Thursday, August 27, 2020

A Class Divided Personnel and Industrial Psychology

In the exemplary film, â€Å"A Class Divided†, teacher Mrs. Jane Elliot formulated and directed an exercise intend to give her understudies precisely how separation comes to fruition. Offended by what she saw happening in the country, Mrs. Elliot led this exercise with a class of third graders the day following the death of Martin Luther King.Mrs. Elliot set up for separating between blue looked at and earthy colored peered toward youngsters. Her objective was to have her understudies experience what it felt like to be oppressed. She had recently examined the issue of segregation with her understudies and thought the appeared to comprehend and was in actuality furious about Dr. King’s passing; they didn't perceive the segregation in her group practice until it was finished and brought up to them.Mrs. Elliott’s exercise isolated her class by eye shading. She had two gatherings, the earthy colored eyes understudies and the blue looked at understudies. She told the understudies toward the beginning of the day, that the blue eyes bunch was contained the more astute and pleasant understudies. She gave them uncommon benefits because of their supported designation.The understudies in the earthy colored looked at bunch were dealt with ineffectively, with negative remarks and out of line rules. She was astonished to perceive how the kids suited these jobs. The earthy colored peered toward understudies out of nowhere did more unfortunate on tests and acted in an unexpected way. The blue eyes bunch took on a stance of prevalence and was mean over the earthy colored looked at students.In class she deliberately remarked on the predominance of blue-peered toward kids so as to set them against the earthy colored looked at understudies. She at that point switched her announcement the next day. At the point when she adored her treatment of the understudies, the student’s conduct switched. The earthy colored looked at understudies got predominant and the blue peered toward understudies started doing ineffectively. It turned out to be evident that as a power figure, what she said was accepted. Indeed, even guardians didn't scrutinize her statement.The proposal of this test was that individuals acknowledge and follow up on what individuals of power or social height. The film portraying her study hall test was distraught in 1985 for the PBS show FRONTLINE. The film was entitled A Class Divided. The film incorporated a follow-up on Mr. Elliot’s understudies, who were youthful grown-ups at the time the film was made. Thee film was trailed by comparable accounts of tests in other settings.The ramifications of this film on brain science are wide based. It shows the effect of power and social height. The exercises learned because of this film help us to see how the impact of power and socials height can be utilized in both positive and negative ways. It causes us to get why and under what conditions individuals will aimlessly fol low others.2. Malcolm Gladwell, New York chronicles: Personality in addition to Overview of the articleThis article, composed by Malcolm Gladwell, was imprinted in the September 2004 release of the New Yorker evaluates the utilization of character tests. The tests examined are those to a great extent utilized in the work field. Gladwell gives the historical backdrop of the improvement of different tests and afterward their regular uses, his own understanding and his evaluation of the test as a business tool.The article is very simple to peruse and intriguing. Gladwell gives foundation on a portion of these regularly utilized tests, which would be of shock to businesses utilizing them.â The scenery for the testing evaluation is the account of a lieutenant in the US Army, Sandy Nininger.He clarifies that Niniger was an impossible warrior given his quiet, keen disposition. Nininger in any case, formed into a wild officer and was granted the Medal of Honor after death for his WWII ser vice.â Gladwell experiences the different character tests and considers how any of these tests may have seen the quality in Nininger that made him such a warrior, when he was better known for drinking tea and tuning in to old style music.The history of the Myers Briggs is to some degree humorous as Gladwell composes. He clarifies that the test was the brainchild of mother-little girl socialites, trying to more readily comprehend the men in beneficiary life and connection among people. The Myers brigs was created dependent on Jung, yet as indicated by Gladwell, these lady knew or saw next to no about Jung’s hypotheses. Indeed, he clarifies that Jung would have never concurred with the fundamental inhabitant of the Myers Briggs.Gladwell met with a clinician and experienced the Thematic Apperception Test which expected him to make stories for pictures. The clinician at that point glanced and topics in Gladwell’s stories and gave him a report. While Gladwll comprehended the appraisal and saw the therapist as very discerning, he communicates concern with respect to the measure of subjectivity in this test evaluation. An alternate therapist could have arrived at a completely extraordinary conclusion.Finally, he talks about the administrations of an organization called Developmental Dimensions International (DDI). This organization surveys imminent employee’s qualities and shortcomings by going through a day with the individual in a recreated workday. There individual is given work for the afternoon and afterward evaluated on an assortment of levels. Gladwell went through a day with the organization and got an evaluation that once more, he could see however scrutinized the emotional idea of the assessment.Gladwell, in synopsis advises us that while character tests are every now and again utilized by managers, there is a lot of subjectivity and space for understanding. He recognizes the way that these tests are fun and the outcomes are fascinati ng, he alerts the utilization of them as important appraisals. He closes by inquiring as to whether any of the test he assessed, would have had the option to anticipate Sandy Nininger's character qualities.

Saturday, August 22, 2020

Salt Flats Formation, Activity, and Examples

Salt Flats Formation, Activity, and Examples Salt pads, additionally called salt dish, are huge and level territories of land that were once lake beds. Salt pads are secured with salt and different minerals and they in many cases look white as a result of the salt nearness. These territories of land by and large structure in deserts and other bone-dry spots where huge waterways have evaporated more than a huge number of years and the salt and different minerals are the remainders. There are salt pads found the world over however probably the biggest models incorporate the Salar de Uyuni in Bolivia, the Bonneville Salt Flats in the territory of Utah and those found in California’s Death Valley National Park.â Arrangement of Salt Flatsâ As indicated by the United States’ National Park Service, there are three essential things that are required for salt pads to frame. These are a wellspring of salts, an encased waste bowl so the salts don't clean out and a parched atmosphere where dissipation is more noteworthy than precipitation so the salts can get left behind when the water evaporates (National Park Service).â A bone-dry atmosphere is the most significant segment of salt level arrangement. In parched spots, waterways with huge, wandering stream systems are uncommon on account of an absence of water. Therefore, numerous lakes, on the off chance that they exist by any means, don't have normal outlets, for example, streams. Encased seepage bowls are significant on the grounds that they thwart the development of water outlets. In the western United States, for example, there is the bowl and range district in the conditions of Nevada and Utah. The geology of these bowls comprise of profound, level dishes where the waste is encased in light of the fact that water depleting out of the locale can't move up the mountain ranges encompassing the bowls (Alden). At long last, the dry atmosphere becomes an integral factor since vanishing must surpass precipitation in the water in the bowls for the salt pads to in the end structure. Notwithstanding encased waste bowls and parched atmospheres, there must likewise be a genuine nearness of salt and different minerals in the lakes for salt pads to shape. All water bodies contain an assortment of broke up minerals and as lakes evaporate through a large number of long periods of dissipation the minerals become solids and are dropped where the lakes used to be. Calcite and gypsum are among a portion of the minerals found in water however salts, generally halite, are found in huge focuses in certain waterways (Alden). It is in places where halite and different salts are found in bounty that salt pads in the long run form.â Salt Flat Examplesâ Salar de Uyuni Enormous salt pads are found the world over in spots, for example, the United States, South America, and Africa. The biggest salt level on the planet is the Salar de Uyuni, situated in the Potosi and Oruro, Bolivia. It covers 4,086 square miles (10,852 sq km) and is situated at a height of 11,995 feet (3,656 m). The Salar de Uyuni is a piece of the Altiplano level that shaped as the Andes Mountains were elevated. The level is home to numerous lakes and the salt pads framed after a few ancient lakes dissipated more than a great many years. Researchers accept that the zone was an incredibly enormous lake called Lake Minchin around 30,000 to 42,000 years prior (Wikipedia.org). As Lake Minchin evaporated because of an absence of precipitation and no outlet (the locale is encircled by the Andes Mountains) it turned into a progression of littler lakes and dry territories. In the long run, the Poopã ³ and Uru lakes and the Salar de Uyuni and Salar de Coipasa salt pads were all that remained. The Salar de Uyuni is critical due to its huge size as well as in light of the fact that it is a huge rearing ground for pink flamingoes, it fills in as a transportation course over the Altiplano and it is a rich territory for the mining of important minerals, for example, sodium, potassium, lithium and magnesium. Â Bonneville Salt Flatsâ The Bonneville Salt Flats are situated in the U.S. province of Utah between the fringe with Nevada and the Great Salt Lake. They spread around 45 square miles (116.5 sq km) and are overseen by the United States Bureau of Land Management as an Area of Critical Environmental Concern and a Special Recreation Management Area (Bureau of Land Management). They are a piece of the United States’ Basin and Range system.â The Bonneville Salt Flats are a remainder of the extremely enormous Lake Bonneville that existed in the region around 17,000 years prior. At its pinnacle, the lake was 1,000 feet (304 m) profound. As per the Bureau of Land Management, proof for the lake’s profundity can be seen on the encompassing Silver Island Mountains. The salt pads started to shape as precipitation diminished with a changing atmosphere and the water in Lake Bonneville started to dissipate and retreat. As the water vanished, minerals, for example, potash and halite were kept on the rest of the dirts. In the end, these minerals developed and were compacted to frame a hard, level, and salty surface. Today the Bonneville Salt Flats are around 5 feet (1.5 m) thick at their inside and simply are only a couple of inches thick at the edges. The Bonneville Salt Flats are about 90% salt and comprises of around 147 million tons of salt (Bureau of Land Management).â Passing Valley The Badwater Basin salt pads situated in California’s Death Valley National Park spread around 200 square miles (518 sq km). It is accepted that the salt pads are the leftovers of the old Lake Manly that filled Death Valley around 10,000 to 11,000 years prior just as increasingly dynamic climate forms today. The principle wellsprings of Badwater Basin’s salt are what was vanished from that lake yet additionally from Death Valley’s about 9,000-square mile (23,310 sq km) waste framework that stretches out to the pinnacles encompassing the bowl (National Park Service). During the wet season precipitation falls on these mountains and afterward runs off into the extremely low rise Death Valley (Badwater Basin is, truth be told, the absolute bottom in North America at - 282 feet (- 86 m)). In wet years, impermanent lakes structure and during the extremely sweltering, dry summers this water dissipates and minerals, for example, sodium chloride are deserted. Following a large number of years, a salt outside layer has shaped, making salt flats.â Exercises on Salt Flatsâ In view of the huge nearness of salts and different minerals, salt pads are regularly puts that are dug for their assets. What's more, there are numerous other human exercises and improvement that have occurred on them in view of their enormous, level nature. The Bonneville Salt Flats, for instance, are home to land speed records, while the Salar de Uyuni is a perfect spot for aligning satellites. Their level nature additionally makes them great travel courses and Interstate 80 goes through a bit of the Bonneville Salt Flats.

