4 resultados para Business Organizations Law

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the article - Discipline and Due Process in the Workplace – by Edwin B. Dean, Assistant Professor, the School of Hospitality Management at Florida International University, Assistant Professor Dean prefaces his article with the statement: “Disciplining employees is often necessary for the maintenance of an effective operation. The author discusses situations which require discipline and methods of handling employees, including the need for rules and due process.” In defining what constitutes appropriate discipline and what doesn’t, Dean says, “Fair play is the keystone to discipline in the workplace. Discrimination, caprice, favoritism, and erratic and inconsistent discipline can be costly and harmful to employee relations, and often are a violation of law.” Violation of law is a key phrase in this statement. The author offers a short primer on tact in regard to disciplining an employee. “Discipline must be tailored to the individual,” Dean offers a pearl of wisdom. “A frown for one can cause a tearful outbreak; another employee may need the proverbial two-by-four in order to get his attention.” This is a perceptive comment, indeed, and one in which most would concede but not all would follow. Dean presents a simple outline for steps in the disciplinary process by submitting this suggestion for your approval: “The steps in the disciplinary process begin perhaps with a friendly warning or word of advice. The key here is friendly,” Dean declares. “It could progress to an oral or written reprimand, followed by a disciplinary layoff, terminating in that equivalent of capital punishment, discharge.” Ouch [!]; in order from lenient to strident. Dean suggests these steps are necessary in order to maintain decorum in the workplace. Assistant Professor Dean references the Weingarter Rule. It is a rule that although significant, most employees, at least non-union employees, don’t know is in their quiver. “If an interview is likely to result in discipline, the employee is entitled to have a representative present, whether a union is involved or not,” the rule states. “The employer is not obligated to inform the employee of the rule, but he is obligated to honor the employee's request, if made,” Dean explains. Dean makes an interesting point by revealing that a termination often reflects as much on the institution as it does the employee suffering the termination. The author goes on to list several infractions that could warrant an employee disciplinary action, with possible approaches toward each. Dean also cautions against capricious disciplinary action; if not handled properly a discipline could and can result in a lawsuit against the institution itself.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Security remains a top priority for organizations as their information systems continue to be plagued by security breaches. This dissertation developed a unique approach to assess the security risks associated with information systems based on dynamic neural network architecture. The risks that are considered encompass the production computing environment and the client machine environment. The risks are established as metrics that define how susceptible each of the computing environments is to security breaches. ^ The merit of the approach developed in this dissertation is based on the design and implementation of Artificial Neural Networks to assess the risks in the computing and client machine environments. The datasets that were utilized in the implementation and validation of the model were obtained from business organizations using a web survey tool hosted by Microsoft. This site was designed as a host site for anonymous surveys that were devised specifically as part of this dissertation. Microsoft customers can login to the website and submit their responses to the questionnaire. ^ This work asserted that security in information systems is not dependent exclusively on technology but rather on the triumvirate people, process and technology. The questionnaire and consequently the developed neural network architecture accounted for all three key factors that impact information systems security. ^ As part of the study, a methodology on how to develop, train and validate such a predictive model was devised and successfully deployed. This methodology prescribed how to determine the optimal topology, activation function, and associated parameters for this security based scenario. The assessment of the effects of security breaches to the information systems has traditionally been post-mortem whereas this dissertation provided a predictive solution where organizations can determine how susceptible their environments are to security breaches in a proactive way. ^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The current study investigated the effects of job satisfaction and organizational commitment on organizational citizenship behavior and turnover intentions. The study also examined the effect of organizational citizenship behavior on turnover intentions. Frontline employees working in five-star hotels in North Cyprus were selected as a sample. The result of multiple regression analyses revealed that job satisfaction is positively related to organizational citizenship behavior and negatively related to turnover intentions. Affective organizational commitment was found to be positively related to organizational citizenship behavior. However, the study found no significant relationship between organizational commitment and turnover intentions. Furthermore, organizational citizenship behavior was negatively associated with turnover intentions. The study provides discussion and avenues for future research.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In response to a crime epidemic afflicting Latin America since the early 1990s, several countries in the region have resorted to using heavy-force police or military units to physically retake territories de facto controlled by non-State criminal or insurgent groups. After a period of territory control, the heavy forces hand law enforcement functions in the retaken territories to regular police officers, with the hope that the territories and their populations will remain under the control of the state. To a varying degree, intensity, and consistency, Brazil, Colombia, Mexico, and Jamaica have adopted such policies since the mid-1990s. During such operations, governments need to pursue two interrelated objectives: to better establish the state’s physical presence and to realign the allegiance of the population in those areas toward the state and away from the non-State criminal entities. From the perspective of law enforcement, such operations entail several critical decisions and junctions, such as: Whether or not to announce the force insertion in advance. The decision trades off the element of surprise and the ability to capture key leaders of the criminal organizations against the ability to minimize civilian casualties and force levels. The latter, however, may allow criminals to go to ground and escape capture. Governments thus must decide whether they merely seek to displace criminal groups to other areas or maximize their decapitation capacity. Intelligence flows rarely come from the population. Often, rival criminal groups are the best source of intelligence. However, cooperation between the State and such groups that goes beyond using vetted intelligence provided by the groups, such as a State tolerance for militias, compromises the rule-of-law integrity of the State and ultimately can eviscerate even public safety gains. Sustaining security after initial clearing operations is at times even more challenging than conducting the initial operations. Although unlike the heavy forces, traditional police forces, especially if designed as community police, have the capacity to develop trust of the community and ultimately focus on crime prevention, developing such trust often takes a long time. To develop the community’s trust, regular police forces need to conduct frequent on-foot patrols with intensive nonthreatening interactions with the population and minimize the use of force. Moreover, sufficiently robust patrol units need to be placed in designated beats for substantial amount of time, often at least over a year. Establishing oversight mechanisms, including joint police-citizens’ boards, further facilities building trust in the police among the community. After disruption of the established criminal order, street crime often significantly rises and both the heavy-force and community-police units often struggle to contain it. The increase in street crime alienates the population of the retaken territory from the State. Thus developing a capacity to address street crime is critical. Moreover, the community police units tend to be vulnerable (especially initially) to efforts by displaced criminals to reoccupy the cleared territories. Losing a cleared territory back to criminal groups is extremely costly in terms of losing any established trust and being able to recover it. Rather than operating on a priori determined handover schedule, a careful assessment of the relative strength of regular police and criminal groups post-clearing operations is likely to be a better guide for timing the handover from heavy forces to regular police units. Cleared territories often experience not only a peace dividend, but also a peace deficit – in the rise new serious crime (in addition to street crime). Newly – valuable land and other previously-inaccessible resources can lead to land speculation and forced displacement; various other forms of new crime can also significantly rise. Community police forces often struggle to cope with such crime, especially as it is frequently linked to legal business. Such new crime often receives little to no attention in the design of the operations to retake territories from criminal groups. But without developing an effective response to such new crime, the public safety gains of the clearing operations can be altogether lost.