the impact of internet technologies utilization on companies internal work environments: the social...

13

Upload: opole

Post on 15-Nov-2023

0 views

Category:

Documents


0 download

TRANSCRIPT

The Impact of internet technology utilizations on companies in-

ternal work environments: The Social and Ethical Implications

By Janusz WIELKI

Abstract

This paper is an attempt to analyze challenges, threats and potential problems which result from the utilization in contemporary organizations of Internet technologies and tools. Five

basic areas of usage have been analyzed: access to Web resources, electronic mail, instant messaging programs, P2P applications and blogs. The most important types of risk connected

with their usage has been discussed, taking into consideration the social and ethical implica-tions of their usage. Finally conclusions and suggestions are offered.

l. Introduction

Currently it would seem that there is no need to convince anyone of the impact of the devel-opment of the Internet and internet technologies on the functioning of contemporary organiza-

tions, which has been taking place for over a decade. Its influence on almost all aspects of function of contemporary organizations has been something extremely visible and obvious

(see [Porter, 2001]) for many years now and in the case of some industries this impact has even significantly deepened recently (in that regard undoubtedly a very good example is the

music sector – see [Wielki, 2003], [Wielki, 2003a]). On the one hand this impact concerns single organizations and their methods of functioning and competing, while on the other hand

it affects consumers, their attitudes and behavior. Both these issues are mutually interrelated.

Already by the mid 1990s organizations were functioning in a more or less stable business environment, concentrating their efforts on conducting business activities in their own sectors

and facing typical challenges such as: cost reduction and the introduction of new products in the marketplace. It was clearly necessary to contend with changes taking place in the business

environment but they were predictable to a large extent [The Economist, 2000].

The second part of the 1990s saw the end of such relative stability, the main reason being due to the arrival of the Internet into the contemporary economy and the beginning of its utiliza-tion in business. An important element of this process was the emergence, within the space of

a year, of two Web browsers with intuitive user interfaces, allowing both companies (i.e. their employees) and their customers easy access to and use of the multimedial resources of the

Internet. At the same time, built-in Web browsers client e-mail programs gave users the pos-sibility of trouble-free utilization of electronic mail. Additionally, at the end of the 1990s two

other tools, based on the utilization of Internet technologies spread: instant messaging and P2P programs. Recently the importance of blogs (Weblogs) has also grown. Along with Web

browsers and e-mail programs they very quickly became the most often utilized tools based on internet technologies, available to contemporary organizations in the business sphere.

After analyzing the impact of the Internet on the business environment of contemporary or-

ganizations it seems that for a long time only one side of the process was perceived. Namely, the advantages which resulted from the commercial utilization of the Internet. So the most

commonly underlined issues were [ECaTT, 2000], [Margherio et al., 1998], [OECD, 1999], [Porter, 2001]:

• procurement cost reduction,

• inventory reduction level,

• lowering cycle times,

• improvement of customer support/service and the lowering of related costs,

• diminishing sales and marketing expenditures,

• emergence of more effective forms of work.

But there is another side of the process connected with the virtualization of the contemporary economy. Looking at these processes from today’s perspective, with over ten years experi-

ence connected with the commercial utilization of Internet technologies, it can clearly be seen that functioning in the electronic environment is far more complicated and brings many more

challenges than was initially predicted. This is especially so with regards to those previously almost completely unnoticed aspects connected with the internal work environment of or-

ganizations. Thus the basic goal of this paper is to analyze the real impact of the utilization of tools based on internet technologies on the internal work environment of organizations virtu-

alizing their business processes, along with the resulting social and ethical implications.

This paper is composed of three parts. In the first part an overview of the situation connected with the virtualization of the contemporary economy and the consequences of this processes

is briefly provided. The second part forms the core of this paper. It focuses on the internal problems and challenges connected with the utilization of Internet technologies, and those

tools based on it, in the work environment of companies. In all cases attention is concentrated not on the advantages of the mentioned tools utilization, which are quite well known and have

already been discussed in length, but on the social and ethical consequences which have be-come more and more important and highlighted by companies. In the final part of the paper,

the most significant conclusions and suggestions are offered.

