Sunday, May 31, 2020
Sailing Ship Effect - Free Essay Example
MGMT002: Technology World Change - AY 2009-2010, Term 2 Student Paper Review, Howells (2002) The response of old technology incumbents to technological competition ââ¬â Does the sailing ship effect exist? Prepared for: Dr Terence Fan Prepared by: Nicole Isabella Aw Su Sien (G14) Howells presents the audience with a critical view of the ââ¬Ësailing ship effectââ¬â¢ and postulates that it is triggered by misinterpretations based on insufficient knowledge, and that the mere existence of this effect is rare. This ââ¬Ësailing ship effectââ¬â¢ is the process whereby the advent of a new technology engenders a response aimed at improving the incumbent technology. I am inclined to Howellsââ¬â¢ view and will further demonstrate this below. There is evidence to believe that the sailing ship effect is existent in the world today. Cooper and Schendel (1988) considered 7 different cases and I would like to focus on the case between vacuum tubes and the transistor. A simple timeline of the development of the vacuum tubes has shown that the old technology (vacuum tubes) continued to be improved and reached its highest stage of technical development only after the new technology (transistor) was introduced. Nonetheless, there is still insufficient evidence to definitely conclude that the sailing ship effect did take place. The sailing ship effect is challenged due to the number of externalities involved in the technological development of any product, making it difficult to conclude that accelerated improvements made by incumbent technology is driven solely by the emergence of new ones. Granted, there is a timely connection between the arrival of new technologies and the accelerated improvement of old ones, however, one must question the genuine motivation for this action (government funding, ââ¬Ënormalââ¬â¢ intra-industry competition, lock-in effect or arrival of new technology). The Flettner rotor ship, for example, was a ââ¬Ëgovernment-inspiredââ¬â¢ project. Research and Development (RD) is essential in the improvement of any technology. The availability of funds is a problem many firms face, however, with high barriers to entry coupled by financial support from the government, it is not difficult to understand how this could provide the impetus for accelerated improvement of a technology as a firm would want to gain monopoly in the industry. In the Alkali industry, the Claus-Chance process was already in the works before the threat of the Leblanc process. This shows that even without the presence of new technologies, accelerated improvements are still being made. I believe that the extent of the sailing ship effect can also be related to the substitutability of the old and new technologies. The more substitutable the new technology is, the greater need to invest in the improvement of the old technology to maintain competitiveness in the market (assuming the firm does not exit the industry or switch from old to new technology). This could be a factor, which allows the coexistence of both old and new technology. The advancement of cameras today illustrates the aforementioned idea. Despite the technological advancement of cameras (from film to digital), digital cameras and film cameras still coexist in the market because of their relatively low substitutability (as film photography is different from that of digital photography). It would be fallacious to argue that the lack of evidence of the sailing ship effect would mean that it is non-existent. Therefore, I do not believe that this effect is non-existent but support Howellsââ¬â¢ viewpoint on the rarity of the sailing ship effect because it is too superficial to claim that the advent of new technologies provided the main driving force for the accelerated improvement of old technologies.
Saturday, May 16, 2020
Different Approach of International Business - 6472 Words
Different approach of International Business In truth, we have become part of a global village and have a global economy where no organization is insulted from the effects foreign markets and competition. Indeed, more and more firm are reshaping themselves for international competition and discovering new ways to exploit markets in every corner of the world. Failure to take a global perspective in one of the biggest mistakes managers can make. Thus we start laying the foundation for our discussion by introducing and describing the basic of international business. International Business: An international business is one that is based primarily in a single country but acquires some meaningful share of its resources or revenues (or both)â⬠¦show more contentâ⬠¦Ã¢â¬ ¢ Basic statistics on international trade normally do not record smuggled goods or international flows of illegal services. A small fraction of the smuggled goods and illegal services may nevertheless be included in official trade statistics through dummy shipments or dummy declarations that serve to conceal the illegal nature of the activities. Balance of trade Balance of trade represents a difference in value for import and export for a country. A country has demand for an import when domestic quantity demanded exceeds domestic quantity supplied, or when the price of the good (or service) on the world market is less than the price on the domestic market. The balance of trade, usually denoted NX, is the difference between the value of the goods (and services) a country exports and the value of the goods the country imports: NX = X âËâ I, or equivalently I = X âËâ NX A trade deficit occurs when imports are large relative to exports. Imports are impacted principally by a countrys income and its productive resources. For example, the US imports oil from Canada even though the US has oil and Canada uses oil. However, consumers in the US are willing to pay more for the marginal barrel of oil than Canadian consumers are, because there is more oil demanded in the US than there is oil produced. In macroeconomic theory, the value of imports I can be modeled as a function of the domestic absorption A and the real exchange rate ÃÆ'. These are theShow MoreRelatedAddressing International Legal and Ethical Issues Simulation Summary718 Words à |à 3 PagesAddressing International Legal and Ethical Issues Simulation Summary LAW/421 August 6, 2013 Addressing International Legal and Ethical Issues Simulation Summary International trade is important and beneficial to business. However, international trade guides a safeguard of interests, specific business contract, defined law, forum of dispute settlement, and understanding of contract clauses. ââ¬Å"A working knowledge of international law helps business owners and managers with global interests reduceRead MoreFour Approaches to International Staffing- Microsoft and Red Cross1343 Words à |à 6 PagesFour approaches to international staffing, advantages and disadvantages. The