Thursday, November 28, 2019

Innovation in organizations

I. Innovation is a necessary element for the sustainability of technology-based organizations. Innovation however, is believed to be an ongoing process. The five main challenges of innovation faced by organizations are generation of ideas, the environment, protecting the idea, execution of the idea to create a substantial outcome, and persuasion, or changing the image of the product among the potential buyers.Advertising We will write a custom case study sample on Innovation in organizations specifically for you for only $16.05 $11/page Learn More Generation of new ideas is the most essential part of sustaining innovation within organizations. When there are no new ideas, there can hardly be innovation. However, here idea does not just imply a thought striking a simpleton. Rather, it is the solution to a problem; a problem that the organization strives to solve. In case of Samsung, it is observed that Jong Yong Yun as the new CEO changed many of the oper ations of the company. Earlier, Samsung was primarily a company that aped the technology of more successful companies like Sony or Mitsubishi and created their own products. These products were deliberately priced low in order to cater to customers who, due to lower budget, would end up purchasing their products. However, once Yun took over the company, he realized that the best possible way to make the company stop from making loses is to turn its innovation strategy. Earlier, Samsung did not innovate. Rather it aped technology and design of premiere brands. He pushed the company to develop its own products. He stressed on innovating new products rather than replicating products of Sony or other companies. The stress on innovation and generation of new ideas for the sake of development of new and futuristic products that are called the â€Å"wow products† became the insignia for the new strategy that Yun had for the company. The stress on product development was shifted from aping of established technology to development of attractive designs and advanced technology. Two strategies that were adopted by Samsung in order to help in idea generation are – Samsung shifted its focus from aping the products of higher end, premiere brands like Sony, and concentrated in generation of new products, especially those with advanced technology and innovative designs. Yun hired young and fresh engineers and managers in order to change the orientation of the company. The environment of generation of the idea is essential, as this would help the employees work and produce a conducive surrounding for flow of ideas. In a highly bureaucratic organization, flow of idea is constrained by various rules, regulations, and hierarchical norms. The environment of the organization was changed in order to create a sustained environment for generation of ideas. The two strategies employed by Samsung to create a proper environment for idea generation are: Yun discarded the bureaucratic structure of the organization and changed the structure to a merit based system in order to motivate these new young managers and engineers. The culture of the organization was changed from one that was essentially of old nature where seniority and hierarchy gained preferences. This allowed managers to go through fewer hierarchical layers to produce their idea at the right place. Ideas generated must be protected. In a highly competitive digital market, Samsung had to ensure that it created an advanced technology and retained exclusivity of the product. The idea become common once its availability is rampant. In order to maintain exclusivity of its innovation Samsung adopted the following strategy:Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More In order to remain ahead of the other companies in LCD technology market, and encouraging innovation, Samsung sources half of i ts filters from Sumitomo Chemical Company of Japan and the rest half it sources internally. This enables the company to hold an upper hand over its competitors as they are in a position to source their own screens for LCD technology. Further, reducing the time from idea generation to production from one year to six months also helps the company to support innovation. Ideas are not enough for a manufacturing company to create profit. These ideas once formulated must be put into place. The creation of the ideas into concrete outcome is an essential step in generation of innovation. An idea in itself is just an abstract concept, however, once it is given a tangible form, it becomes innovation. Samsung employs the following strategies to help its employees to give form to the ideas generated: Ideas generated by the innovation team were quickly processed through hassle free organizational structure. As Samsung’s new strategy was to concentrate more on manufacturing, the innovati ve ideas generated by the managers and engineers were immediately processed through the production process. The company also adopted steps to make the process more competitive in order to speed up the production process. New products once manufactured must also be accepted by the market. If the market for the new product is not developed this would just leave the products in the warehouses increase inventory cost and mounting losses. In order to avoid this step the company employed the following strategy: Samsung employed a new strategy of marketing and hired a new marketing head. The company produced customer-oriented products such that they could product the products that would tab the unfulfilled needs of the customers. How did Jong Yong Yun incorporate the five dimensions of entrepreneurial orientation into the reorganization of Samsung in 1996-1998? Please list 2 arguments for each dimension. II. The five dimensions of entrepreneurial orientation are innovation, autonomy, ri sk-taking, competitive aggressiveness, and being proactive. Jong Yong Yun as CEO of Samsung displayed all of the above five entrepreneurial orientations. Yun operated almost autonomously in changing the structure and the strategy of the company. Yun encouraged innovation through hiring of new and young engineers and forged a competitive culture that nurtured innovative product development. The whole process of changing the strategy of the company was a risk that Yun had taken. Further, changing the culture of a company completely is also a risky task that Yun employed. Further Yun aimed to make Samsung a premiere brand when it had the reputation of being a low-cost product was also a risky adventure. Yun’s competitive aggressiveness helped Samsung become more innovative and achieve the position of one of premiere brands of the world. Yun did not wait for ideas to come to him. He went about making changes as and where he felt it necessary. His proactive decision-making helped the company to achieve a new height of success. III. The international strategy adopted by Samsung is to project itself as a company provides innovative, stylistic, and high quality products. in order to project itself as a brand that nurtures innovation, the company employed one advertising agency that looked after its promotions globally.Advertising We will write a custom case study sample on Innovation in organizations specifically for you for only $16.05 $11/page Learn More They helped Samsung create this new image. Further, Samsung stopped selling products through chains like Wal-Mart and K-Mart that had the reputation of selling cheap products. Instead, it started marketing its products through higher end chains. This helped Samsung change its strategy and internally project itself as a premiere brand. IV. Yun has been a successful leader to transform the company from a loss making, low-end digital manufacturer to an international premiere brand. The transformation was done by employing the following steps. Setting a direction: Yun from the very beginning aimed at making Samsung a premiere brand. His idea was to change the image of the company and produce products that would suit that new image. That is why he stopped the production of low-end replicated technology products and stressed on innovation and product development. Yun also created a structure that would sustain this innovative culture. Designing the organization: In order to create a new organization, Yun changed the structure and culture of the organization. Samsung’s hierarchical structure was changed to have fewer layers to stop bureaucracy. Secondly, he also created an environment that would nature innovation within the organization. Innovation became the key to the success of the company. Nurturing a culture dedicated to excellence and ethical behavior: culture is an essential element that nurtures successful innovation. Yun believed that he had to cr eate an organization that innovated from within and not through replication. Therefore, Yun hired young minds who would brainstorm in a different, more open and energetic environment to create new ideas and put it into implementation. Another endeavor in this direction was setting up the innovation lab in Seoul that natured futuristic design and technology. This case study on Innovation in organizations was written and submitted by user Cristina Wells to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Britain in the Thirties essays

