SEARCH RESULTS

YOU WERE LOOKING FOR :Employees and Corporate Cyber Security

Essays 181 - 210

PERSUADING AND EXPLAINING: OBTAINING A RAISE

An employee raise is probably the farthest thing from her mind. Heres how such a persuasion might be presented....

Organizational Performance As a Reflection of Organizational Commitment

of commitment, and the way that this applies to the workplace. An interesting model developed by Meyer and Allen (1991) may be ver...

The Role of Employees in Organizational Change

forces will be concerned with improving the organisation. The influences which prevent change are the restraining factors....

Referral Letter from Property Manager

from non-profitable to profitable. It was a commercial property that was quickly headed for bankruptcy but Johns creative ideas fo...

Effects of Layoffs at Verizon

did not intend to lay off people but that is not what employees report on blogs (Goldstein, 2009). One employee in Philadelphia re...

New Organization and Employee Change Processes

1993l Tetenbaum, 1998). If people did not know what to do next, for instance, the manager would feel she had failed (Flower, 1993)...

SWOT Analysis of a Construction Site's Hazardous Working Conditions

project, with each employee being run through the rules, tested for their knowledge of the rules and demonstrating the correct and...

Verizon Employees' Employment Development Presentation

as a form of recognition for its "... commitment to improving quality of life in Rhode Island communities and for the universal sp...

Evaluations for Employee Performance

mission statement of some kind and their entire business is based on this mission statement. It is the goal of the company. And, i...

Developing a Reward and Evaluation System for Timley Pte Ltd.

Timely Pte is a fictional company, which is in need of change to the reward and evaluation processes. The writer considers the way...

The Problem with British Airways

can extrapolate the employee relations is the way in which this relationship takes place. Gospel and Palmer also note that there ...

Types of Employee Behaviors

(Jex, 2002). It is a positive contribution. Counterproductive behavior is defined as employee behavior that runs counter to the or...

Assessing Individual Employee Motivation

This paper is based on information provided by the student. The motivational assessment has taken place on three employees, the w...

Effective Recruitment and Retention

This HRM paper is presented as a set of answers to questions posed by the student. The questions include recruitment strategies fo...

SAMPLE EMPLOYEE MEMOS

Examples of staff memos regarding employee resignations, terminations, transfers and promotions....

SAMPLE EMPLOYEE HANDBOOK -- GENPSYCH

Provides an example of the beginning of an employee handbook....

Electronic Commerce Trading Accessibility and Security Dichotomy

computer. Electronic commerce also includes buying and selling over the World-Wide Web and the Internet, electronic funds transfer...

Security Training Program

Great Healthcare Medical Center will be trained in all aspects of every security need of the hospital. This will focus on physica...

Media Access: National Security Versus Public Access To Government Function

(Killian, 2005; Henning, 2005b; Sapino Jeffreys, 2006). II. UNDERSTANDING THE LAW THROUGH COURT RULINGS The precedent-setting ca...

Legal Malpractice Case

make the injured client whole and that where a course of action has created a loss the damages that rewarded should reflect the va...

Dead End Jobs

an organization designed to move "hardworking inner-city employees into richer jobs markets by providing the job information and p...

More Than Motivation

Some managers equate employee job satisfaction with engagement but the two are very different. Surveys have shown that employees m...

How to Mitigate Risks

There are a number of techniques and methods organizations and businesses can use to mitigate risks. This essay discusses three me...

Information Warfare (IW) and Cyber-Terrorist Activities

The concept of information warfare is not new, it has been around for centuries, while cyber-terrorism is new. Despite this the tw...

HSO and the Changes in Management Information System

This 8 page paper gives an overview of security issues for organizations. This paper includes discussions of sensitive materials a...

American Social Security in the Future

This 7 page paper gives an overview of the current and future state of Social Security in America. This paper includes a discussio...

Investigating Cyber Bullying Using The Internet

This essay pertains to critiquing three Internet sources, a blog, a video and a podcast, as to their validity and applicability to...

The Effects of Cyber Bullying on Adolescents

This research paper addresses the topic of cyber bullying as an issue that negatively affects the health of adolescents. Ten pages...

Cyber Bullying, Effects on Teens

This research paper offers additional research findings than its shorter version khcyberbully.doc. Both paper discuss research fin...

Indonesia, Various Societal Features

This research paper discusses various aspects of Indonesian society, such as security of work, employment statistics, social secur...