1. Week 7 Assignment - Descriptive Statistics
Overview
Use your textbook, the Internet, newspaper websites (such
as USA Today, The New York Times, The Wall Street Journal,
or The Washington Post) and the Strayer Library to research an
article that uses statistical data related to a current event, your
major, your current field, or your future career goal. Note:
The Assignment Template for Descriptive Statistics [DOCX] is
provided to help you to organize your thoughts and ideas.
The chosen article must have a publication date during this
quarter and use one of the following categories of descriptive
statistics:
· Measures of frequency: counting rules, percent, frequency,
frequency distributions.
· Measures of central tendency: mean, median, mode.
· Measures of dispersion or variation: range, variance, standard
deviation.
· Measures of position: percentile, quartiles.
Instructions
Write a 2–3 page paper in which you:
· Write a summary of the article.
· Explain how the article uses descriptive statistics.
· Explain how the article applies to the real world, your major,
your current job, or your future career goal.
· Analyze the reasons why the author chose to use the various
types of data shared in the article.
This course requires the use of Strayer Writing Standards. For
assistance and information, please refer to the Strayer Writing
Standards link in the left-hand menu of your course. Check with
your professor for any additional instructions.
The specific course learning outcome associated with this
assignment:
· Review an article that uses descriptive statistics and includes
personal connections applicable to current and future career
goals.
2. By submitting this paper, you agree: (1) that you are
submitting your paper to be used and stored as part of the
SafeAssign™ services in accordance with the Blackboard
Privacy Policy; (2) that your institution may use your paper in
accordance with your institution's policies; and (3) that your use
of SafeAssign will be without recourse against Blackboard Inc.
and its affiliates.
The Benefits and Risks of
Using Skype at Darcy’s:
A Short Report
September 20, 2013
Prepared for:
Darcy’s Department Store
Prepared by:
Student Name
BUS105
2
Background
The East Coast buyers for Darcy’s Department Store are looking
for an economical and
efficient way to share information about the deals buyers are
getting from various
suppliers and use real-time transmission of that information
between one another to
help save money.
There are a number of tools to do this, but Skype has been
mentioned as a leading
contender. Skype claims to be an easy to use, online tool that
allows users to connect
with any other Skype user around the world for free. A user can
make video and voice
calls to other Skype users at no charge. Users can even share
files among themselves,
which provides a great asset during a business meeting.
However, when there are group
video calls, then Skype begins to charge a fee.
Also, for buyers throughout the East Coast, this tool can be
useful if they need to talk
with one another. However, for meetings that require more than
two attendees, Skype
is not a useful tool and is not intended to work that way for
business.
Benefits
Among the most attractive benefits of Skype is that it is free
and you can see the person
you are talking with. To purchase a software license for 20
buyers that is compatible to
what Skype can do will cost Darcy’s roughly $1,500 per month.
There are no hidden
charges with Skype. According to Skype’s web page, users get
video and voice calls to
other Skype users and “instant messaging and file sharing” all
at no charge.
The video sharing feature of Skype will allow the buyers to see
products in real time.
For example, if two buyers are looking at similar merchandise
from two different
suppliers who are offering different pricing, then they can
quickly Skype one another
and compare the product to see if it is the same and to then get
the best pricing for it.
Two business writers for the Auburn Citizen in NY, state that
there are business users
“who can save time and money in scheduling and holding
conferences or training
sessions, demonstrate products or services for potential
customers, and extend
customer service by showing customers how to get the most
from your product” (Leon
and Leon).
Downsides
Despite the benefits mentioned above, there are clear downsides
to this product. I
tested Skype over a one-week period by calling various Skype
users throughout the East
Coast and tried to simulate a conversation that a buyer might
have.
First, using Skype takes getting used to. During my five-day
test, I never mastered the
connection stage. This is when one Skype user “calls” another
Skype user. Skype makes
3
a distinctive sound that lets the user know it is making a call.
However, once you
connect to whom you are calling, the picture shows, but it takes
about five seconds for
that picture to catch up with the person sitting there. In
essence, it is a still picture for
five seconds.
Second, once I was connected to the user, I quickly realized that
what I was saying was
not being transmitted in real-time. There could be up to a three
second lag in what I
said and the user hearing it. This created a number of
challenges, but the biggest one
was this lag kept the other user and me talking over each other.
I just assumed the user
could not hear what I said, so I repeated myself. Of course, as
soon as I spoke, then I
heard the user’s response to my original message, and thus
began us talking over one
another. This was a persistent problem throughout my first two
calls, but got better
once I became more familiar with the technology.
