Monday, September 30, 2019

Siemens: Motivation and Employees

SIEMENS: 1. Identify four benefits to Siemens of its in-depth training and development of workers. Ans. Training refers to increasing the knowledge, skills and attitude of employees or extending those the employees already have. Siemens as the top three electrical and electronic companies has been running various effective training programs for their employees in order to build a strong work force and thus contribute better services to the society.In order to do that, they are providing their employees with both on the job (shadowing, mentoring, coaching, job rotation) and off the job (courses, presentations, qualifications) training sessions. Along with the training, company is also providing different development programs to make their employees more flexible, adaptable to change, more creative and innovative. All these training and development programs have brought outstanding benefits to the company.Four of the main benefits of these are discussed below: * Raising productivity an d profit: The main objective of doing any business is to make profit increasing productivity. Siemens also has the same motive and for that it is continuously looking for improved training programs to build a more competent, efficient and a highly motivated team of employees. As the training is motivating the employees highly, they are more dedicated to work for Siemens which in turn gives the company a huge production and profit every year. Improving services and customer satisfaction: The employees of Siemens are always working for providing better service to their customers. They are highly motivated and confident enough to serve the customers with servicing them on time, keeping their clients informed and by doing what they are promising to do. These types of service are making the customers happy and satisfied to stay with Siemens. * Being more able to respond to competition: A well trained employees with good key skills, especially communication and team working skills has giv en the company a competent and efficient work force.So, this era of huge competition, they have achieved to be the top three electrical companies of the world and is currently competing with all their small and large competitors successfully. * Able to gain long-term employee commitment: Costs of recruiting staffs are high but retaining good staffs are far more difficult. Through different training and development programs like- Apprenticeship, Siemens Commercial Academy, Siemens Graduate Programs, the company is training to build a group of good staffs, they are making them more qualified, more dedicated and motivated towards the organization.It makes the employees stay with the company for longer periods which reduces the cost of recruitment resulting in cost savings. 2. Explain how an appraisal system can help to motivate employees. Ans. To measure the effectiveness of its training and development, unlike other renowned organizations Siemens is also using an appraisal system, kno wn as Performance management process. Well-designed and well-executed performance appraisals have a strong motivational impact. Appraisals have the power to motivate employees because they provide a number of interconnected benefits.A well planned appraisal method can thus motivate an organization’s employees to find out the best from them. A well planned appraisal method tends to cover up the following issues which can help the employees to be well motivated: * Demonstrates the need for improvement: If employees don’t have a clear understanding of how they’ve been performing, they can’t be motivated to make any improvements. So, an appraisal system works as a standard to motivate people by pointing out the deficiencies on them. * Employees build a sense of personal value.When managers take the time and effort to carefully review, analyze, document, and discuss performance with employees, the underlying message to the employees is that they’re impo rtant and valuable, and this alone is quite rewarding, whether the feedback is positive or not. * Turn the employees around: When employees are performing poorly, performance appraisals can provide the wakeup call that they need to get refocused and reenergized. With performance appraisal, however, the purpose of the session is not strictly disciplinary, so the employee is more likely to walk in with a more receptive and open mind. Pay reviews: In some instances, appraisals are related to pay reviews. In these cases, if the employees pay rises due to their good performance, they will feel motivated. * Increases satisfaction. When performance appraisals meet the employees’ needs in such areas as gaining recognition, sensing achievement and competence, experiencing growth, and meeting objectives, they’re also contributing to the employees’ job satisfaction, and this is one of the most important elements at work today. When employees are satisfied, some of the most visible indicators are reduced turnover, absenteeism, and tardiness. Meets higher-level psychological needs: Recognition is one of the most powerful forms of motivation for large numbers of employees. Although, there are numerous possible sources of recognition on the job, performance appraisals are an opportunity for employees to receive formal, significant, and enduring recognition from their manager. * Proper feedback: Providing the employees with proper feedback may give them the motive to try hard to overcome their deficiencies and retaining the positive attitudes on them. 3.Using your understanding of the work of Herzberg, which motivators can you see in action at Siemens? Ans. From the Herzberg’s motivation-hygiene theory, we came to know that, an individual’s relation to his or her work is a basic one and that his or her attitude toward work can very well determine the individual’s success or failure. There are both intrinsic and extrinsic factors which results in employee’s satisfaction or no satisfaction. From the intrinsic factors the following can be seen as present in Siemens: * Responsibility: All Siemens graduates are treated as individuals and responsible.The working environment of Siemens says that it requires high skills, knowledge and working ability in their employees. So, the organization works by making their employees responsible towards their work. * Advancement: For the advancement and career development of the employees, Siemens has come up with Apprenticeship training, Commercial academy and Graduate programs. They are also provided with further qualification if necessary. These types of opportunities make the employees feel that they are advancing with their career and the company values them. * Recognition: Siemens recognizes their employee’s efforts and hard work.Those who come up with outstanding performance are treated with rewards and appraisal. * Growth: Siemens looks forward to growth of th e employees as well as the organization. In the case Paul Thomson says that, his training effort helped him to grow in the organization. There are some external factors that is also working as a motivating factors: * Supervision: Employees in Siemens are closely supervised and given feedback on their works. This sense of appraisal system and supervision motivates the employees to maintain a long term relation with the organization. *Relationship with peers: In the case, Gavin Leslie says that, He feels good to share things with his colleagues and there is a good relationship that occurs in the organization. They feel more socially belonging to their co-workers. * Working condition: There remains a happy, friendly environment in the organization and thus the employees make sure that their customers are staying happy. They feel good that Siemens is treating them as they want their customers to be treated like. Combinedly, all these motivating factors are helping the employees meeting up their needs as well as the company to retain their best employees for long term. . Analyze how Siemens uses training and development to ensure growth in its business. Ans. Training and development helps the growth of a business. Siemens has a clear focus on well-motivated and trained work force as it is an asset for any types of organization. They are providing different training and development programs which are making the employees more skilled to remain competitive. These well-trained employees help to retain customers as they enjoy services from them. This contributes to customer loyalty and repeat business.Thus, Siemens is treating their employees just as they want their customer to be treated which in turn is giving Siemens a huge business growth and good will. So, we can see, ensuring growth of any business lies upon its employee satisfaction and customer satisfaction which Siemens is successfully maintaining. Various training and development programs Helps to build more skilled, motivated and competitive work force Repeat transaction increases production and helps to grow business Loyal customers make repeat transaction Motivated employees tend to provide better customer service and retain customers

