Sie sind auf Seite 1von 53

COMPUTERS ON THE JOB, HOW WORKERS USE COMPUTERS

HOW COMPUTER CHANGE THE WAY WE WORK PERSONAL COMPUTER IN A WORKPLACE HOW SOFTWARE AT WORK

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

All

data are nowadays stored on computers and have replaced the manual records.

Computers

HOW COMPUTER CHANGE THE WAY WE WORK

in the office world have become a necessity and an aid tool in many different aspects. Work is done at a much faster pace and it is possible to change and adapt written work simultaneously. Often, written letters can be reused by just adding or adapting a few

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

Customers are able to make financial


transactions such as withdrawals, deposits, transfers and check cashing themselves with the computer machines provided in every bank or with online banking.

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

The internet has enabled us to


correspondent via email and to track information quickly and easily. E-mail and communicate with our friends/family.

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

Money and travelling time can be


saved by holding conferences, visual lectures, forums, etc. online. (Skype, Camfrog)

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

Instead of Dictionary and Libraries


they preferred to look from Internet Search Engines such as Google, Yahoo and Bing.

HOW COMPUTER CHANGE THE WAY WE WORK

VS.

HOW COMPUTER CHANGE THE WAY WE WORK

Instead of Playing outside children


nowadays preferred to stay inside the house and play computer.

HOW COMPUTER CHANGE THE WAY WE WORK

VS.

HOW COMPUTER CHANGE THE WAY WE WORK

HOW COMPUTER CHANGE THE WAY WE WORK

Instead of presentation using Manila


paper, but now using Multimedia Presentation such as PowerPoint Presentations with videos.

HOW COMPUTER CHANGE THE WAY WE WORK

VS.

HOW COMPUTER CHANGE THE WAY WE WORK

Computers

have opened the business world tremendously; they have made it possible to be in contact with the whole world. (e-commerce)

HOW COMPUTER CHANGE THE WAY WE WORK

Go to different websites and do what


we want

Download stuff from the computer or


upload things

Store files in the memory card

SOFTWARE AT WORK

BENEFITS
Because most data is stored on computers and
almost all communication is done on an organization's computer network, the security of the data is crucial for the success of an organization.

Monitoring workplace computers can be done using a variety of software products that monitor computer networks.

This software can also be used to monitor or


track employee activity and productivity as well.

This ensures data is secure by using the software to block certain websites, alert information technology staff of potential threats, such as computer viruses, as well as monitor computer and internet usage by employees.

EFFECTS
Monitoring workplace computers can secure
data stored on computer systems, as well as ensure employees are using workplace computers for business purposes.

Some monitoring software comes highly recommended at a reasonable cost and can be customized to an organization's needs.

This requires some additional efforts by


management or information technology staff, but proves it's a valuable tool to ensure the security of business data and integrity.

Although computer workplace monitoring has become a necessity, employees often don't understand the reasons for computer monitoring and may feel violated or micromanaged.

CONSIDERATIONS
When
considering using computer monitoring software in the workplace, do extensive research on different products and services.
Although some software is costly, it may be worth the investment to protect the integrity of a business. If an organization decides to use this software--inform employees.

Allow employees to see the software and its capabilities by demonstrating its features in a group setting. software will be used and how it will add security to the business.

Be open and honest regarding how the

Talk to employees about their regarding computer monitoring.

rights

The Texas workforce commission has policies for workplace computer monitoring and employees should be aware of those policies. private setting if they wish.

Also allow employees to ask questions in a

SOFTWARE COMBINED WITH TECHNOLOGY?

AUTOMATION AND IMPROVED EFFICIENCY


Computers can do repetitive tasks faster and
with fewer mistakes than humans, so the first few decades of the development of the computer for business focused mainly on automating a wide range of industrial processes.

DATABASE TECHNOLOGY
The number-crunching ability of computers
had been appreciated since their conception, but a real understanding of their value as data storage devices did not occur until some time later as the technology matured.

Databases maintained on modern workplace computers make it possible for managers to run payroll with the push of a few buttons, and for accountants to calculate taxes or create financial reports in a fraction of the time it took pre-IT. Databases, and the sophisticated software to search them, are also invaluable tools for analysts of all types as they sift through data trying to identify

PRINTING AND PUBLICATION TECHNOLOGY

Replacing the single-function typewriter with a computer with word-processing software and a printer has transformed the way offices across the country do business, but computers have had an especially significant impact on the publication industry.

COMMUNICATION TECHNOLOGY
The development of computers led to the
internet, and more recently to mobile communication devices like smartphones and tablets. The ability to communicate with a colleague or client anywhere at any time has led to the socioeconomic phenomenon of globalization, and dramatically changed the nature of work and work flow in practically

SIGNIFICANT INCREASE IN OVERALL PRODUCTIVITY


The statistics speak for themselves. Worker
productivity in the united states had been increasing at an annual rate of 1 percent to 1.5 percent since the early 1970s, but the productivity rate started to increase dramatically in the mid-1990s, and averaged 2.9 percent from 1995 to 2000.

Many economists, including Alan Greenspan, have noted that this rise in productivity occurred just when computers were becoming common in workplaces, and credit computer-related information technology for the increase.

