Monday, September 30, 2019

Financial Information Systems Essay

INTRODUCTION Financing is the important function of every business organizations, Computer based financial information systems(FIS) support financial managers in decisions concerning. The financing of business, the allocation and control of financial resources. What is finance ? Finance is the art and science of managing money. Virtually all individuals and organisations earn or rise money and spend or invest money. Finance is concerned with the process, institutions, markets and instruments involved in the transfer of money among and between individuals, business and governments. Major FIS Categories Include Cash & investment management Capital budgeting Financial forecasting Financial planning Cash Management Collect information on all cash receipts and disbursements with in a company on a real time or periodic basis. This helps the business to deposit or invest excess funds more quickly. for cash flow forecasts. to determine cash collection programs and alternative financing or investments strategies with forecasted cash deficits or surplus. Online Investment Management Helps to financial management The process of buying, selling, or holding each type of security so that an optimum mix of securities is developed that minimizes risk and maximizes investment income for the business. Capital Budgeting Process of evaluating the profitability and financial impact of processed capital expenditures. Techniques in capital budgeting Payback Period (PBP) Net present value (NPV) Internal rate of return (IRR) Spreadsheets are heavily used for this process incorporates present value analysis of expected cash flows and probability analysis of risk to determine the optimum mix of capital. Financial Forecasting &Planning Financial forecasts concerning to †¦ Economic situation Business operations Type of financing available Interest rates Stock and bond prices Software’s used in FIS 1.Sage Accpac ERP Sage Accpac ERP offers the freedom of choice, seamless integration, high performance, and reliability that forward-thinking companies rely on to increase profitability and gain competitive advantage. Advantages Completely Web-Based Easy To Use and Customize Total Investment Protection Designed for Global Business Hundreds of Industry-Specific Solutions 2.SAP The e-commerce functionality in the SAP ® Business One application will help you bring your business to the public with a set of Web design tools that enable you to build and customize your online store. Create an online catalog where customers, salespeople, and partners can easily access your  products. Manage everything from taxes to inventory to pricing through a Web-based interface, all synchronized with SAP Business One. 3.Greentree Greentree’s main users are medium sized businesses, but it is also successfully used by many larger organizations. The Green tree product is seamlessly scalable to support the whole spectrum of businesses – from a small team to many hundreds of users. Features: Greentree is built around a core financial system, with seamless integration across distribution, job costing, manufacturing etc. The modular design will enable to implement a basic financial solution and add modules as the business grows or grows in complexity, or install a complete business management package from the outset. Greentree delivers both Windows-based and Linux-based software 4.Microsoft Dynamics AX Designed for mid-size and larger companies, It is a multi language, multicurrency enterprise resource planning (ERP) solution. Its core strengths are in manufacturing and e-business, and  it includes strong functionality for the wholesale and services industries. includes applications for financial management, customer relationship management, supply chain management, human resource management, project management, and analytics. It integrates with widely-familiar Microsoft products – such as Microsoft SQL Server, BizTalk Server, Exchange, Office, and Windows. Employees can work with tools that they’re already familiar. Financial Management Microsoft Dynamics AX delivers a range of financial capabilities for companies to consolidate accounts with subsidiaries or distribution centres, no matter where they are located. 5.SAP Business One SAP Business One provides you with instant access to your critical business information – when you need it to run your business. This comprehensive application covers all your core operations, giving you keen insight, so you  can confidently make informed business decisions. Features: All aspects of business become more agile, including administration, customer relationship management, operations, distributions, and financials. Helps in Accounting and Financials, Budgeting, Banking, Financial Reporting, Customer Relationship Management (CRM), Business partner management.

Sunday, September 29, 2019

Pagan Christianity by Frank Viola Essay

The book â€Å"Pagan Christianity† by Frank Viola and George Barna leads readers into the world of religion, religious customs and rituals, sermons and religious clothing. The authors show how the church has changed over times and what new practices and beliefs it has adapted. Frank Viola is known to be an American writers and speaker who has published a series of books devoted to problems with church calling people to return to the biblical principles. Therefore, the central thesis of the book is that people should get back to biblical principles in their religious beliefs because modern church practices are rooted in secular or Pagan practices which have nothing to do with the Bible and God’s commandments, as well as the church doesn’t resemble the early church which was described in the book of Acts. Modern church is based on hierarchical structure; whereas the author claims Jesus came with the strong intent to put an end to legalism, structure and hierarchy. The book is very interesting from historical viewpoint and I think that it is broadly accurate offering us new insights and facts from religious past. Pagan Christianity The authors start their narration with strong claim that modern churches have little resemblance with the early centuries churches described in the New Testament. With the partaking of the Traditional Church the author became very interested trying to reveal what we went on. The first chapter is reflection of authors’ inquiries on the subject of interest. For example, Viola questions whether there was a need to turn down light and to wait when the Spirit would move on to another church. The author thinks we are the ‘Children of Lights’, although he admits that he doesn’t agree with any theologian and preacher offering his unbiased review. It is said that the word ‘pagan’ is a part of book’s title and it is applied to the churches being discussed. However, even the authors agree that often this term is not applicable. In the second chapter the author discusses the issue of the Church Building and ‘modern’ church-goerselievers. It is emphasized that the Church has built itself. The original meaning of the word refers to the Greek language ‘ekklesia’ and it means a group assembled. Viola argues that time and words are describing the gradual development of Holy Places and things which are considered important parts of religious world. The authors discuss Constantine as he was one of the first Christians who gave legitimacy to the Christian Religion. Constantine promoted and supported grand displays of religious architecture. Further, the authors review religious clothing, music, steeples, architecture, thrones borrowed from other cultures along with customs and rituals. In the third chapter Viola provides overview of the order of traditional Worship and description of Sunday morning sets. He argues that standard order should be held in all churches with only slight differences. For example, he writes: â€Å"You can scour your Bible from beginning to end, and you will never find anything that remotely resembles our order of worship†. Further, the authors describe contributions of historical Church leaders – Luther, the Puritans, the Pentecostals, etc. In the fourth chapter they describe the sermon abandoning principles of Protestantism. The authors argue that the early churches were not the sermons; instead, they were places for gathering and Jesus functioned as its Head. In the fifth chapter Viola and Barna introduce the Pastor which is viewed as an obstacle to functioning of every member. The pastor is the fundamental figure in Protestantism and he â€Å"is often better known, more highly raised, and more heavily relied on than Jesus Christ Himself†. (p. 65) And it is a serious mistake. It is noted that the word ‘pastor’ isn’t a tile – instead, it is a function. Viola notes that the word ‘pastor’ is referred to in Ephesians 4:11 only one time: â€Å"a scanty piece of evidence on which to hang the Protestant Faith. In this regard there seems to be more biblical authority for snake handling than there is for the present-day pastor†. p. 66) In the sixth chapter there is a detailed description of Sunday morning costumes. The authors describe dressing up for church, what clothing is appropriated and why. The next chapter is devoted to the origins of Music Ministry and description of the hierarchy of clergy. The eighth chapter analyzes Tithing stressing that it is used in the New Testament and Clergy Compensation, althou gh it is never used by the Christians. Further, the authors specify Baptism, its core principles and fundamentals. They explain that Baptism has replaced the Sinner’s Prayer. The Lord’s Supper was firstly a festive banquet and, therefore, lost its concrete picture of ‘The Body and Blood’. The final chapters are devoted to religious education and how it is possible to receive the qualification to Minister the gospel. Viola and Barna provide new insight into the New Testament offering so-called second glance at Jesus, churches, pastor functioning, religious customs and education. Conclusion: Strengths & Weaknesses Frank Viola and Geroge Barna offer new ideas and facts about religious order, customs, traditional music and dressing. The book is very informative, innovative and well-organized. Moreover, it is very interesting from historical perspective as it is challenging and thought-provoking. The authors incorporate many references about the culture of time, adaptation of church, etc. I like their idea about church building that church is not the place – it is the people. Nevertheless, there were several controversial moments I can’t agree with. I see that Viola offers his own version of organized empire and it seems that he is supreme speaker and the founder of knowledge. It is evidence of hierarchy which he manages to escape. Moreover, he claims that such situation shouldn’t happen in church, although he puts himself on superior position. Viola calls people to leave their church as all of them don’t follow Biblical principles. However, he tells we are the Body of Christ contradicting himself. I think that we shouldn’t worry about such doctrinal issues. Despite certain weaknesses, the book is very informative and fresh.

Saturday, September 28, 2019

Rhetorical Analysis Research Paper Example | Topics and Well Written Essays - 500 words

Rhetorical Analysis - Research Paper Example The ethos aspect, emotional appeal, of the article is significantly strong. Mr. Roger Cohen is a renowned author, columnist and journalist. (A General Summary of Aristotle's Appeals . . ., n.d.). He has extensive experience in foreign correspondence and his work reflects his far-reaching credentials. Considering the writer’s authenticity and credibility, the article carries much weight and strength. However, there is a point worth consideration here. To write about Britishers’ sentiments about London Olympics, probably, is a little out of Roger Cohen spectrum of expertise. In a way, this article can be regarded as a casual, off-road piece of writing for a usually seriously-political content-writer such Roger Cohen. His role in the article is important and provides basis for the basic structure of the writing. He sets the tone as casual and light-weighted. More importantly, using his imaginative-fluency, he carefully carves the primary style to be used in the article from start to end. He uses the indirect approach whereby he creates an opposite scenario at first in the initial paragraph to introduce the main scenario of the article that worked well in the general discourse of the whole writing. Moving on to the content of the article, it is safe to say that he articulated this piece with a commendable choice of words and expression to produce an interesting read. He enjoyed the liberty to develop coherent pre-body scenarios and post-body conclusions. The logos aspect (The Rhetorical Triangle: Understanding and Using Logos, Ethos, and Pathos, n.d.) of it considerably appropriate; Cohen’s ability in using logic and rationality in his writing is strongly backed by his extensive experience in journalism and column-writing.

