Tuesday, August 25, 2020

brave new world :: essays research papers

     The tale â€Å"Brave New World†, by Aldous Huxley, is a history book composed for what's to come. The creator imagines our general public later on and the risky course it is going in. â€Å"Brave New World† section reality makes likenesses between these two universes. Our general public depends on balance and when that parity is broken, misery collects. On the off chance that the fact of the matter was covered up, satisfaction would never be upset.      In section sixteen, Mustapha Mond clarifies why their general public shrouds reality and how reality could cause torment. Soma is utilized in the â€Å"Brave New World† to forestall reality or any clichã ©s that could cause despondency. Lenina, â€Å"A gram is in every case better than a damn,† â€Å"A gram in time spares nine.† truly we call that medication misuse. Medication addicts utilize various substances to get away from the cruel truth of truth. Living without the medications appears to be impossible and startling in the two universes.      ‘Hypnopaedia’ is utilized to show individuals their lifestyle and good exercises. In the story a little youngster named Ruben Rabinovivch nodded off with the radio on tuning in to an educator giving a talk. At the point when he got up the following morning he could present the realities, however didn't have the foggiest idea what they implied. In our general public, individuals utilize comparable strategies with tapes to learn and remember realities. Likewise purposeful publicity and ads are use to persuade or even to control our perspective into what the sponsor needs us to accept. In the event that somebody in the â€Å"Brave New World† society doesn't follow the promulgation, they are viewed as strange and an outsider. We do likewise in our present reality by not tolerating somebody in our gathering in the event that he has various convictions, culture or religion.      I consider the ‘Nine Years’ War’ to be contrasted with the war in Afghanistan. The biochemical fighting is utilized in the two universes. Our progress today is concerned and frightened. On the off chance that the reality of the situation were covered up, with respect to the â€Å"Brave New World† perhaps our general public would be cheerful, as well.

Saturday, August 22, 2020

Lobbing group Essay Example | Topics and Well Written Essays - 750 words

Hurling gathering - Essay Example Opportunity House focal crucial to guarantee the administration is responsible to their kin, the correct principle of law is maintained, there is the right to speak freely of discourse and articulation for all, affiliation and guarantee there is regard for opportunity and privileges of the minority. Opportunity House mostly focuses on laws with respect to human rights the common society and concerning correspondence and data. It centers around decides that encourage free and unprejudiced progression of data and thoughts through the media or the Internet. Opportunity House targets mostly the lawmakers who pass and revise the laws with respect to the right to speak freely of discourse, free Internet and opportunity of the media and the security organizations that are against opportunity of correspondence and the Internet. Opportunity House is a leading group of trustees who are involved for the most part work pioneers, business pioneers, previous senior government authorities, researchers, columnists and scholars. The board individuals and the association don't recognize itself with either the Democratic or the Republican gatherings in the USA. The individuals who join must have one voice and concur that advancement and making the administration responsible for human rights and vote based system is significant to American residents interests locally, universally and towards accomplishing worldwide harmony. Approach motivation of Freedom House particularly the opportunity of articulation and that of worldwide Internet opportunity has support from people and huge companies. Supporters particularly the staff individuals and load up individuals who devote their time and cash towards Freedom House are for the most part political fans who need a liberal society where the administration is responsible. Accomplishing such interests for themselves and the network they live in will guarantee a superior life all in all for the nation and the world in general. A few individuals from the association are specialists who make gifts to the Freedom House

Saturday, August 8, 2020

Longstreet, James

Longstreet, James Longstreet, James, 1821â€"1904, Confederate general in the American Civil War, b. Edgefield District, S.C. He graduated (1842) from West Point and served in the Mexican War, reaching the rank of major. At the outbreak of the Civil War he resigned from the U.S. army and became a Confederate brigadier general. He took part in the first battle of Bull Run and in the Peninsular campaign. His creditable performance at the second battle of Bull Run (1862), at Antietam, and at the battle of Fredericksburg led to his promotion (Oct., 1862) to lieutenant general. In 1862â€"63 he held a semi-independent command S of the James River, returning too late to aid General Lee at Chancellorsville. He commanded the right wing at Gettysburg (1863), where his delay in taking the offensive is generally said to have cost Lee the battle (see Gettysburg campaign ). He fought at Chickamauga in the Chattanooga campaign and unsuccessfully besieged Knoxville (1863). Returning to Virginia in 1864, he disting uished himself in the Wilderness campaign , where he was wounded. Longstreet participated in the last defense of Richmond, surrendering with Lee at Appomattox. After the war he settled in New Orleans, became a Republican, and held a number of federal posts. He criticized Lee's conduct at Gettysburg harshly and was long unpopular in the South. As a general, he is considered to have been a poor independent commander and strategist but an excellent combat officer. His opinions on the war are expressed in his From Manassas to Appomattox (1896, repr. 1960). See G. Tucker, Lee and Longstreet at Gettysburg (1968); W. G. Piston, Lee's Tarnished Lieutenant: James Longstreet and His Place in Southern History (1987). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. See more Encyclopedia articles on: U.S. History: Biographies

Saturday, May 23, 2020

Aristotelian Tragedy Macbeth Essays - 611 Words

Aristotelian Tragedy: Macbeth Aristotle is known widely for developing his ideas on tragedy. He recorded these ideas in his Poetics in which he comments on the plot, purpose, and effect that a true tragedy must have. The structure of these tragedies has been an example for many writers including Shakespeare himself. Many of Shakespeare’s plays follow Aristotelian ideas of tragedy, for instance Macbeth does a decent job in shadowing Aristotle’s model. Aristotle describes one of the most important elements of a tragedy to be a tragic hero. The tragic hero however must present certain qualities such as nobility and virtue. In the play Macbeth, Macbeth is a perfect example of a tragic hero. Macbeth begins the play coming home from battle,†¦show more content†¦However, Macbeth does not go unpunished as he suffers countless dreams and illusions that drive him to insanity. The loss of his wife also brings Macbeth to his final denouement. In the end, Macbeth is killed by Macduff; because of his arrogance he believed he was invincible even after being told his fate. Macbeth reaches his end through the same way he lived his life, through murder and deception. Many argue over the fairness of Macbeth’s life, but the goal of a tragedy in Aristotle’s view point is to strike fear and pity in the audience through harsh punishment upon the hero in extreme ways. Finally, Aristotle claims that in order for a tragedy to be effective, the fear and pity must be released from the audience through catharsis. First the tragic hero must gain some knowledge from his tragic life. Macbeth shows this self-realization in his ‘yellow leaf’ soliloquy when he expresses remorse for his actions. Also, in the end he knows he must fight until the end whether his fate is death. At this point the audience is cleansed of the emotions of the plot and the tragedy is finished. Macbeth is a primary example of a typical Aristotelian tragedy. It follows th e structure necessary from the tragic hero, to his downfall and ultimately to the catharsis necessary for an original Greek drama. The aspects of this play are a perfect example of the tragedies of thatShow MoreRelatedHamlet and Macbeth Compared as Aristotelian Tragedies Essay1732 Words   |  7 PagesAristotle’s Poetics is often considered the blueprint to a successful tragedy; his outline has been used for hundreds of years. Aristotle defines a tragedy as â€Å"an imitation of an action that is serious, complete, and of a certain magnitude†¦ in the form of an action, not of narrative; through pity and fear effecting the proper purgation of these emotions† (House 82). Aristotle believed that the most important part of a strong tragedy was the plot, and from that, the other elements such as character,Read MoreEssay on Hamlet and Macbeth Analyzed as Aristotelian Tragedies1839 Words   |  8 Pageswritten tragedy; his methods have been used for centuries. Aristotl e defines a tragedy as â€Å"an imitation of an action that is serious, complete, and of a certain magnitude†¦ in the form of an action, not of narrative; through pity and fear effecting the proper purgation of these emotions† (House, 82). The philosopher believes the plot to be the most vital aspect of a tragedy, thus all other parts such as character, diction, and thought stem from the plot. Aristotle affirms, â€Å"the principle of tragedy – theRead MoreEssay about Macbeth, Aristotilean Tragedy?1056 Words   |  5 Pages According to Aristotle, there are certain rules which make a tragedy what it is. After discussing the rules of an Aristotelian tragedy, we will try to learn whether Shakespeares Macbeth is classified as such. We will find that although Macbeth is considered a tragedy among many people, it does not meet the requirements of an Aristotelian tragedy. Aristotles definition of a tragedy consists of several points. A tragedy, then is the imitation of an action that is serious and also, as havingRead MoreEssay on Definitions of a Tragedy: Shakespeares and Aristotles1182 Words   |  5 PagesIn writing a tragedy, there are certain standards and guidelines to which an author or playwright must follow. One such standard is the Aristotelian definition of tragedy and the tragic hero. William Shakespeare’s The Tragedy of Macbeth is a perfect mold of an Aristotelian Tragedy. It displays all eight aspects of Aristotle’s definition of tragedy. It is set mainly in Scotland, but briefly in England during the eleventh century. It illuminates the ideal plot, in which the action of the story, orRead MoreGerald Deocariza Iii. Mrs. Jardine. English 3, Period 4.1161 Words   |  5 Pagesdestine for a serious downfall and set as the protagonists of a dramatic tragedy. A tragic hero gets For example, William Shakespeare wrote a play c alled The Tragedy of Macbeth to show Macbeth’s uprisings and downfalls. Macbeth’s downfall results to wrong judgements that combines fate and external forces. If his downfalls does not kill him, his downfalls can cause the tragic hero to suffer for the rest of his life. Macbeth gains the utmost respect from other people; on the other hand, he also losesRead MoreWilliam Shakespeare s Macbeth, Othello, And King Lear1479 Words   |  6 PagesWilliam Shakespeare s Macbeth, was the last of four great tragedies, including Hamlet, Othello, and King Lear, written during the Elizabethan Era. Herbert Courson states the play as, â€Å" â€Å"a powerful even for the mature Shakespeare. [which]... demands that we share its experience intensely, that we fell the strength of Macbeth’s thirst for kingship, the force of Lady Macbeth’s persuasions, the anguish of Macbeth’s struggle before the murder, and the impact of nature’s retribution after the murderà ¢â‚¬ Read MoreMacbeth as a Tragic Hero1513 Words   |  7 PagesMacbeth as a Tragic Hero William Shakespeare s plays have the reputation of being among the greatest in the English language and in Western literature. Shakespeare produced most of his known work between 1589 and 1613. His early plays were mainly comedies and histories, genres he raised to the peak of sophistication and artistry by the end of the 16th century. He then wrote mainly tragedies until about 1608, including Hamlet, King Lear, Othello, and Macbeth, considered some of the finestRead MoreAnalysis of the Actions of Macbeth and Doctor Faustus Based on Free Will and Fate1677 Words   |  7 Pagesactions of Macbeth and Doctor Faustus in Shakespeare’s and Marlowe’s plays come from the characters themselves or whether they were following a predetermined fate. In the play The Tragedy of Macbeth, written by William Shakespeare, each character’s destiny, or fate, seems to be predetermined by the supernatural and unpreventable by any actions meant to stop it from occurring. The c oncept of fate is a large component in many Aristotelian Tragedies, such as Macbeth. However, in the tragedy, The TragicallRead MoreEssay about There Are as Many Readings of Othello as There Are Readers.1972 Words   |  8 Pagesexample, Feminist, Postcolonial and Aristotelian. It is possible to suggest two readings which perhaps may link to audiences psychologically and ideologically more successfully - the Aristotelian and Feminist reading, and this is evident through the plot, characterization language, and themes underpinning the text Othello. Aristotle, the famous Greek philosopher first captured the Aristotelian reading. This reading in general perceives the text as a serious tragedy with the possession of certain tragicRead MoreEssay on The Power of the Witches in Shakespeares Macbeth 1379 Words   |  6 PagesThe Power of the Witches in Shakespeares Macbeth    The tragedy of Macbeth comes about because of a single event in his life. If that one moment, the meeting with the witches on the heath, had not happened then Macbeth would no doubt have gone on to be a loyal and respected subject of King Duncan and, later, King Malcolm. However, the meeting did happen and the powerful force of ambition was unleashed within Macbeth and Lady Macbeth. It is the combination of these two factors, the meeting

