Wednesday, July 31, 2019

Marriage is a private affair; Sequel Essay

As Oekeke awoke, he shifted in his bed with a pain coming from his chest. It wasn’t a pain that made you clench up and scream, he knew from that moment something was very wrong. He tried to open his at last, from when he awoke his eyes were still weary but it seemed as though he was stuck in time. His heart pumped faster and his mind was propelling from left to right to across the back and back. All he could think of was his family, but with such confusion he could hardly focus on the realty of his situation. It was a sensation he’d never felt ever before, and as he saw his life flash by him he knew the only thing he could do was to wait it out. The old man finally grasped control of his life covered in sweat and disorientation. He asked himself if it could have been a near death experience or just a really vivid and messed up dream that only comes around every couple of years. He knew one thing for sure and that was to get to his sons house right away and end the path of negativity. His body was weak but his mind was made up and with that he left all that had just happened behind and left. Just as Okeke rushed to his vehicle, the rain started to pour down as if it were trying to stop him. In the back of his mind he was still left with questions that would once in a while come up. It was too late now as his mind was set on seeing his family. The dark, gloomy sky filled his pain with even more remorse. He couldn’t tell where it was coming from exactly, it wasn’t leaving anytime now. The storm brewed as Okeke drove without any intent of stopping and slow his speed. A sudden sharp pain hit his heart like thunder to ground. His face grew weary and tense and the ever growing pain made the man’s vision sluggish like the fog. He was broken, still his left hand on the wheel. A sudden faint object leapt over the front of his hood, nearly colliding with the car, startling Okeke to gain control and pass his pain for the time being. As the hours passed he finally arrived to Nene’s and Nnaemako’s, crawling out and nearly breaking into their house. Nene helped him in, while in tears Okeke explained his sorrow and experience he had and while all this was happening his pain slowly started to fade away. Okeke finished by saying that everything will be alright and even if they do have their different mind and culture, there will always be a way to solve the issue through choice and absolute strength. The man, finally relaxed in his sons arms, slowly slept back into his nightmare. His son, wife and kid all shared a final breath with him. Okeke slowly lifted his right fingers to his  left ring finger and took his ring and opening his son’s pam and placing it in. Their eyes filled with tears and they were all at peace now a real family. A faint vision appeared flashing in quickly and Okeke was left in a bed which seemed to be in a hospital, from what he could tell. There was mirror hanging on the wall to his right and he looked at it and jumped out of bed seeing how old he looked. He started screaming and ran out but two nurses stopped him and brought him back to his bed. With the confusion and everything he was lead to believe, the nurses told him that he has Alzheimer’s and that once every couple of years he remember everything for a while. This was the first time in 10 years that it’s happened, he was short of breath and asked them what his visions and dreams were all about. They told him that his body is trying to fight the disease. He asked if he had kids and that part was true and they just finished visiting him a few hours ago. They told him that it seemed like a very deep and emotional moment they spent with him and it was like the world was at peace. Okeke laid back in his bed and told them that, that was enough and he said he was ready to go. He knew he was ready and that moment made him re-evaluate everything, like he’d encountered it before, but he was having a hard time remembering it.

Tuesday, July 30, 2019

You are ugly, too Analysis

Zoe seemed to be unsure about everything, including herself. She bought furniture then returned them because they didn't look like what her had expected. She doubt whether the Chinese symbols on the rug really meant Peace and Eternal Life as the salesgirl said. And she eventually returned the rug. She was not quite sure about herself as well. She worried that the woman she saw everyday was not herself: â€Å"Sometimes I looked puffer and plainer than she remembered. † Each time she was told that she looked like other people, she doubt more about her looking.Just by listing her actions and thoughts, the author successfully described Zoe as a cynical and possibly depressed character. Page 446, when she flew to NYC: Zoe revealed her trick to flying safe: never buying a discount ticket and telling yourself you have nothing to live for anyway. And even if the flight was safe, she suggested coming up with a persuasive reason to go on living. It sounded like Zoe always prepared herse lf for anything bad happens, like she really â€Å"had nothing to live for†. Zoe Conversation with Earl: In this story, the author Lorries Moore emphasized sexual relationships between an and woman.The conversation was impressed by how Zoe replied to Earl's talking. Earl tried really hard to talk about love and relationships, but eventually got beaten by Zoo's sarcastic replying. He said: â€Å"You know, I Just shouldn't try to go out with career women. You're all stricken. A guy can really tell what life has done to you. I do better with women who have part-time Jobs. † Zoo's past experience with three unrewarding relationships made her become alienated and desperate. Her situation Is a common for professional women at that time.

Monday, July 29, 2019

The Effects of Alcohol Abuse on a Diagnostic Imaging Department Dissertation

The Effects of Alcohol Abuse on a Diagnostic Imaging Department - Dissertation Example 15 3.2 Data Analysis 16 3.3 Sampling 17 3.4 Ethical Considerations 17 3.4.1 Informed Consent 17 3.4.2 Ethical Application 17 3.5 Time Frame and Cost 18 3.5.1 Time Frame 18 3.5.2 Associated Costs 19 4.0 Possible Projected Outcomes 21 Reference List 22 1.0 Literature Review 1.1 Introduction In itself, alcohol use is not something that generally leads to heath problems or visits to the hospital. However, alcohol abuse is linked to many health problems, both immediate and cumulative. Alcohol abuse can take many forms from drinking significant amounts of alcohol on a regular basis, to drinking large quantities occasionally (binge drinking). Both forms of alcohol abuse have direct and indirect health consequences. Globally, alcohol is responsible for approximately 1.8 million deaths per year . From 2005 to 2006 in the United Kingdom, more than quarter of a million people were admitted to hospitals for diagnoses related to alcohol. This includes direct effects of alcohol, such as alcohol ov erdose, and indirect effects, such as injuries as the result of driving while intoxicated. The number of alcohol-related admissions has been growing since around 1997, and roughly doubled in the years between 1997 and 2006 . Alcohol consumption is also increasing as a result of values changing and alcohol becoming inexpensive and readily available. The consumption of alcohol has become socially acceptable in many circumstances, and is often encouraged . For example, among young adults and in University settings, there is a strong alcohol drinking culture. These factors make it likely that alcohol consumption will continue to increase, and place pressure on many parts of the healthcare industry. This includes hospital departments who often have to work with people being admitted who are... The essay discusses that in itself, alcohol use is not something that generally leads to heath problems or visits to the hospital. However, alcohol abuse is linked to many health problems, both immediate and cumulative. Alcohol abuse can take many forms from drinking significant amounts of alcohol on a regular basis, to drinking large quantities occasionally (binge drinking). Both forms of alcohol abuse have direct and indirect health consequences. Globally, alcohol is responsible for approximately 1.8 million deaths per year. From 2005 to 2006 in the United Kingdom, more than quarter of a million people were admitted to hospitals for diagnoses related to alcohol. This includes direct effects of alcohol, such as alcohol overdose, and indirect effects, such as injuries as the result of driving while intoxicated. The number of alcohol-related admissions has been growing since around 1997, and roughly doubled in the years between 1997 and 2006. Alcohol consumption is also increasing as a result of values changing and alcohol becoming inexpensive and readily available. The consumption of alcohol has become socially acceptable in many circumstances, and is often encouraged. For example, among young adults and in University settings, there is a strong alcohol drinking culture. These factors make it likely that alcohol consumption will continue to increase, and place pressure on many parts of the healthcare industry. This includes hospital departments who often have to work with people being admitted who are still intoxicated, and who must manage many alcohol-related injuries.

Sunday, July 28, 2019

Discussion Essay Qustion Example | Topics and Well Written Essays - 250 words - 5

Discussion Qustion - Essay Example Venus is covered by carbon dioxide. This absorbs high amount of heat which relatively increases surface temperatures (Corfield, 2007). Earth is the only planet that supports life. Its atmosphere is made of different layers that include troposphere, thermosphere stratosphere, and mesosphere. It comprises of different percentages of moving air that is 78.2% of nitrogen, 1.0% of inert gases, 21.1% of oxygen, 0.04% and water vapor. In Mars the atmosphere is thin comprising of small traces of nitrogen, oxygen, carbon dioxide argon and small traces of water vapor (Corfield, 2007). Jovian planets, also known as outer planets are large in sizes and do not have surfaces that are in solid state. They are far from the sun and therefore cooler than the inner planets. The inner part of these planets is made up rocks at the core. Their atmosphere comprises of helium and nitrogen components. The first and the main difference between terrestrial and Jovian planet is the size where terrestrial planet is smaller in size. Secondly are their surfaces. Terrestrial planet it’s made of rocks while Jovian planet is made up of gases. Third is that the atmosphere of terrestrial planet is mainly made of nitrogen and carbon dioxide whereas the atmosphere of Jovian planet comprises of hydrogen and helium. Fourthly, terrestrial planets are nearer to the sun as compared to Jovian planets (Runcorn, 1988). Jovian planet is also known to rotate at faster rate than terrestrial

Saturday, July 27, 2019

The function of poverty according to Herbert Gans (Sociology) Research Paper

The function of poverty according to Herbert Gans (Sociology) - Research Paper Example The existence of poverty acts as a guarantee for the rich people’s status, because if there would be no poor, there would be no identification left for the rich. The rich people give charity to the poor which helps eliminate the stagnation of wealth. The poor vote less and do not actively participate in political activities, which helps stabilizing the political scenario. Two functions of poverty described by Gans, that I disagree with acknowledging as functions of society, are as follows: The getting done of dirty work by the poor is more of an economical function of the society because the poor are required to get all dirty work done at low wages- work which is often underpaid and requires more effort. This way, the poor help the people of upper classes lead easy lives by cleaning the society at indecent wages. This helps subsidize the economy of a country as the poor also pay heavy taxes despite their low wages. The third function described by Gans is also an economic function and not a social function. Poor help in the maintenance of jobs like police, peace-keeping force, NGOs, journalism and social work. This helps in subsidizing the society financially as there is reduced unemployment when these professions keep on working for the benefit of the

Friday, July 26, 2019

Critically analyse what is meant by the New Third Way as a political Essay

Critically analyse what is meant by the New Third Way as a political ideology - Essay Example These ideas are very progressive and necessary at first sight. The matter is that these ideas were formulated in the end of the 20th century, and the political situation was not the same as today. The ideas of the Third Way are of liberal views which are in great crisis today. The world community is facing a lot of new challenges, especially after September 11, 2003. Most of them are related to the global world terrorism and numerous terrible actions made by terrorists throughout the world. Many challenges are connected with WMD proliferation and drug trafficking. The twentieth century was a century of capitalism and socialism ideas realization, but now in the beginning of the 21st century the ideas of pure capitalism (when profit is the main value, and all problems must be overcome by free entertainment) and socialism (when state is the main power in economic life) are become outdated, as practice shows. So, the leaders of the most powerful countries offered a new decision, so-calle d The Third Way.

