Cyber space racism and ethnic hatred at the work place is an act of using and posting racist comments, images and text messages on social networks sites or use of Internet vessel such as emails. Over the past, it has been established that employees at work place have changed the old age of racism and ethnic hatred to new digital fashion of discrimination over the Internet. In this regard, it is acknowledged that “Cyber Racism and ethnic discrimination is based on grounds of race and different cultural practice argues” (Daniels 1997).
Specifically, Cyber racism and ethnic hatred menace entails arbitrarily designating an employee or a group of employees at work place as belonging naturally to some minor race thus being deemed inferior than other employees. For this reason, categorizing people according to their color or their mental or moral behavior rather than their academic qualification, is an example of purely cyber discrimination of employees.
Discrimination in the workplace is caused by embracing a system at work place where decision making power is maintained by one particular selected group of employers who teach each other hatred, racism, and stereotyping which is a noncompliance to affirmative action causing discrimination. As a matter of fact, people are not born being racist. But racism is an act that is learned from a coworker and an employee at the work place or practiced as an extension of cultural exposure of a community. In most cases Employees join their working environment with purity and determination to work for personal gain but not hate of others (Daniels 1997). At work place, employees discrimination over the cyber space causing factors ranges from releasing messages over the Internet on basis of race, color, religion, sex which includes altitude and perception towards pregnancy, national origin, age, disability or any other un ethical statements. These factors cause racism and ethnic hatred discrimination when is elevated in making decision to “determine the employees’ performances status, promotion potential or disciplinary action” (Jason W, 2004) taken against an employee at work place.
Richard (2002) argues that Cyber racism and ethnic hatred at the work place has been noted as a “major cause of Physical and Emotional Health distress”. It has been proved that employees at work place suffer great distress, blood pressure and other related stress ailment and diseases because of the Cyber racism and ethnic hatred elevated to them at the work place, this may range from major discriminatory events such as threats of being fired from a job or suffer due to reactions to chronic daily discrimination in the workplace like racist or sexist jokes or even unfriendly work environment message provocations over the Internet.
According to Jason (2004) “Cyber racism and ethnic hatred at the work place may also lead to legal pursuits…” puts the matter to light by pointing out that racial and ethnic discrimination are among violation of federal and state laws. He highlights that; “discrimination in any terms or conditions of employment are illegal”, which are based on their race, color, national origin, sex and religion. Specifically, the Age discrimination in Employment Act does not allow discrimination of workers over 40 years of age. Secondly, the Americans with Disabilities Act also require that employers to make reasonable accommodations to allow disabled persons access buildings and workplace functionality. In addition The Family and Medical Leave Act also demands that employees are not discriminated against employers by taking care of personal or family medical needs for this reason any form of discrimination whether done on cyber or otherwise any instances of workplace discrimination is valid to lead employees to file a discrimination lawsuits against the employer.
In reference to Donald (2003) “Cyber racism and ethnic hatred at the work place also has a negative effect... It creates poor working
Related Documents: Cyber Space at work place Essay
for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred and used it needs to be secured. A bank is open to the public; you would not have this bank unsecured would you? There would be security guards, cameras, and a vault. The same mentality to secure your data should be implied if you have…
Cyber[“security”], Codification, and Personhood: How H.R. 3523 Colonizes Us in the Internet Our legal state within the Internet is in jeopardy. As we speak, politicians, policymakers, scholars, bloggers, and all of us ordinary citizens are involved in a predominately invisible war over what can and cannot be said, what can and cannot be read, and where we can and will go on the Internet. I call this an invisible war because of our inability to articulate how we approach the most fundamental technology…
In terms of Cyber psychology, discuss the major issues when considering the ‘dark side’ of the Internet Over the years psychologists applied models and theories to explain individuals behaviours when using social networking sites. Primarily to explained positive and the increased display of negative behaviours and their consequences. When the Internet started to roll in its trend and more people became connected to it, some of psychologist decided to look at it even deeper to check how they can…
Sherri McGill Professor Russo English 101 5/1/13 The Worst Type of Bullying Cyber bullying is rapidly becoming a huge problem with young teens and young adults. Technological devices are enabling people to attack others, saying whatever they please through cyberspace. Ways people get ridiculed and belittled are through text messaging, online chat rooms, and online social networking sites. Since this form of bullying is done through technology, it cancels the face to face confrontation…
1. Never share information online if it could be used against you. Cyber bullies often use pictures, status updates, and personal information they find online to harass their targets. It's fine to share a little information about yourself online, but never reveal something you don't want the whole world to know. Don't take an explicit photo of yourself to send to someone else, and never let someone else take an explicit photo of you. You may be in love with your significant other now, but if you…
review of this policy for the purpose of monitoring and of the efficiency with which the related duties have been discharged, by no later than one year from the date shown below, or earlier if significant changes to the systems and arrangements take place, or if legislation, regulatory requirements or best practice guidelines so require. Signed: Date: August 2013 Mr J. Jenner jr. Principal Mr J.Bushrod Headmaster Mrs J.Jenner Proprietor Page 1 of 16 Magdalen Court School is committed…
IA1 – EVALUATION OF THE GLOBAL IMPACT OF THE ESTONIA CYBER EVENT Sherquita Tucker CSEC655 Section 9041 Table of Contents 1. Introduction 3 2. Background and Global Impact 4 3. Vulnerabilities in Cybersecurity Policy and Practices 5 4. Advantages of Reducing Vulnerabilities for Future Attacks 8 5. Disadvantages of Reducing Vulnerabilities for Future Attacks 8 6. Advantages of Improving Security Practices or Policies 9 7. Disadvantages of Improving Security Practices…
exposed to rapidly evolving cyber-attacks, the rise in Malware, and Social Media Hacking. This vulnerability occurs because BGP has deficient measuring ability in terms of validating the authenticity of BGP control traffic (Nicholes & Mukherjee, 2009). For this reason, there is great cause to analyze the BGP vulnerability as it relates to effective business practices. This proposal will utilize research to describe the issue with cyber security, how Border Gateway Protocol works, and discuss current…
Social Media Social Media is engraved into our brains and it is becoming, if not already, one of our activities of daily living. We all must admit social media is a genius creation, revolving our lives around it, using it for schools and even work places; it is our way to feel connected to our friends, friends of our friends, and everyone worldwide! Just one click away to share our photos with our family friends anywhere at any time, stay and be connected with what everyone is doing, following with…
Effects of Social Media on Young Adults Looking at the average Millennial, one would see him toting all his smart devices and would wonder if Millennials are ever disconnected – from technology or from each other. The Millennial Generation, more than any other generation, feels the need to be constantly linked to each other. For young American adults aged 18-32, technology is their life; virtual reality has come to supersede physical reality. In what seems like every second of every day, teenagers…