Tuesday, May 12, 2020

How to Make a Benzoic Acid Snow Globe

Its fun and easy to make your own snow globe using water and snow made from glitter or crushed egg shells, but you can use chemistry to make crystal snow that looks a lot more like the real thing. Snow is made from crystals of water. In this project, you precipitate crystals of benzoic acid, which has the advantage of not melting at room temperature. Heres how you make the snow globe: Snow Globe Materials baby food jar or ointment jar (~4 oz)1 g benzoic acidwaterbeaker or pyrex measuring cuphot plate or microwave or coffee makerstirring rod or spoonhot glue gundecoration to glue to the bottom of the snow globe, like a small plastic toyforceps or tweezerselectrical tape (optional) Assemble the Snow Globe There are a couple of ways to do this. There is my do-it-at-home method and then what you might want to do in a lab. Lets start with the lab instructions...In a 250 ml flask, stir 1 g benzoic acid into 75 ml of water.Heat the solution to dissolve the benzoic acid. You do not need to boil the water.Alternatively, you can measure 75 ml (5 tablespoons) of water that you heated in a microwave or coffee maker. Dissolve the benzoic acid in the hot water.Put down a bead of hot glue on the inside of the jar lid (or you can put it on the bottom of a clean, dry jar if you dont plan to invert the sealed jar).Use tweezers or forceps to position your decoration in the glue.While the glue is cooling, take a look at your benzoic acid solution. As it approaches room temperature, the benzoic acid will precipitate out of solution to form snow. The rate of cooling affects the snow. Slow cooling produces fine crystals. Quick cooling produces something more like snowballs than snowflakes.Pour the room-te mperature benzoic acid solution into the glass jar.Fill the jar as full as possible with water. Air pockets will cause the benzoic acid to form clumps.Put the lid on the jar. If desired, seal the jar with hot glue or electrical tape.Gently shake the jar to see the pretty snow! How the Snow Works Benzoic acid doesnt readily dissolve in room temperature water, but if you heat the water the solubility of the molecule is increased (similar to dissolving sugar in water to make rock candy). Cooling the solution causes the benzoic acid to precipitate back into solid form. Slow cooling of the solution allows the benzoic acid to form prettier, more snow-like flakes than if you had simply mixed benzoic acid powder with water. The cooling rate of water into ice affects how real snow appears, too. Safety Tips Benzoic acid is used as a preservative in food, so as chemicals go it is pretty safe. However, pure benzoic acid can be very irritating to skin and mucous membranes (heres an MSDS for you). Also, it can be toxic if large quantities are ingested. So... wear gloves and eye protection when preparing your solution. Excess solution can be washed down the drain (can neutralize it with baking soda first if you like). I wouldnt recommend this project for very young children. It should be fine for grade school kids with adult supervision. Its mainly intended as a fun project for teens and adults. The snow globe is not a toy—you dont want young children taking it apart and drinking the solution.

