Friday, May 31, 2019

Impact of Film and Television: 1950’s to Present Essay -- Television M

Impact of Film and boob tube 1950s to PresentToday, Film and Television are among the most internationally supported commodities. Financially, their contributions are enormous both industries are responsible for the circulation of billions of dollars each year. Since their respective explosions into the new media markets during the mid-twentieth century, film and television down produced consistently growing numbers of viewers and critics alike. Sparking debate over the nature of their viewing, film and television are now being questioned in social, political, and moral arenas for their potency impact on an audience. Critics claim that watching films or television is a passive activity in which the viewer becomes subconsciously absorbed, and creates a reliance or addiction to the media. Advocates, however, argue that viewing such programs is an active process in which audience members are able to choose to what they are exposed, and interpret messages based on their individual nee ds and background. Perhaps both views are too extreme. Film and television from the 1950s to present, as will be explored in this essay, are extremely useful media, often underestimated within the label of entertainment unfortunately, they may be partially responsible for current socio-cultural problems, too.A few of the benefits of these media are obvious. It is generally concur that film and television create a psychological escape and state of relaxation for the viewer, and that as communications devices they bed important information within a moments notice. The most widespread argument in support of film and television, however, is their power as a tool of education and awareness. As they deliver varying global perspecti... ...Deal. Philadelphia Temple University Press, 2001. Grenier, Richard. Capturing the Culture Film, Art and Politics. Washington Library of Congress Cataloging-in-Publication on Data, 1991. Orwell, George. Nineteen Eighty-Four. Toronto Penguin Books, 1949 . Barnouw, Erik. Tube Of Plenty The Evolution of American Television. clean York Oxford University Press, 1990. Greenfield, Patricia Marks. Mind and Media The Effects of Television, Video Games, and Computers. Cambridge Harvard University Press, 1984. Postman, Neil. Technopoly The Surrender Of Culture To Technology. New York Alfred A. Knopf, 1992. Williams, Raymond. Television Technology and Cultural Form. New York Schocken Books, 1975. Supplementary ResourcesCrowther, Jonathan, ed. Oxford Advanced Learners dictionary of Current English. Oxford Oxford University Press, 1995.

Thursday, May 30, 2019

Student Conduct and Violence in Schools :: Education

Generally, the conduct of students in public school is a deterrent to getting a good education. Violent appearance, drugs in school, and misbehaving students are distracting and break the learning environment for others.Violence in school creates an unsafe environment, and shifts the administrators focus away from the curriculum towards firmness of purpose the dilemma of violence. When the environment that surrounds the students is non secure they become more preoccupied with their own safety than they do about learning (Rehr). This disturbing behavior withal takes both the students and teachers time away from the education process. As Albert Shanker has written, Nobody ever learns in a classroom that has one or two kids who take 90 percent of the time through violence or threats of violence. It deprives children of an opportunity to learn (464). To cut down on violence, schools stir guards at the entrance, gates, or metal detectors in buildings. The effect of this though is th at students sometimes have to miss first period because of the length of time it takes to check everyones bag. In addition, it can cause feelings of intimidation or anxiety due to the fact that when you put metal detectors in buildings, thats a statement that schools are violence-ridden, out of control, and unsafe (Glazer 790). This worries educators because they start to question whether a prison-like atmosphere, charge when it is effective in reducing crime, can in the long run be compatible with good education (David 12).In correlation with crime in schools are illegal drugs. Drugs seems to be the majority cause of violent behavior in school. Teachers tell of some students being sent home because they were drunk others have been involved in fights with other students, teachers, and administrators while under the influence of alcohol (David 8). When these students come to class under the influence of drugs or alcohol they are not able to learn or function responsibly in school. T his not only hurts them but also others who become more vulnerable when they see this behavior and do not see the person getting any kind of discipline. As one student said, If you get caught they will slap you on the wrist, set up Dont do it again, or maybe send you to a different school. Big deal (Lipsky 104). This kind of thinking makes drug use legitimate to other students.A third behavior students engage in that causes disruption and time taken away in classes is simply misbehavior.

Wednesday, May 29, 2019

Cloned Zoos Essay -- Research Paper Animals Cloning Papers

Cloned ZoosImagine an orb where either animal lives within an enclosed area where all piece provoke regard them. Yet, within these enclosures are the yet places humans can see these animals alive. Why? It is because the animals habitats rent been damaged and completely destroyed for the needs and usage of human kind. These enclosed areas are called Cloned Zoos The Final castle of the Worlds Biodiversity. These cloned zoos are full of cloned animals that have been brought back from the dead or from the edge of extinction. Humankind has come to a point where all life on primer coat is controlled by human detention and where without the help of humans no animals will survive.Can you imagine a world where this instance has become reality? Could humankind allow this atrocity to gamble? Will they allow this atrocity to happen? Well, some scientists are trying to avert this tragedy from occurring by using copy to impact those animals that are endanger or rapidly approaching the brink of extinction. The technology for cloning is improving and some scientists are turning to this technology as a way to preserve the genes of species faced with extinction due to weak reproductive abilities or a population, which is split and unable to reach another population. A member of an endangered species can be cloned and reintroduced into the original or a distant and unreachable population. Another option is the member being cloned can be brought back to life by and byward it has died in order that its genes are still part of the gene pool.An estimated one hundred species go extinct each and every day, which means that approximately 36,500 species would go extinct every year (British Broadcasting Corporation, 2003). This extinction trend coul... .... (October 2, 2003). http//www.noonanrusso.com/imedia/ikit/act2/html/faqs.html Tobin, Kate. CNN.com-Nature First cloned endangered species dies 2 days after birth. January 12, 2001. 18 September 2003 http//www.cnn.com/2001 / reputation/01/12/cloned.gaur/ Weise, Elizabeth. USA Today The crme of the clone crop. September 28, 2003. 18 September 2003 http//www.usatoday.com/news/health/2003-09-29-clone-table.htm Westphal, Sylvia Pagan. So simple, some anyone can do it. new-made Scientist. 17 August 2002 16-17.Wright, Richard T. Biology Through the Eyes of Faith. San Francisco Harper & Row, Publishers, 1989.1 The zona pellucida is the extracellular matrix of the egg, (Campbell, Reece, Mitchell, 1999, p. 940), a protective socio-economic class of the egg.2 Fitness is a mensuration of potential success, (English 107), for a species within a given environment. Cloned Zoos Essay -- Research Paper Animals Cloning PapersCloned ZoosImagine an earth where every animal lives within an enclosed area where all humankind can see them. Yet, within these enclosures are the only places humans can see these animals alive. Why? It is because the animals habitats have been damaged and completely destroye d for the needs and usage of human kind. These enclosed areas are called Cloned Zoos The Final Stronghold of the Worlds Biodiversity. These cloned zoos are full of cloned animals that have been brought back from the dead or from the edge of extinction. Humankind has come to a point where all life on earth is controlled by human hands and where without the help of humans no animals will survive.Can you imagine a world where this instance has become reality? Could humankind allow this atrocity to happen? Will they allow this atrocity to happen? Well, some scientists are trying to avert this tragedy from occurring by using cloning to preserve those animals that are endangered or rapidly approaching the brink of extinction. The technology for cloning is improving and some scientists are turning to this technology as a way to preserve the genes of species faced with extinction due to weak reproductive abilities or a population, which is split and unable to reach another population. A mem ber of an endangered species can be cloned and reintroduced into the original or a distant and unreachable population. Another option is the member being cloned can be brought back to life after it has died in order that its genes are still part of the gene pool.An estimated one hundred species go extinct each and every day, which means that approximately 36,500 species would go extinct every year (British Broadcasting Corporation, 2003). This extinction trend coul... .... (October 2, 2003). http//www.noonanrusso.com/imedia/ikit/act2/html/faqs.html Tobin, Kate. CNN.com-Nature First cloned endangered species dies 2 days after birth. January 12, 2001. 18 September 2003 http//www.cnn.com/2001/NATURE/01/12/cloned.gaur/ Weise, Elizabeth. USA Today The crme of the clone crop. September 28, 2003. 18 September 2003 http//www.usatoday.com/news/health/2003-09-29-clone-table.htm Westphal, Sylvia Pagan. So simple, almost anyone can do it. New Scientist. 17 August 2002 16-17.Wright, Richard T. Biology Through the Eyes of Faith. San Francisco Harper & Row, Publishers, 1989.1 The zona pellucida is the extracellular matrix of the egg, (Campbell, Reece, Mitchell, 1999, p. 940), a protective layer of the egg.2 Fitness is a measure of potential success, (English 107), for a species within a given environment.

Struggle to Cope with Death in Do Not Go Gentle into That Good Night Es

Struggle to Cope withDeath in Do non Go Gentle into That Good Night Poetry requires more than just a verse. It must appeal to your mind and generate emotion. It should be constructed in a way that appears so simple, yet is intricate in every detail. Dylan doubting Thomass poem, Do Not Go Gentle into That Good Night is a brilliant poem that appears so simple, yet upon looking closer its complexity can be seen. Dylan Thomas was born on October 27, 1914 in Swansea, Wales. He was educated at Swansea Grammar School. He was urged by his father to go farther in his education, however Thomas began to write. He published his first book in 1934. Thomas and his father had a very close relationship throughout his life. This is important to know while construe the poem Do Not Go Gentle into That Good Night. His father was very ill for many years, and Thomas had to watch his fathers suffering. Thomas has said, Poetry creature comforts and heals. Hopefully that is what Thomas was doing when he wrote this poem. The structure of the poem is a villanelle. The villanelle comes from the French middle ages and is composed of nineteen lines. It has five tercets and a concluding quatrain ABA-ABA-ABA-ABA-ABA-ABAA. Two disparate lines are repeated. Lines one, six, twelve, and eighteen are all the same. Line three reappears in line nine fifteen and nineteen. Each tercet will conclude with an comminuted or very close duplication of line one or three. The final quatrain repeats line one and three. The villanelle is one of the most difficult forms of poetry to follow. perchance Thomas wanted to use this form to show how special his father meant to him. Dylan Thomas speaks of death throughout this poem. Death is the major theme of the vil... ...ther should be traveling into the light, and not into the darkness. Thomas should not be scared of death, yet he questions it in most of his poetry. He is angry at death and believes that the only wander with light is in this world. He may be saying that light is life. Life is happiness. Is death then age and unhappiness? The last quatrain of this Villanelle describes his father on top of the list of men facing death. Thomas curses himself for wanting his father to fight even though he sees his suffering, yet he is not relieve oneself to let go of his father. He begs his father to fight death. This whole poem is Thomass struggle to cope with his fathers death. He writes the poem while his father is still existent and never shows it to him. This poem may have helped him to deal with his fathers death, and it may have taught Thomas a little about death itself.