Sunday, September 29, 2019

Busang – a River of Gold

Challenges for Bre-X Minerals in Indonesia Bre-X Minerals Ltd. faced numerous challenges in 1996, largest among them being the potential loss of the majority stake in property that could yield upwards of 100 million ounces of gold. The Indonesian government was threatening to redistribute ownership of Busang, the mining region in which Bre-X had property rights, due to its fear that Bre-X was a short-term player not serious about extracting the gold or a long term commitment in Indonesia. These fears were justified given Bre-X’s small size (it had a net loss of $Cdn. 66,677 in 1995 compared to a net income of $Cdn. 218 million from Barrick Gold Corp. , a potential government-corporate partner) and limited connections within the country (established only in 1993 by exploring in the East Kalimantan rainforest). Another critical challenge faced by Bre-X was the public outcry over a foreign firm taking advantage of Indonesia’s wealth of natural resources. This mineral explo itation resulted in cries for public action to seize the land and deny Bre-X any compensation. Prominent public figures Dr. Amin Rais and Mr. Hartojo Wignjowinoto were most vocal in these demands. This is a classic example of the risk an unprepared company takes on when operating in a country that is transitioning both politically and economically. Over the first half of 1996, analysts predicted increasing success at Busang and as a result, Bre-X’s stock value rose. Indonesia, however, is a mixed economy where the government uses public action to manipulate and influence the private sector with ease. Bre-X’s failure to collaborate with an influential local company from the beginning of its venture led it to the current crisis. The company’s developmental and operational stagnation resulted in increased pressure from the world’s largest mining firms, Barrick included, and the Indonesian government. The Sudjana Proposal: Bre-X Minerals & Barrick Gold Due to the corruption and public action of the Indonesian government and the potential for continued bureaucratic challenges to extracting the gold, Bre-X should accept Minister Sudjana’s proposal to partner with Barrick. The Indonesian government has shown, through its interactions with Bre-X, that it is easily influenced by the demands of President Suharto’s family and by pressures from respected individuals. For example, the Barrick proposal received endorsement from the government only after Barrick hired Suharto’s daughter (Tutut) and encouragement from former U. S. President George Bush and former Canadian Prime Minister Brian Mulroney. Despite making an alliance with PT Panutan Duta in late October, Bre-X was late in recognizing the importance of relationship building in conducting business in Indonesia. With only eight days to negotiate the deal with Barrick, Bre-X does not have time to develop the necessary connections to succeed in Indonesia without a competent partner. Strong property rights are an essential component in any successful market economy. Although Indonesia has regulations regarding mineral exploration and extraction, the government has found ways to manipulate the regulations to best serve its interests. Making it through the various stages of mining approval requires complex paperwork and numerous negotiations with various government offices. Bre-X had navigated this system and received a Contract of Work (CoW) to mine the Southeast Zone. However, after Kuntoro Mangkusubroto declined to revoke Bre-X’s CoW, Sudjana had transferred the processing of CoWs out of Mangkusubroto’s office. This move suggested that Sudjana could manipulate the regulatory structure to revoke Bre-X’s CoW and make it much more difficult for the company to continue exploration or begin mining. Rejecting the Barrick deal proposed by Sudjana would expose Bre-X to future challenges that may prevent them from ever capitalizing on its Busang II claim. However in accepting the Barrick deal, Bre-X stands to lose a large portion of their claim to the future profits from Busang. Bre-X has made large investments to purchase and explore the properties in Borneo and needs to make sufficient earnings to recoup its costs and satisfy its investors. Therefore, Bre-X should use the eight days that they have to reach an agreement with Barrick in which they receive a greater than 22. 5% stake in Busang. Beyond Barrick: Other Roads to Busang One alternative Bre-X could pursue is a different joint venture with either Placer Dome or Tech Corps, which would align Bre-X with a large enough company to develop and operate in Busang. At the same time, Bre-X needs to cultivate their existing relationship with Suharto’s son to give the company an inside track in navigating the corrupt regime. This alternative is attractive for all parties involved because it increases investor confidence and Bre-X’s stake in Busang, allows Placer Dome or Tech Corps to get involved in the project, and increases the government’s claim through Suharto’s inner circle. Another alternative for Bre-X would be a total buy-out by Barrick. This option would result in a substantial capital inflow for the company to pursue its core business model; exploration and partnership. Throughout the company’s history, Walsh has constantly had to seek out investment from a number of sources to successfully operate his business due to its small size. The operations thus far in Busang have been reminiscent of the Australian speculators in the 1980s, and the Indonesian people are again faced with a situation where estimates of total gold reserves are skyrocketing, while little infrastructure development or mining activity has taken place. The national sentiment towards Bre-X and its inability to carry out mining operations on its own, makes a buy-out proposal an attractive alternative whereby Bre-X can pursue new exploration in a friendlier environment.

Friday, September 27, 2019

What user's want from mobile location-based advertising services Literature review

What user's want from mobile location-based advertising services - Literature review Example It is important for businesses to identify a customer in close proximity to their premises, hence offering them incentives that enable them to identify the selected shops. Tsai et al. (2009) concur with the fact that location awareness brings an interesting aspect to customers since the majority of their purchase decisions are usually made within stores. The finding is in line with the idea that location-based adverts address consumers at the point of purchase decisions while at the same time holding potential results for entrepreneurs. Moreover, there are possibilities of integrating personalised offers and advertisements within the applications (Mobile Marketing Association, 2011). However, this study reviews numerous studies and models that focus on detailed variables influencing consumers’ intention towards mobile location-based advertising services. According to Ickin et al., (2012) the introduction of smart phones with GPS receivers has made marketers to be vigilant on the use of technology. In this case, marketers utilise locations to target customers sending them messages on company location alongside products and services offered. Improvement in technology drives the capabilities of Location Based Advertising granting marketers opportunity of creating clever techniques of selling their brands to customers. However, consumers are trying to gain composure on the idea that advertisers are able to locate them, implementation of such services as Foursquare focuses on delivering large consumer base for band advertisers. On the other, hand Wac et al. (2011) assert that some of the new technology initiatives, business models alongside willingness of consumers to accept the technology make mobile location one of the important elements of marketing. The failure associated with many location initiatives results from most marketers ign oring the actual consumer wants. One of the most important considerations is ensuring that services utilizing

Quantitative vs. Qualitative research Essay Example | Topics and Well Written Essays - 500 words

Quantitative vs. Qualitative research - Essay Example of the measures of concepts, then the research respondents are selected, the next step is issuing research instruments and data collection, what follows is data processing and analysis, after this process finding are drawn and conclusions made. The main steps involved in qualitative research are: setting the overall research questions, then selecting necessary subjects and sites, then relevant data ought to be collected, then interpretation follows, then theoretical and conceptual work follows, the last step is writing up conclusions and findings. In quantitative research, the quality issues involved are issues such as reliability, this deal with the measure of stability and consistency. Replication seeks to find out whether the study is repeatable. Validity seeks to establish whether what is measured is the one intended or if the conclusions are well founded. In qualitative research, quality issues are trustworthiness that entails credibility of the findings, transferability in terms of the applicability of the findings to other contexts; dependability is whether the findings apply at other times. Conformability is whether the investigator’s values have intruded to a high degree. Relevance is the importance of a topic in the field of study and the contribution made by the literature in that field. Quantitative research has major preoccupations such as measurement and reliability validity, causality which entails explanation on reason as to why things are the way they are and the direction taken by the causal influence, that is, dependent and independent variables. Another of these preoccupations is generalization which covers the question on the scope of the context, sample and population, as well as the extent to which the samples are representative. Replication is a value that seeks to reduce contamination of results by researcher values or biases, thorough procedure descriptions, and ability to duplicate in varying context. In qualitative research, the

