Tuesday, December 31, 2019

Death of a Salesman Family Relationships Essay - 903 Words

Battle between Father and Son Family relationships always have a way of playing a key role for the duration of most literary pieces. According to Arthur Miller’s novel, Death of a Salesman, the interaction of Willy and his sons, Happy and Biff, shows that family ties usually are connected either physically or emotionally in some way or another. Willy Loman is just like every father in a father/son bond, yet all he wants is to be a part of his son’s life. Even though Biff and Happy admire and have so much love for their father when they are younger, later down the road when they are older suddenly they realize he had failed to prepare them for the real society in life. Many people would say that in the play that the father/son†¦show more content†¦All Willy really wants is to be a part of his son’s lives and, Miller shows this by the example of when in the play Biff comes home to recollect himself, Willy seems to think this as a failure because he would r ather see his eldest son be likely more successful rather than his youngest, Happy. Hereafter, Willy tries to take matter into his own hands, ‘I’ll get him a job selling, he could be big in no time’, he says to Linda (1215). Partially due to Willy’s consistency in Biff’s life conflicts start to erupt more partially to do with the fact being that they had different ideas of what the ‘American Dream† really is. With Biff believing that the most inspiring job to a man is working outdoors, his father disregarded by saying that working on the road selling was the greatest job a man could possibly have (1276). The boys are clearly not at all fully functioning adults because of their upbringing throughout their life. Another major issue in the play with the father/son relationship between Willy and his sons is the amount of love shown towards them. The continuous support from growing up had molded the Lomans into men who always fled back home whenever a problem approached. Biff says to Willy, ‘I never got anywhere because you blew me so full of hot air I could not stand taking orders from anybody!’ (1275). The Loman brothers were babied so much all through theirShow MoreRelatedAuthor Miller’s Death Of A Salesman: A Family’s Misguided Attempt At The American Dream 707 Words   |  3 Pages Death of a salesman is a two-act play set in the late 1940s. The death of a salesman is a tragic story of one family’s failed attempt to live the American dream. Majority of the action in the play takes place in the Loman’s home and yard. The Loman family consists of Wily, Linda and their two sons Biff and Happy. Overall I consider Death of A Salesman a fascinating Play. To begin with I found my self-having difficulty reading the play. I immediately began writing off the play as another story ofRead MoreLife of Pi1276 Words   |  6 Pagesâ€Å"The relationship between an individual and his or her society is responsible for the sacrifices he or she makes.† Discuss this statement making close reference to Death of a Salesman and American Beauty. Ideas and qualities of acceptable standards that is considered worthwhile in society, pressures the relationship between an individual and his or her society due to the risk of social rejection. By accepting these social norms the individual is forced into the pursuit of the American Dream ofRead MorePride in Macbeth and Death of a Salesman Essay example861 Words   |  4 PagesPride in Macbeth and Death of a Salesman Any great accomplishment can make someone feel proud about their work. It makes one feel good; it raises a persons spirits. No question, pride has its good points. (The Toronto Star, Nov 1999) Then again, there are also the bad points of pride one must consider, before being proud. Pride can deceive a person into being ambitious, and make them strive for something that is not rightfully theirs. Both Macbeth and Willy encountered this problem. Read MoreTaught Me Purple Literary Analysis945 Words   |  4 Pages Tragedies affect each and every family differently from the next. The way you respond to them and deal with them, paves the way for how relationships turn out. In the play Death of a Salesman, the real tragedy is the way Willy puts on a facade to his family, and to himself, regarding his success as a salesman. In the poem Taught Me Purple, the real tragedy is that the mother was able to teach the child many things, but could not teach some of the most important values in life, such as self respectRead MoreAnalysis Of Death Of A Salesman By Arthur Miller1270 Words   |  6 PagesDeath of a Salesman, by Arthur Miller 1245 Words 5 Pages Death of A Salesman, written by Arthur Miller, is a play based on the turmoil within an average American family. Miller wrote Death of A Salesman easily showcasing the elements of drama. I was easily able to follow the plot, identify with his characters, and picture the setting. The main theme of the plot seemed to be Willy reaching for the American Dream. Financial success, business success, outwardly perfect family, revered by your peersRead MoreA Tragic Fate Caused by a Society Filled with Realism Essay1068 Words   |  5 Pagesetc. Death of a salesman is Arthur Millers most famous and notable play. It is a modern tragedy, the hero, Willy Loman is not grand and noble, but a common man, however, he is a symbol for Americans in the postwar period of growing wealth and affluence. Theatrical commentators generally hold that this play not only has high artistic value, but also has profound social significance. The American Great Depression in 1930s is the background of this play; the story is about a common salesman who committedRead MoreArthur Miller s Death Of A Salesman1144 Words   |  5 Pages Arthur Miller: Death of a Salesman Life for many in America are missing the same elements that â€Å"Death of a Salesman† exposed. Those element are love and direction. Many people face these struggles at some point in their life, but don’t know what to do to progress. Arthur Miller devised a style whereby he could show how your past can continuously impact on your future. Each character highlights the powerlessness of a dream to give meaning and control to human life. I disagree with someRead MoreAnalysis Of The Play Death Of A Salesman By Arthur Miller1612 Words   |  7 Pages Selling More Than Just Merchandise The play, Death of a Salesman, by Arthur Miller explores topics that are parallel to the lives of the common man. This makes his play relevant during many different eras, as the central issues discussed correlate with struggles of everyday common people, no matter at what point in history the play is shown. This makes his play very versatile in nature as it can be shown throughout the decades. His play can be considered a classic story; one that cannot be forgottenRead MoreDeath of Trust Essay1235 Words   |  5 PagesIn the classic American drama â€Å"Death of a Salesman,† Arthur Miller spins a profound and complex narrative around a deluded and shallow shell of a man. In a story overflowing with intimations about the nature and morality of man and the ramifications of mistruths and fantasy, there is one message easily held as predominant: that of Willy Loman’s futile pursuit of the American dream and the reality of its death within him—and the unfortunate sec tor of humanity that he embodies. This interpretationRead MoreThe Role Of Dreams In Death Of A Salesman By Arthur Miller1472 Words   |  6 PagesIn Arthur Miller’s play, Death of a Salesman, Willy Loman is a salesman who wants to attain the American dream and struggles as a parent and in his career, which reflects an American tragedy. In the article about Arthur Miller, â€Å"Salem Witch Trials,† Miller was described to be a little like his character from Death of a Salesman, Willy, because they both had mistress’ and fame got in the way of their marriage (Abbotson). Miller was in the spotlight after Death of a Salesman came out and his wife, Mary

