Monday, May 18, 2020
Human Trafficking Supply Chain Risk - 1160 Words
ntro: Human Trafficking Supply Chain Risk When the media talks about human trafficking, the first thing that comes to mind is the kidnapping and sale of women and children. Of girls lured from their homes. But human trafficking is more than just sex trafficking. Many victims of trafficking are conscripted into modern-day slavery through force, fraud, or coercion. This takes the form of debt bondage, forced labor, and involuntary child labor. Human Trafficking is also a supply chain issue. Human trafficking in the supply chain may take many forms. For example; a consumer might stay at a hotel where the sheets were made from cotton harvested by migrant farmers who work with no water and no rest. Consume a chocolate they found on their pillow, made from cocoa beans picked using child labor. Order shrimp for dinner which was fished using forced labor and where the dishwashers and servers have had their passports confiscated. Take a call on their cell phone, which uses materials that wer e mined by children and assembled by bonded labor. This is more than an ethical issue; it is a business issue. President Obama noted that human trafficking slavery ought to concern every business because it distorts markets.â⬠Consumers and investors have an increased awareness of supply chain risk, and an increased aversion to companies perceived of exploiting slave labor. To address these moral and economic issues the United States and other governments are actively passing legislationShow MoreRelatedZimbabwes Struggle For Human Rights Abuses1420 Words à |à 6 Pagesdiamond market, there is a plethora of minerals waiting to be mined. Within Africaââ¬â¢s southern region, Zimbabwe has found diamonds to be a vital commodity in sustaining the country. In order to reach these minerals, mining companies must find a steady supply of labor to mine and sort the diamonds before they are later ââ¬Å"sold roughâ⬠in wholesale to dealers, distributed to be cut, polished, and tu rned into jewelry at manufacturing plants, and marketed by retailers to finally be sold to customers. (LevinRead MoreTheu.s. Constitution : Abolition Of Slavery837 Words à |à 4 PagesS. Constitution, which includes the 13th Amendment. The 13th Amendment, passed by Congress in 1865, explicitly states that neither slavery nor involuntary servitude shall exist in the United States. Jordheim, Alisa. Made in the USA: The Sex Trafficking of America s Children. Oviedo, Florida: HigherLife Publishing and Marketing, 2014. Author, Alisa Jordheim exposes the growing problem of child exploitation in the United States. This book includes a series of personal narratives. Five (5) adultsRead MoreWomen And Children Are The Primary Targets Of Human Trafficking1421 Words à |à 6 PagesIn Vietnam, women and children are the primary targets of human trafficking through the use of deceitful measures which leaves them especially vulnerable. As global citizens, we should be actively involved in international measures in order to combat this severe violation of human rights. BODY PARAGRAPH 1 ââ¬â WHAT IS THE ISSUE? Vietnam has a high rate of human trafficking where women and children are most likely subjected to sex trafficking and forced labor within the country and across the globeRead MoreSex Trafficking : The Second Largest Illegal Industry1638 Words à |à 7 PagesSex-trafficking is the second largest illegal industry in the world. When a community produces generations of pimps, who can supply prostitutes with impunity from the law, this can be a recipe for disaster. For the city of Tenansingo (in the state of Tlaxcala Mexico), pimping and acquiring prostitutes has become a way of life for this small community. Pimps have mastered the art of tricking women into prostitution, which feeds the transnational sex-trafficking industry and impacts the internationalRead MoreWild Life Trafficking Essays944 Words à |à 4 PagesTrafficking is a form of smuggling that has a long history throughout the world. Just like any trade, the forms of trafficking differ as to what is needed in the market. Ex amples of trafficking and smugglings include: drugs, weapons, alcohol, tobacco, women, children and all forms of wildlife (animals and plants). Wildlife trafficking is a serious threat to the environment. Animals, for example, are usually stolen from their natural habitat and sold in the black markets for large sums of money. RemovingRead MoreHuman Trafficking in the United States Essays927 Words à |à 4 Pagesare granted as a citizen of the United States,- human trafficking is an enormous issue that is often overlooked. In fact very little light is shown on this topic, but the awful reality is there. Every day women, children, and even men are kidnapped, taken from their families, and forced into free labor and sexual exploitation. According to a new report from the National