MLA Annotated Bibliography (Orlov)
|
|
|
- Charity Pearson
- 10 years ago
- Views:
Transcription
1 MLA Annotated Bibliography (Orlov) Orlov 1 Anna Orlov Professor Willis English March XXXX Online Monitoring: A Threat to Employee Privacy in the Wired Workplace: An Annotated Bibliography Adams, Scott. Dilbert and the Way of the Weasel. New York: Harper, Print. Adams s Dilbert cartoons are known for satirizing everyday workplace issues. The cartoon on page 106 illustrates how rampant Internet use in the workplace has become and suggests that both employers and employees are well aware of the practice. The cartoon points out the difficulty employers face in trying to restrict employee Internet use. American Management Association and epolicy Institute Electronic Monitoring and Surveillance Survey. American Management Association. Amer. Management Assn., Web. 15 Feb According to the survey of workplace Internet use summarized in this article, employers are most concerned about employees visiting inappropriate Web sites. However, employers monitoring of employees extends beyond blocking certain Web sites. Many employers who participated in the study also track individual keystrokes and review s. The study suggests that the majority of employers who monitor Internet use are telling their employees that they are being In MLA style, each entry begins at the left margin; subsequent lines indent 1 2''. The annotation begins on a new line and is indented 1 2''. Marginal annotations indicate MLA-style formatting and effective writing. Source: Diana Hacker (Boston: Bedford/St. Martin s, 2007). This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (2009).
2 Orlov 2 Orlov interprets the source s findings in relation to other sources in the bibliography. Double-spacing is used throughout, with no extra space between entries and no extra space between entries and their annotations. Annotations are usually three to seven sentences long. monitored. These findings seem to contradict many of my other sources, which claim that employers are not doing enough to explain Internet monitoring to their employees. Automatically Record Everything They Do Online! Spector Pro 5.0 FAQ s. Netbus.org. Netbus.org, n.d. Web. 17 Feb Spector Pro is a type of Internet surveillance program. This Web page, sponsored by the manufacturer of the product, explains the functionality of the software and describes its features. It can be installed on a variety of computers and can be installed in Stealth mode so that the user cannot detect the software on his or her computer. The program can also monitor all computer use ranging from Word documents to Web sites. This source supports my other sources by illustrating the ease with which this kind of software can be installed as well as the extensive amount of information it can gather for employers. Flynn, Nancy. Internet Policies. epolicy Institute. epolicy Inst., n.d. Web. 15 Feb This excerpt from Flynn s The epolicy Handbook offers statistics on employee Internet use and five suggestions for minimizing it. Flynn claims that the majority of employees in the United States are using company time to surf the Internet and that companies are suffering huge financial losses as a result. Her suggestions for minimizing personal Internet use include establishing a company Internet policy and installing monitoring software. This is consistent with the suggestions of many other sources. Source: Diana Hacker (Boston: Bedford/St. Martin s, 2007).
3 Orlov 3 Frauenheim, Ed. Stop Reading This Headline and Get Back to Work. CNET News.com. CNET Networks, 11 July Web. 17 Feb The author examines the results of a study of ten thousand employees conducted by America Online and Salary.com, which found that the Internet was the most popular means of wasting time at work. Frauenheim notes that the extra time spent surfing the Internet is costing companies an estimated $759 billion a year but also quotes the senior vice president at Salary.com and a director at America Online, who argue that employee Internet use actually increases productivity and creativity in the workplace. Frauenheim suggests that the increase in personal Internet use at work might result from a longer average workday and that use of the Internet has made employees more efficient, giving them more free time to waste. Gonsalves, Chris. Wasting Away on the Web. eweek.com. Ziff Davis Enterprise Holdings, 8 Aug Web. 16 Feb In this editorial, Gonsalves considers the implications of several surveys, including one in which 61% of respondents said that their companies had the right to spy on them. The author agrees with this majority, claiming that it s fine if his company chooses to monitor him as long as the company discloses its monitoring practices. He adds that he would prefer not to know the extent of the monitoring. This article, though not entirely objective, offers an employee s perspective on Internet surveillance in the workplace. It also Summary is followed by a balanced evaluation of the source.
