case study presentation on Cyberloafing.
Employees excessively surf the internet during work hours for non-work related activities. Miss using the internet.
Working the Great Resignation: How Employers Can Transform Things to their Ad...Dana Gardner
Transcript of a discussion on new research into why one of the tightest labor markets the world has ever seen means a transition to a more healthy and sustainable environment for employee well-being.
This presentation is intended for parents. It has eye opening information that will help you become aware of the danger of cyber bullying and will give you tips on how to protect your children.
case study presentation on Cyberloafing.
Employees excessively surf the internet during work hours for non-work related activities. Miss using the internet.
Working the Great Resignation: How Employers Can Transform Things to their Ad...Dana Gardner
Transcript of a discussion on new research into why one of the tightest labor markets the world has ever seen means a transition to a more healthy and sustainable environment for employee well-being.
This presentation is intended for parents. It has eye opening information that will help you become aware of the danger of cyber bullying and will give you tips on how to protect your children.
The slide is about safety in the cyber world. The plethora of vulnerability the cyber world has unleashed makes a call for a staunch measure towards cyber safety.
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
Facebook has been blamed for data breech of India users before presidential in 2016 in US. Cambridge Analytica had harvested on the stolen data to analyze the election based on user messages. Here solution on how Facebook can avoid such situations in future has been stated.
Presented by senior researchers from the UTS Health Psychology Unit, this lecture unravels the facts about cyber bullying. It debunks media stereotypes of perpetrators and victims, lays bare its costs to individuals and communities and offers practical pathways for solutions and healing.
Fun presentation addressing a major resource suck in modern business. Start with how to Cyberslack, a guide for employees, and then end with as an employer, what to do about it.
see attachedTitle social Media in the work placeWhat is the .docxbagotjesusa
see attached
Title social Media in the work place
What is the advanges and disadvanges of social media in the work place
the effect of social media in the workplace
10 The Enterprise Feb. 1-7,2010
Social media and the workplace Manners and your bottom line
In some social circles,if you aren't "tweeting,"
you're considered disconnected or entirely out of
touch. Certainly, it seems that social networks like
Twitter, Facebook, Linkedin and other Web 2.0
environments have eclipsed comer bars, coffee
houses and country clubs as the common gathering
places for some groups. Take, for example.
Generation Y. By 2010, Gen Y will outnumber
their Baby Boomer predecessors, and 96 percent of
them have joined a social network. What's more, if
Facebook were a country, it would be the world's
fourth largest nation, with 300 million "citizens."
But individuals aren't the only ones socializing
online. Companies are finding a voice within
social networks too. Just a short decade
ago companies were creating inviting Web
sites to allow their constituents to visit
them. Now, many courageous companies
are reaching outside their firewalls
and enlisting social media forums, like
Twitter and Facebook, to actively engage
and directly communicate with their
constituents. Others are generating original
content and encouraging discussion about
their products and services through blogs
and chat rooms on their Web sites. .
But despite the relatively widespread adoption
of social media among companies for purposes
of marketing and PR, many businesses are still
struggling with the " i f and "how to" of allowing
access to social media within the workplace. In
fact, one recent study reported that 54 percent of
companies prohibit any access to social media
networks on the job, and another 19 percent of
companies permit only limited access solely for
business purposes. Why?
Businesses and their management teams
have valid concerns about opening the door,
or firewalls as the case may be, to social media,
but proponents for employees' open access have
equally compelling arguments to counter those
concerns. For example, business leaders worry that
they'll see a decrease in productivity if employees
are allowed to access their Twitter or Facebook
accounts from their office, but others will argue that
access to social media networks actually promotes
productivity because workers can conduct more
thorough research and interact with coworkers and
customers more effectively. Proponents also point
out that workers who are able to tweet during work
hours are more likely to respond to work e-mails or
check voicemail during non-work hours.
Of course, many managers voice serious
concerns about the potential for employees to leak
confidential company information, spread negative
comments about the company or conduct illegal
online activity from the workplace. Certainly these
are real issues for company leaders to consider.
Given the prevalence of social media today,
however, it is beg.
The slide is about safety in the cyber world. The plethora of vulnerability the cyber world has unleashed makes a call for a staunch measure towards cyber safety.
