Saturday, December 28, 2019

Project Management - Constraints - 1926 Words

Project Mangement - Constraints By Jasmeet Prakash A project has many factors which determine its level of manageability and success. These factors can be considered constraints which may cause delays or difficulties. The most important criteria for a balanced project is often quoted as the careful organisation of these constraints. Constraint reducing techniques are used to better equip a Project Manager for success. These techniques are accomplished through the use of practical guides or methods, improving communication and personal skill of the Manager. A constraint is a limitation or a restriction. This is anything which can delay the project. In order to figure out how to avoid constraints, it is important to first establish†¦show more content†¦This can be done through an Analytical Hierarchy Process giving each criteria a priority score. For example, On a building project, a Manager will prioritise laying a concrete foundation before the need to bring roofing tiles onsite because the roof cannot be constructed until the walls are put up, and that can only occur after the bottom floor is complete. Other more specific planning models have been made to help assist the efficiency of project management, two well known models are PMBOK (A Guide to the Project Management Body Of Knowledge) and PRINCE2 (Projects IN Controlled Environments). PMBOK is a suggested way of approaching each stage of a project working as a guide where as PRINCE2 goes through the different phases of any given project, making it a methodology. These mod els are flexible and realistic, which make them easy to use. A guide is a suggested approach, so in any project case, it can roughly apply. It is a guide because it helps plan the project which can be referred to and may point out things which may have been overlooked and therefore help eliminate the constraints which may not have been thought of. A methodology is a specific structure. PRINCE2 starts from Starting up a project to Closing a project. An example of when this is used to restrict constraints is if a Manager starts on a project immediatley after it is given and does not properly take the time in planning on how it will be completed (short term planning). A longShow MoreRelatedProject Management : The Time Constraint3014 Words   |  13 PagesAbstract There are three major constraints of Project Management: the Time constraint, the Cost constraint and the Scope/Quality constraint. As the name suggests, the Time constraint refers to the time available for the completion of the project, Cost constraint refers to the allocated budget and the Scope constraint refers to the final expected outcome. For a construction project, it is virtually impossible to achieve the best of all worlds, i.e., cheapest, fastest and of the desired quality. DueRead MoreProject Management - Constraints1932 Words   |  8 PagesProject Mangement - Constraints By Jasmeet Prakash A project has many factors which determine its level of manageability and success. These factors can be considered constraints which may cause delays or difficulties. The most important criteria for a balanced project is often quoted as the careful organisation of these constraints. Constraint reducing techniques are used to better equip a Project Manager for success. These techniques are accomplished through the use of practical guides or methodsRead MoreConstraints Management Project ( Surgical Medical Packs )2087 Words   |  9 PagesMGT 333 Constraints Management Project (Surgical Medical Packs) 1. Detailed description The custom surgical packs is a process of assembling, sterilizing, packaging and delivering surgical packs for scheduled surgical procedures in hospitals. This is a process that is facilitated by the client hospitals coordinating with their approved manufacturers of the surgical tools, instruments and linen to deliver their pre-approved list of selected items of their choice and use in a specific surgical procedureRead MorePerformance1552 Words   |  7 PagesTHE MEANING OF PROJECT: A project is a unique venture with specific start and end dates. This is different from an ongoing task that doesnt have an end date. Projects often involve different parts of an organization. Constraints on project include cost, schedule, resources, and quality. There is a give and take between these items i.e. you cant have it all. Usually projects are divisible into stages or phases each with their own set of priorities and goals. A project is an important and carefullyRead MoreTheory Of Constraint Technique Is The Elimination Of Idle Time1716 Words   |  7 Pages Another Theory of Constraint technique is the elimination of idle time. For whatever reason, idle time is also present in bottleneck resources. For instance, all employees may have a break at the same time leading to no performance during the bottleneck process. Short breaks may have a high opportunity costs since the bottleneck have a constraint effect on the entire plant output. Thus, elimination of such idle time may improve a factory s output. As a TOC technique, scheduling and sequencingRead MoreReasons For Software Project Failure Essay1131 Words   |  5 Pagesbillion, an increase of 4.8 over 2012. Many companies invest into innovative IT projects with the intention to boost new opportunities for their businesses, increase their competitiveness in the market. It implies there are millions of small and big software projects all over the world. But researches show that most of the software projects are not successful indicating huge money loss for economies. In fact failed proj ect is more than just loss of money, it’s a lost opportunities, damaged image andRead MoreDetails on the EPC Process and Approach849 Words   |  3 Pagesaccording to EPC project phases. It organises the deliverables of the project scope with cost and schedule. Each WBS is assigned to the individual representative with work packages for their estimating and performance of the tasks. Due to the limitation of this report, this section is focused only on one of the work break structure such as DCS engineering as an example which can be imitated to the other work packages and tasks. The project scheduling is analyzed with theory of constraints and CCPM comparingRead MoreCase Study Management : Master Of Project Management Essay1349 Words   |  6 PagesName : Project management Program : MASTER OF PROJECT MANAGEMENT Semester : ONE/ MAY SEMESTER 2015 Assignment : ORGANIZATIONAL AND BUSINESS MANAGEMEN Facilitator : ISMAIL ALOW Date due : 02/07/2015 Submission Date : 29/08/2015 Table of Contents 2 1.0 Introduction 3 2.0 Literature Review 5 2.1 Schedule 5 2.2 Cost 6 3.3 Scope 6 3.0 Discussion of Triple Constraints 7 4.0 Discussion on execution of the three elements by Project ManagerRead MoreThe Relationships Between Scope Definition and Time Management1358 Words   |  6 PagesRELATIONSHIPS BETWEEN SCOPE DEFINITION AND TIME The Relationships Between Scope Definition and Time Management The relationships between scope definition and time management have as many similarities as they do differences. Scope definition basically, is knowing exactly what needs to be accomplished. This is the first step in accurately forecasting and controlling cost and schedule, which ties into time management. Using quantity surveys performed on a periodic basis are the foundation of determining whatRead MoreProject Management : Projects Management902 Words   |  4 PagesProject Management Project Management. What does the words Project Management mean and what are the steps to managing a great project. If we break down the two words Project Management it is defined on dictionary.com as â€Å"The process of planning, organizing, staffing, directing and controlling the production of a system†. As shown in the website Project Insight there are multiple different steps in the project management roll such as project scope, life cycle, objectives, assumptions, constraints

Friday, December 20, 2019

War Is Naturally Violent, And The Iliad Essay - 1606 Words

War is naturally violent, and the Iliad does not hesitate to describe the atrocities committed by men with spears and swords. They kill each other, descriptively, and although individual heroes may get glory or special recognition for prowess in battle, the detailed depictions of death do not glorify the actual acts of warfare. Even the gods and heroes are critical of taking too much pleasure in waging war, though the epic celebrates the men who are good at it. Several of the heroes, like Diomedes and Achilles, single-handedly hold off the enemy and in doing so, seem to rise above the limits of normal men. They even escape the ignobleness of death and are called â€Å"beautiful† after dying. In all, the Iliad acknowledges the realities of war and does not glorify its violent nature, but it does appoint extraordinary honors to the heroes who fight in the war. The Iliad shows the violence of war without obscuring the brutality of the bloodshed, demonstrating a willingness to show the inglorious side of war. The poem dedicates pages to chronicling the various ways men are killed, which includes being slaughtered in sleep and being â€Å"sliced through the neck, leaving only / A ribbon of skin from which the head dangled† (16.358-359). It is likely unsettling for an audience to contemplate a beheading violent enough to leave the head dangling by nothing but a strip of skin, but that is what happened and it appears to be reported without much apparent censorship. Although Homer does notShow MoreRelatedEssay On Simile In The Iliad790 Words   |  4 Pagestrademark of the epic poem. It describes an extended simile, which continues for lines on end, and the extended simile’s vehicle often describes multiple characteristics of its tenor (Cite Sharon Hamilton!). Homer uses the Homeric simile throughout The Iliad to describe the Troj an or Achaean people and/or army as a group. Yet, the Homeric simile also applies to an individual many times throughout the text, specifically, The Iliad’s protagonist: Achilles. Achilles is a complex and dynamic character. DespiteRead MoreThe Beginning Of Humanities Core862 Words   |  4 PagesHumanities Core in fall quarter, my understanding of war was primarily centered around soldiers and how killing others permanently scarred them, often leading to post-traumatic stress disorder. Being a Cognitive Sciences major, I am naturally interested in how extreme situations, such as war, affect people’s psychology. However, my focus drifted in an entirely new direction, towards civilians in wartime (See: Tags), as the year progressed and my view of war became more complex. 539w Meryl Streep in a productionRead MoreMy Final Words On War871 Words   |  4 PagesWords on War At the beginning of Humanities Core in fall quarter, my understanding of war was primarily centered around soldiers and how killing others permanently scarred them, often leading to post-traumatic stress disorder. Being a Cognitive Sciences major, I am naturally interested in how extreme situations such as war affect people’s psychology. However, my focus drifted in an entirely new direction, towards civilians in wartime (See: Tags), as the year progressed and my view of war became moreRead More Honor as the Theme in Homer’s The Iliad Essay2033 Words   |  9 Pagesironically, they were never written and were first composed in Ancient Greek—The Iliad and Odyssey. Both epics are famous for the literariness therein, but more than that is the theme that spins around the two epics—the importance of honor. In The Iliad, this is shown more than ever, and amidst the thousands of deaths, the murder and betrayal, the wrath of the gods and goddesses, the beautiful queen which caused the war, and the mythical and mystical of creatures is the pervading atmosphere and perceptionRead More Use of Color in Cranes The Red Badge of Courage Essay1643 Words   |  7 Pagesanother green world, the green world of youth. Like schoolchildren, the young soldiers circulate rumor within the regiment. This natural setting proves an ironic place for killing, just as these fresh men seem the wrong ones to be fighting in the Civil War. Crane remarks on this later in the narrative: He was aware that these battalions with their commotions were woven red and startling into the gentle fabric of the softened greens and browns. It looked to be a wrong place for a battlefield (69). GreenRead More Achilles Vs Odysseus Essay example3811 Words   |  16 PagesNevertheless, both heroes are defined not by their appearances, nor by the impressions they leave upon the minds of those around them, nor even so much by the words they speak, but almost entirely by their actions. Action is what drives the plot of both the Iliad and the Odyssey, and action is what holds the characters together. In this respect, the theme of humanity is revealed in both Odysseus and Achilles: man is a combination of his will, his actions, and his relationship to the divine. This blend allowsRead Moretheme of alienation n no where man by kamala markandeya23279 Words   |  94 Pagesancient Greece, after Athens and Sparta. Sophocles described it as â€Å"the only city where mortal women are the mothers of gods.† According to Greek legends, the city was founded by Cadmus and was destroyed by the Epigonoi in the time before the Trojan War. In the sixth century B.C., Thebes recovered its glory to some extent, and in Sophocles’ time it was still a powerful state. LIST OF CHARACTERS Major Antigone The daughter of Oedipus, the former King of Thebes. Her mother, Jocasta, was Creon’s

