Saturday, November 30, 2019

War is Inescapable Part of Human Experience Essay Example

War is Inescapable Part of Human Experience Paper War is so omnipresent and commonplace in human history that some scientists even claim that peoples war-proneness could be explained by natural predisposition dictated by genes. Even though a military conflict is too complex to be triggered by nothing but an innate inclination, aggression that fuels it seems to be integral to social behavior. Therefore, war can be regarded as an inescapable part of human existence. First of all, war is an essential part of social experience, as it is provoked by inevitable clashing of interests of nations on a global level. Such conflicts arise because of a perceived incompatibility of actions or goals of hostile parties. A good example here is a ;Cold War logic; which only relatively recently stopped prevailing in international policies of the most of developed countries. It refers to the way of perceiving foreign affairs in general as a ;zero sum game;, meaning that there exist only two possibilities victory or defeat. Consequently, human society is prone to war because rival parties see alms of each other as mutually exclusive. Secondly, war often derives from peoples most Innate predisposition to survive in a world where resources are scarce. Such scarcity, has resulted in a some kind of struggle for existence leading back to the times, when ancestors of the Homo Sapiens competed with other species for food and habitat. Although nowadays people do not have to fight for such basic necessities, there always will be things considered to be rare and vital, for Instance, OLL and natural gas. We will write a custom essay sample on War is Inescapable Part of Human Experience specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on War is Inescapable Part of Human Experience specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on War is Inescapable Part of Human Experience specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Thus, It Is one of the most primitive Instincts of fighting for survival which makes one engage In warfare. Last but not least, a military conflict Is a ubiquitous phenomenon because war begets war. There can be seen a recurring pattern In the outbursts of International aggression war spreads In the manner of an Infection, reproducing Itself over and over again. Likewise, hostile attitudes and tensions soar In response to ar-like neighbors, not mentioning such catalyst of an armed conflict as retaliation and blood feuding. For that reason, the International arena Is predisposed to be a theatre of military actions. All In all, there exist a number of arguments proving that war Is an essential part of human experience. First, It Is kindled by Inevitable Incompatibility of Interests and goals. Second, the scarcity of resources has elicited war throughout the history. Third, aggression provokes aggression, repeating Itself In a vicious circle.

Tuesday, November 26, 2019

The Five Best Methods for Taking Notes in College

The Five Best Methods for Taking Notes in College One of the keys to success in college is effective note-taking. Taking quality notes will help you to manage large amounts of complex material. The idea is to summarize what youve learned using your own words. When you focus on key concepts and condense them, it will help you to remember them more effectively. It makes studying and reviewing material a less difficult task. This is key to success on your exams. The type of technique you choose will depend on the course you are taking and your learning style. This guide will take you through how to use some of the most popular and effective methods of note taking.1. The Outline MethodThe outline method is probably the most popular method used by students. This method is perhaps the best when it comes to summarizing the main points of a lecture. The method works best in classes that follow a logical structure. It helps you to structure complex material and reduce it down to the main points. As the name suggests, you use an outline struc ture to list the main topics and subtopics. First, write down the main ideas or topics on the far left of the page. Next, indent and write down a subtopic related to the main topic. Underneath the sub-topic you may want to list any supporting facts or details. Here are a few tips for using this method:Write down the most important points as main topics.List subordinate or sub-topics underneath them after indenting.Make sure to include any relevant details or facts after your sub-topics.Use this method when you have a class with a logical structure. If your professor doesnt use the lecture method or structure, you might want to consider a different method.This method is effective because it reduces complex material to key concepts. It is not as effective in classes that make use of graphs, charts or complex statistics such as math course.Here is an example of how to structure your notes using this method:Outline MethodWrite down your main topic.List your sub-topic related to the main topic.Include any relevant details or facts supporting the topic.2. Concept MappingConcept mapping, also known as mind-mapping, is an effective way of taking notes in classes with interrelated concepts. It is also useful for helping you to go more in-depth about a particular topic. Subjects such as Science, History, or Philosophy are perfect classes for this method. First, begin by drawing a large bubble in the center with the most general topic. Secondly, draw smaller bubbles with other concepts related to this concept. Connect them to the main topic by drawing lines to connect them. Later, you can add other bubbles that add details or further connect the ideas or concepts that you are learning about. Here are some key things to remember when using this method of note-taking:List your main topic in a large bubble in the center of your paper such as Causes of World War 1List the related sub-topics or facts in smaller bubbles connected to the main concept.Later add other small bubbl es with facts that connect the sub-topics if applicable.Use this method when you want to connect concepts and understand how they are interrelated. This would not be effective in classes that demand memorization of large amounts of facts.Use brief descriptions or labels in your bubbles. Do not attempt to write long sentences in your bubbles.Below is an example of the use of this method using a History topic:Concept MappingAn example of Concept Mapping3. The Cornell MethodThe Cornell method has a different layout than many other methods. It involves a large section at the top for the title. In the center is a section for the main notes or concepts divided into two columns. The smaller column on the left is used for questions and key words from the lecture. The larger right column is used for the main notes and key facts. It is best to use abbreviations here to save space. At the bottom is a section for you to summarize what you learned. To summarize information, read what youve writt en and try to rewrite it using your own words. Here are some tips to apply when using this method:This method is effective for most types of lectures.It is a systematic way to summarize material and focus on the main ideas behind the concepts you are learning.It does require some advance planning. Draw your layout before you go into your lecture by hand or using a computer.Place your main topic or title at the top. Reserve the majority of the middle section for the main notes. In the smaller left column, list the keywords or questions. In the larger right column, write down your main notes, using abbreviations when you can. Try and summarize your concepts in the bottom section. If you can put the information in your own words, it will help you to remember it later.Here is an example of the Cornell Method:An example of the Cornell Method4. The Sentence MethodThe sentence method is perhaps the simplest method of taking notes, but it can be effective. When you are taking a course that is fast-paced and involves large amounts of information, this method works best. It involves simply writing down a quick summary sentence for the important facts being covered in a course. This allows you to have pared-down information to just the most important or relevant topics. It doesnt involve any advance planning and can be used for any college class. Here are some things to remember when using this method:Use it to summarize the main facts delivered in a lecture, especially ones that deliver large amounts of information in a fast manner.Every new line should be a separate topic, using headings for the topic if that helps you.This method is great for remembering the main points or facts of a class lecture.It does not require any advance planning to use it.Here is an example of the sentence method:Main topic (listed at the top of the page):A sentence involving relevant details pertaining to the topic.A sentence involving a separate concept/details pertaining to the same topic. A sentence involving a separate concept/details from the first two but related to the same topic.5. The Charting MethodThe charting method is best used to organize more complex material. This would be an effective way to organize statistics or other more detailed information. Set it up similarly to a spreadsheet with specific categories in your columns. This can be done on a computer or can be hand-written. The categories should be comparable and related. It may not be the best way to list information that is hard to categorize. It is also time-consuming, but is highly effective for facts and statistics that need to be memorized. Like the Cornell Method, you will need to draw your columns beforehand or create them using your computer. Keep these tips in mind as you implement this method:Use the charting method to summarize material that requires categorization such as science concepts.Either draw or use your computer to create separate columns before you try and use it.The categorie s that you create should be interrelated. This method is designed specifically to illustrate the interconnectedness of concepts and categories.This is probably not the best method for taking lecture notes. However, it is highly effective when reading textbooks and trying to break down complex material.Below is an example of the charting method using Scientific Classification:An example of the Charting MethodThe method that you use to take notes should depend on the nature of your course and your learning style. If you like to have highly organized summaries of lecture material, the outline method may work best. The outline method works best in classes where material is organized. When you need to learn how concepts are related to one another, the concept mapping method may be most effective. Sometimes, putting key words and concepts together by summarizing them in your own words works best. This involves the use of the Cornell method. If you are taking a class that is fast-paced and involves loads of information, use the sentence method. Use the charting method for courses that require you to use statistics or detailed information.Decide which method works best for you and the course you are taking. Feel free to experiment with different methods to find the right one. Once you do, you will find it easier to digest important information. Effective note-taking leads to effective learning. This will help ensure your success on exams and in your college classes.

