smartphonereviews469.wordpress.com Open in urlscan Pro
192.0.78.12  Public Scan

Submitted URL: http://smartphonereviews469.wordpress.com/
Effective URL: https://smartphonereviews469.wordpress.com/
Submission: On May 03 via api from US — Scanned from US

Form analysis 4 forms found in the DOM

GET https://smartphonereviews469.wordpress.com/

<form role="search" method="get" class="search-form" action="https://smartphonereviews469.wordpress.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

POST https://subscribe.wordpress.com

<form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;">
  <div>
    <input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address">
  </div>
  <input type="hidden" name="action" value="subscribe">
  <input type="hidden" name="blog_id" value="107314030">
  <input type="hidden" name="source" value="https://smartphonereviews469.wordpress.com/">
  <input type="hidden" name="sub-type" value="actionbar-follow">
  <input type="hidden" id="_wpnonce" name="_wpnonce" value="f24b1d0050">
  <div class="actnbr-button-wrap">
    <button type="submit" value="Sign me up"> Sign me up </button>
  </div>
</form>

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email (Required)</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name (Required)</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

POST

<form method="post">
  <input type="submit" value="Close and accept" class="accept"> Privacy &amp; Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies/" rel="nofollow">
			Cookie Policy		</a>
</form>

Text Content

Skip to content
Menu
 * About
 * Contact


HEALTH LIVING BLOG


RELATIONSHIPS AMONG INTERPERSONAL CONFLICT, REQUIREMENTS UNCERTAINTY, AND
SOFTWARE PROJECT PERFORMANCE

Posted on October 14, 2016 by Mukolwe Daniel

Relationships among interpersonal Conflict, Requirements Uncertainty, and
Software Project Performance

Summary of the Article

Relationships among interpersonal Conflict, Requirements Uncertainty, and
Software Project Performance is an article that was written by Tsong Shin Sheu,
Julie Yu-Chih Liu, Hun-Gee Chen, and Charlie C. Chen and published by the
International Journal of Project Management in 2011. In this article, the
authors present a candid report on the empirical research conducted on the
relationship between user requirements uncertainty and interpersonal conflicts.

As much as interpersonal conflict plays a significant role in determining the
relationship between the Information System (IS) professionals and users, it can
greatly negatively impact on the IS projects. The objective of the research was
to study effectiveness and efficiency as some of the most important significant
elements of a project performance. Efficiency means a stringent adherence to the
use of available resources such as number of participants, participants and
time. For an IS project to succeed, the project has to be smoothly and
efficiently run by ensuring that an appropriate strategy is employed in line
with the expected technical and organizational changes. Apart from the
efficiency of the project, the development process should always be effective
because without this, no quality production or goals can be attained as
anticipated.

To conduct the study, the researchers employed the use of judgmental sampling
technique. Here, a sample was collected from 1,600 top companies from Taiwan.
These are companies from the Common Wealth Magazine that is one of the most
reputable magazines within the country. Of this sample, there were top 500
service-related companies, 100 top banks, and 1,000 top manufacturing companies
located within Taiwan. The reason why only such companies were included in the
sample is because such top firms are known to be concerned about the IS. The
companies do hire well-trained experts for the IS maintenance and system
development. Therefore, their inclusion in the sample would help in generating a
reliable data for the research.

When collecting the data, the researchers opted for the use of survey. To do so,
questionnaires were sent to the participants who were exclusively IS
professionals. Each of the questionnaires sent to the respondents was
accompanied by a postage paid envelope that would be used in sending back the
questionnaire upon the completion of the survey. However, for the sake of
conformity to the set ethical standards governing research, participation in the
survey was voluntary. So, all the respondents were free to choose to respond to
the questionnaires without necessarily being coerced. This justifies why only
114 valid responses were received from the total of 1547 questionnaires emailed
t the respondents. Besides, the research was to be confidential because private
information provided by the respondents was kept away from other non-authorized
parties. It would only be used for the intended academic purposes. At the same
time, the consent of the participants had to be sought prior to the beginning of
the survey.

To analyze the data, the researchers employed the use of Partial Least Square
(PLS) technique. The PLS technique greatly contributed towards the measurement
of the validity and reliability of the indicators and constructs used in the
research. After the analysis process, the researchers gotten the findings that
requirement instability contributes to interpersonal conflict, which of course
negatively impacts on the project performance due to its influences on
diversity. The study also revealed that uncertainty which simply refers to the
lack of adequate information requires diversity and instability. Software
development incorporates the elements of external and internal interactions.
Therefore, it is upon the IS users to make a proper choice of the interactions.
The research also revealed that whenever a stable state that exist between the
IS professionals and users is broken, conflicts occur because of the divergent
views held by each person. Interpersonal conflict, if not properly controlled,
can escalate to serious levels that can in turn interfere with the success of
the project.



Strengths of the Research

The study conducted by these scholars displayed that it was properly done. It
was quite interesting to learn much about the concept of interpersonal conflict
in an IS setting. The observations made by the researchers were so educative o
what kind of activities to be carried out in the organizations that was sampled
and included in the studies. The research has a lot of strong areas that can be
banked on to make it have findings that can be relied upon by the decision
makers and other scholars who might be interested in conducting further studies
in the future.

The first strength of the research is that it involved the use of a literature
review. Unlike many other studies, this research was based on a thorough
analysis of reputable, sound and credible resources published by renowned
scholars. Here, the researchers sought for background information on IS and how
the Taiwan organizations have been handling the management. At the same time,
the literature review provided useful information on the concept of
organizational management, conflict eruption and resolution. For instance, at
one point, the researchers found out that IS management is not a simple task,
but is a complex activity that requires a collaboration between the IS
professionals, users and all the other stakeholders. The in-depth nature of the
literature review enabled the researchers to base their studies on
well-researched publications that are valid enough and can be relied upon to
understand the research topic.