Friday, August 21, 2020

Blog Archive GMAT Impact The Master Resource List for Reading Comprehension (Part 2 of 4)

Blog Archive GMAT Impact The Master Resource List for Reading Comprehension (Part 2 of 4) With regard to the GMAT, raw intellectual horsepower helps, but it is not everything. In this blog series,  Manhattan Prep’s  Stacey Koprince  teaches you how to perform at your best on test day by using some common sense. In  Part 1 of this series, we discussed how to read Reading Comprehension (RC); if you have not yet read that post, do so now and then continue with this post. The RC Question Types Do you remember the last thing I said at the end of the first post? When you have mastered the reading skills, you are then ready to tackle the questions. Do not make the mistake of thinking that you can ignore the previous post and just go straight for the questions. You will be slower, and you will make more mistakes if you do that. RC has three main question types: Main Idea, Specific Detail, and Inference. Each of those question types can have nuances or subtypes. We will tackle the first two in this post and cover Inference and the minor Why question type in next week’s post. Main Idea Most passages will include one Main Idea category question. Most commonly, you will be asked for the “primary purpose” (i.e., the main idea) of the entire passage, though a question could also ask for the primary purpose or role of just one paragraph. If you are asked for  the purpose of the entire passage, then the correct answer has to cover the overall “real estate” of the passage as a whole. Wrong answers will often be too narrow (e.g., something that applies primarily to just one paragraph) or too broad (e.g., something that includes the main idea but goes beyond it to encompass ideas that were not presented in the passage). Follow the link at the beginning of this paragraph to get some practice. Specific Detail This category refers to questions that ask about a particular detail in the passage. Most commonly, these questions will begin with “According to the passage…” Your task on these is to find an answer choice that matches something stated specifically in the passage. That sounds easyâ€"if the information is stated right there in the passage, how hard can it be? As you already know very well, they can make it quite hard. First, the language in the passage is seriously complex; it is not always easy to understand what they are talking about. Second, right answers will often contain  synonyms  for words that appeared in the passage, while some wrong answers will often contain the exact language used in the passage. If you are not careful, you will be tempted to cross off that right answer because the language does not match exactly! Specific Detail Rule: Use the question wording to figure out where to go in the passage. Then reread that detail carefully. Do NOT rely on your memory! Why not? I was once taking a standardized test (not the GMAT, but similar), and I was about to pick an RC answer. Then I remembered that I should check the proof in the passage first, soâ€"even though I was  sure  I was right!â€"I made myself find the proof. The passage was about some mammals, one of which was the  kangaroo rat. I looked at the passage, glanced back at my answer…and suddenly realized that the answer said  kangaroo not kangaroo rat! I would have been  really  mad to get a question wrong for that reason! The moral of the story: find the proof in the passage. Every single time. Try this  specific detail question  to get started. Want another? Here you go. Join us next week, when we will discuss the third major category, Inference, as well as the minor Why question type. Share ThisTweet GMAT Impact Blog Archive GMAT Impact The Master Resource List for Reading Comprehension (Part 2 of 4) When it comes to the GMAT, raw intellectual horsepower helps, but it is not everything. In this weekly blog series,  Manhattan GMAT’s  Stacey Koprince  teaches you how to perform at your best on test day by using some common sense. In Part 1 of this series, we discussed how to read Reading Comprehension (RC); if you have not yet read that post, do so now and then continue with this post. The RC Question Types Do you remember the last thing I said at the end of the first post? When you have mastered the reading skills, you are then ready to tackle the questions. Do not make the mistake of thinking that you can ignore the previous post and just go straight for the questions. You will be slower, and you will make more mistakes if you do that. RC has three main question types: Main Idea, Specific Detail and Inference. Each of those question types can have nuances or subtypes. We will tackle the first two in this post and cover Inference and the minor Why question type in next week’s post. Main Idea Most passages will include one Main Idea category question. Most commonly, you will be asked for the “primary purpose” (i.e., the main idea) of the entire passage, though a question could also ask for the primary purpose or role of just one paragraph. If you are asked for the purpose of the entire passage, then the correct answer has to cover the overall “real estate” of the passage as a whole. Wrong answers will often be too narrow (e.g., something that applies primarily to just one paragraph) or too broad (e.g., something that includes the main idea but goes beyond it to encompass ideas that were not presented in the passage). Follow the link at the beginning of this paragraph to get some practice. Specific Detail This category refers to questions that ask about a particular detail in the passage. Most commonly, these questions will begin with “According to the passage…” Your task on these is to find an answer choice that matches something stated specifically in the passage. That sounds easyâ€"if the information is stated right there in the passage, how hard can it be? As you already know very well, they can make it quite hard. First, the language in the passage is seriously complex; it is not always easy to understand what they are talking about. Second, right answers will often contain synonyms for words that appeared in the passage, while some wrong answers will often contain the exact language used in the passage. If you are not careful, you will be tempted to cross off that right answer because the language does not match exactly! Specific Detail Rule: Use the question wording to figure out where to go in the passage. Then reread that detail carefully. Do NOT rely on your memory! Why not? I was once taking a standardized test (not the GMAT, but similar), and I was about to pick an RC answer. Then I remembered that I should check the proof in the passage first,   soâ€"even though I was sure I was right!â€"I made myself find the proof. The passage was about some mammals, one of which was the kangaroo rat. I looked at the passage, glanced back at my answer…and suddenly realized that the answer said kangaroo not kangaroo rat! I would have been really mad to get a question wrong for that reason! The moral of the story: find the proof in the passage. Every single time. Try this specific detail question to get started. Want another? Here you go. Join us next week, when we will discuss the third major category, Inference, as well as the minor Why question type. Share ThisTweet GMAT Impact Blog Archive GMAT Impact The Master Resource List for Reading Comprehension (Part 2 of 4) With regard to the GMAT, raw intellectual horsepower helps, but it is not everything. In this blog series,  Manhattan GMAT’s  Stacey Koprince  teaches you how to perform at your best on test day by using some common sense. In  Part 1 of this series, we discussed how to read Reading Comprehension (RC); if you have not yet read that post, do so now and then continue with this post. The RC Question Types Do you remember the last thing I said at the end of the Part 1 post? When you have mastered the reading skills, you are then ready to tackle the questions. Do not make the mistake of thinking that you can ignore the previous post and just go straight for the questions. You will be slower, and you will make more mistakes if you do that. RC has three main question types: Main Idea, Specific Detail, and Inference. Each of those question types can have nuances or subtypes. We will tackle the first two in this post and cover Inference and the minor Why question type in next week’s post. Main Idea Most passages will include one Main Idea category question. Most commonly, you will be asked for the “primary purpose” (i.e., the main idea) of the entire passage, though a question could also ask for the primary purpose or role of just one paragraph. If you are asked for  the purpose of the entire passage, then the correct answer has to cover the overall “real estate” of the passage as a whole. Wrong answers will often be too narrow (e.g., something that applies primarily to just one paragraph) or too broad (e.g., something that includes the main idea but goes beyond it to encompass ideas that were not presented in the passage). Follow the link at the beginning of this paragraph to get some practice. Specific Detail This category refers to questions that ask about a particular detail in the passage. Most commonly, these questions will begin with “According to the passage,…” Your task on these is to find an answer choice that matches something stated specifically in the passage. That sounds easyâ€"if the information is stated right there in the passage, how hard can it be? As you already know very well, they can make it quite hard. First, the language in the passage is seriously complex; it is not always easy to understand what they are talking about. Second, right answers will often contain  synonyms  for words that appeared in the passage, while some wrong answers will often contain the exact language used in the passage. If you are not careful, you will be tempted to cross off that right answer because the language does not match exactly! Specific Detail Rule: Use the question wording to figure out where to go in the passage. Then reread that detail carefully. Do NOT rely on your memory! Why not? I was once taking a standardized test (not the GMAT, but similar), and I was about to pick an RC answer. Then I remembered that I should check the proof in the passage first,   soâ€"even though I was  sure  I was right!â€"I made myself find the proof. The passage was about some mammals, one of which was the  kangaroo rat. I looked at the passage, glanced back at my answer…and suddenly realized that the answer said  kangaroo  not kangaroo rat! I would have been  really  mad to get a question wrong for that reason! The moral of the story: find the proof in the passage. Every single time. Try this  specific detail question  to get started. Want another?  Here you go. Join us next week, when we will discuss the third major category, Inference, as well as the minor Why question type. Share ThisTweet GMAT Impact Blog Archive GMAT Impact The Master Resource List for Reading Comprehension (Part 2 of 4) With regard to the GMAT, raw intellectual horsepower helps, but it is not everything. In this blog series,  Manhattan Prep’s  Stacey Koprince  teaches you how to perform at your best on test day by using some common sense. In  Part 1 of this series, we discussed how to read Reading Comprehension (RC); if you have not yet read that post, do so now and then continue with this post. The RC Question Types Do you remember the last thing I said at the end of the first post? When you have mastered the reading skills, you are then ready to tackle the questions. Do not make the mistake of thinking that you can ignore the previous post and just go straight for the questions. You will be slower, and you will make more mistakes if you do that. RC has three main question types: Main Idea, Specific Detail, and Inference. Each of those question types can have nuances or subtypes. We will tackle the first two in this post and cover Inference and the minor Why question type in next week’s post. Main Idea Most passages will include one Main Idea category question. Most commonly, you will be asked for the “primary purpose” (i.e., the main idea) of the entire passage, though a question could also ask for the primary purpose or role of just one paragraph. If you are asked for  the purpose of the entire passage, then the correct answer has to cover the overall “real estate” of the passage as a whole. Wrong answers will often be too narrow (e.g., something that applies primarily to just one paragraph) or too broad (e.g., something that includes the main idea but goes beyond it to encompass ideas that were not presented in the passage). Follow the link at the beginning of this paragraph to get some practice. Specific Detail This category refers to questions that ask about a particular detail in the passage. Most commonly, these questions will begin with “According to the passage…” Your task on these is to find an answer choice that matches something stated specifically in the passage. That sounds easyâ€"if the information is stated right there in the passage, how hard can it be? As you already know very well, they can make it quite hard. First, the language in the passage is seriously complex; it is not always easy to understand what they are talking about. Second, right answers will often contain  synonyms  for words that appeared in the passage, while some wrong answers will often contain the exact language used in the passage. If you are not careful, you will be tempted to cross off that right answer because the language does not match exactly! Specific Detail Rule: Use the question wording to figure out where to go in the passage. Then reread that detail carefully. Do NOT rely on your memory! Why not? I was once taking a standardized test (not the GMAT, but similar), and I was about to pick an RC answer. Then I remembered that I should check the proof in the passage first, soâ€"even though I was  sure  I was right!â€"I made myself find the proof. The passage was about some mammals, one of which was the  kangaroo rat. I looked at the passage, glanced back at my answer…and suddenly realized that the answer said  kangaroo  not kangaroo rat! I would have been  really  mad to get a question wrong for that reason! The moral of the story: find the proof in the passage. Every single time. Try this  specific detail question  to get started. Want another?  Here you go. Join us next week, when we will discuss the third major category, Inference, as well as the minor Why question type. Share ThisTweet GMAT Impact