Friday, September 27, 2019

Answer the questions Assignment Example | Topics and Well Written Essays - 250 words - 1

Answer the questions - Assignment Example The U.S. commercial airports obtain their revenue largely through selling their tickets to their customers. It includes offering air transport both within and without USA. Profits are generated when their revenues exceed their costs. Commercial aircraft operators are solely licensed to offer certificates that allow an airport to charge their customers for their flight services. They obtain their revenues from fees charged for these certificates. If costs are lower than fees, they then make profits. The Transportation Security Administration is an agency that has got authority over security issues of the travelling public while Federal Aviation Administration is an authority in the US national aviation concerned with overseeing and regulating all aspects of the American civil aviation. 7. The major U.S. commercial aircraft operators must adopt a specific TSA security program that requires the aircraft operator to designate certain security positions within their company. What is the name of the security program and what specific security positions does it require the aircraft operator to have? ( 3 points) The name of the program is the Twelve-Five Standard Security Program (TFSSP) that established security requirements and measures for aircraft operators. Security Coordinator together with TFSSP provides security of property and passengers travelling on flights. This is with the aid of the Twelve-Five aircraft operator. 8. The primary U.S. airport operators must adopt a TSA security program that requires the airport operator to designate a security position within their airport organization. What is the name of the security program and what specific security position does it require the airport operator to have? Its name is Secure Flight Program. It requires an operator to have a passenger’s details (full name, date of birth, redress number, gender and known traveller number). Redress is for those customers who feel that they have been mishandled;

Thursday, September 26, 2019

Individual report Essay Example | Topics and Well Written Essays - 500 words - 2

Individual report - Essay Example With reference to specificity and relevance to the specific aims of the project, it is identified that the project would be more concise with fewer objectives to focus on as the topic. Too much objectives within a project run the risk of overseeing some of the objectives leading to inaccuracies and lack of substantial conclusions (Berman, McCombs, & Boruch, 1977). Given the chance to retake the project, I would down size the current project objectives to five at most to ensure that each deliverable is achieved by focusing on specific explicit sources. However, the fact that the current project objectives are too many, the project is capable of suffering from support or evidence insufficiency. Trying to meet more than ten objectives in one project creates the risk of overlooking some while concentrating on one more than the other. Additionally, directing all the objectives into focusing into the same project is hard to achieve under normal circumstances. The practicality of a project denies the accommodation of too many tasks as these result to added finances, risks of running into various levels of challenges that have the potential to delay or hike the cost of executing the project. With reference to page 34 of the current project document, it is evident that the compiler of the document at this certain point did not consider grammar or proofreading the document a priority. With regards to this particular page, 34, it is evident that the compiler of the document did not consider TENSE and SPELLING to be a priority when compiling the document. For example, the last sentence of page 34 state that â€Å"Staff are not allow to edit the template to their owe preference† which projects high levels of human errors in the compilation of the document. With this in mind, the project runs the risk of being irrelevant to the very target group that it aims to inform and present findings to. Given the

Wednesday, September 25, 2019

The Development of Print Documents for Online Delivery Essay

The Development of Print Documents for Online Delivery - Essay Example The production and distribution of news and other information materials through the traditional communication channels such as print, radio and television require a gatekeeper, a metaphor used to describe the process of selecting which information is worth delivering to consumers. This is necessary not only because of limitations on space, airtime, transmission frequencies and commercial interests but also because of equally important considerations related to reliability and trustworthiness. The era of digital media changed the concept of the gatekeeper into the gate-watcher, as the role of professional journalists or communicators has been narrowed and individuals gained more power, with ordinary citizens acquiring an increasing level of credibility as source of legitimate news. The gatekeepers keep their role and still decide what is newsworthy but ordinary citizens now provide a wider variety of news sources, which are more community-oriented. This paper discusses communication t heory according to the socio-psychological perspective, which suggests that communication achieves its purpose if it considers the prevailing beliefs and attitudes of its intended audience. From the theoretical perspective, the research essay describes the methodology used in a content analysis designed to gather empirical evidence that would support or validate the theories, which finding was then analyzed for its relevance to this research. 2. Theoretical Perspective According to the socio-psychological tradition in communication theory, there is a relationship between communication stimuli, audience predisposition and opinion change. To succeed, journalists and communicators must look for the cause-and-effect relationships that could predict when a communication message will be received favorably by its audience or when it will be ignored (Vaughn, 2008). In this view, communication can be effective in influencing public attitudes and opinions if it considers the "who, what, whom and what-effect" questions of socio-psychological tradition, which are often asked when journalists and public relations practitioners want to change people's minds. The questions refer to the source and content of the message, audience characteristics, and the opinion change it has caused. On the source, the message sender must project expertise and trustworthiness while the content must be appealing and credibly argued. The "whom" phase should consider the personality and gullibility of the audience, while the what-effect question requires that communicators measure the attitude scales before and after delivery of the message. Thus, the editor who hears a reporter say that his mother loves him will tell the reporter skeptically: "Check that out - from at least two sources (Griffin, 2003)." The socio-psychological influences in communication forms the basis of this research. 3. Methodology This study uses the quantitative approach that gathers the primary and secondary data of research through the observation and direct communication methods. The observation method refers to our review of the literature, which gives special attention to such new communication platforms as gate-watcher

Tuesday, September 24, 2019

Eastman-Kodak Essay Example | Topics and Well Written Essays - 1500 words

Eastman-Kodak - Essay Example In 1975, Kodak invented the first digital camera. Hence they didn’t miss the digital age. But Eastman Kodak didn’t market their new technology. They feared that it would hurt their own lucrative film business, in spite of the fact that the digital products were revolutionizing the market. Sony and Canon took this near-sightedness of Kodak and charged ahead with their own digital cameras (Mui, 2012). When Kodak ultimately realized what mistake it did, it was all but too late for them. They saw their market share plummeting. Kodak didn’t recognize the business which they were in. They focussed more on selling more products, instead of concentrating on the business they were in, sharing memories (Kotter, 2012, p. 1). They were more determined on earring revenues through selling film and they though the photography business didn’t fit their business model. Hence they ignored the coming tsunami of new technology in the market. As their film business went from b eing and essential business into old fashioned one, the company could never recover. What opportunities & why did Kodak miss them? For past 15 years, digital technology has changed the photography business drastically. But Kodak, champion of analogy film business, was left behind. Kodak missed the chance to grab the digital market thrice. First miss was Digital Cameras. In 1995 it launched its first digital camera in the market, DC40. But Kodak never took advantage of this situation. Their whole business model was involving the film and printing business. It was not until 2011, that the company came out with EasyShare line for the cameras. But by them they were too late. The Second Miss is the Photo Sharing business. Kodak in 2005 launched the world’s first Wi-Fi enable camera known as EasyShare-One. Figure 1: EasyShare-One But the camera didn’t earn much revenue for the company. Hence Kodak decided to kill this product. But if the company had to foresightedness of understanding that the photo sharing was going to be the way people interacted with the photo, they might had thought about it twice. The same year when Kodak killed it, a group of engineers’ launched Eye-Fi, which had the same concept as EasyShare-One and became hugely successful. Nowadays photo sharing app is a killer app earning millions of revenues for companies. The Third Miss is Photo Viewing. Kodak was working on digital printers and digital photo frames, though it couldn’t understand the demand of it in the market. But when Kodak started to push for the photo frames with distinguishing features like batteries, Wi-Fi, the prices of the technology were falling, and it resulted in thin margins for the company. What did the competition do differently? Kodak couldn’t enter into the digital market at right time when it should have entered. Rather

Monday, September 23, 2019

Develop strategic HRM plans and policies for an organisation Essay

Develop strategic HRM plans and policies for an organisation - Essay Example The main aspects which are identified include areas of recruitment and selections, training and development, communication programs, performance management systems and even conflict management. Besides implementing fairness in all of the above HR aspects it is recommended that the organizations provides a common platform for all in which they could voice any problem faced with regards to diversity. Hurdle free communication channels, instant and continuous support from executives for resolving diversity issues and grievances handling are particularly recommended. Table of Contents Executive Summary 2 Introduction 4 HRM plans and policies for an organization operating in the global business environment 5 Conclusion and Recommendations 11 Bibliography 15 Introduction Today’s organizations seek to attain excellence through diversity. However, the term diversity is often seen to raise controversy, confusion and complication. However, despite the various severe implications of dive rsity, organizations continue to encourage diversity at the workplace. This is primarily applicable for the large and multinational organizations which have multinational presence across all corners of the globe. The word diversity immediately brings to mind the differences in race and ethnicity rather than gender of the workforce. In other words diversity is defined as those human qualities and characteristics which different between individuals and groups but are existent in the people outside the group. It is rather important to realize that the concept of diversity includes very many different dimensions apart from age, gender, race, geographic location, religious beliefs, work experiences etc. These dimensions have important implications for performance and productivity, success and motivation and interactions among employees in the organization. It is important that organizations use these dimensions to their use and advantage rather than focusing on their elimination. That is why managing diversity has emerged as a popular concept in organizational scenario today and is widely practiced in almost all organizations; the multinational organizations in particular. They accept the fact that diversity contributes to the richness of the organization and enhances the quality of organizational life for groups and individuals. Today’s organizations take pride in workforce differences and use them to their own benefit. The project seeks to make an analysis of the various dimensions of diversity in organizations and their implications in organizational life. Based on the analysis it developed human resource management policies and practices aimed at managing a diverse workforce in the global organizations. Specific recommendations are provided in the form of strategic HRM plans for an organization which is expanding its presence in the global market. HRM plans and policies for an organization operating in the global business environment Organizations workin g in the global market must strive to create a harmonious and inclusive environment as it enhances their reputation as being favorable recruiters and allows them to attract and retain the best talents from the industry. The main aspect of managing a diverse workforce is to provide employees with the feeling of inclusiveness, rewarded and valued despite their differences. This helps to motivate them and attain their maximum engagement at the workplace. In a survey

Sunday, September 22, 2019

Different approaches to decision-making Assignment

Different approaches to decision-making - Assignment Example Tentatively, it is extremely difficult to use these sales to justify the existence of a common problem. In the same case, Home Depot and Lowe’s, in as far as the Big Box DIY store is concerned experience a relatively higher annual sales than Menard’s. On another case, when all the three categories of DIY stores are compared, there is a big difference in terms of sales, showing how the sales may be misleading especially where a major decision making is concerned. Possibly, a major individual store audit may be necessary in order to balance the decisions that are just yet to be made, with the possible causes of frustrations and poor performance in a number of the DIY stores. 3. The Company executives assumed a normative framework of decision making. One of the major operating principles of normative framework is to identify, which decision or judgment is most appropriate to make. It provides and evaluation standards, which the company executives used to determine that it is more appropriate actually, to sell the DIY stores that to merger the IT systems of all the stores. It requires an adequate observation with effective definitions of the stakes involved. The Company executives must have identified the situation irredeemable as high stakes were involved that could not be salvaged by any alternative apart from selling the stores. 4. There are several stakeholders who are responsible for decision making in a company. In all areas, top management is involved, but who count on the valuations and assessment of an area’s experts and technical professional. In this case, the Company’s IT expert and project developers (engineers) are the most integral component of decision making in the IT area. Their assessments, evaluations and conclusion form the backbone or the basis of decision making. They are the people who come out with why it would be better or disastrous to take certain decisions in as far as the Company’s IT system is concer ned. The Company’s executives and top managers must also be involved, and in fact they are the most essential players in the decision making framework. They will rely on the deductions of IT and project development engineers to make effective decisions with regard to changes and implementation. 5. Analytic cognitive style may be best suited for such kind of a situation. It requires that all different parts of a system that interact together to bring out a general impact must be examined and analyzed with regards to their i1ndividual contribution to the major problem at hand. There several parts of the DIY stores that are run by the same Company in France and the decision to sell all the stores stem from the fact that almost all of the stores are negatively affected in one way or the other. This puts into consideration the need to react and make decisions influenced from the individual analysis of all the stores in France. It is the responsibility of the executives to ensure t hat the decisions make take care of all the business establishments owned by the same company in a particular region. 6. An effective creative approach to analysis must put into consideration new and efficiently applicable concepts and ideas. The analysis process must disintegrate the available data and findings into finer details with a view of identifying the problems and coming up with impressive solutions that innovatively improve the current situations. It entails an effective

