1 / 27

BUSINESS AND EMPLOYMENT (Taken from Chapter 11 Tomorrow’s Technology and You and Information Technology in a Global S

BUSINESS AND EMPLOYMENT (Taken from Chapter 11 Tomorrow’s Technology and You and Information Technology in a Global Society Chapter 9). Objectives. Discuss the proliferation and uses of computers in the work place Evaluate the types and growth of e-commerce

graceland
Download Presentation

BUSINESS AND EMPLOYMENT (Taken from Chapter 11 Tomorrow’s Technology and You and Information Technology in a Global S

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BUSINESS AND EMPLOYMENT (Taken from Chapter 11 Tomorrow’s Technology and You and Information Technology in a Global Society Chapter 9)

  2. Objectives Discuss the proliferation and uses of computers in the work place Evaluate the types and growth of e-commerce Explain the technologies used for employee monitoring Evaluate the effectiveness of teleworking Evaluate the policies needed to regulate IT in the workplace Discuss e-marketing techniques Explain how IT can be used in the transportation industry

  3. Where Computers Work Computers have a big impact on all of today’s job markets: Entertainment The production of television programs and movies Publishing Reporters scan the Internet for facts. Write and edit stories on location Transmit those stories by modem to central offices Artists design charts and drawings with graphics software. Photo retouchers use computers to edit photographs. Medicine Medical students and professionals use virtual emergency rooms to simulate processes of collecting vital signs and other patient data. Airlines Commercial pilots use computer-controlled flight simulators to learn flight procedures and to upgrade and maintain their flying skills.

  4. Where Computers Work Science Scientists collect and analyze data using remote sensing devices, notebook computers, and statistical analysis programs. Scientists catalog and organize information in massive databases, many of which are accessible via the Web. Scientists use supercomputers, workstations, and processor-sharing grids to create computer models of objects or environments that would otherwise be out of reach. Scientists communicate with colleagues all over the world through the Internet.

  5. Where Computers Work The automated factory Robots: computer-controlled machines Designed to perform specific manual tasks Used for painting, welding, and other repetitive assembly line jobs Computers help track inventory, time the delivery of parts, control the quality of production, monitor wear and tear on machines, and schedule maintenance.

  6. Where Computers Work • Is more efficient: • Tighter integration of planning with manufacturing, reducing the time that materials and machines sit idle • Reduces waste of facilities, raw materials, and labor • Poses a threat to blue-collar workers who keep traditional factories running: • In a typical high-tech manufacturing firm approximately half of the employees are white-collar workers Engineers use CAD (computer-aided design) and CAM (computer-aided manufacturing) technologies to design new products and the machines that build those products. Web cameras and Web displays built into assembly line equipment enable workers and managers to monitor production and inventory from across the factory floor or across the continent.

  7. Where Computers Work The automated office Workgroup computing Groupware: allows groups of users to share calendars, send messages, access data, and work on documents simultaneously Intranets: networks that use Internet technologies to link employees, shares information privately, difference between this and the Internet is the size and visibility of the network Extranets: networks accessible to strategic partners and customers, only certain information is available on these networks Modern information technology makes an organization: Flatter More integrated More flexible More concerned with managing processes than people

  8. Where Computers Work The paperless office Magnetic and optical archives will replace reference books and file cabinets. Electronic communication will replace letters and memos. Web publications will replace newspapers and other periodicals. HTML, XML, Adobe’s popular PDF (portable document format), and other current technologies make it easier for documents to be transmitted and stored electronically without loss of formatting.

  9. E-Commerce Electronic commerce—buying and selling products through the Internet or a smaller computer network Includes marketing, sales, support, customer service, and communication with business partners Business to consumer (B2C) sales continue to increase each year. In 2009 sales grew 11%, in 2012 growth was 21.1% with 1 trillion dollars in sales B2B (Business-to-business)—transactions between corporations B2C (Business-to-consumer)—transactions between businesses and consumers C2C (Consumer to consumer) – transactions made directly between a seller and a buyer usually facilitated by a third party such as an auction site

  10. For customers

  11. For Businesses

  12. What make a good e-commerce site? • Multiple images of each product • Previews of different product versions • Effective search options • Search filters (show only tents for 3 people) • User reviews • FAQ (Frequently asked questions) • Related product links

  13. Staff Computer and Internet Abuse Statistics 70% of all web traffic to Internet pornography sites occurs during the work hours of 9am-5pm. 58% of industrial espionage is perpetrated by current or former employees. 48% of large companies blame their worst security breaches on employees. 46% of the one thousand largest companies globally will be utilizing IM as a daily communications tool. 64% of employees say they use the Internet for personal interest duringworking hours 70% of all Internet porn traffic occurs during the nine-to-five work day. 37% of workers say they surf the Web constantly at work. 77.7% of major U.S. companies keep tabs on employees by checking their e-mail, Internet, phone calls, computer files, or by videotaping them at work. 63% of companies monitor workers' Internet connections and 47% store and review employee e-mail. 27% of companies say that they've fired employees for misuse of office e-mail or Internet connections, and 65% report some disciplinary measure for those offenses. Traditional Business – Employee Monitoring StaffMonitoring.com 2013

