Tuesday, March 5, 2013

Social Media - New Marketing Opportunities

Developing new media systems for well-established media companies will include creating a new social media presence whilst also maintaining traditional practices. This is especially true for online newspaper editions that will be refreshed significantly more often than the morning and afternoon edition, in addition to print magazines which are updated more frequently than one time weekly. In addition, network television broadcasting stations are now posting their programs - although often with shorter and different advertising on certain websites.

When it comes to marketing strategies for creating social media presence on sites such as Twitter, Facebook and Foursquare, there is really no singular new media solution. This is because incorporating or moving towards new media in most cases will involve many different technologies, skills and techniques. As an example, for a retailer who would like to expand his or her business online this move might require the posting of logos and branding utilized in print documents to the digital format; the creation of a online business website: a domain name; developing a company weblog as well as the approach to use Twitter and Facebook; development of online marketing campaigns and also possibly inclusions of videos to be published on YouTube.

These days, most people are taking advantage of the opportunities to boost their business on these networks including online communities like Twitter, LinkedIn or Facebook, because this is one of the most popular ways to carry out social media marketing. One of the main advantages of using these social media sites is that you will have an opportunity to reach a much larger audience.

Social Media - New Marketing Opportunities

Media marketers can also make use of social bookmarking websites, blogs, forums and rating or review websites. Additionally, this type of media promotion could be carried out through virtual 3D networks, news aggregators and social media sharing websites which allow users to swap music, videos and photographs.

Social Media - New Marketing Opportunities
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Monday, February 25, 2013

Social Stratification in America

Social stratification in American Society is not clearly defined or determined; nevertheless social scientist has developed a socio -economic stratification of the American society. Americans believe in a three class society: rich, poor and middle class and most Americans consider themselves as middle class. In reality the American society is more diverse and incongruent and there is an extensive difference among people. The basic determinants that make social class are wealth, education, income and occupation. Some sociologists have divided the American society in six distinct categories including: rich or the upper class, upper middle class, lower middle class, lower class and poor and under class.

It is believed that the people who belong to the same social class share the similar social positions, similar ways of thinking and life styles; others oppose this idea and believe that we cannot generalize characteristic of the people to one another. Social class creates a hierarchy and identity for the people of each class.

One of the indications of the social class in America is income in terms of either individual or household and is one of the most important indicators of social class. Those families who have two income earners are in a better position. Per capita income which means the amount of money allocated to each individual member is also anther important determinant in social stratification. It can be said the families who have fewer members are in a better position.

Social Stratification in America

Another indication in social stratification is education which has a relation with the occupation and income. Higher education itself needs money and paying tuition, so it is clear that most of the time the families who are better off can afford a better education for their children: they can pay for better schools and private schools, colleges and universities. As the result there is an interrelation between money and education.

One of the most prominent features of social class is culture: people of the same social class tend to have similar ways of behavior; though this behavior and culture is not some thing fix and changes with social mobility: people who move upward or downward in their social stratification will acquire the behavior of that social group. But there is diversity inside the same social group as well. One of the important terms in American culture and literature is the concept of "Class Ascendancy": based on this concept each successive generation will have a higher standard of living than its predecessors. Another important characteristic of American social class is achieved status rather than described statues; it means that regardless of his or her original statues, one can become rich and successful and climb the social ladder. But in reality this idealistic view can not be completely true: many people of color are still suffering the racial prejudices and as a result they can not have the proper education and a good occupation which is perhaps the most important class component. These people have lower income and the cycle will continue to the later generations. Despite the existing injustice and inequalities, America is considered land of opportunity, the land which its streets are paved with gold. Thought this belief is exaggerated, Americans have improved their economic situation with their hard working and persistence.

Social Stratification in America
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

http://en.wikipedia.org/wiki/Social_class

Tuesday, February 19, 2013

Defamation of Character on Social Networking Sites

It seems as if hardly a week goes by without the traditional news media reporting another case of abuse, another case where a person's name or position in society has been abused in one form or another through a social media platform, through the publication of personal photographs or slanderous comments on their character, events in their lives. The Internet, and in particular social networking sites, have opened a new means for the less than scrupulous to take their personal vendettas, their prejudices and hatred to a new level in a very public manner. Where the news media once held sway, with usually carefully researched and well crafted stories backed up by clearance from a well schooled legal department, social networking sites now allow absolutely anyone with access to the Internet, with a personal opinion, to take anyone to task in almost any manner they wish.

Social networking sites, often with tens of millions of users logging in each day, have taken the place of the local reporter to bring events to a far wider audience. Citizen reporters, a loose term for anyone who writes about local or national events or who voices an opinion on current affairs, have taken the place of professionals in many spheres, and not always to advance the impartial and unbiased truth. They are generally untrained or have no background in the arts of writing and reporting but feel, having access to such a medium, capable of expounding their opinion on a wide range of subjects. These citizen reporters are often not bound by the press laws, or by personal levels of respect for the privacy of others and do not always have access to the full range of information, of facts, which a professional would have at his or her fingertips. Their work, unpaid and highly personal, is based exclusively on minor events or on the reporting of other media on a particular story or over a particular person, be it someone in the limelight through public office, their work or current events linked to their names. Sometimes it is based only on a single utterance, such as a short post on Twitter, on hearsay, on stories propounded by other citizen reporters, by other non-professionals.

Social networking sites, both the major players in a very wide field such as Facebook or Twitter and minor sites linked to local areas or professional and scholastic fields, have stormed the Internet in such a manner that almost everyone, especially in the Western world, has an account with one or more. Many if not all of the social networking sites allow anyone to sign up for their services without any form of background checks, often without payment, simply through the provision of an e-mail address and the completion of a short biography. Without background checks, without any form of verification that a person signing up for social media services is who they claim to be, social networking has become infested with a mass of faked accounts, with tens of thousands of non-existent people. At one stage in 2012, Facebook admitted that up to eighty-six million accounts on their platform are or may well be faked accounts; accounts created in another person's name or using a name other than that of the actual user. These accounts are used to promote products, opinions, to pass on information or links where the real user, hiding behind their invented name, has a vested interest in not being identified.

Defamation of Character on Social Networking Sites

With the freedom of the Internet, with the mass of social networking platforms available and the ease of signing up for one service or another, comes a new phenomenon: character assassination. The assumed anonymity of the Internet, the ability to create a character with a few mouse clicks and an uploaded photograph, has brought with it a freedom the original founders of this means of communication had never envisaged. With connections to the right people it is possible to create a story near enough to the truth to be believable and have it carried across many different accounts, through many different people so that, within a very short period of time, it gains a certain level of trust, a concrete base through repetition, an acceptance. Facts and background information are rarely checked or verified during this process of promulgation. A mouse click to copy, to share and an invented story can be passed across thousands of miles to an every widening range of people, added to and expanded with personal opinion, with personal prejudices.

A mild example of this trend was seen in mid 2012 when a relatively new Twitter account spread the story that the former British Prime Minister, Margaret Thatcher, had died. Within minutes the news of her death had been picked up by hundreds of other Twitter users and by some professional news services. The originating account had been set up, posted a number of seemingly harmless Tweets in order to gain credibility and followers, then changed its screen name to Sky News to add weight to the false information of Thatcher's death.

