423 Search Results for Employee Privacy Rights in the Workplace

Human Resources Case Study

Case Study #1 – Religious Freedom at Work Fred Rotelli’s situation is an example of the challenges relating to protection of religious freedom at a school or employment setting. In this scenario, Fred Rotelli was fired on the basis that h Continue Reading...

Social Business and Retailer Dissertation

business2community.com/social-media/2012s-ten-worst-social-media-Disaster-0370309 Using contemporary illustrative examples from academic literature and reputable business publications, discuss the concept of "Social Business" and the resultant oppo Continue Reading...

Job Interview is the Most Thesis

The authors assert that organizations large and small have placed a great emphasis on ethical behavior and many resources have been dedicated to ethics training. This emphasis on ethics also extends to pre-employment factors including the Job interv Continue Reading...

Telecom and the Internet Use Term Paper

My personal website is also build around the same principles mentioned above. This is because I had taken the assistance of the company' it manager (she is a part of my social network), to build my website. The shortcomings of the website and plan Continue Reading...

HSBC Bank USA: Efforts in Term Paper

It is highly unlikely that they would become involved with illegal activities knowingly. However, the complicated nature of compliance risk and the high expectations within the banking industry make it possible that some legal manner might be overlo Continue Reading...

Wireless Broadband Technology Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connect Continue Reading...

Sexual Harassment Essay

Essay Topic Examples 1. The Psychological Implications of Sexual Harassment in the Workplace:      Explore the long-term psychological impact of sexual harassment on employees and the ripple effect it may have on their persona Continue Reading...

Personal Health Information Security Essay

Case Study: Information Security Issue Macro-view of the Problem The hospital faces a problem of end-user security: sensitive data is vulnerable to exposure in the workplace as the end-user methods of using computers in the hospital are ineffective t Continue Reading...

Drug-Testing-and-Drug Essay

people engage in recreational activities. Sometimes these activities involve the use of alcohol or drugs. Although people can engage in some alcohol and drug usage dependent on state and federal legislature, many drugs remain prohibited. Because mos Continue Reading...

Nursing-Informatics-and-Nurse Term Paper

Nursing Informatics The site used for this interview is a healthcare facility that offers a range of exposure to a nursing informatics investigation. The preceptor offered valuable insight into the role of the nurse informaticist at the site, and th Continue Reading...

Data Analysis Retail Case Essay

Management The five management programs have the same common dependent variables. These are the average turnover, the weekly profit and the monthly staff time cost. The independent variable for this experiment is the management system that is used. Continue Reading...

Social Media and Employment Process: Essay

The major reason why social media plays a vital role in the recruitment process is because of the fact that applicants reveal more information about themselves via social media than during the normal hiring process. However, while it continues to e Continue Reading...

Occupational Health and Safety The Essay

The safe administration of therapeutic substances involves the five R's - 'Right dose', 'Right Drug', 'Right Patient', 'Right Route' and 'Right time'. [WHO, (1997)] Attending to patient's comfort needs is one of the important nursing responsibiliti Continue Reading...

Whose Computer Is It Anyway Term Paper

Computer Is it Anyway? Should full personal use of Internet access be allowed? The use of computers and access to the Internet are privileges that are widely open for employees in many companies nowadays. However, abuse to the use of email and the Continue Reading...

Educational Leadership Essay

Educational Leadership Select five empirical articles from peer-reviewed journals that you consider critical to your understanding of your specialization In the last several years, educational leadership has become an integral part of helping schoo Continue Reading...

Network Security Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a bette Continue Reading...

C Suite Executive Leadership Ethics Essay

Beliefs, Practices, Challenges Persons in positions of leadership inevitably encounter major ethical dilemmas and in fact make ethical decisions on a daily basis. Interviews with senior executives can reveal the complexities of ethical decision makin Continue Reading...

Information Security Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the a Continue Reading...