Wednesday, May 6, 2020

Internet Security Breaches Free Essays

string(74) " bases and financial documents pose a threat to the company’s security\." The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. We will write a custom essay sample on Internet Security Breaches or any similar topic only for you Order Now Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches. Cyber Fraud Cyber fraud can be defined as the use of software or internet services to defraud victims or taking advantage of them. This includes stealing information that is considered personal, in what constitutes identity theft. One of the most common forms of internet fraud entails distributing rogue security software. Internet technology has created the allowance for criminals to carry out fraudulent transactions, as well as transmit the proceeds of the frauds to other institutions. Cyber frauds occur in message boards, websites, emails and even chat rooms (Messner, 2012). Purchase fraud is an example of cyber fraud and occurs when a perpetrator proposes a business transaction to a merchant, only to use fraudulent mechanisms, such as a fake or stolen credit card, to pay for it. The eventuality is that the merchant does not receive the payment and may even be charged back for accepting credit cards. Another example of fraud is whereby theperpetrators post information about goods that they intend to sell. Interested buyers are asked to make payments for the purchase and delivery of the goods. However, it later turns out that the goods were non-existent and they had only been conned. The third example of cyber fraud is phishing, which is the act of masquerading as a person that can be trusted, such as bank agents or consultants, to acquire information that is sensitive, such as details of credit cards and passwords, among other details that victims may be convinced to share. Subsequently, the information offered is used for fraudulent transactions. It is argued that cyber frauds makeheadlines each day. In October 2012, Barners Noble Inc. made announcements that several PIN keypads had been hacked in as many as its 63 outlets, leaking the card information and PIN numbers of its customers. Easy Solution is one of the companies with evolving techniques of curbing cyber frauds. The company claims to be the only one that is well placed to curb various forms of electronic fraud, clouds and premises. The company has introduced an updated version of the Detect Monitoring Services, which entails timely fraud protection, enhanced monitoring capabilities and enhanced fraud protection. Detect Monitoring Service software effectively monitors the behaviors and patterns associated with phishing scams. Thus, it stops the threats before they cause damage. The software comprises of a relatively simple interface that can effectively function for all forms of clouds and even premises. It is argued that of over 800, 000 phishing attacks, the service enabled the company to detect as many as 76% on timely basis, exhibiting 3.6 hours of average deactivation time. Online transactions services have been particularly affected by cyber frauds. More often than not, customers often get cautious when asked to give personal information. Online transaction service providers have only resorted to instilling confidence in the customers as a way of encouraging them. This entails displaying policies, security badges and trust certificates, as well as the contact information. Online retailers should highlight security around the websites’ secured areas to assure customers that their confidential information is safe. This should be done, regardless of whether some browsers have security indicators built in them. Some online retailing companies, such as Amazon, display this through the use of the sign-in button. Others opt to use padlock symbols that are located in the sign-in areas. This is advisable, even when it is not needed by the customers. Online retailing companies are advised to give alternative contact options. Indeed, some companies are offering customer care support by using call backs, e-mails, and chats to enable users report suspicious activities. Data breaches Data breaches includeall those cyber activities characterized by unauthorized access, use and disclosure of individuals’ or organization information over or from the internet. Malicious attacks are considered to constitute the most expensive data breach, yet they are increasing. Malicious attacks account for as significant as 40% of the data breaches where negligence account for about 32% (In Defense of Data, 2013)Computer software companies, healthcare records and companies have been the most targeted and have accounted for as significant as 93% of the global data breaches (In Defense of Data, 2013). Network security is a necessity for every company. A company’s network cannot be said to be effective if it consists of security lapses. Threats to company’s network can be considered as a subject of various activities. However, former employees who leave the company due to downsizing can be considered as a significant threat. Other activities such as a daily courier dropping packages at the company’s premises, employees travelling on company business to other cities, or building management company installing a fire extinguisher system in company’s premises are not a serious threat. It can be argued that individuals with the potential of hacking, sabotaging and damaging systems are those with familiarity to nature and form of network system. Therefore, an employee that left the company has the capability of hacking the company’s network since they are familiar about the loopholes in the company’s network system. What increases the possibility of hacking is,if the employees left the company due to retrenchment, the attempts of network hacking could be fueled by the whims of revenge. It is argued that all former employees that worked in the company, accessing sensitive data bases and financial documents pose a threat to the company’s security. You read "Internet Security Breaches" in category "Papers" The fact that information technology does not respond to the altering of access points act as a fueling factor. Therefore, a person with information about the company’s network system has the potential of causing more harm than a hacker. According to the 2005 CERT survey, a significant number of former employees are increasingly utilizing the opportunity. The survey indicates that about 59% of the security intrusion is done by former company’s contractors;48% of those involved in hacking had been sacked;38% had left the company due to downsizing while 7% had been retrenched. The survey also notes that former IT professionals are particularly a significant threat to data security(Hazelden Foundation, 2012). Data breaches caused by negligence could be resolved by addressing the factors associated with negligence. On the other hand, data breaches caused by malicious software could be prevented by using appropriate network intrusion, detection techniques and anti-spyware software. Technological mechanisms would include updating and altering passwords for security purposes. Network intrusion/ Hacking Network intrusion or hacking refers to the unauthorized entry into a network, often characterized by malicious ambition of intercepting information from the network or website. The information can be used for other criminal activities such as fraud or espionage. Telvent Company hacking is considered as one of the recent hacking events that occurred in September 2012. The company has learned that its firewall and security systems have been compromised by the attackers who installed malicious software that enabled them steal project files. Telvent, a company whose services and software are applied in monitoring energy industry reported that it has been hacked which affected its operation in United States, Spain and Canada. The incident was blamed on Chinese hacking groups opposed to Western interests (Thiel, 2012). Lately, US officials have blamed Russia and China for staging intrusion attacks against United States for espionage, economic gains and other selfish motives. In November 2012, Leon Panetta, the US Secretary of Defense, had warned that United States was about to experience a cyber-attack comparable to Pearl Harbor, blaming hacking incidents that had been linked to the Middle East and United States Oil producers (Messner, 2012). The technological intervention to network intrusion is the development of Intrusion Detection Systems (IDSs). IDSs refer to application of device or software that aims at monitoring either networks or activities of systems against activities that are either malicious or that violate policies in place. Types of IDSs include Network Intrusion Detection Systems (NIDSs) and Hot-based Intrusion Detection System (HIDS). Network Intrusion Detection System is considered as one of the most popular approaches. Network Intrusion Detection System refers to a system that is designed to detect activities that are considered malicious such as service denial attacks, port scans, as well as cracking into computers via Network Security Monitoring. NID senses the packets coming through the network and scans them in order to identify patterns that are suspected to be malicious. Such patterns can be referred to as rules or signatures. Not only NIDSis limited to scanning of the network traffic that comes into the system but, one can also find a lot of important information concerning network intrusion from both local traffic and outgoing networks. More so, through NIDS, it is possible to stage attacks from the inside the network under monitoring and even a segment of the network. In this regard, such attacks are not in any way considered as incoming traffic. Usually, other various systems are incorporated to function with NIDS. The other network systems could, for instance, deal with updating the blacklists of firewalls using IP address of the computers under the use of real or suspected network crackers. NIDS consist of documentation (DISA) that utilizes ‘NID’ as a terminology with a target of distinguishing IDS that are internal from external. Just like any other IDS, NIDS comprises sensors and management console as its essential components. While management console deals with management and reporting, sensors deal with monitoring of networks. NIDS senses network intrusions through examination of network traffic. The system has the capability of monitoring multiple hosts. Usually, the access to the network traffic is gained through connection to a hub of networks, port-mirroring configured networks or even through the network taps. The NIDS sensors are situated at checkpoints of networks under monitoring. This are more often than not located in demilitarized areas or at the boarders of the network so as to increase effectiveness. All the network traffic is captured by the sensors before each of the packets’ contents are eventually analyzed for malicious network traffic. There are various examples of NIDS such as commercial products (such as ISS Realsecure, NFR Network Intrusion Detection System, Sourcefire and Computer Associates e Trust IDS) and freeware products (such as Ethereal, Snort and Tcpdump). Snort is the most common of all. NIDS should be considered as the most appropriate for organization securitybecause it ensures the greatest impact on the security of the network, takes shorter time to deploy compared to HIDS, yet it is relatively cheaper. Additionally, as long as it is placed on the outside of firewall or demilitarized zones to ensure for effectiveness, NIDS is capable of monitoring all forms of internet traffic and relays immediate feedback on the nature of network security. NIDS is very important to the general internet security. But particularly concerning the network security, NIDS is farther important to organizations in the following ways: first, NIDS has the capability of detecting attacks that HIDS cannot, for instance, fort scan and denial-of-service. Second, NIDS quickly detects and alerts on incidents of intrusion to avert maximum damage. This is particularly suited t o the demilitarized zones, considering the fact that internet providers usually situated at the zones are major computer attack targets. Third, NIDS is capable of reporting successful as well as unsuccessful attacks which is particularly essential as it offers a chance to better understand the network and hence, a key to network security enhancement. Fourth, NIDS equips organizations with knowledge regarding the environment of their network. Fifth, but for application of NIDS, it is difficult to identify network hacking. Lastly, NIDS is very important for organizations’ forensic evidence tool (Thiel, 2007). In this regard, it is not easy to tamper with the evidence unless the aggressors interfered with IDS. Launching worms Launching worms is a cybercrime that involves development of worms, also referred to as viruses, then releasing them on the internet domains. The worms slow down the internet connectivity or infect computers to stop them from functioning effectively. In 2000, FBI suspected incidents of cybercrimes being committed by the Russian citizens namely Alexey Ivanov and VasiliyGorshkov. It sought to track the suspected cyber criminals, luring them to come to United States with a ruse of a job promise (Quinlan, 2012). Activities of concocting worms and launching them on the internet are illegal in some parts of the world. As such, a person found to engage in cybercrime activities that spreads worms is likely to be prosecuted in various courts of countries affected by the worms. In some cases, the prosecution can be consecutive. However, in practice, few countries are in the position of claiming jurisdictions partly because some assume other countries would have incurred serious damages to consider it a priority to prosecute. These reflect how tricky dealing with cybercrimes across the borders is. Certain actions that are done on the internet may be legal in countries where they are initiated, but illegal in other countries that have access to the internet content. There are various recent incidents that entail virus launching. In October 2012, reports were made that FBI was to shut down a DNS as a way of containing viruses. Users were required to check their computers for virus and clean them before they could be allowed to access. These steps had been taken following the launching of the internet infestation by the DNS changer virus. The virus had cost the world billions of dollars (Quinlan, 2012). There are various technological approaches to worm problems. The most common approach is through installing anti-virus software. The antivirus software could be installed remotely on the computers, creating the allowance for all the information that streams in to be scanned for viruses. Malicious files and viruses are either blocked or repaired. Anti-virus could also be installed on the internet to scan the information that is sent over it. Websites, such as Google, are now offering such services. There are various antivirus software products on the market, including Avira, Norton and Kaspersky, which are effective in detecting and blocking malware (Nnap, 2011). Cyber bullying Cyber bullying has been cited as one of the areas that constitute internet security breaches. It entails transferring of abusesor information aimed at intimidating other people. Cyber bullying has turned out as the newest platform for which the people, especially the youth, are increasingly abusing each other. The more concerning issue is that there are currently no new appropriate techniques that intervene for cyber bullying despite the large numbers of children who have access to information and technologies. Internet and cell phone communications have been cited as tools of cyber bullying. Even more intriguing is that cyber bullying occurs during class time. Various incidents of cyber bullying have been witnessed recently. One of the cases that conspicuously featured on news headlines was of Alexis Henkel, a high school student. Henkel was charged with posting a number of anonymous and threatening messages on the internet account of one of her former classmates, who she accused of engaging in a flirt with his boyfriend (HazeldenFoundation, 2012). It has been argued that cyber bullying is particularly rampant because most cases are not reported. The most appropriate technological approach to addressing cyber bullying entails the application of safety tools, which facilitates content monitoring, as well as blocking. Indeed, various social sites now offer safety tools that enable users and administrators to report and block forms of communication that amount to bullying. These go hand-in-hand with the approach of instilling of ethical morals among the users, as well as enlightening the society on online safety, including ways of using online safety tools. Category of internet security Breaches Information leakageIntegrity ViolationDenial of ServiceIllegitimate use Data breaches; information stored in a website is accessed and released without authorityCyber bullying; entails sending abuses and information that undermines the integrity of other people Worm Launching; worms or viruses block internet access, denying the victims access to the internet. Additionally, some worms infect computers, making them malfunction. This also denies the victims access to computer services1. Internet intrusion and Hacking Hacking enables the perpetrators to access websites and use services illegitimately. 2. Cyber fraud Cyber fraud constitutes the motives of illegitimate use of internet resources How to cite Internet Security Breaches, Papers