Other social networking sites have seen examples of less than harmless pranks played out for a mass public. Defamation of character, the besmirching of a person's name through false information, through interpretation of facts and events, through stalking and cyber bullying, has become an outlet for some less than scrupulous people. It ranges from stories at Middle or High School level of sexual impropriety through to accusations of corruption, infidelity and worse. The use of hacked, leaked and altered photographs has also become part and parcel of personal attacks against prominent personages, as well as against normal people of all ages.

For celebrities in the public eye, a personal photograph taken for private use which shows rather more skin, or even the intimate areas of their body, can suddenly find its way into public arena through hacking of cell phones, through unscrupulous friends or acquaintances. Stories attached to these images are often from people who have no connection either with the person concerned, nor any real knowledge of the events surrounding the taking of a photograph. The photographs used, intended for a private audience, for a lover or intimate partner, lower the prestige of a celebrity in the public eye, regardless of what other people outside the public gaze would do, and can often come back to haunt a person in later years. The black mark on their character remains, even when a story has been firmly refuted, proven as being untrue, firmly anchored in the minds of those who have witnessed it.

For private individuals, unused to the intense interest of the public sphere, this form of defamation can be life shattering. A fifteen year old High School student, for example, is not going to be able to react to published photographs or stories of an intimate nature in the same way that a celebrity, used to the limelight, to the press and with a back-up team of employees well schooled in such matters, can. Defamation of character can also, in such cases, lead to far more than brief embarrassment for anyone on the brink of adulthood. Intimate photographs taken in a moment of weakness or through the workings of someone claiming to be a friend can ruin a young woman's name, lead to harassment in school or the workplace, sexual advances and the creation of further stories which, in almost all cases, have nothing to do with the truth. It can result in someone being cut off from their family, becoming the center of unwanted attention both within their own circle and in the media. For an adolescent such adverse publicity can lead to loss of friends, to depression and, in the worst cases, to suicide.

Defamation of character is not limited exclusively to celebrities, to politicians, to people in the public eye. It can be used by anyone, almost always guaranteed anonymity through the Internet, against anyone. Character assassination can also be extended away from the direct target, to their family, to their work colleagues, to a wider circle of friends. It can be used against specific companies and specific products, against a political party or even against an entire country. Social networking sites, with the easy and immediate means of passing on information, of voicing an opinion and the almost unstoppable ability to create as many faked accounts as a person desires, are the new transporters for misinformation, for slander, for character assassination and, with the scope and breadth both of the Internet and of the means of entry to the Internet, is something almost impossible to either stem or to stop completely, regardless of which safety measures a social networking platform may claim to have in place.

The standard form for reporting abuse is to send a mail to an abuse department and request action against a specific party for a specific action. In the case of stolen or faked photographs, and all other images, it is necessary for the person lodging a complaint to prove that they are the legal owners of the image, that they hold copyright rights. For a snapshot taken using a cell phone and passed on to intimate friends, this can be an almost impossible task. When it comes to addressing other forms of abuse, such as written defamation of character, an abuse department is unlikely to be capable of taking any action unless the abuse falls within the terms of their Terms and Conditions of Use and, according to the country in which the social media site is based, breaks the law. Here, too, the proof of abuse must be provided by the abused person, they are required to prove themselves innocent and will be forced through many different legal hoops before any form of action is taken. During this time the stories will continue to exist, will continue to be passed on to others so that, within a very short space of time, it becomes impossible to either stop the original and all its various copies or to restrict the damage done.

The Internet, being an international medium, does not fall under any specific laws. A person writing in France, for example, is not subject to the same laws as a person writing in the United States. A person living in the United States and abused by someone living in France is not going to be able to use local laws against that person, only against the company providing the means of distribution, assuming that this company, the owners of the social networking site, as based and registered in the United States. The recent publication of photographs in Italian and French magazines of members of the British royal family is a prime example of how international defamation can operate. Here the company concerned, a publisher based in Italy with offices and assets in France, was able to publish photographs of an intimate nature as their registered base is outside of the United Kingdom. A legal action against further publication and for damages had to be taken in the respective countries where the publisher operates, and fell outside of the jurisdiction of British law and the British courts. For an ordinary person, defamed online by a foreigner living abroad, such an action is almost impossible.

Defamation of character for celebrities and people in the public eye is considered a part of the risks, the daily life, accepted by an individual when they decide to follow a specific career or enter the public arena. For someone outside of the public gaze, attending High School, a member of a local church, an ordinary person in a small town or city, such an attack on their person is not one of the normal risks associated with daily life. Constantly followed by press and photographers, a media star is more attuned to how they must react, what is acceptable in the public eye and what is not. They are well aware that, providing they have not done anything illegal or which offends against public sensibilities, that the media will, eventually, move on to new stories, other celebrities. Living within a quiet, familiar community, an ordinary person, regardless of their age, is not likely to be able to react to defamation, to faked and false stories, to personal attacks in the same manner. Often they will believe themselves cut off, with no one to talk to, no one they can turn to form help and advice.

A teenager, faced with the publication of intimate photographs designed for one specific and trusted person, will react in a completely different manner to an adult used to media attention. The community in which they live, their surroundings, family and friends, their school, college or workplace are far closer to them than the working environment of a professional, of a film star or politician. Any attacks addressed against them will be taken personally, will disturb far more than they would an adult with greater worldly experience. Here a defamation of character can take on a completely different mass.

Social networking sites are a collection of people linked one to another either by friendship, by profession or by interest. Many will never have actually met one another, may even live in completely different parts of the world and enjoy a living environment others have never experienced. Social networking sites can also be aimed at a specific area of a community, at a professional field or even a certain age group, at college students or school children. The reaction of online acquaintances to defamation in a professional forum is completely different to that within a site designed exclusively for High School students. Here the bulk of those linking one to another know each other personally, meet up with and talk to one another on an almost daily basis. Friendships extend beyond the virtual world of the Internet and into the intimate world of real life. The workings of defamation within this world, within a smaller community of people who know one another personally, is completely different. Any form of attack, on opinion, appearance or more intimate matters, is taken as a personal attack and, because of the nature of the platform, can be blown out of all proportion by the intervention of others.

Defamation of character here, in the social networking sites used by the younger generations, by those still attending school or college, extends beyond the virtual barriers of the Internet and confronts them in their daily lives. What may have seemed, to the originators, as a piece of harmless fun can often be taken by others as a statement of fact. In the case of intimate photography publication, it can bring a label which is not only difficult to shake off but also likely to stick for many years to come. The defamation moves away from the social networking site, away from the Internet and into the real, daily lives of the individuals involved. The individual subjected to defamation, to the publication of intimate photographs or details of their private lives, is confronted with something they cannot simply delete in a world they cannot switch off at the mains. For many this defamation, this revealing of their private and intimate lives is far more than they are capable of handling. They witness the expansion of an original, online accusation into the vitriolic hatred of real life people they are confronted with every day, people who, through connections linked by other connections on the Internet, have possibly no other association with them other than that they are friends of friends, or even further removed. Without the personal knowledge of a person, many are quite happy to expand on a story, to verbally or physically attack the subject in a detached, impersonal manner which, because they are not connected to the subject of their attacks and because real life is totally different to life in a real world, they cannot appreciate the effects of.

