Thursday, November 28, 2019
Gangs And Gang Members Essay Research Paper free essay sample
Gangs And Gang Members Essay, Research Paper Let # 8217 ; s say you # 8217 ; re by yourself on the metro in New York City. You get on and it # 8217 ; s non that crowded, there # 8217 ; s a clump of unfastened seats. As you look about, you notice that the auto is filled with chiefly high school aged childs, largely boys. On one side there is a topographic point following to a clump of African Americans, on the other side it # 8217 ; s a posse of Asians. Okay, so where are you traveling to sit? Following to the Asian # 8217 ; s I bet. What if it was Latino # 8217 ; s alternatively of Blacks, opportunities are you would still state you # 8217 ; d travel towards the Asian # 8217 ; s and shy off from the more typical pack looking childs. When most people think of packs, they don # 8217 ; t truly believe Asian, it # 8217 ; s a Black or Latino thing right? Well, Asiatic packs have been going more and more prevailing. We will write a custom essay sample on Gangs And Gang Members Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Particularly among our state # 8217 ; s largest metropoliss. The bulk of them are in China Town, in San Francisco. New York # 8217 ; s Asiatic population is continuously turning though, and with that comes the urban packs. Where do they arise, and merely how permeant are they in our society? It # 8217 ; s a new country of survey that seemed more interesting to me than the usual American packs. First Lashkar-e-Taiba # 8217 ; s focal point on the fact that pack related offense is one of the most unsafe challenges confronting society and jurisprudence enforcement today. They are younger, more barbarous, fearless of effects and going progressively more barbarous. Gang members work together as coteries, they commit all kinds of violent offenses including slayings, colzas, robberies and snatchs. # 8220 ; They live in aimless and violent nowadayss ; have no sense of the past and no hope for the hereafter ; they commit unspeakably barbarous offenses against other people frequently to satisfy whatever impulses of desires drive them at the minute and their arrant deficiency of compunction is flooring # 8221 ; ( Duin, 31 ) . Gangs are a known job in society ; they are unsafe and difficult to command. Asiatic packs are a new phenomenon, yet are rapidly going more and more common within the United States Asian-Americans have frequently been stereotyped as the # 8220 ; model minority whose values are benign: strong work ethic, low profile, honor pupils, trueness of household # 8221 ; ( Sigmund, 1995, p.8 ) . # 8220 ; Person who is quiet, studious, and who plays the fiddle # 8221 ; ( Lee, 1992, p.129 ) # 8220 ; continuing the sacred worth of human life, spiritual religion, community spirit and? .to be instructors of tolerance difficult work, financial duty, cooperation and love # 8221 ; ( Takaki, 1989, p. 474-475 ) . Yet Asiatic offenses by teens, both separately and in packs, # 8220 ; have been cropping up like weeds? .What has gone incorrectly? # 8221 ; ( Sigmund, 1995, p.8 ) . There seems to be a immense sarcasm here, when one compares popular positions of Asiatic Americans and their admirable work ethic to the increasing incidences of Asian related young person offenses. Upon a 2nd scrutiny, one may get down to oppugn whether the phenomenon of Asiatic American offenses real ly opposes the theoretical account minority work ethic, see offense as an business: if the Asiatic American work ethic focal points on wining in the new universe, so offense can non be ruled out as a agency of achieving fiscal success. ( Sigmund, 1995 ) The history of Chinese packs goes back to a mystical spiritual group formed over three hundred old ages ago in China. The group, # 8220 ; the Triad Society was made up of Buddhist and Taoist priests opposed the Manchu emperor K # 8217 ; ang His, who reigned from 1662 to 1723 # 8243 ; ( Gardner, 1983, p.15 ) . The members of the society devoted themselves to politically human-centered causes. They escaped persecution of the emperor traveling to Hong Kong, where # 8220 ; More than three quarters of the population was said to be connected to the Triad # 8221 ; ( Gardner, 1983, p.15 ) After Sun Yat Sen founded the Chinese Republic utilizing the Triad organisation politically, it # 8217 ; s members began contending among themselves and turned to condemnable activities. ( Takaki, 1989 ) Other packs originated in the Golden Triangle in Southeast Asia, and the Golden Crescent in Southwest Asia. A figure of these groups came approximately as a consequence of societal and political turbu lence in their states of beginning. Former members of the military created many of these offense groups. So, some have their roots in political agitation in their place states. Most of these packs immigrated to the West Coast in big Numberss following the terminal of the Vietnam War. ( Takaki, 1989 ) Gangs have been a portion of society in Asiatic states for centuries. Gangs like the Nipponese Yakuza and the Chinese Tong ( once known as the Triads ) has been around since feudal times. The beginning of the Yakuza can be traced back to every bit early as 1612, when Kabuki mono # 8220 ; brainsick 1s # 8221 ; began to pull the attending of the local functionaries. The Kabuki glandular fevers were bizarre samurai who took hideous names for their sets and spoke to a great extent in slang. They were besides retainers of the Shogun. The groups were compromised of about 500,000 samurai that were forced into unemployment during the clip of peace, the Tokugawa epoch. This forced them to go ronin, or masterless samurai and many of them turned into brigands, plundering towns and small towns as they wandered through Japan. ( Lee, 1992 ) The Yakuza as they are known today did non come up until the in-between to late 1700 # 8217 ; s. They include the bakuto ( traditional gamblers ) and the tekiya ( street pedlars ) . These footings are still used to depict yakuza members today, although a 3rd group, gurentai ( goons ) was added in the station World War Two epoch. # 8220 ; Everyone in those groups came from the same backround: hapless, landless, delinquents and misfits. The groups stuck closely in the same little countries without jobs, as the bakuto remained largely along the main roads and towns, and the tekiya operated in the markets and fairs # 8221 ; ( Lee, 1992, p. 201 ) . # 8220 ; Asiatic felon groups arrived to the United States in the late nineteenth and early twentieth centuries # 8221 ; ( Yablonski, 1997 ) . In the early yearss of Asiatic in-migration, many of them served as legal and concern advisers to their communities, assisting the freshly arrived Asiatics make their manner among the unusual imposts of Western civilization. But they frequently exacted a monetary value from those they helped in the signifier of trueness to the pack. ( Yablonski, 1997 ) In recent old ages, the presence of Asiatic packs has become more and more evident in the United States. The younger members of these packs have become assimilated to American civilization and imposts. Modern packs have a tendency toward marking of mutilation to make gang markers. Nathan birnbaums on custodies or forearms are normally associated with Southeast Asiatic packs form the Philippines, Vietnam of Cambodia. Chinese gang members tend to hold Burnss on their upper weaponries, with females featuring Burnss on their mortise joints and pess. All the pack members have different combinations of markers. The figure and form of Burnss agencies different things to each person pack. ( Webb, 1995 ) . Most pack mem bers prefer imported autos like Hondas, Mazdas or Toyotas as their agencies of transit. Many of them will titivate so up by adding wing flairs, spoilers, tinted Windowss or pinstripes. These autos are used as agencies of reflecting position and wealth to other gang members. ( Gardner, 1992 ) These same members will by and large be armed with and utilize the best arms available. They prefer ââ¬Å"high capacity pistols and semi automatic weaponsâ⬠with ââ¬Å"9mm semi automatic handgunsâ⬠as their arm of pick ( Sigmund, 1995, p.11 ) . Modern pack members are by and large twelve to eighteen old ages of age. They portion a turning tendency toward following colourss and footings associated with the Crips and the Bloods. They dress good and are normally good groomed and clean. Their hairdos vary ; many of them have # 8220 ; new wave # 8221 ; haircuts. When pack members are engaged in condemnable activity, many of them color their hair. After the offense has been committed, they will frequently rinse the colour out. They may even cut their hair to avoid being recognized by constabulary. ( Sigmund, 1995, p. 10 ) Asiatic packs engage in a broad scope of condemnable activities including # 8220 ; extortion, place invasion, harlotry, gaming, and drug trafficking