SlideShare a Scribd company logo
1 of 6
Download to read offline
MLA Annotated Bibliography (Orlov)
Marginal annotations indicate MLA-style formatting and effective writing.
Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).
This paper follows the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (2009).
5/11_A
MLA Annotated Bibliography (Orlov)
Orlov 1
Anna Orlov
Professor Willis
English 101
3 March XXXX
Online Monitoring: A Threat to Employee
Privacy in the Wired Workplace:
An Annotated Bibliography
Adams, Scott. Dilbert and the Way of the Weasel. New York: Harper,
2002. Print.
Adams’s “Dilbert” cartoons are known for satirizing
everyday workplace issues. The cartoon on page 106 illustrates
how rampant Internet use in the workplace has become
and suggests that both employers and employees are well
aware of the practice. The cartoon points out the difficulty
employers face in trying to restrict employee Internet use.
American Management Association and ePolicy Institute. “2005
Electronic Monitoring and Surveillance Survey.” American
Management Association. Amer. Management Assn., 2005.
Web. 15 Feb. 2006.
According to the survey of workplace Internet use
summarized in this article, employers are most concerned
about employees visiting inappropriate Web sites. However,
employers’ monitoring of employees extends beyond blocking
certain Web sites. Many employers who participated in the
study also track individual keystrokes and review e-mails. The
study suggests that the majority of employers who monitor
Internet use are telling their employees that they are being
Marginal annotations indicate MLA-style formatting and effective writing.
In MLA style, each
entry begins at
the left margin;
subsequent lines
indent 1⁄2''.
The annotation
begins on a
new line and is
indented 1⁄2''.
Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007).
This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers,
7th ed. (2009).
Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007).
monitored. These findings seem to contradict many of my
other sources, which claim that employers are not doing
enough to explain Internet monitoring to their employees.
“Automatically Record Everything They Do Online! Spector Pro 5.0
FAQ’s.” Netbus.org. Netbus.org, n.d. Web. 17 Feb. 2006.
Spector Pro is a type of Internet surveillance program.
This Web page, sponsored by the manufacturer of the product,
explains the functionality of the software and describes its
features. It can be installed on a variety of computers and
can be installed in “Stealth” mode so that the user cannot
detect the software on his or her computer. The program can
also monitor all computer use ranging from Word documents
to Web sites. This source supports my other sources by
illustrating the ease with which this kind of software can be
installed as well as the extensive amount of information it
can gather for employers.
Flynn, Nancy. “Internet Policies.” ePolicy Institute. ePolicy Inst.,
n.d. Web. 15 Feb. 2006.
This excerpt from Flynn’s The ePolicy Handbook offers
statistics on employee Internet use and five suggestions for
minimizing it. Flynn claims that the majority of employees in
the United States are using company time to surf the Internet
and that companies are suffering huge financial losses as a
result. Her suggestions for minimizing personal Internet use
include establishing a company Internet policy and installing
monitoring software. This is consistent with the suggestions
of many other sources.
Orlov 2
Orlov interprets
the source’s
findings in relation
to other sources in
the bibliography.
Annotations are
usually three to
seven sentences
long.
Double-spacing is
used throughout,
with no extra space
between entries
and no extra space
between entries
and their annota-
tions.
Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007).
Frauenheim, Ed. “Stop Reading This Headline and Get Back to
Work.” CNET News.com. CNET Networks, 11 July 2005. Web.
17 Feb. 2006.
The author examines the results of a study of ten
thousand employees conducted by America Online and
Salary.com, which found that the Internet was the most
popular means of wasting time at work. Frauenheim notes
that the extra time spent surfing the Internet is costing
companies an estimated $759 billion a year but also quotes
the senior vice president at Salary.com and a director at
America Online, who argue that employee Internet use
actually increases productivity and creativity in the
workplace. Frauenheim suggests that the increase in personal
Internet use at work might result from a longer average
workday and that use of the Internet has made employees
more efficient, giving them more free time to waste.
Gonsalves, Chris. “Wasting Away on the Web.” eWeek.com. Ziff
Davis Enterprise Holdings, 8 Aug. 2005. Web. 16 Feb. 2006.
In this editorial, Gonsalves considers the implications of