Friday, November 22, 2019

Understanding the Darkness of Writer Edgar Allan Poe

Understanding the Darkness of Writer Edgar Allan Poe When trying to get into the mind and works of 19th century American writer Edgar Allan Poe, it is important to first consider his biographical implications – his life experiences – which the influence the work of all artists. His darker works, like the short stories â€Å"The Tell-Tale Heart† and â€Å"The Fall of the House of Usher,† as well as his famous poem â€Å"Annabel Lee,† all deal with death, sickness, the grotesque, the macabre, even insanity. He is a subject studied by many literary scholars, mostly due to his deeply impressionable and penetrating works that are still read and discussed at length today. One can examine Poe’s life experiences, as well as his obsessions and fears, to better understand the meaning behind his most famous works. He experienced death and loss throughout his life, starting from a young age with the untimely death of his mother just a short time after Poe’s father abandoned the family. Also, years later, his young wife, Virginia Poe, died at the age of 24 due to Tuberculosis. Quite naturally, these horrific events had a definite impact on his life and how he related to people, got close to them, and how he saw the life experience, and this naturally seeped into his creative life: his famous writings. Very little of Poe’s life was pleasant, it seems. After achieving literary success with his famous poem â€Å"The Raven† in 1845, Poe – then 36 years of age – seemed to head downhill. He became a literary celebrity quite young, only to die a few years later a broken, ill, lonely and pathetic man on a rainy, empty street one night in Baltimore, Maryland. He was just 40 years of age. Poe was thought to be a drunk, a womanizer, drug addict and a madman. His life was, unfortunately, one of pain, heartache, and suffering – mostly due to the loss of many of his dearest loved ones. Take a look at his most popular works. They are filled with death and horror, tales and stories that even today demonstrate the work of an insane man – maybe even a brilliant one, both of which are often hard to distinguish in Poe’s works. His poem â€Å"Annabel Lee,† tells of a young couple so deeply in love that even the angels in Heaven were envious. They marry but she ultimately falls ill and is taken away from him, she dies too young, and the narrator is left with the cruel memory of the powerful love they shared. This tragic, though famous, poem is evidently the result of losing his young bride, Virginia. It follows the exact same storyline of Poe’s life, and the famous poem was published just a few years after the untimely death of his young bride. This theme of loss, death, and pain runs in other Poe works, as well. In examining â€Å"The Tell-Tale Heart,† his famous, horrific short story, the reader sees the other side of Poe’s dark tendencies. This time, instead of a person losing a loved one, the narrator becomes â€Å"mad† and plays God himself: he kills another person in cold blood because the narrator is obsessed with the man’s frightening â€Å"vulture† eye. Nothing in Poe’s life provides any insight as to this particular tale and this particular indication of mental illness, but one can point to his assumed madness and depression in order to further understand exactly why Poe wrote it. Perhaps he enjoyed the thought of taking the life of another perhaps because God took the life of his closest loved ones. It may have been a revenge fantasy or a defense mechanism. To conclude, writer Edgar Allan Poe was a dark soul who wrote even darker works of English literature. More than 150 years after his death, Poe is still talked about and highly read in classrooms all across the world. In just a short life, he accomplished so much. And it should be acknowledged that he was at least able to turn such a painful experiences into beautiful works of art. His legacy will endure as long as people experience pain and suffering.

Thursday, November 21, 2019

Human sexuality Essay Example | Topics and Well Written Essays - 750 words - 2

Human sexuality - Essay Example Golanty and Edlin (196) describe experiment where persons got alcohol with tonic or tonic without alcohol, and it was told to the randomly taken subjects that they drink alcohol. These persons, regardless whether their drinks contained alcohol or not, demonstrated sexual desire. Alcohol decreases the level of self-control of increases the level of aggression. ‘Alcohol myopia’ when a person ignores negative consequences and is focused on the sexual context is a known result of the alcohol consumption (Bancroft 406). As alcohol decreases control of own behavior, it becomes one of the strongest predictors of the sexual aggression (Rosental 412). Alcohol is just a symbol of establishing the proper sexual behavior. Biological impact of alcohol is harmful for the human sexuality. Chronic alcoholism is the main risk factor. Alcohol decreases sexual desire for both male and female. The most commonly reported problem for male alcoholics is erectile dysfunction. Ejaculatory incompetence, erectile impotence and premature ejaculation occur less frequently. Typical problems of the female alcoholics are lack of orgasm, lack of sexual interest, lack of sexual arousal or pleasure, lack of lubrication, painful intercourse and muscular spasms (Aluko et al. 1281). The mechanisms of alcohol’s impact on the human sexuality are not well understood. It acts as depressant and sedates on the brain cells decelerating the brain activity. The researches results show that chronic intake of alcohol may significantly decrease the level of testosterone for male persons. The low level of testosterone can be a possible explanation for the sexual dysfunctions of male alcoholics. Another effect of alcohol the retardation of blood congestion and swelling in the genitals, as well as decrease of the vaginal blood volume. It can explain the erectile dysfunction due to altered blood flow to genitalia and/or

Tuesday, November 19, 2019

Physical Abuse to Children Essay Example | Topics and Well Written Essays - 1000 words

Physical Abuse to Children - Essay Example This research will begin with the statement that children need to be protected from any and all forms of abuse. It is evident from research carried out by different studies that most children are often exposed to one form of abuse or another at some point in their lives. In order to safeguard and protect the growth and development of a child, it is crucial to ensure that the environment in which they are exposed to is free from any and all forms of abuse. This may make it possible for them to grow and develop into individuals who are keen on helping shape society, rather than destroy it. Physical abuse is just one form of abuse that a child may experience growing up, and in some cases, may lead to the child’s death. It is not correct or fair to insinuate that among all the forms of abuse known, physical abuse may be the most dangerous. This is because all forms of abuse leave the child scarred and mentally afflicted for life. There are legislations that are in place that try a nd ensure children are protected and their rights safeguarded against any form of abuse. However, this has not stopped carers, parents, siblings, or guardians from physically abusing children. Working Together to Safeguard Children identifies physical abuse of children as poisoning, shaking, burning, scalding, and even drowning them. The distress caused by such actions often show up later in children as they tend to act out or carry out similar actions against others.

