Tuesday, May 26, 2020

Effect of Technology on HRM Coursework - 1375 Words

Effect of Technology on HRM (Coursework Sample) Content: Diversity: HUMAN RESOURCE MANAGEMENTNameInstitutionImpact of technology on Human Resource management(a) Overview of the trend.With more eyes on HR trend technology than ever before, there are rapid changes that are taking place. Until the recent past, most human resource information systems have developed in-house approaches to support more complex businesses. Technology has shifted the role of the project manager to that of a consultant to an increasing number of HR systems (Wang frank, 2013).HRM and technology have a broad range of influences on each other, and HR professionals and personnel must adopt technology that allows re-engineering of the HR function.Despite the rapid advances in HRM, the rapid changes in the information technology, most human resources, information process and systems in use today are older. In additional, to the study of 712 members of the association of Human resource systems professionals reported by Nielson, the age of core HRM s ystems is 5.5 years before the time purchase. It is reasonable that companies will hesitate to revamp their HR systems without considerable thought. The reason is that; time, cost and resources to implement a new system and process can be extensive. The study showed that, for companies with 600 employeesà ¢Ã¢â€š ¬ records, the time to implementation was nine months and for companies with 30000 employeesà ¢Ã¢â€š ¬ records the time to implementation was 17 months.Technology has provided a proper managerial climate for innovation and knowledge based businesses. Most of the companies have used the technological techniques in the HR function. The companies have already adopted the technology have already enhanced the effectiveness, speed and cost containment. Virtual HR is emerging because of the growing nature of IT and increased structural options. The main impact of being that, it has created an IT based workplace. One of the results of IT is that, it enables the creation of an IT à ƒ ¢Ã¢â€š ¬based workplace which should lead to what the managerà ¢Ã¢â€š ¬s top priority, the strategic competence management. Advances in IT will hold the promise of meeting the many challenges of more strategic HR personnel and managing the available resources of technological change in the future. Improvement in IT holds to meet and improve challenges of HRM as attracting, motivating, and retaining employees and meeting the demands for more strategic HR function (Wang frank, 2013).(b) Current literatureThe study carried out indicates that more than 90 % of the HR departments operate efficiently in an improved form of computerized Human resource management. In a research carried out by the Institute of manpower research, shows that a number of key changes were identified to have a positive impact on the use of technology. The changes included the development of the HR function which resulted in the closure of many centralized IT function. Today, many and the majority of the H R function are networked. The value ERP is its ability to integrate other functions with HR function under one vendor and the general HR standards. In the most of the leading ERP, systems, some of the ERP software systems permit the use of software allows the use of the internet to reduce transaction costs. Statistics show that ERP software was used to track the movement of 5000 employees across 100 locations and calculate their salaries accurately; the processing was considered effective because the cycle time was reduced from four days to four hours. The accurate, time efficient information delivered to the managers improved the quality and the speed in decision making. Currently, one of the key values of an organization management process in organizations is that they force companies to adopt an advanced cross function view of the organization, and it also leads to the integration of the information and processes (Wang frank, 2013).A recent development in the functionality o f the HRM systems has moved client /server based systems to web based systems. The result is new options for the self-service routine for various HR functions. The main challenge in the e-HR is the alignment of the processes in the HR function according to the future e-business challenge. Currently, in most companies, a change from e-HR from a paper intensive environment represents a significant cultural change and more specifically to the employees. The systems offer different search capabilities such as those for conducting organization in researches related to human resource management and the main result generation options. According to research conducted last year, more than 80% of the respondents used or had plans to use an HR portal. Organizations are using HR portals for company communication (70 %) incumbent policy and procedures, (25%), training (35%), HR record keeping (22%) and other areas like employment information and recruitment use 5 percent (Wang frank, 2013).(c) How companies should deal with it.Technology has many advantages to companies. Application of digital technology can minimize administrative costs, lowering speed response times, increased productivity and enhanced customer service. Effective management of human resources and employees has a vital role to fulfil in the performance, delivery and success of companies. The application of IT includes recruitments and selection, training and development, pay and benefits and emphasis on key HRM strategies. The current research shows that, IT has a significant...

