Wednesday, October 30, 2019
A concise report Case Study Example | Topics and Well Written Essays - 2750 words - 1
A concise report - Case Study Example Inasmuch as there seems to be so many opportunities in companies going global, businesses are expected to ensure that they develop effective business strategies and approaches that can enable them to keep pace with the great competition at this stage. In this regard, success in marketing seems to be among the best strategies that businesses operating globally can use as their competitive advantage. In deciding on the marketing approach, it is important that businesses understand the characteristics of the markets in which they are reaching in order to devise strategies that can appeal to the people in that market. With effective marketing, businesses can easily get their goods in shelves in wholesale and retail stores, which is necessary in order for them to be successful. Marketing strategies are not homogeneous, what may have been successful in the domestic market may not prove to be successful in the global market as well, which underpins the need for effective research and understanding of the global market before launching in the new market. This paper examines the different marketing approaches used by companies going global, focusing on the effectiveness of the relationship marketing approach as opposed to traditional/transactional approach in the global markets. The term ââ¬Å"global marketing environmentâ⬠is sometimes very complex to describe or explain since it encompasses various issues in the global business environment that are never constant, always changing. In order to have the best approach towards understanding what entails the global marketing environment, it is important that one examines some of the current literature and changes in the business environment. In the modern business world, the changing behavior and buying patterns of customers as the proliferation of many and new marketing channels have set up many new issues in the business environment
Monday, October 28, 2019
Great Gatsby Essay, Character Corruption Essay Example for Free
Great Gatsby Essay, Character Corruption Essay Throughout the novel of The Great Gatsby corruption is a prevalent and reoccurring theme and lies within most characters. They become overwhelmed with their own self desires and goal to gain material possession that it blocks their true vision of innocence and morality. Daisy for example is introduced into the book as an innocent dedicated wife to Tom but as the book progresses there is an evident change in her character as she becomes increasingly corrupt. By the end of the book Daisy is selfish, destructive and careless as she handles the situation between her husband, Tom, and her ex lover, Gatsby. For example of her being careless, she lets Gatsby take the blame for her killing of Myrtle Wilson which eventually leads to Gatsbyââ¬â¢s death which she seems to show no concern. She is destructive by cheating on her husband while having no real intentions of leaving him for Gatsby. Tom from the beginning of the novel was always seen as corrupt when he has an ongoing affair with Myrtle to satisfy his own needs and leave those needs and feelings of Daisy behind him. He focuses more on monetary value of things and his own self appearance than to the care which Daisy requires out of him as a husband. Tom is also a hypocrite in a way when he catches Daisy and realizes what she has been doing behind his back, he becomes fierce and angry with her while at the same time he has been doing the same behind her back for years. Jordan Baker is also extremely corrupt because of her dishonesty and her need to gossip. She is a social climber who will cling to anyone who means anything or has money for her to grasp onto. She will do whatever it takes to win or get her way, as shown when she cheats in her round of golf to win the tournament. Everything she does is for show and has no regard for other people or their feelings. She goes to Gatsbyââ¬â¢s parties with no real concern for who he is while showing no gratitude or thanks for having the party. She is constantly looking out for herself and only herself trying to figure out ways in which she can be seen and become popular in the West and East Egg community. When Daisy was having her affair with Gatsby, Jordan supported her and was behind her during the whole thing, another example of corruption within Jordan. The people of West and East Egg are also all corrupt and consumed with themselves. This is shown when Gatsby dies because only two people show up to his funeral Nick and his father. These people attending his parties have no care for him or his house while theyââ¬â¢re there and cannot even pay respect to a man that has died and has given every one of them more then he needed to. Gatsby himself is also a corrupt character in the book yet not nearly as blatantly as the others. Gatsby is corrupted by love and his dream to be with Daisy. Everything heââ¬â¢s ever done in his life such as the money heââ¬â¢s made and the parties he throws are for the slightest chance of him becoming reacquainted with his lost love, Daisy. He is constantly being used by everyone in West and East Egg as an outlet to their everyday lives. They have no regard for who he is and nor do they care. The people come and go as if it is routine for these parties and show no thanks to Gatsby. He has no true friends besides Nick in Egg. Gatsby, over the time of becoming rich has become overwhelmed and brought into the world of expensive material things all to impress Daisy, who previously could not be with him because he was not wealthy. All he can do is show that off so that in the slight chance she comes to one of his parties he can show her is wealth and what he has become. Gatsby is so drawn into and brain-washed over Daisy that she is all he can think about and all he sees is that green light across the bay, dreaming of the time when he and Daisy can finally be together again. This dream is crushed though because he cannot compete with Tom. Tom being categorized under ââ¬Ëold moneyââ¬â¢ while Gatsby is categorized under ââ¬Ënew moneyââ¬â¢ and big distinction in the communities of West and East Egg. He has devoted his life to becoming an exclusive member to the ââ¬Ëold moneyââ¬â¢ people in Long Island but will never be able to reach that goal which corresponds to his goal of end up with Daisy. Corruption is an over arching theme throughout The Great Gatsby and all characters seem to reveal it in their own way with the exception of Nick who stays true to his midwest routes. Nick is never consumed in the material world or has the desire for anything greater than which he already has while all the other characters are always greedy and have desire for more things. They are all absorbed in their own world and worries that they have no time to see what others are doing or how they feel which is an easy way to lead to a corrupted lifestyle.
Saturday, October 26, 2019
income :: essays research papers
à à à à à With the average American having a disposable income of $28,277, it is no wonder America has become the consumer nation that it is today (census.gov). In the past nine months American economy has shown an economic growth of 5.6%. Improvements in work industry are providing higher-paying, more permanent jobs than before, with less than 10% of new jobs created in 2005 being temporary (economist.com). With better employment opportunities and steady economic growth, America will become even more of a consumer culture than it is today. à à à à à Mark Hertsgaard observes a more compassionate side of America when he describes consumer spending post 9/11. ââ¬Å"But the attacks also engendered a new seriousness among the American people, a turning away from self-indulgence and material things in favor of spiritual values and services to othersâ⬠(Hertsgaard 40). The 9/11 attacks left Americans with feelings of sympathy and remorse, as well as a feeling of unity that was shared throughout the country. Hertsgaard stated that after the attacks, the consequent drop in consumer spending turned the economy into an outright recession (Hertsgaard 40). While the economy itself unarguably suffered an obvious and drastic decline, Americans did not waste much time before they used the attacks on the World Trade Center as a means to make a profit. Millions of products advertised as 9/11 memorabilia were suddenly being sold everywhere. These items were announced as apparent ways for Americanââ¬â¢s to show their un ity and patriotism, as well as their loyalty and support for their country. Sweatshirts, posters, coffee mugs, and just about anything that could somehow display images or messages were applicable to be sold as keepsakes from the tragic event. à à à à à While a day as disastrous and devastating as 9/11 left most of America with feelings of grief, especially for those who had lost loved ones, the ââ¬Å"American Dreamâ⬠was far from being forgotten. The American Dream holds different meanings for different individuals, depending on their own opinions and perceptions. Despite the fact that this phrase holds not one particular meaning, and is a somewhat varied idea, itââ¬â¢s accepted interpretation includes achieving prosperity through hard work, courage and determination à à à à à Naturally, Americanââ¬â¢s strive to be the best they can be, regardless of what it is they are doing. It is normal for a person in any profession to desire a promotion, which is a direct route to their actual goal: a higher salary. à à à à à Lee Price, of the Economic Policy Institute, holds an opinion which contrasts Hertsgaardââ¬â¢s idea that the 9/11 attacks were completely responsible for the economic decline.
Thursday, October 24, 2019
Stress Essays -- essays research papers
Stress Stress is the "wear and tear" our bodies experience as we adjust to our continually changing surroundings. It has physical and emotional effects on us and can make good or bad feelings. As a good influence, stress can help motivate us to do something, or help us through the day. As a bad influence, it can result in feelings of distrust, rejection, anger, and depression (overall, make you feel really crappy), which in turn can lead to health problems such as headaches, upset stomachs, rashes, insomnia, ulcers, high blood pressure, heart disease, and strokes. With the death of a loved one, the birth of a child, a job promotion (or demotion), or a new relationship, we experience stress as we change our lives to cater to this. In so adjusting to different circumstances, stress will help or hurt us depending on how we react to it. The circumstances that cause stress are called stressors. Stressors vary in harshness and duration. For example, the responsibility of caring for a sick parent may be an ongoing source of major stress, whereas getting stuck in a traffic jam may cause mild, short-term stress. Some events, such as the death of a loved one, are stressful for everyone. But in other situations, individuals may respond differently to the same eventââ¬âwhat a stressor is for one person may not be stressor for another. For example, a student who is unprepared for a chemistry test and anticipates a bad grade may feel stress, on the other hand a classmate who stud...