Third, the picture is grainy, like an old TV. In this world of
high definition, the picture I
was getting with Skype looked like a 1970s television set. I
could see the person fine,
but the lack of clarity was alarming. If buyers were trying to
compare colors of a fabric,
for instance, that would be nearly impossible to do because of
the degraded picture
quality.
Fourth, I experienced a number of connectivity issues
throughout my test. I was only
able to connect immediately on four of my 10 test calls. On the
others, I thought the
person picked up, but there was no one there, and I had to re-
connect. This caused
frustration and made me want to discard Skype each time it
happened. Also during
calls, it was not uncommon for the connection to be lost, and I
would have to try and re-
connect again. I am not sure why this occurs, but it happened
on nearly 40% of my calls.
Again, this caused a great deal of frustration.
Finally, there are concerns that the privacy of Skype users is
being violated by Microsoft,
“Anyone who uses Skype has consented to the company reading
everything they write”
(“Skype with Care).
Recommendation
The use of Skype really boils down to money. If we are trying
to save money and need a
readily available, free solution, then Skype is a contender.
However, even though it is
free, Skype poses a number of technology challenges that are
outlined above. This
alone makes this technology untenable for our company. At the
swift pace we move,
little challenges like the one Skype poses lead me to not
recommend the product.
There are a number of other services we can use, including
many instant messaging
programs that provide similar services as Skype, but do it
better. We can even use
FaceTime, from Apple, that can be used on Macs, iPhones,
iPads, and iPods, and most of
our buyers seem to have at least one of these products.
4
In summary, although Skype is free, it does not meet the need
we have to interconnect
buyers across the East Coast and allow them to quickly and
efficiently conduct business.
I do not recommend Skype for Darcy’s buyers.
5
Works Cited
Leon, Norma, and Tony Leon. "Sky’s the limit for Skype video
call uses." The Citizen. N.p.,
Aug. 2013. Web. 20 Sept. 2013.
<http://auburnpub.com/lifestyles/sky-s-the-
limit-for-skype-video-call-uses/article_5454fb55-8c85-5817-
909f-
43a729f04992.html. >.
"Skype with care – Microsoft is reading everything you write. ."
The H Security. N.p., May 2013.
Web. 20 Sept. 2013. <http://www.h-
online.com/security/news/item/Skype-with-care-
Microsoft-is-reading-everything-you-write-1862870.html>.
"What is Skype?." Skype. N.p., n.d. Web. 20 Sept. 2013.
<http://www.skype.com/en/what-is-
skype/>.
Internet Usage Policy at
Pyramid:
A Short Report
September 20, 2013
Prepared for:
Pyramid Design Team
Prepared by:
Student Name
BUS105
Background
Pyramid Design Team began seven years ago as a small design
firm with three
employees. The original employees were the owner and two
designers. With this core
of three employees, each knew what was expected of the other,
and official policies cut
against the grain of the creative atmosphere that was being
fostered. Therefore, aside
from the founding document containing the mission of the
company, there were no
policies put in place. This worked fine, until recently.
Within the last four years, Pyramid has hired 11 additional
staff, including designers and
programmers. The company has been implementing new
policies regarding vacation
time, holidays, and sexual harassment, for example, but there
still exists no policy
governing the use of the Internet at work. Now that the
company consists of 14
employees, I propose the creation and adoption of an Internet
policy that will provide
employees with clear guidelines about its appropriate and
sanctioned use at work.
Problem
The inappropriate use of the Internet is threefold. First, the
designers and developers
are downloading beta versions of software from the Internet.
Since this software is
often in beta, there can be, and have been, numerous problems
with these types of free
downloads.
Our IT manager has seen a huge increase in Trojan viruses
penetrating our system and
causing damage to our servers and other employees’ computers.
He has spent
countless hours trying to find and remove these viruses and has
expended thousands of
dollars in resources to call in technical specialists to eradicate
the viruses.
The intent of the designers and developers was simply to get the
latest software that
will allow them to create the best product. Unfortunately, that
has not always been the
case, and some of these downloads are causing serious IT
threats to our systems.
The new Internet policy needs to ban this practice and clearly
state that nothing can be
downloaded from the Internet without the express consent of the
IT manager and a
supervisor.
Second is the use of social media at work. The use of company
computers by employees
to view Facebook, other social media, and streaming services
has increased 200% in the
past 18 months! Some employees, for example, are logging-into
Facebook when they
arrive at work and leaving the page running as a tab in their web
browser, checking it
frequently throughout the day.
