Legal Implications of Personal Web Use in the Workplace

Author(s):  
Grania Connors ◽  
Michael Aikenhead

The virtues of the Internet as a business tool have been widely extolled: the Internet instantly makes available information that may be difficult or time consuming to obtain by other means. However, use of the Internet in the workplace is fraught with potential problems. This chapter examines the legal implications of personal Web use in the workplace. Specifically, it focuses on the legal issues which can arise for both employers and employees when an employee uses organizational computing facilities for non-work related activities such as surfing the Internet, sending e-mail, chatting online, or instant messaging.

Author(s):  
Susan K. Lippert

This chapter addresses the concept and importance of interpersonal trust through the use of the Internet in an organizational setting. In particular, personal Web usage is explored by examining employee interpersonal trust. Personal Web use refers to an employee’s utilization of the Internet for non-job related activities within a work environment. Examples of personal Web use include online banking, participating in instant messaging or chat sessions, buying goods or services, and any other activity in which the Internet is accessed for non-work-related tasks. A discussion regarding the importance of trust, its nature, and strategies for building interpersonal trust in an organizational setting are offered. Generalized guidelines for organizational practice and recommendations to support a culture of trust within the work environment are presented. This chapter addresses the notion of trust through personal Web usage as a human resource management issue.


Author(s):  
Paulette S. Alexander

Many employees have job responsibilities which require Web and other Internet applications. Because of the availability of intrusive software and the existence of various motivations, employees are subjected to unsolicited pop-up windows, browser hijacking, unintended release of confidential information, and unwanted e-mail. These intrusions are a significant problem for employees and employers because they waste resources and create liability situations. Solutions examined include education of employees, standards of practice in the conduct of job-related Internet use, policies regarding Internet use for non-work-related purposes, and deployment of protective technologies. Constant attention to evolving threats and updating of the solutions is also essential to successful use of the Internet in the workplace.


2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.


Author(s):  
Pruthikrai Mahatanankoon

E-mail and instant messaging (IM) are essential ingredients of workplace communication. The study examines how the hedonic use of electronic communications influences work-life balance and cognitive absorption. Data collected from white-collar employees in the United States show that work-life balance mediates the relationship between personal e-mail and cognitive absorption, and that personal instant messaging has no impact on work-life balance but has a direct influence on employees’ cognitive absorption. The findings suggest that work-life balance may eventually increase cognitive absorption and reduce employees’ productivity. The findings provide insight into how different types of personal communication can influence work-life balance as well as into how to manage non-work-related electronic communications in the workplace.


Author(s):  
Tejaswini Herath ◽  
S. Bagchi-Sen ◽  
H. R. Rao

A tremendous growth in the use of the Internet has been observed in the past two decades. More than 75% of Americans participate in online activities (University of Southern California Annenberg School Center for the Digital Future, 2004) such as e-mail, Web browsing, working from home, accessing news stories, seeking information, instant messaging, using the Internet in lieu of the library for school work, playing games, and managing personal finance. For professionals, the Internet is an important medium for networking and building social capital. However, along with all positive impacts, there are also negative outcomes. One such negative outcome includes Internet crimes. Dowland, Furnell, Illingworth, and Reynolds (1999) state that “with society’s widespread use of and, in some cases, reliance upon technology, significant opportunities now exist for both mischievous and malicious abuse via IT systems” (p. 715). Internet crimes (cyber crimes) consist of specific crimes dealing with computers and networks (such as hacking, spreading of viruses, and worms) and the facilitation of traditional crime through the use of computers on the Internet (such as child pornography, hate crimes, telemarketing/Internet fraud). This article focuses on Internet crimes, especially those affecting individual users, and offers a discussion of issues regarding Internet crimes and gender.


First Monday ◽  
2007 ◽  
Author(s):  
Kofoworola Jagboro

The Internet is arguably one of the most significant technological developments of the late 20th century. However, despite the added benefits of this tool to learning, teaching and research, a number of problems still plague Internet connectivity and usage in the Nigerian University system. The objective of this study was to evaluate the level of utilization of the Internet for academic research at the Obafemi Awolowo University, Ile-Ife, Nigeria. Questionnaires were administered to postgraduate students spanning art and science based programmes. The results from the analysis of the responses showed that the use of the Internet ranked fourth (17.26 percent) among the sources of research materials. However, respondents who use the Internet ranked research materials (53.42 percent) second to e-mail (69.86 percent). The study concludes that the use of the Internet for academic research would significantly improve through the provision of more access points at Departmental and Faculty levels.


2012 ◽  
Vol 47 (1) ◽  
pp. 37-41
Author(s):  
A. Zak Kevin ◽  
L. Monaghan Christina ◽  
Parker Amanda

Purpose An observational study was conducted to identify and evaluate trends in the use of the Internet and social media by pharmacy publications. Methods The print and online versions of 10 pharmacy publications were compared at 2 different times separated by 3 years for similarities and differences in content and presentation. Characteristics and functions were evaluated for online publications, including subscription requirements for online access, the dates of online archived material, pre- and postpublication features, e-mail notifications, hyperlinks, and the use of social media and other specialty applications. Results Between 2007 and 2010, online functionality of selected pharmacy publications increased in 52% (12/23) of the features assessed; among these expanded features, the median percent increase was 20%. The 2 most prevalent online features among publications in 2007 and 2010 were article availability in portable document format (pdf) and the ability to submit articles online. The online feature most adopted during the study timeframe was the ability to e-mail friends about an article (increased by 40%). In 2010, the majority of publications offered social media or other specialty applications (80%) and required a paid subscription for online access (60%). Conclusion Currently, not all available online features have been adopted by the reviewed pharmacy publications. Overall, the online functionality of pharmacy publications was maintained or slightly increased from 2007 to 2010. It is important for publishers to continue to expand their presence on the Internet to improve accessibility to the scientific literature.


2009 ◽  
Vol 60 (1) ◽  
pp. 30
Author(s):  
Ralph L Scott

We have all become increasingly aware that, for commercial and perhaps other reasons, our use of the Internet can and is being tracked. For most of us this tracking has become a major concern as unwanted e-mail (commonly called SPAM) has begun to clog our incoming mailboxes.  There are a variety of ways to combat both the tracking and the receipt of unwanted e-mail. One of the ways of dealing with this problem is the use of an anonymiser service, many of which are available over the Web.


Refuge ◽  
2006 ◽  
pp. 51-57 ◽  
Author(s):  
Cindy Horst

This article illustrates the methodological potential of electronic media such as the Internet and e-mail for research amongst refugee diasporas. It will first describe research amongst Somalis in Kenyan refugee camps, which demonstrated the importance of transnational networks in the survival of refugees in the camps. The intention of the research set-up was to provide an alternative approach to common depictions of refugees, which often ignore their agency. A focus on agency, referring to every individual’s level of choice and power, is as much a methodological decision as a theoretical or epistemological assumption, since people’s agency clearly manifests itself in knowledge creation. After describing the possible dialogical nature of academic knowledge creation, the article moves on to illustrate how electronic media can play an important role in this. There are a number of apparent advantages to the methodological use of the Internet and e-mail in research, though at the same time pitfalls should not be underestimated. Nevertheless, when studying refugee communities that are dispersed across the globe and make active use of electronic media, “virtual dialogues” provide fascinating new insights.


Sign in / Sign up

Export Citation Format

Share Document