Tuesday, May 28, 2019

Stop-Loss Policy Essay -- Government War Violence Essays

Stop-Loss PolicyWar has been around since the beginning of time. People have been asked to defend for their expanse and to overhaul for their cause. But is the warf atomic number 18 that America is currently involved in, one of the times where population should be forced to die and stay overseas. The men and women who volunteered to make out for the country they love, are not being forced to stay longer then the original time they were supposed to stay, all thanks to President Bushs stop-loss policy otherwise known as the back-door draft. The stop-loss program was introduced in order to counter act the number of men and womens lives lost in the war and the number of people who have not been signing up to conjunction. There are few arguments that are pro the back-door draft yet there are many more arguments that are against the policy. This paper will explain why the reasons why the policy is something that will just destroy America, such as people being forced to say in war, their families being affected, the volunteer military becoming a non volunteer, and even what it has done to some of the passs. President Bush effectuate the stop-loss policy into effect giving the military the power to keep military personnel for up to twenty-four months longer, in a combat zone or in a high-risk area. If a soldiers military group is being shipped over to fight the War in Iraq, then the soldier would have to go with them as well. It does not matter if the soldier only has a month left, it would not matter and he would still have to go with him. According to what is written in the policy, The policy is designed to assist in meeting manpower requirements for future operations, and will, therefore, evolve to remain relevant to future operations, and will, therefore, evolve to remain relevant to future developments in mission requirements and our involvement in current operations. (Maradmin) Since the beginning of American there has been a draft for people to join the military. During the Vietnam War (1973) the draft finally became something of the past that is until now. The draft has just changed a little to fit with the changing of times. Instead of civilians being forced to go and fight for their country, the soldiers who have already given up so much for their country are being forced to stay. How can America song to have a fully volunteer military when ... ...e vent of war, my enlistment in the armed forces continues six months after the was ends unless it is discontinued by the president. (Wagner) Even though the soldiers are told these things, is it still ok for the government to be asking this of them? Yes they have previous knowledge, but something like this should not happen. The government fatalitys to realize that they need to not start these things, if they are not going to have enough military to support all of it. In conclusion, the men in women who are protect the lives of all the citizens in the united states, are being forced to stay in Iraq or Afghanistan, well beyond their discharged dates, for the government who was not real well planned out. The soldiers however have been fighting back, and not just listening to what the government tells them. Although some people think that since soldiers sign up, and have previous knowledge of the issue, that it would be fine, but that is far from the truth. Each member of the military is a person, and deserves the same rights as everyone else. The government has taken the all-volunteer army, and has turned it into a antithetical kind of draft army, a back-door draft.

Stop-Loss Policy Essay -- Government War Violence Essays

Stop-Loss Policy struggle has been around since the beginning of time. People kick in been asked to defend for their country and to die for their cause. But is the war that America is currently involved in, one of the times where people should be strained to die and stick around overseas. The men and women who volunteered to fight for the country they love, are not beingness forced to stay longer then the original time they were supposed to stay, all convey to President Bushs stop-loss policy otherwise known as the back-door pen. The stop-loss program was introduced in order to counter act the number of men and womens lives lost in the war and the number of people who have not been signing up to join. There are few arguments that are pro the back-door draft yet there are many more arguments that are against the policy. This paper will explain why the reasons why the policy is approximatelything that will just ruin America, such as people being forced to say in war, their families being affected, the volunteer military becoming a non volunteer, and even what it has done to some of the soldiers. President Bush put the stop-loss policy into effect giving the military the power to keep military personnel for up to twenty-four months longer, in a combat zone or in a high-risk area. If a soldiers military group is being shipped over to fight the War in Iraq, then the soldier would have to go with them as well. It does not matter if the soldier only has a month left, it would not matter and he would still have to go with him. According to what is written in the policy, The policy is designed to assist in meeting manpower requirements for future operations, and will, therefore, evolve to carry on relevant to future operations, and will, therefore, evolve to remain relevant to future developments in mission requirements and our involvement in current operations. (Maradmin) Since the beginning of American there has been a draft for people to join the military. During the Vietnam War (1973) the draft finally became something of the past that is until now. The draft has just changed a little to fit with the changing of times. Instead of civilians being forced to go and fight for their country, the soldiers who have already given up so much for their country are being forced to stay. How can America claim to have a fully volunteer military when ... ...e vent of war, my enlistment in the armed forces continues six months after the was ends unless it is cease by the president. (Wagner) Even though the soldiers are told these things, is it still ok for the regime to be asking this of them? Yes they have previous knowledge, but something like this should not happen. The government needs to realize that they need to not start these things, if they are not going to have enough military to support all of it. In conclusion, the men in women who are protecting the lives of all the citizens in the united states, are being fo rced to stay in Iraq or Afghanistan, well beyond their carry out dates, for the government who was not very well planned out. The soldiers however have been fighting back, and not just listening to what the government tells them. Although some people deliberate that since soldiers sign up, and have previous knowledge of the issue, that it would be fine, but that is far from the truth. Each member of the military is a person, and deserves the same rights as everyone else. The government has taken the all-volunteer army, and has turned it into a different kind of draft army, a back-door draft.

Monday, May 27, 2019

Genre Analysis: Musical The Wizard of Oz Essay

The Wizard of Oz is one of the high-riskgest American Musicals in convey. It has become known world wide, it is apart of our American familiar culture, and is best known of all films. It was based on the novel, The Wonderful Wizard of Oz written by L. uncivil Baum in the 1900s. It was produced by Metro-Goldwyn-Mayar in the year of 1939. This film just hit the end of the Golden Age of the Musical that started in the early 1930s. MGM benefited greatly from the hit of the rebirth of melodiouss.Its known for the use of technicolor which is a system of making color motion pictures by means of superimposing the three primary colors to produce a final colored print (Websters Dictionary), romance storytelling, interesting and creative characters, and the musicality imbedded into it. There was also a complex use of special effects for film in that specific time sequence which helped the film receive special notice. MGMs film had many awards but one of the most famous one was the award of Best Original meter for Over the Rainbow.It was sung by Judy Garland as Dorothy just five minutes into the movie after she was trying to get her Aunt and Uncle to come to a realization of what happened to her poor little dog Toto. In the beginning of the film Over the Rainbow is played by MGM orchestra over the starting credits. There is a big taste of fantasy in this particular film which kind of in a way departs away from the musical genre. There is many scenes of flying monkeys, and the wet spellbind of the West and Glinda, the good witch of the South, and the munchkins, and talking lions, and a tin man, and a talking scarecrow.There are many musical scenes that I am fond of in The Wizard of Oz like the scarecrows tune If I only had a Brain, the tin mans song If I only had a Heart and the lions song If I only had the Nerve. The Wizard of Oz was the famous directors, Metro-Goldwyn-Mayars, most popular musical in his time. Starring Judy Garland as Dorothy Gale was one of the best professional choices MGM had in his career. She was the stand out in the whole film.Also starring Frank Morgan as the wizard, Ray Bolger as the scarecrow, Jack Haley as the Tin Man, Bert Lahr as the cowardly lion, Billie Burke as Glinda the good witch of the south, and Margaret Hamilton as the wicked witch of the west. Somewhere over the Rainbow became Judy Garlands signature song. She has been in 32 of MGMs films and she won a Golden Globe Award, Grammy Awards and the Special Tony Award. She was then nominated the Academy Award for Best Actress for her role in A Star is Born. Everyone of the lead rolls in The Wizard of Oz has been in many of Metro-Goldwyn-Mayars another(prenominal) films.

Sunday, May 26, 2019

Edgar Allen Poe Essay

Five Paragraph Essay Have you ever wondered about Edgar Allen Poes literary ingredients or themes? Read the stories called The Tell-Tale flavour , The Cask of Amontillado , Annabell Lee, and The Bells . Poes desired effects was to scare the audience from the baloney, Poe used a writing style called gothic horror. The first literary element seen by Poe was death. In the story of The Cask Of Amontillado the Fortunado suffocates . Another death occurs in the story of The Tell-Tale Heart , when the cashier kills the old man in the middle of the night.The story called The Bells the mother died of a disease. Poe creates horror because the deaths in the stories are unexpected. The second literary element seen by Poe was obsession. The Cask of Amontillado the Montresor is obsessed with getting his revenge. In The Tell-Tale Heart the narrator is obsessed over the old mans eye. The story of Annabell Lee he was obsessed with his wife. This creates horror because obsession is not a usual liaison seen in other stories. The third literary element seen by Poe was insanity. The Tell-Tale Heart the narrator goes insane over the old mans eye. The story The Bells , the raft in the town grow insanity from bells chiming.

