Einsberg, Daniel. “Eyeing the Competition.” TIME. 14 Mar. 1999.
This article gives different examples of competition companies stealing information. Includes important measures which the FBI, companies and lawyers are taking to try and prevent competitive stealing.
This article is helpful to my paper because it allowed me to be able to give current examples of cases and active law suits against individuals, as well as companies, about competition disputes. It includes some interesting statistics about the FBI and how much is actually ‘stolen’ from United States corporations.
Forelle, Charles. “Ivy Imbroglio: Princeton Admits It Spied on Yale Admissions Site.” The Wall Street
Journal. 26 July 2002.
Report on Princeton University’s dean and director of admissions Stephen LeMenager accessing confidential information about their rival school, Yale University. The article discusses the procedures that were taking after Princeton admitted the intrusion and invasion of privacy.
This article is helpful in my paper because it is a prime example of accessing confidential information not only about Yale University but also about the students whose applications were studied. It helps make you realize that even if you think something is confidential there could possibly someone out there who can use it against you.
658.302H833v2006. Howard, Gillian. Vetting and Monitoring Employees, A Guide for HR Practitioners.
Burlington: Gower, 2006.
This book explains the laws and regulations regarding employers’ rights to monitor emails, phone class, etc. It discusses specific parts of the laws that allow employers’ and/or employees’ to do certain things that are considered legal. It points out some of the common mistakes and misunderstanding people perceive from the regulation laws of the workplace.
This book is useful in my paper because it is my main source of information about telephone monitoring and the regulations that go along with it. It includes some of the ways in which phone calls that have been recorded are later used. Also, it helps with my plan of solving some of the trust issues within companies.
Nord, G. Daryl, Tipton F. McCubbins and Jeretta Horn Nord. “E-Monitoring in the Workplace: PRIVACY,
LEGISLATION, AND SURVEILLANCE SOFTWARE.” Communications of the ACM. 15.8.
(2006): 73-77.
This article gives interesting and useful statistics companies throughout the world monitoring their employees and the ways in which they do so. Also, included are statistics about what the employers are monitoring from computers and how the monitoring has increased in the past six years. There is a list of the different types of surveillance capabilities of monitoring software in the world today.
This article is useful for my paper to help me show how certain techniques have increased and become more strict over the years. Also, the statistics will help get the point across and show people how it really affects many companies throughout the United States.
ProQuest. “Spying on employees banned.” ProQuest. 75.10. (2005): 1.
This article defines and discusses The Workplace Surveillance Act of 2005. It explains the means of the law and places it extends to as well. It briefly talks about the act in which it replaced.
This article is useful in my paper because I used it in trying to come up with a logical way to decide what terms and conditions should apply for surveillance of employees’. It is useful also because of the details and discussion it goes into about The Workplace Surveillance Act of 2005.
Sherman, Marc A. “Webmail at Work: The Case for Protection Against Employer Monitoring.”
This document gives some of the primary reasons why employers’ choose to monitor their employees’. It goes in depth about the resources and information about their company that they are trying to protect from outsiders. It explains some of the problems that can be caused if certain confidential information gets in to the hands of the wrong person, or a competitor. Also, included is some of the software that companies use in order to monitor and keep track of the activities of their employees’, especially on PC’s.
This document is useful in my paper because it helps me to explain more in detail the reasons why companies feel the need to monitor their employees’ communications so much. Also, it helped me get a better understanding and made me able to explain a little about The Electronic Communications Privacy Act.
Swartz, Nikki. “Companies Spying on Employees.” ProQuest. 41.1. (2007): 1.
This article consist strictly of statistics about what companies monitor, track content sent by and received by an employee, or retain and review all e-mails.
This article helps my introduction entice people by giving some statistics on a survey that was conducted just two years ago and expressed some percentages about Internet and e-mail monitoring.
Yoon, Suh-kyung. “I’ve got my eye on you.” ProQuest:Far Eastern Economic Review. 164.19. (2001): 1.
This review explains a little about the surveillance issues in Hong Kong and how some of the things those employers’ can do to invade your privacy is illegal for police or any government official. It also talks a little about Hong Kong’s Personal Data Privacy Ordinance, which is where they draw some boundaries as to what employers’ can get in to.
This article helps me compare the difference between the restrictions on employee monitoring in the United States verses the restrictions in Hong Kong. For example, in Hong Kong employers are allowed to monitor and invade their employees’ privacy more than the police legally can.
Wednesday, April 9, 2008
Wednesday, April 2, 2008
Research Plan
I’m using a variety of articles from magazines and newspapers in order to bring to the publics’ attention some of the ways in which competing businesses throughout the world try to “steal” their competitors’ confidential information. The articles that I have used in my research all contain different statistics and recent incidents from all over the world. Some of the articles I have reviewed consist of legal actions that competing companies act upon even though they are extremely unethical.
Problem:
• Companies tailing competitor employees
o Companies hire secret people to dig through some employees trash cans outside of their homes in order to get customer lists, policies, benefits, etc. about their competition.