4 Orlov 4 contradicts some of my other sources, which claim that employees want to know and should know all the details of their company s monitoring procedures. Kesan, Jay P. Cyber-Working or Cyber-Shirking? A First Principles Examination of Electronic Privacy in the Workplace. Florida Law Review 54.2 (2002): Print. This extensive, balanced article examines the legal issues involved in Internet monitoring and employee privacy. Kesan establishes that US written law and common law do not guarantee a right to electronic privacy in the workplace. He suggests that Internet policies should be addressed through a market-based contractual approach that would benefit both employers and employees. Kesan examines employee concerns, such as a working parent s desire to check on his or her children while at work, and employer concerns, such as legal liability for inappropriate employee Internet use. He concludes that a company should develop an Internet policy, make that policy known to all employees, and then monitor employees to ensure that the policy is being followed. Lane, Frederick S., III. The Naked Employee: How Technology Is Compromising Workplace Privacy. New York: Amer. Management Assn., Print. Lane s book discusses the lack of employee privacy in the modern workplace. The author acknowledges that employers have several reasons to be concerned about employee Internet use, such as theft, a decrease in productivity, and workplace lawsuits. At the same time, however, he questions
5 Orlov 5 where employers will draw the line as technology becomes better and better at tracking an employee s every move. This book is accessible and draws from a variety of sources; it confirms the information provided by my other sources. Tam, Pui-Wing, et al. Snooping by Software Is Now a Workplace Norm. Wall Street Journal 9 Mar. 2005: B1+. Print. The authors point out that in every state except Connecticut and Delaware, companies can legally monitor employee without notifying employees and can also use s as evidence in lawsuits against employees. According to the article, only 27% of companies monitor employee-toemployee s, although these s are potentially the most incriminating, since employees are less likely to censor themselves with other employees. The article also explores the means by which companies now monitor employee , such as software that searches not only for inappropriate words but also for words specific to the industry and even the company. Although the article is narrowly focused, it offers a good overview of current practices regarding monitoring in the workplace. Tynan, Daniel. Your Boss Is Watching. PC World. PC World Communications, 6 Oct Web. 17 Sept This conversational article presents ten myths about employee Internet and computer monitoring and reveals how wrong they are. Although several of the myths are discussed more extensively in my other sources, Tynan presents some new information. For example, he states that some employers
6 Orlov 6 monitor employee Webmail accounts in addition to company accounts. Perhaps most important, the article gives a sense of how unaware most employees are about the current capabilities of employee Internet monitoring and about their own lack of legal protection from employers who monitor them. Verespej, Michael A. Inappropriate Internet Surfing. Industry Week. Penton Media, 7 Feb Web. 16 Feb Unlike most of my other sources, this article is aimed at employers and suggests that they need to do more to establish Internet policies and monitor employees. Verespej warns that if employers do not establish Internet policies, they leave themselves vulnerable to expensive and damaging lawsuits, such as suits based on inappropriate or discriminatory s distributed in the workplace. He offers several examples to back up his claim that employers are more at risk than employees from lawsuits. This seems to contradict the information in my other sources, which present the risks mostly in terms of employees privacy.
MLA Research Paper (Orlov)
MLA Research Paper (Orlov) Orlov 1 Title is centered. Opening sentences provide background for thesis. Thesis asserts Orlov s main point. Summary and long quotation are introduced with a signal phrase
Documenting sources in MLA style. MLA list of works cited
2011 MLA Citation Guide Documenting sources in MLA style In English and other classes, you will be asked to use the MLA (Modern Language Association) system for documenting sources. The guidelines in this
APA 6 th Edition Formatting and Style Guide. Lakehead University Writing Center Workshop
APA 6 th Edition Formatting and Style Guide Lakehead University Writing Center Workshop Presentation Overview Why document? Research tips Formatting quotations General APA guidelines Specific guidelines:
MLA Format Example and Guidelines
MLA Format Example and Guidelines Fleming 1 John Fleming Professor Daniels ENGL 1301 One-inch margins on all sides. EVERYTHING double spaced. EVERYTHING in Times New Roman 12 pt. font size. For more details
Writing the MLA Research Paper
Writing the MLA Research Paper Philosophy 1. Name Research = re-search, i.e., search and search again for information 2. Purpose a. To inform b. To persuade c. To persuade and to inform 3. Benefits a.