Saturday, May 16, 2020

Female Empowerment By William Shakespeare s Hamlet Essay

The topic of female empowerment is a prominent issue in modern day society. The idea behind this rapidly growing movement involves the creation of an environment for women where they can make decisions of their own, for personal and societal benefit. Conversely in the Elizabethan Era, during which William Shakespeare s Hamlet was written, the societal role of women was divergent to our current beliefs. The play follows young prince Hamlet s revengeful journey to avenge his father s murder by his uncle Claudius; throughout which, we see the protagonist constantly delaying his revenge due to excessive contemplation and perpetual doubt. The two major female roles in the play are Hamlet s mother, Queen Gertrude, and his lover, Ophelia. Throughout the play, these women are silenced to represent how they could be manipulated to serve the male characters best interests; additionally it emphasizes the patriarchal standards during the Elizabethan era. Ophelia is manipulated by Polonius who i nsists she conserve her innocence from Hamlet s provocative interest. Additionally, Claudius manipulates Gertrude to gain access of the throne and continually ensures she perceives matters that concern her son Hamlet through his point of view. Finally, Hamlet himself seems to develop into a misogynistic character and humiliates Gertrude and Ophelia to further his revenge plot; specifically his apparent madness. Ophelia is manipulated many times throughout the play to serve the maleShow MoreRelatedOphelia And Feminism Essay1471 Words   |  6 PagesIn the play Hamlet Written by William Shakespeare Ophelia is objectified based upon her gender and virginity by her brother Laertes, and is cast aside and treated like a powerless second class citizen by Hamlet. The Oxford Dictionary defines feminism as â€Å"The advocacy of women s rights on the grounds of the equality of the sexes.† Applying the feminist ideal as stated in the previous definition to Ophelia’s situation we can reach the conclusion that Ophelia was not treated with the respect and givenRead MoreThe Tragedy Of Hamlet By William Shakespeare1931 Words   |  8 Pages William Shakespeare is an English Poet known for his famous dramatized writings. Shakespeare was born in the United Kingdom in April. Here are some of his legendary texts: â€Å"Macbeth†, â€Å"Julius Caesar†, and â€Å"Hamlet†. â€Å"The Tragedy of Hamlet† was written during the sixteenth century and was performed in 1609. Shakespeare writes this tragedy to reveal the roles of women during the Middle Ages. Back then females were referred as noblewomen and were expected to do the following: run households, take careRead MoreDeveloping Management Skills404131 Words   |  1617 Pagesbuilt-in pretests and posttests, focus on what you need to learn and to review in order to succeed. Visit www.mymanagementlab.com to learn more. DEVELOPING MANAGEMENT SKILLS EIGHTH EDITION David A. Whetten BRIGHAM YOUNG UNIVERSITY Kim S. Cameron UNIVERSITY OF MICHIGAN Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul SingaporeRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagesand permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290. Many of the designations by manufacturersRead MoreOrganisational Theory230255 Words   |  922 Pagesmanaging, organizing and reflecting on both formal and informal structure s, and in this respect you will find this book timely, interesting and valuable. Peter Holdt Christensen, Associate Professor, Copenhagen Business School, Denmark McAuley et al.’s book is thought-provoking, witty and highly relevant for understanding contemporary organizational dilemmas. The book engages in an imaginative way with a wealth of organizational concepts and theories as well as provides insightful examples from theRead MoreGp Essay Mainpoints24643 Words   |  99 Pagesis all about the firm trying to sell products to the public, the audience themselves have become a valuable commodity to the advertisers †¢ E.g. A 30 second advertising slot during Oscar Ceremony costs $US1million as it promises 60% of American female viewership Overexposure has caused desensitization and advertising messages work into our conscious †¢ Almost every physical surface that can be used is exploited for advertising (e.g. athletes as walking billboards (F1 drivers), surface of products)

