The Impact of internet technology utilizations on

0 downloads 0 Views 343KB Size Report
May 31, 2005 - messaging programs, P2P applications and blogs. ... After analyzing the impact of the Internet on the business environment of ... The results of the report of UCLA Center for Communication Policy show that over 91% of.
The Impact of internet technology utilizations on companies internal work environments: The Social and Ethical Implications By Janusz WIELKI

Abstract This paper is an attempt to analyze challenges, threats and potential problems which result from the utilization in contemporary organizations of Internet technologies and tools. Five basic areas of usage have been analyzed: access to Web resources, electronic mail, instant messaging programs, P2P applications and blogs. The most important types of risk connected with their usage has been discussed, taking into consideration the social and ethical implications of their usage. Finally conclusions and suggestions are offered. l. Introduction

Currently it would seem that there is no need to convince anyone of the impact of the development of the Internet and internet technologies on the functioning of contemporary organizations, which has been taking place for over a decade. Its influence on almost all aspects of function of contemporary organizations has been something extremely visible and obvious (see [Porter, 2001]) for many years now and in the case of some industries this impact has even significantly deepened recently (in that regard undoubtedly a very good example is the music sector – see [Wielki, 2003], [Wielki, 2003a]). On the one hand this impact concerns single organizations and their methods of functioning and competing, while on the other hand it affects consumers, their attitudes and behavior. Both these issues are mutually interrelated. Already by the mid 1990s organizations were functioning in a more or less stable business environment, concentrating their efforts on conducting business activities in their own sectors and facing typical challenges such as: cost reduction and the introduction of new products in the marketplace. It was clearly necessary to contend with changes taking place in the business environment but they were predictable to a large extent [The Economist, 2000]. The second part of the 1990s saw the end of such relative stability, the main reason being due to the arrival of the Internet into the contemporary economy and the beginning of its utilization in business. An important element of this process was the emergence, within the space of a year, of two Web browsers with intuitive user interfaces, allowing both companies (i.e. their employees) and their customers easy access to and use of the multimedial resources of the Internet. At the same time, built-in Web browsers client e-mail programs gave users the possibility of trouble-free utilization of electronic mail. Additionally, at the end of the 1990s two other tools, based on the utilization of Internet technologies spread: instant messaging and P2P programs. Recently the importance of blogs (Weblogs) has also grown. Along with Web browsers and e-mail programs they very quickly became the most often utilized tools based on internet technologies, available to contemporary organizations in the business sphere. After analyzing the impact of the Internet on the business environment of contemporary organizations it seems that for a long time only one side of the process was perceived. Namely, the advantages which resulted from the commercial utilization of the Internet. So the most commonly underlined issues were [ECaTT, 2000], [Margherio et al., 1998], [OECD, 1999], [Porter, 2001]:

• • • • • •

procurement cost reduction, inventory reduction level, lowering cycle times, improvement of customer support/service and the lowering of related costs, diminishing sales and marketing expenditures, emergence of more effective forms of work.

But there is another side of the process connected with the virtualization of the contemporary economy. Looking at these processes from today’s perspective, with over ten years experience connected with the commercial utilization of Internet technologies, it can clearly be seen that functioning in the electronic environment is far more complicated and brings many more challenges than was initially predicted. This is especially so with regards to those previously almost completely unnoticed aspects connected with the internal work environment of organizations. Thus the basic goal of this paper is to analyze the real impact of the utilization of tools based on internet technologies on the internal work environment of organizations virtualizing their business processes, along with the resulting social and ethical implications. This paper is composed of three parts. In the first part an overview of the situation connected with the virtualization of the contemporary economy and the consequences of this processes is briefly provided. The second part forms the core of this paper. It focuses on the internal problems and challenges connected with the utilization of Internet technologies, and those tools based on it, in the work environment of companies. In all cases attention is concentrated not on the advantages of the mentioned tools utilization, which are quite well known and have already been discussed in length, but on the social and ethical consequences which have become more and more important and highlighted by companies. In the final part of the paper, the most significant conclusions and suggestions are offered.