globalisation of the worldââ¬â¢s business economy has been particularly significant, resulting in an increase in the importance of, and interest in, international human resourcing. The international company is a type of multi-unit business organisation, which has a corporate centre in its home and its business units located in various host countries. International HRM distinguishes itself from domestic HRM primarily by havingRead MoreInternation Recruitment and Selection1678 Words à |à 7 PagesInternational Recruitment, Selection, and Training Strategies The world has been rapidly transforming due to the changes in technology, innovations, and the reduction of trade barriers into and out of countries which have permitted globalization. Due to globalization human resource management has been forced to take a more international approach, and has demonstrated that a more effective management of human resources internationally is imperative for the success of companies in international businessRead MoreZara International Case Study1000 Words à |à 4 PagesZara International was a retail shop originated in La Coruna, Spain in 1975. It was clothing and accessories shop and imitated the latest fashion trends and sold them at a lower cost. It became Zara International after entering Portugal in 1988 and then the United States and France in the 1990s. The distributor for this brand is Inditex and is considered the most successful retail chain in the world. Zara has a business strategy that is very different from the retailers nowadays. If a customer ordersRead MoreAnalysis of the Primary Models of International Marketing721 Words à |à 3 PagesInternational Marketing Introduction The three primary models that international marketing is predicated on include ethnocentric, geocentric and polycentric approaches to entering, selling to and serving new markets. Each of these approaches have inherent strengths and weaknesses associated with them, and the intent of this analysis is to explain how the way a company markets a product or service will dictate the selection of one over another. There are many cultural differences and factorsRead MoreStaffing Policies - Pros N Cons1319 Words à |à 6 PagesThe Pros and Cons of International Staffing 1. Introduction There has been a rapid pace of internationalization and globalization over the last decade. Expanding business operations beyond national boundaries while continuing commitment to local markets requires more complex business structures. One of the most critical determinants of an organization s success in global ventures is the effective management of its human resources. The purpose of this paper is to summarize the advantagesRead MoreEffectively Managing Employee Compensation and Benefit Packages1289 Words à |à 6 Pages There are many significant challenges that face multinational organizations in todayââ¬â¢s business world. One such challenge, for global organizations and the human resource department, is effectively managing employee compensation and benefits packages. Managing compensation structures has become an integral part of many organizations that conduct operations in the global market, as there are many considerations for the host country when sending expatriates abroad. It is imperative for organizationsRead MoreCase Study : International Human Resource Management Essay1448 Words à |à 6 Pagesand baking products business. In this company have different technologies for marketing strategies. Judgment is needed to identify the growth of the company so they look after the PBIT. In the time of 1990s they provide expansion opportunities Malaysian company pedi-cepat planned export offices in India, Singapore and Japan bit it fails. After the crisis, they expanded to Europe and the Middl e East. Expand to Oceana for the better growth. This report focused the international human resource managementRead MoreInteraction of American Laws with International Law962 Words à |à 4 PagesUCC and International Law Because the Uniform Commercial Code (UCC) generally regulates commerce or trade on a national basis, one may not realize that it also has an impact on international commerce. However, this assumption would ignore the critical role that American laws and policies play in the arena of international trade. These roles are both formal and informal. In other words, American law has direct and indirect effects on international commerce. In order to understand the impact ofRead MoreInternational Trade Theories That Can Be Analyzed944 Words à |à 4 PagesInternational Trade Theories There are a number of different trade theories that can be analyzed in regards to the above referenced research project, and I will attempt to address the theories I feel that are most relatable to the question in hand. The first international trade theory I will address is that of Mercantilism. Historically, mercantilism is defined as ââ¬Å"the economic theory that trade generates wealth and is stimulated by the accumulation of profitable balances, which a government should
Wednesday, May 6, 2020
THe French Revolution - 1803 Words
During the summer of 1793, the radical phase of the French Revolution was intensified by the Terror, created by The Committee of Public Safety. The Terror successfully preserved the Revolution by weeding out counter-revolutionaries to eliminate corruption within the government and giving equality to all social classes which untied France under one government. However, these successes were undermined by the many failures of the Terror due to the oppression of citizens which would lead to many executions and the paranoid slaughtering of citizens from all social classes which led to the changes in support of the Revolution. The Terror was successfully preserved the Revolution by weeding out counter-revolutionaries to eliminate corruptionâ⬠¦show more contentâ⬠¦The more his army eliminated corrupt individuals, the more stable the National Convention became, thus his job became more secure. The Geographical Incidences of the Principal Indictments Leading to Executions During the Terror displays the numbers of death according to what the suspect was accused of. The majority of accusations were based upon counter-revolutionary activities or acts that went against the state (DOC 3). All the reasons for the executions provide insight as to how many people were against the National Convention and how they supported the old regime. The old regimeââ¬â¢s methods of dealing with the nation were obsolete and unconstructive. Although the Terror caused many deaths, it changed and improved the governmental system by eliminating those who opposed the new government that was trying to unify and better the nati on. The Terror also preserved the Revolution by giving equality before the law in all social classes which would unite all of France under one government. In the table of Deaths Resulting from the Terror, the