Defamation of character on social networking sites is a growing problem. Propounded by the ability to create an anonymous or virtually untraceable character, by the belief of some that whatever is published must either be true to the facts or it wouldn't be published, by the inexperience of many of those subjected to the attack and by the willingness of others to join in, it will remain a problem for the future. It will remain as much an Internet problem as a social problem which can only be reduced by careful education of Internet users, by the realization that people they are addressing, those they are attacking, are real people and not a made-up creation which disappears when the social networking site is left, when the computer is switched off. But the education of those using the Internet will fall on deaf ears; there will always be people whose sole purpose in life is to wreck the lives of others, either for the personal buzz they feel or as some form of revenge. Rather, the education on how to deal with defamation of character on the Internet, as much as personal attacks in real life, should be part and parcel of every computer course from the earliest stages onwards. Once it is clear that the person taking the brunt of an attack is capable of weathering the storm, knows how to counter any defamation calmly and effectively, the attack loses all purpose and the attacker, lacking the buzz of success, will be forced to give up and move on.

Defamation of Character on Social Networking Sites
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Viktoria Michaelis is an American student (born July 1992) currently resident in Germany studying Business Studies and Economics at Bremen University. She has had fictional works published in several anthologies and regularly writes in her personal Blog. Her collected articles are available to read at Viktoria Michaelis on a wide range of subjects from Beauty and Health, Politics and Copyright through to Women's Issues and Adult subjects.

Saturday, February 9, 2013

Social Networking Websites - 10 Best Social Networking Websites

What is social networking? It is made up of a group of individuals which are connected by common interest, friendship, knowledge and etc. Social networking website is a web-based platform that provides internet users to join or form an online community.

What so great about it? It is changing how people communicate with other people, such as family, friends and everyone else online. It also change the way people make money online as well. You can target customers in social networking site such as friends, family members, friends of your friends and even new customers on the following top ten best social networking websites:

Facebook - This is the leader among the social networking sites. It is a general social networking site. There are more than 600 million of people using Facebook and if you are new to social networking thing, Facebook is the place to be. MySpace - This is another popular site. It provides highly personalized experience around entertainment and connecting people to drives social interaction. YouTube - YouTube is a website that allows you to discover, watch and a channel of self-uploaded originally created videos that you can share with others. This is a great way to build relationships through viral video marketing as well. LinkedIn - This is a website that allows you to network with professionals in your industry and business. This is channel for you to get to know people with similar business interests. Bebo - This is another website which is very popular in UK and Ireland and gaining ground in US as well. Twitter - Twitter offers general social networking and also capitalizes on micro-blogging. It allows you to follow what your friends are doing and also share with people who want to know what you are up to as well. Flickr - Flickr is a photography related networking. It allows photo sharing and commenting with people all over the world. Netlog - This is a European website which includes blog and personal video and a good thing that it is completely advertisement free. Habbo - This is a website which geared towards teenagers. It encourages you to meet new people by mixing gaming and chat rooms. hi5 - This is a website which allows you to connect with, not only your friends, but with all people over the world for free. Variety of features being offered such as chat room, groups and profile customization.

Social Networking Websites - 10 Best Social Networking Websites

There is many other social networking website available. You have to understand the terms of services for each of the above, you can become known around the world and leverage your business and social life out from these social networking websites.

Social Networking Websites - 10 Best Social Networking Websites
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

If you want to make money online, it is not just about latest strategies or the newest fab or getting cutting-edge software. It's about create a SYSTEM that will SLASH away all the trial and error so that you can get results lightning fast! Even for beginners!

An amazing breakthrough Inbox Cash Techniques is created for this purpose and is hands down. Now you can get your Free book and audio by Clicking Here => http://www.inboxcashguru.com.

Wednesday, February 6, 2013

Disadvantages of Social Media

We are living in a world filled with the social media craze. From Facebook to Twitter, the world has embraced the new tools that help thousands interact each day no matter where they are. There are so many merits that come with social media and this is undeniable. However, what many forget are the down sides. All good things will have flaws and the following are insights into the disadvantages of social media. Statistics have shown that young people form the bulk of the fan base when it comes to social media outlets. However, those who are in all kinds of businesses are also avid users to further their cause. The following are some of the top cons that business people have to face when they employ the services of different social media.

The first disadvantage to speak about can also be an advantage. I'm talking about the viral potential of the media. In other words, when you have some news or item to share with an audience, it can spread like bushfire all around the world. When this news is negative or in bad taste, the same will happen. This is where the disadvantage comes in. It is hard to undertake damage control when you are dealing with social media and your good name might be soiled within hours.

Another one of the top disadvantages worth a mention is the need for intensive labor. If you intend to build a brand and a name through social media, you must be ready to spend time updating your audience on all the relevant issues. Once you become established, you will tend to have a bigger crowd and it can be difficult to meet the needs of all people increasing you labor greatly. However, to remedy this, you can put in place a networking campaign that is manageable and grow gradually.

Disadvantages of Social Media

Another thing to mention is that you must be ready to connect with your audience at all time. According to experts the law of reciprocity will apply. In other words, you need to give and take. If you have updated helpful information on a network, a person who is interested might respond and it is upon you to reply their queries and satisfy their curiosity. This is the essence of social media and if not done properly, your audience might loose faith in you. There are people who evade this and other disadvantages of social media by establishing themselves are entities that give updates that are promotional in nature. This way, the audience will take and run with what they have.

Finally on the disadvantages, you will be required to stay abreast with all upcoming sites and be ready to make the necessary change. If you are not adaptive, then you might be in trouble because social media in nature will change constantly. You need to keep in touch with all the latest in this industry because this is the sure way to safeguard the interests of your business. Remember, social networking for business gain will help you move to heights you have not been to before. Therefore, know the pitfalls discussed above and steer clear of them if you are to win in this game.

Disadvantages of Social Media
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Emma Wanjiku is an experienced writer who focusses on issues affecting you. Her research is based on all aspects and topics of life. For more tips and information go to http://www.emmalifetips.com

Monday, February 4, 2013

Social Stratification in America

Social stratification in American Society is not clearly defined or determined; nevertheless social scientist has developed a socio -economic stratification of the American society. Americans believe in a three class society: rich, poor and middle class and most Americans consider themselves as middle class. In reality the American society is more diverse and incongruent and there is an extensive difference among people. The basic determinants that make social class are wealth, education, income and occupation. Some sociologists have divided the American society in six distinct categories including: rich or the upper class, upper middle class, lower middle class, lower class and poor and under class.

It is believed that the people who belong to the same social class share the similar social positions, similar ways of thinking and life styles; others oppose this idea and believe that we cannot generalize characteristic of the people to one another. Social class creates a hierarchy and identity for the people of each class.

One of the indications of the social class in America is income in terms of either individual or household and is one of the most important indicators of social class. Those families who have two income earners are in a better position. Per capita income which means the amount of money allocated to each individual member is also anther important determinant in social stratification. It can be said the families who have fewer members are in a better position.

Social Stratification in America

Another indication in social stratification is education which has a relation with the occupation and income. Higher education itself needs money and paying tuition, so it is clear that most of the time the families who are better off can afford a better education for their children: they can pay for better schools and private schools, colleges and universities. As the result there is an interrelation between money and education.