Saturday, May 2, 2020

Enterprises free essay sample

The budding entrepreneur Sam Marcus along with investor Mr. Walter saw the potential of dynamic growth in Mike’s cabinet making company and purchased a small 25 year old cabinet-making company from its founder 2 year earlier. The company competed in basically two segments, commercial and residential construction markets. Sam envisioned the company to grow to 70 Million in sales by 2007. Though commercial market offered the growth opportunity, the operating cycles were rigid because of bidding process which only has 32 % success ratio. On the other hand, the residential market was small but has the ‘got’ ratio of 70 %. The case raised many interesting facts about the value of the customer for an organization perspective. Blackstone being the biggest customer offered annual sales of about 2. 4 % to CMR, but does this relationship offered any value add to the CMR? In the end Sam Marcus must decide whether to continue this relationship without increasing prices or to increase prices thereby threatening a relationship with CMR’s biggest customer. We will write a custom essay sample on Enterprises or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Relationship with Blackstone: Clearly, initiating a relationship with the Blackstone was a complete strategic fit for the CMR enterprises. CMR wanted to increase its revenue 10 times in coming 10 years by creating a scalable and replicable business model. Blackstone will not only offer CMR high volume of sales but also will give them the strong foothold in the residential market share. More so, with aggressive growth strategy in mind, alliance with the Blackstone will gave CMR an opportunity to standardize its business processes in order to benefit from improved operational efficiencies that comes because of scale of operations. The following calculation specifies quantitative value of relationship of black stone for CMR enterprises. Blackstone contribution towards the CMR for year 1998 Fiscal year 1998 | Revenue| Total Residential | 1596000| Blackstone Contribution| 210314| % of contribution in Residential Segment | 13. 17757| Es CM | 65,344| Though the contribution of the sales given by Blackstone does give a positive contribution margin to the business of $ 65344, but with reference to the detailed calculation mention in the exhibit1, the relationship does hurt the CMR bottom line once the SGamp;A costs were taken into account. The overall effect was negative 3,444 which clearly mean that CMR has lost money on this account. Clearly I believe this wasn’t the case when Sam decided to initiate the relationship with Blackstone. So what went wrong and where for CMR? CMR relationship with Blackstone deteriorated over time because of the multiple implementation difficulties that arises over time. CMR was not able to garner the operational efficiencies which they thought they would be achieving, like for example, homeowners were still visiting showrooms of CMR for which CMR has to have a salesperson available in stores to serve them. Secondly, neither CMR and nor Blackstone was able to limit the involvement of the homeowners in the design phase, which again costs money to CMR. Also, as homeowners were working with many other sub-contractors, it created a project –coordination problem for both CMR and Blackstone, resulting in last minute design changes. Such changes entail last minute workings on manufacturing process and often results in loss of material and increases shop floor time etc. Hence I believe, because of the above mentioned reason, there exists a gap between the budgeted shop floor hours and the actual shop floor hours put in on the job. CMR will be right because they can justify the price increase but from the Blackstone perspective, any increase in price might results in non-conformance of the agreement that existed between CMR and Blackstone. Subsequent to my understanding of the above mentioned problems, mentioned below are some of my recommendations that can help CMR in improving the overall customer value chain. Improve the Operational Efficiency on the shop floor: As evident from the data, CMR was clearly not doing a good job in budgeting shop floor hours put in on the Job. It will be tough to believe that much of 69 % of unfavorable variance shown in exhibit 6 of case can be explained by above mentioned problems. Therefore, my hunch is that either the Project Managers/Design engineers were not making right assumptions about a particular job or it is the workforce who is putting inflated numbers on the shop floor time spent on one particular job. In both the cases, it is project manager’s job to improve the operational efficiency in order to reduce the difference between the actual and the budgeted hours. As evident from the calculation mentioned in the attached exhibit1 , if the revenues are to be calculated only using budgeted hours which means only the budged hours are spent on the Job , CMR can get the positive 16% value add on its EBIT / Revenues. Price based on Actual shop floor hours spent in the Job : Going forward, CMR can change its strategy and can start charging based on actual time spent on the job but such a strategy entails a risk that it will open up their margins to Blackstone which again can beat the prices down. This is the price increase option, but the price increase can be justified to the Blackstone management. Based on my calculation In Exhibit1 (If priced right Colum), using such a strategy will again bring positive contribution margin to CMR enterprises. Improve project coordination: As much of the problems results from poor project coordination, having a strong agreement in place will give both CMR and Blackstone an advantage if the other party fails to deliver on its promise. I recommend the penalty clause in the agreement if any party fails to deliver on its promises. CMR should make the agreement more strong like limiting the no of changes, requiring sufficient time to make changes, and pre budget approvals before initiating any change on the job. Similarly from Blackstone perspective, they can penalize CMR on late delivery or wrongful delivery, qualities issue, etc. By having a risk and reward relationship, the project coordination problems can be improved. CMR can selectively outsource some Jobs to different contractor: If CMR can’t bring in operational efficiency into their company on certain jobs or in fact as a whole, what they can do is to hire a subcontractor who can do the job for them in much less price. Rather than losing a complete business with Blackstone, what they can do is to pick and choose which project they would want to do and leave the rest for their subcontractors. This way they can really optimize their efforts and any risks associated with poor jobs get transferred to other sub-contractors. Increase the Prices: If CMR thinks they are right and believes that their price doesn’t justify the amount of work needed on the particular job, they can go ahead and increase their prices up to the minimum whereby they can make the positive return. As mentioned in the case, the market will follow sooner than later.

Sunday, March 22, 2020

Maya Public Ritual Arts

The main idea, which is being explored throughout the course of Inomata’s article, is that the functional purpose of plazas in ancient Mayan cities has been concerned with providing Maya’s rules with an opportunity to expose their subjects to public spectacles.Advertising We will write a custom essay sample on Maya Public Ritual Arts specifically for you for only $16.05 $11/page Learn More In their turn, these spectacles served the purpose of endowing ancient Mayans with the sense of communal belonging – hence, contributing to the formation of collectively explored self-identity, on their part, â€Å"Large-scale theatrical events gave physical reality to a community and helped to ground unstable community identities† (Inomata 818). Given a rather unconventional sounding of this idea, it is not very surprising why the publication of Inomata’s article attracted a number of critical responses. According to Aoyama, Inomataà ¢â‚¬â„¢s line of argumentation can indeed be considered as such that represents a scientifically objective value, as the analysis of plazas’ holding capacities supports the validity of a suggestion that they could have been used for staging public performances. Aoyama explores the legitimacy of his point of view, in regards to the relevant empirical data, collected by archeologists in the Mayan cities of Aguateca and Copan. Becker, however, is challenging Inomata’s assumption. According to him, there is no rationale in believing that plazas served this specific purpose. This is because the amount of plazas’ open space may in fact be reflective of polities’ wealth, which in turn cannot be discussed as such that directly relates to the size of corresponding populations.Advertising Looking for essay on art? Let's see if we can help you! Get your first paper with 15% OFF Learn More Becker also criticizes Inomata for his failure to consider the p ossibility that, as time went on, plazas’ ‘holding’ function might have undergone a qualitative transformation. Yet, it is specifically the fact that Inomata’s idea is based upon the assumption that Mayan polities have been unilaterally governed by ‘divine rulers’, which appears to have caused Becker to adopt a strongly critical stance towards his colleague’s line of argumentation. Mazariegos’s reaction to Inomata’s article can be referred to as being generally positive. After all, he does recognize the validity of Inomata’s idea that Mayan plazas are in fact theatrical spaces. At the same time, however, Mazariegos points out to the fact that there a number of more effective ways of endowing people with the sense of a shared identity, such as prompting them to participate in a warfare, â€Å"Opposition to outside enemies, the shared vicissitudes of military campaigns†¦ are likely to create shared identitiesâ⠂¬  (822). Nevertheless, Mazariegos does welcome Inomata’s article, as such that is being potentially capable of advancing our understanding of ancient Mayan civilization. Ruiz and Pavon’s response to Inomata’s article can also be defined as being generally positive. In it, they acknowledge that by publishing his article, Inomata was able to contribute immensely to our knowledge of ancient Mayan culture. At the same time, Ruiz and Pavon suggest that there are no good reasons to believe that the artistic depictions on stelaes are being necessarily concerned with theatrical performances.Advertising We will write a custom essay sample on Maya Public Ritual Arts specifically for you for only $16.05 $11/page Learn More Partially, the validity of this suggestion can be illustrated in regards to the specifics of steales’ location, â€Å"The (Inomata’s) analysis links the presence of stelae with the largest plazas, but this link cannot be asserted categorically† (823). This appears to be the only critical remark in Ruiz and Pavon’s response. According to Clancy, the assumption that plazas in Mayan cities served theatricality-related functions is indeed being fully legitimate, â€Å"Ancient Maya plazas were surely places for performances choreographed by royal intentions† (823). At the same time, however, Clancy does not quite subscribe to the suggestion that it was solely ancient Mayans’ exposure to public performances, which used to endow them with the sense of a communal identity. Grube’s response to Inomata’s article can be defined as being enthusiastically supportive, â€Å"I strongly concur with Inomata’s conclusions† (824). According to Grube, the reason why Inomata’s idea can be considered thoroughly legitimate is that it correlates with our knowledge of how the rulers of Mayan polity-states used to go about exercising a political aut hority. Given the fact that, due to the absence of adequate technologies, Mayan rulers could not utilize any technical means for imposing their authority upon populations, they had no choice but to rely upon purely psychological ones. In this respect, staging public performances, on the part of Mayan rulers, would prove particularly effective. Even though that, while reflecting upon Inomata’s article, Isendahl did acknowledge its high discursive value, he nevertheless expressed his concerns as to whether Inomata’s utilization of the term ‘theatricality’ is being conceptually appropriate, â€Å"Theatricality is simply not the most appropriate analogy† (825).Advertising Looking for essay on art? Let's see if we can help you! Get your first paper with 15% OFF Learn More Moreover, Isendahl appears rather skeptical about Inomata’s assumption as to what accounted for the actual nature of centrifugal tendencies in ancient Mayan societies. According to Stuardo, Inomata can be well congratulated for having advanced our understanding of what might have accounted for the very principle of political centralization in ancient Mayan city-states. Nevertheless, it is specifically the fact that Inomata’s article allows the conceptualization of new methodological approaches to researching subject matters, concerned with ancient Mayan civilization, which Stuardo considers the most important aspect of this article. Looper’s response to Inomata’s article can also be defined as being highly supportive. Nevertheless, this response does contain a few critical remarks. For example, Looper points out to the fact that Inomata’s line of argumentation implies ancient Mayan societies having been rather secularized. However, this point of vi ew is being inconsistent with how the majority of historians and archeologists discuss the discursive implications of the factor of religion in these societies, â€Å"Theatrical metaphors and models risks secularizing ancient Maya performance† (826). According to Looper, however, this does not affect the overall legitimacy of Inomata’s article. According to Lucero, Inomata’s line of argumentation does deserve to be taken into consideration by mayanists. At the same time, Lucero suggests that in his article, Inomata downplayed the importance of a number of down-to-earth factors for ancient Mayans (especially rural dwellers) to be committed to participating in mass-gatherings. After all, one of the possible reasons why Mayan rural dwellers used to participate in these gatherings is that they were driven to do so by purely objective circumstances , â€Å"Rulers also fulfilled (people’s) material needs—specifically, water during the annual droughtâ₠¬  (827). The foremost of aspect of Newsome’s response to Inomata’s article is that this response stresses out the discursive importance how the author went about substantiating his line of argumentation. According to Newsome, it is not only that Inomata succeeded in revealing the actual mechanics of how Mayan rulers used to ensure the societal integrity of polities, but that he also succeeded in discovering a qualitatively new dimension to the very notion of ‘theatricality’. Therefore, the reading of Inomata’s article will prove utterly beneficial to just about anyone who strives to overcome the limitations of a number of euro-centric discursive conventions. In his response to Inomata’s article, Dorado criticizes the assumption that the staging of public spectacles should be considered a universally applicable tool of maintaining the social integrity of just about every hierarchically structured state. At the same time, however, Dorado expr esses his agreement with Inomata, as to the fact that plazas in ancient Mayan cities did in fact serve the function of accommodating crowds for a number of ritualistic purposes. According to Sanchez, Inomata’s hypothesis, in regards to the functional purpose of plazas, can indeed be defined as being logically and discursively coherent. At the same time, Sanchez suggests that this hypothesis is far from being considered as such that represents an undeniable truth-value, because as of today, the concerned subject matter remains relatively unexplored. Despite the fact that Tokovinine does admit that the author did contribute to our knowledge of ancient Mayan civilization, he also points out to an essentially speculative nature of many of Inomata’s conclusions. In particular, Tokovinine suggests that there is no well-grounded rationale in believing that the theatrical activities, depicted on Mayan murals, connote publicity. While replying to the earlier outlined responses, on the part of his critics, Inomata pointed out to the fact that, even though his interpretation of what should be considered Mayan plazas’ functional significance is far from being considered unchallengeable, it does help to explain how Mayan rulers were able to exercise an administrative control over their subjects. In addition, Inomata suggests that in many cases, responses’ critical overtones appear to reflect the fact that some of his arguments have been misinterpreted. I personally consider the line of Inomata’s argumentation logically coherent but somewhat speculative. This is because; the discussion of a significance of just about any public event through the conceptual lenses of a particular ‘performance theory’ becomes invariably affected by this theory’s discursive subtleties. Given the fact that there are strongly defined euro-centric undertones to how Inomata went about elaborating on the societal implications of public performa nces in ancient Mayan city-states, it is quite doubtful whether Inomata’s conclusions could be considered ideologically neutral. Bibliography Inomata, Takeshi. â€Å"Plazas, Performers, and Spectators: Political Theaters of the Classic Maya.† Current Anthropology 47.5 (2006): 805-842. Print. This essay on Maya Public Ritual Arts was written and submitted by user Izaiah R. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Thursday, March 5, 2020