2. Problems and challenges connected with the utilization of Internet technologies in companies internal work environment In spite of obvious and undisputed benefits related with the utilization by the contemporary organizations cyberspace in their business activities, it seems that today, in the situation of crystallization of the e-economy, it can be hypothesized that numerous internal challenges, threats and potential problems connected with the functioning of organizations in an electronic environment have emerged. First of all they result from the common utilization of Internet technologies, and tools based on it, in the everyday business activities of organizations. It mostly relates to five basic aspects: employee access to WWW resources and Web browser utilization, utilization by employees electronic mail and instant messaging programs, employee access to the resources of P2P networks and P2P programs utilization and blogs utilization (see fig. 1). Additionally, to some degree, it is connected with the usage of chatrooms and IRC (predecessor of IM applications). Fig. 1. Main areas of the impact of internet technologies on organization’s work environment

W

em ail

W W r e s o u r c e s

s k r o w t e n P 2 P

g ign a ses tm n a st in

) s g lo b e W ( s g lo b

Source: author’s own

2.1 Challenges connected with employees access to WWW resources Nowadays employees’ access to WWW resources seems to be something that is quite obvious and natural. Furthermore, the lack of it is perceived as a completely strange situation, preventing workers from functioning effectively. Undoubtedly the possibility of its utilization by workers resources of the multimedial part of the Internet can bring a company numerous benefits such as: faster searching required business information, easier access to professional knowledge, more effective competitor monitoring, possibility of cooperation with business partners or on-line procurement of products and services necessary for organization (businessto-business e-commerce). But according to the results of various surveys, employees commonly use access to Web resources for completely personal purpose and the scope of this phenomenon is not marginal. Fig. 2. Business and personal use of WWW access at work 100 91,2 89,7% 90,2% 90 83,7% 80 64,7 70 60,5% 60,7% 60 50,7% %50 40 30 20 10 0 2000 2001 2002 2003 Source: [USC Annenberg School, 2004]

business use personal use

The results of the report of UCLA Center for Communication Policy show that over 91% of employees with Internet access, use it to visit Web sites related with their work, but at the

same time almost 65 % of them visit Web sites completely unconnected with their professional duties [USC Annenberg School, 2004]. Simultaneously eMarketer report clearly proves that most of the Web sites visited by American at-work Internet users have nothing to do with their business activity (see fig. 3) and 60% of the money consumers spend on-line is spent in the workplace [eMarketer, 2003]. The scope of potential problems and challenges connected with such utilization of the Web resources, to which employees were not entitled is very broad. Undoubtedly the basic challenge is the risk of their productivity loss resulted from devoting part of their work time on activities completely unrelated with their business activities. But there are also other, not less significant ones such as: threats of virus infection connected with downloading various files (music, movies, games etc.), legal risks related to downloading unsavory or copyright material, “absorption” of the part of computers’ disk space, consumption of network bandwidth as well as risk of downloading and installation of various types of malware (spyware or adware) on corporate systems. Threats connected with such programs are significant and commonly perceived. Operating in the background they can not only send information about the computer’s user, utilized for advertising purpose, but they can also allow third-part entities to have access to sensitive business information and can be used for business espionage (see [Mitchell, 2004]. [Dunn, 2005]. Fig. 3. Types of Websites visited by US Internet users at work 24%

Job listings

26%

Health/f itness

27%

Sports

31%

Food/cooking Trav el related

33%

Educational

33% 39%

Games

42%

Special Interests/hobbies

43%

Computer/sof tware

44%

Financial serv ices

45%

Retail shopping

57%

News

0% 10% Source: [eMarketer, 2003]

20%

30%

40%

Generally they comprise of four basic groups of threats:

50%

60%

• • • •

risk of diminishing employee’s productivity, dangers relate to company security, legal risks, challenges connected with the proper functioning of IT infrastructure.