Thursday, September 26, 2019

Differing perceptions of new venture failure Essay

Differing perceptions of new venture failure - Essay Example note that the introduction of the venture capitalist brings in new dimensions in the survival of new ventures since within the first 7 years of establishment; only 18 percent of the new ventures fail as compared to 75 percent of non VC funded new ventures. The authors note that research on the factors that cause failures of new ventures is limited due to factors such as difficulty in conducting financial analysis on failed ventures and the reluctance of entrepreneurs to discuss their venture failures. The authors also discuss the factors leading to new venture failures in the perspective of the venture capitalists and the entrepreneurs. Venture capitalists cite factors such as poor management and unfavourable market conditions while the entrepreneurs cite factors such as product factors, financial limitations and managerial problems. All these are discussed in relation to the attribution theory. The argument that the ventures examined represented all the new ventures and that the factors leading to failure as ranked in order of importance by the authors is misleading due to the fact that new ventures and entrepreneurs from other locations may be faced with other factors of failure. It is therefore important to note that applying the results of the study should be done with that fact in mind. The factors may depend on the location and may also be time determined as well as depend on the individual characteristics. An alternative conclusion could therefore be that the success of the new venture will depend on the internal characteristics of the venture. Zacharkis, Andrew Meyer, Dale G. and DeCastro, J. â€Å"Differing perceptions of new venture failure: A matched exploratory study of venture capitalists and entrepreneurs.† Journal of Small Business Management 7.1 (1999):

Wednesday, September 25, 2019

Visual Arts Project Essay Example | Topics and Well Written Essays - 750 words

Visual Arts Project - Essay Example She was portrayed with her face in profile as she studied her hands, which were covered by the folds of the skirt of her white Victorian styled gown. I wondered if she might have had a quarrel with her lover. Above her head, to the right, was a golden mellow rose that made me think this even more. It created in me a mood of sadness, making me recall my own experiences with lost love. As I became more affected by the painting, I wanted to know more about its creator! While studying the life of Hassam, I learned that the piece is considered one of his best works of art and that he had chosen as an alternate title to the piece, Beethoven's "Appassionato" sonata. (2) It appeared to me that, like Beethoven, he must have had feelings of great passion to be able to create the mood of The Sonata. For me, the subtleness of that passion was further emphasized by Hassam's use of a blend of colors to create a golden gilded hue. The painting is highlighted by this color blend in the colors of the rose, the woman's hair, and in other spots throughout the painting. In contrast to this is the pure whiteness of the Victorian styled gown that the woman wears. Hassam also called attention to the subtle meaning of the painting with the use of indirect line. Using and almost S-shape to emphasis the focal point of the painting-the woman, he draws the eyes of the beholder of the painting, from the rose into the woman's face and down to her hands. The artist was from New England and learned the techniques of the impressionists while studying in Paris. While he, later, became more involved in modernistic landscapes and patriotic scenes of America, the influence of the impressionists never escaped his work. The painting is considered one of Hassams's best works. Like the first artists of impressionism, Hassam has captured natural light and luminosity in the painting with the use of numberless short choppy strokes of paint. Unlike Claude Monet, the father of impressionism, and his early followers, Hassam's Sonata is too academic to be defined strictly as an impressionist work. Instead, the artist has defined his subject and the meaning of the painting as delicately as did the Flemish painters with their strict adherence to detail. The great exception to their rules would be the flatness of The Sonata as compared to the depth to be found in their paintings. A painting such as the Sonata draws one into an imaginary space, while a sculpture calls its viewer to experience it physically. The atmospheric perspective techniques used to create depth in a paintings or not available to sculptures. In paintings, something is added, with sculptures, something is subtracted. Sculptures are devoid of the softness that many paintings possess. While requiring the same talents and skills as that of painters to effect greatness in their creations, sculptures are limited in their abilities to tease our imagination. The use of colors and values is also less, because of this, paintings are more complex. The Sonata is a good example of this, like the Mona Lisa, she invites us, not only to wonder, but also to participate in her mystery. References Frederick Childe Hassam (1859-1935), 1893, oil on canvas, 32 x 32, Bequest of Mr. and Mrs. Joseph S. Atha, Collection of the Nelson-Atkins Museum. The Nelson Gallery Foundation, d.b.a. The Nelson-Atkins M

Tuesday, September 24, 2019

Sexual Abuse Article Example | Topics and Well Written Essays - 1000 words

Sexual Abuse - Article Example There are many signs that can point towards a child being sexually abused. A common sign is when a child has a difficult time walking. In addition, the child might refuse to socialize or engage in any physical activity. Furthermore, if the child experiences nightmares and experiences a rapid decrease in appetite. All these factors are well indicators that the child is or is continuing to experience traumatic sexual abuse. One of the most shocking aspects of sexual abuse is that they have been a commonality in religious atmosphere. This startling reality can be seen in the Vatican Church, which has been criticized for covering up the issue. Unfortunately, many priests have been not only accused but have engaged in sexual abuse, which is damaging to the Church, society, and alarms parents. The Vatican Church is shocked at this fact and has started an investigation that will hold the priests accountable for their shameful act. Reverend Federico Lombardi, the head spokesman of the Church, firmly states the Church will approach the issue with â€Å"rigor and transparency.† However, these assurances have not been adequate as more victims are getting the courage to speak out against the priests. The Church must hold the priests responsible for these heinous acts, but the rules do not implement any of the â€Å"lip service† that Reverend insisted on. For example, the rules of the Church lack st ature, as they do not make it obligatory for these crimes to be reported to officials even though the local law is clear and concise. Catholics globally are shocked at the fact that women are included in the list of grave acts. In addition, they were intrigued that the church believed pedophiles were the same as those who left the church or were heretics. Yet that was not the case as many priests accused, were still part of the church. This frustration of Catholics can be perfectly illustrated in this statement as Chritian Weisnar, one of the key members states, â€Å"It