Human Trafficking Resource Center as many as 9,298 cases of human trafficking have been reported in the past five years, but theseRead MoreHow Much Would You Sell For?1131 Words à |à 5 Pagesand Crime (UNODC), Trafficking in Persons is defined as the recruitment, transportation, transfer, harbouring, or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation. The most common forms of human exploitation are sexualRead MoreSubmission to Local Network1039 Words à |à 5 Pagestwo in the ten principles of the Global Compact. Principle one requires that business should respect human rights including those in the Universal Declaration of Human Rights. And businesses are asked to do something to undertake more environmental responsibility under principle eight. ââ¬Å"As an established industry leader in the areas of human rights and ethical businessâ⬠(see Embedding Human rights in Business Practice iii), we believe Cadbury has a ground to say in these respects. We quite agreeRead MoreThe Unspoken Captivity : Retrospectives On Human Trafficking3262 Words à |à 14 PagesCaptivity: Retrospectives on Human Trafficking Brandon Howell, Kyounga McElroy, Susan Pawlak, Barbara Gardner Davenport University ââ¬Æ' The Unspoken Captivity: Retrospectives on Human Trafficking Human trafficking is a method of modern day slavery which entails the illegal trade of persons for sexual exploitation or forced labor. Each year thousands of men, women and children are victims of this suppression. Countless countries including the United States are affected by trafficking. Habitually, traffickersRead MoreAuret van Heerden is the President of the Florida Labor Association1034 Words à |à 4 PagesHeerden highlight issues with supply chain such as child labor, human rights abuses and the huge ethical and moral dilemma this presents to us all as consumers and as fellow human beings. In 1996 President Clinton convened a meeting at the White House which was attended by industry, human rights NGOs, trade unions, the Department of Labor, in which a task force was formed and they spent about three years arguing about who takes how much responsibility in the global supply chain. Companies didnt feel it
Wednesday, May 6, 2020
Midterm Review - 2002 Words
The Federal Circuit Court of Appeal has appellate jurisdiction over the U.S. Claims Court. True Which of the following terms best describes the decision reached by an arbitrator? Award The dispute resolution method that is most likely to be used by a regulatory agency to negotiate the provisions of the regulations with the interested groups so that there is less likelihood of a challenge once the regulations are promulgated is: regulatory negotiation With reference to the federal government, which of the following is definitely true regarding a system of checks and balances? Only one of the branches is given all the authority. All the branches of the government are given equal authority. All the branches of the government operateâ⬠¦show more contentâ⬠¦assault. disparagement. battery. Which of the following is one of the defenses to negligence? The tort was committed in defense of self or others. The plaintiff contributed to the injury by doing a negligent act him- or herself. The tortfeasor did not have the intent to harm. The tortfeasor was as careful as possible. What is meant by appropriation of name or likeness? Using someones name or photo, usually in an advertisement, without his or her permission Intentionally publishing something that puts another in an unfavorable or untruthful light, though it is true Intentionally intruding into a space someone has a right to consider private Widely disseminating information about someone which, though true, is highly private and need not be publicized Antitrust crimes involve unfair marketing techniques and conduct designed to eliminate competition through unfair means. True Tenants by the entirety is a form of holding property that is specific to married couples. True _____ includes land and anything permanently attached to it such as houses. Tangible personal property Real property Intangible personal propertyShow MoreRelatedMidterm Review1485 Words à |à 6 PagesInteractive Management Science MSamp;E 107/207, Midterm Review The Flaw of the Averages Mindle 1 / Uncertainty vs. Risk * Risk is in the eye of the beholder * Risk reflects how uncertain outcomes cause loss or injury to a particular individual or group * Risk attitude measures the willigness to incur risk in the quest of reward * Different risks to the same uncertainty Mindle 2 / An uncertain number is a shape * A distribution * ââ¬Å"Uncertain numbersâ⬠* Risk is subjective Read MoreMidterm Review Essay963 Words à |à 4 Pagesâ⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ MComm100â⬠©Ã¢â¬ââ⬠©Massâ⬠©Communicationâ⬠©inâ⬠©Societyâ⬠© Midtermâ⬠©Reviewâ⬠©Ã¢â¬ââ⬠©12thâ⬠©Edâ⬠© (Chaptersâ⬠©1â⬠©Ã¢â¬ââ⬠©9)â⬠© â⬠© Understandâ⬠©theâ⬠©definitionâ⬠©ofâ⬠©Ã¢â¬Ëencodingââ¬â¢Ã¢â¬ © Whatâ⬠©isâ⬠©Ã¢â¬Ënegativeâ⬠©feedbackââ¬â¢?