2. Problems and challenges connected with the utilization of Internet tech-

nologies in companies internal work environment

In spite of obvious and undisputed benefits related with the utilization by the contemporary

organizations cyberspace in their business activities, it seems that today, in the situation of crystallization of the e-economy, it can be hypothesized that numerous internal challenges,

threats and potential problems connected with the functioning of organizations in an elec-tronic environment have emerged. First of all they result from the common utilization of

Internet technologies, and tools based on it, in the everyday business activities of organiza-tions. It mostly relates to five basic aspects: employee access to WWW resources and Web

browser utilization, utilization by employees electronic mail and instant messaging programs, employee access to the resources of P2P networks and P2P programs utilization and blogs

utilization (see fig. 1). Additionally, to some degree, it is connected with the usage of chat-rooms and IRC (predecessor of IM applications).

Fig. 1. Main areas of the impact of internet technologies on organization’s work environment

e-mail

P2P networks

instant messaging

blogs (Weblogs)W

WW resources

Source: author’s own

2.1 Challenges connected with employees access to WWW resources

Nowadays employees’ access to WWW resources seems to be something that is quite obvious

and natural. Furthermore, the lack of it is perceived as a completely strange situation, prevent-ing workers from functioning effectively. Undoubtedly the possibility of its utilization by

workers resources of the multimedial part of the Internet can bring a company numerous benefits such as: faster searching required business information, easier access to professional

knowledge, more effective competitor monitoring, possibility of cooperation with business partners or on-line procurement of products and services necessary for organization (business-

to-business e-commerce).

But according to the results of various surveys, employees commonly use access to Web re-sources for completely personal purpose and the scope of this phenomenon is not marginal.

Fig. 2. Business and personal use of WWW access at work

64,7

91,2

83,7%89,7% 90,2%

50,7%

60,7% 60,5%

0

10

20

30

40

50

60

70

80

90

100

2000 2001 2002 2003

%

business

use

personal

use

Source: [USC Annenberg School, 2004]

The results of the report of UCLA Center for Communication Policy show that over 91% of

employees with Internet access, use it to visit Web sites related with their work, but at the

same time almost 65 % of them visit Web sites completely unconnected with their profes-

sional duties [USC Annenberg School, 2004].

Simultaneously eMarketer report clearly proves that most of the Web sites visited by Ameri-can at-work Internet users have nothing to do with their business activity (see fig. 3) and 60%

of the money consumers spend on-line is spent in the workplace [eMarketer, 2003].

The scope of potential problems and challenges connected with such utilization of the Web resources, to which employees were not entitled is very broad. Undoubtedly the basic chal-

lenge is the risk of their productivity loss resulted from devoting part of their work time on activities completely unrelated with their business activities. But there are also other, not less

significant ones such as: threats of virus infection connected with downloading various files (music, movies, games etc.), legal risks related to downloading unsavory or copyright mate-

rial, “absorption” of the part of computers’ disk space, consumption of network bandwidth as well as risk of downloading and installation of various types of malware (spyware or ad-

ware) on corporate systems. Threats connected with such programs are significant and com-monly perceived. Operating in the background they can not only send information about the

computer’s user, utilized for advertising purpose, but they can also allow third-part entities to have access to sensitive business information and can be used for business espionage (see

[Mitchell, 2004]. [Dunn, 2005].

Fig. 3. Types of Websites visited by US Internet users at work

57%

45%

44%

43%

42%

39%

33%

33%

31%

27%

26%

24%

0% 10% 20% 30% 40% 50% 60%

News

Retail shopping

Financial serv ices

Computer/sof tware

Special Interests/hobbies

Games

Educational

Trav el related

Food/cooking

Sports

Health/f itness

Job listings

Source: [eMarketer, 2003]

Generally they comprise of four basic groups of threats:

• risk of diminishing employee’s productivity,

• dangers relate to company security,

• legal risks,

• challenges connected with the proper functioning of IT infrastructure.

2.2 Challenges connected with utilization of instant messaging programs

Instant messaging programs (IM) entered very broadly into the organizations’ work environ-

ment. They mainly allow for real-time communication between computer users, but they also provide opportunities of exchanging files, carry on voice conversation or arranging video con-

ferences, generally making communication processes simpler and faster.

