Thursday, October 31, 2019

Complaint and Compliment Letters Assignment Example | Topics and Well Written Essays - 1000 words

Complaint and Compliment Letters - Assignment Example After 30 minutes we began boarding, this extended our arrival time in Montreal to conservatory 1415Hrs. We arrived in Montreal with barely enough time for us to make a connecting flight. I remember the agent commenting on how he thought we wouldnt make it on time. My luggage (a suitcase), which was supposed to be checked all the way through until I arrived in New Brunswick, baggage tag no. (TKY00275612) Apparently didn’t make the flight. It was probably offloaded in Montreal. The ground workers in Montreal lost the luggage counter. When I made an inquiry, a (Mr Johnson) informed me that they would update me within 24hrs on any development about my luggage. It is very disappointing, especially with the level of customer touch the airline has maintained in the past. I expected to have the same treatment as the cabin crew provides when you ask for a refill or water. In this case it felt cold and unwanted. No warmth and feeling of acceptance that used to greet clients when one boards the flight or when the captain says, â€Å"Thank you for flying Air Canada.† It has been three days since our conversation. Though we have made contact a few times since my arrival, all I get is scanty assurances that they are looking into the matter. It has dawned on me that they have no clue as the whereabouts of my luggage; hence I chose to write to you as my connecting handlers. I fail to understand on how in the modern age, with top notch security and technology, my luggage has not been recovered. I have launched a claim with my insurance, but the entire value of the belongings and items in the luggage were double what the insurance is willing to compensate. Moreover, the luggage contained some items that are completely irreplaceable. I have made follow-up steps, including getting in touch with Toronto airport and New Brunswick customer desk to no avail. The situation has caused me to feel like your policy is just

Tuesday, October 29, 2019

Influx of Migrant Workers Is Not a Good Move Essay Example for Free

Influx of Migrant Workers Is Not a Good Move Essay In today’s competitive world of development, Malaysia perceives a huge aim of becoming an industrialized country in this region. In order to accomplish the mission, the workforce definitely is being empowered and one of the methodologies used is importing migrant workers. This is a good step indeed for Malaysia’s development; however in the present the issue of migrant workers flooding our country is uttered to be tormenting. Despite the fact that the influxes of foreign labors are such assisting shoulders to our country’s competitiveness in industrialization, I believe that their invasion to Malaysia is not a good move. Those who opposed to the decision agreed that the increment of crime cases and social problems in our country are the doings of our Malaysians itself. This is because there are over 20 million numbers of Malaysians in this country, compared to only 1.9 million of registered migrant workers here. However, this fact is conventional. There are many crime cases are proven done by foreign labors such as robbery and murder that donated to the increasing of the already huge numbers of crimes done caused by Malaysians. For instance in the famous local television program 999 on 7th of April 2011, they had revealed that Kota Bharu Police Contingent had made a raid in a budget hotel near Kota Bharu and they managed to catch a couple of foreign workers having illegal sexual intervention as well as possessing drugs. People should understand the word of ‘increment’. When a little number of crimes is done frequently, it will surely contribute to the increment of crime cases to our country and its possibility to be severer is high. Next, the opponents also claimed that our Malaysians are too picky compared to migrant workers in terms of hunting jobs. This is because they believe that many employers offer low payment to Malaysians as much as to the foreign labors. However, in this situation we cannot put the blame on our people only. According to Evelyn Devadason of East Asian Bureau of Economic Research, there are a total of 1.9 million registered foreign workers, constituting approximately 21 per cent of the workforce (2011). The total, added with another millions of unregistered foreign labors is enough to make the job opportunities amongst Malaysians flounder to be restricted. In a project paper entitled Migrant Labor in Malaysia: Impact and Implications of the Asian Financial Crisis written by Syarisa Yanti Abubakar, she mentioned that NEAC (National Economic Action Council) reported at 1998 that the crisis or poverty amongst Malaysians was caused by limitations imposed on labor absorption and income-earning opportunities (2002). One of the factors of the limitation was because of influx of foreign labors. Employers tend to hunt migrant workers because they do not demand expensive payment. However, by without anyone realizing the opportunity of our Malaysians to get a job becomes narrower. In addition, not all of Malaysians are picky when it comes to finding a job. It is just that the chance for them to work is closed due to influx of migrant workers. Apart from that, the opponent of the notion of invasion of migrant workers is a good move agreed that issues regarding the problems caused by migrant workers can be settled in a very civilized manner. Small issue can be brought over into a disputation by without causing conflicts among countries. Nevertheless, the influx of migrant workers into our country can still bring negative impacts between Malaysia and its collaborating countries. Many parties are inclined to take any issues, be it small or big, diminutively by without grasping that relationship between Malaysia and partnering countries such as Indonesia, Myanmar and Philippines can be affected. For example, the case of abuse of an Indonesian maid, Nirmala Bonat few years ago had contravened a conflict between two countries. Not only that, few cases happened over migrant workers in Malaysia had also caused inconvenience among Malaysians who stayed overseas due to threats. A bond-breaking can lead to economic downturn to both countries involved. In conclusion, this essay has shown that the influx of migrant workers is not a good move at all. Government and private parties should reconsider about taking more migrant workers into our country so that any more serious issues will not occur as the saying goes, prevention is better than cure. It is reasonable to have migrant workers as assisting shoulders to our country’s development but there should be limitation in terms of numbers of them. Regarding the already flooding issue of problems caused by influx of migrant workers, equal treatment for them must not only be provided but also enforced so that all parties will get the win-win situation.

