SEARCH RESULTS

YOU WERE LOOKING FOR :Employees and Corporate Cyber Security

Essays 181 - 210

SAMPLE EMPLOYEE MEMOS

Examples of staff memos regarding employee resignations, terminations, transfers and promotions....

SAMPLE EMPLOYEE HANDBOOK -- GENPSYCH

Provides an example of the beginning of an employee handbook....

Effective Recruitment and Retention

This HRM paper is presented as a set of answers to questions posed by the student. The questions include recruitment strategies fo...

Assessing Individual Employee Motivation

This paper is based on information provided by the student. The motivational assessment has taken place on three employees, the w...

Developing a Reward and Evaluation System for Timley Pte Ltd.

Timely Pte is a fictional company, which is in need of change to the reward and evaluation processes. The writer considers the way...

Types of Employee Behaviors

(Jex, 2002). It is a positive contribution. Counterproductive behavior is defined as employee behavior that runs counter to the or...

The Problem with British Airways

can extrapolate the employee relations is the way in which this relationship takes place. Gospel and Palmer also note that there ...

SOUTHWEST AIRLINES, ORGANIZATIONAL MODEL AND POSITIVE CULTURE

SWA works toward creating value for its employees, then converting some of that value to customer service, while encouraging behav...

Organizational Performance As a Reflection of Organizational Commitment

of commitment, and the way that this applies to the workplace. An interesting model developed by Meyer and Allen (1991) may be ver...

The Role of Employees in Organizational Change

forces will be concerned with improving the organisation. The influences which prevent change are the restraining factors....

Referral Letter from Property Manager

from non-profitable to profitable. It was a commercial property that was quickly headed for bankruptcy but Johns creative ideas fo...

Effects of Layoffs at Verizon

did not intend to lay off people but that is not what employees report on blogs (Goldstein, 2009). One employee in Philadelphia re...

AN OVERVIEW OF HUMAN RESOURCES RECRUITMENT

Focuses on the recruitment and interview process for an addiction counselor and supermarket employee....

PERSUADING AND EXPLAINING: OBTAINING A RAISE

An employee raise is probably the farthest thing from her mind. Heres how such a persuasion might be presented....

Employee Recruitment Approaches

In sixteen pages contemporary approaches to employee recruitment are considered in a discussion of such topics as curriculum vitae...

Employee Recruitment on the Internet

In eight pages this paper discusses the Internet as a tool increasingly utilized by employers to recruit employees....

Media Access: National Security Versus Public Access To Government Function

(Killian, 2005; Henning, 2005b; Sapino Jeffreys, 2006). II. UNDERSTANDING THE LAW THROUGH COURT RULINGS The precedent-setting ca...

Security Training Program

Great Healthcare Medical Center will be trained in all aspects of every security need of the hospital. This will focus on physica...

Electronic Commerce Trading Accessibility and Security Dichotomy

computer. Electronic commerce also includes buying and selling over the World-Wide Web and the Internet, electronic funds transfer...

Dead End Jobs

an organization designed to move "hardworking inner-city employees into richer jobs markets by providing the job information and p...

Legal Malpractice Case

make the injured client whole and that where a course of action has created a loss the damages that rewarded should reflect the va...

More Than Motivation

Some managers equate employee job satisfaction with engagement but the two are very different. Surveys have shown that employees m...

Investigating Cyber Bullying Using The Internet

This essay pertains to critiquing three Internet sources, a blog, a video and a podcast, as to their validity and applicability to...

The Effects of Cyber Bullying on Adolescents

This research paper addresses the topic of cyber bullying as an issue that negatively affects the health of adolescents. Ten pages...

Cyber Bullying, Effects on Teens

This research paper offers additional research findings than its shorter version khcyberbully.doc. Both paper discuss research fin...

Information Warfare (IW) and Cyber-Terrorist Activities

The concept of information warfare is not new, it has been around for centuries, while cyber-terrorism is new. Despite this the tw...

HSO and the Changes in Management Information System

This 8 page paper gives an overview of security issues for organizations. This paper includes discussions of sensitive materials a...

How to Mitigate Risks

There are a number of techniques and methods organizations and businesses can use to mitigate risks. This essay discusses three me...

American Social Security in the Future

This 7 page paper gives an overview of the current and future state of Social Security in America. This paper includes a discussio...

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....