Thursday, December 12, 2019

International Management Research Reviews -Myassignmenthelp.Com

Question: Discuss About The International Management Research Reviews? Answer: Introduction: This is to be noted that Blue Ocean Strategy is known as the significant impactful and iconic business strategy. This strategy usually denotes to the formation by an individual new company, unchallenged industry space that states the rivals immaterial and that makes new customer value frequent during costs decreasing. It is to be mentioned that this specific strategy was mentioned for the first time by Rene Mauborgne and W. Chan Kim in the popular book with their name (Randall, 2015). Blue Ocean Strategy offers a competitive benefit to the business: This is to be stated that the evaluation of a business plays an important role in order to denote the need of reanalyzing the market strategies and entry of the "blue ocean." Red Ocean It can be said that the specific company who has business strategies comprising the struggle for a portion of limited sales, comes under the category the red ocean (Leibtag, 2013). The particular business plan should engage rivalry with the other significant companies in order to rise the company share. It is evident if company becomes absolutely unsparing with the specific entries of the new rivals then the revenues expected to decrease. Therefore it is essential for a company to leave the specific red ocean and opt for the blue ocean if the rivals wish their rivalry to be inappropriate. Source Exceeds Plea: Significant companies find it easier to provide significant amount of product due to the technological improvement. This is to be noted the increasing number of production does not provide the idea that the demand for the increment does not increase as per the supply. It is evident that the companies who are under the red ocean with other significant rival companies that also have a hefty amount of supply, the rivalry and combating profit will increase. Therefore, it is always beneficial for the companies to get into the blue ocean to look for new scopes. The example of Apple can be taken where it is clearly being seen that the success of Apple was marked with its entry in blue ocean market along with the iPhone, iPad, iPod (Mickey 2013) Unappealing Industry: The absolutely new companies can wish to take a portion of the pie, diving the beneficial profits with other significant companies in the red ocean when entering to an unappealing and competitive industry. According to Mauborgne and Kim, the Yellow Tail, a significant Australian wine company, utilized the blue ocean strategy when it determined not to contest in the red ocean with the specific wine brands of French and Italian. Other Companies Imitate You It is evident if a company can work successfully in the significant blue ocean, it might appeal to the other specific companies. It can transform the blue ocean space to a red one for the company. Therefore it is vital for a company to discriminate themselves in that case. This is to be noted that Kim and Mauborgne has utilized the Salesforce.com, a consumer relationship management method, as a significant example of an individual company that reformed in the blue ocean when others take part in the competition (Williams, 2015). Analysis of two principles of Blue Ocean Strategy with my professional experience: Reconstructing market boundaries: This particular principle identified the specific paths to help me creating unchallenged industry space across the multiple domains and reducing the risk (Chandrakala, 2013). It has offered me guidance to make the rivalry irrelevant by finding the six predictable boundaries of rivalry to be exposed financially significant blue oceans. The six paths are to concentrate on: alternative market place strategic collectives customer groups alternative products service provide It needs to be analyzed on the basis of the functional-emotional dependence of a company across the specific time and zone. Build execution into strategy: This is to be noted that I have motivated to execute blue ocean strategy in order to survive with my company in the organization. This principle comprises a significant fair process as this strategy positively represents a significant withdrawal from the particular status quo (Sull 2015). The fair process has helped me both in making the strategy as per the company and market requirement and the execution of this strategy by mobilizing the crowd for the charitable assistance with the help of the execution of blue ocean strategy. It helped me understanding the management risk related to the positive attitude and practice. Conclusion: This is to be concluded that Blue Ocean Strategy plays an important role in helping a company to analyze the risk factors, plan accordingly and execute the plans in the proper way. It is evident that leaving the Red Ocean and entering into Blue Ocean has been proved to be beneficial to a significant number of companies. This report has analyzed the importance and the circumstances of the execution of the blue ocean strategies. It also records how this strategy has helped me professionally to survive with my company. References: Chandrakala, V. G., Devaru, S. D. B. (2013). Blue ocean strategy and bottom of the pyramid marketing.International Journal of Management Research and Reviews,3(7), 3080. Leibtag, A. (2013).The digital crown: winning at content on the web. Newnes. Mickey, S. F. (2013). Constructing The Prophet: Steve Jobs and the Messianic Myth of Apple. Randall, R. M. (2015). W. Chan Kim and Rene Mauborgne dispel blue ocean myths.Strategy Leadership,43(2), 11-14. Sull, D., Homkes, R., Sull, C. (2015). Why strategy execution unravelsand what to do about it.Harvard Business Review,93(3), 57-66. Williams, J. C., Platt, A., Lee, J. (2015). Disruptive innovation: new models of legal practice.Hastings LJ,67, 1.

Wednesday, December 4, 2019

Motivation Behind Creative Accounting Accounting Essay Example For Students

Motivation Behind Creative Accounting Accounting Essay Creative accounting is a pattern that potentially being undertaken as a consequence from some single attention more on their ain involvement and indirectly causes issues originate in ethical dimension of originative accounting. From information position, bureau theory gives a clear image on originative accounting scenario. Whereby directors misuse their privileged place in pull stringsing fiscal coverage in their ain involvement which supplying superior information content to stockholder. Lack of personal accomplishment or involuntariness to transport out elaborate analysis doing single stockholders do non hold the clear position on the consequence of accounting use give a high possibility in the incidence of originative accounting. Definition of originative accounting In the USA, the preferable term of originative accounting is net incomes direction , nevertheless in Europe the preferable term is originative accounting . Generally, originative accounting is accounting pattern that falls outside the ordinance and give benefit to certain people. It can be described as a pattern with a clear purpose to disrupt the fiscal coverage procedure which affects reported income to do it looked normal and provides no true economic advantages to relevant parties like stockholders. Concisely, originative accounting is the transmutation of fiscal accounting figures from what they really are to what users desire by taking advantage of the accounting policies which is permitted by accounting criterion. Motivation for originative accounting There are several motives have been identified in exciting the behavior of originative accounting in the organisation. These are proven by assorted researches being done in the yesteryear. First, the important incentive for originative accounting is to describe a lessening in concern income to take down the revenue enhancement paid. Second, to enable the company s public presentation appear better in future, company will maximise the reported loss to do bad loss in that twelvemonth. This is called big bath accounting for the intent in smoothing the income. Third, to supply positive position on outlooks, securities rating and decrease on hazard for analysts in awaited capital market minutess and maintain house s public presentation in analyst s outlook. Other motives are to pull strings net income in order to fit the reported income to gain prognosiss and to deflect attending from negative intelligence by hiking company s net income figure though alteration in accounting policies. Directors motives in pull offing gaining purpose to describe a stable growing in net income non merely to cut down the perceptual experience of variableness toward administration s net incomes, but besides are in relation to income measuring. In order to do company faces less hazard and derive more benefit in facet of raising fund, coup detat commands every bit good as prevent coup detat by other company. Creative accounting is needed to keep or advance the portion monetary value and make a good net income growing. To derive benefit from inside cognition, manager of the company prosecute originative accounting to prorogue the release of information to the market. Last but non least, many types of contractual right, duty and restraints based on the sum reported in the histories besides motivate company to use originative accounting. Techniques of originative accounting Creative accounting is actively applied in six countries. The first country is regulative flexibleness, whereby alterations in accounting policy are permitted by accounting ordinance. For illustration, IAS permit transporting non-current plus can be recovered at either revalued sum or depreciated historical cost in plus rating. Second, famine of ordinance by which some accounting intervention might non be to the full regulated as there is few compulsory demands. The 3rd country is direction has big extent of appraisal in discretional countries, such as premise in bad debts proviso. Fourthly, some minutess can be timed as to demo the coveted visual aspect in histories. For illustration, the director is free to take the timing to sell the investing merely to increase earning in the histories. Fifthly, to pull strings balance sheet sums by utilizing unreal dealing. Lazzaro Spallanzani EssayThere are some action can be taken by accounting regulators in order to keep originative accounting: Decrease allowable accounting method or repair method used in different status so that range for taking accounting method can be narrow downed. Companies should besides be consistent in utilizing method chosen by them. Some regulations should be established to cut down the maltreatment of opinion. For case, International Accounting Standards soon have about removed the extraordinary point from operating net income. Besides, companies should be consistent in using accounting policy to keep the maltreatment of opinion. Execution of Substance over signifier can diminish unreal dealing and this can do coupled dealing go one as whole. To curtail the usage of timing of echt dealing, point in history should be on a regular basis revaluated. The addition or lessening in value should be stated in the history each twelvemonth the reappraisal occurs. International Accounting Standards besides tends to value point at just value instead than historical cost. Besides change in accounting ordinances, ethical criterions and administration codifications must be decently executed to avoid persons from executing originative accounting. Comparison with other writer on the article presented From the survey done by Dilip and Eno in Creative Accounting in Bangladesh And Global Perspectives found that the cause of originative accounting is the struggles of involvement among different involvement groups. For illustration, pull offing stockholders want to pay less revenue enhancement and dividends. Investor-shareholders are interested to acquire more dividends and capital additions. Country s revenue enhancement governments would wish to roll up more and more revenue enhancements. Employees are interested to acquire better wage and higher net income portion. Dilip and Eno besides reported that originative accounting may originate under 3 different fiscal market conditions: Depending on the fiscal market rating of the company s future chances, company maintain alterations its portions to pull investors to lend to such portions either at par or at a premium. Aim to demo a desirable image of its fiscal conditions when the company whose portions are already listed in a stock exchange. Based on hyperbolic net incomes through overestimate of assets, undervaluation of liabilities and alteration in systems of stock rating that promote the image of company in a short clip, company holding its portions listed in the stock exchange may declare and pay high dividends. Both of them examines originative accounting in Bangladesh scenario, they found out many of the company prospectuses published in Bangladesh are based on originative accounting. An adept sentiment study besides done by them and ensue showed that although it is non clear for how long, originative accounting has been clearly pattern in Bangladesh. Creative accounting non merely being practiced in Bangladesh but it seems to be widespread globally in developed states such as UK, USA every bit good as Australia. And the instance of Enron is the most loosely known instance of originative accounting in USA. Dilip and Eno besides suggested that the codification of professional moralss should be purely overemphasized. Accounting instruction is needed every bit good as the responsible of teacher to transfuse moral values of unity, honestness and earnestness into pupil s character as it is critical to modern society, the concern universe and the accounting profession.