several surveys, including one in which 61% of respondents
said that their companies had the right to spy on them. The
author agrees with this majority, claiming that it’s fine if his
company chooses to monitor him as long as the company
discloses its monitoring practices. He adds that he would
prefer not to know the extent of the monitoring. This article,
though not entirely objective, offers an employee’s
perspective on Internet surveillance in the workplace. It also
Orlov 3
Summary is
followed by a
balanced evaluation
of the source.
Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007).
contradicts some of my other sources, which claim that
employees want to know and should know all the details of
their company’s monitoring procedures.
Kesan, Jay P. “Cyber-Working or Cyber-Shirking? A First Principles
Examination of Electronic Privacy in the Workplace.” Florida
Law Review 54.2 (2002): 289-332. Print.
This extensive, balanced article examines the legal
issues involved in Internet monitoring and employee privacy.
Kesan establishes that US written law and common law do not
guarantee a right to electronic privacy in the workplace. He
suggests that Internet policies should be addressed through
a “market-based” contractual approach that would benefit
both employers and employees. Kesan examines employee
concerns, such as a working parent’s desire to check on his or
her children while at work, and employer concerns, such as
legal liability for inappropriate employee Internet use. He
concludes that a company should develop an Internet policy,
make that policy known to all employees, and then monitor
employees to ensure that the policy is being followed.
Lane, Frederick S., III. The Naked Employee: How Technology
Is Compromising Workplace Privacy. New York: Amer.
Management Assn., 2003. Print.
Lane’s book discusses the lack of employee privacy
in the modern workplace. The author acknowledges that
employers have several reasons to be concerned about employee
Internet use, such as theft, a decrease in productivity, and
workplace lawsuits. At the same time, however, he questions
Orlov 4
Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007).
where employers will draw the line as technology becomes
better and better at tracking an employee’s every move.
This book is accessible and draws from a variety of sources;
it confirms the information provided by my other sources.
Tam, Pui-Wing, et al. “Snooping E-Mail by Software Is Now a
Workplace Norm.” Wall Street Journal 9 Mar. 2005: B1+. Print.
The authors point out that in every state except
Connecticut and Delaware, companies can legally monitor
employee e-mail without notifying employees and can also use
e-mails as evidence in lawsuits against employees. According
to the article, only 27% of companies monitor employee-to-
employee e-mails, although these e-mails are potentially the
most incriminating, since employees are less likely to censor
themselves with other employees. The article also explores
the means by which companies now monitor employee e-mail,
such as software that searches not only for inappropriate
words but also for words specific to the industry and even
the company. Although the article is narrowly focused, it
offers a good overview of current practices regarding e-mail
monitoring in the workplace.
Tynan, Daniel. “Your Boss Is Watching.” PC World. PC World
Communications, 6 Oct. 2004. Web. 17 Sept. 2006.
This conversational article presents ten myths about
employee Internet and computer monitoring and reveals how
wrong they are. Although several of the “myths” are discussed
more extensively in my other sources, Tynan presents some
new information. For example, he states that some employers
Orlov 5
Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007).
monitor employee Webmail accounts in addition to company
e-mail accounts. Perhaps most important, the article gives a
sense of how unaware most employees are about the current
capabilities of employee Internet monitoring and about their
own lack of legal protection from employers who monitor
them.
Verespej, Michael A. “Inappropriate Internet Surfing.” Industry
Week. Penton Media, 7 Feb. 2000. Web. 16 Feb. 2006.
Unlike most of my other sources, this article is aimed
at employers and suggests that they need to do more to
establish Internet policies and monitor employees. Verespej
warns that if employers do not establish Internet policies,
they leave themselves vulnerable to expensive and
damaging lawsuits, such as suits based on inappropriate or
discriminatory e-mails distributed in the workplace. He offers
several examples to back up his claim that employers are
more at risk than employees from lawsuits. This seems to
contradict the information in my other sources, which present
the risks mostly in terms of employees’ privacy.
Orlov 6

