Question
Required information Skip to question Go Ahead, Use Facebook Because much of today's communication involves complex Internet-linked computer systems, careless and malicious actions can wreak
Required informationSkip to question
Go Ahead, Use Facebook
Because much of today's communication involves complex Internet-linked computer systems, careless and malicious actions can wreak havoc in terms of costly downtime and lost or stolen data. Therefore, any discussion of digital communication and information technology must necessarily address the twin concerns about security and privacy. Security and privacy are clearly two underlying motives of Unilever's current and prospective technology policies. This exercise requires you to identify such issues and make recommendations to mitigate or prevent their occurrence.
Read the case below and answer the questions that follow.
Wendy Wilkes is very familiar with the technology challenges perceived by Unilever's new hires. They are astonished to learn that their mobile phones and laptops, if they get them, don't have many of the applications and features common to all of their other (personal) devices. This seriously impedes their ability to communicate with people both inside and outside the company, which is customary and expected by most people born after 1985.
Wilkes empathizes, as she is a 27-year-old manager and has experienced many of the same frustrations. Only other company employees can be contacted via e-mail. Employees cannot download iTunes or use instant messaging with people outside of the company. Not only are these things not possible, they are forbidden. Employees see such capabilities and connectivity as essential to functioning effectively both within and outside the company. These frustrations are intensified when employees learn that new applications will be made available by the company, but only after they are developed internally over the course of months or years. This contrasts dramatically with the instant and often free downloads of applications on employees' personal phones and computers.
Despite company policies, many employees are either modifying or using their own devices to do what they want. Unilever's chief technology officer, Chris Turner, realizes the futility of trying to stop them. His efforts largely focus on assuring the appropriate security for the devices that are used. He has also enlisted the help of Wendy Wilkes and others to spread the use of popular, and sometimes free, technology at work. These new efforts are motivated not only by the insistence (or resistance) of employees, but also for economic reasons. For instance, the use of webcams is being explored to enable videoconferencing and cut down on travel time and costs. The company may also allow employees to use their own devices, with appropriate security of course, which could potentially save the company millions of dollars. And while the potential economic benefits are impressive, Turner still meets resistance from some within his IT department. He, however, is undeterred due to the overwhelming economic and social forces.
From what you read in the case, many of the Generation Y employees at Unilever are defying company policies and either modifying or using their own Internet accessible devices to do what they want. Which of the following characteristics of the Internet generation is most likely the cause of this situation?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started