Saturday, October 26, 2019

A Case Study On Computer Viruses Information Technology Essay

A Case Study On Computer Viruses Information Technology Essay In this project we have been asked to consider and discuss the different aspects of the above statement. We have asked to create a case study of an organization to help with our case and we have chosen for our case study to look at North Lanarkshire Council. The case study will be a report based on 2 interviews and a short look at the council and its history and what services it offers. There will also be a critical review arguing as to the rights and wrongs of the statement and finally a conclusion in which we will be a brief summary of what we have discovered during the report. Before we can begin to discuss the statement, we should take a quick look at exactly what a computer virus and phishing are and also take a quick look at their history. The computer virus was so named as it has similar properties as a human virus in the way they can pass form computer to computer and in that they need a host to survive. The first viruses were created during the 1980s, although there programs that worked on the same principle created maybe as early as the late 1960s. The first program of this type to appear on a computer other than the one it was written for was called Elk Cloner and was written by Rich Skrenta in 1982 and surprisingly was written to attack the Apple operating system as today viruses are very rarely written with Apple in mind. The most common virus of that period was written to infect PCs and was called the Brain and was written by two brothers Basit and Amjad Farooq Alvi in 1986. Both these virus were spread by floppy disks and since then the virus concept has grown and become more sophisticated. (antiviruswear.com, 2010) There are 3 main types of common virus today Worms Trojan Horse Email Virus A worm uses security flaws and computer networks to replicate itself. They can be very complex programs and once on an infected machine, will search for other flows to exploit. A Trojan Horse, named after the famous wooden horse in Homers Iliad. The virus disguises as itself as another file, e.g. a sound file with a .wav extension and once on the host computer does not reproduce but will make the host computer susceptible to attack by third parties by opening ports and can be a major threat to the users personal data. Am email virus once opened on an infected machine will send copies of itself to everyone on the email clients contacts list. They payload can also include Worms and Trojan Horses. (spamlaws.com, 2009)The term Phishing appears to have been first coined in 1996 and was applied to hackers who were stealing AOL passwords. It is now a broader term applied to a form of social engineering where the angler (phisher) throws a hook by maybe sending an spam email pretending to be from the recipients bank stating there has been a breach of security and asking for the customer to enter their password and user name on a website that is linked to on the email. This website may look like the persons online banking website but is a fake set up to steal the user names and passwords and allow the phishers to then gain access to the persons bank account details and transfer monies to other accounts. (allspammedup) Review For-end user protection Software-every user should have security software installed on their computer the software will help protect your computer from viruses, worms and other harmful programs. You should scan your computer on a regular basis and also update your operating system. anti virus anti spyware anti malware firewall botnet Antivirus you must update regularly to benefit for the latest threats. A computer virus is a computer program with the intent of copying itself and contaminating a computer. Viruses can boost their chances of spreading to other computers by infecting files on a group of networks or a file structure that is accessed by another computer. You need antivirus software to prevent, detect and remove viruses from your computer. There are quite a lot of different types of viruses like worms and Trojan horse.Millions of computer users suffered billion of dollars in losses from real attack experienced over the internet. Most of the damages were caused by fast moving computer viruses and worms that travelled by email (Simson, 2002) Antispyware- Spyware is a sort of malware that can be setup on computers and gather small pieces of information over time and the users has no awareness that it is there. The existence of spyware is usually concealed from the consumer, and it can be hard to notice. Normally, spyware is secretly installed on the consumers own computer. Now and then spywares is like a key logger and is installed by the vendor of a joint, company, or public computer with the intention to secretly watch other users. Anti malware- A computer worm is a self reproducing malware computer program. It makes a computer network send duplicates of itself to computers that are on the same network and it will do it with no user intervention. This is due to weak security on the computer. Firewall-A firewall is to prevent unauthorized access to or from a network. Firewalls can also be implemented in both hardware and software they prevent unauthorized internet users