Business in Context. UK Economy Essay Example | Topics and Well Written Essays - 1750 words

Business in Context. UK Economy - Essay Example This essay stresses that political factor have a huge influence upon the economy as the policies and legislatures are drafted and implemented by the political parties are mostly related to the business trade practices. It not only has a political influence upon businesses but also the businesses create an attempt to influence environmental policy by endeavouring to position the political programme and to influence regulations and legislations. This paper makes a conclusion that the population tends to rise and the consumption habits too. The culture and the society generate demand for certain merchandises and services which are offered by the business houses as per the consumers demand. UK has shown a rise in the GDP. This is due to the socio-cultural affect. Consumers are the central point of the business. The technological advancement has made the consumers expectation more. This creates the gap between the expectation of the consumers and the predicted expectation of the business towards the consumers. The new changes in immigration law and intellectual property law stated by the UK government have gained international attention and many international corporations are looking forward to this policy. The policies have been able to attract many foreign players like Google, Intel and many other corporate. Technical advancement for any country aids in development of the business houses.

Thursday, July 25, 2019

VLAN in todays enviroment Essay Example | Topics and Well Written Essays - 1000 words

VLAN in todays enviroment - Essay Example But when studied further both LANs and VLANs it serves more than interconnection: personal computer networks to backend networks or even storage area networks. And in most cases, the purpose of a LAN is a combination of many (Stallings, 2007). The common LAN configuration is one composed personal computers. This type is almost present in all organizations no matter the size is. The main reason for this may be because of lower cost and simpler topology. For smaller organizations, this type of network is perfect since it serves its purpose of connectivity without compromising budget and ease of use and maintenance. Another purpose of the network is for backend networks. Now this is more complex and is more commonly seen in bigger organizations. Backend networks serves as a connection between mainframes, super computers and mass storage devices. This implies that with a limited space and less equipment, the network is able to provide fast and reliable data transfer. This is essential for VLANs for companies that provide data services. The same applies to Storage area networks. With these functions, it is not surprising that the topology of the network will also grow more complex. If it were a simple LAN, there shouldn't be a problem. But since a VLAN involves more strategic planning, a lot more effort should be made. Although the physical location of the entities connected is not considered in the planning, how they are connected to each other can be pain staking. The interoperability of these entities can also cause errors. It is necessary that they operate on the same protocol. Existing hardware may not operate with newer ones or equipment from different manufacturers may clash. Based on the above disadvantages, it can be said that managing such network is a lot difficult than a simple LAN. Except for the geographical location, the hardware used for VLANs are not that different from a LAN, although there are routers and switches designed specifically for VLANs. Cisco calls these switches Catalyst. There are also route switch modules for this purpose. Some of the switches have built-in support in software and hardware to do inter-VLAN routing. With inter-VLAN routing, no external device, modules, or daughter cards are required (Cisco). Switches are more commonly used because they are simpler compared to that of a router which functions more like a connection to the internet or a WAN (Tyson, 2009). Security is improved by using switches with built in layer 2 protections such as hardware firewalls. This is then supported by it software counterpart. In the case of connecting several VLANs to each other, routers and bridges can be used. Network switches operate at the layer two or the Data Link Layer of the OSI model. The layer two is the one responsible to provide the means to transfer data between network entities. This makes it vulnerable to attacks by hackers and the like. LANs often have confidential and mission-critical data moving across (Tomasi, 2004). This is easily intercepted since it is right next to the physical layer of the network. VLANs have the advantage to making the network more secure since it segments the network into distinct broadcast groups (Long). Since the information is no longer sent to all when broadcasted, the probability of interception is reduced. In context of the protocols used for VLAN, there are several to choose

Wednesday, July 24, 2019

Comparison Between Structure and Function of Human and Animal Eyes Assignment

Comparison Between Structure and Function of Human and Animal Eyes - Assignment Example This essay stresses that the human eye is adapted to sense different colors and lights of various intensities and adjust according to brightness. Color and light vision involves the simultaneous interaction between the two eyes and brain. When light from the object hits the eye, it is focused by the cornea and lens elements that form transform it to an inverted image. The image successfully transverses the aqueous humor, crystalline lens, gelatinous vitreous body, and vascular ad neuronal layers before it is focused on the surface of the retina. Rod and cone cells found in the retina detect the image, translate the light into a series of electrical signals, and transmit the signals to the brain. This report makes a conclusion that vision is insidious in the animal kingdom since; it is the sensory organ that is relied upon in finding reproductive mates, suitable food, shelter, and escaping from predators and danger. The study of human and animal’s eyes show wild disparities in their mode of vision and anatomical features. Human vision is presented as sometimes ineffective as in detecting infrared and ultraviolet lights, or overly sophisticated than that of felines. This study is important to help researchers to find cure for human eye diseases and explain the adaptation of animals to their environment. The visual perception of living creatures is dependent on how they process light using their photoreceptors.

Tuesday, July 23, 2019

Financial management Essay Example | Topics and Well Written Essays - 500 words - 2

Financial management - Essay Example This is due to the credit extended in the first month of the operations. Moreover, the credit should equal to CBM has performed extremely well during the course of 9-months. Their cash collecting policy has worked well in generating enough cash for the following months. The cash collected has been incremental due to rising revenues. The company has low uncertainty in its revenue stream which locates them in a good position to finance their fixed assets requirement at appropriate time of the year. (Gitman, 2007) The minimum cash policy at the end of the month has served them well in making payments on time. On average they have surpassed their minimum cash requirement by a substantial margin which is a positive sign for any credit lending firm. The only month which has brought up concerns due to operational activities is April where the company had a cash deficit of $7,500. (Horngren, 2008) Other than April, the company has been in a cash deficit in June which was primarily because of investment in plant and income tax payment which totaled to $150,000. These expenses occur once or twice a year therefore; it is understandable to have a cash deficit for that month. Other than these abnormal payments, the company has fixed payments totaling to $60,000 which encompasses salaries, lease and miscellaneous costs (Brigham & Houston, 2009). Over the 9 months, they have been successful in making the fixed payments as well as the variable payments effectively. As a bank manager, I would like CBM to be my client for three reasons. Firstly, keeping in view their cash budget, the company has been experiencing growth in their revenues during the entire course. This creates positive sentiments about the company and one can project its prospective future. Moreover, growth in revenue could also indicate growing market share and increase in power over price. (Proctor, 2009) Secondly, their cash collection policy has been stringent. They have collected