Monday, May 25, 2020

Globalization the Bad - 939 Words

Globalization: the bad and the bad Sargon Lazar (Serge) 100443573 GHUM 1058 Professor Adeesha Hack Globalization defined is the worldwide movement toward economic, financial, trade, and communications integration. Globalization itself has been around for ages. In ancient times, the Greeks and Romans would import salt and spices while exporting musical instruments and art to the eastern part of the world. It has helped shape the society we currently live in. Globalization also plays a part in influencing change in cultures, lifestyles and values. From afar, globalization would seem to have a heavily positive effect on the world we live in today, but not everything is what it seems. Indeed, the concept of globalization raises many†¦show more content†¦Many developing countries fear that increased globalization may lead to the loss of control over economic and political decisions and also threaten their traditions, language, and culture. With the dominance of American pop culture as well as political and economic influence around the world, many developing countries view gl obalization as a form of â€Å"Americanization that is undermining the fabric of their traditional societies. In addition, many developing countries do not have demanding rules about environmental protection, therefore industries do not need expensive pollution control equipment, resulting in serious air, water, and soil pollution that would not be acceptable in North America. This offers an easy way for multinational, multibillion dollar companies to go on about their business and avoid cleaning up afterwards. Globalization is a key practice in the world today and is here to stay. Unfortunately it has many undoing factors that make it a negative movement in the right direction. It has picked up too much momentum and has become too powerful to stop, therefore the only way to solve the issue of negative globalization is to limit the damage. Who knows, maybe one day China will globalize us? References * Weber, Steven, Naazneen Barma, Mathew Kroenig, and Ely Ratner. How Globalization Went Bad. (n.d.): n. pag. Foreign Policy. Web. 10Show MoreRelatedGlobalization Is It Good Or Bad?1719 Words   |  7 Pages Abstract Globalization is the word of the XXI century, which become more and more recognized and has been present in our life for a many decades. Most people have heard that term, but far fewer people are aware of what it really means. How does it affect the public?, is it good or bad?. These types of questions everyone should ask in order to investigate the positive and negative effects of globalization. What exactly is globalization? To consider the advantages and disadvantages it is necessaryRead MoreGlobalization: Good or Bad1133 Words   |  5 PagesGlobalization: Good or Bad Plamen Peev peev.pl@gmail.com Augustine Worth ENG 290 – Advanced Writing Argumentative Essay November 30, 2010 â€Å"I, Pencil, simple though I appear to be, merit your wonder and awe, a claim I shall attempt to prove. In fact, if you can understand me—no, thats too much to ask of anyone—if you can become aware of the miraculousness which I symbolize, you can help save the freedom mankind is so unhappily losing. I have a profound lesson to teach. And I can teach thisRead MoreHow Globalization Went Bad1206 Words   |  5 PagesHOW GLOBALIZATION WENT BAD Article 51: How Globalization Went Bad From Terrorism to Global Warming Emily Hudak Dr. Trautman January 20, 2011 Abstract Steven Weber believes that â€Å"evils of globalization are even more dangerous than ever before.† In his article he describes what has gone wrong, gives reasons for the instability, and provides solutions. Article 51: How Globalization went Bad From Terrorism to Global Warming In the Article â€Å"How globalization Went Bad† by Steven WeberRead MoreGlobalization Is A Good Or Bad Thing Essay1946 Words   |  8 Pageswhether globalization is a good or bad thing. For many years, there have been concerns about whether globalization has an impact on language. How exactly can it affect a person, and if it does in what ways? What if nobody is able to understand you? Immigrants find themselves in this situation quite often; this phenomenon is called linguistic isolation, and argues against globalization and how it leads to the extinction of indigenous languages and beliefs. While other people view globalization as anRead MoreGlobalization And The Environment : Good And Bad Results928 Words   |  4 PagesGlobalization and the Environment-both Good and Bad Results This purpose of this paper is to provide a guideline for discussion of the benefits and problems associated with globalization. The following points will show that the idea of globalization is both positive and negative, while providing five examples of specific net gain and net problems. The following paper will briefly discuss each issue, provide a short summary to provide context, give a mechanism that could assist with managing theRead MoreGlobalization Has Its Good And Bad Sides1307 Words   |  6 Pages Globalization has its good and bad sides. It good side cannot be overemphasized but its bad side cannot be ignored. One of its bad sides is the adverse impact on human rights. There are group of â€Å"human rights† in the form of economic rights, labor rights, cultural rights, civil and political rights etc. The globalization is considered to have an impact on the following rights (Sykes, 2003) as: -The admission to the WTO of nations that violate human rights extinguishes opportunities for valuableRead MoreGlobalization Has Good Or Bad Effect On Developing Countries1981 Words   |  8 Pagesâ€Å"the global marketplace† as used mostly but also politically, socially and culturally. It links the â€Å"traditional societies with the Western industrialized ones. This essay deals with a very popular heated debate, whether globalisation has good or bad effect on developing countries, further analysing the impacts of globalisation with some relevant examples from South east Asia, Africa and other developing countries. So, to begin with the economic globalisation, international trade is the most popularRead MoreIntroduction Globalization960 Words   |  4 Pagesï » ¿Introduction Globalization is an ongoing process integrating economies, industries, markets, cultures, societies and policies around the world. Whether globalization is good or bad is a question that people around the globe are constantly debating over. The answer depends on which part of the world you stand on, for globalization have different impacts on every ‘participant’. The Good The good side of globalization is that it promotes open markets which allows businesses to communicate effectivelyRead MoreEssay on Going Global Presentation965 Words   |  4 Pagesï » ¿Going global. Is it a myth or reality? The question of whether the globalization is a myth or reality is easily answered to my mind: it is definitely a reality. But to what extend can we call it a reality? In my presentation I’ll disclose the term of globalization, cover the spheres in which globalization can be applied and dwell on the advantages and disadvantages of it. Finally I’ll come to the conclusion that globalization is an inevitable and developing phenomenon which requires citizens ofRead MoreBenefits Of Globalization On Jobs891 Words   |  4 PagesOne of the main benefits of globalization is that it helps to develop trading amongst nations. Some may think that trade causes loss of jobs and believe that we should be more self reliant on our own production of goods. But, what they may not understand is trade comes with added benefits. To date the United States is the largest trading nation in the world. â€Å"Most imports have a lower cost and higher quality, and that improves our standard o f living† (Marotta, 2003). It is the competitive pressures

Thursday, May 14, 2020

The Latino Threat An Imposing Threat Of The Hispanic

The Latino Threat is a concept of an imposing threat of the Latino, whether they be from Mexico or any other Latin country, and how they affect the U.S. and its citizens. This concept is described heavily Leo R. Chavez’ book aptly titled The Latino Threat. In the book, he describes how the Latino threat as a concept has been used routinely to underline the aspect of United States citizenship in a tit for tat manner; that being dehumanizing the Latino to raise the standing of U.S. citizenship. The U.S. as a nation believes it should feel better about itself because it is the one that turns people away rather than being the place where people run from. Over the history of America this isolationist view on illegal immigrants has waned and†¦show more content†¦Since Chavez brilliantly uses this heavily biased article toward the beginning of his book, it lays out one of the main prospects that he talks about throughout the span of the book. Chavez describes the Time cover, â€Å"Time Magazine’s June 11, 2001, cover image illustrated just how subtly the idea of the reconquest, or Mexican takeover of the United States, could be evoked.† (39) Chavez also has claims throughout the book of a hypocritical America; being a nation of immigrants that will not recognize this new sect of people living among us as legal citizens; because sarcastically he states throughout the book that American citizenship is one of solid guidelines that haven’t been changed time and time again. Although Chavez’ argument finds that last statement very sarcastic, this how many Americans are conditioned to think in the indoctrination of becoming a citizen. The three approaches to the Latino Threat helps define what it means to be an American citizen; that of dehumanization of Mexicans, the threat of Mexicans retaking America and the ultimate hypocrisy of this whole predicament of immigration and this paper will dive further in the nooks and crannies of Chavez’ writing in this book and what he feels is the definition of an American. The first way being an American citizen is defined by the Latino threat is the dehumanization of Mexicans. History repeats itself time and time