Britain in the Thirties essays The book, The Road to Wigan Pier, by George Orwell depicts the life of miners in 1930s Britain. The 1930s in Britain were rough unless you were part of the upper class. The miners and others of that stature were suppressed, by taxes, by other classes, by just about anyone and anything you can possibly think of. It has a very socialistic point of view. Along with Orwell, there were a good number of men in Britain with the same view. The man that published the book, Victor Gollancz, was a socialist as well. Victor Gollancz, born into a Jewish household with a Polish ancestry. Was educated in Britain at Oxford. He left Oxford without a degree and began to develop views of the world with a very Christian moral stance. His first job was at Benn Brothers publishing firm. After learning the ways of the trade, he set off and started Victor Gollancz Ltd. He began to publish socialist books. Gollancz started to climb the ladder of socialist leaders in Britain. The culmination of his socialist status came in 1936 when he, Laski, and Strachey started the Left Book Club. The purpose of the Left Book Club was to spread the word of socialism and anti-fascism. A number of books were published under the production of the Left Book Club. The most famous and monumental was The Road to Wigan Pier. It was an announcement; a signal to all of those that read the book what was wrong with the world and how socialism could make it all right. First off, we have to define socialism and then work from there. Webster defines socialism as, a social system in which the means of producing and distributing goods are owned collectively and political power is exercised by the whole community. The building of the material base for communism under the dictatorship of the proletariat in Marxist-Leninist theory. Taking that definition and Orwells novel, the reason for the socialistic moveme ...

Thursday, November 21, 2019

Hugos Portinari Altarpiece Essay Example | Topics and Well Written Essays - 750 words

Hugos Portinari Altarpiece - Essay Example Evidently, the noble art piece symbolizes the birth of Jesus Christ. It predominantly showcases the coming of the blessed child and the sanctity of all the hardships experienced by Mary and Joseph in bringing the safe delivery of the innocent child. The relief after the enormous rejections and judgments came into great exaltations as everyone joyously stares at the young infant Jesus. Thus, the miraculous celebration doesn’t came to existence to them alone but a greater power helped them along the way through the guidance of God, the most high. On the other hand, this particular altarpiece upholds hidden symbolism and meaning within it, one that you cannot tell at a glance. Tomasso and his family transpired the characters of the nativity. Not only that, but different saints also appeared in this piece. Indeed, this piece shed some egoistic slate on it. The art of looking at their selves gives the Portinari family a sense of self-appreciation and fulfillment. Thus, in a way nar cissism bestowed self-admiration and chronic show-off that somehow defies the real beauty of the art of nativity. Raising of the Cross by Peter Paul Rubens Peter Paul Rubens painted in 1609-10 the famous triptych painting called â€Å"The raising of the Cross†. Obviously, the painting was influenced by the art of Michelangelo wherein you can recognize the muscularity of the bodies which reflects great strength, power and might. Aside from what we can recognizably see in the painting with all pulling and lifting of the cross which showcases the mighty rage of the people to crucify Jesus, the painting also reflects deeper message within it. The pain and suffering that the crucifixion is giving to Jesus is the same pain and suffering that we people brought to him. We may be in sympathy with Him but who really did these to Him? Who nailed Him? The answer is us. We did this to Him; all of our sins was lifted in the shoulders of Jesus. He paid for our sins in order for Him to save us from the painful suffering. We can simply put this in the verse, â€Å"For God so love the world that he gave his one and only begotten son that whosoever believes in him shall not perish but have everlasting life.† John 3:16. Caravaggism Italian painter Michelangelo Merisi da Caravaggio has been popular due to his techniques of tenebrism and chiaroscuro which has been adopted by artists who wanted to follow his footsteps. â€Å"Chiaroscuro is a method of shading which is used to give figures a sense of three-dimensional volume. Tenebrism is where an artist keeps some areas of a painting totally black, allowing one or two areas to be strongly illuminated by comparison. Tenebrism thus allows the artist to control the 'action' in his canvas† (Caravaggism, n.d.). One of the artists who adopted this is Diego Rodriguez de Silva Velasquez. He was inspired and learned the potentialities of working in a limited palette, black and neutrals which has also been seen in his wor ks which are harmonies of grays and black but not compromising its quality and the famous edge of his works wherein he can give life to his paintings as if they where breathing and moving in action. His great skill in mixing color, light, space, lines and mass liven up every piece that he makes just like the technique that Caravaggio does in his works. Versailles for Louis XIV In 1682, when Louis XIV relocated the court and government permanently to Versailles, the place became the unofficial capital of the kingdom of France. The palace is now filled with splendid royalty and delight as art and nature has harmoniously emerged together and brought about excellence and vigor into the city. Aside from this is the overshadowing face of power and might as the great Louis XIV brought authority and greatness as it moved the central of power away

Wednesday, November 20, 2019

Women and the Law Essay Example | Topics and Well Written Essays - 2500 words

Women and the Law - Essay Example Furthermore, Section 2 of the Street Offences Act 1959 provides that where a woman is cautioned by a constable, in respect of her conduct in a street or public place, that if she persists in such conduct it may result in her being charged with an offence under section one of the Act, the woman, within fourteen clear days afterwards, must apply to a magistrates' court for an order directing that there is to be no entry made in respect of that caution in any record maintained by the police of those so cautioned and that any such entry already made is to be expunged. The court will make the order unless satisfied that on the occasion when she was cautioned she was loitering or soliciting in a street or public place for the purpose of prostitution. Such application made by a woman shall be by way of complaint against the chief officer of police for the area in which the woman is cautioned or against such officer of police as he may designate for the purpose in relation to that area or an y part of it. On the hearing of such complaint, the procedure shall be the same as if it were a complaint by the police officer against the woman. But unless the woman desires that the proceedings shall be conducted in public, an application will be heard and determined in camera. In the case of DPP v Bull,1 the trial court ruled that a male prostitute cannot be a common prostitute within the meaning of the Street Offences Act 1959 s. 1(1). Defendant was charged with being a common prostitute under the Street Offences Act 1959 s. 1(1). The magistrates' court dismissed the information against him on the ground that there was no case to answer since the section applied only to female prostitutes. The matter was appealed by way of case stated, contending that the language of the statute was not gender specific. On appeal, it was held that a male prostitute cannot be a common prostitute within the meaning of s. 1(1) which makes it an offence for a common prostitute to loiter or solicit in a street or public place for the purposes of prostitution since that section applies only to female prostitutes: R. v De Munck (Augusta) [1918] 1 K.B. 635 CCA. Thus, Topaz' conduct in operating as a prostitute on the corner of Boulsdon Street may expose her to a possible charge of soliciting or loitering for purposes of prostitution. It is noteworthy that landlady Rose may be prosecuted for brothel keeping and exploitation of prostitution. Under sections 33 of the Sexual Offences Act 1956 and 33A (as inserted by the Sexual Offences Act 2003) it is an offence to keep a brothel. "Keeping" includes managing or assisting in the management of the brothel. Also, the Sexual Offences Act 2003 makes it an offence for anyone to cause or incite a person to become a prostitute in any part of the world (section 52). Further, it is an offence

