Friday, January 24, 2020
Comparison between Tony Kytes and The Seduction :: English Literature
Comparison between Tony Kytes and The Seduction =============================================== Both Tony Kytes and The Seduction deal with relationships between young men and girls. Both tell of the ways in which the men manipulate the girls, gaining what they want at the girls' expenses. They both detail the insensitive treatment of the girls and explore the attitudes towards sex, marriage and the opposite sex from both the male and female point of views. Tony Kytes is a humorous account of a young man called Tony and his encounter with three prospective young women whilst driving his cart back from the nearby market. The first is sly and worms her way into Tony's affections. However his fiance Milly appears and Tony requests Unity to hide under the tarpaulin in the back of the cart to avoid a difficult confrontation. Milly arrives and climbs aboard the cart, yet they have not travelled far before Tony spies another pretty girl, namely Hannah Jolliver. This time he persuades Milly to hide in the back of the cart and she too consents. Hannah requests a lift and openly flirts with him, making Tony wonder about who he really wants to marry. He notices his Father, who offers some good advice - that he should marry the one girl who didn't ask for a lift (Milly), Tony immediately disregards it. Meanwhile the horse has run off, tipping the cart over and revealing all three girls, forcing Tony to make a quick decision. He asks Hannah, who refuses him due to her father's presence. Unity is asked next, but she refuses him, as she was only second choice. Tony then requests Milly's hand in marriage, she accepts; they get married shortly afterwards. The Seduction is a rather different account of yet another encounter between a young man; this time only one female is involved. Set in Tyneside in 1980's it describes a meeting between a young man and a young girl at a party, and the ensuing aftermath. At the party the girl is plied with alcohol, which makes her more and more relaxed, till finally the man takes her to a favourite spot of his by the river where he takes advantage of her alcohol-fuelled state. When the girl realises she is three months pregnant she is devastated. She realises that she can no longer be the innocent girl she was and can no longer look forward to carefree summers with her friends. She recognises that she will not get to experience teenage life in the same way again and is mortified by this. Tony Kytes is set in the 1800's in a rural Wessex farming community. We know it is a farming community due to the references of " the
Thursday, January 16, 2020
Describe physical, intellectual, emotional and social development for each of the life stages of an individual Essay
The eldest of Frank and Isobel Hawkingââ¬â¢s four children, Stephen William Hawking was born on the 300th anniversary of the death of Galileoââ¬âlong a source of pride for the noted physicistââ¬âon January 8, 1942. He was born in Oxford, England, into a family of thinkers. His Scottish mother, Isobel Hawking, had earned her way into Oxford University in the 1930sââ¬âa time when few women thought of going to collegeââ¬âmaking her one of the collegeââ¬â¢s first female students. His father, Frank Hawking, another Oxford graduate, was a respected medical researcher with a specialty in tropical diseases. Stephen Hawkingââ¬â¢s birth came at an inopportune time for his parents, who didnââ¬â¢t have much money. The political climate was also tense, as England was dealing with World War II and the onslaught of German bombs. In an effort to seek a safer place to have their first child, Frank moved his pregnant wife from their London home to Oxford. The Hawkingââ¬â¢s would go on to have two other children, Mary (1943) and Philippa (1947). A second son, Edward, was adopted in 1956. In 1963 Hawkingââ¬â¢s had many tests done on his well being and found that he had ALS and the doctors said he would die in 2 years. Hawkingââ¬â¢s quest for big answers to big questions includes his own personal desire to travel into space. In 2007, at the age of 65, Hawking made an important step toward space travel. While visiting the Kennedy Space Centre in Florida, he was given the opportunity to experience an environment without gravity. He has also gone on to do many more things which I will go into detail about in this essay. Conception There was no given information about conception, this is what generally happens. However we can estimate the conception time. Physical Development Stephan hawking would have been conceived around the date May the 8th 1941. During conception the physical development is that the semen from the male joins with the egg from the female to create a new living cell. A babyââ¬â¢s sex is determined at fertilisation. A chromosome from the fatherââ¬â¢s sperm determines whether the child is male or female. If an X chromosome is present the baby is a girl; if a Y chromosome is carried by the sperm instead, the baby is a boy. Pregnancy There was no given information about the sort of pregnancy Stephan Hawkingââ¬â¢s mother had so this is an overview of the general things that happen. Physical Development There are three Trimesters in pregnancy in the first: in the first four weeks from conception, fetal growth of the ovum begins with development of the spinal cord, nervous system, gastrointestinal system, heart and lungs. By eight weeks, in the embryonic stage, the face is forming, arms and legs move, the babyââ¬â¢s heart begins beating and the brain and other organs form. By 12 weeks, the baby, now called a foetus, grows to 3 inches long and weighs 1 ounce. She can move fingers and toes. Fingerprints are present. The baby smiles, frowns, sucks, swallows and urinates. The sex of the baby can be discerned by this time. In the second; during the second three months of pregnancy, the baby kicks, can hear and has a strong grip. At 16 weeks a strong heartbeat is evident. The skin is transparent and fingernails and toenails form. The baby can roll over in the amniotic fluid. At 20 weeks, the heartbeat can be heard with a stethoscope. The baby has hair, eyelashes and eyebrows. He can suck his thumb and may have hiccups. By 24 weeks, the baby is 11 to 14 inches long and weighs 1 to 1 1/2 pounds. His skin is covered with a protective coating, his eyes are open. The Third; the baby is very active at 28 weeks and initial breathing movements begin. She is adding body fat. By 32 weeks, the baby experiences periods of sleep and wakefulness and responds to sounds. A six monthsââ¬â¢ supply of iron is accumulating in the liver. By 36 to 38 weeks she is 19 or more inches long and weighs 6 pounds or more. At this point she is less active and gains immunities from her mother. Intellectual Brain waves have been recorded by EEG (electro- encephalograph) in the human embryo 40 days after fertilisation. Human embryos of five weeks gestational age have been seen to move away from an object touching the mouth area. The sensitive area extends to include the rest of the face in the sixth and seventh weeks and the palms of the hands and soles of the feet in the eighth and ninth weeks respectively. 10 weeks your babyââ¬â¢s forehead temporarily bulges with his developing brain and sits very high on his head, which measures half the length of his body. By 12 weeks nerve cells are multiplying rapidly, and in your babyââ¬â¢s brain, synapses are forming furiously. Birth & Infancy Infancy is a time when growth and development are at their most rapid. This is the time when they learn to control the reflexes they are born with and learn to support themselves such as head support and sitting up. Nothing was recorded on this life stage for Stephen Hawking apart from the fact he was born in Oxford and was the eldest of four Stephen Hawkingââ¬â¢s birth came at an inopportune time for his parents, who didnââ¬â¢t have much money. The political climate was also tense, as England was dealing with World War II and the onslaught of German bombs. Physical Development From birth to 3 months Motor control develops from the head, moves down through the arms and the trunk and then to the legs and feet, according to an item on early development on the online magazine Parenting. Initial movements are reflexive in nature, such as turning the head to the side when the cheek is stroked, which aids in feeding. As the initial survival reflexes fade, motor skills are related to the growing ability to observe and interact with the environment. From 3 to 6 months At 3 months of age, infant progresses to lifting the head and chest up when lying in its belly and may press up with its arms. A 3-month-old kicks its legs when lying on the belly or back, and bats at and briefly grasps toys, according to Healthy Children. The Hawaii Early Learning Profile indicates that between 3 and 4 months, he begins rolling with belly to back first, and back to belly closer to 6 months. From 6 to 12 months the average age at which infants sat without support was 6 months. The average age for standing with support was 7. months. Infants in the study crawled on hands and knees at 8. 5 months. Walking with assistance occurred at 9. 2 months. The average age of an infant who achieved standing alone was 11 months. From 12 to 24 months a young toddler takes two to three steps alone around 12 months. They should walk unsupported across a room with stopping or changing direction between 13 and 15 months. Around 18 months, kicking and throwing balls, running, climbing stairs with assistance, and propelling scoot toys join the toddlerââ¬â¢s set of mobility and play skills. From 24 to 36 months (3 years) between the ages of 2 and 3, balance improves and the toddler walks with a smoother pattern. During this period they learn to stand briefly on one foot, walk backwards, and walk on tiptoes. A child jumps in place around 24 months and progresses to jumping over a small obstacle by 36 months. At 24 months then should be able to climb a small ladder and goes down a small slide, then manoeuvres on a variety of playground equipment around 35 months. Between 30 and 34 months, toddlers begin to walk up stairs alternating feet without a hand held or use of a railing. Other play skills expected within a few months of the third birthday are catching a playground ball that has been tossed to the child and pedalling a tricycle. Intellectual Development From 0-6 months the baby can vocalise, it makes cooing sounds and chuckles, the baby will do this spontaneously and they will discover the impact they can have the world such as when they cry someone will come and that6 when they are played with and tickled they should laugh etc. From 6months- 1? years the child should be able to use one or two words to name things or actions such as ââ¬Ëjuiceââ¬â¢ or ââ¬Ëballââ¬â¢, they should also be able to say ââ¬Ëmamaââ¬â¢ and ââ¬Ëdadaââ¬â¢. Point to familiar things when they want them or asked where they are, they should also be able to point to at least one body part when asked, for example if someone asked where their nose was they should clearly be able to show that they know. They will be more curious about everything around them and will start to explore and realise right from wrong. They should also start to realise that objects can still exist when theyââ¬â¢re out of sight for example if theyââ¬â¢re in their high chair and drop something they will then go off and look for it. From 1? years-3 years the child should be able to draw a partial person such as the head and body it may not be clear but you can easily tell that itââ¬â¢s supposed to be a body. They will be able to now talk in sentences and formulate them well and their speech is understandable most of the time. They will use the right pronouns for what theyââ¬â¢re trying to say and identifying persons (I, you and me) Emotional & Social Development 0-3 months will develop a social smile, they will also at this time enjoy play and cry when play stops. The child will then in turn become more expressive and communicates more with the face and body. They will imitate some movements and other facial expression that they see on other people. 