When you ask most people what it means to steal from their company, you 're likely to get answers about making copies at the office, taking home pens or other office supplies, or maybe even padding your expense report. Generally, people are not likely to mention a type of theft that has become more widespread in this age of the Internet and social media, time theft. Younger workers may not even recognize this as theft; they’ve grown up with constant access to the web and view it as normal, if not even an entitlement. But surfing the web on company time is indeed theft, as is anything else that takes an employee 's time or attention away from the work they are being paid to do. With the internet on almost everyone’s phone it is also hard to …show more content…
Those methods still occur, but even offices without a strict time clock can experience time theft. Does one of your co-workers always come in a little late each morning or sneak out early a couple afternoons a week? Are her lunch hours just a little longer than an hour and then she has to use the restroom as soon as she walks in? It may be "no big deal" to her, but she is, in reality, stealing from the company. Not only is she not at work, never mind being productive, when she 's supposed to be, she 's likely creating a distraction and grumbling among colleagues who do put in their full day. This is so true, one co-worker in our office takes at least 4 to 6 smoke/bathroom breaks a day and more often than not, she is not at her own desk. It really makes the people working their 8 hours feel cheated. It causes hard feelings and makes employees question why their supervisor doesn’t say or do …show more content…
It’s shocking, but it’s also consistent with a Seminal Time theft survey conducted by Robert Half International, which found that employers lose about 4.5 hours per week per employee. While every employer has to deal with time theft, it’s especially challenging for companies with a distributed workforce. When you have employees in different locations, even different countries the problem can be compounded. Different cultures view time differently. So, even if you hire carefully and manage scrupulously, chances are you have some percentage of workforce theft in your midst, and that likely includes time theft”. (Donskey
Miller, G. (2010, October 12). Twenty Something Finance . Retrieved April 12, 2011, from The U.S. is the Most Overworked Developed Nation in the World – When do we Draw the Line?: http://20somethingfinance.com/american-hours-worked-productivity-vacation/
As a country, we support the terms “freedom”, “equality”, and “rights”. However, we need to focus on the working citizens of the United States and ensure equal rights for everyone. The wage theft website indicates that wage theft is not stereotypical, and the issue is not primarily in specific work fields. No worker can particularly avoid wage theft, whether it’s good wages or great benefits. Wage theft is more likely to occur in non-union workplaces.
Technology Tackles Employee Theft. (2005). Retail World, 58(3), 41. Retrieved May 10, 2005, from ABI-Inform Online
Computer crime has been an issue since the beginning of computers. Wherever there is something good, there is always someone who takes advantage of it. This can be seen in cyber crime, which has been on the rise in recent years. According to the Los Angeles Times, the median cost of computer crime to a company per year has risen from $3.8 million dollars in 2010 to $5.9 million. (Rodriguez, 2011) This suggests that computer crime is becoming an even bigger hazard to companies. A recent example of this was the data breach committed against Target in 2013.
When the Fair Labor Association completed its audit they found the following problematic issues. For example, during peak production periods, operated by the Taiwanese firm Foxconn, had exceeded 60 hours per week, and many employees were also required to work more than seven consecutive days before having a day off. According to Apple’s code of conduct, an employee is only required to work 40 hours a week, and should receive a day off after working 5 days. In addition Apple noted, 14% of workers that worked overtime were not receiving fair pay for overtime. The Chinese factor...
When the U.S. is compared to the conditions of other workers in other countries the numbers come as quite a shock. According to the magazine Psychology Today, “The United States—one of the richest countries in the world--ranks 28th among advanced nations in the category of work-life balance, 9th from the bottom” (Cummins 1). This stressful imbalance of home life with excessive work hours has left us in desperate need of more time and is becoming a strong identifier of American culture in the world. As Cummins explains, “We log long hours at work with the fear of losing our jobs through downsizing hanging over our heads. Then we fight rush hour traffic to get home in time to be super-parents, putting dinner on the table, helping our kids with their homework, and checking in with friends and family members we feel we have neglected because we are so overwhelmed” (Cummins 1). This well pa...
