Telework/Commuting Teleworking - Is It Research Proposal

PAGES
5
WORDS
1605
Cite

Teleworkers would likely emphasize the reduced or eliminated commuting times previously involved in simply getting to and from the workplace which represents time they can devote to their organizational responsibilities. Furthermore, teleworkers would also emphasize the fact that they are more productive working from home because of fewer workplace interruptions such as incessant telephone calls or chatty co-workers who detract from their efficiency. Many managers as well would like cite the advantages of having a motivated workforce that is empowered to fulfill their organizations responsibilities from home and note the improved employee morale that is likely to accompany such initiatives. Finally, the research also indicated that there are some constraints to such alternative working arrangements, though, including their impact on traditional career trajectories, the problems associated with monitoring performance and productivity and the lack of face-to-face exchanges that some managers may prefer. All in all, though, the handwriting is on the wall for everyone...

...

This trend spells good news for an energy-hungry country where workers will not be spending several hours every day burning fuel in fuel-inefficient vehicles but will rather be able to devote these hours to more productive work.

Sources Used in Documents:

References

Ellison, N.B. (2004). Telework and social change: How technology is reshaping the boundaries between home and work. Westport, CT: Praeger.

Joice, W. (2007). Implementing telework: The technology issue two studies examine technology challenges that may pose barriers to mainstreaming federal telework and tell public managers how to overcome them. The Public Manager, 36(2), 64-65.

Nilles, J.M. (1998). Managing telework: Strategies for managing the virtual workforce. New York: Wiley in Vega at p. 6.

Vega, G. (2003). Managing teleworkers and telecommuting strategies. Westport, CT: Praeger.


Cite this Document:

"Telework Commuting Teleworking - Is It" (2009, March 23) Retrieved May 2, 2024, from
https://www.paperdue.com/essay/telework-commuting-teleworking-is-it-23698

"Telework Commuting Teleworking - Is It" 23 March 2009. Web.2 May. 2024. <
https://www.paperdue.com/essay/telework-commuting-teleworking-is-it-23698>

"Telework Commuting Teleworking - Is It", 23 March 2009, Accessed.2 May. 2024,
https://www.paperdue.com/essay/telework-commuting-teleworking-is-it-23698

Related Documents

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Both types -- qualitative and quantitative -- have their advantages and disadvantages. One of the most well-known of the quantitative risk metrics is that that deals with calculation of annual loss expectancy (ALE) (Bojanc & Jerman-Blazoc, 2008). ALE calculation determines the monetary loss associated form a single occurrence of the risk (popularly known as the single loss exposure (SLE)). The SLE is a monetary amount that is assigned to

Security Breach at Target
PAGES 2 WORDS 580

Computer Security Breaches Internal Controls and Receivables On December the 19th Target publicly acknowledged they had suffered a data breach, which had resulted in the loss of 40 million customer payment card details, along with their names, expiry dates, and the encrypted security codes (Munson, 2013), At the time this was one of the largest security breaches, with the firm suffering not just because they were targeted by criminals, but as a

The next thing is to immediately contact the FOIP Coordinator, Privacy Officer, Responsible Affiliate as well as any other person who is responsible for the organization's it security. Evaluation of the Risks Associated with the Breach There is a need to evaluate the risks associated with the privacy breach. This should be done with a consideration of personal as well as health information (Social Insurance Number, financial information or any other

Today only a General Manager of a distribution center can gain access to the databases where customer records are kept and only by role access privileges can they even see them, which were a requirement of customers who were outraged by the breach (Shine, 2012). Providing Greater Security for Customers: Two Alternatives The most effective security strategy Amazon can take in light of the breach of their confidential data from internally

Lessons Learned From Zappos' Security Breach in January, 2012 On January 16, 2012 Zappos' experienced its first major security breach through a compromised server at its recently opened Kentucky Distribution Center, with an experienced hacker gaining access to potentially 24 million customer records. The Zappos' internal ordering systems had encrypted passwords for safety as part of its basic architecture, yet the last four digits of credit cards, complete customer histories and