Wednesday, May 6, 2020

Regina V. G and Another Case Brief - 1200 Words

Case Title: Regina v. G and another (Appellants) (On Appeal form the Court of Appeal (Criminal Division)) Citation: [2003] UKHL 50 Procedural History (PH): The appellants were charged on 22nd August 2000; without lawful excuse damaged by fire; commercial premises and being reckless as to whether such property would be damaged. The appellants stood trial before Judge Maher in March 2001. The appellants’ case at trial was that they expected the fire to extinguish itself on the concrete. It was accepted that neither of them conceived that there was any risk of the fire spreading. At the start of the trial submissions were made on the meaning of â€Å"recklessness†. The judge ruled that he was bound to direct the jury in accordance with R v†¦show more content†¦Thus it is vital for the correction of the misinterpretation of â€Å"recklessly†. Losing Argument: Should the rule in R v Caldwell be modified? The modification would defy the principle that conviction depends on the mens rea of the defendant. If the principle was modified to accommodate children on the grounds of naivety it would be uncharacteristic if no modification was made to include the mentally handicapped on the grounds of their narrow ability of perception. Implementing modifications of this classification will encourage challenging and controversial debate with regard to the qualities and characteristics plausible for comparison. The implementation of this modification will replace one misinterpretation for another. Were the appellants reckless? A person is said to be reckless if knowing that there is a risk that an event may occur as a consequence of their conduct as defined by The Merriam Webster dictionary . A defendant is only considered to have acted recklessly by the advantage of their failure to give any thought to the risk or property damage that may have been apparent had they given any thought to the matter. Determining if a risk would have been apparent to the defendant is very unpredictable. The tribunal of fact should not acknowledge the defendant’s proclamation that it never occurred to them that there was risk of property damage providing that the conditions,Show MoreRelatedRegina V. G and Another Case Brief1191 Words   |  5 PagesCase Title: Regina v. G and another (Appellants) (On Appeal form the Court of Appeal (Criminal Division)) Citation: [2003] UKHL 50 Procedural History (PH): The appellants were charged on 22nd August 2000; without lawful excuse damaged by fire; commercial premises and being reckless as to whether such property would be damaged. The appellants stood trial before Judge Maher in March 2001. The appellants’ case at trial was that they expected the fire to extinguish itself on the concreteRead More Abnormal Psychology2516 Words   |  11 Pagesnormalcy in another. In attempt to make the field comprehensive a middle ground was determined by drawing on the common elements or patterns of â€Å"peculiar† conditions, and converging them to ascertain this definition of abnormality: behavioural, psychological, or biological dysfunctions that are atypical and unexpected in their cultural context and associated with personal distress and impairment in functioning, or increased risk of suffering, death, or pain (Barlow Durand, 2012). In brief, this isRead MoreEssay on Starting a New Business2363 Words   |  10 PagesIntroduction As Regina Meyers contemplates opening a Satanic coffeehouse in her hometown, she must make a number of critical business decisions related to business organization, ownership, structure, and management. A number of her friends and family members have expressed interest in partnering with her or simply being involved. As Regina’s legal adviser, I have been asked to provide advice to her on a variety of topics outlined below. Business: Friends, Family, and Foes As an entrepreneurRead MoreBed Bathing Patients in a Hospital3347 Words   |  14 Pages(Staff Nurse, during placement)It was approximately 07:45 Friday morning of mid June, three weeks into my placement. After handover I was given the task of bed bathing a female client. Mrs Jones, what I learned about Mrs Jones in handover was very brief. She was admitted to hospital as she was suffering shortness of breath, she had been suffering from Parkinson’s disease for ten years, she also had a catheter instituted, she had very little control of the lower half of her body, her right shoulderRead MoreEffects of Motivation on the Performance of Public Sector Organisations9735 Words   |  39 PagesTITLE PAGE THE EFFECTS OF MOTIVATION ON PERFORMANCE IN PUBLIC SECTOR ORGANIZATIONS: A CASE STUDY OF NON-TEACHING STAFF, GHANA EDUCATION SERVICE, KUMASI METROPOLIS. BY GEORGE ASIAMAH VIDA OWUSU SEKYERE GIFTY ASAMOAH PRAH MANUELA LABRISCA ROBINSON DJAN REGINA OCRAN A DISSERTATION SUBMITTED TO THE DEPARTMENT OF BUSINESS STUDIES, CHRISTIAN SERVICE UNIVERSITY COLLEGE IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF BUSINESS ADMINISTRATION. JUNE 2012. i ABSTRACTRead MoreImproving Public Infrastructure : A Study Of Guyana Essay9286 Words   |  38 Pagesalso highlights the success factors for implementation which includes Political Will and political consensus, PPP Unit, the right vision, Good Governance and Continuity. It will also compiles a framework for cross analysis with the three (3 Case studies) PPP cases in Guyana, and checks for the relevancy of each variables based on Guyana’s situation. This studies will also assess whether these PPP projects lead to infrastructural development. Furthermore, this study seeks to use an econometric modelRead MoreImproving Public Infrastructure : A Study Of Guyana9265 Words   |  38 Pagesalso highlights the success factors for implementation which includes Political Will and political consensus, PPP Unit, the right vision, Good Governance and Continuity. It will also compiles a framework for cross analysis with the three (3 Case studies) PPP cases in Guyana, and checks for the r elevancy of each variables based on Guyana’s situation. This studies will also assess whether these PPP projects lead to infrastructural development. Furthermore, this study seeks to use an econometric modelRead MoreIntroduction to Rizal Course11998 Words   |  48 PagesRizal inherited from his father self – respect, serenity and poise, seriousness and a deep sense of dignity. On the other hand, from his mother side, Rizal’s great grandfather was Eugenio Ursua who married a Filipina named Benigna. Their daughter Regina married Manuel Quintos, from Pangasinan, Rizal’s great grandfather. Their daughter Brigida married Lorenzo Alberto Alonzo serving as Rizal’s grandfather. Lorenzo and Brigida had 5 children, one of whom was Teodora Alonzo, Rizal’s mother who marriedRead MoreModernization of Ntuc Income Case Study14065 Words   |  57 Pagesstrategies to increase organizational commitment. I Contrast transactional and relational psychological contracts. I Discuss the trend towards employability. I f history is any guide, SaskTel won’t be laying off any employees for a long time. The Regina-based telecommunications company hasn’t laid off anyone since it was founded in 1908. â€Å"[Layoffs] aren’t going to happen as long as we can help it,† says Byron Pointer, SaskTel’s vice-president of human resources and industrial relations. By avoidingRead MoreModernization of Ntuc Income Case Study14054 Words   |  57 Pagesstrategies to increase organizational commitment. I Contrast transactional and relational psychological contracts. I Discuss the trend towards employability. I f history is any guide, SaskTel won’t be laying off any employees for a long time. The Regina-based telecommunications company hasn’t laid off anyone since it was founded in 1908. â€Å"[Layoffs] aren’t going to happen as long as we can help it,† says Byron Pointer, SaskTel’s vice-president of human resources and industrial relations. By avoiding

Tuesday, May 5, 2020

Enhancing Government Service Experience

Question: Discuss about the Enhancing Government Service Experience. Answer: Introduction In this age of Globalization and digitalization, QR codes are heavily used by the organizations for marketing and establishing connect with the customers however still QR codes adoption is in early stage and there is huge scope of them (Sundstrom, Radon, 2014). This paper will discuss about the QR codes and how they can be used effectively in service sector by answering the below questions: QR codes can be relevant in almost all the stages of the consumer decision?making process. However their actual usage depends on how innovative the business processes of any organization is. For example, QR codes usage is quite common in advertising and marketing activities however it is not very common in post purchase evaluation stage. Consumer decision making process consists of 5 stages which are identification of requirement, solutions to fulfill the requirement, evaluation of substitutes, actual buying of the product and lastly post purchase analysis of the product by the consumer. Stage 2nd and 3rd i.e. solutions to fulfill the requirement, evaluation of substitutes are generally involve marketing and advertising activities by the organizations. It is during this stage customer is attracted towards the product and start doing the analysis. Thus, it is where the QR codes are used most. For instance, one can see the QR codes in hotels, bus stands, amusement parks, billboards, malls pamphlets. Once customer scans these QR codes, he will be directed to company website or company product or wherever company may want to direct in order to attract the customer towards the products (Wirtz, Lovelock, 2016). Some organizations like Tesla, Pizza hut, Starbucks also support selling of their products using QR codes. Not only will this customer get the discounts or coupons also if they place their order using QR codes. It is because such orders are automated and company can save the time of its executive if the order is placed on the call. Also, placing orders simply by scanning QR codes is quite convenient for customers to place the orders. Thus, few companies uses QR codes for actual buying of the product. Some organizations like Nestle, Coke, Toyota, Dell also connects with people after the purchase for their feedback and thus uses QR codes to collect feedbacks during the post purchase evaluation of the product by the consumers (Downer, Oprescu, Forbes, Philips, McTier, Lord, Simbag, 2016). Do you see a marketing opportunity for QR codes in the services sector? Explain why or why not, and illustrate your answer by using examples from the services sector such as retail, financial services, health services, public sector utilise and transport. . If anyone carefully observe the surroundings, he will be surprised to see the usage of QR codes. QR codes are very cheap and platform independent i.e no matter what operating system your smart device has, it will be able to scan QR code. This is the reason that they are heavily used in service sector be it health services, financial services, public transport. Having said that, still there is a huge scope in the market for using QR codes. Organizations are already reengineering their business processes to include more QR codes. In Airline industry, almost all the airlines allow the travelers to check-in in their flight in advance by sending them QR codes. Such QR codes when scanned retrieve all the information about the passengers (Lorenzi, Vaidya, Chun, Shafiq, Atluri, 2014). While boarding, airline crew just scan the code and it will tell if they are boarding the right flight or not. QR codes has saves huge manual efforts and automated the business processes. In hospitals also, patients are given the barcode and if they go to medical store, they simply scan the code and gets the prescription. Not only this, it is easy to store and share various reports of the patient with other doctors and hospitals using QR codes. In Banking and finance industry also, QR codes are used heavily by the banks. People are having dedicated QR codes to receive the money from other accounts and customers (Panya, Galiyawala, 2014). In public transport system also, many tour and travel companies are using QR codes to ease the process for customers. For instance, there is TouchTravel Germany based tour operator that uses QR codes to print at home ticketing, mobile ticketing, and train passes (Tardivo, Scilla, Viassone, 2014). The case study offers examples of how QR codes can bypass multiple layers of distribution and support marketing. Specific to the services sector what are some potential advantages of this? Suppose you are reading a magazine and came across the advertisement of some beautiful furniture along with a QR code which claims if you order the item by scanning QR code, you will get additional discount. In this process, there is a huge saving for the organization in terms of distributing the product to distributors, resellers who finally sell to the customer by directly receiving orders from the customers and shipping product to them. This drastically cuts the numerous layers of distribution and marketing. In service industry also, Banks are directly selling their financial products to people by advertising through QR code and giving them additional discount by enrolling through QR code. This obviates the need to give commissions to brokers who bring the customers. Other advantages of this are that organizations are directly getting access to customer data, which was earlier, the main strength of the various dealers and brokers. BY directly getting the data, service industry can improve on their product offerings and concentrate the marketing efforts by having a separate strategy for separate segment of the people. How may QR codes affect consumers perceived risk of products within the services sector? Organizations can obviate such risks by capturing frequently ask questions, testimonials, reviews, usability of the product in form of QR code and make those QR codes easily available to the consumers at each of their distribution channel. Not only this, organizations can market these QR codes at social media sites like twitter to make people aware about the product. When people are buying through the agents, they are often skeptical and this is where QR codes will come to their rescue by giving them direct access to actual information about the product. Also, there has been cases of frauds earlier especially in Banking industry where people are promised something else and assured return on investments by the agents. In such cases, QR codes will help to make the process more transparent by educating people about the risks associated with each of the investment product (Chugan, Srivastava, Patel, Soni, 2016). Mutual funds industry can also use QR codes to explain the people about the ir complex product by making a video and sharing it. Which other forms of interactive content and/or information may be developed to support service operations and customer satisfaction in the future? Tour and travel companies can develop the infographics to attract the customers and share the infographics on social media platforms like twitter. Organizations can start campaigns, quizzes, give rewards to people on liking the facebook page and following twitter account of the organization and thus gaining traction from the people. Entertainment services has been doing this from long time by making the trailer of the movies and broadcasting it in television where people can respond and win free movie tickets. Healthcare industry, Banking industry, Insurance industry are also creating blogs and other interactive content to gain the traction of the potential customers and also to advertise their services. References Chugan, P. K., Srivastava, D., Patel, N., Soni, N. C. (2016). New Age Ecosystem for Empowering Trade, Industry and Society. Downer, T., Oprescu, F., Forbes, H., Phillips, N., McTier, L., Lord, B., ... Simbag, V. (2016). Enhancing nursing and midwifery student learning through the use of QR codes.Nursing Education Perspectives,37(4), 242-243. Klein, M. (2014). Contribution of QR-Codes to the Marketing Mix A Case Study. Management, 4(3A), 1-11. Lorenzi, D., Vaidya, J., Chun, S., Shafiq, B., Atluri, V. (2014). Enhancing the government service experience through QR codes on mobile platforms.Government Information Quarterly,31(1), 6-16. Pandya, K. H., Galiyawala, H. J. (2014). A Survey on QR Codes: in context of Research and Application. International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, ISO 9001: 2008 Certified Journal, Volume 4, Issue 3. Sundstrm, M., Radon, A. (2014). Why classic marketing promotion doesnt work in digitized context. In Marketing Edge, Direct/Interactive Marketing Research Summit. Tardivo, G., Scilla, A., Viassone, M. (2014). A new frontier in the satisfaction of the cultural tourist: the QR code. Handbook of Research on Management of Cultural Products: E-Relationship Marketing and Accessibility Perspectives: E-Relationship Marketing and Accessibility Perspectives, 348. Wirtz, J., Lovelock, C. (2016). Services marketing: people, technology, strategy. World Scientific Publishing Co Inc.