Monday, December 23, 2019

The Butler By Lee Daniel - 1654 Words

Lee Daniel’s The Butler, a 2013 historical drama, follows the life of a man born to slavery, finds love and has a son that fights for equal rights, fights for equal pay himself, then dies after Obama becomes president. Cecil Gaines is born to a time of slavery in 1919 in Georgia. In the beginning of the movie, Cecil’s mother is being taken and raped by the plantation owner. Cecil, clearly upset by the abrupt action looks to his father for a solution. Giving in to Cecil’s pleas, the father confronts the plantation owner and is shot and killed. Following the unfortunate series of events, the grandmother on the plantation takes Cecil under her wing. He is brought to the house and becomes a house servant. The widow educates the boy in serving and behaving properly in a house of white people. Years after starting, the boy leaves the plantation and his mother behind. Soon after, starvation gets the best of Cecil and he breaks into a pastry shop. The head slave to the o wners of the shop came rushing down to find Cecil consuming the pastries. This moment was a defining point for Cecil’s life. Instead of all the horrible things that could have been done to Cecil, he is offered a job to pay for the damages he caused. The teachings of that old widow certainly came in handy. The other servant even teaches Cecil to mix drinks and become a better server. The older servant also gives him a wonderful opportunity, to work for one of the larger hotels in Washington D.C. for very wealthyShow MoreRelatedLee Daniels The Butler3535 Words   |  15 PagesLee Daniels’ ‘The Butler’ is a biographical drama depicting the story of Cecil Gaines, a man who escaped a life of slavery and oppression to serve for eight presidents as a butler in the White House. The film focuses on African American historical events, with special concentration on the civil rights era. With the White House segments of the film starting in the oppressive Eisenhower years, it offers a presidential level insight into the historic freedom movements of the 1960’s, all the way throughRead MoreAnalysis Of The Movie Lee Daniels The Butler Essay1175 Words   |  5 PagesIntroduction This family assessment is about the movie â€Å"Lee Daniels The Butler.† It will cover the various culture changes of the family. Each family member brings something different both culturally and socially. This assessment will discuss the similarities and differences in culture during the life span of Cecil Gaines. Description of Movie Family This movie is based on the life of Cecil Gaines. It starts when he was serving white people in the cotton fields at eight years old and continuesRead MoreThe Butler From The Weinstein Film Company Essay1800 Words   |  8 PagesDirector Lee Daniels’ movie, The Butler (2013), from the Weinstein film Company, is a historical film that portrays discrimination towards African Americans from early to mid 20th century America. Daniels displays within his film, the white governing society that subjugated African Americans in the United states, and how they were able to overcome this injustice. As the film progresses, it is perceived that many of the older African American generation were content with their current position withinRead More gods and generals Essay757 Words   |  4 Pages nbsp;nbsp;nbsp;nbsp;nbsp;Gods and Generals, 2003, Colonel Joshua Chamberlain (JEFF DANIELS), Confederate Generals Robert E. Lee (ROBERT DUVALL), Thomas quot;Stonewallquot; Jackson (STEPHEN LANG), Maj. Gen. Joseph Hooker (MAC BUTLER), and Capt. Alexander ‘Sandie’ Pendleton (JEREMY LONDON). The movie Gods and Generals is a portrayal of the actions that were illustrated very eloquently and captivatingly in the book Gods and Generals, written by Jeff Shaara. The movie even though was less thanRead MoreAbraham Lincoln And The Gettysburg Address1152 Words   |  5 Pageswas an industrialist, railroad executive and an inventor. Benjamin Butler, ben was also a lawyer and eventually a politician for the state of massachusetts. Daniel Sickles, he was a union general during the civil war as well as a controversial politician. George Meade, General George Gordon Meade was a civil engineer and an army officer before serving as a Union general during the Civil War. He was successful in defeating General Lee but was criticized for not pursuing the Confederate Army when inRead MoreOprah Winfrey s Influence On Law Enforcement And Schools Across The Country Essay1539 Words   |  7 Pagespast helped shape her into the influential person she is presently. According to achievement.org, the official website of a museum of living history in Washington D.C., Winfrey was born on January 29, 1954 in Kosciusko, Mississippi to mother, Vernita Lee and father Vernon Winfrey. Vernita was just a teenager when Oprah Winfrey was born. Winfrey was sexually abused by several of her mother’s friends and relatives while her mother was away working. The abuse lasted from ages nine to thirteen. When WinfreyRead MorePrecious Based on the Novel Push by Saphire Analysis1368 Words   |  6 PagesJaclyn Butler 04/24/2012 Intracultural Communications Professor Brook Film Analysis on 2009’s â€Å"Precious† Analyzing a dynamic film like the 2009 â€Å"Precious† is difficult. The movie got a lot of praise for the acting and the story that was portrayed but it also got a lot of heat from the race that was portrayed in the movie. African Americans nationwide said the movie made their African American ghettos into a sexually incest ridden, classless society and didn’t properly show any of the positiveRead MoreMovie Analysis : The 70s 1314 Words   |  6 Pageshe returned to TV, playing the pioneer of a publicizing office in â€Å"The Crazy Ones†; the show did well in the examinations, however was crossed out after appear season. He similarly played yet a substitute president, Dwight Eisenhower, in Lee Daniel s â€Å"The Butler†. On August 11, 2014, Robin Williams was found dead at his home in Tiburon, California USA, the setback of an obvious suicide, according to the Marin County Sheriff s Department. A 911 call was gotten at 11:55 AM PDT, firefighters and par amedicsRead MoreArguing a Position Essay2252 Words   |  10 PagesWeb. Oct. 2011. Petrocelli, Daniel, and Peter Knobler. Triumph of Justice: the Final Judgment on the Simpson Saga. New York: Crown, 1998. Print. Wright, Bruce. Black Robes, White Justice: [why Our Justice System Doesnt Work for Blacks]. Secaucus, NJ: Stuart, 1987. Print. Wright, Bruce. Black Robes, White Justice: [why Our Justice System Doesnt Work for Blacks]. Secaucus, NJ: Stuart, 1987. Print. Butler, Lynda Lee., and David Bearinger. The BillRead MoreThe Conflict On The Television Show Empire1470 Words   |  6 Pageswe will focus on the emotional aspect of control Luscious has on his workers. Last, I will discuss the power structure in which Luscious controls people. I want to begin with the background of Empire. The show was originally created by The Butler s Lee Daniels and Danny Strong. The show stars Terrence Howard as Lucious Lyon; a drug dealer-turned-rapper-turned-music mogul who, upon discovering he has a terminal illness, must decide which of his three sons will take over his company. The options are