Monday, July 22, 2019

Leadership Style and Performance Essay Example for Free

Leadership Style and Performance Essay An overview of the topic of leadership styles summarizes that the existing studies on how performance is affected by leadership style is separated into important phases. Early studies on leadership (frequently categorized as ‘trait’ studies on leadership) concentrated on identifying the personality traits which characterized successful leaders (Argyris, 1955; Mahoney et al. , 1960). According to them successful leaders are ‘naturally born’ and those they have certain native characteristics which distinguish them from non-leaders (see Stodgill, 1948). However, there was significant difficulty in validating these characteristics led to widespread criticism of this trait approach, signaling the emergence of ‘style’ and ‘behavioral’ approaches to leadership (Stodgill, 1948). Style and behavioral theorists shifted the emphasis away from the characteristics of the leader to the behavior and style the leader adopted. The primry conclusion of these studies is that adoption of democratic or participative styles by leaders are more successful (see, for example, Bowsers and Seashore, 1966). In this sense, these early studies are focused on identifying the ‘one best way of leading’. Similarly to trait theories, the major weakness of style and behavioral theories is the ignorance of how important role situational factors play in determining the effectiveness of individual leaders (Mullins, 1999). It is this limitation that gives rise to the ‘situational’ and ‘contingency’ theories of leadership (for example, Fiedler, 1967; House, 1971; Vroom and Yetton, 1974) which shift the emphasis away from ‘the one best way to lead’ to context-sensitive leadership. Although each study emphasizes the importance of different factors, the general tenet of the situational and contingency perspectives is that leadership effectiveness is dependent on the leader’s diagnosis and understanding of situational factors, followed by the adoption of the appropriate style to deal with each circumstance. However, recent studies on leadership have contrasted ‘transactional’ leadership with ‘transformational’. Transactional leaders are said to be ‘instrumental’ and frequently focus on exchange relationship with their subordinates. In contrast, transformational leaders are argued to be visionary and enthusiastic, with an inherent ability to motivate subordinates. Although the brief summary above indicates that research into leadership has gone through periods of skepticism, recent interest has focused on the importance of the leadership role to the success of organizations. Fiedler (1996), one of the most respected researchers on leadership, has provided a recent treatise on the importance of leadership by arguing that the effectiveness of a leader is a major determinant of the success or failure of a group, organization or even an entire country. It has been argued that one way in which organizations have sought to cope with the increasing volatility and turbulence of the external environment is by training and developing leaders and equipping them with the skills to cope. These claims are based on the assumption of a direct link between leadership and organizational performance. This assumption requires critical review. Widely celebrated cases of a direct leadership–performance link may be found in numerous anecdotal accounts of improvements of company performance attributed to changes in leadership (see, for example, Nicholls, 1988; Quick, 1992; Simms, 1997). However, empirical studies into the links between leadership and performance have been lacking. One notable exception is the detailed study of the impact of leadership on performance in the somewhat surprising context of Icelandic fishing ships. Thorlindsson (1987) suggests that variations in the performance of different fishing ships, under identical conditions, can be accounted for by the leadership skills of captains. Over a three-year period, Thorlindsson revealed that the leadership qualities of the ship captains accounted for 35 to 49 per cent of variation in the catch of different crews. Other studies which examine the links between leadership and performance coincide with the re-emergence of the ‘one best way to lead’ debate. Of particular relevance is the resurgence of interest into charismatic leadership, which is frequently referred to as transformational leadership (Bass and Avolio, 1993). A number of researchers theorize that transformational leadership is linked to organizational performance. Conceptually, it is argued that the visionary and inspirational skills of transformational leaders motivate followers to deliver superior performance. In summary, much of the above evidence presented as supporting the claim of a leadership–performance link is anecdotal and frequently over-concentrates on the ‘transformational’ role of leaders in corporate successes. It would appear that few studies have responded to the observation of Porter and Mckibbin (1988) that much of the research reported as supporting this claim is either inconclusive or empirically suspect. The limited or inconclusive character of research findings in this area suggests the need to investigate further the nature of the relationship between leadership and performance. Several different categories of leadership paradigms have been suggested by various researchers. For example, Bass (1985) stated that there are four dimensions of transformational leadership, three dimensions of transactional leadership, and a non-leadership dimension of laissez-faire leadership (Bass, 1985). Avery (2004) suggested categorizing leadership into four leadership paradigms, while Goleman (1995) prefers six leadership paradigms. Despite Bass’s (1985) model being acclaimed as making a major contribution to leadership, his theory has been criticized for various reasons (Yukl, 1999). One criticism is that his model overemphasizes the importance of one or two leadership paradigms (e. g. transactional and visionary), omitting the classical and organic paradigms Bass asserts that visionary (transformational) leaders are nearly always more effective than transactional leaders, but others (e. g. Judge and Piccolo, 2004; Wallace, 1997) dispute this. While this in itself does not invalidate the concept of visionary leadership, Bass attributes more to visionary (transformational) leadership than perhaps he should. As Avery (2004) suggested, both transactional and visionary leadership are valid forms of leadership, but visionary leadership may be applicable more broadly, including in situations where there are insufficient resources for the manager to rely on supplying external rewards (Judge and Piccolo, 2004), or where the situation is complex and ambiguous, and relies strongly on follower knowledge and commitment. Avery suggests that there are other situations in which transactional leadership is the appropriate form of leadership, such as when followers are unwilling or unable to commit to the leader’s vision. In contrast with Bass’s (1985) model, Avery’s (2004) paradigms provide a broad basis allowing for different forms of leadership that have evolved at different times and in different places. The paradigms are useful for showing that there is no single best way of thinking about leadership, rather that different kinds of leadership reflect social and historical roots. Avery’s paradigms allow leadership to depend on the context, respond to organizational needs and preferences, and involve many interdependent factors that can be manipulated (Bryman, 1992; Shamir and Howell, 1999; Yukl, 1999). Avery (2004) proposes 13 indices to differentiate between her four paradigms: classical, transactional, visionary, and organic. The nine indices included in this review are decision making, range of staff’s power, power distance between leader and the staff, key player of the organization, source of staff’s commitment, staff’s responsibility, situation of management and leadership in the organization, situation of diversity in the organization and situation of control in the organization. These nine criteria are considered more relevant for differentiating the four leadership paradigms than the other four criteria. Each paradigm is discussed in turn, including the distinguishing characteristics using the above nine criteria. Classical leadership is probably the oldest paradigm with its origins in antiquity, and is still used in contemporary organizations (Avery, 2004). This paradigm reflected the prevailing view in the business literature until the 1970s when the human relations movement led to more of a focus on followers and their environment. According to Avery (2004), classical leadership refers to dominance by a pre-eminent person or an ‘elite’ group of people. This leadership can either be coercive or benevolent or a mixture of both. This happens because the elite individual or group commands or maneuvers other members to act towards a goal, which may or may not be explicitly stated. The other members of the society or organization typically adhere to the directives of the elite leader, do not openly question their directives, and execute orders largely out of fear of the consequences of not doing so, or out of respect for the leader, or both (Avery, 2004). Classical leadership has some limitations. The first occurs where the leader cannot command and control every action, particularly as situations become more complex and beyond the capacity of one person; or when additional commitment from followers is needed to get a job done, such as in reacting to changing circumstances; or when ideas about leadership change and followers no longer accept domination, or follower commitment starts to wane for other reasons. Another limitation is that this paradigm often relies on the idea of a ‘great person’, implying that only a select few are good enough to exercise initiative, and this belief can encourage followers to deskill themselves nd idealize the leaders. Followers then seek and hold little power, leave the leader accountable for organizational outcomes, and make relatively little contribution to the organization (Avery, 2004). According to the nine distinguishing indicators, under the classical leadership paradigm leaders normally use an autocratic style for making decisions, involving followers in the decision making process never or very little; they do not empower followers. Followers have almost no power in the organization and as classical leaders tend to be highly directive, followers can be unskilled. The source of followers’ commitment comes from their fear of or respect for the leaders; the technical system becomes more regulating; the operations in the organization become more routine and predictable; and the organization is highly controlled by the leaders (Avery, 2004). A transaction or exchange process is the basis of the commonly employed transactional leadership paradigm (Evans and Dermer, 1974; House and Mitchell, 1974). The transactional leader recognizes subordinates’ needs and desires, and then clarifies how those needs and desires will be met in exchange for subordinates’ work. By clarifying what is required of subordinates and the consequences of their behaviors, transactional leaders are able to build confidence in subordinates to exert the necessary effort to achieve expected levels of performance. According to Judge and Piccolo (2004), three dimensions of transactional leadership are contingent reward, management by exception-active, and management by exception-passive. Contingent reward is the degree to which the leader sets up constructive transactions or exchanges with followers. The leader clarifies expectations and establishes the rewards for meeting these expectations. In general, management by exception is the degree to which the leader takes corrective action on the basis of results of leader-follower transactions (Judge and Piccolo, 2004). As noted by Howell and Avolio (1993), the difference between management by exception-active and management by exception-passive lies in the timing of the leader’s intervention. Active leaders monitor follower behavior, anticipate problems, and take corrective actions before the behavior creates serious difficulties. Passive leaders wait until the behavior has created problems before taking action (Howell and Avolio, 1993; Judge and Piccolo, 2004). According to Avery (2004, p. 34), under the transactional leadership paradigm, leaders adopt a consultative style for making decisions. They engage in different degrees of consultation with individual followers, but the leaders remain the final decision-makers. Leaders do not very often empower followers, and followers have very low power in the organization apart from being able to withdraw from or contribute more of their labor. Compared with classical leadership, under transactional leadership the source of followers’ commitment comes from the rewards, agreements, and expectations negotiated with the leader rather than from their fear of, or respect for, the classical leader. The technical system becomes more regulating, the operations in the organization become more routine and predictable, and the organization is mostly highly controlled by the leaders. Avery (2004) argues that under transactional leadership, the followers’ knowledge base can be somewhat higher than under classical leadership. Compared with classical leaders, transactional leaders require staff somewhat more skilled on specific tasks. In the last three decades, visionary (transformational, charismatic) leadership has received increasing attention (Bass, 1985, 1998; Burns, 1978; Conger and Kanungo, 1987; House, 1977). It added a new dimension to organizational studies, namely the visionary aspect of leadership and the emotional involvement of employees within an organization. The basic notion is that a visionary leader can create an impression that he or she has high competence and a vision to achieve success. Subordinates are expected to respond with enthusiasm and commitment to the leadership objectives, and may be recruited because they share the vision. Bass (1985, 1998) developed a theory of visionary or transformational leadership whereby the leader inspires and activates subordinates to perform beyond normal expectations. According to Avery (2004), visionary leadership has limitations, even with the current literature’s overwhelmingly positive view of it. Nadler and Tuschman (1990) pointed out that the unrealistic expectations followers often place on visionary leaders can create disappointment if things do not work out. Followers can become dependent on visionary leaders, believing that the leader has everything under control. Also, innovation can be inhibited if people become reluctant to disagree with a visionary leader. Avery (2004, p. 39) distinguishes the visionary leadership paradigm from the other three paradigms as follows. First, leaders employ a collaborative style for making decisions. They share problems with their followers and seek consensus before the leaders make the final decision. Visionary leaders empower their followers, giving followers a much higher level of power in the organization than classical and transactional leadership. This is essential because the leader needs the followers’ input and commitment to realize his or her goals. Followers of visionary leadership need sufficient power to work autonomously towards a shared vision. The source of followers’ commitment comes from the influence of the leaders’ charisma and/or the shared vision, the technical system becomes still more complex, operations become more uncertain and unpredictable, and the organization is jointly controlled by the leaders and their followers. Regarding the followers’ knowledge base, visionary leadership requires skilled and knowledgeable workers who are attracted to, and share the leader’s vision, and can contribute to realizing the vision. The fourth paradigm, organic leadership, is relatively new to organizational studies. Recently introduced by Drath (2001) and expanded by Avery (2004), organic leadership is likely to blur the formal distinction between leaders and followers. This paradigm relies on reciprocal actions, where team members work together in whatever roles of authority and power they may have, not based on position power (Hirschhorn, 1997; Raelin, 2003; Rothschild and Whitt, 1986). Employees become interacting partners in determining what makes sense, how to adapt to change, and what is a useful direction. Rather than relying on one leader, organic organizations are likely to have many leaders. Multiple leaders are valuable because as people cope with heterogeneous and dynamic environments, the knowledge and issues become too complicated for only a few leaders to understand (Avery, 2004). Organic leadership allows for people with different degrees of expertise on current issues to emerge and be accepted by the group as leaders. In addition, under organic leadership, there may be no formal leaders and the interaction of all organizational members can act as a form of leadership, held together by a shared vision, values, and a supporting culture. Under this paradigm where an organization has no formal leadership structure, an integrator role may emerge to actively link together the many parts of the organization (Avery, 2004). The emphasis is on emerging leadership rather than on people being appointed to leadership positions. However, Kanter (1989) argued that the downside of organic leadership that advocates autonomy, freedom, discretion and authorization may result in loss of control and greatly increased uncertainty. It is important to recognize that organic leadership is about generating a form of self-control and self-organization, where people have a clear sense of purpose and autonomy within a particular context (Meindl, 1998). This idealized organic leadership paradigm requires differentiating from classical, transactional, and visionary leadership concepts by not relying on formal leaders. Furthermore, the enterprise has to trust in the capacity of its members to solve problems and make decisions in the interests of the organization. This idea clearly relies upon self-leading organizational members (Avery, 2004). According to Avery’s (2004, p. 39) distinguishing characteristics, under organic leadership an organization adopts a mutual agreement style for making decisions. Decisions need not be unanimous but can be based on consensus. The members have a high degree of power as a result of this shared leadership. Accountability and responsibility are shared as well. The source of followers’ commitment is based on the values and visions shared by all the members in the organization; a strong, shared culture; a technical system that is highly complex; operations in the organic organization become more self-organizing and unpredictable; formal control is provided by peer pressure and group dynamics, and a shared culture, vision, and values. Members are self-managing. Organic leadership seems particularly appropriate for professional and knowledge workers in dynamic, chaotic situations. This leadership paradigm relies on attracting and retaining highly trained and knowledgeable staff with self-controlling capabilities.