Common utilization of such application by employees proves research conducted by Blue Coat Systems in US and UK companies during August 2003. According to this research more than 65% of office workers (UK) and 39% (US) surveyed used IM for personal conversation

during working hours. At the same time only 27% (US) and 11% (UK) of workers used IM for business purposes only (see fig. 4). Results of research conducted by META Group leads

to a similar conclusion. According to their results 57%, of the people surveyed use instant messaging applications at work for personal purposes [Goad, 2004]. It is estimated that by the

end of 2005 the number of people using instant messaging applications at work will reach 350 million by 2005. But although this tool is used in 85% of companies, it is officially supported

in only 10% of them [Murphy, 2004].

Undoubtedly the utilization of instant messaging applications can be a source of benefits con-nected with an employees work. An important aspect is the possibility of their usage for es-

tablishing an informal, internal fast communication network among the organization’s em-ployees. It can be particularly important in situations when a company hasn’t implemented

such kinds of solutions (see [eMarketer, 2002]).

Fig. 4. Utilization of IM applications by the UK and US office workers

65%

11%

39%

27%

0%

10%

20%

30%

40%

50%

60%

70%

80%

usage of IM by office workers for

personal conversation during

working hours

usage of IM by office workers for

business purpose only during

working hours

% surveyed

UK

USA

Source: [Blue Coat, 2003]

The next important aspect is an opportunity to use instant messaging for easy and fast com-munication with people outside an organization and establishing a kind of real-time “knowl-

edge-exchange community” with them.

But there are numerous threats which surpass above the potential benefits of IM usage. The

most significant one seems to be risk of employees productivity loss resulting from conduct-ing, lasting sometimes for many hours, private conversations with friends, causing that it’s

difficult for them to concentrate on other tasks. Results of mentioned earlier research confirm that this problem is a very real one. According to their results nearly 80% of respondents from

UK companies admitted to gossiping via IM [Blue Coat, 2003].

Other serious challenges are security issues connected with uncontrolled usage of instant mes-saging programs. They result from the fact that nearly 80% of communication with IM usage

in the workplace takes place over the public networks (see [King, 2004]) what means that important and often sensitive corporate data is being transmitted through various unknown

and unsafe third-party servers [Murphy, 2004]. Also in case of communication with IM use the whole process takes place outside the companies mail servers, so all incoming messages

(along with attached files) are not controlled by established virus scanning and blocking mechanisms. Quite significant challenge is risk of leaking of confidential information as a

result of informal ad-hoc conversations carried on with people outside of an organization. It’s obvious that all above mentioned activities involving instant messaging programs usage have

an impact consumption of network bandwidth.

2.3. Challenges connected with utilization of P2P by employees

Employees’ access to the resources of P2P (Peer-to-Peer) networks and P2P programs utiliza-tion is nowadays the next common area of Internet technologies usage in organizations. Utili-

zation of application allowing for easy access to their resources spread out with emergence of Napster network in 1999 which provided people with opportunity of downloading MP3 files.

In spite of closing Napster network in 2001, utilization of P2P applications has not finished. In place of it there have emerged numerous new and dynamically developing networks such

as Kaaza, Morpheus or Gnutella, with millions of users around the world, offering free access to music files, software and movies [AssetMetrix, 2003], [Wielki, 2003a].

Results of the research conducted by Blue Coat at the end of 2003 and the beginning of 2004,

prove that utilization of such applications is common among employees. I shows that almost 42% of people use P2P file sharing applications and almost 39% of them conduct file sharing

in the workplace [Blue Coat, 2004].

While in case of instant messaging programs its usage one can perceive some work-related benefits, in case of utilization of P2P applications it’s hard to notice them. They are solely

utilized by employees for their personal purposes and fast broadband networks used by or-ganizations additionally stimulates P2P file sharing programs in the workplace. It is con-

firmed by previously mentioned research. According to it, almost 78% of surveyed confirmed that P2P applications do not add any value to their job [Blue Coat, 2004].

