... Reference 1. The main purpose for creating and maintaining the NBI is to monitor the condition of bridgescarrying public highways. Therefore, for funding and reporting purposes, the FHWA considers ... entered into the 2003 NBI. The delay may be due to a lag betweeninspection and entry of data into the NBI. Therefore, data on bridges built during 2001 and 2002 maybe incomplete. The incomplete ... bridges inthe state andsubmits them annually to the FHWA, where they are entered into the National Bridge Inventory(NBI) database. The NBI must be updated annually as existing bridges are reinspected,...
... of the sample.Coding the Narratives The goal of the coding scheme was to capture the major themes andrelationships respondents mentioned in their answers. We developed the coding scheme inductively, ... well-being from a different lens by introducing the concept of Internetaddiction, specifically looking at online pornography, sexually related Internetcrime, and online gambling inthe workplace. ... sanctions, and individual psychological well-being should be part of the training process in organizations as much as tech-nical training. In Chapter 12, Mark Griffiths continues to examine the issue...
... and rejected that inthe ordinary course ofbusiness” includes anything of interest to the employer’s business. The Courtstated that the exclusion does not apply to the interception of personal ... determine whether alegitimate business justification for the monitoring exists. Here factors such aswhether the employer provided notice to the employee of the monitoring andwhether the level ... managing the interface between humansand information technology — particularly the Internet. Many have argued thatweb usage at work is being misused and that there is a high cost in giving webaccess...
... section briefly examines the major issues surrounding Internet gambling inthe workplace.Internet gambling is one of the newer opportunities for gambling in the workplace. There are now a huge ... dealing with problems thatthey can address with isolated intra-company policies. Rather, Internet abuse in the workplace is intricately linked to the world outside the company. The sources of the ... creating other personas and forming online relationships or engaging in cybersex (see above) (Griffiths, 2000c, 2001).Internet activity abuse involves the use of the Internet during work hoursin...
... 2002).To further investigate the consequences of personal Internet usage, thischapter defines personal Internet usage as the use of the Internet and e-mail in the workplace for personal interests.” ... takinglonger breaks, etc. (Bolin & Heatherly, 2001). Therefore, the attitude towardusing Internet technology is defined as an individual’s positive and negativefeelings about using the Internet ... Monitoring and Filtering Policy — while enhancing their workperformance through personal Internet usage inthe workplace.INTRODUCTIONModern organizations recognize the benefits of the Internet...
... and the nearest freeway, which islocated to the west of the study area. The circle within the map of the Netherlands indicates were the study area is situated, the area marked in black is the ... importantly to the findings of this study, a finding which may be ofimportance for setting up future studies. As subjectsdiagnosed inthe screening were un aware of their dis-ease, bias in especially ... more accurat e in women than in men. The women in this population are of a genera-tion in which working outside of the home was rare. At the time of screening, women in this study thereforewere...
... allegiance.Given these constraints on outside intervention, this monograph emphasizes the role of the U.S. military, and USAF in particular, in training, advising, and equipping partner nations so that they ... Air Power inthe New Counterinsurgency Eracontinues to stress the insurgent goal of building a “counterstate” that will emerge from the shadows and assume power, as in China during the late ... beyond these specific conflicts. It is important, therefore, that the U.S. Air Force (USAF) consider how to meet the growing demand for air power in joint, combined, and interagency counterinsurgency...
... be the main thrust of the Act. It drafters intended the CDA to introduce newcriminal offences of knowingly creating, sending, transmitting or displaying obscene orindecent materials to minors, ... it does to the print medium. The application of the law to an Internet web archive suggests the following points:• the display of false information damaging to the reputation of the person referred ... developing and the chemist forwarded them to the police. Ironically, the student had taken the photographs to include them in a thesis entitled ‘Fine Art versusPornography.’ It seems that the police,...