Saturday, November 16, 2019

Training And Development Analysis Essay Example for Free

Training And Development Analysis Essay Training and education have been increasingly conceived as contributing to the quality and productivity of work and thus the profitability of the organization. When good employees are hired, the organization is benefited by investing in their skill development. The training and development of the employees serve many purposes, apart from quality and productivity improvement. The organization becomes ready to adopt advanced technologies and is also able to find replacements when personnel move up the organization or leave it (ZeroMillion, 2002). Employees become more efficient and motivated and the organization also has adequate human resources for its expansion plans. In earlier times, people were selected and developed as managers based on knowledge of their work and understanding of the organization’s requirements. Workers were told on the requirements and expectations of the management, and the workers delivered it. There were no programs directed at career counseling and performance reviews. The need for stress counseling, interpersonal skills improvement, career advancement, recognition and rewarding was not felt. However in the 1950s to 1980s, the management began focusing on the need to train on core functioning areas like planning, finance, sales and accounting etc. Participants deeply involved themselves on a topic and then moved to another topic. Most management schools did not emphasize on an integrated curriculum of all topics. These managers could hardly solve problems as problems were integrated and the approach to solving them was only restricted to the topic relevant. A manager can solve problems effectively by integrating his knowledge and expertise across various domains. With wider recognition of human relations aspect in managing organizations, training programs were developed to improve efficiency and productivity through coaching, motivation, career development etc. (McNamara, 1997)   Today management schools review diverse management topics, analyze them, and apply that understanding to workplace requirement. Training and development play a vital role in an organization’s attempt of total quality (TQ). Training workshops facilitate stimulation of the attendees’ interest and knowledge, which would drive them towards TQ realization. When training workshops fail to encourage the attendees towards TQ realization, then such workshops have very little or no bearing. Many management personnel believe that interest in TQ would be automatically inculcated when employees mingle and share with each other. Thus, they anticipate great positive changes with every training session. However, many people in the managerial and supervisory roles would see the impending changes as a threat to their position and authority, and therefore indulge in tactics to avoid the implementation of changes. Training can bring about changes and wonders when planned and implemented properly. It should be noted here that training is not considered necessary by all companies, as most training events and sessions cannot be directly attributed to outcomes. Therefore some managers tend to perceive training as a luxury of larger companies who can afford to absorb the costs. Training initiatives need to be related to specific outcomes (Atkinson, 1998). By appropriate planning, the trainer is focused to deliver positive and tangible outcomes. When training is managed properly, the required changes or outcomes are successfully realized. However generalized training using inappropriate material, video presentations and irrelevant case studies are more directed towards the self interest of the trainer rather than the organization. Along with technological innovation and, research and development, training and development is also one of the most important investments a company can make for its progress. The quality of the employees is determined by their experiences and exposure within the organization. When these experiences are restricted in terms of time or opportunity for development, then the employees cannot be expected to solve bigger problems. The employees only tend to keep improving their expertise within the scope of their narrow field. Training in management is similar to athletic training in several ways. In athletics, the successful coachers are those who have undergone similar experiences like those of their trainees. The coach here understands how skills are acquired and how mental blocks like attitudes, hinder effective training. The athletic coach wouldn’t straight away plan a training strategy to make the athlete competitive for the Olympics.   The coachers learn the past performances of the athletes, their ups and downs and appropriately design training strategies. Similarly in management training too, the earlier experience and performance of the managers, their strengths and weaknesses are looked into, while planning their training. Past experiences and its associated success and failures, would help in predicting future behavior with and without training. Sometimes training can create problems by fueling hostility from mangers, mainly because of previous disappointments and sustained ill repute, rendering the training a waste of time and resources. However, determined policy makers can convert hostility into meaningful partnerships. Effective partnering can be developed by trainers crediting success and achievements to the managers. Historically, disappointments associated with training are less intense and take longer time to surface. This is because of the strategy adopted by trainers to play safe by ensuring their programs look successful. The trainers incorporate only standard, mild designs and methods to avoid slipping on the outcomes and attempt to camouflage this by asking for more time, staff and resource requirements. Even when managers have a slight positive attitude, there exists opportunities for better collaboration. Such managers would only demand evidence of the worth of the training. The training partner should welcome this and be ready to slow proof. Managers may sometimes want trainers to design programs or modify them to address their needs. By appropriately creating or modifying programs, a partnership is forged and strengthened. There are other managers who support training and partner with it without any critical examination. These managers don’t listen or speculate on informal concerns and go about answering, signing and scheduling the training. Such kind of cooperation and support would be sufficient for training programs that have been well established. However for training associated with change strategies, this support would not be sufficient. When managers presume ownership of training and are in charge of training, they assume a powerful role (Lynton and Pareek, 2000). They actively participate with the trainers and explore opportunities, options and situations for effective training. Proceeding further, managers acquire required competencies in training and join the training team. Managers have detailed understanding of the work settings and work process and their presence in the training team can be very beneficial. Preparing a training budget is an important administrative responsibility of the training manager. An organization’s concern for training is reflected by the amount sanctioned for training against the requested, budgeted amount. It is important for training managers to strive hard to position training within the organization as something that would enable employees to gain what the organization wants them to acquire. Training should not be perceived by internal customers as a mere classroom program or a teaching department. When, due to any finance crunches, budget cutting is required; it would most probably come down to the training budget. However, if the organization at any later date wants to impart some training or sees a need for training, can easily bring in funds from other programs or departments. Thus learning, if deemed necessary, would always be funded. An organization funds its training programs in several ways. Some organizations have a central training budget from where funds are efficiently transferred to the training department to take care of the organization’s training needs. Sometimes the training department is allocated sufficient money to run its own affairs, like its department’s salaries, supplies and over heads etc. The funds required for the conduct of the programs comes from the budgets of the departments requiring the training. The training department normally raises a charge for its services. Organizations use various terminologies for its budget like budget accounts or chart of accounts; and its own terminology for budgeted items. However a typical budget for the training department includes salaries, benefits, recruitment, consulting, supplies, postage, travel, communications etc. After allocation of funds, the training department tracks its spending on the basis of the same categories. Using a spread sheet, a report is generated showing the expenses for each category in the current month, year-to-date expenses, budget amount for the year and the remainder left for the year. All organizations have their own policies and format for reporting financial data and the training manager too has to conform to this. Employees rely on training, not only to improve their expertise on their current job, but also to help them prepare for responsibilities and prospects. Each job must be designed to provide opportunities for learning and growth. The jobs must be able to enhance skill variety, incorporate task significance and also include autonomy and feedback. Job dissatisfaction is an obvious outcome caused by jobs that are seemingly unrewarding in themselves. Employee resignations and turnover is also increased when people are not trained properly. Employees begin to feel that the demands made on them cannot be fully delivered without proper training. When new employees are not provided adequate training, they experience an ‘induction crises’. Learning and training programs raise existing skills and competences among employees to expected standards, while increasing their morale and confidence. Employees must be encouraged to acquire new skills so that they can assume bigger responsibilities and perform various tasks. Such multi-tasking would also help them to earn more under skill-competency based pay structure. Training is very important when organizations experience change. All successful change implementation efforts need to be supported by enabling structures like retention programs, rewards system and outplacement programs. Retention programs are very crucial as change implementation can turn out to be a major cause for employee turn over. Employees are generally encouraged to those aspects of work, which are rewarded and discard those aspects, which are not rewarded. Thus employees can be reallocated by appropriate training. Sometimes, change implementation may involve downsizing. However, the organization should work out to ensure minimal damage by downsizing, as downsizing can jeopardize any change implementation effort. Before laying off any employee, the manager must consider if the employee has any skills that can be deployed in another position or division of the organization. Here again the prospects of training for adapting is considered. Only when the employee looks incapable of acquiring newer skills or when the employee is not very enthusiastic of training should lay off be considered. If layoff is inevitable, the organization should ensure that a comprehensive outplacement services are offered to him, so that the employee holds the organization in high esteem in his further association with the industry (Harvard, 2005). When organizations introduce technological changes, the work processes are changed and training is required to help employees to perform their new responsibilities with ease and confidence. The machine and its human operator are two complementary units of the work process, and none can replace the other. Science-driven changes are fast and multidirectional. The impact of technology and its bearing on competition is very vast. Different technologies have varying impact on management systems. Technologies used in their work processing in banking, insurance, production line etc., require system redesign and new operator skills. In steel and power generation plants, the central control is carried out by electronic technology. Genetic, bioengineering and instrumentation technology backed procedures require considerable amount of decentralization and cooperation at operator levels. Thus change of technology or introduction of new technology into the work cycle, create certain demands to redesign the work process and work environment, for which training is necessary (Saini and Khan). While training programs are mainly proposed at the employer levels, work unions can also play a crucial role in training and development. The achievements of British trade unions is a standing example of what it can achieve for its members when it’s focused on training and learning. During the last few years, the British trade unions have adopted training and learning as an important element of their agenda. The role of unions in establishing ‘learning agreements’ with employers, creating union learning representative (ULR) and several union learning programs are seen as success stories associated with unions. Unions have also been provided a stakeholder role in the vocational education and training system (VET). Today, most of the important institutional bodies include a formal representation of unions. Unions are represented in the learning skills council (LSC) and the sector skills council (SSC). New sector skills agreements and regional skills agreements have been formed in sectors where unions are present. The Trade Union Congress (TUC) has a formal representation on the National Skills Alliance to advice government on the implementation and progress of skills strategy. Although unions have very limited role at the policy formulation level, they have a larger new role in improving workplace learning. The establishment of the union learning representative is perceived as an innovation of the central union. The role of the representative is to support and motivate workers in taking up workplace learning. The success of workplace learning is evident from the associated facts and figures. As of December 2006, the TUC claims to have trained over 13,000 ULRs. More than 3000 workplaces have been covered with over 450 union learning projects, while over 67,000 learners benefit from these courses each year. There have also been many cases where unions have been in partnership with employers to develop learning and skills acquirement. It is important to note here that employers and employees perceive training and training success in different ways. Employers prefer to develop-specific skills that directly help their business. Union and employees on the other hand, would want to develop broad transferable skills, which can help in an individual’s employment and career. Such programs are very valuable to the employees and sometimes be a life changing experience for many. It helps them to advance their career, while also encouraging them to become more active in the union. A unionlearn random postal survey has highlighted an enormous latent demand for learning (Unionlearn, 2007)  Ã‚   Over 96% of respondents agreed or strongly agreed that it is important to always be learning. People also wanted to take to learning for various reasons. About 81% of people wanted to study for their personal development or as a leisure time activity, while 56% wanted to learn, to benefit at their work. Sometimes workplace training is imparted remotely too through e-learning. The benefits of technology in learning is not just restricted to classroom learning alone, but also to workplace learning. The workplace trainer here needs to have appropriate teaching skills to help the understanding of remote students. The remote workplace trainer requires technology-based instructing skills, comparable to that of an academic teacher. In the coming years, probably all teachers, academic or workplace, would be trained to handle remote teaching, given the trend of e-learning. Successful e-learning for the American workforce calls for combined action by the public and private sectors. Quality issues, assessment and certification, and access to e-learning opportunities are vital areas that need to be focused to make e-learning more beneficial. Business houses need to realize the potential of e-learning and integrate e-learning into their strategies and operations. A training program is designed based on the assessed needs or requirement of the members.   The learning needs are separated into groups and the groups connected in a logical manner. Each group is then associated with goals or outcomes to be realized at the end of the training program. The goals are split into learning objectives, which are specific requirements that a trainee must know or be capable of, once the program is completed. For instance, if an organization’s needs are assessed and found that its supervisors should learn more on performance management, then the training program should have the following outcomes: 1) Supervisors should know the company policy on performance management. 2) Supervisors should manage employee performance only according to the rules and procedures of the company. 3) Supervisors must conduct themselves with the legal limits when addressing performance management issues. When a training program is to designed, it is essential that all departments are involved in it with the training department (O’Connor, Bronner and Delaney, 2003). A wider representation and involvement is necessary as the training outcomes would virtually affect everyone in the organization. The design team should also be represented by members from HR and Legal Departments. Based on the identified needs and the training outcomes, the duration of the training program and the modules are planned. The training professional must ensure that the program activity incorporate good instructional and adult learning principles. The program should have various activities giving priority to group work and interaction than individual readings or lectures. The programs should reflect the organizational culture while being focused on individual learning. The design of the training program should have relevance to the experience and knowledge existing already with the participants. The program should stop once the required learning has been accomplished. Segmenting a designed program helps the training team and the participants to focus on packets of contents, one at a time, for more clarity. The program content may be divided into days, with each day divided into units and each unit divided into modules. The effectiveness of a training session can be evaluated by several parameters. The training can be said to be efficient and effective when it has achieved its objectives. The validity of the training is determined by ascertaining whether the training has been able to solve problems associated with output, service and outflow. The validity of the training program is also seen from the perspective of the participants, whether it has met their needs.   The training program is evaluated by measuring the overall cost benefit of the program while validation is the judgment of objectives achievement. Using a series of tests and assessments, internal validation can be carried out to ascertain whether the participants have acquired knowledge, skills or experienced attitude modification. Common measuring instruments are the opinion of the attendees, opinion of trainers, opinion of managers and opinion of peers and colleagues.   The knowledge gained by training can also assessed through oral, written, objective or practical tests. The skills acquired can be assessed by asking the trainee to demonstrate the skills with a checklist and without a checklist, before judges (Ramaswami, 1992). The checklist must reflect the actions or procedures required to be performed. The attitudes of trainees are measured by actual observation of behavior, by judges, or by an attitude scale for reference. Apart from the training imparted, it has been perceived that certain attributes of the trainer itself can contribute to the influence of the participants. When the trainer is prepared and confident, the participants are convinced and feel at ease. When the trainer is enthusiastic and purpose-oriented, the trainees become interested and get a clear objective. The responsibility and involvement in enhancing productivity has gradually shifted from the management level executives to the capable and knowledgeable workers. The management facilitates and encourages workers to work independently and determine ways of doing things in a better way. This approach is significantly different from its earlier approach of controlling and instructing workers. The management also wants its employees to share their knowledge and expertise with others so that the organization benefits from the new knowledge. With more work being automated, workers have to think of ways and techniques appropriate to the speed and requirements of the automated facility. Learning is necessary to realize and understand better, the ways to doing things that would benefit the customer. Learning is very different from training, which is imparting of skills required for a particular task or work requirement. Learning is an ongoing process, which doesn’t require exclusive sessions or classes; and is perhaps the heart of productive activity (Thite, 2004). Given the globalization and intense competition in the market place, a suitable idea from anyone is appreciated as long as it contributes to process improvement. Ideas even help transform organizations by breaking new grounds. People are encouraged to think of solutions and apply them to their daily work. Organizations need to realize the power of learning and benefit from it to successfully face global competition. REFERENCES Unionlearn.(2007) The role of trade unions in the formation and distribution of learning and skills, [Electronic Version] downloaded on 12th May, 2008 from http://www.unionlearn.org.uk/policy/learn-2042-f0.pdf ZeroMillion (2002). Employee training and Development [Electronic Version] downloaded on 13th May, 2008 from 4. Employee Training and Development McNamara C. (1997) Brief History of Management training and Development. [Electronic Version] downloaded on 13th May, 2008 from http://www.managementhelp.org/mgmt_dev/history/history.htm Atkinson P., (1998) Creating Culture Change; Strategies for Success, Jaico Publishing House O’Connor, Bronner and Delaney (2003) Training for Organizations, Thomson Learning, Singapore Ramaswami N, (1992) A Handbook of Training Development, T.R. Publications Lynton R.P, Pareek U., (2000) Training for Organizational Transformation Sage Publications    Harvard (2005), The Essentials of Managing Change and Transition. Publisher: Harvard Business School Press. Thite M., (2004). Managing People in the New Economy. Response Books. Sage Publication Saini D.S, Khan S.A., (2000), (Eds) Human Resource Management. Perspectives for the New Era, Publisher: Response Books, Year of publication 2000.