Saturday, September 21, 2019

James Jarvis Essay Example for Free

James Jarvis Essay In Alan Paton’s Cry, the Beloved Country there is two protagonists, Reverend Stephen Kumalo, and James Jarvis. Both characters play significant roles to the story but James Jarvis’ situation is noteworthy and inspirational. James is an influential, dynamic character because his opinion dramatically changes upon reading his son’s manuscript. A series of events influences James to shift his mindset into the mindset of his son. An analysis on James Jarvis’ changing mindset reveals that his son’s manuscript, realizing his shortcomings, and Reverend Kumalo are all things that cause him to change drastically. When James’ son, Arthur, dies he visits Arthur’s home and finds his incomplete manuscript. When reading his writings, James finds that his son would have risked anything to help other people, and ended up doing just that. Although James is hurt by the fact that Arthur writes about his parents in a negative way ..But of South Africa I learned nothing at all.† (207), James takes the criticism and improves from it by continuing his son’s battle. James discovers that his son researches tremendously on the problems of their society, and was seeking help in the development of the social structure in South Africa. Arthur’s house contains hundreds of books and â€Å"†¦between the books there were four pictures, of Christ crucified, and Abraham Lincoln, and the white gabled house of Vergelegen, and a painting of leafless willows by a river in a wintry veld.† (176) From these pictures of Jesus, Lincoln, the gabled hose, and the leafless willow disc loses the symbolism that Arthur admires. Jesus and Lincoln were men of action; they showed love for their friends, and at the same time, their enemies. These two men suffered and died for their beliefs, the same way Arthur did. A water willow represents freedom, therefore, it can be concluded that the painting of the leafless willows represents a loss of freedom for the blacks in South Africa and how Arthur wants to gain their freedom back and help them get equal rights. When his son is shot and killed, James gets to finally know and understand him and his values. â€Å"Jarvis filled his pipe slowly, and listened to the tale of his, to this tale of a stranger† (172). James reads his sons speeches and understands his country’s segregation, relieving him of his ignorance. This comparison enables James to better understand his son and realize how concerned and devoted Arthur was for a change in humanity. After James discovers his son’s views, James starts to realize his shortcomings, and realizes that the problems of others and not only of his own. James begins to help the minority. Since his son’s death and the acquaintance of Stephen, James donates 1000 pounds to the African boy’s club. Jarvis is not just giving the money as a gift; instead he gives the money to the club because he knew the club would improve the country’s condition. Using his son’s views again, James decides to do something about Kumalo’s village, which is falling apart. He sends milk for the children, an agricultural expert, and builds a church for Ndotsheni. James builds the church because the current church in Ndotsheni is old. James and Stephen both live in the farming areas of South Africa, share the love for the same land, and what is in their lives. They each have a son of whom they consider a stranger but after they lose their sons, they begin to understand them. They both learn the problems in South Africa through their sons, and after realization, they both try to do something to improve the social, and racial differences which plague Johannesburg. Both men are strong but James Jarvis has to be the strongest for his ability to take his son’s death the way he does. Instead of being an irate, cruel, sorrowful man; he picks up where his son left off. It’s realistic that James can be forgiving to Stephen even though he is the father of Absalom, the boy who killed Arthur Jarvis. James Jarvis reacts this way because he doesn’t want anyone else to experience the same thing that happened to him; instead he wants to fix the problem before it occurs again. When his son is shot and killed, James finally gets to know and understand him and his values. â€Å"Jarvis filled his pipe slowly, and listened to the tale of his son, to this tale of a stranger† (172). He reads his sons speeches and understands his country’s segregation, relieving him of his ignorance. James Jarvis was a dynamic character that changes throughout the novel. The representation shows how South African problems educated James Jarvis, and turned him into an understanding, and influential man. If Arthur Jarvis had never been killed, James Jarvis would’ve not been educated by his son’s writings or by Stephen Kumalo.

Friday, September 20, 2019

Information Systems, Not Computer Science

Information Systems, Not Computer Science The largest growth in most economies is coming from information industries. The success of such knowledge-based organisations lies in their information systems. Also, forced by technological change and globalisation of markets, many manufacturing industries are also placing increasing emphasis upon information systems. Information systems are more than just computer programs. Though information and communications technologies are playing an increasing role in meeting organisations information needs, an information system is a much more general concept. It refers to the wider systems of people, data and activities, both computer-based and manual, that effectively gather, process, store and disseminate organisations information 2.0 Information Systems not Computer Science Information systems, as a discipline, focuses on exploring the interface between management, information science and computer science. Computer Science focuses on information technology: software. Information Systems mediates the two opposing worlds of human activity systems and information technology 3.0 Information Systems and the Modern Organization 3.1 Outline Competitive Advantage and Strategic Information Systems Evolution of Information Systems Classification of Information Systems The Modern Computing Environment Managing Information Resources 3.2 Learning Objectives Describe Porters competitive forces model. Discuss strategies that companies can use to achieve competitive advantage in their industries. Describe strategic information system (SISs) and how information technology helps companies improve their competitive positions. Describe various information systems and their evolution. Learn major Information System classification schemes. Describe the emerging computing environments. Describe how information resources are managed and the roles of the information systems department and the end users 4.0 Competitive advantage and SIS Competitive Advantage: An advantage over competitors in some measure such as cost, quality, or speed, which leads to control of a market and to larger than average profits. 4.1 Competitive forces model A business framework, devised by Michael Porter, for analyzing competitiveness by looking at five major forces that might alter a firms competitive standing. 4.2 Porters five forces Model 4.3 Strategies for Competitive Advantage Cost Leadership. Produce products and/or services at the lowest cost in the industry. Differentiation. Offer different products, services or product features. Customer orientation. Concentrate on making customers happy so that they remain loyal. New markets. Discover new markets either as a means of expansion and growth, or with the goal of capturing market niches. Innovation. Introduce new products and services, add new features to existing products and services or develop new ways to produce them. Operational Effectiveness. Improve the manner in which internal business processes are executed so that a firm performs similar activities better than its rivals. Discussion: Which of these strategies can be enhanced by the use of IS/IT, and how? 4.4 Strategic Information Systems (SISs) Systems that help an organization gain a competitive advantage through their contribution to the strategic goals of an organization and / or their ability to significantly increase performance and productivity. 4.5 IS Related Organizational Responses Strategic Systems may provide advantages that enable organizations to increase market share and/or profits, to better negotiate with suppliers, or prevent competitors from entering their markets. Customer Focus is the idea of attracting and keeping customers by providing superb customer service. Can be enhanced by use of IS/IT. Made-to-Order. is a strategy of producing customized products and services. Mass Customization is producing a large quantity of items, but customizing them to fit the desire of each customer. E business and Ecommerce. Is the strategy of doing business electronically. Discussion: Which Information Systems would be strategic for: An university An online book store A car manufacturer? 5.0 Evolution of Information Systems The first business application of computers (in the mid1950s) performed repetitive, high volume, transaction computing tasks. The computers crunched numbers summarizing and organizing transactions and data in the accounting, finance, and human resources areas. Such systems are generally called transaction processing systems (TPSs). Management Information Systems (MISs): these systems access, organize, summarize and display information for supporting routine decision making in the functional areas. Office Automation Systems (OASs): such as word processing systems were developed to support office and clerical workers. Decision Support Systems: were developed to provide computer based support for complex, or no routine decision making. End-user computing: The use or development of information systems by the principal users of the systems outputs, such as analysts, managers, and other professionals. Knowledge Management Systems: support creating, gathering, organizing, integrating and disseminating of an organization knowledge. Data Warehousing: A data warehouse is a database designed to support DSS, ESS and other analytical and end-user activities. Intelligent Support System (ISSs): Include expert systems which provide the stored knowledge of experts to non experts, and a new type of intelligent systems with machine learning capabilities that can learn from historical cases. Mobile Computing: Information systems that support employees who are working with customers or business partners outside the physical boundaries of their companies; can be done over wire line or wireless networks. 6.0 Classification of Information Systems The two most common classifications are: Classification by breath of support Classification by organizational level. 6.1 Classification by Breath of Support Typical information systems that follow the hierarchical organization structure are functional (departmental), enterprisewide and interorganizational Functional information systems are organized around the traditional departments. Enterprise information systems serve several departments or the entire enterprise. Inter organizational systems connect two or more organizations. An organizations supply chain describe the flow of materials, information, money, and service from raw material suppliers through factories and warehouses to the end customers. IT provides two major types of software solution for managing supply chain activities: Enterprise Resource Planning ( ERP), Supply Chain Management (SCM) 6.2 Departmental, corporate, and inter organizational IS 6.3 IT outside your organization 6.3 Classification by Organization Levels The typical enterprise is organized hierarchically, from the clerical and office worker layer, to the operational layer, the managerial layer, the knowledge worker layer and finally the strategic layer. 6.4 Levels in an Organization 6.5 The Clerical Level Clerical workers constitute a large class of employees who support managers at all levels of the company. Among clerical workers, those who use, manipulate, or disseminate information are referred to as data workers. These employees include bookkeepers, secretaries who work with word processors, electronic file clerks, and insurance claim processors. 6.6 The Operational Level Operational or first line managers deal with the day to day operations of the organization, making routine decisions, which deal in general with activities such as short-term planning, organizing, and control 6.7 The Knowledge Work Level They act as advisors and assistants to both top and middle management and are often subject area experts. Many of these professional workers are classified as knowledge workers, people who create information and knowledge as part of their work and integrate it into the business. 6.8 The Strategic Level Top-level or strategic managers (the executives) make decisions that deal with situations that may significantly change the manner in which business is done. 7.0 The Modern Computing Environment Computing Environment: The way in which an organizations information technologies (hardware, software, and communications technology) are organized and integrated for optimal efficiency and effectiveness. Legacy system: Older systems, typically those that process an organizations high volume transactions that are central to the operations of a business. 8.0 Managing Information Resources Information resources includes hardware, software, data, networks, applications etc. Management includes acquisition, introduction, support. Traditionally, department (ISD IS department) owns, manages and controls all resources End-user computing: employees use computers, write applications, manage data etc. Leads to fragmented management and need for cooperation between ISD and users Who is responsible for which resources? Includes financial responsibilities (contracts between users and ISD IT controlling) Discussion: What are the possible problems associated with: Complete control at ISD, and Complete control for end-users? Which factors in a company would lead to which outcome Chief Information Officer (CIO): sometimes member of top management, nowadays no longer technical, but strategic function IT Governance: à ¢Ã¢â€š ¬Ã‚ ¦ the leadership and organisational structures and processes that ensure that the organisations IT sustains and extends the organisations strategies and objectives. Framework for IT Governance: COBIT Control Objectives for IT and related Technologies Mandated for Turkish banks in 2006 Domains: Plan and Organize, Acquire and Implement, Deliver and Support, Monitor and Evaluate COBIT 9.0 The information system strategies implementation in UK companies 9.1 Strategic process formality Business strategy relationship % companies The ISS is a formal documented part of the business strategy 47.5 There is no formal documentation, but the ISS is related to specific strategic aims 41.8 The ISS is a departmental function, rather than a corporate function 6.4 The ISS is not seen as related to the business strategy 0.0 9.2 Success of strategies 9.4 Conclusion: Collective intelligence and knowledge management can become effective mechanisms to help avoid the disturbances leading to internal disequilibrium within the organisation. Collective intelligence and knowledge management can remediate the negative effects of the instability of environment. The information and knowledge become raw materials for the intelligent organisation; their management requires simple solutions. Life cycle for products and services is getting shorter; the markets are global, fragmented by the needs and exigencies of the clients. The organisational culture evolves according to the aggregate strategy. The role of knowledge manager is to invest in the acquisition and dissemination of knowledge, leaving the employees to capitalise their personal competence