3-7 months they will enjoy social play with other children and other family members. They will be interested when seeing mirror images (seeing themselves in a mirror), the child will start to respond to facial expressions and emotions and often appears joyful and happy. 7months-1year When the child meets new people they will be shy and anxious at first, will cry when mother or father leaves them at day care, nursery etc. They will enjoy imitating people in his play and shows preference for certain people and different toys. The child will at this age start to test their parentââ¬â¢s responses to different behaviours to see how they react to them crying or laughing etc. Children can become fearful in some situations and will prefer their mother or regular care giver over everyone else. They will be able to finger feed themselves and will repeat gestures for attention and they will also extend their arms and legs to help when getting dressed. -3 years the child will imitate behaviours especially other childrenââ¬â¢s behaviours and their parentââ¬â¢s gestures and facial expressions, They will be more aware of themselves as separate from other people. They will be more excited about company of other children; they will also demonstrate growing independence and begin to show defiant behaviour. Their separation anxiety with their parents will begin to fade halfway between this years. Childhood age s 4-10 Childhood is the life stage when people develop control over their bodies. Our emotions become more complex as we get older and we have more control over how we respond to them. We develop more communication skills and learn to relate to others. Thereââ¬â¢s a few things that have come up about Stephan Hawkingââ¬â¢s childhood. One of them is at an early age their mother would all lie outside with them and stare up at the stars, Hawkingââ¬â¢s mother said that ââ¬Å"I could tell the stars would draw himâ⬠and she knew he would from then out want something to do with science and the sky when he was older. Also there was a source that told us that they would all sit quietly at the dinner table and just read this could have affected at least two areas of development that I will talk about when I get to it. However it was said that he hated to be still and would always be on the go as a child and was a very active person even after he started Oxford University at the age of 17 he loved to dance and liked rowing and became one of the Oxford rowing teams coxswain. Also after Hawkings was born his parents would go on to have two other children, Mary (1943) and Philippa (1947). A second son, Edward, was adopted in 1956. Physical Development If Stephan Hawking was a very active child this means his gross motor skills would be very developed as he would never be still and always be running about and even later on in life he carried on with doing active sports and activities. Apart from this there wasnââ¬â¢t much more information on his physical development. At this age the average physical development of a child is: By the age of 4years a child should be able to bend down to pick up toys with their legs straight, can use ladders properly such as climbing up on play frames in the park, they should become better with ball games now finding it easier to kick and throw a ball and catching should begin to develop, if they own a trike (bike with stabilizers) they should now be very good on it, they should also be able to go up and down stairs efficiently, They may also run on their tip toes rather than the balls of their feet and also should be able to sit cross legged and stand on one leg for a short period of time. This is where all the basic things they learn in playgroup come into play and their gross and fine motor skills become more developed such as they can now pick up toys without any trouble where as when they were so many months old this was not possible. At age 5years they should be able to dance, play all sorts of ball games; their balance should have improved, they should be able to walk along a thin line, can touch toes with straight legs and should just be more lively and energetic in general. By the age of 6years they should be able to skip, ride a bike they will begin to lose any fat they have and gain muscle, they should be capable of cleaning their own teeth, they should be able to play jump robe, kick a ball and play catch. Many 6year olds will be interested in playing team sports this then will help boost social Development. Children of 6years will also be able to draw more neatly and clearly, and be able to write letters, they should also be more skilled at using scissors and they should now be learning or already know how to tie their shoe laces and do up buttons. 7years of age children should now have good hand eye coordination and they should have good balance by this age also they should be able to do basic gymnastic movements such as forward and backwards rolls and maybe somersaults. By the age of 8years this is the age when the amount of practice and play done in the earlier years begins to manifest itself in skilfulness and in what might be called ââ¬Å"athleticism. â⬠Motor skills like throwing, catching, kicking, balancing, rolling and batting approach the mature stage and allow some youngsters to be highly successful in traditional sports like baseball, soccer and basketball. Earlier years of practice also provide the foundation for success in sports like skiing, skating, golf, dance and gymnastics. This year is also the time when children frequently begin to identify themselves as ââ¬Å"athleticâ⬠or ââ¬Å"un athletic,â⬠thereby influencing their future involvement in sports and physical activity 8 years of age information took from this website: http://www. pbs. rg/parents/childdevelopmenttracker/eight/ At the age of 9years (the final age of childhood) The growth in your 9 year old child can vary greatly some children at this age can experience puberty the motor skills of 9-year-old children are smoother and stronger than when they were younger, You can expect to see a wide range of physical abilities among children this age. Some 9year olds will have better coordination, balance, and endurance than others and they may take a great interest in a certain sport such as basketball, swimming, dance etc. Intellectual Development Stephen Hawkings family used to sit around the dinner table in silence at dinner times and they would all read a book, this means that intellectually Stephen Hawking should start learning to read from a younger age this means his reading age may be more advanced than other children of his age, even though this does not say what age he was when this used to happed it is presumed it would happen every day in the family home. His mother would also take him out to look at the stars this would encourage his interest in the world at a young age and get him more interested and maybe this could have made him want to learn, she said ââ¬ËI knew the stars would draw himââ¬â¢ she could tell he was very interested in the world/stars. The intellectual developmental averages for a child in childhood are: at 4years of age, They should be skilful at holding pencils, can draw a house, can draw people with heads bodies legs and most fingers, May decide on what theyââ¬â¢re drawing/painting before they complete it, Knows all primary colours and can build a 10 brick high tower and can copy a six brick pattern. At the age of 5years a child should be able to; copy a 10 brick pattern, can count all fingers, can draw a more detailed house with windows chimney garden etc, they should be skilled at colouring in and doing jigsaws, can now copy a square triangle circle and the letters A, C, U, O, T, X, Y, V, H and L and should be able to correspond the time of day with everyday activities. At the age of 6years your child will start school and this is where they will learn all new and exciting things such as writing and reading and mathematics, They will be gaining a longer attention span the interest of the world around them will begin to increase, many 6year olds will begin to develop independent reading, enjoy writing stories, they will start to break words down into sounds vocab will increase and a lot more. Age 7years they should: use a vocabulary of several thousand words, demonstrates a long attention span, will use serious logical thinking, should be able to understand reasoning, knows days months and seasons, able to solve complex problems and individual learning styles become clearer cut. At the age of 8 your child should be able to count to 1000, can do simple comprehension tasks, they will read for pleasure and their vocabulary will now be laying the ground work for academic achievement. Emotional Development Stephan Hawking came from a big family and had sisters and brothers one of which was adopted, this may not have affected him emotionally however sometimes siblings can feel like other of the siblings are favourite and this can often make them feel not good enough and want to impress their parents. There are no records to say this happened to Stephan Hawking however there is a possibility it could have. At 4 years of age a few things they should be able to do include: identify basic emotions on pictures say if the picture looks happy or sad, they can identify care givers such as cares and parents. Obviously this shows Stephan Hawking knew who his mother was etc and maybe have a strong emotional bond as they would often go out and spend time together under the stars. By the age of 5years they will begin to describe their feelings and maybe learn how to control them a little bit by playing with friends/toys when sad, they may even start to imitate their care givers. At the age of 6years they can often become overwhelmed by emotions and feel doubt or shame they will also have formed strong bonds with at least one member of the family and may prefer to send time with them. At the age of 7 years your child will be learning to cope with emotions and can fully be able to describe how they feel when asked will have formed strong friendships at school and will enjoy being around other children. At the age of 8years your child should have a clear favourite friend and will enjoy spending time with them the most, many children will be able to handle their feelings and will know why and how they feel this way which is a good thing as they can then learn how to change how they feel.