Sunday, December 15, 2019

European Colonization of the Americas Free Essays

In the early 1500s, the Spaniards were sent to colonize the New World, not hesitating in expanding to a much broader spectrum, even establishing a few â€Å"short-lived colonies† far up north in Florida. Since then, Mexico’s North and a few states of the United States’ South, have displayed differing characteristics from their respective countries. Woodard, an American journalist, and writer well known for American Nations argues that their â€Å"staggeringly remote location from the centers of the Spanish American civilization† triggered a disparity between their countries in terms of culture, resulting to a floating border. We will write a custom essay sample on European Colonization of the Americas or any similar topic only for you Order Now On a current note, over 400 years later after the Spanish conquest, said cultural disproportion between Mexico’s North and South has been further incited by the immigration flow from Mexico’s South to the US since the implementation of the North American Free Trade Agreement in 1994. The alienation subsequently created a floating border with hybrid zones and no well-established culture up North, where a mestizo culture established with both â€Å"Mexicanidad† and â€Å"American way of Life†. THE TWO REGIONS The North. Mexico’s North — constituted of Baja California, Sonora, Chihuahua, Coahuila, Nuevo Leà ³n, and Tamaulipas — is characteristic to the term ‘floating border’ 1 presented by a renowned senior researcher of the Instituto de Investigaciones Sociales de la UNAM 2, Gilberto Gimà ©nez. As he reported, the Mexican-American border is a situated hybrid zone with no well-established culture, which is most often considered a ‘mestizo’ 2 region. As cities from both sides of the frontier seemed to develop in a twin pair scheme — McAllen-Reynosa or Laredo-Nuevo Laredo —, a new culture arises with both Mexican and American traits, subsequently alienating the North even further from the Mexican society. Through research carried out by the UNAM where Southerners were asked to present their view of the North, many of the respondents viewed it with fascination and attraction as it had an ‘American Way of Life’ — such mindset being further denominated by researchers as the â€Å"tropism of the North† 3. On the other hand, natives of the Anglo-American communities within the Southern states of the United States often perceive the North as a â€Å"latin reconquest† figuring a true foreign invasion. These conclusions have significant applications in the distinctiveness of the North since the implementation of NAFTA, as they portray the preferability coming from the Mexican Southerners but the hostility of the Americans. The South. Due to the regional disparity in the Mexican labor markets, poverty, and education, the implementation of NAFTA was felt inconsistently through the country. Such effects contributing to an increase of the Mexican immigrant population in the U.S. between 1990 and 2005. (Perreira 2011). The ramifications were mostly present in rural, agricultural areas of the Mexican South where the decrease in wages for poverty-stricken regions incited the migration to the North in search of fair wages and a glimpse of the ‘American Dream’. Various Southern states such as Chiapas, Oaxaca, Campeche, Quintana Roo, Yucatà ¡n, and Guerrero, did not have a favorable outcome within the terms of NAFTA. Correspondingly, Southerners migrated to the Mexican-American border contributing to the hybridization of the North with folklore and traditions of their parting regions. EFFECTS OF NAFTA Immigration ; Migration. During the 1990s, as explained by Mexican Families in North Carolina, an article published by the University of North Carolina and written by Krista M. Perreira, NAFTA strongly influenced the privatization of the Mexican ejido system on agricultural based areas of Southern Mexico. As a result, Southerners migrated towards the North in search of a sustainable lifestyle and supply for their families. Norma Ojeda, Professor of the Sociology Department at the San Diego State University, describes how migration flow subsequently changed the cultures of both their parting and arriving communities as farmers, professionals, technicians, and businessmen migrated up North taking within them Southern traditions and behavior. For instance Americanization. The American culture referenced by Maitane Zuloaga, a graduate student from I.T.E.S.M. University Monterrey, as ‘pop culture’ 4, significantly influenced the cultural mindset and cultural industries 5 within the Mexican society. In her paper, Zuloaga argues that Mexico derives from a dual society where the developed communities live side by side with the underdeveloped regions making it difficult to understand the cultural lifestyle of the country. The Mexican culture is characterized by its diverse nature; however, as soon as NAFTA was implemented in the early months of 1994, â€Å"a wave of major cultural industry changes in Mexico were underway† (Zuloaga 2001). The author maintains that the treaty fomented a rise in the demand for American products — T.V shows, radio, clothes, food, music, and movies — as it brought to Mexico numerous U.S. goods with minimal to no supplementary tariffs. Consequently, the demand for cultural products increased, creating a much more competitive ground for national cultural entities. For instance, Mexican conglomerates of television were heavily impacted by Americanization as the Mexican government presented no previous request for a cultural exemption clause which would â€Å"exclude its cultural activities in order to be in a better position to protect† (Zuloaga 2001). By these means, the U.S. had the liberty to incite cultural trends within Mexico with no repercussion. A survey taken from the research of Josà © Carlos Lozano, a recognized Level II member of SNI 6, notices the effect as citizens of Mexico City, Guadalajara, and Monterrey favored American films, sports, and soap operas over Mexican items (Lozano 2006). Due to the geographical closeness of the North to the U.S., the Northern states were impacted by a much stronger wave of Americanization than those of the South; nonetheless, major Southern cities like Guadalajara and Mexico City were considerably impacted due to their strong economic development. How to cite European Colonization of the Americas, Papers