Sunday, November 17, 2019

Pg 1 is teen pregnancy- pg2 is family law and pg 3 is intevention Essay

Pg 1 is teen pregnancy- pg2 is family law and pg 3 is intevention verse prevention - Essay Example The causes if teenage pregnancy can be derived from both social, cultural and economic factors. Teenage pregnancy is more prevalent in areas where people have a low economic income. This is influenced by lack of support to take part in more constructive ideas and activities. In areas where the economy in a community is low lack of social support and guidance in teenagers is relatively low (Rhode 72). This hinder provision of good advice on puberty and safe sex. Cultural factors are based on communities that provide environments that provide for comfort to factors that influence teenage pregnancy. For instance, some communities may allow for underage marriage. There are dire effects of teenage pregnancy. Firstly, both the life of the mother and child are at high risk. Rhode asserts that conception for underage girls is dangerous since their bodies are not effectively developed to handle pregnancies (51). In addition, their bodies are prone to pregnancy related complication for both the child and the mother. Family law is a form of law that deals with domestic relations and family matters (Herring 6). The legal fields is created in specific regards to the family setting as a social factor. The laws provide for regulations aimed at maintaining the social and legal requirements of the family settings. The legal provisions also govern the domestic behavior of family members citing requirements and responsibilities for all family members. However, family law has no general jurisdictions. Jurisdictions differ based on the legal provision as mostly influenced by social factors and preferences. Regardless of the differences provisions of family have a main objective of ensuring the required definition of the family or domestic related factors are maintained. Family law mainly covers areas on domestic partnerships and marriages, issues relating to children and their affairs and paternity issues. Domestic

Friday, November 15, 2019

Principles And Practices Of Teaching

Principles And Practices Of Teaching Learning is a process of acquiring knowledge, wisdom, development of skills and altering behavior and attitude. Learning starts at home, from the birth and ends with our life, a continuous process which helps to facilitate growth. According to Kolb (1984), learning is the process whereby knowledge is created through the transformation of experience. Knowledge results from the combination of grasping experience and transforming it. Learning is an unremitting and hence after completing my diploma, I always wanted to rejoin AKUSON for my higher studies i.e. for my Post RNBScN program. After, almost 4 years of my clinical experience, this program gave me a platform to accomplish my ambition. However there were some predisposing thoughts which made me apprehensive with some courses such as Health assessment, CHS, Teaching learning and reflective writing but as the semester went on, my thoughts changed. At the beginning of the semester, I found that we have different students from different background, countries, culture, different age and experiences. I found it beneficial as it is a great opportunity for me to exchange knowledge with them. We also learnt about the critical thinking on a great deal. The orientation mainly taught us about critical thinking, reasoning, and rationalizing, this was continued throughout the semester. I never use critical thinking as much as I used it after entering into the program. Besides orientation I learnt this skill in English, teaching learning course, culture health and society and of course in life sciences. I realized that critical thinking changed my views towards life. It gave me a different perspective and helped me to clarify my goals and ambition in life. It made me realize that my goal does not end with higher studies.By the end of the semester my whole world turns up in why, what and how, from the CHS reflection to book review and analytical paper, also from the 1st log of teaching learning to the final project. Strategy plays an important role in learning. According to the Anderson, 2008, p7, I hear and I forget. I see and I remember. I do and I understand. Everyone has different learning style and the teaching strategies which helped me to enhance my learning in last four months are lectures, AV materials, healthy discussions between faculty and students has augmented my cognitive learning. According to Basavanthappa, (2003) Psychological studies on learning and retention reveal that 80 percent of information and its retention is through auditory and visual senses. Because of the sensory appeal of audio-visual aids, the retention span of learning increases considerably. Reflective logs writing, project based presentation has increased my affective learning and role plays has improved my psychomotor learning. These strategies help me to gain and retain knowledge. On the other hand, there are some of the factors that have some effects on learning. Affective factors are emotional factors which influence learning. They can have a negative or positive effect. (Swan,M. n.d.), such factors can be internal and external motivation, beliefs and expectations, these factors at times encouraged me to work hard as my family motivated me, their expectations and beliefs lead me to this program but then an unexpected death of my grandmother brought an emotional breakdown to me and my family which affected my learning and my studies for a brief period. However, coming to school and keeping myself busy with projects and assignments helped me to divert my mind and cope up with tragedy. Besides affective factors there are other factors as well. Positive learning environment plays an important role in learning and grasping. For the development and fostering of active learning, environments using appropriate technological and other instructional tools in order to motivate and facilitate student learning. (Lee Zeleke, n.d. pg 2). AKUSON promotes positive learning environment by providing well equipped class rooms with latest audio visual aids, learning resource center with free internet access, library with wide variety of educational books etc. These resources allowed me to enrich my learning. Based on my needs, I used different instructional medium to enhance my knowledge and skills. Post RN-BScN is a very well-designed and organized program. Mostly it does not burden me with loads of assignments. Courses are planned in advance including the material, invitation of guest speaker, objectives, assignments and evaluation. This helps me to prepare in advance and improve my organization and time management skills. Conversely there were some of the reasons that inhibit my learning; the foremost was the use of moodle. At the beginning of the orientation I use to hear from faculties about the self directed learning or adult learning through moodle, this can be understand by means of Andragogy. Andragogy consists of learning strategies focused on adults. It is often interpreted as the process of engaging adult learners with the structure of learning experience.(Wikipedia,2011). It involves the major role of a student for active learning and problem solving. Use of moodle, was directed for self learning. In the beginning I had difficulty understanding this method as it was something new for me but eventually as I was able to grasp it. I found that it very beneficial as all the pre reading material were posted but not for all the subjects There were some discussion forums which can be utilized as healthy conversation. Beside this other factors that hindered my learning ability were the competition among the students, financial burden of the tuition fee and fear to fail a course. CHS course terrified me initially but through proper guidance and hard work I was able to achieve good marks in logs. It was not the end of my fear though; it increased with the next assignment. The assignment was an analytical paper, which constituted 40% of the marks. Unfortunately, it was during that time I lost my grandmother. On the contrary, I was motivated by my teaching learning group as they supported me in that crucial situation. They worked extra hard in my absence till I rejoin the teaching learning project again. This project facilitated me to identify my potentials, enable me to integrate my knowledge and work on the areas that I need to improve. I believe that this project has enriched my learning skills. It has enhanced my ability to identify the needs of my community and/or patients which will enable me to provide teaching/care more effectively. At the end of the semester when I look back, I realize that the position I have attained so far is not just because of my hard work but also because of the support of my faculties, my class mates, my friends and my family. Each day I learn a message to implement and improve my life style.