So you are at home looking at television or maybe out on a vacation and you receive a call from a company. That call probably had someone on the other line explaining to you how much you owe them and when it will be due. At this point in the conversation your mind is everywhere trying to refer back to when you brought that certain thing. The person on the phone had all of your information that you allegedly gave them. Things such as your whole name, your birth date, and the last four digit of your social security number. You can’t seem to remember when you brought it so you ask the representative on the phone when did you buy it and where did you buy it from. The clerk tells you a location that is far beyond your reach of destination. So the only conclusion that you could come up with was identity theft. Identity theft is the fraudulent acquisition and use of a person 's private identifying information. It mainly happens for the thief’s financial purposes. When dealing with identity theft you should
employee theft and fraud. Fraud and theft have a lot in common. Both are criminal acts, and both
Workplace deviance is a voluntary unethical behavior that disobeys organizational norms about wrong and right, and in doing so, threatens the wellbeing of the organization, and/or its members(Robinson and Bennett 555-572). According to Robinson and Bennett, “workplace deviances behavior varies along two dimensions: minor versus serious, and interpersonal (deviant behavior directed at other individuals in the organization) versus organizational (deviant behavior directed at the organization)” (555-572). Based on these dimensions it was further divided, into four categories: production deviance (leaving early, wasting resources etc.), property deviance (stealing ,destroying equipment etc.), political deviance (gossiping, favoritism etc.), and personal aggression (verbal abuse ,sexual harassment etc.) (Robinson and Bennett 555-572).According to Robinson and Bennett,workplace deviant behaviors cost U.S. companies approximately between $6 billion and $200 billion annually(555-572). In addition turnover, absences, and illness, and results in poor or lowered productivity, low morale, and litigation ., workplace deviances leads to misuse and loss of time, waste of resources, increases employee(Robinson and Bennett 555-572) .
Fraud and white-collar crime are common forms of crimes that people commit in various aspects and positions in the corporate world. Fraud and white-collar crimes have similar meaning as they refer to the non-violent crimes that people commit with the basic objective of gaining money using illegal means. The cases of white-collar crimes have been increasing exponentially in the 21st century due to the advent of technology because fraudsters apply technological tools in cheating, swindling, embezzling, and defrauding people or organizations. White-collar crime is a complex issue in society because its occurrence is dependent on many factors such as organizational structure, organization culture, and personality traits. Thus, the literature review examines how organizational structure, organizational culture, and personality traits contribute to the occurrence of white-collar crimes.
The following memorandum written by a director of a security and safety consulting service discusses a critical issue effecting business in our economy today, that of employee theft. "Our research indicated that, over past six years, no incident of employee theft have been reported within ten of the companies that have been our clients. In analyzing the security practices of these ten companies, we have further learned that each of them requires its employees to wear photo identification badges while at work. In the future, we should recommend the uses of such identification badges to all of our clients." The issue of employee theft is a broad problem and has different labels to identify it, shrinkage for the retail industry and hidden profit loss in the technology sector are serval examples of common terms used for employee theft. The author of this memorandum presents several data points and suggests one recommendation to effect the issue of employee theft based on a sampling of the client population.
Today, with businesses facing increasingly competitive markets and unprecedented customer demands for services, the employment of workers in shifts to cover a 24-hour day is increasing. In fact, one in five workers is hired to work outside the typical 9-to-5 time slot ("No More Nine-to-Five" 1998). Manufacturing companies have traditionally operated day and night, often to capitalize on equipment usage. However, many other types of companies are now offering their services around the clock, e.g., financial services, 24-hou...
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer
The limitation of this essay is that no survey has been conducted, and so further research could be done regarding significant issues in time management.
The act of participating in a crime by a minor is considered juvenile delinquency. This criminal act may be punished by many different means, designed specifically to deal with those who are under the statutory age of majority, which is the threshold of adulthood in law. However, many people argue that the severity of the juvenile prosecution system isn't high enough to order proper punishment. Therefore, juvenile offenders should be tried under adult laws. In 1899, the Juvenile Court Act was approved which established the nation's first juvenile court. It was founded on three principles: young offenders are not ready to be held accountable, have not fully developed a sense of maturity, and can rehabilitate as well as change their behavior. Now, anyone charged with committing a criminal act before their 18th birthday is considered a juvenile offender. More than ever, the country has begun to question the reliability of the juvenile courts. The juvenile court system should be abolished. It is not only too unrestricted for the juvenile offenders, but is also an inefficient response to