One of the most prominent features of social class is culture: people of the same social class tend to have similar ways of behavior; though this behavior and culture is not some thing fix and changes with social mobility: people who move upward or downward in their social stratification will acquire the behavior of that social group. But there is diversity inside the same social group as well. One of the important terms in American culture and literature is the concept of "Class Ascendancy": based on this concept each successive generation will have a higher standard of living than its predecessors. Another important characteristic of American social class is achieved status rather than described statues; it means that regardless of his or her original statues, one can become rich and successful and climb the social ladder. But in reality this idealistic view can not be completely true: many people of color are still suffering the racial prejudices and as a result they can not have the proper education and a good occupation which is perhaps the most important class component. These people have lower income and the cycle will continue to the later generations. Despite the existing injustice and inequalities, America is considered land of opportunity, the land which its streets are paved with gold. Thought this belief is exaggerated, Americans have improved their economic situation with their hard working and persistence.

Social Stratification in America
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

http://en.wikipedia.org/wiki/Social_class

Wednesday, January 30, 2013

Media Liability Insurance - Concerns For Writers, Producers, Bloggers

As an insurance broker I often receive phone calls from individuals and organizations looking for general liability coverage. The variety of these organizations run the gamut, from your basic contractor to the adult model day care. But it is not this gamut that I am concerned about, at least not for this article, it is the individual and/or organizations that calls seeking general liability insurance for a media related company and are unaware that they need a very specific and obscure coverage called media liability insurance or communication liability insurance.

Some of these individuals and organizations include bloggers, web developers, radio show personalities, authors, production companies, publishers and broadcasters of instructional material, television and radio stations, motion picture companies, cable and satellite broadcasters and the advertising industries electronic publishing services as well as any other entities engaged in preparing materials for publication, republication, and electronic publishing services just to name a few.

Many of these individuals and or organizations do not realize that they need media liability coverage and worse off many insurance professionals don't even know that media liability coverage exists or that the coverage is most likely specifically excluded from their general liability.This coverage is typically part of the general liability found in Coverage B, Personal and Advertising Injury Liability, in a standard CGL (Commercial general Liability) policy. Personal and advertising injury relates to liable, slander, defamation of character, as well as copyright, patent & trademark infringement. More often than not, it is only when there is a claim, and too late that the individual/organizations learn that the most important coverage for their operation, is excluded from their policy, Media Liability. In most instances their search begins after being instructed by a vendor or contractor to obtain liability insurance. Nonetheless, there are some industry personnel that know they need the coverage but have a hard time coming across a professional that knows anything about the coverage or where to secure it.

Media Liability Insurance - Concerns For Writers, Producers, Bloggers

In either case, most of these individuals or organizations are at their wits end by the time they find us. Most of which have been told that the insurance they are looking for either doesn't exist or is unavailable from the last dozen or so brokers or agents they have spoken with. There are clear reasons for this frustration and even clearer reasons that their search for media liability insurance leads them to so many dead ends.

For most of us, insurance company familiarity stems from advertisements, including, by and large those for AllState, Geico, Nationwide and Liberty Mutual, none of which offer, at this time, any variety of true media liability insurance. As a result, most people become frustrated and dissuaded. Whereas media liability insurance coverage is a very simple to understand form of insurance, nonetheless, most captive agents do not offer it. For agents and brokers those that deal primarily with home and auto insurance as a staple of their business model, exploring and becoming proficient in such a specific type of product is not germane to their own operations.

By now you are most likely and certainly asking yourself, alright already, what is media coverage? Media Liability Insurance protects you against claims arising to from the display, communication, transmission or purveyance of information in ways that may violate the rights of others. Media Liability Insurance provides very valuable third party coverage against liable, slander, defamation of character, copyright, trademark & patent infringement, personal injury liability, invasion of privacy claims or unfair competition claims that RESULT in financial consequence or personal injury. Examples of these circumstances would include printing a damaging statement about someone, making slanderous remarks about an individual or a company's product, using someone's logo or even the unlicensed use of a cartoon character in an ad or publication, distributing illegally obtained photos of someone, or marketing your product by making damaging false claims about your competitors' products.

According to Citizen Media Project, which is affiliated with Harvard Law School's Berkman center for Internet & Society, US based lawsuits have surged 70% in 2008 from 2006. The cost to hire an attorney and defend these allegations can range from ,000 to at least 0,000 in the event the case goes to trial."Of the 256 lawsuits dating as early as 1994 through April tracked by the New Media Law Resource Center, damages were awarded in 17 cases, totaling .9 million", said Ron Coleman, a trademark lawyer at Goetz Fitzpatrick in New York. (1)

That is an average of almost .6M per judgment, before legal costs. It has been stated in various internet publications that 50% of adults are members of social networking sites like Facebook, MySpace and Twitter. Many times posts on these networking sites are written quickly and done impromptu, many times these posts can be taken out of context and because they are stored indefinitely can leave individuals open to claims well into the future. This brings up another point; adults should make sure that they have personal injury coverage on their homeowner's policy. To add this coverage is minimal and in fact this coverage is needed if you have or plan on getting a personal umbrella liability policy. For an in an individual in a non-media related industry, this coverage provides similar protection, but on a personal level. In a recent case involving an internet blogging youth, the insured's daughter hated math class as well as the teacher. The daughter made several "disparaging" remarks about her teacher online. The teacher successfully sued the parents and was awarded 0,000.

The problem with our litigious society is that many times a claim or lawsuit may not involve an error or omission. For example, a client may not be happy with service or just doesn't want to pay a bill, they can bring a lawsuit or claim alleging an error or omission, but their real objective is to avoid paying for services rendered. In this case and all cases when a lawsuit or claim is filed, the defendant still needs to hire counsel and respond to the claim. In this case Media Liability Insurance typically pays for the cost of defending this type of claim, which in may cases is the bulk of the expense of the cost of the suit.

Today's media liability policies, geared to the needs of growing numbers of firms with communication exposures, are carefully underwritten by a substantial group of insurers.

The following are some famous examples of suits that pertain to this form of insurance:

In 1981 Carol Burnett was awarded .6M (.8M in 2009 Value) after the suing the National Enquirer for describing her alleged public drunkenness. In 2006 Chef Gordon Ramsey sued Associated Newspaper LTD for alleging he 'faked some of his scenes' Associated paid Ramsey 8,000 and an apology.(2)

Media Liability Insurance - Concerns For Writers, Producers, Bloggers
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

By Alexis Leondis, The Star-Ledger (Newark, New Jersey), "Blog Insurance Rises in the wake of Lawsuits", 10/04/2009, (10/28/2009)USA Today, [http://www.usatoday.com/life/people/2006-06-20-ramsay_x.htm], (06/21/2006)

Castle Rock Agency Currently Offers Media Liability Insurance in CA, CT, FL, MA, NJ, NY and PA.

Castle Rock Insurance Agency NY

212-360-2334

Castle Rock Agency

853 Broadway 1602

New York NY 10003

212-360-2334

Saturday, January 26, 2013

The Role of Media in Politics

What role does the powerful new media play in Politics? The short and long term effects cannot be denied. But does the new media offer us sound political information or simply entertain us for profit and ratings?

The New Media

Every so often, the mass media system in the United States experiments significant transformations that signal a new plateau in its evolution. Widespread recognition of the new media's role on the political scene occurred during the 1992 Presidential campaign. The candidates flocked to talk radio, television talk shows, news magazine programs and the internet. Although the media offered many options to deliver their views, the debate as to rather or not the content was informative or entertainment had begun.