Infosys and Corporate Social Responsibility in India Essays

Infosys and Corporate Social Responsibility in India Essays Infosys and Corporate Social Responsibility in India Essay Infosys and Corporate Social Responsibility in India Essay Corporate Social Responsibility (CSR) is defined as a businesss policy to encourage positive impact through its activities on the environment, consumers, employees, communities and all other member of the public who may be considered its stakeholders. [8] Analysis The Infosys Foundation The Infosys Foundation was established in the year 1996 with the goal of serving the under-privileged sections of the society The focus areas of the foundation are: Learning and education in 2007, the foundation embarked on the Library for Every Rural School program to get people to donate books in Karnataka, Andhra Pradesh, Orissa, and Kerala. It has since set up 35,000 school libraries, the largest rural education program in India. Healthcare Since its inception in 1996, the foundation has constructed hospital wards, donated medicines and advanced medical equipment to hospitals, and organized health camps in remote areas, all in order to get the under-privileged access to modern medical practices. Arts Culture The Infosys Foundation sustains and preserves several art forms that are unique to our country and form a part of our heritage. Over the years it has sponsored art and music shows by rural artists, sponsored documentaries on Indian culture and published books that delineate the roots of art in Karnataka. Social Rehabilitation and Rural Uplift The foundation works for the welfare of destitute women and children and also helps towards developing rural India by providing education and vocational skills. It has built orphanages where education is prioritized and organized training centres for destitute women in and around Karnataka. Assessment There are a number of observations to be made from the above. Firstly, Infosys is seen to be engaged in various, unconnected welfare activities. Though laudable, this may not be the best policy to adopt towards CSR because many of these have little or no relevance to its core business ability. Thus, there is a chance that it may drop them in the future if aspects of the activities start to clash with their normal business working. This will damage the entire premise of sustainability that the company promotes about its CSR. The extremely local nature of these activities (most are based in and around Karnataka) show that Infosys is perhaps trying to build a good relationship at home where it wants to address as many problems as possible. However, scaling up of these activities will be the real test of its CSR practices because being a global company it cannot afford to limit its welfare activities to only one region. This may raise questions about their sincerity as their efforts may be construed as simply trying to appease the authorities at home and maybe get benefits over its competition. In the next section we will see that in matters in which it has expertise, Infosys has already expanded its activities to the global level. Sustainable Social Change Infosys makes the proud claim of influencing sustainable social change through its varied development initiatives. [1] The following are some of these initiatives: Education and Intellectual Capability It is no secret that India is engineering-mad with Indian Engineering Institutions churning out over 500,000 science and engineering graduates every year. However, even as rival IT companies and a host of other recruiters vie with Infosys over the recruitment of the fresh, inexpensive engineering talent, there is little that these corporates have done to aid in the recognition and reward of top Indian research. This is a matter of pressing concern because not only does this hamper the intellectual capital of our country in relation to competition from overseas (Even China has more PhDs per capita than India) but it promotes a lack of systematic learning that ultimately results in making a lot of these graduates unfit for immediate industrial employment. It is here that Infosys has once again differentiated itself from the competition by undertaking ventures that promote science and engineering education as more than simply a means of landing a job. The Infosys Science Foundation (ISF) was set up with the goal of achieving the above. It was set up by some of the companys founder members in February 2009 with the aim to elevate the prestige of scientific research in India and inspire young Indians to choose a vocation in scientific research. The ISF honours outstanding contributions and achievements by Indians in various streams of science with the Infosys Prize in five categories: mathematical sciences, physical sciences, engineering and computer sciences, life sciences and social sciences. The award is given to Indian scientists below the age of 50. The Foundation is funded by an amount of Rs. 215,000,000 contributed by the members of the Infosys Board and an annual grant from Infosys Tech. Ltd. The annual award in each category amounts to Rs. 5,000,000. The importance of this award is highlighted by the names of its past winners and their achievements, for e.g. last year the award for Life Sciences went to Dr. Chetan Chitnis for having discovered the first viable malaria vaccine and the award for Engineering Sciences went to Prof. Ashutosh Sharma for his applications in energy storage. Along similar lines is the ACM Infosys Foundation Award in Computer Sciences, established in August 2007 and carrying a cash award of USD 150,000 provided by the Infosys Foundation Endowment. It aims to reward educators and researchers whose work in software systems foster innovations that address existing challenges in the domain. Assessment Unlike a number of Indian companies whose education related welfare activities focus primarily on issues of primary/basic education, Infosys initiatives are unique in that they are associated exclusively with the domain of higher technical education, a segment in which it is arguably the most respected company in the country. This allows it to create perfect synergy between its everyday business activities and its investments in the above initiatives because unlike a lot of other companies who get into CSR without doing their homework and as a result get accused of doing it for ulterior motives, Infosys engagement with the field of technical education is a natural extension of its business practices. Its approach in this direction must also be lauded. While Narayana Murty has been accused in the past of favouring foreign universities when it came to giving grants, his decision of having Infosys establish the above awards is a godsend for the research establishment in India because though grants may be siphoned off by agencies without the threat of accountability, awarding individuals for their excellence is more effective as it provides a greater encouragement for others to follow in their shoes. But Infosys has not completely ignored the primary and secondary education sectors either. It has just approached it in a different way and yet received accolades all the same. A case in point is the Akshaya Patra Foundation, which was founded in 2000 and has three senior Infosys members apart from numerous Infosys volunteers who work towards providing free midday meals to schoolchildren. The foundations functions in partnership with state and central governments and currently serves over 1.3 million students in 7699 schools across India. Its impact is easy to assess from third party recognitions: it was awarded an International Fellowship by the US Congressional Hunger Centre, it received the 2008 CNBC India Business Leader of the Year Award and it even made it to the MBA curriculum as a case study at the Harvard School of Business in 2007. Similarly, Infosys BPOs work on Project Genesis, under which it works to improve the written and spoken communication capabilities in addition to the analytical skills of students in Tier 2 and 3 towns of the country so that they become employable, was awarded as the best CSR initiative at the 8th National Outsourcing Association (NOA) Awards 2011, in London. It was especially lauded for making sure that no expense was incurred by the participating academicians in the program. Community Development Unlike the education schemes already mentioned, community development initiatives do not at first seem the best fit with the companys existing activities. However, Infosys has done its share of work in this domain too and while most of it has been in the vicinity of its offices, there are projects like the Flood Relief Project for the victims of northern Karnataka in which the company has participated quite actively. Only last year the first phase of their initiative to construct 2250 houses across 18 villages was completed and subsequently these houses were handed over to the villagers. Assessment This aspect of Infosys CSR efforts can also be criticized for not matching with the core business abilities of the organization. The question to be asked is whether Infosys could have done a better job as simply a service consultant (a domain in which it already has expertise) to a third-party organization and have the latter handle the actual on-ground developmental work. Also, nearly all of Infosys developmental work has come in the neighbourhood of Karnataka. The scalability of this work can be called into question much like in the case of the Infosys Foundation. Regionalized developmental work can always raise questions about its sincerity, i.e. whether they are simply means to appease the local public/authorities. Infosys Eco Group Plans and Implementation Infosys has been considering the worsening impact of businesses on the environment for several years and has understood the importance of a clean environment and energy efficient solutions. It has hence committed itself to come up with innovations which positively impact the environment and can lead to large energy savings. Many of these have been implemented at Infosys itself. Under this initiative of Green Innovation, Infosys has not only come with a number of ideas but has also implemented some of them in tangible forms: iSustain: Carbon energy and resource management tool that helps the user to generate and monitor the use of various resources such as energy and water etc. being used, take majors to allot them efficiently and also monitor the carbon footprint. InGreen Energy Management: A tool used by Infosys to monitor the energy consumption at micro level and to take majors to cut on unnecessary usage. Using this, Infosys has been successfully reducing its carbon emission at a rate of more than 5% per annum. InGreen Personal Carbon Calculator: A tool that helps the user organizations to assess their impact on ecological systems in terms of carbon emission. Smart Integrator for Smart Grid: A device that continuously monitors the power usage of various devices in the range using a sensor and controls them accordingly. Infosys also plans to become carbon neutral and shift to entirely renewable energy by 2017. The steps taken for the same seem to be promising which include building of renewable energy power generation plants (recently they have built a solar energy plant at Jaipur Campus) and aiming for a platinum rating, the highest rating given by LEED (Leadership in Energy and Environmental Design) for environment friendly architecture. In January 2012, the third building at the Mysore Campus achieved this rating. Besides these, Infosys has been taking small but effective measures to reduce its own energy consumption, such as building designs with maximum exposure to natural light, design of windows which could lead to reduction in room temperature thus saving on air conditioning consumption of energy, increasing use of green power and use of recycled water. (Refer Exhibit 1) Assessment In year 2011, Infosys has saved more than 4 lakh units of conventional energy units through the use of the renewable energy sources. Not only has this helped in energy conservation but it has also resulted in savings of Rs. 20 Crore for the organization. In a similar way, innovative ideas such as smart integrator, rooms having maximum exposure to day light, optimum room temperature maintenance measures and use of LED and CFL tubes in place of conventional ones saved more than 7 lakh units of electricity, accounting for monetary benefit of Rs. 35 lakhs. In addition to these, Infosys is working closely with the Karnataka Government and Karnataka Electricity Regulatory Commission (KERC) for implementation of renewable energy power plants. It has been successful in convincing KERC to remove the cross-subsidy on renewable energy thus reducing its cost. Moreover as a result of these efforts, KERC has made it compulsory for the power utilities in Karnataka to buy at least 0.25% of total energy in form of solar energy, which will cost the end users only 4 paise more than regular rate per unit. Though listed under the CSR activities and initiated as Green Innovations, the activities mentioned above are not only intended to improve the environmental conditions as a social need but are also aimed at a reduction in Infosys energy consumption thereby giving it a competitive advantage as it can sell these innovative solutions to its clients as well. It is these latter observations that have been points of concern for critics who blame Infosys of hyping its energy savings and accuse it of Greenwashing. [18] Employee-Driven CSR Employees at Infosys are given ample opportunities to contribute to the society. This way of engaging employees to have hands on experience on CSR can also help the society, which needs responsible citizens to contribute man hours. The policy also helps these employees to attain their personal aspirations of serving the society. This sabbatical policy was initiated in the year 2008, where all the employees are encouraged to work through Infosys Foundation to support the needs of the society. The company as an entity is greatly supportive of its employees in executing the initiatives. The employees are made to pledge that they will make a difference to the society on a consistent basis. For effective execution, the company has individual divisions which run independent of each other under major themes like Health, Art, Education, Rural welfare and Rehabilitation and Targeted inclusive growth. A governance framework has also been put in place to streamline and implement the employee driven CSR initiatives in order to provide operational efficiencies and financial transparency.