â⬠© Characteristicsâ⬠©ofâ⬠©aâ⬠©massâ⬠©communicationâ⬠©audienceâ⬠© Whatâ⬠©isâ⬠©aâ⬠©Ã¢â¬Ëmediaâ⬠©vehicleââ¬â¢?â⬠© Characteristicsâ⬠©ofâ⬠©massâ⬠©communicationâ⬠©organizationsâ⬠© Whatâ⬠©vehiclesâ⬠©haveâ⬠©increasedâ⬠©theâ⬠©mobilityâ⬠©ofâ⬠©theâ⬠©massâ⬠©mediaRead MoreReview for Midterm I1634 Words à |à 7 PagesCalifornia State University ââ¬âFullerton Econ 201- Review for Midterm I Dr. El Hag- Spring 2010 Multiple Choice Identify the choice that best completes the statement or answers the question. ____1.The slope of a line that passes through the points (10, 15) and (20, 7) is a. | -5/4. | b. | -4/5. | c. | 4/5. | d. | 5/4. | ____2.If Shawn can produce more donuts in one day than Sue can produce in one day, then a. | Shawn has a comparative advantageRead MoreGeology Midterm Review2404 Words à |à 10 PagesIntroduction to Geology GEOL-101 Midterm 1 Review Based on the textbook: Understanding Earth, 6th Edition, by Grotzinger and Press CH 1: earth system Summary The human creative process, field and lab observations, and experiments help geoscientists formulate testable hypotheses (models) for how the Earth works and its history. A hypothesis is a tentative explanation focusing attention on plausible features and relationships of a working model. If a testable hypothesis is confirmed by a large Read MoreMidterm Review Bio1291 Words à |à 6 PagesBiology Final Exam Review Sheet a) The identity of each element is defined by the number of protons in its nucleus a. The physical and chemical properties of each element are defined by: i. Number of protons and neutrons in the nucleus ii. Number of electrons orbiting the nucleus Proton = mass of one a positive charge Neutron = mass of one and no charge Electron = negligible mass and a negative charge Isotopes of an element a) Isotopes are different forms of the same element a.Read MoreMidterm Review Essay9272 Words à |à 38 PagesChapter 16 1.) All of the following factors contributed to explosive economic growth during the Gilded Age EXCEPT: Question options: | a) | availability of capital for investment. | | b) | a growing supply of labor. | | c) | abundant natural resources. | | d) | low tariffs. | | e) | federal land grants to railroads. | | | 1 / 1 point | 2.) By 1890, the majority of Americans: Question options: | a) | worked as farmers. | | b) | worked as independent craftsmenRead MoreEssay on Midterm Exam ( Review)1542 Words à |à 7 PagesExam Review 1 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Each of the following functions are within the framework for Human Resources Management EXCEPT: a. recruitment and selection. b. training and development. c. employee relations. d. employee discipline. 2. Which of the following is NOT a primary impact that technology has had on HRM? a. It has improved the processes of internal and external communications. b. It has altered the methodsRead MoreUs History Midterm Review777 Words à |à 4 PagesUS History Midterm Study Guide General Government: 1. What were the Articles of Confederation? 2. Explain the roles of the three branches of the US government play? 3. Explain the political concept of Federalism 4. Be able to differentiate between Dual Federalism Cooperative Federalism (cake?) 5. What purpose does the Bill of Rights serve? 6. Identify the two houses of Congress and the term length of each. 7. What percentage of Congress has to vote to override a vetoRead MoreMidterm Review Questions Set 11481 Words à |à 6 PagesREVIEW QUESTION SET #1 FOR THE MIDTERM EXAM QUESTION 1 (PRODUCTIVITY) ElectroPlus manufactures electronic components. It has recorded data for the last three years as shown in the table below. ElectroPlus Productivity Data (in millions of dollars) 2009 2010 2011 Sales 220 258 248 Materials 124 146 142 Labor 56 66 56 Overhead 16 24 20 a) Calculate a measure of labor productivity for each year and comment on the pattern. b) Calculate a measure of multifactor productivity for each year usingRead MorePsci 231 Midterm Review2130 Words à |à 9 PagesSection One: 1. What is, ââ¬Å"Utilitarianismâ⬠and why is it important to the study of businessgovernment relations? Utilitarianism is a usually described as the greatest happiness for the greatest number. It reflects the action that produces the most happiness for people; meaning that an action is good if it produces a higher ultility of happiness. The thoery treats all members of a society equally, balances the inequalities in wealth between rich and poor people and justifies human acts. For example
Social Media Recruitment Process