Saturday, December 7, 2019

Issue in Children Learning in Australia-Free-Samples-Myassignment

Question: Write a report on a current issue affecting children's learning and development in Australia primary school. Answer: Introduction The current assignment focuses on the different contemporary factors which affect the learning and development of the Australian children within a primary school setting. The contemporary issues can be defined as a present day topic, idea, opinion or practise which has a profound effect on the process of teaching and learning. For the current assignment societal and other dominant contemporary issues have been taken into considerations which have a serious impact on the development. The assignment particularly focuses on the concept of bullying in schools which particularly affects the psychology and the mind of the children. Issue and supporting theories In the current assignment the aspect of bullying had been chosen as one of the contemporary issues which produce serious consequences in the learning and development processes of an individual. As commented by Newton et al. (2014), bullying can have negative consequences on the development and learning process within a school. The present context measures the effect of bullying within a primary school setting. Some of the adverse effects of the phenomenon are increased risk of depression and anxiety in the child. As commented by Fan et al. (2016), bullying can result in withdrawal symptoms where the child may feel less connected with the learning environment. As per the National centre for educational statistics (2016), one out of every five children reports being bullied. The Bronfenbenners ecological theory could be used in order to analyse the effect of the macro and the micro environments on the learning and development of children in a primary school setting (Mansfield Beltman, 2014). The theory could be divided into five major components such as microsystem, mesosystem, exosystem and macrosystem. The microsystem is the one closest to the individual such as home, school and workplace. Thus, any disruption within the school environment can have a profound effect on the mind of a child. The mesosystem depicts the relationship between different Microsystems to which the individual is exposed. The exosystem refers to the components which have no direct relation with the subject but can have serious consequences on the health of an individual. As mentioned by Basford Bath (2014), the bystanders of bullying can also feel withdrawn from the school and learning environment. The macrosystem covers the cultural and political aspects which have a direct ef fect on the learning and developmental needs of the child. Figure1: Bronfenbenners ecological theory (Source: Mansfield Beltman, 2014) Rationale supporting understanding of the situation by the teachers The sufficient amount of participation from the teachers in the learning and the development of a child can have a profound effect. As mentioned by Paliadelis et al.( 2015), generating sufficient amount of awareness in the teacher regrading the micro and the meso environments which can impact the development of the children can be instrumental. Bullying is one of the pre-dominant social evils affecting the learning needs of the children within a primary school setting. Recent developments within education policies and the legal framework accommodates for the implementation of the Emergency and Security Management Unit (ESMU). The implementation of such systems helps in controlling the amount of such untoward incidents in school. The ESMU acts as a single reference point for assisting in responding to settling down of emergency issues. As mentioned by Dinham (2015), the teachers can use specific tool for the reporting of such critical incidents in school which is further shared with the National centre for Education statistics (2016). This helps in provision of quick responses and appropriate measures being taken for the rederessal of the concerns. The teacher could use a number of theories within the classroom environment for enhancing the learning and developmental process of the children. In this respect, Gardners multiple intelligence theory could be used by the teacher within the school environment. The theory could be divided into seven different parameters which have an effect on the learning of the children. The parameters have been expanded below such as linguistic, logical-mathematical, visual-spatial, body-kinaesthetic, musical-rhythmic, intrapersonal and interpersonal factors. The intrapersonal and the interpersonal factors are particularly important for the purpose of understanding the grievances faced by the child. The interpersonal factors comprises of the communication aspect and the development of healthy relationships with the co-students. However, as argued by Eleftheriadou et al. (2013), in the context of bullying the child feels little attraction for the schools and has little or no bonding with his fellow classmates. The intrapersonal factor consists of a state of understanding ones own emotions and presence of sufficient motivation within the child (Brten et al. 2017). In the context of primary or school children application of the theories are faced with several challenges. The children of such ages have an impressionate mind and are easily affected by negative forces. Therefore, the teachers can inculcate such measures within the classroom to access the behaviour change in the students. Figure2: Gardners multiple intelligence theory (Source: Adcock, 2014) Discussion of key points The involvement of the teachers in responding to the bullying incidents within the school environment can have positive consequences in down regulating the occurrence of such incidents. Out of 64 % students bullied only 36% reported the same, due to fear of being tormented any further (Spurling, 2017). The effects of such negative forces on the minds of children are disputable and can vary in consequences. Sometimes the consequences can be severe such that forcing a child to commit suicide. Therefore an effective measurement and assessment system needs to be implemented within the learning environment which would help in reducing the chances of such incidents. Apart from bullying in school, the children could also be exposed to a number of disruptive features within their meso environment, which can have serious consequences upon their mental health and development. Thus, some of the effective measures which could be implemented over here are organising regular meetings with the parents of the school children. This helps in the establishment of an open channel of communication between the children, their respective guardians and the school. As mentioned by Lee et al.