Saturday, May 18, 2019

Electronic Auditing Procedures to Monitor the Computer Use of Employees Essay

Imagining weight on a scale, when iodin goes up, the some other one goes d avow. The natural order of life is the balance signaling there is always a price to pay for an proceedion. In line with the explosion of the information and applied science knowledge, the quality of life has been literally perceived as jumping onto a higher level of realm. But on the other font of the scale is the humanity, the price to pay for much(prenominal) an advance achievement. Consequently there is the pick out to look into the theme on whether the technology should advance the humanity or it should be the otherwise. in that respectfore, this report impart focal point on the ca drops and the effects of the problems arisen, thus outlined few suggestions to overcome the erupt before the spark triggered the fire. This report has been knowing structurally from identifying the problem, the effect and subsequently discuss on the measurements to balance the order. There atomic number 18 lots of companies put one across run the electronic auditing procedures to manage the computer function of the employees. They perceived this matter seriously because the future achievement is their priority.But is the carrying into action of the employee observe system is necessary is still under a heat ponder because it deals with their silence and individual right. We should make a clear statement that comp all(prenominal) computing systems are provided as tools for business and all information created, irritateed, or stored apply these systems are the station of the play along and are reconcile to monitor, auditing, or review. Even though the management has the authority to do so as the management is their root system of income, scarcely it is appropriate for the management to also look into their welfare as equal priority.Therefore, this report go away focus on some(prenominal) side of the scale and d salutary into both the upbeats and the harms on implementing such a major monitoring system. Below (Diagram 1. 0) is the finding of a research conducted by The Ameri outhouse Management stand as published in the Business Week, December 2012 edition. Before we dealt with the issue, it is best for us to understand on how does the system works. Then alto dealher we will proceed on the why should we or should non we implement such system.First off, the system enable the administrator to overlook or monitor the employees screen using his/her own computer, to be exact, we can know what the employees are viewing or doing with their computer. This gives the advantage for the administrator to keep open a screen shot of the employees computer to be kept as evidence in the clipping to come. Next, the administrator can also access in to the employees computer at any time, any will, as if we are using the employees mouse and keyboard. With that, the administrator can turn off or annihilate the non-work think program accessed by the employees.On the oth er hand, the administrator can as well sacrifice access into all of the documents, folders and the program installed or downloaded into the computer, even without the employees consent. Diagram 2. 0 can best total the whole idea of the employees monitoring system. A drop of water can spoil the whole trade of milk. Sometimes precautions are essential to make sure things are in order. In nowadays life, the area is besides at the fingertips. Most of the information is accessible anywhere anytime with the internet network so well established.It is no doubt the digital domain evolves and still evolving in a drastic manner that brings the solid ground into the corkinger level of live. But ironi phone constitutey, the money value for the technology drops steadily compare to the drastic exploitation of the cyber world. We are getting a first class infrastructure development with an increasing transferring speed into the cyber world yet the subscription fee does not increase as muc h in parallel. The end result is the technology is now affordable even to the lowest hierarchy of the society.This easy-accessed phenomenon created another easy-influenced phenomenon where the cyber space has been widely used in reverse quality achievement so known as the cyber abuse. Cyber abuse has also become an infected viral hit other than the gangnam style and the Harlem shake. The first and foremost situation to draw a turn down on the face is the frequent visit to indecent websites, or pornography to be frank. Psychologically, such an act can retard the brain development yet catalyst sexual sensation. Though it is sensual to the eyeball and the lust, but it will draw the vision into the dust.This situation also encourages sexual harassment among the colleague which will later on put a flame onto the smart sets fame. Not to be pessimist, but this is what really happen in the world of reality. Though it goes mutual but a lot of families are in serious crisis because the au thority put the hand on the elbow and let the spark ruin the oil. The affairs among the colleague will definitely fuel up the existing official internal affairs, not to mention in depth in the report. Next is the overused of the social hub.When a g-force miles of distance only separated by an inch of screen, the companys achievement will be a thousand light years behind the mission. Such scenario shifted the working focus to series of pointless(prenominal) communication resulting in miscommunication and lack of communication situation among the subordinates thus creating a plosive conversation here and there with capacious blows, reaching no common goals, drowning further away against the stream. Good communications skills will no hourlong go verbally but upon a long sour facial expression, or even in written form.Verbal communication has always been the best medium in delivering day to day conversation, communion thoughts and ideologies, thus nurturing a effectual social tar iff among the society. With verbal communication at s take away, the social responsibility has also being driven onto the cliff, just a step towards rolling down the hill. We can no longer practice good discussions skills, daily conversations are no longer moderate. There is a call to climb back the cliff to rectify the problems. It is belief the carrying out of the employee monitoring system can elicit the information transferring system thus improving the communication system.With the widespread of such working environment, next comes the apply of the communication and information technology. Blackmail and poison pen letter extradite since become threats. Dissatisfaction now leads to like a shot complaint to the superior without direct confrontation or discussion even a compliment can turn into a complaint with such scenario growing firm affectively in the habit formation. Lot of reports has been lodged without everlasting(a) investigation, even worse when it is a blind accu sation where the innocents have to take on the blame.A fate of ants can also be a disaster the growing numbers of complaints also bring topsy-turvyness to the management. Worse still, most of the complaints have to be left unattended without resolution. This will also tainted our write up and credibility as the top management because of our failure in resolving all the complaints. Another less invade issue is the online games addiction. Though such matter seems to leave no major effect but it still leaves a black dot on the blank slate. Employees with such addiction set excursus practically all other activities in favor of playing computer games almost endlessly.Gamers who engage with highly excessive daily gaming routines can find it difficult to make room for much else in the office. Some