2.2 Challenges connected with utilization of instant messaging programs Instant messaging programs (IM) entered very broadly into the organizations’ work environment. They mainly allow for real-time communication between computer users, but they also provide opportunities of exchanging files, carry on voice conversation or arranging video conferences, generally making communication processes simpler and faster. Common utilization of such application by employees proves research conducted by Blue Coat Systems in US and UK companies during August 2003. According to this research more than 65% of office workers (UK) and 39% (US) surveyed used IM for personal conversation during working hours. At the same time only 27% (US) and 11% (UK) of workers used IM for business purposes only (see fig. 4). Results of research conducted by META Group leads to a similar conclusion. According to their results 57%, of the people surveyed use instant messaging applications at work for personal purposes [Goad, 2004]. It is estimated that by the end of 2005 the number of people using instant messaging applications at work will reach 350 million by 2005. But although this tool is used in 85% of companies, it is officially supported in only 10% of them [Murphy, 2004]. Undoubtedly the utilization of instant messaging applications can be a source of benefits connected with an employees work. An important aspect is the possibility of their usage for establishing an informal, internal fast communication network among the organization’s employees. It can be particularly important in situations when a company hasn’t implemented such kinds of solutions (see [eMarketer, 2002]). Fig. 4. Utilization of IM applications by the UK and US office workers

d e y e v r u s

80% 70% 60% 50% 40% 30% 20% 10% 0%

65% 39% 27%

%

UK USA

11% usage of IM by office workers for usage of IM by office workers for personal conversation during business purpose only during working hours working hours

Source: [Blue Coat, 2003] The next important aspect is an opportunity to use instant messaging for easy and fast communication with people outside an organization and establishing a kind of real-time “knowledge-exchange community” with them.

But there are numerous threats which surpass above the potential benefits of IM usage. The most significant one seems to be risk of employees productivity loss resulting from conducting, lasting sometimes for many hours, private conversations with friends, causing that it’s difficult for them to concentrate on other tasks. Results of mentioned earlier research confirm that this problem is a very real one. According to their results nearly 80% of respondents from UK companies admitted to gossiping via IM [Blue Coat, 2003]. Other serious challenges are security issues connected with uncontrolled usage of instant messaging programs. They result from the fact that nearly 80% of communication with IM usage in the workplace takes place over the public networks (see [King, 2004]) what means that important and often sensitive corporate data is being transmitted through various unknown and unsafe third-party servers [Murphy, 2004]. Also in case of communication with IM use the whole process takes place outside the companies mail servers, so all incoming messages (along with attached files) are not controlled by established virus scanning and blocking mechanisms. Quite significant challenge is risk of leaking of confidential information as a result of informal ad-hoc conversations carried on with people outside of an organization. It’s obvious that all above mentioned activities involving instant messaging programs usage have an impact consumption of network bandwidth.

2.3. Challenges connected with utilization of P2P by employees Employees’ access to the resources of P2P (Peer-to-Peer) networks and P2P programs utilization is nowadays the next common area of Internet technologies usage in organizations. Utilization of application allowing for easy access to their resources spread out with emergence of Napster network in 1999 which provided people with opportunity of downloading MP3 files. In spite of closing Napster network in 2001, utilization of P2P applications has not finished. In place of it there have emerged numerous new and dynamically developing networks such as Kaaza, Morpheus or Gnutella, with millions of users around the world, offering free access to music files, software and movies [AssetMetrix, 2003], [Wielki, 2003a]. Results of the research conducted by Blue Coat at the end of 2003 and the beginning of 2004, prove that utilization of such applications is common among employees. I shows that almost 42% of people use P2P file sharing applications and almost 39% of them conduct file sharing in the workplace [Blue Coat, 2004]. While in case of instant messaging programs its usage one can perceive some work-related benefits, in case of utilization of P2P applications it’s hard to notice them. They are solely utilized by employees for their personal purposes and fast broadband networks used by organizations additionally stimulates P2P file sharing programs in the workplace. It is confirmed by previously mentioned research. According to it, almost 78% of surveyed confirmed that P2P applications do not add any value to their job [Blue Coat, 2004]. There are numerous challenges which emerge in connection of their utilization. Undoubtedly in case of usage P2P file sharing programs there are four most important groups of threats: security issues, challenges connected with proper functioning of companies’ IT infrastructure, legal risks and employees’ productivity loss risk. When security issues are considered it is necessary to mention two basic types of threats: virus risks and risks connected with 3rd party malware (adware, trackware and spyware). In case of usage P2P networks virus risk is really significant and heighten by the fact that there exists viruses not present elsewhere, targeted especially at file-sharing applications (see [Wielki, 2003a]). At the same time threats con-

