An Expectation of Privacy

Author(s):  
Andrew Urbaczewski ◽  
Juho Rikala

This case presents the ethical dilemma of an IT staff member at an academic university. E-mail is an extensively used tool at this university, and the dean suspected that the associate dean was sending personal messages on the university’s server.

Author(s):  
Andrew Urbaczewski ◽  
Juho Rikala

This case presents the ethical dilemma of an IT staff member at an academic university. The IT staffer was caught in the middle of a squabble between the dean of the business school and the associate dean, also of the business school. Professional differences spilled over into personal differences, and the Dean was seeking methods of retribution against the associate dean while the associate dean was on sabbatical. E-mail is an extensively used tool at this university, and the dean suspected that the associate dean was sending personal messages on the university’s server. The dean asked the IT staffer to intervene in two ways: 1) remove her from the staff e-mail list; and 2) forward all of her e-mail to both the dean and the dean’s secretary. He hoped that there would be evidence of misuse of government resources, giving him just cause to terminate her. While this case is based on real events in a real organization, we have changed the names of organizations and participants involved. We regret having to make changes to even the nation in which the program is located, but the tightness of the community compelled the players involved to require absolute anonymity before they gave their consent to publish.


Author(s):  
Andrew Urbaczewski ◽  
Juho Rikala

This case presents the ethical dilemma of an IT staff member at an academic university. The IT staffer was caught in the middle of a squabble between the dean of the business school and the associate dean, also of the business school. Professional differences spilled over into personal differences, and the Dean was seeking methods of retribution against the associate dean while the associate dean was on sabbatical. E-mail is an extensively used tool at this university, and the dean suspected that the associate dean was sending personal messages on the universitys server. The dean asked the IT staffer to intervene in two ways: 1) remove her from the staff e-mail list; and 2) forward all of her e-mail to both the dean and the deans secretary. He hoped that there would be evidence of misuse of government resources, giving him just cause to terminate her. While this case is based on real events in a real organization, we have changed the names of organizations and participants involved. We regret having to make changes to even the nation in which the program is located, but the tightness of the community compelled the players involved to require absolute anonymity before they gave their consent to publish.


1995 ◽  
Vol 58 (4) ◽  
pp. 3-6 ◽  
Author(s):  
George S. Peek ◽  
Maria L. Roxas ◽  
Lucia E. Peek

This paper reports on a project in which students discussed an ethical dilemma using Internet e-mail as the medium of communication. The assignment requires both informal and formal document development in a team environment and uses cooperative learning strategies to assure full participa tion by all students. Students thus have the advantage of discussing an important current business issue, are facili tated in this discussion by the use of structured learning techniques, are required to exercise their thinking and writ ing skills in a variety of ways, and in many cases must acquire new technical and intellectual skills for communi cation across the Internet.


PMLA ◽  
2000 ◽  
Vol 115 (4) ◽  
pp. 519-528

The information that follows is designed to help members of the profession use the association's programs and services and to offer a convenient reference tool for members who wish to undertake specific association-sponsored activities. Unless otherwise noted, all correspondence should be addressed to the department or person indicated at the MLA office, Cooper Station, PO Box 788, New York, NY 10276-0788. At press time the MLA office was moving, and the new phone and fax numbers were not known. For the new fax numbers or to reach a staff member by phone, call 212 475-9500. To reach a staff member by e-mail, follow the address format [email protected]. A list of staff members appears on pages 529-31.For membership information and application forms, write or phone the membership office ([email protected]) or access the MLA Web site (www.mla.org). Membership runs for the calendar year; applications for 2001 membership will be accepted through 30 June 2001. Membership applications received after that date will be effective for 2002, although certain benefits-discounts on MLA publications, members' rates for convention registration and hotels-are available immediately.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2005 ◽  
Vol 36 (1) ◽  
pp. 34
Author(s):  
SHARON WORCESTER
Keyword(s):  

2006 ◽  
Vol 37 (8) ◽  
pp. 56-57
Author(s):  
JOSEPH S. EASTERN
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document