Question: Discuss about the Social Media Recruitment Process. Answer: Introduction The use of social media is rapidly increasing with time. Each and every individual is linked with the use of updated technology, internet and social media. It has become one of the most significant elements of the lives of individuals and especially for the urban people. But with its increased use the consequences and complications arte also up surging and primarily in the business organizations. There are several organizations which have faced such issue of privacy and ruining of their brand image because of the unethical comments passed by the employees in the social media or on their social networking groups. Similarly privacy issues of the employees are also getting hit with the use of social sites as employers are accessing the sites of employees for gathering information about the employee or the candidate for the recruitment purpose. The essay will inform about the issues and consequences of the use of social media as well as the ways in which they can be mitigate (Blomqvist a nd Ekstrm, 2016). Usage of Social Media at Workplace in relation with employees privacy, recruitment and its consequences for employees and organization In present scenario, the privacy issue of the employees is rising extensively at most of the organizations. There are number of cases where the organizations are taking use of the facebook pages or other social websites to access the personal information about the employees. This give detail information about the employees, their hobbies and other numerous things but as per the Fair Act and the Labor law these types of activities are regarded as unethical as well as it voids the rules and regulations of the privacy policies which is required to be followed by each and every employee, employer and the organization. There are various cases where the employees have filed a suit or have raised their voice against such unethical act of the organizations and have been equally supported by the Government for elimination of such acts. These practices which create privacy issues are incorporated by the organizations for number of thing such for the recruitment of the employees, organizations took use of these practices so that they can verify the details as well as know about the hobbies and other interests of the interviewee or to know the background of that person (Bolton, et al., 2013). Another reason for such practice is the employer or the managers try to know about their employees and for this they access their social accounts to gather information about them such as to verify the reason of their leaves or to know about their previous job engagements etc. These privacy issues not only impact the employees but there are several times when the organization also get affected by the acts of the employees such as disclosure of some significant information related to the company or the negative views or opinions delivered by the employees on the social media after getting terminated or after leaving the organization. There are consequences from both the sides i.e. in regards with the employees privacy as well as in context of the organizational privacy (Boyd, 2014). There are several consequences of such privacy issues which are related to both the employees and the organization. The first most consequence which arises or takes place because of such unethical practices is that the employees can file a suit against the organization or the employers which can harm the image of the organization, merely by looking over the social site if the recruiter does not select the candidate for the job then the organization might lose a potential candidate because of the misconception of the recruiter as the social pages of sites are not appropriate for gathering the actual data and information regarding any individual. Another consequence is that employees might feel offended and leave their jobs, there are chances that some negative activities could took place such as occurrence of wrong and fake rumors about the employee and its character (Broughton, et al., 2013). There are few times when the candidates put discrimination charges over the organization if they have rejected that candidate only on the basis of the lifestyle information obtained by the recruiter while selecting candidates. There are several consequences which can also take place in context with the organization such as if any employee post some negative information about the company it might lead to ruining of the image of the organization, publically criticized, negative picture in eyes of the people and decrease in the value of market share. There are furthermore consequences if the employee discloses some confidential and important information and details of the company which can provide the competitors an advantage to demean the company and give the organization a competition might lead to extreme dreadful and shocking results for the company. The organization might terminate the employee or file suit against the individual for spreading fake rumors and negatively publicizing the company (Gritzalis, et al., 2014). For handling such issues there is a need to maintain a balance