More Related Content

What's hot

What's hot (6)

Craciunul
CraciunulCraciunul
Craciunul
 
Sample MLA Annotated Bibliography
Sample MLA Annotated Bibliography Sample MLA Annotated Bibliography
Sample MLA Annotated Bibliography
 
Reuben communication-studies-ia
Reuben communication-studies-iaReuben communication-studies-ia
Reuben communication-studies-ia
 
The introduction-paragraph
The introduction-paragraphThe introduction-paragraph
The introduction-paragraph
 
Unit 1 cape sociology
Unit 1 cape sociologyUnit 1 cape sociology
Unit 1 cape sociology
 
Com stud
Com studCom stud
Com stud
 

Similar to Hacker-Orlov MLA Annotated Bibliography

MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxraju957290
 
Basic mla 10 things to check for before you submit your essay1.
Basic mla 10 things to check for before you submit your essay1.Basic mla 10 things to check for before you submit your essay1.
Basic mla 10 things to check for before you submit your essay1.sodhi3
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillanceitsika
 
India build problem
India build problemIndia build problem
India build problemICE CUBE
 
The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...ijcsit
 
Plagiarism Preventive Initiatives and AI Tools......docx
Plagiarism Preventive Initiatives and AI Tools......docxPlagiarism Preventive Initiatives and AI Tools......docx
Plagiarism Preventive Initiatives and AI Tools......docxNorthern University,Bangladesh.
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxdavezstarr61655
 
RUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY .docx
RUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY            .docxRUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY            .docx
RUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY .docxrtodd599
 
Title of PaperYour NameMonth Day, YearRunning head BASIC PA.docx
Title of PaperYour NameMonth Day, YearRunning head BASIC PA.docxTitle of PaperYour NameMonth Day, YearRunning head BASIC PA.docx
Title of PaperYour NameMonth Day, YearRunning head BASIC PA.docxherthalearmont
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beachelgolfo
 
011 Personal Narrative Essay Example High School Examples
011 Personal Narrative Essay Example High School Examples011 Personal Narrative Essay Example High School Examples
011 Personal Narrative Essay Example High School ExamplesAngelica Ortiz
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the WorkplaceAllisha Anderson
 
Research steps, handout
Research steps, handoutResearch steps, handout
Research steps, handoutmrmahoney
 
Information Retrieval-1
Information Retrieval-1Information Retrieval-1
Information Retrieval-1Jeet Das
 
Assignment 3 Presenting With PowerPointJane R. Doe .docx
Assignment 3 Presenting With PowerPointJane R. Doe           .docxAssignment 3 Presenting With PowerPointJane R. Doe           .docx
Assignment 3 Presenting With PowerPointJane R. Doe .docxrock73
 

Similar to Hacker-Orlov MLA Annotated Bibliography (20)

MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
 
Hacker orlov-mla
Hacker orlov-mlaHacker orlov-mla
Hacker orlov-mla
 
Basic mla 10 things to check for before you submit your essay1.
Basic mla 10 things to check for before you submit your essay1.Basic mla 10 things to check for before you submit your essay1.
Basic mla 10 things to check for before you submit your essay1.
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillance
 
India build problem
India build problemIndia build problem
India build problem
 
The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...
 
Plagiarism Preventive Initiatives and AI Tools......docx
Plagiarism Preventive Initiatives and AI Tools......docxPlagiarism Preventive Initiatives and AI Tools......docx
Plagiarism Preventive Initiatives and AI Tools......docx
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
 
RUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY .docx
RUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY            .docxRUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY            .docx
RUNNING HEADER CASE STUDYRUNNING HEADER CASE STUDY .docx
 
June Documentation
June DocumentationJune Documentation
June Documentation
 
Title of PaperYour NameMonth Day, YearRunning head BASIC PA.docx
Title of PaperYour NameMonth Day, YearRunning head BASIC PA.docxTitle of PaperYour NameMonth Day, YearRunning head BASIC PA.docx
Title of PaperYour NameMonth Day, YearRunning head BASIC PA.docx
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beach
 
011 Personal Narrative Essay Example High School Examples
011 Personal Narrative Essay Example High School Examples011 Personal Narrative Essay Example High School Examples
011 Personal Narrative Essay Example High School Examples
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
HRCU 630 EmployeeSurveillance paper, Feldman
HRCU 630 EmployeeSurveillance paper, FeldmanHRCU 630 EmployeeSurveillance paper, Feldman
HRCU 630 EmployeeSurveillance paper, Feldman
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the Workplace
 