Thursday, November 28, 2019

Gangs And Gang Members Essay Research Paper free essay sample

Gangs And Gang Members Essay, Research Paper Let # 8217 ; s say you # 8217 ; re by yourself on the metro in New York City. You get on and it # 8217 ; s non that crowded, there # 8217 ; s a clump of unfastened seats. As you look about, you notice that the auto is filled with chiefly high school aged childs, largely boys. On one side there is a topographic point following to a clump of African Americans, on the other side it # 8217 ; s a posse of Asians. Okay, so where are you traveling to sit? Following to the Asian # 8217 ; s I bet. What if it was Latino # 8217 ; s alternatively of Blacks, opportunities are you would still state you # 8217 ; d travel towards the Asian # 8217 ; s and shy off from the more typical pack looking childs. When most people think of packs, they don # 8217 ; t truly believe Asian, it # 8217 ; s a Black or Latino thing right? Well, Asiatic packs have been going more and more prevailing. We will write a custom essay sample on Gangs And Gang Members Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Particularly among our state # 8217 ; s largest metropoliss. The bulk of them are in China Town, in San Francisco. New York # 8217 ; s Asiatic population is continuously turning though, and with that comes the urban packs. Where do they arise, and merely how permeant are they in our society? It # 8217 ; s a new country of survey that seemed more interesting to me than the usual American packs. First Lashkar-e-Taiba # 8217 ; s focal point on the fact that pack related offense is one of the most unsafe challenges confronting society and jurisprudence enforcement today. They are younger, more barbarous, fearless of effects and going progressively more barbarous. Gang members work together as coteries, they commit all kinds of violent offenses including slayings, colzas, robberies and snatchs. # 8220 ; They live in aimless and violent nowadayss ; have no sense of the past and no hope for the hereafter ; they commit unspeakably barbarous offenses against other people frequently to satisfy whatever impulses of desires drive them at the minute and their arrant deficiency of compunction is flooring # 8221 ; ( Duin, 31 ) . Gangs are a known job in society ; they are unsafe and difficult to command. Asiatic packs are a new phenomenon, yet are rapidly going more and more common within the United States Asian-Americans have frequently been stereotyped as the # 8220 ; model minority whose values are benign: strong work ethic, low profile, honor pupils, trueness of household # 8221 ; ( Sigmund, 1995, p.8 ) . # 8220 ; Person who is quiet, studious, and who plays the fiddle # 8221 ; ( Lee, 1992, p.129 ) # 8220 ; continuing the sacred worth of human life, spiritual religion, community spirit and? .to be instructors of tolerance difficult work, financial duty, cooperation and love # 8221 ; ( Takaki, 1989, p. 474-475 ) . Yet Asiatic offenses by teens, both separately and in packs, # 8220 ; have been cropping up like weeds? .What has gone incorrectly? # 8221 ; ( Sigmund, 1995, p.8 ) . There seems to be a immense sarcasm here, when one compares popular positions of Asiatic Americans and their admirable work ethic to the increasing incidences of Asian related young person offenses. Upon a 2nd scrutiny, one may get down to oppugn whether the phenomenon of Asiatic American offenses real ly opposes the theoretical account minority work ethic, see offense as an business: if the Asiatic American work ethic focal points on wining in the new universe, so offense can non be ruled out as a agency of achieving fiscal success. ( Sigmund, 1995 ) The history of Chinese packs goes back to a mystical spiritual group formed over three hundred old ages ago in China. The group, # 8220 ; the Triad Society was made up of Buddhist and Taoist priests opposed the Manchu emperor K # 8217 ; ang His, who reigned from 1662 to 1723 # 8243 ; ( Gardner, 1983, p.15 ) . The members of the society devoted themselves to politically human-centered causes. They escaped persecution of the emperor traveling to Hong Kong, where # 8220 ; More than three quarters of the population was said to be connected to the Triad # 8221 ; ( Gardner, 1983, p.15 ) After Sun Yat Sen founded the Chinese Republic utilizing the Triad organisation politically, it # 8217 ; s members began contending among themselves and turned to condemnable activities. ( Takaki, 1989 ) Other packs originated in the Golden Triangle in Southeast Asia, and the Golden Crescent in Southwest Asia. A figure of these groups came approximately as a consequence of societal and political turbu lence in their states of beginning. Former members of the military created many of these offense groups. So, some have their roots in political agitation in their place states. Most of these packs immigrated to the West Coast in big Numberss following the terminal of the Vietnam War. ( Takaki, 1989 ) Gangs have been a portion of society in Asiatic states for centuries. Gangs like the Nipponese Yakuza and the Chinese Tong ( once known as the Triads ) has been around since feudal times. The beginning of the Yakuza can be traced back to every bit early as 1612, when Kabuki mono # 8220 ; brainsick 1s # 8221 ; began to pull the attending of the local functionaries. The Kabuki glandular fevers were bizarre samurai who took hideous names for their sets and spoke to a great extent in slang. They were besides retainers of the Shogun. The groups were compromised of about 500,000 samurai that were forced into unemployment during the clip of peace, the Tokugawa epoch. This forced them to go ronin, or masterless samurai and many of them turned into brigands, plundering towns and small towns as they wandered through Japan. ( Lee, 1992 ) The Yakuza as they are known today did non come up until the in-between to late 1700 # 8217 ; s. They include the bakuto ( traditional gamblers ) and the tekiya ( street pedlars ) . These footings are still used to depict yakuza members today, although a 3rd group, gurentai ( goons ) was added in the station World War Two epoch. # 8220 ; Everyone in those groups came from the same backround: hapless, landless, delinquents and misfits. The groups stuck closely in the same little countries without jobs, as the bakuto remained largely along the main roads and towns, and the tekiya operated in the markets and fairs # 8221 ; ( Lee, 1992, p. 201 ) . # 8220 ; Asiatic felon groups arrived to the United States in the late nineteenth and early twentieth centuries # 8221 ; ( Yablonski, 1997 ) . In the early yearss of Asiatic in-migration, many of them served as legal and concern advisers to their communities, assisting the freshly arrived Asiatics make their manner among the unusual imposts of Western civilization. But they frequently exacted a monetary value from those they helped in the signifier of trueness to the pack. ( Yablonski, 1997 ) In recent old ages, the presence of Asiatic packs has become more and more evident in the United States. The younger members of these packs have become assimilated to American civilization and imposts. Modern packs have a tendency toward marking of mutilation to make gang markers. Nathan birnbaums on custodies or forearms are normally associated with Southeast Asiatic packs form the Philippines, Vietnam of Cambodia. Chinese gang members tend to hold Burnss on their upper weaponries, with females featuring Burnss on their mortise joints and pess. All the pack members have different combinations of markers. The figure and form of Burnss agencies different things to each person pack. ( Webb, 1995 ) . Most pack mem bers prefer imported autos like Hondas, Mazdas or Toyotas as their agencies of transit. Many of them will titivate so up by adding wing flairs, spoilers, tinted Windowss or pinstripes. These autos are used as agencies of reflecting position and wealth to other gang members. ( Gardner, 1992 ) These same members will by and large be armed with and utilize the best arms available. They prefer â€Å"high capacity pistols and semi automatic weapons† with â€Å"9mm semi automatic handguns† as their arm of pick ( Sigmund, 1995, p.11 ) . Modern pack members are by and large twelve to eighteen old ages of age. They portion a turning tendency toward following colourss and footings associated with the Crips and the Bloods. They dress good and are normally good groomed and clean. Their hairdos vary ; many of them have # 8220 ; new wave # 8221 ; haircuts. When pack members are engaged in condemnable activity, many of them color their hair. After the offense has been committed, they will frequently rinse the colour out. They may even cut their hair to avoid being recognized by constabulary. ( Sigmund, 1995, p. 10 ) Asiatic packs engage in a broad scope of condemnable activities including # 8220 ; extortion, place invasion, harlotry, gaming, and drug trafficking nevertheless, robbery is still their offense of pick # 8221 ; ( Lam, 1994, p.3 ) . A common method of robbery is for pack members to interrupt into places of Asiatic immigrants or concern proprietors, tie up their victims and crush them until they produce valuable points or money. ( Lam 1994 ) Several factors have made fellow Asians their primary marks. First Asians, particularly the recent immigrants and concern proprietors do non set money in Bankss. For many of these immigrants, banking is a wholly new experience. This is because they come from states have limited banking services established. Because of this, many of them maintain their money at place, or invest in jewellery. From their point of position, purchasing gold is non merely the safest manner to protect their money, but besides the best signifier of investing since the mo netary value of gold seldom falls. Second, Asiatic packs besides recognize that they are non likely to acquire prosecuted for their offenses against other Asians. Many of the victims are improbable to name or describe offenses to the constabulary. Many Asian # 8217 ; s seek to avoid covering with jurisprudence enforcement functionaries or bureaus for every bit long as possible. This job is non the consequence of constabulary actions or patterns, but instead an misguided impression about the function of jurisprudence enforcement functionaries in the community. To many Asians, the jurisprudence represents an utmost beginning of panic instead than a beginning of aid or service. This misconception grew because of the societal and political conditions from which they came. ( Webb, 1995 ) . # 8220 ; For old ages, many Asiatic authoritiess ( e.g. , China, Vietnam, Laos, Cambodia, Taiwan, North and South Korea, Indonesia, and Burma ) have used the constabulary as a political arm to stamp down political discontents and to protect their powers instead than as an instrument to protect justness # 8221 ; ( Lee, 1992, p.205 ) . Unlike the legal system of the United States where and single can non be arrested without a warrant or sent to prison without having a just test, many of the legal systems in the Asia seldom provide these protections even if they are written into jurisprudence. ( Lee, 1992 ) Many of them are besides unwilling to describe the offenses inflicted on them by Asiatic packs for other grounds. To many, speaking about the condemnable activities committed by Asians against their ain people in public ( e.g. describing the offenses to the constabulary or mass media ) in an admittance of failure non merely of the 1s who committed the offenses, but besides of the full Asian community. # 8220 ; This impression of corporate shame is profoundly rooted in the instructions of Confucianism, in which the full community must portion the incrimination for single failures, since persons are portion of the community # 8221 ; ( Takaki, 1989, p. 451 ) . Furthermore, many Asians have attempted to show a positive image of themselves to the American populace. Consequently, they downplay their defects in their battle for reputability and credence by American people. ( Sigmund, 1995 ) . Asiatic packs have become progressively more broad spread in the United States in recent old ages. Many of them originated centuries ago and played of import functions in society. As Asiatic in-migration to the United States increased, pack members followed. Gangs and other signifiers of organized offense have become a portion of life for Asiatic Americans, who must cover with them on a day-to-day footing. These youth packs engage in condemnable behaviour that frequently goes unreported because of the communities # 8217 ; fright of jurisprudence enforcement functionaries. The fact that these offenses go unreported leads the mean American to believe that offense among the Asiatic American community is non existent. As the old ages advancement, Asiatic packs, every bit good as packs in general will go progressively more common. In order to forestall this, we must halt this force before it occurs. Law enforcement every bit good as the community in general demands to take more of an inv olvement in the maps of Asians as felons do in our society. I didn # 8217 ; t individual out Asians because I hold a bias over merely them. I detest packs in general ; Asiatic 1s are merely of involvement to me. It is believed that if we employ more members of the Asian community into constabulary work, they # 8217 ; ll experience more delineated and there will be limited cultural and linguistic communication barriers. On the other manus, members of the Asian community need to come frontward and describe offenses when they occur. No 1 should hold to populate in fright of these packs. They chiefly peg out Asians, but the full community is at hazard, therefor it is everyone # 8217 ; s job. Gangs will merely be stopped when forces join together for the benefit of everyone. I don # 8217 ; t know if it # 8217 ; ll of all time go on that we feel comfy on that metro drive, and I know now that I wouldn # 8217 ; t experience any safer following to the Asiatic childs any more than the Blacks or Hispanics. Duin, Julia. Alarm Over Crime puts Focus on Nation # 8217 ; s Moral Crisis. Washington Timess, 11/17/1996, p31. Gardner, S. Street Gangs. Franklin Watts, New York: 1983. Gardner, S. Street Gangs in America. Franklin Watts, New York: 1992. Lam, M. # 8220 ; Gun Prevalence finds it # 8217 ; s manner to Asiatic Young person: You don # 8217 ; Ts have to be in A Gang to Band # 8221 ; Asiatic weekly. 1994, 16. Lee, J. Asian Americans. New York Press, New York: 1992. Sigmund, S. Documentary Film Explores Asian Youth Crime. Asiatic Pages, 1995, 5. Tataki, R. Strangers from a Distant Shore. Penguin Books, New York: 1989. Webb, M. Drugs and Gangs. Rosen Publishing Group, New York: 1995. Yablonski, L. Gangsters: Fifty Old ages of Madness, Drugs and Death on the Streets of America. New York University Press: 1996.