Wednesday, October 23, 2019
Development of a Code of Ethics: IT Challenges Essay
Societal changes caused by information technology and the resulting ethical usageà The information technology advancements continue to impact the workplace, societies and cultures. In todayââ¬â¢s world, information technology is almost part of every business, educational institute, and even personal activity (Brooks, 2010). Computer and internet access have found their way to households, schools, libraries, peopleââ¬â¢s cell phones, banks, hospitals, governments, coffee shops, and other public places. As the industry evolves, so do the needs and special niches of society from mainframe systems, to micro systems, to PC-based LAN and WAN systems, to virtual systems and the internet. Advanced technology means unlimited prospects for the society. In the same token, new technologies mean increased exposure to engage in unethical behaviors. The growing concerns have given rise to efforts in developing code of ethics to prevent violations and address ethical dilemmas. When policies are ambiguous, ethical decisions can vary depending to the personal judgment or interpretation of the manager. There are instances where the lines are blurry that it becomes difficult to draw the line between ethical and unethical behavior (Brooks, 2010). This is the reason why it is important for education systems and businesses to address the ethical concerns of information technology usage and to develop a code of ethics to prevent ethical dilemmas and violations. New capabilities of computers give rise to new choices for action. This results in situations where either there is no conduct for guidance or there is inadequate policy to address the situation. James H. Moor, a Professor of Intellectual and Moral Philosophy at Dartmouth College published an article ââ¬Å"What is Computer Ethics?â⬠where he identified this situation as policy vacuum (Moor, 1985). History of the development of Code of Ethics in computing In the 1950 era, a new technology in the form of TAB machines was introducedà by accountants. Very few understood the capabilities of these machines and even fewer had the skills to operate them. The machine accountants were faced with challenges in the usage of the TAB machines and did not have any guidance to follow. The National Machine Accountants Association (NMAA) was founded in 1960 to address the growing issues of this new technology. The changing nature of processing information brought about by the introduction of computers in the early 1960ââ¬â¢s gave rise to another challenge. The industry was changing and the widespread interest on computers required a change in the mission and goals of NMAA. The associationââ¬â¢s name was changed to Data Processing Management Association (DPMA) to be more reflective of the new objectives that promoted continuing education and professional certification of its members. As the computing industry evolved, business leaders, accountants, and educators recognized the need to advance Information Technology (IT) professional development, support IT education, and formulate IT policies that will guide the usage of IT in many facets of society. The association adopted yet another name in 1996 which is now the Association of Information Technology Professionals (AITP). Development of Code of Ethics There are at least two basic factors that influence the development of Code of Ethics for IT. One is from sources outside of the corporate structure, and the other is from the corporationââ¬â¢s governance. AITP as an outside source. The accounting environment established the Public Company Accounting Oversight Board to oversee, regulate, and discipline accounting firms that do not conform to accountability and transparency standards. In the information technology world, similar professional agencies were formed to provide guiding principles in the usage of information technology to ward off undesirable and unethical behavior. A prominent professional association that lends oversight to the guiding principles of information technology is the AITP. AITP is an association composed of a premier network of IT business professionals focused on providing a community of knowledge, education and resources to its members bound by the associationââ¬â¢s guiding principles on Guiding Principles reflect AITPââ¬â¢s beliefs about your role as a member and the impact we want AITP toà have in the IT profession. The association extends opportunities to its member to become better leaders that excel through honesty demanding ethical behavior and fiscal responsibility. The associationââ¬â¢s webpage shares news, IT developments and events with chapter members, IT professionals, faculty advisors, student members, and various community groups. Today, there are over 1,000 U.S. regional chapters with members that are linked in who make continuous network connections around the country and across the globe. Corporate governance as an inside source. Prudent governance of an organizationââ¬â¢s IT functions is viewed as an integral part of corporate strategy in facilitating information-based competitive advantage in promoting organizational growth and progress. Enterprise leaders like the board members, executive management and chief information officers are entrusted with the responsibility of raising awareness and understanding to ensure IT meets and exceeds expectations, its risks mitigated, and standards followed (IT Governance Institute, 2003). These officers are uniquely positioned to fulfill their role in harmonizing the organizational strategy with the accounting, auditing, operational and IT controls that is central in adhering to corporate ethical behavior. It is important for top management to lead in promoting awareness of ethical compliance within their organization as it sends messages to employees that inevitably shape the culture of their organizations. Enforcement issues related to a code of ethics for information technology The expansion of Internet brings together different cultures and societies where norms of ethical and acceptable behavior, and the role of computing and communication networks within the society vary a lot. In protecting globally distributed systems that employ open public networks, there is a great demand to specify what individualsââ¬â¢ rights and responsibilities are in regard to these networks. The distributed global nature of networks makes this a significantly difficult task. The lack of centralized authority and differences in moral codes between different groups, such as original developers of networks, business users, private users and governmentalà organizations lead to significant consistencies. These situations can easily trigger enforcement issues that can result in ethical dilemmas. Differences of organizational culture can also become problematic when dealing with how operational policies and methods are enforced. Various groups within the company may have significantly different objectives and requirements for the use of networks, and balancing different needs and wishes may be a difficult task. The task of adopting or designing a common communication network to adapt to the various departmental needs becomes complex. The issue becomes even more complicated when considering the non-technical issues. For instance, it becomes difficult to establish a common ethics guideline that can provide comprehensive protection and security for all aspects of the organizational structure. There is also an enforcement issue on banning people from downloading data like music off the internet. This is a clear violation of the Copyright laws but protecting the authors is difficult to enforce considering that the internet is open to anyone who has access to a computer. The downloading of music does not cause actual harm to anyone, but it is unethical. A hacker can argue that a crime is not committed since there is no theft, vandalism or breach of confidentiality. In an Examiner article published by Scot Trodik on ââ¬Å"Ethical Issues on Hackingâ⬠(Trodik, 2011), the Hacker Manifesto states that the only crime committed is the crime of curiosity and since the information is free, hacking is therefore justified. Conversely, the Computer Fraud and Abuse act of 1986 recently expanded in March 2013 made it illegal to tap into a computer without authorization and access private government, financial or credit card information. However, this act was flawed because of its broad scope and vague wordings that would criminalize many everyday activities allowing outlandishly severe penalties. Establishing a code of ethics in an online educational environment Technology has enormously changed the teaching world from the traditional classroom to online learning. Distance learning allows a student to chooseà courses to enroll in and enables a student to develop a personalized schedule. Higher education institutions that offer online learning should not lose sight in stressing the importance of ethical character development of both the faculty and the learner in the pursuit of a personal, academic and professional excellence. This educational revolution can pose an ethical challenge because the interaction between the faculty and the learner becomes less personal in comparison to a face-to-face classroom instruction. It is for this reason that it is crucial to establish and adopt a code of conduct that gives guidance to the maintenance of effective and responsible distance learning programs. Institutions should provide policy guidelines for faculty and learners to follow and incorporate technology ethics in the curriculum. An Academic Conduct Committee should be established to enforce academic rules and promote an atmosphere of learning. Penalties for violators of the code should be weighed with fairness keeping in mind the intent to preserve the integrity of distance learning educational process. A student handbook on the rules of academic integrity should be a required reading material so that students know what the instances that violate academic integrity. Examples of these violations include plagiarism, fabricating citation, use of unauthorized assistance, and falsifying or altering results of research work. Among these violations, Plagiarism is one of the most common academic misconduct in a distance learning setting. Many factors lead students to commit plagiarism. Some of these reasons may be because of new rules to learn, academic pressures, poor time management or poor research skills. Notwithstanding these, students should have the responsibility to educate themselves honestly. References Al-Rjoub, H., Zabian, A. & Qawasmeh, S. (2008). Electronic Monitoring: The Employees Pointof View. Journal of Social Sciences , 4(3), 189-195. Brooks, R. (2010). The Development of a Code of Ethics: An Online Classroom Approach to Making Connections between Ethical Foundations and the Challenges Presented by Information Technology. American Journal ofà Business Education. October 2010. 3(10), 1-13. Collack. V. (2007). What is computer ethics? Article analysis. Retrieved August 21, 2013 from http://www.collak.net/index.php?option=com_content&view=article&id Cone, E. (2008, September 10). Social Responsibility: Doing the Right Thing. CIOInsight Retrieved from http://www.cioinsight.com/c/a/Research/Doing-the-Right-Thing Harbert, T. (2007, October 29). Ethics in IT; Dark Secrets, Ugly Truths. And Little Guidance. Computerworld , 41(44), 34-36.Jennings, M. (2009). Business Ethics: Case Studies and Selected Readings(6th Ed.). Mason, OH:South-Western Cengage Learning.Kuzu, A. (2009). Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. Turkish Online Journal of Educational Technology,8(2), 91-110. Mingers, J. & Walsham, G. (2010). Toward ethical information systems: The contribution of discourse ethics. MIS Quarterly. Vol. 34 No. 4. December 2010. 833-854. Moor, J. H. (1985). What is Computer Ethics? Darmouth College. Moor, J. H. (2001). The Future of Computer Ethics: You Ainââ¬â¢t Seen Nothinââ¬â¢ Yet! Ethics and Information Technology,3, 38-91. Moor, J. H. (2005). Why We Need Better Ethics for Emerging Technologies. Ethics and Information Technology, 7, 111-119. doi:10.1007/s10676-006-0008-0 Association of Information Technology Professionals. http://www.aitp.org/?page=Ethics. Accessed August 20, 2013. Board briefing on IT governance. IT Governance Institute. http://www.itgi.org/Template_ITGIc9a4.html?Section. Accessed August 22, 2013. Trodik, S. (2011). Ethical issues on hacking. The Hackerââ¬â¢s Manifesto. http://www.examiner.com/article/ethical-issues-hacking. Accessed August 23, 2013.
