SEARCH RESULTS

YOU WERE LOOKING FOR :Controlling Workplace Internet Usage Through Planning

Essays 91 - 120

UK Workplace Absenteeism Management

METHODOLOGY There are several different approaches that can be used to combat absenteeism in the workplace. One of these program...

Workplace Technology and its Negative Aspects

In five pages this paper examines the negative impacts of workplace technology in a consideration of piracy and hacking problems a...

Different Health Plan Types

12 pages and 12 sources used. This paper provides an overview of an emerging system in providing health benefits by employers. T...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Family, Gun Control, and Health Policies of Al Gore

In 5 pages this paper outlines Al Gore's presidential policy platform which includes workplace daycare facilities, gun control leg...

Corruption of Business Through the Computer Security Endangerment of Internet Hacking

is practically nothing that computers do not influence in one manner or another, which has caused society to render itself depende...

Performance Related Pay and Workplace Performance Management

the employee should be motivated to perform to a higher standard. Before we consider the impact that this has on motivation and ...

Working Women and Birth Control

late in her life, she supported Gregory Pincus when he developed the birth control pill (Anonymous 84). It was not until women h...

Workplace and Abuses of the Internet

so new, companies are still coming to grips between the need to monitor employee use of the Internet and interfering with employee...

Operations Management and Small Business

is costly and too little results in lost sales and a decline in customer goodwill. It is not easy to calculate the amount of inven...

Issues of Privacy, Workers, and the Internet

monitored if they arent doing their jobs properly, or are using Internet resources for things other than work-related tasks. Downl...

Managerial Control Removed by Workplace Technology?

indicated that there is an increased level of production (Johnson and Bharadwaj, 2005). However, this may be more an issue of the ...

Internet Era and Management

Vint Cerf (1989) noted that the "reliable operation of the Internet," (710) not to mention the correct use of resources when it ca...

The Internet Law of Australia

included in Schedule 2 of the Communications Legislation Amendment Bill 2002,: "exempt entire documents (that...

Internet, Public Documents, and Government Control

In fifteen pages this paper discusses the Internet and how the government has endeavored to control public document assess in the ...

Internet and the Impossibility of Censorship

In five pages this paper discusses how lawful censorship of Internet pornography is nearly impossible because of its widespread ca...

The Uses of TCP/IP Protocol Today

their old SNA (systems network architecture) for crucial applications (Passmore, 1997) as real or potential hybridization of netwo...

Government Regulation and Computers

looking into various forms of regulation concerning taxation and prohibition based on pornography laws. Also, pornographic materia...

Case Study on Internet Marketing

Therefore, our small company may decide to attempt to sell not only nationally, but also internationally. Before the internet the ...

Internet Laws and Pornography

has no place debating the issue. The primary issue with regard to Internet control is how it negatively affects society by being ...

Implementing an eBusiness Solution

the traditional mail order and once on the internet, or even twice on the internet. With the traditional mail order when a custome...

Tourism and the Internet

the internet as a distribution channel. 2. Patterns and Influances on in Tourism Tourism is one of the few areas of continued ...

THE AVAILABILITY OF INTERNET PORN: AN ETHICAL DILEMMA

This brings up the ethical question - should outsiders get into the act and put all kinds of filters on the Internet? Can...

The Regulatory Framework for Internet Banking in the United States

Traditional banking regulations have not been sufficient to cope with the challenges presented by the online environment and the i...

Organized Crime Controlling

that context, organizational crime is aligned with academic integrity. Plagiarism would fall under that category. Falsifying docum...

Technology and Globalization

that the world was round, following the voyage of Christopher Columbus to America, when seeking to find a route to India, a journe...

Europe and America: Political Structure, Government, and the Internet

to say that conservatives generally prefer the status quo, and look at the past with longing, while liberals work for change, beli...

Regulating the Internet

supplies. Ramirez, himself, did not make these purchases. Weeks later he was to learn that he had, in fact, been a victim of ident...

IT Professionals and Data Collection

may be asked. A tool that has become increasingly popular is that of the pop up survey. The pop up survey will...

Internet Education

In relationship to the pros and the cons one author notes that the student can take classes from anywhere, can take classes on sub...