Besides, the research was not bias because it was done using a suitable
methodology.  To eliminate any form of bias, the researchers began the studies
by making a proper choice of the population sampling technique. With the
judgmental sampling technique, the researchers managed to identify the
participants and used a proportionate sample of 1,600 Taiwan companies. This
helped in removing any bias that might be encountered because the researchers
made sure that the sample was adequately representational of the entire Taiwan
companies. After all, the participants were carefully chosen after setting out
an inclusion criteria that had to be met by any of them right before the
beginning of the studies. At the same time, the researchers got rid of the bias
by a proper analysis f the data. This was achieved by using testing tools that
suited each of the variables used in the study. When it comes to the
measurements, the research adopted a proper use of measurement approaches for
the variables used in the studies. The same can be said of the hypothesis whose
testing was above board since it was done as expected. All these played a
significant role in making sure that there was no biasness in the research.

The other strength of the research is that it was done under the guidance of
theories. Since a large portion of the study was mainly on conflict, the
researchers felt that it was necessary to apply the principles of theories of
conflict. From the conflict theory employed in the study, it was established
that conflict is indeed not a good thing because it often contributes to
negative interference or negative emotions between the involved stakeholders.
When interpersonal conflicts infiltrate into an organization, the normal
functioning of the organization is seriously interfered with. Whenever this
happens, the organization will get paralyzed because it can fail to effectively
discharge all its functions in a right manner it ought to. Actually, the use of
this theory in the research was well-advised because it helped in presenting the
researchers with background information that could be relied upon to shed more
light on the research topic.



Weaknesses

The study had some weaknesses that might have made it to generate unreliable
results. First, the non-probability sampling technique used was bias. Although
the sampling technique was representative as far as the IS development and
industry type is concerned, it was not proportional. The survey that was carried
out was entirely based on the opinion of the IS project professionals only. This
implies that the scope of the study was so narrow. Instead, if it were not to be
bias, the survey questionnaires were to be responded to by the professionals and
all the other stakeholders. The biasness of the sampling technique was noticed
when a mere 7.37% response was realized. This is a minimal response rate that
was not commendable because it would result into bias that would have been
prevented if a proper choice of sampling was done. However, this could have been
prevented if in any case the researchers could have made efforts to incorporate
a broader inclusive population sample.

In addition, the research did not attempt to evaluate the moderating impacts of
software development process on the type of relationship that exist amongst the
ISD outcomes and interpersonal conflicts. It was undesirable because the
researcher were to broaden the scope of the assessment by extending to these
areas. Instead, it was quite discouraging to observe that the researchers
limited the assessment to frequency and intensity of interpersonal conflict.
This was a serious weakness because prevented the researchers from doing an
extensive study to cover all the areas of interpersonal conflict that might be
necessary in understanding IS in Taiwan. Different organizations have their own
uniqueness that should be put into account especially when conducting such
studies. Likely moderating impacts of the software must be assessed and keenly
weighed against the relationship between ISD results and interpersonal
conflicts. Each type of conflict influence outcome differently. Therefore, when
conducting such studies, the researcher should be keen enough to address the
diversities that exist in each particular situation.

Implications of the Study

This is one of the most invaluable studies that can be relied upon in
transforming the software development sector. It can positively impact on this
sector in many ways:

First, the research helps in providing adequate information on the nature of
interpersonal conflict between the IS professionals as well as the users.
Besides, it can sensitize the IS managers on the viable techniques to apply in
the assessment and controlling the level of interpersonal conflict within the
organization. Moreover, the study will provide insightful information on the
roles of each stakeholder in the eradication of interpersonal conflicts and
instabilities that might derail the smooth-running of the production process.
Lastly, the research will be a basis for the improvement of the quality of the
software development projects because it addresses the challenges of
interpersonal conflict faced in the organization. This shows that the research
will be useful in ensuring that the process of software development is operated
successfully regardless of the challenges faced in the production process. All
the areas covered in the studies can be helpful to anyone who is interested in
making some contributions towards the fight against interpersonal conflict in
such a setting.

Conclusion



Relationships among interpersonal Conflict, Requirements Uncertainty, and
Software Project Performance is a good research that was conducted by credible
scholars. In this study, the researchers carried out an extensive study on the
topic of interpersonal conflict between the IS professionals and users. As
established in the study, interpersonal conflict and instabilities are some of
the challenges that might prevent the process of software development to run
smoothly. The concept of interpersonal conflict was studied using a
non-probability sampling technique in which a considerable proportionate sample
was identified and used in the studies. Despite its limitations, the research
still managed to rely on its methodology to produce valid findings that can be
relied upon to provide insightful information to be used by professionals in
understanding, researching on and making the necessary steps in improving the
concept of interpersonal conflict in the process of software development.