Thursday, September 19, 2019

The Symbolic Role of Birds in Kate Chopins The Awakening Essay

The Symbolic Role of Birds in Kate Chopin's The Awakening The Awakening by Kate Chopin is a truly enlightening novel about a young woman who begins to really live her life for herself, breaking out of the various barriers of society and family. Chopin uses symbolism as an excellent tool to slip her ideas to readers, causing them to think, giving readers a glimpse into the life of this young woman at a time when women were harnessed by many restraints. The birds that appear throughout the novel are the most intriguing symbols; they are used many different ways, to mean many different things, and to portray various emotions and situations. As the novel begins, Chopin likens Edna to a bird in a gilded cage. Edna is not free, but that is okay because she has not yet begun to see what life has to offer; she has not yet begun to awaken. Through Edna's desire for Robert, she begins to realize that she is like the bird in the cage, not wanting for anything materially but still trapped. Edna cannot fly away to freedom; she is tied by social constraints and especially by he...

Wednesday, September 18, 2019

Teenage Suicide Essay -- Teenage Suicide Essays

Suicide is an issue that many young people struggle with everyday. Suicide is the third leading cause of death, behind accidents and homicide, among adolescents. The middle teenage years are the years with the greatest incidence of teen suicide (Fritz, 2001). 7 percent of youths under the age of 25 have attempted suicide at least once (Psychology Today, 2001). These statistics alone show that teenage suicide is something that needs to be dealt with. There are many risk warning signs, and ways to prevent teenage suicide. Some individuals have a higher risk of attempting, and then completing, suicide than others. Suicide attempts among youths have been associated with depression, substance use, loss of a family member or friend to suicide, or the presence of firearms (Borowsky, 2001). Teens who come from a bad family background have a high risk of suicide. Living in poverty, family dysfunction, and lack of communication and poor problem solving in the house hold can be huge factors. If there is stress at home such as abuse, parent's loss of job, or the loss of a loved one, suicide may seem like a way out for the teen. Physical, sexual, and verbal abuse may also put a teen at high risk of suicide attempt (Wagner, 1997). Possibly one of the biggest causes of suicide is mental illness and disorder. There are many mental illnesses that cause suicide but the biggest two are depression and schizophrenia. 30-40% of individuals who complete suicide are those with serious mental illnesses, the more lethal being borderline and anti-social personality disorders (Sanchez, 2001). Alcoholics and substance abusers are also at a high risk. Alcohol has been associated with 50% of suicides (Borowsky, 2001). Even factors such as past head injurie... ...ing their feelings this may push them further away. One should also be very specific when talking to a teen about suicide. Often the actual issues is not suicide itself, but something that is causing them to feel like there is no way out (Parrott, 435). Some teens that are struggling with suicidal thought have other problems in other areas. When you are not qualified to treat such problems, you should refer them to professionals. It is important to not go on trying to treat someone when you have no experience in that area. Trying to help when you are under-qualified can actually make things worse. In 1997, 13% of all deaths in the age group between ages 15-24 were attributed to suicide (Pediatrics, 2000). Suicide is a problem that is growing in the US very Rapidly, It is important that we learn to watch for warning signs in order to prevent further suicide attempts.

Tuesday, September 17, 2019

Classification Essay - Good Books and Great Books -- Classification Es

The Difference Between Good Books and Great Books Reading is fundamental, but some books are more so than others. Surely Daniel Steele is a far cry from William Shakespeare, but what exactly is the difference? Even in the realm of quality literature there are still "good" books and "great" books. The difference between the importance of good and great books is also why it is so important to read great literature: Great books have a scope much larger than good ones. Good and great books differ by nature, not by degree. A good book is not almost a great one; a great book is a totally different creature than a good book. What makes them different is how much they pertain to the human experience. A good book may have one very important meaning, but it is a meaning that only pertains to the time in which it was written. Across the river though, a great book has many meanings. Great books also involve deeper issues, issues that are and always were part of the human experience. A good book only needs to be read once, but to realize all the different meanings of...

Monday, September 16, 2019

Childhood Obesity Essay

Childhood obesity has increased over the years due to genetics, environment, and cultural. There may be a combination of these factors that contribute to the widespread epidemic that is affecting our country today. Most people never take the time to figure out the problem and come up with a solution. Obesity is caused by lack of physical activity, poor eating habits, and genetics. In order to escape the recurring disease; some changes need to be made. Obesity is when a child is well above the normal weight for his or her age and weight. The problem is that children are becoming more obese. Understanding the causes of childhood obesity would be most beneficial in addressing the problem. While playing video games and watching television children have a tendency to want to snack. There is nothing wrong with it, but they need to go outside and play afterwards. They aren’t burning off any calories. Moderate intense regular physical activity is essential for the prevention of overweight and obesity (Raj 2010). Children should engage in some type of physical activity daily. Kids are more apt to do activities if they think of it as fun. Children should be prescribed physical activity that is safe, developmentally appropriate, interesting, and practical and has a social element (Raj 2010). Genetic makeup plays a role in obesity. There is considerable evidence to suggest that, like height, weight is a heritable trait (Sadaf Farooqi 2007). Having obese family members can very well have a lot to do with obesity in children. A recent article reported an odds ratio of >4 for the development of childhood obesity when there is a family history of obesity (Signorino &Winter 2008). White adipose tissue (WAT) is the principal target tissue in obesity (Mitchell 2009). The environment in which one lives in can have something to do with becoming obese. Environmental risk factors for overweight and obesity are very strong and inter-related (Raj & Kumar 2010). The food choices children intake should be monitored. The amount of a food should be monitored as well. Children have tendency to want to eat foods that are high in fat. Children and adolescents of poor socio-economic status tend to consume less quantities of fruits and vegetables and to have a higher intake of total and saturated fat (Raj & Kumar 2010). There are risk and complications that come along with being obese. Being obese you run the risk of have cardiovascular problems, high blood pressure, and type 2 diabetes. Obesity significantly contributes to morbidity and mortality from cardiovascular disease (Raj & Kumar 2010). Not only are there risks, but obesity affects a child’s self-esteem. Obese children are a target for being bullied and picked on. They tend to feel worthless about themselves. Their perception of themselves becomes damaged. It can sometimes affect their grades. Obesity can be managed and controlled with the right treatment and diet. For successful obesity management, the child should be assessed and treated by a multidisciplinary team, including a physician, dietitian, exercise expert, nurse and behavior therapist (Nowicka 2005). With that said, with the right treatment a child who is obese can get help. The ultimate goal is to bring the weight down to where it should be. Eating the right amount as well as the right foods helps with dropping weight. Eating out is a quick fix and should be cut down to a minimum. There should be a plan for healthier snacks, balanced diet, and adequate intake of more fruits and vegetables to avoid high calorie/high fat foods. Obesity in children often leads to obese teenagers who then become obese adults. Health as well as self esteem is often compromise when dealing with the lives of obese children and adults. Identifying and managing obesity in childhood is pertinent in slowing this epidemic down before it is too late to do anything about it. Reference Farooqi, S. (2007). Insights from the Genetics of Severe Childhood Obesity. Hormone Research, 68(S5), 5-7. doi:10. 1159/000110462 Mitchell, G. A. (2009). Genetics, physiology and perinatal influences in childhood obesity: view from the Chair. International Journal of Obesity, 33S41-S47. doi:10. 1038/ijo. 2009. 16 Nowicka, P. (2005). Dietitians and exercise professionals in a childhood obesity treatment team. Acta Paediatrica. Supplement, 94(s448), 23-29. doi:10. 1080/08035320510035537 Raj, M. , & Kumar, R. (2010). Obesity in children & adolescents. Indian Journal of Medical Research, 132(5), 598-607. Signorino, M. R. , & Winter, W. E. (2008). Childhood Obesity and Diabetes. Current Medical Literature: Diabetes, 25(1), 1-16

Sunday, September 15, 2019

The Man To Send Rain clouds Symbolism and Obscurity Essay

In  her short story â€Å"The Man to Send Rainclouds† Leslie Silko writes about the burial of a dead native elder, stating that â€Å"he sat down to rest in the shade and never got up again† (Silko 1). Silko uses obscurity and symbolism to display her attitude towards culture. She was very open to different religions and ways of life because she was of a mixed descent.Obscurity is a recurring motif in the story. Silko uses it to show how blurred the lines of culture can really become. â€Å"The curtains were heavy, and the light from within faintly penetrated†¦Ã¢â‚¬  (Silko 2) is an example of a quote that features the motif. It showcases that because there wasn’t sufficient lighting it was hard to see, which is a metaphorical way of saying that a clear decision couldn’t be made. It was unclear whether giving the natives the holy water was right or wrong in the priest mind and this quote highlighted that fact. Another quote is â€Å"They were nea rly hidden by the red blanket,† (Silko 2). It is an example of obscurity because the blanket is blocking the view of Teofilo and his moccasins which can be interpreted as the culture itself being hidden. Examples of the motif of obscurity can be found in many parts of the short story.Symbolism is a very prevalent literary element in Silko’s work. One example is in the quote, â€Å"Leon’s green arm jacket that was too big for her,† (Silko 2) where the jacket represented the western culture. It was something that Louise was not used to and it didn’t suit her. It seemed as though it was placed into her life unwillingly but she began to embrace the different way  of life. Another example of symbolism is Teofilo; it could be argued that he represented the native culture. With his death came the breakdown of his culture. His people began to incorporate the western ways of living into their own. Symbolism is a very important part of this story because Si lko uses it to communicate with the reader.All in all, â€Å"The Man to Send Rainclouds† is a piece of literature that is written with a motif of obscurity and a lot of symbolism. Both keeps the reader entertained and betters the work. Silko maintained openness to the cultures of both the western world and the natives while showing that one was beginning to overtake the other.