Thursday, November 14, 2019

Theories of Management :: Buisness Management

Management plays a significant role in how business operates. The diversity of approaches to the theoretical and practical background of management has come up with versions of what is meant by such key words as management and organization. The academia views expressed in relation to management theories take a different role than that prescribed to managers. There has not been any concrete definition of management even though the classic definition of Henri fayol still remains contention to be the preferred choice after eighty years. In the context of what is required I will like to elaborate on the following journals which I will vividly explain in assignment two. David J. Lemak (2004) explains clearly the path through that management theory jungle and how entangled theories have brought about conflict and confusion. It recommends using management discipline rather than trying to meander our way through the jungle of numerous theories and â€Å"schools of thought†. This approach was set by koontz and it explains the discipline of management. David lamond (2005) also touched on how to absorb the past in order to understand the present and enlighten the future. According to (Leonard et al, 2004) they explored on how great ideologies turn to become great works. The paper also explains how Frederick Taylor â€Å"spread the gospel† of scientific management. It also sites example and explain how the theory of scientific management came to being and how it used in both private and public organisation. In addition, Amandi et al, (2004) makes us understand issues related to leadership decision and also gives a clear overview on leadership theories. It clearly makes us understands the difference between a manger and a leader as well as the behavioural and trait aspect of leaders. Sahadevan et al, (2004) explains grounded theory approach to analyze the quality of responses from authors and to gain in depth knowledge from the authors of great works that might be helpful to scholars and practitioners involved in the process of developing fresh understanding in organizations.

