Essays Tagged: "privacy issues"

Ethics: Emails vs Workplace

f monitors to their e-mail system. Because of this, there are many problems that arise here such as privacy issues. This leads to an ethical dilemma that can arise in the workplace.It's a fact that em ... eople shouldn't assume that when they delete their message that it has been deleted from the system.Privacy is important to everyone, but when you're in a business where professionalism is a must, thi ...

(2 pages) 279 3 3.8 Apr/2003

Subjects: Science Essays > Technology

Privacy given away

and use it as merchandise for business without your permission or any concern of invading into your privacy.Since Internet begins, privacy issues are growing concerns for online users and the problem ... dangers children and adults routinely encounter on the Internet that may or may not lead to loss of privacy:* pedophiles* online dating and cybersex* hate groups* pornography* incorrect information* h ...

(9 pages) 204 0 4.8 Feb/2004

Subjects: Science Essays > Computer Science > Internet and networking

Napster Internal External Factors

as record executives and government officials have threatened Napster's fate. Copyright, like most privacy issues, raises tough issues in the "e-Age." Like privacy, too, it turns on questions of scal ...

(7 pages) 179 0 3.3 Jun/2004

Subjects: Businesss Research Papers > Management

Privacy in the Employee Handbook

Privacy in the Employee HandbookThe Employee handbook plays an important role in communicating the o ... estrictions of both the employee and the employer. One of the main areas of the handbook deals with privacy issues in the workplace. There are several areas to consider when writing a privacy policy. ... kplace. There are several areas to consider when writing a privacy policy. These areas include: the privacy rights issues that are addressed, the company's position in response to privacy rights issue ...

(6 pages) 1130 0 4.8 Jul/2004

Subjects: Businesss Research Papers > Management

Ecommerce & EBusiness models

r than English. This has large ramifications for e-commerce and ease of transactions, security, and privacy issues. Policymakers, industry leaders, academicians, and others are concerned that this dev ...

(11 pages) 543 0 4.6 Oct/2004

Subjects: Science Essays > Computer Science

Ikea.com (overview on the company)

infrastructure 13Value shop 14Primary activities 14Support activities 15Value network 15Ethical and privacy issues: the use of IT in managing their business processes 16Information systems security an ... an overview of IKEA Company scooping on costumers, suppliers, range of products, value creation and privacy and ethical policies.Methods prettyOur analysis was conducted through the scanning of differ ...

(26 pages) 590 0 4.5 Nov/2004

Subjects: Businesss Research Papers > Marketing

Issue of Privacy in the Workplace.

estrictions of both the employee and the employer. One of the main areas of the handbook deals with privacy issues in the workplace. There are several areas to consider when writing a privacy policy. ... consider when writing a privacy policy. These areas include: the company's position in response to privacy rights issues, privacy protections to limit the company's liability, privacy protections to ...

(5 pages) 194 0 5.0 Sep/2005

Subjects: Businesss Research Papers > Management

Employee Handbook Privacy Section

Introduction to Employee Privacy RightsThis section of the employee handbook is provided as a guideline for employees to unde ... is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, ... ur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work ...

(6 pages) 421 0 3.0 Jan/2006

Subjects: Businesss Research Papers > Management

B2B VS B2C: Legal, Ethical and Regulatory Issues

paper will attempt to show the differences and similarities between B2B and B2C sites.Ethical IssuesPrivacy issues are a major difference between B2B sites and B2C sites. On a B2C site, privacy is one ... red an ethical responsibility for a B2C site (Wiki, 2004). B2B customers are not as concerned about privacy because they are usually conducting business using their company's information when making a ...

(3 pages) 1608 0 2.9 Jul/2006

Subjects: Businesss Research Papers

Health Insurance Portability and Accountability Act (HIPAA)

For the past several years, particularly since compliance with the Privacy Rule of the Health Insurance Portability and Accountability Act (HIPAA) went into effect on ... into effect on April 14, 2003, health care professionals have become especially concerned with the privacy laws and their effect on the provision of health care. Causing further concern is how this r ... mmon Rule, when research is conducted with human subjects. This author chose this article, Research Privacy Under HIPAA and the Common Rule, to critique because of an interest in future research with ...

(7 pages) 152 0 3.0 Mar/2008

Subjects: Law & Government Essays > Civil Rights

What is so significant about the impact that Google is having on the US culture:

tabase of desire, permitting Google to know perfectly what our culture wants, which obviously poses privacy issues; but above this less important dilemma, it allows Google to make business transaction ... w this database can be use really depend on where Google draw the line between private and public.c.PrivacyThe practice of googling raises important questions of privacy that have to be addressed. The ...

(11 pages) 62 1 3.0 Mar/2008

Subjects: Businesss Research Papers

My paper discusses how applied information management systems have a variety of risks and the different types of security you can get.

any risks that are associated with information technologies, which "can be misused to invade users' privacy and commit computer crimes" (57). The first way privacy can be invaded is by using cookies, ... tion about the user's computer and location, which someone can use this information to invade one's privacy. Another way to invade one's privacy is by a "software that secretly gathers information abo ...

(8 pages) 11 0 0.0 Apr/2012

Subjects: Businesss Research Papers > Case Studies > E-commerce