...5-1 Human Resource Planning and Virtual Human Resource Management Discussion Question: 1. How has the emergence of the internet changed the way that organization plan and manage their human resource needs? 2. What kind of future human resource activities might we see developed over the next several years? 3. What are the legal and ethical issues surrounding the use of the Internet by individual employees for human resource activities? Are you concerned about violations of your own privacy because of these kinds of web application? 4. What specialized skills will the future HRIS professional need in order to effectively manage an organizations virtual human resource function? Problem Statement: Possible abuse (legally and ethically) of internet in an organization. Analysis and Evaluation: Technology in an organization nowadays is a necessity. The use of internet plays a big role the way organization plan and manage their human resource needs. Human resource personnel no need to have an effort for example before they use to have posters or brochures and go to different barangays or different areas to look for applicant. They also go to different newspaper companies to post their opening positions. But nowadays, Human Resource personnel no need to go to different areas, just to look for applicants because of internet. Through internet they can now interview personnel in and outside the country by applications like skype wherein you can virtually see the person...
Words: 772 - Pages: 4
...Tracking System Leslie Seo Fashion Institute of Design and Merchandising Abstract This paper explores the ethics of the internet search engine, Google, using algorithms for tracking their users’ search quires and their internet history through their email and how using this information, extends the benefits of this technology to users and to businesses. Although, many people view this as a liability, they do not understand how much information about their preferences are invaluable to businesses in order for them to make profitable advertisements. Most of the public view this as a liability as they do not understand how Google does not specifically track the person at all the algorithm only records what the user has accessed online. There will also be recommendations for users who are still uncomfortable with having limited search quires available for third-party corporations. Ethics of Google’s Tracking System It is clearly visible that the internet is a highly useful resource that can be used for economic expansion. According to the Encyclopedia of Computer Science (2003), the internet started by the name of Arpanet which was used as research work for the U.S. Department of Defense. The internet has evolved very much since then. Now, everything is related to the internet whether it is a social network, shopping, and an outlet for advertising. However in order for a search engine to run itself, there must be revenue and...
Words: 1340 - Pages: 6
...most aggressive and fast growing commodity in today’s world without a doubt is the internet. It’s truly amazing how we can achieve what we want with just a click of a button. A business man can gain all the market knowledge while sitting in his office, students can access thousands of documents they wish to research on unlike earlier times when they had to physically go through hundreds of books. It’s true that the internet has made a huge impact on our lives and has made us more accessible. But is this impact considered to be good or is it bad? Most people would argue it is certainly a positive impact on mankind, but just like every coin has two sides the internet also portrays both the sides. Internet is certainly a blessing in many ways but at times it can become a curse too. This concern gives birth to governance of the internet. “Internet governance is a broad term used in many different contexts, applying to activities as diverse as coordination of technical standards, operation of critical infrastructure, development, regulation, and legislation, among others” (1). Issues like child pornography, identity theft and criminal activities are just few of the major reasons for internet to be controlled. The best way to govern it would be by placing certain restrictions over it and denying access to certain web pages, but it’s not as easy as it sounds. With placing restrictions on the internet another major issue arises that of net neutrality. What is net neutrality? , The term...
Words: 977 - Pages: 4
...Free Trade in the Real World: Competing perspectives about the role and impact of trade in developing countries. By James Lawrie Since the end of the Second World War the Western World has lead the way in the quest for free trade between nations. In particular, various arms of The United Nations, chiefly The World Bank, The International Monetary Fund (IMF) and The World Trade Organisation (WTO) have been the main bodies through which the developed world has pushed its agenda of liberalisation. The policies pursued by these supranational organisations are based on western economic concepts and theories and have become broadly known as the ‘Washington Consensus’, a term first coined by John Williamson in 1989. The Washington Consensus is rooted firmly in the Neoclassical approach to economic thinking and has been criticised by two main schools of thought; Structuralists and Dependency Theory. These two schools question many of the assumptions made by the Neoclassical framework and use real world observations to discredit Neoclassical policies. While Neoclassical theory suggests that all free trade is eventually mutually beneficial to everyones welfare, Dependency Theory advocates argue that free trade is a destructive force and a threat to the Developing World or the Least Developed Countries (LDC’s). Structuralist make their position in the middle ground and acknowledge that while there are gains from free trade to be made for LDC’s and Developed Countries (DC’s) alike...
