47 research outputs found
A comparative study of social media use in hiring processes in the united states, the United Kingdom and Kenya
A dissertation submitted in partial fulfilment of the requirements for the award of the degree of Bachelor of LawsThe main aim of this research is to investigate whether refugees pose a threat to the national
security of Kenya. The objects of the study were: to investigate whether refugees portend any
security threats in Kenya, to establish for policy recommendation whether screening measures
currently in place are able to separate criminals that do not deserve international protection at
Kenyan borders, airports and sea entry points and to determine whether drastic government
measures to deter hosting of criminal elements among refugees has had any consequences on
genuine refugees. The target population of the research consisted of: refugees, government
officials and host communities. This study employed secondary data, with data retrieved from
various databases such as Hein Online, JSTOR and Lex is Nexis. Analysis of the media reports
and statutes on refugees and national security in Kenya was also used. The study recommends
that Kenya has an obligation of providing security to its citizens and also to protect the
physical security of refugees living in its camps. There is therefore the need to strike a balance
between obeying international obligations and that of protecting national interests
Depraved, Distracted, Disabled, or Just âPack Ratsâ? Workplace Hoarding Personas in Physical and Virtual Realms
This article provides some potential directions in exploring the construction of the persona of the âhoarderâ and addresses how such a persona can move to the foreground of an individualâs set of workplace-related personas. Hoarding throws into relief some critical concerns about the social standings of individuals in workplaces and the extent to which they have autonomous expression. The article frames hoarding in terms of its capacity to externalize particular social issues (such as environmental problems) and generate public discourse, and examines both physical hoardings (books and papers in academic and office settings, for example) and hoardings of virtual goods (such as digital music, video files, and pornographic images). Virtual hoardings have been constructed as problematic as they create barriers to the free flow of information in the workplace and can challenge organizational interests related to intellectual property concerns. Hoarding as a whole is becoming more tightly circumscribed as a workplace and community condition, in part because the ability to manage physical and virtual items in confined settings is considered central to many forms of competent societal functioning.An assortment of human resource management initiatives to mitigate hoarding concerns has developed, including the consideration of hoarding as a disability. However, hoarding behavior is increasing creating problems for those who are searching for simple definitions or straightforward diagnostic criteria. This article also provides some structures for analysis of the class-related and economic dimensions of workplace hoarding personas, and explores potential implications of lifelogging initiatives and hoarding acceptance approaches
The Hunt for Privacy Harms After \u3ci\u3eSpokeo\u3c/i\u3e
In recent years, due both to hacks that have leaked the personal information of hundreds of millions of people and to concerns about government surveillance, Americans have become more aware of the harms that can accompany the widespread collection of personal data. However, the law has not yet fully developed to recognize the concrete privacy harms that can result from what otherwise seems like ordinary economic activity involving the widespread aggregation and compilation of data. This Note examines cases in which lower federal courts have applied the Supreme Courtâs directions for testing the concreteness of alleged intangible privacy injuries, and in particular how that inquiry has affected plaintiffsâ suits under statutes that implicate privacy concerns. This Note proposes that, in probing the concreteness of these alleged privacy harms, the courts, through the doctrine of standing, are engaging in work that could serve to revitalize the judiciaryâs long-dormant analysis of the nature of privacy harms. It suggests that courts should look beyond the four traditional privacy torts to find standing for plaintiffs who bring claims against entities that collect and misuse personal information. This Note urges courts to make use of a nexus approach to identify overlapping privacy concerns sufficient for standing, which would allow the federal judiciary to more adequately address emerging privacy harms
Legal and Ethical Implications of Corporate Social Networks
Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employerâs and employeeâs interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to configuration, communication, discipline, and evaluation of policies. Corporate social networking policies should be business-related, ensure user notification of monitoring, maintain adequate records, and provide for reliable, consistent, and impersonal evaluation of monitoring effectiveness
Digital hoarding behaviours: measurement and evaluation
The social and psychological characteristics of individuals who hoard physical items are quite well understood, however very little is known about the psychological characteristics of those who hoard digital items and the kinds of material they hoard. In this study, we designed a new questionnaire (Digital Behaviours Questionnaire: DBQ) comprising 2 sections: the Digital Hoarding Questionnaire (DHQ) assessing two key components of physical hoarding (accumulation and difficulty discarding); and the second measuring the extent of digital hoarding in the workplace (Digital Behaviours in the Workplace Questionnaire: DBWQ). In an initial study comprising 424 adults we established the psychometric properties of the questionnaires. In a second study, we presented revised versions of the questionnaires to a new sample of 203 adults, and confirmed their validity and reliability. Both samples revealed that digital hoarding was common (with emails being the most commonly hoarded items) and that hoarding behaviours at work could be predicted by the 10 item DHQ. Digital hoarding was significantly higher in employees who identified as having âdata protection responsibilitiesâ, suggesting that the problem may be influenced by working practices. In sum, we have validated a new psychometric measure to assess digital hoarding, documented some of its psychological characteristics, and shown that it can predict digital hoarding in the workplace
Privacy in the Workplace: Are Collective Bargaining Agreements a Place to Start Formulating More Uniform Standards?
This paper discusses ambiguities related to laws in employee privacy and posits that this is problematic for both employers and employees. The article discusses how private employers have almost no restrictions when it comes to employee monitoring, especially when there is an announced (albeit vague) policy. The article then suggests that unions have at least some negotiating power in terms of setting standards for when an employee may be disciplined and thus, labor unions have at least a modicum of power in negotiating clear rules regarding employee monitoring. The paper further suggests that clear policies aren\u27t a bad thing, and that if clear policies are adopted in collective bargaining agreements, those policies might find their way into the private sector