nevertheless, robbery is still their offense of pick # 8221 ; ( Lam, 1994, p.3 ) . A common method of robbery is for pack members to interrupt into places of Asiatic immigrants or concern proprietors, tie up their victims and crush them until they produce valuable points or money. ( Lam 1994 ) Several factors have made fellow Asians their primary marks. First Asians, particularly the recent immigrants and concern proprietors do non set money in Bankss. For many of these immigrants, banking is a wholly new experience. This is because they come from states have limited banking services established. Because of this, many of them maintain their money at place, or invest in jewellery. From their point of position, purchasing gold is non merely the safest manner to protect their money, but besides the best signifier of investing since the mo netary value of gold seldom falls. Second, Asiatic packs besides recognize that they are non likely to acquire prosecuted for their offenses against other Asians. Many of the victims are improbable to name or describe offenses to the constabulary. Many Asian # 8217 ; s seek to avoid covering with jurisprudence enforcement functionaries or bureaus for every bit long as possible. This job is non the consequence of constabulary actions or patterns, but instead an misguided impression about the function of jurisprudence enforcement functionaries in the community. To many Asians, the jurisprudence represents an utmost beginning of panic instead than a beginning of aid or service. This misconception grew because of the societal and political conditions from which they came. ( Webb, 1995 ) . # 8220 ; For old ages, many Asiatic authoritiess ( e.g. , China, Vietnam, Laos, Cambodia, Taiwan, North and South Korea, Indonesia, and Burma ) have used the constabulary as a political arm to stamp down political discontents and to protect their powers instead than as an instrument to protect justness # 8221 ; ( Lee, 1992, p.205 ) . Unlike the legal system of the United States where and single can non be arrested without a warrant or sent to prison without having a just test, many of the legal systems in the Asia seldom provide these protections even if they are written into jurisprudence. ( Lee, 1992 ) Many of them are besides unwilling to describe the offenses inflicted on them by Asiatic packs for other grounds. To many, speaking about the condemnable activities committed by Asians against their ain people in public ( e.g. describing the offenses to the constabulary or mass media ) in an admittance of failure non merely of the 1s who committed the offenses, but besides of the full Asian community. # 8220 ; This impression of corporate shame is profoundly rooted in the instructions of Confucianism, in which the full community must portion the incrimination for single failures, since persons are portion of the community # 8221 ; ( Takaki, 1989, p. 451 ) . Furthermore, many Asians have attempted to show a positive image of themselves to the American populace. Consequently, they downplay their defects in their battle for reputability and credence by American people. ( Sigmund, 1995 ) . Asiatic packs have become progressively more broad spread in the United States in recent old ages. Many of them originated centuries ago and played of import functions in society. As Asiatic in-migration to the United States increased, pack members followed. Gangs and other signifiers of organized offense have become a portion of life for Asiatic Americans, who must cover with them on a day-to-day footing. These youth packs engage in condemnable behaviour that frequently goes unreported because of the communities # 8217 ; fright of jurisprudence enforcement functionaries. The fact that these offenses go unreported leads the mean American to believe that offense among the Asiatic American community is non existent. As the old ages advancement, Asiatic packs, every bit good as packs in general will go progressively more common. In order to forestall this, we must halt this force before it occurs. Law enforcement every bit good as the community in general demands to take more of an inv olvement in the maps of Asians as felons do in our society. I didn # 8217 ; t individual out Asians because I hold a bias over merely them. I detest packs in general ; Asiatic 1s are merely of involvement to me. It is believed that if we employ more members of the Asian community into constabulary work, they # 8217 ; ll experience more delineated and there will be limited cultural and linguistic communication barriers. On the other manus, members of the Asian community need to come frontward and describe offenses when they occur. No 1 should hold to populate in fright of these packs. They chiefly peg out Asians, but the full community is at hazard, therefor it is everyone # 8217 ; s job. Gangs will merely be stopped when forces join together for the benefit of everyone. I don # 8217 ; t know if it # 8217 ; ll of all time go on that we feel comfy on that metro drive, and I know now that I wouldn # 8217 ; t experience any safer following to the Asiatic childs any more than the Blacks or Hispanics. Duin, Julia. Alarm Over Crime puts Focus on Nation # 8217 ; s Moral Crisis. Washington Timess, 11/17/1996, p31. Gardner, S. Street Gangs. Franklin Watts, New York: 1983. Gardner, S. Street Gangs in America. Franklin Watts, New York: 1992. Lam, M. # 8220 ; Gun Prevalence finds it # 8217 ; s manner to Asiatic Young person: You don # 8217 ; Ts have to be in A Gang to Band # 8221 ; Asiatic weekly. 1994, 16. Lee, J. Asian Americans. New York Press, New York: 1992. Sigmund, S. Documentary Film Explores Asian Youth Crime. Asiatic Pages, 1995, 5. Tataki, R. Strangers from a Distant Shore. Penguin Books, New York: 1989. Webb, M. Drugs and Gangs. Rosen Publishing Group, New York: 1995. Yablonski, L. Gangsters: Fifty Old ages of Madness, Drugs and Death on the Streets of America. New York University Press: 1996.
Sunday, November 24, 2019
Poseidons Loves and Their Children
Poseidon's Loves and Their Children The Greek god of the sea, Poseidon brother of the gods Zeus and Hades, and of the goddesses Hera, Demeter, and Hestia was associated not just with the sea but also with horses. Its difficult to even for historians to track the myriad lovers and children of the Greek gods. Some estimates put the count at well over a hundred, with the lovers being mostly but not exclusively female. In some cases, ancient authorities differ, so the exact lineage and relationships remain open to debate. Nevertheless, several of the gods various consorts and offspring remain mythologically significant in their own right. Amphitrite,à His Consort Placed somewhere between the Nereidsà and the Oceanids, Amphitrite the daughter of Nereus and Doris never obtained the fame she might have earned as Poseidons consort. Vaguely personified as the sea or seawater, she became the mother of Triton (a merman) and possibly of a daughter, Rhodos.à Other Lovers Poseidon enjoyed the pleasures of the flesh, seeking romance with goddesses, humans, nymphs and other creatures. Not even physical form mattered to him: He could, and often did, transform himself or his lovers into animals so as to hide in plain sight. Aphrodite, goddess of love and beautyAmymone, the blameless Danaid who became an ancestor of the founders of MycenaePelops, king of Pelepponesia and a founder of the Olympic GamesLarissa, a nymph, whose three sons with Poseidon eventually ruled all of ThessalyCanace, a human woman who bore the god five childrenAlcyone, one of the Pleiades, who bore Poseidonà several children Sexual Violence Poseidon, like many of the Greek gods, did not behave with perfect moral rectitude. In fact, many of the stories of Poseidon focus on rape. In the myths, he raped Medusa in the temple of Athena and Athena was so angry she turned Medusa ugly and her hair into snakes. In another story, he raped Caenis and after he fell in love with her, he granted her wish of transforming her into a male warrior named Caeneus. In yet another story, Poseidon pursued the goddess, Demeter. To escape, she turned herself into a mare but he transformed into a stallion and cornered her. Significantà Offspring Some of Poseidons most notable children include: Charybdis, the sea monster who (with Scylla) threatened the Strait of MessinaTheseus, the hero who served as the mythological founder of AthensBellerophon, the hero who captured Pegasus and killed the Chimeraà Polyphemus, the one-eyed giant fromà The OdysseyProcrustes, the villainà who owned an iron bed to which he made his guests fit by means of his hammer Pegasus itself,à the famed winged horse, sprung from Medusas neck when Perseus delivered the fatal blow. Some legends suggest that Poseidon fathered Pegasus, which would have made the horse half-brothers with his captor, Bellerophon. Some legends even suggestà that Poseidon sired the ram that bore the Golden Fleece!
