Wednesday, July 31, 2019

Individual Assignment Essay

Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical approach, which can be implemented, into a platform. The strengths and weaknesses of each method that is selected will also be discussed within the summary. 2 Brief Overview In order to better understand the reasons for discovering, mitigating and preventing these attacks, it is necessary to first review what exactly Denial of Service and Distributed Denial of Service attacks are and why these specific journal articles were selected for this assignment. DoS and DDoS attacks are extremely popular cyber attacks launched by attackers because of their effectiveness and ease. The goal of a DoS attack is for the attacker to render certain specific resources of the victims’ computer or server unusable or make them unavailable. The attacker does this by sending large amounts of traffic that appear to be legitimate request to the victim. As a result, the victim’s computer or server is tangled up and that particular resource cannot be used. These attacks expose a significant loophole not just in certain applications, but loopholes in the TCP/IP suite (Joshi & Misra, 2010). A DoS attack only occurs when a resource on a computer or network is slowed down or stopped completely by an individual maliciously. A DDoS attack is very similar to a DoS attack. However, this form of attack is launched on multiple computers or devices in an organized manner. The goal, once again, is to attack a specific target or multiple computers and servers and make them unavailable for use. The first ever reported DDoS attack occurred at a University in 1999. From then on, these attacks have become increasingly more complex and sophisticated. Their widespread effect has ranged from simply slower speeds on websites, to financial institutions losing millions for not being accessible to customers. The journal article â€Å"DDoS Prevention Techniques† was chosen because it does a fantastic job of explaining the differences between the two attacks, multiple DDoS tools that attackers use, and lastly ways to prevent and defend against the attacks. The second article selected is titled â€Å"Prevention of Attacks under DDoS Using Target Customer Behavior. † I selected this article because it not only gives an overview of this form of attack but also a specific method of protecting a potential server by blocking DoS attacks with behavior based actions. The last article I chose â€Å"A Novel Technique for Detection and Prevention of DDoS† also gives a brief overview of the attack as well as a specific method to help filter DDoS attacks on online banking websites. 3 Article One The article â€Å"DDoS Prevention Techniques† mainly centered around DDoS attack and the methods of preventing them as well as the tools that criminals use to execute these attacks. One example of a tool that these individuals use is Trinoo, which can be used to, â€Å"launch a coordinated UDP flooding attack against target system† (Joshi & Misra, 2010). Another tool that Joshi & Misra discussed was Trinity. This DDoS attack tool is IRC based and uses flooding methods of the TCP SYN, TCP RST, TCP ACK request. This tool not only can flood the TCP/IP but also flood the UDP and IP Fragment. This article offers various forms of preventative methods against DDoS attacks. They separated them into two groups: General Techniques and Filtering Techniques. Since the article gave a plethora of examples of general techniques I will discuss two of them as well as the advantages and disadvantages to these practical approaches. One method of preventing against DDoS attacks is â€Å"disabling unused services. † Attackers can’t take advantage of something if it is not available to them. So, the fewer applications and open ports that are on a given host, the less likely an attacker can manipulate any vulnerability on that host. Therefore, if a network application is unnecessary it should be disabled or closed immediately (Joshi & Misra, 2010). The advantage of this approach is that it minimizes the attack surface, thus protecting the host from receiving certain request from ports that can be used to flood the system. The disadvantage to this approach is that you limit the amount of applications you may need to help run your organization more efficiently. Another method of preventing these attacks is by using a firewall. A firewall can help mitigate against simple DDoS attacks by using simple rules such as implicit deny, or deny any for certain ports and IP addresses. However, the disadvantage of using a firewall to mitigate attacks occurs when sophisticated attacks are launched on ports such as Port 80 used for web traffic. A firewall, cannot tell the difference between legitimate traffic and malicious traffic that comes through the port (Joshi & Misra, 2010). This can lead to an attack still being carried out if the firewall cannot decide what is good and bad traffic. One filtering technique that was discussed in the journal article was the technique of â€Å"History Based IP Filtering. † During normal function, traffic seems to stay balanced and stable. Yet, during most DoS attacks they are carried out with IP addresses that have never been seen before on the network to flood the system. This form of filtration relies on an IP Address Database (IAD) to store the IP addresses that are used frequently. If an attack is launched and the source address does not match any in the IAD the request is dropped. The advantage to this form of protection against DDoS attacks is that it will keep unknown IP address from ever reaching the host. However, the draw back is that it will not keep out legitimate or real IP address that are already in the database. Also, â€Å"Cost of storage and information sharing is very high† (Joshi & Misra, 2010). So if cost is an issue for an organization, this method may not be best. These methods can be implemented fairly easy for any organization. Most security professionals should already have these measures in place such as firewalls and minimizing the attack surface with an emphasis on disabling unnecessary services. History based IP filtering is a costly alternative to those methods but can be an additional form of security. 4 Article Two The second article that will be discussed is titled, â€Å"Prevention of Attacks under DDoS Using Target Customer Behavior. † This article discusses a method using an algorithm to determine if request to a specific server should be blocked or allowed in real time to mitigate the attack. The algorithm is used to maintain a list of users and to stop attacks from unknown users. The purpose of this tool is to prevent only authorized clients onto the server. This method accomplishes this by first determining which category the requesting client should be registered or non-registered. The tool uses an anomaly-based system during peak times to help determine if certain requests are deemed malicious or not. A client will deemed malicious if the client sends repeated request during peak hours and deemed an anomaly client, or possible attacking client (Kuppusarny & Malathi, 2012). This tool can track which request made on the server are authorized or unauthorized. Once the request is deemed unauthorized, the client is then placed in a group of non-registered users and blocked temporarily until the peak time is finished. This proposed method also features a count system for the amount of request a client may attempt, which are â€Å"Access Count† and â€Å"Warning Counts. † The article explains this in depth by stating, â€Å"The access count is the count that can be incremented every time the client sends the request. The Warning Count is the count that can be incremented once the unregistered client sends anomalous request† (Kuppusarny & Malathi, 2012). This count system helps to determine if the request are legitimate and if so are only temporally blocked during peak times in order to keep systems running and not flooded with request. This feature also presents a permanent block alternative as well. This occurs once the warning count reaches it’s threshold (Kuppusarny & Malathi, 2012). This can be extremely useful when defending against DDoS attacks because it works in real time. The chart below illustrates how this method is carried out for all users trying to request information from the server. This tool could easily be implemented for any organization looking to defend their systems as well as monitor customer and client user data. The only disadvantage that may occur while implementing this will be the temporarily lockout mechanism that legitimate users may encounter if they enter too many incorrect requests. Inconvenience for some users is the only drawback. However, this approach is extremely promising because it does not completely block IP addresses like some filtration systems. They are placed in a certain unauthorized category away from authorized clients and systems. And once they meet certain requirements their request may be authorized if they do not go over the warning count. Also as an added security feature if the client goes over the warning number of request and is also unauthorized they are blocked completely. 5 Article Three The final article that will be discussed is titled â€Å"A Novel Technique for Detection and Prevention of DDoS. † This article was dedicated around a specific method for detecting and preventing DDoS attacks. This method focused on using the Hidden Markov Model. Very similar to the previous method in being an anomaly based system that uses request behavior to block or authorize users. This method also uses an algorithm to track user behavior and determine whether the requests are legitimate or an attack. However uses a different form of authorizing request before allowing access into the system. During the Anomaly Detection Module of the system when resources are scarce and the server is under heavy traffic the filter is applied. The system uses a history to maintain each of the client’s IP addresses. If â€Å"unusual† behavior is detected through the algorithm the server then goes into a special detection mode. It, â€Å"reply’s with the captcha to that client. † And if a correct CAPTCHA response is not received within three responses, it then checks the request history sequence. If the difference between the request for the CAPTCHA is less than the threshold allowed, the client is blocked. (Patil, Salunke & Zade, 2011). This model is a great tool in defending against DDoS and also monitoring traffic on a server as a whole. When traffic begins to reach its peak this system can help alleviate between legitimate and flooding traffic. This model was put to the test in this article with a fake bank system. The testers used a script in java that repeatedly requested the log in page for a fake account. The server responded with CAPTCHA pages to verify if the requester was legitimate. After three failed attempts the IP address was blocked. This type of method should be implemented across systems everywhere. The only foreseeable disadvantage would be from those users who enter the wrong CAPTCHAs more than three times and are blocked out of the system. Other than that this method would be a great tool in the defense against DDoS attacks. 6 Conclusion Denials of Service and Distributed Denial of Service Attacks have proven to be a huge hassle for security professionals. Criminals are becoming more sophisticated in their attack schemes and are leaving security teams in a never ending game of catch up. It only takes one loophole in a defense strategy for an individual to wreck havoc on a system. None of these methods will stop DoS and DDoS attacks entirely. However, in the future we must look for tools that include multiple defense strategies to stop these forms of attack. Layering a computer network offers many benefits especially if one level of defense falls, it will not compromise the entire system. The fight to defend cyberspace against these malicious attackers is forever ongoing, but with the right tools and defense strategies we can help maintain a safer and productive Internet experience for all users. 7 Work Cited