Monday, September 23, 2019

Does Online Communication Compromise the Rights of an Individual When Essay

Does Online Communication Compromise the Rights of an Individual When Information is "Anonymous" - Essay Example The effect of anonymous online communication on the rights of individuals still remains a hotly debated topic in the coming years. Different scholars have divergent views with regards to the issue. Neil Swidey on one hand believes that it compromises the rights of the individual because many people post abusive and vitriolic stuff that are often eliminated by the site moderators (Akrivopoulou and Garipidis, 148). He argues that anonymous posters may sometimes become offensive thereby calling into question the nature as well as the value of online communication. Ian Lloyd, on the other hand, maintains that anonymous online communication does not compromise the rights of the individuals. He argues that there is a legal approach that protects anonymity and privacy. Even though the legal approach that is directed online communications tries to safeguard personal rights, people may often have bad intentions; therefore, life in this digital age may be subject to breaches of trust (Akrivopoulou and Garipidis, 148). However, it is worth noting that the use of anonymous online communication is unstoppable because its benefits do outweigh any limitations they bring. The government and the media should be involved in identifying how to harness the potential of anonymous online communication to inform the general public better by making sure that the good intentions do not often backfire. According to me, I tend to think that anonymous online communication is not capable of compromising the rights of the individuals in case it is used correctly because it has more good than harm. First, anonymous online communication actually protects the rights of individuals. It has greatly helped investigative journalists who frequently use it when investigating new stories. Such people have been able to gather information that they wouldn’t have reached had they used direct

Sunday, September 22, 2019

Telecommuting Essay Example for Free

Telecommuting Essay Telecommuting or telework allows employees of a company to work from home or any other remote location other than an office. Telecommuting requires employees to be able to access all of the computer applications they have available to them at work in order to perform their jobs adequately. The company should provide Internet access to employees at their homes and make sure they have the appropriate equipment to run and access company provided software. While some experts argue telecommuting is more cost-efficient, may increase productivity and create a better work/life balance, others say the cost of decreased face time co-workers, effect it has on workers left at the office, and its failure to live up to some of its expectations could make it a less attractive option. By implementing telecommuting, a company has the possibility to save significantly. Because of telework, employees will be able to work from remote locations and will not have a need to come into the office. This will eliminate the need for a physical location for most employees, which will result in a large savings per month. Each employee can use their computer at home or be provided one by the company. By implementing telecommuting, it would prevent the need to expand physical locations in the future. Savings would also increase based on the lack of utility bills associated with the physical location, cancelling T1 lines, and landline phones. Each employee can communicate with each other and customers via their company cell phone, which usually is already provided to them or their home landline phone if they wish. The company will then be responsible for their Internet connection in the form of a reimbursement. The figure above outlines the total costs of each arrangement. It is clear that telecommuting has the potential to save a company more money almost immediately after implementation. This is true only if every person in the company telecommutes. As some companies telecommuting policies say, the employee who telecommutes must report to a centralized workplace for a portion of time each week. If this is true, telecommuting is not as cost efficient as it seems. Transportation costs are also drastically reduced for employees. Because they would no longer need to commute to the office everyday, costs associated with a daily commute would be drastically reduced. This would also save money for the company. The federal government offers tax incentives to companies who make efforts to reduce their carbon footprint. By implementing telecommuting, any company would be eligible for the tax incentives the very next year. In a study conducted at the Kentucky American Water Company, performed from 1998-2003, it was concluded that a significant savings could be made per employee (Butler, Aasheim, Williams, 2007). The article points out that for the Kentucky American Water Company, â€Å"savings include reduced expenses for office space and parking, and a reduction in complaints handled by the managers. † In a chart produced in the study, it compares the costs and savings of implementing the telecommuting process in the call center portion of the company. Their conclusion, on average, was telecommuting will save KAWC $1,361 per employee (p. 102). Research has shown that telework is related to higher job satisfaction and a variety of positive employee outcomes,† writes Karen Fonner for the Journal for Applied Communication Research (Fonner Roloff, 2010, p. 340). Telework helps employees manage their personal and work lives more effectively than working in an office setting. By releasing employees from the constraints of a physical office, they are empowered to create their own schedules to accomplish work more effectively. This empowerment enables employees to take ownership of their position and will otivate them to perform to the best of their abilities. With the ability of employees to create their own schedules around the clock, it will benefit companies by allowing the employee to have a flexible schedule to adapt to the demanding schedules of business in the new millennium. Another benefit of telecommuting is less absenteeism at work. If an employee has a doctor’s appointment, they can set their work schedule around the appointment and include it in their schedule around both personal and work appointments. If they were to report to a physical location and be forced to be stationary for a set amount of time in an office, the employee would be inclined to take the entire day off for the doctor’s appointment. With the flexibility of telework, the employee would not be inclined to call off and would still be able to work before and after the appointment. The same is true for employees who require creativity breaks in between sessions of working. The flexibility of telework enables more frequent breaks so that employees can use the time set aside for work to be most efficient. Telecommuting also takes employees out of the stressors of the office. Office politics plays a huge role in stress at work and is a huge distraction for employees. â€Å"By working remotely the majority of the time, teleworkers can avoid or ignore some of the unjust practices within the organization, such as cronyism, self-interested behavior, and pressure against speaking out against those in power,† writes Fonner (Fonner, 2010, p. 361). Without the politicking at work, employees who work from home can use their downtime for more productive personal task that don’t induce more stress on their job. In a survey conducted at the telcom company Ericsson in July of 2006, respondents were asked a series of questions related to telecommuting. Employees who were not currently telecommuting were asked what important factors would