Sponsored Content

Skip
Ads by


Amazon Hates When You Do This, But They Can't Stop You (Try It Now) Online
Shopping Tools | Sponsored
This Is the Game Everyone Is Talking About BuzzDaily Winners | Sponsored
Cloud IT Cyber Security Migration Tools IT Services | Search Ads | Sponsored
Learn More



MAGIC TECHNOLOGY BALANCED SCORECARD

Posted on October 14, 2016 by Mukolwe Daniel

 

 

 

Magic Technology Balanced Scorecard

Most organizations encounter challenges while attempting to achieve their
strategic goals through formulation of strategies and planning. The management
within such firms has to ensure that effective strategies are laid out to help
overcome the challenges and obtain the desired results in the market. The
balance scorecard has become a common tool used in most organizations for
managerial purposes and in strategic planning (Carmona, Iyer, & Reckers, 2011).
This helps the businesses align their activities that are undertaken by the
stakeholders with the vision of the firm as well as the laid out strategy. In
addition, it helps boost communication both within and outside the organization
in as much as it enables the management to monitor the performance of the
organization given its strategic objectives. The management team at Magic
Technologies seeks to utilize the balanced scorecard in the implementation of
its organizational strategies and attain its objectives in the market.

Since its establishment in Taipei in 1994, Magic Technology was a leading
producer and manufacturer of electronic components, both active and passive
components. This market leadership enabled the company to attain a capital of
NT$250 million in 2009 under the supervision of Allan Lo as the CEO to oversee
the operations of its factories in Shenzen and Suzhou, mainland China. As the
electronics industries began to specialize on value chain, Magic deemed it
necessary to have strategies that would help retain its competitiveness in the
market and spread its influence on a global scale. While the value chain was
created through the manufacture of active and passive electronic components,
Magic Technology focused on the manufacture of passive components that would be
used in storage of static current, prevention of electromagnetic current
interference, filtration of impurities found in the electric current, and
moderation of voltage and electric current. The inductors, under passive
electronic components category, were the key source of revenue for the company
even as regional competition for the product continued to intensify. The
consumers of their electronics, the suppliers of the inputs, the staff members
among other stakeholders in the firm, expect the value chain delivery of the
company. These electronics created the customer value proposition for the
organization, delivering the products to the customers in the mainland China
through the transfer of the manufacturing plants (Carmona, Iyer, & Reckers,
2011).

The adoption of the globalization trend led to significant gaps between the
headquarters at Magic Technology. The presence of multiple offices could lead to
the challenges of coordination between the managerial teams in the different
locations. These challenges and administrational gap could be reduced through
the creation of an organizational culture that helps unify the multiple offices
established by Magic Technology. The management at Magic should focus on the
unique aspects of the organization that would enable it to create a culture that
unites their headquarters. The leaders within the organization should work
towards the creation of a culture that aligns the objectives of the stakeholders
with the mission of the firm (Zheng, Yang, & McLean, 2010). Overseeing employees
in the factories in mainland China may be difficult for Allan Lo to achieve
unless the right system is established to facilitate remote oversight that
ensures the organizational goals are given a priority. The effectiveness of the
attempts to create a unified culture and eliminate the gaps between the two
headquarters is determined through the observation to see that all the
identified challenges have been resolved. In addition, the nature of
communication between these offices indicates the effectiveness of the approach
to eliminate the gaps (Wang, Mora, & Raisinghani, 2015).



Magic Technology encounters various challenges in the electronic industry. These
challenges include the lack of clarity in business strategy, weaknesses in the
execution of operations in the factories, incomplete mechanisms of checking and
evaluating the key performance indicators, weak management systems, and
insufficient product analysis within the organization (Rothaermel, 2015). These
challenges can be addressed and resolved through the establishment of a balanced
scorecard that would help in the management and alignment of strategy and key
objectives of the organization. The score cared would help in ensuring that the
business strategy is clear, eliminate the weaknesses in execution, and enhance
the management of performance within Magic Technology (Wang, Mora, &
Raisinghani, 2015).

Using the balanced scorecard helps observe and monitor various aspects of an
organization, thereby enabling the management and team members to restructure
the firm for the attainment of desired objectives. The scorecard looks at the
financial performance, internal processed, business capacity, and the
satisfaction of the stakeholders within the organization in relation to the
strategy and vision of company, Magic Technology (Wang, Mora, & Raisinghani,
2015). Using the different perspectives it is possible for the metrics to be
developed, enhance the collection of data for managerial use, and facilitate the
analysis of the data to come up with viable and applicable inferences on the
strategy to be adopted by the organization.

Figure 1: Magic Technology Balanced Scorecard

For the attainment of the desired growth, the organization should consider the
growth and learning perspective of their employees and stakeholders. This
focuses on the training of employees as well as the development of a positive
attitude towards a corporate culture that is capable of leading to the
improvement of individuals and the entire organization. Due to the changes being
experience in the industry, Magic Technology should utilize the knowledge
possessed by workers to ensure a continuous learning process. The inclusion of
metric helps the management to direct funding towards training, which is most
effective and productive for the firm (Rothaermel, 2015). Clearly, growth and
learning are the key foundations of organizational success in the face of
competition in the market. Another key perspective is the business processes
within the organization determine what the organization achieves in the external
environment, by being able to cease opportunities and counter the possible
threats in the market. The management is able to determine the customers’ needs
and ensure that the products are customized to meet these needs. The financial
perspective of the organization focusses on the need for financial data to help
the management determine and predict the future flow of income. Corporate
databases ensure that the financial metrics across all the factories of the
organization can be easily managed.in addition, the organizational leaders able
to assess the risks facing them and conduct and evaluation of costs and benefits
from the operations they engage in the industry. Focusing on the customers and
stakeholders ensures that they remain fully satisfied and willing to maintain
their loyalty. Any dissatisfaction among consumers could lead them to look for
alternative sources of satisfaction, thereby shifting their attention to the
products offered by the rivals of Magic Technology. Thus, customer and
stakeholders’ metrics should be fully analyzed to ensure that the products
offered match their needs (Carmona, Iyer, & Reckers, 2011).