Research steps, handout
Research steps, handoutResearch steps, handout
Research steps, handout
 
Proposal.docx
Proposal.docxProposal.docx
Proposal.docx
 
Information Retrieval-1
Information Retrieval-1Information Retrieval-1
Information Retrieval-1
 
Assignment 3 Presenting With PowerPointJane R. Doe .docx
Assignment 3 Presenting With PowerPointJane R. Doe           .docxAssignment 3 Presenting With PowerPointJane R. Doe           .docx
Assignment 3 Presenting With PowerPointJane R. Doe .docx
 

More from Jonathan Underwood

Full Text of the Mueller Report's Executive Summaries Volume II
Full Text of the Mueller Report's Executive Summaries Volume II Full Text of the Mueller Report's Executive Summaries Volume II
Full Text of the Mueller Report's Executive Summaries Volume II Jonathan Underwood
 
Litigation Documents Related to the Mueller Investigation
Litigation Documents Related to the Mueller InvestigationLitigation Documents Related to the Mueller Investigation
Litigation Documents Related to the Mueller InvestigationJonathan Underwood
 
The Biggest Indictments, Guilty Pleas and Dramas in the Russia Investigation
The Biggest Indictments, Guilty Pleas and Dramas in the Russia InvestigationThe Biggest Indictments, Guilty Pleas and Dramas in the Russia Investigation
The Biggest Indictments, Guilty Pleas and Dramas in the Russia InvestigationJonathan Underwood
 
Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...
Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...
Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...Jonathan Underwood
 
Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018
Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018
Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018Jonathan Underwood
 
Psych 440 Information Literacy Class
Psych 440  Information Literacy ClassPsych 440  Information Literacy Class
Psych 440 Information Literacy ClassJonathan Underwood
 
APSA Style Guide for Citations and References Source: https://www.apsanet.org/
APSA Style Guide for Citations and References  Source: https://www.apsanet.org/APSA Style Guide for Citations and References  Source: https://www.apsanet.org/
APSA Style Guide for Citations and References Source: https://www.apsanet.org/Jonathan Underwood
 
Popular versus Scholarly from Rutgers University
Popular versus Scholarly from Rutgers UniversityPopular versus Scholarly from Rutgers University
Popular versus Scholarly from Rutgers UniversityJonathan Underwood
 
Academic versus Popular Sources
Academic versus Popular SourcesAcademic versus Popular Sources
Academic versus Popular SourcesJonathan Underwood
 
Social Work Practice with Deaf Clients by Laura L. Myers and Bruce A. Thyer
Social Work Practice with Deaf Clients by Laura L. Myers and Bruce A. ThyerSocial Work Practice with Deaf Clients by Laura L. Myers and Bruce A. Thyer
Social Work Practice with Deaf Clients by Laura L. Myers and Bruce A. ThyerJonathan Underwood
 
Developing student knowledge and skills for home-based social work practice b...
Developing student knowledge and skills for home-based social work practice b...Developing student knowledge and skills for home-based social work practice b...
Developing student knowledge and skills for home-based social work practice b...Jonathan Underwood
 
8 Teaching social work practice through intervention field work by Dr. Gangad...
8 Teaching social work practice through intervention field work by Dr. Gangad...8 Teaching social work practice through intervention field work by Dr. Gangad...
8 Teaching social work practice through intervention field work by Dr. Gangad...Jonathan Underwood
 
Social Work Early Intervention for Young Children with Developmental Disabili...
Social Work Early Intervention for Young Children with Developmental Disabili...Social Work Early Intervention for Young Children with Developmental Disabili...
Social Work Early Intervention for Young Children with Developmental Disabili...Jonathan Underwood
 
Universal Declaration of Human Rights by The United Nations
Universal Declaration of Human Rights by The United NationsUniversal Declaration of Human Rights by The United Nations
Universal Declaration of Human Rights by The United NationsJonathan Underwood
 