There are numerous challenges which emerge in connection of their utilization. Undoubtedly in case of usage P2P file sharing programs there are four most important groups of threats:

security issues, challenges connected with proper functioning of companies’ IT infrastructure, legal risks and employees’ productivity loss risk. When security issues are considered it is

necessary to mention two basic types of threats: virus risks and risks connected with 3rd party malware (adware, trackware and spyware). In case of usage P2P networks virus risk is really

significant and heighten by the fact that there exists viruses not present elsewhere, targeted especially at file-sharing applications (see [Wielki, 2003a]). At the same time threats con-

nected with malware is extremely high. It is commonly included within the P2P-application

installation and according to the results of the research conducted by AssetMetrix Research Labs, over 98% of P2P file sharing programs include malware [AssetMetrix, 2003].

The usage of P2P applications also pose a significant threat for the proper functioning of cor-

porate IT infrastructures. Because the fact that the size of downloaded files is usually quite big (in the case of movies it can range from 500Mb to 1Gb) their downloading can signifi-

cantly decrease bandwidth available for mission critical applications. According to the Blue Coat report, a few dozen employees using P2P applications for downloading thousands files

can “consume” over 30% of companies network banwidth [Blue Coat, 2004]. One can’t also omit legal risks (risk of company liability for actions of end-users i.e. employees), connected

with downloading and storing on company’s computers copyrighted material (especially mu-sic and films). Examples of actions undertaken by music and movie industries in the U.S.

prove that this kind of risk is quite real. In the case of productivity loss, it mostly relates to the allocation of employees part of work time for files searching which are interesting for

them in P2P networks and downloading them (see [Meta Group, 2004]).

2.4 Challenges connected with utilization of electronic mail in companies work

environment

Electronic mail is undoubtedly (beside access to WWW resources) the most common utiliza-tion of Internet technologies in an organizations’ work environment. In today’s situation it

became an essential element of practically every single organization’s functioning, regardless of the sector it operates or its size. The most important aspect connected with electronic mail

utilization in work environment include: better and faster communication with customers and business partners, easier access to co-workers or improved quality of team work.

Similar to the case of Web access, employees commonly use electronic mail in the workplace

for private purposes. According to the report of USC Annenberg School Center for Digital Future, over 85% of those who utilize the Internet at work use e-mail for business purposes,

but at the same time almost 64% of them accessed their personal e-mail at work (see fig. 5)

Fig. 5. Business and personal e-mail access at work

79,7%85,5% 83,5% 85,9%

52,4%58,1% 57,1%

63,5%

0

20

40

60

80

100

2000 2001 2002 2003

business

personal

Źródło: [USC Annenberg School, 2004] Research conducted by Hitachi Data Systems shows that the amount of non-work related e-mail correspondence poses serious problem in some countries. In the case of South Africa 74% of companies one in five e-mails sent in the workplace are non-work related. Similar

situations are in the case of Israeli or Dutch companies [Hitachi Data Systems, 2003]. The most popular ways of private e-mail use in the workplace are shown in fig. 6. Fig. 6. The most common ways of private utilization of e-mail at work

39%

26%

15%

0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

Sending jokes or

chain e-mails at some

point

Discussing personal

life

Gossiping about work

% of surveyed

Source: [Fallows, 2003] The most common way of its personal usage is sending other people (inside or outside an or-ganization) various jokes or chain e-mails received from others. They are very often not only text messages but they also include attachments such as pictures, shorts movies or Power Point presentations. Also discussing and gossiping personal life or work issues are quite common ways of using e-mail by employees in the workplace. This kind of behavior is a source of numerous challenges. The most important one is productivity loss which result from devoting part of work time on reading and answering personal e-mails. Additionally com-monly received and forwarded e-mails containing jokes, pictures or multimedia presentations are the sources of few kinds of challenges. On the one hand they contribute to an increasing amount of spam circulating in cyberspace, which rapid growth in recent years has become a serious problem, diminishing people’s confidence in e-mail as a business tool. On the other hand such workers behavior affects bandwidth of Internet connection, although undoubtedly not in such a significant way as in the case of P2P applications. How serious a problem this can pose is proved by the case of Lockheed Martin. In this company the e-mail system crashed for six hours after its employees sent 60,000 co-workers an e-mail concerning a na-tional prayer day, additionally requesting confirmation of its receipt. The cost of it was hun-dreds of thousands of dollars [Naughton, 1999]. Additionally earlier mentioned attachments, commonly accompanying personal correspondence, pose a serious threat to an organization’s security and it relates to such issues as virus or malware risks. Another increasingly serious issue is the problem of the impact of common utilization of elec-tronic mail on the structure of the daily budget of employees’ working time. It is connected with a fact that the usage of this tool in everyday work forces them, more and more often, to spending increasing part of their workday on reading and answering e-mails. According to research conducted by the American Management Association an average respondent spends almost everyday two hours (about 25% of workday) on e-mail, while in the case of many workers this time is much longer (see fig. 7). Fig. 7. Amount of time spent on a typical workday on e-mail