between the rights of the employees and the consequences for the organizations. If the organization instead of using the facebook pages or other social sites for enquiring and gathering the information of the employees have used one-to-one approach and communicate with the employee then there must be must harmonious interpersonal relations as well as if the employees also have not criticized the organization publically have discussed the issues with the higher authorities can give must positive outcomes (Yerby, 2013). The rules and regulation of the Labor law and Fair Act must me strictly followed by the organizations as well there must be strict implementation of the privacy policy by the employees as well as by the organizations so that the interest of both the parties do not get harm by performance of any unethical act (Kluemper, Mitra and Wang, 2016). With the change in time and generations the attitude and mind set of the individuals also get change. The notion of the older aged employees related to the commitment towards organization and the work, responsibilities and privacy are very much different from the view-points of the younger employees. Today the people are more connected socially rather than meeting up with each other on regular basis. The connections, relations and associations are generally through chats, social interactions at social sites or through other social networking groups. And the reason that the young employees do not feel offended or not feel good if the organization or the employers obtain their personal information from their social networking pages (Leonardi, Huysman and Steinfield, 2013). The use of social media and internet has extensively increased in the last decade. Collaborating and interacting at the social media sites have become more significant from last few years. Earlier there was high commitment towards the work and the organization by the employees and thus this sustain them criticize the working environment and the business operations publically. The most effective form to resolve issues was the face-to-face communications rather than making propaganda of those issues. Similarly before a decade or two the employees does not have an informal connection or communication with the bosses and the senior level managers or employees and so there was no sharing of the personal information with them but with change in generation now the top level people are involved in a communication with the grass-root level employees through the use of the social networking sites and pages and this creates a scenario where the individuals of different levels are pretty familia r with each other lives (Mathur and Mathur, 2015). And thus privacy is not a big concern to be complaint or conflict for. The employees are also not that much responsible for the work and the organization as compared with the seriousness of the elderly aged employees. Instead of thinking over the consequences organization might face because of the negative publicity because of the actions of the employees, they just post their comments about the organizational working experiences which lead to pessimist outcomes for the organizational image. And this sense of irresponsibility gives the reason to Government and the organizations for enhancing the strictness of the privacy policy (Madera, 2012). There are several HR policies which emphasize over taking of legal actions on the employees who make comments about the organization on the social sites. Similarly the Labor law also protects the employees against the use of their personal information by the organizations by taking severe actions against those organizations. There is a need that every company should implement a social media use policy which binds and restrict all the employees and the organization to take unethical use of the social media and social networking sites to investigate or harm each other through any form (Broughton, et al., 2009). The apart from the extensive number of legal issues there are several ethical issues also which are involved in the use of social media in context with the business and organizational purpose. There are prominently two significant issues which usually came under limelight. The first one focuses over the subject or the topic which has been discussed over the social networking sit es and groups and second issues relates to the balance among the implicit as well as the explicit behavioral expectations at the workplace and the rights of the individuals (Nikolaou, 2014). If the privacy policy is completely broken by the employees which means that if an individual have posted entirely unethical which can harm the company or someones image then the dismissal of the employee is ethically correct but if the intensity of the comment is mot that high and it has been written just to taken out the frustration from the work then it will be analyzed from several