Thursday, November 21, 2019
Individual Assignment, Theories of Management Essay
Individual Assignment, Theories of Management - Essay Example The first case study deals with the revival of Nissan from losing millions to making millions under the leadership of Carlos Ghosn. The second case study describes the leadership style of Andros Stakis, group-managing director of Stakis PLC, who almost put the entire company in risk. Case Study I - Nissan Nissan Motor Co., a Japanese automaker has been one of the largest car manufacturers in the world (Daily Markets). The company started losing its market share to another Japanese competitor Toyota since late 1970s and was suffering continuous losses since 1997 (INSEAD). In March 1999, Nissan had an alliance with French carmaker company Renault in order to bail out of their mountainous debt (Renault). In terms of strategy, it was a good M&A deal. Renaultââ¬â¢s geographical market strengths were in Europe and Latin America where Nissan was weak. Similarly in case of organizational capabilities, upon the merger, Renault would gain access to Nissanââ¬â¢s engineering and manufactur ing know-how, while Nissan would profit from Renaultââ¬â¢s marketing and design abilities (NY Times). Cultural clashes, different organizational behaviors and financial conditions of Nissan posed huge risks to the anticipated synergies from the merger. The casestudy reflects on the leadership style of the new COO Carlos Ghosn (le cost cutter) who made a clear agenda of the change that Nissan would go through in the years 1999-2001. In the first week itself, Ghosn made a number of significant changes such as incentive plans for his executive officers, new language policies and a committment to quit if profits were not achieved by FY 2001 (HBS). Ghosnââ¬â¢s leadership style in the case is called as dramatic, sel-sustaining, effective charismatic and focused. The company returned to profit by FY 2000 and had an operational profit of 4.5% by FY 2002. Case Study II ââ¬â Stakis PLC The second casestudy discussed in the paper is that of Stakis PLC, a group of hotel and casino cha ins in UK. Headquartered in Glasglow, the company was owned and run by Reo Stakis who turned a lace business to a hotel and casino empire. Prior to the appointment decision of Andros Stakis as the new CEO, Reo led the diversification of group into casinos, pubs, hotels and restaurants. In early 80s, the hotel tycoon passed on his business to his son Andros when the company was in a transitionary landscape of the unstable external environment and mis-guided strategic direction. The companyââ¬â¢s strategic and financial position was exposed to the downturn in economic climate of 1991. Despite induction of two established leaders, Sir Lewis Robertson and David Michels as Chairman and CEO respectively, the company started having debts as high as ?15I Mn in 1991. Upon a number of cost-cutting measures, divestures, new partnerships and ouster of Andros Stakis, the group had its first pre-tax profits in 1993. Hilton PLC bought the group in 1999 for ?1.2Bn (The Independent). Theories of Management ââ¬â An Overview This section provides an overview of varios theories of management designed over the period of years to make effective judgements on business and processes: 1. Scientific Management Theory (1890-1940): From the need to increase productivity, Fedrick Taylor divised a body of principles that scientifically selected workers so that each each worker would be given the responsibility best
Wednesday, November 20, 2019
Business presentation Essay Example | Topics and Well Written Essays - 250 words
Business presentation - Essay Example It is usually easier to read information because it helps reduce the number of speaking errors that I present and the information is already in a format that sounds academic and professional. Because my greatest challenge is in how I communicate to the audience, I think this is the biggest thing that I actually need to improve upon. It is very difficult to speak in front of my peers especially in a way that is not boring and keeps the audienceââ¬â¢s attention. To avoid making mistakes, I create power points that have too much information and make presentations that are actually based on reading to the audience. There are probably techniques and methods to take the research that I perform to learn about a topic and shrink the knowledge down into a summarized version. Learning how to take research and use it to support the overall purpose of the presentation is critical. Right now, I also struggle in speaking to the audience and need to improve on how I prepare the presentation and actually deliver it to the
Monday, November 18, 2019
Proposal for PHD in business Essay Example | Topics and Well Written Essays - 750 words
Proposal for PHD in business - Essay Example In case the cash invested results in wealth creation but by an amount less than the cash invested and the resources used, society is poorer to the extent of the loss, as the borrower must repay the debt by compensating for the loss out of existing wealth owned or acquired by him/her. The same applies to cases in which invested cash is totally lost, no wealth creation having taken place. In both cases a redistribution of wealth in favor of the creditors is involved" (Siddiqi, 2007). This paper is an examination of actual investment has increased in the past few years that the tawarruq system is in place. Investment is one the path through which wealth creation can occur. We expect the tawarruq system to aid business process and investment so as to further improve the economy. Other variables that may be affected in the process are interest rates, exchange rates, consumption and bank's profitability. The three are macroeconomic variables while the last is a microeconomic variables. We particularly desire that people do not owe money for consumption purposes alone but for investment. The research will commence with the review of related literature. ... B. Research Questions a. What is the tawarruq system's impact on Saudi Arabia's over-all level of investment b. What is the tawarruq system's impact on Saudi Arabia's over-all level of consumption c. What is the effect of the tawarruq system on Saudi Arabia's interest rates d. What is the effect of the tawarruq system on Saudi Arabia's exchange rate e. What is the impact of the tawarruq system on banks' profitability C. Methods and Procedures The research will commence with the review of related literature. This is where we identify the gaps in the study that need to be filled. The literature review will also provide us a knowledge of the depth of current and previous researches on the topic. The review will also include desk research of recent news about the conduct of the business and the related figures. Data mining for the necessary figures will follow. We will particularly mine the data for the over-all tawarruq level of lending (the amount of lending per year) for the last 10 years, the figures for investment, consumption, interest rate and exchange rate for the last 10 years. To establish the relationship between these variables, we will use simple regression of the time series analysis. An econometric software, Eviews 4 will be particularly used to test the relationship. The possible outcomes are significant or not significant and whether the direction is positive or negative. D. Goals and Objectives This paper wishes to trace the practice of the tawarruq lending system in Saudi Arabia and its impact on wealth creation primarily the investment variable. Lending is a path to consumption or investment and it is said to create wealth if it goes to the latter. In this paper we particularly examine
Friday, November 15, 2019
History Of Mobile Banking
History Of Mobile Banking Mobile banking is known as M-banking or SMS Banking. The european company called PayBox supported financially by Deutsche Bank, in 1999 started mobile banking.Ã [i]Ã SMS was the earliest mobile banking service offered. It is an emerging field in the banking segment. However, older phones had limited functionality. Mobile phones, palm PCs and PDAs were lacking hardware and software support. The higher cost of data plans and the slower network speed were also limiting factors in the growth of mobile banking. It has been improved with the advancement of the technology, the hardware and software. The cost of mobile devices has been reduced drastically and is still reducing. Network speed is much better than before and data plans are not as costly. All of these changes have provided necessary raw materials for the growth of mobile banking and the numbers of people using mobile banking is increasing day by day. Users, who were using computers/laptops for online banking, are moving towa rds mobile banking because of ease of use and fast access. In the USA, mobile banking was introduced in 2006 by Wachovia bank.Ã [ii]Ã In Sep 2007, Aite group predicted the mobile banking users in the United States would reach 1.6 million by the end of the year 2007 and will rapidly increase to 35 million by the year 2010.Ã [iii]Ã The report indicated the growth potential for mobile banking. However, the security issues are the major concerns for mobile banking service providers and the users. As mobile banking systems mature, more users will start using mobile banking, which will draw the attention of the hacker community to target mobile banking customers mostly for financial gain. Safety and security of the personal and financial information stored and managed in the devices are the key factors for users, banking organization and the security community. The purpose of this paper is to gain basic knowledge of mobile banking, explain the different kinds of architecture used in mobile banking and identify the different security attacks and its countermeasures. Mobile banking in US compare to other countries Wachovia bank was the first to announce mobile banking services to their customers in Sep 2006 and re-launched in March 2007 followed by a few other banks.Ã [iv]Ã They developed their own banking product with ATT. Bank of America started mobile banking services in March 2007 in collaboration with four major wireless carriers, which reported 500,000 users within the first 6 months. Initially, the services offered were funds transfer, bill payment, branch and ATM locations, account balance, etc. Since then there has been huge progress in mobile banking services. In 2009 and 2010 respectively, San Antonio, Texas-based USAA launched their new application for the iPhone and Android platform that is capable of remote deposit capture allowing users to take a photo of the check and deposit electronically.