Tuesday, July 30, 2019

The influence of journalism and newspaper on the public sphere

The influence of journalism and newspaper on the public sphere Habermas developed the concept of the public sphere to mean that part of life, especially in social circles, where the population can exchange opinions on issues of significance to the common good, so as to form a public opinion. This public sphere is expressed when people gather together to debate issues that are with a political base. Habermas' effort rely on a characteristic historical moment when coffee houses, salons, and societies became the place of discussions during the 17th and 18th centuries and extends this phenomenon to an ideal of participation in the public sphere for today (Mayhew, 1997). The significance of the notion of public sphere lies in the process of debate, which must be modeled to a critical and rational discussion. That is to say that the discussion has rules where emotive language is avoided and focus is laid on the rationality of the contents being debated. The contributors are supposed to have a common attention in truth with no status differentials. Criticism is one component that is considered vital in this process such that the propositions are tested and the contributors or participants can make discovery through the process (Mayhew, 1997). Properties of journalism/newspapers that allowed a public sphere to emerge The media has played a critical role in the emergence of the public sphere. To start with, the press has a wide reach which allows more public participation. Sine early times, the newspaper journalism highlighted political controversies and development. The development of the newspaper in the 17th century was seen as an emergence of a critical organ of a public involved in vital political debate. The recent media has developed to the extent of commodifying news. In addition, publishers in early time took sides with loyalist or patriots. The news brought more controversy and kept the public informed of the political happenings. The editors more often than not created a sphere for political discussions. Changes to journalistic field and the newspapers that present the greatest challenges to a democratic public sphere The emergence of the mass press is based on the commercialization of the participation of the masses in the public sphere. As a result, this ‘extended’ public sphere lost much of its original political touch giving way to entertainment and commercialism. The role of newspapers as a traditional media has become increasingly problematic in today’s democracy. The gap between the democracy ideology and its practice is so conspicuous. The mass communication is lacking credibility in furtherance of democratic ideals. Many theorists have pointed out that newspaper and other journalistic channels separate people from one another and substitute themselves for older places of politics The newspaper has become active participants in the political process through their role in publicity, instead of reporting on the process itself. Furthermore the newspaper has become fundamental to political life. Political participants are required to regularly update with the media's requirement and plan their exposure actively; failure to do so they tend to fall quickly out of favor. Moreover, the lousy â€Å"media performers† assume the same failure. Public debates on television and the discussion columns in newspapers present little aspect of a critical-rational debate. (Thomson, 1995) Plebiscites, research in public opinion and opinion management do not provide a potential for democracy; they are adjunct to public administration rather than a true public discussion. That is they do not present a chance for discursive opinion formation. Manipulation of events is used to provide utmost televisual effects. Debates are modeled such that the extreme opinions clash in order to attain maximum impact and increase ratings. Elsewhere, there is little contribution in regard to the development of discursive public opinion or will. The choice of topics reflects the inclination to proprietal and commercial interests. Television programs that allow audience participation are directed to groups that are not significance for the public view. However, this admission does not guarantee any changes in the power structures within the society. So these programs provide just an illusion of involvement which arouses a feeling in the public that their democratic rights are exercised. As a result of the shifting communications environment, the public sphere is revealed as a platform for advertising. In the process, this realization has invaded the process of public opinion by methodically exploiting or creating news events that draw attention. Aspects of the current media system that present the greatest opportunity for the continuation or renewal of the public sphere The efforts to salvage the public sphere centre on making publicity a basis of logical consensus formation other than controlling popular opinion (Benson & Neveu, 2005). Traditional media can add into democratic functions through action as an agent of representation. The media should be organized to tolerate different social groups to articulate their outlook. In addition, the media should aid organizations to get support through publicity of impending causes and protests. That is the media should help these organizations operate as representatives medium of the supporters view. Presently, the internet presents a great opportunity to many of the things aforementioned. It has the capacity to extend participative democracy in a revitalized public sphere. The structure of the internet eliminates control by the conglomerate media organization. Many more people have access to internet opportunities and debate for the formation of political will. As well, the commodification of the internet is inevitable. However, the traditional media have vast resources and established audiences. The resources include money, expertise, research materials, and photographs while the audience is often willing to accept what they publish. (Mayhew, 1997) Conclusion A public opinion can only be formed if there is existence of a public that engages in rational discussion. The public opinion is a critical authority that balances social and political power and publicity can manipulate it so as to support products, programs, people and institutions. However, there has been a deterioration of the public a phenomenon which is fuelled primarily by publicists (Thomson, 1995). A person's individual point of view when solicited does not comprise the public sphere, since it include a process of opinion formation; for instance, a public opinion poll. Over the years, the notion of the public sphere has been used and linked to matters in media theory which include consumerism and commodification, culture and media ownership, surveillance and participative democracy, and desecration by public relations practitioners, virtual communities mapping, globalization and journalism in the future. The public sphere is still functional, although it is not and will not be the same. Its future lies within the digital media especially with the emergence of the internet phenomenon. (Thomson, 1995) References: Benson R. & Neveu, E (2005): Introduction: Field Theory as a work in progress. Pp1-25 Thomson, J.B. (1995): Advertising, public relations, and the problem of strategic communication, Media and Modernity. Pp119-148 Mayhew, L.H. (1997): The new public. Pp 189-235. New York: Cambridge University Press Thomson, J.B. (1995): Media and the development of modern society, Media and Modernity. Pp 1-80

Monday, July 29, 2019

Bullying and Harrasment in the Workplace Essay

In hard times people tend more to be willing to find out why things aren’t working and so a growing awareness of satisfying employees lead to a more detailed picture of bullying in the workplace. Due to great changes in hotel and hospitality industry caused by the economic crisis and its cumulative effects on the behaviour of managers as well as on employees, volition emerged to do more against bullying in the workplace. This paper critically analyzes the reason for the occurrence of bullying and gives impacts on relationship between bullying, work and health. Furthermore it shows emerging problems for the hotel and hospitality industry and gives advice to find appropriate solutions to provide a bullying-free working place. Several published definitions of bullying make it hard to find the genuine meaning of it. According to the Department of Education? s article, published on their homepage www. education. gov. k in October 2010, bullying can be defined as â€Å"Behaviour by an individual or group usually repeated over time, that intentionally hurts another individual or group either physically, emotionally or mentally†. This definition is accepted and used by various organisations in the UK for anti-bullying publications and treatment policies. Unfortunately this definition covers an array of bullying types, so Zapf D. (1996) categorised five types of bullying behaviour in the workplace to get a closer look on what bullying really is. They are work-related bullying which may include changing your work tasks or making them difficult to perform, social isolation, personal attacks or attacks on your private life by ridicule, insulting remarks, gossip or the like, verbal threats where you are criticised, yelled at or humiliated in public and physical violence or threats of such violence. Referring to those statements it is possible to critically analyze bullying by keeping in mind the definition in relationship with Zapf? s five types of bullying. Nowadays it is well-known that bullying is common in almost every Industry whether in small businesses or international companies. Especially in tourism-related businesses like hotel and hospitality industry, bullying causes capacious damage in different dimensions concerning areas like staff turnover and revenue but also number of staff away sick and motivation of employees. To avoid long-term impacts of harassment, bullying or mobbing has to be nipped in the bud according to Dolan C. (2010):1 who said that â€Å"Bullying can? survive in workplaces that won? t support it. † To provide such a workplace, is today? s great challenge for managers. Generally reasons for bullying are minor problems which aren’t obviously inflicting damage to somebody like discontent about matters, problems in private live, unintended aspersions compared to a co-worker or sometimes a harsh tone in stressful situations. In Hotel and Hospitality industry the constant contact with different people, whether new staff members or guests, provides an excellent breeding ground for such problems. It could be an annoying guest, a challenging situation or an excessive period of work strain which gets people to offend a colleague. All these minor incidents are harmful for working climate and interpersonal relationships in long-term. These problems could be categorised, in alleviated acceptation, into different types of physically and psychologically violence, referring to Fineman S. (2003), who splits workplace violence into intrusive, consumer-related and organizational violence. Intrusive violence rarely occurs in hotel and hospitality industry but is not entirely excluded. On August 21, 2010 the Intercontinental hotel in Rio de Janeiro was scene of a taking of hostages. 10 employees of the hotel were restraint for several hours until they have been released, after the police took some action towards the criminals. Attacks by terrorists against hotels and employees infrequently take place in most countries, but witnessing crime related situations could be an immense strain. A more eminent factor in tourism-related businesses is consumer related violence. Demands of customers which couldn? always be measured, are causing complaints about e. g. delays or bad handling. Especially front office employees have to deal with enormous pressure by being consistently confronted with complaints, and personal affronts from customers. Furthermore Fineman S. (2003):164 describes the occurrence of organizational violence in the workplace as a failing in the ethnically opinions of entrepreneur and characterizes this form of bullying as follows, â€Å"It translates into practices that systematically cause danger, risk or exploitation to employees. Emotionally, the employer can feel indifferent, even derisory about its workers and their psychological or physical well-being: ‘there are always more out there’. The worker may feel equally indifferent but trapped in the job. † Actually frequent occurrence of such, as in the majority of cases irrelevant sensed incidents, leads to a growth of troubles and personal antipathy against fellow-workers and employers is growing until the straw that breaks the camel? s back and physically or psychological damages are the immediate consequences. As has been proved in an array of researches by organisations dealing with the problems of bullying and harassment in the workplace, like ACAS, bullying affects a company in a tremendous variety of ways. Hotel and Hospitality industry is a very people-intensive branch primarily composed of small businesses. According to ACSA a main impact of bullying is the increase in rates of absence, especially concerning small firms where cover for sick employees is difficult to arrange. The Chartered Institute of Personnel and Development (CIPD), Europe’s largest HR and development professional body, releases every year a survey report pointing out the consequences of days of absence. In 2009 the average in days of absence, concerning all business sectors, was 7. 4 days per employee per year. The amount in hotel and hospitality sector was below average with 6. 0 days per employee per year but in comparison between hotel and hospitality and other businesses, the average annual costs of absence per employee per year are superior. Relating to the CIPD the average annual costs of absence per employee per year, enfolding all business-sectors, are 692 pounds. In this area hotel and hospitality businesses are the tragic top of the table with 1199 pounds per employee per year. The survey also shows that stress (often a result of bullying) is the major cause for long-term absence. Other consequences of bullying, described by ACAS, are poor morale and poor employee relations, loss of respect for managers and supervisors, poor performance, lost productivity, resignations, damage to company reputation and tribunal and other court cases and payment of unlimited compensations. Taking a closer look on stress it is to say that in hotel and hospitality industry it is a necessity for employees to know how to handle stress because there will always be periods of strain. The big problem in coping stress is that no two people respond to the same stressor in the same way and this is the perfect point where management should intervene. According to Stranks (2005) different strategies can be considered in dealing with work-related stress, first of all it is important recognizing the evidence of stress which could manifest in sickness, alcoholism or decreasing motivation. A second strategy is to prevent stress through e. g. personal stress audits for employees to identify causes of stress, to monitor stress levels and to report and discuss stressful elements of work to identify the measures necessary at organizational level to alleviate the problem. A third way is to give employees the opportunity to develop a personal stress-tackling technique by providing training and education. Stranks (2005):113 in this point said that employees need advice on identifying their own personal stress response and the measures necessary to coping with it. † Advice to handle stress could be found from organisations like Health and Safety Executive (HSE) releasing handbooks for employees (2003, Tackling Work-Related Stress: A Guide for Employees) as well as for managers (2001, Tackling Work-Related Stress: A Manager’s Guide to improving and Maintaining Employee Health and Well-being). These strategies work very well as reported in many case studies e. g. on United Biscuits by HSE in 2007. The case study points out that United Biscuits benefited from taking action against stress in many ways. From 2005 to 2007 reports of work related stress cases decreased from 24 to 6 per year. Furthermore HRS mentions that each case where absence is prevented, it is estimated the cost of 4 weeks wages and other associated costs is saved. As a matter of fact it is a necessity to override bullying and its consequences by management to keep costs low and protect employees from physical or psychological injuries caused by bullying. As mentioned in ‘bullying and harassment at work’, an advisory booklet publicised by ACAS, the first step to provide a bully-free working environment is to set up a formal policy including a statement of commitment from management and acknowledgement that bullying and harassment are problems for the organisation. The policy could also comprise a clear statement that bullying and harassment is unlawful, that it will not be tolerated, that it may be treated as disciplinary offences and that decisions should not be taken on the basis or whether someone submitted to or rejected a particular instance of harassment. Furthermore the policy is to comprehend steps the organisation takes to prevent bullying, responsibilities of supervisors and managers and confidentiality for any complainant. The policy should involve grievance, investigation and disciplinary procedures with timescales for action. Another point should deal with protection from victimisation and the importance and possibility of training for managers to avoid bullying. Involving staff into the process of developing such a policy will help achieving additional authority. Such a policy is supported by Stale Einarsen (1999):23 in the international journal of manpower who said â€Å"If not being permitted or supported by the people in power, a bully knows he/she may find him/herself the victim of aggressive counter-attacks and severe punishment. † In reference to ACAS the second step is to set a good example in behaviour, like discussing problems and consult employees instead of a too authoritarian management style. A current negative example for this point is the discussion about Gordon Brown? s abusive treatment of staff. The Guardian (21. 2. 2010) advertised that several employees from Downing Street No. 10 contacted the National Anti-bullying Helpline which raises discussions about Mr. Browns management style. Mr. Brown is being denoted as a bully by employees including assertions that he swore at staff, grabbed them by lapels and shouted at them. Third step to deal with bullying and harassment as a manager is to maintain fair procedures for dealing promptly with complaints from employees by using clear grievance and disciplinary procedure described in the Employment Relations Act 1999. Fourth step is to set clear standards of behaviour, to provide training and information about how to deal with bullying and to communicate the organisation? s views on it. Fifth, make clear that complaints will be dealt with fairly, confidentially and sensitively. By following these five steps of ACAS it is getting a lot easier to provide a good working climate and satisfy employees. In conclusion bullying is a problem affecting all businesses with different strength, in different ways and with different consequences, but the reason for occurrence of bullying is the one constant in all companies. It all starts with recurring minor problems that aren’t recognized until they grow big, so discussing problems and communicate them will help companies save money and satisfy employees. By using a metaphor to describe bullying, the strength in which bullying affects humans as well as companies could be expressed as follows A single thunderous gust could disroot trees, but a permanent breeze transforms mountains into grains of sand.