Tuesday, November 12, 2019

Ode To The West Wind :: essays research papers

" Ode to the West Wind" was written by Percy Bysshe Shelley shortly before his death in 1822. Shelley spent the majority of his life in England where he was born to an upper class family. He attended Eton for his primary education and Oxford University until he was expelled for the publication of The Necessity of Atheism. Shortly after being expelled, Shelley married a commoner named Harriet Westbrook , which upset his family because of his wife’s low social standing. The marriage was short lived and Shelley quickly fell in love with Mary Godwin. Shelley continued writing throughout his life and his most notable works include "Ozamandias", "Laon and Cythna", and "Rosalind and Helen". Mary Shelley, Shelley’s wife who was also involved in literature, wrote Frankenstein. In 1822 Shelley drowned in a boating accident in the Gulf of Spieza. Shelly is mainly noted as the most passionate of the Romantic writers and for his usage of expe rimental styles in poetry. "Ode to the West Wind" was written by Shelley on a day when the weather was unpredictable and windy, the poem reflects the mood of the weather and expresses Shelley’s desire for creativeness and intellect. The first section of the poem focuses on the description of the colorful autumn leaves being stirred by the wind. The line " Wild Spirit, which art moving everywhere; Destroyer and preserver.." shows the relationship between Shelley’s desire to create and nature’s force. The second section of the poem tells about the clouds in the sky that are forewarning " the locks of the approaching storm". The fierce storm clouds represent Shelley’s frustration in his lack of original ideas. The third section relates the winds effect on the waves in the sea, which Shelley describes as ".. Grey with fear and tremble and despoil themselves†¦". In the fourth section of the poem Shelley shows his desire to be the autumn leaves, tempest clouds, and turbulent waves so that he to can be effected by the wind and nature the way the objects are.

Sunday, November 10, 2019

How iCloud provides advantages to Apple Inc. Customers Essay

Innovations in Information Technology expanding rapidly and synergistic with the development of modern society that has the characteristics of high mobility, look for a flexible service, easy-paced and satisfying. The need for systems and methods reliably to the individuals or companies are increasing due to globalization where the business movement is growing so fast. Apple included in the top 25 company in forbes magazine The assessment is based on their Rankings for sales, profits, assets and market value. In 2012, Apple posted quarterly revenue of $36.0 billion and quarterly net profit of $8.2 billion, or $8.67 per diluted share. International sales accounted for 60 percent of the quarter’s revenue. During the quarter, the company sold 26.9 million iPhones, 14 million iPad, 4.9 million Macs and 5.3 million iPods. iCloud is a cloud computing based technology of apple which seamlessly integrated into devices that allows users to synchronize data such as photos, music, and documents into an iPhone, iPad, iPod Touch, Mac and the computer automatically at the same time. Users can access anywhere and anytime without the need to back up data manually. Furthermore, the system will automatically sync music or applications that have been purchased through Apple’s iTunes on all devices connected to the account. Not only that, iCloud also stores all the data of purchase on iTunes. It allows users to download music or apps back ever purchased using any device without having to buy back. During the fourth-quarter of 2012, Apple announced that iCloud has 190 million users, which increased significantly from 150 million users in July and the 125 million in April. In terms of accessing iCloud, Apple customers just need to register or sign up iCloud with their Apple ID and password, and then a free storage of 5GB will be theirs unconsciously. This storage space can be use for anything that customers want from hottest music’s, latest photograph, articles, and eBooks. Users who need more can purchase $20 per year for 10GB of additional storage (for a total of 15GB), $40 for 20GB and $100 for 50GB. Similarly there are also numerous advantages that are security, easy of access even situated in remote places as long as you have your ID and password, trouble-free development, and most of all friendly to the surroundings or environment. Besides that, iCloud is also eco-friendly which helps you to cutback the operating cost of electrical energy. Based on Porter’s Three Generic Strategies, iCloud system for apple devices adopted differentiation competitive advantage. Apple strong echo-system of cloud sharing and product integration could guarantee success, as apple products is unchallanged by its competitors. Apple Inc. key success is every product that apple release compliments the next with great sinergy, so innovation not only create excitement of long lines at new product launches, but also can become foundations for entire ecosystems. In terms of 5 Forces, Apple Inc. has a power to bargain with suppliers (games and application developers, etc.) and buyers as well. Buyer power influences the price that firms can charge, and also the cost and investment, this is due that powerful buyers demand costly services. As for the RBVF analysis, Apple has position itself as the leader in technology industry by influences a firms demand curve with the loyalty of their customers. Peter and Barney, 2003, said that A firm that has conquered a competitive advantage has created economic value than its competitors which shown by create greater benefit at the same cost compared to competitors (differentiation-based competitive advantage). The competitors for iCloud are Microsoft Windows Azure, Amazon-Aws, and Google Cloud.

Friday, November 8, 2019

Port Security

Port Security Despite the tremendous efforts in the field of port security, U.S. ports remain vulnerable to the threat of the terrorist attacks due to the complexity of their functional systems and the wide range of stakeholders responsible for the different aspects of safety measures development and implementation.Advertising We will write a custom essay sample on Port Security specifically for you for only $16.05 $11/page Learn More The following discussion will analyze and critique the safety and emergency management structures in the port environment. In addition, it will address the supporting plans and programs and the legislative policies developed to prevent and respond for a WMD attack at a major port. The safety and emergency management structure found in the port environment can be evaluated as quite effective with some considerable issues that still remain. The weak points include the following omissions: (1) vessel identification system is not available for e very port; (2) omissions are identified in port security assessment procedures; (3) security issues related to foreign vessels; (4) IT technical issues in the port security systems; and (5) inconsistence of emergency management practices in some ports to the general guidelines and regulations provided by the government (U.S. General Accounting Office, 2003a; U.S. General Accounting Office, 2003b). The supporting plans and programs typically found in a major port operation complex structure of ports amount to ensuring that the brought to ports cargo is safe (U.S. General Accounting Office, 2005). The major components of these plans and programs include the principle of â€Å"reporting about every cargo assessment result within the 24-hours period† and â€Å"integrated training for all port security workers to ensure their professionalism as for the technical aspect of protection systems† (U.S. General Accounting Office, 2004). Evaluating the legislative policies develop ed to prevent, prepare for, respond to, and recover from a WMD attack at a major port, considerable progress since the year 2001 is noted. Legislators did not fail to notice the limitations the port security systems had. Since the terrorist attack on September 11, 2001, the government systematically draws closer to the exalted objective to secure safety in ports. The remarkable achievements include refining the Automated Targeting System regulations and designing the national standards for the port security workers’ attestation (Congressional Research Service, 2004; U.S. General Accounting Office, 2004). However, as far as I am concerned, the current legislative security policies are insufficient to secure and protect US ports due to the complicated system of port authority distribution between the public and private stakeholders, and interference from multiple governmental and private agencies. The reality of a terrorist nuclear threat to America’s seaports is high. T he situation is getting worse because of the sheer size of cargo being operated in ports every day and absence of the well-designed system of the central authority overseeing the maritime system (Cruise et al., 2013).Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More As a final point, the vulnerability of the U.S. ports to the terroristic threats remains of high concern to the government and commercial institutions due to a variety of complex issues connected with the port security. The most complicated issues relate to the complexity of ports authority. Analysis of facts demonstrates that there are too many stakeholders involved in the process of port security control. These stakeholders have problems with implementing the unified security systems developed by the governmental agencies and, as a result, some of the major ports appear vulnerable to a WMD attack due to the existing un ifying protection violations. References Congressional Research Service. (2004). Border and transportation security: Overview of congressional issues. A Report to Congress. Web. Cruise, R. J., DErman, V. J., Grillot, S. R. (2013). Protecting Our Ports: Domestic and International Politics of Containerized Freight Security. New York, N.Y.: Ashgate Publishing, Ltd. U.S. General Accounting Office. (2003a). Homeland security: Preliminary observations on efforts to target security inspections of cargo containers. U.S. General Accounting Office. Web. U.S. General Accounting Office. (2003b). Maritime security: Progress made in implementing maritime transportation security act, but concerns remain. U.S. General Accounting Office. Web. U.S. General Accounting Office. (2004). Homeland security: Summary of challenges faced in targeting ocean-going cargo containers for inspection. U.S. General Accounting Office. Web.Advertising We will write a custom essay sample on Port Security specif ically for you for only $16.05 $11/page Learn More U.S. General Accounting Office. (2005). Homeland security: Process for reporting lessons learned from seaport exercises needs further attention. U.S. Government Accountability Office. Web.