Words: 2331 - Pages: 10
...age. Internet and social media begin playing irreplaceable roles in everyday life as well as business. What changes of corporate reputation appeared under the digital era, and what do corporates react to those changes are discussing in the report. Key issues and how to address are also provided. Key Differences in Corporate Reputation Pre and Post Digital Age The earliest version of the Internet, Web 1.0 was composed of about 250,000 sites and 45 million users worldwide in 1996. However, with Web 2.0 appeared in 2006, with about 80,000,000 sites and over one billion users1, a new digital age has arrived, giving more opportunities and threats for business. The new era brings three key differences for corporate reputation. Geography and Demography With the growth of global Internet, news can deliver all around the world. Things happened in Asia can be post online and read by North Americas, vise versa. By 2013, there are 39% Internet users globally (world population is 7.1 billion), see Table 1. Especially for international companies, who have locations around the world, corporate reputation is more globally involved. For example, Pepsi was criticized by people worldwide because of its brutal treatment to workers in India2. Also, because that computers and Internet have been owned by increasing number of people, more people are involved. Consumers are influenced by word of mouth, online reviews/research result, news, and all kinds of channels available on the Internet (see...
Words: 1783 - Pages: 8
...By Leaps and Bounds Technology is a wonderful aide in our society. Having the ability to access information at the stroke of your fingertips is a gift to people. We are able to research on the go, carry multiple books to read in the palm of your hand, and even be able to navigate digitally rather than carry a paper map. There are so many benefits to technology and the advances quickly achieve, in a matter of months! However, like many things in life a good thing can be bad in the wrong hands. As much good technology provides society with by having information in a flash at their fingertips there is the ominous cloud of this same technology gathering information and using it to hurt others. Sharing information has now become dangerous and society must adapt to the ever-changing world of technology and protect them. One of the major changes seen in government was the adoption of the Patriot Act of 2001. This act pertains to the government being able to access personal information and share it under the covering of protection and security. The Department of Justice states, “The Department of Justice’s first priority is to prevent future terrorist attacks. Since its passage following the September 11, 2001 attacks, the Patriot Act has played a key part and often the leading role- in a number of successful operations to protect innocent Americans from the deadly plans of terrorists dedicated to destroying America and our way of life. While the results have been important...
Words: 1016 - Pages: 5
...You pay all of your bills on time, when you use your credit card you pay the balance off when you are supposed to; even more than the minimum payments, and then when you try and go buy a car or a house you are declined due to bad credit. Ever wonder how that can be? Well you might have been a victim of identity theft. What is identity theft you ask? It is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. According to the national association of the attorneys general, “Identity theft is one of the fastest growing crimes in the nation with an estimated 700,000 victims each year and after the victim discovers their theft, they spend an average of 808 dollars to clear up the discrepancies along with 175 hours approx. Restoring their reputation by means of notifying the credit bureaus, cancelling cards, and negotiating with creditors (2006.) Currently those numbers are now even higher at 1,495 dollars in expenses and 609 hours to clean up credit”. Identity theft happens all the time. This is partly caused because of who you trust and what you put on the internet. In the paragraphs to come we will get into the types and stages of identity theft, who it affects and how you can protect yourself. According to the NIJ (National Institute of Justice), there are seven broad types of identity theft and...
Words: 1118 - Pages: 5
...According to Skinner’s theory, “Operant” refers to how an organism operates on the environment, and hence, operant conditioning comes from how we respond to what is presented to us in the environment. It can be thought of as learning due to the natural consequences of our actions (B.F.Skinner,1904-1990). Like all the learning theories out there, Skinners operant conditioning theory has both positive and negative (reinforcement & punishment) feature. There are various strengths to this theory, as well as weakness. Operant conditioning explains a broad range of phenomena, such as when a person is rewarded for a behaviour, it is more likely for it occur again. Many organisation employ the use of positive reinforcement to builds confidence and helps employees have a more pleasurable experience at work. While, avoid the side-effects of punishment or negative reinforcement, such as frustration, anger, anxiety and depression( Kashdan and Fincham,2004,p 484 as cited in Leslie E, Linsey N, Richard, 2012). Case study, Airbnb.Inc gives all of its employees $2,000 a year to travel anywhere in the world they want to.Besides the awesome travel stipend, Airbnbers allowed to bring their pets to work every day, they go sailing together, have a ping pong table, weekly Yoga classes is provide and get to eat organic lunches on a daily basis(Natalie W,2013). Positive reward will motivates efficient workers to continue to do a good job.In contrast, lack of reinforcement leads to job dissatisfaction...