Writer's Checklist for MLA 8 Format - By Germanna Community College
Writer's Checklist for MLA 8 Format - By Germanna Community CollegeWriter's Checklist for MLA 8 Format - By Germanna Community College
Writer's Checklist for MLA 8 Format - By Germanna Community CollegeJonathan Underwood
 
MLA 8 - Sample Paper by Liberty University
MLA 8 - Sample Paper by Liberty UniversityMLA 8 - Sample Paper by Liberty University
MLA 8 - Sample Paper by Liberty UniversityJonathan Underwood
 
Macro Practice Theories by APU Social Work
Macro Practice Theories by APU Social WorkMacro Practice Theories by APU Social Work
Macro Practice Theories by APU Social WorkJonathan Underwood
 

More from Jonathan Underwood (20)

House Report 116-33
House Report 116-33House Report 116-33
House Report 116-33
 
Full Text of the Mueller Report's Executive Summaries Volume II
Full Text of the Mueller Report's Executive Summaries Volume II Full Text of the Mueller Report's Executive Summaries Volume II
Full Text of the Mueller Report's Executive Summaries Volume II
 
Litigation Documents Related to the Mueller Investigation
Litigation Documents Related to the Mueller InvestigationLitigation Documents Related to the Mueller Investigation
Litigation Documents Related to the Mueller Investigation
 
The Biggest Indictments, Guilty Pleas and Dramas in the Russia Investigation
The Biggest Indictments, Guilty Pleas and Dramas in the Russia InvestigationThe Biggest Indictments, Guilty Pleas and Dramas in the Russia Investigation
The Biggest Indictments, Guilty Pleas and Dramas in the Russia Investigation
 
Dr. Ross PSYCH440 - Seminar
Dr. Ross PSYCH440 - SeminarDr. Ross PSYCH440 - Seminar
Dr. Ross PSYCH440 - Seminar
 
Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...
Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...
Chicago Manual of Style 17th Edition Notes and Bibliography Sample Paper - Pr...
 
Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018
Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018
Dr. Gebhard English 102 Information Literacy Presentation - Fall 2018
 
Psych 440 Information Literacy Class
Psych 440  Information Literacy ClassPsych 440  Information Literacy Class
Psych 440 Information Literacy Class
 
APSA Style Guide for Citations and References Source: https://www.apsanet.org/
APSA Style Guide for Citations and References  Source: https://www.apsanet.org/APSA Style Guide for Citations and References  Source: https://www.apsanet.org/
APSA Style Guide for Citations and References Source: https://www.apsanet.org/
 
APSA Style Guide
APSA Style GuideAPSA Style Guide
APSA Style Guide
 
Popular versus Scholarly from Rutgers University
Popular versus Scholarly from Rutgers UniversityPopular versus Scholarly from Rutgers University
Popular versus Scholarly from Rutgers University
 
Academic versus Popular Sources
Academic versus Popular SourcesAcademic versus Popular Sources
Academic versus Popular Sources
 
Social Work Practice with Deaf Clients by Laura L. Myers and Bruce A. Thyer
Social Work Practice with Deaf Clients by Laura L. Myers and Bruce A. ThyerSocial Work Practice with Deaf Clients by Laura L. Myers and Bruce A. Thyer
Social Work Practice with Deaf Clients by Laura L. Myers and Bruce A. Thyer
 
Developing student knowledge and skills for home-based social work practice b...
Developing student knowledge and skills for home-based social work practice b...Developing student knowledge and skills for home-based social work practice b...
Developing student knowledge and skills for home-based social work practice b...
 
8 Teaching social work practice through intervention field work by Dr. Gangad...
8 Teaching social work practice through intervention field work by Dr. Gangad...8 Teaching social work practice through intervention field work by Dr. Gangad...
8 Teaching social work practice through intervention field work by Dr. Gangad...
 
Social Work Early Intervention for Young Children with Developmental Disabili...
Social Work Early Intervention for Young Children with Developmental Disabili...Social Work Early Intervention for Young Children with Developmental Disabili...
Social Work Early Intervention for Young Children with Developmental Disabili...
 