from accessing a private network. All messages leaving the intranet pass through the firewall. Botnet- Once a solitary machine inside a network has become part of the botnet it will put other computers on the same network at risk. The infected computer is able to read emails and email addresses and copying files and also able to record keystrokes and send spam as well as capturing screen shots. Phishing- You could be sent an e-mail wrongly claiming to be a recognized genuine company in an attempt to scam the user into giving away their private information that will then be used for identity theft. The email will guide the user to visit a web site where they are asked to input their personal information, like your credit card details, passwords and bank account numbers. The website is a phony website and is only set up to steal the users information. Access- Its up to the end user if they want people accessing data so their privacy is in their hands, it is up to the user who they allow access to their computer. They should only allow people they trust to protect their computer with any personal information that is received or collected. Your personal information is under your control your privacy is your property so be aware of what information you store on your computer. Naivety is not an excuse, attackers will take advantage of a computers vulnerability. Legitimate companies will not ask for personal information in an email. Hardware like your router use password protection to constantly secure your wireless connection and will only allow named computers that you know access to the network. Awareness-Every user should be aware of the threats that is out there and what they can do. They should be aware of the different types of viruses and spyware and of what phishing is and what the stakes are. There is your privacy, time, money and your computer. Credit card fraud is on the increase and identity theft also. Your children are exposed to pornographic material and can be targeted by pedophiles. You also need to be aware of shopping when using your credit card most magstripe cards conform to ISO standard that the card contains three tracks of data referred to as track 1,2,3 the majority of magstripe cards contains no security measures to protect the data stored on the card (Stuart, 2009) Education-Most people are not aware of installing software to stop viruses, they have never been taught that your computer needs to be maintained and that there are viruses and worms they dont know of and the damage they can cause. You would not leave your home without locking your door so why leave a personal computer without protecting it. New users and children should be educated before being allowed access to a computer. Naivety is a weapon used by malware and phishers and children and teens are targeted, parents should take steps as well, there is a parental control that will help block websites and file downloads. Computer virus traps over 2,000 tourists on Russia-chinese border Over 2,000 Russian tourists were stranded in the Chinese town of Heihe on the Russian-Chinese border after a computer virus paralyzed the borders electronic pass entry system (Alexey, 2010) Internet service providers are facing an ever increasing amount of pressure to make sure their networks are virus and phishing free-not only would this be advantageous to their customers, but also very beneficial for the internet in general. Against-end user protection With the escalation of zombie-fed threats like phishing, securing the consumers PCs should no longer be down to the user themselves, the internet service providers should in this day and age be protecting the Internet traffic they are providing. ISPs should be taking more responsibility to monitor what is passing through their networks more closely. A zombie computer is a PC that has been secretly hacked, this then allows an outside person to control the computer with the intentions to infect, copy, corrupt and for erasing the hard drive. The hacker can then install tools that will store everything that is typed into the PC, this includes passwords, usernames and credit card and bank account details. Once this information is in the hands of the hackers it can be used for identity theft, committing fraud or sold on to the highest bidder. Related topics There has been a huge rise in cases that involve malicious code, also referred to as bot code that infects computers turning them into zombies, from April to June this year the number of reported cases have quadrupled to 13000. ISPs have been doing somethings to combat the threats of bot code by providing customers with online help on how to keep their PCs secure and some apply spam and virus filters for email as bot code is quite often spread through instant message worms, email and also through Trojans hidden in spam. The ISPs should however be offering a greater protection against these infestations than by just trying to control the threats from e-mail. Getting filtering to work effectively and properly takes a vast amount of time, patience, resources and money. Because the people writing the malware get better and better on a constant basis, it is a never ending struggle to keep up to pace with them so that filtering works. Some Internet service providers are using a technique