The Role of Media in Politics

Talk Radio

If there has been one communications format that has become emblematic of the new media, it is talk radio. Talk radio used to be the "night shift" of the airways. Talk radio reinvented itself. Talk radio became an important candidate forum in 1992. President George H. Bush interviewed with conservative talk show host Rush Limbaugh. By 1994 nine talk radio hosts ran for statewide or local office. Most were unsuccessful, but their positions in talk radio gave them legitimacy as
candidates.

Other unsuccessful candidates such as former New York Governor Mario Cuomo and New York Mayor Ed Koch moved into local or national talk show host jobs. Talk radio had a political platform. Americans were tuning in. Ratings were up. Profits were rising. Talk radio had become a force to be reckoned with.

Television

Cable television opened the airways for an onset of media opportunities. Time slots were filled with talk shows and news programs that you could tune in twenty four hours a day. The television media quickly enhanced their position in the political process. Politicians and the mainstream press could not help but take them seriously. One of the criticisms levied against the television media was that they trivialized serious issues of governing by mixing politics with entertainment. Every political issue at hand could now be analyzed and scrutinized twenty four hours a day on cable news. Campaigns had to give a second look on the role of media in politics. The media could be a tool of support or a thorn in your side. Campaign strategy had to be changed. The power of television was not to be denied.

The Internet

Twenty five years ago the term "modem" did not even appear in the dictionary. Modems connect people to online computer services such as CompuServe,Prodigy, America Online or MSN, and to hundreds of thousands of world wide websites and home pages. Increasingly, the internet has become a tool for political communications as well. On the net you could gain political info, express political opinion, and mobilize other voters and political leaders. You could also make political donations. In this years Presidential race, candidates have raised literally millions of dollars online. The web has become a electronic town hall. In a brief time, the web has grown into a major player in the new media.

Conclusion

The media has found its niche in today's politics. Rather its talk shows, television or the internet, they have laid a foundation, built a platform from which to voice their social agenda and flex their political muscle. How much of that voice is quality content is still up for debate. One thing is for sure, if you want to succeed in politics, it will not hurt to have the media in your corner.

The Role of Media in Politics
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

William Curl
Contact info: maverick28666@yahoo.com
Phone: 828-640-7643

Wednesday, January 23, 2013

Social Networking, The Pros and Cons of Social Networks

Social Networking has become increasingly popular nowadays as there are a lot of sites that offer this service. MySpace and Friendster are two of the most popular sites that aim to build communities of people who share common interests and activities, or who are interested in exploring the interests and activities of others.

THE PROS

A social networking site is like a virtual meeting place where people can hang out and discuss different topics. Anything under the sun, in fact. Some use these networking sites to promote their blogs, to post bulletins and updates or to use them as a bridge to a future love interest.

Social Networking, The Pros and Cons of Social Networks

These are just a few of the reasons why social networking is getting a lot of attention lately -- it makes life more exciting for many people.

THE CONS

However, it would be best to make sure that safety and security are the topmost concerns of the social networking site that you currently use. This is because social networking sites require or give you the option to provide personal information such as your name, location, and email address. Unfortunately some people can take this as an opportunity for identity theft. They can copy your information and pretend to be "you" when engaging in illegal activities. Bad news! So be cautious with what you enter into an online networking site.

You could fall into the trap of someone who pretends to be somebody else. For example, they might offer you a job or want to meet up with you just to get your money. This can lead to cyberstalking, where the stalker uses electronic media such as the Internet to pursue or harass you.

THE CONCLUSION

So take your time and be careful in choosing who to trust so you can hopefully avoid this sort of unpleasant thing happening to you. Apart from that, social networking is great thing.

Social Networking, The Pros and Cons of Social Networks
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

If you found this article helpful, you might appreciate my FREE report called "GET TO THE MONEY FASTER". Get it now at http://eprofitnews.org

Article by Gary Harvey of http://FindHotMarkets.com the Internet's BIGGEST LIST of ways to find hot niches, best selling products and hot markets.

Sunday, January 20, 2013

Human Resource Information System - HRIS

Human Resource Information Systems

The purpose of this paper is to identify other companies who have faced similar human resources issues in regards to information technology. Through benchmarking different companies we can learn how other companies have handled certain human resources issues related to information technology, information systems, new technology, and data security. An overall analysis has been completed using research on IBM Europe, Ameriprise Financial, Terasen Pipelines, Shaw’s Supermarkets, CS Stars LLC, IBM, WORKSource Inc., and Toshiba America Medical Systems, Inc. This paper also includes eight synopses of companies facing similar issue to those in the reading.

New Technology

Human Resource Information System - HRIS

With the changing world and constant new technology that is available, managers need to be aware of the technology that will increase effectiveness in their company. Human resource information systems (HRIS) have increasingly transformed since it was first introduced at General Electric in the 1950s. HRIS has gone from a basic process to convert manual information keeping systems into computerized systems, to the HRIS systems that are used today. Human resource professionals began to see the possibility of new applications for the computer. The idea was to integrate many of the different human resource functions. The result was the third generation of the computerized HRIS, a feature-rich, broad-based, self-contained HRIS. The third generation took systems far beyond being mere data repositories and created tools with which human resource professionals could do much more (Byars, 2004).

Many companies have seen a need to transform the way Human Resource operations are performed in order to keep up with new technology and increasing numbers of employees. Terasen Pipelines moved its headquarters from Vancouver to Calgary to be closer to the oil and realized a major growth in employees. In the past recording keeping was done on paper and with spreadsheets. Mangers at Terasen realized that there was a need to change to a more computerized system and looked into different HRIS vendors. By making the move to a HRIS system, Terasen is able to keep more accurate records as well as better prepare for future growth. Another company that saw the benefits of keeping up with new technology is WORKSource Inc. To meet the challenge of handling 100 new employees, WORKSource Inc. acquired Web-based technology programs from GHG Corp. like electronic pay stub, electronic timesheet software, time-off system, and human resource information system (“Tips,” 2006). By adapting these new programs, WORKSource was able to reduce waste and cost.

The Internet is an increasingly popular way to recruit applicants, research technologies and perform other essential functions in business. Delivering human resource services online (eHR) supports more efficient collection, storage, distribution, and exchange of data (Friesen, 2003). An intranet is a type of network used by companies to share information to people within the organization. An intranet connects people to people and people to information and knowledge within the organization; it serves as an “information hub” for the entire organization. Most organizations set up intranets primarily for employees, but they can extend to business partners and even customers with appropriate security clearance (Byars & Rue, 2004).

Applications of HRIS

The efficiency of HRIS, the systems are able to produce more effective and faster outcomes than can be done on paper. Some of the many applications of HRIS are: Clerical applications, applicant search expenditures, risk management, training management, training experiences, financial planning, turnover analysis, succession planning, flexible-benefits administration, compliance with government regulations, attendance reporting and analysis, human resource planning, accident reporting and prevention and strategic planning. With the many different applications of HRIS, it is difficult to understand how the programs benefit companies without looking at companies that have already benefited from such programs.