Therefore, to regain its magic, Magic Technology should adopt a strategy that
allows them to align the vision and strategy of the firm with the financial,
customer, organizational process, and learning and knowledge needs of the firm.
The company should maximize on its strengths in these perspectives and ensure
that they utilize these strengths to counter the challenges they are currently
experiencing in the market. The development of a strong research and development
team will ensure that the organization is able to cease opportunities while
minimizing the risks involved with entry into a new market, which they are not
familiar. As such, the adoption of an effective strategy would enable Magic
Technology to regain its initial glory as a leading manufacturer of electronic
components that are highly appreciated by their customers.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



 

 

 

 

 

 

References

Carmona, S., Iyer, G., & Reckers, P. M. (2011). The impact of strategy
communications, incentives, and national culture on balanced scorecard
implementation. Advances in Accounting, 27(1), 62-74.

Rothaermel, F. T. (2015). Strategic management. McGraw-Hill.

Wang, F., Mora, M., & Raisinghani, M. (2015). Web-Based Decision Support for
E-Business Strategies: A Balanced Scorecard Approach. Int. J. Info. Tech. Dec.
Mak., 14(03), 455-479. http://dx.doi.org/10.1142/s0219622014500291

Zheng, W., Yang, B., & McLean, G. N. (2010). Linking organizational culture,
structure, strategy, and organizational effectiveness: Mediating role of
knowledge management. Journal of Business research, 63(7), 763-771.




RFID

Posted on October 14, 2016 by Mukolwe Daniel

 

RFID has gained acceptance in all technological circles and is being used in
some real life situations. It has been linked to some applications and has
increasing use in Information Systems in the current era. The use of RFID has
been accepted in technological development as well as automation.It has been
known to increase efficiency in some processes and has widely been accepted in
some technical branches (Szilágyi & Dupláková, 2016). The central principle of
this form of technology includes the use of wireless non-contact radio frequency
electromagnetic fields of r automatic identification as well as observation. The
RFID system consists of some features including a Transponder, which is an
electronic magnet circuit that has aerials and its energy source. It also has a
RFID reader that has transmission channel and can receive circuit with a decoder
and antenna. It also contains middleware that is constituted of supporting
systems such as a control computer, database, and telecommunication network.

These systems work in some aspects that include operating frequency as well as
reading distance and targeting and the protection of particular data. The RFID
consists of its energy source and is dependent on the power supply as well. It
can spread electromagnetic fields by aerial, and the electromagnetic field is an
energy source as well as a channel for communication in the line of the sensor
to the RFDI tag (Szilágyi & Dupláková, 2016).The RFDI tag serves as a source of
identification and sanctions for temperature and pressure measurement in the
device. It can be independent on a sensor and often contains sensors for
measurement of all physical aspects. It can communicate to the user visually as
well as with the inclusion of sound. The RFID system is currently being applied
in the railway transport system. It often comprises of the use of an inbuilt
system in the vehicle as well as an inbuilt computer. They provide receiving
information from the middleware, and it includes visual as well as audio
warnings. The use of RFID technology has improved comfort as well as the
productivity of the railway transport system and reduces administrative as well
as personnel costs.

 

 

 

 

References

 

Szilágyi, E., & Dupláková, D. (2016). Application of RFID Technology for
Increasing Of Efficiency and Safety in Railway Transport. Annals of the Faculty
of Engineering Hunedoara – International Journal of Engineering, 14(3), 139-142.


RESPONSE

Posted on October 14, 2016 by Mukolwe Daniel

Introduction

Schuler and Jackson (2007) points out that Human resources management is
critical to any organization in different areas ranging from the company image
and creating a strategic plan. As such, the Human resource practitioners in
either small or large organizations who are acquainted with well- rounded
expertise provide a number of services to the workers of the organization. As
the Human Resource executive of a large hospital system, I have the mandate of
organizing the human resource department through the implementation of goals and
objectives to enhance the overall performance and productivity of the hospital.

To begin with, I will initiate an aggressive plan that is estimated to cost
about forty percent of the total budget that is allocated by the management in
the improvement of the hospital system. I will begin by doing the promotion of
the existing members of staff with the aim of boosting the morale of the staff
and at the same time hiring other health practitioners from other heath sectors
with the objective of bringing new ideas and innovation in the hospital
management system. As a new Human resource executive of the hospital, I will
also come with measures to ensure there is a pay rise and also implement the
workers benefit program which will be geared towards lowering the rate of
absenteeism usually witnessed among the unsatisfied employees of most firms
(Dunn, 2010).

Additionally, I will hire more nurses who will work as the level 1 workers and
then promote the existing nurses to level 2 and 3 so as to improve the customer
satisfaction that would emanate from the increased productivity of the
employees. At the same time, I will ensure that there are more doctors to
supervise the nurses that will be hired to take the level 1 position. I would
also begin the workers- funded pension and tuition support so as to provide the
hospital workers with the incentives that would see them continue with their
careers in their quest for higher learning. The performance appraisal program
will be necessary when implemented at all times with the purpose of boosting the
morale of the hospital workers and rewarding the more productive employees of
the hospital (“Performance Appraisal System in Technology Start-Ups: Strategic
Implications for HR Managers”, 2012).

