MLA Annotated Bibliography (Orlov)



Similar documents
MLA Research Paper (Orlov)

Documenting sources in MLA style. MLA list of works cited

APA 6 th Edition Formatting and Style Guide. Lakehead University Writing Center Workshop

MLA Format Example and Guidelines

Writing the MLA Research Paper

PROTECTING YOUR DIGITAL LIFE

SAMPLE TURABIAN STYLE PAPER

Chicago Citation Style: Footnotes and Bibliography

Employee PC and Server Activity Monitoring Solution

Auditing Security: Lessons Learned From Healthcare Security Breaches

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

INCREASING PRODUCTIVITY. By Implementing A Non-Invasive Employee Surveillance Solution

Syllabus ENC 3249 Professional and Technical Writing for Computing

AP English Language Research Project Assignment Created by Sandy Jameson, Nazareth Area High School, 2013

MLA Format: Not As Difficult As It Seems. students view their teachers as red-pen-happy, paper-slaying dragons. Fortunately, with the

Master Syllabus. Learning Outcomes. ENL 260: Intermediate Composition

TechTarget Enterprise Applications Media. Pocket E-Guide

American Academic Writing Conventions

State By State Employee Monitoring Laws

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Is security awareness a waste of time?

ADMS 3015 Winter 2012 Professional Communication in a Canadian Context

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey

A Writer s Reference, Seventh Edition Diana Hacker Nancy Sommers

Guide to APA Style. What is APA style?

WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES

HEALTH CARE AND CYBER SECURITY:

MLA Style Sheet for Bibliography and Footnotes/Endnotes (For Humanities)

Are You Ready for PCI 3.1?

HIST 106: HISTORY OF CIVILIZATIONS II

How to Cite Information From This System

Anatomy of a Hotel Breach

ANGL 1041 Language, Writing and Reading Winter 2012

Guide on how to choose an Employment Lawyer to represent you* Do you need an Employment Lawyer to help you with a problem you may have?

MLA Formatting in Microsoft Word 2010/2011

APA Annotated Bibliography (Haddad)

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT

Google: Trust, Choice, and Privacy

GRADUATE PAPER FORMAT

Small Business Trends

ENGL ENGLISH COMPOSITION COURSE SYLLABUS, SPRING 2012

Crash Course in APA Style: Documentation for Academic Writing. Sting Y. Jacket. Black Hills State University. Running head: CRASH COURSE IN APA STYLE

Text Margins 1 inch all around Typing -Do not break (hyphenate) words at end of a line.

MLA Style Guide Quick & Easy

National Cyber Security Month 2015: Daily Security Awareness Tips

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

HIST200 - Introduction to the Discipline of History SAMPLE SYLLABUS MWF 1:00-1:50 p.m. Professor Amanda López, Ph.D.

7 Biggest Mistakes in Web Design 1

Data Sheet: Work Examiner Professional and Standard

MLA-Style Citation Guide

Writing a Research Paper. a. It is a written document primarily used in academic settings.

Course Description Readings Course Requirements Research Paper

The Value of DLP

An Executive Overview of GAPP. Generally Accepted Privacy Principles

7 th Edition MLA Handbook

Language Arts Division

ROYAL REHAB COLLEGE AND THE ENTOURAGE EDUCATION GROUP. UPDATED SCHEDULE OF VET UNITS OF STUDY AND VET TUITION FEES Course Aug 1/2015

Cyber-Crime Protection

Cybersecurity: Protecting Your Business. March 11, 2015

Conventions for Writing a Literary Analysis Paper


The Complete Guide To SEO For PUBLISHER SITES. moomu. media

Use APA Style Formatting with Microsoft Word 2010

The Annotated Bibliography: A Researcher's Companion

Welcome. Thank you for choosing Cogeco High Speed Internet.

LSA Department Liaison Handbook

Transcription:

MLA Annotated Bibliography (Orlov) Orlov 1 Anna Orlov Professor Willis English 101 3 March XXXX Online Monitoring: A Threat to Employee Privacy in the Wired Workplace: An Annotated Bibliography Adams, Scott. Dilbert and the Way of the Weasel. New York: Harper, 2002. Print. Adams s Dilbert cartoons are known for satirizing everyday workplace issues. The cartoon on page 106 illustrates how rampant Internet use in the workplace has become and suggests that both employers and employees are well aware of the practice. The cartoon points out the difficulty employers face in trying to restrict employee Internet use. American Management Association and epolicy Institute. 2005 Electronic Monitoring and Surveillance Survey. American Management Association. Amer. Management Assn., 2005. Web. 15 Feb. 2006. According to the survey of workplace Internet use summarized in this article, employers are most concerned about employees visiting inappropriate Web sites. However, employers monitoring of employees extends beyond blocking certain Web sites. Many employers who participated in the study also track individual keystrokes and review e-mails. The study suggests that the majority of employers who monitor Internet use are telling their employees that they are being In MLA style, each entry begins at the left margin; subsequent lines indent 1 2''. The annotation begins on a new line and is indented 1 2''. Marginal annotations indicate MLA-style formatting and effective writing. Source: Diana Hacker (Boston: Bedford/St. Martin s, 2007). This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (2009).