Saturday, May 25, 2019

Mystery Shopping†the Miracle Tool in Business Research

VOLUME zero(prenominal) 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 A Monthly Double-Blind accomplice Reviewed (Refereed/Juried) Open entree supranational e-Journal Included in the International series Directories kinged & Listed at Ulrichs Periodicals Directory , ProQuest, U. S. A. , EBSCO Publishing, U. S. A. , Cabells Directories of Publishing Opportunities, U. S. A. , Open J-Gage, India link of the same is duly available at Inflibnet of University Grants Commission (U. G. C. , Index Copernicus Publishers Panel, Poland with IC Value of 5. 09 & number of libraries exclusively around the world. Circulated all over the world & Google has verified t assume scholars of more than 2022 Cities in 153 countries/territories be visiting our daybook on regular basis. Ground Floor, Building No. 1041-C-1, Devi Bhawan Bazar, JAGADHRI 135 003, Yamunanagar, Haryana, INDIA http//ijrcm. org. in/ VOLUME no. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 CONTENTS Sr. No. backing & NAME OF THE AUTHOR (S)HIERARCHY PROCESS MOJGAN RIAZI, DR. YOU zero(prenominal) VAKIL ALROAIA & DR. ALI AKBAR AMIN BIDOKHTI ASSOCIATION OF TRAINING PRACTICES WITH line of merchandise merriment IN PUBLIC SECTOR ORGANIZATIONS RIZWAN BASHIR & FARZANA BASHIR STUDYING THE RELATIONSHIP BETWEEN SOCIAL peachy AND TALENT counseling IN IRAN STATE MANAGEMENT TRAINING CENTER (SMTC) SAYED ALI AKBAR AHMADI, MOHAMMAD ALI SARLAK, MUSA MAHDAVI, MOHAMMAD REZA DARAEI & SAMIRA GHANIABADI CONTEMPLATIVE SCRUTINY OF THE ADEQUACY OF HERZBERGS MOTIVATION-HYGIENETHEORY A VERDICT OF JOB SATISFACTION IN THE MID LEVEL MANAGER IN TELECOMMUNICATION INDUSTRY ABU ZAFAR AHMED MUKUL, SHAH JOHIR RAYHAN & MD. SHAKIB HOSSAIN PLANNING AND MANAGING A SCHEDULED SERVICE DR. IGNATIUS A. NWOKORO REAL INCOME, INFLATION, AND INDUSTRIAL productiveness IN NIGERIA (1970-2005) Dr. OWOLABI A. USMAN & ADEGBITE TAJUDEEN ADEJARE DEVELOPMENT OF SMALL AND MEDIUM ENTERPRISES IN NIGERIA A PARADIGM SHIFT ADEYEMI, A.ADEKUNLE THE EVALUAT ION OF KNOWLEDGE MANAGEMENTS EFFECTIVENESS ON E-LEARNING A CASE STUDY ON PAYAME NOOR UNIVERSITY OF IRAN BAHAREH SHAHRIARI & KIARASH JAHANPOUR THE RELATIONSHIP BETWEEN ORGANIZATIONAL CULTURE AND JOB SATISFACTION AMONG PROFESSIONAL STAFF IN VIETNAMESE CONSTRUCTION COMPANIES NGUYEN PHI erythema sol atomic number 18 ANALYSIS OF LIQUIDITY OF SELECTED PRIVATE SECTOR Indian BANKS SULTAN SINGH, SAHILA CHOUDHRY & MOHINA proceedsIVITY MEASUREMENT OF PUBLIC SECTORS BANKS IN INDIA DR. BHAVET, PRIYA JINDAL & DR. SAMBHAV GARG IMBIBE ETHICAL EDUCATION DR. T.SREE LATHA & SAVANAM CHANDRA SEKHAR MODELING INDIAN MONSOON (RAINFALL) VOLATILITY AS AN INDEX BASED RISK TRANSFER PRODUCT D P. SHIVKUMAR, M PRABHU & DR. G. KOTRESHWAR THE DEVELOPMENT OF SMALL SCALE INDUSTRIES IN MEGHALAYA MUSHTAQ MOHMAD SOFI & DR. HARSH VARDHAN JHAMB fixation MODELS M. VENKATARAMANAIAH & M. SUDARSANA RAO EFFECTIVENESS OF EMPLOYEE RETENTION TECHNIQUES ADOPTED BY BPO COMPANIES WITH REFERENCE TO CHENNAI DR. RANJITHAM. D ROLE OF FOREIGN DIRECT INVESTMENT IN EDUCATION INSTITUTIONS IN INDIA SHABANA, SONIKA CHOUDHARY & DR. M. L.GUPTA AN EXAMINATION OF long AND SHORT-RUN RELATIONSHIP BETWEEN CRUDE OIL PRICE, GOLD PRICE, EXCHANGE RATE AND INDIAN STOCK MARKET R. KANAKARAJAMMAL, S. PAULRAJ & M. V. ARULALAN MYSTERY shop THE MIRACLE TOOL IN BUSINESS look into SHAKEEL-UL-REHMAN & A. VELSAMY THE EMPIRICAL INVESTIGATION BETWEEN unres claimed COMPETENCE AND WORK PERFORMANCE OF INDIAN SALES PEOPLE DR. RITIKA SHARMA MARKETING OF BRANDED PRODUCT IN RURAL AREA A CONCEPTUAL BASED STUDY ON RURAL MARKET PANKAJ ARORA & AJITHA PRASHANT A STUDY ON EMPLOYEES JOB SATISFACTION WITH SPECIAL REFERENCE TO COACH FACTORY P.MANONMANI & V. UMA E-CRM APPLICATION IN INSURANCE SECTOR AND RETENTION OF CUSTOMERS DASH BISWAMOHAN. & MISHRA RADHAKRISHNA THE USAGE OF SIX SIGMA TOOLS IN carry DOWN THE DEFECTS IN THE HR PROCESSES SREEJA K & MINTU THANKACHAN WOMEN EMERGING GLOBALLY AS THE POTENTIAL MARKET REASONS, IMPLICATIONS AND ISSUES DR. JAYA PALIWAL URBAN RESIDENTIAL WATER SUPPLY IN GADAG town IN KARNATAKA STATE DR. H H BHARADI TECHNICAL ANALYSIS A TOOL TO MEASURE MARKET VOLATILITY G. B. SABARI RAJAN CO-BRANDED CREDIT CARD A tailor-made PRODUCT NICHE FOR CONSUMERS DR.A. JESU KULANDAIRAJ A COMPARATIVE STUDY ON CUSTOMER SATISFACTION WITH SERVICE QUALITY IN PUBLIC AND PRIVATE SECTOR BANKS DR. SAMBHAV GARG, PRIYA JINDAL & DR. BHAVET EMOTIONAL INTELLIGENCE (EI) AN IMPERATIVE SKILL FOR MANAGERS IN THE GLOBAL WORKPLACE SMARTY MUKUNDAN Page No. 1. THE EXTENT OF THE IMPORTANCE OF PERSONALITY INDICATORS OF INDEPENDENT ENTREPRENEUR THROUGH development GROUP ANALYTICAL 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 8 14 21 29 34 40 45 49 54 57 63 66 72 83 86 91 94 101 104 111 120 123 128 136 140 144 150 153 157 160 REQUEST FOR FEEDBACK internationalistic JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Acce ss International e-Journal Included in the International Serial Directories ii http//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 CHIEF PATRON PROF. K. K. AGGARWAL Chancellor, Lingayas University, Delhi Founder Vice-Chancellor, Guru Gobind Singh Indraprastha University, Delhi Ex.Pro Vice-Chancellor, Guru Jambheshwar University, Hisar FOUNDER PATRON LATE SH. RAM BHAJAN AGGARWAL Former State Minister for scale & Tourism, Government of Haryana Former Vice-President, Dadri Education Society, Charkhi Dadri Former President, Chinar Syntex Ltd. (Textile Mills), Bhiwani COCO-ORDINATOR AMITA Faculty, Government M. S. , Mohali ADVISORS DR. PRIYA RANJAN TRIVEDI Chancellor, The Global Open University, Nagaland PROF. M. S. SENAM RAJU Director A. C. D. , School of Management Studies, I. G. N. O. U. , smart Delhi PROF. M. N. SHARMA Chairman, M.B. A. , Haryana College of Technology & Management, Kaithal PROF. S. L. MAHANDRU Principal (Retd. ), Maharaja Agrasen Col lege, Jagadhri editor PROF. R. K. SHARMA Professor, Bharti Vidyapeeth University Institute of Management & Research, peeled Delhi COCO-EDITOR DR. BHAVET Faculty, M. M. Institute of Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana EDITORIAL ADVISORY BOARD DR. RAJESH MODI Faculty, Yanbu Industrial College, Kingdom of Saudi Arabia PROF. SANJIV MITTAL University School of Management Studies, Guru Gobind Singh I.P. University, Delhi PROF. ANIL K. SAINI Chairperson (CRC), Guru Gobind Singh I. P. University, Delhi DR. SAMBHAVNA Faculty, I. I. T. M. , Delhi INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Access International e-Journal Included in the International Serial Directories cardinal http//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 DR. MOHENDER KUMAR GUPTA gent Professor, P. J. L. N. Government College, Faridabad DR. SHIVAKUMAR DEENE Asst.Professo r, Dept. of Commerce, School of Business Studies, Central University of Karnataka, Gulbarga ASSOCIATE EDITORS PROF. NAWAB ALI KHAN division of Commerce, Aligarh Muslim University, Aligarh, U. P. PROF. ABHAY BANSAL Head, Department of Information Technology, Amity School of Engineering & Technology, Amity University, Noida PROF. A. SURYANARAYANA Department of Business Management, Osmania University, Hyderabad DR. SAMBHAV GARG Faculty, M. M. Institute of Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana PROF. V. SELVAMSSL, VIT University, Vellore DR. PARDEEP AHLAWAT Associate Professor, Institute of Management Studies & Research, Maharshi Dayanand University, Rohtak DR. S. TABASSUM SULTANA Associate Professor, Department of Business Management, Matrusri Institute of P. G. Studies, Hyderabad SURJEET SINGH Asst. Professor, Department of estimator Science, G. M. N. (P. G. ) College, Ambala Cantt. TECHNICAL ADVISOR AMITA Faculty, Government M. S. , Mohali FINANCIA L ADVISORS DICKIN GOYAL Advocate & Tax Adviser, Panchkula NEENA Investment Consultant, Chambaghat, Solan, Himachal PradeshLEGAL ADVISORS JITENDER S. CHAHAL Advocate, Punjab & Haryana High Court, Chandigarh U. T. CHANDER BHUSHAN SHARMA Advocate & Consultant, regulate Courts, Yamunanagar at Jagadhri SUPERINTENDENT SURENDER KUMAR POONIA INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Access International e-Journal Included in the International Serial Directories iv http//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 CALL FOR disseminated multiple sclerosisSWe invite unpublished novel, original, empirical and high case seek work pertaining to recent developments & practices in the area of Computer, Business, Finance, merchandise, Human Resource Management, General Management, Banking, Insurance, Corporate Governance and emerging paradigms in allied subjects like accounting sy stem Education Accounting Information Systems Accounting Theory & Practice Auditing Behavioral Accounting Behavioral economicals Corporate Finance Cost Accounting Econometrics Economic Development Economic History Financial Institutions & Markets Financial Services Fiscal Policy Government & Non ProfitAccounting Industrial Organization International Economics & Trade International Finance Macro Economics Micro Economics M integritytary Policy Portfolio & Security summary universal Policy Economics Real Estate regional Economics Tax Accounting advertizing & Promotion Management Business Education Management Information Systems (MIS) Business Law, Public Responsibility & Ethics parley Direct Marketing E-Commerce Global Business Health Care Administration Labor Relations & Human Resource Management Marketing Research Marketing Theory & Applications NonProfit Organizations Office Administration/Management Operations Research/Statistics Organizational Behavior & Theory Organizational Development Production/Operations Public Administration Purchasing/Materials Management Retailing Sales/Selling Services Small Business Entrepreneurship Strategic Management Policy Technology/Innovation Tourism, cordial reception & Leisure Transportation/Physical Distribution Algorithms Artificial Intelligence Compilers & Translation Computer Aided Design (CAD) Computer Aided Manufacturing Computer Graphics Computer Organization & Architecture Database Structures & Systems Digital Logic Discrete Structures Internet Management Information Systems Modeling & Simulation Multimedia Neural Systems/Neural Nedeucerks Numerical Analysis/Scientific Computing Object Oriented Programming Operating Systems Programming Languages Robotics Symbolic & Formal Logic and Web Design. The above menti matchlessd tracks are only indicative, and non exhaustive. Anybody buttocks submit the soft copy of his/her manuscript anytime in M. S. Word format after preparing the same as per our submission guideli nes duly available on our website under the heading guidelines for submission, at the email verbalize emailprotected com.GUIDELINES FOR SUBMISSION OF MANUSCRIPT 1. COVERING LETTER FOR SUBMISSION DATED _____________ THE EDITOR IJRCM Subject SUBMISSION OF MANUSCRIPT IN THE AREA OF . (e. g. Finance/Marketing/HRM/General Management/Economics/Psychology/Law/Computer/IT/Engineering/Mathematics/ opposite, please specify) DEAR SIR/ brothel keeper Please find my submission of manuscript entitled ___________________________________________ for possible publication in your diarys. I hereby affirm that the contents of this manuscript are original. Furthermore, it has uncomplete been published elsewhere in any language fully or partly, nor is it under review for publication elsewhere.I affirm that all the reason (s) have seen and concur to the submitted version of the manuscript and their inclusion of name (s) as co-author (s). Also, if my/our manuscript is accepted, I/We agree to comply w ith the formalities as go alongn on the website of the journal & you are free to publish our contribution in any of your journals. NAME OF CORRESPONDING AUTHOR Designation Affiliation with full address, contact numbers & dusk Code Residential address with Pin Code Mobile Number (s) Landline Number (s) E-mail Address Alternate E-mail Address NOTES a) The unit of measurement manuscript is essential to be in ONE MS WORD FILE only (pdf. version is liable to be rejected without any consideration), which depart start from the covering letter, inside the manuscript. ) The sender is postulate to mention the following in the SUBJECT COLUMN of the mail New Manuscript for Review in the area of (Finance/Marketing/HRM/General Management/Economics/Psychology/Law/Computer/IT/ Engineering/Mathematics/other, please specify) c) There is no lease to progress any text in the body of mail, except the cases where the author wishes to give any specific message w. r. t. to the manuscript. d) The to tal size of the file containing the manuscript is required to be below 500 KB. e) Abstract alone will not be considered for review, and the author is required to submit the complete manuscript in the counterbalance instance. f) The journal gives acknowledgement w. r. . the receipt of every email and in case of non-receipt of acknowledgment from the journal, w. r. t. the submission of manuscript, within two days of submission, the corresponding author is required to demand for the same by sending separate mail to the journal. 2. 3. 