Tuesday, October 22, 2019
Words That Follow Sequi
Words That Follow Sequi Words That Follow Sequi Words That Follow Sequi By Mark Nichol The Latin verb sequi, meaning ââ¬Å"follow,â⬠is the source of a diverse array of words pertaining to ââ¬Å"going afterâ⬠in one way or another. This post lists and defines the termââ¬â¢s descendants. Sequel, originally meaning ââ¬Å"retinueâ⬠and later coming to mean ââ¬Å"result,â⬠came from a Latin term meaning ââ¬Å"that which follows.â⬠The dominant modern sense, that of ââ¬Å"a continuation of a story,â⬠is nearly as old; prequel is a recent coinage created on the model of sequel to refer to a story that predates a related tale in an overarching narrative but was created first. Sequence originally denoted liturgical verses that followed others; later, the word came to mean ââ¬Å"seriesâ⬠or ââ¬Å"continuity or order of events,â⬠as well as ââ¬Å"result.â⬠The prevailing adjectival form is sequential, though sequent also exists. Consequent is the adjective form of consequence, which literally means ââ¬Å"follows withâ⬠and refers to a result (often, an unfortunate one); the adverbial form is consequently. (Consequence also means ââ¬Å"importance,â⬠as in ââ¬Å"a man of some consequence,â⬠from the idea of something significant having multiple consequences.) Subsequent (ââ¬Å"follows closelyâ⬠), with the same transformations to other parts of speech, is generally more neutral in connotation and pertains more to chronology than to outcome. Segue, originally an instruction, meaning ââ¬Å"now follows,â⬠in a musical score, came to mean ââ¬Å"smooth transitionâ⬠and usually refers to such an event in communication or the media, as when someone effortlessly changes the subject of a conversation by bringing up a related topic, or when one filmed scene shifts to another with little or no disruption. The adjective obsequious refers to someone who is overly attentive so as to gain favor; a sequacious person lacks independent or original thought. (The latter term is much more rare than the former.) The noun forms are, respectively, obsequiousness and sequaciousness (or sequacity); adverbs are formed by adding -ly to the respective adjectives. Sequitur, adopted directly from Latin, means ââ¬Å"consequenceâ⬠; it is used rarely, though it appears in the common term ââ¬Å"non sequitur,â⬠describing something that does not logically follow from what occurred or was said before. Sequester originally meant ââ¬Å"mediateâ⬠and later come to mean ââ¬Å"place in safekeepingâ⬠and then ââ¬Å"isolate.â⬠(Sequestration is a legal procedure or a chemical process.) Persecute and prosecute both mean ââ¬Å"follow,â⬠but persecution is persistent harassment or punishment, whereas prosecution is performance or pursuit as a duty, especially as in the context of bringing legal action or instituting legal proceedings, though originally the former term had a legal sense as well. Pursue (the noun form is pursuit) is descended from prosecute- not persecute- by way of French and originally referred to following someone with antagonistic intent; it still means ââ¬Å"chase,â⬠but often refers simply to following an inclination, as in ââ¬Å"He intends to pursue a medical degree.â⬠One who pursues is a pursuer; pursuant is a rare variant that also serves as an adjective, usually in legislative documents. An associated word that may not be immediately apparent as such is, regardless, right there in pursuit: suit. The sense of ââ¬Å"a set of clothingâ⬠for suit derives from the matching uniforms of a suite, or retinue; suite, by extension, came to also mean a set of things in general, especially a grouping of rooms or a series of musical compositions. The legal sense of suit (often referred to as a lawsuit) shares the ââ¬Å"setâ⬠sense from the notion of being part of a retinue attending (following) oneââ¬â¢s lord at court; courtiers would present a suit to obtain consideration from their superior. A suitor, therefore, is a party in a suit, or a petitioner, or one who seeks to take over a business or who courts a woman. To sue is to carry out a suit or to plead; the word is obsolete as a synonym for woo. (The name Sue, an abbreviation of Susan, ultimately from Hebrew and meaning ââ¬Å"lily,â⬠is unrelated.) Ensue originally meant ââ¬Å"followâ⬠or ââ¬Å"seekâ⬠; it retains only the former sense. Two other words whose derivation from sequi may not be apparent are sect, which pertains to a group within a religion with distinctive beliefs or observances, and execute, which means ââ¬Å"follow up,â⬠though it also developed the sense of ââ¬Å"carry out capital punishmentâ⬠from a legal sense of ââ¬Å"passing judgment.â⬠Sequin, a word for a small, shiny ornament often used on clothing, is unrelated; it derives ultimately from an Arabic term pertaining to minting currency, from the resemblance of a sequin to a gold coin. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:"Because Of" and "Due To" In Search of a 4-Dot EllipsisPeople vs. Persons
Monday, October 21, 2019
Free Essays on Brain In A Vat
Brain in a Vat There are valid arguments for both sides of the brain in a vat problem. Since I have no idea if I am or am not a brain in a vat, I will first tackle the question ââ¬Å"Would I be happier being a brain in a vat?â⬠There are pros and cons to both sides. The next question should be, ââ¬Å"What is the motivation for the controller of the brains in vats?â⬠The evil demon that may or may not exist needs some motivation for controlling lots of brains. The third question is, ââ¬Å"If I am a brain in a vat what is my motivation for doing anything?â⬠This is more of a question of unchanging cause and affect. The final question is ââ¬Å"How do drugs (alcohol, nicotine, narcotics, hallucinogens) play into the brain in a vat scheme?â⬠The cons of being a brain in a vat begin with the given that none of this is reality as we perceive it. It is reality as we know it, but isnââ¬â¢t real when compared to the common definition. Some people would have a problem with this. It fundamentally lies on whether people believe in ignorance is bliss. I donââ¬â¢t. That is like Trevor deciding heââ¬â¢d rather not that Iââ¬â¢ve been getting a piece of his girlfriend. The pro of this is Trevor is more likely to be happy with is his relationship until the moment of truth. This is only a temporary high though. This reality will fall apart with vengeance. So decidedly, I do not want to be a brain in a vat if I donââ¬â¢t realize it. Why would an evil demon want to control our brains? No doubt some diabolic purpose. He probably gets his biggest jollies watching me right this essay. It seems like an awful lot of work to maintain all those brains. If I were an evil demon Iââ¬â¢d probably find something better more evil task to do. I can therefore conclude an evil demon has little motivation that I can grasp for such a tedious task. If I were able to determine I was a brain in a vat, and wires were just feeding all this to me, I would party till the circuits overloaded. Thi... Free Essays on Brain In A Vat Free Essays on Brain In A Vat Brain in a Vat There are valid arguments for both sides of the brain in a vat problem. Since I have no idea if I am or am not a brain in a vat, I will first tackle the question ââ¬Å"Would I be happier being a brain in a vat?â⬠There are pros and cons to both sides. The next question should be, ââ¬Å"What is the motivation for the controller of the brains in vats?â⬠The evil demon that may or may not exist needs some motivation for controlling lots of brains. The third question is, ââ¬Å"If I am a brain in a vat what is my motivation for doing anything?â⬠This is more of a question of unchanging cause and affect. The final question is ââ¬Å"How do drugs (alcohol, nicotine, narcotics, hallucinogens) play into the brain in a vat scheme?â⬠The cons of being a brain in a vat begin with the given that none of this is reality as we perceive it. It is reality as we know it, but isnââ¬â¢t real when compared to the common definition. Some people would have a problem with this. It fundamentally lies on whether people believe in ignorance is bliss. I donââ¬â¢t. That is like Trevor deciding heââ¬â¢d rather not that Iââ¬â¢ve been getting a piece of his girlfriend. The pro of this is Trevor is more likely to be happy with is his relationship until the moment of truth. This is only a temporary high though. This reality will fall apart with vengeance. So decidedly, I do not want to be a brain in a vat if I donââ¬â¢t realize it. Why would an evil demon want to control our brains? No doubt some diabolic purpose. He probably gets his biggest jollies watching me right this essay. It seems like an awful lot of work to maintain all those brains. If I were an evil demon Iââ¬â¢d probably find something better more evil task to do. I can therefore conclude an evil demon has little motivation that I can grasp for such a tedious task. If I were able to determine I was a brain in a vat, and wires were just feeding all this to me, I would party till the circuits overloaded. Thi...
Sunday, October 20, 2019
buy custom iPadââ¬â¢s Security Breach essay
buy custom iPadââ¬â¢s Security Breach essay Hacking into websites is not orthodox in the least but it has certain advantages if looked upon in a certain light. For one, it removes the illusion of the perfect security environment and keeps the competitive standards of firewalls in the current environment up to par. The companies that brag of their prowess and security standards might become careless and slack. This will leave enough room for a huge breach depending on the timing. By the time, that the company collects itself again to regroup from the attack it may be too late to make a quick recovery and the damage may turn into grievous financial loss. Is hacking justifiable within a company? The breach in iPad is one such example of a security break in because of lapse in adequate measures. Steve Jobs cast the company giant as one of pristine in the field of technology, as well as security (Tate, 2010). This statement hit a dead end in the face of the breach stating that the policy of apple is to seek and to make sure that they get user permission in order to know what you are going to do with their data. Thus, one can let the customer know what they are signing up for in the simplest language possible. This statement was not just referring to how the company uses the private data information of iPad information. It also referred to how the company created policies on the use of private data by other iPad experience providers. This obviously did not reflect in the breach. Thus, it gave customers a chance to know the truth instead of putting false hopes into a system that could be easily compromised. This time, only information on the email addresses got out. If this had continued and the attack had been more precise, information that is more pertinent would have gotten out. This could be leaked files on a government officials phone conversations, emails, and data. This would be quite dangerous in the wrong hands. This was a warning, and it would be justifiable if the incident were a test run. This is quite common in intelligence agencies where they frequently train for worst-case scenarios that could happen. They use these standard raining operations to simulate what would happen if a real life situation if the worst happened. This is the same case, with the hacking incident. Companies could make their computer department design a firewall to the best of their ability. This firewall would then be subjected to testing, as it would be by hackers. These hackers would be in the companys payroll, and their objective would be to try to penetrate the defenses. Of course, the situation would be quite a risk because this was unexpected and there was no way of knowing how far the breach was intended to go. In this case, if there were a computer security firm that was to use this method to better their security then there should be a corporate ethics statement to keep them in line. Corporate ethics statement When daring the code, there must be a few considerations depending on the company. The reason for this would be to regulate the companys behavior. Firstly, the code should be divided into two sections. The first section would entail the aspirations that the organization wants to live to maintain. This are the hopes that it wants to maintain. The second part of the statement would contain the rules and regulations of that specific company. These principles should include what would be illegal inside the organization. These are crimes against the copany from within as well as the crimes omitted when hacking into the privacy of another firm on unsanctioned basis. Other rules should include regulations on which personnel in this department would have access to certain levels of information of other companies that hire the corporation in question on a security check basis. This distinguishing of hierarchy would allow for order and decrease the amount of incidences that happen that could compromise the security of the firm. On the other hand, there should be an enforcement procedure to make sure the rules are followed. These include measures of punishment and disciplinary action to violations of the regulations. The rules will be listed in the order of priority for the organization by importance and the enforcement measures would follow in a corresponding manner as well as disciplinary action for violation of each rule. Finally, there will be provisions for revisions of these rules and regulations if need be depending on changing ethical situations. In the mean time, it would be helpful to establish relationships with media companies on information discretion. The coming out of certain information that would be as harmful to the consumer psychologically as it is to the manufacturer needs to be taken into consideration. The breach in apple caused a lot of fear in users of the new iPad and probably affected forth-coming sales of the product. The move by Gawker to publicize the information may be a good and bad decision, at the same time. It was good because it gave the users something to think about the security situation of the firm. As it reported that ATT, operated the web server, using weak security controls. The company gets a jump-start and stops slacking off where they should have been ahead of the game. Social responsibility of Gawker On the other hand, Gawker should also read the ground situation before making any hasty decisions on publicizing the matter. As with the security data, that the company had and was compromised there is a risk that the breach would cause widespread panic as the information belonging to certain government officials, even in the white house became compromised. Matters on these levels should be treated a little more sensitively because they could explode in everyones face. There is a reason for media blackouts