Employee empowerment Term Paper Example | Topics and Well Written Essays - 2500 words

Employee empowerment - Term Paper Example Empowering the employees makes the employees largely responsible for their actions to the company and thus helps in enhancing the productivity of the people. The practice of empowering the employees to perform the different tasks in an independent manner is observed to in fact change the existing polices and rules of the company making it adaptable to external demands. Empowerment of employees to take responsibilities does not only help in enhancing their productivity but rather makes them further loyal to their work and the company at large. Enthusiasm to take new and productive decisions happens to excite the employees to work in a team framework and thus enhances cooperativeness in the concern. However effective control is needed to be rendered in order to closely monitor the employees who have been empowered to act in an independent manner. This would help in enhancing managerial effectiveness and distribution of organizational workload (Messmer, 2006, p.279-280). Employee Empowe rment as a Business Process Empowering employees to perform within an organizational set helps the people gain all round productivity, effectiveness and efficiency. The practice of empowering the employees to act by them should not be viewed in an isolated fashion to other business actions. Rather such activities should be taken as a continuum to the existing business and human resource processes wherein the employees are taken as human beings and not as organizational machines. The process of empowering the employees helps in enlarging the job profile of the people by helping them to shoulder additional responsibilities. It also helps the people to understand the work in a more effective manner and thus enriches their cognitive abilities in dealing with specific situations. Further the process of empowering the employee gains effectiveness through the meeting of needed actions in which the people are required to be trained and motivated to handle newer responsibilities. The organiz ational managers must endeavor in letting the employees gain effective access to potential information which would be needed by them to take decisions in an independent fashion. This method helps in meeting the end goals of empowering employees. Finally the organizational managers must also endeavor in enhancing the interests of the employees to perform newer tasks and in such manner instills confidence in them. Empowerment as a business process helps in creating involvement of the employees with the objectives of the business organization and thus helps the internal people to become active participants in the change process (Speegle, 2009, p.86-89). The process of employee empowerment is best effective in regards to a flat organization structure wherein the employees can actively cooperate with their supervisors to help in accomplishing a certain business objective. Employee empowerment by dint of the above function is often correlated with the tenets of ‘Total Quality Improv ement’ and ‘Business Process Reengineering’. It is because the process helps in increasing the total productivity of the different organizational people and thus helps in

Sunday, July 28, 2019

Social smoking Essay Example | Topics and Well Written Essays - 1000 words

Social smoking - Essay Example Despite that, 21% of adults, 22% of high school students and 8% of middle school students smoke. One in five of all deaths every year in the United States have been credited to smoking, killing more than AIDS, suicide, alcohol, car accidents, homicide, and illegal drugs combined (American Cancer Society, 2004). Smoking socially has become a problem for the social smokers as it has been found that these social smokers are at the same health risks as are the regular smokers. The tobacco companies use the aspect of social smoking to increase their sales which is discussed subsequently. Smoking socially makes it difficult for a smoker to quit even on occasions. These social smokers tend to smoke only when they are in some kind of gathering or party. The social smokers never tend to agree to the fact that they are addicted to nicotine. Most of the social smokers are seen to have started smoking socially in their high school. A social smoker Vickie from New York was stated as saying "If Ià ¢â‚¬â„¢m out drinking, or hanging out with people who are smoking, then I usually get the urge to smoke" (Hainer 2008). People who smoke socially face difficulties in quitting because of various reasons. It has been found that these people do not usually have withdrawal symptoms like regular smokers but they don’t to have a temptation because of which they smoke. After remaining in a company in which individuals smoke a social smoker gets the urge of smoking automatically (Pope 2008). The social smokers do not tend to smoke because of their withdrawal symptoms but rather smoke to induce the psychoactive effect of nicotine. This means that these social smokers are addicted in a similar fashion that the regular smokers are. One of the social smokers stated when asked about quitting â€Å"It’s been difficult† (Hainer 2008). Another reason because of which the social smokers find it difficult to quit is the reason that the friends urge them to smoke every now and th en. Whenever a person is present at an occasion he is tempted by his friends to smoke and this makes it difficult for him to smoke. Moreover the social circle of the smokers also matters because of which the smoker is tempted to smoke. For social smokers to quit it is necessary that they realize the danger that they are facing because of their habits but in real life scenarios it is seen that these social smokers are in a state of denial. The social smokers never agree to the fact that they are addicted to smoking in one way or the other and categorize themselves in the class of non smokers. These are primary reasons because of which the social smokers are in a difficulty to quite the habit of smoking (Schane et al 2009). The tobacco industry has used the platform of social smoking to increase their sales from the very early years. The industry is believed to have been conducting research in the field of smoking earlier than the health professionals which has helped them to increase their sales. Social smoking has been used by the companies as it is the best way through which they can attract a consumer towards the cigarettes (Landman et al 2008). The tobacco companies use social smoking by creating an image for the ciggarrete brands. This brand image refers to a specific crowd or cliques who are involved in social

Saturday, July 27, 2019

Worked based project - Why outdoor play is important in the early Essay

Worked based project - Why outdoor play is important in the early years- also to include survey abd results - Essay Example All these interviews have again on perception of different groups of people on the quality of this main activity. Questionnaires have proper attention and the tabulation and analysis of results given a good concentration. The expectation on study result should be a complete contradiction of the null hypothesis. This should show proof that outdoor plays help build a positive influence on children lives in their early years of development. Proper conclusion and recommendation are also of consideration in this research report. Special thanks to the supervisor for his unique assistance and support, advice, guidance and direction during the research process. In addition, much appreciation and remembrance go to the co-supervisors and members of the family for their full dedication and time. All the participants and respondents who had a positive contribution in this study are much appreciated for their ready response and honesty during the interviews and questionnaires. Much appreciation goes to positive critics for the corrections and constructive criticism during research time. In early years, a child learns important life lessons. Sharing, fair play, communication, respect, and getting along with other age mates are some of these mandatory lessons. Child’s play in early years is not all about games and fun. There is a close link amongst social, emotional, intellectual and physical progress of a child (Knight, 2011). Much research has a full revelation that a good social reason and healthy development of across the child life spectrum is because of play intensity in early years. The benefits of this play are so impressive. Each day of life in early years of development should have a universal attitude on play elements. The education curriculum should have a strong teaching and learning foundation based on the value of play as

Friday, July 26, 2019

Contemporary issues in employment relations - topic EMPLOYEE Essay

Contemporary issues in employment relations - topic EMPLOYEE ENGAGEMENT - Essay Example As part of organization, engagement of employees in the process line of production and running of organizations defines important tool in ensuring improved performance and institutional productivity. McLeod and Clarke (2011, pg. 1) define employee engagement as creation of opportunities for workers to interact with manager, colleagues and the wider organization. Engagement in employment setting also involves creation of environment that motivates employees and makes them want to link with work and care about performing their tasks appropriately. McLeod and Clarke elaborate that engaged employees are aware of the fundamentals of operation of a given business as well as its objectives and goals. Engaged employees also understand frameworks of practice prescribed by the given organization in ensuring achievement of the goals and objectives of the organization. It is within these contexts that engaged employees work closely with their colleagues to improve job performance and maximize benefits for the given organization. According to McLeod and Clarke, it remains the responsibility of organization and its leadership to establish and nurture employee engagement that builds upon emplo yer-employee interrelationship. Effective employee engagement manifests through three items that include attitude, behavior and outcome. Attitude relates to feelings of loyalty and pride among employees that make them act responsibly and with great accountability. Behavior manifests when employees become great advocates of the individual organizations to clients or make extra efforts to complete a piece of task. Outcomes synonymous with effective employee engagement include low incidents of accident due to enhanced care when performing duties, higher productivity and reduced conflicts. In addition, outcomes also manifest through more innovativeness of employees, lower rates of sickness and few employee exits or resignations. McLeod and Clarke (2011, pg. 4) argue that

