Sunday, November 13, 2011

Chapter 6: Part Two

Name Rob Feind Class time: 11am
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 6: Crime (Sections 6.4 and 6.5)

1. (Knowledge)Tell three interesting elements of this chapter:
a. Embezzlement is an important factor in employee crime, an example being Volkswagen, which lost over 200 million dollars in a fraud committed by high level employees (Baase, 333).
b. A “logic bomb” is software that destroys critical files; while sometimes for sabotage, some employees do this so they can be paid more to fix the problem (Baase, 333).
c. The Electronic Communications Privacy Act prohibits interception of email and reading of said email without a court order, however employers are given this power, and the act is much more lenient on them (Baase, 340).

2. (Comprehension) Summarize what is being discussed within this chapter?

With computers, employee crime has become much more common. Embezzlement, the fraudulent appropriation of property by a person to whom it has been entrusted, is easier to accomplish with computers (Baase, 332). The anonymity and complexity of computers makes this a far easier task to accomplish. Sabotage is also possible through a tool called a logic bomb, or software that destroys files such as the payroll. Rotating desks and ID checkpoints have been used to counter these crimes, though it still goes on (Baase, 333). Employee monitoring has also become much simpler, and as Cindia Cameron says, “technology now allows employers to cross the line from monitoring the work to monitoring the worker.” In the past time clocks and assembly line speeds dictated worker productivity – now computers make it more accurate and detailed. Cameras that link to individual computer monitors and keystroke counting are just a few of the measures put in place to supervise employees (Baase, 335). Recorded calls and beeping to signal a lack of work taking place has deemed this type of job an “electronic sweatshop” by critics. This monitoring may cause loss of independence, stress, low morale, and a general feeling of being a machine to employees (Baase, 336). Lewis Maltby wants to regulate employee monitoring, calling it a “blessing in disguise” to employers, as it would cause more long term loyalty and productivity (Baase, 337). E-mail privacy has also become an issue, especially if the employee uses the address for more personal reasons (Baase, 339). However it does have its practical uses, such as to check for offensive material, illegal software, and to investigate harassment claims. The Electronic Communications Privacy Act prohibits the interception of -email and reading of e-mail without a court order, however employers are excluded from this (Baase, 340). Online web surfing is also heavily blocked, though for more reasonable objectives; this keeps the employee productive and working for their money, and also protects against the threat of viruses (Baase, 343). Technology plays a large part in the workplace, and not only brings up issues of internet crime, but privacy as well.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

One example of employee embezzlement involves Kimberly Sziraki, an individual who took 1.6 million dollars from the Merced nut processing plant that she worked at. Facing a maximum of 17 years in prison, Sziraki stole this money from the company within three years, mainly to feed her online gambling addiction. The most interesting part of this is that she was a manager at this plant. It goes to show that it doesn’t matter what position of power you are in, embezzlement still happens, and may even be easier for higher power workers. More info can be found at: http://www.mercedsunstar.com/2010/06/11/1456054/kimberly-sziraki-pleads-no-contest.html


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

On page 334, it is stated that “Computers don’t steal – people do”. By this argument, embezzlement is just human greed made easier through new technology. This eases and agitates some concerns about technology and crime in the workplace, as the technology itself is not the problem and is not looking to harm people – at the same time, this makes a crook even more powerful than what they could be without the technology.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree that embezzlement makes it much easier to commit corporate fraud; as Baase states on page 333, the anonymity and complexity of computers makes this a much simpler task. One example of this is Volkswagen, and its $200 million loss to employees partaking in a foreign exchange fraud. With logic bombs, sabotage is also easier, as while it may be just for the sake of sabotage, it may be so the employee is paid to fix the problem they created, which may be a form of embezzlement in itself. I agree with Lewis Maltby in the sense that excessive employee monitoring is problematic, and a regulation of it will increase loyalty and productivity in the end (Baase, 337). E-mail monitoring, while somewhat justified, should have parameters; simple criticisms of the company should not get one terminated. There should be filters put into place that only allows the employee to e-mail coworkers at work, as private e-mails may distract from work and also allow viruses to enter the workspace.


6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
This topic is relevant in today’s society as technology is continuing to have a massive effect on our careers. Embezzlement is a serious workplace crime that is committed without people knowing in some cases, as it is very easy to hide. Workplace monitoring is considered unethical in some instances, and even a blow to productivity. As food for thought, I believe that workplace monitoring may actually help to decrease embezzlement cases (except for in the case of management committing it), however it may not work at that level due to criticisms that will emerge of said monitoring becoming even more powerful than it was previously considered.






References

Patton, Victor. "Kimberly Sziraki Pleads No Contest in $1.6 Million Embezzlement Case."Merced Sun-Star. 11 June 2010. Web. 12 Nov. 2011. .

Baase, Sara. "Chapter 6: Work." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. Print.

No comments:

Post a Comment