because the last thing that everyone would want is widespread panic that would cause more damage than necessary. When there is a security breach the CEO and executives must considers the facts on the table. They must first evaluate the extent of the problem. This happens by ordering an all-inclusive inspection of the systems to determine the extent of the damage. Secondly, they must remove the hostile or destructive code. The next step is to reload the necessary operating systems software and configure the test operations accordingly. They should then patch the system in order to avoid any vulnerability. They should then test the functionality and restore the files from backup if indeed necessary. The files that passed the test of determination of damage would undergo through that process of restoration. As for the damaged files if there is no backup available at the time, then replication would be necessary. The system should be back on track at this point, and the executives would have reason to believe that everything is proceeding according to plan. However, the bottom line would be that theory does not always have a correlation to reality. Thus, things oon the ground may not be what the statistics project. The company has to confirm with the users that the data has been completely restored. Email script to would be customers We as the board of ATT want to inform you as our customers of an impending situation that we are currently experiencing in our technical department. This has to do with the security issues in the IT department with one of our products. There is a potential exposure risk to the iPad ICC IDS. Several of you have purchased the device and before you start to worry, the situation is already under control. The only information that could be derived from the device is the email address attached to it. There is an ongoing investigation now to determine the source of the breach and the perpetrators. As a result, all of the customers, whose information may have been compromised, that is their email address and so forth will receive notification as soon as possible. If there is anything sacred to the company, it is privacy of information. We do not take customer privacy very lightly. However, in light of the damage that the incident did to the companys name and the inconveniences that this caused our customers, we would like to apologize. Now that is settled we would also like to point out that we received the information from a business customer recently who pointed out the potential exposure. This issue went to the highest levels of the organization where it had top priority, and was dealt with expeditiously. In this way, the feature that gave access to email addresses has essentially been turned off. To be specific, amount of data that was compromised in the breach summed as the following. The subscribers email addresses that was coupled with the associated ID used to authenticate the subscriber on the network was utilized on ATT network. However, we managed to close the security hole within days of the breach. The victims had been unaware of any development in the breach that is the symptoms had not revealed themselves to them. This gives an idea how much we need to be vigilant to stop future incident. This is because the device had been shipping for barely two months. It had been shipping in the cellular configuration for only a month. This is a relatively time for such compromising situations to arise and suggests that the security needs to be looked into seriously. Reasons The security, in fact, will receive reviews in this light. A group known as Goatse security obtained the subscriber data. It seems the group specializes in showing faults in web applications. It highlighted weaknesses in the Firefox as well as the safari web browsers. It obtained the data it needed through the ATT's website. This information was available to anyone using the internet. However, it was the companys hospitable nature with information, which did it in the end. In response to this attack, the company called in the help of the FBI to look into the investigation. The FBI also contracted Gawker media recently and served them with a formal perseveration notice. On this note, there will be a review on most sectors to determine the full extent of the damage done because of the incident. This includes those that were totally unrelated to the occasion. The reason is that it could affect sales in other department because of bad publicity. These effects are a ripple effect and need to be anticipated in advance, and in this way, the company will not be caught off guard again. Buy custom iPadââ¬â¢s Security Breach essay
Saturday, October 19, 2019
Comparing Linear Graphs Essay Example | Topics and Well Written Essays - 500 words
Comparing Linear Graphs - Essay Example However, in case of linear inequality graph, there will be more than one (infinite) value of y for one value of x. A linear equation graph can be easily plotted if some points (x, y) are known. Similarly, a linear inequality graph can be plotted if the points for linear equation of the linear inequality are known. The above two examples of linear equation and linear inequality have same expression (only difference is = and âⰠ¤ or âⰠ¥) and therefore can be plotted (graphed) similarly. If there are several linear equations than they can be plotted by choosing different colors, line types and size. Similarly, if there is more than one linear inequality (various supply and demand graphs) than for each linear inequality different types of color and shades can be used for differencing them. In addition, intersection (combined shaded area) of all the linear inequality will be solution area (for supply and demand graphs) and the points of intersection of linear inequality will be the break-even
Friday, October 18, 2019
Meeting the Challenge through External Audit Essay
Meeting the Challenge through External Audit - Essay Example To prepare the research paper, data has been collected from various secondary sources such as, internet journals and academic websites. The basic premise of the research is to generate an understanding about fraud and role of external audit; how frauds have taken place in Canadian organizations, its impact and the limitations of external audit to face the problems of fraudulent activities. Table of Contents Research Paper Outline 2 Table of Contents 3 Introduction 4 The Duty of External Auditor 5 Fraud in Canadian Organizations 7 Challenges of External Audit 10 Conclusion 13 Introduction Fraud can be defined as a planned activity which is intended to betray other party. It results in sufferance of the victim through loss and accomplishment of any gain by the doer. Fraud is any unlawful act characterized by dishonesty, concealment or breach of faith. However, fraud does not mean any threat of bloodshed or physical force to deceive. It is committed by human beings and organizations to acquire money, assets or services and to evade fee or protect individual or corporate benefits. From the auditorââ¬â¢s viewpoint fraud is the misrepresentation of a companyââ¬â¢s financial statement. The misrepresentation can happen because of fraudulent financial statement or embezzlement of asset. ... France or revelation of data (Thornton, ââ¬Å"Managing Fraud Risk: The Audit Committee Perspectiveâ⬠) The Duty of External Auditor The duty of external auditor is to manage the fraud. According to statement on Auditing Standard No. 99 (SAS 99) the external auditor needs to: Collect requisite information to recognize the risks of material misrepresentation Recognize the threat of material misrepresentation Evaluate the risks of fraud React to the consequences of evaluation Examine the audit verification Share any proof of fraudulent activity to interested parties, and File the reflection of auditor regarding fraud (Thornton, ââ¬Å"Managing Fraud Risk: The Audit Committee Perspectiveâ⬠). It is the duty of external auditor to identify the fraud and detect any kind of unlawful activity by any organization. In order to detect the risk of misrepresentation the external auditor can apply professional decision and consider the elements of risk which comprises of kinds of risk, im portance of risk, probability of the threat, and pervasiveness of the risk. The external auditorââ¬â¢s evaluation does not act like an assurance that no fraud exists in financial report. The audit committee must acquire rational assurance on behalf of the external auditors that organization has taken the requisite steps to secure the assets of the unit. The audit committee needs to verify by proper analysis about the auditorââ¬â¢s vigilance to the likelihood of fraud (Thornton, ââ¬Å"Managing Fraud Risk: The Audit Committee Perspectiveâ⬠). According to Companies Act 2006, an organization is required to employ an auditor who makes a report for investors with a view on whether the financial statement provides accurate and real value of companyââ¬â¢s financial performance. I
Juvenile Justice Project (outline) How Teenagers Should be Punished Assignment
Juvenile Justice Project (outline) How Teenagers Should be Punished - Assignment Example These minor violations result in harsh and brutal punishments from them. This is the simplest parenting trap many parents may fall into as at this point parents are trying to win their battle of ego and being superior rather than giving some learning to their child about how to choose good and bad. Parents must remember that this is not the wrestling match or a tug of war but only the time to demonstrate their role in the best possible way. Parents do have some authority over their child but that does not mean to change this into a power struggle scenario. (ii). Negative Impact Of Physical Aggression: Child who suffers a constant hitting by their parents may end up having violent behavior issues later with their friends, siblings or even with their better halves. Conclusion: Thus physical assaults practice on teenagers must be condemned as this may lead to loss of self confidence of child and respect of parents in the eye of child. Certain alternatives for combating the discipline issues with child must be kept in mind for the proper upbringing of the
Thursday, October 17, 2019
Green IT Dissertation Example | Topics and Well Written Essays - 3500 words
Green IT - Dissertation Example The need for this kind of technology has also been necessitated by energy conservation concerns raised by environmental conservation bodies. The reduction in the overall production of computers and the development of proper disposal of the e-waste are some of the factors behind the growth in green technologies (Hassan, Molla & Cooper, 2012). In the early 90s, most computer manufacturing companies in the United States made voluntary efforts to manufacture energy saving computer devices, which were labeled with the energy star mark. Today, government regulations and enactments have acted to strengthen the manufacture and sales of green computers. Such steps are partly facilitated by international treaties and ratifications that are meant to reduce environmental destruction caused by electronic waste (Dedrick, 2010). In this paper, the current advances in the development of green technologies and computing will be analyzed in relation to the available scientific research. A number of pr actice borders on the adoption of green technologies, which guide policy formulation in this sector. This paper will review the practices that guide the development of green technologies in the United States and other developed countries across the world. ... This has necessitated the development and growth of green information and computing as adopted by a number of companies around the world. Sustainability in the manufacture of computers relates to issues such as the economic, environmental and social impacts. Thus, Green technologies and computing work towards ensuring the sustainability of the computer applications in different organizations (Hassan, Molla & Cooper, 2012). The idea behind the development of green technologies was necessitated by the need for energy efficient and environmental friendly computer system. Such a system consumes less energy and reduces the impacts of the e-waste on the environment. In building sustainability in the information technology, green computing seeks to introduce a coordinated planning and investing technology that seeks to serve the interest and desires of the users. According to Ozturk (2011), there exist a distinction between green information technology (IT) and green information systems (IS ). The development of green information technology seeks to create products that increase energy efficiency and the maximization of the equipment utilization. Green information system however concerns the design and implementation of informationââ¬â¢s systems, which are capable of improving the overall sustainability and reliability of business processes (Dedrick, 2010). Green information technologies have a number of goals and issues that it seeks to address. The replacement of personal computers with energy efficient computer hardware also forms part of the evolution of green information technology. The energy saving mission of green computing does not just end with efficiency of the hardware but the
Compensation Comparisons Assignment Example | Topics and Well Written Essays - 500 words
Compensation Comparisons - Assignment Example Look at the 25th percentile for both base pay and total cash compensation for Bookkeeper. Both of these amounts are the same. This means that bonuses are influenced by several factors including responsibilities, performance, and longevity. I would be able to use the above information in negotiation my salary for a job right after graduation. First, I would assess my level of skills for the job I am applying. Second, I would compare this level with that of others in the field. Say, if my level of skills is deemed above average, then I can demand a salary near the 75th percentile base pay of the job I am applying in. To support the asking price, I would present letters of references from my professors in relevant subjects detailing my performance in the class. However, the asking price of other applicants can significantly impact whether I get what I am asking for. For these jobs, the relevant labour market includes all industries as all firms in whatever field maintain an accounting department. Moreover, there is no significant differences between salaries in different locations. These salary data were developed based on the review of available and applicable market data as gathered by Monster.ca and Salary.comââ¬â¢s team of compensation consultants. I believe that there is enough information to support the conclusion made by the team. This is so because given the speed with which people share information now data collection on sensitive issues is much easier. Nevertheless, the use of inaccurate salary data is a large financial impact. For example, if an erroneous salary data is used in negotiating oneââ¬â¢s salary, then it is highly likely that the negotiated salary would also be incorrect. Given that this information is available for free, I wouldnââ¬â¢t bother with consultants surveys. However, if the job I am applying for is high level, say Chief Executive Officer, then this would be a time where I will use