Ã [v]Ã In the middle of 2010 Chase bank also introduced the mobile RDC application for the iPhone.Ã [vi]Ã In Nov 2010, U.S. Bank and Visa announced a mobile payment system for th eir customers.Ã [vii]Ã They offer the service via use of the MicroSD card, which fits in most existing mobile devices. A month before that, U.S. bank launched a full suite mobile banking solution for prepaid cardholders with bill pay capabilities. Even though the US based banks provide different kinds of mobile banking services, they are still far behind of their counter parts in the world. 7Many banks in the world have offered mobile banking and financial services for years. European and Asian countries have been offering mobile banking services for years that vary for banking related services to the mobile proximity payments. Japan and South Korea are the world leaders in adopting mobile banking technology. Before 2004, the Internet was the only way of using mobile banking in Japan, which enabled customers to browse the merchant website through a web browser. However, customers still had to use their credit/debit cards for payments. In 2004, NTT DoCoMo started using FeliCa contactless IC chips developed by Sony for mobile devices, which can carry personal and financial information that facilitated remote payments and substituted mobile devices for cash and cards at merchants points of sale. In 2005, KDDI and Vodafone also adopted FeliCa. 7In 2002, SK Telecom and KTF launched their proximity payment programs in South Korea, which used an infrared technology. These prog rams were not successful because of number of reasons. In 2003, LG Telecom started South Koreas first IC chip based mobile banking service, which significantly increased the market share of LG Telecom. The other carriers also adopted IC chips following the success of LG Telecom. Also, Visa and MasterCard have successfully operated in South Korea since 2006. Since then mobile banking services have come a long way in other countries of the world. Difference between mobile banking and online banking/credit/debit card banking At present, mobile banking provides almost the same kind of services as online, credit/debit card banking. When mobile banking services first started, the mobile devices were not able to support all mobile banking services and they were lacking hardware and software support. The initial mobile banking service offered was the SMS banking; while online banking was very well developed and was offering all kinds of banking services. Credit/debit card systems are also fully developed and people were able to use their cards at merchants point of sale and online for payments. However, technological advancements in mobile devices have enabled users to use mobile banking related services via SMS, web browser and mobile web applications. Currently available mobile devices have the same processing power as computers and they are still evolving. In some countries, mobile banking was started in the early 90s and now offer a full suite mobile banking solution, which has features of online banking and credit/debit card banking. People are using their mobile devices to replace cash and cards. However, mobile banking services in the USA were started at the end of 2006. Most USA banks are still not offering full mobile banking solutions to their customers. U.S. banks recently announced proximity payment systems in 2010, which has been in use for a long time in other countries. Some of the features of online banking and credit/debit card banking are not available for mobile banking systems. So mobile banking systems in the US are less developed compared to online, credit/debit card banking in terms of services. However, as number of people enrolled in mobile banking increases and banks offer more services with a full range of solutions in the US, the line between mobile banking and online/credit/debit card banking will get thinner and, in the future, mobile banking will provide a combination service of online and credit/debit card banking in the US. In terms of security, mobile banking is as secure as online banking and offers the same security features and protections. However, there is less number of users for mobile banking than online/credit/debit card banking, which reduces the risk of security threats. The hacking community is more targeted towards the online/credit/debit card banking for financial gain. A large number of antivirus, antimalware/spyware etc. available for online banking are not widely available for mobile banking. But with the increase in number of users for mobile banking, these software are also increasing. Mobile banking also carries the risk of some attacks called Vishing, SMishing and spoofing that are only possible in mobile devices. The security features and countermeasures for them differ from online banking. However, mobile banking provides the same security protections as the online banking, as most of them are derived from the experience with online banking. Mobile banking services 5Mobile banking systems allow users to perform bank related transactions like balance checks, account transactions, bill payments, fund transfers, credit/debit card management, etc. through mobile telecommunication devices like mobile phones or PDAs (personal digital assistants). Mobile banking can be divided in three different concepts based on an academic model: (1) Mobile accounting, (2) Mobile brokerage and (3) Mobile financial information services. 6Mobile accounting services can be divided into account operations and account administration. Account operations include fund transfers, bill payments, etc. and account administration includes ordering checks, updating profiles and personal information, managing lost or stolen cards, etc. Mobile brokerage is related to buying and selling of stocks, securities, and obtaining current information about securities. Mobile financial information divides into account information and market information. Account information includes informati on on branch and ATM locations, credit/debit cards, statements, alerts, balance inquiries, etc., while market information includes products and services, currency exchanges, interest rates, etc. Mobile banking advantages disadvantages Mobile banking offers many advantages to both, users and service providers. It is fast and easy to use and saves time. For online banking, an internet connection is an essential which is a major problem in developing countries. However, many individuals can find mobile connectivity at places where internet connection cannot be found. Mobile banking is cost effective for providers as cost of mobile banking is much less compared with onsite banking. Various kinds of banking services and transactions can be performed with mobile banking. However, mobile banking has many disadvantages too. Security issues are the major concern. Phishing scams, viruses and Trojans and physical loss of the mobile device are some of the security issues that affect mobile banking. The cost of the mobile devices, which are compatible with the mobile banking application and still quite high. Mobile requires a data plan and text messaging services, which is an added cost to the user. Some providers charge for s oftware and mobile banking services as well. Different types of mobile banking architecture 5There are three types of architectures available for mobile phones to enable mobile banking. Up until 2010 most of the mobile banking was performed by SMS or mobile web. With the advancement in mobile phones and following the success of Apples iPhone and other operating system based phones, mobile banking is increasing through the special client applications. These different architectures are further discussed below: SMS or MMS based mobile banking Mobile website Mobile client application SMS or MMS based mobile banking architecture SMS based mobile banking was the first mobile banking service offered. It is based on plain text message interaction. 6,11SMS banking works in two different modes. Pull mode and push mode. Pull mode is a one-way text message system where the bank sends a text message to the users informing them about certain account situations. It can be used to promote other mobile banking services. Push mode is a two-way message system where users send text messages to the bank requesting specific transactions or services with predefined request codes and the bank replies with specific information pertaining to the transactions or services through plain text messages. 6,11There are two different kinds of text messaging systems: SMS and MMS. SMS is a short form of short message service, which includes sending or receiving plain text messages from the bank. It has a limitation on the number of characters can be included in a message. MMS, known as multimedia messaging service, is the second type of messaging service, which can carry larger text messages and works on the same platform as SMS. To use message based mobile banking, a customer has to enroll his/her cell phone to the bank and the bank sends a text massage with a onetime password. Each bank has its own SMS banking number and commands for mobile banking. The message based system has some advantages. It is cost effective and familiar technology, virtually available in each and every cell phone regardless of manufacturer, model or carrier. It provides two-way communication between the bank and the user, so either the bank or the customer can initiate communication. It does not transmit or sto re the confidential information in the mobile device. However, SMS cannot carry a larger message and account information. SMS has to be limited to certain number of characters which limits its use. Mobile website based mobile banking architecture 6,11This architecture includes the use of the internet browser of the mobile device to access the banks internet banking website. Users can connect to the internet via a wireless network or their carriers internet service. The biggest advantage of this architecture is most of the processing is done at a remote server at the bank and much less information is stored in the mobile device. On the other hand, it doesnt require the installation of special software and most of the phones today are capable of using an internet browser. 