4. MANUSCRIPT TITLE The title of the paper should be in a 12 social club Calibri Font. It should be bold typed, centered and fully capitalised. AUTHOR NAME (S) & AFFILIATIONS The author (s) full name, designation, affiliation (s), address, mobile/landline numbers, and email/alternate email address should be in italic & 11-point Calibri Font. It mustiness be centered underneath the title.ABSTRACT Abstract should be in fully italicized text, not exceedi ng 250 words. The abstract must be informative and condone the background, aims, methods, results & conclusion in a single para. Abbreviations must be mentioned in full. INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Access International e-Journal Included in the International Serial Directories v http//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) 5. 6. ISSN 2231-5756 KEYWORDS Abstract must be followed by a list of keywords, subject to the maximum of five. These should be arranged in alphabetic order separated by commas and full stops at the end.MANUSCRIPT Manuscript must be in BRITISH ENGLISH prepared on a well-worn A4 size PORTRAIT SETTING PAPER. It must be prepared on a single space and single column with 1 margin habilitate for top, bottom, left and right. It should be typed in 8 point Calibri Font with paginate numbers at the bottom and centre of every page. It should be free from grammatical, spell out and punctuation errors and must be thoroughly edited. HEADINGS All the headings should be in a 10 point Calibri Font. These must be bold-faced, adjust left and fully capitalised. Leave a blank line before each heading. SUB-HEADINGS All the sub-headings should be in a 8 point Calibri Font. These must be bold-faced, aligned left and fully capitalised.MAIN TEXT The main text should follow the following sequence INTRODUCTION REVIEW OF LITERATURE NEED/IMPORTANCE OF THE STUDY description OF THE PROBLEM OBJECTIVES HYPOTHESES RESEARCH METHODOLOGY RESULTS & DISCUSSION FINDINGS RECOMMENDATIONS/SUGGESTIONS CONCLUSIONS SCOPE FOR FURTHER RESEARCH ACKNOWLEDGMENTS REFERENCES APPENDIX/ANNEXURE It should be in a 8 point Calibri Font, single put and justified. The manuscript should preferably not exceed 5000 WORDS. 7. 8. 9. 10. 11. 12. FIGURES & TABLES These should be simple, crystal clear, centered, separately numbered & self explained, and titles must be above the table/f igure. Sources of data should be mentioned below the table/figure.It should be ensured that the tables/figures are referred to from the main text. EQUATIONS These should be consecutively numbered in parentheses, horizontally centered with equation number placed at the right. REFERENCES The list of all references should be alphabetically arranged. The author (s) should mention only the actually utilised references in the preparation of manuscript and they are supposed to follow Harvard Style of Referencing. The author (s) are supposed to follow the references as per the following All works cited in the text (including sources for tables and figures) should be listed alphabetically. Use (ed. ) for one editor, and (ed. s) for multiple editors.When listing two or more works by one author, use (20xx), much(prenominal) as after Kohl (1997), use (2001), etc, in chronologically ascending order. Indicate (opening and closing) page numbers for articles in journals and for chapters in books . The title of books and journals should be in italics. Double quotation marks are utilise for titles of journal articles, book chapters, dissertations, reports, working papers, unpublished material, etc. For titles in a language other than English, provide an English translation in parentheses. The location of endnotes within the text should be indicated by superscript numbers. PLEASE USE THE FOLLOWING FOR STYLE AND PUNCTUATION IN REFERENCES BOOKS Bowersox, Donald J. , Closs, David J. (1996), Logistical Management. Tata McGraw, Hill, New Delhi. Hunker, H. L. and A. J. Wright (1963), Factors of Industrial Location in Ohio Ohio State University, Nigeria. CONTRIBUTIONS TO BOOKS Sharma T. , Kwatra, G. (2008) Effectiveness of Social Advertising A Study of Selected Campaigns, Corporate Social Responsibility, Edited by David Crowther & Nicholas Capaldi, Ashgate Research Companion to Corporate Social Responsibility, Chapter 15, pp 287-303. JOURNAL AND OTHER ARTICLES Scheme nner, R. W. , Huber, J. C. and Cook, R. L. (1987), Geographic Differences and the Location of New Manufacturing Facilities, Journal of Urban Economics, Vol. 1, No. 1, pp. 83-104. CONFERENCE PAPERS Garg, Sambhav (2011) Business Ethics Paper presented at the Annual International Conference for the All India Management Association, New Delhi, India, 1922 June. UNPUBLISHED DISSERTATIONS AND THESES Kumar S. (2011) Customer Value A Comparative Study of Rural and Urban Customers, Thesis, Kurukshetra University, Kurukshetra. ONLINE RESOURCES Always indicate the date that the source was accessed, as online resources are frequently updated or removed. Garg, Bhavet (2011) Towards a New Natural Gas Policy, Political Weekly, Viewed on January 01, 2012 http//epw. in/user/viewabstract. jsp WEBSITES INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Access International e-Journal Included in the International Serial Directorie s vi http//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 MYSTERY SHOPPING THE MIRACLE TOOL IN BUSINESS RESEARCH SHAKEEL-UL-REHMAN RESEARCH SCHOLAR ANNA UNIVERSITY OF TECHNOLOGY CHENNAI A. VELSAMY ASSOCIATE PROFESSOR part OF MANAGEMENT STUDIES SONA COLLEGE OF TECHNOLOGY SALEM ABSTRACT Satisfied clients are an distinguished advantage for al some every union. Every company tries its level best to take over better assistants to make the customers satisfied.A customer must be satisfied up to the highest possible level. brain-teaser obtain is a type of research legal document to measure the level of triumph, a customer experiences through impartial way. The present paper tries to bring out the conceptual understanding of whodunit shopping tries to explain the openness of mystery shopping to mingled arenas whether public or private and how it creates attention for improving performance of the company. KEYWORDS whodunit obtain, brain-teaser Sho pper, Customer Services, Customer Satisfaction, Employee Appraisal, emulous Advantage. INTRODUCTION nowing the customer satisfaction is always the top prerogative in any business.Getting to know the level of satisfaction and (or) the changing expectations of customers is a continuous accomplish. though there are various methods and tools available for this, mystery shopping is considered as unique and undeniable tool in any organisation. As defined by Wilson (2001), mystery shopping is a form of participant observation that uses researchers to deceive customer- avail personnel into believe that they are serving real customers or potential customers. brain-teaser shopping is a technique that involves looking at your business from outside and measure the efficiency of your own key processes from the view point of customers. brain-teaser Shopping stern be carried out in person, by telephone, or less commonly by email.It preempt recognize strengths and weaknesses and aid to show e xactly where answer delivery rear end be improved. In instances where excellent servicing is provided, the service may be considered an example of best practice and specific staff members can be singled out for recognition and reward. Initially set up in retail and private sector service industries, now mystery shopping is use increasingly in the private as well as public sector to gain a better understanding of how service users are interpreted care of when they approach front line offices. Research is the foundation stone of effective market planning and is vital for implementing successful marketing strategies.Mystery shopping is a research to know about company in customer point of view. It is the use of individuals, skilled to measure any customer service process, by playacting as potential customers and in some way reporting back on their experiences in a detailed and objective way. It is also an act of purchasing goods and services for collecting breeding for market r esearch. K REVIEW OF LITERATURE Although the concept of mystery shopping is old, there are very less literature available in its field. Since the use mystery shopping as a tool of research has got much concern in the present business competition, study through the literature becomes imperative.As the use of mystery shopping is gaining much importance in the present chase of competition. The literature obtained by the investigator, in the form of various reports and research studies is briefly reviewed in this part. Banks and Murphy (1985) have noted that organizations prolong to articulate discontent in performance valuatement systems even though advances in appraisal applied science. Appraisal reliability and validity still remain a major problem in most assessment systems. Mystery shopping is the army of facts, not perceptions. The mystery customer questionnaire or checklist should emphasize objective questions with a view to collecting factual data, again negating another we akness of customer surveys, i. e. hat customers only remember their overall impression of a service and not the individual elements or transactions (Wilson, 1998). Finn & Kayande, 1999 found that the process mystery shopping uses a form of member observation to observe the behavior of employees, usually in the process of providing services the resulting data are then utilise for evaluation purposes. The process usually includes a structured interaction between the representative and the service provider an employee whose behavior is being assessed. It is followed by an evaluation interview in which the film director gives the employee feedback about the data collected during the interaction. This procedure is intended to maturation the accuracy of the service provider.Bromage, (2000) found it as an integral fostering tool in that it can be used to identify training needs. Wilson, (2001) defined mystery shopping as a form of participant observation that uses researchers to deceiv e customer-service personnel into believing that they are serving real customers or potential customers. Shing and Spence (2002) argue that their use to gather competitive intelligence is parallel to industrial espionage and conclude that in such cases mystery shopping is difficult to defend ethically. Karia, 2005 stated that mystery shopping in India is of not a much scope but some of the vast corporate have started to do mystery shopping for increasing their service delivery. Brender-Ilan, B. nd Shultz, T. (2005) found that the procedure of mystery shopping research is intended to increase the accuracy of the service provider valuation, as this type of jobs is considered rigid to appraise impartially. Obviously, the process is used differently in different organizations, and for different purposes. CONCEPTUAL understand Mystery shopping is necessary for companies to get an objective opinion on how their business is doing. If they used their own employees to evaluate their servi ce and operations, it would be biased. So mystery shoppers, who dont already have a connection with the company, are used to provide honest and unbiased feedback.In the UK mystery, shopping is increasingly used to provide feedback on customer services provided by local authorities, and other non-profit organizations such as housing associations and churches. Mystery shopping is a term that describes a field based research technique of using independent auditors posing as customers to gather information about product quality and service delivery by a retail firm. The mystery shopper poses as a customer in order to objectively gather information on the business being INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Access International e-Journal Included in the International Serial Directories 01 http//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 studied. Getting a customers view of ones business is a widely recognized tool in both the marketing and customer service arenas. When mystery shoppers are dispatched to visit a business, they use criteria developed by the client to evaluate the business and focus primarily on service delivery and the sales skills of employees. Their reports, usually written, are forwarded to the client and can be used in a number of ways. Mystery shoppers can also objectively evaluate competitors and their service delivery and product mix for comparisons and benchmarking.Mystery Shopping is also known as Ghost Shopping where industry serves to evaluate the customer service for any company that deals with customer satisfaction. By sending an anonymous ghost shopper, that forms the base on their visits to client locations. Ghost shopping aids in evaluating the service provided by the companys channel members to its customers. From this information companies can understand whether it is meeting, or failing to meet, its customers nee ds. Ghost shoppers are everyday people who are visiting stores as anonymous customers, and