nected with malware is extremely high. It is commonly included within the P2P-application installation and according to the results of the research conducted by AssetMetrix Research Labs, over 98% of P2P file sharing programs include malware [AssetMetrix, 2003]. The usage of P2P applications also pose a significant threat for the proper functioning of corporate IT infrastructures. Because the fact that the size of downloaded files is usually quite big (in the case of movies it can range from 500Mb to 1Gb) their downloading can significantly decrease bandwidth available for mission critical applications. According to the Blue Coat report, a few dozen employees using P2P applications for downloading thousands files can “consume” over 30% of companies network banwidth [Blue Coat, 2004]. One can’t also omit legal risks (risk of company liability for actions of end-users i.e. employees), connected with downloading and storing on company’s computers copyrighted material (especially music and films). Examples of actions undertaken by music and movie industries in the U.S. prove that this kind of risk is quite real. In the case of productivity loss, it mostly relates to the allocation of employees part of work time for files searching which are interesting for them in P2P networks and downloading them (see [Meta Group, 2004]).

2.4 Challenges connected with utilization of electronic mail in companies work environment Electronic mail is undoubtedly (beside access to WWW resources) the most common utilization of Internet technologies in an organizations’ work environment. In today’s situation it became an essential element of practically every single organization’s functioning, regardless of the sector it operates or its size. The most important aspect connected with electronic mail utilization in work environment include: better and faster communication with customers and business partners, easier access to co-workers or improved quality of team work. Similar to the case of Web access, employees commonly use electronic mail in the workplace for private purposes. According to the report of USC Annenberg School Center for Digital Future, over 85% of those who utilize the Internet at work use e-mail for business purposes, but at the same time almost 64% of them accessed their personal e-mail at work (see fig. 5) Fig. 5. Business and personal e-mail access at work 100 79,7% 80 52,4% 60 40 20 0 2000

85,5%

85,9%

83,5% 58,1%

2001

57,1%

2002

63,5%

business personal

2003

Źródło: [USC Annenberg School, 2004] Research conducted by Hitachi Data Systems shows that the amount of non-work related email correspondence poses serious problem in some countries. In the case of South Africa 74% of companies one in five e-mails sent in the workplace are non-work related. Similar

situations are in the case of Israeli or Dutch companies [Hitachi Data Systems, 2003]. The most popular ways of private e-mail use in the workplace are shown in fig. 6. Fig. 6. The most common ways of private utilization of e-mail at work 45% 39% 40% 35% 30% 26% 25% 20% 15% 15% 10% 5% 0% d e y e v r u s f o

%

Discussing personal Gossiping about work Sending jokes or life chain e-mails at some point

Source: [Fallows, 2003] The most common way of its personal usage is sending other people (inside or outside an organization) various jokes or chain e-mails received from others. They are very often not only text messages but they also include attachments such as pictures, shorts movies or Power Point presentations. Also discussing and gossiping personal life or work issues are quite common ways of using e-mail by employees in the workplace. This kind of behavior is a source of numerous challenges. The most important one is productivity loss which result from devoting part of work time on reading and answering personal e-mails. Additionally commonly received and forwarded e-mails containing jokes, pictures or multimedia presentations are the sources of few kinds of challenges. On the one hand they contribute to an increasing amount of spam circulating in cyberspace, which rapid growth in recent years has become a serious problem, diminishing people’s confidence in e-mail as a business tool. On the other hand such workers behavior affects bandwidth of Internet connection, although undoubtedly not in such a significant way as in the case of P2P applications. How serious a problem this can pose is proved by the case of Lockheed Martin. In this company the e-mail system crashed for six hours after its employees sent 60,000 co-workers an e-mail concerning a national prayer day, additionally requesting confirmation of its receipt. The cost of it was hundreds of thousands of dollars [Naughton, 1999]. Additionally earlier mentioned attachments, commonly accompanying personal correspondence, pose a serious threat to an organization’s security and it relates to such issues as virus or malware risks. Another increasingly serious issue is the problem of the impact of common utilization of electronic mail on the structure of the daily budget of employees’ working time. It is connected with a fact that the usage of this tool in everyday work forces them, more and more often, to spending increasing part of their workday on reading and answering e-mails. According to research conducted by the American Management Association an average respondent spends almost everyday two hours (about 25% of workday) on e-mail, while in the case of many workers this time is much longer (see fig. 7). Fig. 7. Amount of time spent on a typical workday on e-mail