One such company is IBM. IBM has a paperless online enrollment plan for all of its employees. Not only has the online enrollment saved the company 1.2 million per year on printing and mailing costs, the employees enjoy working with the online plan. "Since we began offering online enrollment, we've learned that employees want web access," Donnelly [Senior Communications Specialist] says, so they can log on at home rather than through the company intranet. So the company has been working to put in place a web-based enrollment system that employees and retirees can access from anywhere (Huering, 2003). By utilizing the flexible-benefits application HRIS has to offer, IBM was able to cut costs and give employees the freedom to discover their benefits on their own time and pace.

Another company that has taken advantage of HRIS applications is Shaw’s Supermarkets. In order for Shaw’s to better manage its workforce, the company decided it was time to centralize the HR operations. After looking at different options, Shaw’s decided to implement an Employee Self Service (ESS) system. The use of self-service applications creates a positive situation for HR. ESS gives HR more time to focus on strategic issues, such as workforce management, succession planning, and compensation management, while at the same time improving service to employees and managers, and ensuring that their data is accurate. With this solution, employees have online access to forms, training material, benefits information and other payroll related information (Koven, 2002). By giving employees access to their personal information and the ability to update or change their information as needed, HR was given more time to focus on other issues. Understanding the different applications HRIS has to offer will give companies the chance to increase employee efficiency and reduce costs.

Measuring the Effectiveness of HRIS

The evaluation should determine whether or not the HRIS has performed up to its expectations and if the HRIS is being used to its full advantage (Byars & Rue, 2004). One of the most significant challenges faced by public personnel executives today is measuring the performance of their human resources information system (HRIS) In order to justify the value-added contribution of the HRIS to accomplishing the organization's mission (Hagood & Friedman, 2002). Implementing an HRIS program may seem a necessary stem for a company, but unless it will be an effective tool for HR operations, it will not help increase efficiency and may hinder it instead.

One company that implemented a HRIS system is Toshiba America Medical Systems, Inc. (TAMS). TAMS put all employee benefits information online and created an open enrollment option when TAMS changed healthcare providers. Almost immediately upon rolling out the UltiPro portal [new HRIS technology] to employees, TAMS began seeing improvements, with an estimated 70% increase in open enrollment efficiency (Wojcik, 2004). By determining the efficiency of the new program, TAMS was able to realize the benefits of the new HRIS system.

Security of HRIS

The privacy of employee information has become a major issue in recent years. With identity theft becoming a common problem, employees are becoming more sensitive about who sees their personal information, and the security it is kept in. By making sure employee information that is kept in the HRIS is relevant to the company and making sure there is limited access (password protection) to such information, companies can make its employees more secure with the safety of their information. Whether electronic or paper, employee files deserve to be treated with great care. Establishing security and end-user privileges calls for a balance of incorporating, HR policy, system knowledge and day-to-day operations (O’Connell, 1994).

One company that faced a major security issue was CS Stars, LLC. CS Stars lost track of one of its computers that contained personal information that included names, addresses and social security numbers of workers compensation benefits. The bigger problem was that CS Stars failed to notify the affected consumers and employees about the missing computer. Though the computer was retrieved and no information seemed to have been harmed, many employees lost their sense of security with the company. New York's Information Security Breach and Notification Law, effective in December 2005, requires businesses that maintain computerized data which includes private information to notify the owner of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, acquired by a person without valid authorization (Cadrain, 2007).

Another company that experienced a breach in security is Ameriprise Financial. In late 2005, a computer that contained personal information on clients and employees was stolen. Because many of the employees at Ameriprise take their computers between work and home, the company determined there was a need to put more security into those computers. Ameriprise made sure all employees had the new security suite installed on their computers. By responding quickly to the need for more security, Ameriprise made sure all information is being kept secure. Making sure employees information is kept as secure as possible there will be more trust in the company and the HR employees working with that information.

Conclusion

IBM, Terasen Pipeline, CS Stars LCC, and Toshiba America Medical Systems, Inc. are good examples of companies facing issues similar to human resources information technology and human resources information systems. All of these companies know the importance of new technology, human resources information systems, and data security. The remainder of this paper provides synopses of more companies facing human resources issues, how the company responded to the issues, and the outcomes of the company’s responses.

Companies Benchmarked

IBM Europe

The Situation:

IBM is a global organization offering research, software, hardware, IT consulting, business and management consulting, ring and financing. It employs around 340,000 people, speaking 165 languages across 75 countries, and serving clients in 174 countries. In January 2007, IBM established a separate “new media” function within its corporate communication department. IBM main goal is to educate, support, and promote programs that utilize social media. IBM Europe decided to expand internal communication by blogging guidelines. The recognition was that blogging was already happening among IBMers, just in an unregulated way. In a similar way, institutionalizing a function to deal specifically with new media is not a corporate move, or establishing from scratch. It’s a response to the issues already emerging in the company. Now that those technologies are here, people are using them, they’re growing and there here to stay-we’re just going to put some structure around them so that we can try to optimize their use.” The users decide what technologies they want to use and how they want to use them. That main idea is that IBM understands that they must remember to respect the fact that social media are social. IBM had the need to connect its 340,000 global employees more effectively.

The Response:

IBM’s intent around social media has now been officially formalized. From January 22 2007, the company established a separate “new media” function within its corporate communication department. “Its remit: To act as expert consultants inside and outside IBM on issues relating to blogs, wikis, RSS and other social media applications. The main idea is to educate, support and promote programs that utilize these tools. IBM has a history of being a t the forefront of technology based corporate communication. From the multimedia brainstorming “WorldJam” that made news headlines back in 2001 in which 50,000 employees worldwide joined a real time, online idea-sharing session about the company’s direction. IMB has always prepared itself to use breakthrough technologies to establish a two-way dialogue with its employees. The need for social media was necessary and could no longer wait.

The Outcome:

In the last few years IBM has been recognized as being the vanguard of social-media use: IBM was on of the first Fortune 500 companies to get behind collaborative wikis, published internal blogging guidelines as far back as 2003, and is now moving fast beyond RSS and podcasts into videocasting and “virtual world” technologies like Second Life. The intranet search facility extends to all areas of the site, including new media aspects. When an employee logs onto their portal an executes a key word search, the results they get back not only come from the main intranet pages, but include results from IBM forums, wikis, blogs and podcast/videocasts tags. IMB has an understanding that employees are no longer staying in a company their entire lives. It’s just not like that any more. In Belgium for example over 50 percent of 2,300 employees have been there fewer than five years. The company has come to the conclusion that with an increasingly young and mobile workforce, the likelihood is that an employee population full of a younger generation, for whom these tools are part and parcel of life, is not that far away. In years to come IBM will have to deal with employee base for which blogging is just the natural way to interact over a web platform. IBM has created centralized platforms for most tools that fall under its remit, which includes wikis. For Philippe Borremans, new media lead Europe for IBM, has the potential business applications of a wiki cover two broad benefits: Collaborating and knowledge sharing. IBM has scored some notable successes on both fronts in the near 5000 wiki pages now up and running in the organization. The company has been a huge pick-up in interest in podcasting over the last 18 months writing can seem such a technical skill, whereas people feel they can talk more freely than they can write. One of the most consistently popular IBM podcasts, with over 20,000 downloads a week.