Tuesday, February 18, 2020

The value of an education Essay Example | Topics and Well Written Essays - 3500 words

The value of an education - Essay Example One of the most well-known facts about society’s advancement is the fact that from an archaeological perspective, we have banded together to increase our chances of survival. At its root, this suggests that we band together to work together and to learn from one another. Learning from a person is what modern education is today. Society can only progress forward due in part to education and without it, it is a wasteful experience. Education progresses people beyond their limits, allowing for improvements that would not be otherwise possible. It becomes more concrete when perceived from the lens outside of what is commonly understood and held. The implications of a good education can become a persuasive argument for socioeconomic development. One can identify trends within any society to see that education is a tool for success when building a middle class and to some extent, solidifying the community. However, education is a complex issue that holds different keys and locks, al l of which cannot be answered through a singular answer. The importance of an education is valued through what it can grant, provided that individuals help to support their educators but are often hindered by aspects like geography, familial dynamics, and income; which should be overcome if one looks to improve society. Economic development can bring about change in its purest and simplest form. At its core, it can be said that an education has a key role in improving the quality of life and well-being. This is an important aspect of society.

Monday, February 3, 2020

Benefits of e-communications in integrated marketing communications Essay

Benefits of e-communications in integrated marketing communications - Essay Example as been integrated into today’s systems especially with the acceptance and rapid use of the internet which has simply brought a revolution on how things are done. (Pratten 2007) The marketing field has not been left behind in the use of e-communication. Integrated marketing on the other hand is a general term which seeks to describe an entire spectrum of marketing communication. It helps ensure that the messages communicated are both consistent and complementary. Integrated marketing utilizes both online marketing which is basically e-communication and offline methods in its roles. To shape this discussion coherently, it is important to first have the e communications methods discussed and in addition, the basic marketing milestones they help achieve. The final part will draw the benefits in each of the marketing communication fields. (Tony 1999). To start with, it is almost impossible to form a paper on marketing without looking at the basic foundations of marketing which are the four P’s. Every marketer aims at achieving these as far as strategic positioning of goods is concerned. This is known as the marketing mix in a marketing field. Marketing mix is defined as a set of controllable marketing tools harnessed together to help achieve the laid down objectives of the selling company. This is the exchange value of the product or the amount paid by a customer in the exchange of a good. A price in most cases is subject to many factors either present in the company or externally determined. Factors determining the price of a good are mainly the market share of the particular company, competition levels, the total cost of producing these goods and finally the perceived value of the goods by the customers. This refers to the sum total of all the communications a marketer undertakes for the purpose of ensuring that the word about availability of a product goes out to the potential buyers/customers. This last P is the subject of this study as we look at how it