Source: “Snoops” Business Week from October 9, 2006
• Making phone calls and expressing a false identity
o Companies make phone calls to employees or customers of their competition to try to squeezing some useful information out of them.
• Reading through e-mails or other confidential documents and/or employees taking this information with them
o In some cases, past employees take very confidential and important information with them when they leave one job for another job in the same field.
Source: 45% of Employees Take Data When They Change Jobs www.findarticles.com/p/articles/mi_pwwi/is_200705/ai_n19162742/print
o An instance at Yale University where an associate dean and director of admissions, Stephen LeMenager, was accessing confidential Internet records to see whether its rival had admitted or rejected students who had applied to both schools.
Source: Ivy imbroglio: Princeton Admits It Spied on Yale Admissions Site
• Filtering organizations or businesses
• Video taping workers without their permission
o Recently cell phones with camera capabilities are becoming a problem and being banned from some places of work for protective reasons.
Source: “The dim view of camera phones” in the Indianapolis Star on August 15, 2004
Solution:
• Inform as many people as possible about the risk within competing businesses
• Warn people about some of the things companies might try to pull on them in order to get important information from them, in sneaky ways
• In order to stop “spies” from finding any useful information in employees or company trash every company should have a policy where they have to shred everything before it leaves the building
o Also, delete all information from computers once it’s no longer needed
• Monitor all employee interactions with other businesses whether a competing company or a vendor
o Keep good records of all employees’ computers and emails
I have researched this topic thoroughly because I want to make myself more aware of the lengths that people will go to in order to ‘beat out’ the competition. Also, want to make other people aware of these tactics in case they haven’t heard of any of the cases I have presented.
Problem:
• Companies tailing competitor employees
o Companies hire secret people to dig through some employees trash cans outside of their homes in order to get customer lists, policies, benefits, etc. about their competition.
Source: “Snoops” Business Week from October 9, 2006
• Making phone calls and expressing a false identity
o Companies make phone calls to employees or customers of their competition to try to squeezing some useful information out of them.
• Reading through e-mails or other confidential documents and/or employees taking this information with them
o In some cases, past employees take very confidential and important information with them when they leave one job for another job in the same field.
Source: 45% of Employees Take Data When They Change Jobs www.findarticles.com/p/articles/mi_pwwi/is_200705/ai_n19162742/print
o An instance at Yale University where an associate dean and director of admissions, Stephen LeMenager, was accessing confidential Internet records to see whether its rival had admitted or rejected students who had applied to both schools.
Source: Ivy imbroglio: Princeton Admits It Spied on Yale Admissions Site
• Filtering organizations or businesses
• Video taping workers without their permission
o Recently cell phones with camera capabilities are becoming a problem and being banned from some places of work for protective reasons.
Source: “The dim view of camera phones” in the Indianapolis Star on August 15, 2004
Solution:
• Inform as many people as possible about the risk within competing businesses
• Warn people about some of the things companies might try to pull on them in order to get important information from them, in sneaky ways
• In order to stop “spies” from finding any useful information in employees or company trash every company should have a policy where they have to shred everything before it leaves the building
o Also, delete all information from computers once it’s no longer needed
• Monitor all employee interactions with other businesses whether a competing company or a vendor
o Keep good records of all employees’ computers and emails
I have researched this topic thoroughly because I want to make myself more aware of the lengths that people will go to in order to ‘beat out’ the competition. Also, want to make other people aware of these tactics in case they haven’t heard of any of the cases I have presented.
Friday, March 28, 2008
The Areas of My Expertise
My research purposal paper will explain a little on the subject of competitive companies using sneaking techniques such as dumpster diving, stealing customer list, or luring past or current employees, in order to find out what their 'rivals' are up to. I will talk about some of the ways in which companies do this and also the way they get caught in the process. I will give the reader a little insight on some current situations that have come about between competing companies.
I choose to write my paper on this topic because one of my friends was telling me about how she learned all about it in one of her management classes and I think it is very interesting. Therefore, I decided that I wanted to research it more thoroughly. It's interesting to learn that many of the techniques companies are using to steal confidential information from their competitors is legal because in every case the means and action that they go through are extremely unethical.
By researching this topic and writing a paper that could be published in a newsletter I want to open the eyes of people who don't really know what all goes on between competing companies. I have just recently been introduced to some of the means and details of what happens and I would like to inform a few more people on the ways in which this happens and the consequences it has. Also, by giving example and stories on recent incidents I hope to warn people about some of the risk and some of the tricks competitors of a company will go to get want they want.
I choose to write my paper on this topic because one of my friends was telling me about how she learned all about it in one of her management classes and I think it is very interesting. Therefore, I decided that I wanted to research it more thoroughly. It's interesting to learn that many of the techniques companies are using to steal confidential information from their competitors is legal because in every case the means and action that they go through are extremely unethical.
By researching this topic and writing a paper that could be published in a newsletter I want to open the eyes of people who don't really know what all goes on between competing companies. I have just recently been introduced to some of the means and details of what happens and I would like to inform a few more people on the ways in which this happens and the consequences it has. Also, by giving example and stories on recent incidents I hope to warn people about some of the risk and some of the tricks competitors of a company will go to get want they want.
