... Reference 1.
The main purpose for creating and maintaining the NBI is to monitor the condition of bridges
carrying public highways. Therefore, for funding and reporting purposes, the FHWA considers ... entered into the 2003 NBI. The delay may be due to a lag between
inspection and entry of data into the NBI. Therefore, data on bridges built during 2001 and 2002 may
be incomplete. The incomplete ... bridges inthe state and
submits them annually to the FHWA, where they are entered into the National Bridge Inventory
(NBI) database. The NBI must be updated annually as existing bridges are reinspected,...
... of the sample.
Coding the Narratives
The goal of the coding scheme was to capture the major themes and
relationships respondents mentioned in their answers. We developed the
coding scheme inductively, ... well-being from a different lens by introducing the concept of Internet
addiction, specifically looking at online pornography, sexually related Internet
crime, and online gambling inthe workplace. ... sanctions, and individual psychological well-
being should be part of the training process in organizations as much as tech-
nical training. In Chapter 12, Mark Griffiths continues to examine the issue...
... and rejected that inthe ordinary course of
business” includes anything of interest to the employer’s business. The Court
stated that the exclusion does not apply to the interception of personal ... determine whether a
legitimate business justification for the monitoring exists. Here factors such as
whether the employer provided notice to the employee of the monitoring and
whether the level ... managing the interface between humans
and information technology — particularly the Internet. Many have argued that
web usage at work is being misused and that there is a high cost in giving web
access...
... section briefly examines the
major issues surrounding Internet gambling inthe workplace.
Internet gambling is one of the newer opportunities for gambling in the
workplace. There are now a huge ... dealing with problems that
they can address with isolated intra-company policies. Rather, Internet abuse
in the workplace is intricately linked to the world outside the company. The
sources of the ... creating other personas and forming online relationships or engaging
in cybersex (see above) (Griffiths, 2000c, 2001).
Internet activity abuse involves the use of the Internet during work hours
in...
... 2002).
To further investigate the consequences of personal Internet usage, this
chapter defines personal Internet usage as the use of the Internet and e-mail
in the workplace for personal interests.” ... taking
longer breaks, etc. (Bolin & Heatherly, 2001). Therefore, the attitude toward
using Internet technology is defined as an individual’s positive and negative
feelings about using the Internet ... Monitoring and Filtering Policy — while enhancing their work
performance through personal Internet usage inthe workplace.
INTRODUCTION
Modern organizations recognize the benefits of the Internet...
... and the nearest freeway, which is
located to the west of the study area. The circle within the map of the Netherlands indicates were the study area is situated, the area marked in
black is the ... importantly to
the findings of this study, a finding which may be of
importance for setting up future studies. As subjects
diagnosed inthe screening were un aware of their dis-
ease, bias in especially ... more accurat e in women than
in men. The women in this population are of a genera-
tion in which working outside of the home was rare. At
the time of screening, women in this study therefore
were...
... allegiance.
Given these constraints on outside intervention, this monograph
emphasizes the role of the U.S. military, and USAF in particular, in
training, advising, and equipping partner nations so that they ... Air Power inthe New Counterinsurgency Era
continues to stress the insurgent goal of building a “counterstate” that
will emerge from the shadows and assume power, as in China during
the late ... beyond these
specific conflicts. It is important, therefore, that the U.S. Air Force
(USAF) consider how to meet the growing demand for air power in
joint, combined, and interagency counterinsurgency...
... be the main thrust of the Act. It drafters intended the CDA to introduce new
criminal offences of knowingly creating, sending, transmitting or displaying obscene or
indecent materials to minors, ... it does to
the print medium.
The application of the law to an Internet web archive suggests the following points:
• the display of false information damaging to the reputation of the person referred ... developing and the chemist forwarded them to the police. Ironically, the
student had taken the photographs to include them in a thesis entitled ‘Fine Art versus
Pornography.’ It seems that the police,...