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
Facebook has been blamed for data breech of India users before presidential in 2016 in US. Cambridge Analytica had harvested on the stolen data to analyze the election based on user messages. Here solution on how Facebook can avoid such situations in future has been stated.
Presented by senior researchers from the UTS Health Psychology Unit, this lecture unravels the facts about cyber bullying. It debunks media stereotypes of perpetrators and victims, lays bare its costs to individuals and communities and offers practical pathways for solutions and healing.
Fun presentation addressing a major resource suck in modern business. Start with how to Cyberslack, a guide for employees, and then end with as an employer, what to do about it.
see attachedTitle social Media in the work placeWhat is the .docxbagotjesusa
see attached
Title social Media in the work place
What is the advanges and disadvanges of social media in the work place
the effect of social media in the workplace
10 The Enterprise Feb. 1-7,2010
Social media and the workplace Manners and your bottom line
In some social circles,if you aren't "tweeting,"
you're considered disconnected or entirely out of
touch. Certainly, it seems that social networks like
Twitter, Facebook, Linkedin and other Web 2.0
environments have eclipsed comer bars, coffee
houses and country clubs as the common gathering
places for some groups. Take, for example.
Generation Y. By 2010, Gen Y will outnumber
their Baby Boomer predecessors, and 96 percent of
them have joined a social network. What's more, if
Facebook were a country, it would be the world's
fourth largest nation, with 300 million "citizens."
But individuals aren't the only ones socializing
online. Companies are finding a voice within
social networks too. Just a short decade
ago companies were creating inviting Web
sites to allow their constituents to visit
them. Now, many courageous companies
are reaching outside their firewalls
and enlisting social media forums, like
Twitter and Facebook, to actively engage
and directly communicate with their
constituents. Others are generating original
content and encouraging discussion about
their products and services through blogs
and chat rooms on their Web sites. .
But despite the relatively widespread adoption
of social media among companies for purposes
of marketing and PR, many businesses are still
struggling with the " i f and "how to" of allowing
access to social media within the workplace. In
fact, one recent study reported that 54 percent of
companies prohibit any access to social media
networks on the job, and another 19 percent of
companies permit only limited access solely for
business purposes. Why?
Businesses and their management teams
have valid concerns about opening the door,
or firewalls as the case may be, to social media,
but proponents for employees' open access have
equally compelling arguments to counter those
concerns. For example, business leaders worry that
they'll see a decrease in productivity if employees
are allowed to access their Twitter or Facebook
accounts from their office, but others will argue that
access to social media networks actually promotes
productivity because workers can conduct more
thorough research and interact with coworkers and
customers more effectively. Proponents also point
out that workers who are able to tweet during work
hours are more likely to respond to work e-mails or
check voicemail during non-work hours.
Of course, many managers voice serious
concerns about the potential for employees to leak
confidential company information, spread negative
comments about the company or conduct illegal
online activity from the workplace. Certainly these
are real issues for company leaders to consider.
Given the prevalence of social media today,
however, it is beg.
BetterCloud Whitepaper: Offboarding Inefficiencies and Security ThreatsBetterCloud
With the increase of SaaS apps in the workplace, it can take hours to just offboard one employee. Its time to tackle this issue, and offboard fast, and securely.
Whitepaper for IM Lock Software
http://www.comvigo.com
Our Latest Version of IMLock
http://www.imlock.com/how-to-block-a-website-with-imlock/
IM Lock is an internet filtering software for Home, Business, and Networks.
What 2014 holds for Internal CommunicationsTrefor Smith
This is the follow up to last years guide to Internal Communication trends. This years guide outlines 4 main areas that we think are going to be key in 2014, along with sub themes and a wealth of hints and tips. We hope it is of benefit, and brings you success with your 2014 internal communications!
Making sense of your Digital WorkplaceSam Marshall
One of the challenges of a modern intranet is that the boundaries are becoming blurred by the growth of social and collaboration tools, mobile access and cloud applications. In this evolving landscape, intranets remain highly important, but the roadmap needs to plan for the digital workplace as a whole. Based on hands-on experience of developing strategy, Sam Marshall shows how approaching this from an employee perspective can bring clarity and purpose, but also how the emphasis needs to be as much on management as on technology.