9,9%

18,5%

24,4%

47,3%

0,0%

10,0%

20,0%

30,0%

40,0%

50,0%

60,0%

less than 1 hour 1-2 hours 2-4 hours more than 4 hours

Source: [Amecian Management Association, 2004] Research conducted by the Pew Internet & American Life Project indicates that in extreme situation this issue can pose a serious challenge. According to their results in the group of “power e-mailers”, which make up about a fifth of employees using the Internet, 68% of the people surveyed spend over 2 hours of a workday on handling e-mails, including 16% who spend more than 4 hours on such activities [Fallows, 2003]. So in the result of extreme situa-tions the utilization of electronic mail as a business tool can lead to opposite effects as ex-pected i.e. loss of productivity through message overload and increased amounts of issues not handled on time. Such a problem was perceived by telephone retailer Phones 4u, which banned its own employees sending internal e-mails. They estimate that its would save each worker every day at least three hours of work time and $1.6 million each month [Reuters, 2003]. At the same time research recently conducted in the UK, on behalf of Hewlett Packard, shows that there is at least one more challenge connected with common utilization of e-mails in an organizations work environment. The phenomenon is called an “Info-Mania” and it relates to the usage by workers of technologies allowing them the continuous access to various types of messages (“always-on” technology). According to the results of this research, employees tools based on such technologies tend to constantly check if they received new messages and

respond to it. It affects their mental sharpness, lowering their productivity. In this context the most dangerous aspect turned out to be an electronic mail. The results of the research showed

that the “Info-Mania” phenomenon can lead to the loss of employees’ IQ by 10 points [Wainwright, 2005].

There is also one more kind of threat connected with growing e-mail utilization in an organi-

zations work environment. This is a risk of accidental disclose by employees various sensitive information in outbound e-mail correspondence. Such situations can cost company amounts in

revenues, legal penalties, and organizational credibility. Although this risk is commonly overlooked numerous cases prove that it is a serious problem (see [Clearswift, 2005]).

2.5 Challenges related to utilization of blogs by employees

Blog (Weblog) is a tool which recently has been rapidly becoming one of the basic instru-

ments based on Internet technology. It is estimated that at the end of April 2005 the number of blogs reached almost 9 million and 40,000 new ones emerge every day [Baker, 2005]. Their

popularity quickly grows not only among Internet users writing own diaries on various inter-esting issues (see [Rainie, 2005]. Simultaneously they become an important business tool util-

ized by various organizations [Baker, 2005]. They are used by such companies as IBM, Gen-

eral Motors and Microsoft. In this latter one there are over 1000 corporation blogs (see

[Rosencrance, 2004). They are utilized for stimulating internal cooperation and knowledge exchange among employees but also in communicating with customers and the business envi-

ronment [Li, 2004]. But also in case of this tool usage there are quite serious challenges and the most important one is uncontrolled leaking of internal information. On the one hand it can

be disclosing, in corporation blogs, information important for competitors such as shifts in the organization’s strategy or undertaking works on certain projects. On the other hand a signifi-

cant challenge can pose various type of private employees blogs, often containing comments concerning internal organization’s issues and its functioning (see [Perez, 2005]). They pose a

significant challenge because of the fact that “blog posts linger on the Web forever” [Baker, 2005] and that the most popular ones attract even dozens of thousands of people. Such a situa-

tion took place in the case of a fired Google employee whose blog, devoted to his work ex-perience, in one day was read by 60,000 visitors. A potential challenge connected with blogs

is also a risk of productivity loss resulting from employees devoting part of their work day on reading and writing blogs not connected with professional issues. An additional threat related

with blogs is their increased exploitation for distribution of malware (see [Websense, 2005]).