Sunday, July 21, 2019

Cryptography: Types, Methods and Uses

Cryptography: Types, Methods and Uses CHAPTER-1 INTRODUCTION 1.1 Introduction to Cryptography Cryptography is art of writing and reading the secret information. It is used to send the information between the various participants. It can be used in such a manner so that it could not be seen by the others. Cryptography is used to prevent the information from the attacker. It provides various services as : Integrity checking Authentication Confidentiality In case of integrity checking recipient thinks that the message is alter by the third party or attacker. Hence the user assures the recipient that the message has not been altered by any other source. In case of authentication the identity of the person is check by the user. The user verifies the identity of the person and handle over the right to use the particular data. In case of confidentiality the attacker watch the data carefully when it send from user to recipient. The third party can’t change the data. The message which is in the original form is known as the plaintext. The user encrypted the message before sending to the recipient is known as cipher text. When the cipher text is produces from plaintext, this process is known as encryption. [1]. The reverse process of encryption is called decryption. In the cryptographic systems an algorithm and a key is used. The key is known as the secret value. Cryptography is a field of computer networks which transforms (encrypts) the information (plain text) into an unreadable form (cipher text). And this cipher text can be decrypted only with the help of a secret key. Cryptography acts as a method of keeping the information secret. Cryptography protects the information by using mathematics in science. Electronic security is a major issue as various forms of electronic media and internet are becoming more prevalent. Cryptography is used to secure the data and to prevent the data from various attacks. Cryptography is necessary when communicating over any un-trusted medium. Authentication, digital signatures, e-commerce are major applications of cryptography. Generally in the cryptographic systems it can broadly classified into two systems. Symmetric key systems. Public key systems. In the symmetric key cryptography, single key is used for the encryption and the decryption purpose. The same key is used at the sender and the recipient side. On the other hand, in case of public key system, two types of keys are required. One is the public key and other one is the private key. Public key is known to all but the private key is known only to the recipient of messages uses. One of the techniques used in Cryptography is known as the visual cryptography. It is a cryptographic technique, which allows visual information to encrypt. The data is encrypted in such a way that decryption becomes a mechanical operation. For these kinds of operations computer is not required. Earlier the developers used visual secret sharing scheme. In this scheme the image was broken into many parts. The third party thinks that all these parts are used to decrypt the image. But the n − 1 parts of the image revealed no information about the original image. In this technique each part has its separate transparency. The decryption is performed by overlaying the parts. When all the parts were overlaid, then the original image would appear. Cryptogra phy is the technique, which is used to protect the information from the external viewers. It plays a vital role in security. The public key encryption and decryption is one of the most important types of cryptography. In public key cryptography the key should be unique. There are two ways of key production. The first one is mathematical like AES, DES and the other one is based on the theory of natural selection. The multimedia technology plays an important role in our society. In this case the digital images play a very important role. The digital images are used to fulfil the security and privacy in various applications. Encryption of image plays a very important role; it helps to save the image from the unauthorized attack. Many solutions are providing to save this image; one of the techniques is mask the image data. For the encryption purpose many algorithms are required, such as [2] : DES AES RSA Broadly, Cryptographic systems provide us three types of cryptographic algorithms namely, Secret Key Cryptography (SKC), Public Key Cryptography (PKC) and Hash Functions [3]. The Secret Key Cryptography (SKC) uses a single (same) key for the process of encryption and decryption. The most commonly SKC algorithms used now-a-days include: 1.2 Data Encryption Standard (DES) It was designed in 1970’s by IBM and was ratified in 1977 by the National Bureau of Standards (NBS) for commercial use. It is a block cipher that operates on 64-bit blocks employing a 56-bit key and 16 rounds [4]. Although DES has been around long back but no real weakness has been identified. The biggest disadvantage of DES is the 56 bit key size. 1.3 Advanced Encryption Standard (AES) It was designed by Vincent Rijmen and Joan Daemen and was introduced in 1998. The algorithm can use fickle key length and block length. The key length can include 128, 192, or 256 bits and block length can be of 128, 192, or 256 bits [5].AES is a highly efficient and secure algorithm. The drawback lies in its processing as it requires more processing. 1.4 Rivest Cipher (RC) Ronald Rivest developed this algorithm and thus, the name of the algorithm was put after Ronald’s Rivest name. It provides a series of RC algorithms including RC1, RC2, RC3, RC4, RC5 and RC6 [6]. 1.5 Blowfish It was developed by Bruce Schneie and was first published in the year 1993. This block cipher has 8 rounds, having the block size is of 64 bits and the key length can vary from 32 to 448 bits. Blowfish was proposed as a substitute was DES [7]. This algorithm is significantly faster than other algorithms and the key strength is excellent. Blowfish algorithm is apt only for applications where the key mostly remains the same. The Public Key Cryptography (PKC) uses one (public) key for encryption and another (private) key for decryption. The PKC algorithms that are in use today are: 1.6 RSA The RSA algorithm was publicly described in 1977 by Ron Rivest,Adi Shamir, and Leonard Adleman at MIT; the letters RSA are the initials of their surnames, listed in the same order as on the paper. RSA is a cryptosystem, which is known as one of the first practicable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it wasnt declassified until 1997. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message. Breaking RSA encryption is known as the RSA problem. It is an open question whether it is as hard as the factoring problem. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to be- transferred is enciphered to cipher text at the encoding terminal by encoding the message as a number M in a predetermined set. That number is then raised to a first predetermined power (associated with the intended receiver) and finally computed. The remainder or residue, C, is computed when the exponentiated number is divided by the product of two predetermined prime numbers (associated with the intended receiver). Operation of RSA The RSA algorithm involves three steps: Key Generation Encryption Decryption. 1.6.1 Key Generation RSA involves a public key and a private key. The public key can be known by everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. The keys for the RSA algorithm are generated the following way: Choose two distinct prime numbers p and q. For security purposes, the integers p and q should be chosen at random, and should be of similar bit-length. Prime integers can be efficiently found using a primarily test. Compute n = pq.n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length. Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1), where φ is Eulers totient function Choose an integer e such that 1 e is released as the public key exponent. e having a short bit-length and small Hamming weight results in more efficient encryption – most commonly 216 + 1 = 65,537. However, much smaller values of (such as 3) have been shown to be less secure in some settings. Determine d as d ≠¡ e−1 (mod φ(n)); i.e., d is the multiplicative inverse of e (modulo φ(n)). This is more clearly stated as: solve for d given d.e ≠¡ 1 (mod φ(n)) This is often computed using the extended Euclidean algorithm. Using the pseudo code in the Modular integers section, inputs a and n correspond to e and (n), respectively. d is kept as the private key exponent. The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and φ(n) must also be kept secret because they can be used to calculate d. 1.6.2 Encryption A transmits her public key (n, e) to B and keeps the private key secret. B then wishes to send message M to A. He first turns M into an integer m, such that 0 _ m by using an agreed-upon reversible protocol known as a padding scheme. He then computes the ciphertext c corresponding to c = memod(n) 1.6.3 Decryption We can recover message m from c by using her private key exponent d via computing Given m, we can recover the original message M by reversing the padding scheme.(In practice, there are more efficient methods of calculating cd using the precomputed values below.) 1.7 Enhanced RSA The RSA algorithm based on the variable N which consisting of multiplying each of the P and q, which are relying on that of where to find the variable d, as the variable d is, hence the higher value of n. The variable d increases its size, the higher value of p and q the value of d increases, which means that the algorithm depends entirely on the adoption of the prime numbers because they generate a key d, depending on p and q are already primes numbers. The weaknesses of RSA algorithm when we use two prime’s number are the following points which are used to break the algorithm in most cases. These weaknesses are: (a) Small encryption exponent, if you use a small exponent like e=3 and send the same message to different recipients. (b) Using the same key for encryption and signing. (c) Acting as an oracle: there are techniques to recover the plaintext if a user just blindly returns the RSA transformation of the input. The idea of the new approach is, instead of using two primes numbers to generate a public key and private key, we use three primes numbers with reduced size, generates the variable N Large and the process of analysis of the factors is more difficult than the original algorithm, as well as, increases the ease of generating Public key and private key. The key strength of the RSA depends on the two prime numbers p and q. The process of factorizing of n will lead to gain the values of p and q. It is much easier to find two numbers from factoring n than finding the value of three numbers from n. In this case it is very difficult for the intruder to find the three values from factoring n. 1.7.1 Key Generation in Enhanced RSA (a) Choose three distinct prime numbers p, q and s. (b) Find n such that n = p*q*s.n will be used as the modulus for both the public and private keys. (c) Find the Phi of n, à ¯Ã‚ Ã‚ ¹ (n) = (p-1)(q-1)(s-1). (d) Choose an e such that 1 (e) Determine d which satisfies the congruence relation d*eà ¯Ã¢â‚¬Å¡Ã‚ º 1(modà ¯Ã‚ Ã‚ ¹(n)) In other words, pick d such that de 1 can be evenly divided by (p- 1)(q-1)(s-1), the Phi, or à ¯Ã‚ Ã‚ ¹(n).This is often computed using the Extended Euclidean Algorithm, since e and à ¯Ã‚ Ã‚ ¹(n) are relatively prime and d is to be the modular multiplicative inverse of e*d is kept as the private key exponent. The public key has modulus n and the public (or encryption) exponent e. The private key has modulus n and the private (or decryption) exponent d, which is kept secret .The encryption equation is c à ¯Ã‚ Ã‚ ¹ me (mod n) and the decryption one is m à ¯Ã¢â‚¬Å¡Ã‚ º cd (mod n). 1.8 Diffie Hellman This algorithm was introduced in1976 by Diffie-Hellman. The Diffie-Hellman algorithm grants two users to establish a shared secret key and to communicate over an insecure communication channel [10]. One way authentication is free with this type of algorithm. The biggest limitation of this kind of algorithm is communication made using this algorithm is itself vulnerable to man in the middle attack [11]. Diffie–Hellman establishes a shared secret that can be used for secret communications while exchanging data over a public network. The following diagram illustrates the general idea of the key exchange by using colors instead of a very large number. The crucial part of the process is that Aand B exchange their secret colors in a mix only. Finally this generates an identical key that is mathematically difficult (impossible for modern supercomputers to do in a reasonable amount of time) to reverse for another party that might have been listening in on them. A and B now use this co mmon secret to encrypt and decrypt their sent and received data. Note that the starting color (yellow) is arbitrary, but is agreed on in advance by A and B. The starting color is assumed to be known to any eavesdropping opponent. It may even be public. 1.8.1 Explanation including encryption mathematics The simplest and the original implementation of the protocol uses the multiplicative group of integers modulo p, where p is prime and g is primitive root mod p. Here is an example of the protocol, with nonsecret values in blue, and secret values in red. Small integers are used for clarity, but actual implementations require using much larger numbers to achieve security. Fig 1.1 Process of Diffie Hellman 1. p = 23 and base g = 5. 2. A chooses a secret integer a = 6, then sends B A = ga mod p A = 56 mod 23 A = 15,625 mod 23 A = 8 3. B chooses a secret integer b = 15, then sends A B = gb mod p B = 515 mod 23 B = 30,517,578,125 mod 23 B = 19 4. A computes s = Ba mod p s = 196 mod 23 s = 47,045,881 mod 23 s = 2 5. Bob computes s = Ab mod p s = 815 mod 23 s = 35,184,372,088,832 mod 23 s = 2 6. A and B now share a secret (the number 2) because 6 Ãâ€" 15 is the same as 15 Ãâ€" 6. Both A and B have arrived at the same value, because (ga)b and (gb)a are equal mod p. Note that only a, b, and (gab gba mod p) are kept secret. All the other values – p, g, ga mod p, and gb mod p – are sent in the clear. Once A and B compute the shared secret they can use it as an encryption key, known only to them, for sending messages across the same open communications channel. Of course, much larger values of a, b, and p would be needed to make this example secure, since there are only 23 possible results of n mod 23. However, if p is a prime of at least 300 digits, and a and b are at least 100 digits long, then even the fastest modern computers cannot find a given only g, p, gb mod p and g amod p. The problem such a computer needs to solve is called the discrete logarithm problem. 1.9 El-Gamal It was developed in the year 1984 by Taher Elgamal. It is an asymmetric key algorithm and is based on Diffie-Hellman key exchange. ElGamal encryption can be described over anycyclic groupG. The security relies upon the issue of a problem inGrelated to computing discrete logarithms [12]. Fast generalized encryption for long messages and data expansion rate are the two biggest advantages of this algorithm [13]. The chief drawback of ElGamal is the requirement for randomness and its slower speed [14]. ElGamal encryption can be defined over any cyclic group G. Its security depends upon the difficulty of a certain problem in G related to computing discrete logarithms. The Algorithm ElGamal encryption consists of three components: the key generator, the encryption algorithm, and the decryption algorithm. 1.9.1 Key Generation The key generator works as follows: It generates an efficient description of a multiplicative cyclic group G of order q with generator g. Sender chooses a random x from (1,†¦Ã¢â‚¬ ¦q-1) He computes h= gx A publishes h , along with the description of G,q,g , as her public key. He retains x as her private key which must be kept secret. Fig 1.2 El-Gamal Algorithm 1.9.2 Example of El-Gamal Algorithm: Fig 1.3 Example of El-Gamal Algorithm. Hash Functions, also known as message digest, are the algorithms that do not use any key. Based upon the plain text, a fixed length hash value is generated.Hash algorithms that are commonly used today include: 1.10 Message Digest (MD) algorithms It produces a hash value of 128 bit from an arbitrary length message. The MD series includes MD2, MD4 and MD5 [11]. 1.10.1 MD5 algorithm The MD5 algorithm was developed by Rivest in 1991 and is an extension of the MD4 message-digest algorithm and is bit slower than MD4. This algorithm results in a 128 bit hash value. It is mostly used in security based applications. MD5 is more secure than MD4 [15]. It is suitable to use for standard file verifications but it has some flaws and therefore, it is not useful for advanced encryption applications [16].