This has decreased productivity. A study conducted by Nucleus
Research and published
by Computerworld found that “Companies that allow users to
access Facebook in the
workplace lose an average of 1.5% in total employee
productivity, according to a new
report from Nucleus Research, an IT research company. The
survey of 237 employees
also showed that 77% of workers who have a Facebook account
use it during work
hours.” Facebook is, of course, the biggest offender, but the
policy needs to ban all
social media, such as Twitter, while at work.
The third area of concern involves streaming video services,
such as Netflix, Amazon
Prime, and Hulu. Employees who eat lunch at their desk are
using their computers to
watch videos from a streaming video provider. The problem
arises when the employee
watching a video finds the content completely suitable, while a
co-worker sitting
nearby, or passing by his or her desk, finds the content
inappropriate. As this is a
subjective opinion, we can be opening ourselves up to a lawsuit
for sexual harassment,
for instance, if a video contained nudity in it and the passerby
saw it and became
threatened.
Although most employees are not falling into this category, it
only takes one. Because
of this, we need to ban streaming videos.
Finally, there have been instances where pornography has been
viewed on a company
computer. I am sure we all can agree that banning the use of
viewing or downloading
any pornographic image using a company computer should be
banned.
Solution
There needs to be a policy implemented where violations like
these above can be dealt
with immediately. Depending on the severity of the infraction,
we can have a tiered
system of punishment:
1. First Infraction – verbal warning
2. Second Infraction – written warning
3. Third Infraction – dismissal from the company
There are many forms an Internet usage policy can take, but I
suggest we keep it simple.
GFI, a company that provides IT solutions, provides a clear -cut
policy for Internet usage
that details what company computers should, and should not, be
used for:
• Company employees are expected to use the Internet
responsibly and productively.
Internet access is limited to job-related activities only and
personal use is not
permitted
• Job-related activities include research and educational tasks
that may be found via
the Internet that would help in an employee's role
• All Internet data that is composed, transmitted and/or received
by <company's>
computer systems is considered to belong to <company> and is
recognized as part of
its official data. It is therefore subject to disclosure for legal
reasons or to other
appropriate third parties
• The equipment, services and technology used to access the
Internet are the property
of <company> and the company reserves the right to monitor
Internet traffic and
monitor and access data that is composed, sent or received
through its online
connections
• Emails sent via the company email system should not contain
content that is deemed
to be offensive. This includes, though is not restricted to, the
use of vulgar or
harassing language/images
• All sites and downloads may be monitored and/or blocked by
<company> if they are
deemed to be harmful and/or not productive to business
• The installation of software such as instant messaging
technology is strictly
prohibited
Unacceptable use of the Internet by employees includes, but i s
not limited to:
• Sending or posting discriminatory, harassing, or threatening
messages or images on
the Internet or via <company's> email service
• Using computers to perpetrate any form of fraud, and/or
software, film or music
piracy
• Stealing, using, or disclosing someone else's password without
authorization
• Downloading, copying or pirating software and electronic files
that are copyrighted
or without authorization
• Sharing confidential material, trade secrets, or proprietary
information outside of the
organization
• Hacking into unauthorized websites
• Sending or posting information that is defamatory to the
company, its
products/services, colleagues and/or customers
• Introducing malicious software onto the company network
and/or jeopardizing the
security of the organization's electronic communications
systems
• Sending or posting chain letters, solicitations, or
advertisements not related to
business purposes or activities
• Passing off personal views as representing those of the
organization
Obviously, not all points made here are necessary, but this
provides the best overview
of a policy that we can utilize to make our operations run more
smoothly and
effectively. We can pick what we need and discard what does
not apply. I suggest we
begin work on creating this policy within the next week and
have it ready to implement
within one month. I am available at your convenience to discuss
the creation of this
policy.
Works Cited
"Sample Internet Usage Policy." GFI. GFI Software, n.d. Web.
20 Sept. 2013.
<http://www.gfi.com/pages/sample-internet-usage-policy>.
"Study: Facebook Use Cuts Productivity at Work."
Computerworld. Computerworld, Inc.