persuade them to telecommute in the future (Borjesson Markus, 2006, p. 526). The most rated saving time as the most influential reason to adapt telecommunication with increasing efficiency, reducing stress, and having more independence in their daily life as the top four reasons (Borjesson Markus, 2006). Ironically, reducing traveling costs had the smallest amount of supporters. Employees at Ericsson put more emphasis on empowerment as their main reason to choose telecommuting over monetary reasons. Plus, its an important tool for attracting a younger generation of employees who expect that flexibility and greater sense of control over their lives, says Danette Campbell, senior adviser for telework with the U. S. Patent and Trademark Office in Washington when speaking about telework in the article â€Å"Washington Tapping Into Telework For More Flexibility† (Silver, 2010, p. 0). Adding telecommuting as a workplace option will make any company a more attractive employer. The Kentucky American Water Company study proved telecommuters are more productive workers than their on-site employees (Butler, Aasheim, Williams, 2007, p. 101). The study measured productivity based on four factors, â€Å"amount of work; intensity of work; efficiency of work; and adjustments for additional costs associated with telecommuting (such as expenses for equipment, technology support, training, managerial support, and so forth)† (2007, p. 101). The study found, â€Å"the average productivity of telecommuters in the 13 months immediately after the â€Å"go live† period increased by 154%, while the average productivity of in-office agents fell by 13. 3%. Because overall customer service improved considerably (the percentage of abandoned calls decreased from 12. 2% to 3. 6%)† (p. 102). Understanding that all jobs at the KAWC call center can be performed using telecommunication, parallels can still be drawn from call center work and the type of work performed by most companies. The majority of daily work performed by most employees consists of communicating with clients and co-workers. All communication in most jobs does not rely on an employee being in a centralized workspace. By allowing employees to telecommute, they will be free to meet with customers and clients during any time of the day, thus allowing them to be more productive and available to them. Many clients and customers have problems meeting during a normal â€Å"9-to-5† workday because they are also at work. By implementing telecommuting, employees will be free to meet with them in the evening when they usually wouldn’t be at â€Å"work† if they worked in a centralized location or during business hours if they need to. Telecommuting also requires the use of technology to perform work from remote locations. â€Å"People who use more IT in their work are more productive, and by its very nature telecommuting requires more use of IT,† writes Ralph Westfall in his article â€Å"Does Telecommuting Really Improve Productivity? † (Westfall, 2004, p. 95). By implementing telecommuting at a company, they will be forced to update their technology and train people to use the new technology effectively. In doing this, employees will be forced to become more productive based on their new knowledge and the use of new technology. An argument against telecommuting is the lack of human interaction involved with the â€Å"Employees who worked away from their offices for three or more days a week reported worsening of their relationships with coworkers,† stated Pam Willenz for the American Psychological Association (Willenz, 2007). Employees may seem disenfranchised from their co-workers who report to an office, which has detrimental effects on employee morale to all employees. Telecommuting also could have detrimental effects on promotions for employees. The idea behind â€Å"out of sight, out of mind† plays a large role in the fear that employees who telecommute have less likely of a chance to get promoted from their current position because of their lack of face time with superiors. The lack of office politicking could be a double-edged sword where employees don’t have the chance to mingle with co-workers that could potentially advance their careers. Telecommuting had negative effects on the employees that are â€Å"left behind† in a centralized workplace. In-office employees took less satisfaction in their jobs and felt less of a relationship and obligation to their company as the number of telecommuting coworkers grew,† in a study that David Chartier reported in the article, â€Å"Study: Telecommuting makes work worse for non-telecommuters† (Chartier, 2009). Many of the workers that are left behind perceived that more work was left for them and are forced into other difficulties posed by telecommuting such as, building strong working relationships and finishing group work. Telecommuting is not appropriate for every job. There are still many jobs that cannot be performed through telecommuting. Contemporary Business states, â€Å"the cubicle- filled office will likely never become obsolete† (Boone, p. 22). Many jobs will never be able to completely translate over to a telecommuting environment so many workers will still have to report to a centralized workplace. Many face-to-face customer service jobs cannot be performed via telecommuting and many workers will still have to report to work therefore telecommuting is not an alternative to every job. Since telecommuting is so new, many employers are still experimenting with it and require that the employees who telecommute have to report to the office at least one day a week. Telecommuting is difficult to implement in situations where workers are paid on an hourly basis. The old adage, â€Å"Time worked equals time paid,† does not necessarily translate into the telecommuting environment very well. In hourly positions that can be transferred to telecommuting settings, clocking in and clocking out will be at the discretion of the worker with no oversight available. Employees who are compensated on an hourly basis would have to change their pay scale to a salaried position in order for telecommuting to be fair (Boone, 2010). If that is not the case, truant workers would be enabled by the lack of supervision and can â€Å"run the clock† more easily than if they reported to a centralized workspace (Boone, 2010). Telecommuting also puts company assets and information in an uncontrolled environment where it is difficult to keep track of how and for what they are used. It raises some questions where company information and assets could be compromised in a telecommuting situation. Many employees would easily be put in a situation where they could steal or copy customer information and use it outside of their work (Boone, 2010). Telecommuting is cost effective depending on how it is implemented and can save a company a lot of money only if every employee telecommutes in order to alleviate the need for a centralized workplace. Research supports these benefits of implementing telecommuting saying it will alleviate many stressors on employees by reducing time spent getting ready for work, commuting to an office on a daily basis, and office politics. There are negatives aspects, however, to telecommuting. It cannot be implemented for every job and there will still be a need for a centralized workspace so it may not be as profitable as expected. Telecommuting also puts company property and information inside someone else’s home. Truant workers are enabled to â€Å"run the clock† in a telecommuting setting since there is no oversight on when they are actually working. Telecommuting does have its strengths, but it also has weaknesses. The future will open up doors for telecommuting as technology improves and our culture becomes more technologically savvy. For now, telecommuting in most situations is a hybrid of some workdays reporting to work and others worked from home.