Furthermore, I will introduce the workers participation program to enable the
hospital employees to have more control over their working conditions and this
would ensure the increase in the productivity by reducing the employee turnover
that would then increase the customer satisfaction. I will also offer the
existing employees with overtime and extra work so as to finish the job for the
customers that would be geared towards boosting the moral of the hospital
employees. Also, I would introduce the employee training program that would
necessitate the training of the new nurses plus the promoted ones as this would
help give the workers a sense of confidence in their line of duty thereby
reducing the employee turnover and enhance the employee morale. I will also
ensure that funds are allocated to the ongoing training of the doctors and the
supervisors for them to improve on their expertise as well as their management
skills to effectively manage their subjects (Schuler & Jackson, 2007).

Conclusively, I would release enough funds to set up the formal quality control
system in the hospital management and this would ensure improvement on the
quality of service delivery while increasing the productivity of the employees.
The quality control department will ensure realization of positive results and
the quality of medical care provided to the patients visiting the hospital
(Schuler & Jackson, 2007). Furthermore, it would be necessary to introduce the
safety and accident prevention program in the hospital arising from the high
employee turnover in the hospital. This measure can be achieved through the
introduction of computerized hospital system in the hospital and also through
the new employee orientation program for the new employees. The computerized
system can assist in the diagnosing the patients on infectious and chronic
diseases that are usually transmitted to the medical practitioners. On the other
hand, the new employee orientation program would ensure that the new recruits in
the hospital are educated on the hospital operations that utilize the
computerized system.



 

 

 

 

 

 

 

 

 

 

 

 

 

References

Dunn, B. (2010). Human Resource Management: The Importance of Getting It Right.
Rangelands, 32(4). http://dx.doi.org/10.2458/azu_rangelands_v32i4_dunn

Performance Appraisal System in Technology Start-Ups: Strategic Implications for
HR Managers. (2012). China-USA Business Review, 11(07).
http://dx.doi.org/10.17265/1537-1514/2012.07.009

Schuler, R. & Jackson, S. (2007). Strategic human resource management. Malden,
MA: Blackwell.

 


COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

Posted on October 14, 2016 by Mukolwe Daniel

Common Vulnerabilities in Industrial Control Systems

Industrial control systems face various vulnerabilities, which may occur both
within and outside the network of the control system. These vulnerabilities
arise from various sources, mainly due to the operations and communications
carried out by these control systems. The inefficiencies or the lack of
administration and security governance, inadequate funds to ensure proper system
management, and the attrition of employees in the automation of the control
system could also expose the system to these vulnerabilities (Stamp, Dillinger,
Young, & DePoy, 2003). In addition, the vulnerabilities may arise due to
external attacks due to the individuals outside the system, who take advantage
of the loopholes in the network being used by the control system. Being able to
understand the vulnerabilities that the industrial controls systems at PureLand
Wastewater will ensure that appropriate measures are put in place to mitigate
them.

PureLand Wastewater faces threats and vulnerabilities in their ICS. A major
threat is that the company has not established the sensitivity levels of the
data that is circulated in their system. Most secure systems are determined by
the ability to classify and identify the data into their appropriate categories
based on how sensitive they are to the organization. Failure to establish such
distinction makes it hard to determine where the precautions could be applied or
data segments that requires more security. Most ICS systems become vulnerable
due to lack of effective security administration, mainly due to the absence of
effective policies to help in system administration (Stamp, Dillinger, Young, &
DePoy, 2003). The lack of policies on security leads to lack of measurability
and self-perpetuation of security, which in turn makes the network more
vulnerable to external threats. For the prevention of these vulnerabilities, the
organization should apply procedures that enhance security administration making
it effective and instills coherence. This is done through the implementation of
security plans and training, implementing guides, as well as auditing the system
controls to enforce security. The architecture of the control system could make
it more vulnerable due to the physical infrastructural damages or architectural
designs that weaken the protection of the system data. In addition, the networks
and links that are used to convey data or signals within the organization may
expose it to security vulnerabilities. The platforms that are used could also
endanger the data shared within the organization due to harm that may arise form
incidences within the company. The use of passwords does not always guarantee
the protection of the data as these may be accessed and lead to damages. The
failure by the company to collect or examine the system logs could cause the
system to become vulnerable and possible loss of vital information (Stamp,
Dillinger, Young, & DePoy, 2003).

Thus, the weaknesses in the management of the systems within the organization
may lead to more vulnerabilities and failure of the system being used in the
company. The industry is largely unaware of the threats that are present in
their environment and the capabilities of their adversaries. Deploying complex
modern IT equipment by those in charge of automation could lead to result to
deficiencies in the security of the system, while most of them as well as those
operating the systems have insufficient knowledge and training on how to utilize
them. The process of mitigating these challenges is comprehensive and calls for
the creation of awareness on security matters within the industry, developing an
effective and strong system of security governance as well as enhancement of the
vulnerabilities by configuring and integrating technology in the system used
within the industry. Failure to address and mitigate each of these
vulnerabilities could lead to serious effects and possible failure or poor
operation of the industrial control system of the company.



 

References

Stamp, J., Dillinger, J., Young, W., & DePoy, J. (2003). Common vulnerabilities
in critical infrastructure control systems. SAND2003-1772C. Sandia National
Laboratories.




PROVIDING SECURITY IN BANKING SECTOR

Posted on October 14, 2016 by Mukolwe Daniel

 

A research paper about providing security in the Banking industry

Executive summary

The soul of a banking sector is the information or the data. Furthermore, this
budgetary and saving money information incorporates client financials and
account data, cardholder information and exchanges and non-open individual data.
All the information created or utilized by a fiscal administration’s firm is
controlled, conceivably delicate or private. The information security
consistency and monitoring challenges alone are overwhelming for keeping money
or monetary policies companies. At the point when a borrower has conceded an
advance from a bank, the bank will frequently need security for the credit it
makes.

