Полнотекстовый поиск:
Где искать:
только в названии
только в тексте
слова в тексте
только заголовок

Рекомендуем ознакомиться

Остальные работы->Реферат
Throughout time more powerful countries have extended their influence over weaker countries and then colonized those countries to expand their own pow...полностью>>
Остальные работы->Реферат
S. Reid also on the Lawson commission, and his “theory of elastic rebound” are significant observations in earthquake research. Although one would thi...полностью>>
Остальные работы->Реферат
Who really decided what acceptable use of force is? How thin of a line is it? To me the line seems so thin that it virtually does not exist. Or does t...полностью>>
Остальные работы->Реферат
Wolf spiders are a group of ground-dwelling hunting spiders. There are more than 2 types of wolf spiders. They range from 2mm to 40mm. Some wolf spide...полностью>>

Главная > Реферат >Остальные работы

Сохрани ссылку в одной из сетей:

Reducing Employee Productivity

Loss, After Connecting to the Internet

Case Study


Ronald B. Burke

In Partial Fulfillment of the Requirements of MI537

Data Communications and Networks

City University

February 16th, 2001


Today companies continually search for ways to improve efficiency, and Internet e-mail has helped to achieve this goal. One of the problems not foreseen in connecting the office to the Internet is the millions of Web sites that exist. Making it simple for workers to connect to the Internet allows users to waste time, money, and bandwidth, only to return with virus-laden files as souvenirs of their efforts. This report examines corporate need for effective Internet controls, and strong access policies.

Topics Covered

? Web Surfing Costs

? Unauthorized Access, Attacks, and Virus Contamination

? Network Security

? Creating a Network Use Policy

Web Surfing Costs

Costs are contained if employees use the Internet at work as intended. A “wired” workplace finds its productivity hampered as often as augmented due to employees having Internet access. The Internet is vast; the temptation to Web surf pursuing personal interests at work is hard to resist.

United States Department of Labor estimates printed in The Standard.com (2000), are wasted time cost corporations three million dollars a year per each 1000 employees. The article continues: “Where are employees wasting most of their time these days? It is not the water cooler”. Companies that want to improve efficiency are looking to rein in Web surfing workers.” In a Christmas 1999 article about electronic greeting cards, ZDNN (1999) reported: “There is rising corporate fervor against opening unnecessary files amid concerns about excessive personal usage among employees.”

Unauthorized Access, Attacks, and Viruses

Web sites proliferate as a means of corporate promotion, customer service, and commerce. Unauthorized Internet access in the form of Web site intrusions, breaches and viruses can lead to lost time, money, information, or worse.

Internet Hackers work to crack passwords, breaking into corporate networks believed secure. Thestandard.com (1999) reported Microsoft fell prey to a hacker attack on its network in October that year. The company says someone transferred its passwords to an e-mail account in Russia, where hackers posed as Microsoft employees.

Increasingly sophisticated viruses used against Internet sites endanger corporations everywhere. The 1999 Babylonia virus found by Symantec (1999) started its spread through Internet chat rooms. Unlike typical viruses, Babylonia updates itself automatically with files from the Web.

Network Security

Banning corporate Internet use to avoid problems is impractical. Too many companies are unaware of the dangers and need a more responsible strategy.

Network security should include:

? Protection against Information Loss

? Productivity Monitoring

? Maximizing Network Speed

Network speed is a function of connection, hardware, and software. Any effective Information Systems Department can achieve this easily. Virus protection and access protection software can prevent data loss or theft. Network-tracking tools exist for unobtrusive use monitoring.

Creating a Network Use Policy

Use polices must advise all employees their Internet access is being monitored. The policy must delineate what types of access the company deems acceptable.

Outline those practices unacceptable: personal interest surfing during business hours; visits to sexually explicit, racist, or terrorism promoting sites at any time. Policies should explain why limits protect time, information, and guarantee a pleasant work environment for everyone. It is important to specify penalties applied for any policy breaches.

Infoworld business technology architect Brooks Talley (1999) advised: “Communicate clearly the change in policy”. Be sure to enumerate the reasons for change, but also be sure to make it clear that if someone has a real need for service, you are committed to providing it.”

Conclusion and Recommendation

Internet connection when used for business purposes does give business a huge edge over companies that are not connected. Disconnecting from the Internet would not allow “instant communication” needed in today’s business environment. The best course of action at this time is to develop a clear network use policy, and implement network use monitoring. Review news, Internet, and professional journal articles, evaluating use trends and monitoring technologies. Information System Department representatives can attend technology symposiums to evaluate newly released technology,

Talley, B. (1999). Communicate Clearly the Change in Policy. [www.infoworld.com]. URL: http://www.infoworld.com/cgibin/displayArchive.pl?/99/36/z02-36.70.htm

The Standard. (1999). Microsoft Fell Prey to a Hacker Attack. [http://www.thestandard.com/]. URL: http://www.thestandard.com/article/display/0,1151,19745,00.html

The Standard. (2000). US Labor Department Estimates on Employee Time Management. [http://www.thestandard.com]. URL:


Symantec Anti-Virus Research Center. (1999). The 1999 Babylonia Virus. [http://www.symantec.com]. URL:


ZD Net News. (1999). Businesses Shun Electronic Greeting Cards. [http://www.zdnet.com]. URL: http://www.zdnet.com/stories/bursts/0,7407,2413458,00.html

Загрузить файл

Похожие страницы:

  1. Employee Benefits Essay Research Paper If you

    Реферат >> Остальные работы
    Employee Benefits Essay, Research Paper If you have employees, than salaries, wages & benefits are ... the answer. You can reduce unwanted employee turnover & related recruiting, ... environment that contributes to increased employee productivity. To create a win/ ...
  2. Employee Theft Essay Research Paper OUTLINEI OverviewII

    Реферат >> Остальные работы
    ... Essay, Research Paper OUTLINE I. Overview II. Myths & Misconceptions III. Facts & Reality IV. Why Employees ... scrap metal, printing, bakery products or cardboard boxes, it has ... reduce risks to theft and prevent losses. Some accepted theories regarding employee ...
  3. Reducing The Military Essay Research Paper With

    Реферат >> Остальные работы
    Reducing The Military Essay, Research Paper With the end of ... closure of bases, the reduced production by defense contractors, the ... The actions taken to reduce the military has left ... contractors to make cutbacks in employees. 1.3 million jobs have been ...
  4. Industry Production Essay Research Paper Industry ProductionThe

    Реферат >> Остальные работы
    Industry Production Essay, Research Paper Industry Production The structure of industrial production and the service industries ... by the high number of employees. There is only a limited ... and European continental plates reduced their common marine space ...
  5. Production Planning Essay Research Paper Production PlanningIntroductionThe

    Реферат >> Остальные работы
    Production Planning Essay, Research Paper Production Planning Introduction The intention of ... Kodak gives monetary rewards to employees who devises an improvement in ... that I could have further reduced costs by reducing some of the parts ...

Хочу больше похожих работ...

Generated in 0.0026299953460693