22 July 2009. Web. 20 Sept. 2013.
<http://www.computerworld.com/s/article/
9135795/Study_Facebook_use_cuts_productivity_at_work>
https://in.joblum.com/job/graphic-designer/591796
https://www.homeworkmarket.com/questions/instructions-for-
graded-writing-assignment-3-short-report
https://www.homeworkmarket.com/questions/instructions-for-
graded-writing-assignment-3-short-report
https://www.homeworkmarket.com/questions/instructions-for-
graded-writing-assignment-3-short-report
https://www.homeworkmarket.com/questions/instructions-for-
graded-writing-assignment-3-short-report
https://www.homeworkmarket.com/questions/instructions-for-
graded-writing-assignment-3-short-report
https://www.computerworld.com/article/2526045/study--
facebook-use-cuts-productivity-at-work.html
https://www.homeworkmarket.com/questions/instructions-for-
graded-writing-assignment-3-short-report
https://www.homeworkmarket.com/questions/instructions-for-
graded-writing-assignment-3-short-report
https://www.homeworkmarket.com/files/ex2-pdf-7274485
https://www.homeworkmarket.com/files/ex2-pdf-7274485
https://www.alcorn.edu/uploaded/files/finadmin/POLICIES/CIT
S/Internet_Usage_Policy.pdf
https://smallhorsefordentists.com/client-acceptable-use
https://www.homeworkmarket.com/files/ex2-pdf-7274485
https://www.svcleanenergy.org/wp-
content/uploads/2018/10/ITP-04_Internet-Usage-Policy-F.pdf
https://www.homeworkmarket.com/files/ex2-pdf-7274485
https://www.homeworkmarket.com/files/ex2-pdf-7274485
https://www.homeworkmarket.com/files/ex2-pdf-7274485
https://smallhorsefordentists.com/client-acceptable-use
https://www.cerias.purdue.edu/site/symposium2015/presentation
s
https://darulqasim.org/wireless
https://smallhorsefordentists.com/client-acceptable-use
https://www.alcorn.edu/uploaded/files/finadmin/POLICIES/CIT
S/Internet_Usage_Policy.pdf
https://worlddatabaseofhappiness.eur.nl/publications/internet-
use-and-well-being-a-survey-and-a-theoretical-framework-
14609
https://pennstate.pure.elsevier.com/en/publications/securing-
the-internet-of-things-iot-a-security-taxonomy-for-iot
https://www.semanticscholar.org/paper/A-Review-of-Privacy-
and-Consent-Management-in-A-on-Asghar-
Lee/b8cb69868f59316e76996312a20994257276071b
https://www.quetext.com/
Short Report
Background information
Oracle graphic design shop has been doing well since its
inception in the IT market. The design shop deal with design of
web pages, brochures, logos, signs, books, annual reports,
advertisements magazine covers among others. The shop has
been successful because it has been able to raise market value
for the last three years. For this reason, the Human Resource
manager who is also the owner, last year hired three new
designers and a receptionist thus bringing the total number of
employees to 14. Initially Oracle had three designers because its
market capitalization and revenue collection was little. The rest
of the employees were one account officer, one IT person, two
technicians and the rest were data analysts.
Employees have been very hardworking. The policies under
which they bid themselves in the contract ensures that each one
of them achieves all the set targets or goals. However, Oracle
graphic design shop has developed problems related to
increased numbers of employees. The owner who also doubles
as a Human Resource officer, has had a lot of headache i n
figuring out how to regulate the higher number of employee’s
internet use.
Problem
Having increased number of employees, the owner of Oracle
graphic design shop has been receiving reports on the rising
cost of maintaining the company’s computers. Currently,
employees can download anything they want from the Internet
and view any website they wish.
The owner's IT person has alerted him to several problems. One
is that the designers are downloading any and all software that
they think sounds "cool" - even software in beta/ developer
versions that still have a lot of kinks. For instance, through the
IT officer, the owner notified during usual briefings that some
employees use company computers during their free time to
browse through unprotected sites. Some use the computers to
watch live stream videos on the sites like Netflix, Amazon
prime and Hulu. As a result, their computers lock up or
malfunction and then IT has to spend hours troubleshooting the
problem to get it resolved.
The computer thus developing malfunctions which leads to
technical problems. Considering the call of duty for the Oracles
employees, there is nowhere written that employees have the
liberty to irresponsibly use the Oracles computers or internet
for a purpose rather than what is meant for the growth of the
company. As account officer, I noted the number of checks I
deposit to pay the specialists technician during the process of
repairing and eradicating viruses a lot and a loss to the small
company.
This has decreased productivity of the company as well as its
quarterly revenues. According to the study conducted by
Nucleus Research and published by Computerworld found that
“Companies that allow users to access Facebook in the
workplace lose an average of 1.5% in total employee
productivity, according to a new report from Nucleus Research,
an IT research company.” This is indeed clear from the account
information that have summarized and also the advice from the
IT expert.