Sunday, January 26, 2020

Important Factors In Selection Methods

Important Factors In Selection Methods INTRODUCTION The human resource planning is very important and necessary part of an organization. It plays important part in the long run success of an organization and there are several methods which are adopted by different organizations for selection of new employees so that the long term objectives of an organization could be achieved. The hiring process is not a easy task. Every organization has its own selection process according to its need. The selection procedure is very important effort to select right person for right job at right time. The various selection methods are used to obtain an assessment about the qualities of candidates. These selection methods are used to check overall personality, attitude, aptitude, knowledge, adoptability, confidence, communication skills, and managerial skills. If any organization wants to gain long term success in the marketplace, it must develop valuable selection techniques for recruiting new incumbents. The future job performance depends upon the selection of potential employee. It is very complicated and time consuming effort to find out desired talent in the pound of candidates. There are several types of Interviews and paper-pencil measures (tests) which are used at a time to analyse the future job performance of candidates. Sometimes a one organization uses more than one selection method; it all depends upon the nature sensitivity of the job, organization size and number of applicants. Among all selection procedures, the Interview is the most frequent selection method to check oral responses regarding any particular inquiry. Interview is the essential part of selection procedure in most of organizations. Although paper pencil measures also in cycle to check different attributes of candidates but after examining the candidates by various selection methods, mostly organization use interview to finalize the candidate. The validity of interview is often criticised but on this base the importance of interview can not be minimised. An organization also can not fully rely on the validity paper pencil measures. It is a complex process sometime both methods becomes essential and sometime only interview or test is enough for employee selection but it all depends upon requirement, number of candidates, organization size and financial condition of the organization. Interview is still most famous selection tool (Judge et al., 2000; Posthuma et al, 2002). Employment interview is the best selection method (Barclay, 1999; Garman Lesowitz, 2005). There are different important factors in selection methods which are considered by management of firms for getting right staff at right time. Organizations consider such factors like previous work experience, qualification, knowledge, abilities, skills, attitude, personality, and other characteristics. There are also some problems and issues which arise during selection process and these are very important to handle to make selection on merit. For example the perception of interviewer, biasness, discrimination regarding sex, age, racial, religion, disability, physical appearance etc. The selection method must be neat and clean of such prejudices. SELECTION METHODS The selection method is the process of gathering and analysing the information about a person for the purpose of offering new job.(Gatewood Field 2001). There are two stages first is to define the requirement and objective of selection and the second stage is set up the selection method according to that requirement.(Guion, 1998; Patterson Ferguson, 2007).The selection method for hiring new employee depends upon the nature of job, organizational structure, mode of business, and number of candidates etc. Organizations recruitment criteria also depend upon time, cost and need of potential employee. Selection is the final part of total staffing process of an organization. The human resource department takes three basic steps in employee selection process i.e. planning, recruitment and selection. First of all, the human resource department starts planning by projecting the demands of organization for new employees with particular skills and abilities. In the second step , the organizat ion starts advertising to get in touch with potential external incumbent and posting internally to catch new employee within the organization In the third step, the organization finalised the new employee from the pool of candidates which are generated by recruitment process. The organization use different selection methods for hiring right person at right place and at right time. ( Kramar 2008) VALIDITY OF SELECTION METHODS In the context of selection, validity means meaningfulness, the appropriateness, and usefulness of the inferences made about applicants during the selection process.( Gatewood Field 2001).What is the validity of selection method and how it can be determined? These are the basic questions which arise in mind when we examine the validity. Actually the validity deals with the issue that whether the actual performance of the applicant is according to the expected performance which we incurred during the selection method. If the actual and expected performance is very close to each other then we can say the selection method for hiring new employee is valid and if both performances have gaps then the selection method must be change. (Price 2007) IMPORTANT FACTORS IN SELECTION METHODS There are various factors i.e. education, job experience, cognitive ability tests, integrity test, personality tests, IQ tests, interview, references. (Dipboye, 1992; Randall and Randall, 1990). Effective selection requirements should be blueprinted, either by gaining expert views (e.g. Janis Hatef, 2008) or conducting an appropriate job analysis (Patterson et al., 2000; Patterson et al., 2008).The organization takes two considerations in order to select new employee. Firstly analyse the individual differences between applicants by comparing their knowledge, skills and abilities and secondly decide the most appropriate selection method. (Gatewood Field 2001)The knowledge, skills, abilities are very important to determine potential candidate as well as previous job experience also matter. The responsibilities and duties of previous work and qualification can help a lot in understanding new work environment. The other characteristics like personality, attitude and intelligence as wel l as physical examination are also very important factors. Some organization also considers previous background and criminal records in their hiring process. 4.1. APPROPRIATE KNOWLEDGE, SKILLS AND ABILITIES There are several stages of employee selection. First of all knowledge, skills and abilities (KSAs) of applicant are determined, secondly highlight the contents of job and to determine whether the existing employees skills are appropriate to job nature or not? This procedure is called job analysis. After job analysis the duties and responsibilities are described according to nature of job in documentary form call job description and then what type of human resource is required for that particular job called job specification. (Dessler 2011).The necessary skills, knowledge and abilities which are necessary to perform the job are called job requirements. These can be qualification, experience, training, aptitudes and abilities. (Gatewood Field 2001)The knowledge, skills and abilities ( KSAs) are the basic important factor which is specially examined in the applicant in recruitment process. There are also other two important factors i.e. previous work experience and other characteristi cs. Example: 1 (JAPANESE AUTOMOBILE) Japanese automobile companies generally consider organization dedication, social need and skills, and attention in work.( www.fbe.hku.hk/Programme/Undergraduate/doc/courses/2008-2009/BUSI0075/Fit.pdf Article accessed on 29/01/2011) Example: 2 (TOYOTA USA ) The selection process of Toyota (USA) takes minimum eighteen hours which consists of a general knowledge exam, attitude test, interpersonal skills, assessment centre, an extensive personal interview, and a physical exam. (www.fbe.hku.hk/Programme/Undergraduate/doc/courses/2008-009/BUSI0075/Fit.pdf Article accessed on 29/01/2011) Article accessed on 29/01/2011) WORK EXPERIENCE The duties and responsibilities handled by previous jobs are very important to understand the work criteria and requirements. The experienced persons knowledge and skills are the great assets for organization and it is the main benefit of knowledgeable persons. Organizations take advantages of their developed personal relations due to previous job works so it is very beneficial for future growth of the organization.( Price-2007) Example: 3 (BERNARD HOLDANE ASSOCIATION) The chairman of Bernard Holdane Associates, Jerry Weinger, says candidates should have strong record of distinctions and success in a challenging environment like down economies. (Price-2007 ). EDUCATIONAL BACKGROUND Qualification is very important factor for selection of new employees. Every organization seeks qualified persons for hiring. It verifies the educational claims of candidates. The job descriptions and specifications are set out according to qualification. (Kramar 2008) Example: 4 (HRA INDUSTRIES ) Qualification is matched with requirement in selection process of HRA industrial. (www.hr-guide.com/data/016.htm accessed on 29/01/2011) PERSONAL AND PROFESSIONAL CHARACTERISTICS The other characteristics refer to different personality traits as well as his professional attitude. Many organizations examine personal attributes of candidates, his communication style, presentation skills, oral and written competency of language, confidence, behaviour adoptability etc. These all characteristics build up the personality of the candidate and organization has to seek best potential candidate who have good professional and personal attributes. ( Price 2007) Example: 5 (TOYOTA) Toyota, a Japanese company give more importance to personal traits as compare to technical skills. (Price 2007). Example: 6 (PRET A MANAGER) A famous Company Pret A Manager which have 2800 employees on 118 shops, received 55000 application for 1500 places. According to recruitments strategy of Pret A Manger, the candidates have to show sociable personality, positive approach to life in interview.( Beardwell 2007). PHYSICAL EXAMINATION Candidates are physically examined in process of hiring to discover the diseases and medical limitations for candidate. The future job performance can be affected by candidates health issues so it is necessary to check medical complications before hiring. (Price 2007) Example: 7 (AFG INDUSTRIES)The hiring process of AFG Industries for factory workers includes screening formal resumes , personality testing, that suggest some plant jobs, panel interviews and a medical exam. www.fbe.hku.hk/ Programme/ Undergraduate/ doc/courses/2008-2009/BUSI0075/Fit.pdf Article accessed on 29/01/2011). CRIMINAL RECORDS AND BACKGROUNDCHECKS The criminal records and background checking depends upon the nature and type of organization. This is not a common practice of all the organizations. It is very time consuming and costly. There are several jobs like police jobs, security concern jobs, teaching jobs and sensitive nature jobs where criminal records and background verification is very necessary. Example: 8 ( AMERICAN COMPANIES) The professional back ground companies are getting space in almost 80 percent of American companies due to importance of background checking and necessity of verification of criminal records of candidates.. (www.articlesbase.com/human-resources-articles/pre-employment-background-screening-company-a-reliable-hiring-outsource-for-human-resource-departments-3414302 accessed on 30/01/ 2011) CHOICE OF SELECTION METHOD After identifying the skills and abilities the organization have to take decision about the choice of selection methods. The organization can develop its own selection method to assess the applicant or can adopt selection method of other organizations. The most important test include exercise of assessment centres, cognitive ability testing, integrity testing which are used to assess job performance (Campion et al. 1994; Howard, 1997; Randall, 1990; Salgado and Moscoso, 2002; Wright et al., 1989).So there are various employee selection methods utilizing by different organizations but the most famous selection method is job interview. The other methods could be aptitude test, personality test, reference, assessment centres, background checking, cognitive ability test, drugs test etc. All these methods are used to assess the applicants skills and abilities and to determine any situation which is becoming the root cause of performance failure. The selection method must be appropriate to nature of job and it must be accurate as much as possible in providing the information. The accuracy of selection method depends upon reliability and validity of selection method. IMPORTANT SELECTION METHODS The organizations use various selection methods according to nature of job, size of organization and number of candidates. The organization can use one or more selection methods; it depends upon the reliable and valid so that expected performance of employee could be achieved. (Price 2007) Example: 9 ( MAZDA) In USA, the famous company Mazda is recruiting new employees by assessment of several selection methods. The methods include application forms, aptitude test, group problem solving, personal interview, and previous job experience. (Price 2007) The important methods can be described as: Application Forms and CVs Online Screening and Short Listing Psychometric Testing Ability and Aptitude Tests Personality Profiling Presentation Group exercises Assessment centres References INTERVIEW (Anderson Cunningham-Snell 2000) 5.1. APPLICATION FORMS CVs The application forms mostly use in public sectors. The application forms are prescribed in a formulated way which helps to know about important information of incumbents and this information can be examined during other tests and interviews. The main problem is that sometime the application forms are so lengthy and complicated. CVs are commonly used in private sector to gain initial and necessary information about the candidates qualification, previous job experiences and other distinctions but the problem with CVs is that CVs are presented by applicant in way to which he consider himself more fit for the job. So it is difficult for employer to judge the candidate only by CV. (Anderson Cunningham-Snell 2000) Example: 10 (GOVT INSTITUTIONS) In Pakistan, almost all the Govt institutions require the application and CV from candidates for hiring and selection of candidates for positions. ( personal experience) ONLINE SCREENING AND SHORT LISTING The Online screening is the quick procedure to filter potential incumbents among the huge number of applicants. Generally there are two criterions to short list the candidate by online screening, one is applicants experience and other is qualification. In this method scores are set according to criterions and candidates are shortlisted on the base of those scores. This is very useful method to save valuable time by short listing the applicants in very short time but costly in a sense of implementation of software and uploading of online information for screening applicants. Sometime potential candidate missed the chance of getting opportunity of that required job due to inappropriate key words during search. (Anderson Cunningham-Snell 2000) Example: 11 ( WOOLWORTH) The one of the largest retailer in the market Woolworth is using web-based recruitment policy to hire new employees. Woolworth have 2800 staff in its 800 stores and used online screening method very successfully. (Beardwell 2007). Example: 12 (CADBURY SCHWEPPS) The Cadbury Schweppes have introduced online verbal and numerical reason tests for its recruitment process and received about 4000 applications for just 20 places.