Words: 2209 - Pages: 9
...* Trade Secrets * Highly confidential and important non-public information. 1. About company’s inner structure 2. Classified records 3. Systems 4. Future plans 5. Policies * If this will be knowned by competitors could place the company into a competitive disadvantage. Example: Formula in making San Miguel Beer Banking industry – marketing strategy, portfolio of big-time clients, salary level of its middle manager Jollibee’s main ingredient to its chicken joy Broadly speaking, any confidential business information which provides an enterprise a competitive edge may be considered a trade secret. The unauthorized use of such information by persons other than the holder is regarded as an unfair practice and a violation of the trade secret. * Difference of Trade Secrets from personal skills? * Skills and training that an employee acquired an developed from his work experience in the company are not trade secrets. * In other words, his technical skills which he personally developed through time cannot be considered property of the company. * Motives in pirating a “LOADED” employee/officer of competitor? (1) The company wants the experience and skills of employee. * By headcounting, the 2nd company will definitely benefit from the training, experience, and solid background the pirated individual has acquired from the 1st company. (2) Wants to acquire its competitor’s trade secret. * Not only experience...
Words: 600 - Pages: 3
...IT Doesn’t Matter Many years ago, in order to send a letter or communicate with someone from place A which is far away to place B was very difficult. It could take him/her long time to do. Also, trading from country A to country B had a lot of obstacles about geographic boundaries. However, when computers, Internet, and computer applications (technology information - IT) were appeared, they have pushed society up to a high level. Geographic distance is not a difficulty. People can easily communicate via email, chat or call. Today, almost of work is automatic, and it totally depends on computers. This leads to development in IT. Nevertheless, in Harvard Business Review article, Carr (2003) wrote that “IT Doesn’t Matter”. This causes confusion and debates. The first point is that IT is as a commodity. A single company can own proprietary technologies and use them to build competitive advantage because it is hard to replicate. On the contrary, infrastructural technologies are the property which “when shared” in industries rather than “when used in isolation”. A technology that is broadly shared to use cannot create competition. Thus, in his opinion, due to minimize costs, reduce vulnerabilities and restrict risk, Carr (2003) admitted that “IT has all the hallmarks of an infrastructural technology” rather than a proprietary technology. IT can be easily commoditized. First, he said IT is “a transport mechanism”, especially in data. By comparing IT with other commoditized...
Words: 1242 - Pages: 5
...Schnatter Distinguished Professor of Free Enterprise in the Department of Economics at Ball State University, where he also is a partner at the John H. Schnatter Institute, and he has 4 books published, according to his Wikipedia page. What he claims to be true in the article is what the title says-Capitalism is good. “The competitive market process has made education, art, and culture available to more and more people. Even the poorest of Americans, not to mention many of the global poor, have access through the Internet and TV to concerts, books, and works of art that were exclusively the province of the wealthy for centuries.” (Paragraph 7) This quote from the article “Why Capitalism is Good for the Poor” is using pathos to persuade the reader to believe his claim. The quote speaks of how good capitalism is by provoking the reader to feel sympathetic for the very fact that capitalism has been the reason that poor people from all around are now able to access the internet, as well as TVs, concerts, books, and works of art, which makes the fact “all of this was possible because of capitalism” seem like capitalism is in fact good . The article goes on to say “The poor in largely capitalist countries have access to a quality of medical care and a variety and quality of food that the ancient kings could only dream of.”(paragraph 8) This again is pathos being used to connect with the reader’s emotion. No matter your financial status you will either feel empathetic after reading that...