called port 25 blocking to halt zombie computers that are connecting through their network sending out junk emails, this allows only emails that comes from its own server to be sent out, and this then helps eliminates spam that originates from another server. But those steps dont appear to be enough to tackle the threat of zombies, according to some experts. To take down zombies, ISPs should monitor their networks closer for traffic generated by the compromised PCs, said Dmitri Alperovitch, research engineer at CipherTrust, a security vendor in Alpharetta, USA.ISPs allow these machines to communicate with the rest of the world. They have the power to do a lot about the zombie threat, and they should be doing a lot about it Alperovitch said.A start for Internet companies would be for them to participate more actively in security groups and to use data on zombies collected by third-party security companies such as CipherTrust, he said. ISPs should monitor their networks more closely for anything suspicious, the ISPs should also be improving customer education and possibly even providing their customers with Anti-virus, Anti-spyware and firewalls for their own machines. If the ISPs were to provide customers with all the necessary software to protect themselves then there should no longer be any problems, as long as the customer uses the protection. Maybe the ISPs should enter in their contracts with customers that they will provide the software and if the customer chooses not to use it or take other preventative measures their internet connection will be cut off. If the ISPs were to do their part in helping to protect their customers then naivety in people using the internet should not be an excuse in this day and age, there has been enough cyber crime and virus and it has also been about long enough now that it is no longer excusable for people not to be protecting themselves while surfing the net. There are danger s in most things we do in life and we are expected to take preventative measures, if we go out for a walk we put shoes on to protect our feet, if we go out for a drive we put our seatbelt on and if we surf the net we should also protect ourselves in advance. We are not allowed to drive a car on the road if it is not roadworthy so maybe we should not be allowed to surf the net if our computer is not properly equipped. Although customers can be encouraged to keep their PCs clean with the threat of disconnection, the pressure should be on the ISPS to take more responsibility to tackle any threats coming through their network. With the amount of threats on the increase, ISPs should be taking a more hands on approach, as the hands-off method has been proven not to work. (1) Dmitri Alperovitch, research engineer at CipherTrust, a security vendor in Alpharetta (news.cnet.com, 2010) Case Study North Lanarkshire Council For our case study we chose North Lanarkshire Council, there were two reasons for this, the first being that they are a large organization with a huge computer infrastructure that would allow us to speak to a qualified IT specialist and also an end user to get both views across and the second reason being one of our team had previously worked there and was confident he would get the interviews arranged with the minimum of fuss. North Lanarkshire Council is the fourth largest local Authority in Scotland employing over 18,000 staff and serving a population of 321,000 people mainly in the following towns Airdrie, Bellshill, Coatbridge, Cumbernauld, Kilsyth, Motherwell, Shotts, Wishaw and their surrounding districts. The council is split into 5 key service areas: Finance and Customer Services incorporating all finance and IT services (including housing benefits and rebates) as well as public access via first stop shops, customer contact centre and website. Corporate Services which includes central support unit, human resources, legal services, design and property services. Environmental Services including planning and development, roads and transportation and protective services amongst others. Housing and Social Work services Learning leisure Services which includes education and community education services. The nature of this case study will dictate we concentrate on Finance and Customer Services, and in particular the government and development division which includes the IT function within the council and we will get a flavour as to how it protects its end users from Virus and Phishing attacks. The finance department has many functions and these include council tax, purchasing and debtors, housing benefits and rebates and as you can see there is much personal and financial data to be protected within even this small selection of councils services. If we add in the data that the social work also has to protect then we can see the security has to be comprehensive. We will now take a look at the interviews. Interviews overview We had chosen to contact North Lanarkshire Council to see if it was possible to interview 2 of their employees for the project. We decided to contact Alex Mitchell, Assistant Service Delivery Manager, as one of our team had already worked quite closely with him in the past when he worked for the North Lanarkshire Council IT Department. Alex agreed in principle and asked we email him 2 sets of questions