ADVANTAGES OF SOFTWARE TECHNOLOGY?

IMPROVES COMMUNICATION:

Many businesses are using various business communication technologies to change the way their employees interact and communicate while at work. Employees can use various communication tools to interact or exchange information at work.

ENCOURAGES INNOVATION AND CREATIVITY:

Workers can use different business technologies to create innovative business ideas which can be used in business growth and expansion.

IMPROVES ON HUMAN RESOURCE MANAGEMENT:


Technology in the workplace can change the
way human resource managers do their job. It improves on the process of screening, recruiting and hiring new employees.

SAVES TIME:

Technology can be used to automate various tasks at work, this automation will guarantee efficiency and will also increase on production at work. The use of computers to accomplish specific tasks at work creates room of making corrections on instant and it also reduces on human errors.

CREATES MOBILITY:

The use of internet and computers to work has eliminated space and time boundaries.

DISADVANTAGES OF SOFTWARE TECHNOLOGY?


Causes distraction at work; High maintenance costs; Makes employees lazy; Affects workplace relationships; and Its risky

6 tips For proper computer use in the workplace


Quality, Consciousness, Habits and Process DALISAY, Precious Jade N.

1. Be wary of connecting external storage devices to office PCs

Similar to diskettes in their day, USB flash drives and other highly portable storage devices offer a convenient way to carry large volumes of information. However, these same gadgets can be a hotbed for computer viruses and other threats. Contaminated devices can infect machines to which they are connected, and continually re-infect them, which ultimately compromises your offices data and network security.
Quality, Consciousness, Habits and Process

DALISAY, Precious Jade N.

2. Exercise care when installing software on the PC in your care


Typically, people can get quite excited by software be it new or updates to existing applications. They are eager to download (as applicable) and install them. However, do double-check the source. Is it a reputable business? Could it harbour some kind of threat to your workplaces equipment or data? Other questions you should be prepared to answer before proceeding include: Can you foresee any difficulties with the installation? Is it convenient to execute the installation? What will you do if the installation does not go as expected? Do you have a backup of all key programmes and files, should you have to format the hard drive?
Quality, Consciousness, Habits and Process

DALISAY, Precious Jade N.

3. Limit the amount of personal data that is stored on office machines

Although at the office, you and your colleagues may refer to the PC/laptop that you are using as your machine, it does not mean that the device is your personal PC to do as you please. Unless otherwise specified, the PC is and remains office property. Further, your employer has the right to access at any time, and may even remove from your care as it sees fit.

Quality, Consciousness, Habits and Process

DALISAY, Precious Jade N.

4. Avoid using business email address for personal purposes, and vice versa Following from the previous point, it is important to try to maintain some distinction between information that is the property of your employer, in this case emails, and that which is your own. This is particularly the case if your organisation has assigned you an email to use for its communication. Although occasionally it may be necessary to use your personal email address for work purposes, e.g., if you cannot access to your work account, this is not an ideal situation. Depending on your organisations privacy, Internet and/or email policy, use of your private email account could be in breach of those instruments, as well as any specific provisions on confidentiality that might be applicable.

Quality, Consciousness, Habits and Process

DALISAY, Precious Jade N.

5. Limit personal use of the Internet at the office This point has been causing considerable concern in the workplace in recent years. Employers have been observing noticeable decline in employee productivity, which has been largely attributed to excessive online activity of a personal nature, e.g. web surfing and interacting on social networks and instant messaging sites. Although some employers have sought to prohibit access to the social networking sites in particular, and where such freedoms still exists, it is advisable to exercise some discretion in when and for how long (if at all?) you use your workplaces Internet connection for your personal activity.
Quality, Consciousness, Habits and Process

DALISAY, Precious Jade N.

6. Appreciate that computer and Internet use might be subject to local laws As Internet access and use truly become ubiquitous, many countries either have, or are in the process of, introducing legislation to govern various aspects of this environment. Critical areas that are being addressed include computer misuse, cyber crime, cyber security and Intellectual Property. Although your offices internal policies might prohibit certain content being accessed, and using the offices resources to engage in criminal activity, for example, contravention of those provisions might also place you in breach of local laws. Hence again, you might find yourself not only facing disciplinary action from your employer, but also being accused of committing criminal offences, which could lead to incarceration.

Quality, Consciousness, Habits and Process

DALISAY, Precious Jade N.

Personal Computers in a Workplace


Companies SHOULD have rules regarding what can and cannot be accessed on the network. This accomplishes two goals. It enforces necessary security rules for the safely of the network assets. For example, one of the key problems with personal devices is the ability of employees to carry critical and potentially confidential information beyond the limits of the in-house security system. If any employee from HR, for example, copies personnel records on their notebook to work on from home that confidential information is vulnerable to theft or loss despite the best intentions of that employee. If he or she stops at the store on the way home and the notebook is stolen off the front seat of the car, the company now has a serious exposure to penalties, litigation or financial loss. From the employee side of the equation, the issue is more pragmatic. They want to know what kind of device to buy so that they can access the right assets at work and do their job better.
Quality, Consciousness, Habits and Process DALISAY, Precious Jade N.

Das könnte Ihnen auch gefallen