Saturday, September 21, 2019

Comaprison Theorist Essay Example for Free

Comaprison Theorist Essay Sigmund Freud’s approach to personality would be and still is a debate within our society today. Researchers and psychologist are still observing his approach and there are still unanswered questions. One approach Freud did not use was how our society and culture would effect the person we all would become. The one thing that most Neo-Freudian’s agreed on was that early childhood experiences would have an effect on your personality development. Freud laid the path for psychologist and many would take what they learned from him and go in their own direction. Alfred Adler was one Neo-Freudian that disagreed with Freud. Their disagreement was not only professional it became personal. Adler approach was called the individual psychology. He helped us understand personality with striving for superiority, how our parents were an influence on our personalities as children and the effect of our birth order. Adler like Freud believed that your earlier years were important when it came to shaping your personality when you became and adult. One thing Adler believed is that the parent’s role would affect the child. The first thing parents should not do is give the child too much attention. By stating this Adler meant pampering. He believed that pampering would take away children’s independence. They become more dependent on people, and they don’t learn how to make their own decisions. He believed that they should be able to make mistakes and make their own decisions, because this would be good for them and they would learn to be more dependent. Another mistake  parents make stated Adler was they would not give children enough attention, which would lead to neglect. If children don’t receive enough attention they would grow up to be distant, and would not know how to be intimate or carry on a relationship. Adler was the first psychologist to mention that the order in which you were born would shape your personality. Comparison of Theorists3 Carl Jung also would leave Freud and Freud would feel betrayed by that. He took him leaving personal as well. Jung was curious with religious concepts. He would take Freud’s idea of unconscious and put his own twist to it. We as people would inherit our physical characteristics, but Jung believed we inherited unconscious psychic characterics as well. After Jung left Freud he would travel around the world and study other cultures and this is were he would base his theory on. He relied a lot on ancient mythology and Eastern religion. Jung believed that the collective unconscious is made up by something called the primordial images. These images would help people respond to our society in a different way, there called archetypes. Basically Jung would describe the collective unconscious as the concept of instincts. He also believed that every man had a feminine side and female had a masculine side. He had three archetypes that he spoke on the anima which is the feminine side of the male, and the animus is the masculine side of female. Stating this, Jung was the first psychologist to point out people would have both male and female characteristics within themselves. Another archetype he had was called the shadow. The shadow was known as the dark side that people would possess. It does not actually mean that people are evil. The main thing that Jung is known for was his focus on introversive and extroversive types. An introvert was someone who focused more inwardly, this person was not the social type and focused more on themselves. An extravert focus just the opposite their focus was outward. Jung, like Freud would stay on the topic of human behavior. Karen Horney was a female psychologist who disagreed with how Freud viewed women. Freud stated that men and women were born with different personalities. (pg 111 n.d.). Horney would disagree with that, she thought  that our social and culture played a bigger role in our  Comparison of Theorists4  personality then biology. She studied a term called neurosis, which means neurotic. Horney’s definition of neurotic is that people are trapped in a self-defeating interpersonal style. The way people interact with others prevents them from developing the social contact they unconsciously crave. (pg 112 n.d.). This will lead to a defense mechanism to help with their feeling of anxiety. Freud would say neurosis was an unconscious battle between various aspects of personality. Horney would state that it would start off in your childhood. Horney had three styles neurotics would use to avoid anxiety experiences. They were called â€Å"moving away from people†, â€Å"moving toward people†, â€Å"moving against people.† Moving away from people, this is when children would learn to just tune people out. When in a hostile environment or situation, instead of engaging with the others they would just tune the person out. Basically ignore the situation. As adults they become sheltered. They would find jobs with little interactions and they would reframe from being in a relationship or intimate. These people would become emotionless and if attached to someone or something the feeling of emptiness while a child would all return. Moving toward people, these people become very dependent on others. They yearn for affection and strive to get accepted by their parents. This yearning would temporally relive them for any anxiety they are having, but in later years they would rely on this. As adults they would have more then usual need for love and affection. They don’t want to be lonely, and believe that any relationship they are in is a relationship. They are demanding affection and don’t know how to love, they are more clingy. Moving against people, these people would rather fight. They have the urge to have power while pushing around children. These individuals believe that being aggressive and mean you can get what you can in that form. You basically take control of the matter before anyone else does. One thing that Horney debated about was Freud theory on  Comparison of Theorists5  women. Freud stated women had â€Å"penis envy†, which is the desire that every girls as to be a boy†(pg 114 n.d.). Horney disagreed and stated that men envy us women and the ability we have to bear and nurse children, this was called the â€Å"womb envy†. Horney was not stating that men were not pleased with themselves but simply stating that we all have qualities that each other admirer. Horney did point out when Freud was making his theory on woman that he was living in a time where woman were treated the way they should have been, he was living in a era where the culture would have helped his influence on the decisions he made for women. Erick Erikson would use some of Freud ideas in his theory; he would add some of his own ideas. Freud believed that the ego was between id impulses and superego demand; however Erikson believed that the ego played a bigger part. Erikson believed that the ego played a powerful, independent part of personality. (pg 106 n.d.). It would help with your identity, and your need to over come the environment. Your ego is to help you get your sense of identity. The term identity crisis comes from Erikson. You would usually find this in adolescents; they seem to not know which way they are going in life. Freud ended his personality development around six years of age, as for Erikson he said it would continue throughout a person’s life. By saying this he gave us eight stages that start from when you are a baby until you’re at an old age. The first stage is basic trust versus mistrust this stage is during infancy years, newborns have no choice but to rely on everyone around them. Autonomy versus shame and doubt is during the toddler’s years, when children want to feel powerful and independent. At the toddler stage Adler stated parents should not pamper, as for Erikson he stated they should not be overprotective at this stage. Initiative versus guilty is early childhood, children learn how to organize and they will learn to set goals and kick down and challenges that come their way. Industry versus. Comparison of Theorists6  inferiority is elementary school age years, this when children soon find out  there is more competition out their in the world. Identity versus role confusion is adolescence years, when teenagers find out who they are and what they want in life. Intimacy versus isolation is young adulthood years, when you seek for the relationship you have always longed for. Generatively versus stagnation is adulthood years, when you want to guide the next generation because you feel as though you have not done everything you want in your life. Ego integrity versus despair is old age years, when you look at your past life and smile you know you have that sense of integrity, but if you don’t you know at this time, it’s too late because time is short now. These four Neo-Freudians have their own approach on personality psychology. When reading all of their perspectives, I would agree to disagree with most. I agreed with Erikson’s approach with the eight stages, Horney was believable because I am a woman and I could relate to where she was coming with her feminine psychology approach. Jung was the more vibrant one and he dug deep into different cultures, and I disagreed with Adler’s approach with the birth order, but would agree with his perspective on how parents pampered and neglected their children. So like there are still debates and intellectual conversations about personality psychology, I would have to debate as well, because there are so many different approaches you can lean towards when it comes to this topic. Comparison of Theorists7 References Burger, J. (2010). Personality. CengageLearning. Eighth edition