Sunday, November 24, 2019

Poseidons Loves and Their Children

Poseidon's Loves and Their Children The Greek god of the sea, Poseidon brother of the gods Zeus and Hades, and of the goddesses Hera, Demeter, and Hestia was associated not just with the sea but also with horses. Its difficult to even for historians to track the myriad lovers and children of the Greek gods. Some estimates put the count at well over a hundred, with the lovers being mostly but not exclusively female. In some cases, ancient authorities differ, so the exact lineage and relationships remain open to debate. Nevertheless, several of the gods various consorts and offspring remain mythologically significant in their own right. Amphitrite,  His Consort Placed somewhere between the Nereids  and the Oceanids, Amphitrite the daughter of Nereus and Doris never obtained the fame she might have earned as Poseidons consort. Vaguely personified as the sea or seawater, she became the mother of Triton (a merman) and possibly of a daughter, Rhodos.   Other Lovers Poseidon enjoyed the pleasures of the flesh, seeking romance with goddesses, humans, nymphs and other creatures. Not even physical form mattered to him: He could, and often did, transform himself or his lovers into animals so as to hide in plain sight. Aphrodite, goddess of love and beautyAmymone, the blameless Danaid who became an ancestor of the founders of MycenaePelops, king of Pelepponesia and a founder of the Olympic GamesLarissa, a nymph, whose three sons with Poseidon eventually ruled all of ThessalyCanace, a human woman who bore the god five childrenAlcyone, one of the Pleiades, who bore Poseidon  several children Sexual Violence Poseidon, like many of the Greek gods, did not behave with perfect moral rectitude. In fact, many of the stories of Poseidon focus on rape. In the myths, he raped Medusa in the temple of Athena and Athena was so angry she turned Medusa ugly and her hair into snakes. In another story, he raped Caenis and after he fell in love with her, he granted her wish of transforming her into a male warrior named Caeneus. In yet another story, Poseidon pursued the goddess, Demeter. To escape, she turned herself into a mare but he transformed into a stallion and cornered her. Significant  Offspring Some of Poseidons most notable children include: Charybdis, the sea monster who (with Scylla) threatened the Strait of MessinaTheseus, the hero who served as the mythological founder of AthensBellerophon, the hero who captured Pegasus and killed the Chimera  Polyphemus, the one-eyed giant from  The OdysseyProcrustes, the villain  who owned an iron bed to which he made his guests fit by means of his hammer Pegasus itself,  the famed winged horse, sprung from Medusas neck when Perseus delivered the fatal blow. Some legends suggest that Poseidon fathered Pegasus, which would have made the horse half-brothers with his captor, Bellerophon. Some legends even suggest  that Poseidon sired the ram that bore the Golden Fleece!