60,0%

47,3%

50,0% 40,0% 30,0% 20,0% 10,0% 0,0%

24,4%

18,5%

less than 1 hour

9,9% 1-2 hours

2-4 hours

more than 4 hours

Source: [Amecian Management Association, 2004] Research conducted by the Pew Internet & American Life Project indicates that in extreme situation this issue can pose a serious challenge. According to their results in the group of “power e-mailers”, which make up about a fifth of employees using the Internet, 68% of the people surveyed spend over 2 hours of a workday on handling e-mails, including 16% who spend more than 4 hours on such activities [Fallows, 2003]. So in the result of extreme situations the utilization of electronic mail as a business tool can lead to opposite effects as expected i.e. loss of productivity through message overload and increased amounts of issues not handled on time. Such a problem was perceived by telephone retailer Phones 4u, which banned its own employees sending internal e-mails. They estimate that its would save each worker every day at least three hours of work time and $1.6 million each month [Reuters, 2003]. At the same time research recently conducted in the UK, on behalf of Hewlett Packard, shows that there is at least one more challenge connected with common utilization of e-mails in an organizations work environment. The phenomenon is called an “Info-Mania” and it relates to the usage by workers of technologies allowing them the continuous access to various types of messages (“always-on” technology). According to the results of this research, employees tools based on such technologies tend to constantly check if they received new messages and respond to it. It affects their mental sharpness, lowering their productivity. In this context the most dangerous aspect turned out to be an electronic mail. The results of the research showed that the “Info-Mania” phenomenon can lead to the loss of employees’ IQ by 10 points [Wainwright, 2005]. There is also one more kind of threat connected with growing e-mail utilization in an organizations work environment. This is a risk of accidental disclose by employees various sensitive information in outbound e-mail correspondence. Such situations can cost company amounts in revenues, legal penalties, and organizational credibility. Although this risk is commonly overlooked numerous cases prove that it is a serious problem (see [Clearswift, 2005]).

2.5 Challenges related to utilization of blogs by employees Blog (Weblog) is a tool which recently has been rapidly becoming one of the basic instruments based on Internet technology. It is estimated that at the end of April 2005 the number of blogs reached almost 9 million and 40,000 new ones emerge every day [Baker, 2005]. Their popularity quickly grows not only among Internet users writing own diaries on various interesting issues (see [Rainie, 2005]. Simultaneously they become an important business tool utilized by various organizations [Baker, 2005]. They are used by such companies as IBM, Gen-

eral Motors and Microsoft. In this latter one there are over 1000 corporation blogs (see [Rosencrance, 2004). They are utilized for stimulating internal cooperation and knowledge exchange among employees but also in communicating with customers and the business environment [Li, 2004]. But also in case of this tool usage there are quite serious challenges and the most important one is uncontrolled leaking of internal information. On the one hand it can be disclosing, in corporation blogs, information important for competitors such as shifts in the organization’s strategy or undertaking works on certain projects. On the other hand a significant challenge can pose various type of private employees blogs, often containing comments concerning internal organization’s issues and its functioning (see [Perez, 2005]). They pose a significant challenge because of the fact that “blog posts linger on the Web forever” [Baker, 2005] and that the most popular ones attract even dozens of thousands of people. Such a situation took place in the case of a fired Google employee whose blog, devoted to his work experience, in one day was read by 60,000 visitors. A potential challenge connected with blogs is also a risk of productivity loss resulting from employees devoting part of their work day on reading and writing blogs not connected with professional issues. An additional threat related with blogs is their increased exploitation for distribution of malware (see [Websense, 2005]). 3 Conclusions