Friday, September 20, 2019

Harmful Effects of Mobile Phones on the Body

Harmful Effects of Mobile Phones on the Body MOBILE PHONE HARMNESS ON HUMAN BODY Abstract:- Mobile Phone usage has been rapidly spread globally and to provide proper coverage (signal strength), numbers of cell towers are also increasing worldwide generating a public concern as to whether frequent utilization of such devices is unsafe. Effects of Mobile Tower Radiations are seen in many countries. So, in this paper, we have discussed Mobile Tower Radiations Harmness on Human Health. Keywords: Mobile Tower Radiations, Electromagnetic Radiations, Signal Strength, Mobile Phone I. Introduction:- Forty years ago today, Motorola engineer martin cooper-credited as the inventor of the cell phone made the world’s first public cell from a mobile phone. In 1984, the U.S. federal communications commission approved Motorola’s Dyna Tac phone for public use. In 1993, Bellsouth and IBM announced their creation of the Simon personal Communicator phone, touched as the world’s first smart phone. In 2002, the first phones with built-in cameras became publicly available, including the Nokia 7650 and the Sanyo SPC-5300. In January 2007, Apple launched its first phone. The company into one handled devices, a mobile phone, an i-pod and a wireless communication device. II. Mobile Technology for increased Productivity and profitability:- The demand for access to business information and applications through mobile technologies such as the Apple i-phone and i-pad device running google Android and windows 7 mobile or using RIM BlackBerry. Mobile technology allows people to use company data and resources without being tied to a single location. Mobile IT Device can also change the way your company does business new technologies lead to new way of working and new products and services that can be offered to your customers. They can make your team more efficient, more creative and more valuable to your clients. Mobile Technology can be used to increase their productivity and lead to increased profitability. Below are some of the key areas in which mobile technology can be useful. Networking/ communication Development Marketing Mobile ticketing Mobile vouchers and coupons and loyalty cards Content purchase and delivery Location based services Information services Mobile Banking Mobile or cellular phones are now an integral part of modern telecommunications. In many countries, over half the population use mobile phones and the market is growing rapidly. At the end of 2009, there were an estimated 4.6 billion subscriptions globally. In some parts of the world, mobile phones are the most reliable or the only phones available. Mobile phones communicate by transmitting radio waves through a network of fixed antennas called base stations. Radiofrequency waves are electromagnetic fields, and unlike ionizing radiation such as X-rays or gamma rays, can neither break chemical bonds nor cause ionization in the human body. Cell phones and cell phone towers send signals using radio frequency (RF) energy, or radiation, just like radio, television, pagers and other wireless communication devices. Many people have asked whether the RF energy from cell phones and cell phone towers is safe. III. Radio Frequency Energy: RF energy is another name for radio waves. Probably the most important use for RF energy is for communication services. Radio and TV broadcasting, cell phones, pagers, cordless phones, and satellite communications are just a few of the many communication uses of RF radiation.A microwave oven is an example of a non-communication use of RF radiation. Radio frequency energy is a form of electromagnetic radiation. Electromagnetic radiation can be categorized into two types: ionizing (e.g., x-rays, radon, and cosmic rays) and non-ionizing (e.g. radio frequency and extremely low-frequency or power frequency). The potential health effects of non-ionizing radiation from radar, microwave ovens, and other sources, there is currently no consistent evidence that non-ionizing radiation increases cancer risk. Exposure to ionizing radiation, such as from radiation therapy, is known to increase the risk of Cancer. IV. Effects of radiation energy of mobile phones on human health: Thermal effects:- One well-understood effect of microwave radiation is dielectric heating, in which any dielectric material (such as living tissue) is heated by rotations of polar molecules induced by the electromagnetic field. In the case of a person using a cell phone, most of the heating effect will occur at the surface of the head, causing its temperature to increase by a fraction of a degree. In this case, the level of temperature increase is an order of magnitude less than that obtained during the exposure of the head to direct sunlight. The brains blood circulation is capable of disposing of excess heat by increasing local blood flow. Non-Thermal effects:- An effect which can only be explained in terms of mechanisms other than increased molecular motion (i.e. heating), or occurs at absorbed power levels so low, that a thermal mechanism seems unlikely, or displays so unexpected a dependence upon some experimental variable that it is difficult to see how heating could be the cause. Cancer: Studies on cancer in relation to mobile telephony have focused on intracranial tumors because deposition of energy from RF fields from a mobile phone is mainly within a small area of the skull near the handset. When whole body exposure is considered, as in some occupational and environmental studies, also other forms of cancer have been investigated. V. Do mobile phones harm brain tissues and cause cancer? There is an argument that mobile phone causes change in the structure of chemicals of cells. Also, they are accused of causing cancer. The radiation from the mobile phones has been villainized by those who warn that the excess usage of mobile phones can damage brain cells. The heat produced by the radiation from mobile phones has been found to change the chemical structure of chemicals synthesized in small organisms like worms. But many scientists are of opinion that the radiation cannot be harmful to human tissues. A recent report says that so far there is no evidence of any adverse effect by mobile phone radiations, but they added that new researches have to be conducted. Recently, I have observed some serious effects ofmobile phone radiationon brain. In brain, hippocampus is understood to be responsible for learning and memory. In order to confirm this, we have carried out investigations on the whole brain, hippocampus, and remaining brain. This was undertaken to determine the possible site of the electromagnetic field (EMF) bio-interaction. We have concluded that these radiations may damage our nervous system, especially memory. This has been done by protein kinase C activity and DNA strand break, which has been affected by mobile phone radiations. Anyway it is better to prevent kids fromusing mobile phonesexcessively because their brain tissues are more vulnerable to chemical changes and cancer if exposed to radiation. When you try to call someone through mobile phone, do not put your mobile closer to your ears until the recipient answers. Because directly after dialing the mobile phone, it would use its maximum signaling power, which is 2 watts which is equal to 33 dbi. Please be careful. Message as received (Save your brain. Please use your left ear while using cell (mobile), because if you use the right one, it will affect the brain directly. This is a true fact from many researches performed by the medical teams around the world. VI. Advantages and Disadvantages of Mobile Phone Effect: As time passes by technology are growing faster and move faster. The most important and common part of technology in our life is mobile phone technology. We bring mobile phone with us in everywhere that we go and use it on a daily basis. It is being the part and parcel of our daily life. Mobil phone have been around for quite some time, but as time goes on, mobile phones continuous to gain many features. A mobile phone started out as simple device that had only numbers, and most people used them for emergencies only. Nowadays, cell phones have many features such as phone calls, text messaging, taking pictures accessing the web, using calculator etc as many accessories. People become addicted in cell phone because they are getting many facilities by using it. For example whenever they go outside they can take the phone with them because of its size, networking range, a full charge battery, essay connection etc. There is no doubt about the benefits of mobile phones. Mobile phones have so many advantages but there have some disadvantages too. It has become a vital element for every person but nowadays it has also becoming an addiction to the young generation. If we talking about Bangladesh, nine out of ten young people in the town area, have own a mobile phone. They use it in various purposes. Their attraction of mobile phone is increasing day by day. Medical science says that the radiation of mobile phone is too bad for human health. In 1995 mobile phone has introduced to Bangladeshi people. The first mobile service provider company was City cell. Then Grameenphone, Aktel, Banglalink, Teletalk, and Warid which is being named as Airtel an Indian telecom company who has also started their business in Bangladesh. In the arena of communication mobile has becoming the latest fashion and also the most essential means of communication. These mobile phones let us enjoy all the comforts within a single device. VII. A few tips on how to avoid radiation from cell phones: At your workplace or office, there should be strict screening of calls. Use voicemail regularly when working on something from which you do not want to be disturbed. When responding back, it helps to collect the thoughts and speak just how much is required. People who attend a lot of teleconferences should use a wireless headphone cum mike. It is easier than the headset on the ears which one has to keep pressed to the ear, especially since the meetings may go on for hours. At home, turn on the loudspeaker, so there is not much of a problem for the ears and brain. While traveling, use earphones. Keep mobile phones a few feet away from your body while sleeping. Do not talk for too long on your cell phone. Short calls will avoid unwanted radiation and also you will save money on calls. VIII. Result:- Analyses shows that mobile radiations effect human brain and GSM operated mobile phones has the higher effect on brain activity as compared to CDMA operated mobile phones. Globalization is the new mantra. In this age, it is very difficult not to have technology. But as shown in this study, with every technology invented to facilitate human beings, there come certain hazards. Electromagnetic radiation is everywhere. More and more wireless communication services are expected, so is the artificial electromagnetic radiation. It seems that there is no way to reverse this trend. Scientists and engineers must develop better and safer wireless systems and devices. Smaller cell size, better base station antennas and other more advanced technologies will allow future cell phones to radiate much lower power and make technology a real boon. Conclusion: The use of cell phone is increasing tremendously day-by-day but most of the people (who use cellular phone) have no knowledge how the cell phones impact on human health. It is almost clear from the research that the radiation from cell phone is responsible for many diseases like brain tumor, headaches, short-term memory loss, different types of heart diseases etc. In the presence of various RF sources, including cell phone handsets and broadcast antennas which contribute the overall environmental exposure has become a great concern about safety of this new technology and as well as human health. However we should contribute more efforts to transform mobile radio communication to an efficient, secure and convenient system useful for the welfare and positive advancement global society and for this the Government should take necessary steps for the mobile industry with proper regulation.