3 Conclusions

There are many issues concerning the functioning of an organization, in the situation of dy-

namic development of the e-economy, which require deep analysis and rethinking. As we still have to deal with very early phase of crystallization of the new form of contemporary econ-

omy, there are numerous and unpredictable aspects which unceasingly emerge almost every day posing organizations numerous new challenges. In this context undoubtedly an extremely

important issue for organizations connected with utilizations by their employees in an elec-tronic environment in which more and more often they have to work. As numerous researches

show functioning in this new environment and the utilization by them in everyday work, tools based on Internet technologies has been not only a source of many benefits but it also causes

the emergence of numerous very real problems and challenges. Although the intensity of its impact on the work environment of contemporary organization is various it is already quite

clear that this influence must be carefully observed and analyzed, taking into account not only benefits but also challenges,. These challenges are not only of pure a technical nature, con-

nected with the proper functioning of the organization and its security in the situation of in-creasing virtualization of its business activities. They also include numerous and difficult so-

cial and ethical implications which emerge with more and more common utilization of cyber-space in an organizations functioning.

The range of necessary shifts is so significant that it becomes necessary to rethink and rede-

fine ways and rules which are the base of organization of functioning. This situation necessi-tates the introduction of comprehensive solutions including both organizational and technical

issues, leading to defining the confines of employees’ functioning in electronic environment. So more and more companies becomes aware of this fact undertaking various types of action.

According to the study conducted by American Management Association together with The ePolicy Institute, 76% of surveyed organizations monitor employees’ Website connections

and 55% of them review their e-mails. Simultaneously organizations more and more often establish their own policies concerning the usage of tools based on Internet technology utili-

zation. According to the previous mentioned research 84% companies have such a policy re-lating to personal e-mail usage, 81% of them concerning personal Internet usage, 42% firm

have regulated personal usage of instant messengers and 23% have a policy concerning post-ings on corporate blogs [American Management Association, 2005].

Generally various approaches to this problem are possible, from very restrictive ones to more liberal (see [American Management Association, 2005], [Naughton, 1999], [Reuters, 2003]),

but nowadays it’s obvious that issues related with workers functioning in cyberspace can not be left to itself. Such attitudes can lead to a situation in which benefits following from utiliza-

tion of the Internet and internet technologies by organizations will be vary questionable. Si-multaneously because of big and dynamic changes taking place in cyberspace, its monitoring

and flexible adjusting organization as well as solutions functioning in it seems to be essential.

References

American Management Association (2004), 2004 Workplace E-mail and Instant Messaging

Survey, online at http://www.amanet.org/research/pdfs/IM_2004_Summary.pdf accessed 24.01.2005

American Management Association (2005), 2005 Electronic Monitoring & Surveillance Sur-

vey, online at http://www.amanet.org/research/pdfs/ Email_Policies_Practicies.pdf accessed 14.06.2005

AssetMetrix Research Labs (2003), Corporate P2P Usage and Risk Analysis, online at

http://www.assetmetrix.com/pdf/p2prisk.pdf accessed 14.08.2003

Baker, S., Green, H. (2005), Blogs Will Change Your Business, BusinessWeek, May 2. Blue Coat (2003), An Internet Usage Policy to Combat New Business Risks – White Paper,

online at http://www.bluecoat.com/downloads/files/ BCS_internet_policy_wp.PDF accessed 30.10.2003

Blue Coat (2004), Establishing an Internet Use Policy to Address Peer-to-Peer (P2P) Use –

White Paper, online at http://www.bluecoat.com/downloads/whitepapers/ BCS_Controlling_P2P_survey.pdf accessed 05.06.2005

Clearswift (2005), Email mistakes highlight need for outbound communications securiy,

online at http://www.clearswift.com/news/item.aspx?ID=830 accessed 01.06.2005

Dunn, J.(2005), Izraeli Police uncover Trojan industrial spy ring, Computerworld, online at http://www.computerworld.com/securitytopics/security/cybercrime/story/0,10801,102141,00.

html 31.05.2005

ECaTT Final Report (2000), Benchmarking Telework and E-Commerce in Europe, European Commission, 2000.

eMarketer (2002), Instant Messaging as an E-business Application, online at

http://www.emarketer.com/news/article.php?1001456&ref=ed; accessed 06.02.2002

eMarketer (2003), An Elephant in the Room: The Online At-Work Audience, online at http://www.emarketer.com/products/reports/pdfs/atwork_feb03.pdf accessed 21.02.2003