There are many issues concerning the functioning of an organization, in the situation of dynamic development of the e-economy, which require deep analysis and rethinking. As we still have to deal with very early phase of crystallization of the new form of contemporary economy, there are numerous and unpredictable aspects which unceasingly emerge almost every day posing organizations numerous new challenges. In this context undoubtedly an extremely important issue for organizations connected with utilizations by their employees in an electronic environment in which more and more often they have to work. As numerous researches show functioning in this new environment and the utilization by them in everyday work, tools based on Internet technologies has been not only a source of many benefits but it also causes the emergence of numerous very real problems and challenges. Although the intensity of its impact on the work environment of contemporary organization is various it is already quite clear that this influence must be carefully observed and analyzed, taking into account not only benefits but also challenges,. These challenges are not only of pure a technical nature, connected with the proper functioning of the organization and its security in the situation of increasing virtualization of its business activities. They also include numerous and difficult social and ethical implications which emerge with more and more common utilization of cyberspace in an organizations functioning. The range of necessary shifts is so significant that it becomes necessary to rethink and redefine ways and rules which are the base of organization of functioning. This situation necessitates the introduction of comprehensive solutions including both organizational and technical issues, leading to defining the confines of employees’ functioning in electronic environment. So more and more companies becomes aware of this fact undertaking various types of action. According to the study conducted by American Management Association together with The ePolicy Institute, 76% of surveyed organizations monitor employees’ Website connections and 55% of them review their e-mails. Simultaneously organizations more and more often establish their own policies concerning the usage of tools based on Internet technology utilization. According to the previous mentioned research 84% companies have such a policy relating to personal e-mail usage, 81% of them concerning personal Internet usage, 42% firm have regulated personal usage of instant messengers and 23% have a policy concerning postings on corporate blogs [American Management Association, 2005].

Generally various approaches to this problem are possible, from very restrictive ones to more liberal (see [American Management Association, 2005], [Naughton, 1999], [Reuters, 2003]), but nowadays it’s obvious that issues related with workers functioning in cyberspace can not be left to itself. Such attitudes can lead to a situation in which benefits following from utilization of the Internet and internet technologies by organizations will be vary questionable. Simultaneously because of big and dynamic changes taking place in cyberspace, its monitoring and flexible adjusting organization as well as solutions functioning in it seems to be essential. References

American Management Association (2004), 2004 Workplace E-mail and Instant Messaging Survey, online at http://www.amanet.org/research/pdfs/IM_2004_Summary.pdf accessed 24.01.2005 American Management Association (2005), 2005 Electronic Monitoring & Surveillance Survey, online at http://www.amanet.org/research/pdfs/ Email_Policies_Practicies.pdf accessed 14.06.2005 AssetMetrix Research Labs (2003), Corporate P2P Usage and Risk Analysis, online at http://www.assetmetrix.com/pdf/p2prisk.pdf accessed 14.08.2003 Baker, S., Green, H. (2005), Blogs Will Change Your Business, BusinessWeek, May 2. Blue Coat (2003), An Internet Usage Policy to Combat New Business Risks – White Paper, online at http://www.bluecoat.com/downloads/files/ BCS_internet_policy_wp.PDF accessed 30.10.2003 Blue Coat (2004), Establishing an Internet Use Policy to Address Peer-to-Peer (P2P) Use – White Paper, online at http://www.bluecoat.com/downloads/whitepapers/ BCS_Controlling_P2P_survey.pdf accessed 05.06.2005 Clearswift (2005), Email mistakes highlight need for outbound communications securiy, online at http://www.clearswift.com/news/item.aspx?ID=830 accessed 01.06.2005 Dunn, J.(2005), Izraeli Police uncover Trojan industrial spy ring, Computerworld, online at http://www.computerworld.com/securitytopics/security/cybercrime/story/0,10801,102141,00. html 31.05.2005 ECaTT Final Report (2000), Benchmarking Telework and E-Commerce in Europe, European Commission, 2000. eMarketer (2002), Instant Messaging as an E-business Application, online at http://www.emarketer.com/news/article.php?1001456&ref=ed; accessed 06.02.2002 eMarketer (2003), An Elephant in the Room: The Online At-Work Audience, online at http://www.emarketer.com/products/reports/pdfs/atwork_feb03.pdf accessed 21.02.2003 Fallows, D. (2002), Email at Work, Pew Internet & American Life Project, online at http://www.pewinternet.org/reports/pdfs/PIP_Work_Email_Report.pdf accessed 12.12.2002