Thursday, September 19, 2019

Security and the OSI Model Essay -- Networks Telecommunications

Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model. Physical Layer The physical layer is where the actual communication occurs between devices. The security of the physical layer pertains to the actual hardware. The vulnerabilities of the physical layer include: • Power outage • Environmental control loss • Hardware theft, damage or destruction • Unauthorized hardware changes (i.e.; removable media, data connections) • Detachment of the physical data links • Unnoticeable Data Interception • Keystroke Logging Certain measures can be implemented to ensure the physical layer is secure. This would be done by storing all hardware in a locked environment. The use of electronic locks would control and log all access to the room containing the hardware. The electronic locks could be a PIN and password or fingerprint scanner (biometrics). The use of video and audio surveillance would provide physical proof of unauthorized access that could compromise the hardware. Data Link Layer The second layer of the OSI model is the data link layer. This is the layer that transports the data between network nodes in a wide area network (WAN) or on the same local area network (LAN) between nodes. The data link layer makes available the procedural and functional means to move data between network devices and could provide the measures to find and possibly correct errors that may occur in the physical layer. The security vulnerabi... ...on. This is to stop any unauthorized use of the network. Conclusion In conclusion, the information covered in this paper shows the different types of security that is associated with each level of the standard OSI model. From the physical layer to the application layer, each layer has a different type of security which must be applied at each layer to prevent any security leaks, spoofing, and infinite loops. These are just a few of the different vulnerabilities that must be protected on a WLAN or LAN. References Reed (November 21, 2003). Applying the OSI seven layer model to Information Security. Retrieved on January 11, 2008, from SANS Institute. Website: http://www.sans.org/reading_room/whitepapers/protocols/1309.php Haden (2008). The OSI Model. Retrieved on January 11, 2008, from Data Network Resource. Website: http://www.rhyshaden.com/osi.htm Security and the OSI Model Essay -- Networks Telecommunications Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model. Physical Layer The physical layer is where the actual communication occurs between devices. The security of the physical layer pertains to the actual hardware. The vulnerabilities of the physical layer include: • Power outage • Environmental control loss • Hardware theft, damage or destruction • Unauthorized hardware changes (i.e.; removable media, data connections) • Detachment of the physical data links • Unnoticeable Data Interception • Keystroke Logging Certain measures can be implemented to ensure the physical layer is secure. This would be done by storing all hardware in a locked environment. The use of electronic locks would control and log all access to the room containing the hardware. The electronic locks could be a PIN and password or fingerprint scanner (biometrics). The use of video and audio surveillance would provide physical proof of unauthorized access that could compromise the hardware. Data Link Layer The second layer of the OSI model is the data link layer. This is the layer that transports the data between network nodes in a wide area network (WAN) or on the same local area network (LAN) between nodes. The data link layer makes available the procedural and functional means to move data between network devices and could provide the measures to find and possibly correct errors that may occur in the physical layer. The security vulnerabi... ...on. This is to stop any unauthorized use of the network. Conclusion In conclusion, the information covered in this paper shows the different types of security that is associated with each level of the standard OSI model. From the physical layer to the application layer, each layer has a different type of security which must be applied at each layer to prevent any security leaks, spoofing, and infinite loops. These are just a few of the different vulnerabilities that must be protected on a WLAN or LAN. References Reed (November 21, 2003). Applying the OSI seven layer model to Information Security. Retrieved on January 11, 2008, from SANS Institute. Website: http://www.sans.org/reading_room/whitepapers/protocols/1309.php Haden (2008). The OSI Model. Retrieved on January 11, 2008, from Data Network Resource. Website: http://www.rhyshaden.com/osi.htm

Wednesday, September 18, 2019

What is there to Know about WNV and WNE Essay -- Biology Medical Biome

What is there to Know about WNV and WNE? West Nile Virus (WNV) is an arbovirus that causes West Nile Encephalitis (WNE), an inflammation of the brain. The virus was first found in an Ugandan woman, and spread throughout all areas of the world, from Europe to Oceania. WNV is virus carried by mosquitoes and birds. Other organisms are the secondary carriers of the virus. The first outbreak resulted in victims of WNE. Since then the U.S has been alert and cautious about the virus for public health. The virus is known to affect animals as well. Up to now there is no special treatment or vaccine for WNV and its symptoms. However, there are ways to preclude you from getting the virus. Though the chances of getting WNV and a fatal case are slim, the symptoms aren’t worth risking. West Nile Encephalitis is a brain inflammation that is caused by mosquitoes. WNE is new to the U.S.A and broke out less than a decade ago in one of the states. So far there aren’t any vaccines for WNV, but there are methods of prevention. Up to this day, WNE isn’t common; however, it is a brutal enemy to those who are infected. The first outbreak of WNE was in New York City in 1999. Four deaths occurred in 1999 due to WNE (Illinois Department of Public Health). Studies show that there was less involvement with their cortex, thalamus, and cerebellum. Their microglial modules that carried histiocytes and lymphocytes were dispersed and they also developed leptomeningitis. Two years later, in the autumn of 2001, the infection spread to Iowa and Missouri. There were 54 infected people in Illinois and a death in 2003 (Illinois Department of Public Health). By now, WNE has spread to the West Coast. Researchers aren’t sure how WNV or WNE was introduced to the U.S.A.... ...tious of areas that are reported to have infected mosquitoes. If anyone is going outside during the times of day or the places where they are prone to get infected, being cautious and careful can prevent a severe case of WNE. What Is There 5 References 1) Burke, A Cunha, MD. (2004, Dec). West Nile Encephalitis. eMedicine. 7/27/05: http://www.emedicine.com/med/topic3160.htm 2) Dr. Tom Solomon. (2005, June). West Nile Encephalitis. Encephalitis Information Resource. 7/27/05: http://www.encephalitis.info/TheIllness/TypesEncephalitis/WestNile.html 3) Lee, M.C. 2003. West Nile Virus overview and abstracts. New York: NOVA 4) Illinois Department of Public Health. West Nile Virus. 7/27/05: http://www.idph.state.il.us/public/hb/hbwestnile.htm 5) White, Dennis J. et all. 2001. West Nile Virus Detection, Surveillance, and Control. New York: New York Academy of Sciences.