Preview

It205 Week 4

Satisfactory Essays
Open Document
Open Document
522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It205 Week 4
Monitoring Employees on Networks
Leslie Rocha
IT 205
10/14/2011
Mitchell Harris

Monitoring Employees on Networks
I believe that e-mail usage with an organization is beneficial to all parties within an organization. Its main purpose is for communications between employees, management, and clients. It is a tool used from a PC to a PC or MAC which is sent and received in seconds, As far as the downside of e-mail usage can be the information being sent and received and the privacy issues. Organizations fear that that the information being sent and or received can lead to a lawsuit or cause adverse publicity for that organization, which could be costly to an organization. This is one of the main reasons organizations limit the usages of e-mails. The path once an e-mail leaves an organization is a very broad one, it goes through an IP address from sender to an IP address to the receiver (or what we call the internet). And the receiver can then take the information sent to them and resend it others without the permission or even knowledge of who in turn will receive it and what they will do with it. An e-mail can pass through many hands before ending up in the right place.
Instant Messaging creates a chat service that enables both parties real time communication much like talking on the phone. It can increase productivity if used correctly. One drawback is personal usage with friends during work hours. These can blog down the system and waste revenue. It is not always the most formal way to communicate because sometimes it has its own language which can be misunderstood or not appropriate. For example, LOL stands for laugh out loud.
The benefits and drawback of web pages and search engine usages also can be harmful to a company if the searches are not appropriate for that organization. Having a web page can be a great way to advertise because in most cases it is free. Search engines can supply the organization with much needed information faster than manuals.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iLab Week4

    • 563 Words
    • 2 Pages

    A test was run using the software OpNet Modeler to create a test environment. First the 30…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    For all three settings given the conditions in which to work with a client server based model is the choice. This choice is made for a few different reasons while considering multiple factors. First off client server includes an option for flexibility. That is growth and, or modification to any existing device, or future additions to the system. The design, implication, material, and budget demands are reasonably accomplishable. A client server offers tighter security through a central database which houses an array of customized permissions which allows an appointed user whatever access is needed. A client server base model is reasonably equipped to accommodate the expanding business to the business with everything…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT210 Week 3

    • 756 Words
    • 4 Pages

    Resources: Review the example in Appendix E and the additional examples on pgs 80-83 of Prelude to Programming…

    • 756 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Paper

    • 567 Words
    • 3 Pages

    Emails provide stability to the organizations. Emails are the backbone that forms the base for the organization structure. Organization has different department for a different purpose. In order to communicate with the environment. Organizations use MS Outlook for maintaining a healthy communication environment in different departments. Every user mailbox data is stored in on exchange server in the form of edb files. In the presence of certain conditions EDB files of MS Outlook get corrupt and are not accessible.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    The TJX was still using the old wired equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. An auditor also later found the company had neglected to install firewalls and data encryption, on many of the computers using the wireless network,…

    • 667 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It236 Week9 Final

    • 576 Words
    • 3 Pages

    The web site chosen for this project is the Belleville News-Democrat Newspaper web site from Belleville, Illinois. It is the hometown newspaper of this papers author. The site URL is http://www.bnd.com/ .…

    • 576 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It/205 Week 8 Checkpoint

    • 339 Words
    • 2 Pages

    A census is the process of acquiring and recording information from the general public to determine population or housing numbers. For the 2010 census, the United States Census Bureau decided to implement a program called Field Data Collection Automation (FDCA). The program was intended to improve the data collection process by using handheld electronic devices. The mobile handhelds were to canvass addresses during the initial stage of the census.The FDCA program was important to the U.S. Census Bureau because it would replace the millions of paper forms and maps that were previously required to complete the census (Laudon&Laudon, 2011, p413). It was also important because it was meant to reduce costs, improve data quality, improve data collection efficiency, and encourage people to participate. Unfortunately, the FDCA program had problems.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Business communication forms are continually evolving into many different forms. There was a time when communications were done by simpler means such as telephone, mail or by courier. That is not because that was the way businesses chose to communicate, but because it was the only way to. Technology had not advanced to accommodate busy lifestyles, and business deals that can fall apart in a matter of seconds simply because they could not speak to someone that was far away right at that very moment. Businesses definitely use the resources available to communicate, because they ensure that their employees have email, IM and a cellular phone so they can have open communication with them at all times. With my employer it is often difficult to get in touch with me by telephone, so we have an Instant Message system so than I can be connected to at any time when I am needed. Email is also an essential form of communication, and the emails come in a matter of seconds from all over the world. That keeps everyone tapped into one another by a simple click of a button, and the ease of speaking to someone for some last minute input into a project can take place without the inconvenience of having to call that person on the phone. Even though my job relies on the telephone I believe that it is slowly becoming obsolete, and electronic messages from text, IM or email are the improved yet impersonal way of communication.…

    • 1712 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    SOC413 Week 2

    • 695 Words
    • 3 Pages

    There are several agents of socialization; three of them are family, religion, and the workplace. Family is the most important of the social agents. A persons coming into society can be a negative one or a positive one and it begins with the relationships that person has at home. A person who is loved and nurtured at home is more than likely to grow into a loving and nurturing person and a productive person in society. A person who is neglected and not cared for at home has a greater chance of being a negative part of society. (Brinkerhoff, White, Ortega, and Weitz, 2011) A traditional family consists of a mother, father, and one or more children. More families are raised by a single parent, and in some of those homes the single parent is a male. The effects of a child growing up in a single parent home are low…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It-250 Week 5 Questions

    • 397 Words
    • 2 Pages

    c. The Header file accts.h is composed of two other header files: trans.h and reps.h.…

    • 397 Words
    • 2 Pages
    Good Essays
  • Good Essays

    First and foremost, it is time consuming. Online communication can take longer than a live or telephone conversation. This is because the time it takes to type, wait for a response and then type again interferes with the flow of the conversation itself. Email is especially time-consuming since an individual has to type his half of the conversation, sent it, and wait for a response. Depending on the time it takes for the recipient to receive, read and type her own response, a person can wait a few hours or even a few days to complete one conversation. So, if a person is in a hurry, he or she could not be able to receive or give the message fast. Therefore, it is really time consuming than face to face communication.…

    • 529 Words
    • 3 Pages
    Good Essays

Related Topics