Words: 1452 - Pages: 6
...The Background Introduction Helter Skelter, Inc. founded in the late 1960’s is a large public company producing the component parts that are integral for high performing automobiles. It also opened the market in Asia to provide component parts for emerging auto manufacturers in the past ten years. The company is highly successful and has a track record of long stretches of reporting consecutive profit growth. Dagwood Blemish is the founded-CEO of Helter Skelter, Inc. Blemish has been the single leader of Helter skelter, Inc. for the last 15 years and his proclaimed leadership style is to serve as the inspirer for good ideas and to facilitate technological advancement. By Blemish’s lead, the company is making between $8 billion to $9 billion annual revenue. Blemish has so high authorism image among the employees that very few individuals say no to him or contradict his directives. Blemish’s growing concern is the large portion of the company overhead dedicated to information technology assets and how those assets can drive better revenue for the company. Reynolds Potter joined Helter Skelter, Inc. in 1998 as the CIO of the company. He has very strong professor background working as top IT officer for a number of high profile and large companies. Due to Potter’s powerful international leadership and his centralized purchasing power in Helter Skelter, Inc. he unfortunately get some animosity from some other company senior leaders who also have the CEO’s ear. As being a founded-CEO...
Words: 1546 - Pages: 7
...on the subject? Please cite all sources The current structure of the internet can be described as "open" because it allows both consumers and businesses to communicate; as well as create, share, and access content without restriction or boundaries. The concept behind the The "Open Internet" structure is Net Neutrality, defined by the Oxford Dictionaries as "the principle that internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites." Currently, net neutrality plays a substantial role in the competitive landscape of our current business markets. The current "open" structure of the internet allows for better communication, creativity, innovation, and access to markets as well as products for both organizations and consumers . Net neutrality has somewhat leveled the "playing field", and made it possible for smaller organizations to compete in the same markets as established organizations that have access to larger amounts of capital. Recently, President Obama released a statement calling net neutrality "essential to the American economy" due its ability to "lower the cost of launching a new idea, ignite new political movements, and bring communities closer together." In my opinion net neutrality isn't a good long term solution. While I do believe there should be a basic level of internet service provided at no charge (similar to our current situation), I also...
Words: 1776 - Pages: 8
...What is Ethical Hacking Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean “The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts(who refer to cyber-criminals as "crackers"), the second definition is much more commonly used.” – Definition by Internet Security Systems In the context of “ethical hacking”, hacking refers to the second definition –breaking into computer systems. It can be assumed that hacking is illegal, as breaking into a house would be. At this point, “ethical” comes into play. Ethical has a very positive touch and describes something noble which leads us to the following definition of ethical hacking: Ethical hacking describes the process of attacking and penetrating computer systems and networks to discover and point out potential security weaknesses for a client which is responsible for the attacked information technology environment. An ethical hacker is therefore a “good” hacker, somebody who uses the methods and tools of the blackhat4 community to test the security of networks and servers. The goal of an ethical hack is neither to do damage...
Words: 1321 - Pages: 6
...The USA PATRIOT ACT, commonly known as the Patriot Act, is an acronym for Uniting and Strengthening America by Providing Appropriate tools required to Intercept and Obstruct Terrorism Act of 2001. On October 23, 2001, Republican Rep. Jim Sensenbrenner introduced H.R. 3162 incorporating provisions from a previously sponsored House bill and a Senate bill also introduced earlier in the month. The next day on October 24, 2001, the Act passed the House 357 to 66, with Democrats comprising the overwhelming portion of dissent. The following day on October 25, 2001, the Act passed the Senate by 98 to 1, with Russ Feingold the only opposition. This act was signed then into law by former president George W. Bush on October 26, 2011, just six weeks after the September 11th attacks to the World Trade Center and the Pentagon. This act reduced restrictions in law enforcement agencies’ gathering of intelligence with the U.S. The act also expanded the definition of terrorism to include domestic terrorism. The Patriot Act made many changes to U.S. law, such as the Foreign Intelligence Surveillance Act of 1978 (FISA), the Electronic Communications Privacy Act of 1986 (ECPA), the Money Laundering Control Act of 1986 and Bank Secrecy Act (BSA), as well as the Immigration and Nationality Act. It was strongly opposed by Senator, Russ Feingold; he was the only Senator to vote against the bill. The final Act had a number of sunsets that was supposed to expire on December 15, 2005. On May 26, 2011, President...
Words: 2019 - Pages: 9