Investigating employee harassment via social media
暂无分享,去创建一个
[1] Gundars Kaupins,et al. Legal and Ethical Implications of Corporate Social Networks , 2011 .
[2] T. V. Laer,et al. The Means to Justify the End: Combating Cyber Harassment in Social Media , 2013, Journal of Business Ethics.
[3] Sylvia Kierkegaard,et al. Twitter thou doeth? , 2010, Comput. Law Secur. Rev..
[4] Avnita Lakhani. Social networking sites and the legal profession: Balancing benefits with navigating minefields , 2013, Comput. Law Secur. Rev..
[5] Eric A. Storch,et al. Has Cyber Technology Produced a New Group of Peer Aggressors? , 2011, Cyberpsychology Behav. Soc. Netw..
[6] N. Geach,et al. Regulating Harassment: Is the Law Fit for the Social Networking Age? , 2009 .
[7] John Haggerty,et al. Forensic investigation of social networking applications , 2014, Netw. Secur..
[8] Margaret Anne Carter,et al. Third Party Observers Witnessing Cyber Bullying on Social Media Sites , 2013 .
[9] David Ormerod,et al. Social networking material as criminal evidence , 2012 .
[10] P. Thompson,et al. Social Media(tion) and the Reshaping of Public/Private Boundaries in Employment Relations , 2016 .
[11] Bahaudin G. Mujtaba,et al. Social Media and the Workplace: Legal, Ethical, and Practical Considerations for Management , 2013 .
[12] Kevin J. Jones,et al. Sexual Harassment Versus Workplace Romance: Social Media Spillover and Textual Harassment in the Workplace , 2013 .
[13] Wu He,et al. A review of social media security risks and mitigation techniques , 2012, J. Syst. Inf. Technol..
[14] Kevin J. Jones,et al. Workplace Romance 2.0: Developing a Communication Ethics Model to Address Potential Sexual Harassment from Inappropriate Social Media Contacts Between Coworkers , 2013 .
[15] James Field,et al. Employers need to get to grips with social-media risks , 2013 .
[16] Chris Piotrowski,et al. From Workplace Bullying to Cyberbullying: The Enigma of ?-Harassment in Modern Organizations , 2012 .
[17] D. Mcgoldrick,et al. The Limits of Freedom of Expression on Facebook and Social Networking Sites: A UK Perspective , 2013 .
[18] Ibrahim Baggili,et al. Forensic analysis of social networking applications on mobile devices , 2012, Digit. Investig..
[19] Kathy Eivazi,et al. Computer use monitoring and privacy at work , 2011, Comput. Law Secur. Rev..
[20] Willow S. Jacobson,et al. To Post or Not to Post , 2013 .
[21] Mark J. Weal,et al. Social media on the job: an exploration of the potential legal consequences of employees' social media activities during the course of employment , 2011, WebSci '11.