6,11WAP (wireless access protocol) was created in 1999 and made internet access possible through mobile devices. WAP is an industry standard for wireless applications for mobile devices. It provides the same kind of user experience to the customer as the Internet banking and it does not require the installation of a special mobile banking application. However, it has some disadvantages also. Banks have to create mobile websites that are mobile friendly and can be accessed through the small screen of mobile device. It does not work with all kinds of phones and requires smart or PDA phones. There is an added cost for data plans and only customers can initiate communication. This system is more prone to attack as mobile devices are not capable of running firewalls or antivirus protections. Mobile client application based mobile banking architecture 6,11This architecture requires the download and installation of a mobile client application to the mobile device. With the help of the application a bank can provide a wide range of services to their customers. Although this approach has some advantages and some disadvantages. First of all, users have to learn a new application. The application has to be customized to different phones which increases the development cost to the banks. The applications are also susceptible to attacks and only customers can initiate communication. The older phones are not capable of running this application because of technical limitations. The use of internet requires a data plan that increases the cost on the part of customers. (A data plan requires to use client application based mobile banking architecture, which increases the cost on the part of customer.) Some of the banks charge an initial fee for downloading and installing the mobile client application. Mobile banking security requirements Confidentiality Authentication integrity non-repudiation Security attacks/threats Mobile banking is an emerging technology and the number of mobile banking subscribers increases day by day. With the increase in number of users, the concerns for security also rise. Different kinds of security attacks are as follows: What kinds of attacks are more on which types of architecture model? Vishing12 Vishing is a social engineering attack over the telephone system. It is a type of phishing and it is a combination term of voice and phishing. Mostly it uses features facilitated by Voice over IP (VOIP), to gain access to private, personal and financial information from the public (information of the users). It is used to get the authentication information of the user mostly for financial gain. 13Phishing Phishing is an another kind of social engineering attack in an electronic communication to acquire sensitive information like usernames, passwords and credit card details by redirecting unsuspecting users to a fake website with the use of an authentic looking email. It can also be carried out by instant messages. 14Smishing Smishing is also a social engineering attack similar to phishing. The name is derived from SMs phiSHING. It uses the text message system of the phone to get private, personal, and financial information of the user. A web site URL embedded in the text message may act as a hook. However, the phone number that connects to the automated voice response system has become more common. 15,16Spoofing Spoofing is an attack where a person or program successfully masquerades as another with falsifying data. A spoofing attack causes the telephone network to display a number on the recipients caller-id-display. This number is familiar and looks like it came from a legitimate source, which is not an origination source actually. 6Lost and stolen phones This is one the biggest threats for mobile banking. Mobile phones are small and portable and could be easily lost or stolen. Authentication, authorization and confidentiality are the areas to be considered when mobile devices are lost or stolen. 19In 2001, 1.3 million devices were lost or stolen in the UK. 17In 2006, over 1 billion phones were sold worldwide. Of those 80 million were smartphones, which have operating system and can store all kinds of information. 18A survey found that 34% users didnt even use a PIN. This threat increases with the increase in the number of phones. 6Cracking and Cloning Cracking a mobile device means modifying its software to gain control of that particular mobile device. Attackers find the ways to break or crack the software and once cracked the attacker has the access to the data stored in the device. An IPhone cracked by an ISE is an example of phone cracking. Attacker found an exploit in the iPhones web browser, deployed a fussing attack and injected invalid data into a program looking for the buffer overflow. With cracking, the software attacker can also view SMS logs, call history, etc. or send that data to their machine. Bluetooth is also vulnerable to phone crack attack. 17If Bluetooth is on, any Bluetooth device can connect to the phone within a 30 foot range. An attacker can use bluesnarfing and download, upload or edit files on a device without the owners permission. Default setting can be change by attacker.(Even once a Bluetooth device connected with phone, attacker can change the default setting also.) 20One survey in London found that 379 out of 943 phones had their default setting on and 138 out of 379 were vulnerable to attack. Making identical copies of anything is known as cloning. Cloning of a mobile device creates a second device, which has the same identical information as the original device. Cloning new phones is difficult while older phones were easy to clone with some basic equipment. 17Cloning of GSM phones is much more difficult in comparison to cloning of CDMA phones. Cloning of CDMA phones only requires a phones electronic serial number and mobile identification number. A few ALLTEL customers had their phones cloned during their visit to different places. Cloning can affect all carriers and all kinds of phones if they are left on. 21With less than $2000, any attacker can build a cloning device that can capture the signals from a mobile device. It can capture the signals sent out by the phone from up to a mile away and get the codes that identify the phone. Cracking and cloning are active threats to mobile banking. Cracking can be used to get sensitive data from the phone or to install malware w hile cloning can duplicate all information from the phone and an attacker can get about half of the information to identify the phone. 6,22Man-In-the-Middle attack(MIM) MIM is considered a threat to the confidentiality and integrity of people. It is a form of active eavesdropping in which attacker makes independent connections to victims by positioning him/herself in between two victims to take control of communication between them with the intention of interception and alteration of information and relays it to others, making them believe that it came from the other person and not from the attacker. The attacker must be able to intercept all messages and alter them while it is transit. It is also known as active wiretapping or traffic intercepting. The chances of this kind of attack increases with the use of wireless connection compared to other more secured connections. Viruses, malware and malicious code 24Malicious code is a software in the form of viruses, malware or worms. These kinds of software can be inserted into a system without the knowledge of the user. The primary intent of inserting the software is to gain private personal and financial information of the user and compromise the integrity and confidentiality of the system. It affects the victims private data, applications, operating systems or sometimes just annoys the users. 23Mobile browsers are susceptible to the same kind of security risks as home or office computers. Mobile browsers are little safer at this point compared to computers. With the increase of mobile banking, the numbers of these kinds of software will increase. However, at present, the increasing number of viruses and Trojan horses is the biggest concern to mobile banking security. 25The mobile devices running windows operating system are a favorite target for the hacker community. 26The first generation viruses were proof-of-concept viruses. The Commwarrior virus spreads over Bluetooth and MMS. SymbOS.skulls is a Trojan horse that affects symbian phones and changes all the application icons to skull icons. In 1994, the Cabir worm spread as an infected SIS package called caribe.sis. It spread via open Bluetooth connections and affected Symbian Series 60 phones. Timifonica virus infected PCs in 2000 and sent harmless text messages to cell phones. There are also software that infect mobile devices and look for personal information like stored password or other sensitive information. Some Trojans can steal address book information and send that information to hackers via SMS or MMS. 6Bluetooth can be used easily to spread these viruses. Most digital phones available today are Bluetooth enabled and any Bluetooth device can be infected within range. In Finland, a mobile malware was spread from Bluetooth to Bluetooth device during a soccer game. However, while Blueto oth is the easiest way to spread viruses it is not the only way. Malware have been written that use Internet and cellular networks to spread. SMS and MMS can also be used to spread viruses and malware. Therefore, this threat is a recent major concern for banks and users. Vast number of attacks can be launched with use of viruses and malware. Security countermeasures Security of mobile banking is an important and a crucial issue. In addition to that, wireless communication increases the vulnerability of the system. Therefore, more robust security system is necessary to protect the private personal and financial information of the users. Following are some of the countermeasures discussed in the paper. What kinds of countermeasures are more required and more available for which types of architecture model? User authentication 27Authentication is process of identification of something or someone as authentic. There are three different ways by which someone can be authenticated. These three categories are based on the factors of authentication: what you know, what you have or what you are. Each of these factors have a range of elements. Research has suggested that for better security at least two or preferably three factors be verified. If two elements are required for authentication it is called as two-factor authentication while two or more than two factors authentication is known as multi-factor authentication. 