Secondly, there is concern over what Internet sites employees
are viewing, specifically those that are inappropriate for the
workplace. For instance, some employees use the company
computers to visit pornographic sites one of which I noted has
led to an increase in the internet premiums. Despite, that during
lunch time when we don’t expect employees to be logged into
the internet. The IT person informed that most of them who take
lunch on their desks use lunchtime hour to browse in social
media platforms such as Twitter, Facebook, Instagram and
WhatsApp among other applications.
Considering all this headache, it’s well if the Human resource
manager ban browsing on the alleged sites as well as
irresponsible use of Oracle graphic design computers. Overall,
the IT person is worried about security breaches resulting from
these downloads, inappropriate website visits, and other Internet
activities.

1. Week 7 Assignment - Descriptive StatisticsOverviewUse your

  • 1.
    1. Week 7Assignment - Descriptive Statistics Overview Use your textbook, the Internet, newspaper websites (such as USA Today, The New York Times, The Wall Street Journal, or The Washington Post) and the Strayer Library to research an article that uses statistical data related to a current event, your major, your current field, or your future career goal. Note: The Assignment Template for Descriptive Statistics [DOCX] is provided to help you to organize your thoughts and ideas. The chosen article must have a publication date during this quarter and use one of the following categories of descriptive statistics: · Measures of frequency: counting rules, percent, frequency, frequency distributions. · Measures of central tendency: mean, median, mode. · Measures of dispersion or variation: range, variance, standard deviation. · Measures of position: percentile, quartiles. Instructions Write a 2–3 page paper in which you: · Write a summary of the article. · Explain how the article uses descriptive statistics. · Explain how the article applies to the real world, your major, your current job, or your future career goal. · Analyze the reasons why the author chose to use the various types of data shared in the article. This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment: · Review an article that uses descriptive statistics and includes personal connections applicable to current and future career
  • 2.
    goals. 2. By submittingthis paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates. The Benefits and Risks of Using Skype at Darcy’s: A Short Report September 20, 2013 Prepared for: Darcy’s Department Store Prepared by: Student Name BUS105
  • 3.
    2 Background The East Coastbuyers for Darcy’s Department Store are looking for an economical and efficient way to share information about the deals buyers are getting from various suppliers and use real-time transmission of that information between one another to help save money. There are a number of tools to do this, but Skype has been mentioned as a leading contender. Skype claims to be an easy to use, online tool that allows users to connect with any other Skype user around the world for free. A user can make video and voice calls to other Skype users at no charge. Users can even share files among themselves, which provides a great asset during a business meeting. However, when there are group
  • 4.
    video calls, thenSkype begins to charge a fee. Also, for buyers throughout the East Coast, this tool can be useful if they need to talk with one another. However, for meetings that require more than two attendees, Skype is not a useful tool and is not intended to work that way for business. Benefits Among the most attractive benefits of Skype is that it is free and you can see the person you are talking with. To purchase a software license for 20 buyers that is compatible to what Skype can do will cost Darcy’s roughly $1,500 per month. There are no hidden charges with Skype. According to Skype’s web page, users get video and voice calls to other Skype users and “instant messaging and file sharing” all at no charge. The video sharing feature of Skype will allow the buyers to see products in real time. For example, if two buyers are looking at similar merchandise from two different suppliers who are offering different pricing, then they can quickly Skype one another and compare the product to see if it is the same and to then get the best pricing for it. Two business writers for the Auburn Citizen in NY, state that there are business users “who can save time and money in scheduling and holding conferences or training sessions, demonstrate products or services for potential
  • 5.
    customers, and extend customerservice by showing customers how to get the most from your product” (Leon and Leon). Downsides Despite the benefits mentioned above, there are clear downsides to this product. I tested Skype over a one-week period by calling various Skype users throughout the East Coast and tried to simulate a conversation that a buyer might have. First, using Skype takes getting used to. During my five-day test, I never mastered the connection stage. This is when one Skype user “calls” another Skype user. Skype makes 3 a distinctive sound that lets the user know it is making a call. However, once you connect to whom you are calling, the picture shows, but it takes about five seconds for that picture to catch up with the person sitting there. In essence, it is a still picture for five seconds. Second, once I was connected to the user, I quickly realized that what I was saying was not being transmitted in real-time. There could be up to a three second lag in what I
  • 6.