Monday, November 11, 2019

Mitigating Computer Fraud in the Online Environment Essay

Crime on the Internet is creating stunning losses for people as well as organizations of all kinds (Internet Crime Complaint Center, 2009; Mensch & Wilkie, 2011). The necessity to inform and educate faculty, staff, and students of the diversity of threats and methods to protect and mitigate organizations and individuals from these threats is practically a moral imperative. People who lack the fundamental skills and knowledge to safeguard themselves and the institutions they attend or work for, cost those institutions and themselves billions of dollars every year, and the cost is rising (Custer, 2010; Internet Crime Complaint Center, 2009). This lack of fundamental skills and knowledge paired with the overall lack of education and information security by a preponderance of educational institutions and business makes it progressively more probable that cybercrime damages and costs will continue to burgeon (Guy & Lownes-Jackson, 2011; Khansa & Liginlal, 2009). In 2011, the fiscal cost of cybercrime was valued at 114 billion dollars (Ivan, Milodin, & Sbora, 2012). Responding to the escalated danger to educational organizations from cybercrime, a number of schools have been assigned to create programs for training students in Information Security Management (Kuzma, Kenney, & Philippe, 2009). Consistent with the necessity for instruction is the subsequent discussion of cyber threats and responses to them. Threats in an Online Environment Spam is the sending of unsolicited e-mails to unsuspecting victims. Spam is responsible for many of the threats that will be discussed (Burgunder, 2011). Spam harmfully effects computer systems because it’s sheer volume, with eighty percent or more of e-mail shown to be spam. Spam affords the method of deploying numerous kinds of threats. These threats can be divided into application based threats and human based threats. According to two international studies, businesses do not put sufficient emphasis on information technology security (Labodi & Michelberger, 2010). Human-based Threats Viruses, spyware, zombies, bots, and worms are all computer programs that are applied to destroy, corrupt, or glean data (Burgunder, 2011; Ivan et al., 2012). These are examples of human-based threats since systems are affected as a consequence of something that a human does. A virus is a computer program that typically contaminates systems through a spam e-mail or by clicking of a random advertisement, and then replicates itself over and over again. Trojan horses are a nonreplicating type of virus that appears useful, but is intended to corrupt or destroy files and programs. Spyware is designed to facilitate identify theft by delivering personal identifying data to cybercriminals. Zombies and bots can perform helpful purposes, but are used to collect data concerning the utilization of a system or computer. Worms are similar to viruses but do not need to piggyback on a file to be delivered from one system to another. Federal laws enacted make it a crime to deliberately generate harm to any computer system (Burgunder, 2011). Phishing is when someone poses as a legitimate company to collect personal information from unknowing victims. Phishing typically begins with an authoritative looking and sounding e-mail that directs the victim to a website that appears to be a legitimate business but is utilized to collect personal data (Burgunder, 2011; Custer, 2010). Phishing is currently the most widespread and well-known technique of fraud by electronic measures (Ivan et al., 2012). Software programs that either utilize a rainbow table or endeavor to deduce a password to get into a database or network is considered password sniffing (Kara & Atalay, 2012). After an administrator’s password is deduced it is probable that further accounts will be breached (Custer, 2010 Much too frequently transferable data with a person’s identifiable data is kept by means that were not constructed for security and not counted in a data security strategy (Custer, 2010). The greatest percentage of thefts of private information is from incorrectly stored backup tapes, external hard drives, or laptops. Existing laws order companies to alert affected individuals of a potential breach of their data. It is expected that the price tag of the typical breach of educational data will span from $210,000 to as much as $4 million from the costs of notifying affected individuals alone (Custer, 2010). Still, another type of cybercrime concerning human error is scams. In 2011 more than 20,000 recorded infringements involved four types of crime (Internet Crime Complaint Center, 2011). One of these types was FBI-related scams, in which someone impersonates a FBI agent to cheat victims, while another is personal identity theft, in which someone uses the victim’s personal identifying data to perpetrate a crime. The other two types are advanced fee fraud, in which a perpetrator persuades the victim to pay a fee to acquire something of value but without ever providing it and the non-delivery of products, in which the victim pays for merchandise that never arrives (Internet Crime Complaint Center, 2011; Ivan et al., 2012). Increasingly, information breaches happen because of resentful or dissatisfied employees (Custer, 2010). Presently, the main risk to data’s confidentiality, availability, and integrity within a company is careless treatment or purposeful destruction by in-house employees (Labodi & Michelberger, 2010). It is unusual for small or medium companies to pay much time or attention to the harm that insufficiently educated or malicious employees can cause. Application-based Threats Usually when security is penetrated from outside it is because of vulnerabilities or configuration errors connected to applications installed on networks and computers (Custer, 2010). The Open Web Application Security Project (OWASP) enumerates 162 vulnerabilities a standard software application may contain that could be manipulated. Two of the most often abused application vulnerabilities are injection flaws and cross-site scripting (Custer, 2010). Cross-site scripting incorporates extra code in a HTTP response message that gets implemented if the vulnerability is not detected and prevented. The implementation of this code could involve dispatching the session cookie to someone who could then utilize that cookie to do damage (Custer, 2010). Current scrutiny estimates that poorly written and protected web pages permit as much as forty percent of information breaches by means of cross-site scripting (Custer, 2010). A database language that permits the retrieval and manipulation of objects and data on a relational database management system is the Structured Query Language (SQL). SQL injection attacks permits invaders to make several harmful changes. One possibility is to cause repudiation problems such as changing balances or voiding transactions. Another possibility is to meddle with data by allowing full disclosure of all information on the system or to eliminate the information or make it unavailable. A disturbing possibility is to make the intruder the administrator of the database server. The vulnerability happens when no effort is made to authenticate the user information, this makes it possible for an experienced user to input data in such a way to displace the real function of the SQL, and implement code for nefarious purposes (Custer, 2010). Between ten to twenty percent of information breaches happen because of web pages that vigorously generate statements against the database without authenticating the statements before proceeding to execution (Custer, 2010). Threat Responses in an Online Environment The necessity to develop, plan, and, most importantly, implement IT security awareness instruction is essential to guarantee the security of faculty, student, and institutional information (Mensch & Wilkie, 2011). Today’s systems have key security components such as spam filters and intrusion detection systems (Ivan et al., 2012). These components can expose unauthorized admission and filter electronic communications that are deemed high risk. Some information breaches happen because of system invasion and extraordinary technical talents of criminals. However, the majority happen because of human error and are founded more on inventiveness and cleverness (Ivan et al., 2012). Needed are policies, awareness and technology, education and training to ensure data security for both organizations and individuals (Mensch & Wilkie, 2011). Responding to Human-based Threats There are several actions that can be taken to eliminate or minimize the threats posed by viruses, spyware, zombies, bots, and worms. Installing a virus detecting software, then keeping it current, and confirming that it operates on a regular schedule is the principal defense for these threats. Additionally, a browser add-in that verifies web site ratings prior to permitting routing to a site should be installed and it will also warn users when they may be making a questionable or unsafe Internet selection. Furthermore, browser pop-up blockers reduce the frequency of successful infringement of this kind (Mensch & Wilkie, 2011). Finally, a security information awareness program should teach faculty, staff, and students concerning the gravity of the danger and the potential cost of their actions. Phishing is so widespread and flourishing due to the inexperience of users. An adequate amount of education and training is the key to alleviating the success of a phishing tactic (Ivan et al. , 2012). The way to mitigate or eliminate password sniffing is to teach all users on all systems to utilize hardened passwords. A hardened password is deemed to be a password that is changed at least every 90 days, with at least eight characters with one being a different case from the rest of the password, one is a special character, and at least one is a number (Custer, 2010). It is also essential that each user use a special hardened password for every system and that these hardened passwords not be recorded in a manner that can be discovered. An even superior remedy for sensitive information is a two-factor authentication that requests something the user has, such as a random digit produced by a miniature hardware token and something the user knows, like a password (Custer, 2010). A suggestion for IT professionals is to consider how they would transport over $200,000, and use comparable common sense and caution in their treatment of private information and the vehicle on which it is stored (Custer 2010). Also, it is recommended that any portable device use whole disk encryption and consequently if it is misplaced or stolen then information is rendered unreadable. Another method for decreasing human error is to inform users of the most predominant scams so they are prepared and less likely to be fooled (Ivan et al., 2012). The Internet Crime Complaint Center issues guidelines for performing business online (2011). A curriculum to maintain and increase data security awareness among staff, faculty, and students has a considerably inconsequential cost when equated to the conceivable costs of a security breach, but does entail consistency in application (Labodi & Michelberger, 2010). Responding to Application-based Threats The FBI reported that ninety percent of security infiltrations is from recognized problems. Assistive services have been designed that will permit companies to test their systems for these problems. Running these tests and then repairing any problems that are detected is vital to protect the system from the majority of security infiltrations (Custer, 2010). Also, creating a policy of regular system tests will most likely ensure that these types of system infiltrations will not occur. The most effective way to guard against SQL infiltration is centered on solid input validation (Ivan et al., 2012). Products exist that can be installed on systems to test a web site’s security ratings. Cross-site scripting can be curtailed through the utilization of such products. Conclusion Information technology security must be first and foremost for an organization. The protection of faculty, staff, and student personal data is critical to individual privacy and, furthermore, to the finances and reputation of the organization. Dangers to IT security come from weaknesses intrinsic to the use of compound software products and from human error. The educational organization’s IT team is responsible for averting the occurrence of information breaches and implementing appropriate tactics to diminish the damage of a data breach if it occurs. Information Security plans outline the security procedures that must be taken by an institution and should include both strategic and high level as well as operational and detailed. A key element in any information security plan must be the education and training of the individuals who have access to information. References Burgunder, L. B. (2011). Legal aspects of managing technology (5th ed.). Mason, OH: South-Western Cengage Learning. Custer, W. L. (2010). Information security issues in higher education and institutional research. New Directions for Institutional Research, 146, 23-49. doi:10.1002/ir.341 Guy, R., & Lownes-Jackson, M. (2011). Business continuity strategies: An assessment of planning, preparedness, response and recovery activities for emergency disasters. Review of Management Innovation & Creativity, 4(9), 55-69. Retrieved from http://www.intellectbase.org/articles.php?journal=RMIC&volume=4&issue=9 Internet Crime Complaint Center. (2011). Internet Crime Report. Washington, DC: National White Collar Crime Center and the Federal Bureau of Investigation. Retrieved from http://www.ic3.gov/media/annualreport/2011_ic3report.pdf Ivan, I., Milodin, D., & Sbora, C. (2012). Non security – Premise of cybercrime. Theoretical and Applied Economics, 19(4), 59-78. Retrieved from http://www.ectap.ro/ Khansa, L., & Liginlal, D. (2009). Quantifying the benefits of investing in information security. Communications of the ACM, 52(11), 113-117. doi:10.1145/1592761.1592789 Kuzma, J. M., Kenney, S., & Philippe, T. (2010). Creating an information technology security program for educators. International Journal of Business Research, 10(1), 172-180. Retrieved from http://www.iabe.org/domains/iabe/journal.aspx?journalid=12 Labodi, C., & Michelberger, P. (2010). Necessity or challenge – information security for small and medium enterprises. Annals of the University of Petrosani Economics, 10(3), 207-216. Retrieved from http://www.upet.ro/anale/economie/pdf/20100322.pdf Mensch, S., & Wilkie, L. (2011). Information security activities of college students: An exploratory study. Academy of Information and Management Sciences Journal, 14(2), 91-116. Retrieved from http://www.alliedacademies.org/Publications/Papers/AIMSJ_Vol_14_No_2_2011%20p%2091-116.pdf