equality for all social classes is demonstrated. The table is split into social groups with the percentages of deaths from each social class. For the most part, the number of deaths is evenly distributed throughout the social classes (DOC 2). The equal distribution of deaths throughout all the differentShow MoreRelatedThe French Revolution And French Revolutions2006 Words à |à 9 PagesAlthough the American and French revolutions both took place in the late 18th century, both fought for independence, and both portrayed patriotism, the revolutions are markedly different in their origins; one which led to the worldââ¬â¢s longest lasting democracy and the other to a Napoleonic Dictatorship. Political revolutions in America and France happened because people felt dissatisfied with the way their country was run. In North America they rebelled against rule from a foreign power, they wantedRead MoreThe French Revolution And The Revolution1523 Words à |à 7 PagesThe French Revolution was a time rife with violence, with many revolutionaries using extreme actions to overturn the French Monarchy and create a government based on equality and justice, rather than tyranny and despotism. This violence reached gruesome and terrible heights throughout the revolution, but was justified by the revolutionaries, who believed that their goals of total equality, the end of tyranny, and the return to a virtuous society, allowed them to use means necessary to attain theseRead MoreThe French Revolution And The Revolution1336 Words à |à 6 PagesAnalysis The French Revolution was such an important time history. Not only was it a massacre with many lives being lost, including that of Queen Marie Antoinette and her husband King Louis XVI, it was also a time of great political turmoil which would turn man against man that being the case of Edmond Burke and Thomas Paine. Edmond Burke a traditionalist who believed the people should be loyal to the king against his former friend, Thomas Paine a free thinker who believed in order for things toRead MoreThe Revolution Of The French Revolution1040 Words à |à 5 PagesWhile there were political and social causes of The French Revolution the most important cause was actually economic. A few years before the Frenchââ¬â¢s revolution the French spent approximately 1.3 billion livres, 13 billion dollars, on the American Revolution. This gracious contribution caused trouble at home. The French Revolution was one of the most important events in history. While it changed the social structure in France it also affected many different countries across the world. ââ¬Å"the treeRead MoreThe French Revolution And The Revolution1640 Words à |à 7 Pages The French Revolution is often seen as one of the most influential and significant events in world history (Voices 9). The surge of rebellion present in those against the old regime, or Ancien Rà ©gime, inspired reformers for generations to come. Nevertheless, the French Revolution would not have occurred without the aid of the Enlightenment Thinkers, or Philosophà ©s. These Philosophà ©sââ¬â¢ ideas sparked the French Revolution. Prior to the French Revolution, France was radically different. It was theRead MoreThe French Revolution And The Revolution1321 Words à |à 6 Pages The French Revolution The French Revolution was an iconic piece of history that help shape the world. It was a time were great battles occurred. Blood sheds happen almost every day. The streets were red by the blood of bodies that were dragged from being beheaded. The economy was in bad shape. But before all of this the French had a few goals but there was one goal that they all wanted and that was to get rid of the monarchy. This idea did not arrive out of nowhere, the commoners were influenceRead MoreThe French Revolution And The Revolution1223 Words à |à 5 Pages French Revolution As the Enlightenment began in the middle of the 17th century, people began to use reason rather than stick to tradition. New Enlightenment ideas spread throughout Europe such as ideas on government. Enlightenment thinkers such as Rousenan believed that the best government was one formed with the general consent of the people. Other Enlightenment thinkers such as Voltaire and Montesquieu believed in freedom of speech and a separation of power within the government. All of theseRead MoreThe French Revolution And The Revolution1221 Words à |à 5 PagesWhen people think of the French Revolution, they immediately think of the country of France and how the Revolution affected it. What most people do not think about however, is how the Revolution affected other countries, specifically the country of England. England was affected positively and negatively by the Revolution in that there was an increase of political involvement, but there was a collapse in the economy due to war declared by France. The French Revolution created a battle of conflictingRead MoreRevolutions And The French Revolution956 Words à |à 4 Pages Revolutions are a common occurrence throughout world history. With the amount of revolutions in history, there are those that get lost and those that are the most remembered or well known. One of the well known revolutions is the French Revolution which occurred in the years 1789 to 1799. Before the French Revolution, France was ruled by an absolute monarchy, this meaning that one ruler had the supreme authority and that said authority was not restricted by any written laws, legislature, or customsRead MoreThe Revolution Of The French Revolution1636 Words à |à 7 Pageswas an old fortress that had served as a royal prison and in which gunpowder was stored. This will be the place where Parisian crowds will lay siege on and use the gunpowder for their weapons, and this will become a great turning point in the French Revolution. 3) The Great Fear was the vast movement that the peasant insurgency of sacking noblesââ¬â¢ castles and burning documents would blend into. This attack was mainly because of seigneurial dues and church tithes that weighed heavily on many peasants
Tuesday, May 5, 2020
Generating and Evaluating Application System â⬠MyAssignmenthelp.com