PROTECTING YOUR DIGITAL LIFE
PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?
SAMPLE TURABIAN STYLE PAPER
SAMPLE TURABIAN STYLE PAPER John Doe History 2010 Dr. Johnson July 11, 2014 Doe 1 The Turabian style sample essay has been prepared to help answer some of the questions and problems that you may have when
Chicago Citation Style: Footnotes and Bibliography
Chicago Citation Style: s and Last updated: September 10, 2010 The Politics Department has adopted the Chicago citation format for footnotes in academic papers. The Chicago citation style is the method
Employee PC and Server Activity Monitoring Solution
Employee PC and Server Activity Monitoring Solution Employee PC and Server Activity Monitoring Ever dreamed of a software tool to track your network activity in real time? Ever thought of how useful it
Auditing Security: Lessons Learned From Healthcare Security Breaches
Auditing Security: Lessons Learned From Healthcare Security Breaches Adam H. Greene, J.D., M.P.H. Davis Wright Tremaine LLP Washington, D.C. Michael Mac McMillan CynergisTek, Inc. Austin, Texas DISCLAIMER:
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
INCREASING PRODUCTIVITY. By Implementing A Non-Invasive Employee Surveillance Solution
INCREASING PRODUCTIVITY By Implementing A Non-Invasive Employee Surveillance Solution Introduction 3 Employee Monitoring 3 How It Works 4 Employee Activity 5 Internet Activity 5 Applications Used 5 Overtime
Syllabus ENC 3249 Professional and Technical Writing for Computing
Syllabus ENC 3249 Professional and Technical Writing for Computing Instructor: Michael Creeden Phone: 305.348.2508 Class: MWF 9-950 Office Hours: F 11AM-1PM; Office: DM 459B Location: TBD E-mail: Course
AP English Language Research Project Assignment Created by Sandy Jameson, Nazareth Area High School, 2013
Assignment Created by Sandy Jameson, Nazareth Area High School, 2013 You will be creating an AP Exam style Synthesis Question. The Synthesis Question gives you several sources, and asks you to combine
MLA Format: Not As Difficult As It Seems. students view their teachers as red-pen-happy, paper-slaying dragons. Fortunately, with the
Student 1 Joe Student Mr. Pollard Mythology 13 January 2014 MLA Format: Not As Difficult As It Seems Writing an MLA-formatted paper can seem like a daunting task at first, especially when students view
Master Syllabus. Learning Outcomes. ENL 260: Intermediate Composition
Master Syllabus ENL 260: Intermediate Composition University Studies Cluster Requirement 1C: Intermediate Writing. This University Studies Master Syllabus serves as a guide and standard for all instructors
TechTarget Enterprise Applications Media. Pocket E-Guide
TechTarget Enterprise Applications Media Pocket E-Guide Data Breach Dangers: Learn to How to Protect Data and Lower Security Spending While most organizations today acknowledge the importance of information
American Academic Writing Conventions
American Academic Writing Conventions This handout will describe some common writing practices and assignments in American colleges such as The College of Saint Rose. For more assistance, come see the
State By State Employee Monitoring Laws
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 [email protected] State By State Employee Monitoring Laws Law360,
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
Is security awareness a waste of time?
Is security awareness a waste of time? New York State Cyber Security Conference June 5, 2013 Scott Gréaux Vice President Product Management and Services, PhishMe, Inc. They are exploiting human vulnerabilities
ADMS 3015 Winter 2012 Professional Communication in a Canadian Context
ADMS 3015 Winter 2012 Professional Communication in a Canadian Context Course Director: Marlene Bernholtz Contact: [email protected] Office Hours: After class; Before class, by appointment. Class
National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey
PRESS RELEASE Oct. 1, 2012, 9:00 a.m. EDT National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey WASHINGTON, Oct. 1, 2012
A Writer s Reference, Seventh Edition Diana Hacker Nancy Sommers
A Writer s Reference, Seventh Edition Diana Hacker Nancy Sommers What s new on the companion Web site? hackerhandbooks.com/writersref The companion Web site for A Writer s Reference, Seventh Edition, now
Guide to APA Style. What is APA style?
