Preview

Communicating in the Cyber Age

Good Essays
Open Document
Open Document
1124 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Communicating in the Cyber Age
Communicating in the Cyber Age

The technology age brings new ways to interact with each other in every part of life. Communication is just one part of life that has dramatically changed in this new age. People are now able to communicate to more people, on more personal levels, and with a lot more ease. Communicating with cyber technology has its benefits as well as its downfalls. While being able to communicate to many people there is the risk of sharing too much. That risk has caused many businesses to take precautions while communicating for and through the company. By understanding the reasons and methods for company precautions while communicating an employee can protect their self. Communicating in the cyber age takes awareness and responsibility to be effective and safe.
Cyber Communication and the Military While in the military communication is vital to task operations, survival needs, and simple moral for members. Being an IT for the U.S. Navy gives a different perspective on communication. An IT has to monitor the communications for military use. Monitoring communication for the military varies by location and by security need. One thing that is common is that the communicators need to have responsibility about what is being communicated. If the users are loose with their responsibility they will lose the ability to use cyber communication. IT professionals have the ability and the right to stop someone from communicating in an irresponsible manner. Using programs and technicians to monitor emails, web content, and web usage keeps military personnel from being irresponsible. The monitoring allows technicians to be aware of what is going on and who reprehend if need be. Privacy is given to military members at the discretion of the technicians. If the member shows signs of irresponsible cyber use they are subject to lose their privacy to maintain military security. The military also uses privileged cyber usage as a tool. Certain military members



References: Friedman, B. A., & Reed, L. J. (2007). Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-mail Use. Employee Responsibilities & Rights Journal . Jr., D. P., Chauncey M., J., & K., R. (2006). Who 's Reading Your Office E-Mail? Is that legal? Strategic Finance , 87 (10). Kitty O. Locker, D. S. (2008). Business and Administrative Communication (8th Edition ed.). McGraw-Hill.

You May Also Find These Documents Helpful

  • Better Essays

    Syllabus

    • 1217 Words
    • 5 Pages

    In recent history, there has been an influx in controversy regarding e-mail, Internet usage, and overall privacy policies in the workplace. Because of the extensive increase of personal e-mail, smartphones, social media, and other Internet-based communications, the need for laws that govern privacy for the users of these communications is crucial. These policies are usually implemented to ensure security and to reduce liability. This report will show examples of privacy issues, laws, and experiences in the workplace.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    There are only a few exceptions to the law in regards to a company monitoring their employee’s use of Internet or phone usage while on company time. One of these exceptions is called the “ordinary course of business”, it is stated that under this exception “the employer may monitor employee communications to ensure such legitimate business objectives as assuring quality control”(Nord, G.D., McCubbins, T., Horn Norn, J.; August 2006/Vol. 49, no.8).…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Xcom 285 Week 3

    • 301 Words
    • 2 Pages

    The technological advancements in communication that was discussed in the article was business communication through some of the latest and hottest technology available. It discussed mash ups and social computing. These forms of communication offers more users and corporate executives a effortless line of communication and a improved way to indicate messages . both forms of communication can be used effective in my workplace environment.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of concepts, rules, regulations, and business processes. Every organization has data, files, business, and personal records. Organizations have become more reliant on technology. With this reliance comes a sense of dependence on technology for daily business operations, therefore it is very important that organizations protect their information because they can easily be exposed and vulnerable to cyber attacks.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I think that management should monitor email and internet usage during work hours because of loss of revenue due to employees being on the web instead of being productive. Also to protect the organization from potential liability of what may or may not be transmitted or received on the…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Balancing the legitimate need of employers to monitor the workplace with respect for individual privacy is not difficult. The best course of action is to have a monitoring policy and follow it. Legal experts state that "apathy toward e-mail and Internet policies is the biggest mistake an employer can make." It is recommended that firms have a written policy clearly stating that any right to privacy…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Computer-mediated Communication (CMC) is a significant part of our daily lives through the routine of verbal or non-verbal messages. CMC is a digital technology becoming more common in communication for personal and business use worldwide. The majority of workplaces utilizes CMC by email and instant messaging and individuals outside of work utilize text messaging, email, Facebook, and Skype. Despite the colossal impact in our lives with the usage of CMC; people should be conscious of how they practice this type of communication whether it is verbally or nonverbally.…

    • 888 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There is much debate over what employers should and should not be able to do when it comes to monitoring the communications of individuals under their employment. There are those who feel that the rights of the individual are not limited to protection from the Government and employers have limited rights in regards to employee communication. There those that feel that the employer should have very little to no restraint in monitoring those under their employment. Going too far in either the employers or employee position can create an unproductive and unrealistic standard for a working environment. Employers must be able to create and maintain both a productive and safe working environment from their employees. However this does not mean employees should be subject to unreasonable and intrusive monitoring practices by their employer. Communication privacy laws and workplace policies should be carefully crafted to provided balanced protection both the interest of employer and employee.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Business Law

    • 259 Words
    • 2 Pages

    One of the most common questions from our business clients is whether their promises regarding email and other workplace privacy issues are legally binding. Not necessarily is the response we give. Usually, when an employer states a policy regarding any issue in the workplace, including privacy issues, that policy is legally binding, such as stating the policy in an employee handbook, memo or in a union contract. However, some court's have upheld employee terminations, for issues related to the termination of an employee for personal emails despite the fact that the company policy was that personal emails could be sent, if the email messages are deemed highly inappropriate for workplace communications.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Privacy is something everyone should have the right to. In fact, the First and Fourth Amendment protects this right. A major issue evolving in today's workplace is the invasion of employees' privacy by the employer. Everyone has a right to privacy at home, but this right does not include the workplace. Many employers have started monitoring the actions occurring by the employees of their company while at work. One of the many ways of monitoring action is through accesses to employees email correspondence. Many employers have private email severs which they have access to. This action is used to prompt employees to handle work related emails only. What would happen if an employee access there personal email while at work? Would that personal email be subject to…

    • 540 Words
    • 3 Pages
    Good Essays
  • Good Essays

    New technology is being introduced daily into the business world. In past employers I have seen several different communication trends used to express issues within the company. Some of my past employers have used personal digital assistants (PDAs), e-mail and text messaging, job flexibility, and team work (Locker & Kienzler, 2008). PDAs were an excellent way to let a person work from home if it is needed or they can be used for someone that is not in the office every day. E-mails became useful when the company had grown to larger numbers and were used as a way to order…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The idea of employee rights involves many complex issues. An employee’s right to a workplace free of discrimination and harmful environmental factors is obvious. Yet, other issues surrounding privacy, personal expression, and communication monitoring are not as clear-cut. While employees may feel that they have the right to express their opinions and use business communications while working, not only may they be fooling themselves but they are acting in a way that is unethical. While businesses do not have the right to control employee behaviors outside of the workplace, they do have the right to monitor and control communications and employee actions during paid time. As such, employees have the right to reasonable expectations in terms of communication, yet cannot (within limits) ethically demand a right to privacy, private communication, or personal expression while they are utilizing business property or on business time. Workplace privacy has been a hot issue in the last decade, as more and more workplaces incorporate email and Internet-use into the office environment. Many employees now use email and the Internet daily, not to mention the telephone (Nord, McCubbins, & Nord, 2006). With high volumes of communicatio…

    • 917 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion.…

    • 696 Words
    • 3 Pages
    Good Essays