Taking critical security over an advantage implies that the bank can, on the
bankruptcy of the borrower, claim that benefit, offer it and utilize the returns
to reimburse the credit. However, this puts the bank in a more grounded position
than lenders who don’t have security. Contingent upon the conditions, the bank,
has the choice of taking security over particular resources of the organization
or every one of the advantages of the organization (International Conference on
Network and System Security, Lopez, Huang, & Sandhu, 2013). On the off chance
that the bank does the last, a debenture will be utilized to make altered and
gliding charges over all the property and resources of the organization.

Project charter

Today’s reality is unified with expanding utilization of online access to
administrations. Internet Banking is one of the online access that is speedily
growing. To give clients with sheltered, steady, vigorous online environment to
do online managing an account the banks ought to actualize “best of breed”
advancements to verify clients personalities when they sign in. By so doing,
they will warrant that their information is transmitted safely and reliably Bank
ought to have the best reinforcement and possibility procedures and ought to
detail the best security arranges and rehearses. The sole objective of this
article is to provide a detailed analysis of the banking systems security and
how it operates. Also, the paper tries to investigate a few of Technologies,
what’s more, Security Standards the distinctive scientists have prescribed to
banks for safe web keeping money and correlation of some security frameworks
given the suggestions provided by these creators for secure internet keeping the
money.

Security framework

The most widely recognized innovation danger or risk to saving money and money
related organization is phishing assault. The typical phishing attack depends on
social designing because the shoppers who are the objectives are controlled.
They are deceived into uncovering their usernames and passwords expected to get
to their online saving money accounts. With these qualifications, the fraudster
can skim reserves, assume control records, and take the record holders’
personality (NATO Advanced Research Workshop on Information Assurance and
Computer Security, Thomas, & Essaaidi, 2006).



The more up to date assault systems are of another kind than the great phishing
and require different protections. Alternative types of crime, similar to
spyware, Trojan steeds, and keyloggers, can bring about a client to unwittingly
download malware which is PC code created for the malevolent goal of gathering
different customer data (NATO Advanced Research Workshop on Information
Assurance and Computer Security, Thomas, & Essaaidi, 2006). The stolen data can
be utilized for fraud, which is a significantly more treacherous prospect than
the record skimming or record takeover connected with the more basic phishing
assaults.

Regulations of the industry

COBIT (Control Objectives for Information and related Technology), is produced
by The Information Systems Audit and Control Association and Foundation to give
administration and business process proprietors with an IT management model to
comprehend and deal with the dangers connected with IT. COBIT comprises of four
principle parts to be specific, arrangement and sort out, obtain and actualize,
convey, what’s more, backing, lastly screen and assess (Harmer, 2013).

 * ISO 27002

The International Organization for Standardization (ISO) is ”the world’s biggest
designer and distributor of global benchmarks in an extensive territory of
subjects counting data security administration frameworks and practices. The ISO
27002 standard, formally The ISO 2005 standard, is a benchmark industry code of
practice for information security “(Harmer, 2013). IT traces eleven control
instruments and a hundred and thirty security checks. The standard builds up
rules and general standards for ”starting, actualizing, keeping up, and
enhancing data security administration inside an association” (ISO, 2006).

PCI Data Security Standard, a set of extensive prerequisites for improving
installment account information security, was created by the establishing
payment brands of the PCI Security Standards Chamber. Including American
Express, Find Financial Services, JCB Universal, MasterCard International and
Visa Inc. Inc. Worldwide, to encourage the broad selection of predictable
information efforts to establish safety on a worldwide premise (Harmer, 2013).
The PCI DSS is a multifaceted security standard that incorporates necessities
for the safety administration, approaches, systems, system engineering,
programming outline and other basic defensive measures.

Safety requirements of an industry

Data security segments can be portrayed as the rule that empowers the usage and
upkeep of data security, for example, a data security arrangement, hazard
appraisals, specialized controls, and data security mindfulness. These parts
could be considered in a data security administration system to give
associations a comprehension of the prerequisites for an all-encompassing
arrangement for data security. It additionally consolidates specialized,
procedural, and individuals orientated parts with the end goal of developing a
proper level of data security culture and minimizing dangers postured to data
resources (NATO Advanced Research Workshop on Information Assurance and Computer
Security, Thomas, & Essaaidi, 2006).

There are a few utilized ways to deal with data security administration systems
keeping in mind the end goal to characterize and develop another data security
management structure for managing an account. These segments were chosen from
every methodology where a segment was delineated as a key guideline, or as a
data security control. Where sections covered between methods, for example,
“Strategies,” a joined part class was defined. Corporate administration, moral
behavior, trust, and evaluator security system are excluded in numerous
different structures, albeit each of the four sections is considered as critical
segments by various analysts when administering data safety in an association.



Policies, procedures

It is conspicuous that not a single of the system covers all data security
administration sections, a portion of the structure, for example, PCI Security
Standard is definite to the operational level. Some different structures, for
example, ISO 27002 or the COBIT (Harmer, 2013), have specialized practice
security models, which have the character of basic setup and operation of IT
frameworks and just by implication influence data security. (International
Seminar on Network and Structure Security, Lopez, Huang, & Sandhu, 2013). Lopez,
Huang, and Sandhu (2013), likewise express that “in spite of the fact that it is
regularly talking about “best practice” regarding information security. By and
by there is no standard that totally controls the majority of the parts of data
safety and can satisfy the necessities of individual organizations to the same
degree (Harmer, 2013).