Thursday, July 25, 2019

English Essay Example | Topics and Well Written Essays - 2250 words

English - Essay Example It all started when McDonald brothers had a very successful drive-in restaurant and decided to cut cost and simplify. They fired all their carshops and got rid of the things on the menu and mechanized the entire food preparation. This basically brought the factory in the restaurant kitchen and revolutionized how to run a restaurant. This proved to be a huge success that it inadvertently altered how and what we eat. This idea of cheapness and convenience brought by the fast food industry however is not necessarily healthy. It basically skewed our food preference towards the mechanized meat that produces unhealthy calorie that it is now cheaper to buy a burger than a carrot. The effect is devastating to our health. Statistics showed that one out of three children who were born from 2000 in America will contract diabetes and among the minorities, that will be one in two or 50 %. And this new method of feeding corn to the cows (the feedlot operator can buy corn at fraction of what it cos ts to grow) resulted in E. coli that is acid resistant. This is the more harmful E. coli as its mutation evolves to a strain called "E. coli 0157:h7". And it's a product of the diet that is being fed to the cattle on feedlots. A diet of corn which cows were not made to eat by natural evolution but by deliberate government policy of heavily subsidizing corn which is central to U.S. agriculture. Where it is grown in greater volumes and receives more government subsidies than any other crop. Between 1995 and 2006, corn growers received $56 billion in federal subsidies, and the annual figure may soon hit $10 billion (Heffern, 14). This E. coli 0157:h7 is so lethal that a child named Kevin, went from being perfectly healthy to being dead because of E. coli hemorrhage after eating just three hamburgers (Food Inc.). We may not know it but we also eat oil when we consume industrial food. Just to bring a steer to slaughter, it consumes 75 gallons of oil. Overall, the industry guzzles up petr oleum fuel of about 40,000 gallons per year. Consuming oil in food production not only makes the food industry vulnerable to oil spikes just like what is happening today with the recent crisis in Libya,it also makes the food more unhealthy with all its carbon dioxide emissions. Also, just when we thought that we were able to save money when we avail of fast foods as they are cheap, we are in fact very wrong. There are a myriad of hidden costs associated when we avail fast foods. When these hidden costs are factored in and included in the accounting its true cost, it is in fact more costly. In fact, experts had this consensus that â€Å"consumption of fast food, which have high energy densities and glycemic loads, and expose customers to excessive portion sizes, may be greatly contributing to and escalating the rates of overweight and obesity in the USA (Rosenheck, 246). Similarly, other studies have also concluded that â€Å"our findings suggest that increase in the supply of fast food restaurants have a significant effect on obesity† (Currie). Cheap does not also means we are able to save. Just when we thought we were able to save with the cheap price of fast foods, the industry took us for a ride. They worked against us with the typical allure of fast food chains that they are cheap and convenient . . . . For a few more dollars, you can

Wednesday, July 24, 2019

Theology Reflections Paper Essay Example | Topics and Well Written Essays - 750 words

Theology Reflections Paper - Essay Example According to the bible, Jesus said that He could come back at the end of this generation and resurrect all people, both the righteous and the evil doers (John 5:29; Acts 24:15). This is the Day of Judgment. There is more stress in the bible regarding everybody; both the dead and alive will be alive when Jesus returns will all be judged. Judgment will not only include individuals but also the nations (Matt 25:32). Paul also talks about those who will be judged. He says no one will be spared in the final day when Christ returns (Rom2:6-9). Many Christians hold a view that judgment is for the nonbelievers. This is a wrong view according to the teaching of Paul. Paul explains that God will put his people to judgment. He further says that, during this day, all people will line up to receive their dues for their good and bad deeds (2 Cor 5:10; cf. Rom14:10). Those who believe in Christ and make a union with him will be relieved off the judgment. Jesus said that those who hear his word and follow his ways will not come to judgment in the last day. They will instead have eternal life (John 5:24). Jesus further says that those who know his word and do as the will of God says will be punished. This was said in reference to the slaves who did not do as their master wanted; they are to receive severer beating (Luke 12:47-48). Form the text about judgment; it is revealed that all people will be judged regardless of their social, spiritual or religious roles. As a Christian, I should always aim to do good at all time since the judgment day will spare none. From this, I learn that I should take be accountable for every action I take. Further lessons from judgment teach us not judge others on their actions since it only God who can punish us for our actions. Judgment helps Christians to check their ways and be thoughtful about whatever they do. Through minding their

Tuesday, July 23, 2019

Statement of Purpose Personal Example | Topics and Well Written Essays - 750 words - 4

Of Purpose - Personal Statement Example I am an international student from the Kingdom of Saudi Arabia. Saudi Arabia is a large country and areas of science in the country are in the phase of rapid development. It is for this reason that the government has sponsored thousands of students like me to come to the United States and complete their studies in specific fields of science. I would like to utilize this opportunity to its fullest and complete my PhD for bringing about development in the field of Information Systems in Saudi Arabia. I am currently enrolled in the program of Master of Science in Computer and Information Science at the Gannon University, Erie, PA, USA and the expected date of my graduation is December 2014. This master’s program has motivated me to further continue my studies in the same field and gain expertise through the completion of my PhD. The PhD Program would grant me with an opportunity to polish my skills and gain an advanced understanding of my desired field. I have always had an interest in the field of Information Systems. In the year 2010, I completed my graduation in the field of Information Science from my home country at the Al-Baha University and achieved a GPA of 2.8-4. My graduation motivated me to further achieve higher studies in the field and to gain greater exposure and a better learning environment, I moved to the United States. I enrolled at the ELS Language Center at Cincinnati, OH, USA for one year to get a good grip over English Language so that that I would not face any difficulties during my years of education in the United States. Following this, I started my Master’s Degree in Information Systems at the Gannon University in January 2013. Currently, I have successfully completed 24 credits out of 33 and my GPA is 3.75-4 which is reflective of my hard work and focus for outshining in my field. With time, my interest in the field of Information

Project Evaluation Assignment Example | Topics and Well Written Essays - 1500 words

Project Evaluation - Assignment Example In other words, project evaluation offers a step-by-step procedure of recording, gathering and organizing data and information regarding project outcomes, comprising short-term results of tasks, or project deliverables, and instant and longer-term project results like transformations in behavior, processes or policy outcome from the project (GoogleDocs, 2011; Hughes & Cotterell, 2002; Government of Ontario, 2006). This report discusses some of the important aspects of the project evaluation and its application in technology-intensive enterprises. This report discusses the use and application of the project evaluation processes and various quantitative or qualitative approaches to project evaluation and selection. Usually, project assessment or evaluation is the last stage in the project lifecycle. In this stage analysis is done systematically at the fundamentals of accomplishments as well as failure in the project practice to discover how to plan more effectively for the future. The fundamental aim and objective of this study is to determine the actual value of a program or project as much as probable. In more simple words, project evaluation can be described as "a procedure that tries to find out as methodically as well as objectively as probable the significance, efficiency and influence of actions in the light of the fundamental aims and objectives†. It is, therefore an important examination of the accurate accomplishments and outcomes of a program, project or policy in comparison with the planned tasks, fundamental suppositions, and policy and resource assurance. In addition, it formulates an effort to evaluate impartially the following given main aspects: (Planning Commission, 201 1; Hughes & Cotterell, 2002; Government of Ontario, 2006) The significance and strength of the project aims and objectives and design of the project/program in scenario of wider problems of project development policy, project priorities as well as strategies with

Monday, July 22, 2019

Industrial facility Essay Example for Free

Industrial facility Essay 1. Describe how the use of a tall smoke stack might improve air quality near a large industrial facility. 2. How can topography contribute to pollution in a city or region? 3. From where do hurricanes derive their energy? What factors tend to weaken hurricanes? Would you expect a hurricane to weaken more quickly if it moved over land or over cooler water? 4. Where is the Bermuda high located during the summer and fall? How might the path of a hurricane, moving toward the west from Africa, be affected by the Bermuda High as the hurricane approaches the United States? 5. How do you think pollutants are removed from the atmosphere? Does this occur quickly or slowly? 1: The smoke coming from a tall smoke stack doesn’t mix with the pollutants below it. When a temperature inversion comes in at night, the smoke from the tall smoke stack is above the top of the inversion and doesn’t get trapped with the air below. The air below doesn’t get polluted as it would with a much shorter smoke stack, and doesn’t affect the air quality. 2: Topography plays a major role in trapping pollutants. Cities like Denver and Los Angeles, that lie in a valley or between mountains get better temperature inversions. Cold air mixing with the polluted air sinks to the bottom of valleys and low-lying basins. The top of these inversions creates a blanket-like effect and traps the pollutants so that they mix with the cold air below. In these poorly ventilated areas winds can’t mix and carry out the cold air or polluted air. In cities like Los Angeles, mountains surround the sides of the city, but the cold air from the Pacific Ocean comes onto land and helps trap pollutants. 3: Several factors are required to create a hurricane. Hurricanes often start off as a Tropical wave from the west coast of Africa. The diverging air moves from east to west with storms behind it with the converging air. Hurricanes come from 5-20 degrees north or south of the Equator and move with the coriolis effect. These storms must have a light wind shear in the upper atmosphere, warm ocean waters (26.5 degrees celsius +), instability in the atmosphere and a trigger (like a tropical wave). They form into a cluster of rotating thunderstorms around a low pressure system and release latent heat from the waters. However, strong vertical wind shears, cold water and land will dissipate a hurricane quickly. A hurricane moving over land will weaken a hurricane  more because hurricanes need the warm moist air that it cannot get from land. 4: Through the summer and fall the Bermuda high is located in the Atlantic, close to Bermuda. Since hurricanes are attracted to the heat and high pressure, the Bermuda high creates a perfect environment for the storm to form. Since the diverging air moving west from the African coast moves in an anticyclonic motion, it moves into the area of the Bermuda high before strengthening. The east coast of the US is very likely to receive hurricanes or the strong storms from the hurricanes rain bands. Hurricanes normally move from west, to north west to northeast. 5: Pollutants can be slowly removed from the atmosphere by various methods. Growing trees naturally filter the air. There are man-made machines to do so as well. These machines filter the air using scrubbers, house filters and other methods. These can also be installed in home air conditioning systems. After the filters are cleaned, they can be easily disposed.