in the process helping these stores to better understand how they can meet customers needs. METHODS OF IMPLEMENTATIONMystery shopping can be done by two methods a) A company uses its own employees to perform the mystery shopping, in which company trains its own employees to collect the customer related enquires from the market and b) Some companies can engage marketing research companies to evaluate the superiority of service in their stores these companies use mystery shoppers to get the information in disguise. They disperse a mystery shopper to make a particular purchase in a shop or store, for example, and then report on the experience and understanding. Typically, the shopper is compensated, and can keep the product or service. Mystery shopping can be used in any industry, with the most common venue being retail stores, hotels, movie theaters, restaurants, fast food chains, banks, misha ndle stations, automobile dealerships, apartments, health clubs and health care services Mystery shopping can allow a firm to create a competitive edge. It can also assist retailers in developing and evaluating strategies to retain circulating(prenominal) customers.The first step in mystery shopping is to identify your firms important customer service characteristics and objectives often flowing from your strategy and overall name and addresss and objectives. Next a firm uses these variables to develop a mystery shopping questionnaire, either alone or with the help or a consultant or mystery shopping firm. The survey can include a mix of description and check-off questions. WHY & WHERE MYSTERY SHOPPING? In this growing severely competitive environment, there is an ever-increasing need for companies to gather evidence on whether their policy initiatives have had the intended outcomes and whether retail firms treat their customers fairly.In particular, the need is to measure and eva luate the impact of company policies, assess levels of firms compliance with rules and examine the experience consumers have of the market. Mystery shopping is regarded as a necessary sum of gathering such information. This is because of the problems inherent to surveying those who have recently purchased products consumers dont always exactly recall all the particulars. Some of the benefits of mystery shopping are Product Placement, Point of Selling, Visibility, Customer Demand, Repurchases, Brand Recall, Awareness. Mystery shopping is useful to know about the awareness of that brand, how many outlets are having this product? by it one can get the information about the competitors like their new product launches, market share, new promotions, campaigns, etc.Even you can check the placement of the product in the outlet, whether the product has got right place on shelf, visibility of product, how fast product is moving, impulse buying appeal of the product, etc. A conformist myste ry shopper in-person visits more of business locations. The assessments are typically discrete questions along with the correlated point values, as well as some narratives for amplification. However, due to advances in technology as well as evolving customer service requirements, the ability to gather data and other materials relating to a customers experience has been significantly increased. Mystery shopping can allow a firm to create a competitive edge. It can also assist retailers in developing and evaluating strategies to retain current customers.Typical areas of assessment are customer service, suggestive selling and up-selling techniques, teamwork, employee and management activities, head-count, store appearance and organization, merchandise displays and stock, cleanliness of the location, signage and advertising compliance, time in line and time go by for service, product quality, order accuracy, customers preferences, cash handling, and return policies. After pre-testing the questionnaire, mystery shoppers are hired to do an assessment. Assessments can be on-site or via the telephone or even the Internet. A sample size as well as a period of time for the mystery shopping program is determined and results are used for feedback.BENEFITING RANGE OF BUSINESS Mystery shopping is more visible in developing countries and it is mostly prevailing in retail sector. But other sectors also use it as a tool to measure their customer satisfaction, competition, new technology advancements etc. some of the areas where mystery shopping is seen commonly are Banks, Restaurants, Hotels, Supermarkets, Automobile shops, Repair shops, Bars, Clubs, Theaters, Shopping malls, Retail chain operators. FMCG companies, Consumer durable companies, Apparel retailers. Mystery shoppers are professional in this field as he charges a reasonable amount from the companies for doing this service of conducting research.A feedback is given by them to the client whether the services are bei ng performed according to expectations or not and gives a chance for the merely improvements that company thinks necessary for its survival. On the other hand they tries to offer a better delivery to the customers to make them satisfied and a company can delineate more and more customers if it is in effect(p) in the market USE AND EXECUTION OF MYSTERY SHOPPING Managers can use the reports from mystery shoppers to evaluate their position in the industry, and the results can be used to provide employee recognition and other positive reinforcements of loyalty and morale through incentive programs.Many restaurants, banks, supermarkets, and clothing retailers have used the techniques, along with hotels, furniture stores, grocery stores, gas stations, movie theaters, automotive repair shops, bars, athletic clubs, bowling alleys, and almost any business where customer service is important. As the service sector of the economy has increased, so has the demand for mystery shoppers. Some r etailers are large enough to have their own in-house program in place. Other little companies who do not have the resources to develop a quality mystery shopping program in-house use mystery shopping contractors. These contractors directly hire and train the mystery shoppers, who work as independent contractors.The reports from mystery shoppers can measure training and levels of customer service pre- and post-training. Mystery shopping allows managers to determine if the services provided by employees are appropriate. Shopping reports can assess promotional campaigns and even verify employees honesty in handling cash and charges. Reports over time can give up a longitudinal database of averages. Some industries share findings so that managers can know regional or national averages of the industry. At the Web site Managerspot. com, for example, restaurant owners can compare their numbers from mystery shopping reports with a pool of similar, but anonymous, restaurants.The use of myst ery shopping is just one part of a company-wide program to develop and enhance employee performance. The idea is to find out from a consumers point of view which areas of service and product quality are most important and what areas need improvement. Data from the shopping results can be used by the company to make necessary changes on a timely basis. The results should be used for developmental and reward purposes and not for punishment. Mystery shopping is a valuable tool to businesses and is especially helpful for small, start-up businesses that need accurate and fast information to assess their employees and compare their products and services to the competition.So mystery shopping is a process for exploring everyday experiences, one persons view at a snapshot in time, a way of identifying strengths and weaknesses in dealing with customers, a method of measuring employees performance against set customer service standards, a useful aid for identifying training needs. INTERNATION AL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Access International e-Journal Included in the International Serial Directories 102 http//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 Mystery shopping can be used for various purposes. Most of the time the goal is to measure the quality of the service delivery to the customer.In this situation the mystery guest can be focused on the compliance to specific standards, guidelines or demands, or the mystery guest can be instructed to position the quality of the service on a scale. If a mystery guest visits locations of competitors, benchmarking becomes a way to assess your own activities against those. GROWING NECESSITY OF MYSTERY SHOPPERS Managers can use the reports from mystery shoppers to evaluate their status among its competitors and the scope of increasing the business. Also this tool is highly reliable, and the results can be used to provide employee recognition and other positive reinforcements of loyalty and morale through incentive programs.The use of mystery shopping is just one part of a company-wide program to develop and augment employee performance. The idea is to learn from a consumers point of view which areas of service and product quality are most important and what areas need improvement. Data from the shopping results can be used by the company to make necessary changes on a timely basis. The results should be used for developmental and reward purposes and not for punishment. Mystery shopping is a valuable tool to businesses and is especially helpful for small, start-up businesses that need accurate and fast information to assess their employees and compare their products and services to the competition. MYSTERY SHOPPING IN INDIAMystery shopping is not much practiced in India some of the organizations who have initially used this type of research are ICICI Bank, Titan, Arrow and Reliance communicat ions. ICICI Bank used mystery shopping initially in Pune to check the services offered by one of its branches, it conducted survey by telephone through mystery shoppers to find out the different services provided to different age groups by the bank (Karia, P. M. , 2005) CONCLUSION In the present age of competition there are various tools of research available for the companies to measure their service level from the customer point of view. One such efficient tool is mystery shopping, which is also called as ghost shopping. It can be viewed as an efficient tool in measuring the customer satisfaction with the company.No doubt, companies are spending lot of resources in ensuring customer satisfaction and to know what actually customers want. Mystery shopping can be chosen as an efficient tool in knowing the overall details of positive and negative aspects of services provided to customers. It can also be used to rectify the problems a company actually faces in dealing with the customer s. REFERENCES Banks, C. G. & Murphy, K. R. (1985) Toward Narrowing the Research-Practice Gap in Performance Appraisal. Personnel Psychology, Vol. 38 (2), pp. 335 345. 2. Brender-ilan, Y. and Shultz, T. (2005) Perceived Fairness of the Mystery Customer regularity Comparing Two Employee Evaluation Practices. Employee Responsibilities and Rights Journal, Vol. 17(4), pp. 231-243. 3. Bromage, N. 2000) Mystery Shopping It is Research, But Not as We Know It. Managing Accounting, Vol. 78 (4), pp. 30-35. 4. Cawley, B. D. , Keeping, L. M. & Levy, P. E. (1998) Participation in the Performance Appraisal bear on and Employee Reaction A Meta-Analytic Review of Field Investigation. Journal of Applied Psychology, Vol. 98 (4), pp. 615621. 5. Finn, A. (2001) Mystery Shopper Benchmarking of Durable-Goods Chains and Stores. Journal of Service Research, Vol. 3 (4), pp. 310-320. 6. Finn, A. and Kayande, U. (1999) Unmasking a Phantom A Psychometric Assessment of Mystery Shopping. Journal of Retailing, Vol. 75 (2), pp. 195217. 7. Karia, M. P. , (2005) Ghost Shopping. http//www. indiamba. com. 8.Shing, M. N. K. and Spence, L. J. (2002) Investigating the Limits of Competitive Intelligence Gathering Is Mystery Shopping Ethical Business Ethics A European Review, Vol. 11 (4), pp. 343-353. 9. Stovall, S. A. (1993) Keeping Tabs on Customer Service. Bank Marketing, Vol. 25 (6), pp. 29-33. 10. Wilson, A. M. (1998) The Role of Mystery Shopping in the Measurement of Service Performance Managing Service Quality, Vol. 8 (6), pp. 414-420. 1. INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT A Monthly Double-Blind Peer Reviewed (Refereed/Juried) Open Access International e-Journal Included in the International Serial Directories 103 ttp//ijrcm. org. in/ VOLUME NO. 3 (2013), ISSUE N O. 01 (J ANUARY) ISSN 2231-5756 REQUEST FOR FEEDBACK honest Readers At the very outset, International Journal of Research in Commerce, IT and Management (IJRCM) acknowledges & appreciates your efforts i n showing interest in our present issue under your bod perusal. I would like to request you to supply your critical comments and suggestions about the material published in this issue as well as on the journal as a whole, on our E-mail i. e. emailprotected com for further improvements in the interest of research. If you have any queries please feel free to contact us on our E-mail emailprotected com.