  14. Staff Computer and Internet Abuse Statistics (continued) 90% of employees feel the Internet can be addictive, and 41 percent admit to personal surfing at work for more than three hours per week. 60% of Security Breaches occur within the Company - behind the Firewall 25% of corporate Internet traffic is considered to be "unrelated towork". 30-40% of lost productivity is accounted for by cyber-slacking. 32.6% of workers surf the net with no specific objective; men are twiceas likely as women. 27% of Fortune 500 organizations have defended themselves against claims of sexual harassment stemming from inappropriate email. 90% of respondents (primarily large corporations and government agencies) detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million. StaffMonitoring.com 2013

  15. StaffMonitoring.com 2013

  16. Often, employers have good reason to snoop. According to a 2009 AMA/ePolicy survey: •14% of employees admit to e-mailing confidential or proprietary information about a firm, its people, products and services to outside parties. •14% admit to sending third parties potentially embarrassing and confidential company e-mail that is intended strictly for internal readers. •89% of users admit to using the office system to send jokes, gossip, rumors or disparaging remarks to outsiders. •9% have used company e-mail to transmit sexual, romantic or pornographic text or images. On the employer side, 1-in-10 say they've gone to court to fight lawsuits that were specifically triggered by employee e-mail. In addition, 2% of employers were ordered by courts or regulators to produce employee instant messages (IMs). That's twice the amount reported in 2006.

  17. How does Employee Monitoring Take Place? Previously, workplace monitoring was limited to tapping employees’ phones and physical inspection of employees’ offices. However, as noted above, technological changes have led to the development and use of more sophisticated equipment. Equally, this technology makes employee monitoring less easily detectable and to a certain extent, capable of being more invasive than before. Video surveillance is commonly installed in commercial premises for security reasons. However, in some offices (as opposed to shops), the raison d’etre is not so much that the office is not secure, but that these cameras are used to check employees’ conduct at work. The cameras may be installed openly in and around the office, or hidden at workstations or cubicles. Most areas of the office may be monitored but, for obvious reasons, bathrooms and changing areas are not. There is, however, nothing to stop a company from mounting a camera just outside the bathroom to see which of its employees use the toilet frequently. . http://www.lawgazette.com.sg/2003-1/Jan03-col2.htm

  18. Packet-sniffing software can intercept, analyze and archive all communications on a network, including employee e-mail, chat sessions, file sharing and internet browsing. Employees who use the workplace network to access personal e-mail accounts should note that traffic to and from their personal account may be monitored even if the company’s system does not actually read what is in the personal e-mail box. Keystroke loggers can be employed to capture every key pressed on a computer keyboard. These systems will even record information that is typed and then deleted. ‘Smart’ ID cards can track an employee’s location while she moves around the workplace. The benefit of such a system is that telephone calls for that employee may be routed to literally follow her around the office or to trace employees like doctors who may be located very quickly in hospitals. However, the potential for abuse is great. Using location tracking, an employer may monitor whether employees spend too much time in front of the bathroom sink washing their hands http://www.lawgazette.com.sg/2003-1/Jan03-col2.htm

  19. What is Monitored • Individual application use • Disk space use • Idle time (no mouse or keyboard input) • Instant message chat logs • Installation of software • Access, copying, and changing of files • Documents opened • Windows opened • Items printed • Keystrokes typed (keylogger) • Insertion and removal of USB devices • Software may also have remote viewing and remote desktop features

  20. Problems with Monitoring • Ethical Concerns • Invasion of privacy • Statistics can be misleading • Just because a program or website is open does not mean the employee is interacting with it • Using computer technology to track, record, and evaluate employee performance, often without the knowledge of employees, can raise some other serious issues: • Morale • Devalued skills • Loss of quality

  21. Teleworking (Telecommuting) Teleworkers are employees who work away from the office – either working from home or while travelling – and use IT to stay in touch with colleagues. Variations on Teleworking Some teleworkers work from home part time and from the office part time. Some work from home part time and while travelling.

  22. Arguments for telecommuting: • Reduces the number of automobile commuters • Saves time • Allows for a more flexible schedule • Can increase productivity • Arguments against telecommuting: • Doesn’t work with jobs requiring interaction • Requires self-discipline • Lacks office social life • Causes low visibility

  23. Based on a special analysis of the latest American Community Survey data (2011 data based on surveys conducted in 2010 to 2011), 2.5% of the U.S. employee workforce (3.1 million people, not including the self-employed or unpaid volunteers) considers home their primary place of work. • Growth of Multiple Days per Week Employees (not including self-employed) telecommuting increased 73% from 2005 to 2011 though the rate of growth slowed during the recession: • 2010 to 2011 = 4.1% (3.1 million or 2.5% of the workforce) • 2009 to 2010 = 3.2% (3.0 million or 2.5% of the workforce) • 2008 to 2009 = 3.6% (2.9 million or 2.3% of the workforce) • 2007 to 2008 = 14.1% (2.8 million or 2.18% of  the workforce) • 2006 to 2007 = 7.8% (2.5 million or 1.99% of  workforce) • 2005 to 2006 = 26.2% (2.3 million or 1.86% of  workforce) TeleworkResearchNetwork.com

More Related