perspectives and the decision would be taking rather directly terminating the employees, similar is the case of the organization that if the employer have accessed the personal info of the employees from their social sites will be sound unethical if there has been taken some negative or wrong use of that information or any kind of discrimination has been taken place on the basis o that and if the information gathered is just for integrating with that person than it wont be sound unethical (Pang, et al., 2014). Usually the organization, employer and the employee consider the use of social media as the win-lose situation or recognized it as the employer-versus-employee situation. This is because in the organizational history from the global context there have been several cases where it has been analyzed that the use of social media has involved the organization/employer or the employee in a circumstance where conflicts arises as well as there is ruining of the image of either of the two (Valenzuela, 2013). The percentage of the negative outcomes of using social media is extremely higher than the positive outcomes of its use and this is the reason in some organizations the use of social media is completely banned in the system as well as there are certain organizations where the employees are also not allowed to take use of their mobile phones at the work place so that there can avoidance of the issues related to business conspiracy or sharing of the confidential data of the company (Pfeffer , Zorbach and Carley, 2014). The increased number of conflicts and issues in the interpersonal relations of the employers and the employees the use of social media is recognized as a negative element in the success and friendly environment at the workplace. Thus there is a view-point and notion that the use of social media is a win-lose situation which means that one of the either party will be benefited from the use and other will get negatively impacted by tits use. It is also regarded as the employer-versus-employee situation which means that it will definitely result into a situation of conflict or clash between the employees and the employers (Slovensky and Ross, 2012). But with the thoughts and efforts of a progressive employer the whole situation can depict a different picture. The win-lose situation can be converted into a win-win situation with few major effective strategies and approaches. First of all the employer must have a complete understanding of the needs and requirements of the employees and the organization and it should also evaluate that whether the organizational objectives are integrating with individual objectives of the employees or not. The first major step which the progressive manager can take is formation and implementation of a strict and clear policy regarding the use of social media. The cause and consequences must be circulate within the organizational members effectively and HR team must forward remember mails or mails which can mark the attention of the people over the strict follow up of the policy so that one cannot give an excuse of fail to remember (Singh and Duhan, 2016). The other ways for achieving this objective of transforming the situation in a win-win state are firstly the manager should convey the possible outcomes of voiding the social media usage policy, secondly on monthly basis the issues and problems which the employees are facing must be discussed in an open forum so that the conflicts can be resolved at the initial stage only, third without the consent of the employees the employer should not access to its social sites for gathering information regarding the individual, fourth there must be development of an informal relationship between the employer and the employee so that there can be an open discussion regarding any sort of issue instead of developing into a situation of conflict. The manager should also ban the sites or have a restricted access to the internet by the employees instead of monitoring them so that there can be no such issues of offensive use of internet and force the company to take any sort of legal actions against th e employees (Kluemper, Mitra and Wang, 2016). With all such friendly approaches, open discussions and strictness in the policies of social media usage will have a direct impact in controlling the occurrence of conflicts and issues regarding the unethical use of social media and instead of the negative outcomes there will certainly be fruitful and positive results of incorporating the use of social media for the employees as well as for the organization (Kluemper, Mitra and Wang, 2016). Conclusion From this essay it can be concluded that there are several issues and consequences of the use of social media by the employees at the workplace and by the organization for gathering information of the employees. As per the laws and the regulation it has been found unethical