Saturday, November 9, 2019

Allpied Behavioral Analysis

According to what we have so far is that his parents are divorcing this alone can be the cause of the problem and his actions are channeled through his disruptive behavior. It is possible that Cameron has lost the ability to process information due to the nature of the stress he is expose, lack of sleep greatly reduces mental capabilities because of the lack of integration of memories. When the brain and body re not restored from the day before stress hormones like cortical are deposit in the central nervous and limbic system causing a negative reaction and can affect our memory (Seabrook, 2012). Stress is a psychological response resulting from a physical or psychological treat.Children that are exposed to several day of stressful situation (like in the case of Cameron) frequently have poor self-esteem, poor frustration tolerance, depressed mood and temper outburst. However, individual responses differ according to an array of factors, and most relate to the development of effective opining skills, resiliency, experience with stresses, and susceptibility to strong messages (Seabrook, 2012), which in Cameraman's case is what perceive in his family what triggers or active the stress response. 3) How might his intelligence be affected by his attention problems? What problems might he have in using his intelligence to adapt to school situations?In Cameron case his intelligence may not be affected however, his working memory that is the basic component of intelligence is the one being affected. Working memory is also the influences to perform on test and in schools assignments. Not only do changes in the brain directly affect psychological functions, but the training of psychological functions may produce changes in the brain as well (Matthias & Alcohol, 2010). In another word Cameron problem may lead to other concern that have nothing to do with intelligence, however, his difficulty to adapt to he school situation may lead him to peer rejection and resulting feeli ngs of depression or anxiety.Finally other risk factors such as drug and alcohol abuse, and social-cognitive deficits may be expected by his continuous behavior. 4)Propose some specific strategies/activities that you might use to help him to increase his ability to direct his attention. There are a wide range of approaches but the earlier the intervention the better changes for success in treating Cameron will have. One of the suggestions will be through parenting skill and education. However, they are getting onto a divorce so they will need help for themselves, so I will concentrate my efforts to make Cameron more susceptible to a treatment he will successfully achieve.A cognitive behavioral therapy may assist the Cameron to manage his impulsive behavior, focusing in encouraging and rewarding appropriate behavior. Social skill training to increase flexibility and improve social skills and therapy to assist with problem solving and decrease negativism. There are also few medication that may be helpful control his emotion and sudden outburst of anger but I would left that out for owe and concentrate in getting him the ability to concentrate in doing better at school by reinforcing his working memory and meta-cognition. In conclusion, many authorities have indicate that oppositional defiant disorder is more prevalent when structure in the home is out of balance, when there is either too much structure or not enough.