Zappos Swot

Re:SWOT Analysis of the Culture of Zappos. com Zappos. com is an online shoe store that was created in 1999 by a man named, Nick Swinmurn. Today it is a multi-billion dollar company thanks to its current CEO, Tony Hseih. One of the reasons Zappos. com has become such successful empire is because it got the economics and operations right. The management of Zappos. com is in my personal opinion, a necessity to a happy and thriving company. Their strategy is to find employees that are going to dedicate themselves to the environment and purpose of Zappos. com.They rely on passion, purpose, happiness, and emotional connection. If you don’t fit right into this, they even offer a $1,000 quit-that-day bonus. They strive on â€Å"weeding out† the employees that don’t extend their positive energy to the company. Zappos. com has a lot of different strengths, all of which play a part in their major success. They are a company that focuses on company culture and hiring passio nate employees. Which allows the company to run as Hseih designed it out to. Another strength that aids Zappos. com in success is their demand for effective communication.They also believe the importance and impact of feeling good, for both the employee and customer, is key. Tony Hsieh quickly discovered that becoming successful did not begin with the intention to make as much money as possible. He realized then that he should work towards making it a passion instead of an income. â€Å"Passion and determination are contagious,† he says. â€Å"We believe in having a positive and optimistic (but realistic) attitude about everything we do, because we realize that this inspires others to have the same attitude. † Which I believe is their biggest strength and most powerful.The weaknesses that affect Zappos. com are how the way their management affects their outside controls. Amazon just recently purchased Zappos. com for about $1 billion. One weakness they could experience is how Zappos. com’s fun and relaxed work ethic and environment collides with the way Amazon. com runs. Another weakness Zappos. com faces is the average salary a sales representative makes. Zappos. com main goal, and what most of its reputation is built upon, is customer service. To keep up with the high demand of customers seeking help and asking questions, Zappos has a large number of ustomer service representatives. Where this becomes a weakness is, Zappos. com pays their representative’s and average of $23,000 a year, three percent below the national average. This makes them vulnerable to other competitors. Zappos. com strategy is very unique in the fact that they focus on happiness. They want to make sure that not only the customers are satisfied, but their employees as well. They look for dedicated and passionate people to work hard and play hard. They a set of ten core values that the company lives by.They are deliver wow through service, embrace and drive cha nge, create fun and a little weirdness, be adventurous, creative, and open-minded, pursue growth and learning, build open and honest relationships with communication, build a positive team and family spirit, do more with less, be passionate and determined, be humble. They use a strategy of making sure the employees are in good spirits and enjoy their work place. It reminds me of the saying, â€Å"happy wife, happy life. † If their workers are happy in their job then they will work harder for the company.This strategy puts Zappos. com at a definite advantage over other companies that, say, pay a higher salary. I know that I would rather work in a laid-back, fun and enjoyable environment over a bigger paycheck. If you’re miserable in your job it will leak into other parts of your life. The first recommendation I would provide Zappos. com is to cover more area. Instead of their main focus to online retail, they could open up Zappo storefronts to up their sales. Continuing their up-keep with social media is also a high recommendation for Zappos. com.They are a huge hit on Twitter, which allows their customers to see their every move and what exactly is going on with promotions and deals. They need to focus on their core values, especially the last of the ten, be humble. Earlier when there was a security breech in company, there were a lot of upset, confused, and concern customers. It takes a lot of patience to deal with that high volume of calls but if zappos. com sticks to the words they say they live by, they are going to continue to receive loyal customers who spread the word and their business.Works Cited Bailey, Jean. â€Å"Happiness as a business strategy. † Massage Therapy Journal Winter 2012: 25+. Academic OneFile. Web. 22 Feb. 2013. Chafkin, M. (2009, May 1). The Zappos Way of Managing. Retrieved from ? http://www. inc. com/magazine/20090501/the-zappos-way-of-managing. html McDonald, Shelley. â€Å"Delivering Happiness: A Path to Pro fits, Passion and Purpose. † American Economist 56. 1 (2011): 127+. Academic OneFile. Web. 22 Feb. 2013. Reid, K, Carolina.. â€Å"SHOULD BUSINESS EMBRACE SOCIAL NETWORKING?. † EContent. 01 Jun. 2009: 34. eLibrary. Web. 22 Feb. 2013.

Saturday, September 14, 2019

Letter to Government Essay

I am writing to you on behalf of your article in this weeks paper I think the curfew is a fantastic idea I am in full support of the Council proposing this great curfew. Where I live under 16’s are taking over my neighbourhood me and the other residents in the area are feeling threatend by these gangs of ‘yobs’ hanging around our area. All they do is go around drinking and creating uneeded noise which I and the rest of our neighbourhood would agree on. While we adults are staying indoors scared of going out they are out commiting crimes and going round doing under age drinking and under age sex and if the parents of these children could see what I see nearly every night then I’m sure they would be in support with me. As I said before I am scared to go out of my house to go to the shops or to the pub or anywhere! because I am scared of getting jumped or mugged or even killed. Also this curfew would be a good idea because it would give new employees in the police force good experience of dealing with these situations so they are confident and experienced when it comes to a really big proper crime. Also if this curfew goes through then once all of the under 16’s are indoors then it will make life easier for the police patrolling to catch the proper criminals because they won’t have to put up with the cheek and disrespect that they recieve off the under 16’s, also the under 16’s need to respect the police force and realise that they are trying to protect them but they are just trying to show off in front of friends.

Friday, September 13, 2019

To what extent can you consider the Arab World culture to be one Essay

To what extent can you consider the Arab World culture to be one singular culture - Essay Example Literature review is used in order to present important normative information on the Arab countries to which this study refers. On the other hand, the literature helps to identify the views of theorists regarding the characteristics and the importance of culture as part of a country’s social framework. Culture is an important part of a country’s history; in fact, culture reflects the development of a country’s social and political life. Through the decades, the changes on a country’s culture can be explained using the ‘social comparison’ theory; this theory is based on the assumption that every individual is likely ‘to use others to make sense of himself and his social world’ (Guimond, 2006, 15); in accordance with Singerman et al. (2006) ‘culture can be seen as a kind of soft power spreading the image and influence of the state beyond its borders among the peoples of other nations’ (Singerman et al., 2006, 157). At the next level, it is noted that the development of culture across a country – but also across a greater region – can be achieved using a series of different tools/ paths, like ‘media products, educational infrastructure and models of economic development and modernization’ (Singerma n et al., 2006, 157). The culture of Arab countries can be explained by referring primarily to the characteristics of Arab culture as an indication of a specific way of life; indeed, in the study of Moran et al. (2007, 316) it is noted that the term ‘Arab’ is mainly related with a specific way of life – the nomadic way of life; through the decades, the term has been used in order to refer to the culture of people living in Middle East; however, it is made clear that not all people living in this area have the same cultural characteristics mostly because today Arab is considered to be related with

Thursday, September 12, 2019

Managment Essay Example | Topics and Well Written Essays - 1500 words - 1

Managment - Essay Example This is where union representation plays its vital role. The right to union representation is called the Weingarten Right. This is the right to request assistance from the representatives from the union during investigatory interviews through a union steward to make sure that the employee is not coerced and forced in any nature or form by the management to make confession of misconduct (www.cueunion.org, Weingarten Rights - the right to union representation). It refers to union representation during the company interrogations through a Union steward. The union steward is tasked to prevent any form of intimidation that the management will do to its employees (www.iatse728.org, Weingarten Rights). In any company, there comes a time that employees will be investigated for any charges of improper acts or behaviour against co-employee or the management. The Weingarten Rights will assure that during this investigation, an employee is free from coercion especially during confession through the presence of union representative or steward to witness the enquiry. The union steward is a very important person in union representation which has bountiful responsibilities to do. A union steward can help the employee investigated explain what really happened when the employee is inarticulate or afraid to answer. He can present justifications and mitigating factors for the employee and can advise the employee to be honest. The steward can also help the employee avoid making fatal admissions. Most importantly, the union steward serves as witness to prevent the management from making inappropriate action such as giving false account of the investigation (www.iatse728.org, Weingarten Rights). Collective Bargaining Collective bargaining is considered to be a legal obligation and... This paper approves that collective bargaining also has a very important impact to managing an effective workforce. Collective bargaining process helps provide element of security and certainty and may establish employee privileges and benefits which would otherwise may not have been provided by an employer dealing individually with employees. Because of this process or negotiation, agreements can be achieved between unions and employers. Through collective bargaining there is a harmonious and productive relationship between employers and employees because there is already agreed rights and responsibilities in the workplace for employment matters such as wages, insurance, working hours and conditions that are legally enforceable. The process of collective bargaining can also help reach an agreement to provide a â€Å"just cause† standard of review that an employer must use when deciding to discipline or discharge any employee in an arbitration process. In addition, collective bargaining is advantageous for both workers and employers. This essay makes a conclusion that labor unions through the process of collective bargaining can negotiate with the employers or management to maintain a healthy, peaceful and effective working relationship. Effective management of workforce can be achieved if there is union representation and collective bargaining which ensure that both the employers and employees are well benefited and given what is â€Å"just† for both of them.