Tuesday, March 25, 2008
Common Sense response
In the pamphlet "Common Sense" by Thomas Paine he argues for American independence. He mainly focuses and criticizes the government, which he describes as "an institution whose sole purpose is to protect us from our own vices." He attacks the British government as well by expressing that it is too complex and that the monarchy as too much power.
In one part of the pamphlet Paine gives the reader an example of a group of people gathered on a secluded part of the earth that is disconnected to the rest of the world. He makes the point that they will be representing themselves. He explains that each person will be trying to figure things out for themselves but will eventually turn to the other people for help once they realize it is too overwhelming and so much work. He expresses that he feels people would be much happier if they were responsible for creating their own. Also, he thinks this would be better for the American colonists. He makes this point about the people stranded on an island by themselves they would create their own lives because he feels that the natural state of man is to live without government. He explains that the government is there in order to solve or prevent problems, but what happens when the government itself is the cause of a problem.
Paine later goes on to talk about how the American colonies have little to gain from staying attached to Britain. He goes on to talk about how even though we have been under the impression that Britain was protecting us, she was actually protecting herself. He also states that if the colonies remain attached to Britain that the problems that have come about in the past will more that likely appear again. From this pamphlet it is obvious to the reader that he is strongly arguing that now is the time to break off and become independent. He thinks that the present time is the perfect time to break free because of the size of the colonies and thier capabilities.
In conclusion, I think Thomas Paine makes some good arguments in this pamphlet. The points and subjects that he addresses makes you think. For example, the part about the people stranded on an island, you wouldn't really think about it from the perspective that he does. He strongly expresses how he feels about the British government and the reason he thinks the colonies would be better off apart from them.
In one part of the pamphlet Paine gives the reader an example of a group of people gathered on a secluded part of the earth that is disconnected to the rest of the world. He makes the point that they will be representing themselves. He explains that each person will be trying to figure things out for themselves but will eventually turn to the other people for help once they realize it is too overwhelming and so much work. He expresses that he feels people would be much happier if they were responsible for creating their own. Also, he thinks this would be better for the American colonists. He makes this point about the people stranded on an island by themselves they would create their own lives because he feels that the natural state of man is to live without government. He explains that the government is there in order to solve or prevent problems, but what happens when the government itself is the cause of a problem.
Paine later goes on to talk about how the American colonies have little to gain from staying attached to Britain. He goes on to talk about how even though we have been under the impression that Britain was protecting us, she was actually protecting herself. He also states that if the colonies remain attached to Britain that the problems that have come about in the past will more that likely appear again. From this pamphlet it is obvious to the reader that he is strongly arguing that now is the time to break off and become independent. He thinks that the present time is the perfect time to break free because of the size of the colonies and thier capabilities.
In conclusion, I think Thomas Paine makes some good arguments in this pamphlet. The points and subjects that he addresses makes you think. For example, the part about the people stranded on an island, you wouldn't really think about it from the perspective that he does. He strongly expresses how he feels about the British government and the reason he thinks the colonies would be better off apart from them.
Friday, March 21, 2008
Tuesday, March 18, 2008
Spring Break
My Spring Break was very relaxing and cheap. I spent the week at home with my family and friends. I loved the fact that I got to sleep in everyday. I went back to my high school to turn in some scholarship papers and visit some of my teachers. I was able to hang out with some people that I went to high school with. Then, my sister came home on Tuesday, so I got to spend some time with her. On Thursday her and I went to Evansville to visit my grandparents because we aren't going to be able to spend Easter with them like usual. I got to go shopping a few days throughout the week too, but I didn't spend too much money. I was sad to come back because it was a nice week to have no stress, but then I was ready to come back to finish the semester finished. Hope everyone else had a good break too!
Monday, March 3, 2008
Undersea Cables
These cables are supported by Telekom. Other countries would want to cut them for various reasons such as; personal vendetta against us, they are trying to disable our means of communications, or just by accident maybe. On the internet there are a number of maps that show the location of these cables in order to try to prevent any accidents from happening. Also, Wikipedia has a list of international submarines communications cables. Make them pay for the damages and repairs plus make them reimburse the profit they would make from there delivery. The UN government would have to implement it and go through with all the penalties. It is cost-effective because no one is going to want to pay all the money, therefore, they will hopefully be more careful when it comes to undersea cables. It helps everyone throughout the whole world because it is definitely one of the most useful means of communication and technology. The people it would hurt would be the ones who cut it either on purpose or by accident. It could also hurt the tax payers if they were forced to contribute money to the damages or obviously if their taxes were raised in order to compensate for the damages.
http://en.wikipedia.org/wiki/Submarine_communications_cable
http://news.zdnet.com/2100-9595_22-529826.html
*Everything else is our own ideas
Jenn Heldt
Valerie Petrey
Logan Shrock
Athena Davros
http://en.wikipedia.org/wiki/Submarine_communications_cable
http://news.zdnet.com/2100-9595_22-529826.html
*Everything else is our own ideas
Jenn Heldt
Valerie Petrey
Logan Shrock
Athena Davros
Subscribe to:
Posts (Atom)