Wednesday, October 16, 2019
Green IT Dissertation Example | Topics and Well Written Essays - 3500 words
Green IT - Dissertation Example The need for this kind of technology has also been necessitated by energy conservation concerns raised by environmental conservation bodies. The reduction in the overall production of computers and the development of proper disposal of the e-waste are some of the factors behind the growth in green technologies (Hassan, Molla & Cooper, 2012). In the early 90s, most computer manufacturing companies in the United States made voluntary efforts to manufacture energy saving computer devices, which were labeled with the energy star mark. Today, government regulations and enactments have acted to strengthen the manufacture and sales of green computers. Such steps are partly facilitated by international treaties and ratifications that are meant to reduce environmental destruction caused by electronic waste (Dedrick, 2010). In this paper, the current advances in the development of green technologies and computing will be analyzed in relation to the available scientific research. A number of pr actice borders on the adoption of green technologies, which guide policy formulation in this sector. This paper will review the practices that guide the development of green technologies in the United States and other developed countries across the world. ... This has necessitated the development and growth of green information and computing as adopted by a number of companies around the world. Sustainability in the manufacture of computers relates to issues such as the economic, environmental and social impacts. Thus, Green technologies and computing work towards ensuring the sustainability of the computer applications in different organizations (Hassan, Molla & Cooper, 2012). The idea behind the development of green technologies was necessitated by the need for energy efficient and environmental friendly computer system. Such a system consumes less energy and reduces the impacts of the e-waste on the environment. In building sustainability in the information technology, green computing seeks to introduce a coordinated planning and investing technology that seeks to serve the interest and desires of the users. According to Ozturk (2011), there exist a distinction between green information technology (IT) and green information systems (IS ). The development of green information technology seeks to create products that increase energy efficiency and the maximization of the equipment utilization. Green information system however concerns the design and implementation of informationââ¬â¢s systems, which are capable of improving the overall sustainability and reliability of business processes (Dedrick, 2010). Green information technologies have a number of goals and issues that it seeks to address. The replacement of personal computers with energy efficient computer hardware also forms part of the evolution of green information technology. The energy saving mission of green computing does not just end with efficiency of the hardware but the
Tuesday, October 15, 2019
Discuss critically contemporary international approaches (e.g. World Essay
Discuss critically contemporary international approaches (e.g. World Bank, Financial Stability Board) to consumer credit regulat - Essay Example This reform has been accounted due to the growth in the consumer credits and rise in the numbers of consumer credit institutions1. Contextually, consumer credit is considered as a key driver of economic growth as it is used for the payment of services holding a major proportion of the industrial contribution obtained by any economy in the modern world2. In a general sense, consumer credit is that commodity, which is produced by the private sectors and then sold to the consumers. These regulations are fixed for the sale, available in a wide range of varieties. The most commonly observed regulations in the consumer credit are the price and the interest rates. The information and disclosure regulations are also persistent regarding the debt collection aspects in a particular country, also seemed to be an important aspect to the regulators and legislators as well3. In a recent affair, the European Commission (EC) has denoted the significant role of consumer credit in the growth of nation al economy and also the well being of the consumers and thus, it is seeking to adopt the credit regulation across the country4. The government has further planned to implement the policy of credit regulation across the country so as to regulate strong credit markets all over the nation along with the minimisation of the risk of debt. The strategic approach and aim of adopting the consumer credit regulation along with the objective further differs from one state to another. It can be well understood with the example of both Germany and France, which possess rates at a lower level ceiling along with lower legal maximums. Illustratively, the most stringently market based approach has been adopted by the UK with no rates of ceiling5. The government of the UK had introduced Consumer Credit Act 1974 in its constitution, which focuses on the protection of the consumers and control of traders along with taking due measures to implement the provisions of credit being regulated by the Directo r General of Fair Trading6. In this essay, the major concern has been drawn with the attention towards the critical evaluation of the contemporary international approaches to the consumer credit regulation. The essay has described the concept of consumer credit regulations in respect of the practical case study referrals of World Bank and Financial Stability Board. Defining Consumer Credit Regulation As per the subsidiary legislation of the UK in 2010, the ââ¬Ëconsumer credit regulationââ¬â¢ has been broken into words, viz. Customers and Credit, for drawing a clear understanding of the term. In accordance, consumer is a person who is responding to the trade or business under the regulations of the transaction7. On the other hand, the creditor is that person who has made a commitment to grant credits for performing trade and business. Thus, the consumer credit regulation implies the act that has been developed by the government body for the protection of the consumer and the cr editor performing a trade or business. One of the useful terms that are usually used in the definition of consumer credit regulation is the credit agreement. It is that contract between the consumer and
How would a Scholarship Assist Me After Graduation Essay Example for Free
How would a Scholarship Assist Me After Graduation Essay In my findings, it is not just enough to have enrichment of goal, fervency of passion and the keeping of focus, there is the place of vital impact played by pecuniary support from guardian(s) to actualize the desire. I strongly believe many brave and highly intelligent ones have been choked out of their academic dream in life after graduation. Statistical findings have unarguably revealed that financial incapability in one of the factors responsible for thwarted vision in academic excellence. I am very proud to note however, that our school is making part of her contributions in easing studentsââ¬â¢ financial burden as a responsible institution in the society. The scholarship is a gesture I really appreciate whole heartedly. I do forward this scholarship application to passionately appeal for my consideration in the grant in order to survive hardship in my future pursuit of academic excellence. See more: how to write a college scholarship essay format Being a promising member from a home with single mother who had lost his father as early as age five, I have only being struggling with ways out of incessant hopelessness, deprivation and unavoidable emotional abuse. I have labored assiduously with my parent to make both ends meet; during summer, I work at Boys and Girls Club to save some fund for school and trying hard to work-out element of laziness from exacerbating the poverty. Sooner after my graduation with me and my two other sisters in studying in college, the financial stress for our mother would climax. The cost of education even in a low grade school with the cheapest environment is overwhelming despite how hard I try to save. My two sisters also need optimum care to cater for their more demanding feminine nature. So huge are my worries despite the strong zeal to pursue academic excellence which I currently demonstrate in school for being among the top 10%. With the hope of scholarship aid, I look forward to a redemptive future from excellence incapacitation. In the college, the scholarship will assist to continual keep focus and meet up the grant expectation.
Monday, October 14, 2019
Marketng Analysis of Bajaj Fans
Marketng Analysis of Bajaj Fans Critically analysis of the Bajaj fans contribution of marketing planning to the process of the strategic development In the strategic development process begins with strategic planning. Strategic planning is the process of developing overall plan strategies for the whole of organization. Under the strategic planning process evaluate answering the following questions; Where are we now? How did we get there? Where are we heading? Where would like to be? How do we get there? After that review whole planning process part by part sequential order. Those steps are; Analyze Vision and Strategic intent where we want to be future Reviewing mission statement in terms of rationale for existence of the business and value of the business. Under this review process evaluates further Purpose, values, Competencies, Culture, Polices and Product As a next step developing goals and objectives for whole organization Then carrying out the position audit by using SWOT analysis techniques and identify gaps. To fill that the above gaps evaluating corporate strategic choices. Here generating the strategic options by answering the following question; How to compete Where to compete method of growth As well as evaluating options by using the following criterias acceptability (evaluating based on stakeholders goals, objectives and their power), suitability (evaluating in relation with mission and strategic intent) and Feasibility (in terms of financial viability and risk) There after finishing that process start strategic implementation process. In this stage do the followings ; Resources Planning Draft operations plans, structure and culture Change (Implement changes) Implement Functional Strategies Productions operation strategies R D strategies Marketing strategies (Marketing mix, Segmentation, PLC analysis, MIS). HRM (Personal planning, Motivation, Appraisal) Finance strategies (source of finance, investment) IT strategies Looking at actual performance Review and control (assessing the deviation from plan and make corrective actions based on that) As final stage link to the step called strategic analysis. How the marketing planning contributing to strategic development process can be seen in above mentioned step number 5. If the company is having more than one business, there are three type of strategies can be identified those are; Corporate strategy Business and functional strategies Corporate level strategies are focused; Maximize share holders wealth Increase the overall profitability company as a whole Typically focused determining overall propose of the business. Decisions on mergers and acquisitions sell off or closure of business units. Maintain relationship with key stakeholders of the business such as investors, government and regulatory body. Explore new market Developing corporate image Under the Business strategies developed for division in the larger organization, that has a significant degree of autonomy basically responsible for developing and marketing their own products or services. Functional strategies mainly focused on selection of decision rule of the in each of functional area. In this case Baja electrical division or business unit (SBU) has draft a product marketing plan for fans. Under that product marketing plan strategic business unit has analyze, create and developed strategies to support the corporate strategies in the every aspect. Such as profitability, market share, developing corporate image by using corporate brand with the products. As a final conclusion Can say Bajaj fans marketing plan has contribute significantly for the strategic development process. Appraise marketing plan of Bajaj fans with suitable marketing element of marketing mix Under the marketing plan of bajaj fan has considered all the aspect of marketing mix element such product, STP process, price, place, and promotion). 2.1. Product analysis 2.1.1. Product mix This has developed to attract the customers (different segment).Those product mix are Ceiling fans, TPW fans (Table/ Pedestal / wall) and fresh air fans. Not only that under that they have developed different design like decorative and non decorative based on the segment. 2.1.2. Brand Name for the fan product category very low focused given by customers even bajaj fans was not included in the consideration set under their decision making process. That was major weakness. To eliminate that weakness they have come up with new strategies called umbrella branding (family branding) 2.1.3. Packaging Company has changed their graphic on packaging for entire product rage. 2.2. Segmentation, targeting and positioning (STP) At earlier stage company has followed niche marketing strategies. Company segmentation bases are price, quality and aesthetics look. Based on that segmentation criterias, they have introduced different product categories for each segment. Price based segmentation with sub brands as follows; Product category Price High price Medium price Low price Ceiling fans Crown Maxima Bahar , Grace TPW fans Crown Bahar Fresh air fans Aesthetics look based segmentation Decorative Non decorative Company product position strategies is that benefit positioning, Price quality positioning and performance based positioning revolutions per minutes RPS (speed, cooling). 2.3. Pricing analysis Company maintains the cost based pricing policy. There major weakness of the pricing having high margins for distributors. That has directly affected on their profitability because of high cost is incurred for distributors margins. To save that cost company has started distribution of products by using their own vehicles. 