SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology Employee Abuses and Company Protection

Essays 1231 - 1260

Mercury Web and Graphic Designs Inner Operations Assessment

In a paper consisting of six pages the slippage of production levels along with low employee morale for Mercury Web and Graphic De...

Employee Motivation and Compensation

In eleven pages motivating employees examined in a consideration of such theories as Maslow's hierarchy of needs with a Walton Ent...

The Performance Appraisal

In a paper consisting of five pages workplace performance appraisals are discussed in terms of the reasons for there administratio...

Contemporary Work Ethics, Managers, Employees, and Peers

In five pages this paper examines the workplace changes that have occurred in recent years and discusses the impact upon work ethi...

Process of Appraising Employees

In five pages this paper examines the relationship between employer and employee in this consideration of the process of employee ...

Rights of Employees and Disciplinary Process

In twelve pages employee rights are considered as they relate to job termination and discusses types of disciplinary processes tha...

Study Questions on Management Theory

Kelleher could be used as an example of such a winning CEO. Superlative communications abilities of course are important, b...

Greece's Forever Living Products and Employment Motivation Measurement

In thirty five pages this paper discusses Greece's Forever Living Products in a consideration of how to measure employee motivatio...

Fictitious Case Study on Workplace Sexual Harassment

VII and other pertinent information. MEMORANDUM To: Robert Brown, CEO From: Arthur Taylor, Research Assistant (Legal Departme...

Workplace Compensation

In eleven pages discrepancies of compensation in the workplace are evaluated with such topics as technological change along with a...

'Bad Attitude' Employee Management

In five pages this paper discusses the fictitious employee Joe Smith and how to develop the potential of this employee who frequen...

Human Resource and Answering 2 Questions

In five pages HR questions on enhancing improved employee relations through communications and the employee relations benefits gai...

Influences in Change - Ambivalence and Emotion

The writer looks at literature dealing with employees feeling during the change process. The first section considers how and why ...

Honesty in Change Management

The writer considers whether or not it is necessary for leaders and management to be honest with employees during the change proc...

Possible Case of Elder Abuse

There are many kinds of abuse, including mismanagement of their money, physical and/or emotional abuse, and neglect. It is a trage...

Dependence and Addiction

There is a scale of addiction-on one side is complete abstinence, to abuse, to dependence, to addiction. It is very difficult to h...

Issues for Restaurant Managers

The food and beverage sector is more likely to be challenged with harassment lawsuits because of the close environment in which em...

The Impact of Employee Performance Assessments on Employee Commitment

The writer presents a project to assess the way in which performance assessments or appraisals may impact on the level of commitme...

Job Satisfaction Motivation and the Leader

A great deal has been written about how leadership styles and behaviors impact and influence employee motivation, job satisfaction...

Multicultural Workforce

This paper discusses why employees consistently fail a test following diversity training. The paper discusses expectancy theory an...

Information's Function in the Context of Managerial Decision Making

This research paper examines two areas in regards to this topic: the role of manager and also how managers utilize information in ...

Information's Role in the Changing U.S. Culture

This discussion addresses vaious issues on the role that information plays within this technologically oriented age and the writer...

Global Data Security

type of electronic data and information is highly vulnerable to breaches. The Global Security Market and Trends This is a growi...

Information Warfare versus Information Intelligence

from the Cold War. While some of the information in this article is outdated, i.e. the section pertaining to Y2K, the majority of ...

Knowledge Creation and Tesco; The Successful Use of Technology and a Loyalty Scheme

1. Introduction The commercial environment is becoming increasingly competitive. Companies need to find ways of keeping and then...

Implications Of Implied Warranties In The Technology Sector

protect consumers from shoddy workmanship and defective products. The small print on the back of a package or bottom of a service...

Electronic Commerce Trading Accessibility and Security Dichotomy

computer. Electronic commerce also includes buying and selling over the World-Wide Web and the Internet, electronic funds transfer...

Information Systems and Information Technology: Still Providing a Competitive Advantage?

on the manufacturing sector. There, the author says, the "competitive advantage is provided by integrated information systems" (T...

Turkle's "Can You Hear Me Now?" - Summary/Response

his species - has long been a determinant of how advanced human beings have become throughout the ages. Fire established man as a...

Organizational Development Case Study

either. Instead, it is a mixture of Taylors scientific model, autocratic and laissez-faire. Let me explain by providing a brief in...