Thursday, November 21, 2019

Individual Assignment, Theories of Management Essay

Individual Assignment, Theories of Management - Essay Example The first case study deals with the revival of Nissan from losing millions to making millions under the leadership of Carlos Ghosn. The second case study describes the leadership style of Andros Stakis, group-managing director of Stakis PLC, who almost put the entire company in risk. Case Study I - Nissan Nissan Motor Co., a Japanese automaker has been one of the largest car manufacturers in the world (Daily Markets). The company started losing its market share to another Japanese competitor Toyota since late 1970s and was suffering continuous losses since 1997 (INSEAD). In March 1999, Nissan had an alliance with French carmaker company Renault in order to bail out of their mountainous debt (Renault). In terms of strategy, it was a good M&A deal. Renault’s geographical market strengths were in Europe and Latin America where Nissan was weak. Similarly in case of organizational capabilities, upon the merger, Renault would gain access to Nissan’s engineering and manufactur ing know-how, while Nissan would profit from Renault’s marketing and design abilities (NY Times). Cultural clashes, different organizational behaviors and financial conditions of Nissan posed huge risks to the anticipated synergies from the merger. The casestudy reflects on the leadership style of the new COO Carlos Ghosn (le cost cutter) who made a clear agenda of the change that Nissan would go through in the years 1999-2001. In the first week itself, Ghosn made a number of significant changes such as incentive plans for his executive officers, new language policies and a committment to quit if profits were not achieved by FY 2001 (HBS). Ghosn’s leadership style in the case is called as dramatic, sel-sustaining, effective charismatic and focused. The company returned to profit by FY 2000 and had an operational profit of 4.5% by FY 2002. Case Study II – Stakis PLC The second casestudy discussed in the paper is that of Stakis PLC, a group of hotel and casino cha ins in UK. Headquartered in Glasglow, the company was owned and run by Reo Stakis who turned a lace business to a hotel and casino empire. Prior to the appointment decision of Andros Stakis as the new CEO, Reo led the diversification of group into casinos, pubs, hotels and restaurants. In early 80s, the hotel tycoon passed on his business to his son Andros when the company was in a transitionary landscape of the unstable external environment and mis-guided strategic direction. The company’s strategic and financial position was exposed to the downturn in economic climate of 1991. Despite induction of two established leaders, Sir Lewis Robertson and David Michels as Chairman and CEO respectively, the company started having debts as high as ?15I Mn in 1991. Upon a number of cost-cutting measures, divestures, new partnerships and ouster of Andros Stakis, the group had its first pre-tax profits in 1993. Hilton PLC bought the group in 1999 for ?1.2Bn (The Independent). Theories of Management – An Overview This section provides an overview of varios theories of management designed over the period of years to make effective judgements on business and processes: 1. Scientific Management Theory (1890-1940): From the need to increase productivity, Fedrick Taylor divised a body of principles that scientifically selected workers so that each each worker would be given the responsibility best

Wednesday, November 20, 2019

Business presentation Essay Example | Topics and Well Written Essays - 250 words

Business presentation - Essay Example It is usually easier to read information because it helps reduce the number of speaking errors that I present and the information is already in a format that sounds academic and professional. Because my greatest challenge is in how I communicate to the audience, I think this is the biggest thing that I actually need to improve upon. It is very difficult to speak in front of my peers especially in a way that is not boring and keeps the audience’s attention. To avoid making mistakes, I create power points that have too much information and make presentations that are actually based on reading to the audience. There are probably techniques and methods to take the research that I perform to learn about a topic and shrink the knowledge down into a summarized version. Learning how to take research and use it to support the overall purpose of the presentation is critical. Right now, I also struggle in speaking to the audience and need to improve on how I prepare the presentation and actually deliver it to the

Monday, November 18, 2019

Proposal for PHD in business Essay Example | Topics and Well Written Essays - 750 words

Proposal for PHD in business - Essay Example In case the cash invested results in wealth creation but by an amount less than the cash invested and the resources used, society is poorer to the extent of the loss, as the borrower must repay the debt by compensating for the loss out of existing wealth owned or acquired by him/her. The same applies to cases in which invested cash is totally lost, no wealth creation having taken place. In both cases a redistribution of wealth in favor of the creditors is involved" (Siddiqi, 2007). This paper is an examination of actual investment has increased in the past few years that the tawarruq system is in place. Investment is one the path through which wealth creation can occur. We expect the tawarruq system to aid business process and investment so as to further improve the economy. Other variables that may be affected in the process are interest rates, exchange rates, consumption and bank's profitability. The three are macroeconomic variables while the last is a microeconomic variables. We particularly desire that people do not owe money for consumption purposes alone but for investment. The research will commence with the review of related literature. ... B. Research Questions a. What is the tawarruq system's impact on Saudi Arabia's over-all level of investment b. What is the tawarruq system's impact on Saudi Arabia's over-all level of consumption c. What is the effect of the tawarruq system on Saudi Arabia's interest rates d. What is the effect of the tawarruq system on Saudi Arabia's exchange rate e. What is the impact of the tawarruq system on banks' profitability C. Methods and Procedures The research will commence with the review of related literature. This is where we identify the gaps in the study that need to be filled. The literature review will also provide us a knowledge of the depth of current and previous researches on the topic. The review will also include desk research of recent news about the conduct of the business and the related figures. Data mining for the necessary figures will follow. We will particularly mine the data for the over-all tawarruq level of lending (the amount of lending per year) for the last 10 years, the figures for investment, consumption, interest rate and exchange rate for the last 10 years. To establish the relationship between these variables, we will use simple regression of the time series analysis. An econometric software, Eviews 4 will be particularly used to test the relationship. The possible outcomes are significant or not significant and whether the direction is positive or negative. D. Goals and Objectives This paper wishes to trace the practice of the tawarruq lending system in Saudi Arabia and its impact on wealth creation primarily the investment variable. Lending is a path to consumption or investment and it is said to create wealth if it goes to the latter. In this paper we particularly examine