Ameriprise Financial

The Situation:

The Department of Justice survey estimates that 3.6 million U.S. households were victims of identity theft in 2004. Trafficking in personal date goes beyond U.S. borders: the New York Times reports that stolen financial information is often distributed among participants of online trading boards, and the buyers are frequently located in Russia, Ukraine, and the Middle East. One reason clients are concerned about data security is the widespread publicity generated by breaches at financial services firm. In late December 2205, an Ameriprise Financial employee’s laptop that contained unencrypted data on approximately 230,000 customers and advisors was stolen from a car. Other financial services firm, including Citigroup and Bank of America, also acknowledge large-scale customer data losses in 2005. President of NCS, Rita Dew, a compliance consulting firm in Delray Beach, Florida, says that the Securities and Exchange Commission requires investment advisors to have policies and procedures that address the administrative, technical, and physical safeguards related to client records and information.

The Response:

Ameriprise Financial had to fight back and had to implement “layers of protection.” It is important for employees who their primary business computer, and employees regularly transport the computer between home, office, and meeting sites. The vulnerability of this arrangement and the need for a safety software program is much needed.

The Outcome:

Employees who are transporting lab tops should install the Steganos Security Suite on their computer. This software allows employees to create an encrypted virtual drive on the laptop that serves as data storage safe. Employees stores all client related data and tax preparation software database on the encrypted drive, which employees has set up with one gigabyte of storage space. The best thing is that when an employee turns off the computer the information is stored “safe”, the software automatically encrypts the virtual drive’s data. The software also generates encrypted backup files, which employees store on CDs in a fireproof safe. This should keep the data secure if any employee’s laptop is stolen or if the drive is removed from the laptop. Other financial advisors are relying on encryption both in and out of the office. Other programs that are being used to protect client’s information are RAID Level 1 system to store data on the drives that are encrypted with WinMagic’s SecureDocs software. Encryption ensures that anyone who steals the computer will be absolutely unable to read the data, even by connecting it to another computer as a “slave drive. This has given many financial advisors the greatest peace of mind.

Terasen Pipelines

The Situation:

Terasen Pipelines is a subsidiary of Terasen Inc. located in Vancouver, Canada and is located in several provinces and U.S. states. In 2001 the company changed its headquarters to Calgary to be closer to the oil. With the big move, the company went through a growth spurt. With the company in many different locations and the growing numbers of employees, the HR department saw a need to find a new system to keep more accurate records.

The Response:

In the past Terasen had kept records on paper and with spreadsheets and with the growth of the company, this system does not work as well as in the past. In order to compensate for future growth, Terasen began to look into HRIS companies to help with the HR operations. After researching different companies, Hewitt’s application service provider model with eCyborg was found to be the right fit.

The Outcome:

Although there was difficulty adapting to a new way of recordkeeping, Terasen was able to find a system that will help support the current and future growth of the company. Fortunately, some of the HR staff had experience working with an HRIS and were able to help their colleagues imagine new processes, as aided by a system. One theme often voiced throughout this process was: "You guys don't know how hard we're working when we can make it so much easier with a system that could do a lot of this for us. You don't always have to run to the cabinet for the employee file just to get basic information. It can all be at your fingertips." (Vu, 2005). In order to help Terasen ease the HR burden of implementing a new HR system, the management of Terasen was convinced to look for a vendor to help implement and maintain a HRIS system. This system has helped Terasen better prepare for current and future growth.

Shaw’s Supermarkets

The Situation:

Shaw’s Supermarkets is the second largest supermarket chain in New England. With a workforce of 30,000 located at 180 stores throughout six states, Shaw's HR staff is responsible for managing employees' personal data. Their employee mix includes approximately 70 percent part-time employees, consisting of students, senior citizens, second-job part-timers, and career part-timers. One third of the workforce is made up of union associates, and Shaw's staff oversees the company's involvement with three unions and six separate contracts (Koven, 2002). In order to help manage the workforce, the HR staff became interested in centralizing its HR operations.

The Response:

In order to centralize HR operations Shaw’s decided to implement an ESS (employee self-service) solution. The use of self-service applications creates a positive situation for HR. ESS gives HR more time to focus on strategic issues, such as workforce management, succession planning, and compensation management, while at the same time improving service to employees and managers, and ensuring that their data is accurate. With this solution, employees have online access to forms, training material, benefits information and other payroll related information.

The Outcome:

Shaw’s has had positive feedback since implementing the ESS solution. "The reaction from our employees has been extremely positive," Penney, VP of Compensation and Benefits, says. "We even had a significant increase in our medical coverage costs, and it was almost a non-issue because the online enrollment featured the plan choices, the employee cost, and the company subsidy. An employee self-service application makes it very easy for them to understand their contributions and coverage options. I received several e-mails from employees saying this was a great change and how easy ESS was, which the case is not often when employees are selecting their benefit options." (Koven, 2002). By giving the employees more access to their information they are able to see the benefit choices available to them. Employees are also able to update their information online, which helps reduce the paperwork of the past. Shaw’s has also seen improvement in productivity because employees are updating information at home, not during work hours.

CS Stars, LLC

The Situation:
New York Attorney General Andrew Cuomo has announced that New York State has reached its first settlement with a company charged with failing to notify consumers and others that their personal data had gone missing. Cuomo’s office, which enforces the state’s 2005 Information Security Breach and Notification Law, charged CS STARS LLC, a Chicago-based claims management company, with failing to give notice that it had lost track of a computer containing data on 540,000 New Yorkers’ workers’ comp claims.

The Response:

The owner of the lost data, which had been in the custody of CS STARS, was the New York Special Funds Conservation Committee, an organization that assists in providing workers’ comp benefits under the state’s workers' comp law. On May 9, 2006, a CS STARS employee noticed that a computer was missing that held personal information, including the names, addresses, and Social Security numbers of recipients of workers’ compensation benefits. But CS Stars waited until June 29, 2006, to notify Special Funds and the FBI of the security breach. Because the FBI declared that notice to consumers might impede its investigation, CS STARS waited until July 8, 2006, to send notices to the 540,000 New Yorkers affected by the breach. On July 25, 2006, the FBI determined an employee, of a cleaning contractor, had stolen the computer, and the missing computer was located and recovered. In addition, the FBI found that the data on the missing computer had not been improperly accessed.

The Outcome:

New York's Information Security Breach and Notification Law, effective in December 2005, requires businesses that maintain computerized data which includes private information to notify the owner of the information of any breach of the security of the system immediately following discovery, if the private information was, or is reasonably believed to have been, acquired by a person without valid authorization. The law affects not only businesses in their dealings with their customers, but employers in their role as custodians of employees’ personal data. (Cadrain)

Without admitting to any violation of law, CS STARS agreed to comply with the law and ensure that proper notifications will be made in the event of any future breach. The company also agreed to implement more extensive practices relating to the security of private information. CS STARS will pay the Attorney General’s office ,000 for costs related to this investigation. (Cadrain)

IBM

The Situation:

IBM's paperless online enrollment system, introduced in 1999, has proved to be a winner for both the company's 135,000 active U.S. employees and the company, according to Cathleen Donnelly, senior communications specialist at company headquarters in Armonk, N.Y. The company saves .2 million per year on printing and mailing costs alone, Donnelly says, and the employees’ can take advantage of a variety of technologies to learn about issues, research program information and access decision support tools from their desktop computers. (Heuring, 2002)

The Response:

One of those tools, a personal medical cost estimator, enables employees to calculate potential out-of-pocket health care expenses under each of the plan options available to them, Donnelly says. Employees log in personally and are greeted by name and with important information regarding their benefits enrollment, such as the deadlines and when changes take effect. They automatically get access to health plans that are available to them, and the calculator lets them compare estimated benefit amounts for each plan.