Fallows, D. (2002), Email at Work, Pew Internet & American Life Project, online at

http://www.pewinternet.org/reports/pdfs/PIP_Work_Email_Report.pdf accessed 12.12.2002

Goad, L.(2004), Instant Messaging Gets Personal at Work, eWEEK, online at

http://www.eweek.com/article2/0,1759,1726017,00.asp, 12.11.2004

Hitachi Data Systems (2003), Personal Emails Add IT Directors’ Storage Woes, online at http://www.hds.com/company/news/press_room/press_releases/ g1031202.html accessed

12.12.2003

King, J.(2004), Sidebar: IM Chatter, Computerworld, online at http://www.computerworld.com/softwaretopics/software/groupware/story/0,10801,90312,00.

html accessed 23.02.2004

Li, C (2004) Blogging: Bubble Or Big Deal?, online at http://www.forrester.com/ Research/ PDF/0,5110,35000,00.pdf accessed 5.11.2004

Margherio, L. et al.(1998), The Emerging Digital Economy, U.S. Departament of Commerce,

online at http://www.esa.doc.gov/pdf/ EmergingDig.pdf accessed 1998

Meta Group (2004), The Growing Security Threat: Your Employees, online at http://www.bluecoat.com/downloads/whitepapers/META_Growing_Security_Threat.pdf ac-

cessed 05.06.2005

Mitchell, R. (2004), Spyware sneaks into the desktop, online at http://www.computerworld.com/printthis/2004/0,4814,92784,00.html accessed 03.05.2004

Murphy, J, Zwieback, D. (2004), Protecting the Enterprise from Instant Messaging and Peer-to-Peer Threats, http://www.surfcontrol.com/general/assets/whitepapers/

IM_and_P2P_whitepaper.pdf; 18.04.2005

Naughton, K. (1999), CyberSlacking, Newsweek, November 29, 62-65.

OECD (1999), The Economic and Social Impact of Electronic Commerce: Preliminary Find-ings and Research Agenda, online at http://www.oecd.org/ dataoecd/ 3/12/ 1944883.pdf;

23.12.1999

Perez, J.(2005), Fired Google blogger reflects, moves on, Computerworld, online at http://www.computerworld.com/printthis/2005/0,4814,99839,00.html accessed 17.02.2005.

Porter, M.(2001), Strategy and the Internet, Harvard Business Review, March, 2001, 63-78.

Rainie, L.(2005), The state of blogging, Pew Internet & American Life Project, online at

http://www.pewinternet.org/pdfs/PIP_blogging_data.pdf, accessed 02.02.2005

Reuters (2003), British company declares war on internal e-mail, online at http://www.computerworld.com/printthis/2003/0,4814,85174,00.html, accessed 03.09.2003

Rosencrance, L.(2004), Watch Your Weblog, Computerworld, online at

http://www.computerworld.com/printthis/2004/0,4814,97009,00.html accessed 01.11.2004

The Economist (2000), Inside the machine: A survey of e-management, November 9th.

USC Annenberg School Center for the Digital Future (2004), The Digital Future Report –

Surveying the Digital Future: Year Four, online at http://www.digitalcenter.org/ downloads/ DigitalFutureReport-Year4-2004.pdf accessed 24.12.2004.

Wainwright, M.(2005), Email ‘pose threat to IQ’, The Guardian, on line at

http://www.guardian.co.uk/print/0,3858,5176855-111163,00.html accessed 22.05.2005. Websense (2005), Toxic Blogs Distribute Malcode and Keyloggers, online at

http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/?Release=050412889 accessed 26.05.2005

Wielki, J. (2003), Możliwości wykorzystania wirtualnych kanałów dystrybucji w branży

muzycznej, Proceedings of the conference SWO’2003.

Wielki, J. (2003a), The recording industry in the new economy reality, Proceedings of 3rd

IFIP Conference on eCommerce, eBusiness and eGovernment.

Wielki, J. (2004), Social and Ethical Implications of Virtualization of the Business Environ-

ment in the Music Sector, Proceedings of ETHICOMP 2004 Conference.