This translates into a delay in the project delivery schedule. Additionally, the project delays could generate major customer dissatisfactions, or the breakage of contractual terms, which could easily materialize in more severe organizational losses. Nevertheless, considering that the employee works overtime to reduce the chance of project delays, this time has to be remunerated; virtually, it translates into increased financial costs for the company. Then, the mobile telephone could be used to make quick telephones to competitors and as such sabotage the company's efforts and success chances.
3. Opponents of an IT Policy
Despite the validity of the arguments presented in favor of implementing a strong IT policy, fact remains that there exist also some reasons which make a strong IT policy less favorable within the context of the modern workplace. These are succinctly described below.
3.1. Installation of pirated software
The matter of piracy in the workplace is somewhat different from the following three parts for the simple reason that it involves not only features of morality and work ethics, but is in its essence an illegal operation. Given this situation, it is rather difficult for anyone to generate a strong argument that would militate for freedom to steel software applications within a business context. Nevertheless, some arguments in favor of piracy, and as such the lack of an IT policy, have been forwarded. According to them:
Piracy often occurs when the product is too expensive; yet, the scope of the developer is that of having the consumers use the product; this virtually means that piracy efforts increase the popularity of a software application and support the development of the field (Computer Business Review, 2007)
Piracy can generate cost savings for the company; this feature is common in some organizations, in which managers turn a blind eye to employees who illegally download software applications to get the job done
Piracy has the final benefit of allowing the employee to test an application, and then make an informed recommendation for purchase to his/her manager
3.2. Monitoring of employee telephones, emails and webs access
Monitoring the telephones made by the employees or the emails they send and the web pages they access is in great contrast with the privacy regulations. In this order of ideas, the company's monitorization of an employee's web pages could reveal that he/she is verifying various adoption websites and forums. Now considering that the respective employee is being currently considered for a promotion with increased responsibilities that would require the individual to put in longer hours, the managerial realization that the respective employee might be welcoming a baby soon could reduce the eagerness to promote the employee. They would then promote another employee, who is not likely to engage in personal projects throughout the near future and who is as such able to dedicate more time to the company. This example reveals a situation of not only invaded privacy, but even out right discrimination.
Another instance of invaded privacy is offered by the case of an employee constantly calling a medical facility to confirm appointments with a specialty medic. That individual might be confronted with a difficult period and the invasion of privacy on the part of the employer would only generate frustrations, conflicts, reduced performances and so on.
3.3. Blocking website access and chatting programs
The major benefit of internet blocking and filtering is that of reducing the employees' access to immoral web pages and as such protecting the organizational reputation. In other contexts however, the benefits of the endeavor are virtually inexistent. Take for instance the case of a highly capable and committed employee who is exhausted from working hard on a project. In order to get his ideas back in order and gather sufficient power of concentration to carry on, he needs to spend some time to relax and browse through some internet pages that relax him, such as amusing videos on youtube.com or some jokes and funny pictures on various other websites. This will however be impossible in the context of a strong IT policy. In other words then, limitation of internet access generates a direct negative impact on the concentration powers of the employees, as well as their creativity levels. Ultimately, the company loses.
A second example as to why an IT policy limiting the employees' access to the internet is offered by a situation in which an employee is going through a personal crisis and could use chatting programs to release some tension and resolve his problems. Once he achieves these desiderates, his power of concentration and commitment to organizational goals would increase. Nevertheless, since his usage of chatting programs is restricted, the employee will have to deal with his issues alone, without any...
4. Exit interview As the decision to terminate the employment relationship has been made and even set in motion, the employee is asked to participate in an exit interview. This interview is generally held throughout the last days the employee spends in the organization and it focuses on retrieving feedback related to the reasons as to which the employee has chosen to leave; his feelings and opinions regarding the time he
Short-term wins creation In this case, the insistence is on the enhancement of credibility for change through demonstrating gains made. In the case of News Corp, those who excel in change related initiatives could be rewarded and recognized going forward. Building on Change/Consolidation of Gains Here, quick wins should be taken as a beginning and not as an end. Hence in a way, victory must not be declared before the whole change process
As a strategist for JetBlue I would find differentiation to be the most difficult. The discount airline business is highly commoditized and vigorously competitive. Sources of differentiation are scarce. All competitors have almost equal access to the same technology and same routes. Competitors attempt to differentiate based on service levels, yet none of their service initiatives are a source of sustainable competitive advantage. Furthermore, differentiation is not the main driver
Policy Strategy Innovation A Policy Strategy of Innovation Organizational survival and success are predicated on the establishment of a strategic orientation and a set of clear, realistic and relevant policies intended to drive this strategy. From these features, an organization will ultimately derive goals, procedural norms, role designation, organizational culture, leadership orientation and a host of other defining features. It is thus that the Policy Strategy driving a company will ultimately come
This balkanization is partially driven by the lack of integration between various segments of itself, and this is primarily a technological limitation. Yet the far broader and more difficult challenge in this regard is the segregating of knowledge not just for profit, but for lasting competitive advantage between nations. On the one hand there is the need for competitive differentiation in company's offerings, yet in others including the sharing
Company Law Brief synopsis of the situation Jane is the Marketing Manager of Prints Pty Limited. She has recently made some purchases on company account including leasing a new car, a photocopier, a reconditioned printing press and photo copy paper supply. While all the other purchases were made by Jane on her own discretion, the printing press was co-signed by John, part owner of Prints Pty limited. John tells Jane that while he
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now