Please, respond to the below classmate discussion posts (125 words each). Please, respond to the below two classmate main posts regarding the use of technology in the workplace. (Please, the responses...

1 answer below »


Please, respond to the attached classmate discussion posts (125 words each). Please, me sure to disagree with them and explain you disagree. No citations required. Thank you!




Please, respond to the below classmate discussion posts (125 words each). Please, respond to the below two classmate main posts regarding the use of technology in the workplace. (Please, the responses need to be a discussion, not an evaluation. You need to disagree with their opinion and add the reasons why and information regarding the topic discussed. No citation required) Thank you Classmate discussion posts Discussion 1 Denetria Holman Memorandum Date:      January 29, 2020 To:          Don Kawamoto From:     Denetria Holman DH Subject: Internet Crackdown Policy In response to your request, we have identified one of the main causes of low productivity. We suggest that a zero-tolerance policy regarding personal internet access be implemented. The internet should only be accessed for business purposes.   Employee productivity has been low for the past six months. You asked us to find the causes of low productivity and ultimately produce a solution. The main objective is to increase productivity, which would lead to greater company profit.   After much research, we find that productivity has been low due to these factors:   · Online Shopping · Social Media Visits · Online Browsing not related to work If you let us know this week, we could schedule a company meeting no later than February 17. Discussion 2 Paige Gibbs A company can face a vast amount of issues when allowing their employees to use social media while at work. The access of having secret proprietary information and processes in an employee’s mind and technology at their fingertips can be a huge concern. The speed of information travel via phones and computers in this current timeframe is almost immediate in most avenues (Guffey and Loewy, p.164). Company methodologies and processes can be leaked to the public or competitors by an employee not being careful when posting status updates, sending communications or through photographs posted on their sites. Companies can lose their edge ahead of their competition and lose profit. I do think there should be some limitations to websites and applications accessed while using work equipment. The risks of malware damaging the equipment presents a higher risk on personal websites than websites screened by company’s security. A security breach could be detrimental to a company’s equipment, and information of the customers. Capital One experienced nearly 106 million customer accounts and credit card applications being compromised in 2019 (Fraud.org, 2019). The company is having to pay for free credit monitoring for their customers and loses a sense of trust from its patrons. This also inconveniences the customers because their social security numbers, credit scores, names, addresses and more were given to sources without their consent, and can be used in fraudulent activity (Fraud.org, 2019). I do believe employees should be allowed to have their phones while working. Family emergencies can happen, and employees should have access to check on their family members if needed. However, having some limitations to prevent breaches are fundamental. Taking photos with cameras on employee’s phones can present problems with releasing information. If employees follow guidelines to prevent any releasing of customer data or proprietary information, they should be allowed to carry their phones while working. Company management should be allowed to monitor use of their equipment. The company paid for the equipment utilized to complete job requirements and are allowing the employees to use the tools to complete assigned tasks. If employees are using computers and phones that belong to the company to look up websites for personal inquiries, the risks of the computers being exposed to viruses and malware are higher that if using the equipment for the intended tasks (Guffey and Loewy, p.165). If the computers need repairs, this can slow down productivity, create a larger workload for the company’s IT department, and cause a loss of profit from costs of repairing or replacing. I believe that employees should be warned about companies monitoring their devices. It dissolves having an invasion of privacy and employees will feel respected and valued. It also secures that if there is a data breach and an employee is found at fault, the employee cannot point blame towards the company for not informing them or plead ignorance. I do support an internet crackdown at the company level. Most companies don’t want to lose any productivity, have security breaches or any possible litigation opportunities (Guffey and Loewy, p.191). I would agree that companies that pay for the equipment and want to protect their assets and their business, and they have the right to do so. Fraud.org. (2019, August 8). Latest Breaches: Capital One Breach. Retrieved from https://www.fraud.org/capital_one_2019. Guffey, M. E., & Loewy, D. (2019). Short Workplace Messages and Digital Media In Essentials of business communication (pp. 156-193). Boston, MA: Cengage Learning.
Answered Same DayFeb 01, 2021

Answer To: Please, respond to the below classmate discussion posts (125 words each). Please, respond to the...

Sourav Kumar answered on Feb 02 2021
137 Votes
Discussion 1
Turning out little upgrades to penchants will profoundly improve the degrees of gainfu
lness and office profitability in the business. This will allow the representatives to achieve more prominent quality work in a shorter time period similarly as lessen the proportion of time spent on inconsequential assignments.
Web-based social networking and online shopping can be an immense efficiency executioner, however it doesn’t qualify as closer to earth to have a no-cellphone strategy. On the other hand, attempt to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here