Wednesday, September 11, 2019

Research Methods in Business Studies Assignment - 1

Research Methods in Business Studies - Assignment Example This means that all themes that come with the results of the study are outlined and discussed in this chapter. Some of the themes that the chapter will look includes data collection, which explains how the research design was operationalized, data gathering, which explains the actual process of collecting data, data analysis, which presents and analyses data, sampling selection, which throws light on how the sample used in the study was constructed, and survey participants demographic classification, which gives the unique demographic characteristics of the participants used in the study. The results chapter of the study is expected to give an overall view of what the real situation on the ground is, as far as the issue of EMR adoption in China is concerned. This is because it is through the results chapter that what participants who are directly affected or part of the situation give out information on what they perceive about the research problem (Ghauri and Gronhaung, 2002). Gill and Johnson (2007) noted that the data collection process defines the overall plan used in for the collection of data (Hussey and Hussey, 2007). By implication, the data collection component of this chapter helps to understand how the researcher put the research design into action. As part of the plan to collect data, the researcher had to select a research approach, which would help to identify the best way to approach the whole task of collecting data. Meanwhile, Remenyi, Williams, Money, and Swartz (2008) and Hakim (2010) presented two major types of research approaches which are the deductive and inductive research approach. In the deductive research approach, the researcher sets a hypothesis, based on which data is collected to either justify or disprove the hypothesis (Saunders, Lewis and Thornhill, 2003).  

Tuesday, September 10, 2019

The assingment is answering 10 Questions Research Paper - 2

The assingment is answering 10 Questions - Research Paper Example Further, it respects the rights of people by allowing them to elect leaders of their choice as opposed to the government in the film that was characterized by anarchy. 2. The character of "V" is very complex. Some of his deeds are noble, while others are monstrous. In the film he makes a threat to carry out one specific act on November 5 of the following year. Is that act moral or immoral? Is it useful in a fight against tyranny? Make reference to what Immanuel Kant would think of these acts? These acts were moral because they were aimed to produce the common good for the majority people who had been intimidated and oppressed by the government. For Immanuel Kant, the categorical imperative would have determined these acts as moral duty because it aimed to produce moral good not harm. In addition, according to Kant, moral action should not be based on person’s feelings or pity nor the desire to get a reward but on what you ought to do as a person. ‘V’ is not a terrorist because he is fighting to oust an oppressive government that is murdering and unjustly detaining people. The acts of ‘V ’are not terrorist since they target the corrupt regime not the citizens. He is determined to overthrow the ruling regime in order to establish a just society that respects its people. Therefore, the killing of ‘Norsefire’ party members cannot be justified as terrorist deeds because even these people orchestrate the murder of those who oppose the government. Yes, I agree with this tagline because it is people who are subjected to work in order to run the government. Thus, if the government oppresses them, they should revolt against such oppressive regime in order to get their freedom and liberty. Further, they should not fear the government because the voice of the mass cannot be ignored even with the use of guns or powerful military weapons since they will always triumph. 5. A

Monday, September 9, 2019

Accounting ...Auditing assignment Example | Topics and Well Written Essays - 1000 words

Accounting ...Auditing - Assignment Example For A & E cycle, there could be complex transactions expenses that cannot be classified with precision. Similarly, production cycle is faced by the complexities in method to use in valuing stock and goods produced. Secondly, the inherent risks in all the three cycles would affect both the balance sheet and income statement of the business. R & C cycle may either increase or reduce the receivables and cash and this would at the same time affect the income reported by the business. Inherent risks in A & E cycles affects the expenses reported thus affecting income statement. Likewise, wrong valuing of stock affects the inventory value in the balance sheet and also closing stock which alters the income reported. In all the three cycles, the inherent risk is increases by the fact that there are external parties’ dealings. These parties include the suppliers, debtors, and creditors. Fraudulent actions of these parties increase the inherent risks. In as much as there are similarities in the inherent risk in the three cycles, there are also some differences. Inherent risks in these cycles differ because of the differences in the nature of transactions involved. In R &C cycle, the asset involved is cash, A &E also involves majorly cash asset while and production cycle inventory is at risk. The three cycles are also characterized by different accounting standard requirements (Louwers 53). The manner of recognizing receivables is different from that of valuing stock or purchasing materials in the production cycle hence making their inherent risk different. R $ C cycle is entails the determination of the business debtors and the amount they owe to the business. The relevant department has to identify all the debtors and examine the credit period agreement. They then make the claims for the money and adjust their debtors’ balances. Source documents include sales order, credit

Sunday, September 8, 2019

Memo regarding gun violence and illegal use of narcotics Assignment

Memo regarding gun violence and illegal use of narcotics - Assignment Example However, their use should be solely after a doctor’s or professional pharmacist’s prescription. Nevertheless, many people tend to ignore this fact and go ahead to abuse these substances. The most common manner through which the abuse takes place is by taking these drugs in high dosages and, thus, altering their reception by the human body system. By modifying the reception, the brain fails to co-ordinate and function normally, and this leads to the users engaging in acts of violence. As in this case, the acts of violence often involve the purchase of firearms in an effort to settle old scores. In the normal and sober condition of these people, they may have had a misunderstanding with someone. The misunderstanding might have been negligible, but after the intoxication of the brain, all these emotions get heightened, thus resulting in the purchase of these weapons to commit acts of revenge or associated self-gratification tactics (Decker and Alarid 37). The other relation between gun violence and the illegal use of narcotics is concerning the economic environment. Over the last couple of years, the economy has been unstable with inflation hitting the market often. This has made it difficult for people that live under the poverty line and at times, even middle-income earners to survive these conditions. This leads to the indulgence in additional activities such as the sale of firearms in an effort to obtain additional money for the fulfillment of personal needs. For the addicts, these personal needs may even involve the purchase of more drugs. Another connection found between the illegal use of narcotics and gun violence is the systematic link (Decker and Alarid 47). Common to all countries in the world, the use of narcotics is a crime. This, therefore, makes it rather impossible for any peaceful drug business to take part legally. As widely perceived, any illegal activity is usually associated with violence. The narcotics environment is rather concealed

Saturday, September 7, 2019

Proposal (Subject-Mental Health and Criminal Justice) Research Paper

Proposal (Subject-Mental Health and Criminal Justice) - Research Paper Example Here, we develop a proposal on behalf of a community mental health support group. This proposal is developed using empirical evidence from previous methods. Issues of public safety and ethics are paramount. As such, we analyze the process of law enforcement as applied to the mentally ill, and in so doing, we delineate strengths and weaknesses of traditional methods of dealing with these problems. Our population of interest is those who have not responded well to conventional clinical-legal methods. These are the people who have been traditionally called lost causes or incorrigibles. Our proposal builds upon previously successful models as a consolidated inter-disciplinary method. Briefly, our proposal is one of laissez faire. Forced participation in mental health and substance abuse programs are most often not appropriate especially for people who have the ability to independently improve their own lives (Chandler et. al., 2004). Ultimately, it is a profoundly human endeavor to help others live down their own shortcomings. This is a certainty upon which any method should operate. Although their presence is becoming much more significant, offenders with mental illnesses are still some of the most disenfranchised groups in society. Here, we propose improved methods of dealing with this population in a criminal justice setting. As such, we present the background and rationale for our proposal as well as its details and predicted outcomes. As we explore relevant information with respect to mental health and criminal justice, we are faced with certain questions. Do we include alcohol and drug abuse as a mental illness? How much is the system itself responsible for aggravating mental illnesses in the population? Does punishment (particularly confinement and isolation) make matters worse or maybe even create a lasting state

Friday, September 6, 2019

Asos, a Company History Essay Example for Free

Asos, a Company History Essay ASOS was created in June of 2000 by UK natives Nick Robertson and Quentin Griffiths. ASOS, an acronym for As Seen On Screen, was a small online business based out of the UK that duplicated celebrity inspired products. Today they have over 1000 employees and over 50,000 items of fashion. From emulating celebrity fashions, they now are setting the trends. In 2001, the company was admitted to the London Stock Exchange, and the company quickly grew from there. In 2004, ASOS developed their own label for Women and in 2005, launched a beauty line. In 2007 they launched their own mens line as well as the extremely popular publication ASOS magazine. In the ten years after the business was first created, the company became extremely successful becoming the number one independent retailer in the United Kingdom. In 2010, started to branch out of the UK . ASOS launched websites in France, Spain, Italy, Australia, Germany and the USA, which made them an international well-known brand. Just in this past year they also launched their site in Russia. Today their website brings over 17. 5 million visitors month and as of 2012, they have 4. 4 million active customers from 160 countries. ASOS offers products under its own label as well as third party brands. These brands offer products in womenswear, menswear, footwear, accessories, jewelry as well as beauty. ASOS appears to be in a perpetual state of growth as their company seems to expand by the minute offering over thousands of new products a month.

Thursday, September 5, 2019

Mr aaban Essay Example for Free

Mr aaban Essay An employees contract of employment may be terminated by either the employer or the employer or the employee giving the notice required by the applicable award or the industrial Relation act 1990. Where the prescribed notice is not given, the employee shall be paid wages in lieu of notice, or the employer may withhold wages due to the employee. Part 2 Notwithstanding Part 1 above, where any employee is guilty of misconduct, the contract of employment may be terminated instantaneously. Where it is alleged that an employee is guilty of misconduct, the employee shall be provided with details of the allegation/s and be given a reasonable opportunity to respond to allegations prior to a decisions being made to either terminate the employment or to issue a written warning. Part 3 where it is alleged that an employees capacity or performance is unsatisfactory, then the following procedure should be followed. The existence of this procedure shall not prevent an employee being dismissed in accordance with part 2 above. The initial discussion and direction will be provided on an informal basis by Business manager of other authorised person. If the problem/s persist the Business manager to other authorised person will discuss with employee. 1. the matter/s of concern; 2. action necessary to resolve the concerns; and 3. a timetable for improvement to be evidence. input including explanations will be sought from the employee. As a result of this discussion the Business manager or other authorised person will notify the employee in writing regarding those matters in question discussed per clause 3. 5 above The notice will detail; 1 the matter/s of concern; 2. actions necessary to resolve the concerns; 3. a timetable for improvement to be evidenced. This notice will be signed and confirmed by the employee to recorded the discussion (3) above. of there is a disagreement as to the content of the notice the employee shall have the opportunity for their view to be placed on the record. Appropriate monitoring and counselling shall then be provided to the employee by the business manager or other authorised person. part 4 at any meeting or discussion forming part of the process in part2 or 3, the employee nay be accompanied by a union representative or other person of the employees choosing. Macville Private Incident Hazard Form Incident/ Hazard Report Form Given Name: John Family name: Dawson Position Title: Equipment Assistant International? Yes No Visiting Student Agency Personnel Visitor Contractor Employee number/ Student ID : s654 Address: 57 Mitford Crescent Craigieburn Division: 50 Management Unit: 15 TAFE Unit/ Sub Management Unit: 20 DOB: 02/06/1985 Gender: M F Contact details: 86557342 Have you reported this to your Team Leader/ Manager? Yes No Date 15/08/2012 notified Yes Name ( please Print): Matthew Contact: 0432654678 Macville Private Questions and Answers for Incident Hazard Form Question1. Feed back for the use of Templates: Answer: For Incident Hazard form we got feedback from the employees and management committee so made some changes in it. In incident hazard form we got the feedback from employee suggested that we need to add more question in section 2 details of incident. Rest of the format for this template was achieved good response from all of them. Question 2. Change in template after feedback Answer: According to the feedback on the use of template we made some changes in for example we add some more question regarding the incident so we after giving the answer to those question we have more information what actually happened. Question 3. How to provide information for document Answer: We can use Meta tag which is primary used to help search engines better index a document by supplying additional information about the document. Question4 : Which particular section of the form should prior check the form? Answer: In incident hazard form first check the details of the person to check they are appropriate and then check the details of the incidents what actually happened. Question 5: which software used to make forms for example? Answer: For Incident Form we used software Microsoft word. Macville Private Question and answer for Performance Development form Question1 : Feedback for the use of Templates Answer: Fro the Professional development form we got feedback from the employees and management committee so made some changes in it. First of all we just asked in the form for professional goals then they suggested that if we achieved good response from all of them. Question2. Change in template after feedback Answer: According to the feedback on the use of template we made some changes in for example we made another column of personal goals in professional development form so we can achieve both goal employees personal and professional Question3 : How to provide information for document Answer: We can use Meta tag which is primarily used to help search engines better index a document by supplying additional information about the document. Question4: Which particular section of the form should prior check the form Answer: In Performance development form all the sections are important but firstly we will check the Name of the person and date of reviewed and there goals. Question5: Provide clear instruction for the use of all three forms. Answer: Development form is a really good way to know the employees work performance that how the employee is doing the job and what he/she want to achieve from doing that job and what/where they can do best in the future for the organisation to achieve their targets and mission.