(2015), implementation of additional features such as the installation of CCTV cameras which are connected with the staff room can act as precautionary measures. Factors contributing to the issue There are a number of factors which can act as direct or indirect contributing factors promulgating developmentally unfavourable environment in school. Some of the factors which form the basis of such bullying in school are gender, race, class, ethnicity and socio-economic status of an individual. As commented by Sumsion et al. (2014), race, ethnicity and socio-economic status of an individual can act as some of the major forms of discrimination. This could be attributed to difference in cultural beliefs along with language barriers. Out of the 71 % of the Australian school enrolments, 21 % have been found to belong to different nationalities (Spurling, 2017). This often results in communication gaps within the school premises, where the children coming from varied geospatial regions are seen as intruders and not one among the few. Additionally, detailed report and analysis have pointed out that every year 0.5 % of the children belonging to the Australian aboriginal and Torres islander drop out of school due to increased rates of discrimination. As per the Australian Psychological society, 65% the bullying behaviour is mostly depicted by individuals who have had previous experiences of being bullied. Additionally, encouragement in any form by the bystanders who support the bullying behaviour can also have a profound effect on the learning and development environment. As commented by Lynch Redpath (2014), such dominating feelings within an individual are often generated due to greater emotional instability and unrest that an individual may be subjected to. Theoretical approaches A number of theoretical approaches may be implemented for the purpose of providing effective counselling or emotional support to the ones experiencing bullying in schools and colleges. The target population being primary school children implementation of person centred approach could help in catering to the care requirements. The person centred approach helps the teachers in applying empathy, love and care for understanding the mental dilemmas faced by the children. Additionally, the implementation of the psychodynamic theory allows the counsellor to evaluate the past and childhood experiences of the child, which plays a critical role in shaping the future behaviour of the child. As commented by Tanrikulu Campbell (2015), the application of the theory is based upon the development of a strong relationship between the student and the attending teacher or counsellor. This is particularly useful in understanding the effect of independent events in the mind of a child. The events may develop into future insecurities and anxieties within the child and further shape the behaviour and development of the child. As commented by Tanrikulu Campbell (2015), application of the transactional theory which amalgamates the humanistic, cognitive behavioural and psychodynamic theory can help in bringing about positive behavioural changes within an individual. As commented by Karimi et al.(2014), parental counselling can also act as an important measure preventing the development of negative feelings within a child. Potential effects of the issue of bullying on learning and development Bullying can have a number of effects on the learning and development of a child. The bullying could be divided into several types such as cyber bullying, physical bullying, verbal bullying, and relational bullying being some of the few. Sometimes such power play and depiction of a strong commanding behaviour can lead to severe consequences in the development of a child. The physical bullying can be defined in the form of hard push or pull or intentionally hurting someone. As commented by Kaiser (2016), such incidents can lead to development of extreme fear and anxiety within the children. This can have a profound effect on the learning and development of the child. Moreover, the deep rooted fear can also affect the cognition and learning power of an individual. The mental bullying has similar consequences and is much fatal in nature, where the decision making power of an individual is often lost. In the context, of the primary school environment the children project a very impressionate mind. Therefore, presentation of false facts and myths to a child can make him distressed, uncanny, irrational. As mentioned by Kwan et al. (2013), extreme cases often results in development of submissive or defensive behaviour in the child. On the contrary, relational bullying can also be mentioned over here where the development of power play or dominating behaviour in an individual often goes unnoticed. This is particularly observed in case of children who have siblings and often display a commanding attitude over them. As mentioned by Healy et al.