2.3. Promotion analysis Major media is television because of cable and satellite TV penetration is very high. Mainly advertising on C S channels such as star, Sony, Zee. Different types of TV commercial has developed air time (10,20 30).These TV commercial showing by using the different language. Major communication message is that Subse Tez Under the advertising they have new packaging strategies are incorporated with posters, POPs, Shops or dealers, boards and other communication elements direct mail. Followed different marketing recalling elements such as promotion team with braded t-shirts and caps, distribute leaflet for potential customers on point of sales. Used to promote the product dealers word of mouth recommendation to increase the sales. AS a pull strategy thy used pull strategies by organizing different contest among the customers, attractive pops, display schemes. 2.4. Place analysis (Distribution) There distribution strategies reduced by one layer. Company directly distributes their products to the retailers. As well as they have developed separate distribution network sub economy market segment. At the same time promoting dealers under pull strategy to keep their loyalty, increase shop share and attract the customers. Logistic is very strong 20 branches after sales service centers around 200 franchise that is also increasing the sales capacity of the channel. Identify the process of the developing and using brand identity of Bajaj with further evaluation of marketing segmentation, competitive analysis To develop the brand identity company used major strategy is umbrella strategy strengthening the product with corporate brand. That increases the customer credibility and dealers loyalty. At same time they are promoting by using pull strategies both party customers and dealers that is help to increase the brand loyalty of dealers. Not only that they are using TV commercial to communicate the brand identity for the different market segment that is on of the strategy which help to upgrade the top of mind brad awareness. In terms market Segmentation Company has develop different market based on the price, quality and aesthetics look. This also helps develop brand awareness of those market segments. Currently in market leading players are; Crompton, orient, polar, Khaitan, Usha. Current situation is level of competition very high and that is reducing margin of products because of profit divided into the above major competitors. Bajaj market segmentation strategy is also helping to face that competition. Because of all the above players are having their own production plant as well as gained economies of scale. Therefore major strategies that they need to be followed develop the customer loyalty via product performance and after sales services. As well as Bajaj Company use the promoters to develop brand awareness among the customer by using branded T shirts and caps. Some time such capacities do not have competitors to promote their products. Analyze the marketing capabilities of Bajaj fans to utilize the current technologies e-marketing and e commerce platform. If the bajaj used e marketing tools and techniques under this context of e commerce by which creating new distribution channel for the bajaj company as well as e marketing is help to reach different customer segment on individual basis ( via email campaign marketing) and corporate segment. In addition to that the following benefit and advantage that they can gain out of the e marketing; Can access wider rage of the market because of penetration of internet and email usage is very high. Therefore, in terms of cost vs. benefit, benefit is higher than cost, because of cost to reach very low. As example if the company developed websites by spending INR 150,000 and suppose that 1500 peoples access per month to site (150,000 /1500 = 100) in the first moth cost is 100 Indian rupees. Month by moth that cost is reduced only thing that they need invest that capital for web site. That web sites is providing adverting and online purchase facility also can be set. When online marketing is going to apply it is ideal for corporate segment such as companies, building housing contractors. Online purchasing help reduce time gap in ordering and delivering product. As well as it is reducing the retailer margin which that they paying for retail sales. Online promotional campaign also can carry out by using e marketing tools such as pop up advertising, cross promotions. Disadvantage of e marketing and e commerce are technical failures and security issues. By analyzing those cost benefit as well as advantage and disadvantage Bajaj Company apply new technology to improve their communication, sales and to beat the competition. As final conclusion bajaj has feasibility to use the new technology. In the future they can collect domestic and international corporate orders via web. That will deliver greatest benefit for them. Therefore bajaj is capable enough use the new technology under this scenario.
Sunday, October 13, 2019
Alexander Graham Bell :: essays research papers
Alexander Graham Bell Alexander Graham Bell is a name of great significance in American history today. A skillful inventor and generous philanthropist, he astounded the world with his intuitive ideas that proved to be both innovative and extremely practical in the latter half of the 19th century. Most notable, of course, are Bell's work in developing the telephone and his venerable life-long endeavor to educate the deaf. Originally, his only wish was to help deaf people overcome their difficulty in learning verbal communication, and later was pushed into researching the possibility of a device that could transmit the human voice electronically over a distance. After building his first working telephone model, Bell's fame spread quickly as people in America and around the world began to realize the awesome potential this wonderfully fascinating new device held in store for society (Brinkley 481). His telephone an instant success and already a burgeoning industry, A. G. Bell decided to turn his attention back to assisting the deaf and following other creative ideas including the development of a metal detector, an electric probe which was used by many surgeons before the X ray was invented, a device having the same purpose as today's iron lung, and also a method of locating icebergs by detecting echoes from them. With his many inventions (especially the insanely popular and universally applied telephone), his efforts to educate the deaf, and the founding and financing of the American Association to Promote the Teaching of Speech to the Deaf (now called the Alexander Graham Bell Association for the Deaf), Alexander Graham Bell has become a very important historical figure indeed (Berstein 9). Perhaps a key factor in Bell's successful life was his invigorating background. His family and his education definitely had a deep influence on his career. Born in Scotland, his mother was a painter and an accomplished musician, his father a teacher of the deaf and speech textbook writer. His father invented "Visible Speech," a code of symbols which indicated the position of the throat, tongue, and lips in making sounds. These symbols helped guide the deaf in learning to speak. His grandfather, also named Alexander Bell, had similarly specialized in good speech. He acted for several years and later gave dramatic readings from Shakespeare. Young Alexander Graham Bell had a great talent for music. He played by ear from infancy, and received a musical education. Later, Bell and his two brothers assisted their father in public demonstrations in Visible Speech, beginning in 1862. He also enrolled as a student-teacher at Weston House, a boys' school, where he taught music and speech in exchange for
Saturday, October 12, 2019
Essay --
From the late 1800s and early 1900s immigrants saw the United States as a golden opportunity for success. Between 1880 and 1930, over 27 million new immigrants arrived, mainly from Italy, Germany, Eastern Europe, Russia, Britain, Canada, Ireland, and Sweden. This period in American history caused great change in culture of the neighborhoods and cities humanitarian movements that helped assimilation, laws surrounding immigration, and educational reform. Many factors in other countryââ¬â¢s pushed immigrants to the new world. In Italy, many southern farmers had been struggling at the mercy of wealthy land owners and had to face declining health conditions. In Ireland, a great potato famine left the country in utter despair. Jewish immigrants, particularly from Russia, fled to avoid religious persecution. Everyone had their reasons for coming, whether it be expectations of economic success or for freedom, and the American Dream. However, most immigrants were not greeted with success and fortune as they expected upon entering the United States. In reality, many economic, social, and political conditions caused early American immigrants to endure great struggle in order to shape what became a thriving country. The new immigrants arrived imagining the United States as a land of freedom, where people worshiped as they pleased, enjoyed economic opportunity, and had been emancipated from the oppressive social hierarchies of their homelands. However, these new immigrants had no intention to permanently stay in the United States. Most expected to hit gold and promptly return to their homelands. Upon arrival, immigrants began to pile into cities which quickly became overpopulated. Lack of appropriate housing and generally having little money m... ...ng of the 20th century forever changed America. Many of these immigrants came to the country expecting to find the streets paved with gold, and opportunity knocking at their door. However, an evolving system of labor greeted these immigrants, and they were often forced to adjust to unfavorable working conditions and wide spread discrimination. Laws put into legislation further restricted the lives of these people making it even more difficult to assimilate to the American way of life. These hard working men and women truly exemplify the spirit of excellence and effort for without them, we would not be where we are today. Their contributions to society were numerous, and the effects of that era revolutionized the urban landscape of the United States. Immigrants are truly an example of what hard work and determination can achieve when a group of people stick together.
Friday, October 11, 2019
Advertising Objectives Essay
Furthermore, Budweiserââ¬â¢s mission is to pursue a long-term growth strategy by pursuing high consumption markets and attaining a firm market share among competitors. Budweiser has a strong brand name domestically, but for this particular region it will need to implement a penetration strategy. Also, Budweiser will focus on securing valuable distribution channels including pubs and supermarkets. The product positioning strategy reflects competitive pricing and product differentiation. Inherently, the product reflects cultural values of the target country, with attributes such as caffeine and local flavors that represent regional preferences. The brand may potentially increase market share via acquisition of equity investment. Tactical Details Product Various product attributes will be localized to appeal to consumer tastes such as a diet/lighter version beer with caffeine. Offering smaller glass bottles, which align with European consumption volume trends, will differentiate product packaging. The beer base content will be standardized but with local flavors based on market research. Also, based on potential research findings there is a possible product extension for an ââ¬Å"all-naturalâ⬠beer within the Austrian market. Additionally, products will be available in mini kegs to support the younger market segment behavioral characteristics. Advertising Implementing TV, Radio, Direct mail, Print ads, and Internet will be necessary to keep up with competitive advertising within this region. Messaging will focus on initially creating awareness. Ultimately, message strategies will portray a global brand through localized messaging. Internet advertising will be highly influential for the demographic market segment. Advertising will include viral ads, flash advertisements, and promotional incentives and incorporate sites such as MySpace and blogs (for the younger generation). Furthermore, sponsorship from popular celebrities or musicians for events and products will appeal to the target market. Personal Selling Face to face education via account executives with clubs/pubs will be imperitive to create awareness and motivate front-line distributors. Additionally, face-to-face points of contact in grocery stores and super/hypermarkets will be important in order to impact this a vast portion of purchases. These tasks will be contracted out to a local sales force that understands the culture, industry and competitive environment. Routine follow-ups and frequent interactions will be emphasized in order to maintain strong distributor relationships. Sales Promotion Incentives will be offered to club owners, super markets and so forth that will be based on volume discounts. A sales contest will also be commenced across the club/pub segment and the supermarket segment to increase purchases, emphasize product push through distribution channels and create awareness for caffeinated beer. Sub-brand specific websites will offer promotional incentives as well (BOGO, etc). Sleek, appealing point of purchase displays will be exhibited in supermarkets. Promotional partnerships with record a company, such as free iTunes downloads with purchase will be implemented to appeal to youthful market. Distribution Distribution will primarily focus on clubs/pubs, closely following the Red Bull distribution model and its flourishing success within this region. Distribution will also be emphasized in super and hypermarkets. Price Policy Pricing will remain competitive, but not premium. Also, based on market research, pricing will reflect that of energy drinks. Product differentiation and promotional efforts will not focus on price, but instead aim to increase purchasing through incentives such as volume discounts. Research A partnership with an experienced European market research agency (i. e. EURO, RSCG) will be imperative to monitoring quality perception and target market acceptance. Research will closely examine brand recognition development over time. Data mining from distributors to track trends will also be influential in understanding consumption behaviors. Research will also be needed in evaluating the possibility of launching a more mainstream bud beer. Finally, based upon success within Austria, further research into surrounding countries will be necessary.
