When you ask most people what it means to steal from their company, you 're likely to get answers about making copies at the office, taking home pens or other office supplies, or maybe even padding your expense report. Generally, people are not likely to mention a type of theft that has become more widespread in this age of the Internet and social media, time theft. Younger workers may not even recognize this as theft; they’ve grown up with constant access to the web and view it as normal, if not even an entitlement. But surfing the web on company time is indeed theft, as is anything else that takes an employee 's time or attention away from the work they are being paid to do. With the internet on almost everyone’s phone it is also hard to …show more content…
Those methods still occur, but even offices without a strict time clock can experience time theft. Does one of your co-workers always come in a little late each morning or sneak out early a couple afternoons a week? Are her lunch hours just a little longer than an hour and then she has to use the restroom as soon as she walks in? It may be "no big deal" to her, but she is, in reality, stealing from the company. Not only is she not at work, never mind being productive, when she 's supposed to be, she 's likely creating a distraction and grumbling among colleagues who do put in their full day. This is so true, one co-worker in our office takes at least 4 to 6 smoke/bathroom breaks a day and more often than not, she is not at her own desk. It really makes the people working their 8 hours feel cheated. It causes hard feelings and makes employees question why their supervisor doesn’t say or do …show more content…
It’s shocking, but it’s also consistent with a Seminal Time theft survey conducted by Robert Half International, which found that employers lose about 4.5 hours per week per employee. While every employer has to deal with time theft, it’s especially challenging for companies with a distributed workforce. When you have employees in different locations, even different countries the problem can be compounded. Different cultures view time differently. So, even if you hire carefully and manage scrupulously, chances are you have some percentage of workforce theft in your midst, and that likely includes time theft”. (Donskey
Miller, G. (2010, October 12). Twenty Something Finance . Retrieved April 12, 2011, from The U.S. is the Most Overworked Developed Nation in the World – When do we Draw the Line?: http://20somethingfinance.com/american-hours-worked-productivity-vacation/
She uses various statistics to support her claims such as “Americans are sleeping on average 60-90 minutes less than other countries (Schor, 5)”. Not only are Americans spending more time working but because of their hectic work schedules they also get less time sleeping, which can lead to a variety of other problems. Schor continues throughout the book with different reasons to support her claim. She goes on to say that many of the white collar workers feel that is a need to “overwork” in order to meet the needs of their job. “Schor tells us that many overworked Americans-and she is not talking about the unemployed or underemployed but the overemployed professional, white collar management, and skilled workers-have lost any sense of autonomy over their jobs (Schor 4)”. The author clearly makes it obvious that American workers are working way more and as time goes on this trend will continue to
As a country, we support the terms “freedom”, “equality”, and “rights”. However, we need to focus on the working citizens of the United States and ensure equal rights for everyone. The wage theft website indicates that wage theft is not stereotypical, and the issue is not primarily in specific work fields. No worker can particularly avoid wage theft, whether it’s good wages or great benefits. Wage theft is more likely to occur in non-union workplaces.
Technology Tackles Employee Theft. (2005). Retail World, 58(3), 41. Retrieved May 10, 2005, from ABI-Inform Online
The development of the four-day workweek actually began in the 1970s as a theoretical practice to help organizations optimize operations while saving resources and improving worker quality of life (Poor, 2010). Beginning in the 1980s, the use of the four-day workweek began to accelerate and the Department of Labor began keeping records regarding outcomes for companies using this work arrangement (Poor, 2010). Although the Department of Labor continues to track alternative work arrangements, Poor contends that four-hour workweeks have morphed into flexible work arrangements with companies offering workers a wide range of programs to acquire time-off from the traditional 5/40 schedule. Even though efforts to evaluate the impact of the four-day workweek have shifted to a general classification of outcomes for flextime, the four day-workweek remains the principle tool used by organizations to offer ...