Thursday, November 7, 2019

Chinese Company Research

Chinese Company Research Company summary HSBC was founded in 1865 in Shanghai and Hong Kong. It is a wholly owned subsidiary of HSBC group which has over 7,000 offices around the world. The bank’s headquarter is located in Hong Kong and serves about 570 branches in 20 countries and regions within the Asian-Pacific region.Advertising We will write a custom research paper sample on Chinese Company Research specifically for you for only $16.05 $11/page Learn More The bank provides a wide range of banking and financial services, and is among the world’s leading organizations in the industry. Together with its subsidiaries, the bank holds consolidated assets worth HK$5,607 billion and reported total revenue of HK$187,559 million as at the end of FY 2011 (HSBC, 2011). In addition to being the source of employment, HSBC is engaged in Corporate Social Responsibility (CSR) as well as other non-business activities that are important to the banking business. Company performance O ne of the major achievements of HSBC in the last five years is the establishment of HSBC Bank (China) Company Limited. The subsidiary is among the leading foreign investors in the Mainland China with investments worth US$5 billion. The impact of this HSBC growth occurred when they launched gold-exchange business and became the first and only financial institution to conduct business as a party of the Shanghai Gold Exchange in 2008. Other notable developments include the expansion of banking and financial services by individual subsidiaries. The consequence of these developments has been the continued increase in revenues which lead to profitability. The FY2010 indicated an increase of HK$12,201 million to reach HK$57,597 million as compared to HK$36,787 million in FY2009. The profits for FY2011 were HK$67,591 million which increased by HK$9,994 million (HSBC, 2011). This growth in profit is expected to continue as the bank continues to capture new markets. Business strategies HSBC a nd its subsidiaries provide banking and other financial services across the globe. The bank provides personal financial services including mortgages, private loans, wealth management, savings account, credit cards, foreign exchanges, customer lending, international payments and insurance policies. The bank also offers commercial banking services such as foreign trade financing, treasury and capital markets, investment finance services and commercial cards.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The firm’s international banking provides financial solutions and investment banking; world asset management and capital investment products; and market operations that provide services in credit. HSBC operates in about 21 countries and regions. The areas of operations are divided into several territory including the Asian-Pacific, China, Europe, MENA region and Afr ica. Competitive position The HK and Shanghai Banking Corporation Limited is probably the most competitive bank in terms of revenue acquisition when compared with other Chinese banks. In terms of assets and capital, the bank is the leader. However, this competitive position is attributed to the global presence of its banking and financial markets. Other banks such as Industrial and Commercial Bank of China, China Construction bank and Bank of China have indicated better performance at the local level. Indeed, the profit growth rate of the Bank of China is much higher than that of HSBC and its global expansion is a big threat. Key questions What is the firm doing to maintain the lead in the banking sector? What risk management strategies are in place? Does the bank prepare for economic crisis? What strengths has the bank secured in order to increase profitability? Given the current global economic situation, does the bank perceive any future threats? Li Fung Limited Company summar y Li Fung Limited was founded in 1906 as a small traditional trading firm by two entrepreneurs: Fung Pak-Liu and Li To-Ming. From its humble background, the company grew to become a worldwide supply chain management company. Since 1992, the company has been listed in the Hong Kong Exchange as Li Fung Limited. Its operations extend to more than 40 countries with a workforce of about 26,000 employees. As of the end of FY2010, the company’s worth in terms of revenue stood at US$20,030 million and the total current assets were US$9,526 million (Li $ Fung, 2011). Company performance Li Fung Limited has continued to grow in terms of revenue and assets. Recently, the company announced robust growth, reflecting gains in the market share and synergistic changes of its business structure. In spite of the recent slow-down of the world economy, the company has continued to increase its revenue year after year. The FY2011 indicated the highest revenue gains of 26% as compared to FY2010 . This strong growth reflects the company’s strong position in expanding its market reach through acquisitions, organic growth and cross-selling activities from its core business networks, logistics and distribution. In the last few years, Li Fung has concentrated its market expansion in the growing economies. Asia in particular has become the significant platform for the company’s operations and sourcing activities. In 2011, the company completed its global distribution network which contributed greatly to its distribution operations. This expansion resulted in the operating profit growing by 22% to reach US$882 million as of FY2011. Simultaneously, shareholder profits rose by 24% in 2011 compared to FY2010.Advertising We will write a custom research paper sample on Chinese Company Research specifically for you for only $16.05 $11/page Learn More Business strategies Li Fung Limited is a global consumer products export trading company managi ng the supply network for large-scale, time-sensitive consumer commodities. The company’s operations are described in three business elements: business networks of trading, distribution and logistics. These elements are used to identify business partners, initiate business transactions and complete the transaction across many parts of the world. The company has also strategized on targeting specific markets where the flow of consumer goods is high. Some of the strategic locations are within the Mainland China, though goods are sourced via a network of outlets in 40 countries targeted for consumers in Europe, Asia, US and Southern Hemisphere. Competitive position By all means, Li Fung is the leader in China trading industry in terms of revenue. The company’s position was strengthened by its acquisitions of Inchape Buying Services and the Swire Group which were the biggest competitors. However, there is considerable competitive pressure posed by Jebsen Co limited and M ars Concord limited. These competitors have by all means penetrated the local markets more than Li Fung. Indeed, Mars Concord limited was largely unaffected by the Asian financial crisis. These competitors were also faster than Li Fung in implementing B2B business models which enhanced their operations significantly. Key questions Given the stiff competition, what market should the firm pay attention to? How is the company responding to the effects of the economic crisis? What strategies should the company implement in future? Is the company responding to globalization appropriately? Does the financial position of the firm guarantee future growth? Hutchison Whampoa Limited (HWL) Company summary Hutchison Whampoa Limited (HWL) is a global corporation engaged in a range of business including health and beauty trade, container ports operations, mobile video technology among others. The company is committed to innovation and technology with operations spread across the world. Indeed , its diverse collection of holdings range from global-scale operations to infrastructure and property development to the world’s leading telecommunication operations in terms of technology and marketing. As at 31st December 2011, HWL reported a turnover of HK$ 388 billion. The company properties and assets are sprawled all over the world and include skyscrapers, industry facilities and real estates. Company performance The performance of HWL is mainly attributed to its global expansion and business diversity. For the last few years, the company has been expanding its market share through the establishment of businesses in new economies. In 2008 for instance, HWL engaged in the investment and development of several deep-sea ports in China.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More In 2012, the company successfully implemented the establishment and IPO of Hutchison Port Holdings Trust on the Singapore Exchange. The 2011 average production of oil reached 312,500 barrels per day. The number of 3G customers served by the company has grown tremendously reaching over 31.6 million making it the market leader. Recently, the company established mobile telecommunication in Vietnam, Indonesia and Sri Lanka. The consequence of these developments has been the continued increase in revenues which lead to profitability. The FY2010 indicated an increase in profit attributed to shareholders of HK$25,830million to reach HK$56,019 million in FY2011 as compared to HK$20,179 million in FY2010 (HWL, 2012). Business strategies With operation in more than 53 countries and territories, HWL has six core businesses: property and hotels, ports services, infrastructure development, retail, energy and telecommunications. Some of the major firms are Cheung Kong Infrastructure, Hutchison po rt Holdings, Power assets and Hutchison Telecom. HWL holds and manages ports services in about 26 countries and territories. They own the London Thamesport in UK and Harwich Ports as well as other ports in Europe, South America, Asia and Africa. On top of the quality hotels and properties in Hong Kong and China, HWL has interest in many foreign property developments mainly in UK and the Bahamas. The company owns several retail chains including supermarkets, boutiques, electronic stores, beauty shops and drug stores in 30 countries worldwide. HWL engages in infrastructure development mainly in Hong Kong, China, UK, Australia and Canada. Its energy operations are conducted in Canada through Husky Energy Inc while telecommunication operations are worldwide. Competitive position The key competitors of HWL include Swire Pacific Limited, Jardine Matheson holdings Limited, HSBC Holdings plc, The Wharf Limited, and NW Development Limited. These competitors compete with individual business s egments of the company. Their revenue performance is much less than that of HWL. The capital market performance in 2011 was such that the shares traded around 9.8 times expected earnings. The company also traded at about 40 percent discount to the net asset value. The figures are cheaper compared to the closest rival corporations: Wharf Holdings Ltd and Swire Pacific Limited. Wharf Company is second largest telecommunication firm in Hong Kong after HWL. Swire Company invests in shipping business and is a principal shareholder of the Chinese Cathy Pacific Airways. Other competitors can be sorted by location, but have little significance. Key questions Does the management have the capacity to manage the firm appropriately? What issues are important in the management of diversified businesses? What business segments are most strategic in the current economic state? Does the Asian market satisfy the business operations therein? What competitive advantage does the firm pursue? Wal-Mart (China) Company summary The parent organization of Wal-Mart China is the American Wal-Mart superstore, the world’s largest retailer and company. The company started retailing in China in 1996 by establishing a supercenter and Sam’s Club in the city of Shenzhen. Since its establishment, the company has grown its sales, store base and market share at over 40 percent. As at December 2011, the firm’s sale revenues climbed with 21 percent to reach US$10.6 billion. Their first profits were reported in 2009 which forced the company to focus on expanding in the Mainland China. The firm settled on changing the business concept that was used in US to accommodate the diversity of the Chinese consumers, but maintained their key segments and brand names. Currently, the store operates 319 hypermarkets under the banners of Wal-Mart and Trust-Mart. Company performance With the many opportunities in the Chinese market as a result of the high population and stable economy, Wal-M art has continued to expand its operations. Currently, there are about 373 retail units including Supercenters, Sam’s Clubs, Trust-Mart Hypermarkets, Neighborhood markets, Discount Compact Hyper and Smart Choice. In 2007, the company bought a 35% interest in Trust-Mart. In 2011, the company signed a memorandum of understanding (MOU) with the Shanghai government to develop the company’s China e-Commerce headquarters in the city. Wal-Mart growth within the Chinese market is partly attributed to its business concept and partly to the corporate social responsibility. The firm is involved in social and economic activities that promote the life of the Chinese people. These developments have resulted in increased sales revenue and profits. The sales figure in FY2010 and FY2011 were US$7.5 and US$ 10.6 billion respectively (Burkitt, 2012). This trend indicates the growth opportunities for the firm in the Chinese market. Business strategies Wal-Mart China engages in retailing c onsumer goods through several business concepts. The concepts reflect those offered by the mother company and include superstores, Sam’s Club, hypermarkets, Neighborhood markets, Discount Compact Hyper and Smart Choice. The core marketing strategy is focused on low pricing. Within this market, the major segment is the grocery segment and takes 96% of the total products offered. Wal-Mart stores are located in the major cities as most of the Chinese consumers are concentrated within the urban areas. Competitive position Wal-Mart is the second largest retailer in Chinese market in terms of market share, after Sun Art Retail Group Limited which is a business partnership between France and Taiwan. Sun Art Company was established earlier and has attained the lead by understanding consumer needs and enjoying first mover advantages. The competitor also employs a decentralized management structure where department managers can make pricing and production decisions quickly to meet the needs of local people unlike Wal-Mart whose decisions originate from its headquarters. Most of the other close competitors such as Beijing Hualian Group Stores have been able to increase profits by establishing upscale stores catering to consumers wishing to purchase premium and imported goods. Despite this stiff competition, the Chinese market is far from saturation and Wal-Mart is poised to make more profits in future. Key questions What opportunities can the firm exploit in the Chinese market? Does the company’s current performance promise a better future? Can the financial position of the company allow for future expansion? How are the Chinese consumers different from American consumers? Does decentralization prevent the firm from understanding the market? Foxconn (targeted) Company summary Foxconn is a world leading Technology Company that has its roots in China. The company is the principle founder and member of the Foxconn Technology Group that was established in 197 4. Its facilities are spread across the world particularly in its principal markets: Europe, Asia and America. Headquartered in Taiwan, the firm employs over 900,000 employees across the world. As at December 2010, its turnover was 2.997 billion NTD with a continuous increase of 53%. The company supplies technological products to some of the word’s renowned brands such as Apple, Nintendo, Nokia, Motorola, Dell and Sony Ericsson. Company performance In an effort to become a global company, Foxconn has continued to support its market with designs and developments of modern technology. In the recent past, the company has expanded from its principal manufacturing locations in China to other countries. Through a series of investments, the company transformed itself into a market leader in the technology industry. Currently, the firm has established numerous subsidiaries throughout Asia, America and Europe which offer products and services of high quality and low cost with high eff iciency. Throughout its regions of operations, the company has established a research network with an integrated intellectual property management system and completely functional innovation platform. As at December 2010, the company had about 88,000 patent applications comprising about 40,000 that were authorized. Apparently, these developments have led to the continued growth in revenue and profits. By the FY2011, the firm made a net profit of US$75 million which was an increase from the previous year profits (FIHL, 2011). Business strategies Foxconn (target) is a member of Foxconn Technology group that engages in the production and assembly of technology products. The company focuses on six key technologies namely: manufacturing computers, consumer electronics, car electronics, telecommunications, digital contents and channel business. The firm has grown from a manufacturer to technology innovator and developer. With its headquarters based in New Taipei City, Taiwan, Foxconn has i ts operations spread across three continents: Asia, America and Europe. The firm is committed to strengthening its market position as a responsible business entity across the globe, with the present six key competencies as the platform. Competitive position The original equipment manufacturer industry is dominated by firms from the Asian continents and in particular from Far East. However, Foxconn is a leader in both manufacturing and supply of technological products. Their innovation capability and market research are the key competitive strengths that lead to competitive advantage. This has resulted in the company becoming the preferred supplier by many electronic product marketers around the world such as Dell, Apple, Motorola, Sony and Nokia. This dominance indicates little pressure from competitors especially those from foreign markets. But, several competitors such as Quanta Computer, Austek, Pegatron Corporation and Compal Electronics have an impact on the industry. These com petitors have particularly responded to employee concerns which have been the major drawback in Foxxon. Key questions How is the firm responding to labor issues? What future plans does the firm have as pertaining to internationalization? What can the firm do to position itself better in the rising competition? How is the firm’s relationship with key customers? Is the financial strength enough to maintain future profitability? Lenovo Company summary Lenovo brand was established in 2004 after Legend Holdings acquired the Personal Computer Segment of IBM. The strategic acquisition had the advantage that the former was the Chinese leader in electronic industry while the latter had invented the personal computer industry. Lenovo thus grew rapidly as a result of the two strengths. Currently, the company is worth US$21 billion in revenue and is the second largest PC vendor in the world. The company employs over 26,000 employees in about 60 countries and territories serving consume rs in about 160 countries and territories. It is a global Fortune 500 firm that is headquartered in Beijing, China with manufacturing facilities spread across the world. Company performance Lenovo being the leader in the Chinese PC market and holding about 30% of the market share has grown fast and even won market share in many parts of the globe. The company has continuously outgrown the global PC market in production and attained substantial market share in significant geographical areas, customer segments and product portfolio. This has made the company to be the fastest glowing among the major PC manufacturers for the last two years. The company has emerged to be the PC leader in Japan, China and Germany. Their Smartphone and notebooks have hit several consumer segments. According to the Wall Street Journal, Lenovo net profits rose by 88 percent in the recent quarter due to strong shipments growth which drove the firm past Dell to take the second position as a PC maker (Fletcher , 2011). Business strategies The business strategy for Lenovo is to develop a unique personal touch through innovative technology. All along, the company has created and built outstandingly engineered personal technology. The company is always defining new ways of doing business and positioning itself as the next generation corporation. Its core strength is in China, substantial growth in developing economies and a distinct global trail. The company builds on its dominant platform in the Chinese market to grow internationally. Their new way of doing business is expanding from East to West; introducing new products in the home market and then extending them to the next potential market. Competitive position Despite the stiff competition in the PC industry, Lenovo has indicated tremendous growth which has made it to be the second largest manufacturer after Apple. Unfortunately, the larger part of the market share is from the Chinese market unlike other competitors who have concentrate d on international markets. Apple, HP and Dell in particular have a substantial presence in the global market as compared to Lenovo. Their distribution and supply chains are well established uplifting their competitive advantage. Lenovo could be a leader due to the dominance it has in the Chinese market, yet its global appearance is weaker than the four key competitors. Key questions What future strategies does the firm have in place? Can these strategies maintain the present growth rate? Which markets have the best opportunities for the company? Why should the firm focused on increasing revenue than internationalizing? Which are the firm’s core strength and their viability in future economic dynamics? References Burkitt, L. (2012). Wal-Mart to work harder on growth in China. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052702304356604577340912309012378.html. Fletcher, O. (2011). Lenovo profit rises 88%. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052970203716204577013280771200006.html. Foxconn International Holdings Limited. (2011). 2011 Annual report. Retrieved from http://pg.jrj.com.cn/acc/HK_DISC/stock_time/2011/04/08/001184514-0.PDF. Hutchison Whampoa Limited. (2010). 2010 Annual report. Retrieved from http://202.66.146.82/listco/hk/hutchison/annual/2011/keyfininfo.pdf. Li Fung Limited. (2011). 2011 Annual report. Retrieved from lifung.com/eng/ir/reports/ir2011/ir2011.pdf. The HK and Shanghai Banking Corporation Limited. (2011). 2011 Annual report. Retrieved from hsbc.com.hk/1/PA_1_3_S5/content/about/financial-information/financial-reports/bank/pdf/2011report.pdf.