Question: Discuss about the Generating and Evaluating Application System. Answer: Introduction: The main backdrop from which project emerged was the gap in effective communication between American Red Cross (ARC) and its employees that sometime impeded or hampered the need for quick emergency reporting and rapid responses. It followed the realization that communication is a prominent factor in addressing disasters hence ARCs employee must be connected with convenient mobile devices (Afreen 2014). This would then increase the workflow in real time is done by integrating all the work force with one system of communication. To deploy cost cutting mechanisms infrastructure and employee satisfaction, BYOD was acknowledged and suggested to be a working panacea in helping achieve all the above factors and fill the gap in the communicating in ARC (Armando, Costa, Merlo, Verderame and Wrona 2016). It is upon this basis that ARC realized the need to have its volunteers who are partially involved with the organization but have never got adequate time to spend with ARC to be connected with the organization in real time basis by implementing BYOD to remain in touch with the organization from anywhere (Armstrong 2014). This would have enhanced communication among the employees about the problem and its solution since disaster is something which comes accidently hence employees should be in contact with the organization. Through BYOD, employees will be able use their own devices to be in touch 24/7 with the ARC. Mobile device management has significantly increased in recent times (Armando, Costa, Merlo, Verderame and Wrona 2016). Emergence VMware has made increase its efficiency by segmented controlling and access to customers. People can have access to the disaster aid from anywhere across USA. Employee information and rescue methods, safety procedures can be known. The BYOD fits well into the nature of the work that ARC does of providing assistance in disaster relief and emergence across America (Armstrong 2014). This because ARCs disaster relief wing is addressing over 700,000 disasters per year using its disaster action teams that must always be in touch with ARC to enhance the preparedness for disaster including the deployment of thousands of volunteers at the locations. Therefore, bring your own device will be effective since it is already a proven practice having been initiated in the year 2009 by Intel (Berry 2016). In 2010, the BYOD got its prominence and over 75% of the organization have implemented the policy due to its positive packages. By ARC extending this policy to the current mobile spectrum (BYOx) it will greatly contribute to real time effectiveness in ARC relief and emergency functions as has been witnessed in BYOx high adoption rates by versatile enterprises. This will be based on its performance including the provision of adequate participation through their own devices, IT consumerization, increase productivity and optimize cost, flexibility to the employee which increases productivity, simple issues can be resolved on their own, easy information access as well as better workflow (Caldwell, Zeltmann and Griffin 2012). The policy will also translates in its pros including increases employee satisfaction levels which yields high productivity, Lower costs, up-to-date devices, less stress on it, creates agile work force, incorporates advantages from new devices, improves user enhancement into ARC operations thereby increasing its efficiency. It is against this background that ARC has decided to explore the opportunity of Mobile Device Management (PDM) by designing a PDM prototype that will be implemented in the organization to connect the ARC and its volunteers. The PDM has substantially increased in the latest years (Chang, Jimnez-Martn, Maasoumi and Prez-Amaral 2015). The emergence VMware, for instance has increased its efficiency by segmented control and access to the customers. This has enabled people to have access to the disaster aid from any location across the United States of America (Chang, Ho and Chang 2014). This means that the employees information as well as rescue methods and safety pro cedures can be known effortlessly. This projects presents the following prototype to be implemented in ARC: The project aims at solving the ineffectiveness in communication between the ARC and its several volunteers who have not been integrated into the BYOD policy. By doing this, ARC will ensure real time and quick responses to the emergence and hence provide disaster relief. This is because ARC has been facing the information or the reporting gap between the times a volunteer comes across a disaster and the period it takes to report and then the react on it. By having the BYOx in place, the volunteers will highly be in touched with the organization. This will translates in real time reporting of the emergence and hence faster responses unlike never seen before (Drach?Zahavy, Goldblatt and Maizel 2015). This will mean the ARC will boost is efficiency since there will be increased number of disasters being reported and responded to and the ultimate beneficiaries will be the Americans. The impetus for change exists; that is, where is the pain and who is feeling it; and, if necessary, why yo ur area or the department should be doing something about this and what are the likely consequences of not addressing the problem (Elliott and Sullivan 2015). The cost of the prototype for the PDM will be $50000. This cost will be used to ensure that the project implementation is full and complete. From this amount, the relevant resources will be purchased at $10000 and another $20000 will be used in training the employees in order that they do not resist this change (Farag, Rey, Noe, Bayleyegn, Wood and Zane 2013). Also, the training will be important in ensuring that each volunteer has adequate knowledge to use the BYOx policy so that the speed of both reporting and responding to a given emergency is speeded up. The other $10000 will be used in gathering the right information to be included in the training manual to ensure that adequate information is given to each participant. The remaining $10000 will be left for any adjustment in the project including the need to offset any fluctuations in the level of prices that might affect the cost of the pre-determined resources. Strategic alignment within the organization's business and IT strategies: The project management team will ensure that there is a seamless alignment between the project and the organizations core strategic priorities, among them agreed measures of success. In order to this, the project management team will adopt a practice that brings together every stakeholder that will be affected by the proposed change. The focus here will be to have each department bring the issues that they think would be affected by the pending full completion and implementation of the proposed project (Freedman 2015). The main strategic objective of the ARC is to ensure that communication between the volunteer employees and the organization is enhanced a great deal to facilitate their operations in terms of reporting the disaster and the emergence so that Americans are kept safe from any harm that can be responded to and mitigated in no time (French, Guo and Shim 2014). The ARC seeks to guarantee Americans the safest environment by ensuring that the many volunteers are kept in touch with the organization and report the emergences in real time (Greenwald 2008). The ARC can take advantage of the potential changes that PDM will cause to empower its workers and help create a more effective organization. ARC needs to see this project to completion in order to ensure that each