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docxssuserf9c51d
TEC H | 10/04/2013 @ 6:15PM | 15,497 views
“Cell phones” at work are not new. Nor are smart phones. Many credit
Blackberry for inventing the concept, but few would argue that Apple with its
iPhone, more than other device created this explosive phenomena called
BYOD – Bring Your Own Device to work.
Most of what BYOD seems to represent so far is an unbalanced equation in
favor of employees. Employees may be happier because they can carry their
favorite device to get company email, but it is not clear that employers are
happy with the results. Keep in mind, that 90%+ of BYOD activities are
email, calendar, personal banking, news, family life coordination, Twitter
and Facebook, but little else.
In my conversations with business and technology leaders, many
organizations are asking themselves if the fully loaded costs of
~$5.50/month/employee, in addition to any device or services subsidy, is
worth it to the company.
If BYOD 1.0 is about employees, what might a BYOD 2.0 look like?
What are enterprises looking to get out of BYOD going forward? With this in
mind, I have been asking a lot of CIO’s, Directors of IT and other smart
people what they think.
Once such person is Yaacov Cohen, CEO of harmon.ie, a fast growing
enterprise mobility company. Yaacov talks to senior executives around the
world about how better collaborated ideas and increased productivity can
take place via personal use of mobile devices at work – and he has some
pretty interesting insights to share.
1. Yaacov, how do we move from this Bring Your Own Device (BYOD)
paradigm into BYOD 2.0, which you talk about as more of a “Use Your Own
Device” mentality?
“Everyone has been talking about BYOD, which should be more than
bringing their devices to work and then putting them to the side and saying,
“Hey, stay quiet. Don’t disturb me. I’ve got a lot of work to do.” And they go
to their laptops and do most of their work.”
“We want to change that. Business leaders are looking for change. The
mobile enterprise and BYOD 2.0 is not about bringing devices to work; it is
about using devices for work. How does business turn these shiny new toys
into business tools?”
“That means allowing employees to work with customers, review contracts,
write blog posts – do real work on mobile devices.”
2. Is BYOD a good idea in a practical sense?
“BYOD essentially means freedom of choice. Today’s IT professionals
recognize the need to work with users rather than impose procedures and
systems on them. BYOD is an expression of our world, which is becoming
more democratic and more engaging.”
“We’ve gotten stuck on the infrastructure side of things. It is true that mobile
brings a lot of questions about security. What happens if I lose my device?
What happens if an employee leaves the company with sensitive records on
his mobile device? We need to address these issues and then we need to
move beyond them.”
3. What are the key business drivers for how enterprise should invest in
BYOD 2.0?
“The p ...
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docxmattinsonjanel
TEC H | 10/04/2013 @ 6:15PM | 15,497 views
“Cell phones” at work are not new. Nor are smart phones. Many credit
Blackberry for inventing the concept, but few would argue that Apple with its
iPhone, more than other device created this explosive phenomena called
BYOD – Bring Your Own Device to work.
Most of what BYOD seems to represent so far is an unbalanced equation in
favor of employees. Employees may be happier because they can carry their
favorite device to get company email, but it is not clear that employers are
happy with the results. Keep in mind, that 90%+ of BYOD activities are
email, calendar, personal banking, news, family life coordination, Twitter
and Facebook, but little else.
In my conversations with business and technology leaders, many
organizations are asking themselves if the fully loaded costs of
~$5.50/month/employee, in addition to any device or services subsidy, is
worth it to the company.
If BYOD 1.0 is about employees, what might a BYOD 2.0 look like?
What are enterprises looking to get out of BYOD going forward? With this in
mind, I have been asking a lot of CIO’s, Directors of IT and other smart
people what they think.
Once such person is Yaacov Cohen, CEO of harmon.ie, a fast growing
enterprise mobility company. Yaacov talks to senior executives around the
world about how better collaborated ideas and increased productivity can
take place via personal use of mobile devices at work – and he has some
pretty interesting insights to share.
1. Yaacov, how do we move from this Bring Your Own Device (BYOD)
paradigm into BYOD 2.0, which you talk about as more of a “Use Your Own
Device” mentality?