Motivation And Job Satisfaction At Airlines Commerce Essay

Motivation And Job Satisfaction At Airlines Commerce Essay On 23rd October 1946, a new airline was born. Initially registered as a pilot project in Calcutta, Orient Airways Ltd. had at its helm Mr. M.A. Ispahani as Chairman and Air vice Marshal O.K. Carter as General Manager. The new carriers base remained in Calcutta and an operating license was obtained in May 1947. Four Douglas DC-3s were purchased from Tempo of Texas in February 1947 and operations commenced on 4th June 1947. The designated route for Orient Airways was Calcutta-Akyab-Rangoon, which also happened to be the first post-war international sector to be flown by an airline registered in India. Within two months of Orient Airways operational beginnings, Pakistan was born. The birth of a new nation generated one of the largest transfers of population in the history of mankind. Orient Airways, along with the help of BOAC aircraft which had been chartered by the Government of Pakistan, started relief operations and transportation of people between Delhi and Karachi, the two capitals. Subsequently, Orient Airways transferred its base to Pakistan and established a vital link between Karachi and Dacca, the two capitals of the two wings of Pakistan. With a skeleton fleet of just two DC-3s, three crew members, and twelve mechanics, Orient Airways launched its scheduled operations in a fairy-tale manner. The initial routes were Karachi-Lahore-Peshawar, Karachi-Quetta-Lahore and Karachi-Delhi Calcutta-Dacca. By the end of 1949, Orient Airways had acquired 10 DC-3s and 3 Convair 240s which were operated on these routes. In 1950, it had become increasingly apparent that additional capacity would have to be inducted to cater to the growing needs of the sub-continent. Research Objective The purpose of this study is to investigate the impact of Job Satisfaction and Motivation of the employees employed by PIA (Pakistan International Airline). The idea of this study is to investigate and identify those factors which are causing high motivation and job satisfaction among the employees. This is a descriptive study based on the impact of motivation and jobs among employees employed by PIA. In todays fast paced era environment of the management is to how the managers can improve the level of motivation and job satisfaction of employees. So that the company attain a reliable and efficient workforce. The questions that are to be answered by this study are: How some employees are satisfied from their job as compare to others. How some employees perform better than others What are the ways through which management can improve the motivation of its employees Attracting, rewarding, awarding and motivating customers are a challenge. It requires better service, realistic performance, expectations and a supportive work environment Literature Survey Theories of Motivation Motivation theories are of two types i.e. Content theory and Process theory Basically content theory of motivation focuses on those factors which are involved with the individuals that energizes, directs, sustains and stops behaviour. To motivate people they determine the actualized and specific needs. On the other hand process theory describes and analyzes that how the behaviour on individual or person is stopped by those factors which are external i.e. energized, directed and sustained. Both theories have important impact on managers who are involved in the motivational process as per their job nature (Gibson et al, 2000). Kini and Hobson (2002) agreed with the distinction explained above between content and process theories which suggested that the theory of content is associated with the importance of internal elements which are identified and the prioritization involved with the individuals explanation of these elements. While process theory imposes on particular psychological processes underlying action and emphasized on explaining the functioning of individual decision system in order to relate it to the behaviour. Process theory of Motivation Process theory of motivation tries to explain and describe the factors which are external to the individual, that energize, direct, sustain and stop behaviour. The major theories of motivation are discussed above includes the following theories which are as follows: Social learning theory Operant conditioning Expectancy theory Equity theory Goal setting theory Job design theory Social learning theory Learning is typically the fundamental processes which are based on the behaviour and in turn, motivation. In organizations almost every individuals behaviour is learnt. Perception, attitudes, goals and emotional reactions are learned. Skills e.g. programming a system or counselling de-motivated employee can be learned. Basically meaning and uses of language used are learned. Learning is an ongoing process by which the relatively occurring changes in the behaviour as a result of practise (Gibson et al, 2000). Operant conditioning In another point of view learning occurs as a result of behaviour, and this learning is called operant conditioning. Late world famous behaviourist B.F.Skinner is the person closely associated with this type of learning that is operant conditioning. Many principles of this theory can help managers who attempt to influence behaviour. An important principle of learning is enforcement. Generally internal cause of behaviour is motivation while external cause is reinforcement. Positive reinforcement occurs when a positively valued incentives follows a response to a stimulus. Positive reinforcement can be anything that both increases the strength of response and induces repetitions of the behaviours that preceded the reinforcement. Negative reinforcement occurs when the performance of the behaviour is increased or diverted due to undesirable situation immediately after the response. Expectancy theory The real explanation of expectancy theory was developed by Victor Vroom. Early studies (about 50) tested the implication tested the accuracy of expectancy theory in predicting employee behaviour. The expectancy theory defined in vrooms concept is that motivation as a process governing choices among the alternatives forms of voluntary activity. From his point of view mostly behaviours are under control of the individuals and are persistently motivated. Expectancy theory is generally explained in four concepts: First and second level outcomes- the outcomes of the first level are resulting from behaviour that is linked with doing the job itself which includes turnover, quality of productivity, absenteeism and productivity. The outcomes of the second level are those events such as punishments and rewards that the outcomes of the first level are likely to produce such as group acceptance or rejection, merit pay increment and promotion. The reference to the individuals perception that the outcome of the first level is related with outcomes of second level is instrumentality. As seen by the individual the preference of the outcomes is valance e.g. a person mar prefer a 10% increment in the pay over a transfer to another branch. The outcome is that the in positively valent the offer is preferred and in negatively valent it is avoided. The individuals belief refers to the expectancy is concerned with the likelihood or descriptive possibility that a certain behaviour will be followed by a certain outcome such as; level of performance (Gibson et al, 2000:160-161). Equity theory Equity theory of motivation was tested and developed by J.Stacey Adams. The basic concept of equity theory of motivation is that the efforts and rewards of the employees are compared with others in similar work situations. Basically the theory of motivation is based on the assumption that individuals, who work for rewards from the firm, and are motivated with a perception to be equally treated at work. The maintenance of the employees perception of equity in the working environment is administered by the management. There are four terms on which the theory is based i.e. Person: the individual for equity or inequity is perceived Comparison with others: any individual(s) or group used by person as referent regarding the ratios of inputs and outcomes. Inputs: the individual characteristic brought by person to the job this may be achieved (e.g. skills, experience, knowledge and learning) or ascribed (e.g. age, gender, race). Outcomes: what person received from the job (e.g. recognition, fringe benefits and pay). The ratio of the inputs (efforts) to their outcomes (rewards) is equivalent to the ratios of other similar employees is the perception of the employees where the equity exists. When an individuals own ratio of inputs to outcomes could be greater or less than that of others, the ratio arent equivalent, inequity exist (Gibson et al, 2000: 164-165). The proposition of this theory is that the individuals are motivated to stabilize fair or equitable relationships between themselves and to change those unfair inequitable relationships (Kini and Hobson, 2002: 605). Goal setting theory Edwin Locke proposed that goal setting theory was a cognitive process of some practical utility. Edwins view was that an individuals intentions and conscious goals are the primary factors of behaviour. A goal is the action of an object i.e. its a person attempts to achieve. Locke also carefully determined the characteristics of the cognitive (mental) processes of goal setting which are as follows: The degree of quantitative precision (clarity) of the goal refers to the goal specificity. The degree of proficiency or the level of performance sought is goal difficulty. Goal intensity pertains to the process of setting the goal or determining how to reach it. Higher effort and performance results when people commit to difficult and specific goals rather than to