( Beardwell 2007) PSYCHOMETRIC TESTING Psychometric testing refers to mental measurement. It helps in testing of ability and aptitude as well as personality profiling. Trained and qualified staff is necessary to arrange psychometric testing. Many organizations use these tests with the interview method as a part of selection process. (Beardwell 2007).There must be a proper staff for suitable psychometric testing. The psychometric testing can be divided by two parts. In first par only ability and aptitude is checked and in second part personality is judged. It is essential that candidate are offered feedback and the candidate must know that how information is worked during test. Example: 13 (MORGAN BANKS) The Morgan Banks recruitment consultancy conducted about 10 to 15 psychometric tests in selection procedure of hiring new employees. (Kramar 2007) Example: 14 (BT COMPANY) BT company always consider psychometric test as important tool for hiring new employees. ( Kramar 2007) Example: 15 (AFR COMPANY) AFR a famous organization is also conduction psychometric tests for its recruitment. (Kramar 2007) ABILITY AND APTITUDE TESTS The ability and aptitude tests are very useful to analyse general intelligence, spatial ability, verbal ability, sensory and motor abilities, clerical ability, numerical ability, mechanical ability, diagrammatical ability. The logical reasoning and mental performance is checked by these tests because these tests are designed very comprehensively. It include multiple question which are to be answered in a strictly time. For example if the questions are thirty ,the time would be 30 minutes. ( Gomez-Majla 2010) Example: 16 (USA) In USA ability test is conducted for entry level jobs and Govt. Is saving almost $15 billion per year. ( Gomez-Majla 2010) Example: 17 ( TOYOTA USA ) The selection process of Toyota (USA) takes minimum eighteen hours which consists of a general knowledge exam, attitude test, interpersonal skills, assessment centre, an extensive personal interview, and a physical exam. (www.fbe.hku.hk/Programme/Undergraduate/doc/courses/2008-009/BUSI0075/Fit.pdf Article accessed on 29/01/2011) Article accessed on 29/01/2011) PERSONALITY PROFILING Personality profiling is also very important for acquiring of good job. Sometime personality of person is not suitable to job so its difficult to handle that job for such a person. But if the individual can shift himself according to job criterion and suitability then it can be possible to get particular job.The relative importance of different selection factors; The personality and appearance of characteristics that are observed in an interview and rated as important include being energetic, confident, honest, organised, and verbally fluent (Spina et al. (2000). Example: 18 (ALLIED SIGNUAL) Personality tests are very important selection measure. It is used by companies such as Allied Signal, 3M.and Apple as selection criteria. (www.fbe.hku.hk/Programme/Undergraduate/doc/courses/2008-009/BUSI0075/Fit.pdf Article accessed on 29/01/2011) Article accessed on 29/01/2011) Example. 19 ( ATT, Honeywell, Citicorp, ) ATT, Honeywell and Citicorp are also used personality test as selection criteria. (www.fbe.hku.hk/Programme/ Undergraduate/ doc/courses/2008-009/BUSI0075/Fit.pdf Article accessed on 29/01/2011) Example: 20 (HAYS) HAYS human resource management department specially focus on candidates personality and character profiling. (Human Resource Management (Kramar 2007) Example 21 (AFG INDUSTRIES) The hiring process of AFG Industries for factory workers includes screening formal resumes (not job applications), personality testing, pre-employment training that simulates some plant jobs, interviews with panels of manager s and/or employees, and a medical exam.(www.fbe.hku.hk/ Programme/ Undergraduate/ doc/courses/2008-009/BUSI0075/Fit.pdf Article accessed on 29/01/2011) PRESENTATION In senior level jobs the selection method of presentation is widely used. A topic is given to the candidate and within a time frame he has to deliver a presentation. Sometime candidate receive presentation topic with interview letter and sometime on the spot topic is given. Candidate may have to deliver presentation on power point or overhead projector. (Kramar 2007) GROUP EXERCISES This selection method is used to filter a potential candidate among the group of applicants. The candidates have to debate on a topic or play a given role to show their knowledge, skills and abilities about the given topic. The observers give scores to candidates according to set criterion. (Price 2007). Example: 22 ( MAZDA) In USA, the famous company Mazda is recruiting new employees by assessment of several selection methods. The methods include application forms, aptitude test, group problem solving, personal interview, and previous job experience. (Price 2007). ASSESSMENT CENTRES The assessment centres refers to multiple testing methods. It includes ability testing, group exercise, presentation, aptitude testing, personality profiling etc. This selection method gives the opportunity to the candidate to show his knowledge, skills and abilities and get higher marks irrespective of his previous academic background. This selection method must be fair and neutral.(Beardwell 2007) Example: 23 ( GKN MANUFACTURING COMPANY) 22 GKN, the famous manufacturing company, having business in all over the world is using assessment centre selection method for recruiting new employees. It receive 1000 applications for just only 20 positions ( Beardwell 2007 ) Example: 24 (AT T COMPANY) The American Telephone and telegraph Company (ATT) recruits employees on the basis of Assessment centres. (Human Resource Management by Alan Price 3rd edition, ch 15, p 376). REFERENCES References are also considered very important in selection process. It is difficult for candidate to get a reasonable job with substandard references especially in a private sector. (Gromes- Majla 2010). The basic objective of references is to get information about the applicants qualification, employment history, experience etc. Generally reference is taken from current and former employees. If candidate is not working then the personal reference is demanded. Most organization demand references in written either in form of unstructured letter or in form. Example: 25 (US COURTS) 207 U.S Courts recruits new employees on the basis of reference check. The formal employers feedback is give high importance in selection procedure. ( Gromes-Majla 2010) 5.10. INTERVIEW An interview is a process intended to get the information from a person through oral responses to oral techniques. ( Dessler 2011) A selection interview is a selection procedure designed to predict future job performance on the basis of applicants oral responses to oral enquires. ( Michael McDaniel et al.,1994 ).The validity of interview is often criticised but still interview is interview is most famous selection tool (Judge et al., 2000; Posthuma et al, 2002).Still, practitioners continue to use the employment interview as their primary selection tool (Barclay, 1999; Judge et al., 2000). The non cognitive attributes of candidates are often assessed by interviews. (Otero et al., 2006) According to Nayer about 99% of USA medical schools ,interviews are basic element of the admissions process (e.g. Johnson Edwards, 1991).Interview is the procedure to assess the knowledge, skills and abilities of the candidates by his oral responses towards oral enquiries. Interview is good tool to an alyse the confidence, knowledge, presentation, communication and managerial skills. Some critics question about the validity of interview but still interview is the most appropriate and most useful selection method for hiring new employees. Example: 26 (SUN MICROSYSTEM) In the hiring process of Sun Microsystems , there are multiple interviews for hiring new Organization can use one or more than one selection method for recruitment according to job requirement. www.fbe.hku.hk/ Programme/ Undergraduate/doc/courses/2008-009/BUSI0075/Fit.pdf Article accessed on 29/01/2011) Article accessed on 29/01/2011) 5.10.1 CLASSIFICATION OF SELECTION INTERVIEW The selection interview is can be classified by three heads i.e. structure, content and administers. STRUCTURE VS. UNSTRUCTURED INTERVIEWS INTERVIEW CONTENT ( TYPE OF QUESTIONS) HOW THE FIRMS ADMINISTER THE INTERVIEW (Dessler 2011) STRUCTURED INTERVIEW According to key requirements of job , the structured interview process is formulated and list of questions are set up. Each applicant have to face a group of interviewers and they score them on the basis of their performance. Recent studies of employment interviews have concluded that structured interviews offer greater predictive validity than unstructured interviews (Judge et al., 2000; Ployhart, 2006; Barclay, 1999). If selection system is challenged the structured interviews have more important regarding legal defensibility.(Posthuma et al., 2002)The preset standardised questions are set in the structured interview which is very helpful scrutiny of potential candidate from large number of candidates and gaining accurate results. The structured interviews are very useful and more comprehensive as compare to unstructured. Structure in interviews is one of the generally vital arbiters of its achievement in the calculation of act (e.g. Huffcutt Arthur, 1994). The structured intervi ews have higher foretelling and parallel validity than unstructured interviews (e.g. McDaniel, Whetzel, Schmidt, Maurer, 1994; Wiesner Cronshaw, 1988). The structured interviews were apparent positively and impartially. (Westwood et al. (2008) UNSTRUCTURED INTERVIEW The unstructured conventional interviews assessed personality dimensions and social skills while the structured behavioral interview mainly assessed job knowledge, job experience, and situational judgment. (Salgado and Moscoso 2002). Unstructured interviews do not use a standardised set of questions, do not have objective scoring protocols (Latif et al., 2004), and are often prone to biases that affect ratings (Patterson Ferguson, 2007) Despite evidence of their low reliability and validity, unstructured interviews are still used for selection purposes. In a recent survey of pharmacy colleges in the US, only 13% of those that interviewed applicants used a pre-defined list of questions (Joyner et al., 2007).In the unstructured interview there is not set format and manager asks question according to his mind and preferences. It is friendly conversation between interviewer and interviewee. Courneya et al. (2005) compared structured with unstructured interviews, and reported that struct ured interviews put interviewees at ease and allowed them to express themselves more than unstructured interviews. INTERVIEW CONTENT (WHAT TYPE OF QUESTIONS TO ASK) The type of question which are asked in interview called interview content. There can be different categories of questions which can be situational, behavioural, job-related, and stress questions. These questions are used to determine attitude and decision powers of the candidate. There are series of question in which candidates overall reaction and behaviour is checked. If any satiation is given to candidate for response that interview is called situational interview and in some situations candidates are asked how he behaved in past called behavioural interview. In some situation interviewers intentionally ask such questions to candidate which create stress , such interviews are called stress interviews. Candidates are asked questions about past experience, responsibilities and duties, such interviews are named as job-related interviews. In all such interviews candidates overall behaviour, reaction, response, patience level and personality attributes are examined ( Dessler 2011) HOW FIRMS ADMINISTERS THE INTERVIEW Interviews are administered by employers by various ways i.e. face-to-face (one to one) or panel interview, sequentially or all at once and computerised or personally. (Dessler 2011) These interviews also can be telephone, online or video/web based interviews according to nature and circumstances. Organizations mostly use two types of interview; one to one and sequential. In one to one two persons meet and in sequential a series of questions are asked to candidate. Another one is panel interview in which a groups of interviewers meet each candidate with set of questions an score them according to their answers. There are also some other interviews like computerised interviews which are conducted due to distance and saving the precious time of organization. In the computerised interviews the applicants oral or/ and computerised replies are taken in response of computerised oral or visual or written questions. Some organization conduct telephone interviews to ease the applicant or due to distance problem. In this interview some questions are asked about the knowledge ,skills and abilities of the applicant and it gives more confidence to candidate as compare to face to face interview. The online or video/web based interviews are also conducted due to distance and easiness of both organization and applicant. Through video conference each candidate is asked a set of questions and employers examine their responses. (Dessler 2011) Example: 27 ( MONITOR CONSULTING FIRM) Monitor is a famous consulting firm uses group interview as a selection method. Applicants are given a problem to solve and they are monitored by interviewers. (www.kelloggforum.org/top-10-consulting-firms accessed on 5/02/2010) 5.10.2 ADVANTAGE AND DISADVANTAGES OF INTERVIEW I. ADVANTAGES: Interview is useful to find out important information about candidate and his/her attributes. Employer can easily determine the communication and social skills of candidate. The supplementary information can be determined by interview. The verbal fluency can also be checked. It is helpful to find candidates job knowledge. Interview is very useful to compare candidates having equal qualification. Candidate also gets the opportunity to ask questions to interviewer if he/she has any confusion. II. DISADVANTAGES: Personal liking and disliking can be major factor of biasness. Usually interviewer made his mind about the selection of candidate in first few minutes and then remaining part of interview is just used to validate his decision. There can be a great chance of prejudice as according to research it has been proved that minorities are ignored in interviews. There can be a more weight to negative information. Validity and reliability of interviews are always in questioned. (www.hr-guide.com/data/G311.htm Accessed 0n 02/02/2011) IMPORTANT ISSUES IN CONDUCTING INTERVIEW The main purpose of interview is to hire right person for right job but there are some issues which arise during the process of interview which may become hurdle in the neat and clean process of selection. These are the problems which are necessary to address. First of all the perception of the interviewer can affect the selection of the process. The interviewers inability to understand the candidates characteristics and attribute can become big barrier in the selection of potential candidate. Secondly the biased behaviour of the interviewer can also be the hurdle in selection of right applicant. The discrimination of sex, age, racial, relig