Friday, May 24, 2019

Study Overseas Is Better Than Study Locally

Hello .. what ar u doing .. how have u been ? Oversea study Nowadays more and more students are eager to study oversea, because they feel that studying abroad is better than studying local universities of our country. However, they have own reason to study topically or abroad. Both of universities, abroad or local have their own uniqueness. Studying abroad is a better pickax Education is a ever-living learning bear upon that has eer been a unwrap of our life. Nowadays, we are willing to spend late into our learning. Looking at the turn out recently , spillage abroad for a university education excites split up of people.Studying abroad is a better choice Education is a never-ending learning process that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas for a university education excites lots of people. Studying abroad is a better choice Education is a never-ending learning proc ess that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas for a university education excites lots of people.Studying abroad is a better choice Education is a never-ending learning process that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas for a university education excites lots of people. Studying abroad is a better choice Education is a never-ending learning process that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas for a university education excites lots of people.Studying abroad is a better choice Education is a never-ending learning process that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas fo r a university education excites lots of people. Studying abroad is a better choice Education is a never-ending learning process that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas for a university education excites lots of people.Studying abroad is a better choice Education is a never-ending learning process that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas for a university education excites lots of people. Studying abroad is a better choice Education is a never-ending learning process that has always been a part of our life. Nowadays, we are willing to invest deeply into our education. Looking at the trend recently , going overseas for a university education excites lots of people.

Thursday, May 23, 2019

The required number of hours

Sleep is a basic human need. It functions to watchore normal activity levels and normal balance among the separate of the nervous system and it allows for repair processes to occur as in protein synthesis (Kozier, 2004). Lack of forty winks is said to ca work an emotionally irrit qualified, poorly concentrated unmarried that experiences decision making difficulty. The required number of hours of repose per day varies with age. A newborn is expected to sleep for 16 to 18 hours a day, an infant 22 hours a day, a toddler 10 to 12 hours per day and preschool children need 11 to 12 hours of sleep per day (Kozier, 2004).As the item-by-item grows older, he is required to sleep less. School aged children is required 8 to 12 hours of sleep, adolescents 8 to 10 hours, young adults 7 to 8 hours, middle aged adults 6 to 8 hours and elders whole 6 hours (Kozier, 2004). The circadian rhythm, the most familiar rhythmic biologic clock that is responsible for our sleep-wake chassiss, follows a unilluminated-light pattern with the suprachiasmatic nucleus as its pacemaker (Bullock, 2000).The suprachiasmatic nucleus is institute in the anterior hypothalamus and is stimulated by the receptors in the retina of our eyes. Melatonin, which has regulatory effects on the SCN, is secreted by the pineal gland and its secretion is stimulated by the dark and is suppressed by light (Bullock, 2000). Melatonin promotes sleep in this way, and fewerer hormones secreted, as in the elderly, will be one of the many causes for insomnia (Bullock, 2000). on that point atomic number 18 or so(prenominal) factors that can cause sleep pattern disturbance aside from a decrease in melatonin.Sleep pattern disturbances can be ca utilise by external or internal factors and these disturbances can only be classified as a medical condition when they chronically interrupt sleep (Bullock, 2000) or when the inability to sleep well at wickedness causes impaired daytime functioning (Atkinson, 2000). Sleep pattern disturbances substantiate been grouped into four categories by the Association of Sleep Disorders Center, namely, disorders of initiating and maintaining sleep, disorders of riotous somnolence, disorders of sleeping-waking schedule and dysfunctions associated with sleep, sleep stages or partial arousal (Atkinson, 2000).Disorders of initiating and maintaining sleep take insomnias, which is the inability to sleep and maybe exhibited by difficulty falling asleep, there are recurrent awakenings, and early morning awakening with go forth being able to go back to sleep (Atkinson, 2000). Reasons for the cause of insomnia is still non known, as some require that this is a symptom of a disease or just a perception of individuals who feel that they have not gotten enough sleep because of some factors they state to have experienced. Insomnia can be attributed to various factors that could either be pathologic or psychological.Pathologic causes include disease process, pain, obst ructive uropathy, hyperthyroidism, congenital heart failure, respiratory disease, arthritis, and hormonal imbalance (Atkinson, 2000). Psychologically, anxiety, obsessive worrying, chronic stress and depression can bring about insomnia (Atkinson, 2000). As much as possible, interventions for insomnia remain to be nonpharmacologic, but if the individual is experiencing sleeplessness that is ruining his daytime activities, a doctor will prescribe selected sedative-hypnotic medications.Although effective, these medications should not be used as often and several considerations should be noted. These medications produce a central nervous system depression and produces an unnatural sleep, it may resolve insomnia for tonight, but may disturb sleep the following night and cause daytime drowsiness (Kozier, 2004). Some medications are antianxiety medications which decrease the arousal ability of the individual taking it these are also contraindicated to be taken by pregnant women because of the congenital anomalies that they may cause (Kozier, 2004).These medications also vary in their onset and duration of action and continuous use can lead to allowance account or to drug dependency (Kozier, 2004). Sudden cessation of these medications can result in withdrawal symptoms and even death, thus forrader withdrawal of medications, the dose should be gradually tapered to about 25% to 30% weekly. Examples of these medications are Chloral hydrate (Noctec), Ethchlorvynol (Placidyl), Flurazepam (Dalmane), Glutethimide (Doriden), Lorazepam (Ativan), Melatonin, Temazepam (Restoril), Triazolam (Halcion), Zaleplon (Sonata), and Zolpidem (Ambien) (Kozier, 2004).Alternative treatment for insomnia have been preferred over the pharmacologic therapy because alternative treatment is natural, hence less side effects are experienced and the individual will be able to have control over his sleep-wake cycle. Nonorthodox, unconventional, alternative, complementary, are a number of terms used to denote non-medical treatment that has been used since early times for a figure of diseases. Complementary and alternative medicine is defined as being identified through a social process as those practices that do not physique part of the dominant system for managing health and disease (Kozier, 2004, p.224). Before considering any therapy, be it alternative or pharmacologic, the individual is advised to consider techniques on promoting rest and sleep. A psyche who is suffering from insomnia should establish a regular sleep-wake pattern, this means that he should try to go to sleep at the same time everyday and wake up at the same time also. This is to prevent disruptions in the biologic clock (Kozier, 2004). He should also try to eliminate lengthy naps in between sleeps, and if ever necessary should limit this to only thirty minutes per day at the same time everyday (Kozier, 2004).He should get ample suffice or physical activities during the day to lower stress but this sh ould not be done two hours to begin with bedtime. The individual should also avoid relations with personal problems or office work before going to sleep and ins tead should establish a routine before sleep such as reading a book, listening to music or drinking a glass of warm milk (Kozier, 2004). Finally, to establish a sleep pattern the person is asked to only use the bed for sleeping, so that he would associate it with sleep, and that if still not drowsy, pursue some relaxing activity (Kozier, 2004).The environment also plays a role in helping the individual fall asleep. There should be appropriate lighting, temperature and ventilation as per the persons desire, noise should be unbroken to a minimum and if extraneous noise is present, it should be blocked with soft music (Kozier, 2004). With regards to food consumption and diet, the individual should not take a glum meal 3 hours before bedtime and to decrease fluid intake 2 to 4 hours prior to going to sleep but if it cannot b e helped, void before sleeping (Kozier, 2004).Several drugs can disrupt sleep by delaying its onset, decreasing sleep time, and cause nightmares and should be avoided before sleeping, examples are alcohol, amphetamines, antidepressants, beta-blockers, bronchodilators, caffeine, decongestants, and steroid (Kozier, 2004). Caffeine containing foods and beverages include coffee, soda, tea and chocolate and should not be taken 4 hours before bedtime. Promoting comfort and relaxation behavior may be helpful.The individual should wear loose-fitting nightwear, have taken a bath and does not feel sweaty and hot, make sure the bed linen is soft, smooth, clean and dry, and a back massage may be done, which is a type of touch therapy (Kozier, 2004). There are several healing modalities that are being implemented to help alleviate insomnia, and this includes touch therapy, mind-body therapy, and aroma therapy. Touch therapies, which include massage, foot reflexology, acupressure, and reiki, ma y stimulate the production of healing-promoting chemicals by the immune or limbic system (Kozier, 2004).Massage assists in relaxation and blood circulation improvement (Kozier, 2004). Physically, it promotes muscle relaxation by helping in release of lactic acid that is formed during strenuous activities and exercise, it improves blood and lymph flow, stretches joints, and helps in body toxin release and immune system input (Kozier, 2004). It also has mental and emotional benefits like anxiety relief and it provides a sense of relaxation and well-being (Kozier, 2004).There are three kinds of massage strokes, namely effleurage (stroking), crash pressure and petrissage which is kneading or large quick pinches of the shinny, subcutaneous tissues and muscles (Kozier, 2004). Mind-body therapies utilize the individuals focus on realigning or creating balance in mental elegant to bring about healing (Kozier, 2004). Progressive relaxation is most helpful in insomnia because it reduces i ncreased level of stress and chronic pain by enable the individual to wield control over the bodys responses to anxiety and tension (Kozier, 2004).There are three requisites though, to be able to make use of this technique. There should be correct posture, the persons mind should be at rest and the environment should be noise free as possible and the technique is to make the individual tense and relax his muscles alternately and then focus attention on the differentiating feelings of each action (Kozier, 2004). This can result to decreased atomic number 8 consumption by decreased metabolism, heart and respiratory rate, and decreased blood pressure (Kozier, 2004).Aromatherapy, which is defined clinically as the controlled use of essential oils for specific measured outcomes by Kozier, can be used by massaging into the body, added to water that is used when bathing, inhaled or applied as hot or cold compresses. The oils used in this therapy are distilled from a variety of substances such as flowers, roots, wood resins, leaves, lemon or orange rinds, barks, etc. When inhaled, the oils aroma is detected by olfactory receptor cells in our nares.The stimuli received will travel along the olfactory nerve or the cranial nerve I, the stimuli will then be received by the olfactory bulb and will be sent to the brain. The essential oil aroma is thought to play a role in emotions, memory and a variety of body functions including the heart rate, blood pressure, breathing and immune response (Kozier, 2004). There are 300 essential oils being used and some of these are lavender for headache relief, stress and insomnia, peppermint for nausea relief, aid in respiration an antipyretic, and sandalwood for chapped skin, depression, and stress (Kozier, 2004).There are also some herbal preparations that can be used for insomnia. Hops and valerian are used to induce sleep by nervous system relaxation, as recommended by the website holistic online. There are ways by which we can com bine both the conventional treatment and the alternative therapies to reduce insomnia. One way is to do the techniques on promoting rest and sleep, while on low-dosed medication. In a way, this might still be useful in eventually lowering and then eliminating drug use while still maintaining a normal sleep-wake pattern.Although plausible, it is still best advised to not take pharmacologic therapy when necessary. There is to some extent a fortune on using sedative-hypnotic drugs, as mentioned earlier. This can cause drug dependency, withdrawal symptoms if stopped abruptly without tapering the dose gradually, and can disrupt the sleep-wake pattern by causing excessive sleep and daytime drowsiness. It should also be noted that these drugs can be expensive and if needed on a effortless basis may become a burden to healthcare cost budgets.The benefit of course is that you will be able to sleep, after a few minutes once the drug is taken. As to the nonpharmacologic treatment suggestions , there are no risks, as long as the person who would want to try out these therapies has an open mind and is willing to subject himself to these procedures. Health wise, the therapies do not present any danger to the individual being subjected to the procedures unless pregnant, has allergies to the essential oils or herbs, has fractures, skin conditions or disease processes.If the person has insomnia as a symptom to an underlying disease, he should immediately heed the physicians advice. I do not see alternative treatment as a threat to the medical community, nor a competition. These two have very different procedures and are based on different dogmas that they should not be compared to each other. Although it cannot be helped, people should always be open-minded about these things, because they are at times useful, and have been subjected to many tests to be proven safe and effective.Of course, if one is in doubt of the nature or cause of their insomnia, one should head to the ne arest clinic or to the family physician before taking these alternative treatments into consideration. Once there is no underlying pathology, then before taking sleeping pills to make the dilemma go away, nonpharmacologic therapy should and is highly recommended to be done. There is no harm to it, and it might just help. It costs less and can be done right at home without spending flatulence to go some place else. But if all else fails, then it is suggested to take the sleeping pills as prescribed by the physician.References Atkinson, R. L. , Atkinson R. C. , Smith E. E. , Bem, D. J. , & Nolen-Koeksema, S. (2000). Hilgards Introduction to Psychology. ground forces Thomson. Bullock, B. and Henze, R. (2000). Focus on Pathophysiology. Philadelphia Lippincott Williams & Wilkins. Holistic Online. (1998-2007). Herb and Herbal Therapies. Retrieved January 25, 2008, from http//holisticonline. com/Remedies/Sleep/sleep_insomnia_herbs. htm Kozier, B. Erb, G. , Berman, A. , & Snyder, S. (2004 ). Fundamentals of Nursing. USA Pearson Education. .