6FFIEC requires banks to use multiple forms of authentication for electronic banking. All mobile banking systems need to use at least two-factor authentication for user identification. 6Authentication techniques based on what user knows including a combination of the pin number, the username, the password and the onetime password for mobile banking. Research has shown security concerns with this technique as users use weak passwords, write it down or share with others. 28Therefore, to increase the protection of the mobile device pin protection or distributed pin verification scheme has been suggested in which one-half of the pin is stored in the mobile device and rest of the half is stored in a remote machine in the network. So the attacker can get only half of the pin from the phones memory. 6Another technique uses what user has. This includes ID card, cell phone, credit card etc. Use of any of the above forms is not a reliable technique as the user must have the physical possession of them. 6Biometrics is an another form of authentication that includes face, voice, fingerprint, DNA sequence etc. 18Clarke and Furnell found in a survey that 83% of populations were in favor of using biometric system for authentication. 29A report on biometric security for mobile banking in March 2008 discusses the different issues of the mobile banking and suggests use of biometric system for more robust security with the help of a users fingerprint as a biometric element. 6Behavior analysis can also be used as a security measure where users are granted or denied access based on their previous behavior. A robust system uses multiple forms of identification before and during use of an application and if necessary asks for more accurate form of identification. If the user fails they are locked out. Encryption 30Encryption means changing or transforming the information in an unreadable form to anyone with the help of algorithm. A key is required to make the information readable again. This process is called decryption. Encryption addresses the confidentiality issue. Encryption can be used to protect data at rest and in transit. There are vast numbers of incidents reporting data interception in transit. 6There are two different ways to protect the data on the phone. (1) Encryption of information stored in the phone and (2) Encryption of the information during communication. 31The current encryption technique is AES and ECC. The wireless data is encrypted with AES and the encryption key uses ECC to encrypt this data. They increase the speed of encryption and decryption and currently they are the most powerful technology available for encryption. 6CellTrust uses AES and micro clients to protect the SMS messages and send encrypted SMS messages. ClairMail recommends the use of SSL and HTTPS during communication. TPM is another tool that can help with encryption and protection of mobile devices. It is an embedded chip in the motherboard that can work with mobile devices or security smartcards. It can store keys, passwords, digital signature and certificates. 32TPM chip has a unique RSA key embedded in it during production. So it can be used to perform platform authentication. For example , to verify mobile devices seeking access for mobile banking. Digital signature 33Digital signature is an electronic signature that can be used to identify the authenticity of the message of the document. It is also known as digital cryptographic signature. It can be used with encrypted or unencrypted message. A valid digital signature indicates that the message or document was sent by a known person and it was not altered in transit. Digital signature also represents non-repudiation. Therefore, ones the message has been sent and digitally signed, the signer cannot deny that he/she did not sign a message. 6With the help of Digital signatures customer can sign the document and does not have to visit branch office. In mobile banking, adding a digital signature to the transaction proves that a customer authorized the transaction. 31At present digital signature technology uses RSA algorithm and ECC algorithm. Because of higher security level, low calculating processing speed, small storage space and low band-width requirement ECC will be more suitable for mobile banking. WPKI technology 34PKI (public key infrastructure) is a security mechanism for wireless internet and uses public key cryptography and certificate management for communications. It provides all four of the security feature for e-commerce: confidentiality, integrity, non-repudiation and authentication. 35WAP (wireless access protocol) is developed by WAP forum to provide a common format for internet transfers for mobile devices. The WAP stack includes five layers: WAE, WSP, WTP, WDP and WTLS. WAP consists of WIM, WTLS, WMLScrypt and WPKI. 31Wireless application protocol PKI is an extension of traditional IETF PKI standards used in wired network. It is mainly used in wireless network. WPKI applications have to work in a restricted environment like less powerful CPUs, less memory, less storage space, small displays etc. Therefore, WPKI must be optimized like the other security and application services within WAP environment. WPKI uses a public key system based on ECC algorithm for encryption and decryption. With the help of this system the information can safely reach to its destination. In the presence of other security protocols like WIM, WTLS and WMLScrypt of WAP, WPKI can fulfill all four security requirements for mobile banking: confidentiality of data, identity and authentication, integrity and non-repudiation. Conclusion The number of people use mobile devices is rising rapidly. Advanced technology in mobile device field has overcome the limitations of the older phones. Newer phones have a wide range of functions and improvement in hardware and software support, which enabled users to use mobile devices as substitute for computers. These mobile devices are capable of performing complex functions, which enabled users to manage their finances through mobile devices. There are three different kinds of architecture for mobile banking. SMS based system works in almost any mobile device. Web based systems are similar to internet system and they are more popular in the USA. The client application system offers robust solution to mobile banking. However, all of these systems have security issues those need to identified and addressed in a proper fashion. Confidentiality, authentication, integrity and non-repudiation are the most important security requirements for any mobile banking system. Authentication of the user and encryption of the data presents serious challenges to the mobile banking system. Implementing the various types of authentication and encryption technology can improve the mobile banking security, which reduces customers fear against security issues and increase
Wednesday, November 13, 2019
Essay --
CHAPTER THREE RESEARCH METHODOLOGY 3.1. Introduction This chapter will explain chronological way to do the full research by using different research methodologies. The purpose of study will be explained by the appropriate philosophy in a right approach and the pattern of the reach will be discussed by the researcher thoroughly in this chapter. This approach will be a combination of data collection procedures using both primary and secondary sources, sampling methods, strategy of the research. Every research has some limitations and this chapter will also discuss the limitation of the study by detecting it and comparing with different approaching methods which can be used. 3.2. Data Analysis Method Qualitative and Quantitative these are the two types of approach to the any research analysis for the any data which can be used in research. The research which only uses the numbers to do the research analysis is called Quantitative Research and the research which uses the words, units of the analysis of the collection data and the visual images is Qualitative Research. Quantitative Research is also known about its tending to link with passivism but on the other side, Qualitative Research focused and worked with the association of interpretive. Moreover, the contrast between involvement and lack of involvement respectively are associated by Qualitative data and Quantitative data analysis method (Denscombe, Approach to analysis: quantitative and qualitative research, 2010). The purpose of the study is analyzing the issues of Supply Chain Management which is also known as SCM. The purpose of the study is to analyzing how Supply Chain Management works for Tesco. This study also includes direct involvement relationship between the co... ...SS. 3.9. SUMMARY In this chapter research methodology is associated with the approach of analyzing and explanation of whole research. There is other ways to conduct the research by the researcher. The way of conducting the research should be determined by the researcher in this chapter by explaining all the related logic and explanation. Supply Chain Management has a great impact on todayââ¬â¢s success of company. It also develops the organizational performance of Tesco. The researcher follow the qualitative research method to collect the data and for analyzing these data. It includes a survey with 20 questionnaires in 100 groups of people following with 10 face to face interviews. Most of the people from this group are the employees, managers and few customers. Most of the data is collected from the primary source which makes the accuracy and analyzing strength higher. Essay -- CHAPTER THREE RESEARCH METHODOLOGY 3.1. Introduction This chapter will explain chronological way to do the full research by using different research methodologies. The purpose of study will be explained by the appropriate philosophy in a right approach and the pattern of the reach will be discussed by the researcher thoroughly in this chapter. This approach will be a combination of data collection procedures using both primary and secondary sources, sampling methods, strategy of the research. Every research has some limitations and this chapter will also