The reasons why there can’t be right data protection, on account of the critical
contrasts between different financial administrators, even inside the same
business (Harmer, 2013). Distinctive organizations have assorted sizes, money
related qualities, societies, values, center skills, dreams, business
techniques, plans of action, target client portions, furthermore unique danger
approaches. In this manner, organizations have different originations about the
significance and estimation of data security for the accomplishment of specific
business goals and a correspondingly different ability to pay for it (Harmer,
2013).

Conclusion

In today’s mechanical and social environment, security is a highly critical part
of a managing an account and money related organization framework. Clients are
exceptionally worries about safety and fraud rise. Business accomplices,
suppliers, and sellers are requiring it from one another, especially while
giving conventional system and data access (International Conference on Network
and System Security, Lopez, Huang, & Sandhu, 2013). Secret activities using
methods to increase aggressive knowledge and to blackmail associations is
turning out to be more predominant. Banks capacity to exploit new open doors
frequently relies on upon their ability to give public, open, accessible, and
secure system network and administrations.

Having a notoriety for protecting data and the earth inside which it dwells
improves an association’s capacity to safeguard and increment piece of the
overall industry. An extended data security administration structure is very
required in this developing business sector. Some broad benchmarks Furthermore,
best practices have been produced, for example, COBIT, ITIL and ISO 27002,
however not one of them can satisfy particular and extraordinary necessities of
an association. This advancing examination is to create a particular data
security administration system to fit with managing an account domain and it
data framework.

 

 

 

 



References

Harmer, G. (2013). Governance of initiative IT based on COBIT 5: A managing
guide. Ely, Cambridgeshire: IT Governance Pub.

International Seminar on Network and Structure Security, Lopez, J., Huang, X., &
Sandhu, R. (2013). System and structure security: 7th Intercontinental
Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Minutes. Berlin: Springer.

NATO Unconventional Research Workshop on Info Assurance and Workstation
Security, Thomas, J. P., & Essaaidi, M. (2006). Information assurance and
computer security. Amsterdam: IOS Press.

 


THE EFFECTIVENESS OF CELEBRITY BRANDING/ENDORSEMENT IN THE SINGAPOREAN MARKET
FOR CLOTHING INDUSTRY

Posted on October 14, 2016 by Mukolwe Daniel

 

 

 

The Effectiveness of Celebrity Branding/Endorsement in the Singaporean Market
for clothing industry

Discussion and Implications

The advertising industry has undergone significant changes, gaining a lot of
popularity, which has enabled most organizations to reach out to more consumers
thus gaining a competitive advantage in the market. Celebrity
branding/advertising has become a commonly used method of product advertising,
as a way of influencing people’s perception and consumption of a particular
product (Muda et al, 2014, 12). Based on the results obtained in the primary
research, it is evident that a higher section of the population that was
interviewed expressed their concerns on fashion trends, and how they perceive
celebrity-branded clothing that they purchase. The respondents during this
survey are selected randomly as a way of ensuring that the research findings are
not biased on age or gender of the participants among other demographic aspects.
As a result, the company, Exclusive Inc., can use the data results while
formulating the marketing strategy within the market in Singapore in future. The
survey is designed to explore the demographics and the buying habits of the
people in the Singaporean market for the fashion clothing based on their
perception of celebrity endorsement.

Based on the results from the primary research, most of the respondents during
the survey are in the age group 20-29 years, which forms 48.3% of the selected
sample while those in the 30-39 age group accounted for 31.7% with equal gender
representation in a sample of 120 respondents. Majority of those individuals who
reported to be between 20-39 are in active employment, which indicated that 80%
of those in the sample are employed. In addition, more than 55.9% of those in
the sample have attained an academic degree or higher, while those with a
Diploma were about 32.5%, which is an indicator of high educational attainment
with more than 88.4% being holders of a diploma or higher. The income of 45.8%
of the sample falls within $30,000-$60,000 while those below $30,000 form 30.8%
of the selected sample. Additionally, most of those selected in the sample work
are in the executive and professional occupation groups, which make up 67.5% of
the sample or 40% and 27.5% respectively. Thus, this survey indicates the power
of consumption by the young people in Singapore, where the purchasing motives
are driven by desire for quality and luxury clothing products. Such products are
capable of differentiating the consumers from the rest of the people in the
market and make them unique mainly due to the perceived quality as dictated by
celebrity branding.

The findings indicate that, it would be beneficial for the Exclusive Inc. to
focus their marketing efforts on the young consumers in the market. To attract
these consumers, Exclusive Inc. should be able to design and offer products that
are customized to meet the fashion needs of the young population, improve the
experience of the consumers, and adopt marketing mechanisms that allow the image
of the company brand to be distinguished from that of the competing firms in the
industry. The findings from the secondary research indicate that product
branding makes it prestigious, as much as it becomes exclusive and the consumers
attach a social status to it, similar to that given to the celebrity marketing
this product. From the primary research, it is clear that the respondents’
self-confidence rises when they purchase and wear clothing that is identified
with luxury or the high status of the popular celebrity. Some also believe that
purchasing branded clothing improves their social recognition and respect in as
much as they gain self-fulfillment by using the same product as that used by a
celebrity. Thus, consumption patterns of an individual in the population is
influenced by the social value that they attach to the product as well as the
perception held by other people regarding the product that is advertised by a
known public figure. This justifies the findings in secondary research
indicating that the consumer’s decision to buy a product that is associated with
luxury brand is highly driven by the belief on the social image that the product
they purchase carries. Therefore, by establishing a strong and unique brand
image, Exclusive Inc. will be able to influence the consumption habits of the
people in the market (Muda et al, 2014, 15).