    said and theuser hearing it. This created a number of challenges, but the biggest one was this lag kept the other user and me talking over each other. I just assumed the user could not hear what I said, so I repeated myself. Of course, as soon as I spoke, then I heard the user’s response to my original message, and thus began us talking over one another. This was a persistent problem throughout my first two calls, but got better once I became more familiar with the technology. Third, the picture is grainy, like an old TV. In this world of high definition, the picture I was getting with Skype looked like a 1970s television set. I could see the person fine, but the lack of clarity was alarming. If buyers were trying to compare colors of a fabric, for instance, that would be nearly impossible to do because of the degraded picture quality. Fourth, I experienced a number of connectivity issues throughout my test. I was only able to connect immediately on four of my 10 test calls. On the others, I thought the person picked up, but there was no one there, and I had to re- connect. This caused frustration and made me want to discard Skype each time it happened. Also during calls, it was not uncommon for the connection to be lost, and I would have to try and re- connect again. I am not sure why this occurs, but it happened on nearly 40% of my calls. Again, this caused a great deal of frustration.
  • 7.
    Finally, there areconcerns that the privacy of Skype users is being violated by Microsoft, “Anyone who uses Skype has consented to the company reading everything they write” (“Skype with Care). Recommendation The use of Skype really boils down to money. If we are trying to save money and need a readily available, free solution, then Skype is a contender. However, even though it is free, Skype poses a number of technology challenges that are outlined above. This alone makes this technology untenable for our company. At the swift pace we move, little challenges like the one Skype poses lead me to not recommend the product. There are a number of other services we can use, including many instant messaging programs that provide similar services as Skype, but do it better. We can even use FaceTime, from Apple, that can be used on Macs, iPhones, iPads, and iPods, and most of our buyers seem to have at least one of these products. 4 In summary, although Skype is free, it does not meet the need we have to interconnect buyers across the East Coast and allow them to quickly and
  • 8.
    efficiently conduct business. Ido not recommend Skype for Darcy’s buyers. 5 Works Cited Leon, Norma, and Tony Leon. "Sky’s the limit for Skype video call uses." The Citizen. N.p., Aug. 2013. Web. 20 Sept. 2013. <http://auburnpub.com/lifestyles/sky-s-the- limit-for-skype-video-call-uses/article_5454fb55-8c85-5817- 909f- 43a729f04992.html. >. "Skype with care – Microsoft is reading everything you write. ." The H Security. N.p., May 2013. Web. 20 Sept. 2013. <http://www.h- online.com/security/news/item/Skype-with-care- Microsoft-is-reading-everything-you-write-1862870.html>. "What is Skype?." Skype. N.p., n.d. Web. 20 Sept. 2013. <http://www.skype.com/en/what-is-
  • 9.
    skype/>. Internet Usage Policyat Pyramid: A Short Report September 20, 2013 Prepared for: Pyramid Design Team Prepared by: Student Name BUS105
  • 10.
    Background Pyramid Design Teambegan seven years ago as a small design firm with three employees. The original employees were the owner and two designers. With this core of three employees, each knew what was expected of the other, and official policies cut against the grain of the creative atmosphere that was being fostered. Therefore, aside from the founding document containing the mission of the company, there were no policies put in place. This worked fine, until recently. Within the last four years, Pyramid has hired 11 additional staff, including designers and programmers. The company has been implementing new policies regarding vacation time, holidays, and sexual harassment, for example, but there still exists no policy
  • 11.
    governing the useof the Internet at work. Now that the company consists of 14 employees, I propose the creation and adoption of an Internet policy that will provide employees with clear guidelines about its appropriate and sanctioned use at work. Problem The inappropriate use of the Internet is threefold. First, the designers and developers are downloading beta versions of software from the Internet. Since this software is often in beta, there can be, and have been, numerous problems with these types of free downloads. Our IT manager has seen a huge increase in Trojan viruses penetrating our system and causing damage to our servers and other employees’ computers. He has spent countless hours trying to find and remove these viruses and has expended thousands of dollars in resources to call in technical specialists to eradicate the viruses.
  • 12.
    The intent ofthe designers and developers was simply to get the latest software that will allow them to create the best product. Unfortunately, that has not always been the case, and some of these downloads are causing serious IT threats to our systems. The new Internet policy needs to ban this practice and clearly state that nothing can be downloaded from the Internet without the express consent of the IT manager and a supervisor. Second is the use of social media at work. The use of company computers by employees to view Facebook, other social media, and streaming services has increased 200% in the past 18 months! Some employees, for example, are logging-into Facebook when they arrive at work and leaving the page running as a tab in their web browser, checking it frequently throughout the day. This has decreased productivity. A study conducted by Nucleus
  • 13.