Wednesday, November 6, 2019

Human and Technical Intelligence in Countering Terrorism

Human and Technical Intelligence in Countering Terrorism Introduction Both human and technological systems continue to become more complicated by the day. In some cases, technology has proven so complex that even experts involved in various fields may not amicably understand their areas of specialisations (Clutterbuck 2013, p. 271).Advertising We will write a custom essay sample on Human and Technical Intelligence in Countering Terrorism specifically for you for only $16.05 $11/page Learn More Too often, when we tackle this subject, we focus on a broad area of specialisation that involves computational ambience, machinery, the internet, and the wherewithal. However, many other factors continue shape this discourse in ways that transform humanity in its endeavours. How modern technology can be instrumental in counter terrorism continue to dominate debate with opinions split as to whether this might have negative or positive impacts on either side of the divide. Primakov (2004, p. 245) notes that the world currently relies on both human and technical intelligence to counter detect, deter, and thwart acts of terrorism before they strike. However, as much as human and technical intelligence is effective in combating terrorism, terror groups equally benefits from these opportunities to extend their hegemony. This paper seeks to explore the magnitude to which modern human and technical intelligence is instrumental in combating terrorism. Human and technical intelligence Technical or artificial intelligence refers to the brainpower exhibited by machines in dissimulation through action, thinking skills, reasoning, and behavior. As a study in an academic field, artificial intelligence developers’ attempts to equip objects with animate abilities to imitate humans and even execute some of the duties performed by man (Sandin 2003, p. 34). Mechanical engineers seek training in a wide range of technicalities that attempt to offer problem solving to which robot-like objects espouse such domineering intelligence to match human thinking skills (US Department of Mechanical Engineering 2013). It is still subject to debate as to whether these developments will ultimately culminate into a perfect art that can always take a place of the human mind. With increased technology, computational proficiency guarantees mechanical engineers with the rare capacity to design and offer an insight into principles of integration and control especially for machinery equipment. This knowledge seeks to give robotic objects some air of human intellect capable of executing human orders.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More As Sandin (2003, p. 75) observes, this science delves much in feedback mechanism, signal sensing and processing to efficiently design and integrate human accuracy with automated systems such as robots. For many, robots are merely objects that imitate insects, animals, and human beings. However, in military science they could be effective gadgets for countering terrorism. While much these artificial animate objects capture our imagination, their designers dwell much on developing them to help intelligence authorities in executing some specific activities that could be risky for humans to undertake (Shi 2011, p. 56). Many developers are already contemplating giving these objects enough intelligence to enable them interact reliably with the dynamics that are in common practice. In most cases, these objects have the endowment of doing some of the things deemed as too dangerous, boring, difficult to execute, or just extra ordinary in some way such as fighting terrorism. Technical intelligence is common in most objects found in automotive, manufacturing industry, medical implements, and space exploration gadgets. Over a million different types of object-like robots exist within modern science with greater tendency to work with greater intelligence capable of detecting and fighting terror groups (US Department of Mechanical Engineering 2013). Some robotic objects such as the Mars Exploration Rover, the Caribou, and drones have been used to assist the intelligence personnel in learning about possibilities that are either too dangerous or practically unsafe to explore (US Department of Mechanical Engineering 2013). Fighting terrorism is a high calling that sometimes extend to areas where there is biological attack. Since robot-like gadgets do not breathe, it is easy for such gadgets to explore such regions and launch an attack or take photos. Objects with technical intelligence have features that enable them to perform their duties optimally. These characteristic consists of movement, energy, sensory, and intelligence analogous to that in human beings. For an object to have artificial intelligence, it has to exhibit some animate qualities. Whether propelled by thrust, walking on human-like legs, or rolling on wheels, these objects have been instrumental in aiding human capacity to fight terrorism. For these objects to function, they have in-built human capacities that put them at par with human intelligence.Advertising We will write a custom essay sample on Human and Technical Intelligence in Countering Terrorism specifically for you for only $16.05 $11/page Learn More Unlike human beings, that have innate body power, an object that displays technical intelligence needs to power itself effectively and perform its functions as desired. A robot for example, must derive its power from electric charges, solar power, or battery (Shi 2011, p. 145). Furthermore, the ways these objects get their energy always depend on their designated function. Unlike human beings, to function in the capacity desired, a robot for instance, needs a fair degree of smartness. In essence, a great deal of software design becomes a necessity in the assembly of robotic objects. Unlike human beings that have natural se nsory nerves, for robots to perform well, they must have the software to help them sense their immediate surroundings and act as programmed (Dick Kandel 2005, p. 56). While giving robotic objects sensory abilities such as chemical sensors (nose), light sensors to emulate the eyes, pressure, or touch sensors to emulate the hands), hearing sensors to emulate ears, and taste sensors (tongue) has the likelihood of giving robots human qualities. It must however, come out clearly that singularity with humanity as to take special parallelism with the human making is still far from reality. Contribution of human and technical intelligence to counter-terrorism operations The increased attention and use of drones, or perhaps aerial vehicles continue to spark debate about their widespread application and effectiveness in fighting terrorism (Stanford/NYU Report 2012). Much of the debate, according to Cavoukian (2012), centres on their state application for surveillance and warfare or at times by the media to grope raw photo footage of a particular event. The application of drones especially in military airstrike and photo surveillance have all been great feats in combating terrorism (Cavoukian 2012). Moreover, anti-terror agencies equally use them for surveillance to enable them detect and deter terrorism. However, the varying applications of drone technology necessitate the need for best practices to ensure the terror groups do not find use them for their advantage. The application of technical intelligence for the public good has to prioritise on several factors including human welfare in assisting the authorities in detecting and combating terrorism. Terrorism continues to evolve with increase in technology. Today, terror groups such as Al-Qaida, ISIS, Al-Shabaab, and Boko Haram continue to device various means of survival to stay relevant. Armed aerial gadgets with technical intelligence make camera technology to be useful in tracing terror networks around the globe (Finn Wright 2012).Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Technical intelligence come with enhance flexibility since these gadgets have are not limited in their ability to go places. This flexibility gives way to a new task for intelligence agencies to fight terrorism without being intercepted by the terror groups (Stanford/NYU Report 2012). As camera technology becomes more pronounced, the emergence of armed aerial gadgets suggest a wide range of concerns, ranging from relief supply, digital imaging, device development, to mobile airborne tracking (Finn Wright 2012). Drones particularly, have been instrumental in play board delivery, and a police crackdown on terror groups or monitoring their activities around the globe. Some drones have special uses with a radioactive monitoring device while others are effective in protecting wildlife or tracing lost games. As concerns public policy and human privileges watch, the contemporary debate on the recent uses of drone culminating in the military strikes on civilians have narrowed down the deba te to ethical and legal issues. As Cavoukian (2012) argues, the legality of using drones to deliver military weapons for air strikes has been an emergent factor that questions its use by ordinary surveillance group such as the fourth estate (Finn Wright 2012). It is no doubt that this issue has given rise to a critical debate giving way to tentative and unprecedented legality tussle. If used in ways that project technology in bad light such as infringing on the rights of citizens, or in attacking the armed civil populations, then drones will be less effective in delivering their potentials. Sophisticated policymaking as well as legal considerations is necessary in preventing the state from