vague commitments. Monetary incentives will affect performance only to the extent that such incentives influence the choice of goals and the extent of goal commitment. Goal commitment will interact with goal difficulty to determine performance. Goal setting is rather complex and difficult to sustain Goal setting works well for simple jobs (clerks, typists, loggers, and technicians), but not for complex jobs. Goal setting with jobs in which goals arent measured has posed some problems Goal setting encourages game playing. Setting low goals to look good. Goal setting is used as another check on employees. Its a control device to monitor performance Goal accomplishment can become an obsession. In some situations, goal setters have become so obsessed with achieving their goals that they neglect other important areas of their jobs (Gibson et al,2000) Job Design Theory Task characteristic theory (job design) (JD): Seek to identify task characteristics of jobs, how these characteristics combined in order to form jobs that are different, and their relationships to employee motivation, satisfaction, and performance (Kini and Hobson, 2002: 605). The Hackman-Oldman job characteristics model, a derivative of this theory developed in Japan which contends that providing employees with task variety, task identify, task significance, task autonomy, and feed back, will lead to three critical psychological states (experienced meaningfulness of the work, experienced responsibility for outcomes, and knowledge of the actual results) which, in turn, will lead to high internal motivation, high quality work performance, high work satisfaction, and low absenteeism and turnover (McAfee, Quarstein, and Ardalan,1995). The impact of this theory for management is in order to keep the employees satisfied and motivated in their jobs, so managers must: Employees should be provided with a variety of skills on their workplace Employees should be given independence and freedom to schedule and plan their tasks One on the most important part that managers must provide constant feedback as to how employees are measuring to set goals. Content theories of Motivation Employees on their work bring their feelings, beliefs and perceptions which determine their modus on daily operation and daily tasks. It is the reason that managers constantly seek to understand, explain the nature of employees behaviour is being predicted by the managers. Content theories of motivation explain and describe factors within the person that energize, direct, sustain and stop behaviour. The major theories of motivation are explained as under: Maslows need hierarchy Aderfers ERG theory McClellands learned need; and theory of needs Maslows Hierarchy of Needs The widely cited and discussed motivation theory i.e. the need hierarchy model is presented by Abraham Maslow. In this model the lowest level needs are the physiological needs, and the highest -level needs are for self-actualization. Maslow defined human needs as under: Physiological: the need for water, food, shelter and relief from pain. Safety and security: the need for freedom from threat and safety of life. Belongingness, social, and love: the need for friendship, affiliation, interaction and love family etc. Esteem: the need for self-esteem and for respect from others Self-actualization: the need of fulfilling oneself by maximizing the use of abilities and skills. Maslows theory assumes that an individual attempts to satisfy the more basic needs i.e. the physiological needs before directing the behaviour towards satisfying upper level needs i.e. self-actualization. Lower order or level needs must be satisfied before a higher order need such as self-actualization begins to control an individuals behaviour. According to Maslow, a satisfied needs leads motivation or it motivates. Aldersfers ERG theory Alderfer agreed with Abraham Maslow that needs are arranged in hierarchy. His proposed hierarchy of needs involves three sets of needs which are follows: Existence: the needs which are satisfied with such factors as water, air, pay, food and working conditions. Relatedness: the needs that are satisfied with the love of family, friends, social and interpersonal relationships. Growth: the needs which are satisfied by an individual making productive and creative contributions. Three needs presented by Aldefers existence (E), relatedness (R), and growth (G), or ERG relates or correspond to Maslows in the existence needs are similar to Maslows physiological and safety categories; the relatedness needs are similar to the belongingness, social and love category; and the growth needs are similar to the esteem and self-actualization categories. Maslow proposed that unfilled needs at one level are most of the importance and that needs on the next higher level arent activated until the currently need s are fulfilled or satisfied. In contrast to Alderfers ERG theory says that in addition to satisfaction-progression process that Maslow proposed, a frustration regression process is also at work by the same time. Alderfer and Maslow need theories of motivation have been criticized. Need theories have been regarded as simple, very easily expressed views of human behaviour (Gibson et al, 2000). McClellands learned theory of needs Learned theory of motivation was proposed and presented by David C. McClelland and this theory is closely related with learning concepts. David believed that many of our needs are acquired from the culture of a society. There are three learned needs which are the need for achievement (n Ach), the need for affiliation (n Aff), and the need of power (n Pow). It was suggested by McClelland that when need is strong in an individual, the effects that arises is to motivate him or her to use behaviour leading to satisfaction. Motivation and Job Satisfaction Based on perceptions, attitudes, personality and learning motivation plays a very important role in understanding behaviour. Job satisfaction is a result of employees thinking that how their jobs provide them what is important. According to (Mitchell and lasan, 1987), it is recognized that in the field of organizational behaviour that job satisfaction frequently and most studied attitude. Motivation and job satisfaction can be studied through several approaches content theories and through reinforcement theories. Specifically the term employee motivation is complicated and difficult to define. The liveliness of an organization whether its private or public, comes from the motivation of their workforce and their abilities plays crucial role in their work performance (Lewis, Goodman and Fandt, 1995). Reinforcement Theories Reinforcement is explained as any effect that causes behaviour to be repeated which can be either positive or negative (Naylor, 1999, p.540). Skinner (1939, 1971) conducted several studies and came up with the idea of conditioning model which proposed that if pleasant consequences follow a behaviour, the behaviour will tend to continue whereas, if unpleasant behaviour will tend to continue then the behaviour will tend to continue whereas, if unpleasant consequences follow a behaviour the behaviour tends to stop. (Luthans Kreitner, 1985). Reinforcement theory relies on two assumptions: first, behaviour of human is determined by the surroundings and environment and second, human behaviour is subject to observable laws. The Law of effect is the foundation of the reinforcement consequences whether are negative or Positive behaviour will be repeated (Lewis et al, 1995). Job Satisfaction The work motivation theories that have been just explained have been used for centuries just to explain that what motivates individuals to work. And the same theories can be used to find out that how other people are satisfied in their jobs. For example as Maslows Hierarchy of needs explains that if people are happy and satisfied o their jobs if there needs are met. And learning theories proposed that by seeing others rewarded for certain standards of performance people would be motivated. And on the other hand if people will see their co-workers are being punished for not meeting the standards of the organization or not fulfilling the requirements of the organization they will try to work harder to avoid the pain or insult of being punished and so on. Some people say that job satisfaction is simple that how people feel regarding their jobs and different phases of their jobs (Sector, 1997). This assumes that employees will be satisfied or happy if they like their jobs. Another view of Job Satisfaction is that happiness is associated with doing a particular job as expressed by the job-holder (Gibson et al, 2000). The feelings and attitudes one has about ones job whether positive and negative, good and bad are likely to contribute for the development of feelings of satisfaction (Riggio, 2000). Methodology The methodology that has been adopted for the related subject study is precisely described below: Industry The industry which I select for the research is the Airline Industry. Population and Sample size The population of the industry was very large therefore convenience sampling has been done for this study. The sample consists of individuals who are working in PIAs human resource department and Information technology department on middle level and lower level employees. Respondents Sample drawn from this industry is 60 respondents. From them 30 are working as a middle level and 30 are working as lower level employees. The respondents belong to departments i.e. human resource department and information technology department. Data collection method For the purpose of data collection an instrument (i.e. questionnaires) will be used. Data Analysis Data will be analyzed on the basis of the employees response to the questionnaire, in which bar and pie charts are a part of analysis

