3 March XXXX
Online Monitoring: A Threat to Employee
Privacy in the Wired Workplace:
An Annotated Bibliography
Adams, Scott. Dilbert and the Way of the Weasel. New York: Harper, 2002. Print.
Adams’s “Dilbert” cartoons are known for satirizing
In MLA style, each
entry begins at
the left margin;
indent 1⁄ 2''.
everyday workplace issues. The cartoon on page 106 illustrates how rampant Internet use in the workplace has become
and suggests that both employers and employees are well
aware of the practice. The cartoon points out the difficulty employers face in trying to restrict employee Internet use.
American Management Association and ePolicy Institute. “2005 Electronic Monitoring and Surveillance Survey.” American
Management Association. Amer. Management Assn., 2005.
Web. 15 Feb. 2006.
According to the survey of workplace Internet use
summarized in this article, employers are most concerned
about employees visiting inappropriate Web sites. However,
begins on a
new line and is
indented 1⁄ 2''.
employers’ monitoring of employees extends beyond blocking certain Web sites. Many employers who participated in the
study also track individual keystrokes and review e-mails. The study suggests that the majority of employers who monitor
Internet use are telling their employees that they are being
Marginal annotations indicate MLA-style formatting and effective writing. Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007). This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (2009).
findings in relation
to other sources in
monitored. These findings seem to contradict many of my
other sources, which claim that employers are not doing
enough to explain Internet monitoring to their employees.
“Automatically Record Everything They Do Online! Spector Pro 5.0 FAQ’s.” Netbus.org. Netbus.org, n.d. Web. 17 Feb. 2006.
with no extra space
and no extra space
and their annotations.
Spector Pro is a type of Internet surveillance program.
This Web page, sponsored by the manufacturer of the product, explains the functionality of the software and describes its features. It can be installed on a variety of computers and
can be installed in “Stealth” mode so that the user cannot detect the software on his or her computer. The program can
also monitor all computer use ranging from Word documents
to Web sites. This source supports my other sources by
illustrating the ease with which this kind of software can be installed as well as the extensive amount of information it
can gather for employers.
Flynn, Nancy. “Internet Policies.” ePolicy Institute. ePolicy Inst., n.d. Web. 15 Feb. 2006.
usually three to
This excerpt from Flynn’s The ePolicy Handbook offers
statistics on employee Internet use and five suggestions for minimizing it. Flynn claims that the majority of employees in the United States are using company time to surf the Internet and that companies are suffering huge financial losses as a
result. Her suggestions for minimizing personal Internet use include establishing a company Internet policy and installing monitoring software. This is consistent with the suggestions of many other sources.
Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007).
Frauenheim, Ed. “Stop Reading This Headline and Get Back to Work.” CNET News.com. CNET Networks, 11 July 2005. Web.
17 Feb. 2006.
The author examines the results of a study of ten
thousand employees conducted by America Online and
Salary.com, which found that the Internet was the most
popular means of wasting time at work. Frauenheim notes
that the extra...