Wednesday, May 22, 2019

Information Privacy Security: TJX Data Breach Crisis and Lessons

IntroductionProtecting the secretiveness of consumer personalized culture continues to pose significant repugns for organisations. The complexity is aggravated by consumers photo that comes about when they are unable to control the usage of personal discipline they share with craft organisations. Given the importance of information secrecy, there has been a host of privacy research focusing on the organisational decisions regarding the use and reuse of consumer personal information (Schwartz, 2009 Greenaway and Chan, 2005). Culnan et al (2008) observes that the emerging decentralisation of technology environment has posed additional privacy challenge data buckes. Currently, it is only the United States that requires organisations to give formal notice in the event of data breach (Morley, 2014). European Union and its member countries are yet to establish any legal requirements for organisations to notify consumers of any data breach, thereby leaving such contingency at t he fate of an organisations wariness. Without any notification laws, data breaches remain private and under the discretion of the affected organization. Therefore, this paper focuses on genius of the most prominent data security breaches that the world has ever witnessed TJX data privacy breach crisis, in the context of, respectable principles and theories, legal, professional and social issues. .The info concealing ConceptAccording to Xu et al. (2008), the concept of information privacy is multidimensional in nature and is largely dependent on the context as healthy as personal experiences. Although others see information privacy as full of definition ambiguity (Schwartz, 2009), others have defined consumer personal information as macrocosm made up of data generated when consumers conduct transactions. The problems of privacy often emerge from how this consumer information is stored, analysed, used, or shared (FTC, 2008). Information on how to address problems related to pri vacy management is limited due to minimal research in the area, particularly those issues dealing with management responsibilities on social issues. For example, there is limited research on how organisations should deal with consumers personal identifiable information, the role of managers in the protecting the consumer data and the chaste duty of all troupe involved in the handling or accessing consumer data.Overview of TJX data BreachTJX is a US-based off-price retailer operating over 2,400 stores in various countries and regions including US, Puerto Rico, Canada, and Europe. In the network of stores, the retailer collects and store customer information that would realise purchases via payment cards, personal cheques , and processing of merchandise returned without a receipt. This violated the legal requirement that prohibits any business from retaining sensitive consumer card information, including the magnetic strips on belief cards (Smedinghoff and Hamady, 2008). In addi tion, the breach exposed TJXs ill luck to observe basic ethical and professional principles. The revelation emerged when in 2007 TJX issued a press emission stating that criminals had intruded their data system and stolen over 45 million consumers card information within a period of 18 months (FTC, 2008). Although the TJX filed Form 8-K disclosure statement with the Securities and sub boot as required by the law, the company was widely held to be at fault for the breach. The company was accused of breaching the law by storing unencrypted sensitive consumer information, for their failure to limit wildcat access to the massive data via their wireless network, and the inability to establish adequate security measures within its networks among other issues (FTC, 2008).The Legal and social Issues in the TJX Data BreachThe current global data protection guideline is based on the Fair Information Practices (FIPs), which deal with individual rights and organisational responsibilities w ith regard to management of consumer data (Morley, 2014). In other words, how responsibly the data is used is a pointer to the social expectations with regards to consumer data use. FIPs attempts to put a certain level of fit between the competing business and individual interests in terms of legitimate use of personal information, which serves as the foundation for privacy laws and industry-specific regulatory programmes. In this respect, FIPs lays the foundation for organisations on how to be socially responsible in dealing with privacy issues. On the other hand, the adoption of these guidelines lays the foundations for evaluation by the external audiences on an organisations degree of responsiveness (Allen, 2011). There is a general consensus that responsible data management practice is paramount in every organisation (Morley, 2014). However, there is no consensus about how the implementation of individual principles should be carried out. Schwartz (2009, p.1) observes that in m ost parts of the world, fair information practices are implemented through omnibus laws. Curiously, the United States has no comprehensive laws that compel organisations to observe fair information practice, exclusively instead developed sectoral laws and regulations to consumer privacy protection with laws being enacted in response to issues arising from specific industries. The challenge that comes with this approach is that there is uneven practice in terms of operations and implementations. Moreover, the TJX issue exposed some glaring weaknesses in the implementation of FIP laws and regulations based on the principles of notice, choice, access, security, and sanctions for noncompliance (Culnan, et al., 2008). The effectiveness of data privacy management for organisations that collect, store, and use consumer personal data is curtailed by other issues including unclear law or policy, varied jurisdictions, and differences in data type. The challenge may be further aggravated by c onflicting regional or state laws (Allen, 2011). The breaches in the TJX case involved unauthorised access to consumer personal information, which resulted in a variety of risks towards consumer personal information. Nevertheless, there is a general agreement within the statutory laws and regulations that every organisation should verify there is duty of care with regards to information they collect and store based on consumers vulnerability and the actual possibility of harm (Allen, 2011). Allen (2011) observes that although organisations that comply with politics regulations are considered legitimate, and readily accepted by their external environment, including partners, this milestone is not easily achievable given the above challenges. For example, the term reasonable procedure as stated in most sectoral data protection regulations does not specify what is actually reasonable, which may vary depending on the nature and size of the organisation, the types of information it cap tures and stores, the security equipments and tools in the possession of the organisation, and the nature of risk at display. There has been criticism in regards to the prevailing laws and regulations because they are seen as reactive and outdated at the time when they are enacted (Morley, 2014). The other complaint is that most of privacy violation issues are only detected after the damage is done, thus doing little to retrogression the loss on the affected consumers.The Moral Issues and ResponsibilitiesInformation ethics is based on the collection, use, and management of information (Morley, 2014). As technology becomes increasingly complex, it is evident that ethical problems related to these developments continue to increase. However, the normative theories (stockholder, stakeholder, and social contracts) used to address the prevailing challenges remain less developed, with many institutions only relying on bare legal borderline requirements in relation to consumer data protec tion (Culnan, et al., 2008). Morley (2014) observes that these theories are distinct and incompatible with regards to the obligations of a business person. Taking into consideration the large social and financial intrusion of privacy breach as observed in the TJX case, there are mainly two aspects of moral issues that are central to the data privacy vulnerability and harm avoidance. The concept of vulnerability highlights most of societys moral intuitions, with the inherent scenario where one party is at disadvantage with regard to the other party in terms of data collection and use. This situation emerged because one party lacked the capacity to control the information givento the other party. Solove (2007) observed that the root cause of large privacy invasions is embedded inthe lack of information control by the giver. In the case of TJX, consumers suffered outright vulnerability, although they expected TJX to protect their card information with a proper(a) mechanism in place. On the other hand, avoiding harm involves the need for managers to avoid using consumer data to harm the vulnerable consumer socially and financially. Many have argued that it is the state of the managers to take a minimum moral standing to check no harm is done in the treatment of consumer information (Culnan, et al., 2008).ConclusionInformation privacy is an important issue in the modern business environment. In order to protect consumer information, managers must learn to strike a balance between consumer privacy and business interests by constantly adhering to the principle of protecting the vulnerable consumer and not causing harm to them through their personal information. It is important to note that TJX caused harm when their consumer personal data were stolen by a third party intruder. Although TJX violated industry rules, it is more significant to highlight that the companys failure to observe moral responsibility in the protection of consumer data should be viewed as mo re detrimental to the company. Businesses are expected to follow basic ethical principles in managing business activities. While we can argue that the TJX data breach saga received the attention because of the United States comprehensive formal notice requirements within the laws on privacy data management, it is also apparent that personal data protection is beyond the laws and regulations and requires ethical foundations within the organisations. The need to integrate ethical reasoning into the privacy programmes of every organisation is paramount (Xu et al., 2008). We can argue that integrating moral responsibility within organisations will not only establish ethical standards for the organisations, but is growingly becoming a necessity considering the challenges surrounding the implementation of legal requirements. Furthermore, considering that consumers are vulnerable and are unable to control how businesses use their personal information, it is the moral responsibilities of ev ery organisation to go beyond bare minimum legal compliance. That is, each organisation needs to take reasonable precaution when handling consumer data and ensure no harm is caused with this kind of data.ReferencesAllen, A. (2011). Unpopular Privacy What Must We HideOxford Oxford University Press. Culnan, M. J., Foxman, E. R., and Ray, A. W. (2008). Why ITExecutives Should Help Employees Secure Their Home Com- puters, MIS Quarterly Executive (71), March, pp. 49-55. Federal Trade Commission (FTC). (2008). Press Release Agency Announces Settlement of Separate Actions Against Retailer TJX, and Data Brokers Reed Elsevier and Seisint for Failing to Provide Adequate Security for Consumers Data, March 27(available at http//www.ftc.gov/opa/2008/03/datasec.shtm accessed November 29, 2014). Greenaway, K. E., and Chan, Y. E. (2005). hypothetic Explana-tions of Firms Information Privacy Behaviors, Journal of the Association for Information Systems (66), pp. 171-198. Morley, D. (2014). Understa nding Computers in a Changing Society. Chicago Cengage Learning. Schwartz, M. (2009). Europe Debates Mandatory Data Breach Notifications. The Privacy Advisor (92), p. 1. Smedinghoff, T. J., and Hamady, L. E. (2008). New State Regula-tions Signal Significant Expansion of Corporate Data SecurityObligations, BNA Privacy and Security Law Report (7), October 20, p. 1518. Solove, D. (2007). The New Vulnerability Data Security andPersonal Information, in Securing Privacy in the Internet Age, A. Chander, L. Gelman, and M. J. Radin (eds.), Palo Alto, CA Stanford University Press, pp. 111-136. Xu, H., Dinev, T., Smith, H. J., and Hart, P. (2008). Examining the Formation of Individuals Privacy Concerns Toward an Integra-tive View, in Proceedings of the 29th International company on Information Systems, Paris (available at http//aisel.aisnet.org/icis2008/6 accessed October 29, 2014).