"Employees can select the health care services they expect to use in a particular year, estimate expected frequency of use, and calculate potential costs under each plan option," Donnelly says. "The feedback that we've received from employees tells us that this tool has really helped them to make a comparison between plans based on how they consume medical services." The calculator shows both IBM's costs and the employee's. (Heuring, 2002)

The Outcome:

"Since we began offering online enrollment, we've learned that employees want web access," Donnelly says, so they can log on at home rather than through the company intranet. So the company has been working to put in place a web-based enrollment system that employees and retirees can access from anywhere.

Employees can get summary information on the plans, drill down into very specific details and follow links to the health care providers for research. Donnelly says the system has received high marks for convenience because employees can "get in and out quickly."

WORKSource Inc.

The Situation:

To meet the challenge of handling 100 new employees, WORKSource Inc. acquired Web-based technology programs from GHG Corp. like electronic paystub, electronic timesheet software, time-off system, and human resource information system (“Tips,” 2006). These tools enabled CEO Judith Hahn to handling payroll procedures efficiently and effectively.

The Response:

WORKSource has eight workforce centers, with approximately 108 employees, located throughout a six-county region. Previously, payroll, benefits, and human resources for those employees were processed and managed by a Professional Employer Organization. The company also has 52 administrative staff in its headquarters office. When the contract with the PEO terminated on June 30, 2006, those 108 employees were immediately moved to the payroll of WORKSource, which meant Hahn’s workload more than doubled effective July 2006 (“Tips,” 2006).

Hahn, in an interview with PMR, said she relied on LEAN to help get a handle on what needed to change for her to manage the increased workload. Two years earlier, Hahn’s CEO had introduced her to LEAN, a Japanese management concept of eliminating wasteful steps and motion when completing processes. “I began to read as much as possible about LEAN and joined an HR LEAN focus group” (“Tips,” 2006).

The Outcome:

Mastering the concepts of LEAN led Hahn to develop and apply her own acronym of “REASON” to her department’s payroll and HR processes. Review the process: map payroll tasks from start to finish. Eliminate waste: determine how to complete a payroll task most efficiently without unnecessary steps. Analyze alternatives: research and evaluate the applicability of new technology. Sell innovations to management: document the return on investment of each innovation. Open the lines of communication: communicate openly—and often—with all stakeholders, including employees and top management. Never allow negativity: make change simple and fun. Give employees plenty of encouragement and time to learn (“Tips,” 2006). Judith Hahn was able to implement the right human resource functions using information systems.

Toshiba America Medical Systems Inc.

The Situation:

Lynda Morvik, director of benefits and human resources information systems at Tustin, California-based Toshiba America Medical Systems Inc. (TAMS), thought it would make sense to add a benefits communication component to it. By having all the benefit information online, the TAMS employee handbook would also be a living document, enabling Morvik to make changes when necessary. Such was the case halfway through the project, when TAMS changed health care plans from Aetna Inc. to United Health Group Inc (Wojcik, 2004).

The Response:

TAMS, an independent group company of Toshiba Corporation and a global leading provider of diagnostic medical imaging systems and comprehensive medical solutions, such as CT, X-ray, ultrasound, nuclear medicine, MRI, and information systems, had been using a payroll service bureau and an in-house solution for HR that didn't include easy-to-use consolidated reporting or an employee portal. After evaluating UltiPro alongside several enterprise resource vendors, TAMS selected Ultimate Software's offering and went live in September 2002 after an on-time and on-budget implementation. Almost immediately upon rolling out the UltiPro portal to employees, TAMS began seeing improvements, with an estimated 70% increase in open enrollment efficiency (Wojcik, 2004).

The Outcome:

In an effort to expand the usage of the Web beyond the benefits enrollment process, TAMS has posted a library of documents and forms on its HR portal, including the benefits handbook, which garnered a 2004 Apex Award for publication excellence. That same year, Business Insurance magazine also gave TAMS the Electronic Benefit Communication (EBC) award for outstanding achievement in communicating employee benefits programs over the Web. To continue elevating its use of Ultimate Software's HRMS/payroll solution, TAMS modified the UltiPro portal to meet the imaging company's unique needs (Wojcik, 2004). It was completely integrated with several proprietary applications created to address compensation and performance management issues so that TAMS employees have a central location for comprehensive workforce and payroll information from a Web browser that they can access with a single sign-on (Wojcik, 2004).

References

Byars, Lloyd L. & Rue, Leslie W. (2004). Human Resource Management, 7e. The McGraw-Hill Companies.
Cadrain, Diane (2007). New York: Company Settles Data Breach Charges. Retrieved June 3, 2007 from [http://www.shrm.org/law/states/CMS_021505.asp#P-8_0]
Clarifying IBM’s Strategic mission for social media (2007). Strategic Communication
Management. Retrieved June 1, 2007 from
http://proquest.umi.com/pqdweb?index=17&did=1263791161&SrchMode=1&sid=2&Fmt=4&clientld=2606&RQT=309&VName=PQD.
Friesen, G. Bruce (2003). Is your client ready for eHR? Consulting to Management, 14(3), 27. Retrieved June 3, 2007 from ProQuest Database.
Hagood, Wesley O. & Friedman, Lee ( 2002). Using the balanced scorecard to measure the performance of your HR information system. Public Personnel Management, 31(4), 543-58. Retrieved June 3, 2007 from ProQuest Database.
Heuring, Linda (2003). IBM: Laying Outing Enrollment Options. Retrieved June 2, 2007 from [http://www.shrm.org/hrmagazine/articles/0803/0803heuring_paperless.asp]
Koven, Jeff (2002). Streamlining benefit process with employee self-service applications: A case study. Compensation & Benefits Management, 18(3), 18-23. Retrieved June 2, 2007 from ProQuest Database.
O’Connell, Sandra (1994). Security for HR records – human resources. HR Magazine. Retrieved June 3, 2007 from [http://findarticles.com/p/articles/mi_m349] 5/is_n9_v39/ai_16309018
Protecting Client Data (2006). Financial Planning. Retrieved June 1, 2007 from

http://proquest.umi.com/pqdweb?did=1066464321&Fmt=4&clientld=2606&RQT=309

&VName=PQD.
Tips on Using Technology to Streamline Payroll Processes – and Cut Costs (2006). Payroll Managers Report, 6(10), 1-9. Retrieved June 2, 2007 from EBSCOhost Database.
Vu, Uyen (2005). Contracting out HRIS easy call at Terasen Pipelines. Canadian HR Reporter, 18(4), 5-9. Retrieved June 2, 2007 from ProQuest Database.
Wojcik, J. (2004). Toshiba Employee Handbook Goes Online. Business Insurance, 38(49), 18.
Retrieved June 2, 2007 from EBSCOhost Database.

Human Resource Information System - HRIS
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Steven Brown, MBA is a loving husband and father of two boys. He enjoys his time with his family by providing a strong family foundation of Christian Faith. After completing his Bachelors degree, Steven wanted to further his ability to teach and share to others his mindset that they can do anything if they would believe in themselves.