discuss the limitation of the study by detecting it and comparing with different approaching methods which can be used. 3.2. Data Analysis Method Qualitative and Quantitative these are the two types of approach to the any research analysis for the any data which can be used in research. The research which only uses the numbers to do the research analysis is called Quantitative Research and the research which uses the words, units of the analysis of the collection data and the visual images is Qualitative Research. Quantitative Research is also known about its tending to link with passivism but on the other side, Qualitative Research focused and worked with the association of interpretive. Moreover, the contrast between involvement and lack of involvement respectively are associated by Qualitative data and Quantitative data analysis method (Denscombe, Approach to analysis: quantitative and qualitative research, 2010). The purpose of the study is analyzing the issues of Supply Chain Management which is also known as SCM. The purpose of the study is to analyzing how Supply Chain Management works for Tesco. This study also includes direct involvement relationship between the co... ...SS. 3.9. SUMMARY In this chapter research methodology is associated with the approach of analyzing and explanation of whole research. There is other ways to conduct the research by the researcher. The way of conducting the research should be determined by the researcher in this chapter by explaining all the related logic and explanation. Supply Chain Management has a great impact on todayââ¬â¢s success of company. It also develops the organizational performance of Tesco. The researcher follow the qualitative research method to collect the data and for analyzing these data. It includes a survey with 20 questionnaires in 100 groups of people following with 10 face to face interviews. Most of the people from this group are the employees, managers and few customers. Most of the data is collected from the primary source which makes the accuracy and analyzing strength higher.
Sunday, November 10, 2019
Internal and External Forces and Change Essay
Within the business world, there are different theories of effective change implementation. The corporation this research focuses on is Duke University Childrenââ¬â¢s Hospital, which is highlighted in the textbook. The topic of the research paper will focus on the process of implementing change within the hospital. Implementing change within organizations is very relevant to this course. Not only is the course called Leading Organization Change, but the topics we have been focusing on revolve around methods of implementing change. With changes, organizations need to take steps to fully plan the change in order to ensure a smooth transition and acceptance (Spector, 2013). Research will show how Duke University Childrenââ¬â¢s Hospital assessed the internal and external forces that impacted the change and how they assessed if the organization was ready for change. Also, research will show what model and strategies were used during the organizational change along with an analysis o f whether resistance to the change occurred and if so, how it was dealt with. Finally, I will strategize how to handle leading group changes within a similar context. Often times, financial crises spurs change in organizations. This was the case for Duke University Childrenââ¬â¢s Hospital. An assessment was made by the key administrators that showed how dire their financial situation truly was due to various reasons. This resulted in the pending elimination of programs and reduced services. Additionally, sales productivity had dramatically fallen as well as patient and staff satisfaction reaching its lowest point. These negative factors caused the hospital to make an assessment that they were ready for change. Change was the only thing that would keep their doors open to the public and Meliones knew that once people understood the situation more fully, change would be a goal on all of the staffââ¬â¢s minds. The first step Meliones took was to diagnose what the root causes of the financial crisis was with the staff (Spector, 2013). By creating a sense of urgency around the need for change to a wide variety of staff members, the change impleme ntation process started out on the right path (Russell, 2013). One problem they immediately noticed was that each group of employees (accountants, administrators, clinicians, etc.) was working towards individual goals instead of understanding what the goals of the organization were. This assessment of internal forces that could impactà the change led the staff to understand that it was essential to create a sense of shared responsibility for the organizationââ¬â¢s performance as well as changing the previous patterns of behavior. The hospitalââ¬â¢s chief medical director, Jon Meliones, realized that these problems could not be addressed by the chief executive officer and chief operation officer alone. These problems needed the combined efforts of all administrators and clinicians in order to successfully come out of the negative place they found themselves in. Meliones, the chief nurse executive, and the nurse managers decided on a tactic that brought together the connection between financial performance and excellence of the health care provided to patients. Under their planned strategic renewal, both financial performance and excellent patient care would be dual focuses. During the shared diagnosis stage, the wide spectrum of employees was educated in the external forces their hospital was up against financially. They realized that because the external forces would most likely not change, changes needed to be made primarily internally (Spector, 2013). Next, implementation moved to the pediatric intensive care unit. It was crucial that new behaviors became operationalized by the redesign of roles, relationships, and responsibilities. The team was able to redesign how every member (doctors, nurses, medical staff, accountants, etc.) would perform their tasks. This redesign was done alongside the members in order to get input. There was a decision to use the balanced scorecard measurement tool once they got to the stage where measurements could be utilized. This measurement tool utilized measurements of many things such as customer satisfaction, financial outcomes, processes of the business internally, and the learning/growing abilities of the organization. These measurements were done in hopes to aide in the reinforcement of all new behaviors that were expected. Because of these new tactics, within three years, the hospital began making a profit again (Spector, 2013). What was crucial to the success of Meliones and his team was the sequence they chose to take during the intervention. First, Meliones kept the staff involved by facilitating a shared diagnosis process which helped find the root of the hospitalââ¬â¢s financial issues. The process of unfreezing isà important because this is when group members become dissatisfied with current performance or situations. Because Meliones used this approach instead of lecturing the employees on how to change, the employees were given the opportunity to learn and they felt more involved. This allowed the process of formulating an appropriate response to the issues be a group effort as opposed to Meliones coming up with a plan on his own that may have been resisted. The way to overcome defensiveness, when employees resist change, is to get broad-based participation. The shared diagnosis approach surfaced the connection between their financial performance versus behavior patterns and brought agreement am ong employees about what needs to change. Of course, Meliones could have chosen the approach of presenting to the employees all that was wrong and what the new plan would be, including the balanced scorecard. This would have made the unfreezing stage nearly impossible to accomplish if this approach had been taken. Second, he formulated a cross-functional team made of many different positions. This team had a goal to decide the best way to provide excellent customer service for their patients as well as perform well financially. By using the approach of task alignment, Meliones spurred the organization to focus not only on how the staff could work better together, but a dual focus on excellent patient care and financial performance. It was crucial at this stage to get employees to understand how their roles must interact and rely on other roles within the hospital to be successful. This involved educating all employees about the organization as a whole to give everyone a broad perspective and understanding. Third, Meliones began implementing the changes needed specifically in the pediatric intensive care unit. Fourth, every unit member had a redesign of roles, relationships, and responsibi lities. The last step involved using the balanced scorecard system to reinforce the new behaviors within the organization. This sequence was done for each unit within the organization and as a result, the hospital completely changed their downward trajectory within three years (Spector, 2013). After seeing the success that Duke Childrenââ¬â¢s Hospital experienced in their strategies, I would take the same approach if I were expected to lead group change in a similar situation. Within the process of shared diagnosis, aà shared commitment to the ideas and action plans is incredibly valuable. When people come together, they stimulate, motivate, and inspire each other to bring forward the best ideas (Fullan, 2001). By involving many employees in the process, the positive effect is that they naturally will have a clear understanding of how the necessary changes will actually benefit the organization (Nguyen, 2010). References Fullan, M. (2001). Leading in a culture of change (1st ed.). San Francisco, California: Jossey-Bass. Nguyen, S. (2010). Implementing change and overcoming resistance. Workplace Psychology. Retrieved from http://workplacepsychology.net/2010/02/05/implementing-change-and-overcoming-resistance/ Russell, J. (2013). How to create change in the workplace. The Washington Post. Retrieved from http://www.washingtonpost.com/business/capitalbusiness/how-to-create-change-in-the-workplace/2013/11/27/9d62f8de-5548-11e3-835d-e7173847c7cc_story.html Spector, B. (2013). Implementing organizational change (3rd ed.). Upper Saddle River, New Jersey: Prentice Hall.