Tuesday, May 21, 2019

Project Manager – Main Responsibilities

i) Project Manager main responsibilities and desired traits Project manager has primary responsibilities for providing leadership in planning, organizing and controlling to the ramble team to accomplish the project objective in quality manner, within budget and on time as a cohesive group. pic Desired Traits Skills utile project managers must posses a variety of skills in enlargeition to general management skills.While certain necessary skills may be dependent upon the project, there atomic number 18 some skills that all project managers should possess. Leadership ability -create a vision an direction, inspiring the team, give empowerment, give motivations, appreciate and values the contribution by recognition, measure encouragement, establishing an environment of trust, high expectations and enjoyment.Ability to develop people has a commitment to the training and development of people working on the project. Give the team an opportunity to add value from experience by gaining knowledge and more competent. Communication skills the ability to communicate clearly, effectively, and regularly for the purpose of to have a good working consanguinity with the project team, customers and other stakeholders.Interpersonal skills- the ability to develop a relationship with each team member in order to know what motivates them, how they think things are going, what concerns they have, and how they intent about things Problem-Solving the ability to anticipate problems, recognize them when they arise, and solve them quickly and efficiently Time Management the ability to prioritize, delegate, and manage time effectively Ability to wangle stress the ability to handle stress that can arise from work situation.Negotiating Skills able to interact with customers, sponsor, the project organizations management, subcontractors, vendors and end user to become at a mutually acceptable agreement on an issue. Conclusion The project manager responsibilities of planning, or ganizing, and controlling are general management responsibilities. In accession to these responsibilities, the effective project manager must possess a specific set of skills that can be used to manage projects successfully. PROJECT MANAGER

Monday, May 20, 2019

Oppressed Rights by the Oppressive Regime in Margaret Atwood’s the Handmaid’s Tale Essay

Margaret Atwoods The handmaids Tale delves well into the horrid nature of extreme constraint and immoral limitations in defining the corrupt theocratic regime at large, and more specifically the military unit this control has on the societys women. In an age in which a newly emerged and untamed governmental system called the Republic of Gilead has put life back to the middle ages, sparked by a far-flung panic of infertility, personal liberty and individuality wealthy person get going unimaginably reduced (Genny 1).Handmaids selected to live in the houses of wealthy, well-respected couples go through a life entirely designed by the government for the sole procedure of bearing children. Caught between adopting the strict rules made for women by the Republic and breaking them in underground for the sake of her sanity, the protagonist Offred essentially but not purposefully twists close to nothing for her societys benefit.Not allowed to read, write, speak her thoughts or even look an opposite in the eye, the most she can offer proves to be occasional, well-monitored grocery errands and the s on the loose(p) possibility of providing the gift of life for an elite commanding officer and his Wife. Parallel to a dystopia in which Offred has been stripped of the most simplistic allowances, women in todays various Middle east societies find relatively tally difficulty in utilizing their strengths due to the severe suppression and forced organise of their daily lives.Regardless of the varying context of these two scenarios, they both present themselves problematically in light of womens personal struggle to contribute in societyin both Atwoods The Handmaids Tale and the modern Middle East, seemingly unethical yet extreme theocratic government exercises examples of such radically unformed control over its people that the exploitation and demeaning of the natural rights of women become prevalent.But on what grounds should the male citizens of the Republic of Gilead and those in todays foreign communities be granted more liberation and opportunity plot the women are held more captive of their own indep devastationency? As Offred finds herself trapped in such an unreasonably restrained living part, she instinctively recognizes the current omit of available free will because she once knew what freedom looked and felt like.For example, in op range of her training as a handmaid with the Aunts, she cannot help but wander her ind back to the pre-Republic days thousands of years before, when she and fellow females could very go to school and watch movies of the rest of the world that even included dancing, singing, ceremonial masks, and music, clearly winning place in a land where peoplewere happy (Atwood 118). Offred as well as other handmaids in her place inevitably suffer within their reality by trying to maintain a grasp on the memories of such privileges they once took for granted, such as real television to promote fiber genteelnes s.Instead of living the naturally liberal life of opportunity that was once available to Offred and existed in her home office and school life, such a vision has been taken away by the government and exists now notwithstanding in her memory, as the Aunts present to her and the other potential handmaids a government-approved film with the title and few names blacked protrudewith a crayon so they couldnt read themanother example of a ludicrous constraint, reading, that could have in tranquilliseed fruitful possibilities in the mind of a woman (Atwood 119).In addition, as if the recollection of accredited education and other past events were not enough a cause of longing, Offred also recalls the fearless, em parting spirits of her late love onesparticularly her mother whom she spots in the film, wearing the kind of outfit Aunt Lydia told the handmaids was typical of Unwomen in those days while smiling, laughingand raising her fists in the air (Atwood 119).To witness such a nonsensi cal and free spirit in action, that once was allowed for women but has been officially banned by the radical Christian followings of the Republic of Gilead, undoubtedly sparks a deep temptation within handmaids to rebel against this authority inflicting such insufferable losses of intellectual liberty however, such a temptation proves to be a challenge to engage for somewhat women today (Tolan 1).While the initial teachings of Islam attempted to improve living conditions for Muslim women by granting them some of the same rights as men in the seventh century, women become incapable of endorsing these rights when their society attempts to enforce the laws of the Islamic religion, described by the Columbia University professors who wrote At the Crossroads of the World Women in the Middle East instantly, umpteen Muslim women do not have the opportunity to enjoy rights once considered theirs by their religion.Women may be unaware of their rights or live in societies where these righ ts have been misinterpreted or misrepresented by individuals in power (be it the state, culture, or family). In Muslim countries around the world, there is a fundamental difference between what is positivistic by religious texts and what is actually practiced, a gulf between the ideal and the real (Esposito 1998, xiii).Often, the purportedly sacredly grounded restrictions placed on women within certain societies have little or nothing to do with the teachings of Islam. more than often they are a function of socioeconomic and political factors. Recent examples of such restrictions included Taliban-controlled Afghanistan, which forbidden women from receiving medical attention from males and placed other restrictions on their movement in public (Revolutionary Association of the Women in Afghanistan)(Crocco, Pervez, and Katz 110).At most, these women are granted with the illusion that they possess legitimate freedoms, when in actuality their government prohibits this execution with the traitorously justification that it simply conforms to the Islamic religion. The handmaids and all women alike governed by the Republic of Gilead correspondingly must follow the rules of the regime that claims to be operating in the name of the Christian faith in an attempt to confirm its restrictive essence.Thus, no question exists as to how Offred becomes increasingly reckless with her actions and behaviors, or to why in the end there is the strong possibility that her recklessness has cost her her life (Genny 1). Most emphatically does Offreds situation come off as unjust when she finally experiences a small taste of the natural freedom she once had but still deserves. Because it is obviously an oasis of the forbidden, she has to force herself to holdabsolutely rigid when the Commander invites her into his off-limits personal turf to play a game of Scrabble, something harmless, yet banned.Despite the fact that shes terrified, Offred still recognizes that this is freedom an e yeblink of it, as if he were offering her drugs (Atwood 138-139). While Atwood implies in her novel that feminist utopianism cannot avoid the taint of totalitarianism, she employs the conceit of defiance in that Offred can nourish her natural tendencies to actually enjoy herself through breaking the rules (Tolan 30). similarly for the women in Iraq, the Baath Party that emerged in 1963 sought provisions for womens equality, including the liberties of education and employment however, orthogonal the major urban center of Baghdad, the society still relegated Iraqi women to a very inferior position vis-a-vis men (Brown and Romano 1). To maintain two adjacent communities with such contrasting ways of governing women is arguably contradicting and therefore, a cause for concern.Ultimately, women have simplistically natural rights that ought not to be rendered in the least, especially by prick theocratic governments. Under no circumstances are the rights to thought, decision, reading, a nd writing, among many others, capable of being outlawed justifiably, irrespective of gender. With such liberties, women carry great potential in contributing to society, despite the possibility of infertility or radically religious devotionand in a lot of cases, that contribution can be imperative.Today in Iraq, a woman cannot own private property or hold any status, while forced to give up her education and marry a stranger. However, women still make up 65% percent of the population, and make up 70% of the agricultural workforce (Al-Jawaheri and Harris). Though they continue to fight for the equal rights and treatment they deserve while accepting their low circumstances, the crucial importance of granting women this moral blessing frame strong.