Wednesday, April 8, 2020

Prejudice Is Defined In The Dictionary As Hatred Or Unfair Treatment O

Prejudice is defined in the dictionary as hatred or unfair treatment of a particular group, such as members of a race or religion. Although prejudice has a definite definition in the dictionary, the novel;To Kill A Mockingbird teaches us that there are many diferent form of prejudice. In the novel, Harper Lee used many different types of prejudice such as stereotyping, racism, and segregation. During the novel, Harper Lee uses segregation as a form of prejudice. One of the many examples of segregation was when the black people were confined to a diferent church. White people went to whites churches and balck people went to balack churches. Balck people were also segregated during the Tom Robinson trial. The balck people of the town had to sit up in the balcony while the white people sta below them. Another way the balack people were segregated form the white people was when Boo Radeley was put in the basement of the court instead of the jail beacuse black people were being held. Throughout the novel, there were many different forms of stereotyping. Aunt Alexandria believed everyone in Maycomb had an "Incestous Streak." " Everyboby it seemed had a streak: a drinking streak, a gambling starek..."Scut recited. Aunt Alexandria is steroetying the people of Maycomb because she is judging them on their realtives beahvior. Another example of stereotyping was ehn Scout said " Wlater's one of thme Cunninghams, Miss Caroline". Scout was reffering to the poorness of Walter's family. They never take donations and everyone is suppoeds to know that. In conclusion, the novel, To kill a Mocking Bird, shows that there are many forms of prejudice such as streotyping, racism, and segregation. There are many more types of prejudice that were used through otu the novel. Even though the dictionary provides a precise defintion of the word prejudice, Harper Lee teaches us that there are many differnet forms of prejudice.

Monday, March 9, 2020

Declaration of Independence importance essays

Declaration of Independence importance essays The Declaration of Independence, signed on July 4th 1776, is one of the most important documents in American history. It helped to define Americas values and its freedom, as it still stands today. The people of the 13 colonies had been trying to revolt from the power of Great Britain for 14 months while proclaiming their allegiance to the crown. In 1776, after the Second Continental Congress met, a decision was made that the only definite way to declare independence would be a statement to the British king. The colonists wanted to make clear exactly why they decided to take this action, and carefully presented their arguments in the Declaration. The Declaration of Independence can be divided into four parts. The first part is an introduction which explains why the colonies wished to declare their independence, and the necessity of independence for a successful new country. The second part describes the unalienable rights, which are not granted by governments, but instead guaranteed to mankind at birth. However, the colonists felt that the current British government was violating these natural born rights, and that the settlers could create a much more effective government to run the new country. They stated that one of the main purposes of their government was to secure and protect these rights. Furthermore, the new government would be based on the consent of the governed, which should be the sole source of the government's authority. If the colonies government violated the peoples vision of a stable government, then it would be their right to overthrow it. The third part of the document is a list of grievances and compl aints against King George III, who represented all of the British actions. These grievances are examples of actions that violated the criteria for a good government as stated in the second part of the Declaration of Independence. These grievances justify separation from the King's t...

Friday, February 21, 2020

A New HR Strategy for CCD Construction Essay Example | Topics and Well Written Essays - 2500 words

A New HR Strategy for CCD Construction - Essay Example CCDC is a construction company that was formed in 2007 after the merger of two construction companies. After the merger the company made many changes in the human resource policy. Around 3,000 employees were laid off in 4 years and the company tried to flatten its organizational structure. CCDC was formed by the merger of two firms. One of those firms catered to small clients and other catered to large clients. This main difference had repercussions on the human resource management policies of the company. The current HR policy of the company focuses on flattening of structures and constant feedbacks from employees. The policy is also aiming for employee training and coaching style management. All these strategies cannot go well for the company because they contradict the organization and business strategy. In this report a new HR policy is suggested to the top management of the company. The HR strategy will include the organizational structure and culture, reward management system, job design and employee relation. The new HR strategy will be discussed keeping in mind the aims and objectives of the business of CCDC. Human Resource Strategy for CCDC When devising a human resource strategy it is important to keep in mind the dynamics of the company. Employees of CCDC were previously working for a different company and therefore they had a different understanding of company’s policy. The new HR strategy should be focused on giving the employees a proper direction. The organizational culture of the two companies (which were merged to form CCDC) was also not similar. This must be tackled in the new HR strategy for the company. The structure of the company should also fit the business operations of the company and the same is true for organizational culture. It is also important to motivate employees through different types of rewards. Employee relation is also essential in operating a construction company as big as CCDC. Organizational Structure and Culture Organizational structure of CCDC should be vertical so that employees can report to their superiors in a proper and orderly fashion. The current HR policy of the company i s aiming for a flatter organizational structure. This is not good for a company like CCDC because it is a huge organization. Flatter structures are also appropriate for small organization or they are applicable in innovation oriented businesses. Construction business is all about controlling employees so that they can complete the work that is assigned to them. For this purpose a tall organizational structure should be used. The company should also form a team based structure at the project level. Evidence suggests that team based struct

Wednesday, February 5, 2020

Leadership Assignment Example | Topics and Well Written Essays - 2000 words

Leadership - Assignment Example A leader establishes the target himself while a manager is not authorized to establish the target. Rest of the work of a leader and a manager is the same. Both plan and control the work of the subordinates. A leader is also a manager but a manager is not a leader. A leader is not able to achieve his target unless he has robust management skills. A manager can be thought of as a leader in his own little capacity. He also takes decisions but his decisions are directed at organizing the subordinates in a way that is conducive for the achievement of the senior’s targets. b) I would consider it a great compliment if I am recognized by someone as a good manager or a good leader. Both are equally difficult skills. Some say that leadership is easier as compared to manager because the individual has the freedom to take independent decision. Nevertheless, this does not come without added responsibility. If a leader becomes successful, the whole team takes the credit. On the other hand, if the leader fails to achieve his target, the whole blame rests with him. Therefore, a leader assumes complete risk for the work. In comparison to the leader, the manager assumes very little risk. A manager is one of the team members in the hierarchy of the organization structure that a leader has. He is answerable to the leader for the compliance of the work quality, progress and cost as per the quality plan, project work schedule and the cost schedule he was originally provided by the leader. There can be a lot of excuses if any of these doesn’t comply with the original schedule owing to the hidden risks i.e. weather risk, political crises and financial crises etc. Nonetheless, management in itself is no less than an art. To make things go as per the schedule, a manager needs to have robust organizing skills. Yes, I can be both a manager and a leader as long as I have good risk identification and mitigation skills. c) Leadership has no relation to gender. A woman can be as good a leader as a man. Both men and women have their own strengths and weaknesses. Even within a particular gender, people greatly vary in their qualities. One woman may be a very good leader while another may not be so. Likewise, some men make very good leaders while others do not. All that matters is the extent to which an individual is foresighted, frugal and dominating, and both men and women can have these qualities in them. Q. 2 a) Emotional intelligence is an individual’s ability to monitor his/her own emotions as well as those of the subordinates or any group of people. People born with high emotional intelligence are more articulate in their manner and know how to deal others without offending them. In everyday life, we encounter a lot of situations which we don’t like being in. We have numerous options to deal with the complications, some of which help us achieve our targets without making anyone feel hurt while others lead us to our targets on the cost of our relationships with others. The behaviors we are required to exhibit in order to make things go smoothly vary from one situation to another. Sometimes, a mere smile on the face solves the problem. In other times, the smile won’t do. It has to be something else. People with high emotional intelligence know what behavior works best in a certain setting. Emotional intelligence has five dimensions namely â€Å"self-awareness, self-management, self-motivation, empathy and social skills†