Wednesday, January 8, 2020
Sharpville Massacre - 1100 Words
Kekeletso Mphuthi Human Rights Day (21 March, the date of the Sharpeville Massacre in 1960) During the Apartheid era in South Africa, black people were oppressed beyond humane standards. They were deprived of racial equality with the whites. Also, they were exploited off from their land. Furthermore, they were restricted from certain privileges. All this caused retaliation by the blacks both politically and socially, and the eventual result was the Sharpeville Massacre. The Sharpeville massacre was a haunting historical response by black people against the Apartheid oppression. For almost fifty years black South Africans had strived for their struggle against oppression and exploitation with the greatest patience. They had put theirâ⬠¦show more contentâ⬠¦Then on March 21, 1960, the people of Sharpeville began to move up Seiso Street toward the police station at the top end of the township. It was said that the Congress leaders wanted everyone to go there and get them arrested for not carrying their passes. People crowded around the high security fence and were chanting and singing. On the other side of the fence were armed policemen lined up and ready to shoot and to the sides of the crowd were two rock-hard cars equipped with machine guns. People arrived in masses with only faith at hand. At exactly 1:50 P.M. there was uproar at the right side of the gate, it seemed as though a fat woman had been bumped by a police car as it tried to drive through the gate. Immediately after this there were chattering noises within the crowd. The police started shooting at crowd. People were being shot in the head. A survivor of this tragic day, Michael Zondo, a school teacher, recalls seeing brains flying everywhere in front of him, skulls bursting wide open. The crowd spread quickly and people began running in a panic. It was a moment of total chaos. Suddenly it was all over, 69 deaths and 180 sufferers, later the Sharpeville Massacre had come to an end. There is no memorial to the Sharpeville Massacre as there is to the women and children who died in the Boer concentration camps, but it holds the same symbolic place in the pilgrimage of deaths ofShow MoreRelatedHow Far Has the Importance of Nelson Mandela in the Ending of Apartheid Been Exaggerated?1748 Words à |à 7 Pagesbelieved to be more influential than Mandela. Protests against pass laws were quite common but the Sharpville massacre is what caught the attention of the world. The Sharpville massacre was one of the worst civilian massacres is south African history. It was reported in the Chronicle of the 20th century that ââ¬Å"56 Africans died and 162 were injured when police opened fire in the black township of Sharpville.â⬠This cannot be thought of as completely accurate as it was published in a newspaper. The governmentRead MoreThe Role of Nelson Mandela in En ding Apartheid in South Africa783 Words à |à 4 Pageshelped bring Apartheid to an end; the examples are the Sharpville massacre (in 1960) and the Soweto (in 1978). Sharpville was a very important turning point in the fight against Apartheid. In 1960 the PAC organised a protest against the pass laws at Sharpville. Some 5000 unarmed protesters gathered. Stone throwing led to shooting. At the end of the day 69 Africans were dead and 178 wounded. Obviously this massacre caused devastation, upset and anger. The ANC calledRead More Nelson Mandela Essay2142 Words à |à 9 PagesANC to protest the actions of the Apartheid government. The police retaliated sporadically shooting everybody in sightâ⬠¦sixty-nine dead, one hundred and eighty injured (Humanitarians and Reformers 184).The vicious annihilations were named the Sharpville massacre (Humanitarians and Reformers 183). These events created a work boycott amongst the African community which in turn caused the government to claim that they were in a state of emergency, shutting down the entire country. Arrest warrants wereRead MoreTaking a Look at Nelson Mandela639 Words à |à 3 Pagescannot say for certain if there is such a thing as love at first sight, but i do know that the moment i first glimpsed at Winnie Nomzamo,I knew that i wanted to have her as my wife. (Mandela,1958, pg 77 ) Armed Struggle(1960) After the 1960 Sharpville Massacre, where many unarmed black protesters were killed by the police he saw the need to change from his non-violent ways by organizing an armed struggle the ANCs Military Wing, Umkhonto WeSizwe. In the very same year he went on to study guerrilla
Tuesday, December 31, 2019
Analysis Of The Article On The Letter By Charles E...
How to Be a Minimalist By Charles E Huss | Submitted On September 24, 2012 Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest 1 Expert Author Charles E Huss Minimalism has been around for thousands of years but it seems it is becoming increasingly popular lately. Perhaps that is because so many people, used to living a material life, are starting to question why all these things don t make them happy, or even satisfied. Some are realizing that they can get more by living with less. What is Minimalism? Minimalism has several meanings, some are related to art and music and others refer to interior design and architecture, Still others are political in nature. The dictionaries I looked at do not even mention minimalism as a lifestyle choice so I will try to define it in my own words. Minimalism is a lifestyle that involves living with only what is necessary for happiness, health and general well-being. I tend to take a softer approach to being a minimalist. I believe it is more of a journey than a destination. Some people may want to jump in head first and get rid of every single unnecessary item in their house overnight. I think that takes much of the enjoyment out of it. For me, getting rid of
Monday, December 23, 2019
Bob Dylan And The American Civil Rights And Anti War...