“Everyone has been talking about BYOD, which should be more than
bringing their devices to work and then putting them to the side and saying,
“Hey, stay quiet. Don’t disturb me. I’ve got a lot of work to do.” And they go
to their laptops and do most of their work.”
“We want to change that. Business leaders are looking for change. The
mobile enterprise and BYOD 2.0 is not about bringing devices to work; it is
about using devices for work. How does business turn these shiny new toys
into business tools?”
“That means allowing employees to work with customers, review contracts,
write blog posts – do real work on mobile devices.”
2. Is BYOD a good idea in a practical sense?
“BYOD essentially means freedom of choice. Today’s IT professionals
recognize the need to work with users rather than impose procedures and
systems on them. BYOD is an expression of our world, which is becoming
more democratic and more engaging.”
“We’ve gotten stuck on the infrastructure side of things. It is true that mobile
brings a lot of questions about security. What happens if I lose my device?
What happens if an employee leaves the company with sensitive records on
his mobile device? We need to address these issues and then we need to
move beyond them.”
3. What are the key business drivers for how enterprise should invest in
BYOD 2.0?
“The p ...
By valuing deliverables, collaboration, and innovation through a focus on a shared work culture of Excellence from Anywhere, you can instill in your employees a focus on deliverables. The core idea is to get all of your workforce to pull together to achieve business outcomes: The location doesn’t matter.
2014 Guide to Backroom-to-Boardroom Payroll and HRPaylocity
To get from the backroom to the boardroom might not be easy. But we believe you can do it if you have the right tools. In this eBook you will learn the importance of trends like:
- Mobility: How the increase in mobile devices is changing business
- Employee Engagement: Why it matters and easy ways to make improvements
- Big Data: How “big” data applies to small and mid-sized businesses
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. WHAT IS CYBER LOAFING?
Cyber loafing is anytime you're on the web at work doing non-work-
related activities. The study finds that 60 to 80 percent of the time
workers spend on the Internet on the job is spent doing things that
have nothing to do with work.'
4. . Cyberloafing is No.1 reported way employees waste time, according to a
survey of 10,000 employees, and 44.7% cited cyberloafing as their No.1
distraction at work…
A modern example is staff who use their work internet access for personal
reasons while maintaining the appearance of working, which can lead to
inefficiency.
According to study by Kansas State University;between 60 and 80% of
people cyberloaf…
cyberloafing costs U.S. employers $1 billion per year in computer
resources,
5. FACTORS AFFECTING CYBER LOAFING
An internet presence in the workplace is the main facilitator,
Dissatisfaction with one’s job, to a lack of sleep can lead to an
increase in cyber loafing behaviours.
As demands on workers increase, most cyber loafing occurs in an
attempt to regulate the work-life balance.
6. THE MOST COMMON FORMS OF CYBER
LOAFING ARE
Checking personal email,
Social media,
Playing games,
Watching videos,
Online shopping,
Managing finances,
Find new job …
7. SOLUTIONS OF CYBER LOFING..
Many firms employ surveillance software to track employees' Internet activity in an
effort to limit liability and improve productivity.
Other methods used to reduce goldbricking include installation of proxy servers to
prevent programs from accessing resources like Facebook, Messenger, yahoochat or
some online gambling services,
Monitoring
8. THERE ARE VARIOUS TECHNIQUES THAT CAN BE
USED TO HELP PREVENT CYBER LOAFING FROM
HAPPENING IN YOUR ORGANIZATION.
It is important to remember that it is not enough to simply have a
policy in place because it must also be enforced.
Second, depending on how ethical your employees are, their
likelihood of engaging in cyber loafing will vary. If the company
treats its employees well and makes decisions ethically, there is a
greater chance that the employees will notice this and will not
want to do anything to harm the organization.
Besides these methods, it is also possible to allot a specific amount
of time for employees to use the Internet however they choose. This
way, they can take a break and come back to their work with a
clear head.
9. REAL LIFE EXAMPLE
Goldbricking became a mainstream topic when Yahoo! announced in late February of
2013 that it was banning the practice of telecommuting because it discovered its
remote employees were not logging into the corporate VPN often enough.