Tuesday, November 5, 2019

Find MBA Case Studies From Top Business Schools

Find MBA Case Studies From Top Business Schools Many business schools use the case method to teach MBA students how to analyze business problems and develop solutions from a leadership perspective. The case method involves presenting students with case studies, also known as cases, that document a  real-life business situation or imagined business scenario. Cases typically present a problem, issue, or challenge that must be addressed or solved for a business to prosper. For example, a case might present a problem like: ABC Company needs to increase sales substantially over the next several years to attract potential buyers.U-Rent-Stuff wants to expand but is not sure whether they want to own the locations or franchise them.Ralphies BBQ, a two-person company that makes spices for BBQ products, needs to figure out how to increase production from 1,000 bottles a month to 10,000 bottles a month. As a business student. you are asked to read the case, analyze the problems that are presented, evaluate underlying issues, and present solutions that address the problem that was presented. Your analysis should include a realistic solution as well as an explanation as to why this solution is the best fit for the problem and the organizations goal. Your reasoning should be supported with evidence that has been gathered through outside research.  Finally, your analysis should include  specific strategies for accomplishing the solution you have proposed.   Where to Find MBA Case Studies The following business schools publish either abstracts or full MBA case studies online. Some of these case studies are free. Others can be downloaded and purchased for a small fee.   Harvard Business School Cases - Harvard offers thousands of case studies on every business topic imaginable.Darden Business Case Studies - Thousands of MBA case studies from the Darden Graduate School of Business Administration at the University of Virginia.Stanford Case Studies - A searchable database of MBA case studies from Stanfords Graduate School of Business.Babson College Case Studies - A large collection of business case studies from the Babson faculty.IMD Case Studies - 50 years of case studies from the IMD faculty and research staff. Using Case Studies Familiarizing yourself with  case studies  is a good way to prepare for business school. This will help you familiarize yourself with various components of a case study and allow you to practice putting yourself in the role of a business owner or manager. As you are reading through cases, you should learn how to identify relevant facts and key problems. Be sure to take notes so that you have a list of items and potential solutions that can be researched when you are done reading the case. As you are developing your solutions, make a list of pros and cons for each solution, and above all, make sure the solutions are realistic.

Saturday, November 2, 2019

Journal Essay Example | Topics and Well Written Essays - 250 words - 101

Journal - Essay Example Economically, business organizations are embracing social media for their growth and survival. From marketing their products or services to interacting with their potential employees virtually, producers and employers respectively are saving on time and costs favoring profit making. Skilled labor for the companies behind the social tools creates employment for many where they are based. In addition, social media is enlightening people from different cultural backgrounds on the various beliefs thus contributing to world peace because of mutual understanding amongst individuals. Interracial relationships are proof of the understanding. On the other hand, there is a spur of criminal acts because a persons’ location is both voluntary and involuntary exposed to the public. This makes it easier for a criminal to track down their victim without going through trouble especially if both are within the same locus. Person to person social interaction is disintegrating because virtual interaction seems easier. Consequentially, this has diminished hospitality and courtesy while promoting cyber bullying. The latter and over exposure to the devices in use to access social media has brought about psychological and physical health issues, which are affecting thousands the users by the day. This in turn counteracts the output of the individuals to an economy leading to decreased productivity of the economy in the long