and illegal to take use of someones personal information for the purpose of recruitment or for other things and making discrimination on the basis of that information is highly unethical and the employee can file a suit against the organization for the same (Stoughton, Thompson and Meade, 2015). There are several issues which are associated with the use of unethical use of social media by the employees while they are at work such as access to prohibited sites as well as writing comments on the social networking groups and sites which can harm the reputation and business operation of any organization. And thus all these come under the violence of the privacy policy. There is a need of progressive higher authorities or managers which can handle such issues and implement such strategies which can mitigate the negative impact of the social media usage convert it into a win-win situation and offer benefits to the organization as well as to the employees (Upchurch and Grassman, 2015). References Blomqvist, M., Ekstrm, M. (2016). Keeping up to date: Incorporating social network sites and employer branding in recruitment processes. Bolton, R. N., Parasuraman, A., Hoefnagels, A., Migchels, N., Kabadayi, S., Gruber, T., ... Solnet, D. (2013). Understanding Generation Y and their use of social media: a review and research agenda.Journal of Service Management,24(3), 245-267. Boyd, D. (2014).It's complicated: The social lives of networked teens. Yale University Press. Broughton, A., Foley, B., Ledermaier, S., Cox, A. (2013). The use of social media in the recruitment process.Retrieved May,2, 2014. Broughton, A., Higgins, T., Hicks, B. and Cox, A., (2009). Workplaces and Social Networking The Implications for Employment Relations, ACAS, Research Paper, Pp56, Retrieved on: 27th September, 2016, Retrieved from: https://www.acas.org.uk/media/pdf/d/6/1111_Workplaces_and_Social_Networking.pdf Charles, B.C., (2006). Privacy Issues Affecting Employers, Employees, and Labor Organizations, GW Law Faculty Publications Other Works, Pp.31, Retrieved on: 27th September, 2016, Retrieved from: https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=1519context=faculty_publications Gritzalis, D., Kandias, M., Stavrou, V., Mitrou, L. (2014). History of Information: The case of Privacy and Security in Social Media. InProc. of the History of Information Conference(pp. 283-310). Kluemper, D. H., Mitra, A., Wang, S. (2016). Social Media use in HRM. InResearch in Personnel and Human Resources Management(pp. 153-207). Emerald Group Publishing Limited. Leonardi, P. M., Huysman, M., Steinfield, C. (2013). Enterprise social media: Definition, history, and prospects for the study of social technologies in organizations.Journal of Computerà ¢Ã¢â ¬Ã Mediated Communication,19(1), 1-19. Madera, J. M. (2012). Using social networking websites as a selection tool: The role of selection process fairness and job pursuit intentions.International Journal of Hospitality Management,31(4), 1276-1282. Mathur, D., Mathur, D. (2015). Word of mouth on social media: A potent tool for brand building.Capturing, Analyzing, and Managing Word-of-Mouth in the Digital Marketplace, 45-61. Nikolaou, I. (2014). Social networking web sites in job search and employee recruitment.International Journal of Selection and Assessment,22(2), 179-189. Pang, A., Begam Binte Abul Hassan, N., Chee Yang Chong, A. (2014). Negotiating crisis in the social media environment: Evolution of crises online, gaining credibility offline.Corporate Communications: An International Journal,19(1), 96-118. Pfeffer, J., Zorbach, T., Carley, K. M. (2014). Understanding online firestorms: Negative word-of-mouth dynamics in social media networks.Journal of Marketing Communications,20(1-2), 117-128. Singh, A., Duhan, P. (2016). Managing Public Relations and Brand Image through Social Media. Slovensky, R., Ross, W. H. (2012). Should human resource managers use social media to screen job applicants? Managerial and legal issues in the USA.info,14(1), 55-69. Stoughton, J. W., Thompson, L. F., Meade, A. W. (2015). Examining applicant reactions to the use of social networking websites in pre-employment screening.Journal of Business and Psychology,30(1), 73-88. Upchurch, M., Grassman, R. (2015). Striking with social media: The contested (online) terrain of workplace conflict.Organization, 1350508415598248. Valenzuela, S. (2013). Unpacking the use of social media for protest behavior the roles of information, opinion expression, and activism.American Behavioral Scientist,57(7), 920-942. Yerby, J., (2013). Legal and ethical issues of employee monitoring, Online Journal of Applied Knowledge Management, A Publication of the International Institute for Applied Knowledge Management, 1(2), Pp.12. Retrieved on: 27th September, 2016, Retrieved from: https://www.iiakm.org/ojakm/articles/2013/volume1_2/OJAKM_Volume1_2pp44-55.pdf
Subscribe to:
Posts (Atom)