Annotation. Title is centered.

Online Monitoring: A Threat to Employee Privacy in the Wired Workplace Annotation. Opening sentences provide background for thesis. As the Internet has become an integral tool of businesses,company policies on Internet usage have become as common aspolicies regarding vacation days or sexual harassment. A 2005study by the American Management Association and ePolicy Institute found that 76% of companies monitor employees’ use ofthe Web, and the number of companies that block employees’ access to certain Web sites has increased 27% since 2001 (1). Unlike other company rules, however, Internet usage policies ofteninclude language authorizing companies to secretly monitor theiremployees, a practice that raises questions about rights in theworkplace. Annotation. Thesis asserts Orlov’s main point.

Although companies often have legitimate concernsthat lead them to monitor employees’ Internet usage—from expensive security breaches to reduced productivity—the benefitsof electronic surveillance are outweighed by its costs to employees’privacy and autonomy.While surveillance of employees is not a new phenomenon,electronic surveillance allows employers to monitor workers withunprecedented efficiency. Annotation. Summary and long quotation are introduced with a signal phrase naming the author. In his book The Naked Employee, Frederick Lane describes offline ways in which employers have beenpermitted to intrude on employees’ privacy for decades, such asdrug testing, background checks, psychological exams, lie detector Title is centered.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Opening sentences
provide background
for thesis.
Thesis asserts
Orlov’s main point.
Summary and long
quotation are
introduced with a
signal phrase
naming the author.
Source:Diana Hacker (Boston:Bedford/St.Martin’s, 2007).
This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (2009).
SSoourucrec: eH:aDckiearn/Sao mHmaecrkse (Br o(sBtoons: tBoend:foBrde/dSfto. Mrda/rStint.’sM, 2a01rt1i,n 2’s0,0 72)0. 07). tests, and in-store video surveillance. The difference, Lane argues, between these old methods of data gathering and electronic

surveillance involves quantity:
Technology makes it possible for employers to gather
enormous amounts of data about employees, often
far beyond what is necessary to satisfy safety or
productivity concerns. And the trends that drive
technology—faster, smaller, cheaper—make it possible
for larger and larger numbers of employers to gather
ever-greater amounts of personal data. (3-4)
Lane points out that employers can collect data whenever
employees use their computers—for example, when they send e-mail, surf the Web, or even arrive at or depart from their workstations. Another key difference between traditional surveillance and
electronic surveillance is that employers can monitor workers’ computer use secretly. One popular monitoring method is keystroke logging, which is done by means of an undetectable program on employees’ computers. The Web site of a vendor for Spector Pro, a popular keystroke logging program, explains that the software can be installed to operate in “Stealth” mode so that it “does not show up as an icon, does not appear in the Windows system tray, . . . [and] cannot be uninstalled without the Spector Pro password which YOU specify” (“Automatically”). As Lane explains, these programs record every key entered into the computer in hidden directories that can later be accessed or uploaded by supervisors; the programs can even scan for keywords tailored to individual companies (128-29).

Orlov 2
Long quotation is
set off from the
text; quotation
marks are omitted.
Page number is
given in parentheses
after the final period.
Clear topic
sentences, like
this one, are used
throughout the
paper.
Source with an
unknown author is
cited by a shortened
title.
SSource: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007). ource:Diana Hacker (Boston:Bedford/St.Martin’s, 2007). Orlov

x

Hi!
I'm Niki!

Would you like to get a custom essay? How about receiving a customized one?

Check it out