There are electronic communication technologies, consist of five dimensions, social presence, media richness, asynchronicity, permanence, and spreadability. For the Launch Cable case, there are three aspects continuing to the widespread problem, including social presence, media richness, permanency, spreadability.
Media richness is a theory that described the capacity a communication medium can carry information. (Alberts, Nakayama& Martin, …show more content…
Social presence refers to people experiencing psychological feelings of closeness or immediacy during interactions. (Alberts, Nakayama& Martin, 2007) While selling the private data, the law-breaking employee could conceal their identity easily since the medium was lean as mentioned before. The medium could not carry their personal information. Also, the medium they used is low in social presence that lack of personal touch. The basic, obvious traits about nature and cultural character, which were accustomed to in the physical world, were absent (Donath, 1999). The information of the wrongdoers was not included or evident that could trace back to them. They could deny responsibility when the crimes were discovered. These characteristics of electronic communication technologies eased the employees’ fear of getting caught by the authority. Hence, the unauthorized disclosure problem became particularly widespread.
According to Jenkins, Ford and Green (2013), spreadability refers to the media make some kinds of content circulate easier than other media, the attribute of the circulated information interesting enough that people exchange it. The concept can apply in the Launch Cable case in two ways. First, in the case, the customer database was stored in a computer system, which had high spreadability. This medium could induce employees to copy the documents, and resulted in many copies being produced and spread …show more content…
Permanency of a medium expresses whether a message can easily be stored in a permanent way. Documents can either store digitally or in hard copy. In the Launch Cable case, whether the company chose to store the data digitally or keep a hard copy of them, either way the employees could always have access to the information. Even if the company wanted to destroy the data, any employees could have had a copy themselves on the sly. Once information or pictures are up online, even for a short period, there is no telling that who made a copy or copies of them and where they might be exposed (Kendall, 2008). Inappropriate activities towards this kind of confidential information will lead to unintended audiences. The employees, who could access the data readily, could have easily stored the clients’ personal information to any device any time. Then they could make use of the data whenever they wanted to. We can see from the case, ‘all Juan had to do was copy the data to an Excel file…’ that it was not difficult for the Launch Cable staff to store the data in other means. In this way, the customers’ personal information could be stored permanently. This effortless practice fostered the