Friday, November 8, 2019
Schindlers list essays
Schindler's list essays The movie Schindlers List touched me in many ways. I didnt realize the extent of the horror that the Jews faced. The thought that someone could come and barge in to my house and take all my belongings scares me. I now feel more sympathy than ever for the Jews who had to suffer through this horrible ordeal. The girl in the red dress really touched me, and I think it was the turning point for Schindler to start his factory of Jews when he saw her at the crematorium. The fact that she was the only person in color made it obvious that she played in important role in the faith of the Jews. Schindler first sees her as an innocent young girl walking along the streets of the ghetto. He later spots her body being wheeled off to be burned. The young girl in the red dress symbolizes the hope the Jews had. In the beginning of the movie, the Jews hope was pretty high, and most people expected to be freed sooner or later. As things became progressively worse, the hope for any liberation went down, and all hope died as the girl in the red dress was being carried to be burned. Schindler notices this, and he then takes the initiative to change the situation by hiring Jews as ammunition factory workers. Also, her death can be viewed as the most angelic and innocent child suffering the wrath of the co ncentration camps. I also liked how Schindler changes during the movie. He starts out as a Nazi party member, who enjoyed partying and spending time with women. As he witnesses the horrible things being done to the Jews, he realizes that he needs to make some efforts to save at least some of the Jews. Since he had already developed a relationship with many of his employees (the Jews), Schindler was able to feel the harshness much more than any other German. I admire his skills and determination that help him do what he needs to do to get the job done. Even if it included bribes, Schindler was bent upon keeping the Jews from being ...
Wednesday, November 6, 2019
Has Television had a Detrimental Effect on Your Generation, essays
Has Television had a Detrimental Effect on Your Generation, essays There are some things in life that you cannot live without; for example, air, food, shelter and clothing are the ones that may first come to your mind. But have you ever thought that some goods may have become your necessarily without you even realizing it. One of these kinds of good that comes to my mind is Television. The first thing I do when I go home is to turn on the television. For children and teenagers watching television may be one of their best entertainments. From children watching à ¡Sesame Streetà ¡ to teenagers watching à ¡Friendsà ¡. Statistics show that American children and adolescents spend 22-28 hours per week viewing television more than any other activities (except sleeping). I think that television have a detrimental effect on my generation. For children they are young and innocent they will learn everything in school, from their parents and on whatever they see the most, which is television. They may not see any violence in school or from their parents but there is a big chance that they will see violence in television. When children have finished their homework their parents may let them watch television as entertainment. As they turn on the television, they may come across many programs that may contain violent scenes. For the first time they see violence on television, they may be scared or even think that it is cruel, the second time they see violence they may not be as frighten since they have seen it before and so on. Until one day the child may not feel anything at all when they see violence on television. Another way television shows can influence children is when they see that violence can be used to solve problems. Children who view shows in which violence is very realistic frequently repeated or un punished are more likely to imitate what they see. Television has even more influence on teenagers. As teenagers enter high school they make new friends and they learn new ...
Monday, November 4, 2019
Starbucks Assignment Example | Topics and Well Written Essays - 1000 words - 1
Starbucks - Assignment Example The economic forces determine how the entire economy affects the business strategy in terms of market rates, globalization, interest rates, taxation, inflation rate, and the economic growth. In the case of changes in the Starbuckââ¬â¢s marketing strategy The technological forces determine how technology advancements that may include automation and technological advancements affect the business, production, and decision-making. In the case of changes in the Starbuckââ¬â¢s marketing strategy The elements of marketing mix include price, product, promotion, and place. Price relates to the idea that the product sells at a price, which is competitive and profitable. In the Starbuckââ¬â¢s marketing mix includes a pricing strategy that relates price with location. Actually, USA and UK absorb the highest prices for Starbucks products and other location buy coffee at convenient prices. For example, the breakfast sandwich costs between $3.99 and $5.99 depending on location. This enables the company to make profits as well as remain competitive in the market. Furthermore, product defines the suitability of the physical attributes of the product, their uniqueness, their benefits, and functioning. Starbuckââ¬â¢s has a reputation of producing fine products and offering satisfying customer service in all its outlets like the made-to-order gourmet sandwiches. Indeed, Starbucksââ¬â¢ breakfast sandwiches are of much higher quality than those of its competitors. On the other han d, place defines the availability of the product to the customers at the right place and at the right time. Ideally, there are about 9,000 cafes in almost 40 countries in the world, which avails Starbucksââ¬â¢s products to its customers at the right place and at the right time. Additionally, Starbucksââ¬â¢ tests its products in multiple locations before distributing them. Finally, promotion refers the mode of communicating the features and benefits of a product to
Friday, November 1, 2019
Case study on Performance Management and Rewards Essay
Case study on Performance Management and Rewards - Essay Example There are certain key issues which need consideration, and in this case, the type of issues varies considerably with regards to the different type of organizations operating in the same sector. FSC faces an employee turnover rate of 16%, which is roughly equal to the general turnover rate in the industry, this portrays room for improvement, and if the human resource management is properly handled, this rate could be reduced, like BSFC. A major issue for FSC is employee recruitment procedure, it focuses more on external recruitment which has significant consequences attached to it, though new and fresh minds entering the organization would mean more ideas, it would also simultaneously have negative impact on the existing workforce, who have been in the business for long and shown their loyalty, while at the same time, an outsider would be recruited from outside to fill a higher vacant position. With regards to BSFC, employee turnover is not a major issue since it is relatively lower than the industry level, and hence depicts their competitive strength in attracting employees, in addition they recruit workers internally, which proposes greater promotional opportunities for ex isting employees, however they should focus on retaining employees who enter the business anew, and the reward system should also take into account their preferences to ensure that they remain loyal to the firm. The discrimination at the effect in BSFC would have a negative impact on the lower levels, where the women and foreign nationals mostly clustered, leaving no promotional room for them, it should hence develop a more cultural diversity conducive approach, instead of the white male dominance in the organization.
Subscribe to:
Posts (Atom)