Tuesday, January 28, 2020

Electronic Notice Board Software

Electronic Notice Board Software ENB project was created to modernise the classic means of communication through the pin and paperboard based communication to the more efficient and dynamic communication of general information to the students of the Bolton University. Student and faculty will get the timely information while they are walking around School office or in Labs. ENB will remind the student about the critical dates for the exams, social events, and warnings etc. It will positively affect the student behaviour towards the academic excellence and time management. ENB will decrease the rate of late assignments submission and absents among the students. ENB will decrease the workload of university management for printing and pasting the traditional paper based notice boards. ENB system will not require any additional hardware and it will be developed in the Microsoft Visual Basic .net Express Edition and Microsoft SQL server Database hence low cost of development and implementation. ENB will bring forth a positive change in the university environment. ENB project was created using the VB.NET and SQL database express editions, which are free of cost. Database is designed to ensure the efficiency of the software in the network environment. A survey was conducted on the sample of students to evaluate the potential of ENB to improve the overall communication in the campus. To ensure the successful implementation of the project the software was tested and evaluated in the campus environment. The final solution met all the basic requirements and also delivered some extra features. Further features and improvement can be added in the future. The report has the details of the ENB project from start to end, including the requirement analysis, background research, design, implementation, testing and evaluation stages. CHAPTER 1 INTRODUCTION Problem Definition During my time in university I have missed many recreational occasions and a couple of times I have missed important dates of final assignment submissions as I was miss informed about the dates. All these errors of misinformation made me realize the necessity of an electronics notice board. In the University of Bolton there are many problems, distinguish is between rumour and true information. At times dates are changed and change of plan is very poorly communicated to the students and faculty, which creates confusion. In case of an ENB students will have access to important announcements while walking around and have the benefit of being reminded several times a day. Currently university administration is using a Paper based notice board. A printed black and white poster is pasted on the notice board to announce university events. The method indeed consumes the administrative and clerical time of the university. Sometimes the change of dates is not timely announced, which provokes frustration among the students of the concerned disciplines. The ENB project was realised and envisaged based on the concept of improving the communication channels within the University campus among students and the faculty members. For example to announce the start of new semester a simple piece of paper is loosely pasted at the front door notice board of school office. Sometimes the fonts are not appropriate and the black ink prints are not very attractive and appealing to grab the real attention of the concerned students. So the students miss the critical information and often submit the final project or prepare for the final exams very close to the deadline. In my opinion irrespective of the students aptitude the fault might be at the universitys end. The ENB will effectively convey the key academic information to the students hence there will be great reduction in the late submission of the final projects and assignments. The ENB will play a powerful role at will increase the academic productive of the students. A notice board can be defined as Abulletin board(pinboard,pin boardornotice boardin British English) is a place where people can leave publicmessages [1] A Notice Board is a traditional tool for the dissemination of information in academic campuses. A traditional Notice board is made of a wooden frame with a soft central square of cork for pinning the papers of information for the students. Widespread adaptation of information technology has changed the traditional means of information dispersion. Electronic notice board is an innovative replacement for the traditional wood and cork notice boards. Due to the dynamic nature of the electronic notice board it has practical application in the corporate environment. Following are some of the case studies about the practical application of electronic notice board in both academic and corporate scenarios. Aim The project ENB aims to develop and implement application software that will disseminate the academic information in the network environment among the students and faculty members. The project ENB will open the new powerful channel of communication between university management and students. The solution will consist of a page server and client PCs as the notice boards. In the design phase I will focus on to simplifying the end user experience of using the ENB. End users will probably include members of admin staff. For the administrator it will be hassle free to upload the different formats of multimedia. There will be some quick templates to quickly upload the announcements. The ENB system first time configuration will be automatic therefore very easy. There must be server software on one end therefore the client side will automatically detect the server. In case of multiple page servers the ENB system will give options to connect. The ENB system will be Database driven hence it will take the minimal amount of network bandwidth. The ENB system will be network based therefore additional network optimization technology will be deployed to make it as fast as possible The system will be operated by Administrator and other staff to assist them in scheduling tasks for messages in the near future. Also an aim of the project is to develop the framework so that it is easy to extend in the future. Objectives The ENB system will be developed using the visual basic programming language and MS SQL SERVER database. I will focus on the following outcomes for the finished product. In order to satisfy the aim the following objectives need to be achieved: Deploying a software engineering methodology relevant to the ENB project Design a data model for ENB Design and develop an integrated system to query the data model Test and Evaluate the ENB against the requirements Minimum Requirements A prototype of an integrated framework for Electronic Notice Board system which can be informative and flexible. A prototype to input and store task commands. A prototype to input and store scheduled task commands. A prototype to input and transfer scheduled task to task command data. Enhancements A login system to provide security for the server application. View of Report of pending tasks for any date. View of Report of completed tasks for any date. Administrator prototype to add new users on database server. Administrator prototype to run client in Admin mode. Data bound schema to control scheduled tasks. Controlling the clients status active or inactive Input FIFO: First in First out. As task is set to client, it is executed straight away. Time Controlled pattern: Events are controlled by given time. Time can span to any number of minutes, hours or even days. Date Controlled pattern: Events are controlled by given Date. Time and date controlled pattern: combination of Time Controlled pattern and Date controlled pattern. Client Registration Data Primary Input Client Id, Client Name, Client Unique Id, Time of Registration, Date of Registration. Secondary Input Client State. Base Data (Client Data) Base table is basically a blueprint for all clients. (Primary Input) Record Id, Task Id, Task Command, Task Arguments (Additional input) Task in Time, Task in Date, Task State Scheduled Data It is same as Base Database. (Primary Input) Record Id, Task Id, Task Command, Task Arguments (Additional input) Task in Time, Task in Date, Task State Output For each task that is in current execution schema is grouped by registered users and are performed by clients on given time span. Scheduled tasks are placed in scheduler and on given time they are transferred to corresponding client(s) for execution. Requirements Analysis The purpose for this project is not to develop a system that can act as a notice board but to integrate and utilize data driven technology to accomplish complex tasks with ease without any additional hardware to display message. Integrated scheduling technology provides flexibility and automation. Orange valley systems are the market leader for marketing the ENB application for the business organizations Appendix WRITE IT IN END. A thorough analysis was conducted on the orange valley product. Basic idea for the ENB features was captured from the screen shots available from their website. In depth interviews were conducted with the students, friends, and the IT administrator staff. On collecting the requirement analysis data from the above research the following functional and non functional requirements were devised. Functional Requirements Add and edit tasks. Add and edit scheduled tasks. Add and remove tasks. Schedule tasks Display reports of tasks. Non Functional Requirements System must be easy to use and navigate. System should have a consistent interface. CHAPTER 2 METHODOLOGIES Methodologies Communication is the lifeline of any social system. Success of any organization is directly related to the effectiveness for their communication systems. Academics are no exception for this. An effective campus communication system must be understood, credible, and practically utilized. Attributes about the campus communication In the year 1973 Mr. Anderson Jerry M presented his research papers at the Annual meeting of the Nebraska speech communication association. Title of the research papers were Improving the internal communication: A campus Quandary. Research papers were based on the formal interviews with the 90 interviewees. Each interview took 15 to 90 minutes. Interviewees were randomly selected persons of the campuses. Interviewees included the campus administrators, faculty, students, staff, alumni and trustees representing 30 post secondary institutions of different sizes. Past research data was also used to analyze the results of the research. The 1971-72 opinion research was based on an interview format designed to be open-ended to encourage respondents to call upon personal experience and ventilate feelings. The interviews unveiled the issues and anxieties regarding the campus communication. Two questions formed the basis for interviews, except in a few instances where a more structured questioning approach was necessitated to elicit more extended responses. Those two questions: From your perspective and experiences, how effective is communication on this campus? What, if anything, would you do to improve it? [2] Three general attitudes clearly emerged. The need for improved campus communication is among the most significant and pressing problems. When asked why, most answered that the functional operation of the campus was dependent upon communication effectiveness and it could be much improved, and internal effectiveness as perceived by those outside the campus would determine the level of future support. Recommendations for improvement were multiple, usually incomplete in development, and concluded with the statement that no clear solutions existed. Concern was expressed about the lack of sensitivity and attention to communication problems by those with the expertise to improve the situation and by others in positions to effect change. Opinion research drew the following conclusions. Research uncovered a strong need to improve the campus communication. Old faculty members were nostalgic about the good old days when they knew everybody in campus and always knew the important events Campus members realize the ultimate responsibility of communication lies on administration Administrator is frustrated about changing the campus communication. They dont understand the approach to the change. They themselves are confused on aligning their communication between deans and faculty. Faculty members and chairman were not happy with the unreasonable deadlines, dissemination of information in clusters, reactions to proposed policies. Communication denial and communication under load were the main concern of middle level management. Campus staff was concerned about the lack of confidence upon their colleagues due to surveillance and audit of their work. Information used to distort when passing down or up in the hierarchy of the organization. Traditional approaches were not working 20% of the sample showed their lack of interest for improving the campus communication. These were mostly the students and faculty members. Interviewees were most distrustful about the administrative communication behaviour especially lack of disclosure Solutions for improving the Campus Communication Communication had been improved using the technological advances. Providing informational announcement is on closed circuit television between classes had proven to be effective. The use of telephone answering services in offices during after hours, and as a message dissemination system for people to call and hear important recorded messages. Catalogues and bulletins and other information sources need be written with the sensitivity to readability. Departments or divisions, large institutions, should be encouraged to develop newsletters. Bulletin boards could be kept up to date and used more extensively I have chance to review the communication methods deployed by the UK universities. These are some general and specialise methods. News Kantor, Brian and Phil Lapsley Network News Transfer Protocol: A Proposed Standard for the Stream-Based Transmission of News. 1986. [3] Universities employ NNTP (network news transfer protocol) service named News as the official bulletin board. NNTP provides discussion forums for modules, programming languages and other both academic and non-academic topics. NNTP has also the application of a notice board where official announcements are posted. Students can access the news by any newsreader. Thunderbird email client and Tin are popular newsreader. Students are required to read the newsgroups on a regular basis as it is the main method of official communication between the school and students. It has been noticed in the recent years a falling trend of reading news among the university students. Email Universities provide everyone with an email account. Using email to communicate has several advantages. Email Communications are often more effective than printed direct mail. [4] Firstly email is a flexible system that by now has large amounts of web integration. Therefore people have flexibility in how to access their email account Secondly email is an accepted method of communication with people usually inspecting their email on a habitual basis and therefore messages be likely to get read. As a broader point, email is simply further widely used all-round. SIS The term SIS School Information System is used in some of the UK universities. SIS provides information on students, staff, modules, timetables, coursework and more. From the perspective of an undergraduate student, SIS provides access to the school timetables, modules information, and coursework results and is also used to facilitate the submission of electronic coursework. Module websites In most of the UK universities every module has its own WebPages. Modular group of pages can be accessed on adding codes in the official URL. These web pages typically include the outline of the module, lecture slides from each lecture, sample coursework, additional reading and information on the examination and assessment process for the module. [5] Wiki The simplest online database that could possibly work.