making military use of drones to be legitimate (Last 2005, p. 45). In addition, strict and firm measures regulating the commercial uses of drones are a necessity. Furthermore, restricting its use by the civil society will make drones to be an effective approach to embracing camera technology. Man y people, especially the civil society deem drones harmful, especially considering their recent uses in military air strikes, this notion is reversible if there is effective implementation if rules for its use. Moreover, its ability to take secret photos is nothing less than an infringement on the privacy of the citizens. The civil society groups consider the widespread use of drones as watering down the privacy right of citizens, and the authorities must come with strict regulations to curb this phenomenon. Combating terrorism in America Securing the United States’ borders including land, air, and sea from illegal entry by immigrants, and contraband such as weapons and drugs has been the face of America security structure especially in the wake of increased terror threat (Weintrit 2013, p. 5). The United States’ Patriot Act, was officially instituted in 2001 as the most sweeping enactment to counter terrorism following the 9/11 attack (Etzioni 2004, p. 75). At the beh est, the presumption of the act lies on its uniting and strengthening ability to provide among other things, appropriate tools necessary to intercept and thwart terrorism. As an effective homeland security commitment to ensure the safety of the American people, the Patriot Act instituted the use of technical intelligence for surveillance and rapid tracking response including seizures and detention of suspected terrorist agents. In the aftermath of the 9/11 attack, Hoffman (2015, p. 76) notes that President Bush together with the Attorney General John Ashcroft effectively rallied the Congress to increase police and military powers of search, seizures, surveillance to use relevant intelligence to detect, arrest and detain terror suspects. Among the key features of the Patriot Act included the Roving Wiretaps, which allowed the federal agency to use technical gadgets to wiretap any telephone conversations that terror suspects and agents might use to penetrate the security systems. In t he course of all these developments, Etzioni (2004, p. 125) notes that the federal agency became more consistent in the use of internet tracking as a means of fast tracking internet communication. The law enforcement authorities therefore had the capacity to interfere directly in the personal accounts of individuals using the internet without necessarily having to obtain warrants for such impersonations. The Patriot Act also guaranteed the federal authorities the right to order for business records for private and public companies for litigation scrutiny and auditing by the federal authorities. In so doing, federal investigators were able to access information and communications from consumer purchases, bank records, credit cards, libraries as well as schools, and colleges. Moreover, the Act instituted a special Foreign Intelligence Surveillance Court with the capacity to issue search warrants at the request of an investigator to launch terrorist investigation on foreign visitation to America (Hoffman 2015, p. 76). In addition, the Aliens Reporting and Detention Act authorises the Federal authorities to obtain personal documentations by foreign persons vising America and those found to be in America illegally risked detention and arrest without warrant. Within the tenets of keeping with the traditions of the Patriotic Act, the federal authorities could seize the property or obstruct such logistics of suspected terrorists. Individuals whose property fall victim of the rule bear the duty of proof that the property in question was not for the purpose of terrorism and the provision also guaranteed no claim. The detention as Etzioni (2004, p. 215) observes laws allowed the federal authorities to detain suspected terrorists and agents for lengthy periods during which interrogation and effective investigation for such persons will take place. The federal authorities became effective in fast tracking the indigenous American citizens from terrorist connections. Patriot Act instituted prohibition against harbouring terrorists as a duty to thwart the emergent terrorist networks in America and other parts of the world. Harbouring individuals who have committed a felony amounting to terror and or are about to commit such acts of terrorism therefore became highly constrainable by the federal authorities. In retrospect, the Patriot Act unleashed a tall order for the various institutions charged with the security of the American populations. In achieving the objectives of the Patriot Act, the American citizens became more involved in ensuring the smooth passage of the Act by showing a commitment to thwart terrorism by any means necessary including technical intelligence. Terror suspects and agents by contrast carry the greatest responsibility for their crimes as provided for by the Patriot Act. Terrorism and counter terrorism When it comes to terrorism and counter terrorism, the intelligence becomes a powerful tool used in spreading information to a wid e and expansive audience. The web particularly acts as both important facets of both human and technical facets of countering terrorism. Intelligence could be useful for security agencies to relay messages effectively in their explicit forms. However, terror groups could as well use it to inspire a powerful revolution through dispensing information, disinformation, or misinformation to their affiliations to mount an insurgence (Johnson 2015, p. 5). Studies hold that when it comes to terrorism and counter terrorism, intelligence becomes a powerful medium to arouse the authorities to the occasion. In most parts of the world, Kahl and Lynch (2013, p. 43) note that security agencies have used both human and technical intelligence as their campaign medium to put terror groups on toes. The trend according to Fluri (2005, p. 261) has been that the security agencies that use both of these forms of intelligence to fight terrorism have received wide acclaim. In recent cases, the intelligence has been effective in denouncing governments seem inclined to support terrorist activities. Through intelligence, the web primarily fuelled revolutions such as those witnessed in the Arab spring. Opponents of these unpopular regimes used intelligence amicably to arouse the masses and call them to a duty of nationhood. However, while the intelligence is such an empowering tool, concerns about cyber-crime are on the rise as fraudsters continue to seek a lifeline by expediting clandestine activities through the web. The web therefore, hosts several things, some of which are beneficial to fighting terrorism while on the other hand aid their activities. Technical intelligence has become so much part of human intelligence, not only in America, but also in other parts of the world especially in the advent of fighting terrorism (Kahl Lynch 2013, p. 45). Because of its rare ability to transform humanity, it is always easy to imply that the intelligence will always form part of the society a nd remain an open medium for human empowerment. Most security systems as Dick and Kandel (2005, p. 245) note will always want it to remain an item to explore the world and bring great opportunities that technology offers. Away with the regulatory policy duties, through the intelligence, security agencies can always have the endowment to access any permissible content they want and this in turn has the capacity to help the security personnel to stay informed. While it is true that some form of technical intelligence might warrant censorship, the onus should be on the security detail to guard their contents jealously. Through this, the security personnel are likely to build a robust network capable of combating terror groupings. With increased terrorist activities taking place in most parts of the world, the society looks upon the security agencies to use any form of intelligence necessary to combat terrorism from all corners of the world. With the growth in technological inventions, information flow especially through the web continues to empower security agencies in their effort to combat terrorism. In the course of these progresses, Johnson (2015, p. 10) notes that the world continues to grow into a global society in combating terrorism. The increased use of technology to thwart terrorism has greatly influenced human resource capacity to make business blossom, while effectively aiding in the effective administration of and coordination of government operations (Kahl Lynch 2013, p. 48). Both human and artificial intelligence continue to be empowering tools that offer greater prospect to security personnel to share information with broader audiences who are almost, always invisible. In the present, humanity devotedly uses the web to get across their ideas to millions of audiences elsewhere in an effort to stay informed and put terror groups on notice. The application of intelligence by the security personnel according to Meara (2003, p. 67) continues to transf orm lives while extending an olive branch to technological advancements for human safety. Through technology, governments with different terrorism concerns interact and by so doing, they use technical intelligence to transform the social and cognitive skills of their personnel in the effort of fighting terrorism (Johnson 2015, p. 12). The foundation of the proposition for the efficacy of human and technical intelligence emanates from the fact that the intelligence is an empowering medium that is ordinary in essence and dear to human empowerment by fact. More than anything, intelligence is an intrinsic embodiment for technological expansion, and for that matter, its supremacy in fighting terrorism is unalterable. Terrorism compromises the security of the world With the security of the world under threat, humanity continues to live in peril and this reflects negatively on the socio-economic and political progress in areas subdued by the terror groups. Esfandiary and Tabatabai (2015, p . 