Gift Guide

Managing Your Wired Workforce: A Practical Guide

Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (1) from $4.25   
  • Used (1) from $4.25   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2014

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Like New
PAPERBACK Fine 1883726794 SC un-used CD minor shelf-wear only.

Ships from: Burlington, VT

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Sort by
Sending request ...

Product Details

  • ISBN-13: 9781883726799
  • Publisher: Bradford Publishing Company
  • Publication date: 9/28/2003
  • Edition description: BK&CD-ROM
  • Pages: 169
  • Product dimensions: 7.08 (w) x 8.98 (h) x 0.50 (d)

Table of Contents

Dedication v
About the authors vi
Editor's note vii
Chapter 1 The Importance of Managing Your Wired Workforce 1
Possible business disasters 2
Management goals 3
Summary 5
Chapter 2 Developing an Internet Management System 7
Why is an Internet and e-mail management system important to your business? 7
Where should you start? 9
Is Internet and e-mail use management new to you (or your business)? 10
Case studies 10
Critical start-up questions when your business embarks on Internet and e-mail use management 13
Step 1 Analyze need 14
Step 2 Analyze risk 15
What are employees doing online, if not working? 18
Pornography viewing at work 18
Sexual and racial harassment online 19
Shopping and other online activities 20
Dangerous e-mail 21
Step 3 Analyze security 23
Step 4 Formulate policy 24
Step 5 Investigate hardware and software needs 26
Summary 28
Chapter 3 Monitoring and Filtering E-Mail Use 31
Can a business legally monitor its employees' Internet activities? 32
How does spam affect your business e-mail? 32
Spam fighters 34
The newest inbox polluters: hoaxes and chain letters 35
What can you do? 36
Using software to monitor and filter e-mail use 37
Software monitoring systems designed for multiple tasks 37
Software that works for large and small businesses 38
Small operations software, with limitations 39
Monitoring instant messages 39
The downside of Internet monitoring: Negative impact on employee morale 40
Summary 41
Chapter 4 Your Staff and Information Technology: The Human Resources Issues Generated by the Internet 43
The IT professional 44
Managing the IT manager and the security manager 45
What about outsourcing? 46
Security services 47
Information security starts with every new hire 48
Background checks 48
Training 49
Tips on developing and implementing security policies 49
E-mail and instant messaging policies 51
Information security checklist for training in your business 54
Other security measures 54
Summary 55
Chapter 5 E-Mail Management, Computer Security, and Physical Security Issues 59
The security assessment 62
Memo to managers 63
Computer security 64
Firewalls 64
Encryption 67
Anti-virus software 69
Tech Tip--virus 70
Passwords and other authentication 71
Tech Tip--passwords 73
Your employees are in the field: What special security is needed? 73
Patches and updates 75
Back-ups 75
Physical security 76
Adequate physical security 76
Breaching physical security 77
A process for determining the amount of security that is needed 77
Disaster planning 79
Summary 81
Chapter 6 Identity Theft, the Internet, and Your Business 83
What is identity theft? 83
Identity theft: Its scope and impact 84
How does identity theft happen? 85
Risky business 86
Protecting against identity thefts 87
Important questions 88
Who's leading the charge against identity thieves? 89
What if your business is a target? 91
Concerns for online merchants 91
Summary 93
Chapter 7 The Internet and Intellectual Property: An Essential Guide for Managers 95
What exactly is "intellectual property" and why should it be managed? 96
How does the Internet affect a business's protection of intellectual property rights? 96
Computer security systems: Can they protect your intellectual property? 97
Types of intellectual property your business may have 98
Trade secrets 98
What is the difference between a business's confidential information and its trade secrets? 99
Legal issues involving trade secrets 99
When the federal government may come to your aid 101
Remedies for trade secret theft 101
Keeping the "secret" in trade secret--what to do first 102
If an actual trade secret is stolen, can criminal action be brought? 102
Can someone else legally obtain trade secrets from your business? 103
Memo to managers--using non disclosure agreements 103
Checklist for safeguarding your business's trade secrets 105
Copyrighted material 106
Who owns a copyright? 106
What does a copyright protect? 107
When does a copyright originate? 108
Advantages of registering with the U.S. Copyright Office 108
What is not protected by copyright? 109
What are a manager's responsibilities regarding copyrights? 109
Consequences of copyright infringement 110
How long does copyright protection last? 111
How can another's original work be used without infringing on the copyright? 111
Copyright and the Internet 111
How can a business protect itself from copyright infringement by employees? 114
Are Web pages and e-mails protected by copyright? 114
What about Web sites? 115
What about putting a link to another's site on your site? 116
How do you obtain permission to use copyrighted material? 117
What if someone is using part or your entire Web site without permission? 117
The "fair-use" doctrine 118
An innocent looking trap 119
The Digital Millennium Copyright Act of 1998 120
Patents 123
What features make an invention quality for a patent? 125
Trademarks and trade names 125
How do you know if something is trademarked? 125
What's the difference between trademark and trade name? 126
Trade dress and when imitation may mean litigation 126
Summary 127
Appendix 1 The Internet: A Little History and How It Works 129
What is the Internet? 129
How did the Internet come to be? 130
How does the Internet work? 131
Appendix 2 The World Wide Web 135
The difference between the Internet and the World Wide Web 135
How did the World Wide Web begin? 136
Want to know more? 137
Appendix 3 CD-Rom Contents 139
Sample Internet and e-mail use policy 140
Checklist for e-mail policies and procedures 151
Checklist for setting up a corporate confidentiality and trade secret protection program 154
Glossary 159
Index 165
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)