    Research and published byComputerworld found that “Companies that allow users to access Facebook in the workplace lose an average of 1.5% in total employee productivity, according to a new report from Nucleus Research, an IT research company. The survey of 237 employees also showed that 77% of workers who have a Facebook account use it during work hours.” Facebook is, of course, the biggest offender, but the policy needs to ban all social media, such as Twitter, while at work. The third area of concern involves streaming video services, such as Netflix, Amazon Prime, and Hulu. Employees who eat lunch at their desk are using their computers to watch videos from a streaming video provider. The problem arises when the employee watching a video finds the content completely suitable, while a co-worker sitting nearby, or passing by his or her desk, finds the content inappropriate. As this is a
  • 14.
    subjective opinion, wecan be opening ourselves up to a lawsuit for sexual harassment, for instance, if a video contained nudity in it and the passerby saw it and became threatened. Although most employees are not falling into this category, it only takes one. Because of this, we need to ban streaming videos. Finally, there have been instances where pornography has been viewed on a company computer. I am sure we all can agree that banning the use of viewing or downloading any pornographic image using a company computer should be banned. Solution There needs to be a policy implemented where violations like these above can be dealt
  • 15.
    with immediately. Dependingon the severity of the infraction, we can have a tiered system of punishment: 1. First Infraction – verbal warning 2. Second Infraction – written warning 3. Third Infraction – dismissal from the company There are many forms an Internet usage policy can take, but I suggest we keep it simple. GFI, a company that provides IT solutions, provides a clear -cut policy for Internet usage that details what company computers should, and should not, be used for: • Company employees are expected to use the Internet responsibly and productively. Internet access is limited to job-related activities only and
  • 16.
    personal use isnot permitted • Job-related activities include research and educational tasks that may be found via the Internet that would help in an employee's role • All Internet data that is composed, transmitted and/or received by <company's> computer systems is considered to belong to <company> and is recognized as part of its official data. It is therefore subject to disclosure for legal reasons or to other appropriate third parties • The equipment, services and technology used to access the Internet are the property of <company> and the company reserves the right to monitor Internet traffic and
  • 17.
    monitor and accessdata that is composed, sent or received through its online connections • Emails sent via the company email system should not contain content that is deemed to be offensive. This includes, though is not restricted to, the use of vulgar or harassing language/images • All sites and downloads may be monitored and/or blocked by <company> if they are deemed to be harmful and/or not productive to business • The installation of software such as instant messaging technology is strictly prohibited Unacceptable use of the Internet by employees includes, but i s not limited to: • Sending or posting discriminatory, harassing, or threatening
  • 18.
    messages or imageson the Internet or via <company's> email service • Using computers to perpetrate any form of fraud, and/or software, film or music piracy • Stealing, using, or disclosing someone else's password without authorization • Downloading, copying or pirating software and electronic files that are copyrighted or without authorization • Sharing confidential material, trade secrets, or proprietary information outside of the organization • Hacking into unauthorized websites • Sending or posting information that is defamatory to the company, its products/services, colleagues and/or customers • Introducing malicious software onto the company network
  • 19.
    and/or jeopardizing the securityof the organization's electronic communications systems • Sending or posting chain letters, solicitations, or advertisements not related to business purposes or activities • Passing off personal views as representing those of the organization Obviously, not all points made here are necessary, but this provides the best overview of a policy that we can utilize to make our operations run more smoothly and effectively. We can pick what we need and discard what does not apply. I suggest we begin work on creating this policy within the next week and have it ready to implement within one month. I am available at your convenience to discuss
  • 20.
    the creation ofthis policy. Works Cited "Sample Internet Usage Policy." GFI. GFI Software, n.d. Web. 20 Sept. 2013. <http://www.gfi.com/pages/sample-internet-usage-policy>. "Study: Facebook Use Cuts Productivity at Work." Computerworld. Computerworld, Inc.
  • 21.