Wednesday, May 6, 2020

Essay on A Passage to India - 1304 Words

There are people bustling, merchants selling, Anglo-Indians watching, and birds flying overhead. How many perspectives are there in this one snippet of life? They are uncountable, and that is the reality. Modernist writers strive to emulate this type of reality into their own work as well. In such novels, there is a tendency to lack a chronological or even logical narrative and there are also frequent breaks in narratives where the perspectives jump from one to another without warning. Because there are many points of view and not all of them are explained, therefore, modernist novels often tend to have narrative perspectives that suddenly shift or cause confusion. This is because modernism has always been an experimental form of†¦show more content†¦Ã¢â‚¬Å"’I’m tired of seeing picturesque figures pass before me as a frieze,’ the girl explained. ‘It was wonderful when we landed, but that superficial glamour soon goes, ‘† (26) Adela arr ives in India in an excited state and believes that she will be able to see the true India. However, â€Å"her impressions were of no interest to the Collector, he was only concerned to give her a good time† (26). Sometimes, the narration can switch abruptly between multiple people without any prior warning whatsoever so that the true feelings felt by the speakers can be fully expressed in the writing. At one point, Aziz, Ronny, and Fielding all converse with one another, but each of them see a different situation unfolding before them. Ronny wished to lash back at Aziz but â€Å"it was his job to avoid ‘incidents,’ so he said nothing, and ignored the provocation that Aziz continued to offer. Aziz was provocative† (82). To Ronny, an invitation to sit down and join them has become a â€Å"provocation† (82). However, the narrative suddenly jumps to Aziz when it says that â€Å"[he] did not mean to be impertinent to Mr. Heaslop, who had never done hi m harm before comfort could be regained.† (82). In Aziz’s perspective, he is trying his best to be hospitable to Ronny, despite knowing Ronny’s hate for him. To each man, his own thoughts were the truth. Thus, the views are directly compared to one another and suggest that there can be truth in multiple ways and perspectives. TheseShow MoreRelatedSummary Of A Passage Of India 1404 Words   |  6 PagesEnglish Journey To India In the novel, A Passage to India, E.M. Forster describes how the heritage and civilization of India profoundly differs from England when a class of English set foot in Indian territory with detrimental effects to follow. Introduction Cultural Background of India and England Entering the Caves Detrimental Effects Courthouse Letters with Aziz Assumptions Conclusion Ameera Salman Mrs.King AP English 11 December 2, 2014 The novel, A Passage to India, starts off by statingRead More A passage to india Essay1667 Words   |  7 Pages E.M. Forsters A Passage to India concerns the relations between the English and the native population of India during the colonial period in which Britain ruled India. The novel takes place primarily in Chandrapore, a city along the Ganges River notable only for the nearby Marabar caves. The main character of the novel is Dr. Aziz, a Moslem doctor in Chandrapore and widower. After he is summoned to the Civil Surgeons home only to be promptly ignored, Aziz visits a local Islamic temple where heRead MoreA Passage to India: Imperialism1677 Words   |  7 PagesDiscuss Forster’s portrayal of Imperialism in the novel a passage to India A passage to India by E.M.Forster is a novel which deals largely with the political, economic and social takeover of India by the British Crown. The novel deals widely with colonialism and more specifically, imperialism. Forster presents the theme in question through the lives and minds of the characters from both the Indians and the English people. There is no subjective undertone to the novel and we see clearly how eachRead MoreA Passage to India by Forster650 Words   |  3 PagesIn the novel, A Passage to India, Forster expresses this male dominance by writing, â€Å"He took no notice of them, and with this, which would have passed without comment in feminist England, did harm in a community where the male is expected to be lively and helpful† (Forster 52). They say that to be female is to be passive, agreeable, timid, emotional, and conventional. The feminist theorists’ argument of a male centered society is definitely present in the novel A Passage to India. E.M. ForsterRead MoreThe Film Of A Passage Of India1749 Words   |  7 Pagessuch as E. M. Forster’s, A Passage to India. Each reader has their own perspective of what the characters are supposed to be like and it is the director’s job to try their hardest to please everyone and give an accurate representation of the text. David Lean did a fantastic job with his casting decisions for his 1984 film version of A Passage to India. In fact, Lean manages to clarify the novel’s intentions. The characterization in David Lean’s film of A Passage to India mirrors the novel’s originalRead More A Passage To India Essays1069 Words   |  5 Pages A Passage to India A Passage to India entails various social criticisms and political matters that are among the human race. The setting of the story takes place in India where the British have colonized the city of Chandrapore. The British had no respect for the native culture and race that inhabit this region even thought they were the original inhabitants. Miss Quested and Mrs. Moore begin their passage to India in order to attend the marriage of Miss Quested. Miss Quested plans on being unitedRead MoreNature in a Passage to India1435 Words   |  6 PagesNature in A Passage to India Nature is everywhere. This universal idea inspires many authors to emphasize nature’s role in the human world and to highlight how the human world affects nature. A Passage to India, written by E.M. Forster, does just that. In many instances throughout the book, Forster stresses human struggles and how these coexist with nature. While doing this, Forster also illustrates the resentment and friendship shared between the two ethnic groups in the novel. He successfullyRead MoreA Passage to India Analysis1655 Words   |  7 PagesThe reflection of fear and hope problem in is a book published in 1924 by E.M Forster which portrays the colonized India under the rule of Britain and further explores the problem whether it’s possible that friendship can be established regardless of the separation of religions and social status. The question deals with the emotion of fear and hope and also the roles they play in the novel. Both of the two emotions here not merely refer to the feelings but also, they reflect the different personalRead MoreAnalysis Of A Passage Of India 1253 Words   |  6 Pagesbeing the â€Å"refusal to inherit the modern novel†, I would like to point out the contradictions of character and the motifs being displayed are both important to this scene in the essence of the theme of our course. In â€Å"A Passage to India† by E.M. Forster, the story takes place in India during a time when they were fighting for their independence. The scene I chose to look at in great detail was in Chapter XXIX (29). Fielding has been conversing with Miss Quested as she stays in the college and growsRead MoreAnalysis Of The Book A Passage Of India 1145 Words   |  5 PagesE.M. Forster’s classic novel â€Å"A Passage to India† tells the story of a young doctor, Dr. Aziz, and his interactions with the British citizens who are residing in India during the time of the British Raj. Throughout the novel, the reader gets many different viewpoints on the people and the culture of India during this point in history. The reader sees through the eyes of the Indian people primarily through the character of Dr. Aziz, and the perceptions of the British through the characters of Mr.