Guide to APA Style Dr. Blakemore PSY 100 What is APA style? Writing style developed by the American Psychological Association Used in many social and behavioral sciences and other fields such as communication,
WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES
BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION IDT911 1 DEFINITIONS 1. Cyber Programs - Focuses on services and systems related to technology and their use in business. Risks addressed include
HEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
MLA Style Sheet for Bibliography and Footnotes/Endnotes (For Humanities)
MLA Style Sheet for ibliography and ootnotes/endnotes (or Humanities) The MLA style of bibliographic citations is often used to cite sources in the humanities. The difference between MLA style and Turabian
Are You Ready for PCI 3.1?
Are You Ready for PCI 3.1? Are You Ready for PCI 3.1? If your hotel is not PCI compliant, it should be. Every time a customer hands over their credit card, they trust your hotel to keep their information
HIST 106: HISTORY OF CIVILIZATIONS II
UNIVERSITY OF LOUISVILLE Daniel Krebs, Ph.D. Department of History Gottschalk Hall 102C Louisville, KY 40292 Email: [email protected] HIST 106: HISTORY OF CIVILIZATIONS II Spring 2014 1. COURSE
How to Cite Information From This System
How to Cite Information From This System How you cite material from this system will depend on the style you have been asked to use. This document covers three styles: Chicago style Modern Language Association
Anatomy of a Hotel Breach
Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent
ANGL 1041 Language, Writing and Reading Winter 2012
ANGL 1041 Language, Writing and Reading Winter 2012 Professor: Laurie Armstrong Cooper Office: 237B Fine Arts Office Phone: 858-4596 Office Hours: Mon. 1:30 to 4:30 p.m.; Wed. 2-5 p.m. Also by appointment.
Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have?
Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have? Are you unsure as to how to do this? If so, hopefully this article
MLA Formatting in Microsoft Word 2010/2011
MLA Formatting in Microsoft Word 2010/2011 Learn to format a research paper in MLA style using Microsoft Word 2010 for Windows and 2011 for Mac. Program Version and Resources for Guide All the recommended
APA Annotated Bibliography (Haddad)
APA Annotated Bibliography (Haddad) Gender and Online Communication 1 Arman Haddad Professor Andrews Psychology 101 14 October XXXX Patterns of Gender-Related Differences in Online Communication: An Annotated
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
Google: Trust, Choice, and Privacy
Google: Trust, Choice, and Privacy Gus Meuli, Caitlin Finn Trust is hard to earn, easy to loose, and nearly impossible to win back. 1 This statement seems to ring true in the constantly changing world
GRADUATE PAPER FORMAT
GRADUATE PAPER FORMAT PAPER FORMAT The format of term papers and the file paper with regard to content is based upon the style used in the ACM publication Communications of the ACM and guidelines for presentation
Small Business Trends
In searching the publicly accessible web, we found a webpage of interest and provide a snapshot of it below. Please be advised that this page, and any images or links in it, may have changed since we created
ENGL 111-08 ENGLISH COMPOSITION COURSE SYLLABUS, SPRING 2012
APPENDIX A--Course Syllabus IVY TECH STATE COLLEGE REGION 14 BLOOMINGTON ENGL 111-08 ENGLISH COMPOSITION COURSE SYLLABUS, SPRING 2012 This syllabus outlines the requirements, expectations, and policies
Crash Course in APA Style: Documentation for Academic Writing. Sting Y. Jacket. Black Hills State University. Running head: CRASH COURSE IN APA STYLE
1 Running head: CRASH COURSE IN APA STYLE Comment [A1]: The label running head only appears on the title page; all caps are used for the shortened version of the title. Crash Course in APA Style: Documentation
Text Margins 1 inch all around Typing -Do not break (hyphenate) words at end of a line.
A P A 6 th Edition Sample Paper Text Margins 1 inch all around Typing -Do not break (hyphenate) words at end of a line. -Indent the first line of every paragraph except for the abstract page (The default
MLA Style Guide Quick & Easy
MLA Style Guide Quick & Easy By Eric Garcia Updated: October 15, 2015 at 2:32 p.m. General Guidelines In-Text Citation In-Text Examples Books Anthology Reference Material Newspapers Magazine Journals Webpage
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
HIST200 - Introduction to the Discipline of History SAMPLE SYLLABUS MWF 1:00-1:50 p.m. Professor Amanda López, Ph.D.