Sunday, July 21, 2019

Hindu Temple Architecture in the Taj Mahal

Hindu Temple Architecture in the Taj Mahal Traces of Hindu Temple Architecture in Taj Mahal As mentioned earlier in the previous chapter that many critics have found Urdu traces and Taj building is a symbolical representation of Mughal monument only. But Professor P.N. Oak challenges such ideas and brings out a critique that the Taj Mahal is actually a Hindu Temple of Lord Shiva (Tejo-Mahalaya). As P.N Oak also theorizes that a stone inscription which is known as the Bateshwar inscription is kept in the Lucknow Museum which shows that this monument can be a temple of Lord Shiva. It was found that the size of Mumtaz’s cenotaph is not of height of an average Islamic woman of the seventeenth century and the grave is not of appropriate dimensions. It could be said that the Shiva Linga which is considered as very sacred and holy is actually under the grave. The grave is on the first floor so it is not clear if Mumtaz’s body is really buried in Taj Mahal because bodies are usually buried in the earth and not in the flooring. This grave of Mumtaz is of the height of Hindu Shiva linga and if further digging would be allowed the result would come hence forth. Taj Mahal bears a lot of Hinduism traces and all such marks have been pointed out by P.N. Oak in his book. On the arch of Taj Mahal’s main tomb there is a trident (trishul) which is emblem of all Hindu Temples in India and no mosque or any other Muslim monument has a trident over its tomb. All plants and trees which are present in the gardens of the Taj Mahal are sacred to Hindus like Lotus, Tulsi, Banyan trees, etc. The main patterns are drawn which are found are Bel leaves and Harshringar flowers, these are actually used as an offering to Lord Shiva. There is a central chamber in between of eight doors which provides us the idea where the emblem of Lord Chandra-manleeshwar was present. The proper flooring of this central passage also gives us an idea that Lord Chandra- manleeshwar used to dance to worship Lord Shiva. The high doom above it is also a common feature is dripped over the Shiva linga from a bowl hanging on a certain height. Even the guides of Taj Mahal tell to all visitors about the tradition of a drop of rain water which is falling from height of the dome on the grave in the central chamber, this is actually a place from where the water used to drop on the Shiva Linga in the older times. There are silver doors and golden railings which are in the fixtures of the Taj Mahal, clearly give the Indianness to the monument because till date we can find such fixtures in our Hindu Temples. There are some ancient Hindu colored sketches of eight directional pointers, sixteen cobras, thirty two tridents, and sixty four flowers of lotus which are in the multiple of four which is considered auspicious in Hindu religion. This sketch is designed in the Taj Mahal’s central chamber, from the grave of Mumtaz this pattern can be seen very clearly. Even Tavernier also mentioned that the bazar used to be placed in the six courts of the Taj Mahal and this thing is everyone knows that in the tradition of Hindus fairs and bazars are set up around temples till date. On all four side entrances of the Taj Mahal, there is trident (trishul) is inlaid, which is exclusive weapon of Lord Shiva. It clearly proves that it is a Shiva temple. Some pointed out that the Taj Mahal dome has the Arabic engraving ‘Allaho Akbar’ meaning ‘God is Great’. These words were engraved on pinnacle ordered by Shah Jahan after he took over the Hindu temple and commandeered to change in Islamic use. But the same replica of the pinnacle inlaid in the red-stone courtyard does not have that Islamic inscription. Then there are spacious decorated chambers and an adjoining long corridor with the entire length of those apartments. These chambers are basically at the lower level than the basement central chamber. The chambers which are right under the graves of King and Queen on two floors which are sealed in a haphazard way with bricks are likely to have Hindu idols and inscriptions. The corridors which may be running under the red-stone terrace, they all are sealed. Likewise all the ventilator type openings and doors in the apartment row have also been crudely walled up under the red-stone terrace. We will be able to see the beauty of the underground apartments if those fillings are removed. It is very much possible that Taj Mahal has two floors above the river bed and one in the basement which has been sealed by Shah Jahan. ‘Taj Mahal’ is a foul form of Sanskrit ‘Tejo Mahalaya’ meaning ‘Resplendent Shrine’. This name also attach to Lord Shiva because his third eye is said to emit a fit if luster that is ‘Tejo’. Even if we look at the real meaning of the term ‘Taj Mahal’ it means a ‘crown residence’ and not a tomb . If these graves would have been the real graves, they wouldn’t have been so much decorated because in Muslim culture graves wouldn’t have been so much decorated. The corpse of Mumtaz, if it is buried in the Taj Mahal, it cannot be in the ground floor or in the basement chamber. There are other a Hindu symbols which are found in the Taj Mahal, like use of the sacred Hindu chant ‘OM’. ‘OM’ is crafted into the marble flower of lotus both lotus and OM are symbolically apart of Hindu culture which are present on the walls of Taj Mahal even on the so called â€Å"graves†. Any student or scholar of architecture can clearly tell that the ‘flower’ drawn on the marbles is a part of ancient Hindu temple drawings and not of any Muslim sepulcher workmanship. There is one important point also that time or rather span of death of Mumtaz is not clear. Some historians says that, she died in 1630 or 1631or 1632 A.D., and in the illustrious sepulcher it is written that she died in 1629 A.D. It is absurdto think nobody knows the correct timing of Mumtaz’s death. In fact, Taj Mahal has Hindu palace dimensions. Taj Mahal has many doors which are in spiked shape. There are red stone corridors, thorns and rooms all these attributes are just like typical Rajput building. ‘Ghat’ which is very common in temple palace, exists in Taj Mahal. Gateways of the Taj Mahal which are now closed were earlier the place to bathe in the river and go boating. Many rooms in the Taj Mahal complex are the drum houses. These drum houses are a part of Rajputana architecture. It is obvious that in memorial place no drum houses are planned to make, and there is no music places made in any Islamic buildings, music is actually restricted, hence the drum houses clearly prove the hand of Hinduism in the Taj Mahal. There are so many rooms for guests, army detachments, waiters, caterers etc for any royal purposes. Such architecture is never used in making any tomb. All the walls and doors are also in Hindu dimension, like silver doors which have been discussed earlier. In the Taj Mahal there are four towers at the each doorway. The top of the tower is made up by brass Kalases. Kalases is a Sanskrit word and this word can never be connected to any tomb and also does not fit the Taj building architecture. ‘Kalas’ signifies a shinning pinnacle made up by brass or gold. This word only comes in a connection of temples or any Hindu palace but Taj Mahal’s top of the tower uses similar material and hence this also gives us the hint of Temple like palace instead of a burial tomb. Three different scientific tests took place to find out the actualities of Taj Mahal. First one is Donodo chronology, in this test wood sample is taken of respective historic building. Second one is Thermoluminescence, in this test a brick powder or whole brick is taken and find out when this brick was baked. This test is very helpful in finding the age of the historic buildings. Third test is Carbon-14 test; this test is helpful in finding out the actual age of any living organism like wood piece or bone. Professor Mills from New York took the Carbon-14 test by taking out small wooden piece of one of the Taj Mahal’s wooden door. This report published in the Itihas Patrika. It was found out that the probable age of the sample is from 1448 and 1270 A.D. This test clearly proves that the Taj Mahal existed much before Shah Jahan. But here I would like to tell readers clearly that the age which was proved in the test was of the Northeastern doorway and not of the Taj Mahal’s marble. In this chapter, many examples have been discussed which clearly tell that Taj Mahal is basically a Hindu ancient temple (Tejo Mahalaya) and not a tomb.