Universal Declaration of Human Rights by The United Nations
Universal Declaration of Human Rights by The United NationsUniversal Declaration of Human Rights by The United Nations
Universal Declaration of Human Rights by The United Nations
 
Writer's Checklist for MLA 8 Format - By Germanna Community College
Writer's Checklist for MLA 8 Format - By Germanna Community CollegeWriter's Checklist for MLA 8 Format - By Germanna Community College
Writer's Checklist for MLA 8 Format - By Germanna Community College
 
MLA 8 - Sample Paper by Liberty University
MLA 8 - Sample Paper by Liberty UniversityMLA 8 - Sample Paper by Liberty University
MLA 8 - Sample Paper by Liberty University
 
Macro Practice Theories by APU Social Work
Macro Practice Theories by APU Social WorkMacro Practice Theories by APU Social Work
Macro Practice Theories by APU Social Work
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Hacker-Orlov MLA Annotated Bibliography

  • 1. MLA Annotated Bibliography (Orlov) Marginal annotations indicate MLA-style formatting and effective writing. Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007). This paper follows the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (2009). 5/11_A MLA Annotated Bibliography (Orlov) Orlov 1 Anna Orlov Professor Willis English 101 3 March XXXX Online Monitoring: A Threat to Employee Privacy in the Wired Workplace: An Annotated Bibliography Adams, Scott. Dilbert and the Way of the Weasel. New York: Harper, 2002. Print. Adams’s “Dilbert” cartoons are known for satirizing everyday workplace issues. The cartoon on page 106 illustrates how rampant Internet use in the workplace has become and suggests that both employers and employees are well aware of the practice. The cartoon points out the difficulty employers face in trying to restrict employee Internet use. American Management Association and ePolicy Institute. “2005 Electronic Monitoring and Surveillance Survey.” American Management Association. Amer. Management Assn., 2005. Web. 15 Feb. 2006. According to the survey of workplace Internet use summarized in this article, employers are most concerned about employees visiting inappropriate Web sites. However, employers’ monitoring of employees extends beyond blocking certain Web sites. Many employers who participated in the study also track individual keystrokes and review e-mails. The study suggests that the majority of employers who monitor Internet use are telling their employees that they are being Marginal annotations indicate MLA-style formatting and effective writing. In MLA style, each entry begins at the left margin; subsequent lines indent 1⁄2''. The annotation begins on a new line and is indented 1⁄2''. Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007). This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (2009).
  • 2. Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007). monitored. These findings seem to contradict many of my other sources, which claim that employers are not doing enough to explain Internet monitoring to their employees. “Automatically Record Everything They Do Online! Spector Pro 5.0 FAQ’s.” Netbus.org. Netbus.org, n.d. Web. 17 Feb. 2006. Spector Pro is a type of Internet surveillance program. This Web page, sponsored by the manufacturer of the product, explains the functionality of the software and describes its features. It can be installed on a variety of computers and can be installed in “Stealth” mode so that the user cannot detect the software on his or her computer. The program can also monitor all computer use ranging from Word documents to Web sites. This source supports my other sources by illustrating the ease with which this kind of software can be installed as well as the extensive amount of information it can gather for employers. Flynn, Nancy. “Internet Policies.” ePolicy Institute. ePolicy Inst., n.d. Web. 15 Feb. 2006. This excerpt from Flynn’s The ePolicy Handbook offers statistics on employee Internet use and five suggestions for minimizing it. Flynn claims that the majority of employees in the United States are using company time to surf the Internet and that companies are suffering huge financial losses as a result. Her suggestions for minimizing personal Internet use include establishing a company Internet policy and installing monitoring software. This is consistent with the suggestions of many other sources. Orlov 2 Orlov interprets the source’s findings in relation to other sources in the bibliography. Annotations are usually three to seven sentences long. Double-spacing is used throughout, with no extra space between entries and no extra space between entries and their annota- tions.