When the Fair Labor Association completed its audit they found the following problematic issues. For example, during peak production periods, operated by the Taiwanese firm Foxconn, had exceeded 60 hours per week, and many employees were also required to work more than seven consecutive days before having a day off. According to Apple’s code of conduct, an employee is only required to work 40 hours a week, and should receive a day off after working 5 days. In addition Apple noted, 14% of workers that worked overtime were not receiving fair pay for overtime. The Chinese factor...
Cyber loafing is using personal internet during working hours (Liberman, Seidman, Mckenna & Buffardi 2011, pp. 2192). Cyber loafing is one of the issues that employees need to deal with at work. Websen (cited in Vitak et.al 2011, p. 1751) claims that there is a huge loses in work productivity in the US that cost the companies milli...
So you are at home looking at television or maybe out on a vacation and you receive a call from a company. That call probably had someone on the other line explaining to you how much you owe them and when it will be due. At this point in the conversation your mind is everywhere trying to refer back to when you brought that certain thing. The person on the phone had all of your information that you allegedly gave them. Things such as your whole name, your birth date, and the last four digit of your social security number. You can’t seem to remember when you brought it so you ask the representative on the phone when did you buy it and where did you buy it from. The clerk tells you a location that is far beyond your reach of destination. So the only conclusion that you could come up with was identity theft. Identity theft is the fraudulent acquisition and use of a person 's private identifying information. It mainly happens for the thief’s financial purposes. When dealing with identity theft you should
employee theft and fraud. Fraud and theft have a lot in common. Both are criminal acts, and both
Today, with businesses facing increasingly competitive markets and unprecedented customer demands for services, the employment of workers in shifts to cover a 24-hour day is increasing. In fact, one in five workers is hired to work outside the typical 9-to-5 time slot ("No More Nine-to-Five" 1998). Manufacturing companies have traditionally operated day and night, often to capitalize on equipment usage. However, many other types of companies are now offering their services around the clock, e.g., financial services, 24-hou...
The act of participating in a crime by a minor is considered juvenile delinquency. This criminal act may be punished by many different means, designed specifically to deal with those who are under the statutory age of majority, which is the threshold of adulthood in law. However, many people argue that the severity of the juvenile prosecution system isn't high enough to order proper punishment. Therefore, juvenile offenders should be tried under adult laws. In 1899, the Juvenile Court Act was approved which established the nation's first juvenile court. It was founded on three principles: young offenders are not ready to be held accountable, have not fully developed a sense of maturity, and can rehabilitate as well as change their behavior. Now, anyone charged with committing a criminal act before their 18th birthday is considered a juvenile offender. More than ever, the country has begun to question the reliability of the juvenile courts. The juvenile court system should be abolished. It is not only too unrestricted for the juvenile offenders, but is also an inefficient response to
Fraud and white-collar crime are common forms of crimes that people commit in various aspects and positions in the corporate world. Fraud and white-collar crimes have similar meaning as they refer to the non-violent crimes that people commit with the basic objective of gaining money using illegal means. The cases of white-collar crimes have been increasing exponentially in the 21st century due to the advent of technology because fraudsters apply technological tools in cheating, swindling, embezzling, and defrauding people or organizations. White-collar crime is a complex issue in society because its occurrence is dependent on many factors such as organizational structure, organization culture, and personality traits. Thus, the literature review examines how organizational structure, organizational culture, and personality traits contribute to the occurrence of white-collar crimes.
The following memorandum written by a director of a security and safety consulting service discusses a critical issue effecting business in our economy today, that of employee theft. "Our research indicated that, over past six years, no incident of employee theft have been reported within ten of the companies that have been our clients. In analyzing the security practices of these ten companies, we have further learned that each of them requires its employees to wear photo identification badges while at work. In the future, we should recommend the uses of such identification badges to all of our clients." The issue of employee theft is a broad problem and has different labels to identify it, shrinkage for the retail industry and hidden profit loss in the technology sector are serval examples of common terms used for employee theft. The author of this memorandum presents several data points and suggests one recommendation to effect the issue of employee theft based on a sampling of the client population.
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer
The limitation of this essay is that no survey has been conducted, and so further research could be done regarding significant issues in time management.