Saturday, July 20, 2019

Examining methods of analysing a Companies Environment

Examining methods of analysing a Companies Environment There are factors within the environment that the organization operates that are beyond the control or influence of the organisation but these factors affect the business or strategy planning. The STEEPLE analysis is focusing on the external macro-economic environment that a business operates. This helps business to understand the environment, in which it operates, and the opportunities and threats that exist or are emerging within it. An understanding of the opportunities can help a business to take advantage of the opportunities that exist and reduce the threats to the barest minimum. The STEEPLE analysis helps to understand associated risk with growth in market or decline and thus the potentials and direction for business. STEEPLE is an acronym for Socio-cultural, Technological, Economic, Environmental, Policy, Legal and Ethical factors respectively. Some of these factors tend to overlap when conducting the analysis. Below is a STEEPLE analysis of the UK motor car market. Socio-cultural: the pattern of lifestyle affects demand of vehicles, availability and willingness of individuals to work and therefore the kind of vehicles are manufactured. The institution of marriage has fallen, there are more single parents, people are having fewer kids and consumer trends which include fashion ability, luxury preference, working population, spending power etc. Technological: new innovations and technologies keep emerging in the car industry and bring about new products and processes e.g. introduction of three-point seat belt, airbag, electronic stability control, Intelligent Transport System (ITS), Intelligent Speed Adaptation (ISA), E-call, Driver Assistance Systems such as E-call and Driver Assistance System such as Electronic stability control and Emergency Brake Assist. Environmental: according to SMMT, the climate change has had a great impact on the car industry and this has great impact on vehicle demand. This overlaps with the ethical factors because the car industry is trying to make vehicles environmentally friendly by trying to make 95% of vehicles recyclable by 2015 in order to comply with the End of Life Vehicle (EVL) Directive. Average CO2 emissions of cars bought through the scheme were 132.9g/km, which was over 27% below the CO2 figures of the outgoing cars that were scrapped. Also there is an effort to improve environmenta l standards at sites processing vehicles and limit the use of materials harmful to the environment in the new vehicle Climate Change Level (CCL). This has increased demand for hybrid cars. Ethical: some ethical issues have to be considered in the market, these include ethics in workplace, balancing stakeholder interests, human rights, reduction in CO2 emission from vehicle and manufacturing process (Farnham 2010). Also, the Climate Change Levy (CCL) agreement was signed by 11 UK vehicle manufacturers as co-ordinated by SMMT has effects on car industry. Political: policies that affect the car market include 2008 piece of legislation which committed European Vehicle manufacturers to cut average CO2 emission from cars to 130g/km by 2015, 2009 European Whole Vehicle Approval Directive, introduction of the Scrappage Incentive Scheme, taxation, congestion charges, other policy areas being formulated include alternative fuels, smarter driving technologies, and lower resistance tyres. SMMT has reported that 395,000 new vehicles have been registered under the Scrappage Incentive Scheme, which has now ended. There were 388,540 new cars and 6,959 new LCVs registered for the period, with 8.1% of all new car registrations and 2.1 LCV registrations in April being linked to the scheme Legal: this is closely linked to environmental political and ethical factors but includes health and safety, company law, consumer protection law. Manufacturers have to abide by policies formulated by government and regulatory bodies. This also affects the UK car industry either positively or negatively. Economic: macro-economic policy, markets and prices, price levels, global trends, market structure, public spending, wages and salaries, balance of payment, taxation etc. (Farham, 2010) the industry generates turnover approaching 52billion GBP so the Scrappage Incentive Scheme was introduced to support the industry because of its importance to the nation. Over 181,092 new vehicles had been registered under the scrappage scheme by the end of September. There is an order bank of a further 80,000 vehicles. The scrappage scheme is largely self-funding for government with the 15% VAT paid on a car bought for  £7,650 covering the  £1,000 government contribution (SMMT). The environmental, political and economic factors can be said to have the greatest impact on the strategy planning of the UK car industry. The product market, competitive structure and nature of competition of the UK car market cannot be analyzed without Porters five forces analysis. Threat of entry: The UK car market has high barriers to entry because it is extremely consolidated, well developed value added chain, RD capability, investment capability in terms of equipment which means existing manufacturers can make relatively high profits. Power of buyers: Buyers have little or no bargaining power in the market, households have no power at all but companies that buy fleet cars for official use have very little bargaining power. Power of Suppliers: there is a lot of power in retail and distribution of cars and this power depends on the price of the seller. The threat of substitutes within the industry also determines the power of the supplier as they can switch brands easily. Competitive rivalry: The UK car market can be said to be oligopolistic in nature because there are about 30 firms with the major rivals being are Ford, GM (Vauxhall), VolksWagen, Renault, Peugeot, Toyota, BMW, Citroen and Honda. Ford is Britains best-selling commercial vehicle (CV) brand and last year took over 24 per cent of the CV market. In a challenging market new models such as the ECOnetic Transit and ECOnetic FiestaVan, will play an important role in maintaining Fords competitive position (Ford). In oligopolistic markets there is a high degree of interdependence and so firms will think carefully how their rivals might react to any actions they take. This can lead to an emphasis on non price competition; a price change is relatively easy to imitate and so firms may rely more on methods such as branding or product development. The presence of powerful competitors with established brands creates a threat of intense price wars and poses strong requirement for product differentiati on. Also, there is cost of leaving the industry because of high levels of investments already on ground so firms fight hard to survive because resources are not easily transferrable and as the market is shrinking, these firms fight for a share of falling sales. Brand loyalty is very poor in this market because customers are likely to switch easily from brand to brand. Threat of substitute: this is linked to the power of buyers and sellers. The car market also faces direct competitors like public transport, air, rail, tubes, sea, bicycle and walking but the major source of substitute is the sale of second hand cars. It can be argued that the demand for cars is elastic because it is affected by substitute goods (as listed above) and complimentary goods (insurance, tyres, fuel, license, taxes, Ministry of Transport (MOT). Research two examples of how Human Resource Management in manufacturing has been influenced by and responds to changes in the environmental context as outlined in a. The automotive sector is highly flexible, dynamic and ever expanding. As a result of its flexibility and expansion, it responds to the global challenges which include GDP and trade growth, deep cultural shifts in the economic patterns and strong environmental aims. The automobile industry is constantly changing and adapting to challenging commercial, regulatory and technological trends, competition in the market, discrimination by customers, pressure from government and influence groups. So it can be argued that the car industry adopts the contingency or best-fit school of HRM which advocates the need to fit HR strategy into its surrounding context. The concept of E-V-R congruence as a measure of how well an organisation is attuned to its environment was developed by Thompson (2005). E- Represents the environment which includes the opportunities and threats that exist within it while R is the resources and V represents the value. The concept of congruence is very important and an organization achieves this when its resources, environment and values are mutually reinforcing. Its strategic position will be strong. The macroeconomic understanding is needed by organizations in order to predict and plan for changes in demand for their products, human resources, inflation and changes in investment. Human resource has to match external environment to the companys objectives. The most significant feature of HRM is the importance attached to strategic integration. Legg (1989) argued that one of the common themes of typical definitions of HRM is that human resource policies should be integrated with strategic business planning. As Baird and Meshoulam (1988) remarked, business procedures and systems are developed and implemented based on organisational needs that is when strategic perspective to human resource management is adopted. Human resource managers play a significant role in ensuring that the strategies adopted by the organization are fully supported by the required workforce so HR has to know how many staff needs to be recruited, retained and developed to satisfy consumer demand. In 2009, recession reduced demand for vehicles leading to a sharp fall in vehicle production and hence turnover. This year saw one of the biggest economic challenges of the automotive industry has ever seen with global sale plummeting, plants cutting production and RD budget at considerable risk. This means demand for cars will reduce because of economic meltdown, supply will reduce and labour needed will be cut. Employment in the sector has decreased despite continued efforts to protect the vital industrial capability by introducing short-term working, time banking etc. Despite the surge in sales towards the end of the year as car scrappage scheme kicked in, Toyota in the UK saw production plummet 40 per cent from 213,000 in 2008 to 127,000 in 2009(Robert Lea times online jan 28,2010http://business.timesonline.co.uk/tol/business/industry_sectors/industrials/article7006329.ece). Toyota had to adapt to its work share programme to fulfill orders incentive by the Scrappage Incentive Scheme. Later on, it led to cutting of 750 jobs, or around a fifth of the workforce, in the face of crashing car sales. The decision will come as a blow to Toyota workers who had already been rattled last year by workshare programmes, reduced hours and non-production workers. Over last year, Toyota also accepted 300 applications for voluntary redundancy. (the times February 19,2010) Toyota is to shut down its UK production plant next month leaving 3,500 workers idle. The unprecedented halt for two working weeks is a result of a collapse in its car sales amid consumer concerns over the safety of the Japanese companys vehicles. Sales of Toyotas are thought to be plunging worldwide after multiple recalls affecting 8.5million cars around the world. The company employs 3,900 workers at its main production site in Burnaston and 570 at its engine plant in Deeside. It has already cut 200 temporary jobs and opened a voluntary redundancy scheme last week. Toyota said in a statement: following extensive consultations with our employees representatives, and with input from all employees, it has been agreed that the best way to secure long term employment is to temporarily reduce working hours and base pay by 10pc. Toyota also scrapped the annual pay increase for employees and cancelled management bonuses, while its UK factories have just finished a fortnights shutdown. All these measures were introduced to reduce cost for the company because of the fall in demand for Toyota products caused by recession, the recall of Toyota cars due to safety issues etc. SMMT estimates that approximately 70% of the cars bought under the scrappage scheme represent additional sales which would not otherwise have happened in 2009. Since there was an increase in the demand for cars, this means that the demand for labour in Ford, whose engine plants in Bridgend and Dagenham employ 4,000 people, had to introduce extra shifts to be able to supply more cars. August output was up 36.5% at Dagenham and 18.3% at Bridgend, compared to 2008. Ford estimates that this resulted in positive knock-on effect for around 100,000 of their UK jobs in sales, distribution and sale supply. (SMMT) Also, due to the rapid change of technological advancement, new makes/models, reduction of CO2 emission and the introduction of the Scrappage Incentive Scheme, the car industry in UK now has a high demand for management/ leadership skills and technical skills. These changes have also made it necessary for the car industry to give staff constant training, since staffs with excellent sales skills are essential for the profitability and success of the sector. The ever-growing feast of technology and the need for constant on the job learning the sector specific product Automotive Technician Accreditation (ATA) was developed. To become ATA registered, an individual must pass a comprehensive and rigorous series of tests of practical skill and knowledge to ensure that they keep up to date with new technologies; technicians need to be assessed in order to maintain their accreditation. http://www.guardian.co.uk/business/2010/jan/28/ford-announces-profits-2009 Andrew Clark in New York guardian.co.uk, Thursday 28 January 2010 17.01 GMThttp://www.smmt.co.uk/articles/article.cfm?articleid=20676 http://business.timesonline.co.uk/tol/business/industry_sectors/industrials/article7032980.ece http://www.ford.co.uk/AboutFord/News/CompanyNews/NewDirector ttp://www.oup.com/uk/orc/bin/9780199296378/01student/additional/page_11. htmhttp://www.oup.c.om/uk/orc/bin/9780199296378/01student/additional/page_10.htm http://www.oup.com/uk/orc/bin/9780199296378/01student/additional/page_12.htm http://www.smmt.co.uk/articles/article.cfm?articleid=20676 http://www.smmt.co.uk/articles/article.cfm?articleid=20676 http://www.telegraph.co.uk/finance/4972091/Toyota-cuts-production-and-pay-as-motor-industry-crisis-deepens.htmlhttp://www.investopedia.com/articles/economics/08/understanding-microeconomics.asp http://business.timesonline.co.uk/tol/business/industry_sectors/industrials/article7032980.ece http://www.smmt.co.uk/industryissues/index.cfm?catid=3725sid=259iicatid=P_1002 http://www.smmt.co.uk/industryissues/index.cfm?catid=3725sid=259iicatid=P_973 http://www.smmt.co.uk/industryissues/index.cfm?catid=3725sid=259iicatid=P_4093 http://www.smmt.co.uk/industryissues/index.cfm?catid=3725sid=259iicatid=P_982 http://www.smmt.co.uk/hottopics/index.cfm?catid=3725sid=259 http://business.timesonline.co.uk/tol/business/industry_sectors/industrials/article7006329.ece http://www.comparecontracthire.com/blog/index.php/2010/05/scrappage-registrations-totalled-395000-units-says-smmt/

The Importance of the Dance in A Dolls House Essay -- A Dolls House E

The Importance of the Dance in A Doll's House    Dancing is a beautiful form of expression that reveals a good deal about a person in a matter of minutes.   Characters that dance in plays and novels usually flash some sort of underlying meaning pertaining to their story, shining light on themselves, other characters, and the movement of the action.   In Ibsen's A Doll's House, Nora's performance of the tarantella summarizes the plot of the entire play.      Take, for example, Torvald's attitude towards Nora's offbeat movements.   Torvald plays the piano for Nora initially, but becomes so frustrated with Nora's dancing that he abandons his tune and attempts to re-teach Nora the tarantella.   This simple confrontation reflects the main action; Torvald is the one who provides Nora with music and who had previously taught Nora how to dance, just like he is the one who gives her a home and has sculpted her into his ideal wife.   Nora cannot dance rhythmically to Torvald's song because both her lies and Torvald's strong belief in app...

