Workplace Privacy Essays (Examples)

Studyspark

Study Document Study Document

Workplace Trends And Changes

Pages: 7 (2170 words) Sources: 5 Document Type:Term Paper Document #:67790748

Introduction
Three big trends impacting the workplace are 1) the effects of the #MeToo Movement and the need to implement policies to protect workers against sexual harassment, 2) the role … #MeToo Movement and the need to implement policies to protect workers against sexual harassment, 2) the role that AI is playing in the workplace and the impact it is having on issues such as worker privacy, and 3) the problem of politics and how there may be gaps between the type of culture the administration wants to cultivate and … can positively influence any of the changes required as a result of the current issues as they give support to workers in the workplace environment.
MeToo
The #MeToo movement changed the way organizations think about sexual harassment in a big way—particularly with respect to how upper level … the support that must be provided to workers in the sense……

References

Works Cited

Ghaffary, S. Political tension at Google is only getting worse. Vox, 2019.  https://www.vox.com/recode/2019/8/2/20751822/google-employee-dissent-james-damore-cernekee-conservatives-bias 

Kreager, Derek A., and Jeremy Staff. "The sexual double standard and adolescent peer acceptance." Social psychology quarterly 72.2 (2009): 143-164.

Nilsson, Warren. "Positive institutional work: Exploring institutional work through the lens of positive organizational scholarship." Academy of Management Review 40.3 (2015): 370-398.

O'Neil, Adrienne, et al. "The# MeToo movement: an opportunity in public health?." The Lancet 391.10140 (2018): 2587-2589.

PLBSH. Yes, Men Can Be Sexually Harassed In The Workplace. PLBSH, 2019.  https://www.plbsh.com/yes-men-can-be-sexually-harassed-in-the-workplace/ 

Wong, N. & Chin, Y. “Issues and Challenges Faced by Generation X While Managing Generation Y.” International Journal of Business and Social Science 7.2 (2016): 167-170.

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

… recreate to how they work. This is no less true in the field of health care, where clinical informatics is reshaping the nursing workplace environment, how patient data is recorded and shared, and how health care is delivered. This paper will discuss clinical informatics concepts emerging in … 21st century, what evidence-based practice (EBP) shows with respect to clinical informatics, how the law figures into this issue with respect to HIPAA, privacy/confidentiality and security issues; and how patient safety, the nursing role and electronic medical records are impacted.
Clinical Informatics Concepts in the 21st Century
… effective or timely decision-making (Sousa et al., 2017). Nursing research has to focus more on how to positive integrate EMR systems into nurse workplace. One of the big questions going forward, however, is whether nurse PHDs, researchers or leaders are being prepared in the classroom to handle … being standardized in nurse education.……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

… so doing, I would be concerned with two key aspects that relate to the investigation: work-related aspects and aspects not related to the workplace. With regard to work-related aspects, I would be seeking to interview those who have closely worked with Mr. John Belcamp, i.e. his workmates … is indeed any possibility of violation of organizational policy or threat to organizational interests. When it comes to aspects not related to the workplace, of relevance would be the character and comportment of Mr. Belcamp. Towards this end, persons of interest would be a few of Mr. … that to a large extent, the interview setting would be determined by the aspect, i.e. work-related aspects and aspects not related to the workplace. For work-related aspects, the interview would be taken at the work premises to avoid unnecessary disruptions to workflows. On the other hand, for … would be taken at the……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… insider threats. According to its strategy, “the most effective safeguard against insider threats is a knowledgeable, trusted workforce which is confident that their privacy and civil liberties are respected.”[footnoteRef:2] Making sure that its employees are trustworthy and invested is the first line of defense against insider threats. …
The organization supports this culture with technological programs that assist in the monitoring of individuals and their actions. This two-pronged approach uniting a workplace culture with a technical methodology of monitoring and evaluating employee actions to determine anomalies and potential insider threats is comprehensive and cohesive and … using digitally connected technology today, it should not be difficult to know who is where and what they are doing.
The problem of privacy rights holds up any real and substantive approach to detecting subversion, unfortunately. privacy rights of users of digital technology can be respected at the same time the safety of……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… be substantially more susceptible to different malicious attacks by impostors. This varies from identity theft, eavesdropping to interrupt data, violating the rights for privacy, denial-of-service attacks, to incorporation of viruses, Trojan horse and other mischievous codes to interrupt valid transmissions, and jamming attacks (Ijemaru et al., 2018). … with cybercriminal actions, bearing in mind that at the present moment, progressively more individuals are utilizing wireless communication networks in the home and workplace settings (Ijemaru et al., 2018).
Chapter 2: Literature Review
The enormous worldwide infrastructure does not have any fundamental security mechanisms that are embedded … taken that preclude unwarranted access or damage to information that is transmitted over wireless networks in addition to making certain that both the privacy and veracity of data are not compromised (Ijemaru et al., 2018). At the present moment, most of the security architecture that are existent … networks is wide open to……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

C Suite Executive Leadership And Ethics

Pages: 9 (2693 words) Sources: 7 Document Type:Essay Document #:16009984

… organization or the industry’s regulatory climate (Bailey & Shantz, 2018). Bandwagon fallacies—the sense that because something is normative it is ethical—predominate in the workplace. An interview with C. Linden (name altered to protect the individual’s privacy) shows how personal ethical beliefs clash with the prevailing norms and values in the field. Employee diversity adds to the complications involved in … in their daily work…[break]…ethics plus the cultivation of good moral character in employees makes for a sensible approach to ethical dilemmas in the workplace. A code of ethics and even the law are insufficient to guide employee behavior. As Linden does, I also believe in the need ……

References

References

Bailey, C. & Shantz, A. (2018). Creating an ethically strong organization. MIT Sloan Management Review. http://ilp.mit.edu/media/news_articles/smr/2018/60101.pdf

Crossan, M., Mazutis, D. & Seijts, G. (2013). In search of virtue. Journal of Business Ethics 113(4): 567-581.

Hatcher, T. (2008). The value of values in the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Charlotte: IAP, pp. 97-122.

Hoekstra, E., Bell, A. & Peterson, S.R. (2008). Humility in Leadership: Abandoning the Pursuit of Unattainable Perfection. In S.A. Quatro & R. R. Sims (Eds.), Executive Ethics: Ethical Dilemmas and Challenges for the C-Suite. Greenwich, CT: Information Age Publishing, pp. 79-96.

MacDougall, A.E., Bagdarasov, Z. & Buckley, M.R. (2008). Applying a primary risk management model to the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Second Edition. Charlotte: IAP, pp. 211-234.

Martin, R. (2011). The CEO\\\\'s ethical dilemma in the era of earnings management. Strategy & Leadership 39(6): 43-47.

Schwartz, M.S. (2013). Developing and sustaining an ethical corporate culture: The core elements. Business Horizons 56(1): 39-50.

 

Join thousands of other students and

"spark your studies".