The Information Technology Act

The Information Technology Act When Internet was developed, there was hardly any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities in cyberspace. All existing laws had to be amended to suit the latest developments. Since other laws cannot handle cyber legislations completely, the need was felt to introduce cyber law as a separate discipline. Reasonable Security Measures must be adopted while handling, storing, processing Sensitive Personal Information and Data. This paper examines the various aspects of Cyber Legal System. Keywords- Cyber Crimes, Cyber Crime Investigation, Cyber Forensics, Cyber Space, Cyber Law, Data Protection, Digital Signatures, E-Contracts, Intellectual property rights, IT Act INTRODUCTION The growth of Information Technology has given rise to a new society named Cyber Society. Computers and allied technology is used as a basic tool in Communication, Storage, and Control. Cyber Society includes Cyber Space which is no different from physical space in real society. Information and Communications Technology popularly known as ICT is considered as an integration of computers, software, storage, visual systems, telecommunications that enables a user to access, store, transmit and handle information. To maintain harmony and co-existence in Cyber Space, a need was felt for a legal regime which we call as Cyber Law. In simple words, Cyber Law is the law governing and regulating cyber space. Cyber Laws impact every aspect of Cyber Society be it Education, Entertainment, Business etc and are considered as basic laws of Cyber Space. INFORMATION TECHNOLOGY ACT Indian Cyber Law comprises mainly of Information Technology Act. The Information Technology Act was enacted in the year 2000 and came into force since then. IT Act 2000 is not a penal statute. The Act is intended to promote e-governance of which an essential part is e-commerce. All cyber crimes do not come under the ambit of IT Act; many crimes are covered under IPC. The objective of IT Act 2000 is to provide legal recognition to electronic records and transactions carried out by way of electronic data interchange. CYBER CRIMES Cyber Crimes require no special introduction. In this information technology era, computers and technology are used in every phase be it Business, Education, Governance, Communication, Booking of Rail, Air, Cinema Tickets to name a few. Crimes committed in the Cyber World are Cyber Crimes. In general, cyber crimes can be explained as crimes committed by using a computer either as a tool or a target or sometimes both. There are a variety of Cyber Crimes including Unauthorized Access, Tampering Computer Source Code, Electronic Documents, Forgery, Virus, Trojans, Online Defamation, Cyber Trespass, Stalking, Email Harassments, and Lottery Scams etc. New types of crimes are evolving day by day. Information Technology Act 2000 discusses certain types of Cyber Offences and provides Civil and Criminal Remedies thereon. The punishment is also provided under Information Technology Act 2000, Indian Penal Code, Criminal Law, and Banking Law etc. Therefore, any crime committed on the Cyber Space or by use of Cyber tools is punishable under Indian Law. These Laws are also applicable for persons residing outside India provided any computer, computer network, computer resource in India is used to commit a crime. E-CONTRACTS DIGITAL SIGNATURES A contract is considered as a key element in business. All agreements enforceable in a court of law only are called contracts. The ICT has given a new medium to transact business which is the electronic medium. A new form of business called e-business has become popular today which led to a revolution in commerce by way of e-commerce. With the rise in e-commerce, e-business, the business essentials also turned electronic. This has bought in a revived approach to paper based contracts by introducing e-contracts or online contracts. Information Technology Act has provided legal recognition to all e-contracts. The Act has advanced a unique form of authentication by way of e-authentication which includes digital and electronic signatures. An Electronic document to be legally valid has to be affixed with digital/ electronic signature. The digital signature is needed to use a PKI (public key infrastructure) authentication mechanism. Digital Signature forms an important component of E-contracts and a standard one way hash algorithm is adopted for checking the data integrity. In simple words, there is a public key which in the public domain and there is a private key which is known only to the private user, only if both the keys correspond the document is validated. The Government has licensing authorities called CAs (Certifying Authorities) who would be responsible for issuing a standard key generation systems to the public. A digital certificate would be issued based on application and certain approved procedures. At present there are four agencies established for this purpose including NIC, IDRBT and two private agencies like TCS, Safe Scrypt. IT Act 2000 has also provided a clarification as to determining the time and place of an electronic document when it is transmitted from one place to other. Any electronic document including a webpage, e-mail or any computer generated document can be held against the originator for legal purpose under the ambit of this law. Any automatic system which is either a hardware or software like programs, servers, routers can be considered as an Agent of the owner and any action taken by such a system may be legally held to be an action taken by the owner himself. DIGITAL RIGHTS Freedom of Speech and Right to Privacy are considered as certain rights which all the Citizens enjoy in the nation. Correspondingly, these rights also exist in the digital world. Just as freedom of speech is guaranteed by the Constitution of India, the same also extends to Online Speech or Cyber Speech that might include expression on a website, rights of regulators to restrict the freedom in the interest of sovereignty and integrity of the country, maintaining friendly relations with its neighbors as well as to retain harmony and peace in the society. The Information Technology Act provides that the Controller of Certifying Authorities can order decryption of any information and failing to co-operate with the concerned authority could lead to imprisonment. In addition, under POTA (Prevention of Terrorism Act), the appropriate authorities can intercept communication including emails under approved procedures without the knowledge of the user of the email. Likewise, an investigating Police officer has certain rights to not only intercept and monitor communication but also provide requisition support of the Network administrator for the purpose under Criminal Law read along with Information Technology Act. Right to privacy is a personal right that is guaranteed by the Constitution of India. In the world, whenever a person visits a website or sends out an e-mail his digital identities are being recorded by several systems. Additionally, users share their personal information for varied reasons to different websites. This information is covered under the privacy rights of a user. INTELLECTUAL PROPERTY There exists digital property in cyber world as like the real property in real world. The digital property is also known as Intellectual Property. It is an intangible asset and a vital element in the e-business. It comprises of Copyright, Patent, Trade Mark, Trade Secret, Domain Name, Semi Conductors and Industrial Layouts, Designs. Domain Name is a crucial digital property which a website owner possesses. There is a contractual arrangement between the Domain Name Registrant and Domain Name Registrar. Domain Name registrars are those who are authorized for the purpose by ICANN (Internet Corporation for Assigned Names and Numbers) and the law regarding domain names is governed indirectly by the policies of the ICANN. Laws relating to domain names is associated and linked closely to Trade Mark Law. Generally, the person holding a trademark right can claim priority to possess a corresponding domain name. Content is another cyber property that needs to be considered. Content either within a file or on a website confers a copyright to the original author. The holder of copyright can assign or license the copyright for a price or allow it to be freely used by the public. Infringement, Punishments, Remedies are provided under the Copyright Law. Copyright in cyber world has some grey areas mainly due to a strict definition of Copyright law as applicable to the Meta Society would make Caching, Proxy Server Setting, Meta Tags setting, Caching by a search engine, Hyper linking, Framing, File Sharing etc as possible copyright infringements. Another area where digital property can be recognized is patents on Software and Web Utilities. These are encompassed under the Patent laws. A patent holder can enforce payment of licensing fee or damages if a Patent system is used by another person without specific authorization. Patents in the cyber world are facing a dilemma especially in regard to aspects of technology that are needed to keep the Internet going like Framing, Hyper Linking etc since they are claimed as patented products by the patent holders. DIGITAL EVIDENCE Evidence is the element which probablises a case in a court of law. The evidence in digital form is called Digital Evidence. This digital evidence may be found in computer hard disks, cell phones, iPods, pen drives, digital cameras, CDs, DVDs, floppies, computer networks, the Internet etc. In Civil Law, evidence is analyzed on the principle of PREPONDERANCE OF PROBABILITY. In Criminal Law, evidence is analyzed on the principle of BEYOND RESONABLE DOUBT. Digital Evidence is relatively difficult to destroy. Even if it is deleted, digital evidence can be recovered. When criminals attempt to destroy digital evidence, copies can remain in places they were not aware of. The Present Legal Scenario mandates two sets of quantum of evidence à ¢Ã¢â€š ¬Ã‚ ¢ STRINGENT à ¢Ã¢â€š ¬Ã‚ ¢ RELAXED FACTORS OF DIGITAL EVIDENCE à ¢Ã¢â€š ¬Ã‚ ¢ IDENTIFICATION à ¢Ã¢â€š ¬Ã‚ ¢ PROCUREMENT à ¢Ã¢â€š ¬Ã‚ ¢ PRESERVATION à ¢Ã¢â€š ¬Ã‚ ¢ ANALYSIS à ¢Ã¢â€š ¬Ã‚ ¢ PRESENTATION IN A COURT OF LAW If it can be proved that the chain is not compromised and from the time the sample is taken a standard protocol was followed,the defence tries to demonstrate that there was a possibility of compromise in the chain and proves that he is entitled for a benefit of doubt.(NDPS ACT ,FOOD ADULTERATION). The basic philosophy of understanding or accepting evidence is to know its authenticity. A document should be demonstrated or proved that it is the same document what is purports to be. The forensic skills, technology may be used to prove or demonstrate before a court of law. Section 65 B of the Indian Evidence Act 1872- a certificate similar to Section 3, 4 of Bankers Book Evidence Act. LOGIC BEHIND THE LAW In a secure environment, if persons are to transact there should be a trusted authority. The authority would supervise things to check the integrity, attributions and to prevent non- repudiation. If all these characteristics are given to any environment, the legal system of any country would accept it as legally admissible evidence. TRUSTED AUTHORITY The certificate issued by a trusted authority there is a general tendency to believe it to be true. There are many cases of manipulation of these certificates, but still such systems are not scrapped off. Eg: Voter ID, Passport There cannot be a 100% fool proof system. If it can be demonstrated before a court of law that the new technology is reasonably reliable which would indicate that if manipulated can be found out, then it is accepted by the court. The trusted authority is the certifying authority. It certifies the digital signature. There is an attribution or a presumption a corresponding amendment in the Evidence Act all these together make a presumption. All presumptions are rebuttable. The presumption shifts the onus or burden to the other party to prove the compromise. It applies to civil and criminal law. It is the passport office of the digital world. CYBER CRIME INVESTIGATION It is the Collection, Analysis, investigation of digital evidence, cyber trails. The various techniques of cyber crime investigation include forensic analysis of digital information -using forensic tools, use of sound forensic procedure to identify and detect evidence, examination of evidence, observation of proper custody of evidence, control procedures, documentation of procedures, findings to ensure admissibility in a court of law, preparation of