one aimed at the end user and the other aimed at someone who would be more aware of the security measures in place from the IT section. He duly replied and said that the head of IT Security, Kenny Yates would be happy to meet for an interview and also gave us the name of an end user, namely a Lesley Bone who was happy to answer the end user questions. Due to adverse weather conditions it became very difficult to arrange the interviews and in the end Lesley emailed her answers to us and we carried out a telephone interview with Kenny. Happily, they were both fairly frank and gave a good indication of how the council deals with computer security and how it protects the end user. As was said earlier there were 2 sets of questions as some questions were asked to both people and others didnt make sense to ask the individual concerned so were more tailored as to an end user or the more technical question. The results were as follows. Lesley showed that as an end user she had an awareness of threats and had security in place in the house but was very vague as to what to do if she was affected by one and it seemed to be apparent that when given these questions she realized that maybe security is something she should look into and give more thought to in general. Kenny on the other hand gave us a great insight as to how difficult a job it is to protect an organisation such as NLC. He showed that it was not just down to the councils duty of care to its employees to protect them and the data they hold but there are many legal requirements some of which also get audited that have to be followed and can result in fines and removal from government secure networks if that audit is failed. He also said that awareness training is now taking place and this seemed to tie in as Lesley had said she had received no specific training as such but there had been a responsible use policy available for a long time. The main issues for the council as Kenny sees as the growth of remote and home working and as users have more scope to use unauthorized equipment on council networks and he also said naivety is the main cause of infection in council equipment. Finally when asked what was the main threats he said that spam and email type worm viruses are the main concern and social engineering techniques are getting more sophisticated but the main threat was could be lack of investment due to recent cutbacks and this could leave the council open to attack. The full interviews can be read. See appendices. Conclusion We were asked to comment and discuss the following statement It is up to end-users to protect themselves sufficiently from threats such as viruses and phishing they are responsible, naivety is not an excuse. And here is the conclusion our team has come up with. Firstly the user has a degree of responsibility, a home user especially must at least have the awareness that these threats exist, what they are, what they do and must know and carry out the minimum steps to protect themselves by at least installing a full security suite on all pcs and also making sure that anyone with internet access has the same awareness. Also they should be wary as to who has access and should protect their computers and wireless devices with a secure password. There is also a lot going on in the background that the end user is not aware of and this is also helping to protect them from threats, from working groups, the law and government acts and even their banks and retailers to their Internet service Provider and the security software writers. They are all working hard to minimize the effects of virus and phishing. In an organisation it is much different and the end user has very little to do to protect themselves as we saw in the interviews. That job is taken on by the IT department and it is a very difficult job to protect an organisation. Due to legal obligations there has to be very tight security, especially in organisations like the one we looked at North Lanarkshire Council and surprisingly it turned out that the main source of protection turned out to be the amount of investment made in it and keeping up to date as everything moves so fast in the IT world and if the organisations dont keep up they will get caught out. Finally is naivety an excuse, the answer has to be a resounding no, it appears to be one of the main causes of infection and more so it is also the main tool of the people who write the virus or use their social engineering tools in the phishing attacks. Bibliography Alexey, K. (2010, 04 19). WorldComputer virus traps over 2,000 tourists on Russian-Chinese border. Retrieved from rianovosti: http://en.rian.ru/world/20100419/158646482.html allspammedup. (n.d.). allspammedup. Retrieved from allspammedup: http://www.allspammedup.com/2009/02/history-of-phishing/ antiviruswear.com. (2010). antivirus. Retrieved from antivirus: http://www.antivirusware.com/articles/history-computer-viruses.html news.cnet.com. (2010). news.cnet.com. Retrieved from news.cnet.com: http://news.cnet.com/ISPs-versus-the-zombies/2100-7349_3-5793719.html#ixzz16FkK89Lv Simson, G. (2002). web security,privacy and commerce. cambridge: o,reilly. spamlaws.com. (2009). spamlaws. Retrieved from spamlaws: http://www.spamlaws.com/virus-comtypes.html Stuart, M. (2009). hacking exposed 6. new york: mcgraw.

