Preview

Cyber Slacking

Satisfactory Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Slacking
Whether it is called cyber slacking, computer gold-bricking, cyberloafing, or any of the other dozens of nicknames that have surfaced over the last decade, surfing the web for personal use during work time is a world-wide problem. It is so common these days that many people won’t think twice about surfing the web for personal use, but according to the International Association for Computer Information Systems (2009), cyber slacking costs American businesses $54 billion and 30-40% of productivity losses every year.
It is a very widespread practice; and one that is continuously growing. Laura D.L. Bracken (n.d.), an owner of a web development company called Design Spike, Inc. referenced that “according to a February 2007 survey by Pew Internet & American Life Project, a Washington, D.C.-based research firm that collects data from real-world developments as they affect the virtual world, 83 percent of online users report searching the internet for personal interests” (para. 3). This means only 17 percent of workers who have access to the Internet do not cyber slack. The reason that so many people cyber slack is because there is something to surf the web for everyone: weather, news, social networks, games, shopping, and the list goes on and on. Just recently, for example, the Transportation Security Administration [TSA] blocked certain websites from the federal agency’s computers, including: chat/messaging, controversial opinion, criminal activity, extreme violence, and gaming (Malbran, 2010). With so many potential sites to surf, it’s no wonder so many people are doing it.

References
Bracken, L.(n.d.). Cyberslacking ticks time off the workforce clock. Retrieved from



References: Bracken, L.(n.d.). Cyberslacking ticks time off the workforce clock. Retrieved from http://www.designspike.com/articles/cyberslacking-ticks-time-off-the-workforce-clock/3.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    In the essay “Caught in the Net” Eva Tihanyi explains that people use the internet in different ways and not all to the “same extent” (111). She classifies people into three types of internet users: “dabblers, regulars, or addicts” (111).…

    • 425 Words
    • 2 Pages
    Good Essays
  • Good Essays

    UNV104

    • 999 Words
    • 4 Pages

    Internet abuse is an issue in the workplace. Statistics show the internet is being used for personal use during work hours. Extensive internet use causes a decrease in productivity and an increase in liability.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Since 1912 Lockheed-Martin was a concept derived from Glenn Martin with the design of his first airplane in collaboration with the founder of Alco Hydro-Aeroplane Company Malcolm Lockheed (Our History, 2017). The merger between Martin and Lockheed formed the well-known aerospace company Lockheed-Aircraft Company which is currently Lockheed-Martin. However, Lockheed-Martin evolved into a contractor for the U.S. defense in technology and security. Thus, making them extremely vulnerable to outside cyber-attacks and novice 'hackers.' Unfortunately, by 2011 a cyber-attack and Lockheed targeted the company reported no damage to the security.…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    These technological advancements are often very overwhelming and major sources of distraction. For example, Source G is a political cartoon created by Paul Noth that portrays a man in a lab coat at a desktop with a tab open that says “The Internet wants to destroy your productivity” with a button underneath labeled “always allow” This cartoon helps to highlight how the exponential freedom the internet provides can easily lead us to get distracted and stray away from…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In just twenty years, since the web’s graphical browser was created, the Internet has become the communication and information medium of choice. Those of us who grew up in an analog youth can still remember when AOL was the top consumer choice for web use. Do you remember AOL's weekly allotment of a limited amount of web surfing?…

    • 845 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The excessive use of computers has drastically changed the lives of many users. As a multifaceted tool, the computer is used for tasks to include research, homework, business related activities, and even communicating with distant friends and family. Although computers can serve many useful purposes, they can become a reason for procrastination as well as cause people to retract from “real life” social activity. “As changes occur in technology, we must also contemplate the effect these changes will have on individuals. We must realize that individuals are vulnerable to the virtual world and that they can get lost,” (Computers and Their Impact, California State University Northridge, n.d.).…

    • 1156 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Many organizations use the Internet and the Web technology to make their business more productive, efficient, and to cut cost. Developing a central information system or IS, is vital to organizing and storing information pertaining to all company processes. An IS will make the “six important business objectives: operational excellence; new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; and survival” achievable. (Laudon & Laudon, 2011) “Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations.” (Laudon & Laudon, 2011) A firewall is important to have to make a security barrier that ensures that the information within the company’s information systems safe from hackers and access by outside sources. A system’s firewall is just one of many ways a company can ensure the safety of their private information.…

    • 1139 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Incident Response Plan

    • 930 Words
    • 4 Pages

    In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…

    • 930 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Criminology in the Future

    • 3359 Words
    • 14 Pages

    The Internet has become a powerful source for information as well as communication. We depend on computers in almost every aspect of our lives. At work, much of our financials are done through the computer. We do not see the millions of dollars a company has but see the numbers generated by the Ledger. We can move money around to various banks and accounts…

    • 3359 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    People were able to micromanage their lives way before the era of technology.You can do virtually everything from your touch screen smart phone. We are absorbed into the computer for research, building relationships, retail, games and daily news around the world. Majority of the time people when people get home, the first thing they do is login to their computer. It’s become a necessity to always be online for your personal pleasures.…

    • 582 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyberlife

    • 1594 Words
    • 7 Pages

    You sit down in front of your computer and flip the "on" switch, just like always. The machine starts buzzing and grinding and churning out unending meaningless numbers, just like always. But don’t be fooled… because today will be no normal day. Soon you start to hear a strange grinding noise that you’ve never heard before… this catches your attention - what’s going on ? The grinding gives way to a sickening chuncking sound, and a strange image pops into your head of tiny men inside your computer smashing your motherboard with sledgehammers! Well…thiscan’t be good - you start to worry. What’s wrong ?!? Strange letters and numbers dance on the screen in a morbid medley of digital death, and finally six simple words appear at the bottom - "Hard Drive Failure. Insert Boot Disk." [gasp] The epitaph of computing. Your heart sinks as you realize that, contrary to all the advice you received, you never made a boot disk -where’s your "Real Men Don’t Need Boot Disks" attitude now?! No matter how many times you hit the "Escape" key, the monitor still stares at you, unchanged, cold white letters in a vacant sea of black. As a last resort, you pray for divine help. Oh, Patron Saint of software, help me in my time of need !!! [Pause….] But Bill Gates never answers. You let your swimming head fall on the keyboard, knowing that your life as you know it is over.…

    • 1594 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Ever since its inception in 1982, the internet has become an essential part of the average person’s life. Many people see the internet as a place for entertainment, research, and communication. Although the invention of the internet allows for easy access to information and communication, there are some negative effects, such as encouraging cheating, corrupting children, and hindering development of social skills as well.…

    • 670 Words
    • 3 Pages
    Good Essays