Bixenstine, 2023 - Google Patents
Employment Law Implications of a Remote Workplace.Bixenstine, 2023
- Document ID
- 15786687805137154603
- Author
- Bixenstine B
- Publication year
- Publication venue
- Dispute Resolution Journal
External Links
Snippet
The article discusses the potential effects of remote work to employment law in the US Also cited are how the COVID-19 pandemic resulted in a dramatic increase in the number of full- time remote workers in the country, the prevalence of remote work and hybrid work …
- 208000025721 COVID-19 0 abstract 1
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vacca | Computer and information security handbook | |
Garba et al. | Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments | |
Almeida | Web 2.0 technologies and social networking security fears in enterprises | |
Sharma | Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security | |
Paquet | Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide | |
Chigada et al. | Exploring information systems security implications posed by BYOD for a financial services firm | |
Petihakis et al. | A Bring Your Own Device security awareness survey among professionals | |
Kumar et al. | Design and implementation of privacy and security system in social media | |
Bixenstine | Employment Law Implications of a Remote Workplace. | |
Shamsudin et al. | Information security behaviors among employees | |
Porcius | The Rise Of Telework And The Struggle Towards Cyber Security | |
Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase ii, expanded analysis and recommendations | |
Feagin | The value of cyber security in small business | |
Lang et al. | Managing the Cybersecurity Risks of Teleworking in the Post-Pandemic'New Normal' | |
Gordon | Securing workers beyond the perimeter | |
Short | Risks in a web 2.0 world | |
Yevseyeva et al. | Addressing consumerization of IT risks with nudging | |
Shihepo et al. | Assessment of BYOD security awareness among mobile device users within Namibian enterprises | |
Granneman | Working from Home: A Hacker's Perspective | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Alsmadi et al. | IT Risk and Security Management | |
Binkhorst | Improving Cyber Risk Communication: Mental Models of VPN in a professional services firm in the Netherlands | |
Sizov | Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management | |
Rast | Cybersecurity Threats to the Judiciary | |
Brenner et al. | Security Analysis and Improvement of Data Logistics in AutomationML-Based Engineering Networks |