47 research outputs found

    A comparative study of social media use in hiring processes in the united states, the United Kingdom and Kenya

    Get PDF
    A dissertation submitted in partial fulfilment of the requirements for the award of the degree of Bachelor of LawsThe main aim of this research is to investigate whether refugees pose a threat to the national security of Kenya. The objects of the study were: to investigate whether refugees portend any security threats in Kenya, to establish for policy recommendation whether screening measures currently in place are able to separate criminals that do not deserve international protection at Kenyan borders, airports and sea entry points and to determine whether drastic government measures to deter hosting of criminal elements among refugees has had any consequences on genuine refugees. The target population of the research consisted of: refugees, government officials and host communities. This study employed secondary data, with data retrieved from various databases such as Hein Online, JSTOR and Lex is Nexis. Analysis of the media reports and statutes on refugees and national security in Kenya was also used. The study recommends that Kenya has an obligation of providing security to its citizens and also to protect the physical security of refugees living in its camps. There is therefore the need to strike a balance between obeying international obligations and that of protecting national interests

    Depraved, Distracted, Disabled, or Just “Pack Rats”? Workplace Hoarding Personas in Physical and Virtual Realms

    Get PDF
    This article provides some potential directions in exploring the construction of the persona of the “hoarder” and addresses how such a persona can move to the foreground of an individual’s set of workplace-related personas. Hoarding throws into relief some critical concerns about the social standings of individuals in workplaces and the extent to which they have autonomous expression. The article frames hoarding in terms of its capacity to externalize particular social issues (such as environmental problems) and generate public discourse, and examines both physical hoardings (books and papers in academic and office settings, for example) and hoardings of virtual goods (such as digital music, video files, and pornographic images). Virtual hoardings have been constructed as problematic as they create barriers to the free flow of information in the workplace and can challenge organizational interests related to intellectual property concerns. Hoarding as a whole is becoming more tightly circumscribed as a workplace and community condition, in part because the ability to manage physical and virtual items in confined settings is considered central to many forms of competent societal functioning.An assortment of human resource management initiatives to mitigate hoarding concerns has developed, including the consideration of hoarding as a disability. However, hoarding behavior is increasing creating problems for those who are searching for simple definitions or straightforward diagnostic criteria. This article also provides some structures for analysis of the class-related and economic dimensions of workplace hoarding personas, and explores potential implications of lifelogging initiatives and hoarding acceptance approaches

    The Hunt for Privacy Harms After \u3ci\u3eSpokeo\u3c/i\u3e

    Get PDF
    In recent years, due both to hacks that have leaked the personal information of hundreds of millions of people and to concerns about government surveillance, Americans have become more aware of the harms that can accompany the widespread collection of personal data. However, the law has not yet fully developed to recognize the concrete privacy harms that can result from what otherwise seems like ordinary economic activity involving the widespread aggregation and compilation of data. This Note examines cases in which lower federal courts have applied the Supreme Court’s directions for testing the concreteness of alleged intangible privacy injuries, and in particular how that inquiry has affected plaintiffs’ suits under statutes that implicate privacy concerns. This Note proposes that, in probing the concreteness of these alleged privacy harms, the courts, through the doctrine of standing, are engaging in work that could serve to revitalize the judiciary’s long-dormant analysis of the nature of privacy harms. It suggests that courts should look beyond the four traditional privacy torts to find standing for plaintiffs who bring claims against entities that collect and misuse personal information. This Note urges courts to make use of a nexus approach to identify overlapping privacy concerns sufficient for standing, which would allow the federal judiciary to more adequately address emerging privacy harms

    Legal and Ethical Implications of Corporate Social Networks

    Get PDF
    Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to configuration, communication, discipline, and evaluation of policies. Corporate social networking policies should be business-related, ensure user notification of monitoring, maintain adequate records, and provide for reliable, consistent, and impersonal evaluation of monitoring effectiveness

    Digital hoarding behaviours: measurement and evaluation

    Get PDF
    The social and psychological characteristics of individuals who hoard physical items are quite well understood, however very little is known about the psychological characteristics of those who hoard digital items and the kinds of material they hoard. In this study, we designed a new questionnaire (Digital Behaviours Questionnaire: DBQ) comprising 2 sections: the Digital Hoarding Questionnaire (DHQ) assessing two key components of physical hoarding (accumulation and difficulty discarding); and the second measuring the extent of digital hoarding in the workplace (Digital Behaviours in the Workplace Questionnaire: DBWQ). In an initial study comprising 424 adults we established the psychometric properties of the questionnaires. In a second study, we presented revised versions of the questionnaires to a new sample of 203 adults, and confirmed their validity and reliability. Both samples revealed that digital hoarding was common (with emails being the most commonly hoarded items) and that hoarding behaviours at work could be predicted by the 10 item DHQ. Digital hoarding was significantly higher in employees who identified as having ‘data protection responsibilities’, suggesting that the problem may be influenced by working practices. In sum, we have validated a new psychometric measure to assess digital hoarding, documented some of its psychological characteristics, and shown that it can predict digital hoarding in the workplace

    Privacy in the Workplace: Are Collective Bargaining Agreements a Place to Start Formulating More Uniform Standards?

    Get PDF
    This paper discusses ambiguities related to laws in employee privacy and posits that this is problematic for both employers and employees. The article discusses how private employers have almost no restrictions when it comes to employee monitoring, especially when there is an announced (albeit vague) policy. The article then suggests that unions have at least some negotiating power in terms of setting standards for when an employee may be disciplined and thus, labor unions have at least a modicum of power in negotiating clear rules regarding employee monitoring. The paper further suggests that clear policies aren\u27t a bad thing, and that if clear policies are adopted in collective bargaining agreements, those policies might find their way into the private sector
    corecore