Friday, November 15, 2019

History Of Mobile Banking

History Of Mobile Banking Mobile banking is known as M-banking or SMS Banking. The european company called PayBox supported financially by Deutsche Bank, in 1999 started mobile banking.  [i]  SMS was the earliest mobile banking service offered. It is an emerging field in the banking segment. However, older phones had limited functionality. Mobile phones, palm PCs and PDAs were lacking hardware and software support. The higher cost of data plans and the slower network speed were also limiting factors in the growth of mobile banking. It has been improved with the advancement of the technology, the hardware and software. The cost of mobile devices has been reduced drastically and is still reducing. Network speed is much better than before and data plans are not as costly. All of these changes have provided necessary raw materials for the growth of mobile banking and the numbers of people using mobile banking is increasing day by day. Users, who were using computers/laptops for online banking, are moving towa rds mobile banking because of ease of use and fast access. In the USA, mobile banking was introduced in 2006 by Wachovia bank.  [ii]  In Sep 2007, Aite group predicted the mobile banking users in the United States would reach 1.6 million by the end of the year 2007 and will rapidly increase to 35 million by the year 2010.  [iii]  The report indicated the growth potential for mobile banking. However, the security issues are the major concerns for mobile banking service providers and the users. As mobile banking systems mature, more users will start using mobile banking, which will draw the attention of the hacker community to target mobile banking customers mostly for financial gain. Safety and security of the personal and financial information stored and managed in the devices are the key factors for users, banking organization and the security community. The purpose of this paper is to gain basic knowledge of mobile banking, explain the different kinds of architecture used in mobile banking and identify the different security attacks and its countermeasures. Mobile banking in US compare to other countries Wachovia bank was the first to announce mobile banking services to their customers in Sep 2006 and re-launched in March 2007 followed by a few other banks.  [iv]  They developed their own banking product with ATT. Bank of America started mobile banking services in March 2007 in collaboration with four major wireless carriers, which reported 500,000 users within the first 6 months. Initially, the services offered were funds transfer, bill payment, branch and ATM locations, account balance, etc. Since then there has been huge progress in mobile banking services. In 2009 and 2010 respectively, San Antonio, Texas-based USAA launched their new application for the iPhone and Android platform that is capable of remote deposit capture allowing users to take a photo of the check and deposit electronically.  [v]  In the middle of 2010 Chase bank also introduced the mobile RDC application for the iPhone.  [vi]  In Nov 2010, U.S. Bank and Visa announced a mobile payment system for th eir customers.  [vii]  They offer the service via use of the MicroSD card, which fits in most existing mobile devices. A month before that, U.S. bank launched a full suite mobile banking solution for prepaid cardholders with bill pay capabilities. Even though the US based banks provide different kinds of mobile banking services, they are still far behind of their counter parts in the world. 7Many banks in the world have offered mobile banking and financial services for years. European and Asian countries have been offering mobile banking services for years that vary for banking related services to the mobile proximity payments. Japan and South Korea are the world leaders in adopting mobile banking technology. Before 2004, the Internet was the only way of using mobile banking in Japan, which enabled customers to browse the merchant website through a web browser. However, customers still had to use their credit/debit cards for payments. In 2004, NTT DoCoMo started using FeliCa contactless IC chips developed by Sony for mobile devices, which can carry personal and financial information that facilitated remote payments and substituted mobile devices for cash and cards at merchants points of sale. In 2005, KDDI and Vodafone also adopted FeliCa. 7In 2002, SK Telecom and KTF launched their proximity payment programs in South Korea, which used an infrared technology. These prog rams were not successful because of number of reasons. In 2003, LG Telecom started South Koreas first IC chip based mobile banking service, which significantly increased the market share of LG Telecom. The other carriers also adopted IC chips following the success of LG Telecom. Also, Visa and MasterCard have successfully operated in South Korea since 2006. Since then mobile banking services have come a long way in other countries of the world. Difference between mobile banking and online banking/credit/debit card banking At present, mobile banking provides almost the same kind of services as online, credit/debit card banking. When mobile banking services first started, the mobile devices were not able to support all mobile banking services and they were lacking hardware and software support. The initial mobile banking service offered was the SMS banking; while online banking was very well developed and was offering all kinds of banking services. Credit/debit card systems are also fully developed and people were able to use their cards at merchants point of sale and online for payments. However, technological advancements in mobile devices have enabled users to use mobile banking related services via SMS, web browser and mobile web applications. Currently available mobile devices have the same processing power as computers and they are still evolving. In some countries, mobile banking was started in the early 90s and now offer a full suite mobile banking solution, which has features of online banking and credit/debit card banking. People are using their mobile devices to replace cash and cards. However, mobile banking services in the USA were started at the end of 2006. Most USA banks are still not offering full mobile banking solutions to their customers. U.S. banks recently announced proximity payment systems in 2010, which has been in use for a long time in other countries. Some of the features of online banking and credit/debit card banking are not available for mobile banking systems. So mobile banking systems in the US are less developed compared to online, credit/debit card banking in terms of services. However, as number of people enrolled in mobile banking increases and banks offer more services with a full range of solutions in the US, the line between mobile banking and online/credit/debit card banking will get thinner and, in the future, mobile banking will provide a combination service of online and credit/debit card banking in the US. In terms of security, mobile banking is as secure as online banking and offers the same security features and protections. However, there is less number of users for mobile banking than online/credit/debit card banking, which reduces the risk of security threats. The hacking community is more targeted towards the online/credit/debit card banking for financial gain. A large number of antivirus, antimalware/spyware etc. available for online banking are not widely available for mobile banking. But with the increase in number of users for mobile banking, these software are also increasing. Mobile banking also carries the risk of some attacks called Vishing, SMishing and spoofing that are only possible in mobile devices. The security features and countermeasures for them differ from online banking. However, mobile banking provides the same security protections as the online banking, as most of them are derived from the experience with online banking. Mobile banking services 5Mobile banking systems allow users to perform bank related transactions like balance checks, account transactions, bill payments, fund transfers, credit/debit card management, etc. through mobile telecommunication devices like mobile phones or PDAs (personal digital assistants). Mobile banking can be divided in three different concepts based on an academic model: (1) Mobile accounting, (2) Mobile brokerage and (3) Mobile financial information services. 6Mobile accounting services can be divided into account operations and account administration. Account operations include fund transfers, bill payments, etc. and account administration includes ordering checks, updating profiles and personal information, managing lost or stolen cards, etc. Mobile brokerage is related to buying and selling of stocks, securities, and obtaining current information about securities. Mobile financial information divides into account information and market information. Account information includes informati on on branch and ATM locations, credit/debit cards, statements, alerts, balance inquiries, etc., while market information includes products and services, currency exchanges, interest rates, etc. Mobile banking advantages disadvantages Mobile banking offers many advantages to both, users and service providers. It is fast and easy to use and saves time. For online banking, an internet connection is an essential which is a major problem in developing countries. However, many individuals can find mobile connectivity at places where internet connection cannot be found. Mobile banking is cost effective for providers as cost of mobile banking is much less compared with onsite banking. Various kinds of banking services and transactions can be performed with mobile banking. However, mobile banking has many disadvantages too. Security issues are the major concern. Phishing scams, viruses and Trojans and physical loss of the mobile device are some of the security issues that affect mobile banking. The cost of the mobile devices, which are compatible with the mobile banking application and still quite high. Mobile requires a data plan and text messaging services, which is an added cost to the user. Some providers charge for s oftware and mobile banking services as well. Different types of mobile banking architecture 5There are three types of architectures available for mobile phones to enable mobile banking. Up until 2010 most of the mobile banking was performed by SMS or mobile web. With the advancement in mobile phones and following the success of Apples iPhone and other operating system based phones, mobile banking is increasing through the special client applications. These different architectures are further discussed below: SMS or MMS based mobile banking Mobile website Mobile client application SMS or MMS based mobile banking architecture SMS based mobile banking was the first mobile banking service offered. It is based on plain text message interaction. 6,11SMS banking works in two different modes. Pull mode and push mode. Pull mode is a one-way text message system where the bank sends a text message to the users informing them about certain account situations. It can be used to promote other mobile banking services. Push mode is a two-way message system where users send text messages to the bank requesting specific transactions or services with predefined request codes and the bank replies with specific information pertaining to the transactions or services through plain text messages. 6,11There are two different kinds of text messaging systems: SMS and MMS. SMS is a short form of short message service, which includes sending or receiving plain text messages from the bank. It has a limitation on the number of characters can be included in a message. MMS, known as multimedia messaging service, is the second type of messaging service, which can carry larger text messages and works on the same platform as SMS. To use message based mobile banking, a customer has to enroll his/her cell phone to the bank and the bank sends a text massage with a onetime password. Each bank has its own SMS banking number and commands for mobile banking. The message based system has some advantages. It is cost effective and familiar technology, virtually available in each and every cell phone regardless of manufacturer, model or carrier. It provides two-way communication between the bank and the user, so either the bank or the customer can initiate communication. It does not transmit or sto re the confidential information in the mobile device. However, SMS cannot carry a larger message and account information. SMS has to be limited to certain number of characters which limits its use. Mobile website based mobile banking architecture 6,11This architecture includes the use of the internet browser of the mobile device to access the banks internet banking website. Users can connect to the internet via a wireless network or their carriers internet service. The biggest advantage of this architecture is most of the processing is done at a remote server at the bank and much less information is stored in the mobile device. On the other hand, it doesnt require the installation of special software and most of the phones today are capable of using an internet browser. 6,11WAP (wireless access protocol) was created in 1999 and made internet access possible through mobile devices. WAP is an industry standard for wireless applications for mobile devices. It provides the same kind of user experience to the customer as the Internet banking and it does not require the installation of a special mobile banking application. However, it has some disadvantages also. Banks have to create mobile websites that are mobile friendly and can be accessed through the small screen of mobile device. It does not work with all kinds of phones and requires smart or PDA phones. There is an added cost for data plans and only customers can initiate communication. This system is more prone to attack as mobile devices are not capable of running firewalls or antivirus protections. Mobile client application based mobile banking architecture 6,11This architecture requires the download and installation of a mobile client application to the mobile device. With the help of the application a bank can provide a wide range of services to their customers. Although this approach has some advantages and some disadvantages. First of all, users have to learn a new application. The application has to be customized to different phones which increases the development cost to the banks. The applications are also susceptible to attacks and only customers can initiate communication. The older phones are not capable of running this application because of technical limitations. The use of internet requires a data plan that increases the cost on the part of customers. (A data plan requires to use client application based mobile banking architecture, which increases the cost on the part of customer.) Some of the banks charge an initial fee for downloading and installing the mobile client application. Mobile banking security requirements Confidentiality Authentication integrity non-repudiation Security attacks/threats Mobile banking is an emerging technology and the number of mobile banking subscribers increases day by day. With the increase in number of users, the concerns for security also rise. Different kinds of security attacks are as follows: What kinds of attacks are more on which types of architecture model? Vishing12 Vishing is a social engineering attack over the telephone system. It is a type of phishing and it is a combination term of voice and phishing. Mostly it uses features facilitated by Voice over IP (VOIP), to gain access to private, personal and financial information from the public (information of the users). It is used to get the authentication information of the user mostly for financial gain. 13Phishing Phishing is an another kind of social engineering attack in an electronic communication to acquire sensitive information like usernames, passwords and credit card details by redirecting unsuspecting users to a fake website with the use of an authentic looking email. It can also be carried out by instant messages. 