(2015), parental counselling can play an effective role in checking the progression of such behaviour in the child. Reports and evidences have suggested that increased risk of relational aggression have been found to be associated with early dropouts from school and inclination to abusive substances within a youth or a growing up child. Some of these events results in the development of a number of a plethora of events or changes within the growth and behaviour of a child. As commented by Kaiser (2016), some of these might develop into serious mental illnesses within an individual. The children may portray increased risk of depression and anxiety. The depressive feelings can further affect the learning patterns of an individual. Moreover, changes in sleeping patterns along with increased feelings of sadness and loneliness have been reported in the children facing such bullying activities in school. Some of them have reported detachment from parents and their favourite hobby or activities. As commented by Healy et al (2015), comparatively low levels of psychological well being and social intermixing have been reported in the children with past history of abuses or victimization. Additionally, such incidents can also affect the learning patterns and progression of the child. Thus, some of these might be reflected as consistently low grades of the children, disinterest to learn along with low self esteem. Some of these can have long term effect on the physical and mental well being of the child. Recommendations A number of suitable methods could be suggested for coping up with the contemporary issues of bullying faced within the Australian primary school scenario. Some of these are implementation of effective measures such as emergency and security management unit. The ESMU helps in the prevention of untoward incidents within a learning environment. Additionally, implementation of CCTV cameras can also help in checking incidents of physical and mental bullying. The application of effective counselling sessions and theoretical approaches can further help in analysing the current situation and providing effective measures. Some of the measures such as the transactional theory and the psychodynamic approaches help in the evaluation of the current behaviour patterns depicted by both the bullied and the bully. Additionally, involvement of parents within the counselling process can help in supporting the child care needs. Conclusion The assignment focuses on the concept of contemporary issues and their effects upon learning and development. For the current assignment we have taken into consideration the aspect of child learning and development. Therefore, a number of theories and approaches have been focussed upon in the present model which includes Bonfenbrenners ecological theory along with the Gardners multiples intelligences theory. The theories and the approaches help in the evaluation of the different factors including the growth and the development environment of the child, which have a profound effect on the learning. The inculcation of precautionary measures such as ESMU along with greater involvement of the parents and the teachers can help redressing the care concerns of the child. References Adcock, P. K. (2014). The Longevity of Multiple Intelligence Theory in Education.Delta Kappa Gamma Bulletin,80(4). Basford, J., Bath, C. (2014). Playing the assessment game: an English early childhood education perspective.Early years,34(2), 119-132. Brten, I., Lien, A., Nietfeld, J. (2017). Examining the Effects of Task Instructions to Induce Implicit Theories of Intelligence on a Rational Thinking Task.Zeitschrift fr Psychologie. Dinham, S. (2015). Issues and perspectives relevant to the development of an approach to the accreditation of initial teacher education in Australia based on evidence of impact.Australian Institute for Teaching and School Leadership, Melbourne, Australia. Retrieved from https://? www.? aitsl.? edu.? au/? docs/? default-source/? initial-teacher-education-resources/? ite-reform-stimulus-paper-03-dinham.? pdf. Ekinci, B. (2014). The relationships among Sternberg's Triarchic Abilities, Gardner's multiple intelligences, and academic achievement.Social Behavior and Personality: an international journal,42(4), 625-633. Eleftheriadou, Z. (2013).Incorporating cross-cultural issues in psychotherapy: a relational framework(Doctoral dissertation, Middlesex University). Fan, D., Cui, L., Li, Y., Zhu, C. J. (2016). Localized learning by emerging multinational enterprises in developed host countries: A fuzzy-set analysis of Chinese foreign direct investment in Australia.International Business Review,25(1), 187-203. Healy, K. L., Sanders, M. R., Iyer, A. (2015). Parenting practices, childrens peer relationships and being bullied at school.Journal of Child and Family Studies,24(1), 127-140. Kaiser, S. (2016).Colorado school safety: An examination of web availability of emergency management information(Doctoral dissertation, Colorado State University). Karimi, H., Jarrott, S. E., O'Hora, K. (2014). Therapists Working in New and Old Ways: An Integrative Ecological Framework for Non?Familial Intergenerational Relationships.Australian and New Zealand Journal of Family Therapy,35(3), 207-222. Knaus, M., Warren, J. (2015). A supported playgroup located on school grounds: Developing family relationships within a school environment to support children's transition to school.New Zealand Research in Early Childhood Education, (18), 20. Kwan, G. C. E., Skoric, M. M. (2013). Facebook bullying: An extension of battles in school.Computers in Human Behavior,29(1), 16-25. Lee, S., Kim, C. J., Kim, D. H. (2015). A meta-analysis of the effect of school-based anti-bullying programs.Journal of child health care,19(2), 136-153. Lynch, J., Redpath, T. (2014). Smarttechnologies in early years literacy education: A meta-narrative of paradigmatic tensions in iPad use in an Australian preparatory classroom.Journal of Early Childhood Literacy,14(2), 147-174. Mansfield, C. F., Beltman, S. (2014). Teacher motivation from a goal content perspective: Beginning teachers goals for teaching.International Journal of Educational Research,65, 54-64. Newton, C., Becker, K., Bell, S. (2014). Learning and development opportunities as a tool for the retention of volunteers: A motivational perspective.Human Resource Management Journal,24(4), 514-530. Paliadelis, P. S., Stupans, I., Parker, V., Piper, D., Gillan, P., Lea, J., ... Fagan, A. (2015). The development and evaluation of online stories to enhance clinical learning experiences across health professions in rural Australia.Collegian,22(4), 397-403. Spurling, L. (2017).An introduction to psychodynamic counselling. Palgrave Macmillan. Sumsion, J., Grieshaber, S., McArdle, F., Shield, P. (2014). The'state of play'in Australia: Early childhood educators and play-based learning.Australasian journal of early childhood,39(3), 4. Tanrikulu, I., Campbell, M. (2015). Correlates of traditional bullying and cyberbullying perpetration among Australian students.Children and youth services review,55, 138-146.