8) suggest an urgent need for mobilisation between the security agencies in different countries and the international players to trace the foothold of terror groupings. Different security agencies across the world understand the enormity of tackling terrorism menace from its very foundations in various parts of the world. Moreover, most security agencies are optimistic that the solution to the threats posed by terrorism must begin with thorough realignments for both the human and technical intelligence to counter the possible threat posed by terror groups. Security agencies according to Kahl and Lynch (2013, p. 50) use both technical and human intelligence to volunteer a rich account of the strategies that these groups employ to survive counter terror attacks. Through intelligence, security agencies are optimistic that the very tricks that the terror groups employ to launch attacks could be useful in smothering them. Security agencies hold that the first step in seeking solutions to terrorism menace is to understand the actions of the groups’ from their very point of view, which essentially is all that intelligence seeks to exploit. Esfandiary and Tabatabai (2015, p. 12) absolve the Muslim world of blame and warn that generalisations might be imprudent approach in the effort to counter terrorism. Intelligence makes it easy to separate terrorists from ordinary civilisations that may be victims of the situation by either religious creed or ethnic orientations. However, Farwell (2014, p. 49) strongly suggest intelligence could be useful in expediting strong action on governments that perpetuate the terrorism activities. Different terror organisations such as Al-Qaeda and ISIS have a strong backing from several Islamic states that give them a lifeline in their operations. Intelligence offers an insight into the survival mechanisms of terror groups from using the Islamic state machineries to media fronts in perpetuating their propaganda and agenda. The med ia particularly, has been a formidable platform in the growth of ISIS and Al-Qaeda. According to Farwell (2014, p. 50), the groups’ public relations infrastructures seem more inclined in building their credibility while seeking to justify their legacy. Farwell (2014, p. 52) argues that while the media has been instrumental in promoting the ideals of these heinous groups, it can as well be effective in negating the gains they have achieved over time. The same sentiments are echoed by Klausen (2015, p. 5) in his article arguing that the Islamic extremist seem to have a well-coordinated IT experts and social media administrators that help in extrapolating the groups vendetta through social media platforms such as Facebook, twitter handle, Skype, and the You tube. While Farwell (2014) gives a detailed account of how social media has propelled the legacy of ISIS particularly, he warns of an impending danger in possible cyber terrorism that ISIS might soon deploy. Klausen (2015, p. 8) notes that to sensitise its following, ISIS uses great intelligence to inspire psychological warfare in propagating religious and political propaganda to recruit prospective members into the fighting squad. Notably, intelligence agencies opine that the first step in defeating terrorism is to extract the Muslim thinking that it has built around it. There is need to tell the world that ISIS is a terror squad that uses religious undertones to justify its crimes. Klausen (2015, p. 12) and Farwell (2014, p. 53) concur that governmental intelligence must be stepped up to track terror groups’ airwaves and destroy their networks in all parts of the world. Religious extremism is the baseline of the terror networks in all parts of the world today. Various intelligence agencies have sought to trace the origin of Jihad that seems to be the core of terrorism. In so doing, they find a rich link between the modern day Islamic religious Jihad and the rise of terror networks as having clo se links with religious extremism. Gerges (2014, p. 339) takes on this perspective and volunteers a glimpse into the historical context of Islamic extremism under the guise of Jihad. Islamic religious aggression is not something new to intelligence agencies across the world; it has its genesis from the Quran Jihad (Gerges 2014, p. 340). The same observation is presented by Hecan (2014), who traces the origin of Al-Qaeda to its rich ties with the ideological conflicts in Middle East and rise of the Cold War. Different intelligence groups give separate evidence of the atrocities already committed by the Al-Qaeda in Iraq, Syria, Afghanistan and Saudi Arabia as attributions for the group’s discontent with the current state of affairs in regions in which it operates. Al-Qaeda particularly has always been in existence for many years and it has evolved over time to give rise to other sub terror groups such as ISIS, Boko Haram, and Al-Shabaab. Having gone through an arduous metamorph osis, Gerges (2014, p. 342) opines that dealing with the terrorism is not an event but rather a process that must involve insightful human and technical intelligence. Terror groups have invested much time in seeking harmony with the Muslim faith to justify their Jihadist extremism, hence the need to use greater human and technical intelligence to diffuse such propaganda. Conclusion In today’s technological world, information and communication technology has created room for empowerment. Different groups and individuals use this noble cause in different ways including negative ones such as cyber-crimes and terrorism. Intelligence has been instrumental in fighting terrorism as well as in aiding the operations of terror groups around the world. Security agencies employ both human and technical intelligence to detect, intercept, and thwart terrorism while on the other hand terror groups use this enablement in reaching out to their audiences to carry out terror activities in targe t areas. However, both human and technical intelligence has handled security agencies around the world a powerful weapon in hacking the administration records of terror groups to seek information pertinent to their operations and counter their activities. References Cavoukian, A 2012, Privacy and drones: Unmanned aerial vehicles. ipc.on.ca/images/Resources/pbd-drones.pdf Clutterbuck, R 2013, Terrorism, Drugs Crime in Europe after 1992, Taylor and Francis, Hoboken. Dick, S., Kandel, A 2005, Computational intelligence in software quality assurance, World Scientific, New Jersey. Esfandiary, D., Tabatabai, A 2015, ‘Irans ISIS policy’, International Affairs, vol. 91, no. 1, pp. 1-15. Etzioni, A 2004, How patriotic is the Patriot Act? Freedom versus security in the age of terrorism, Routledge, New York. Farwell, J 2014, ‘The media strategy of ISIS’, Survival, vol. 56, no. 6, pp. 49-55. Finn, R. Wright, D 2012, ‘Unmanned aircraft systems: Surveillance, e thics and privacy in civil applications’, Computer Law Security Review, vol. 28, no. 2, pp. 184-194. Fluri, P 2005, The evolution of civil-military relations in South East Europe continuing democratic reform and adapting to the needs of fighting terrorism, Physica-Verlag, a Springer, Heidelberg. Gerges, F 2014, ‘ISIS and the third wave of Jihadism’, Current History, vol. 113, no. 767, pp. 339-343. Hecan, M 2014, Iraq steads against the deployment of foreign ground troops within its territories says Iraqi foreign minister at USAK, http://connection.ebscohost.com/c/articles/99424135/iraq-steads-against-deployment-foreign-ground-troops-within-territories-says-iraqi-foreign-minister-usak Hoffman, B 2015, ‘A first draft of the history of America’s ongoing wars on terrorism’, Studies in Conflict Terrorism, vol. 38, no. 1, pp. 75-83. Johnson, L 2015, ‘A conversation with James R. Clapper, Jr., the director of National Intelligence in the Unit ed States’, Intelligence National Security, vol. 30, no. 1, pp. 1-25. Kahl, C. H., Lynch, M 2013, ‘U.S. Strategy after the Arab uprisings toward progressive engagement’, Washington Quarterly, vol. 36, no. 2, pp. 39-60. Klausen, J 2015, ‘Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq’, Studies in Conflict Terrorism, vol. 38, no. 1, pp. 1-22. Last, M 2005, Fighting Terror in cyberspace: Series in Machine Perception and Artificial Intelligence, World Scientific, New York. Meara, M 2003, History behind the headlines the origins of conflicts worldwide, Gale Group, Detroit. Primakov, E 2004, A world challenged fighting terrorism in the twenty-first century, Nixon Center and Brookings Institution Press, Washington, D.C. Sandin, P 2003, Robot mechanisms, and mechanical devices, McGraw-Hill Companies Inc., New York. Shi, Z 2011, Advanced artificial intelligence, World Scientific, Singapore. Stanford/NYU Report 2012, Living under drones: death, injury, and trauma to civilians from US drone practices in Pakistan, livingunderdrones.org/report/ US Department of Mechanical Engineering 2013, Trends in mechanical engineering careers, http://me.eng.sunysb.edu/index.php?option=com_contentview=articleid=60%3Atrends-in-mechanical-engineering-careers-Itemid=83 Weintrit, A 2013, Marine navigation and safety of sea transportation, CRC Press, Hoboken.