14Smishing Smishing is also a social engineering attack similar to phishing. The name is derived from SMs phiSHING. It uses the text message system of the phone to get private, personal, and financial information of the user. A web site URL embedded in the text message may act as a hook. However, the phone number that connects to the automated voice response system has become more common. 15,16Spoofing Spoofing is an attack where a person or program successfully masquerades as another with falsifying data. A spoofing attack causes the telephone network to display a number on the recipients caller-id-display. This number is familiar and looks like it came from a legitimate source, which is not an origination source actually. 6Lost and stolen phones This is one the biggest threats for mobile banking. Mobile phones are small and portable and could be easily lost or stolen. Authentication, authorization and confidentiality are the areas to be considered when mobile devices are lost or stolen. 19In 2001, 1.3 million devices were lost or stolen in the UK. 17In 2006, over 1 billion phones were sold worldwide. Of those 80 million were smartphones, which have operating system and can store all kinds of information. 18A survey found that 34% users didnt even use a PIN. This threat increases with the increase in the number of phones. 6Cracking and Cloning Cracking a mobile device means modifying its software to gain control of that particular mobile device. Attackers find the ways to break or crack the software and once cracked the attacker has the access to the data stored in the device. An IPhone cracked by an ISE is an example of phone cracking. Attacker found an exploit in the iPhones web browser, deployed a fussing attack and injected invalid data into a program looking for the buffer overflow. With cracking, the software attacker can also view SMS logs, call history, etc. or send that data to their machine. Bluetooth is also vulnerable to phone crack attack. 17If Bluetooth is on, any Bluetooth device can connect to the phone within a 30 foot range. An attacker can use bluesnarfing and download, upload or edit files on a device without the owners permission. Default setting can be change by attacker.(Even once a Bluetooth device connected with phone, attacker can change the default setting also.) 20One survey in London found that 379 out of 943 phones had their default setting on and 138 out of 379 were vulnerable to attack. Making identical copies of anything is known as cloning. Cloning of a mobile device creates a second device, which has the same identical information as the original device. Cloning new phones is difficult while older phones were easy to clone with some basic equipment. 17Cloning of GSM phones is much more difficult in comparison to cloning of CDMA phones. Cloning of CDMA phones only requires a phones electronic serial number and mobile identification number. A few ALLTEL customers had their phones cloned during their visit to different places. Cloning can affect all carriers and all kinds of phones if they are left on. 21With less than $2000, any attacker can build a cloning device that can capture the signals from a mobile device. It can capture the signals sent out by the phone from up to a mile away and get the codes that identify the phone. Cracking and cloning are active threats to mobile banking. Cracking can be used to get sensitive data from the phone or to install malware w hile cloning can duplicate all information from the phone and an attacker can get about half of the information to identify the phone. 6,22Man-In-the-Middle attack(MIM) MIM is considered a threat to the confidentiality and integrity of people. It is a form of active eavesdropping in which attacker makes independent connections to victims by positioning him/herself in between two victims to take control of communication between them with the intention of interception and alteration of information and relays it to others, making them believe that it came from the other person and not from the attacker. The attacker must be able to intercept all messages and alter them while it is transit. It is also known as active wiretapping or traffic intercepting. The chances of this kind of attack increases with the use of wireless connection compared to other more secured connections. Viruses, malware and malicious code 24Malicious code is a software in the form of viruses, malware or worms. These kinds of software can be inserted into a system without the knowledge of the user. The primary intent of inserting the software is to gain private personal and financial information of the user and compromise the integrity and confidentiality of the system. It affects the victims private data, applications, operating systems or sometimes just annoys the users. 23Mobile browsers are susceptible to the same kind of security risks as home or office computers. Mobile browsers are little safer at this point compared to computers. With the increase of mobile banking, the numbers of these kinds of software will increase. However, at present, the increasing number of viruses and Trojan horses is the biggest concern to mobile banking security. 25The mobile devices running windows operating system are a favorite target for the hacker community. 26The first generation viruses were proof-of-concept viruses. The Commwarrior virus spreads over Bluetooth and MMS. SymbOS.skulls is a Trojan horse that affects symbian phones and changes all the application icons to skull icons. In 1994, the Cabir worm spread as an infected SIS package called caribe.sis. It spread via open Bluetooth connections and affected Symbian Series 60 phones. Timifonica virus infected PCs in 2000 and sent harmless text messages to cell phones. There are also software that infect mobile devices and look for personal information like stored password or other sensitive information. Some Trojans can steal address book information and send that information to hackers via SMS or MMS. 6Bluetooth can be used easily to spread these viruses. Most digital phones available today are Bluetooth enabled and any Bluetooth device can be infected within range. In Finland, a mobile malware was spread from Bluetooth to Bluetooth device during a soccer game. However, while Blueto oth is the easiest way to spread viruses it is not the only way. Malware have been written that use Internet and cellular networks to spread. SMS and MMS can also be used to spread viruses and malware. Therefore, this threat is a recent major concern for banks and users. Vast number of attacks can be launched with use of viruses and malware. Security countermeasures Security of mobile banking is an important and a crucial issue. In addition to that, wireless communication increases the vulnerability of the system. Therefore, more robust security system is necessary to protect the private personal and financial information of the users. Following are some of the countermeasures discussed in the paper. What kinds of countermeasures are more required and more available for which types of architecture model? User authentication 27Authentication is process of identification of something or someone as authentic. There are three different ways by which someone can be authenticated. These three categories are based on the factors of authentication: what you know, what you have or what you are. Each of these factors have a range of elements. Research has suggested that for better security at least two or preferably three factors be verified. If two elements are required for authentication it is called as two-factor authentication while two or more than two factors authentication is known as multi-factor authentication. 6FFIEC requires banks to use multiple forms of authentication for electronic banking. All mobile banking systems need to use at least two-factor authentication for user identification. 6Authentication techniques based on what user knows including a combination of the pin number, the username, the password and the onetime password for mobile banking. Research has shown security concerns with this technique as users use weak passwords, write it down or share with others. 28Therefore, to increase the protection of the mobile device pin protection or distributed pin verification scheme has been suggested in which one-half of the pin is stored in the mobile device and rest of the half is stored in a remote machine in the network. So the attacker can get only half of the pin from the phones memory. 6Another technique uses what user has. This includes ID card, cell phone, credit card etc. Use of any of the above forms is not a reliable technique as the user must have the physical possession of them. 6Biometrics is an another form of authentication that includes face, voice, fingerprint, DNA sequence etc. 18Clarke and Furnell found in a survey that 83% of populations were in favor of using biometric system for authentication. 29A report on biometric security for mobile banking in March 2008 discusses the different issues of the mobile banking and suggests use of biometric system for more robust security with the help of a users fingerprint as a biometric element. 6Behavior analysis can also be used as a security measure where users are granted or denied access based on their previous behavior. A robust system uses multiple forms of identification before and during use of an application and if necessary asks for more accurate form of identification. If the user fails they are locked out. Encryption 30Encryption means changing or transforming the information in an unreadable form to anyone with the help of algorithm. A key is required to make the information readable again. This process is called decryption. Encryption addresses the confidentiality issue. Encryption can be used to protect data at rest and in transit. There are vast numbers of incidents reporting data interception in transit. 6There are two different ways to protect the data on the phone. (1) Encryption of information stored in the phone and (2) Encryption of the information during communication. 31The current encryption technique is AES and ECC. The wireless data is encrypted with AES and the encryption key uses ECC to encrypt this data. They increase the speed of encryption and decryption and currently they are the most powerful technology available for encryption. 6CellTrust uses AES and micro clients to protect the SMS messages and send encrypted SMS messages. ClairMail recommends the use of SSL and HTTPS during communication. TPM is another tool that can help with encryption and protection of mobile devices. It is an embedded chip in the motherboard that can work with mobile devices or security smartcards. It can store keys, passwords, digital signature and certificates. 32TPM chip has a unique RSA key embedded in it during production. So it can be used to perform platform authentication. For example , to verify mobile devices seeking access for mobile banking. Digital signature 33Digital signature is an electronic signature that can be used to identify the authenticity of the message of the document. It is also known as digital cryptographic signature. It can be used with encrypted or unencrypted message. A valid digital signature indicates that the message or document was sent by a known person and it was not altered in transit. Digital signature also represents non-repudiation. Therefore, ones the message has been sent and digitally signed, the signer cannot deny that he/she did not sign a message. 6With the help of Digital signatures customer can sign the document and does not have to visit branch office. In mobile banking, adding a digital signature to the transaction proves that a customer authorized the transaction. 31At present digital signature technology uses RSA algorithm and ECC algorithm. Because of higher security level, low calculating processing speed, small storage space and low band-width requirement ECC will be more suitable for mobile banking. WPKI technology 34PKI (public key infrastructure) is a security mechanism for wireless internet and uses public key cryptography and certificate management for communications. It provides all four of the security feature for e-commerce: confidentiality, integrity, non-repudiation and authentication. 35WAP (wireless access protocol) is developed by WAP forum to provide a common format for internet transfers for mobile devices. The WAP stack includes five layers: WAE, WSP, WTP, WDP and WTLS. WAP consists of WIM, WTLS, WMLScrypt and WPKI. 31Wireless application protocol PKI is an extension of traditional IETF PKI standards used in wired network. It is mainly used in wireless network. WPKI applications have to work in a restricted environment like less powerful CPUs, less memory, less storage space, small displays etc. Therefore, WPKI must be optimized like the other security and application services within WAP environment. WPKI uses a public key system based on ECC algorithm for encryption and decryption. With the help of this system the information can safely reach to its destination. In the presence of other security protocols like WIM, WTLS and WMLScrypt of WAP, WPKI can fulfill all four security requirements for mobile banking: confidentiality of data, identity and authentication, integrity and non-repudiation. Conclusion The number of people use mobile devices is rising rapidly. Advanced technology in mobile device field has overcome the limitations of the older phones. Newer phones have a wide range of functions and improvement in hardware and software support, which enabled users to use mobile devices as substitute for computers. These mobile devices are capable of performing complex functions, which enabled users to manage their finances through mobile devices. There are three different kinds of architecture for mobile banking. SMS based system works in almost any mobile device. Web based systems are similar to internet system and they are more popular in the USA. The client application system offers robust solution to mobile banking. However, all of these systems have security issues those need to identified and addressed in a proper fashion. Confidentiality, authentication, integrity and non-repudiation are the most important security requirements for any mobile banking system. Authentication of the user and encryption of the data presents serious challenges to the mobile banking system. Implementing the various types of authentication and encryption technology can improve the mobile banking security, which reduces customers fear against security issues and increase