    22 July 2009.Web. 20 Sept. 2013. <http://www.computerworld.com/s/article/ 9135795/Study_Facebook_use_cuts_productivity_at_work> https://in.joblum.com/job/graphic-designer/591796 https://www.homeworkmarket.com/questions/instructions-for- graded-writing-assignment-3-short-report https://www.homeworkmarket.com/questions/instructions-for- graded-writing-assignment-3-short-report https://www.homeworkmarket.com/questions/instructions-for- graded-writing-assignment-3-short-report https://www.homeworkmarket.com/questions/instructions-for- graded-writing-assignment-3-short-report https://www.homeworkmarket.com/questions/instructions-for- graded-writing-assignment-3-short-report https://www.computerworld.com/article/2526045/study-- facebook-use-cuts-productivity-at-work.html
  • 22.
    https://www.homeworkmarket.com/questions/instructions-for- graded-writing-assignment-3-short-report https://www.homeworkmarket.com/questions/instructions-for- graded-writing-assignment-3-short-report https://www.homeworkmarket.com/files/ex2-pdf-7274485 https://www.homeworkmarket.com/files/ex2-pdf-7274485 https://www.alcorn.edu/uploaded/files/finadmin/POLICIES/CIT S/Internet_Usage_Policy.pdf https://smallhorsefordentists.com/client-acceptable-use https://www.homeworkmarket.com/files/ex2-pdf-7274485 https://www.svcleanenergy.org/wp- content/uploads/2018/10/ITP-04_Internet-Usage-Policy-F.pdf https://www.homeworkmarket.com/files/ex2-pdf-7274485 https://www.homeworkmarket.com/files/ex2-pdf-7274485 https://www.homeworkmarket.com/files/ex2-pdf-7274485 https://smallhorsefordentists.com/client-acceptable-use https://www.cerias.purdue.edu/site/symposium2015/presentation s https://darulqasim.org/wireless
  • 23.
  • 24.
    Background information Oracle graphicdesign shop has been doing well since its inception in the IT market. The design shop deal with design of web pages, brochures, logos, signs, books, annual reports, advertisements magazine covers among others. The shop has been successful because it has been able to raise market value for the last three years. For this reason, the Human Resource manager who is also the owner, last year hired three new designers and a receptionist thus bringing the total number of employees to 14. Initially Oracle had three designers because its market capitalization and revenue collection was little. The rest of the employees were one account officer, one IT person, two technicians and the rest were data analysts. Employees have been very hardworking. The policies under which they bid themselves in the contract ensures that each one of them achieves all the set targets or goals. However, Oracle graphic design shop has developed problems related to
  • 25.
    increased numbers ofemployees. The owner who also doubles as a Human Resource officer, has had a lot of headache i n figuring out how to regulate the higher number of employee’s internet use. Problem Having increased number of employees, the owner of Oracle graphic design shop has been receiving reports on the rising cost of maintaining the company’s computers. Currently, employees can download anything they want from the Internet and view any website they wish. The owner's IT person has alerted him to several problems. One is that the designers are downloading any and all software that they think sounds "cool" - even software in beta/ developer versions that still have a lot of kinks. For instance, through the IT officer, the owner notified during usual briefings that some employees use company computers during their free time to browse through unprotected sites. Some use the computers to watch live stream videos on the sites like Netflix, Amazon prime and Hulu. As a result, their computers lock up or malfunction and then IT has to spend hours troubleshooting the problem to get it resolved. The computer thus developing malfunctions which leads to technical problems. Considering the call of duty for the Oracles employees, there is nowhere written that employees have the liberty to irresponsibly use the Oracles computers or internet
  • 26.
    for a purposerather than what is meant for the growth of the company. As account officer, I noted the number of checks I deposit to pay the specialists technician during the process of repairing and eradicating viruses a lot and a loss to the small company. This has decreased productivity of the company as well as its quarterly revenues. According to the study conducted by Nucleus Research and published by Computerworld found that “Companies that allow users to access Facebook in the workplace lose an average of 1.5% in total employee productivity, according to a new report from Nucleus Research, an IT research company.” This is indeed clear from the account information that have summarized and also the advice from the IT expert. Secondly, there is concern over what Internet sites employees are viewing, specifically those that are inappropriate for the workplace. For instance, some employees use the company computers to visit pornographic sites one of which I noted has led to an increase in the internet premiums. Despite, that during lunch time when we don’t expect employees to be logged into the internet. The IT person informed that most of them who take lunch on their desks use lunchtime hour to browse in social media platforms such as Twitter, Facebook, Instagram and WhatsApp among other applications. Considering all this headache, it’s well if the Human resource
  • 27.
    manager ban browsingon the alleged sites as well as irresponsible use of Oracle graphic design computers. Overall, the IT person is worried about security breaches resulting from these downloads, inappropriate website visits, and other Internet activities.