addicts allow jobs and careers to collapse in order to spend more time playing their ducky games. Furthermore, online games are not merely games, to a larger extend, they deal with gambling . With financial issue at stake, the focus is now on winning the jack pot like an ant in the hot pot. The companys economy status is no longer the major concern as long as it does not effecting the payrolls.All of the above mentioned situations subsequently lead to the climate changes of the working environment. Workers are building and support in the virtual world of their own, reflecting the world of reality at the other side of the mirror, turning everything top down. Another minor issue not to be missed out is the waste of time and energy. In the name of time, verily, man is in blemish. The companys performance is greatly affected when most of the travail are not submitted in due time. Even when it is, the quality and the outcome do not get the end meet.Worse still when we have to bare all of the cost of the energy wasted for each and every workers entertainment. Based on the research conducted by The American Management Association, every company loses depart an amount of budget due to non-work related browsing. Somehow, it is understandable that the entire act can created a tune free working environment where they can channel the tense into the cyber space. Looking at the positive side, the use of the cyber space is actually one of the most powerful and effective information transferring and sharing method.The continuous development of the cyber technology has proved that the digital networking chain is indeed the key towards ultimate success if being use in proper management. Another major issue to look into is the employ of the confidential information of the company. Again, ground on the finding, most of the employees confessed of leaking the confidential information to third parties, non-related to the company, or even to the archrivals of the company. It implies the information security breakout where the employees can easily access and leak the information to the outsider.Nonetheless, this has also caused quite a few billions loss to the c ompany income. Such scenario reflected on the management failure in preserving it confidentiality and information security system. Here comes the call to put all of the employees communication system inclusive of e-mail to be put under strict oversight. However, it should be noted that enraged employees can cause an organization legal problems and liability in other methods such as by writing a letter, having a conversation, direct a fax or making a phone call just as easily as by sending an e-mail or misusing the Internet.So much so, we must recognize that some activities have a control investment return. For example, with the exception of support center telephone operators, few telephone conversations are monitored because some unconcerned or personal usage is expected and tolerated. Though the implementation of the electronic auditing procedure can benefit the company in almost every aspect but the invasion of the individual right and the employees privacy are the aspects not to be neglected. Ensuring proper use of organizational technology begins with outlining what is proper and what is not.Looking from the move of an outsider, the welfare of the workers is not taken care of and it can cause a serious morale problem. Still, monitoring can be controversial because employees often view it as invasive, distracting, and stressful However, precaution steps need to be outlined to curb the problems mentioned. It can be considered as a system upgrading process to meliorate the companys achievement. Our view is that we are showing a great concern towards the workers progression from time to time. Theres no doubt that the employee monitoring has become more common nowadays.However, overly peeping practices can create the negative perception that the boss is watching. The solution, therefore, is to balance your need for protection with your employees desire for as much privacy as possible. So the idea is to implement the system with a little adjustment where the management can still monitor the employees computer yet the employees are still comfortable with such implementation. As the years roll by, workers can develop self awareness thus nurturing a great self discipline in carrying out the tasks assigned.In the case of e-mail, we should only use the companys local area network emails outlook system to oversee the whole information transferring system. In a way, there is no other email service provider to be use in the office. The implementation of the system can be carried out in a specified timeframe so the employees still have the key to hold onto their privacy life. Yet the management should also take into consideration to block the access into original website and IE download as a mean to overcome the individual morale issue while in the office.Workplaces subjected to high security surveillance basically are culturally troubled where institutionalize is missing. Data collected during monitoring is subject to misuse in ways that could result the organization to liability. Our concern is that without proper handling and adequate corporate governance, employers may abuse the monitoring system. Human resource segment should take the initiative to development a better programmer team under the management surveillance to take care of the system or it might become an individual right violation if the teams themselves misused the authority to oversee the system.It is utmost important now to develop a highly skilled, knowledgeable and professionally high etiquette team to encourage employee loyalty and lead to more satisfied employees. Managers and technology professionals must take steps to ensure the negative impact is minimized. With consideration from every point of view, it is utmost important to cotton up there is a need for a change of wind. Given the risk of legal liability, productivity loss, and beetle off on bandwidth, it is clear why we must implement a blended and acceptable use policies and monitor resource usage.To qualify, the consent can be expressed in the written form with the business related reasons stated clearly on why it is being implemented. A great start is a good jump towards success, the best starting point for any organization should be the consultation with their legal advocator and other relevant parties to determine what type and scope of policy would be best suited for the organization. There should also be a defensive wall from accessing into improper website. Other than that, employees should also know that the monitoring system will only being carried out during the working hours.They still have their right into their own privacy life during the lunch hour and after the office hour. Therefore they can still plead the stress free environment at the office. Again, the implementation of such system must be in spite of appearance the employees consent so they are aware of the situation that they are being watch at certain timeframe. The company policy sho uld also embrace that the computer system and communications services are the property of the employer as well as include the penalties for policy violations, up to service termination.To show our concern towards both the companys prospect and the employees privacy right, the approach to create the balance is neither the management is doing nought nor monitor everything, but overseeing something yet the employees can still do their things at their own pace and comfort. With the implementation of this blended and modified monitoring system, let us put forth the hope of bringing the company into a greater level in the economy world.

No comments:

Post a Comment