Wednesday, November 13, 2019

Essay --

CHAPTER THREE RESEARCH METHODOLOGY 3.1. Introduction This chapter will explain chronological way to do the full research by using different research methodologies. The purpose of study will be explained by the appropriate philosophy in a right approach and the pattern of the reach will be discussed by the researcher thoroughly in this chapter. This approach will be a combination of data collection procedures using both primary and secondary sources, sampling methods, strategy of the research. Every research has some limitations and this chapter will also discuss the limitation of the study by detecting it and comparing with different approaching methods which can be used. 3.2. Data Analysis Method Qualitative and Quantitative these are the two types of approach to the any research analysis for the any data which can be used in research. The research which only uses the numbers to do the research analysis is called Quantitative Research and the research which uses the words, units of the analysis of the collection data and the visual images is Qualitative Research. Quantitative Research is also known about its tending to link with passivism but on the other side, Qualitative Research focused and worked with the association of interpretive. Moreover, the contrast between involvement and lack of involvement respectively are associated by Qualitative data and Quantitative data analysis method (Denscombe, Approach to analysis: quantitative and qualitative research, 2010). The purpose of the study is analyzing the issues of Supply Chain Management which is also known as SCM. The purpose of the study is to analyzing how Supply Chain Management works for Tesco. This study also includes direct involvement relationship between the co... ...SS. 3.9. SUMMARY In this chapter research methodology is associated with the approach of analyzing and explanation of whole research. There is other ways to conduct the research by the researcher. The way of conducting the research should be determined by the researcher in this chapter by explaining all the related logic and explanation. Supply Chain Management has a great impact on today’s success of company. It also develops the organizational performance of Tesco. The researcher follow the qualitative research method to collect the data and for analyzing these data. It includes a survey with 20 questionnaires in 100 groups of people following with 10 face to face interviews. Most of the people from this group are the employees, managers and few customers. Most of the data is collected from the primary source which makes the accuracy and analyzing strength higher. Essay -- CHAPTER THREE RESEARCH METHODOLOGY 3.1. Introduction This chapter will explain chronological way to do the full research by using different research methodologies. The purpose of study will be explained by the appropriate philosophy in a right approach and the pattern of the reach will be discussed by the researcher thoroughly in this chapter. This approach will be a combination of data collection procedures using both primary and secondary sources, sampling methods, strategy of the research. Every research has some limitations and this chapter will also discuss the limitation of the study by detecting it and comparing with different approaching methods which can be used. 3.2. Data Analysis Method Qualitative and Quantitative these are the two types of approach to the any research analysis for the any data which can be used in research. The research which only uses the numbers to do the research analysis is called Quantitative Research and the research which uses the words, units of the analysis of the collection data and the visual images is Qualitative Research. Quantitative Research is also known about its tending to link with passivism but on the other side, Qualitative Research focused and worked with the association of interpretive. Moreover, the contrast between involvement and lack of involvement respectively are associated by Qualitative data and Quantitative data analysis method (Denscombe, Approach to analysis: quantitative and qualitative research, 2010). The purpose of the study is analyzing the issues of Supply Chain Management which is also known as SCM. The purpose of the study is to analyzing how Supply Chain Management works for Tesco. This study also includes direct involvement relationship between the co... ...SS. 3.9. SUMMARY In this chapter research methodology is associated with the approach of analyzing and explanation of whole research. There is other ways to conduct the research by the researcher. The way of conducting the research should be determined by the researcher in this chapter by explaining all the related logic and explanation. Supply Chain Management has a great impact on today’s success of company. It also develops the organizational performance of Tesco. The researcher follow the qualitative research method to collect the data and for analyzing these data. It includes a survey with 20 questionnaires in 100 groups of people following with 10 face to face interviews. Most of the people from this group are the employees, managers and few customers. Most of the data is collected from the primary source which makes the accuracy and analyzing strength higher.

Sunday, November 10, 2019

Internal and External Forces and Change Essay

Within the business world, there are different theories of effective change implementation. The corporation this research focuses on is Duke University Children’s Hospital, which is highlighted in the textbook. The topic of the research paper will focus on the process of implementing change within the hospital. Implementing change within organizations is very relevant to this course. Not only is the course called Leading Organization Change, but the topics we have been focusing on revolve around methods of implementing change. With changes, organizations need to take steps to fully plan the change in order to ensure a smooth transition and acceptance (Spector, 2013). Research will show how Duke University Children’s Hospital assessed the internal and external forces that impacted the change and how they assessed if the organization was ready for change. Also, research will show what model and strategies were used during the organizational change along with an analysis o f whether resistance to the change occurred and if so, how it was dealt with. Finally, I will strategize how to handle leading group changes within a similar context. Often times, financial crises spurs change in organizations. This was the case for Duke University Children’s Hospital. An assessment was made by the key administrators that showed how dire their financial situation truly was due to various reasons. This resulted in the pending elimination of programs and reduced services. Additionally, sales productivity had dramatically fallen as well as patient and staff satisfaction reaching its lowest point. These negative factors caused the hospital to make an assessment that they were ready for change. Change was the only thing that would keep their doors open to the public and Meliones knew that once people understood the situation more fully, change would be a goal on all of the staff’s minds. The first step Meliones took was to diagnose what the root causes of the financial crisis was with the staff (Spector, 2013). By creating a sense of urgency around the need for change to a wide variety of staff members, the change impleme ntation process started out on the right path (Russell, 2013). One problem they immediately noticed was that each group of employees (accountants, administrators, clinicians, etc.) was working towards individual goals instead of understanding what the goals of the organization were. This assessment of internal forces that could impact  the change led the staff to understand that it was essential to create a sense of shared responsibility for the organization’s performance as well as changing the previous patterns of behavior. The hospital’s chief medical director, Jon Meliones, realized that these problems could not be addressed by the chief executive officer and chief operation officer alone. These problems needed the combined efforts of all administrators and clinicians in order to successfully come out of the negative place they found themselves in. Meliones, the chief nurse executive, and the nurse managers decided on a tactic that brought together the connection between financial performance and excellence of the health care provided to patients. Under their planned strategic renewal, both financial performance and excellent patient care would be dual focuses. During the shared diagnosis stage, the wide spectrum of employees was educated in the external forces their hospital was up against financially. They realized that because the external forces would most likely not change, changes needed to be made primarily internally (Spector, 2013). Next, implementation moved to the pediatric intensive care unit. It was crucial that new behaviors became operationalized by the redesign of roles, relationships, and responsibilities. The team was able to redesign how every member (doctors, nurses, medical staff, accountants, etc.) would perform their tasks. This redesign was done alongside the members in order to get input. There was a decision to use the balanced scorecard measurement tool once they got to the stage where measurements could be utilized. This measurement tool utilized measurements of many things such as customer satisfaction, financial outcomes, processes of the business internally, and the learning/growing abilities of the organization. These measurements were done in hopes to aide in the reinforcement of all new behaviors that were expected. Because of these new tactics, within three years, the hospital began making a profit again (Spector, 2013). What was crucial to the success of Meliones and his team was the sequence they chose to take during the intervention. First, Meliones kept the staff involved by facilitating a shared diagnosis process which helped find the root of the hospital’s financial issues. The process of unfreezing is  important because this is when group members become dissatisfied with current performance or situations. Because Meliones used this approach instead of lecturing the employees on how to change, the employees were given the opportunity to learn and they felt more involved. This allowed the process of formulating an appropriate response to the issues be a group effort as opposed to Meliones coming up with a plan on his own that may have been resisted. The way to overcome defensiveness, when employees resist change, is to get broad-based participation. The shared diagnosis approach surfaced the connection between their financial performance versus behavior patterns and brought agreement am ong employees about what needs to change. Of course, Meliones could have chosen the approach of presenting to the employees all that was wrong and what the new plan would be, including the balanced scorecard. This would have made the unfreezing stage nearly impossible to accomplish if this approach had been taken. Second, he formulated a cross-functional team made of many different positions. This team had a goal to decide the best way to provide excellent customer service for their patients as well as perform well financially. By using the approach of task alignment, Meliones spurred the organization to focus not only on how the staff could work better together, but a dual focus on excellent patient care and financial performance. It was crucial at this stage to get employees to understand how their roles must interact and rely on other roles within the hospital to be successful. This involved educating all employees about the organization as a whole to give everyone a broad perspective and understanding. Third, Meliones began implementing the changes needed specifically in the pediatric intensive care unit. Fourth, every unit member had a redesign of roles, relationships, and responsibi lities. The last step involved using the balanced scorecard system to reinforce the new behaviors within the organization. This sequence was done for each unit within the organization and as a result, the hospital completely changed their downward trajectory within three years (Spector, 2013). After seeing the success that Duke Children’s Hospital experienced in their strategies, I would take the same approach if I were expected to lead group change in a similar situation. Within the process of shared diagnosis, a  shared commitment to the ideas and action plans is incredibly valuable. When people come together, they stimulate, motivate, and inspire each other to bring forward the best ideas (Fullan, 2001). By involving many employees in the process, the positive effect is that they naturally will have a clear understanding of how the necessary changes will actually benefit the organization (Nguyen, 2010). References Fullan, M. (2001). Leading in a culture of change (1st ed.). San Francisco, California: Jossey-Bass. Nguyen, S. (2010). Implementing change and overcoming resistance. Workplace Psychology. Retrieved from http://workplacepsychology.net/2010/02/05/implementing-change-and-overcoming-resistance/ Russell, J. (2013). How to create change in the workplace. The Washington Post. Retrieved from http://www.washingtonpost.com/business/capitalbusiness/how-to-create-change-in-the-workplace/2013/11/27/9d62f8de-5548-11e3-835d-e7173847c7cc_story.html Spector, B. (2013). Implementing organizational change (3rd ed.). Upper Saddle River, New Jersey: Prentice Hall.

Friday, November 8, 2019

Schindlers list essays

Schindler's list essays The movie Schindlers List touched me in many ways. I didnt realize the extent of the horror that the Jews faced. The thought that someone could come and barge in to my house and take all my belongings scares me. I now feel more sympathy than ever for the Jews who had to suffer through this horrible ordeal. The girl in the red dress really touched me, and I think it was the turning point for Schindler to start his factory of Jews when he saw her at the crematorium. The fact that she was the only person in color made it obvious that she played in important role in the faith of the Jews. Schindler first sees her as an innocent young girl walking along the streets of the ghetto. He later spots her body being wheeled off to be burned. The young girl in the red dress symbolizes the hope the Jews had. In the beginning of the movie, the Jews hope was pretty high, and most people expected to be freed sooner or later. As things became progressively worse, the hope for any liberation went down, and all hope died as the girl in the red dress was being carried to be burned. Schindler notices this, and he then takes the initiative to change the situation by hiring Jews as ammunition factory workers. Also, her death can be viewed as the most angelic and innocent child suffering the wrath of the co ncentration camps. I also liked how Schindler changes during the movie. He starts out as a Nazi party member, who enjoyed partying and spending time with women. As he witnesses the horrible things being done to the Jews, he realizes that he needs to make some efforts to save at least some of the Jews. Since he had already developed a relationship with many of his employees (the Jews), Schindler was able to feel the harshness much more than any other German. I admire his skills and determination that help him do what he needs to do to get the job done. Even if it included bribes, Schindler was bent upon keeping the Jews from being ...