and every volunteer that have been left out in the BYOD policy are brought on board using the BYOx as proposed by the PDM prototype. By doing this the ARC will have boosted its presence in every village of America since the firm has a range of the volunteers and hence where only brings his or her mobile device without the need for company to buy all these device will be a good opportunity that must be grabbed (Gaff 2015). The cost of the entire project is relatively small as no much hardware is needed to be purchased. Indeed, each and every volunteer is using his Smartphone and henc e the organization will save huge costs when implementing this PDM prototype. Where American Red Cross under full implementation, the efficiency in its operation will be enhanced a great deal but at a comparatively low cost (Garba, Armarego and Murray 2015). The project implementation will improve the efficiency ARC by ensuring that each volunteer remains in touch with the organization thus reporting the emergency as fast as possible to save the life of Americans. This will be done by improving the communication effectiveness between the organization and the volunteer employees and hence ensure that the organization responds swiftly to the disaster and at the real time in order to minimize the cost that would otherwise be incurred were the problem not reported in time. The gaps in communication has been a problem to the ARC in terms of how the volunteers report the emergencies and disasters taking place in the country (Gatewood 2012). Project management and control: The progress of the project will be under the management of the project manager. The manager will form a team of ten persons from diverse expertise to help drive the project to completion (Greenwald 2008). The manager will play the oversight role and will always track the progress for proper adjustments to be made in time. The facility executive will always receive updates of the progress at every three days. The PDM application will run on an Android and IOS development platforms. The reason for choosing these two platforms is that many smartphones are supported by these platforms and hence it will minimize the cost that would otherwise be incurred to change the smartphones that conforms to a given development platform. This will also help lessen the resistance to change that would otherwise accrue if the volunteers were to be compelled to buy other phones supports the application. The coding language will be based on a range of diverse languages because America is a diverse culture. These languages will encompass English and any other language (Hemsley and Bajkowski 2014). The application will be developed on Java Script programming language. The programming tools that the PDM software developers will utilize in the creation, debugging as well as maintaining the program and application will include generic programming tools, paid programming tools and free programming (Houston et al. 2015). The source code editor, debugger, graphical interface builder (GUI designer) will be the generic tools to be used. Free programming tools like bitbucket, gitlab and jEdit. Also to be used will include paid programming tools like codeship, Maven, SSH, and Quick Build. The cloud services will also be used in this PDM development (Irwin 2013). The CAD will be used to leverage the files storage as well as management on cloud while the CAD system will still reside on the desktop. Software design, development methodologies and testing strategies The application has been designed and will be developed by the software development as well as tested for effective. The application will then be ready for internationalization in a number of ways. The application will use common language and will be made very simpler to be used by uses across the world. This is because any sophistication will be counterproductive to the strategic goals of ARC which is solely focused on improving the communication between the volunteers and the organization by ensuring real in touch on a 24/7 basis to make sure the lives of American and their properties are safe from any eventually (Irwin 2014). The application will be integrated in all social sites including Facebook, Twitter, Instagram, WhatsApp and many other available virtual community. In this respect, the application will be able to help gather the information about the disaster in social sites. It will link the volunteer and any informant directly so that any information about the emergency and disaster can be noted and report immediately (Kavvadias 2014). This is will be more productive since it will ensure that maximum information is gathered and reported immediately. It will be linked to all emergency and disaster groups in these social sites so that one can easily contact any volunteer. The application will be available to even the unknown volunteers who can still have in their phones and report any eventually in case it happens. By liking these application to the social media, it will a great coverage as the world has become a global village among the social media users (Miltenoff, Todorova and Martinova 2016). H aving this integration would mean that each and every person with a social media account will be able to report any emergence to the ARC and the firm will take the necessary actions in time to solve the problem. Through the social media API strategies the ARC will reach a huge audience by a single click at the application. By having the integrated API with Facebook, LinkedIn, Twitter, YouTube, Pinterest, Bebo, Vimeo, and Googl+, a huge audience will be reached. ARC will be able to deliver Social Media API integration solutions via posts that contain the necessary information on how to detect and report an emergency and why this should be done promptly. There will also be effective information flaw from the application to library and then to the generic API which then spreads out into a rage of social media sites. This is because a great percentage of individuals in the social sites and doing their activities including business transactions and entertainment which can be easily reached when the application in integrated in social sites properly (Pal et al. 2014). The application is in line with the purpose of social psychology studies of social media influence on human interaction based their behavior as explained by the three traits. Understanding the influence of social media on human interaction is inevitable and impossible without a clear understanding of social psychologists take on the topic. Human interaction on social media is based on the willingness and interest to make friends as explained by the traits of extraversion Machiavellianism and Emotional Intelligence. The three traits are assessed by psychologist ad a function of social networks. For example, the traits of Extraversion is key to understanding social media since it determines the ability of an individual to remain socially dominant exert leadership as well as influencing others by being active and positive. Moreover, the social media is based on the ability of an individual to identify and manage emotional states both in oneself and to others (Ratchford 2018). However, this is only possible through a critical understanding of the trait of Emotional Intelligence. Thus, this further justifies the fitness of this application to the social psychology purposes. Moreover, as social psychologist try to assess the extent to which the three states affect virtual social networking and the manner in which such traits overlap, it showcase further how the application fits the purposes of the social psychology. Therefore, understanding the correlation between these traits is important to social psychologists in understanding the effect of social media on human interaction. For example, getting an answer to the contradiction whereby the anticipated negative correlation between Machiavellianism and Emotional Intelligence is importance (Ready, Astani and Tessema 2014). The two traits showcase a negative correlation yet both should positively predict social networking. Therefore, where social psychologist focus their studies on understanding the drivers to such contradiction help us effectively understand the topic and hence able to explicate the effects of social media on human interaction using the restaurant as the area of application based a natural observation method to collect effective data. Management of risks encompasses such process as identifying, assessing and prioritizing risks. Subsequently, the risk manager accomplishes the process through a coordinated and economical application of facilities to curtail, screen, as well as to control the likelihood and the upshot of the uncertain events. The aim of managing risks is maximizing the achievement of opportunities. In risk management, the organization aims at maximizing the opportunity attributable to its projects through effective risk management frameworks. The organization in so doing will assure improbability does not diverge the endeavor from the business goalmouths. For successful project and its operation, the organization must start by identifying the risks associated with any of its ventures. The process of risk management will take the following form: Risk Identification: The team must ask such questions as what could bar the organizations ability to meet its objectives. For example, loss of a key member of the team, a protracted outage of Information Technology network, lagged provision of significant information by another work unit or individual; failure to grab a valuable opportunity. The team must as well consider things that could enhance the ability of the organization to meet the objectives including a profitable fundraising opportunity. Risk Analysis/Cause Identification: Following a successful risk identification, the team advances into the determination of the probability and the consequence of individual risk. The team develops a comprehension of the risks nature together with its potential to influence goals and objective of the project. Such information is input to the Project Risk Register. Risk Evaluation/Ranking: The team then undertakes the evaluation and ranking of the risk via the determination of the risk magnitude, a merger of the likelihood and consequence. The team makes the decision relating to whether the risk is satisfactory/acceptable or whether the risk is serious enough to warrant the treatment. Such risk rankings are further added to the Project Risk Register. Risk Treatment/Risk Response Planning: The team assesses the organization's highest ranked risks as well as setting out a plan for treating or modifying these risks for acceptable risk level achievement. Questions asked here include, how the team can minimize the likelihood of the adverse risk and enhancing the opportunities. The team then creates the risk mitigation strategies, preventive plans as well as contingency plans in this phase. The team then adds the risk treatment measures for the highest ranking/most grave danger to the Project Risk Register. Risk Monitoring and Review: In this phase, the team takes its Project Risk Register and utilize it for monitoring, tracking and reviewing risks. The risk is all about the uncertainty. The organization will de-risk the project by putting a framework around such uncertainty. This implies that the organization can move much more confidently towards the achievement of goals of the project. Via the identification as well as management of a detailed list of project risk, the undesirable surprises, as well as impediments, can be decreased while golden opportunities are unearthed. The process of managing risk further assist in resolving problems as they happen since such problems have been forecasted, and plans for treating them have already been established and agreed. The organization will then avoid spontaneous reactions as well as being trapped in firefighting mode for the rectification of the problem which could otherwise have been anticipated. This guarantees happier, less stressed project stakeholders and teams. The result is minimized impacts of the threats to the project and capturing the opportunity as they become available. Effective risk management begins by making risk management integral part of the project which helps in early risk identification. Project managers must communicate about the risk while considering both threats and opportunities. Moreover, ownership issues must be clarified and risk prioritized. Further, the risk must be analyzed and avail plan and implement risk responses. Subsequently, register project risk and then rank risks and associated task. Risk management involves the following key steps: risk identification, risk impact assessment, risk prioritization and mitigation, planning, implementation and progress monitoring. Risk identification involves using such tools as brainstorming based on examining risk events and their relationships and assessing risk probability and consequences (cost, schedule, technical performance impacts and capability impacts) under risk impact assessment stage. After the identified risks have been assessed, risk prioritization and analysis takes place where the risks are critically assessed. Accordingly, analytic decision rules are applied to help rank-order the identified risk events from the most to the least critical. Once the identified risks have been rank-ordered from the most to the least critical one; risk mitigation planning takes place. Here, risk events are assessed as medium or high criticality and transferred to risk mitigation planning and implementation while the low critical risks are tracked or monitored on the watch list. The process of risk management is completed when existing events are reassessed, and the identification of new risk starts over again (Creasey and Hiatt 2003). There are many tools and techniques useful for risk management. Risk identification tools include information gathering techniques, brainstorming, and Delphi technique. Another tool is risk probability and impact assessment that help determine the likelihood that a particular risk will occur alongside determining the potential effect on a project objective (schedule or cost). Another tool is probability and impact matrix that help rate the risk quantitatively. Risk categorization is also a key tool in risk management since it helps determine the projects areas most exposed to risks. Effective risk response results from risk grouping by common root causes. Expert judgment is also an effective tool since the experts use the interview to make a judgment regarding a particular risk (Caldwell, Zeltmann and Griffin 2012). The risk management for this application will focus on privacy, security, confidentiality, and ethical issues. The major risks that can be associated with this application will include the risk of being fully engaged with the application and social media content that might lead a person not doing any other productive job. For example, a user may always want to stay online on the social media to an extent that he will not be thinking of any other duties that might be before him. In this case, the application will negatively impact on the ARC volunteers and hence the need for ethical consideration when designing as well as using the application. Integration and deployment strategies: The solution will be integrated into other applications and systems, and deployed across the enterprise. For example, the application will be integrated in the communication department and in every call center. This will ensure that the call and the information are received in time and acted upon immediately. The training will be held in each department to ensure that everyone in the organization is privy to the changes to be effected before deployment. ARC should grab this potential opportunity to ensure that it meets its strategic goals and objectives of serving every American in a 24/7 basis (Caldwell, Zeltmann and Griffin 2012). This will ensure that the company improves its efficiency because there will be less cases of emergency and disasters going undetected. By having the application in place many cases will be reported and hence improving the ability of the organization to respond to its problems. With the proper and complete integration of the volunteers across the country, the Americans will be served in real time and this is good for the organization. The firm should take the opportunity and fully integrate the application into the organization and the social media platforms. This is because social media will avail a huge audience and through the firm can as well create awareness of how to keep safe in case of emergency even before the organization hits the ground. This project is effective and every effort must be taken to achieve its completion since it will not only benefit the Americans but its usage will stretch past the territorial boundaries of America. The user acceptance and manage changes within the development and post development phases will be critical to this applications success. Communication is the centerpiece for attracting customers and proper chain of command within an organization leads to incorporation of customers feedbacks into manufacturing products that are customers tailored and hence satisfying customer needs which translates into increased market share and hence large revenue fetched Caldwell, Zeltmann and Griffin 2012. The firm should employ a system where current form of power based on positions that leads to inferiority is scrapped and replaced by collaborative organizational designs amongst employees and management and customers thus incorporating every stakeholder in decision making process (White 2014). A proper chain of command will be designed where each department is tasked with distinct role with public relation assigned to listen customers complaints and subsequently integrating such complaints to ma nufacturing process to produce products that meet customers needs and hence inventory management as accumulation is curbed which is a cost-effective strategy. The product will be updated and patched through its lifecycle. The update of the system will be based on the current development on the BYOx application. The IT department will always check for any development in order to ensure the most latest ones are used in the firm. Future opportunities and enhancements: The proposal will be great if implemented in the organization. The ARC will have the potential to improve its communication department by having this system in place. To this, more research is to be carried on the success of the BYOx and its application in other firms. By having this detailed information, the organization will be effective in helping the Americans who might be trapped in the emergency (White 2014). This proposal needs to be driven to completion in order that each American citizens remains safe in anywhere. Conclusion The project purposes at solving the ineffectiveness in communication between the ARC and its several volunteers who have not been integrated into the BYOD policy. By doing this, ARC will ensure real time and quick responses to the emergence and hence provide disaster relief (Singh 2012). This is because ARC has been facing the information or the reporting gap between the times a volunteer comes across a disaster and the period it takes to report and then the react on it. By having the BYOx in place, the volunteers will highly be in touched with the organization. This will translates in real time reporting of the emergence and hence faster responses unlike never seen before. This will mean the ARC will boost is efficiency since there will be increased number of disasters being reported and responded to and the ultimate beneficiaries will be the Americans (Corvette 2006). The impetus for change exists; that is, where is the pain and who is feeling it; and, if necessary, why your area or the department should be doing something about this and what are the likely consequences of not addressing the problem. Integration of the social media will greatly impact on employee communications and employee turnover level. Social media impact on employee communications and employee turnover level (Caldwell, Zeltmann and Griffin 2012). The employees are all the time socially interconnected online and can share the information from a department to a department without the need to walk into each department. For example, a firm that employs social media bolsters employee engagement online since employees require social interaction, and this makes employees feel part of the company. Moreover, via social media managers can posts simple messages of praise at the accomplishment of a project and monthly memos highlighting team achievement as well as a thank you note (Semer 2013). The employee turnover levels is thus reduced as the firm ensures that it hires the right employee from the beginning and strictly follow their actions through the social media. ARC should grab this potential opportunity to ensure that it meets its strategic goals and objectives of serving every American in a 24/7 basis. This will ensure that the company improves its efficiency because there will be less cases of emergency and disasters going undetected. By having the application in place many cases will be reported and hence improving the ability of the organization to respond to its problems. With the proper and complete integration of the volunteers across the country, the Americans will be served in real time and this is good for the organization (Schreiber, Yin, Omaish and Broderick 2014). The firm should take the opportunity and fully integrate the application into the organization and the social media platforms. This is because social media will avail a huge audience and through the firm can as well create awareness of how to keep safe in case of emergency even before the organization hits the ground (Savchenko 2015). This project is effective and every effort must be taken to achieve its completion since it will not only benefit the Americans but its usage will stretch past the territorial boundaries of America. List of references: Afreen, R., 2014. Bring your own device (BYOD) in higher education: opportunities and challenges. International Journal of Emerging Trends Technology in Computer Science, 3(1), pp.233-236. Armando, A., Costa, G., Merlo, A., Verderame, L. and Wrona, K., 2016, May. Developing a NATO BYOD security policy. In Military Communications and Information Systems (ICMCIS), 2016 International Conference on (pp. 1-6). IEEE. Armando, A., Costa, G., Merlo, A., Verderame, L. and Wrona, K., 2016, May. Developing a NATO BYOD security policy. In Military Communications and Information Systems (ICMCIS), 2016 International Conference on (pp. 1-6). IEEE. Armstrong, A., 2014. Technology in the classroom: It's not a matter of'if,'but'when'and'how'. The Education Digest, 79(5), p.39. Berry, M., 2016. BYOD Policy Template. IT Manager Daily, https://www. itmanagerdaily. com/byod-policy-template. Caldwell, C., Zeltmann, S. and Griffin, K., 2012, July. BYOD (bring your own device). In Competition forum (Vol. 10, No. 2, p. 117). American Society for Competitiveness. Chang, C.L., Jimnez-Martn, J.., Maasoumi, E. and Prez-Amaral, T., 2015. A stochastic dominance approach to financial risk management strategies. Journal of Econometrics, 187(2), pp.472-485. Chang, J.M., Ho, P.C. and Chang, T.C., 2014. Securing byod. IT Professional, 16(5), pp.9-11. Corvette, A. 2006. Conflict management: a practical guide to developing negotiation strategies. New York, NY: Pearson Prentice Hall. Creasey, T. J., and Hiatt, J. M. 2003. Change management: The people side of change. Madison, Wis: Prosci Learning Center Publications. Drach?Zahavy, A., Goldblatt, H. and Maizel, A., 2015. Between standardisation and resilience: nurses' emergent risk management strategies during handovers. Journal of clinical nursing, 24(3-4), pp.592-601. Elliott, J. and Sullivan, L., 2015. How the Red Cross raised half a billion dollars for Haiti and built six homes. ProPublica, June, 3. Farag, N.H., Rey, A., Noe, R., Bayleyegn, T., Wood, A.D. and Zane, D., 2013. Evaluation of the American Red Cross disaster-related mortality surveillance system using Hurricane Ike dataTexas 2008. Disaster medicine and public health preparedness, 7(1), pp.13-19. Freedman, A., 2015. MANAGING PERSONAL DEVICE USE IN THE WORKPLACE: HOW TO AVOID DATA SECURITY ISSUES AND TO DIG YOURSELF OUT OF YOUR FAILED BYOD POLICY. Suffolk J. Trial App. Adv., 20, pp.284-361. French, A.M., Guo, C. and Shim, J.P., 2014. Current Status, Issues, and Future of Bring Your Own Device (BYOD). CAIS, 35, p.10. Gaff, B.M., 2015. Byod? omg!. Computer, 48(2), pp.10-11. Garba, A.B., Armarego, J. and Murray, D., 2015. A policy-based framework for managing information security and privacy risks in BYOD environments. International Journal of Emerging Trends Technology in Computer Science (IJETTCS), 4(2), pp.189-198. Gatewood, B., 2012. The nuts and bolts of making BYOD work. Information Management Journal, 46(6), pp.26-31. Greenwald, H. P. 2008. Organizations: Management without control. Thousand Oaks, CA: Sage Publications. Hemsley, P. and Bajkowski, J., 2014. Bring it on. Government News, 34(1), p.22. Houston, J.B., Hawthorne, J., Perreault, M.F., Park, E.H., Goldstein Hode, M., Halliwell, M.R., Turner McGowen, S.E., Davis, R., Vaid, S., McElderry, J.A. and Griffith, S.A., 2015. Social media and disasters: a functional framework for social media use in disaster planning, response, and research. Disasters, 39(1), pp.1-22. Irwin, J., 2013. Making the World Safe: The American Red Cross and a Nation's Humanitarian Awakening. Oxford University Press. Irwin, J.F., 2014. The disaster of war: American understandings of catastrophe, conflict and relief. First World War Studies, 5(1), pp.17-28. Kavvadias, N., 2014. Generating and evaluating application-specific hardware extensions. arXiv preprint arXiv:1403.7380. Miltenoff, P., Todorova, R. and Martinova, G., 2016. Gamification and BYOx in Academic Libraries: Low-end, Practical Approach. Pal, T., Lee, J.H., Besharat, A., Thompson, Z., Monteiro, A.N., Phelan, C., Lancaster, J.M., Metcalfe, K., Sellers, T.A., Vadaparampil, S. and Narod, S.A., 2014. Modes of delivery of genetic testing services and the uptake of cancer risk management strategies in BRCA1 and BRCA2 carriers. Clinical genetics, 85(1), pp.49-53. Ratchford, M.M., 2018. BYOD: A Security Policy Evaluation Model. In Information Technology-New Generations (pp. 215-220). Springer, Cham. Ready, K.J., Astani, M. and Tessema, M., 2014. Human recourses issues in BYOD policy development. J. Am. Acad. Bus. Camb., 19(2), pp.40-46. Savchenko, V.A., 2015. BRING YOUR OWN DEVICE POLICY AND WI-FI TECHNOLOGY FOR MILITARY EDUCATIONAL ORGANIZATION. Modern Information Technologies in the Sphere of Security and Defence, (2 (23)), pp.124-130. Schreiber, M.D., Yin, R., Omaish, M. and Broderick, J.E., 2014. Snapshot from superstorm Sandy: American Red Cross mental health risk surveillance in lower New York state. Annals of emergency medicine, 64(1), pp.59-65. Semer, L., 2013. Auditing the BYOD program: the growing business use of personal smartphones and other devices raises new security risks. Internal Auditor, 70(1), pp.23-26. Singh, N. (2012). BYOD genie is out of the bottleDevil or angel. Journal of Business Management Social Sciences Research, 1(3), 1-12. White, B., 2014. Disaster relief for deaf persons: Lessons from Hurricanes Katrina and Rita. Review of Disability Studies: An International Journal, 2(3).
Subscribe to:
Posts (Atom)