Tuesday, May 5, 2020

Illegal Surveillance Despite Anonymity †MyAssignmenthelp.com

Question: Discuss about the Illegal Surveillance Despite Anonymity. Answer: Introduction In the report, the ethical issue that has been discussed here is illegal surveillance of user data despite anonymity. The usage of World Wide Web to hide the personal information of an individual from the websites they have visited is known as anonymous web browsing. By sending the web activity information through a number of routers, a user can easily browse the web anonymously. But this does not guarantee server anonymity as the data is vulnerable to traffic analysis (Jardine, 2015). An ethical issue rises here against the tracking of data without the authorization of the user. It raises an ethical issue about personal information privacy as the data from the browser plugins and cookies can be used to track the user even if the user has hidden his or her IP address. Problem Action Consequences Techniques Identified ethical problems Despite the usage of proxy sites and anonymous servers, the internet users are repeatedly monitored by government authorities in the name of protection. Cyber criminals have misused the anonymity provided by the proxy servers to perform illegal activities but the consequences of their action has trickled down on the common public. Without proper authorization from the users, the authorities collect personal information to get hold of the criminals which has created an ethical issue (Kandpal Singh, 2013). The ethical dilemma occurs when the question rises about whether the remote monitoring of the public information to catch a handful of criminals is justifiable or not. Reason for the ethical problems A common misconception is that anonymity helps to encourage disinhibition and is often abused by cyber criminals to get into dishonest activities. As the proxy is not aware of the IP address of the user, the information can be turned over to other users. If the user is not using a secure connection to the proxy server, other individuals can easily monitor the web activities of the individual (Yar, 2013). Hackers often use free proxy servers to lure individuals to use the service and steal their personal information. For example, in US, a cyber-attack from the Chinese was used as a key argument to formulate the CISPA or Cyber Intelligence Sharing and Protection Act which will allow the authorities to check personal information of users without the need of a warrant (Ablon, Libicki Golay, 2014). The internal as well as cyber-attacks to national security is used to justify the governments surveillance measures on normal users. The freedom of expression of the user is highly diminished in these cases which raises an ethical consideration. In many countries, people cannot access internet (in cyber cafes also) without proper identification and the cyber cafes as well as ISPs are obligated to maintain logs of the users browsing history. These illegal mass surveillance of data and computers creates a data interference that affects a huge number of users. People responsible The people responsible for creating this ethical issue is the government and the hackers who use unscrupulous methods to collect user information. Without the consent of the individuals, the government utilizes mass surveillance to track the personal data of the user when clearly the user does not want anyone to track his or her activities but in this modern digital age, nothing remains confined which is a huge ethical issue that must be addressed (Reddy, Reddy, 2014). Hackers use spywares and bots to collect personal information despite the usage of anonymous software which is a major issue. People affected The web information (the computer information and the IP address) of an individual becomes visible in the server of the target web page when the individual opens a particular web page. This data is utilized to track the individual. Even if the individual uses a VPN or proxy server, it can be avoided by using an improper browser (Hyman, 2013). These particular servers work by not sending information from the user directly but by sending a request to the target browser. The anonymous servers work by putting a proxy (anonymous in nature) between the website and the user and can be used to bypass restrictions where particular site is blocked in a particular school, office or country. Users make use of this feature to protect their personal identity. Strategies to counter the issue It can be accomplished with the help of VPNs or Virtual private networks, anonymous programs such as Tor and proxy servers. The anonymous web server are used for two reasons primarily. Firstly, it helps the user to get access to certain parts of the webpage which are not accessible and secondly, it allow the user to bypass any application that blocks the web site accessibility (Loader Thomas, 