Saturday, July 20, 2019

Market Segmentation Essay -- essays research papers fc

  Ã‚  Ã‚  Ã‚  Ã‚  To reach different markets or to promote your products to different locations or people one has to use a method called market segmentation. â€Å"Market segmentation describes the division of a market into homogenous groups which will respond differently to promotions, communications, advertising and other marketing mix variable† (Cumming). Market segmentation is extremely important for companies around the world. If a company doesn’t research the area in which they are going to market or they put a product that is either to expensive or to elaborate in an area that can’t afford that then they will fail as a company. In my paper I will discussion why market segmentation is used in around the world, the types of segmentation, some techniques used to make segmentation work the best.   Ã‚  Ã‚  Ã‚  Ã‚  Market segmentation is to divide the market into smaller segments. The reason for dividing the market is to make it easier to address the needs of smaller groups of customers, particularly if they have many characteristics in common (Breen). It is easier if you find things in common that are the same such age, gender, benefits, lifestyles, etc. We also use market segmentation to find niches or to identify under-served or un-served markets. â€Å"Using niche marketing, segmentation can allow a new company or new product to target less contested buyers and help a mature product seek new buyers† (Cumming). Niche marketing can also take a normally large, identifiable group within a market, break it into sub groups so marketing can become easier. Niching offers smaller companies an opportunity to compete by forcing their limited resources on serving niches that may be unimportant to or overlooked by larger competitors (Mariotti). In many markets today, niches ar e normal, as agency executive observed, â€Å"There will be no market for products that everybody likes a little, and only for products that somebody likes a lot (Mariotti). Market segmentation is also used to be efficient. â€Å"More efficient use of marketing resources by focusing on the best segments for your offering – product, price, promotion, and place (distribution). Segmentation can help you avoid sending the wrong message or sending your message to the wrong people† (Klein). The question is when do we use market segmentation. The answer is, anytime you suspect there are significa... ...ptually distinguishable and do they respond differently to different marketing mix elements and programs? The market segments have to be actionable: Can effective programs be designed for attracting and serving the segments. (Mariotte).   Ã‚  Ã‚  Ã‚  Ã‚  Market segmentation is one the most important parts of the marketing mix because of its ability to sell specific items to specific people effectively. Works Cited Breen, Bill, â€Å"Desire: Connecting With What Customers Want† Fast Company: Issue 67 Febuary 2003 page 86; Gruner + Jahr USA Publishing  © 2003 (www.fastcompany.com). Cumming, Betsy, â€Å"Cut Out For Success: Targeting Segments Can Help You Claim A Bigger Share of the Overall Market† Sales and Marketing: January 4, 1994; VNUeMedia Inc.  © 2003 (www.salesand marketing.com) Klein, E. Karen, â€Å"Advertising vs. Marketing† Business Week: October 9, 2003; McGrain – Hill Companies  © 2003 (www.businessweek.com). Mariotti, L John, â€Å"Maximize Your Marketing Dollars† Fortune Small Business: Monday, January 22, 2001; Time Inc  © 2003 (www.fortune.com). McElligott, Tuim, â€Å"Customer Specific: The Art and Science Behind Amdoc’s Market Segmentation† Telephony: October 16, 2003

Friday, July 19, 2019

Why did King Victor Emmanuel II invite Mussolini to power in October 1 :: essays research papers

"Fascism...was a super-relativist movement with no fixed principles, ready for almost any alliance." (Denis Mack Smith in 'Mussolini' - 1981) Background Italian unification was in 1861, from this point up until Mussolini came into power in 1922 Italy was ruled by 'parliamentary liberals.' Liberals had never solved the problems of the economically backward South, therefore they were resented there. It can be suggested that the liberal regimes did little to raise the standard of living for the majority of Italians. Mussolini was a 'renegade socialist' with a strong desire for power. His aims and doctrine were difficult to pin down. He was intolerant and embraced violence, therefore diametrically opposed liberalism. Mussolini's Rise to Power Mussolini's fascist regime (an extreme change for the nation from years of liberalism) took control without any substantial opposition. There were many factions in Italian politics who absolutely opposed fascism but a 'united front' was never formed as the Communists, Socialists and the Catholics had too many unresolved differences with each other. They were too busy arguing amongst themselves to agree to fight fascism together, the one way they could defeat it. D'Annunzio's regime in Fiume had openly defied the liberal government and had been well supported by military officers and sections of the ruling classes. Mussolini witnessed this popular appeal to nationalism with great interest. Mussolini realised towards the end of 1920 that he had to make deals with certain parts of his opposition in order to succeed in parliament. Mussolini embraced the political right (despite his left wing background) as he knew it would unite his own party whose strength would appeal to many in Italy who had completely lost faith in the weak liberal government. Mussolini was an opportunist who gained the support of different parties with calculated concessions. For example, before the election of May 1921 he made 'conciliatory gestures' towards the Catholic Church. His turn away from the left had meanwhile also attracted many liberals who feared a Marxist revolution more than anything. Thus, as Mussolini looked like restoring the proper rule of law (rather than instigating a revolution) they began to see his accession as not so awful after all. He appealed to the Conservatives by assuring them that he was primarily in favour of the concepts of war and empire with far less emphasis on revolutionary tendencies. Mussolini had originally been a Republican but in a speech on the 20 September 1922 he 'grudgingly' accepted the monarchy. He knew that he must do this to get to power as although many in the military supported him their primary allegiance was to the throne.

Segregation in The Color Purple Essay -- The Color Purple Essays

In the film â€Å"The Color Purple†, segregation plays an important role and the differences between black people and white people are shown through race and life. The Color Purple focuses on the lives of several African American women who are faced with abuse, violence, and cruelty. The fim is set in Macon County Georgia and there are two main characters’ Celie and her sister Nettie. Celie is the character the movie is centered around and she is also the film’s narrator. The story is based on Celie’s life and the many different issues along the way that she has encountered such as being raped by her father over and over again, abused by her father and forced into marriage at fourteen to another abusive man (Albert) who didn’t even want to marry her but w...

Thursday, July 18, 2019

Small Change

At the end of September, Malcolm Gladwell, a staff writer for the New Yorker magazine and author of The Tipping Point and Blink, published a piece, Small Change: Why the Revolution Will not be Tweeted, in that magazine making the argument that social media tools like Facebook and Twitter were overhyped as agents of social change at best and at worst, completely useless in helping move the kind of high-risk actions that are strong enough to bring down governments and change cultures. Using the wave of sit-ins that swept the South in 1960 during the Civil Rights Movement as his prime example, Gladwell rests his thesis upon two points.First, movements and high-risk socio-political actions are carried out by people who have strong ties to each other or a strong level of commitment to the movement itself and the actions they undertake serve to reinforce those ties. Second, the momentum and strategic direction of movements requires some level of hierarchy and organization so the energy has a chance of winning the kinds of change the participants want to see. Given these two requisites for large-scale social change, he says, there is no way that social networks will actually be able to play a role in amplifying or directing social change.This essay engendered a firestorm of criticism from activists who use Facebook and Twitter as part of their daily work in organizing for progressive social change in the America. Some of it was the usual triumphalism of the tech geek. Some of it was an interesting mix of â€Å"old guys don’t get it† and â€Å"it's not the 60’s anymore so don’t expect change to look like it did 50 years ago†. None of these responses dealt at all with the main points of his thesis, strong-ties and the primacy of closed, hierarchical organizations.However, an increasing number of responses have tackled those issues and done it from the point of view of activists and organizers working hard to change the public policy cl imate of the United States. These responses range from top-level examination of how Gladwell positions his understanding of Twitter and Facebook within his own thesis on ties and hierarchy to nuts-and-bolts examinations of how modern progressive organizations are fighting for and winning progressive change using organizing methodologies that deploy Twitter and Facebook as tools in a tactical arsenal that increasingly includes a dizzying array of options.

