Saturday, November 12, 2011

Chapter 6-Part 2: Work

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.4 and 6.5

1. (Knowledge)Tell three interesting elements of this chapter:

a. I learned that embezzlement means, “fraudulent appropriation of property by a person to whom it has been entrusted.” (pg. 332)

b. I couldn’t believe when I read that 47% of retail losses are from retail store employees. I have never stolen anything in my life, let alone from my place of employment. (pg. 337)

c. I didn’t know that some places of employment took such extreme measures to keep track of their employees by using electronic surveillance badges to know their every location. (pg. 337)

2. (Comprehension) Summarize what is being discussed within this chapter?

In section 6.4, Baase discusses embezzlement, fraud and different ways an employee can sabotage their workplace using technology (pg. 332-335). In section 6.5 Baase goes into the different techniques companies use to monitor their employees. Baase explains the three most common issues in the three areas of electronic monitoring; details of performance, location and performance of scattered employees, and e-mail, voice mail, and Web surfing. Throughout these sections, Baase implicates the ethics involved with an employee’s right to privacy and an employer’s protection of property rights (pg. 335-344).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

At my work I have personally experienced my employer monitoring the web activity of employees at the workplace. If an employee tries to go on an unrelated website to work on one of the work computers the web page will not open. My employer has made it so certain websites are restricted access while connected to their internet and at their workplace. As Baase states on page 343, some people may feel this restricted access as an invasion of privacy because then your employer will know what websites you are going on. I agree with those who feel this monitoring is acceptable because going online at your workplace is on their property and on their time they are paying their employees for.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

In chapter 6, Baase talks about retail theft and embezzlement by employees. Not in relation to computers, technology, or the internet, theft by employees at their workplace in general is still a pressing issue today. I have heard from friends at their workplaces who have stolen food if they work at a grocery store, or liquor at a liquor store, or appliances at a home store. None of these thefts have to do with technology directly but are still wrong. On page 334 Baase gives some reasons of why people may do this and I do this that they are related, mostly financial or just because the person wants to get back their boss.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said in the second part of chapter 6 because employee crime and employee monitoring are issues people still have to deal with today. Employers and employees have always had to deal with these issues because no workplace has ever been perfect. The issues have evolved with the technology, so now that there are new ways to steal from an employer, such as embezzlement, or to monitor your employees, such as looking through their e-mails and websites, the issue has only become more advanced.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

I believe that this topic is relevant in today’s society because if you look at the rising statistics of today’s employee theft you will see the rate is consistently growing. According to The Schulman Center for Compulsive theft, spending, and hoarding, 75% of employees steal from their work and do so repeatedly, 30% of corporate bankruptcies resulted from employee theft, and 60% of inventory losses were due to employee theft. The FBI believes that employee theft is the fastest growing crime in America (http://www.theshulmancenter.com/facts.htm). These statistics show the seriousness of employee theft is America’s society today. The ethical issue raised by employee monitoring is the crossing the line between an employer protecting their property rights, and an employee protecting their privacy rights (Baase, pg. 342).




References

http://www.theshulmancenter.com/facts.htm

No comments:

Post a Comment