Friday, October 25, 2019

Nurses in Works Progress Administration Memories :: Nursing Careers Professions Medical Essays

Nurses in Works Progress Administration Memories Evidence from American Life Histories: The Federal Writers' Project, 1936-1940 American nursing transformed in the late nineteenth and early twentieth century from a family and community duty performed largely by untrained women in family homes, to paid labor performed by both trained and untrained women and men in a variety of settings. Distinctions between types of nurses increased in this transition. Life histories of nurses taken by Works Progress Administration (W.P.A.) writers in the late 1930s provide valuable insight into the experience of some of these nurses. Enthusiast historians within the leadership of professional organizations have commonly focused on the accomplishments of notable nurses and professional organizations in what became a narrative of professional and societal progress. This narrative, whole providing much rich historical data and analysis, ignores the vast majority of nurses’ experience and voices. In the mid nineteen eighties, as nursing was increasingly embattled in a growing health care industry, historians, some from outside the nursing profession, began to examine this history. Barbara Melosh examined written and oral accounts of nurses in American from 1920 and through the Second World War in The Physician’s Hand: Work Culture and Conflict in American Nursing. She found that while the reform aim for nurse leaders in this period was professionalization, other nurses resisted or were distant from this process. For these nurses, the shared experience of the changing of the demands and rewards of nursing shaped their work and thinking. [1] Melosh attempts to place nursing within the context of women’s, labor and medical history. She proposes that the growing divisions within nursing itself arose from nurses’ position in the medical hierarchy, and the fight for both legitimate authority and control over the work process itself. She also posits that nurses developed an â€Å"occupational culture† that placed manual skill and direct patient contact over theoretical training at the same time that nursing elites were successfully winn ing a battle for degrees and credentialing over the apprenticeship model of the nineteenth century. [2] Lastly, she finds that while stratification of nursing as paid labor mirrored societal relations of gender, race and class, the experience of both apprenticeship and professionalization contributed to the separation of nursing from pre modern roots.[3] Susan Reverby in Ordered to Care: The Dilemma of American Nursing, 1850-1945, finds that the story of American nursing revolved around the women and an obligation to care†¦in a society that refuses to value caring.