Friday, July 19, 2019

The Hypodermic-Syringe Model Essay -- science

The Hypodermic-Syringe Model The hypodermic syringe model suggest that the media is alike a magic bullet and when an audience is targeted it will immediately be knocked down when they are hit. The hypodermic-syringe model also suggests that society is passive and the media â€Å"inject† their media influence into society and manipulates it. The Frankfurt school envisioned the media as a hypodermic syringe, and the contents of the media were injected into the thoughts of the audience, who accepted the attitudes, opinions and beliefs expressed by the media without question. This model was a response to the German fascist’s use of film and radio for propaganda, and later applied to American capitalist society. The followers of the hypodermic model of Effects adopted a variant of Marxism, emphasizing the dangers of the power of capitalism, which owned and controlled new forms of media. Researchers in the fifties also supported the Effects model when exploring the potential of the new medium of television. Researchers were particularly concerned over increases in the representation of violent acts on television, which related with increases in violent acts in society. In the nineties, there was considerable concern over what were called "video nasties". The tabloid papers created a moral panic over whether particular violet films could influence child behavior – and whether Childs Play 3 influenced the child killers of Jamie Bulger, but there was no proof that they had watched it....

Thursday, July 18, 2019

Adapting materials

Adoption Concerns with whole course books. Adaptation Concerns the parts that make up that whole. A process of matching To maximize the appropriate of teaching materials In context. Evaluation for adapting materials An exercise to help to develop insights into different views of language and learning into the principle of materials design.Process of adaptation -Internal factors (what the material offers) Content Organization consistency Choice of topics Skills covered Proficiency level Grading of exercise External factors (what we have) Learner characteristics Physical environment Resources Class size Reasons for adapting Aim to make the materials more communicative and authentic Aspects of language use Skills Classroom organization Supplementary materials Principles and procedures -Adding, including expanding (qualitative) and extending (quantitative) Materials are supplemented by putting more into them.Extensions of an existing aspect of content and bringing a qualitative and quant itative change. Expanding adds methodology by moving outside It and impotent. Deleting or omitting Reducing the length of materials as subtracting from it. Small scale-over part of an exercise Large scale-whole unit of a course book Modifying An internal change in the approach or focus of an exercise.Rewriting modify linguistic content and make it more communicative relate activities more closely to learners' own backgrounds and interests introduce models of authentic language set more purposeful tasks Restructuring classroom management design interactive exercise based on number of students and size of class Simplifying One type of modification, a ‘rewriting' activity.Simplify instructions and explanation of exercises and activities and as well as layout of activities To make it becomes easier to be understood Simplification of content and the ways in which that content is presented This technique is mostly use for to reading passages to change various sentence-bound elements to match text more closely to the proficiency level of a particular group of learners. – One can simplify according to Sentence structure. Sentence length is reduced Complex sentence is rewritten as a number of simpler ones.Lexical content Number of new vocabulary items is controlled. Grammatical structures Passives are converted to actives. Reordering Adjusting the sequence of presentation within a unit. Taking units in a different sequence from that originally intended. Separating items of content from each other Regrouping them and putting them together Conclusion work more relevant to the learners. Reference McCullough, J. & Shaw, C. (2003). Materials and methods in LET. (2nd De. ). Australia: Backfill Publishing.

Wembley vs Emirates Football Stadiums

facial expression of Wembley scene of action was supposed to be finished by May 2006, but finished in March 2007. at that place were some(prenominal) controversial between node, contractor, sub contractor, antecedent etc. and some cases check up in the court. The causes for these controversial were identified primarily due to adversarial contracts, un sane risk each(prenominal)ocation, cash-flow problems, shape changes, poor performance, poor site focal point and litigations.Several reasons were adduced for the successful delivery of the Emirates football stadium but the most overarching and nonable of the reasons was the impressive and selective put up chain created by the main contractor (Exceptional Performer, 2007). In both(prenominal) case studies one batch clear see good and bad practices demonstrated. spell both cased had the same procurance routes, with only slight modifications to allow client to have greater input in design, they both had different outco mes. In all respects the Emirates scene of action is surely the success as the most successfully penalise draw of the two.In both cases there were many an separate(prenominal) challenges as well but it is how they were met with that placed their fate. The Wembley Stadium case was clearly a disaster in planning, financing and execution. This may be attributed to the deficiency of knowledge and escort on the part of the contractor, Mutliplex about the UK complex body part industry, which is why they possibly formed a consortium with Bovis in the beginning. Due to lack of a firm establishment in the UK industry, Multiplex was faced with much surmise from locally well established firms.The point that so many disputes arose in legal injury of payments and court proceedings did not sponsor much either. The Emirates Stadium on the other hand was a perfect typesetters case of best practice. They incorporated sustainability, collaborative working, and powerful and selective r eturn chain management. The supply chain was a crucial member that Sir Robert McAlpine had established through experience in the UK industry while working with different subcontractors and forming strong ties with them. This strong ties and trust between contractor and subcontractors was lacking in the Wembley case.However, contractors totally be not to bare the commit the structure clients have a character in the success of a vomit up as well. In the Wembley case the construction client mismanaged money by expending too much in investigations and check up ons. They as well as pointlessly hired management consultants and did not heed their advice. Therefore, the clients side towards contractor selection is imperative and can lead to project failure if not done prudishly. This was the case in the Wembley Stadium where the Australian contractor was rushed into agreement.In the end collaborative working and an effective supply chain coupled with a proper decision making cl ient are vital ingredients for a project to be executed effectively and efficiently. From the literature review found that, projects suited to GMP had the following characteristics greet certainty was a primary object lens Time was a primary quarry The scope was fully defined The project was simple It was a development project The parties had previous experience in GMP contracts There was a good team ground relationship between the parties The personalities were appropriate (fair, reasonable and empathetic)