comprehensive written notes, reports. INCIDENT RESPONSE It is considered as a pre-cursor to techniques of cyber crime investigation, forensic tools. Incident Response may be referred to as precise set of actions to handle any security incident in a responsible, meaningful and timely manner. The goals of incident response include confirming whether an event has occurred, educating senior management, helping in detection or prevention of such incidents, minimizing disruption, facilitating criminal action against perpetrators. Various steps of incident response are detection of incidents, initial response, investigation of event, reporting, resolution, pre-incident preparation. CYBER FORENSICS It is considered as the use of investigative, analytical techniques to identify, collect, examine, preserve and present evidence or information which is magnetically stored or encoded. Cyber Forensics can be also defined as the scientific method of examining, analyzing data from computer storage media so that data can be used as evidence in court The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. Computer evidence is just like any other evidence in the sense that it must be authentic, accurate, complete, convincing to Juries, in conformity with common law and legislative rules. EXAMINER OF ELECTRONIC RECORDS Section 79 A of IT Amended Act 2008 empowers the Central government to appoint any department or agency of Central or State government as Examiner of Electronic Evidence. This agency will play a crucial role in providing expert opinion on electronic form of evidence The explanation to the Section has an inclusive definition of electronic form evidence that means any information of probative value that is either stored or transmitted in electronic form and includes computer evidence, digital audio, digital video, cell phones, digital fax machines. With the increasing number of cybercrime cases it will become necessary to set up at least one Examiner of Electronic Evidence in each State. The CDAC cyber forensics lab in Trivandrum, CFSIL laboratory in Hyderabad are playing similar role at present in cybercrime. COMPUTER- LEGAL DEFINITION COMPUTER is defined under Section 2(1)(i) of the IT Act as:- Computer means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network;[1] ANALYSIS OF DEFINTION The term computer has been defined in a very wide sense. Considering the definition, devices like microwave ovens, washing machines, scanners, printers, desktops, personal computers, mobile phones etc are considered as a computer under Information Technology Act. COMMUNICATION DEVICE Similarly the word communication devices inserted in the Information Technology Amended Act 2008 has been given an inclusive definition, taking into its coverage cell phones, personal digital assistance or such other devices used to transmit any text, video etc like what was later being marketed as iPad or other similar devices on Wi-Fi and cellular models. CYBER SECURITY There is a need to create a secure environment in cyber space and also prevent unauthorized access and misuse of computer system. In simple words, the security of the cyber space can be called cyber security. Cyber security is critical due to the dangers that threats in cyber world. It requires a global co-operation and effort from all stake holders. DEFINITION The term Cyber Security is for the first time given a legal definition under Indian Cyber Law. Cyber Security has been newly added in the IT Amended Act 2008, under Section 2 (nb) which is as under- Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. [2] ANALYSIS OF DEFINTION The said definition provides security in terms of both, physical security to the devices and security to the information stored therein such devices. The above definition also provides protection for unauthorized access, use, disclosure, disruption, modification and destruction to both physical device and the information stored therein. All communication devices like phones, smart phones and other devices used to communicate audio, video, image, text is covered under the ambit of the definition. DATA PROTECTION LEGAL REGIME Processing of data raises considerable issues on privacy, e-security, misuse of individual information and data. Personal data like credit cards, debit cards etc are normally routed via many countries. The Government of India recently notified the Reasonable security practices and procedures and sensitive personal data or Information Rules, 2011 (Rules) under Section 43A of the Information Technology Act, 2000 (ITA). These Rules have been made effective from April 11, 2011. Section 43A of the ITA inter alia deals with protection of data in electronic medium1 by providing that when an body corporate is negligent in implementing and maintaining reasonable security practices and procedures in relation to any sensitive personal data or information which it possesses, deals or handles in a computer resource which it owns, controls or operates and such negligence causes wrongful loss or wrongful gain to any person, such entity shall be liable to pay damages by way of compensation to the person so affected. Section 43A applies to data or information in a computer resource. The Rules define Personal Information and Sensitive personal data or information to mean as follows: Personal Information means any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person Sensitive personal data or information means such personal information which consists of information relating to;- (i) Password; (ii)Financial information such as Bank account or credit card or debit card or other payment instrument details; (iii) Physical, physiological and mental health condition; (iv) Sexual orientation; (v) Medical records and history; (vi) Biometric information; (vii) Any detail relating to the above clauses as provided to body corporate for providing service; and (viii) Any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise.[3] EXCEPTION TO SENSITIVE PERSONAL DATA OR INFORMATION Any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force is not to be regarded as sensitive personal data or information. ANALYSIS Definition of personal information is wider than sensitive personal data or information (SPDI). The definition of SPDI is in the nature of an exhaustive list of items. Hence, no other information apart from the one listed above, would be considered as SPDI. It is interesting to note that Section 43A only included SPDI within its ambit, but some of its provisions of the Rules have been made applicable to Personal Information. It is appropriate to note that these Rules apply to personal information irrespective of the nationality of the provider of the information; thus information provided not only by Indian nationals but also by nationals in different jurisdictions, whose information is stored, dealt or handled by a corporate entity in a computer resource in India would attract the provisions of the ITA. The applicability is driven by the location of computer resource in India, as can be seen from the wording of Section 43A of the ITA read with the Rules. Rules will also be applicable in cases where the information is collected in India and is transferred to any computer resource outside India and also in cases where the information is neither collected nor stored in India, but is dealt with or handled in India E.g. even accessed from India. Thus, typical outsourcing businesses where personal information of foreign nationals is transferred to Indian entity (ies) who deal or handle such information would henceforth attract the provisions of the IT Act. DATA PRIVACY RULES SECURITY MEASURES The Data Privacy Rules require that the body corporate and the Data Processor implement reasonable security practices and standards; have a comprehensively documented information security program, and security policies. These must contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected and with the nature of business. The International Standard IS/ISO/IEC 27001 on Information Technology Security Techniques Information Security Management System Requirements is recognized as an approved security practices standard that the body corporate or the Data Processor could implement to comply with security measures under the Data Privacy Rules. Any other security standard approved by the Central Government may also be adopted by the body corporate or the Data Processor in compliance with the security measures under the Data Privacy Rules. The security standards adopted by the body corporate and the Data Processor should be audited by an auditor approved by the Central Government. The audit must be carried out at least once every year, or at such times as the body corporate or the Data Processor undertakes a significant upgrade of its process or computer resource. If there is an information security breach, the body corporate or the Data Processor will be required, upon request from a governmental agency, to demonstrate that it has implemented the security control measures as per its documented information security program and information security policies. A corporation is required to designate a Grievance Officer to address the grievances of the Provider. The name and contact details of the Grievance Officer must be published on the website of the body corporate. The Grievance Officer must address the grievances within 1 month from the date of receipt of grievance. JURISDICTION Since the cyber world is a boundary less world, there are lots of issues regarding Jurisdiction, which laws would apply. Material may be lawful at one place, but unlawful somewhere else for instance the places from where is it accessed. The Yahoo Case is a classic example. ILLUSTRATION Consider a scenario, where a person A is employed as a computer programmer by a bank in Country X. The programmer managed to instruct a computer to transfer money to his account in Country Y. A case was registered against the programmer in Country X. On Appeal, the Court in Country X had no jurisdiction over matters from Country Y. Though S.75 of IT Act provides for extra-territorial operations of this law, but these should be enforced with orders and warrants of external authorities and demands a highest level of inter-agency cooperation. ADJUDICATING AUTHORITY ADJUDICATING OFFICER Up to Rs.5 Crores IT SECRETARY OF THE STATE. CYBER APPELLATE TRIBUNAL appellate jurisdiction. SUB COURT or CITY CIVIL COURT. CYBER CRIME PROSECUTION Section 67 C to play a significant role in cyber crime prosecution- Section 67 C brings a very significant change in the IT Act, 2000. According to this section, intermediaries shall be bound to preserve and retain such information as may be prescribed by the Central government and for such duration and format as it may prescribe. Any intermediary that contravenes this provision intentionally or knowingly shall be liable on conviction for imprisonment for a term not exceeding 2 yrs or fine not exceeding one lakh or both. Many cybercrime cases cannot be solved due to lack of evidence and in many cases this is due to the fact that ISP failed to preserve the record pertaining to relevant time . This provision is very helpful in collection of evidence that can prove indispensable in cybercrime cases POSSIBLE RELIEFS TO A CYBERCRIME VICTIM- STRATEGY ADOPTION A victim of cybercrime needs to immediately report the matter to his local police station and to the nearest cybercrime cell Depending on the nature of crime there may be civil and criminal remedies. In civil remedies, injunction and restraint orders may be sought, together with damages, delivery up of infringing matter and/or account for profits. In criminal remedies, a cybercrime case will be registered by police if the offence is cognizable and if the same is non cognizable, a complaint should be filed with metropolitan magistrate For certain offences, both civil and criminal remedies may be available to the victim CONCLUSION The word cyber crime is not mentioned in the IT ACT for the reason that not to scare away the potential users and keeping in mind the basic philosophy of reducing the digital divide(computer literate or not ) . Reasonable measures should be adopted. The IT Act is an articulation of all existing laws with e added to most of the provisions. The dark or grey areas should not alone be highlighted. We can therefore conclude that cyber law knowledge is the need of the hour for the persons working with computers, computer systems, computer networks, computer resources and information communication technology since these laws cover the legal aspects of the information technology and ignorance of law is no excuse in the eyes of law.