Thursday, October 10, 2019
External environmental influences Essay
The external environmental factors described in the following essay have a direct or indirect influence on HRM. To be effective, HR managers must monitor the environment on an ongoing basis; assess the impact of any changes; and be proactive in implementing policies and programs to deal with such challenges. Economic Environment The economic environment has a major impact on business in general and the management of human resources in particular. Economic conditions affect supply and demand for products and services, which, in turn, have a dramatic impact on the labour force by affecting the number and types of employees required, as well as an employerââ¬â¢s ability to pay wages and provide benefits. When the economy is healthy, companies often hire more workers as demand for products and services increases. Consequently, unemployment rates fall, there is more competition for qualified employees, and training and retention strategies increase in importance. Conversely, during a downturn, some firms reduce pay and benefits in order to retain workers. Other employers are forced to downsize, by offering attractive early retirement and early leave programs or by laying off and terminating employees. Unemployment rates rise, and employers are often overwhelmed with applicants when vacancies are advertised. In most organizations today, productivity improvement is essential for long-term success. Through productivity gains, managers can reduce costs, conserve scarce resources, and increase profits. This leads to a win-win situation, since higher profits often result in better compensation and improved working conditions, thereby enhancing the employeesââ¬â¢ quality of work life and their motivation to further improve productivity. Australiaââ¬â¢s relatively low productivity growth rate and high labour costs are of grave concern, since competition with foreign companies has become increasingly important. Australiaââ¬â¢s economic success increasingly depends on the ability of Australian employers to meet international quality andà productivity standards and become more cost-competitive. This applies to firms selling products and services in the domestic market, in which foreign competition is increasingly a factor, as well as those with international markets. Labour Market Conditions The labour market is the geographic area from which an organization recruits employees and where individuals seek employment. In other words, it is the area in which the forces of supply and demand interact. The labour market is often different for various employee groups within an organization. While clerical and technical employees are generally recruited locally, the labour market for senior managers and highly specialized employees is often national or even international in scope. One measure of an organizationââ¬â¢s effectiveness is its ability to compete successfully for high calibre human resources. Many factors motivate candidates to seek employment with a particular organization, including type of business/industry, reputation, opportunities for advancement, compensation, job security, and working conditions. Location and climate and other aspects of a firmââ¬â¢s physical surroundings, such as housing, commuting, and living costs, can help or hinder a firmââ¬â¢s ability to attract and retain employees. Recent population shifts to the coastal and small towns and rural areas can be attributed, at least in part, to the desire of many individuals to work and live in what they perceive to be a more desirable physical environment. Such shifts alter the demand for and supply of individuals in local labour markets, a factor that firms must always take into account when deciding where to establish a new venture, expand, or downsize. Because the labour market is not controlled or influenced by any one factor, it is unstructured and often unpredictable. Nevertheless, organizations must constantly monitor and track trends affecting supply and demand of humanà resources. By doing so, they can gather information about the prevailing pay rates for employees with particular talents or skills, and estimate how difficult it is likely to be to attract and recruit staff. Labour market conditions should also be monitored to determine present and emerging trends (such as the changing composition of the labour force) as well as changing values and expectations, so that policies and programs can be adapted and/or designed in order to recognize and take advantage of these trends. Globalization Globalization refers to the tendency of firms to extend their sales or manufacturing to new markets abroad. For businesses everywhere, the rate of globalization in the past few years has been nothing short of phenomenal. ââ¬Å"The bottom line is that the growing integration of the world economy into a single, huge marketplace is increasing the intensity of competition in a wide range of manufacturing and service industries.â⬠Production is becoming globalized, too, as firms around the world put manufacturing facilities where they will be most advantageous. Also, there are increasing numbers of multinational corporationsââ¬âfirms that conduct a large part of business outside the country in which they are headquartered and that locate a significant percentage of their physical facilities and human resources in other countries. Many organizations are locating new plants in areas where wages and other operating costs are lower. For example, Australiaââ¬â¢s Hewlett Packardââ¬â¢s computers are assembled in Singapore. While cheaper labour is one reason for transferring operations abroad, another is to tap into what Fortune magazine calls ââ¬Å"a vast new supply of skilled labour around the world.â⬠Many multinational firms set up manufacturing plants abroad, not only to establish beachheads in promising markets, but also to utilize that countryââ¬â¢s professionals and engineers. This globalization of markets and manufacturing has vastly increased international competition. Throughout the world, organizations that formerlyà competed only with local or national firmsââ¬âfrom airlines to automobile makers to banksââ¬âare now facing an onslaught of foreign competitors. From boosting the productivity of a global labour force to formulating selection, training, and compensation policies for expatriate employees, managing globalization and its effects on competitiveness will thus continue to be a major HR challenge in the years to come. Demographic Trends and Increasing Work-force Diversity Demographics refers to the characteristics of the work force, which include age, sex, marital status, and education level. Demographic changes occur slowly and are well measured, which means that they are known in advance. The fact that Australiaââ¬â¢s labour force is becoming increasingly diverse is one of the major challenges confronting HR managers today. Diversity refers to ââ¬Å"â⬠¦ any attribute that humans are likely to use to tell themselves, ââ¬Ëthat person is different from me,'â⬠and thus includes such factors as race, gender, age, values, and cultural norms. Population Growth The single most important factor governing the size and composition of the labour force is population growth. Currently, the fastest growing groups in the Australian work force are women, visible minorities, Aboriginal people, and persons with disabilities. Age The baby boomers, born between 1946 and 1965, began crowding into the labour market in the late 1960s. The sheer number of ââ¬Å"boomersâ⬠helped to expand the economy and made it easier for HR departments to focus on issues such as cost containment, since recruitment and selection, while important, were not the most critical problems. During the 1990s, individuals in this ââ¬Å"population bulgeâ⬠experienced a great deal of competition for advancement. This challenged managers to find new strategies for forging career paths, such as lateral moves, to keep this group motivated and satisfied. Theà oldest of the baby boomers are now in their mid-fifties. Life expectancies have increased and fertility rates have declined, the average age of the population is increasing substantially. Since some baby boomers have already taken advantage of generous early retirement programs and many more will be retiring over the 25 years, pension plan and social security benefits issues are starting to present a very serious concern for employers and governments, given the smaller labour force available to support the retirees. Many organizations with a primary interest in the younger age group, such as retail establishments and fast-food chains, have already started to feel the impact of the fact that the population from which they have traditionally gained customers and part-time workers is starting to shrink dramatically. Some employers have undertaken initiatives to attract older workers, especially those who have taken early retirement, by offering job sharing and expanding the number of part-time hours available. For example, McDonaldââ¬â¢s Restaurants of Australia is another organization that is actively recruiting seniors, as well as directing advertising efforts to appeal to the senior market. HR specialists must remember that many HR policies, benefits plans, and reward systems that attract and motivate employees in one age group may not appeal to those in another due to differing values and priorities. Education The level of education of the Australian labour force is increasing at a significant rate. more Australians are pursuing higher education, through a variety of institutions ranging from universities and colleges/TAFEs to trade schools, private-sector organizations, and professional associations.à growth in the number of cooperative-education programs, designed to enable students to gain work experience while still attending school, and ofà distance-education opportunities, which mesh Internet technology with the fundamental need to continue learning. Given the higher expectations of the better-educated labour force, managers are expected to try to ensure that the talents and capabilities of employees are fully utilized and that opportunities are provided for career growth. In todayââ¬â¢s economic climate, doing so is not always possible. Visible and Ethnic Minorities The proportion of visible and ethnic minorities entering the Australian labour market is growing, in jobs ranging from general labour to technical, professional, and skilled trades. Ethnic diversity is also increasing. Thus, HR specialists must ensure that policies and programs are developed in their organizations to accommodate and celebrate the diverse cultural characteristics of visible and ethnic minority employees, something that requires much more than ensuring compliance with human rights legislation. Women The growing presence of women has been one of the dominant trends in Australiaââ¬â¢s labour force since the 1950s. Factors contributing to the dramatic increase in female participation rate include smaller family size, increased divorce rate, the need and desire for dual family incomes, increased educational level, and the availability of more-flexible working hours and part-time jobs. The employment rate for women has also continued to climb. Recent studies have shown that women have moved into occupations in which the unemployment rate is low, while men tend to be clustered in jobs in which the risk of unemployment is much higher.73 There is still strong evidence that women are underutilized in the Australian work force, however. Aboriginal Peoples Indigenous peoples are still facing considerable difficulty in obtaining jobs and advancing in the workplace. Persons with Disabilities Despite the fact that human rights legislation in every Australian jurisdiction prohibits discrimination against individuals with disabilities, Australians with disabilities continue to confront physical barriers to equality every day. Inaccessibility is still the rule, not the exception. Even though studies show that there are no performance differences in terms of productivity, attendance, and average tenure between employees who classify themselves as having a disability and those who do not, persons with disabilities continue on average to experience high rates of unemployment and underemployment, and lower pay. Overall Impact of Increasing Diversity Managers must be extremely aware that related to the work-force diversity described above are significant value differences about the overall importance of work, what aspects or characteristics of a job are most important, tolerance of discipline in terms of hours and pace of work, attitudes toward authority, and definition of loyalty. Employees increasingly expect to exercise more freedom from management control, and are more demanding and questioning. More people are seeking jobs that are attuned to their personal values and provide the opportunity for them to bring their personalities to work with them,87 as well as flexible work arrangements and other programs that will enable them to balance their work and personal lives.88 Policies and practices must be adapted to embrace the diversity of the dominant values represented in an organizationââ¬â¢s work force. Trends in the Nature of Jobs and Work Major changes have been occurring in the nature of jobs and work, in part as a response to a number of the environmental challenges already discussed. Telecommuting, is the use of microcomputers, networks, and other communications technology (such as fax machines) to perform in the home work that is traditionally done in the workplace. Many firms are using more contingent employeesââ¬âdefined as workers who do not have regular full-time or part-time employment statusââ¬âto handle vacation and leave coverage, peak-period demands, extra workload, and specialized tasks or assignments. Included are contract workers, seasonal workers, casual and non-regular part-time employees, temporary employees, independent contractors (freelancers), consultants, and