Often companies find that when they first install filtering software or routers, the sites and communications employees need to do their jobs cannot be done. What is needed then is a gradual move to include those sites and types of communications with outside suppliers, buyers, customers, resellers, services organizations and other key constituents. The use of monitoring however is prevalent, according to the American Management Associated; fully 76% of companies from their 2005 survey on this subject actively monitor the use of websites and filter them based on content (American Management Association 2005). The momentum in businesses t measure, monitor and modify their Acceptable Use Policies is now in full-swing, and the development of these policies must be governed by the broader strategic needs of the company on the one hand and the need to ensure an acceptable environment for employees to work in on the other (Pauli, 2001).
Method
The research objective of this study is to measure the level of awareness of e-mail monitoring programs in a typical company which is part of the services sector. Employee's levels of awareness of e-mail monitoring policies, their impressions and attitudes towards them, and the resulting influence on their behavior and productivity is the intent of this study. The research objective, hypothesis, variables included in the analysis and the methodology are provided in this section as well. Appendix a includes the questionnaire used in this analysis. Limitations of the study and threats to validity are also discussed.
Research Objectives
To statistically prove that e-mail monitoring educational programs are not understood and effectively communicated in companies.
To validate significant differences between the perceptions of e-mail monitoring programs between genders.
Hypothesis
Null Hypothesis: There is no significant statistical difference of employees with regard to their knowledge of e-mail policy specifics.
Alterative Hypothesis: There is a significant statistical difference of employees knowing the specific of the e-mail policies in their companies.
Methodology and Research Design total of thirty respondents were interviewed in person suing the questionnaire shown in Appendix a of this study. Gender, percentage of time spent checking e-mail, if the organization had terminated anyone for using e-mail outside the policies, and if the organization and informed them via written policies and regulations regarding violation of e-mail usage as well. Attitudes with regard to the right to privacy, legality of monitoring e-mail, attitudinal measurement of e-mail being monitored, and whether the respondent felt any sense of distrust of the organization as a result. All of these factors combined to create a complete empirical analysis of the effectiveness of training programs in teaching employees about e-mail usage policies.
Limitations and Threats to Validity
As with any empirical studies there must be safeguards against interviewer and respondent bias, in addition to guarding against respondent bias. To ensure these threats to validity are minimized, the interviewers defined their role as being from a local university, where the results would be aggregated to ensure their anonymity. In addition the researchers defined their role in the university as being completely separate from the company, and that the results of the survey would only be included in a summarized report. Given the approach of statistical analysis used in Microsoft Excel and Statistical Package for the Social Sciences, it would be impossible to isolate each specific response by respondent, further ensuring their confidentiality as well.
Analysis
As was stated in the Method section, the Hypothesis for this study is as follows:
Null Hypothesis: There is no significant statistical difference of employees with regard to their knowledge of e-mail policy specifics and their attitudes about e-mail monitoring.
Alterative Hypothesis: There is a significant statistical difference of employees knowing the specific of the e-mail policies in their attitudes about e-mail monitoring.
The statistical analysis techniques used for completing this research study include frequency distributions of each of the 13 variables in the analysis followed by a Bivariate Analysis of Variance (ANOVA) of all variable sin the study using parametric and non-parametric correlational techniques. In addition cross-tabulations are used for further analysis of the data.
Bivariate ANOVA correlation analysis produced the correlation matrix in Appendix B of this document....
The courts have basically given businesses cart blanc with regard to the monitoring of what their employees say and do in their work email as well as on their work computers, even when they sign in to private web-based email accounts for private transmissions, as such events can be recorded by employers, as the computer being used has been designated by the courts as the domain of the employer
Employee Handbook Privacy Section ABC Widget Company: Employee Handbook Privacy Section What privacy rights issues should be addressed? In the Age of Information, there are increasing concerns being voiced about what can legitimately be expected to be kept private, and how these issues affect employees' rights in the workplace. According to Hayden, Hendricks and Novak (1990, most adults spend approximately one-half of their waking hours in the workplace today, and it is therefore
Employee Privacy Torts History of Employee Privacy Changing Trends of Employee Privacy Impact of Innovative Technology on Employee Privacy Role of Social Media towards Employee Privacy Impact of Changing Community/Society on Employee Privacy Adaptation to the new Environment pertaining to Employee Privacy Employee Monitoring and Surveillance Laws and Employer Policies for Text Messaging and Social Media Electronic Communication Privacy Act Monitoring of Employee Conversations over Telephone & Email Recommendations for creating Effective Policies Future Implications of Employee Privacy As years have passed and
The first step in project management involves identifying the requirements. The second step is establishment of a clear and achievable objective. The third step is finding a balance for the competing demands for quality, scope, time and cost. Finally, the fourth step in project management is the adaptation of the specifications, plans and approach to the various concerns and expectations of the client. It is necessary that the manager
1. Introduction The modern 21st century has posed new challenges for the organizations to survive and grow (Smith et al. 2010). As they are operated and managed by human beings, the challenges are ultimately faced by the individuals who are responsible for making decisions and implementing them (Nieuwenhuizen, Weiss and Rossouw, 2009). As challenges are multifaceted, and human lives are divided into various aspects, it is difficult to excel in every
Occupational Stress and Scientific MonitoringBYElena Georgiou�This paper was submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in the Doctoral Program (PhD) in Business Administration at the University of Nicosia, School of Business Administration, Nicosia, Cyprus, (December/2017)�University of Nicosia46 Makedonitissas Ave.P.O. Box 240051700 NicosiaCyprusDate: (December/2017)Table Contents1.Introduction��������������������������........32. Research Aims��������������������������3-43. Research Objectives������������������������..54. Research Questions�������������������������55. Literature Review������������������������...5-65.1 Types of Stress�������������������������.6-75.2 Definition of Supervision����������������������75.3 Categories of Supervisory Models������������������..75.4 The
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now