Wednesday, October 23, 2019

Hierarchical Team

A hierarchical team is a type of team organization structure in which the team is divided into hierarchies and there are many middle management (Mohr 1982). There is an overall manager of the team who is place at the top of the hierarchy. This manager is responsible for leading or controlling the managers in each hierarchy to make sure that the team’s objectives are met as well as the overall objectives of the organization. The manager works with the middle managers to make sure that the team is ran smoothly and that the organizational goals are being achieved by the team. There is a manager in each hierarchy who is called a middle manager who is in charge of their own department. This helps the department to be independent and therefore is able to deal with their own problems in their department without bothering what the other departments are doing. The manager who is in charge of this department is leads the department towards achieving team goals (Heckscher and Donnellon 1994). The manager is responsible of the whole department at large and in making sure that the team’s objectives are being achieved as well as the overall objectives of the organization. The middle managers communicate their progress to the overall team manager who is able to evaluate performance and decide if the team is achieving the intended objectives as well as the overall objectives of the organization. Because in hierarchical teams the team is divided into hierarchies (Robbins and Judge 2007), the team is able to run smoothly because each department has its own jobs which are allocated to it and the department are able to undertake their jobs independently. This helps in making sure that the department or rather the hierarchy undertakes their work perfectly as they are responsible for themselves and can not blame any other department or hierarchy in case they do not deliver. This makes each department to work hard to achieve their target so as not to be blamed in case the team fails to achieve the intended objectives as well as organizational objectives. The team members are able to interact as they work and therefore (Thareja 2007), are able to combine their skills and achieve the organizational goals easily. The structure below shows how a hierarchical team looks like. A team in an organization is very important as it helps the people in an organization to work as team in order to achieve organizational goals. People are also able to work in a friendly environment and therefore, they are able to create a good working environment as well as a more relaxed environment. When people work when they are relaxed, they are able to deliver better than those people who work under any tension (Thareja 2007). Therefore, people in the hierarchical team are able to deliver well than those people that are working individually because; the people in the hierarchical team are able to interact as they perform their duties. Advantages of hierarchical team 1.Division of work- each hierarchy within the hierarchical team is allocated certain jobs to undertake, therefore, they are able to undertake the tasks (Lim and Sambrook 2010) because that is what they are good at and therefore are able to deliver the best. 2.Flexibility- within a team, there are people who are able to perform more than one tasks. Therefore, in case someone is absent in a department, another person is able to perform their duties and therefore, work is able to continue smoothly without much problem. 3.The hierarchies within the team are able to share ideas. This will help in making sure that the organizational goals are met. 4.Because the departments are independent, they are able to make their own decisions which is best for them and which will help them achieve the team’s goals as well as organizational goals. 5.Even though the whole hierarchy is a team, each department is allocated their particular job, makes the department to feel the ownership of a success (Pugh 1990). For example, if a department in a team is allocated the work of advertisement, the hierarchy will feel good if there is an increased sale. 6.Working as a team even though in a hierarchy boosts the morale of the workers. This is because, they are able to interact as they work, and the work is shared amongst the hierarchies. 7.Because the team is organized in an hierarchical manner, leadership is shared in that, a middle manager is allocated for each department (Thareja 2007), this helps in smooth running of the team and that, not just one person who is responsible for the team but several people according to the number of hierarchies in that team. 8.The team is able to deliver better products because they are comprised of a mixture of people with different talents and therefore, these talents can be used to achieve organizational goals. Disadvantages 1.Work can be divided unfairly amongst the departments. The work that the whole team is supposed to undertake may be divided unfairly amongst the departments or the hierarchies (Amaral and Uzzi 2007). This therefore means that some hierarchies or departments may be allocated more jobs than the others thus making them work more than the other departments. 2.Arguments amongst the departments may rise. In case the team’s objectives are not met, the departments may start blaming one another and thus result to arguments and even destroyed relationships in the organization. 3.Because each department is able to make their own decision, coordination of that team may be difficult as the departments work independently. 4.Because the hierarchical team focus more on working as a team rather than an individual, some talents and skills of some workers may become stagnant because they may not be needed or used in the team (Burns and Stalker 1961). 5.Poor communication because, communication is vertical in that, the top manager in the hierarchy has to communicate through the hierarchies while the manager at the bottom of the hierarchy has to reach the top manager vertically. 6.If one department fails to perform its tasks, it may lead to the failure of the whole team in that the whole team may not be able to achieve its goals.

Tuesday, October 22, 2019

Professional Issues in Information Technology essays

Professional Issues in Information Technology essays Professional Issues in Information Technology Dont they say first impressions last ... well, heres my first impression on: 1. the relevance of this subject to my course and; So where do I start - well how about I start with you because once Ive made my first impression on you, based on my first impressions about this subject, then I can justify the second point. It seems clear to me that I am supposed to be writing not based on what I dont know but on what I do know. Well thats easy, not a great deal, so I will be completely honest and say I havent researched any of the content in this essay and it is only based on my own understanding. So here are the key words youve given me to trigger some potential ideas in my head (a) ethics, (b) computer ethics, (c) professional ethics. My initial thought is shit however I cant say that! But why not? Im only expressing the way I feel ... is that right or wrong? a) Hang on, is that ethics? Questioning the notion of what is right or wrong and attempting to justify it through our opinions. Ive got a feeling Im warm however I cant be completely sure. What I am sure of, is you cannot pin ethics down and there is no absolute right or wrong answer. However many people and society in general will subscribe to what is considered right or wrong. Obvious examples include refrain from rape, stealing, murder, assault, slander, and fraud. And in society this is enforced through law which often based on circumstance or evolution can fall over and bring us to question what is written down as right or wrong and the issue becomes one of an ethical debate. Personally I dont believe in absolute right or wrong which is probably similar to the ideas of a Zen Buddha. A step further would have me saying I dont be ...