The primary research indicates that 87.5% purchased their fashionable clothing
from retail store while the rest purchased them online. In addition, 65.0% and
22.5% purchase the branded clothing products annually and quarterly respectively
while the rest made purchases on a monthly, bi-weekly, or weekly basis. In
addition, the primary research indicated that 57.5% of the respondents made the
purchase of the branded clothing without noticing any celebrity endorsement
while 29.2% indicated that their purchases were not driven by celebrity
endorsement and the rest agreed to the influence of celebrity endorsement on
their purchasing decision. Similarly, the data collected from the sample
indicate that both male and female consumers have equal likelihood of switching
to another product that is endorsed by a celebrity. The involvement of the
celebrity in negative news does not have a significant impact on the highest and
most frequent consumers in the fashion industry as they are likely to continue
the consumption even after the negative news have been spread about the
celebrity. However, those in the higher income levels, $90,000 and above are
likely to reduce their consumption of the celebrity-endorsed product following
this news.

Regarding the most preferred brand communication channel, the internet and
social media platforms are leading from the primary research findings.
Similarly, the social media platforms and applications that allow for active
interactions, content sharing, and collaboration are most effective while market
a product through celebrity endorsement according to secondary research. Print
media, radio, and television are poorly ranked in their effectiveness in
celebrity endorsement as most of the common and frequent consumers of the
fashion clothing products spend most of their time on the social media and the
websites, where they can check the products. The celebrity-endorsed products are
more likely to appear on the website and social media as compared to the other
information channels where the advertisement of the clothing endorsed by a
celebrity is less likely to appear (Muda et al, 2014, 18). Most people trust the
information obtained from the television and the website as compared to that
from the print media, social media, and the radio regarding a celebrity endorsed
product. On the other hand, the primary data research findings indicate that the
consumers are more likely to purchase a product that is endorsed by a celebrity
if they see it being advertised on the website. The purchasing behavior
decreases from the print media, social media, television, and radio
respectively. The high preference of the social media and website indicates that
Exclusive Inc. should rely on these channels due to the influence they are
likely to produce on the purchase of their celebrity endorsed clothing.

The interactive nature of social media and website increases the effectiveness
of celebrity advertising as the consumers get to share information regarding the
product with other potential consumers. In addition, the reviews given about a
product influence the purchasing behavior of those who read such comment.
Positive reviews of a celebrity endorsed clothing are more likely to drive sales
while negative ones could ruin the brand image. Thus, Exclusive Inc. should
intensify its online campaigns where more success is likely to be attained by
influencing the consumption patterns and conduct brand sensitization enabling
them to attract new customers and retain the existing share of the market.

 

 



Reference

Muda, M., Musa, R., Mohamed, R.N. and Borhan, H., 2014. Celebrity entrepreneur
endorsement and advertising effectiveness. Procedia-Social and Behavioral
Sciences, 130, pp.11-20.


LAST TWO QUARTERS REPORT

Posted on October 14, 2016 by Mukolwe Daniel

Last two quarters Report

 

According to Schuler and Jackson (2007), Human resource Management is
fundamental to productive, employee- oriented workplace where the workers are
engaged and energized. In our bid to further organize the human resource
department, the third quarter saw us make aggressive decisions to further
enhance the performance of our company. Our major goal for this quarter was to
further increase the productivity of the company and thus we hired one qualified
employee to level 2. Such employee was to bring new ideas and methods to the
firm thus improving the productivity of the firm to a greater extend. We also
decided to promote one employee to the level of the supervisor in level 2
because of the many workers who were currently located in level 1. Furthermore,
we started the employee training in both level 1 and 2 so as to acquaint the
newly hired employees with skills to improve the probability of success of our
workers. Our team ended this quarter by improving the quality assurance program.
As such, our team allocated $4000 to train all the supervisors at all levels to
be conducting quality checks during the production process.

Going to the last quarter, we launched strategies that were to consume the
remaining amount in the budget. Due to the fact that it was our last quarter of
the year, we decided on the pay rise so as to boost the employee morale to work
and finish year on a high note. Furthermore, we improved on the employee
participation through creation of voluntary problem- solving groups in an
attempt to provide the employees with more control over their work and to have
self- direction. Additionally, our team allocated $11,000 towards improving the
Human Resource Information system to enhance easy record keeping. Our thinking
behind this scheme was to facilitate decision making process in all the areas of
the Human Resource management department when staffing, conducting job analysis,
conducting performance appraisal and training of members of staff.

 

 

 

 

 

 

 

 

 

 

 



 

 

 

 

 

References

Schuler, R. & Jackson, S. (2007). Strategic human resource management. Malden,
MA: Blackwell.


POSTS NAVIGATION

Older posts
Search for:


RECENT POSTS

 * Relationships among interpersonal Conflict, Requirements Uncertainty, and
   Software Project Performance
 * Magic Technology Balanced Scorecard
 * RFID
 * Response
 * Common Vulnerabilities in Critical Infrastructure Control Systems


Blog at WordPress.com.

Health Living Blog
Blog at WordPress.com.
 * Follow Following
    * Health Living Blog
      Sign me up
    * Already have a WordPress.com account? Log in now.

 *  * Health Living Blog
    * Customize
    * Follow Following
    * Sign up
    * Log in
    * Report this content
    * View site in Reader
    * Manage subscriptions
    * Collapse this bar

 

Loading Comments...

 

Write a Comment...
Email (Required) Name (Required) Website

Privacy & Cookies: This site uses cookies. By continuing to use this website,
you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy