Tuesday, May 5, 2020
Turbine Manufacturing Industry and Implications - Free Samples
Question: Discuss about the Turbine Manufacturing Industry and Implications. Answer: Introduction The main aim of this task is to explain and analyze the external environment of the China to initiate new business operations and activities. Sukin is a skincare and cosmetic company which is incorporated in Australia in 2007. The firm has decided to setup the business in China. For this purpose external environment analysis is done by the company to attain objectives and goals in this country. The paper explains that how political, social, cultural, legal and environmental factors may influence the profitability and growth of Sukin in China. Along with this, it explains that how the company can gain competitive advantages by using porter five forces analysis and porter diamond model. Additionally, here is the discussion about the various entry modes, as it also explains that which entry mode has been selected by the company. Further detail of the task has been discussed below. China is a unitary sovereign state in East Asia and the country is most populous country in the world. In addition, the country is one of the biggest explorers of goods and services. The country is not counted in LDC and it is not a developed country as it is a developing country who is introducing new and innovative technologies. Moreover, the country is a part of BRICS and NIC (Newly industrialized country). The major industries of China include coal, machinery, mining, transportation, petroleum, cement, textiles, automobiles, manufacturing and agriculture industry. China maintains physical diversity and it is the third biggest country after Canada and Russia in the world. Along with this, the country has enormous lakes, rivers and mountains. In this way, China is unique and strong on the basis of geographically. In 2007, Sukin was launched in Melbourne, Australia after analyzing and identifying a gap in the marketplace for high efficiency and effectiveness, environmentally sustainable and affordable natural skincare. After then, Sukin has become number one brand in the Australia. The head office of the company is located in Dandnong south, Victoria. The company utilizes a plenty of botanicals, antioxidants and essential oils to restore the natural radiance and vitality of people skin and hair. The firm is offering natural skin and beauty products in the Australia. All the skins and beauty products launched by Sukin are Australian made with ingredients that are naturally derived, vegan and cruelty free. The companys brand is loved and liked by children, men and women in all over the world. The main mission of the firm is to expand and explore the people knowledge in natural skin care, create exceptional products, educate and give back to the community across the world. The vision of Sukin is to be a most attractive and influential natural skin Care Company in the world. The core values include passion, ethics, empower, excellence and innovation which help to overcome the competitors in the global market. In todays modern world, Sukin is increasing its profits and revenue in the Australian market. There are approx 617 employees employed in Sukin. The estimated revenue of the company is approx $ 37.9M. Jurlique and Organic pharmacy are main competitors of the organization which may influence the long term growth and success of the company. Economic environment analysis of China Any economic development might have a major impact on the business activities and operations of Sukin. The GDP growth rate is 6.9% in China. The GDP per capital in the country is equivalent to 55% of the worlds average. GDP per capital in China averaged 1562.61 USD from 1960 until 2016, reaching an all time high of 6894.50 USD in 2016 and a record low of 132 USD in 1962. The average inflation rate of China is 2.13% (2018) that is higher than previous year rate. It can influence the revenue of Sukin in China. Along with this, Beijing plans to finish and complete by years end negotiations on the regional comprehensive economic partnership (RCEP), which is a trade agreement between ASEAN, New Zealand, Korea, China, Japan and India. In addition, various reforms have been initiated over the past 2 decades affected the new business activities in such country. It is noted that inflation rate and property prices are high in the country that may affect the growth of Sukin. The peoples bank of the country has increased interest rate (de Beer et al 2011). China maintains second largest economy in the world therefore; the company can take various advantages in the country. Along with this, private sector is main driver of development and growth. In 2016, the countrys economic growth slowed to a 26 year low of 6.7 %. In addition, the country maintains reciprocal relationship with its neighbor countries which could help in exploring and flourishing Sukin business in China. The country also implements market oriented reforms to increase and enhance the productivity, living standards and technological quality but not lead to adverse impact on budget, unemployment and inflation. Moreover, the high economic growth of the country will lead demand of the skincare products and services. Along with this, workforce are skilled, experienced and potentials in the country. Hence, the company can be benefited by using of talented and skilled labor force in the market. No company can survive its business in the international market without effective a nd potential employees. Additionally, labor cost is low in China as compared to other countries. The labor costs in the country increased to 104.50 index points in the fourth quarter of 2017 from 104 index points in the third quarter of 2017. Furthermore, population can also influence the profitability of Sukin Company positively. The population of the country is 137.87 crores therefore; Sukin can attract more and more customers in the marketplace. For this purpose, Sukin needs to analyze and identify the needs, requirements and desires of the Chinese people to introduce new and innovative skincare products.GDP based on purchasing power parity was 23,122,.03 billion international dollars in 2017. Purchasing power of consumers also influences the sale of the skincare products in the global market. Now it shall be noted that the firm should focus on economic factors to overcome the competitors in Chinese market as it also help to maximize the profitability of the company (Otmazgin 201 3) Social-cultural environment of the China The social cultural factors play a significant role in the china to attract more and more companies in the market place due to constantly demographics change. The demographics changes also affect the tastes, preferences and choices of the customers (Ragnedda and Glenn 2013). The social cultural factors include custom, values, belief, loyalty and morale of the people that have direct impact on the choices and requirements of the customers. The social behavior and family size generally impact that how and why decisions are taken in the marketplace (Cooley 2017). Some other social factors include education, religion, lifestyle, emigration that may affect the progress of the firm positively as well as negatively. China is a collectivistic society based on the Greet Hostede value dimensions. The literacy rate is over 90% in china, it means the country emphasizes on education and majority of the nation are literate. Along with this, China is the biggest country for cosmetic players due to highest population. Sukin can seek various opportunities in Chinese market by analyzing and evaluating the trends and lifestyle of the people. Moreover, gender imbalance also influences the revenue and returns of the company. One child policy has been implemented in the country which may have direct impact on the productivity of the firm. There is discrimination between male and female therefore, it can arise various difficulties in the marketplace (Li, Hiroshi and Terry 2013). Apart from this, income inequality is also appearing and growing in the country. Due to income inequality, the country has not been able to maintain good relationship with some other countries. Due to gender inequality, the country does not involve womens in decision making process. Thus, the company is unable to know and understand the ideas and opinion of womens. Additionally, language and communication barriers also are existed in the Chinese market because Chinese speak their own language in the global ma rket. If Sukin wants to start new business activities and operation in China, it needs to measure and understand the communication system and language of the country (Cao and Daniele 2013). Along with this, there are various issues raised in the China in terms of Hofstedes cultural dimensions. Lets talk about the power distance, power distance is 80 in China it means there is culture inequalities in the country. There is a difference between wealthy and poor that could affect the progress of Sukin negatively. Apart from this, the country maintains low individualism; it means Chinese people like to work in the groups rather than the individual. There are dependent on the groups and they do not prefer to act as individualism. In addition, China surpassed the number of males over the females. It means Chinese do not give importance to womens. On the other hand, China has a low score on uncertainty avoidance; it has ranked 30 in uncertainty avoidance (Laruelle and Sbastien 2012). The Chinese people show their emotions and nervousness to other people and there are strict rules, religious and legal laws to keep out uncertainties. Moreover, Chinese are high in long term orient ation at 118, it means they focus on persistence and long term success. However, it seems that long term orientation is time consuming process and the people are unable to focus on the short term goals. Thus, it can influence the growth and progress of Sukin Company adversely. Apart from this, China is a multi religious country including Islam, Buddhism, Taoism and Protestantism. The religious activities are protected by the constitution. It is noted that Chinas luxury market is optimistic due to its female population aged 16 to 45. Sukin needs to monitor and analyze the socio-cultural factors of the country to attain long term mission and vision (Guthrie 2012). Political and legal environment of the China Currently, China government is ongoing to promote and encourage rule of law. After the Cultural Revolution, a legal system of revolutionary and official authority has implemented in the country (Yabuki 2018). In addition, legal framework for e-commerce is still in its early stage which influences the success of Sukin. It is noted that approx 90% of China high end cosmetic products are foreign brands and mainly imported from Japan and Europe (Heggelund 2017). In today era, most of the brands are presented in the Chinese market (Kwong 2015). Since a long time, it has been observed that the process of importing increases the challenge and issue for the cosmetic and skin care companies including various difficulties such as custom duty and tax treatment (Zhong 2015). Apart from this, progressive taxation system is followed by the country whereas the tax rate for freelancers income progresses in three levels from 20% to 40% and the tax rate for the regular workers in seven levels from 3% to 45%. The political system affects the activities and operations of the organization positively and negatively as well because the company will have to follow rules and legislation of the China. Sometimes, it becomes very difficult for the country to follow rules and legislation of foreign country (Zhong 2015). On the other hand, the country has set up a relative complete law system to encourage and motivate foreign companies to invest in China. The main basic laws and legislations include three common laws including the law on chine foreign contractual joint ventures, the law on Chinese foreign equity joint ventures and the law on wholly foreign owned enterprises (Gillespie and Liesl Riddle 2015). Recently, the government of the country is considering its existing laws and statutes in accordance with the model of the world trade organization. Moreover, tax law is one of the significant issues in front of Sukin while initiating business activities in the China (Day 2016). The company needs to understand the tax laws and legislations that have direct impact on the business activities and operations. On the other hand, it is noted that the China is well known and reputed for attractive incentives package in Asia (Wang 2011). The tax incentives and other benefits are provided by the country fo r the promotion of investment. If the company wants to set up skincare business in the country, Sukin has to take approval from the government (Axelrod and Stacy 2014). Additionally, socialist rule of law is followed by the country. The legal system of country is based on the model of civil law. Intellectual property issues also influence the growth rate of Sukin in various ways. China still does have a problem and issue with corruption and that needs to be considered while initiating business in China. It is dependent on the patent holders to defend their products against illegal generic manufacturers that are very complex process (Pound and Marshall 2017) Competitive analysis of the country Sukin Company can use the porters diamond model to analyze and measure the competitive benefits in the international market. The company believes that porter diamond model plays a significant role in the generating of various benefits in the global market (Huggins and Hiro Izushi 2011). The porter diamond model includes the following: Factor condition: It is a situation related to the production elements such as infrastructure and knowledge. Under this factor, the company focuses on the various factors such as human resources, labor, costs, commitment, qualification of the workers, and infrastructure. These factors help in creating competitive position in the international market. Related and supporting industries: The success of the skincare company depends on the presence of the suppliers and related industries within a region. It will help in maintaining good and effective relationship with neighbor countries. The competitive suppliers also reinforce internationalization and innovation. Besides suppliers, Sukin also focuses on the organizations that are operating and managing same business activities in China. It will help to know and analyze the plans, policies and strategies of the competitors to attain rivalry benefits in the foreign market. Along with this, Sukin is also able to differentiate its products from the competitors products and services. Home demand conditions: Under this stage, size and nature of the market can be analyzed by the company to achieved goals and objectives. Interaction between economies of scale and size of the market are existed in the market. If Sukin can realize sufficient economies of scale, this will help to provide several advantages to serve the market from a single location. Under this stage, demand of the market and choices of the customers can be evaluated by the firm to build a good image in the foreign market. Strategy, structure and rivalry: This element is related to the way in which Sukin is managed and organized, its corporate objectives and goals and measures the competitors within the organization. Along with this, the company is focuses on the conditions of the China to determine and evaluate the place to starts new activities and operations. Culture plays a significant role to make unique strategies and policies within the organization. It also helps in understanding and knowing the religion and language of other country in which the company wants to start new business. In this way, this factor provides advantages and disadvantages as well in foreign country (Zhang, Sufang 2012). Government: The government plays an empirical role in encouraging and inspiring the development of industries and companies in home country as well as foreign country. The government allows the companies to initiate business activities in foreign country. If Sukin wants to set up new business in China, it needs to take prior approval from the government because government helps to provide finance and other facilities to the firm (Chang 2013). Opportunities: This factor plays a powerful role in porter diamond model because it helps to provide enormous opportunities to Sukin in China. Various opportunities are taken by the company while implementing new operations in such country. Along with this, unique strategies and policies are made by the firm to beat the competitors in the international market. In this way, it is assumed that porter diamond model provides various competitive benefits to Sukin in China. It helps to evaluate and analyze the plans of the rivalry in the global market. Furthermore, it makes easy market entry for the firm in the universal market. By using this, the firm has been able to build and develop strong relationship with competitors (Shambaugh 2013). Porter five forces model The porter five forces model is propounded by Porter to analyze and identify internal and external factors which influence the competitiveness of a product and industry. As the same way, Sukin also use this model to evaluate the competitive advantages in the Chinese market (Yunna and Yang 2014). The porter five forces analysis has been detailed below. Threat of new entry: The cosmetic company has a low threat of new entrants in the country. This is due to several factors such as high cost of market entry. Along with this, lot of resources is required to enter in the foreign market. There are some cosmetic companies already existed in the china such as Dior, LANCOME and Guerlain which can influence the operations of Sukin. In this way, Sukin needs to focus on the existed rivalries which may affect the outcomes and results of the organization. Bargaining power of customers: The cosmetic company has a high bargaining power of customers. This is possible because cosmetic products are available in every country. High and immense competition also exists in the Chinese market. Along with this, firm makes substitutes products to reduce the prices of the products and services. Bargaining power of customers is a biggest challenge in front of manufacturer across the world. Bargaining power of suppliers: Sukin has a low bargaining power of suppliers in China. It can be possible due to the high number of market leaders are existed in Chinese market. Suppliers supply diverse products in the marketplace. Due to the large supply, customers have the power to affect the market prices as opposed to the vendors (El Namaki 2012). Threats of substitutes: In the skincare and cosmetic industry, there are various rivalries presented in the global market. It is seen that threat of substitute is high in cosmetic company. The cosmetic companies sell their products at higher prices or if the products are of low quality then the consumers prefer to buy the substitutes products in the marketplace. It influences the sales and profitability of the firm. Barriers to entry exist: High cost is comprised with developing cosmetic products, as it is complex for Sukin to leave the industry without attaining the costs for production. Therefore, various factors influence the position of the firm. In this way, it is observed that porter five forces model renders enormous benefits to the company (Liu, Zhang Xu C). SWOT analysis SWOT stands for strengths, weaknesses, threats and opportunities which have been stated below Lu, (Weisheng, Roger and Carol 2013). Strengths Weaknesses Quality of products is one of the biggest strength for Sukin Company. Offering the products at an affordable price. It offers attractive and unique product in the market. Brand portfolio is one of the significant strengths of the firm. Widespread distribution is possible in cosmetic company. Weak delivery system can be considered as one of the weakness of the firm. Unskilled staff and delivery officers can also be counted under the list of weakness. Opportunities Threats Diversification in the products range can be one of the biggest opportunities for the business corporation. Establishing the products to new market regions. Adoption of open communication system and contemporary distribution mechanisms. Intensification in competitive environment. Changing marketing trends and consumer behaviors will be one of the biggest threats for business organization.The top three strengths include followings: Widespread distribution can be possible. It offers beauty and attractive products to people. Brand portfolio is significant strength of the company. Entry modes There are various entry modes to enter in the foreign market such as exporting, joint venture, outsourcing, and franchising, strategic alliance, contract manufacturing and foreign direct investment. Contract manufacturing is one of the significant entry modes to enter in the foreign market for cosmetic company. Under contract manufacturing, a foreign firm hires and appoints local manufacturers to produce and manufacture their products and services, it is called contract manufacturing. This method utilizes the skills and talents of a local manufacturer and help in reducing cost of production (Scuttari 2014). The marketing and selling of the cosmetic product is the responsibility of the international company. Sukin can use this method to enter in the Chinese market because it is suitable method for the organization. It helps in reducing the production cost and develops the small and medium industries in the global market. Under this method, the company needs to hires local manufacturer s to introduce new products in the foreign market. It also helps in improving and enhancing the skills and knowledge of Chinese people (Terpstra, James and Ravi 2012). Conclusion On the above mentioned study, it can be concluded that Sukin is the biggest skincare and cosmetic company in Australia. The firm offers enormous beauty and skincare products to the men, women and children across the world. The organization wants to enter in the Chinese market to maximize the profitability. Along with this, the paper explains that how macro environment factors affect the success and growth of Sukin in china. Pestle analysis and SWOT analysis is done by the company to analyze and evaluate the risks and challenges of the market. In addition, the firm uses porter five forces model and porter diamond model to gain competitive benefits in the Chinese market. On the other hand, market entry modes also have been explained in the tasks. Contract manufacturing entry mode is used by Sukin Company to avert the production cost and maximize the revenue. By using this method, the company can easily enter in the international market. References Axelrod, Regina S., and Stacy D. VanDeveer, eds. The global environment: institutions, law, and policy. CQ Press, (2014). Cao, Lanlan, and Daniele Pederzoli. "International retailers' strategic responses to institutional environment of emerging market: Multiple case studies in China." International Journal of Retail Distribution Management 41, no. 4 (2013): 289-310. Chang, Sea-Jin. Multinational firms in China: Entry strategies, competition, and firm performance. OUP Oxford, (2013). Cooley, Charles Horton. Human nature and the social order. Routledge, (2017). Day, Kristen A. China's environment and the challenge of sustainable development. Routledge, (2016). De Beer, K. A., M. Holtzhausen, R. Steenkamp, S. Rudan sky Kloppers, C. Nieuwenhuizen, and M. Kara. Principles of business management. Edited by Johan Wilhelm Strydom. Cape Town: Oxford University Press, (2011). El Namaki, M. S. S. "Does the thinking of yesterdays management Gurus imperil todays companies?." Ivey Business Journal 76, no. 2 (2012): 10-13. Gillespie, Kate, and Liesl Riddle. Global marketing. Routledge, (2015). Guthrie, Doug. China and globalization: The social, economic and political transformation of Chinese society. Routledge, (2012). Heggelund, Grild. Environment and resettlement politics in China: the Three Gorges Project. Taylor Francis, (2017). Huggins, Robert, and Hiro Izushi, eds. Competition, competitive advantage, and clusters: The ideas of Michael Porter. Oxford University Press, (2011). Kwong, Julia. The political economy of corruption in China. Routledge, 2015. Laruelle, Marlne, and Sbastien Peyrouse. The Chinese question in Central Asia: Domestic order, social change, and the Chinese factor. Vol. 29. New York: Columbia University Press, (2012). Li, Shi, Hiroshi Sato, and Terry Sicular, eds. Rising inequality in China: Challenges to a harmonious society. Cambridge University Press, (2013). Liu. Y., Zhang. Y Xu . C. Analysis of the international competitiveness of Chinese medicine industry based on the diamond model. International business research, vol 3(3)., (2010) Lu, Weisheng, Kunhui Ye, Roger Flanagan, and Carol Jewell. "Developing construction professional services in the international market: SWOT analysis of China." Journal of management in engineering 29, no. 3 (2013): 302-313. Otmazgin, Nissim Kadosh. Regionalizing culture: The political economy of Japanese popular culture in Asia. University of Hawai'i Press, (2013). Pound, Roscoe, and Marshall L. DeRosa. An introduction to the philosophy of law. Routledge, (2017). Ragnedda, Massimo, and Glenn W. Muschert, eds. The digital divide: The Internet and social inequality in international perspective. Vol. 73. Routledge, (2013). Sakamoto, Kazutami, Robert Lochhead, Howard Maibach, and Yuji Yamashita, eds.Cosmetic Science and Technology: Theoretical Principles and Applications. Elsevier, (2017). Scuttari, Francesca. "The determinants that influence entry mode decisions of Italian companies in China." (2014). Shambaugh, David L. China goes global: The partial power. Vol. 111. Oxford: Oxford University Press, (2013). Terpstra, Vern, James Foley, and Ravi Sarathy. International marketing. Naper Press, (2012). Wang, Jin. The end of the revolution: China and the limits of modernity. Vol. 40, no. 5. Sage CA: Los Angeles, CA: SAGE Publications, (2011). Yabuki, Susumu. China's New Political Economy: Revised Edition. Routledge, (2018). Yunna, Wu, and Yang Yisheng. "The competition situation analysis of shale gas industry in China: Applying Porters five forces and scenario model." Renewable and Sustainable Energy Reviews 40 (2014): 798-805. Zhang, Sufang. "International competitiveness of China's wind turbine manufacturing industry and implications for future development." Renewable and Sustainable Energy Reviews 16, no. 6 (2012): 3903-3909. Zhong, Yang. Local Government and Politics in China: Challenges from below: Challenges from below. Routledge, (2015).
Sunday, April 5, 2020
Cloning Process Essays - Cloning, Molecular Biology, Genetics
Cloning Process Cloning is the process of creating a genetic duplicate of an individual. Since the February 1997 announcement of the birth of Dolly, a sheep cloned by Ian Wilmut, cloning research has increased greatly. Cloning humans now has become a much greater possibility in society than it was years ago. Scientist are on the edge of a huge breakthrough with human cloning, and society will ask it's self if this should be allowed or not. Many arguments can be made for and against human cloning. Proponents of human cloning may argue that it is just a logical and inevitable advance in science technology. It is, however , risky for human subjects. At the present time, most of the general public is against cloning. Within a few years time, the medical possibilities of human cloning may be attractive enough to change the publics opinion. Reasearchers on human cloning would involve huge risks for the initial clones, because any experiments in human cloning would eventually have to be tested on humans. Human cloning is unethical because of the risks that this practice involves greatly outweigh the bebefits. The technique that produced Dolly the sheep was successful in only 1 of 277 attempts. If this was attempted in humans, it would risk miscarriages in the mother and severe developmental problems in the child. The actual risks of physical harm to the cloned child cannot be certain without conducting experiments on human beings. This itself is unethical because no one knows what will happen and the child is in danger because noone knows what is going to happen, the child could be born disabled and/or have developmental diffuculties. As of now human cloning doesn't seem like a great possibility because of the risk involved and how the general public would react. Some time in the future, maybe the advances in medical technology will allow cloning with no possible risk.
Sunday, March 8, 2020
How the Internet Fuels Terrorism
How the Internet Fuels Terrorism Free Online Research Papers The First Amendment is the bedrock of the United States, and without adherence to First Amendment rights and privileges, America will suffer. The Foreign Intelligence and Surveillance Act (FISA) was first enacted in 1978 and subsequently modified extensively with the USA Patriot Act of 2001. After the tragedy of September 11, 2001, the federal government ramped up its security investigations to gather intelligence on foreign terrorist groups seeking to destroy the spread of democracy. The proliferation of satellite communications is allowing these terrorist groups to exchange information and coordinate attacks on their ââ¬Å"enemies.â⬠Introduction The First Amendmentââ¬â¢s protection of free speech is the United Statesââ¬â¢ bedrock and is being threatened by the internet explosion that is being misused by global terrorists. The explosion in technology over the last two decades laid the framework for interconnectivity opening communication channels twenty-four hours per day, 365 days per year to every corner of the world. Internet connections can be achieved with satellite technology through out the globe allowing entrepreneurs to maintain continuous trade, medical professionals to collaborate cures, academics to correlate research, law enforcement to snoop on every human being and terrorists to plot world destruction. With any good technology, there are always those schemers trying to make illicit profits or to cause harm to settle personal vendettas or advance personal goals. In particular, the United States has taken up radical Islamists as its twenty-first century enemy. The U.S. government has reorganized nation al security to battle the terrorists until financial ruin or victory is achieved over the terrorists. To battle terrorists, America primarily uses the Foreign Intelligence and Surveillance Act (FISA) first enacted in 1978 and subsequently modified extensively with the USA Patriot Act of 2001 (law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001801-000-.html). After the tragedy of September 11, 2001, the federal government ramped up its security investigations to gather intelligence on foreign terrorist groups seeking to destroy the spread of democracy. The proliferation of satellite communications allows terrorist groups to exchange information and coordinate attacks on their ââ¬Å"enemies.â⬠FISA provisions of court ordered warrants by Supreme Court nominees and the Constitution are now being ignored for the sake of fighting the global war on terror. Freedom of Speech When the founding fathers began writing the constitution of the USA it focused on individual rights and responsibilities. The first known formalization of the concept of free speech recorded is the appearance of Sir Thomas More before King Henry VIII in 1523 (Freedom of Speech, 2007). Since free speech has been a governmental concept for only the last six centuries, continued prescription is inevitable. With todayââ¬â¢s litigious society, limits and expanses of free speech will be continually challenged. The United Nations in 1948 attempted to universalize the right to free speech without fear of incarceration (Freedom of Speech, 2007). Certain speech that is intended to incite a riot or violence is generally restricted as the public need to peace and tranquility takes the forefront. Referencing Wikipedia, one must note that many countries are listed for their advances in declarations of rights to free speech, but it is quite notable that Middle Eastern countries are missing . This paper will attempt to bring to the forefront the immense challenge of encouraging technology deployment while maintaining a vigilant watch on terrorists that seek to do harm to America and its many freedom partners. Regulations That Promote Free Speech The Constitution and its Bill of Rights are the foundation of the Freedom of Speech. Our judicial system continually referees challenges to the First Amendment. Landmark cases that limit free speech are noteworthy and somewhat numerous: 1) Miller test for obscenity, 2) Copyright protections, 3) Roth versus the United States, and 4) the Pruneyard Case. Freedom of speech in the U.S. generally allows anyone to say anything, print any publication, or broadcast any media without censorship only to defend its permissibility and its innocence after the fact. Larry Flint is one of those willing to challenge all boundaries of obscenity and be very willing to suffer the consequences. Flint could definitely be called a First Amendment martyr. With so many means of media and communication, many federal agencies come into the foray to protect free speech. Besides federal, common and case law, the United States takes to heart international law such as the United Nations Universal Declaratio n of Human Rights. Article 19 of that UN declaration states, everyone has the right to opinions without interference and to seek, receive and impart information and ideas through any media, regardless of frontiers (Freedom of Speech, 2007). The Federal Communications Commission (FCC) with its traditional challenge of reigning in unruly broadcasters and publishers must now face the perils of unfettered internet access. The internet opens up so many means of communicating ââ¬â both beneficial and harmful. Specifically the FCC utilizes post facto sanctions to punish media providers that violate community standards definitions of obscenity or indecency. Since internet transmissions can come from anywhere in the world into every living room in the world, the FCC has an almost insurmountable challenge to protect the new digital age of communication while building ââ¬Å"firewallsâ⬠to protect against terrorism. Protecting Internet Free Speech The First Amendment will always take the form of granite for America with the judicial system continuing to define the crystals that form the rock. Public action groups such as www.savetheinternet.com and www.MoveOn.org serve as citizen referees to maintain the internet and other public venues available to all to express opinions openly. A recent victory for these groups was the defeat of Senator Ted Stevensââ¬â¢ H.R. 5252 Telco bill that was seen as very pro-industry and anti-public in nature (Huge Victoryâ⬠¦, 2007). The bill and the subsequent fight to defeat featured the concept of net neutrality. Net neutrality focuses on the process design of the internet and not the content; passage of the Stevensââ¬â¢ bill would have allowed internet providers to price web content according to a scale that would have left public non-corporate content at hit 1,000,000 plus. Most call the processing system of the internet, the pipes (internet backbone on servers, fiber optic netwo rks and web portals). Supporters of net neutrality stress that the pipe owners maintain a reasonable separation so content will not be slanted too far left or right. Traditional media such as newspapers definitely show political leanings by their editorials, and the internet serves as the virtual scales of justice. While net neutrality focused on the backbone, other groups trying to protect the internet are the Electronic Frontier Foundation (EFF), the Electronic Privacy Information Center (EPIC), American Civil Liberties Union (ACLU), and the Center for Democracy and Technology (CDT). One example of federal law protecting internet content was the Digital Millennium Copyright Act (DMCA) that offers protection to intellectual property (Free Speech, 2006). Such property takes the form of something as simple as clipart: ?. One well established protection for reporters that allows anonymous sources to remain anonymous is being afforded via internet bloggers for the most part. These attempts to extend free speech protections to the digital world closely track laws and regulations in the traditional beacons of transparency: vagueness, overbreadth, and prior restraint. With the internet being the most participatory form of mass speech yet developed, the right to free speech will be tested until t he end of time. Invasions of Privacy Big brother is watching. George Orwell would love to rewrite his classic book, 1984, based on such organizations as the Army Web Risk Assessment Cell (AWRAC) (Reed, 2007). AWARAC operates automated surveillance of troopsââ¬â¢ blogs and web content to control careless or possible malicious release of secret data. In the meantime AWARAC can scan soldierââ¬â¢s complaints. Many soldiers typically disagree at one time or another about commandââ¬â¢s direction, but the internet allows a bon fire of unlimited blogging that could lead to detrimental troop morale. This example portrays the possibility of common citizen monitoring very plausible. Of course, it is not illegal to search the internet for say military complaints randomly, but if the government sets up digital programs to monitor all lanes of free speech that leaders find displeasing, an invasion of privacy is inevitable. The internet has given birth to the newest crime category and venue of today: cyber crime and internet terrorism. These new crime areas threaten aviation, financial security, national security, identities and national defense. Committing criminal or forbidden acts can take the simple form of posting a blog where an Army unit is traveling. Travel fears should ripple when someone hacks into the Federal Aviation Administrationââ¬â¢s air traffic control server to change location displays of various aircraft in order that several horrendous crashes occur simultaneously. The question remains, if individuals knowingly or innocently violate laws and regulations, does that give the government carte blanche to monitor all internet transmissions? This appears to violate the innate right of Americans to say and print almost anything to only suffer consequences later. To battle these new crime channels, governments must tune traditional intelligence gathering and sharing paradigms. To establish and adjudicate security clearances for all levels of government is essentially unachievable. To fight these new breeds of terrorists, all levels of government must be keen to threats, vigilantly share information with other agencies and in turn receive valuable intelligence to shift resources in preparation for upcoming attacks. Intelligence officers today need to be master surfers as well as master data analysts. When all sects of society join together and the federal government sharpens their intelligence frameworks, homeland security can be continuously improved. Global Internet Technologies To imagine that Americaââ¬â¢s homeland security can be threatened by something as simple as a bicycle powered generator and a 30-inch dish with a $150 laptop changes all preconceived ideas of typical criminal backrooms. Simple technology is being developed to spread educational opportunities throughout the world, but that same capability can easily deliver Al Qaedaââ¬â¢s next operation order to attack a U.S. Embassy in Tanzania. Communication has always been vital to the battlefield, but with instantaneous messaging, Osama Bin Laden could direct a strike against any target at any time with a $100 GPS that is accurate to within 100 feet. Various groups will continue the development of simple and easy to use computing technologies, and this information sharing may help inform diverse groups to understand others so they are not feared or hated. One such foundation is One Laptop Per Child which deploys laptops to impoverished children (Hilton, 2006). These laptops do not have much software but come with wireless network connectivity. Network connections take the form of existing cellular telephone networks, long-range microwave and satellite fed networks. Besides expansion of educational opportunities, this technology explosion opens up new venues for holding national elections, agricultural trading, medical treatment extension, and banking. Internet Technologies Used by Terrorist Originally hackers were very annoying to the point that computers were corrupted requiring operating systems to be reinstalled. Bruce Berkowitz stated in 2001, ââ¬Å"the real threat is not the hackers you see; itââ¬â¢s the ones you donââ¬â¢t.â⬠Now those same hackers are being hired by terrorists to look for data to discover vulnerabilities of their enemies to cause havoc. The simplest method to battle an electronic enemy is to develop advanced technology continuously: firewalls, encryption programs, and training vigilant users. This technology of course has to be home grown. Traditional national security intelligence efforts are known for their reports and briefs and now need to be known for their internet savvy. If the federal government can attract young techies with the glamour to be the next 007, our intelligence efforts will be back at the forefront. As vast and diverse illicit uses of the internet become evermore prevalent, the costs to society to counter cyberterrorism will impact the free flow of information. Intelligence agencies must reform around internet connectivity to analyze potential enemies as well as serving as the microscope to dissect who and what is being planned. Some of the many ways the internet can be used by terrorists are psychological warfare, propaganda, fundraising, recruitment, data mining, and coordination of actions. Foreign Terrorist Organizations designated under the U.S. Antiterrorism and Effective Death Penalty Act of 1996 almost all unanimously maintained websites by year 2000 (Weimann, 2004). These organizations employ webmasters that change internet protocol (IP) addresses almost daily and upload and remove websites as quick as a mouse click. The first avenue of eight different ways to use the internet by terrorists is psychological warfare. All modern armies use some psychological warfare. Terrorist are very good at disinformation causing fear and panic with fake attacks. This method draws eerie similarities to Orson Wellââ¬â¢s War of the Worldââ¬â¢s infamous radio show nearly effecting pandemonium. Information is powerful, and terrorists who learn how and when to spread disinformation may cause almost as much damage as rockets. The USAââ¬â¢s most wanted terrorist organization, Al Qaeda, wages continuous fake attacks on the US, like white envelopes with white powder. These attacks typically cause some level of alarm that impacts the stock and bond markets, but principally diverts intelligence resources away from a possible another September 11, 2001. The second focus area, publicity and propaganda, are used by terrorists to gain public awareness and empathy for their cause and financial support. One key area that is always stressed is the perils faced by their captured comrades. Those prisoners are touted as being religious zealots not terrorists. Religious groups should have a free reign to practice their religion, but when that practice takes the form of collaborated Improvised Explosive Devices (IED), those groups must be controlled. Terrorists claim that their point of view will not be heard without explosions, that their way of life is being attacked by the West, and that their espousing of sovereignty is their sole goal. All of these goals gel easily around the internetââ¬â¢s free, unfettered and uncensored communication. It is strange to think that the internet is the ultimate symbol of a free world but is also a terroristââ¬â¢s greatest weapon. The third area that terrorists focus on is data mining. This area is exploited by all parties ââ¬â good and bad. When one thinks that there are over a billion pages of information on the internet, it is easy to see that this is much more valuable than all the South African diamond mines together. A simple Yahoo search on the term ââ¬Å"internet terrorismâ⬠yields over 24 million hits. Since the internet grows by the nanosecond, information analyzing is becoming infinite. Terrorists form such organizations as the Muslim Hackers Club who disseminates sensitive or classified information such as Secret Service radio frequencies, electronic virus tutorials, and building blueprints (Weimann, 2004). When the US discovered Al Qaeda with U.S. dam drawings, the Army Corps of Engineers stop posting engineering project designs as a part of contract solicitations. These contract packages are now only available on a bona fide need to know. A real security challenge remains to pro tect key infrastructure sites around the world, and this increasing effort to protect will no doubt close venues to public access in the future. How is all of this paid for? Fundraising on the internet becomes a very economical means. Howard Dean displayed in the 2004 US Presidential election that raising funds on the internet is very viable. Terrorist publish overseas account numbers for sympathizers to make deposits. Many groups that appear to be legitimate non-profits are in fact fronts for jihadist groups. One uncanny example is that of Sami Hussayen who was a doctoral candidate in computer science supported by the National Security Agency. He was found to be creating websites that disseminated radical jihadist messages. Supporters of various terrorists are recruited and mobilized easily through the web and its many tangles. The perils of internet cookies tastes bitter when one is considered to be targeted for donations or moral support because of their perusing of terrorist websites. Principally the internet is used to sway sympathizers to join the militias based on their anti-American propaganda and religious decrees. Al Qaeda is the principal group using the internet to stage recruitment campaigns. The internet is also used to invoke public displays of support as demonstrated by the world wide collective protest to the arrest of Abdullah Ocalan, the leader of the Kurdist terrorist group, Kurdish Workersââ¬â¢ Party (PKK) (Weimann, 2004). The internet perfectly enables Al Qaeda and Hamas to form loose coalitions of terrorism organizations. Since these organizations are constantly being hunted by the western world, a traditional hierarchical structure is not easily maintained. The internet lends itself to horizontally organized groups dispersed all over the world. Bombs are being built by these groups with online assembly manuals, and the terror cells are formed lightening quick and text message operation orders are issued to place and detonate those bombs. The seventh area terrorists are using the internet is information sharing ââ¬â collaboration. Three scary publications found on the internet are 1) The Terroristââ¬â¢s Handbook, 2) The Anarchist Cookbook and 3) The Mujahadeen Poisons Handbook. Of course the best of those 3 manuals along with other terrorist publications are collated into The Encyclopedia of Jihad (Weimann, 2004). Information on the internet with evil purposes is not solely privileged for Jihadist groups but also inspires individuals to formulate individual evil. Many other examples in the free world display the unpredictable consequences of having such malevolence information available freely on the internet. The eighth portal that the internet opens to terrorists is the planning and coordination efforts that can be conducted virtually. Planners of September 11, 2001 used public free email accounts to transmit cryptic messages from public internet terminals. Graphic files are used frequently with operation orders embedded behind the graphics for concealment. Anti-terrorist organizations have focused their efforts normally on cyber terrorism and not the routine transmission of complex encrypted email messages containing the next 9-1-1. When the battle begins on the many ways that terrorists use the internet, democracy may be dealt blows with losses of privacy. Terrorists are starting to finance their campaigns by conducting cyber crimes, e.g. brokering stolen corporate secrets. Gabriel Weimann stated in 2004, ââ¬Å"It is a paradox: those movements who criticize Western technology and modernity are using the Westââ¬â¢s most advanced communication technology, the Internet, to spread their message.â⬠As this digital cat and mouse continue their chase, the U. S. Government must balance their aggression against sacred freedoms. Counter Internet Terrorism FISA, Foreign Intelligence and Surveillance Act, first enacted in 1978 as a reaction to the new cold war, started with good intentions, but have gone awry in recent years. FISA is the federal governmentââ¬â¢s most lethal homeland operation platform available to fight terrorism in general. Along with FISA, the more recent USA Patriot Act added complimentary defensive postures. Besides laws, our government uses Computer Assisted Passenger Prescreening Systems (CAPPS II), Terrorist Threat Integration Center (TTIC), the Defense Advanced Projects Administration (DARPA), Terrorist Information Awareness (TIA), and the Privacy and Civil Liberties Board (PCLB) (Steinberg, Graham Eggers, 2003). These modern efforts to secure our national security are force multipliers to the Central Intelligence Agency (CIA) and the Federal Bureau of Investigations (FBI). If all of these national laws, regulations and agencies are worked in concert, all Americans will be safer. FISA details procedures for electronic and physical surveillance and gathering of foreign intelligence information that is between foreign powers. This intelligence gathering should be for the sake of finding terrorist cells that intend harm on America or Americans living abroad. FISAââ¬â¢s very secret court that approves almost baseless warrants to perform physical searches or electronic surveillance programs started being used extensively in year 2000 under President Clinton and even more frequently under the Bush Administration. This secret court is comprised of 11 judges appointed by the Supreme Court Chief Justice and is housed in the Department of Justices. Troubling concerns became public in recent years that the President of the United States conducted electronic surveillance specifically without FISA warrants in the name of fighting the Global War on Terror. FISA was significantly revised with the USA Patriot Act of 2001 to allow intelligence gathering activities on foreign groups that may or may not be backed by a foreign government. The USA Patriot Act approved by Congress as a result of the tragedy of September 11, 2001 was the greatest step-change that the Federal Government has promulgated to protect America while threatening our freedoms commonly called privacy rights. Privacy rights are definitely going to be violated as the Patriot Act is utilized, but it is the terrorist that the wire taps, data mining, and various cyber probes were supposed to target. The Patriot Act is supposed to be used to find foreign threats that generally reside within the United States. Common reactions leading to the Patriot Act were to never allow terrorist to be trained to fly planes in the U.S., travel around the country freely or violate VISA requirements. One overarching goal of the Patriot Act is to coalesce local, state and federal law enforcement agencies into a homogenous intelligence gathering and sharing team to stop terrorists. CAPPS II is being tested by the Transportation Security Administration (TSA), an agency formed as a result of 9-11-01 (Steinberg, Graham Eggers, 2003). TSA intends to scan all commercial airliner passenger manifests looking for potential terrorists. TTIC a creation of 2003 vintage by the George W. Bush administration offers another very pervasive avenue into our everyday lives (Steinberg, Graham Eggers, 2003). TTIC seeks to coordinate information sharing between various intelligence gathering agencies. The goal of TTIC is not to gather more information, but rather to facilitate the collaboration of intelligence agencies to gain analytical synergies. Successful collaboration could lead to protections for critical infrastructure such as agriculture, transportation, water resources, and energy. DARPA sponsors research into data mining techniques and pattern recognition technologies that could develop new tools to discover terrorist plots or battlefield plans by the enemy. One s uch program to mine data is TIA (Steinberg, Graham Eggers, 2003). TIA is designed to detect terrorist groups planning attacks against America. TIA serves as the ultimate blender to integrate various technologies to provide tools to authorized intelligence and law enforcement agencies to gather critical data to detect terrorists. To possibly balance the three above intelligence agencies, the five-member Privacy and Civil Liberties Board has secretly operated for almost a year and will make its first report to Congress soon (Yen, 2007). The Board was intended to be a watchdog over the various FISA and Patriot Act reforms to determine if they have caused unruly invasions into private lives. The Board has looked at international financial transaction monitoring, warrant less eavesdropping, and the Homeland Security Departmentââ¬â¢s no-fly lists. The Board was tasked with looking at how the various oversight activities were conducted so that national security validated warrants and searches without warrants did not cause irreparable harm to America. Citizen Protections from Counter Terrorism Activities FISA courts were set up to serve the President while providing some means of protection for our citizen liberties. One really has to wonder why President Bush avoids the court formed to protect America. In 2000, Judge Lambert discovered that the FBI was misleading the court on the purpose of national security wiretaps. As a result of this courtââ¬â¢s actions, tremendously needed wiretaps of Al Qaeda suspects were shut down. Immediate search and seizures in the name of foreign terrorist surveillance can be made without a warrant, but must be certified by the Attorney General after the fact. Domestically, the FISA court serves as the principal gatekeeper, but internationally the young Council of Europeââ¬â¢s Convention on Cybercrime (CECC) steps into the foray to offer some common sense (Cybercrime Hacking, 2007). Anytime a process is validated by several countries, it should offer greater individual freedom protections. Only time will tell if this international intelligence gathering venue truly gets to the source quicker and more efficiently while avoiding violations of citizenââ¬â¢s personal life. Since all of these information gathering methods involve some form of communication, it must be obvious to realize that the Federal Communications Commission (FCC) must play a key role in protecting constitutional freedoms. A crucial supporting cast to the FCC is the Homeland Security Policy Council (HSPC, 2007). HSPC was formed in late 2001 to strengthen measures to protect U.S. telecommunications, broadcast and communications infrastructure. HSPC was also tasked with being the emergency coordination agency in the event of terrorist attacks on communication systems, providing the means of last resort for first responders to effectively communicate. It is essential that the FCC plays a key role in terrorism awareness as that agency is able to reserve vital frequencies for communication. National disasters such as Hurricane Katrina clearly displayed the importance of interoperability. Besides government sponsored internet protectors, grass roots organizations such as Reporters Without Borders (RSF) maintain websites devoted to uncovering enemies of the internet (Enemies of the internet, 2006). As of November 2006 RSF listed 13 blacklisted countries. RSF has organized online coordinated protests to show worldwide support to maintain a free open internet. A free uncensored internet will keep bloggers posting their complaints about countries that are traditional human rights violators, e.g. China, Iran and North Korea. It will certainly be very interesting to watch whether penetrating U.S. intelligence activities could actually plop America on the predator of freedoms list. Global War on Terror (GWOT) Over $700 billion spent in the last four years and no closer to finding Osama bin Laden or weapons of mass destruction (WMD) makes every taxpayer cringe at the thought of continuing the fight for years to come. The answer to this world dilemma will come from innovative novel solutions. One such potential solution is allowing young scientists to craft means to destroy satellites virtually or physically. The Air Force Research Laboratory in New Mexico houses one such simple group formed to achieve those results. The group is named Space Countermeasures Hands On Program or Space CHOP (Shachtman, 2007). For example this group may go to the neighborhood electronic store to build simple devices that block vital satellite signals. Discovering these vulnerabilities along with hacking in their free time, define the next defensive front that must be armed and ready to protect national assets. For the free world to achieve a semblance of terrorism control, it is simple to see that to be able to fight modern terrorists, one must think and act like one. When someone considers that an individual can peddle an exercise bike to generate electricity to connect to the World Wide Web to transmit a lethal operational order that releases deadly attacks on trains in Spain, advances in counter-terrorism are critical. Instant messaging becomes a normal means of communication for battlefield commanders via PDAââ¬â¢s linked to satellite or cellular systems. Information is available to understand the issues; one such web page by the Counterproliferation Center of the U.S. Air Force lists 28 pages of links (GWOT, 2007). One day, counter terrorism classes may become as common as First Aid classes. Sacrifices for Security Intelligence gathering will not subside anytime soon, so the question must be answered how America will maintain privacy for every citizen and organization. Discussions are really just beginning to start with the apparently never ending GWOT. The public has only learned within the last year or so that the President of the United States authorized search and seizures without warrants to gain information about potential foreign terrorists. Regulations to protect us also offer invasions into every personal life. FISA, CIA, FBI, and our military are intended to make peace, but they also offer chaos. Becoming a better and stronger nation must be the goal of our leaders for all facets of life: education, economics, medical care, safety and democracy. Democracy is what sets America apart with its unlimited entrepreneurial spirit. This spirit in a sense makes close bedfellows with internet hackers. Hopefully each reader can see that creating an atmosphere that allows some harmless hacking actually presents opportunities to build new firewalls from terrorists. The key to fighting todayââ¬â¢s and tomorrowââ¬â¢s radical terrorists lies within the internet. Sophisticated terrorists are the norm, and America must develop a new army of cyber warriors. Do you feel the calling? References Attacking Terrorist Networks at Home and Abroad, The White House, Washington, accessed February 20, 2007. Becker, Gary S., Why a Crash Wouldnââ¬â¢t Cripple The Economy, Hoover Digest No. 4, Hoover Institution, 1997. Berkowitz, Bruce, Fixing U.S. Intelligence, Hoover Institution, March 19, 2001. Berkowitz, Bruce, Preparing for the Computer Wars, Hoover Institution, August 13, 2001. Censorship Fears over New Online Ethics Commission, Reporters Without Borders, February 16, 2007. Cybercrime and Hacking, Computer World, IDG News, August 04, 2006. Enemies of the Internet Named, BBC News, London, November 7, 2006. FCC To Study ISP Business Practices, Stars and Stripes Volume 4, Number 346, Department of the Defense(DOD), 2007. 50 USC 1801, , law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001801-000-.html, accessed April 21, 2007. Flexible Deployment Assistance Guide 2nd Edition, Packet Mode Communications, Communications Assistance for Law Enforcement Act ââ¬â CALEA, August 2001. For $150, Third-World Laptop Stirs Big Debate, New York Times, November 11, 2006. Foreign Intelligence Surveillance Act of 1978, Wikipedia, accessed February 4, 2007. Free Expression, Center For Democracy Technology(CDT), 2007. Free Speech, Electronic Privacy Information Center, 2007. Freedom of Speech, Wikipedia.org, 2007. Global War on Terrorism (GWOT), U.S. Air Force Counterproliferation Center(USAFCC), accessed February 21, 2007. Glusing, Jens, Rao, Padma Himar Schmundt, The Dirt Road to the Information Superhighway, Spiegel Online, June 01, 2006. Goodman, Seymour Sofaer, Abraham, The Transnational Dimension of Cyber Crime and Terrorism, Hoover Institution, 2007. Help Us Protect Free Speech Online, Electronic Frontier Foundation (EFF), 2007. Homeland Security Policy Council, Federal Communications Commission, Washington, accessed February 21, 2007. Huge Victory for Real People as Telco Bill Dies, savetheinternet.com, 2006. Lame Duck Alert: Donââ¬â¢t Let Senators Sell Us Out, savetheinternet.com, 2006. Lawmakers: Abuses Could Lead to Cuts in FBI Power, Associated Press, Stars and Stripes Volume 4, Number 343, Department of the Defense (DOD), 2007. Nakashima, Ellen, Business transactions rely on flawed terror watch list, Washington Post, Stars and Stripes, March 28, 2007. Oââ¬â¢Brien, Teri, Did the FISA Court Stop Us From Connecting the Dots?, Free Republic, January 3, 2006. Privacy Technology: Internet Free Speech, American Civil Liberties Union (ACLU), 2007. Reed, Fred, Troopsââ¬â¢ Blogs Under Scrutiny, Washington Times, February 17, 2007. Shachtman, Noah, The Satellite Hackers, Popular Mechanics, February 2007. Sniffen, Michael J., FBI chief defends bureauââ¬â¢s authority to spy, Associated Press, Stars and Stripes, March 28, 2007. Steinberg, James B., Graham, Mary, Eggers, Andrew, Building Intelligence to Fight Terrorism, The Brookings Institution, September 2003. Swartz, Jon, Terroristsââ¬â¢ use of Internet spreads, USATODAY.com, February 20, 2005. Weimann, Gabriel, www.terror.net: How Modern Terrorism Uses the Internet, United States Institute of Peace (USIP), March, 2004. Yen, Hope, Board OKs eavesdropping, financial tracking, The Associated Press (AP), Washington, March 7, 2007. Research Papers on How the Internet Fuels TerrorismThe Effects of Illegal Immigration19 Century Society: A Deeply Divided EraTwilight of the UAWNever Been Kicked Out of a Place This NiceGenetic EngineeringDefinition of Export QuotasAppeasement Policy Towards the Outbreak of World War 2Relationship between Media Coverage and Social andBringing Democracy to AfricaQuebec and Canada
Friday, February 21, 2020
Do economist matter Assignment Example | Topics and Well Written Essays - 250 words
Do economist matter - Assignment Example He points out that the public is uneducated in economic theories. Moreover, people and institutions of influence tend to muddle up these economic laws in order to server their own vested interest. Ultimately, the public is not only uneducated, they are also miseducated in the theories of economics and even refuse to be educated in these areas. In addition, even economists themselves rarely adhere to the economic theories that they themselves preach as they take into account external factors such as family security, pride, and societal acceptance. As such, economists end up sending messages that the public would be more comfortable to hear. This dilemma is further aggravated by the fact that economic theories have been, and may be, tested out on very limited platforms. Thus, economists usually have their hands tied and their tongues curled in defense of economic theories that may or may not work. Overall, Stigler illustrates that economists are almost always torn between being an academic who incessantly explains theories to an unaccepting public and an implementor whose proposals are periodically squashed by an unbelieving society. Either way, an economistââ¬â¢s quest for popularity and for influence will, in Stiglerââ¬â¢s view, most likely lead him to parallel
Wednesday, February 5, 2020
Critical Reflection Essay Example | Topics and Well Written Essays - 1500 words
Critical Reflection - Essay Example During the second seminar, members of the forum discussed debated on several issues that face if not the society, the issues face humanity. Some of the common issues debated during this case include; the aspect of sexual desire, social isolation, anger as an aspect of motivations, personality disorder and the aspect of being sadistic. Other debated topics included sexuality, fantasy, characters of the perpetrators, actions and victimââ¬â¢s psychological features. However, the main topic of the seminar was sexual offending and sexual homicide. During the first seminar discussion, it was revealed that violent crime entails a crime whereby the offender threatens or uses violence upon an individual. In most cases, violent crimes entail crimes whereby the main objective is violent act. Alternatively, violent crimes include the types of crimes, which are committed with weapons. The seminar revealed that violent crimes are always seen as negative and unnecessary. Most of the members drew a conclusion that violent crimes always turn out as bad, dangerous and ugly towards fellow human beings. However, it was also discussed that violent crimes can be ambiguous along with power dimensions which mostly results in ineffectiveness and weakness. Some members of the seminar however were of the opinion that acts of violence remain a successful aspect of social positioning. In response to the aspect of media perceptions of violence, the discussion generally established that there are three different fundamentally spheres of media communication which generally interact the aspect of violent crime. The three aspects include the entertainment aspect, online and news. Further discussions revealed that the three spheres are subdivided into media sub-spheres, which include television, radio, films and the internet. These forms of media and sub-media aspects play an essential role in interacting with a near inexhaustible crime numbers as well as crime control activities
Tuesday, January 28, 2020
Introduction Of KFC In Mauritius
Introduction Of KFC In Mauritius The necessity for all human being is eating which is observably a daily action. For eating at restaurants, it depend on an individuals reason and is intentionally or instinctively assess by a multifarious set of attributes ahead before choosing a restaurant. Thus, this study is to investigate how much service quality has an impact on customer satisfaction and retention especially in our Mauritian context at KFC. As there is a casual inter-relationship between customer satisfaction and service quality, this study aims to find out the effectiveness of the service dimensions of service quality which leads to customer satisfaction and finally to retention at KFC. An individual feeling of pleasure and disappointment is known as satisfaction and the customer satisfaction is very important for any organization. All the main aspects will be analyzed and recommendations will be drawn out for better improvement. Company Background History Kentucky Fried Chicken (KFC) was founded by Colonel Harland Sanders in 1952 and its primary focus is fried chicken. KFC also offers grilled and roasted chicken products, wraps, salads, sandwiches and desserts as well beef based products outside the USA. Although the death of Sanders in 1980, he remains a vital part of the firms branding and advertisements, and Colonel Sanders or The Colonel is a metonym for the company itself. In 1991, the abbreviated form of its name KFC was adopted by the company. The Present KFC operates more than 5,200 restaurants in the United States and more than 15,000 units around the world. In 109 countries and territories around the world, KFC daily serves more than 12 million customers. KFC is world famous for its Original Recipe fried chicken, made up of 11 herbs and spices secretly blended together. Colonel Harland Sanders perfected more than a half century ago. Based on the Fortune 500 List, KFC is ranked on 239 positions with revenues in excess of $11 billion in 2008. Introduction of KFC in Mauritius With time, consumers were more demanding for large variety of food and then, the first KFC outlet was launched in Mauritius-1983. Pick N Eat is the company which operates the KFC franchise in Mauritius. KFC has carved a solid reputation as a quick service restaurant which provides quality products and service. Across our island, 18 outlets are spread out and 10,000 customers daily are enjoying their finger-linking favorites in the consumer-friendly environment. Background of the program In the fierce competition, the market trend has changed noticeably from agricultural to service market. The service sector especially fast food industry is in a rapid growth and gain a sustainable position in the market due to lack of time to prepare food and dual income families. All of the fast food businesses are trying their best to improve their service quality in order to make customer satisfied and return back to them again. They are concentrating more on service quality in order to meet the needs and expectations of the customer. The more satisfied the customers are, the more likely they are to return to the restaurant. The fast food industry has undoubtedly not been free from either augmented competition or from increasing customer expectations regarding quality. In the fast food industry, the perceived quality holds a great importance to create a retention effect for customers. So the fact is that when the service providers are able to satisfy its customers with good manage rial arrangement, the foods quality provided, have efficient staff, then a positive outcome is seen in customers retention in a particular restaurant. Problem Statement Service quality is a vital strategy for any restaurants, success and repeat business and it has long been defined by adopting a rather more customer-oriented view and not by the restaurateur-oriented (Saleh and Ryan, 1991). Customer is the key role in any business, without any customer it is difficult to do business. It is necessary to work closely with your customer. As customers can also create your business, thus, customer is the major part of business and also in the market. Business runs through customer, without the customer there is no business. Due to the increasing competition with other restaurants and quality-conscious customers, it is vital to carry out this research. There is a need for further improvement in order to face the competitors and meet the increasing customers expectation concerning quality. Based on the actual service quality performance of KFC, it is important to identify if customers are satisfied with the current situation and are likely to retain at KFC or switch to other competitors. Also, to find out the factors of service quality that leads to customer satisfaction and retention. From the above reasons, it is important that the service performance meets or exceeds customers and their expectation, the customer will be satisfied. Service quality is an antecedent of customer satisfaction. Therefore, this warrants a study to assess the customers expectation and perception, examine its discrepancy gaps and the service quality dimensions that influence customer satisfaction and retention. Research Objectives -To determine customers expectation and perception level towards service quality. -To identify the discrepancy gap between customers expectation and perception level towards service quality. -To identify the SERVQUAL dimensions which have an influence on customer satisfaction and retention? Research Questions -What is customers expectation and perception towards service quality? -What is the discrepancy gap exist between customers expectation and perception towards service quality? -What are the SERVQUAL dimensions which have an influence on customer satisfaction and retention? Aims of the study This study is to find out whether the service dimensions have an impact on customer satisfaction and retention at KFC by using the SERVQUAL Model by Parasuraman, Zenithaml, and Berry (1988). It will also explore the service aspects that affect and influence customer satisfaction and retention. Significance of the study This study will act as a practical guideline for KFC, especially for the management and the front line employees which may increased a higher level of customer satisfaction in the near future. The results of this quantitative assessment of service quality may provide some insights into how customers rate the service and assessed customer satisfaction at KFC. The outcomes will utilize as a basis to improve their existing service quality or to develop a new one in order to meet with the customers needs and satisfy them. Furthermore it will help KFC managers to know if they are providing services according to the norms established by customers. The management will be able to come up with a strategy for upgrading their service quality which will definitely lead to customer satisfaction and retention. All these views of customers will help KFC to remedy problems if there are and maintain their service quality. Phases of the discussion Introduction In the first chapter, the problem area is discussed with a deeper understanding regarding the research. The problem discussion ends with a research objectives and questions. In the end of this chapter, the contributions of this research are also presented. Literature Review In the literature review, the service qualitys impact on customer satisfaction and retention is discussed with the following purposes of assessing customers expectation, customers and employees perception, identifying their gaps and the influencing service quality aspects. Research Methodology ************************************* Analysis ************************************************* Conclusion and Recommendation ******************************************************** Conclusion The first chapter provided us a background to the outline of the dissertation. It contained the research context, which is, identify the problems, and establish its aims and its objectives, set out the research questions and finally present the outline of the study. Chapter 2- LITERATURE REVIEW 2.1 Introduction This chapter will give an overview of literature and models that presented by writers and journalists. It will support the research objective presented in the previous chapter. The chapter will elaborate the concepts of service, service quality, customer satisfaction, customer retention, service quality dimensions, the gaps and others. 2.2 Fast Food Industry The fast food industry is also known as Quick Service Restaurants (QSR) and has been serving delicious food for as long as people lived on. The fast food generally refers to the food served to customers in form of packaged for takeout or on the spot with minimum preparation time. The Mauritian fast food industry was primarily started with the famous dholl-puri and is still in great demand. But, due to globalization, the fast food industry has gradually breakthrough the Mauritian lifestyle. The consumer demand has evolved as they demand for a variety of food in a comfortable, stylish place and for busy people a quick bite at all times of the day. Today, these products form part of the Mauritian lifestyle and culture. People look for the convenience in order to improve their lives and productivity. Recent studies have shown that one out of every two-and-a-half-meal today is eaten away from home (Kara et al 1997). The fast food industry is not without its challenges. There is an increased focus on the quality of food served in the fast food restaurants. But, in this fierce competition of today, the right marketing approach and application of service quality is vital to compete with competitors as well as retain customers. The fast food industry is large and diverse in itself with lots of opportunities that challenge is being answered with new offerings and strategies to lure consumer back in. In the new emerging fast food industry, KFC is expanding in accordance with the customers demand despite the environmental problems and provide its potential to give a meal in a pleasant atmosphere. Jang Namkung (2009) proposed three factors: service and product quality as well as the atmospherics element are considered as the main restaurant attributes affecting the perceived quality of customers experiences at a restaurant. The total dining experience in a restaurant is comprised of not only food itself, but also the atmosphere (physical aspects) and the service provided. Thus, the fast food industry is based on the principles of quality food served fast and requires fast-reaction solutions to customers needs if they want to satisfy and retain customers. 2.3 Service There are many definitions concerning the concept of service by researchers. The term service was describe by the author Gronroos (1983) as: An activity or series of activities of more or less intangibles nature that normally, but not necessarily, take place in interactions between the customer and service employees and/or physical resources or goods and / or systems of service provider, which are provided as solutions to customer problems. Another definition was given by the author (Payne, 1993) said that service is Any primary or complementary activity that does not directly. Produce a physical product that is, the non-goods part of the transaction between customer and provider. Whereas Kotler et. al. (1999) is of opinion the service is regarded as any activity or benefit that one party offers to another which is essentially intangible and does not result in the ownership of anything, and it may or may not be tied to a physical product. Normally, lots of people are involved in a s ervice process and it is tough to do an analysis of service or to duplicate the same service exactly. In today market, products heavily rely on its service to acquire competitive advantage and to satisfy customers needs. Each authors mentions service as an exchange between the service provider and customers as well as its intangibility nature. The most vital point is simply the participation of the customer in the service process. KFC provides quality product and service with full customers interaction. 2.4 Service Quality In the service industry, service quality has become a crucial tool. Practitioners are more interested in the concept of service quality which has an advantageous effect on the outcome performance for the company. Service quality is a critical element of customer perceptions as well as in determining customer satisfaction. Various experts have defined service quality differently. Parasuraman et al. (1985) proposed a formal definition of service quality as the degree and direction of discrepancy between customers service perception and expectation. Satisfaction occurs when the expectations meet or exceed the performance level whereas customer dissatisfaction occurs when the expectation is below the perceived quality. Asubonteng et al. (1996) defines service quality as the extent to which a service meets customers need and expectation. Hooley, Saunders and Piercy (2004) A prime factor in differentiating the product or service from that of competitors is quality. Quality concerns the fit ness for purpose of a product or service. For manufactured products that can include the durability, appearance or grade of the product while in services it often comes down to the tangible elements of the services, the reliability and responsiveness of the service provider, the assurance provided of the value of service and empathy, or caring attention, received. According to these authors, the service quality is normally the customer perceptions and the organizations activities together with delivering quality service that matched to customer expectations on a consistent basis. Service quality is a key survival of all restaurants as it is the most powerful competitive weapon that can be used against competitors and to attract as well as to retain customers. These authors highlights that two main factors affect the quality of a services, that is, expected service and perceived service. 2.5 SERVQUAL Approach The SERVQUAL framework has come up for the purpose to improve service quality in services and retailing organizations as it has suggest that customer satisfaction is based on multiple factors rather than one. The SERVQUAL method was developed by Parasuraman et al. in 1988 as a technique used to perform a gap analysis of an organizations service quality performance against customer service quality needs. Parasuraman et al. (1988) came up with five dimensions (grouped with 22 attributes) to measure service quality which is responsiveness, assurance, tangibility, empathy and reliability. The SERVQUAL instrument is regarded as a reliable method of measuring service quality (explore customers expectation and perceptions), which in turn leads to a measurement of customer satisfaction. Internationally, KFC already have a service quality assurance team for regular surveys with a theory known as CHAMPS (consist of cleanliness, hospitality, accuracy, maintenance, the standard of product quality plus service speed). This is to evaluate the customers experience whether they are satisfied or not with the products and services. In Mauritius, KFC has already executed the theory of service quality and conduct survey concerning the services. Thus, in the study, the SERVQUAL method will be used for further research work. 2.5.1 SERVQUAL Dimensions In 1985, Parasuraman et al. has identified ten determinants for measuring service quality which are as follows: responsiveness, reliability, access, competence, courtesy, credibility, communication, security, tangibility and understanding or knowing the customer. Later, in 1998, Parasuraman et al. refined the model to the useful acronym RATER:- Reliability It is defined as the ability to perform the promised service dependably and accurately or delivering on its promises (Zeithaml et al., 2006, p. 117). It is one of the most important service components for customers as it implies doing it right the first time. The service organizations need to keep its promise and maintain an error free record. The reliability factors are efficiency in the billing system, consistency in serving customers, and the staff performs tasks that have been promised to guests and well trained staff. For the food beverage industry, reliability can be interpreted to mean fresh food delivered at the correct temperature and accurately the first time (Andaleeb Conway, 2006). In the Mauritian context, KFC has its own training center recognized by the franchisor for their staff. The chicken is prepared on the spot and they make sure that the service delivery is consistent and timely. The most significant policy of KFC is evaluating the customers experience with its service, whether they are satisfied or not. They can also put their comments and suggestions for further improvements of the products and services of KFC. Assurance Assurance is defined as the employees knowledge and courtesy and the service providers ability to inspire trust and confidence (Zeithaml et al., 2006, p. 119). The assurance factors are staffs knowledge about the menu, safety, security, trustworthy and friendly staff. Customers are more likely to use tangible evidence to assess the assurance dimension such as awards or special certificates which give a new customer confidence. KFC has achieved National Quality Awards and have a Hazard Analysis Critical Control Point (HACCP) program is implemented in order to identify, evaluate and control any physical and environmental hazards in the work place. And the logo of HACCP is visible in every restaurant as an assurance dimension. Tangibility Tangible is defined as the physical facilities, equipment, staff appearance and others. In accordance with the author, Zeithamal et al. (2006) this dimension is comprised to the current appearance and shape of the cutlery, the restaurants interiors decor, silverwares and the uniform of the staff, the layout and appearance of the menu list, restaurant signage and advertising campaign. Tangibles are used by firms to convey image and signal quality (Zeithaml et al., 2006). Customers use this dimension to evaluate the quality. KFC has its own evidence of its service in terms of products, packaging, printed and visual marketing materials, websites, and staff appearance, virtual evidence of handling queries and feedback through Facebook and other online services. Empathy Empathy is the extent to which caring individualized service is given to a customer. The customer is treated as a king. Many small companies use this ability to provide customized services as a competitive advantage over the larger firms (Zeithaml et al., 2006). The empathy components are willingness to handle requests, give individualized attention to customers, and show enthusiasm to serve and to answer to all queries accurately. Empathy may be important to ensure customer loyalty as the server knows how the customer likes his or her food prepared. In return, the customer is easily approach and spell out their needs to the service provider. If a company looks its customer as an individual, as result, the company will come out as a winner. KFC take care of each individual customer by providing the meal according to the customer requirement. Such as, a meal can be upgraded by adding cheese, pineapple, tomato, plain or spicy chicken as per the customers taste. Before launching a new product, KFC take care of its customers opinion into consideration through Facebook and keep continuous communication with the customer through regular survey. Responsiveness Responsiveness is defined as the willingness to help customers and provide prompt service (Zeithaml et al., 2006, p. 117). The responsiveness factors are short waiting period for the service delivery, attend complaints quickly, availability of staff when needed and restaurants action upon customer suggestions. In order to be responsive, a service provider has to determine how long it would take to get answer or to solve a problem. To be successful, companies need to look at responsiveness from the view point of the customer rather than the companys perspective (Zeithaml et al., 2006). This dimension captures the notion of flexibility and ability to customize the service according to the customer needs. KFC handle complaints quickly especially through Facebook and the staff are willing to help customer as well as keeping in mind for short waiting period in service delivery. 2.5.2 Service Quality Gaps Model In 1990, Zeithaml, Parasuraman and Berry have developed a survey instrument to measure the gap between customers expectation for excellence and their perception of actual service delivered. The SERVQUAL model uses the terms that describe one or more determinants of a quality service encounter. Gronroos (1982), Lewis and Booms (1983); Parasuraman et al. (1985) have the same opinion that the most frequently used approach to measure service quality is SERVQUAL to compare the customers expectation prior to the service encounter and their perception after the actual service delivery. Basically, there are seven principal gaps in the service qualitys concept, out of which Gap 1, Gap 5 and Gap 6 are more associated with the external customers as they have a direct relationship with customers. Figure 2.1: SERVQUAL or Gaps Model (Zeithaml Parasuaman Berry 1988 Gap 1: Management perceptions of consumer expectations and Customers expectations and It is the knowledge gap which portrays the difference between the management beliefs about customers, expectations and what customers actually need and expect. This gap happens when there is insufficient flow of communication upwards, lack of marketing research orientation and too many level of management. Gap 2: Management perceptions of consumer expectations v/s service specifications It is a policy gap where a difference occurs between management perceptions regarding customers expectations and service specifications are set for service delivery. The reasons for this gap are unfeasibility, inadequate commitment to service quality and task standardization as well as an absence of goal setting. Gap 3: Service quality specifications opposite service delivery It is the difference between the service specifications and the service delivery teams actual performance on these specifications. The gap is a result of poor employee-job fit, lack of perceived control and lack of teamwork. Gap 4: Service delivery v/s external communication to customers The communication gap is the difference between what the company communicates and what is actually delivers to the customer. It is due to inadequate horizontal communications and propensity to over- promise. Gap 5: The discrepancy gap between customers expectations and customers perceptions of the service delivered It is the difference between what has actually delivered and what customers feel they have received. Customer expectations are influenced by the extent of personal needs, past service experiences and word of mouth recommendation. The difference occurs when customers are influenced and service provider has shortfalls. Gap 6: The discrepancy gap between customer expectations from the service provider and employees perceptions of consumers expectations The service quality gap is what the customers expect to receive and their perception of the service that is actually delivered. There is a difference in the understanding of customer expectations by front-line service provider. Gap 7: The discrepancy gap between employees perceptions and management perceptions of consumers expectations This gap is mainly an internal difference in the organization such as differences in understanding of customer expectations between management and employees. 