Saturday, November 30, 2019

To What Extent Can Logic, Math or Music Be Classified as a Language Tok Essay Example

To What Extent Can Logic, Math or Music Be Classified as a Language? Tok Essay To what extent can logic, math or music be classified as a language? â€Å"Mathematics  is the language with which God has written the universe. † Declares the Italian physicist, mathematician, astronomer, and philosopher Galileo Galilei, when we think in modern sense language is a system of linguistic signs or symbols. In other words it’s the basis of communication. Some people communicate using sign language while others rely on gestures and facial expressions. Mathematics and music may also be used to communicate to some extent. On the other hand logic is only instrumental and it does not house any intention of communication. Mathematics is the systematic arrangement of numbers. These numbers could sometimes be used as a form of secretive code used for communication. Such codes are often used by agencies such as the NSA in exchanging valuable information. Many teenagers also use an alternative alphabet composed mostly of numbers and symbols, leetspeak (or 1337 ). Although mathematics may be used as a language itself could be able to achieve true meaning while using such means of communication? Is it possible to use this nonverbal communication to express our feelings? We must be blind to truly understand the role of face to face communication in our lives. We will write a custom essay sample on To What Extent Can Logic, Math or Music Be Classified as a Language? Tok specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on To What Extent Can Logic, Math or Music Be Classified as a Language? Tok specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on To What Extent Can Logic, Math or Music Be Classified as a Language? Tok specifically for you FOR ONLY $16.38 $13.9/page Hire Writer It would be impossible for you to use irony, connotation and metaphors. For example, if in our secret mathematical code 1446+ meant go away would there be any way to be sure if you said this in a friendly manner or not. This also makes everything vague and unclear. Raw information is put in front of you, you cannot have your own ideas you must accept what is given to you with no objection Music is an essential to most humans, it is a way of coping with life, and it sometimes may even be used to change the mood of the listener. Your mood shapes the music that you listen to. You would not listen to hard rock or metal after a recent breakup instead you will listen to romantic songs. You will also notice that some songs will make you feel happy. For example whenever I listen to a Beatles song let’s say ‘Love Me Do’ a fun/happy feeling forms inside of me. I do not believe that connotation of music is limited with its lyrics. Even when you listen to the tune of Bob Marley’s ‘Don’t Worry Be Happy ‘ you will find yourself feeling happier (positive connotation) businesses use this a lot in their advertisements in order to get the potential customers attention. Although music does have a sense of connotation and is able to shift your mood it cannot be classified as a language as the only knowledge acquired if any is acquired is one way thus there is no communication. For Aristotle, logic is the instrument by means of which we come to know anything. If logic is merely instrument of knowing can we say that it is a language? Could there be language without logic, logic without language? Since we use our own logic to understand the acquired knowledge and there is no intended communication except that of which is with ourselves. Therefore even though logic pays a major role in the apprehension of knowledge it cannot be classified as a language by itself. â€Å"Mathematics is, as it were, a sensuous logic, and relates to philosophy as do the arts, music, and plastic art to poetry. † Once said the German poet, Karl Wilhelm Friedrich Schlegel. Mathematics and music are frequently used to communicate, but without knowledge it would not be possible for us to express our ideas and communicate at all. Therefore we can conclude that mathematics music and language are used integrated with logic forming communication. 0nur Basman () l/l V 2

Monday, November 25, 2019

A Short History of Bluetooth

A Short History of Bluetooth If you own a smartphone, tablet, laptop, speakers or any of the array of electronic devices on the market today, theres a good chance that, at some point, youve paired at least a couple of them together. And while virtually all our personal devices these days are equipped with Bluetooth technology, few people actually know how it got there. The Somewhat Dark Backstory Strangely enough, Hollywood and World War II played a pivotal role in the creation of not only Bluetooth, but a multitude of wireless technologies. It all began in 1937 when Hedy Lamarr, an Austrian-born actress, left her marriage to an arms dealer with ties to Nazis and fascist Italian dictator Benito Mussolini and fled to Hollywood in hopes of becoming a star. With the support of Metro-Goldwyn-Mayer studio head Louis B. Mayer,  who promoted her to audiences as the worlds most beautiful woman, Lamarr notched roles in films such as Boom Town starring Clark Gable and Spencer Tracy, Ziegfeld Girl starring Judy Garland, and 1949 hit Samson and Delilah.   Somehow she also found time to do some inventing on the side. Using her drafting table, she experimented with concepts that included a reworked stoplight design and a fizzy instant drink that came in tablet form. Although none of them panned out, it was her collaboration with composer George Antheil on an innovative guidance system for torpedoes that set her on a course to change the world. Drawing on what she learned about weapons systems while she was married, the two used paper player piano rolls to generate radio frequencies that hopped around as a way to prevent the enemy from jamming the signal. Initially, the U.S. Navy was reluctant to implement Lamarr and Antheil’s spread-spectrum radio technology, but would later deploy the system to relay information about the position of enemy submarines to military aircraft flying overhead.   Today, Wi-Fi and Bluetooth are two variations of spread-spectrum radio. Bluetooth’s Swedish Origins So who invented Bluetooth? The short answer is Swedish telecommunications company Ericsson. The team effort began in 1989 when the Chief Technology Officer of Ericsson Mobile, Nils Rydbeck, together with a physician named Johan Ullman, commissioned engineers Jaap Haartsen and Sven Mattisson to come up with an optimal short-link radio technology standard for transmitting signals between personal computers to wireless headsets that they were planning to bring to the market. In 1990,  Jaap Haartsen was nominated by the  European Patent Office for the European Inventor Award.   The name Bluetooth is an anglicized translation of Danish King Harald Blà ¥tands surname. During the 10th century, the second King of Denmark was famous in Scandinavian lore for uniting the peoples of Denmark and Norway. In creating the Bluetooth standard, the inventors felt that they were, in effect, doing something similar in uniting the PC and cellular industries. Thus the name stuck. The logo is a viking inscription, known as a bind rune, that merges the kings two initials.  Ã‚  Ã‚   Lack of Competition Given its ubiquity, some may also wonder why there arent any alternatives. The answer to this is a little more complicated. The beauty of Bluetooth technology is that it allows up to eight devices to be paired together via short-range radio signals that form a network, with each device functioning as a component of a larger system. To achieve this, Bluetooth-enabled devices must communicate using network protocols under a uniform specification. As a technology standard, similar to Wi-Fi , Bluetooths isnt tied to any product but is implemented by the Bluetooth Special Interest Group, a committee charged with revising the standards as well as licensing the technology and trademarks to manufacturers. For instance, Bluetooth 4.2 (released in 2014) uses less power and features improved speeds and security compared to previous versions. It also allows for internet protocol connectivity so that smart devices can be linked.   That isn’t to say, however, that Bluetooth doesn’t have any competitors. ZigBee, a wireless standard overseen by the ZigBee Alliance was rolled out in 2005 and allows for transmissions over longer distances, up to 100 meters, while using less power. A year later, the Bluetooth Special Interest Group introduced Bluetooth low energy, aimed at reducing power consumption by putting the connection into sleep mode whenever it detected inactivity.