Sunday, November 3, 2019

How can companies use 'social networks' to maximise their competitive Dissertation

How can companies use 'social networks' to maximise their competitive advantage - Dissertation Example Business competitive leveraging is just within a finger tips. The advent of information technology and the thriving of cyberspace communities within social networks made it easy to exchange goods with customer around the world or within the domestic market. Corporations and companies are now accessible in this era where everyone lurked within the information superhighway. But while business analysts and organizations see these as infinite opportunities, there remain a necessity for all web-based organizations to develop its internal policy on Information Management System to ensure that while its undergoing business competitive leveraging, it’s still able to maintain and respect internal policies, rules, and secrecy of corporate information, such as, the fiduciary relation with clients or customers and those internal corporate trade policies (Khan & Blair, 2004, pp.1-241; Badaracco ,1991, pp. 6-10).  Some tips on how to preserve corporate integrity in this information and so cial network era are recommended by the researcher too. Table of Contents I. Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 a. Aims †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 b. Methodology†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 II. ... 11 d. Social media: Bases for business decision-making†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 13 e. Conclusion and Recommendations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...16 Introduction The use of social network for business leveraging is currently an essential value in business management. The advancement of information technology and development of software for web-based collaboration has turned data management as a strategic asset that is imperative as knowledge-economy becomes a trend of the decade’s economic paradigm. This paper aims to explore and discuss the significance of social network use for business leveraging. In delving into this topic, the researcher will answer the question how companies use social networks to maximize their competitive advantage? The researcher will use a qualitative method in exploring and explicating the topic. This method seeks to explore a phenom enon using flexible iterative style of generating responses to questions through semi structured in-depth interviews, focus group discussions and observation to describe and explain relationships and experiences of a group (Cassell & Symon, 1994, pp 10-25; Cassell & Symon, 2004, pp. 1-4; Creswell, 2003, pp. 4-6; Easterby-Smith, Thorpe, & Lowe, 2002, pp. 10; Fischer, 2007, Mayon-White, 2004, p. 28; Neuman, 2006, pp. 12-15; Polonsky & Waller, 2005, pp. 10). It’s an open ended research type and most of evidences are textual sourced from secondary and primary sources (Cassell & Symon, 1994, pp 10-25; Cassell & Symon, 2004, pp. 1-4; Creswell, 2003, pp. 4-6; Easterby-Smith, Thorpe, & Lowe, 2002, pp. 10; Fischer, 2007, Mayon-White, 2004, p. 28; Neuman, 2006, pp. 12-15; Polonsky & Waller, 2005, pp. 10). Ethical considerations in the conduct of this study are seriously noted in

Friday, November 1, 2019

Interview Essay Example | Topics and Well Written Essays - 750 words - 15

Interview - Essay Example The interview perused on issues relating to team management for instance, how I ever managed a team project in the past, difficulties I encountered, decisions I undertook, how I managed the group members, how I met deadlines, and organized the team to work as one. In preparation of the team building questions will give me confidence when going for the interview. I also believe that there are a number of questions which I did not find relevant in the mock exam, for instance, the question asking about situations when I missed deadlines while carrying projects and what I could have done different. I believe such a question is irrelevant in this content. I felt more prepared when questions relating to goals was asked. Ever since I was a young person, I had always been taught about the value of always planning ahead, through having short and long term goals. In addition, I was more prepared when it came to team project management issues since I had experience with it. In school, we used to be grouped in groups of 8 and each group accorded group leader in rotation for each task. As a group leader and project manager, I managed to get some skills in relation to how to make a team stronger and more focused. I felt least prepared in the question which talked about describing some aspects about the company, since i had not research about it well. I also found the question about the most difficult course that I took in school absurd, because I found all to be equally easy. I learnt a lot about myself after the mock interview. I realized that I had a lot to learn and prepare for the real exam. First of all, I realized I would get an average or a fail based on the level of prepared at the mock interview. In order to score highly for the real interview with the company, means I have to prepare well. I also realized the value of being prepared all round as some questions are not directly related to class work, but come as practical examples, like for