Wednesday, July 17, 2019

Business blue print document Essay

Recurring salaryments/deductions infotype (0014) in which you capture the detail of periodic/ reparation requital or deductions. For Mastek, Indian compensationsheet, they will be medical checkup Reimbursement, Reimbursement of Books, Leave Without cave in, Guesthouse logical implication, Personal Courier and Personal STD/ISD call off Call. special conciliatements infotype (0015) in which you capture the details of yearly or irrepair stipend or deductions. For Mastek, Indian paysheet department department, they will be LTA and Performance throw. Contract elements infotype (0016) supervise discovers infotype (0019) Family details infotype (0021).Membership fees infotype (0057), which you keister excessively ascertain up to mention payments to third-parties in particular cases apostrophize distri besidesion infotype (0027), which you bed as hale set up to assign the internal order frame if the bell of the employee is to go to the internal order bout. You f inish besides assign the theatrical role so that still that percentage of price goes to the internal order. If this infotype is non maintained or the percentage designate to the internal order in this infotype is non 100 percent, then the brass picks the price center assignment from infotype 0001 to attach the cost.force play IDs infotype (0185) These infotypes stir been modified to handle Indian requirements. India-specific infotypes containing payment info These infotypes wee been created for India paysheet department only Previous participation taxation details infotype (0580) Ho development (HRA/CLA/COA) infotype (0581) Exemptions infotype (0582) Car & enthrall of training infotype (0583) Income from other sources infotype (0584) air division 80 deductions infotype (0585) Investment details (Section 88) infotype (0586) Provident fund voice infotype (0587).Other statutory deductions infotype (0588) Long term reimbursements infotype (0590) * Nominations info type (0591) 1. 7 invoice TO be resolve overcompensateage for government none paysheet dissolvers to Accounting, diametricly known as identity card to Accounting, is a accompanying activity that is carried out after a no-hit payroll department give way. It usually takes place for to each one payroll period. During posting to Accounting, all posting selective information for the payroll results is selected, summarized, formatted, and then posted to the integrated divisions in Accounting.You seat also archive the data created in posting to Accounting. integrating Different R/3 components be involved in posting to Accounting, and these components have mingled data requirements payroll department (PY) pecuniary Accounting (FI) superior general Ledger Accounting (FI-GL) Accounts Payable (FI-AP) Accounts Receivable (FI-AR) particular Ledger (FI-SL) Controlling (CO) INTEGRATION OF THE COMPONENTS IN POSTING TO ACCOUNTING paysheet (HR) The principal organizational idea in payroll department is the earnings type.A plight type classifies personnel expenses correspond to tax, restitution, labour legislation, pay scales and other operational characteristics. In payroll department, lucre types be also used for saving additional cultivation in the payroll results, for example, in the form of cumulation pursue types (total arrant(a) amount of money or gross tax amount), or in the form of enlist types for other important amounts (statutory clear pay or deepen amount). The organizational assignments valid for all periods argon also created within Payroll as well as special cost assignments, and the wage types be assigned to this information.During payroll, additional wage types be created to provide data for cost forecasting and these are saved in the payroll results, for example, the portion of the wage that is not relevant on public holidays. Financial Accounting (FI) Financial Accounting is responsible for(p) for the flow o f payments. The payment flows are posted to particular levels depending on the type or identity of the receiver, and on the out-of-pocket date of the payment. personify Accounting (CO) Cost Accounting disassembles the costs according to the type (cost type = G/L bank note) and assigns them to cost centers or to other cost assignment objects (additional account assignment). notice to be allows you to post costs to the pursuit account assignment objects Position in node order Implementation Considerations To ensure that the process of posting to accounting is completed successfully and without problems, please make the following settings Customize the components involved (wage types, accounts, other account assignment objects) Customize Reporting for posting to Accounting.The somebody components involved in posting to Accounting can be organized as follows whole components are in the same clients of the R/3 corpse. The accounting components are in a different system to the Payroll application component. This could be a different R/3 System, an R/2 System, or a third-party system. If the individual components are distributed in variant systems, gather setting up Posting to accounting. Reporting for posting payroll results to Accounting Posting documents In Customizing for Cross-Application Components nether Scenarios Posting payroll results to Accounting.Features Posting to Accounting allows you to perform the following functions Post retroactive accounting officiates Pension livestock report for exempted Trusts (Though this is not applicable for Mastek, this is for the information only) 1. Form 4 pass on of members loss service 2. Form 5E Return of the members leaving service during the month 3.Form 6 instruction of contributions for the month ESI Reports 1. Form 6 2. Form 7 These reports are generated every half-year, in the months of October and April for the preceding contribution period. sea captain appraise (P appraise) Reports Pa yroll-India caters to the PTax Reports for the following articulates 1. Andhra Pradesh (monthly) Not applicable for Mastek 2. Gujarat (Monthly) Not applicable for Mastek 3. Karnataka (Monthly) Applicable for Mastek 4. Maharashtra (Monthly) Applicable for Mastek 5. air jacket Bengal (Monthly) Applicable for Mastek 6. Tamil Nadu (Half-Yearly) Applicable for Mastek 7.Madhya Pradesh (Annual) Not applicable for Mastek These reports are to be generated at the relevant absolute frequency for those evokes where PTax is applicable. The selection screen captures the following information 1. The PTax report can be generated for a PTax grouping created for the military group Sub eye socket. 2. The report is printed in the relevant format for each state as applicable and for those employees for whom the PTax and return is applicable. jade Welfare Fund Reports Payroll-India caters to Labour Welfare Fund reports for the following states 1. Gujarat (Half-Yearly) Not applicable for Mastek 2.Using the bar pall automatic data processing link the gross payroll results shall be uploaded to ADP for the final processing. The fag US Payroll allows MSI to process payroll for employees in the get together States, apply data from cosh Personnel judiciary and Benefits under a wide variety of configurations. The wear out Payroll system also offers a number of standard payroll reports. The Tax Reporter component will allow MSI to generate all inevitable state and national tax forms, such as SUI reports and W-2s. Further reports can be generated using Ad Hoc Query in conjunction with an fall guy Payroll Infotype. thus far bulk of MSI requirements for legal reporting and so forthshall be met by ADP as the net payroll processing will be in their domain. integrating The Payroll component is integrated with other black flag HR components, such as Personnel judicature and Benefits. in that position are also interfaces to other wear modules such as Financial Acco unting and Controlling. 2. 1 COMPENSATION FOR USA PAY SCALE showcase During the discussions it was realized that across Mastek Group, the pay give to the employees is split up into the following classifications 1. Technical Professional 2.Technical Semi-professional 3. Non-Technical Professional 4. Non-technical Semi-professional 5. Others Professional 6. Others Non-professional The same will be piece as the Pay weighing machine Types in the fag R/3 system. PAY SCALE stadium The Pay Scale Area will take a breather same as we have be our Personnel Areas. at that placefore the following will be the Pay Scale Areas in the gull R/3 system 1. Santa Clara 2. Dallas PAYROLL AREA & PAYROLL fulfilment In MSI, a semi monthly payroll period shall be used for running the payroll. and so the payroll area defined in the SAP R/3 system for MSI is 02 Semi Monthly USA PAY SCALE GROUP The Pay Scale Group will be in terms of grades in the organization. The list of Pay Scale Gro up that is to be customized as under 1. T2 2. T3 3. G2 4. G3 5. G4 6. G6 7. G8 8. G10 9. G12 10. G14 11. G16 12. G18 13. G20 14. escort Trainee 15. Temporary PAY SCALE LEVEL There is no sub-classification of Pay Scale Groups, which can be actped to the Pay Scale take. At Mastek the salaries are defined in terms of Total Annual stark(a) (TAG) and then the money is divided into the various wage types of the employee.For the purpose of customization, one Pay Scale Level will be defined For the US compensation, Dallas has been interpreted as base location. The location is also considered for the US compensation package. To start the compensation review, first Mastek has to map the US posts with the Indian Grades. The US Grades are as follows D2 D1 C2 C1 B2 B1 A2 A1 How they are mapped Indian Grade US Grade G4 D2 G6 D1 G8 C2 G10 C1, B2 G12 B1 G14 A2 G16 A1 The salary survey is done by an orthogonal agency and the salaries are fixed found on that.There are four major heads under which the salary is fixed for the review 1. foundation fee 2. Location Allowance 3. Skills 4. Performance Pay seam MASTEK has decided that Indian grades shall be applicable globally and the US grades shall be mapped to equivalent Indian grades. However MASTEK is yet to provide the mapped list of grades for the same. The Reviewed salary is compensable as Base salary and the relevant amounts are paid under the other heads. Thus the salaries are finalized for each and every employee in USA. It is to be celebrated that the salary survey report is Grade based in USA.As Dallas is taken as Base location, the amount for Location Allowance is fixed on the basis of the location the employee is scheduled to work in. For finalizing the location allowance the following factors are taken into account 1. Accommodation Cost, 2. Transportation Cost, 3. Tax Rate, and 4. Food Cost. All this is relevant to the Indian employees who visit USA from India. There is no information operational as to how the compensation review takes place for the US nationals in USA. 2. 2 USA SPECIFIC BENEFITS ADMINISTRATION COBRA COBRA stands for the Consolidated bus Budget Reconciliation Act of 1985.It requires the vast mass of employers to offer continuation of coverage to covered employee and their qualifieds who, due to certain COBRA qualifying events, lose group wellness plan coverage. Infotype 0211 COBRA Qualified Beneficiary Infotype 0212 COBRA Health proposal Infotype 0270 COBRA Payments MSI pays 100% for its employees wellness insurance superiors. Employees dependents are eligible to participate in the same health insurance, however its the employees responsibility to pay the premium costs. Anthem Health provides both Medical and dental insurance for MSI employees and their dependents.LIFE INSURANCE MSI provides life expiration and dismemberment insurance coverage for all of its employees through with(predicate) UNUM Life Insurance Company effective from the date of joining MSI. The beneficiary will receive 2 times the employees annual base salary. 401 K curriculum All employees are eligible for this plan MSI does not make any contributions to this plan Employee can guide up to 25% to a maximum of USD 10,000 per calendar year. CAFETARIA PLAN Also known as Section 125 Plan. Employees can pay for medical and dependent care expenses with Pre Tax Dollars to avail of tax advance under this plan. Employees may choose to have designated amount of their income directed towards this plan. This is solely and employee contributed benefit. 2. 3 STANDARD SAP US PAYROLL FEATURES SAP Payroll allows MSI to run payroll for employees in all states. Requisite statutory reports, such as Federal forms 940, W-2, W-3, and all state SUI forms are also supported by the SAP system. Payroll does not just involve the reckoning of wage, but consists of a variety of processes that are become increasingly important due to the employers increase obligation to supply be nefits and medical welfare.You can also control the financial system of third-party providers. The System calculates the gross and net pay, which comprises the individual payments and deductions that are calculated during a payroll period, and are received by an employee. These payments and deductions are let ind in the computer science of the remuneration using different wage types. However, since MSI has out sourced its net payroll processing to a third party called ADP. accordingly only the gross payroll shall be run and an interface shall be provided to send data to ADP for net payroll processing and deduction of Taxes etc.After the remuneration payroll you can lease out various subsequent activities, for example, you can see to remuneration payment or the creation of various lists, and make evaluations. The stark(a) Payroll component processes employee lord data from SAP Personnel Administration and generates wage types and amounts to be used by the Net Payroll component, or to be exported to a third-party product for net tally. Pre-tax deductions and earnings are processed within the Gross Payroll component. Integration.The Gross Payroll component is nigh integrated with the SAP Personnel Administration and SAP Benefits components Payroll in Dialog Mode theatrical role The payroll program is run at a specific point in time, not only to calculate an employees basic remuneration but also any special payments, overtime payments or bonuses that must be effected for the period in question. You can follow the procedure of payroll right off in negotiation mode. Payroll in dialog mode is particularly suited to simulate a payroll run for an individual payroll area or individual personnel numbers. Payroll in a Background OperationUse When you have checked all the settings for the payroll run, and have well-tried the run in a simulation run, you can perform the payroll run in a background job. Off-Cycle Activities Purpose As an addition to veritable(a) payroll, which carries out payroll at fixed regular intervals, this function enables you to carry out specific off-cycle payroll activities for individual employees on any day. You can sleep with a check to replace payments that were originally make to an employee by check or by transfer but which the employee did not receive, or if the check is in an unusable condition (for example, torn).You can reverse payroll results that were created by a regular or off-cycle payroll run. You can enter a check number into the system retrospectively for a payroll result for which you have already issued a check manually. 2. 4 MSI US PAYROLL GROSS unconscious processING Purpose The Gross Payroll component processes employee verify data from SAP Personnel Administration and generates wage types and amounts to be used by the Net Payroll component, or to be exported to a third-party product for net calculation. Pre-tax deductions and earnings are processed within the Gross Payroll component.Inte gration The Gross Payroll component is most integrated with the SAP Personnel Administration and SAP Benefits components Payments The individual payments form the basis for the calculation of an employees gross remuneration, which is the core part of payroll. Gross remuneration is the starting point for the calculation of social insurance and tax payments, and also for the calculation of net remuneration. social structure In the R/3 System, payments are split into the following categories according to their characteristics Basic pay.Basic pay consists of the fixed wage and salary elements that are paid in every payroll period. You enter them in the form of wage types in the basic pay (0008) infotype. Recurring payments and deductions Recurring payments and deductions are paid or retained with fixed frequency. The system determined the payments using factors such as overtime, leave or substitutions. The wage types that illustrate these factors are entered in the recurring payments and deductions (0014) infotype. In the processing stage the system uses the Customizing settings representing the collective agreement. Additional Payments.Additional payments are remuneration elements that are not usually paid in each payroll period, and that are not paid at regular intervals. You enter them in the Additional Payments (0015) infotype. Benefits Integration to Payroll Purpose Users of the R/3 Benefits component can use Benefits Integration to streamline the payroll calculation process for their employees. The Benefits Integration component allows benefits-related deductions and contributions entered in master data to be processed during net payroll processing. Integration This component integrates the Payroll component with the Benefits component.Deduction and contribution amounts can be remitted to benefits providers using functionality from the terce Party Remittance component. 2. 5 THE PAYROLL PROCESS 2. 6 US PAYROLL REPORTING cosmos The R/3 HR Payroll System pr ovides all restrictive and tax reports indispensable by U. S. federal and state law, such as SUI reports for state unemployment agencies, W-2 reports for the federal and state governments, and the doubled Worksite Report for the berth of Labor Statistics. Additional payroll reports are available for other business purposes, such as the advanced Hire Report.These reports allow efficient evaluation of payroll data and ensure compliance with government regulations. Integration Payroll reports access information from all HR Infotypes and evaluate data from HR Time caution and HR Organizational Management as well as HR Personnel Administration. Features R/3 Payroll offers numerous internal and regulatory reports, including peeled Hire Reporting Tax Reporter for federal and state reports Law requires companies to report the results of their payroll calculation to several tax authorities, including the federal government and legion(predicate) state and local governments.This compon ent enables you to produce regulatory reports for government authorities in the format required by each authority. Reports that Tax Reporter supports include Form 940 Employers Annual Federal Unemployment Tax Return, Form 941 Employers Quarterly Federal Tax Return, Form W-2 Wage and Tax Statement, the 1099-R form and the Multiple Worksite Report. NOTE-In case of MASTEK the above reports may be provided by ADP since ADP shall be responsible for running net payroll and doing all calculations and deductions for the same.