2.6 Customer Satisfaction Customer satisfaction is the heart of marketing. Customer satisfaction is the customers evaluation of the service or product against if their needs and expectations are meant. For any restaurant, customer satisfaction is more important as it forms a part of marketing. In past years, customer satisfaction was not that important but today it is the most important issue in term of the most reliable feedback for a restaurants excellency. Richard L. Oliver (1997, P.13) define customer satisfaction as Satisfaction is the consumers fulfillment response. It is a judgment that a product or service feature, or the product or service itself, provides a pleasurable level of consumption-related fulfillment. Customers satisfaction is highly influenced by their characteristics, their emotional responses and their perceptions of equity. As Kotler (2000, p.36) defined that satisfaction is a persons feelings of pleasure or disappointment resulting from comparing a products perceived performance (or ou tcome) in relation to his or her expectation. If the performance didnt meet the expectation of the customer, then dissatisfaction will occur. If the performance exceeds the customers expectation, then satisfaction will occur. If the performance exceeds more than expected, then the customer will delighted. In the context of customer satisfaction, Johnston and Clark (2005) have describe it as Service as the combination of outcomes and experience delivered to and receives by a customer. Customers therefore judge the quality of the service on the experience as well as the outcome. Due to current competitive edge, customers are abreast with the fact of product quality and every service provider is interested to satisfy customers needs and wants. All of three authors explain customer satisfaction as a bunch of desired expectations of a customer that has been fulfilled by the service provider. But, Richard L. Olivers definition is more applicable in this research work which emphasis that satisfaction is based upon service itself. KFC take care for its customer satisfaction by providing an online questionnaire on its website regarding customer satisfaction. 2.7 Customer Retention Lovelock (2004) illustrates importance of customer retention The hardest part of a business is customer retention. If a company does not retain its customers, inevitably it will fail. Marketing essentially means keeping customer loyalty. In order to have a good lifetime value of customers, an organization needs to have good strategies to retain them and arouse loyalty within them for lifetime. Laura Lake (2010) defined Customer retention is not only a cost effective and profitable strategy, but in todays business world its necessary. This is especially true when you remember that 80% of your sales come from 20% of your customer and clients In the starting point of a business, customer retention is very important as the cost involved in attracting new customers are five times higher than retaining an existing one. Hill and Alexander (2006) defined It is becoming accepted that there is a strong link between customer satisfaction, customer retention and profitability. By fulfilling cust omer expectation, an organization provides all service according to the customers preferences and in return, the customer is loyal to the organization. It makes profit for the organization and organization has to retain by providing continuous good services, better customer satisfaction and that will be profitability for the organization. So, organization has to make strong relation with customers as high rates of customer retention are a competitive weapon against its competitors. By having a questionnaire always on the website, KFC is trying to take care of that small segment of customers who are satisfied or dissatisfied with its service quality. In this way, KFC tries to retain those happy customers than losing them. 2.8 Customers expectations and perceptions 2.8.1 Customers expectations Customer expectations are increasing day by day and demanding for quality products and services; therefore expectations play an important role in the formation of customer satisfaction. The term expectations really matters to companies because they want to know what customers expectations are. According to Oliver (1981) à ¢Ã¢â ¬Ã ¦ expectations are consumer-defined probabilities of the occurrence of positive and negative events if the consumer engages in some behavior. Customers form their expectations from their past experience, friends advice, and marketers and competitors information and promises. Organizations in order to keep expectations from rising, they have to perform services properly from the first time (Parasuraman et al. 1988). There is tendency that if a service is not delivered as promised, thus the customers expectations are likely to rise in the next encounter. Expectations serve as reference points in customers assessment of performance (Cronin Taylor, 1992). Th e purpose of trying to understand customers expectations is trying to ensure that service can be designed and delivered in order to meet those expectations. If the operation meets the expectations, or indeed exceeds them, then customers are satisfied with the service. If they are satisfied they are more likely to become valuable customers who not only use the service again, but are positively disposed towards it and may even recommend it to other Johnston and Clark (2005). Therefore, the perceived service quality is viewed as the difference between consumers perceptions and expectations for the service provided. 2.8.2 Customers perceptions Mc Kenna (2000) is of opinion that perception is a vital process in a persons life where he or she has to manage and interpret a situation or an event to define a particular respond. Service firms must understand the concept of service quality from the point of view of the customer, not from the view point of the service firm or service provider. Besides, customer perceives services in the response to quality pertaining to the service and the extent to which they are satisfied with the overall service with their experiences (Zeithaml and Bitner 2003). The customer satisfaction is determined by the customers perceptions and expectations of the service quality. Customer perceives services in terms of the quality of the service and how satisfied they are overall with their experience. The customers perception varies from customer to customer and each one has different beliefs towards the services that play a crucial role in determining customer satisfaction. Therefore, customer percepti on and customer satisfaction are very closely linked together, because if the perceived service is close to customers expectations it leads to satisfaction. Satisfied customers provide recommendations; maintain loyalty towards the company and customers in turn are more likely to pay price premiums (Reichheld, 1996). As such, perceived service quality is a key component of customer satisfaction. 2.9 Relationship between service quality and customer satisfaction A great emphasis need to be heightened on service quality and customer satisfaction. In old times, customers were not concerned about quality and their satisfaction does not have such importance. But, today,
Sunday, January 19, 2020
Human Resource Mangement Essay -- Personnel Management
Human Resource Mangement Describe and critically evaluate the key factors that shape the role and practices of the HR/Personnel function within an organisation with which you are familiar. On the basis of your analysis identify the main HR challenges currently facing this organisation. Relate your analysis to appropriate literature. Introduction People are an important and expensive resource to a business. This asset has the capacity to be highly productive and generate revenue for the firm, but it also requires much attention and maintenance. When the direct costs of employment are added to the indirect costs of recruitment and selection, training and development, the organisation's investment in an average full-time employee can exceed à £100,000 in a short space of time. Therefore one of the fundamental factors is how to attract the right employee and retain their services, gaining efficiency throughout. Before answering the first part of the question ââ¬Å"Describe and critically evaluate the key factors that shape the role and practices of the HR/Personnel function within an organisation with which you are familiarâ⬠, the differences between HRM and the older style ââ¬ËPersonnel Managementââ¬â¢ requires defining. Human Resource Management HRM can be defined as any part of the management structure that relates to people at work. It involves everything from recruitment to training to performance appraisal and overall employee welfare. HRM is originally an American management term that has taken over from the more restrictive 'Personnel Management', and denotes a more proactive and business-focused role, with an emphasis on good communication and staff commitment, more flexible work practices, and performance-related reward systems. http://www.leavingcert.net/. Once considered a more peripheral activity, HRM has now moved to the core of the business. The authorââ¬â¢s own perspective of this assignment is delivered from within the steel industry. An employee in middle management with a history of working from grass roots to Manufacturing Manager over a 10 year period within the Basic Oxygen Steel making plant (BOS). A plant where the iron from the Blast furnace iron is refined and then re-alloyed to be supplied at the correct time temperature and specification to the Continuously Cast plant (CONCAST) where semi-finished products are ... ...emphasis on good communication and staff commitment, more flexible work practices, and performance-related reward systems as opposed to Personnel Management These philosophies are carried out by the first line management, which begs the question, ââ¬Å"Have the lesser experienced plant personnel carried out a process that has inherently been carried out by trained professional HR managers and got the numbers wrong, furthermore, was it implemented correctly? Overall because of the reduction in numbers within the HR department, Plant managers and Line managers are now carrying out many tasks and the HR department have a significantly lesser role in the organisation. With no forecast of any change in philosophy and increase in expenditure then the situation is unlikely to change. The input of an active Trade Union and informed official needs to be considered, there is a definite need for both and the HRM department must ensure that a relationship continues. Bibliography: Human resource Management, A Contemporary Perspective, 2nd Edition, 1997. Ian Beardwell and Len Holden. Human Resource Management, ââ¬ËRhetoricââ¬â¢ and Realitiesââ¬â¢. Karen Legge http://www.leavingcert.net/
Subscribe to:
Posts (Atom)