Bob Dylan (/ÃËdà ªlÃâ¢n/; born Robert Allen Zimmerman, May 24, 1941) is an American singer-songwriter, artist and writer. He has been influential in popular music and culture for more than five decades. Much of his most celebrated work dates from the 1960s when his songs chronicled social unrest, although Dylan repudiated suggestions from journalists that he was a spokesman for his generation. Nevertheless, early songs such as Blowin in the Wind and The Times They Are a-Changin became anthems for the American civil rights and anti-war movements. After he left his initial base in the American folk music revival, his six-minute single Like a Rolling Stone altered the range of popular music in 1965. His mid-1960s recordings, backed by rock musicians, reached the top end of the United States music charts while also attracting denunciation and criticism from others in the folk movement. Dylan s lyrics have incorporated various political, social, philosophical, and literary influences. They defied existing pop music conventions and appealed to the burgeoning counterculture. Initially inspired by the performances of Little Richard, and the songwriting of Woody Guthrie, Robert Johnson, and Hank Williams, Dylan has amplified and personalized musical genres. His recording career, spanning 50 years, has explored the traditions in American songââ¬âfrom folk, blues, and country to gospel, rock and roll, and rockabilly to English, Scottish, and Irish folk music, embracing even jazzShow MoreRelatedBob Dylans The Sixties Counterculture1622 Words à |à 7 Pages we must understand the important role of Bob Dylan. His lyrics fueled the rebellious youth in America. Songs such as ââ¬Å"Blowinââ¬â¢ in the Windâ⬠and ââ¬Å"The Times are A-Changinâ⬠made him favorable to anti-war demonstrators and supporters of the Civil Rights movement. He was commonly hailed as the spokesman for his generation. Dylan used lyrics to allow the youth to find their own form of counter-culture. The youth generation began to see the effects racism, war, etc. effect the society in America. To combatRead MoreThe Impacts Of Bob Dylan And The Civil Rights Movement939 Words à |à 4 Pagesand racism. In America in 1960 the Civil Rights Movement was underway and the Vietnam War had already been going on for 5 years, where approximately 900 American troops were already serving. The 1960s produced some of the greatest musical artists seen in history, and one in particular was Bob Dylan. Bob Dylan is thought to be one of the greatest influence on popular culture in all time, and is one of the main and influential protest song artists of the 1960s. Dylan grew up in a time of great changeRead MoreBob Dylan And The Sixties1214 Words à |à 5 PagesBob Dylan played a vital role in the sixties counter-culture. His lyrics fueled the rebellious youth in America. Songs such as ââ¬Å"Blowinââ¬â¢ in the Windâ⬠and ââ¬Å"The Times are A-Changinâ⬠made him favorable to anti-war demonstrators and supporters of the Civil Rights movement. He was commonly referred to as the spokesman for his generation. Dylan used lyrics to empower the youth to find their own form of counter-culture. The youth generation began to see the effects racism had on society and the violenceRead MoreCivil War And The 1960s1631 Words à |à 7 PagesA History of Protest Music ââ¬â Revolutionary War to the 1960s Protest music in the United States dates back to the 19th century. This protest music focused around subjects that were topical for the time period. Among these topics were the Civil War. Another topic was slavery, and its abolition. A final topic was womenââ¬â¢s suffrage. A famous group of protest singers was the Hutchinson Family Singers. Their notoriety, which spanned the mid-19th century, began in 1839. Their songs about abolition wereRead MoreThe ââ¬Ë60s: Culture and Music Essay1478 Words à |à 6 Pagesimportant role in constituting American culture, where people have expressed themselves through music during flourishing and turbulent times. In the 1930ââ¬â¢s, Swing music created a platform for audiences to vent their emotions in the midst of Great Depression and political unrest. Such strong relationship between music and culture can be seen throughout history, especially in the sixties. The ââ¬Ë60s were the age of youth, as millions of childrenââ¬â¢s from post World War II became teenagers and rebelledRead MoreThe Vietnam War Of Vietnam1573 Words à |à 7 PagesA. The Vietnam War occurred from 1955-1975, this included the North and South fighting over government structure of the newly independent state of Vietnam, having recently become independent from France. However, the USA was in Vietnam as a sort of protection for the South Vietnamese people, who had a weaker army force, but only a few thousand Americans were in Vietnam for that purpose at the time. On August 7, 1964, the USA entered the war for the purpose of fighting the North Vietnamese due toRead MoreThe Most Iconic Civil Rights Movement Influencers Of All Time By Billie Holiday1590 Words à |à 7 PagesTo begin my essay, I would like to start off with arguably the most iconic civil rights movement influencers of all time, Billie Holiday. Eleanora Fagan was born on April 7, 1915 and is from the â⠬Å"Quaker Cityâ⬠formally known as Philadelphia, Pennsylvania. Eleanora childhood could be best described as unsteady, at times. During these trying points in her life, Eleanora enjoyed singing along to records and escape the harsh reality of her life. When she made the move to New York with her mother aroundRead MoreBob Dylan Impact on Society2726 Words à |à 11 PagesBob Dylan: An Impact on American Society in the 1960ââ¬â¢s Amy Blanton Professor Porter History 22 April 10, 2001 1 The 1960s was a decade of liberation for music, public opinion, dance, invention, and the binds of racism. From this generation spawned some of the greatest musical artists of all timeââ¬âone in particular, Bob Dylan. Bob Dylan is considered to be the greatest influence on popular culture of all time. However, Bob Dylan was not born an idolââ¬âhis legacy was a result of his surroundings. ThroughoutRead MoreBob Dylan Essay1153 Words à |à 5 PagesThe early 1960s was a time of extreme social issues such as the Vietnam War and the Civil Rights Movement; everyone was looking for their own voice in this time of adversity. A young Bob Dylan arises to the spotlight and sings songs speaking of protest and originality, expressing societal dissatisfaction felt by not only himself but by his entire generation. In the 1960s Dylan wrote many protest songs that people of his generation found themselves connecting to, leading way to a counterculture asideRead MoreThe Beatles And Bob Dy lan905 Words à |à 4 Pagesand America have influenced and inspired one another for many years. Music was, and still is, a huge connecting factor between the two countries. The Beatles and Bob Dylan, two of the most famous artists of all time, demonstrate how Britain and America had a profound influence on each countryââ¬â¢s music culture. In the beginning of American history, America was heavily influenced by Britain because it was considered the ââ¬Å"Mother Countryâ⬠for the pilgrims that settled throughout North America. Due to this
Sunday, December 15, 2019
Security and Privacy in Workplace Free Essays
string(108) " for certain then the company can be sued which can affect the companiesââ¬â¢ reputation to a greater extent\." 1. 0 Introduction Whalen and Gates (2010), define monitoring differently in their article. They define it as a method and procedure of examining the workers in an organization and study their constant events intended to guarantee that together the protection of employees and requirements of the employer are met. We will write a custom essay sample on Security and Privacy in Workplace or any similar topic only for you Order Now Nearly all companies nowadays take videos of their employees, they read their emails and monitor their Web surfing. This can be done surreptitiously and some organizations are honest about it Chan et al. (2005). Privacy is one of the most important things that are immensely fitting to be something of the past. In general companies are permitted to observe employee activities by the courts. Private companies have been setting rules in situations when employees are taken into service for instance contracts that affirm that they will be monitoring employeesââ¬â¢ use of the Internet or any company tools (Chieh and Kleiner, 2003). Efforts have been made in arrangement for laws that protect business and the employees, regrettably most current court cases have been deceiving evidence in the eyes of the magistrates thus confidentiality or privacy laws have been unsuccessful for employees. It has been recommended that government, big firms and industries and health care systems should have the capability to tape and study workers activities as it is a benefit to research and development for several years. Most legislation is the same opinion that laws should be set in place even though the breach of human rights forbid them from approaching the issue to a law level (Welebir and Kleiner, 2005). Sadly, comprehensible defenses of privacy opposed to security may never be evident from the view point of the law. Employersââ¬â¢ main apprehension is the decrease in productivity, virus attacks/ damaged equipment (i. e. computers), legal charges and loss of classifies data. Employeesââ¬â¢ major worry is incursion of their privacy, mistreatment of control and precision in their work. A survey conducted in the year 2000, is that sixty two percent of the employees use Internet resources once a day for their private reasons and twenty percent of them use it for at least ten times. This is why employer is at unease because a large number of workers are using company property for their own use and not for the business purposes. According to Watson (2002) sopports the idea that productivity is what most companies are concerned about such that if employees use them for their own private uses it will negatively affect productivity. It is compulsory for them to put regulations and policies that will help them monitor employees and their activities during working hours. Some of the main things that companies use are telephone monitoring particularly when personal calls are made, electronic surveillance, drug testing and verification of emails sent externally for private reasons. Reasons why companies make use of policies is for the reason of a decrease in productivity , sensitive material which arise from unpleasant email usage, workplace accidents caused by prohibited drug use, employees bitterness over monitoring of computers and sexual harassment complaints prompted by dating among workmates. 2. 0 Research Objectives R01. To identify if security and privacy actions affect things like productivity in the workplace/organization R02. To state some of the security and privacy actions that some companies are implementing in the workplace R03. To analyze whether organizations nowadays are focusing more on prioritizing their security initiatives thus undermining their employees and their personal lives R04. To evaluate if companies are using the right tools, technologies and methods to maintain good quality security and privacy within their organization 3. 0 Research Questions RQ1. What do organizations hope to achieve by implementing security in their companies? RQ2. What effect does security and privacy actions have on productivity in the organization? RQ3. Do organizations of nowadays focus more on prioritizing their security initiatives hence undermining their employees and their personal lives? RQ4. Do companies use the right methods, technology and tools when they choose security and privacy as a priority? 4. 0 Hypothesis H1. Security and privacy actions increase things like productivity in the workplace. H2. Telephone and email monitoring, monitored computer web use and surveillance cameras are some of the security actions that some organizations are implementing to their workers. H3. Organizations nowadays are more focused on prioritizing their security initiatives thus undermining their employeesââ¬â¢ personal lives. H4. For a company to maintain good quality security and privacy within their organization they have to own the right tools, technologies and methods. Theoretical Framework Workplace performance Security and Privacy in the workplace Priorities of the company such as productivity and protection The independent variable is security and privacy implementation in companies and workplace performance is the dependent variable. Priorities of companies such as productivity and protection are the controlling variables to the results. 5. 0 Achievements gained From Implementing Security and Privacy in the Workplace Organizations hope to achieve a better performance from their employees when they implement security in the workplace. Most companies today in most parts of the world do observe their workers because they have reasonable reasons for doing so. Since employers are accountable for their employees they have to provide them with a safe and a secure workplace. By monitoring or surveilling employees, employers hope to achieve several things such as employee or customer satisfaction, protection of the companyââ¬â¢s confidential information and prevent trade secrets from leaking out, non-offensive material from emails and the internet, high performance from the network and the systems and to boost employee productivity (Vorvoreanu and Botan, 2001). 5. Non-offensive material from emails and the Internet According to Lee and Kleiner (2003), employees are responsible for all their workers during employment hours such that even any of the workers happens to send offensive information/materials and they happen to offend the receiver, the employers are the ones who will be liable to this course of action. If the material that would have been sent is found offensive for certain then the company can be sued which can affect the compani esââ¬â¢ reputation to a greater extent. You read "Security and Privacy in Workplace" in category "Essay examples" To prevent such cases most companies have seen it fit to take the initiative of monitoring each and every email and web use by the employees. 5. 2 Prevention of trade secrets from leaking out According to Paciniet al. (2008), there are several physical actions that employees consider when doing an internal control to safeguard trade secrets of the company. Such actions include a restriction on accessing certain premises (use of key cards), locks for all file cabinets, surveillance equipment to see all movements and passwords for accessing computers. Monitoring employees especially when it comes to trade secrets boosts productivity because employees who have intentions to harm the organization are quickly detected and those who are loyal to the company will work to their maximum potential because they know that they are safe. 5. 3 High Performance from Network and the systems of the Company Companies do not only monitor their employees just to check if they are doing work properly. They also monitor them in order to know if the network and system performance is not being taken advantage of by being used for personal use hence a decrease in productivity. If a computer network is efficient it is of a great advantage because it increases productivity in the workplace. If a computer system is poor it can be a great loss to the firm because productivity can decrease which results in loss of customers and profits. Most employers really consider the network bandwidth traffic; this is related to employees using the network for personal use . These activities include downloads which decreases network and systems performance, also sharing and use of large audio and video files, surfing the internet and personal emails which are of high volume. All these actions by employees can cause the network/system be attacked by viruses which may cause it to be disabled (Trim, 2005). Secondly, if the bandwidth is used for purposes that are not work-related somehow it would be an expense that could have been avoided and to make matters worse the expenses that are incurred do not contribute to the wellness of the firm (Strategic Direction, 2009). For example nowadays most organizations are seeking to adopt the Web 2. 0 technologies for the sake of privacy and security of their companies. This type of technology according to Almeida (2012), it enables the employers to prevent data loss which would have been caused by inappropriate use of social media applications such as YouTube, Skype during working hours will definitely increase productivity in the workplace. According to Doshi (2009), employer does believe in monitoring their employees because it is a fast and easy method of getting the job done. Productivity and profits increase because the employees will work efficiently and at ease hence a lot of work is done in a short period of time. When workers work efficiently the employees themselves is satisfied hence customers are satisfied as well (Chan et al. 2005). According to The Gazette (2008), Internet abuse is a rising problem that is costing Canadian businesses beyond sixteen billion dollars yearly in lost productivity and the amount is predicted to be eighty billion dollars in the United States. 6. 0 Security Actions That Most Organizations Are Implementing 6. 1 Drug Testing Most organizations do drug testing for security reasons. For companies that are doing drug test, they test mainly for alcohol and drugs separately and others test for both. Employees who come to do their job under the influence of drugs/alcohol may be a threat to other work-mates. Secondly, drug testing has increased because of a rise in health cost and an increase in the danger imposed by lawsuits which come from worker disease. Many companies are involved with drug testing their employees because it is one of the best ways for solving medical and economic problems (Jardine-Tweedie and Wright, 1998) . According to Lu and Kleiner (2004), if the drug testing by the employer is legal and correctly does things according to the law of that particular state then the company will have to look forward to higher profits. High profits are obtained because the employee will be more productive, higher level of morale, a low rate of absenteeism, low health care and fewer injuries are encountered during working periods. 6. 2 Electronic Surveillance Computers are changing rapidly nowadays especially in the workplaces such that monitoring employees by electric equipment is more common. Surveillance cameras/ CCTV is another means used by employers to monitor their employees, they are always aware of all the activities that take place in the organization and surrounding areas. According to Chen and Park (2005), monitoring employees regularly would reduce cases of spies in the organization getting away with their actions. Such cases are few because these ââ¬Å"spiesâ⬠are aware that they are being watched thereby lose interest to do any illegal actions that will jeopardize their identity (Lu and Kleiner, 2004). Next, managementââ¬â¢s main objective is to increase productivity and gain more profit hence they believe monitoring employeesââ¬â¢ will improve their productivity levels for the better and an assurance of service of high quality. Chieh and Kleiner (2003) states that employers can use information they get from the cameras to find out things that are going wrong in the workplace or find out reasons why productivity is decreasing. For example, an employer can discipline workers who may have been wasting their working hours on their own interest based from the information obtained from monitoring. From this employees are bound to focus more on their assigned duties rather than waste time during working hours. Surveilling employees also motivates them to work even harder than they have been doing (Lee and Kleiner, 2003). Managers can somehow conduct a performance evaluation of their employees whereby they will be able to give a feedback to the employeesââ¬â¢ and explain which parts needs correction. From monitoring they are able to dictate the type of employees who are hard-working and those who need help. Employers are also able to detect mistakes the employees are making and from this it will be easy to assist them and correct them. 6. 3 Emails, Voicemails/Telephone calls, Files and Web/Internet use monitoring Many companies monitor employeesââ¬â¢ emails, files, voicemails and internet use for various reasons. The number of companies who practice this type of monitoring has increased over the past years (Cox et al, 2005). Employers proclaim that by monitoring employees email, voicemails/telephone calls that way they can be certain that they do not contain any materials that can offend the receiver. Email monitoring is when employers monitor all emails that are going in and out for security purposes to make sure that employees are not disclosing employment or business confidential information. They may monitor as well to check if employees are not harassing other coworkers. Telephone monitoring is a system of managing calls and observing service by the employees. This type of surveillance is used to monitor employees when they make or receive calls and they can gather information on how the employees are performing. Internet use monitoring is when managers take the initiative to observe all the steps of their employeeââ¬â¢s online tracks. Sixty percent of the firms in the United States of America gain from the complex technology and they opt to monitor the workers activities on the Internet (Ciocchetti, 2010). In cases that they are in such situations whereby a worker sends offensive material employees are able to deal with the accused accordingly based on the proof of recorded conversations/videos. For example, Xerox Company fired forty employees who were caught viewing Pornography sites on the internet during working hours (The Register, 2000). Employers have been monitoring all its employees all over the world (ninety-two thousand in total) by taking records of every web site opened. The main reasons why they were fired is because they spent most of their working hours on issues that were not related to their company and also viewing pornographic sites may have been offending material to coworkers. Companies have installed different types of technologies just to monitor their employeesââ¬â¢ activities. Examples include software that filters specific content of information to prevent it from leaving the firm which may lead to the disposal of company secrets. Other types of software used by companies are those that can monitor log-on and off times so that employers can see if workers are wasting time on issues that are not company related. Monitoring of emails, voicemails, files and Web use is believed to be another way that makes it certain that employees will work efficiently and possess productive work habits. Productive work habits boosts efficiency which increases productivity thus perfecting customer service. According to Welebir and Kleiner (2005), the worry for organizations is to keep up with the aspect of having power over production and encouraging utilization of the Internet as a priceless resource. A survey conducted by IntelliQuest Information group revealed that there was an increase in private use of the Internet at work. The results signified that the use of had grown from 6. 9 hours to 9. 8 hours for every week prior to the last year and about fifty seven million workers access Internet from their workplace for private use. Further information provided by the study was that the number of workers seemingly receiving classified information from competitors has increased from 9. 2 percent to 24. percent within a year. Moreover workers are getting emails with attachments, roughly one fifth of the workers have reported receiving insulting email from an inner source and only a third to confess spending more time on the Internet for personal use. States do not have the same policies for monitoring and governing websites viewed by the residents. States like China, Vietnam and Singapore does not only block sites for pornography they also ban access to linguistic and political issue s (Hechanova and Alampay, 2010). 7. Prioritizing Security and Privacy Ignores Employeesââ¬â¢ Personal Lives Opponents of implementing security and privacy in the organization state that organization nowadays are too concerned with their own company interests and its prosperity thus forgetting that their employees do have personal lives. Installing electronic cameras that will be watching their activities all day when they are at work, monitoring emails and phone calls is making companies seem as if they are forgetting that their employees have a life to live (Dubbeld, 2004). This side of the coin feels that staff is at liberty to confidentiality when they are using the Internet. Employees argue that as they are allowed to breaks, lunch hours or other selectedperiods where they are not liable to any duties but still in the building they should have the freedom to do things like checking their e-mail, do their banking or shopping and maybe just browse the Internet on free time. Everyone is entitled to some privacy no matter where they are so they argue that they should be able to do this during their free time without anyone monitoring all their movements. Secondly, employees do not consider it as monitoring productivity when companies even observe staff in the toilet or relaxing areas of the office. Some employees consider it as an intrusion and they have lawful hope that they can maintain their personal lives private. Undermining workers privileges to confidentiality by surveillance and monitoring is not the only problem that employees face. It also generates high levels of stress and nervousness which to higher chances may lead to poor health of workers and a reduction in performance. Examples of physical wellbeing problems which may be caused by monitoring are repetitive Strain Injury and Carpal Tunnel Syndrome from performance monitoring by the company for instance keyboard strikes. To add on, employees believe thatthey are individuals who can make their own decisions hence it is their right to be treated as proficient andindependentpeople. Guaranteeing their individual development and performance that can be valued is what they believe they can achieve if they are treated as independent people thus they consider surveillance as violating their privacy (Ahmed, 2007). Workers argue that as long as individual e-mail does not hinder or conflict with business life, it should be permitted. Employees also argue that phone calls take more time than writing an e-mail and also that they should be given time to do individual matters because it can reduce the rate of absenteeism. Most employees have suggested that as long as there is a realistic limit on this practice of monitoring emails, there is no reason for fear but in situations where someone does something unusual then they will have to be dealt with (Kierkegaard, 2005). Even if employees are informed that they are being monitored and in agreement that they are using company property they still feel that their employersââ¬â¢ are not respecting the fact that besides working for tem they also have personal lives which still go on whether they are working or not. 8. 0 Better results can be achieved by using the right tools, technologies and methods For a company to maintain good quality security and privacy within their organization they have to own the right tools, technologies and methods. A company cannot just instill a rule/wake up one morning with intentions of monitoring all the activities of their employees and expect high productivity. Companies have to follows certain regulations to install such things as software that monitors an employeesââ¬â¢ Internet use and all phone calls, drug testing and electronic surveillance. A cautiously worded policy that informs employees concerning the necessity of surveillance in the company will be the most probable way that it can gain acceptance or support for workplace monitoring from them (Watson, 2002). According to Mei-ShaChieh and Kleiner (2003), as regards to other forms of monitoring, it is vital that all forms of surveillance should not be unreasonably intrusive. The methods that employerââ¬â¢s use when they consider monitoring employees should be practical because if they are not deemed like that then the company can encounter problems such as rebellious employees; which may cause a decrease in performance. Arnesen and Weis (2007) critically supports the idea that Employers must know that it would not be irrationally intrusive to observe what an employee does in public; however it might be intrusive to observe the employeeââ¬â¢s behavior hen they are in private places such as the toilet. For example, it may be practical to take pictures of employees when they are at work to observe productivity. However, it may unreasonable to put transparent panels in the ceiling of an employee lavatory. Moreover, if convincing conditions state the use of cameras in locker rooms or othe r private areas, they are supposed to have signs warning employees they are there. Next, Kierkegaard (2005) states the some of the international regulations and codes that organizations should take note of when they decide to prioritize security and some form of privacy in their workplace. The International Labor Office (ILO) has issued a Code of Practice on the Protection of workerââ¬â¢s personal dataâ⬠and it is anticipated to give assistance on the safeguard of workersââ¬â¢ private data. The most important requirements of the Code include issues like using individual data legally and justly only for reasons that are directly applicable to the employment of the staff and for the reasons which they were gathered for in the first place. Employers should by all means necessary not keep insightful private information of employees and all employees should be well-informed before such events take place in the organization. They should be informed of any kind of monitoring that especially the ones that involve personal data collection. However, the information obtained from monitoring them should not be the only issues when doing a performance appraisal. Companies have a duty to safeguard private documents against any kind of a loss, unapproved access, usage, changes or exposure. Employees must have admission to their entire personal information and all rights to scrutinize and get a copy of all the archives. Revealing an Internet supervising policy is an essential element in an organization. Workers ought to be up to date with the type of activities that would be supervised, the regularity monitoring and how the management will be informed of the activity. If the organization verifies how the employees use their Internet then they must be informed and if the company retains deleted information for reasons like security when they should be informed about it (Welebir and Kleiner, 2005). The staff should not have beliefs that their actions on the Internet are confidential. Even though companies do not want to present the idea that they are monitoring each word they key in and mouse clicks on the Internet, it is compulsory to tell employees that they do not own any personal confidential rights when they are using the company Internet. 9. 0 Research Design and Methodology The impact of implementing security and privacy in the workplace and the effect it has on performance in the firm is an ontological study which takes a subjectivism view because security and privacy is created from the perception that workplace performance might be positively or negatively affected. The research is more of an explanatory studywhich is a deductive approach where Saunders et al. (2006), defines deductive astestinga concept in which the researcher cultivates the concept and assumption and design a research plan to test the assumption. The research strategy that is suitable for this study is survey because according to Saunders et al. (2006), it is usually related to a deductive approach and since we are using companies it is a tactic commonly used in businesses. I believe the research choice suitable for the study is a multi-method qualitative study whereby semi-structured interviews and questionnaires can be used for data collecting. Time horizon that can be used is a longitudinal study where according to Saunders (2006), the researcher embarks on a study at numerous facts in time in order to answer a research question. For reliability and validity sake to how security and privacy affect workplace performance several times of embarking on such a question will provide accurate results. Physical access is the one suitable for my study since I am an external researcher. Access would be granted from the management of all the companies that are to be used for the study and gaining an informal access from all the employees for accurate results. One of strategies that can be used to gain this access is that the project will benefit the company in one way or the other. Research ethics that should be maintained during data collection stage are confidentiality and anonymity. Furthermore, the sampling method technique I used is probability specifically cluster sampling is what I would consider because there are specific types of jobs that make use of surveillance cameras, computers (with internet) and telephones. . 1 Possible Results Based on the literature analysis, H1 can be accepted because by implementing security in the workplace it can work in two ways. Firstly, protects the business from competitors and can be used when evaluating employees. H2 can also be accepted because not only American companies use Surveillance cameras, do telephone and Interne t monitoring, companies in Europe and in countries like China, Vietnam, Philippine, Australia also do the same. H4 is acceptable because for the policy of applying security and privacy to work companies have to follow proper procedures. However H3 will remain debatable in the sense that in every topic that arises there is always going to be a group of people who will rebut the idea. It is acceptable only when the company does not communicate the use and the reasons behind the monitoring. 10. Conclusion Based on the evidence and facts from the literature review which provided various perspectives about security and privacy it can be concluded that monitoring employees can result in something noble or something unscrupulous. For example, emails and surfing the Internet can be a disruption but at the same time the feeling of being watched regularly can also be a disruption. Law of privacy has to balance employee interest against those of the employers and more prominently it must center on the important concepts of human self-esteem. Information technology has assisted firms to enlarge their productivity and efficiency but the misuse of the Internet has steered firms to monitor all communications operated electronically to guard their companies and limit legal responsibilities. Nowadays two major developments to be concerned about in regards to electronic surveillance is the great concern for employee privacy and the increased cases of employers being caught accountable for workersââ¬â¢ misbehaviors of electronic communication. Although the courts are in support of employers they must be alert about the workersââ¬â¢ rights though shielding the firmsââ¬â¢ interests. Words 4 282 References Ahmed, S. ( 2007). Analysis of Workplace Surveillance In a Quest for an Ethical Stance. Journal of Business Systems, Governance and Ethics, Vol 2,No. 4. Almeida, F. 2012). Web 2. 0 Technologies and Social Networking Security Fears in Enterprisesââ¬â¢Ã¢â¬â¢, International Journal of Advanced Computer Science and Applications,Vol. 3, No. 2, Amicus Guide. (2005). Amicus Guide to Privacy at Work. Privacy at Work. [Online]. Retrieved on 19 March 2012 from: http://www. amicustheunion. org/pdf/PrivacyatWork. pdf Arnesen, D. W and Weis, W. L. (2007). Developing an Eff ective Company Policy For Employee Internet And E-Mail Use. Journal of Organizational Culture, Communications and Conflict, Volume 11, No. 2,pp. 53-65. Chen, J. V and Park, Y. 2005) ââ¬Å"The role of control and other factors in the electronic surveillance workplaceâ⬠, Journal of Information, Communication and Ethics in Society, Vol. 3 Iss: 2, pp. 79 ââ¬â 90. Ciocchetti, C. A. (2010). The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring. [Online]. Retrieved on 19 March 2012 from: http://www. futureofprivacy. org/wpcontent/uploads/2010/07/The_Eavesdropping_Employer_%20A_Twenty-First_Century_Framework. pdf Cox, S; Goette, T. and Young, D. (2005). Workplace Surveillance and Employee Privacy: Implementing an Effective Computer Use Policy, Volume 5 Issue 2. Dubbeld, L. 2004) ââ¬Å"Limits on surveillance: Frictions, fragilities and failures in the operation of camera surveillanceâ⬠, Journal of Information, Communication and Ethics in Society , Vol. 2 Iss: 1, pp. 9 ââ¬â 19. Guha, M. (2008). ââ¬Å"The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets without Compromising Employee Privacy or Trustâ⬠, Library Review, Vol. 57 Iss: 9, pp. 746 ââ¬â 747 Hechanova, R. M. and Alampay, E. A. (2010). Monitoring Employee Use of the Internet in Philippine Organizationsââ¬â¢Ã¢â¬â¢, The Electronic Journal on Information Systems in Developing Countries, Volume 40 Issue: 5, pp. -20. Kierkegaard, S. (2005). Privacy in Electronic Communication. Watch your e-mail: your boss is snooping. Computer Law Security Report,â⬠Vol. 21 Iss: 3, pp. 226-236. Lee, S. and Kleiner, B. H. (2003). ââ¬Å"Electronic surveillance in the workplaceâ⬠, Management Research News, Vol. 26 Iss: 2/3/4, pp. 72 ââ¬â 81. Mei-ShaChieh, C. and Kleiner, B. H. (2003),â⬠How organisations manage the issue of employee privacytodayâ⬠, Management Research News, Vol. 26 Iss: 2 pp. 82 ââ¬â 88. Petrovic-Lazarevic, S. and Sohal, A. S. (2004). ââ¬Å"Nature of e-business ethical dilemmasâ⬠, Information Management Computer Security, Vol. 2 Iss: 2, pp. 167 ââ¬â 177. Rustad, M. L. and Paulsson, S. R. (2005). Monitoring Employee e-mail and Internet Usage: Avoiding the Omniscient. Electronic Sweatshop: Insights from Europe. U. Pa. Journal of LaborAnd Employment Law, Vol. 7:4. Saunders, M. , Lewis, P, and Thornhill A. (2006) Research Methods for Business students. 4th edition . UK: Prentice Hall. Strategic Direction. (2009) ââ¬Å"Social networking and the workplace: Making the most of web 2. 0 technologiesâ⬠,Vol. 25 Iss: 8, pp. 20 ââ¬â 23. The Gazette (2008). ââ¬ËStealingââ¬â¢ time at work on Net. One of the new trends to watch in labor law is how companies and labor tribunals handle cyberslacking- a term coined to describe people who spend an excess of time on the Internet at work. [Online]. Retrieved on 31 March 2012 from: http://www. canada. com/montrealgazette/news/business/story. html? id=32125d78-a479-497a-ae19-4f461ea18060 The Register. (2000). Xerox fires 40 in porn site clampdown. Document Company staffs get caught shuffling more than just paper. Trim, P. R. J. (2005). ââ¬Å"Managing computer security issues: preventing and limiting future threats and disastersâ⬠, Disaster Prevention and Management, Vol. 4 Iss: 4, pp. 493 ââ¬â 505 Vorvoreanu,M. and Botan, C. H. (2001). Examining Electronic Surveillance In the Workplace: A Review of Theoretical Perspectives and Research Findings. [Online]. Retrieved on 16 March 2012 from: http://www. cerias. purdue. edu/assets/pdf/bibtex_archive/2001-32. pdf Warren, A. (2002) ââ¬Å"Right to privacy? The protection of persona l data in UK public organisationsâ⬠, New Library World, Vol. 103 Iss: 11/12, pp. 446 ââ¬â 456. Warren, M. J. (2002). ââ¬Å"Security practice: survey evidence from three countriesâ⬠, Logistics Information Management, Vol. 15 Iss: 5/6, pp. 347 ââ¬â 35. Watson, G. (2002). E-mail surveillance in the UK workplace-a management consulting case studyâ⬠, Aslib Proceedings, Vol. 54 Iss: 1 pp. 23 ââ¬â 40. Welebir, B. and Kleiner,B. H. (2005),â⬠How to write a proper Internet usage policyâ⬠, Journal of Management ResearchNews, Vol. 28 Iss: 2 pp. 80 ââ¬â 87. Whalen, T. and Gates, C. (2010),â⬠Watching the watchers: ââ¬Å"voluntary monitoringâ⬠of infosec employeesâ⬠, Journal of Information Management Computer Security, Vol. 18 Iss: 1 pp. 14 ââ¬â 25. Moghe, V. (2003) ââ¬Å"Privacy management ââ¬â a new era in the Australian business environmentâ⬠, Journal of Information Management Computer Security, Vol. 1 Iss: 2, pp. 60 â⠬â 66 Ying-Tzu Lu, Brian H. Kleiner, (2004),â⬠Drug testing in the workplaceâ⬠, Journal of Management Research News, Vol. 27 Iss: 4 pp. 46 ââ¬â 53 Jardine-Tweedie, L. and Phillip C. Wright, (1998) ââ¬Å"Workplace drug testing: avoiding the testing addictionâ⬠, Journal of Managerial Psychology, Vol. 13 Iss: 8, pp. 534 ââ¬â 543 Chan, M; Woon, I. and Kanakanhalli, A. (2005). ââ¬Å"Perceptions of Information Security in the workplace : Linking Information Security climate to Compliant Behaviorâ⬠, Journal of Information Privacy and Security, Volume 1 Issue: 3, pp. 8-41 Chieh, C. M. and Kleiner, B. H. (2003), ââ¬Å"How organisations manage the issue of employee privacy todayâ⬠, Journal of Management Research News, Vol. 26 Iss: 2 pp. 82 ââ¬â 88 Bibliography Gritzalis, S. (2004). ââ¬Å"Enhancing Web privacy and anonymity in the digital eraâ⬠, Journal of Information Management Computer Security, Vol. 12 Iss: 3, pp. 255 ââ¬â 287. Griffiths, M. (2010),â⬠Internet abuse and internet addiction in the workplaceâ⬠, Journal of Workplace Learning, Vol. 22 Iss: 7 pp. 463 ââ¬â 472 Morgan, C. (1999). Employer Monitoring Of the Employee Electronic Mail And Internet Use. McGill Law Journal, Vol. 44 pp. 850-902. Jardine-Tweedie, L. and Phillip C. Wright, (1998) ââ¬Å"Workplace drug testing: avoiding the testing addictionâ⬠, Journal of Managerial Psychology, Vol. 13 Iss: 8, pp. 534 ââ¬â 543 Appendices Appendix 1: Evaluation of Sources In order to do my literature review I made use of secondary data which consisted of journals, books and web publications (which included newspapers). From these sources I could get dependable information because they are reliable sources. I did not manage to get a lot of recent journals for the current year and for the previous year but I did manage to get publications which were within the ten years. These sources really helped me understand more facts about my research topic. Most of the journals that I found were useful to explain my topic and write more facts because they had information that I wanted to use. Most of the journals that I found discussed reasons why organizations were implementing security and privacy in their organizations and the proper procedures that were supposed to be taken for such policies. However it was not easy to get journals that rebuttal those ideas and supported that somehow it affected employees. Secondly, I was able to find journals that explained security and privacy from companies in different countries. The issue of security and privacy in the workplace was more crucial beginning 1996 which shows that itââ¬â¢s an issue that that was brought about technology advancements. I found most of my journals on emerald insight and to top it up I found more from scholar web publications. I took my time to paraphrase all the necessary information from the journals that I found to support all my assumptions. I used twenty- three journals to support my ideas, except for one journal all of them the author name was given, dates, journal article headings and all the information needed to do the referencing. The impact of implementing security and privacy and its effect on workplace performance Appendix 2: Mind Map Week 1 Received topics to research on Week 2 Search for relevant journals mainly from Emerald Insight. com Week 2 Research Objectives Research Questions Hypothesis Week 2 Chose the research topic Week 3 Theoretical Framework Introduction Search for more Journals Week 4 Non-offensive material from emails and the Internet High performance from company networks systems Week 4 Protection of company confidential information Prevention of trade secrets from leaking out Week 4 Positive effects of security and privacy mainly on productivity, employee customer satisfaction Week 5 Security Privacy actions that companies are using Week 6 Facts raised by opponents of Security and privacy e. g. electronic surveillance Week 7 Owning the right tools, technologies and methods Week 9 Research Design and Methodology Possible Results How to cite Security and Privacy in Workplace, Essay examples
Saturday, December 7, 2019
Woolworth Company analysis-Free-Samples-Myassignmenthelp.com
Question: Discuss about the Key Strategic decisions taken by Woolworth Plc for enhancing and growing Business in Domestic and International Market. Answer: Introduction This report reflects the key strategic decisions taken by Woolworth Plc for enhancing and growing business in domestic and international market. In addition to this, investment in installation of major application information system has been discussed. Big decisions Woolworth in context with IT/IS strategy It is observed that Brad Banducci has come up with business plan to introduce a restructured operating model which will be adopted with a view to increase the efficiency and productivity of organization. It is evaluated that if he will introduce a restructured operating model then it will result to split the online business and more than 1000 workers will be indulged in operating functioning of organization. However, if organization introduces a restructured operating model then it will also increase the client satisfaction establish automation in Woolworths value chain activities and strengthen the online business of company (Fernie, and Sparks, 2014). Major challenges Woolworths has been facing The main challenge of Woolworth is related to redundancies of employee and organizations which result to approximately cost of $35 million. In addition to this, with the increasing ramification of economic changes and clients inclination towards innovative and creative technologies, company may face destruction in its existing business functioning. Moreover, company might need to make restructuring of business which may cost around $766 million after tax in the group's FY2016 results. Additional problem of Woolworth is related to uncertainty of business and an associated factor which may put negative impact on introduces a restructured operating model (Fernie, and Sparks, 2014). Factors that led Woolworth to take such decisions With the ramified economic changes and stakeholders increasing need from the business functioning of organization, Brad Banducci evaluated that company has been struggling with the supplier relationship due to the issues of replenishment of performance and non-effective inventory system. In addition to this, company is also facing problem in implementation of new software and claimed to have problem in improvement in performance (Norton, 2015) Use of Five porter forces model analysis Buyers power- It is evaluated that Woolworth has been selling its goods and services in market and created international brand image around the globe. However, This may result to buyers inclination towards other organizations such as Wesfarmers, Tesco and Morrison plc (Nkirote, 2014). Suppliers strength- Company has planned to install restructured operating model in its value chain activities which may integrate the business with the suppliers while determining the strategic alliance with them. Therefore, after introducing restructured operating model suppliers and vendors would be more inclined toward the business setting with this company. Rivalry with other organizations- There are several other organizations such as Wesfarmers, Tesco and Morrison plc who will be less inclined towards adopting this operating model due to its high level of cost. Threat of new entrants- Woolworth has faced restricting cost around $766 million after tax in the group's FY2016 results while introducing new operating model in its value chain activities. Therefore, it is very hard for other companies to bear the same level of cost for installing new operating model in their value chain activities. Substitution of product- There will be no substitute product and process which other companies could adopt to make the business rivalry with Woolworth. Balance of power Company has been struggling with the supplier relationship due to the issues of replenishment of performance and non-effective inventory system which may result to less effective products and services to clients. However, at the same time, buyers are more inclined towards buying products offered by Woolworth. It has resulted to high level of balance of power between purchase and supply of goods and services of Woolworth. Impact on IT strategy This will allow Woolworth to introduce new strategy in innovative way and systematic manner and by using new operating system IT process; employees could make effective use of financial and non-financial resources in effective manner Pros and cons of strategic decision Short term Pros- Woolworth could trim its balance sheet by showing this amount as assets and. Employees could also learn new process and adopted model through training process. Cons- It will increase the overall cost of production and employees may showcase redundancies towards adoption of operating system. Long term Pros- It would result to increased level of brand image and result to easy handling of value chain activities of organization. Cons- It may result to destruction of set objectives and goals due to ramified economic growth and creative and innovative business functioning of rivals in market. Role of IT in Woolworth The main role of IT in Woolworth is related to establish proper level of communication method. It would also reduce the complexity of business and lower down the overall cost of organization. Decisions of new management to write down the millions of investment in IT investment It is highly appreciable that Brad Banducci has written down investment to adopt new IT operating model. It will reduce the complexity of business and lower down the overall cost of organization. There are several organizations such as GE capital, Wesfarmers and Coals who have done the same to increase the overall productions and efficiency of company (Barrons, 2017). What I would do if I had been CIO of company I would have done the same which Brad Banducci has done in Woolworth with some changes like reducing the cost of capital for installing the operating model. GE capital from multi diversified business has adopted cyber computing operating system to reduce the complexity of its business (Barrons, 2017). However, in order to convince the top management regarding with the same, I would have prepared proper level of power point presentation with all the pros and cons. It will help them to gauge all the negative and positive points while installing new operating model. In case, my idea would be rejected then, I will show them the practice example which other companies are using to create core competency in their filed. Major information system Woolworth needs to adopt customized cyber computing system as its major information system. This customized cyber computing system will help company to store, supply and establish automation in data process system. It will also result to effective level of data mining process (Wang and Tan, 2015). Impact of slashed down project The major impact of slashed down project of IT in Woolworth would be that in short term it will increase the overall cost of process functioning. In addition to this, company needs to write off this amount from capital account to reduce the loss of its business. Woolworth has strong financial condition and with the help of its reserve and collected profit, company could bear the cost of newly IT operating system (Dos Santos Svensson, and Padin, 2013.). Enlist of stakeholder with new IT system With the help of new operating system IT process, employees could communicate with other employees and management department. Team could also use IT operating system accompanied by cyber computing system to make effective strategic business decision. In addition to this, top management and other shareholders could use IT operating system accompanied by cyber computing system to assess the business functioning of company (Fernie, and Sparks, 2014). Functional requirement for use IT operating system accompanied by cyber computing system Hiring of employees who will be accustomed to act as per the directions of IT line manager. Setting of standard value chain activities. Adaption of existing value chain activities as per the newly introduce IT operating system accompanied by cyber computing system. Conclusion In this report, decisions taken by top management and factors affecting strategic decisions have been taken into consideration. If Woolworth installs this new IT operating system then it will surely increase the overall efficiency and productivity of business in long run. References Barrons, K.P. and McGinnis, T.C., 2017. Building Capability.Effective Talent Management Strategies for Organizational Success, p.160. Barrons, K.P., Expanding Training Possibilities: Flipping the Zone of Proximal Development For Talent Management. InCONFERENCE PROCEEDINGS BY TRACK(p. 296). Dos Santos, M.A., Svensson, G. and Padin, C., 2013. Indicators of sustainable business practices: Woolworths in South Africa.Supply Chain Management: An International Journal,18(1), pp.104-108. Fernie, J. and Sparks, L., 2014.Logistics and retail management: emerging issues and new challenges in the retail supply chain. Kogan page publishers. Nkirote, M., 2014. Marketing Strategies Adopted to Gain a Competitive Advantage by Supermarkets in Kakamega Town, Kenya.International Journal of Business and Social Research,3(4), pp.78-85. Norton, A.L., 2015. Enterprise resource planning II-A review of critical success factors.International Journal of Computer Science and Information Security,13(11), p.5. Wang, W. and Tan, F.T.C., 2015. A Benefit Expectation Management Framework for Supply Chain Management Systems. InEnterprise Systems. Strategic, Organizational, and Technological Dimensions(pp. 247-270). Springer, Cham
Subscribe to:
Posts (Atom)