Orlov 2 Orlov interprets the source s findings in relation to other sources in the bibliography. Double-spacing is used throughout, with no extra space between entries and no extra space between entries and their annotations. Annotations are usually three to seven sentences long. monitored. These findings seem to contradict many of my other sources, which claim that employers are not doing enough to explain Internet monitoring to their employees. Automatically Record Everything They Do Online! Spector Pro 5.0 FAQ s. Netbus.org. Netbus.org, n.d. Web. 17 Feb. 2006. Spector Pro is a type of Internet surveillance program. This Web page, sponsored by the manufacturer of the product, explains the functionality of the software and describes its features. It can be installed on a variety of computers and can be installed in Stealth mode so that the user cannot detect the software on his or her computer. The program can also monitor all computer use ranging from Word documents to Web sites. This source supports my other sources by illustrating the ease with which this kind of software can be installed as well as the extensive amount of information it can gather for employers. Flynn, Nancy. Internet Policies. epolicy Institute. epolicy Inst., n.d. Web. 15 Feb. 2006. This excerpt from Flynn s The epolicy Handbook offers statistics on employee Internet use and five suggestions for minimizing it. Flynn claims that the majority of employees in the United States are using company time to surf the Internet and that companies are suffering huge financial losses as a result. Her suggestions for minimizing personal Internet use include establishing a company Internet policy and installing monitoring software. This is consistent with the suggestions of many other sources. Source: Diana Hacker (Boston: Bedford/St. Martin s, 2007).

Orlov 3 Frauenheim, Ed. Stop Reading This Headline and Get Back to Work. CNET News.com. CNET Networks, 11 July 2005. Web. 17 Feb. 2006. The author examines the results of a study of ten thousand employees conducted by America Online and Salary.com, which found that the Internet was the most popular means of wasting time at work. Frauenheim notes that the extra time spent surfing the Internet is costing companies an estimated $759 billion a year but also quotes the senior vice president at Salary.com and a director at America Online, who argue that employee Internet use actually increases productivity and creativity in the workplace. Frauenheim suggests that the increase in personal Internet use at work might result from a longer average workday and that use of the Internet has made employees more efficient, giving them more free time to waste. Gonsalves, Chris. Wasting Away on the Web. eweek.com. Ziff Davis Enterprise Holdings, 8 Aug. 2005. Web. 16 Feb. 2006. In this editorial, Gonsalves considers the implications of several surveys, including one in which 61% of respondents said that their companies had the right to spy on them. The author agrees with this majority, claiming that it s fine if his company chooses to monitor him as long as the company discloses its monitoring practices. He adds that he would prefer not to know the extent of the monitoring. This article, though not entirely objective, offers an employee s perspective on Internet surveillance in the workplace. It also Summary is followed by a balanced evaluation of the source.

Orlov 4 contradicts some of my other sources, which claim that employees want to know and should know all the details of their company s monitoring procedures. Kesan, Jay P. Cyber-Working or Cyber-Shirking? A First Principles Examination of Electronic Privacy in the Workplace. Florida Law Review 54.2 (2002): 289-332. Print. This extensive, balanced article examines the legal issues involved in Internet monitoring and employee privacy. Kesan establishes that US written law and common law do not guarantee a right to electronic privacy in the workplace. He suggests that Internet policies should be addressed through a market-based contractual approach that would benefit both employers and employees. Kesan examines employee concerns, such as a working parent s desire to check on his or her children while at work, and employer concerns, such as legal liability for inappropriate employee Internet use. He concludes that a company should develop an Internet policy, make that policy known to all employees, and then monitor employees to ensure that the policy is being followed. Lane, Frederick S., III. The Naked Employee: How Technology Is Compromising Workplace Privacy. New York: Amer. Management Assn., 2003. Print. Lane s book discusses the lack of employee privacy in the modern workplace. The author acknowledges that employers have several reasons to be concerned about employee Internet use, such as theft, a decrease in productivity, and workplace lawsuits. At the same time, however, he questions

Orlov 5 where employers will draw the line as technology becomes better and better at tracking an employee s every move. This book is accessible and draws from a variety of sources; it confirms the information provided by my other sources. Tam, Pui-Wing, et al. Snooping E-Mail by Software Is Now a Workplace Norm. Wall Street Journal 9 Mar. 2005: B1+. Print. The authors point out that in every state except Connecticut and Delaware, companies can legally monitor employee e-mail without notifying employees and can also use e-mails as evidence in lawsuits against employees. According to the article, only 27% of companies monitor employee-toemployee e-mails, although these e-mails are potentially the most incriminating, since employees are less likely to censor themselves with other employees. The article also explores the means by which companies now monitor employee e-mail, such as software that searches not only for inappropriate words but also for words specific to the industry and even the company. Although the article is narrowly focused, it offers a good overview of current practices regarding e-mail monitoring in the workplace. Tynan, Daniel. Your Boss Is Watching. PC World. PC World Communications, 6 Oct. 2004. Web. 17 Sept. 2006. This conversational article presents ten myths about employee Internet and computer monitoring and reveals how wrong they are. Although several of the myths are discussed more extensively in my other sources, Tynan presents some new information. For example, he states that some employers

Orlov 6 monitor employee Webmail accounts in addition to company e-mail accounts. Perhaps most important, the article gives a sense of how unaware most employees are about the current capabilities of employee Internet monitoring and about their own lack of legal protection from employers who monitor them. Verespej, Michael A. Inappropriate Internet Surfing. Industry Week. Penton Media, 7 Feb. 2000. Web. 16 Feb. 2006. Unlike most of my other sources, this article is aimed at employers and suggests that they need to do more to establish Internet policies and monitor employees. Verespej warns that if employers do not establish Internet policies, they leave themselves vulnerable to expensive and damaging lawsuits, such as suits based on inappropriate or discriminatory e-mails distributed in the workplace. He offers several examples to back up his claim that employers are more at risk than employees from lawsuits. This seems to contradict the information in my other sources, which present the risks mostly in terms of employees privacy.