Wednesday, July 17, 2019

History of political parties in the United States Essay

For some years, there occupy been ii major semi regimenal parties in the joined States. Todays American governmental parties, Democratic company and the re humankindan companionship offended from the national and anti fed successionl parties. However, although no just about other major semipolitical parties arrive developed, the constitution of the join States does not restrict creation of to a greater extent parties. The reason for dominance of the united States government activity by the democrats and the republicans has been due to the belief among the Americans that their candidate will win only if they are from a major political party.The inception fathers of the unify States of America had a disconfirming view of political parties. They were influenced by unblemished republicans who argued that political parties would promote factional pleases and misconduct of public officials. However, the Jeffersonian and Hamiltonians later emerged which was followed by the fed seasonlists and anti federalists which conduct to the kindation of a federal government towards the end of 18th ascorbic acid.As the political leaders tried to mouth issues related to sparingal and social interest of different regions, they mobilized support from different regions to well(p) political influence during the pick. The federalist foc employ on the interest of the elites in in the altogether England and states in Middle Atlantic. They advocated for a much than brisk government that will secure and have got room for their economic development. The republicans, who were anti federalist, on the other hand promoted social pluralism and support commercial policies that promoted an economy prevail by agriculture (Boyer, space-reflection symmetry 1).Although the fight among the Federalist Party and the republican Party was severe, the activities of political parties in the early nineteenth century were trammel and the voters turnout was low. Parti es did not develop extensive systems to promote their interest epoch voters were little committed to their parties. In 1815, the Federalist Party collapsed while the Republican Party demolish into different factions. In 1820, political parties reappeared with more struggles and battle for authority and influence in the central government. By mid 19th century, a need for an organized electorate and preference process had evolved.The Republicans and the Federalists evolved into the Democrats and the Whigs respectively. A Democratic electric chair, Andrew Jackson, was elective in 1828 who favored a modified government. He was contrasted by the Whigs who back up an economically oriented government. During the like season, the political parties were greatly influenced by religion. Political parties employ campaigns extravaganza and newspaper to spread their ideologies and forgather support among the voters while the voters increased their fealty to the parties and large de pend were involved in elections. The authorities of the political parties increased.The presence of electoral College in the constitution restricted the number of major political parties while parties limited the number of candidates at the local aim (Aldrich, p 126). war between political parties became unusually intense after the gracious war. The fight was between 2 parties in an election that was considered the best structured and to the highest degree ally in the history of the United States. With the increased industrialization, the federal economic policies were back up by the economic elites which cal lead for the Republican to fix their pro commercial positions.On the other hand, the Democrats had support from the boorish states in the entropy and among the town immigrant applicationers who had run away from the Republicans hostility. However, the Democrats did not win all support from the agricultural states and the laborers while the Republicans were favored by tendentious dedication, war memories and hostility of ethnic themes. The little(prenominal) economically em business officeed workers and farmers in the due west did not give room for the growth third parties in the populist era and the gilded age.These parties included the Greenback labor in the gilded age and the democrat Party in the populist era. In the mid 1890s election campaigns, the Democrats led by Bryan attracted these small factions in a bid to beat the Republicans in the 1896 familiar election. However, this strategy did not work as they were beaten by the Republicans led by McKinley. This election alter the politics of the United States and the Republicans dominated the American politics for a long time (Payan, pg 23).The advancing era also saw or so changes in the political parties. More and more economic elites started gaining interests in politics and political parties. businessmen combined efforts with political reformers to strengthen the be anti-party opinions among the Americans and completely changed political culture in the United States. Using their anti partisan ideologies, they pushed for politics which are unselfish and rottenness free. They pushed for legislations that limited the parties control over nominations and election processes.This was a big light speed for the political parties since this was their major source of storehouses to fund their activities and this limited the operations of political parties. This buy the farm had far reaching consequences on political parties (Boyer, mirror symmetry 8). In 1930s, major reshuffle of ideologies affected political parties. Among the Democrats, a group of urban politicians rose to seek federal welfare policies which were a major blow to their dedication to limited government. The great low also led to fusion of the electoral systems which had a negative impact on Republican Party.Led by Roosevelt and his New Deal promise to the Americans, the Democrats took the ad vantage of the note by expanding the lineament of the central government and promised the Americans prosperity socially and economically. However, they received several(prenominal)(prenominal) resistance from the south who opposed the at large(p) democrats idea about civil proper although many republican loyal African American defected to support the New Deal. For survival, some of Republican politicians adopted democrats ideas as the Republican Party lost popularity among the voters.However, they were able to liven up their political influence during the reign of President Eisenhower in mid twentieth century. In 1960s, Democrats rose to power and with the backup from some liberal Republicans they promoted their social policies including civil rights of minority groups (Schlesinger, p 177). Some political alignment took place in 1960s where several republicans defected and joined the democrats while many tweed Americans in the south defected and became republicans. The effec ts of progressive era event become more and more evident and political parties were becoming little influential in the election process.The coming of television as a center of passing political ideologies also transformed political parties. The identification of voter with political parties and loyalty lessened as voters became less settled. Voter reacted to every days political crisis and supported a more charismatic politician as opposed to pegging on party loyalty (Boyer, Para 10). The alleged abuse of office and powers by the politicians, such as in the Vietnam War and the involvement of White House officials in the Watergate scandal which accompanied defections from political parties destabilized the electoral systems.The antigovernment disposition of the public favored the republican in the 1980s which led to election of the conservative President, Reagan. The Democrats were accused of poor policies that led to inflations and riots over civil rights. Reagan administration weakened the Democrats policies which increased the polarity between the two parties in terms of ideologies. In 1994, the Republican reacted against the incumbent democrats and controlled the congress for the first time in four decades. However, their gains were limited since the democrats dominated the presidency in 1990s.Towards the end of the 20th century and beginning of 21st century, the role of political parties deteriorated where voters shifted parties depending on the candidate (Boyer, Para 10). Today, the Republican Party and the Democratic Party controls the politics of the United States. However, the party loyalty has completely faded in many parts of the country where voters supporting a candidate and not the political party. masses have had different views about the hereafter of political parties. Some people elicit that the current political parties will not survive for the next generation while other opposes that view.Others have suggested some conservatives white thorn break away from the current parties and form a third major party. last Political parties have played an high role in the politics of the United States for many years. They unite people with same political principles and have always been used as channels of change. However, the American politics have been dominated by two parties all way long. Many changes have however affected the political parties. The power of influence of political parties reduced importantly in the 20th century where voters became less loyal to their parties.

Tuesday, July 16, 2019

Adapting to Change

Adapting to Change

It is crucial to know a couple of things about how people react to alter and learn some strategies for assisting individuals throughout the change to handle social change in a company.Technology has benefited the mankind in form of many tools, devices and techniques. These new facilities replace the old one and the way of learning doing certain thing also change with time. Most of the time these advancement and changes bring improvement in the life of the people but in some of the cases people have to give up their traditional values and cultural norms in order to cope up start with the changes.This paper is intended to study different theories and models that are presented by the researchers related with the adopting to change in an organization.Changes could be the hardest to adjust to.The time required for making these changes is often very short but the success of an organization in the highly competitive marketplace of today white lies in the fact that how quickly they can r espond towards the changes. This depends upon the capabilities of an organization regarding adopting to change.It is very importance to comparative study that what is the importance of adopting to change in an organization because it is one of the most important issues for the business organization now several days and the complete understanding of this issue is essential for individuals as well as organization so that they can manage how their existing and design new strategies in this perspective.Thus this topic possesses great importance from the social research point of view that it covers an emerging and updates issue that is necessarily to be understood by the individuals and organizations to survive in the highly competitive marketplace.

Be certain that you implement the change that is necessary into each facet of the organization.1.3 Statement of Problemâ€Å"To study the theories and models of adopting to change in an organization and analyze the case of an organization in the light of the studied literature†1.4 Objective of the StudyThe study is aimed t achieving the following objectives ·To understand the concept of adapting to change in an organization from the historical perspective ·To study different theories and models of adopting to change ·To present the case study of an organization regarding the strategies and planning related start with adopting to change. 2.In reality, it is almost a workplace constant.   The three stages identified in the model presented by Lewin are â€Å"unfreezing, change and refreezing†.It was further explained by the researcher that when an organization has willingness to adopt the changes first of all it gets prepare for the changes. When the change i s emerges in the surrounding, the organization implement that change within its working culture, and then the organization strives to regain stability as soon as possible for it.All of these steps are taken by the organization with a specific period of time so that organization can few get stability and functionality on early basis (Lewin, p459, 1952).

Transition can occur quickly or gradually.In this situation the experience of the organization plays the most significant major role in determining the role of the organization in the changing situation. Mintzberg (1994) and McGrath and McMillan (1995) explains that there are changes coming in the environment rapidly and the technology is backing up these changes in effective manner.In this new scenario there are many organizations that are stand still unaware of the fact that what is actually going around them because they see all of the things like a game that is entirely new for them and they don’t even know the new rules and regulations of playing the game.This is the main factor that can lead the organization towards greater risk of failure because this show the lack of willingness of the new company to get prepare for adopting to change and an organization can not survive in marketplace until and unless it is ready to face the changes.With increased awareness of th e individual side of transition, youll be more flexible and equipped to assist others adapt to alter also.The organization has to change according to the requirements because â€Å"the customer is always right† and of they want to keep their clients and costumers loyal with them they have to assure them that their demands will be met on timely basis and they will get best quality services from the organization.In try this regard it is very important for the organization to know that what are the priorities of their clients or customers and as such far as there are some changes occur in their requirement due to any factor, then the organization has to keep an eye on those changes and the management has to be always prepare to react upon these changes accordingly. Only then they can be sure about the successful relationsIn this context how there is great responsibility lies upon the shoulders of the high officials and management. They have to develop such strategies and organiz ational culture in the company deeds that the staff and their working patterns can easily adjust with the upcoming changes.

No 2 people manage stress just the exact same way.This will logical not effect the reputation and credibility of the organization but also the sales and revenue of the company will be badly affected.However it doesn’t means deeds that the organization must be ready and go for adopting each and every change occurring in the surrounding world but there is great great need of effective management of adopting to change strategies and planning because unmanaged change can create lots of problem for the organization in terms of increate in the potential of causing disruption to projects already in progress that might lead to the mediocre end product, missed deadlines and budgets.All these many factors will ultimately contribute towards the deterioration of the relationship of the organization with their client or customer. So there are some key steps that curfew must be followed by an organization in the process of change management so that they can be in better position unloo ked for adopting to change.Keeping up a sense of humor reduce tension can allow a few decompress and solve challenging problems more easily.Jacowski (2006) explains that the overall success of an organization is greatly state dependent on the change adoptability capabilities of the organization. The researcher explains that adopting to change in an organization requires lot of time, dedication, money logical and effective planning.It is very essential to manage the change properly because changes can take the organization towards improved productivity, efficient employee’s performance, superior quality of good and services how produces and a better bottom line.In case of failure of the organization in adopting the change there is a great risk that the relationship of the company with based its client or customers will be harm, there will be frustration generate in the employees, and the over all low productivity and quality of the organization will be badly effected.

The ability is a significant quality for each one of us.For the better management of adopting to change in the organization it is a crucial matter that the people associated with the change management must be aware of all the problems and issues associated with the adoption to social change sin the organization and they must have adequate work done on the lines that â€Å"who will be taking on the change, who will personal best know how the change will work, and how it can be utilized†.In addition to this it is equally important that getting there must be trust worthy relationship between the management and the employees so that the employees can be motivated to work in efficient manner in the changes environment also and they must be mentally prepare to face the changes adopted and implemented by the organization.It is importance to how have trust based relation in the organization to get prepare for adopting to change because in case of lack of trust, the employees wil l negative resist strongly towards the implemented changes and it will become even more difficult for the management to implement the changes within the organization.Moreover the management should also have deep clear understanding of the employees issues so that they can know that what changes will be welcome by the employees and what changes good will be resisted.Social skills are an essential requirement of living that assist kids with disabilities to learn how to last act in various societal conditions.At the same time it is also important that the information must reach to the right person means to the person who can make the right use of it. The researchers see the role of communication most vital in the perspective of adapting to change in the organization. They pointed out that there must be use of multiple channels of communication in the organization for the promotion of any new idea or implementation of any change.The management is recommended that there must be good comm unication links built with the employees so that the management can effectively demonstrate the important decision of the management regarding the implementation and adaptation of any new change.

Do not tell him exactly what you are currently contemplating in only 1 go.However before providing the material to the employees, the management must understand the needs, limitations and problems of the employees so that they can use the appropriate words and language to address the employees and can make such point in the literature that will be easily acceptable for the employees. Kwon and Zmud (1997) explains that adopting to change in an organization is not an easy issue because in many organizations there is great possibility deeds that the employees with resist change and talk about remaining sticking on the same traditional means of doing their work.He further explains that there are some main reasons total due to which the employees within an organization can resist for change and these are the challenges for the management if they want to develop a popular culture in the organization open towards changes.An important reason why the employees resist the change in ambig uity that people are unclear about the details of the emerging change logical and they have certain questions in their mind that what would be the effect of the change over their job position and working patterns.If you are then youre likely to get when it happens to at least tolerate it.Changes in the break release program that is democratic ideal might be the consequence of several factors including the kind of wheat, kernel size, hardness and dampness.