Goad, L.(2004), Instant Messaging Gets Personal at Work, eWEEK, online at http://www.eweek.com/article2/0,1759,1726017,00.asp, 12.11.2004 Hitachi Data Systems (2003), Personal Emails Add IT Directors’ Storage Woes, online at http://www.hds.com/company/news/press_room/press_releases/ g1031202.html accessed 12.12.2003 King, J.(2004), Sidebar: IM Chatter, Computerworld, online at http://www.computerworld.com/softwaretopics/software/groupware/story/0,10801,90312,00. html accessed 23.02.2004 Li, C (2004) Blogging: Bubble Or Big Deal?, online at http://www.forrester.com/ Research/ PDF/0,5110,35000,00.pdf accessed 5.11.2004 Margherio, L. et al.(1998), The Emerging Digital Economy, U.S. Departament of Commerce, online at http://www.esa.doc.gov/pdf/ EmergingDig.pdf accessed 1998 Meta Group (2004), The Growing Security Threat: Your Employees, online at http://www.bluecoat.com/downloads/whitepapers/META_Growing_Security_Threat.pdf accessed 05.06.2005 Mitchell, R. (2004), Spyware sneaks into the desktop, online at http://www.computerworld.com/printthis/2004/0,4814,92784,00.html accessed 03.05.2004 Murphy, J, Zwieback, D. (2004), Protecting the Enterprise from Instant Messaging and Peerto-Peer Threats, http://www.surfcontrol.com/general/assets/whitepapers/ IM_and_P2P_whitepaper.pdf; 18.04.2005 Naughton, K. (1999), CyberSlacking, Newsweek, November 29, 62-65. OECD (1999), The Economic and Social Impact of Electronic Commerce: Preliminary Findings and Research Agenda, online at http://www.oecd.org/ dataoecd/ 3/12/ 1944883.pdf; 23.12.1999 Perez, J.(2005), Fired Google blogger reflects, moves on, Computerworld, online at http://www.computerworld.com/printthis/2005/0,4814,99839,00.html accessed 17.02.2005. Porter, M.(2001), Strategy and the Internet, Harvard Business Review, March, 2001, 63-78. Rainie, L.(2005), The state of blogging, Pew Internet & American Life Project, online at http://www.pewinternet.org/pdfs/PIP_blogging_data.pdf, accessed 02.02.2005 Reuters (2003), British company declares war on internal e-mail, online at http://www.computerworld.com/printthis/2003/0,4814,85174,00.html, accessed 03.09.2003 Rosencrance, L.(2004), Watch Your Weblog, Computerworld, online at http://www.computerworld.com/printthis/2004/0,4814,97009,00.html accessed 01.11.2004 The Economist (2000), Inside the machine: A survey of e-management, November 9th.

USC Annenberg School Center for the Digital Future (2004), The Digital Future Report – Surveying the Digital Future: Year Four, online at http://www.digitalcenter.org/ downloads/ DigitalFutureReport-Year4-2004.pdf accessed 24.12.2004. Wainwright, M.(2005), Email ‘pose threat to IQ’, The Guardian, on line at http://www.guardian.co.uk/print/0,3858,5176855-111163,00.html accessed 22.05.2005. Websense (2005), Toxic Blogs Distribute Malcode and Keyloggers, online at http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/?Release= 050412889 accessed 26.05.2005 Wielki, J. (2003), Możliwości wykorzystania wirtualnych kanałów dystrybucji w branży muzycznej, Proceedings of the conference SWO’2003. Wielki, J. (2003a), The recording industry in the new economy reality, Proceedings of 3rd IFIP Conference on eCommerce, eBusiness and eGovernment. Wielki, J. (2004), Social and Ethical Implications of Virtualization of the Business Environment in the Music Sector, Proceedings of ETHICOMP 2004 Conference.