  • 3. Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007). Frauenheim, Ed. “Stop Reading This Headline and Get Back to Work.” CNET News.com. CNET Networks, 11 July 2005. Web. 17 Feb. 2006. The author examines the results of a study of ten thousand employees conducted by America Online and Salary.com, which found that the Internet was the most popular means of wasting time at work. Frauenheim notes that the extra time spent surfing the Internet is costing companies an estimated $759 billion a year but also quotes the senior vice president at Salary.com and a director at America Online, who argue that employee Internet use actually increases productivity and creativity in the workplace. Frauenheim suggests that the increase in personal Internet use at work might result from a longer average workday and that use of the Internet has made employees more efficient, giving them more free time to waste. Gonsalves, Chris. “Wasting Away on the Web.” eWeek.com. Ziff Davis Enterprise Holdings, 8 Aug. 2005. Web. 16 Feb. 2006. In this editorial, Gonsalves considers the implications of several surveys, including one in which 61% of respondents said that their companies had the right to spy on them. The author agrees with this majority, claiming that it’s fine if his company chooses to monitor him as long as the company discloses its monitoring practices. He adds that he would prefer not to know the extent of the monitoring. This article, though not entirely objective, offers an employee’s perspective on Internet surveillance in the workplace. It also Orlov 3 Summary is followed by a balanced evaluation of the source.
  • 4. Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007). contradicts some of my other sources, which claim that employees want to know and should know all the details of their company’s monitoring procedures. Kesan, Jay P. “Cyber-Working or Cyber-Shirking? A First Principles Examination of Electronic Privacy in the Workplace.” Florida Law Review 54.2 (2002): 289-332. Print. This extensive, balanced article examines the legal issues involved in Internet monitoring and employee privacy. Kesan establishes that US written law and common law do not guarantee a right to electronic privacy in the workplace. He suggests that Internet policies should be addressed through a “market-based” contractual approach that would benefit both employers and employees. Kesan examines employee concerns, such as a working parent’s desire to check on his or her children while at work, and employer concerns, such as legal liability for inappropriate employee Internet use. He concludes that a company should develop an Internet policy, make that policy known to all employees, and then monitor employees to ensure that the policy is being followed. Lane, Frederick S., III. The Naked Employee: How Technology Is Compromising Workplace Privacy. New York: Amer. Management Assn., 2003. Print. Lane’s book discusses the lack of employee privacy in the modern workplace. The author acknowledges that employers have several reasons to be concerned about employee Internet use, such as theft, a decrease in productivity, and workplace lawsuits. At the same time, however, he questions Orlov 4
  • 5. Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007). where employers will draw the line as technology becomes better and better at tracking an employee’s every move. This book is accessible and draws from a variety of sources; it confirms the information provided by my other sources. Tam, Pui-Wing, et al. “Snooping E-Mail by Software Is Now a Workplace Norm.” Wall Street Journal 9 Mar. 2005: B1+. Print. The authors point out that in every state except Connecticut and Delaware, companies can legally monitor employee e-mail without notifying employees and can also use e-mails as evidence in lawsuits against employees. According to the article, only 27% of companies monitor employee-to- employee e-mails, although these e-mails are potentially the most incriminating, since employees are less likely to censor themselves with other employees. The article also explores the means by which companies now monitor employee e-mail, such as software that searches not only for inappropriate words but also for words specific to the industry and even the company. Although the article is narrowly focused, it offers a good overview of current practices regarding e-mail monitoring in the workplace. Tynan, Daniel. “Your Boss Is Watching.” PC World. PC World Communications, 6 Oct. 2004. Web. 17 Sept. 2006. This conversational article presents ten myths about employee Internet and computer monitoring and reveals how wrong they are. Although several of the “myths” are discussed more extensively in my other sources, Tynan presents some new information. For example, he states that some employers Orlov 5
  • 6. Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007).Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007). monitor employee Webmail accounts in addition to company e-mail accounts. Perhaps most important, the article gives a sense of how unaware most employees are about the current capabilities of employee Internet monitoring and about their own lack of legal protection from employers who monitor them. Verespej, Michael A. “Inappropriate Internet Surfing.” Industry Week. Penton Media, 7 Feb. 2000. Web. 16 Feb. 2006. Unlike most of my other sources, this article is aimed at employers and suggests that they need to do more to establish Internet policies and monitor employees. Verespej warns that if employers do not establish Internet policies, they leave themselves vulnerable to expensive and damaging lawsuits, such as suits based on inappropriate or discriminatory e-mails distributed in the workplace. He offers several examples to back up his claim that employers are more at risk than employees from lawsuits. This seems to contradict the information in my other sources, which present the risks mostly in terms of employees’ privacy. Orlov 6