[6] Universities have link to the WIKI. WIKI has rigorous information of how to and guides to using the facilities. The wiki provides plenty of helpful information and is frequently the first port of call for numerous students when students have a problem or desire information on the University facilities. University of Bolton has the WIKI. It also has new information that people are continuously adding. However until now nearly all of the edits have been through by staff or by a small selection of students. It has up till now to be fully embraced by undergraduate students with a small number of using it on a regular basis and barely any undergraduates contributing to it. VLE (Virtual Learning Environment) Mostly Uk Universities Library has a virtual learning environment which the universities developed in-house and launched in around 1996. Access to the environment is available through a web browser for both students and guests [7].The thought is to create a virtual campus online separated up into various buildings which house the different resources on offer. The quantity of information available varies from school to school and from module to module. For example the business school has a chat room, module information, lecture slides and past exam papers for a large number of their modules. The School of Computing however does not. This is most probably because all this information is available on the schools intranet. The VLE also provides quick access to searching Google, Oxford reference dictionary, Thesaurus.com, Institute and the library catalogue. Facebook Facebook is a social networking website analogous to MySpace. It was at first targeted at university students. The site was launched in 2004. It was primarily developed for student community of Harvard and extended to offer networks for other universities and ultimately opened membership to all and sundry in 2006. The idea is based around a series of networks, one for each university. In order to join the network one needs to use a valid email address for that institution (for instance, in order to join the University of Bolton network you require to use a @Bolton.ac.uk email address. You then have access to that networks features such as being able to view peoples profiles, joining groups and creating and replying to event invitations. Facebook is amazingly popular with students, claiming a penetration rate of 85% among US college students. Facebook also achieves very high levels of user retention. Over 50% of its user base visits the site every day [8] and on average each user view s 50 pages of the site per day. The main problem with Facebook from the perspective of the school is that is it not managed by the Institution and the Institution has no control over it. The school has no effective way to utilise Facebook to communicate with students as it does not have control over the School of Computing group on Facebook and only a minority of the staff are registered on the site. A more elemental problem is that Facebook is a social networking website intended for students and was not intended to be used for academic activities or to be utilised by academic institutions. Conclusion In the universities of UK current methods of campus communication do not seem to be engaging the students. Declining use of the News and other web based IT platform shows that students information needs are not met. Facebook is very popular but Universities have no control on it. Therefore it would appear to the Universities requirement to deal with these problems either by upgrading their existing systems or adopting a new system in order to engage students more and meet the new level of expectations of the students. CHAPTER 3 BACKGROUND RESEARCH Background Reading Software Engineering Methodologies A methodology is a structured approach to design and develop the software, hence reducing the chances of software project failure. Methodology provides a recommendation of a series of steps to be followed [9]. There are number of software development methodologies. The selection of the methodology depends on the scoop and complexity of the project. Some of the famous methodologies are Waterfall Model which is also described classical model [10]. The Spiral Model was introduced to replace the Waterfall Model [4]. The Spiral model is being criticised for its rigidity. The Rapid Application Development (RAD) methodology became popular in the early 1990s due to the perceived deficiencies of the traditional waterfall approach [11]. RAD is ideal for the projects where requirements may change during or after the development.RAD has advantage on other methodologies to save the time required for development. Prototyping is another methodology in which developer builds an application from the requirements. There are two types of prototyping methodologies evolutionary prototyping and throwaway prototyping. It is important to decide in advance the selection for the type of prototyping methodology [12]. After a thorough analysis it seems that no single methodology is suitable for the ENB project. Chosen methodology will be explained in the following section. Chosen Methodology It has been decided after reviewing the common methodologies, it seems appropriate to select the Evolutionary prototyping methodology for the ENB project. RAD will be used to develop the required features of the ENB software. Using an only the approach of RAD will lead to the errors and the prototyping will allow correcting the errors. Prototyping has the four main stages. Identification of the requirements. Development of a prototype system. Review the prototype. Revisions and enhancements of the Prototype. Prototyping typing will allow the development of the certain module of the project. Even if the whole project is not developed, there will be basic system to be developed further in the future. For example server side application will be developed with all requirements of scheduling, the tasks and defining the users rights. The client application will be developed afterwards. Client application will have support for the features of the server. On the user evaluation the further features will be added on the server side. RAD will be used on each phase of the development therefore the client server applications will be developed rapidly. RAD will be used within each phase of development, so the Time Controlled pattern / Date Controlled pattern Input task will be developed rapidly. Similarly the other aspects will be developed like this and will together form the overall framework, which will develop as an evolutionary prototype. Each aspect of the system will be developed using a RAD approach and then modified, this will include the database development, the input component and the output component. The evolutionary prototype will allow for any bugs to be corrected during the development instead of detecting and correcting them during the testing phase. Tools and Applications Database Systems The system involves the use of a lot of information, some which will be needed several times and the most appropriate form of storage of this data is in a database. This will allow data to be saved from input to the system and retrieved to be used by the system. As an important aspect of this project is use of Time Control System. In this section several databases are reviewed for their suitability to this project. Microsoft Access Microsoft Access is Bundles of RDBS with the Microsoft Office. MS Access is widely spread on the windows based PCs. It is dependent on the windows environment therefore it cant be deployed on the Linux or UNIX environment. MS access has a GUI, Which facilitates creating the database tables and their relations, queries, forms and reports. MS Access is one of the best selling databases and it has a lot of support available from Microsoft and this is likely to remain so in the future [13]. MS access has disadvantages. It has data limit of 2GB. It is not ideal to use on the network. MS access has lax security measures to prevent the unauthorized access. These disadvantages would be an issue for this project as the system is likely to be accessed by a multiple users at a time and multimedia files will be run on it, it is very likely to exceed 2GB in size. There is a possible security risk of an MS Access database due to it being stored as a single file if un-trusted sources gain access to the folder it is contained in [14]. Most important drawback of MS Access is that lack of network support. ENB is totally depending on Network environment for communication which is by no means supported by MS Access. MS SQL Server MS SQL Server has been developed by Microsoft and it is their more expensive but more robust alternative to MS Access. MS SQL Server is more commonly used by businesses for small to medium sized databases. MS SQL Server is a high performance database with a bundle of functionality and it also has built in security features for LAN/WAN and web environment. There are free express versions of MS SQL Server that can be downloaded for free, however free versions offer less in functionality [15]. MS SQL Server utilizes Transact-SQL as its primary query language. MS SQL Server allows procedures to be stored within the database comparable to MS Access queries. This reduces load on the network bandwidth because only the variables are sent to the data along with the related procedures to be executed not the entire queries. This method is useful for the regular database queries. The method also protects the database from the injection attacks [16]. Sql server has the following disadvantages. It can only work on Windows environment Professional and Enterprise editions has costly license fee As far the ENB project the Enterprise edition is not required. MySQL MySQL is free open source relational database management system. MySQL is the most popular open source database due to its high performance [17]. MySQL has compatibility with any operating system including Linux, UNIX, Mac and Windows. It can also handle large amounts of data and provides security through user authorization and access privileges [18]. MySQL was designed to use on the internet, due to the high performance and very advance features MySQL is a favourite database for the desktop applications. A disadvantage of MySQL is that it is not ideal to set foreign key references [19]. PostgreSQL PostgreSQL is also an open source RDBMS, it is a platform independent database management system analogous to MySQL, however it has more advance features such as triggers. On implementing all features PostgreSQL performance is slower as compare to MySQL. PostgreSQL is the database of many high profile applications such as Skype and Hi5.com. PostgreSQL database design is more complex than MySQL. Performance of PostgreSQL is relatively slow [19]. Chosen Database Management System On reviewing the above database systems the following analysis are being concluded. Ms Access has been discarded from the selection list. It has no support for the network environment. Due to the network oriented nature of the ENB project the network performance is the core issue. Network performance cant be compromised. It will jeopardize the overall functionality of the project during the network load times. PostgreSQL has similar feature as MySQL. Both are discarded on the grounds of limited GUI support for development and maintenance. Both are not closely integrated with MS VB.Net. MS SQL server 2008 Express editions has been decided to be used as database platform for the ENB project. SQL Server 2008 Express is a correct choice for project to include Multimedia database services. Microsoft SQL Server 2008 is a relational model database server produced by Microsoft. Its primary query languages are T-SQL and ANSI SQL. Due to the limited scoop of the ENB application I will use MS SQL Express Edition. Microsoft SQL Server Express is available at no cost. SQL Server Express edition relational database management system, comprises a database is limited for embedded and smaller-scale applications. Database engine is limited to receive work from a small number of users. It has several technical limitations; therefore it cant be deployed in the enterprise environment. Maximum database size of 4 GB per database. The 4 GB limit applies per database (log files excluded); but in some scenarios users can access more data through the use of multiple interconnected databases. It has the several advantages. The advantages are listed in the following lines. Its free of cost SQL server express edition has all the features required for my ENB project. SQL server express edition has Management studio. Limited support for multiple clients on LAN. SQL management studio will simplify the management and maintenance of the ENB database. Most of the IT technician and administrators are well versed with the MS SQL server. GUI tools will allow administrator to easily troubleshoot the common database issues. Main reason for selecting the SQL server is the TCP/IP pipes. TCP/IP pipes technology is very efficient on network as compare to the traditional TCP/IP packets. Programming Environments An appropriate programming environment is required for the system development. The programming tool must be capable to develop the graphical user interface to display the understandable output to the end user. In the ENB project the end user will the system administrator. It has been selected that MS SQL Server will be used to store the Database so the Programming tool must be able to interact with the MS SQL database. The chosen language should include support for object-oriented implementations. Booch (1998) stated Each object can be viewed as an independent little machine with a distinct role or responsibility [20]. Objected oriented language would allow efficient data parsing. The development in the high level programming tool is simpler than coding in the low level programming environment. Indeed high level programming tool reduces the cost of development as well the time spent on coding. Some of the programming environments are analyzed in the detail. Java Java is an object oriented programming language, developed by Sun Microsystems [21]. Java is a well accepted high-level language. ICN students study java during the firs