leased employees.108 Contingent workers currently account for about 12 percent of all jobs in Australia, a figure that is expected to reach 25 percent by 2010.109 There are more regular part-time employees in Australia than ever before. These are individuals who work fewer hours than fulltime core employees, typically during peak periods (such as evenings and weekends in retail stores and restaurants). Approximately 33 percent of all employed women work part-time: two-thirds of them by preference, and the other one third because they were unable to obtain full-time employment.112 The fact that part-time workers are often paid less than their full-time counterpartsââ¬âand may not have benefits coverageââ¬âhas raised some major equity concerns. Small businesses, classified as firms with fewer than 50 employees, whether sole proprietorships, partnerships or corporations, are a large and increasingly important part of the Australian economy. A Service Society Employment trends in Australia have been experiencing dramatic change. The primary sector, which includes agriculture, fishing and trapping, forestry, and mining, now represents only 2.8 percent of jobs. While the secondaryà sector (manufacturing and construction) has grown In common with trends in Western Europe and the U.S., the sector of the Australian economy accounting for the greatest growth in recent decades is the tertiary or service sector, which includes public administration, personal and business services, finance, trade, public utilities, and transportation/communications. While much of this growth is attributable to rapid technological change (initially in the form of automation and more recently in improvements in IT), part is due to an increase in outsourcing of particular activities by primary- and secondary-sector firms to decrease costs and increase efficiency. Subcontracted functions range from building maintenance to provision of security, cafeteria management and laundry services to payroll and training and development. Since all jobs in this sector involve the provision of service, often in person but increasingly through the design, installation, and maintenance of service-providing technologies (such as automated banking machines and cable television), effectively managing and motivating human resources is critical. Although there are some lesser-skilled jobs (in housekeeping and food services, for example), many service-sector jobs demand knowledge workers, employees who transform information into a product or service, whose responsibilities include planning, problem solving, and decision making. Knowledge Work and Human Capital Management expert Peter Drucker has said that ââ¬Å"the foundation of an organization is not money or capital or technologyââ¬âitââ¬â¢s knowledge and education (human capital). By 2005, knowledge workers will be the single largest group in the labour force.â⬠116 He is not alone in this belief. Many experts believe that the distinguishing characteristic of companies today and tomorrow is this growing emphasis on human capital. Jobs today in all sectors demand a level of expertise far beyond that required of most workers 20 or 30 years ago, which means that human capital is quickly replacing machines as the basis for most firmsââ¬â¢ success. Furthermore, it is notà unusual for more than one-quarter of sales to come from products less than five years old. As a result, ââ¬Å"innovatingââ¬âcreating new products, new services, and new ways of turning out goods more cheaplyââ¬âhas become the most urgent concern of corporations everywhere.â⬠11 For managers, the challenge of fostering intellectual or human capital lies in the fact that knowledge workers must be managed differently than workers of previous generations. New HRM systems and skills are required to select and train such employees, encourage self-discipline, win employee commitment, and spark creativity. Apple computers is one organization that has learned how to encourage creativity and access the skills and ideas of all of its employees:118 Technology It is mainly through technological innovation that firms develop new products and services and/or improve existing ones in order to remain competitive, and gain the productivity and quality needed for competitive advantage. Manufacturing advances, such as robotics and computer-aided design / computer-aided manufacturing (CAD/CAM), have eliminated many blue-collar jobs, replacing them with fewer but more highly skilled jobs. When robots were introduced in the automobile industry, for instance, there was a major decrease in the demand for welders and painters, but a new demand for technicians who could program, install, and service automated equipment.89 Due to computer technology, similar changes have been occurring in the nature of office work. Optical scanners, computerized x-ray scanners, and Magnetic Resonance Imagery (MRI) are technological advances that have caused major occupational changes in the medical field over the past few decades, and such advances are being made every d ay. Currently, for example, a few doctors are attempting to revolutionize heart surgery using computer assistance and robotic arms.90 The overall impact of the technological changes affecting almost every field is that labour-intensive blue-collar and clerical jobs have been decreasing, while technical, managerial, and professional jobs are on the increase. This shift in employment opportunities has many implications for organizations: jobs and organizationà structures are being redesigned; new incentive and compensation plans are being instituted; revised job descriptions are being written; and new programs are being instituted for employee selection, evaluation, and training/retrainingââ¬âall with the help of HR specialists. Unfortunately, the training of the Australian labour force has not kept pace with the rate of technological change and innovation. Consequently, there is a scarcity of skills in certain fields. Many Australian firms, such as Telstra, inevitably have to look outside of Australia to fill their high-tech openings, which is rather disturbing given the fact that there are currently about 1.1 million Australians seeking employment. While much of the impact of information technology has been positive, it has also led to some organizational problems. For many employees, it has created anxiety, tension, resentment, and alienation. Unions have consistently expressed concerns about job displacement and health hazards, such as those related to video display terminals. All of these issues must be addressed through effective HRM practices such as information sharing, counselling, ergonomic refitting, job redesign, and training. Information technology has also hastened what experts call the ââ¬Å"fall of hierarchy,â⬠or promotion of egalitarianism. Power and authority are spread more evenly among all employees. For example, with ââ¬Å"distributed computing,â⬠every employee with a personal computer on his or her desk can tap into the firmââ¬â¢s computer network and obtain needed information. Expecting employees to make more decisions has implications for selection, training, and compensation. Questions concerning data control, accuracy, right to privacy, and ethics are at the core of a growing controversy brought about by the new information technologies. Sophisticated computerized control systems are used to monitor employee speed, accuracy, and efficiency in some firms, including IBM Australia. More and more firms are also monitoring employee e-mail, voiceà mail, telephone conversations, and computer usage, and some now monitor employee behaviour using video surveillance.94 Reasons for such monitoring include eliminating time wastage, deterring abuse of company resources, protecting network security, preventing misappropriation of company resources, ensuring compliance with health and safety standards and regulations and other legislation, and monitoring employee behaviour and performance. Employers considering monitoring employees should be aware that doing so may present both practical and legal problems: such monitoring may have counterproductive results such as increased job stress, decreased morale and productivity, lowered employee self-esteem, and decreased trust in and respect for the employer Setting up and maintaining a monitoring system may involve significant economic costs surveillance of employees in the workplace raises the controversial legal issue of employee privacy rights. Human Resources Information Systems Changing technology has also had major implications for HR departments. Over the past few decades, many firms introduced a Human Resources Information System (HRIS) to store detailed information on employees, HR policies and procedures, government laws and regulations, collective agreements, etc. HRIS computer applications include: salary and benefits administration; tracking statistics on absenteeism, grievances, and health and safety; collecting data for government statistical reporting and employment equity purposes; advertising jobs and recruiting candidates; and communicating with employees. Computers are now being used not only for storage, retrieval and analysis of information but for broader applications, including basic report production, long-range forecasting and strategic planning, and evaluation of HR policies and practices. Such systems can decrease time lost to comparatively non-productive work like data entry and employee scheduling, thereby providing time for HR department employees and managers throughout the firmà to focus on more strategic issues. Today, many Australian firms, are utilizing computer technology even more extensively by introducing a Human Resources Management System (HRMS), defined as an information management system accessible to staff at all levels, designed to ensure that the organizationââ¬â¢s human resources are recruited, selected, developed, employed, deployed, and supported effectively. Functional applications include succession planning, pension plan projections and eligibility monitoring, interactive employee retirement training, and more. Self-service applications for employees and managers ensure that information reaches those who need it, with one-time data entry, less maintenance, and improved quality and accuracy. Government Various laws enacted by governments have had and will continue to have a dramatic impact on the employer-employee relationship in Australia. In one recent survey, 70 percent of the HR specialists responding cited changing regulatory requirements as a major factor altering their work environment. The legal framework for employment includes: constitutional law, particularly the Charter of Rights and Freedoms; acts of parliament; common law, which is the accumulation of judicial precedents that do not derive from specific pieces of legislation; and contract law, which governs collective agreements and individual employment contracts. Such laws impose specific requirements and constraints on management policies, procedures, and practices. Some of the employment-related legislation is aimed at prohibiting discrimination in various aspects and terms and conditions of employment, such as human rights, employment equity, and pay equity. Other laws require employers to meet certain obligations, such as occupational health and safety, employment standards, and labour relations. Still others make various payments mandatory, such as Workersââ¬â¢ Compensation, Employment Insurance, and the Australia Superannuation Plans. All of the laws mentioned above and their regulations have importantà implications for all managers, since they must: Stay abreast of legislative developments is a major ongoing responsibility. Often, the HR department staff members play a major role in helping other managers to remain current by circulating reading material or holding seminars. Develop and administer policies and practices that ensure compliance to avoid loss of government contracts, suits by affected employees or regulatory bodies, fines, and bad publicity. Try to ensure that compliance does not interfere with the efficient and effective accomplishment of their other responsibilities. This means finding ways to comply with regulatory requirements with as little cost and disruption as possible. For example, many firms have developed manuals, videotapes, and self-administered quizzes, such that employees can study independently at home or at work during off-peak times, and submit their completed quizzes for evaluation and verification of training completion. Bibliography 1. Baron, J.N. and Kreps, D.M. (1999) ââ¬ËConsistent human resourcepracticesââ¬â¢,California Management Review, 41(3), pp.29-53. 2. De Cieri, H. and Kramar, R. (2003) Human Resource Management in Australia; strategy, people, performance, McGraw Hill Australia. 3. Dessler, Griffiths and Lloyd-Walker (2004), Human Resource Management, 2nd ed, Frenchs Forest, N.S.W. : Prentice Hall Australia 4. Heneman, H.G, Donald P. Schwab, D.P (eds) (1978), Perspectives on personnel/human resource management, Homewood, Ill : R. D. Irwin, 1978 5. Lansbury, R.D. and M. Baird (2004) ââ¬ËBroadening the horizons of HRM: Lessons for Australia from the US experienceââ¬â¢ Asia Pacific Journal of Human Resources, 42(2), pp.147-155. 6. Mirabal, N. and De Young, R. (2005) ââ¬ËDownsizing as a Strategic Interventionââ¬â¢ Journal of American Academy of Business, 6(1), pp.39-45. 7. Nankervis A., Compton and Baird (2005) Human Resource Management: strategies and processes, 5th ed.,Thomson, Southbank, Victoria Australia 8. Stone, R. J, (2005) Human resource management, Milton, Qld.: John Wiley & Sons Australia, ch 1 9. Travaglione, A. and Marshall, V. (eds) (2000) Human Resource Strategies: An Applied Approach, Irwin/McGraw Hill, Roseville. 10. Todd, T and Crake. A, Human Resource Management 237, lecture notes (2005) 11. Young, S. (2000) ââ¬ËOutsourcing: Lessons From the Literatureââ¬â¢ Labour and Industry, 10(3), pp.97-118.
Subscribe to:
Posts (Atom)