HIST200 - Introduction to the Discipline of History SAMPLE SYLLABUS MWF 1:00-1:50 p.m. Professor Amanda López, Ph.D. Course Description This course introduces history majors, history education majors,
7 Biggest Mistakes in Web Design 1
7 Biggest Mistakes in Web Design 1 7 Biggest Mistakes in Web Design 2 Written by Senka Pupacic This is not a free e-book! Printing out more than one copy - or distributing it electronically is prohibited
Data Sheet: Work Examiner Professional and Standard
Data Sheet: Work Examiner Professional and Standard Editions Overview One of the main problems in any business is control over the efficiency of employees. Nowadays it is impossible to imagine an organization
MLA-Style Citation Guide
Bibliography/Works Cited/Source List Why We Do This Whenever you draw on another s work, you must also document your source by indicating where you borrowed it from. Through documentation, you will provide
Writing a Research Paper. a. It is a written document primarily used in academic settings.
Online Writing Center, Darton State College 1 Writing a Research Paper What is a research paper? a. It is a written document primarily used in academic settings. b. It is a document that is used to present
-------------------------------------------------------------------------------- Course Description Readings Course Requirements Research Paper
Course Syllabus Political Science 301 American Government and Politics Winter 2011 Course Description Readings Course Requirements Research Paper Instructor: Richard Gelm, Ph.D University of La Verne Dept.
The Value of Email DLP
The Value of Email DLP Identifying and Minimizing Your Organization s Greatest Risk By ZixCorp www.zixcorp.com Zix Email Data Loss Prevention Page 1 CLICKING SEND IS ALMOST TOO EASY. We ve all had those
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
7 th Edition MLA Handbook
7 th Edition MLA Handbook University of Akron Wayne College Smucker Learning Center MLA HANDOUT FOR WAYNE COLLEGE STUDENTS This handout is designed to assist students in documenting research papers using
Language Arts Division
1 Language Arts Division English 103, Composition and Critical Thinking, Spring 2016 Online Section #8193 Transfers to UC/CSU, 3 units 11 April 6 June 2016, 6 hrs 30 mins per week Prerequisites: Completion
ROYAL REHAB COLLEGE AND THE ENTOURAGE EDUCATION GROUP. UPDATED SCHEDULE OF VET UNITS OF STUDY AND VET TUITION FEES Course Aug 1/2015
UPDATED SCHEDULE OF UNITS OF STUDY AND TUITION FEES Course Aug 1/2015 Course Name: Delivery Mode: BSB50215 Diploma of Business Online DBTEU01 01/08/2015 19/08/2015 31/10/2015 0.25 $4245 $3265 DBTEU02 01/11/2015
Cyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Conventions for Writing a Literary Analysis Paper
Conventions for Writing a Literary Analysis Paper BCCC Tutoring Center This handout can be used in conjunction with the Tutoring Center s resource, How to Write a Literary Analysis Paper. Your Writing
Documentation and Electronic Communications Part I. Proactive Record- Keeping We live in a litigious era, and sloppy record-keeping is an invitation to litigation. Good record-keeping demonstrates your
The Complete Guide To SEO For PUBLISHER SITES. moomu. media
The Complete Guide To SEO For PUBLISHER SITES moomu media SEO for Publishing Sites Publishing sites can have a healthy dose of skepticism when it comes to SEO - they worry that it means taking their finely
Use APA Style Formatting with Microsoft Word 2010
A Guide on How To Use APA Style Formatting with Microsoft Word 2010 0 Elftmann Student Success Center A Guide on How To Use APA Style Formatting with Microsoft Word 2010 T. Milligan 2014 D u n w o o d
The Annotated Bibliography: A Researcher's Companion
The Annotated Bibliography: A Researcher's Companion Definition A bibliography is a list of sources (books, journals, websites, periodicals, etc.) one has used for researching a topic. A bibliography usually
Welcome. Thank you for choosing Cogeco High Speed Internet.
Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you
LSA Department Liaison Handbook
LSA Department Liaison Handbook Rationale for the Liaison Relationship When general advisors, concentration advisors, instructors (faculty, lecturers, GSIs), and administrative staff are talking with each
