Investigation And Research Of Information Technology In The Workplace

Page 6 of 50 - About 500 Essays
  • Premium Essay

    The Emereald

    The Emerald Research Register for this journal is available at www.emeraldinsight.com/researchregister The current issue and full text archive of this journal is available at www.emeraldinsight.com/0268-6902.htm Anatomy of computer accounting frauds A. Seetharaman, M. Senthilvelmurugan and Rajan Periyanayagam Faculty of Management, Multimedia University, Malaysia Keywords Fraud, Corruption, Financial reporting, Whistleblowing, Internal control, Corporate governance Abstract This paper introduces

    Words: 8560 - Pages: 35

  • Premium Essay

    Electroinc Surveillance of Employees

    environments to maintains security, by monitoring employees and to deter theft. There are laws set in place to also protect the privacy tof employee’s personnel records, including personal data, medical information and health status, social security numbers, background screenings information, financial and everything else that could invade a persons privacy. Is Herman's need to know whether his salespersons are honest a sufficient ground for utilizing electronic surveillance? The answer

    Words: 4553 - Pages: 19

  • Free Essay

    Human Resource

    Production Supervisor: Graphic Design: Production & Layout: Patricia M. Trainor, J.D. Susan E. Prince, J.D. Elaine V. Quayle Isabelle B. Smith Catherine A. Downie Sherry Newcomb This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If legal advice or other expert assistance is required, the services of

    Words: 23795 - Pages: 96

  • Premium Essay

    Royal Commission on Safety in Mines

    workers| ANS: d PTS: 1 REF: p. 7 BLM: Remember 3. Which of the following is an example of an employer’s responsibility under OH&S legislation? a.|providing financial support for injured workers | b.|cleaning up the workplace before an inspection | c.|conducting research on health and safety issues| d.|preparing a written occupational health and safety policy | ANS: d PTS: 1 REF: p. 12 BLM: Remember 4. According to the text, what was the primary reason that supervisors on construction

    Words: 2411 - Pages: 10

  • Premium Essay

    Coordinator Debate

    Heidegger: Firstly and most of the time we are not scientists. Science only starts when the equipment breaks down. Consequence: Technology precedes science. Both historically and logically. Don Ihde: ”All science is technoscience” ”No instruments, no science” 20 Heidegger: Die Frage nach der Technik Another iconic contribution to the philosophy of technology. Most often as a punching bag. Many criticize Heidegger’s attempt to talk about the ”Technik” in singular. But when connected

    Words: 5229 - Pages: 21

  • Premium Essay

    Leg500

    in the Workplace. In this modern world is difficult to determine where our private life begins and ends and where our work life start, through the years we have seen how employees sometimes take advantage of the resources available to them in their workplace and use them for personal gain, this has led the company to have better control of the activities performed during employee work hours, such as phone calls and internet use. Employees are accustomed to using the technology made available

    Words: 1248 - Pages: 5

  • Premium Essay

    E-Cigarette

    Your family is your greatest treasure and your home your safest citadel from the unwanted influences of the world. That's why monitoring software to track and log internet and computer use is a necessity. It lets you block and filter a host of influential content that could prove harmful to your children's development and the overall peace of your home. Just knowing that monitoring software is installed on your computer can keep users honest. Everything from pornography to explicit gore, violent

    Words: 5031 - Pages: 21

  • Free Essay

    Impact of Past Crises on Current Crisis Communication

    Coombs Eastern Illinois University Previous research based on Situational Crisis Communication Theory (SCCT) suggests that an organization’s past crises history affects the reputational threat posed by a current crisis when that crisis results from intentional acts by the organization. The study reported on in this article provides a wider test of crisis history to better assess its role in crisis communication. Results from the present investigation showed that a history of similar crises intensified

    Words: 11305 - Pages: 46

  • Premium Essay

    Scale Development Theory

    creates a race between the major manufacturers. A connected watch got several elements differentiating it from other existing watches. As its name indicates, it is connected to the web or a smartphone. Generally, the watch uses Bluetooth or Wi-Fi technology to allow the connection with your phone, or a

    Words: 2344 - Pages: 10

  • Premium Essay

    Student

    on Mercy Corps (INGO) By Hazar Jaber Supervisor Dr. Sami Abou-Al-Ross A dissertation plan submitted in partial fulfillment of the requirements for the degree of Master of Business Administration Dec 2014 * Introduction Many research studies have shown that leaders have a strong effect on their subordinates’ behavior and attitudes (Van Dam, Oreg & Schyns, 2008). This relationship is often referred to as the Leader-Member Exchange (LMX) relationship, which demonstrates the

    Words: 2367 - Pages: 10

Page   1 2 3 4 5 6 7 8 9 10 50