2013). This helps the individual feel secure. Other solutions such as using Hidemyass.com helps to provide a triple bypass layer to mitigate the history of the web activity that the user is conducting enabling him to remain completely anonymous. Better action The better action of this ethical dilemma would be for the government to acknowledge the mass surveillance program on the common people and ask whether or not they are ready to share their personal information in the name of security. The government might face a huge backlash after this revelation but ethically it is the right thing to do. Other actions The government should organise a meeting with the IT experts as well as conduct a project whether mass surveillance is a feasible action for mitigating this issue. Citizens will always choose security over anything else and the government must realize that being a democracy, opinions may vary from person to person. The option to install infrastructures for proper surveillance should be also explored by the authorities as well (Broadhurst et al., 2014). Person to take the best action The government officials are the only people who can take the best action related to this ethical dilemma. The related IT experts and people who are related to the ethical dilemma such as the stakeholders can also help in mitigating this ethical issue by voicing their concerns and providing possible solutions. Implications of the best action Although the counter measures that are enforced for cyber criminals by the government (to track user data) may affect the private users for using private enhanced technologies, the measures are equally justified in certain cases. The scale of cyber-attacks have doubled in the past few years. To protect the rights of citizens, the government have to employ counter measures and tracking mechanisms for finding out the point of origin of the attack. This cannot be done simultaneously while protecting the citizens right as well as the attackers (Choo, Grabosky, 2013). As users are getting aware of the risks of cyber-attacks, more people are wanting adequate safeguards from the concerned authorities for protecting their data. Although the private users may get affected due to the counter measures, it can prove beneficial for the entire community in the long run. Consequences to the stake holders The consequences of the best action will be an overall justifiable mass surveillance system that collects user information after the consent of the user. The system will incorporate advanced technologies which can collect personal information up to a certain extent (Reddy, Reddy, 2014). Hackers will rejoice the consequences as their internet blueprint will be reduced but the users will also enjoy the new system knowing that no one is checking their personal information without their consent. Conclusion To conclude the report, it can be stated that discontinuation of openly expressing public opinions can result in violation of democratic rights of the individual. Although the anonymous services can be used to steal private data and the government can justify their mass surveillance in one way or the other, accessing private information without the users permission creates an ethical dilemma which can be thoroughly debated by both parties. Understanding the threats is the first step in mitigating the dilemma and prepare for the future where no one have to think about whether they are tracked 24x7. Realizing the benefits of anonymity can help the online communities to understand the utilitarian benefits of the service and enable them to use their rights of privacy and freedom of expression in a proper way. References Ablon, L., Libicki, M. C., Golay, A. A. (2014).Markets for cybercrime tools and stolen data: Hackers' bazaar. Rand Corporation. Anderson, R., Barton, C., Bhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... Savage, S. (2013). Measuring the cost of cybercrime. InThe economics of information security and privacy(pp. 265-300). Springer, Berlin, Heidelberg. Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., Chon, S. (2014). An analysis of the nature of groups engaged in cyber crime. Choo, K. K. R., Grabosky, P. (2013). Cyber crime. Hyman, P. (2013). Cybercrime: it's serious, but exactly how serious?.Communications of the ACM,56(3), 18-20. Jardine, E. (2015). Global cyberspace is safer than you think: real trends in cybercrime.Browser Download This Paper. Kandpal, V., Singh, R. K. (2013). Latest Face of Cybercrime and Its Prevention In India.International Journal of Basic and Applied Sciences,2(4), 150-156. Loader, B. D., Thomas, D. (Eds.). (2013).Cybercrime: Security and surveillance in the information age. Routledge. Reddy, G. N., Reddy, G. J. (2014). A Study of Cyber Security Challenges and its emerging trends on latest technologies.arXiv preprint arXiv:1402.1842. Yar, M. (2013).Cybercrime and society. Sage.