Monday, January 20, 2020

Dangers of Social Networking Sites Essay -- Social Networking

Is the current craze of these ubiquitous social networking sites becoming too much to handle? Some say yes, others might disagree. Social networking was created to connect friends and family together. Now, many predators use sites such as Facebook or Myspace to find their prey. This is the source of what parents are stressing about to their children. While many who use social media are enjoying meeting new people, they are also becoming distant from contact with real people and they are involved in a very surprising and dangerous environment. Around 2005, Myspace and Facebook were popping up on many computer screens; they allowed people to create a profile and share everything about themselves to the whole world. When social sites first were developed, they only linked people by their name and address. Since sites such as Xanga, Tagged, and Facebook were gaining so much popularity, more users were logging on, and online predators are becoming a problem. These sites are so easy, that it is not that hard for predators to â€Å"pose† as another person and trick young adults. It is extremely difficult to differentiate the real person that you are looking for from a fake. Young adults claim that social networks can help them connect with their friends and family, and also â€Å"meet like-minded people† ( Metz, par. 1). In some cases, business people such as Ron West, claim that he uses Facebook â€Å"to become acquainted with new customers†( par. 8). Yes, these types of websites are great tools to stay in touch with old classmatesand faraway family members. It is a great source of communication, but there is always a con to every pro. Even though users are connecting with others, users of social networks never know exact... ...r stepsister Jordan. She boarded a plane to the Middle East not knowing what to expect. Of course her parents had figured out, and sent the police to come after Katherine. Katherine had put herself into a dangerous situation because she was getting engaged to a person that she had met on Myspace! She had never even met Abdullah before. A lesson that she should have learned when she was young, was to never speak to strangers. Social networking is becoming increasingly popular which creates more users. These sites contribute to people having faux emotions and more danger also arises. Do users of these sites want to put themselves in dangerous situations like Megan or Katherine? Or do they want to build up a strong relationship with someone and be crushed because it was never real. So be careful when social media is unexpected and dangerous.

Sunday, January 12, 2020

The Necessity Of Computer Security

When the first electronic computers emerged from university and military laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business, government and industry. But few laymen, even if they were aware of the machines, could see the connection. Experts too, were sceptical. Not only were computers huge, expensive, one-of-a-kind devices designed for performing abstruse scientific and military calculations, such as cracking codes and calculations missile trajectories, they were also extremely difficult to handle. Now, it is clear that computers are not only here to stay, but they have a profound effect on society as well. As John McCarthy, Professor of Computer Science at Stanford University, speculated in 1966: â€Å"The computer gives signs of becoming the contemporary counterpart of the steam engine that brought on the industrial revolution – one that is still gathering momentum and whose true nature had yet to be seen. † Today’s applications of computers are vast. They are used to run ordinary household appliances such as televisions and microwaves, to being tools in the workplaces through word processing, spreadsheets, and graphics software, to unning monumental tasks such as being the heart and soul of the nations tax processing department, and managing the project timetables of the Space Shuttle. It is obvious that the computer is now and always will be inexorably linked to our lives, and we have no choice but to accept this technology and learn how to harness its total potential. With any progressing technology, an unauthorized application can almost be found for it. A computer could and has been used for theft and fraud – for example, as a database and manager of illegal activities such as drug trafficking and pornography. However, we must not just consider the harmful applications of the computer, but also take into account the good that they have caused. When society embraced the computer technology, we have to treat this as an extension of what we already have at hand. This means that some problems that we had before the computer era may also arise now, in the form where computers are an accessory to a crime. One of the problems that society has faced ever since the dawn of civilization is privacy. The issue of privacy on the Internet has risen many arguments for and against having it. The issue of privacy has gotten to the oint where the government of the United States has placed a bill promoting a single chip to encrypt all private material on the Internet. Why is privacy so important? Hiding confidential material from intruders does not necessarily mean that what we keep secret it illegal. Since ancient times, people have trusted couriers to carry their messages. We seal out messages in a envelope when sending mail through the postal service. Using computer and encrypting programs to transfer electronic messages securely is not different from sending a letter the old-fashioned way. This paper will examine he modern methods of encrypting messages and analyse why Phil Zimmerman created an extremely powerful civilian encipherment program, called the PGP, for â€Å"Pretty Good Privacy. In particular, by focusing on cryptography, which was originally intended for military use, this paper will examine just how easy it is to conclude why giving civilians a military-grade encrypting program such as the PGP may be dangerous to national security. Therefore, with any type of new technology, this paper will argue that the application of cryptography for civilian purposes is not just a right, but is also a necessity. Increasingly in today’s era of computer technology, not only banks but also businesses and government agencies are turning to encryption. Computer security experts consider it best and most practical way to protect computer data from unauthorized disclosure when transmitted and even when stored on a disk, tape, of the magnetic strip of a credit card. Two encryption systems have led the way in the modern era. One is the single-key system, in which data is both encrypted and decrypted with the same key, a sequence of eight numbers, each between 0 and 127. The other is a 2-key ystem; in this approach to cryptography, a pair of mathematically complementary keys, each containing as many as 200 digits, are used for encryptions and decryption. In contrast with ciphers of earlier generations, where security depended in part on concealing the algorithm, confidentiality of a computer encrypted message hinges solely on the secrecy of the keys. Each system is thought to encrypt a message so inscrutably that the step-by-step mathematical algorithms can be made public without compromising security. The single key system, named the Data Encryption Standard – DES for short — as designed in 1977 as the official method for protecting unclassified computer data in agencies of the American Federal government. Its evolution began in 1973 when the US National Bureau of Standards, responding to public concern about the confidentiality of computerized information outside military and diplomatic channels, invited the submission of data-encryption techniques as the first step towards an encryption scheme intended for public use. The method selected by the bureau as the DES was developed by IBM researchers. During encryption, the DES algorithm divides a message into blocks f eight characters, then enciphers them one after another. Under control of the key, the letters and numbers of each block are scrambled no fewer than 16 times, resulting in eight characters of ciphertext. As good as the DES is, obsolescence will almost certainly overtake it. The life span of encryption systems tends to be short; the older and more widely used a cipher is, the higher the potential payoff if it is cracked, and the greater the likelihood that someone has succeeded. An entirely different approach to encryption, called the 2-key or public- key system, simplifies the problem of key distribution and management. The approach to cryptography eliminates the need for subscribers to share keys that must be kept confidential. In a public-key system, each subscriber has a pair of keys. One of them is the so-called public key, which is freely available to anyone who wishes to communicate with its owner. The other is a secret key, known only to its owner. Though either key can be used to encipher or to decipher data encrypted with its mate, in most instances, the public key is employed for encoding, and the private key for decoding. Thus, anyone can send a secret message to anyone else by using the addressee’s public key to encrypt ts contents. But only the recipient of the message can make sense of it, since only that person has the private key. A public key cryptosystem is called the PGP, for Pretty Good Privacy. Designed by Phil Zimmerman, this program is freely distributed for the purpose of giving the public the knowledge that whatever communications they pass, they can be sure that it is practically unbreakable. PGP generates a public and private key for the user using the RSA technique. The data is then encrypted and decrypted with the IDEA algorithm – which is similar to the DES, but the work factor to decode the encrypted message by brute orce is much higher than what the DES could provide. The reason why the RSA is used only when generating the keys is that the RSA takes a very long time to encrypt an entire document, where using the RSA on the keys takes a mere fraction of the time. At this time, Zimmerman is bing charged by the US government for his effort in developing the PGP. The government considers encryption as a weapon, and they have established regulations controlling or prohibiting the export of munitions. Since the PGP is a powerful encryption program, it is considered and can be used as a powerful weapon and may be a threat to national security. On the Internet, it is clear that many people all over the world are against the US government’s effort on limiting the PGP’s encryption capabilities, and their reason is that the ban infringes on the people’s right to privacy. The PGP must not be treated only as a weapon, for it contains analogies that are not used in wartime. One of them is authentication. The two-key cryptosystem is designed with authentication in mind: Using someone’s public key to encrypt enables only the owner of the private key to decrypt the same message. In the real world, we use our own signature to prove out identity in signing heques or contracts. There exists retina scanners that check the blood vessels in out eyes, as well as fingerprint analysis devices. These use our physical characteristics to prove our identity. A digital signature generated by a public key cryptosystem is much harder to counterfeit because of the mathematics of factoring – which is an advantage over conventional methods of tests for out identity. Another analogy the PGP has with the real world is the need for security. Banks and corporations employ a trusted courier – in the form of an armoured truck or a guard – to transfer sensitive documents or valuables. However, this is expensive for civilian purposes, and the PGP provides the same or better security when securing civilian information. While many argue that limiting the PGP’s abilities are against the people’s right to privacy, the PGP must also be seen as a necessity as we enter the Information Age. There is currently little or no practical and inexpensive way to secure digital information for civilians, and the PGP is an answer to this problem. Computer privacy must not be treated differently than any other method to make private any documents. Rather, we must consider the computer as a tool and se it as an extension of society’s evolution. Clearly the techniques we employ for computer privacy such as encryption, secure transfers and authentication closely mirrors past efforts at privacy and non-criminal efforts. The government is putting more pressure against the distribution of PGP outside of the United States. One of their main reasons was that since it is freely distributed and thus can be modified in such a way that even the vast computational resources of the US government cannot break the PGP’s secured message. The government could now reason that the PGP can provide criminal rganizations a means of secure communications and storage of their activities, and thus make the law enforcement’s job much harder in tracking criminals down and proving them guilty. Also, we must never forget one of out basic human rights – one that many laid their lives for, is freedom. We have the freedom to do anything we wish that is within the law. The government is now attempting to pass a bill promoting a single algorithm to encrypt and decrypt all data that belongs to its citizens. A multitude of people around the world are opposed to this concept, arguing that it is against their freedom and their privacy.