Friday, November 22, 2019

A study on motivational factors influencing work place behaviour of employees

This project is entitled A STUDY ON MOTIVATIONAL FACTORS INFLUENCING WORK PLACE BEHAVIOUR OF EMPLOYEES with reference to â€Å"TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,†, located at Neyveli. In this company there are 145 employees including the staff members. For this study, I have chosen a sample size 30 employees through a systematic sampling. This study helps to know the factors that are influencing the motivational level of employees in the organization. This project had been undertaken by me to find out the needs and wants of the employees to motivate them. Under this Study a questionnaire that contained the questions relating to the employees expectations are given to them and their responses are recorded. The gathered data had been analyzed relating to employee motivations. CHAPTER-1 1. INTRODUCTION The project work titled as A STUDY ON MOTIVATIONAL FACTORS INFLUENCING WORK PLACE BEHAVIOUR OF EMPLOYEES with special reference to TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,, is mainly conducted to identify the factors which will motivate the employees in that organization. Management’s basic job is the effective utilization of human resources for achievements of organizational objectives. The personnel management is concerned with organizing human resources in such a way to get maximum output to the enterprise and to develop the talent of people at work to the fullest satisfaction. Motivation implies that one person, in organization context a manager, includes another, say an employee, to engage in action by ensuring that a channel to satisfy those needs and aspirations becomes available to the person. In addition to this, the strong needs in a direction that is satisfying to the latent needs in employees and harness them in a manner that would be functional for the organization. Employee motivation is one of the major issues faced by every organization. It is the major task of every manager to motivate his subordinates or to create the ‘will to work’ among the subordinates. It should also be remembered that a worker may be immensely capable of doing some work; nothing can be achieved if he is not willing to work. A manager has to make appropriate use of motivation to enthuse the employees to follow them. Hence these studies focus on the employee motivation among the employees of Premier Buildings Materials Ltd. , The data needed for the study has been collected from the employees through questionnaires and through direct interviews. Analysis and interpretation has been done by using the statistical tools and data’s are presented through tables and charts. 1. 1INDUSTRY PROFILE: Energy has been universally recognized as one of the most important inputs for economic growth and human development. There is a strong two-way relationship between economic development and energy consumption. On one hand, growth of an economy, with its global competitiveness, hinges on the availability of cost-effective and environmentally benign energy sources, and on the other hand, the level of economic development has been observed to be reliant on the energy demand. Coal India now ranks third amongst the coal producing countries in the world. Being the most abundant fossil fuel in India till date, it continues to be one of the most important sources for meeting the domestic energy needs. It accounts for 55% of the country’s total energy supplies. Through sustained increase in investment, production of coal increased from about 70 MT (million tonnes) (MoC 2005) in early 1970s to 382 MT in 2004/05. Most of the coal production in India comes from open pit mines contributing to over 81% of the total production while underground mining accounts for rest of the national output mainly from Neyveli (MoC 2005) 1. 2COMPANY PROFILE: TAQA Abu Dhabi National Energy Company, PJSC (TAQA) Type state-owned Traded as ADX: TAQA Industry Energy Founded 2005 Headquarters Abu Dhabi, United Arab Emirates Owner(s) Government of Abu Dhabi Employees 2,800 (Aug 2011) Subsidiaries TAQA North, TAQA Bratani Website www. taqa. ae The Abu Dhabi National Energy Company, PJSC (TAQA) (ADX: TAQA) is a government controlled energy holding company of Abu Dhabi, United Arab Emirates. TAQA is one of Abu Dhabi’s flagship companies and as such has an important role to play in helping to deliver the economic strategy of the Emirate of Abu Dhabi. [citation needed] History TAQA was founded in June 2005 pursuant to the provisions of Emiri Decree in 2005 as a public joint stock company. In May 2006 TAQA appointed Mr. Peter E. Barker-Homek, an American businessman, as its first CEO. TAQA expanded quickly under the guidance of Mr. Barker-Homek, making several key acquisitions in Africa and North America In Canada, TAQA acquired Northrock Resources Ltd. (US$ 2 billion) Pioneer Natural Resources Canada Inc (US$ 540 million) and PrimeWest Energy Trust (US$ 5 billion). In 2008 TAQA acquired several North Sea assets from Shell U. K. Limited and Esso Exploration and Production (UK) Limited. The purchase included all equity, associated infrastructure and production licenses relating to the Tern, Eider, Cormorant North, South Cormorant, Kestrel and Pelican fields and related sub-sea satellite fields. [citation needed] In late 2009 Mr Barker-Homek relinquished his position as CEO and was replaced by Carl Sheldon. Operations TAQAs main focus of investments is the companies engaged in power generation, water desalination, and production and storage of oil and gas. In addition, it has invested in mining, metal, and services sectors. TAQA has investments in over 60 companies. Its principal wholly owned subsidiaries include Emirates Power Company, Gulf Power Company, Arabian United Power Company, Al Shuweihat Power Company, Taweelah United Power Company, Union Power Holding Company, TAQA Bratani Limited, TAQA Energy B. V. , TAQA North Ltd. and Takoradi International Company, operator of the Takoradi Power Station II. TAQA owns majority stakes in assets that provide about 85% of Abu Dhabis power generation and 90% of its water desalination capacity. In addition to the Persian Gulf region, TAQA has assets in Europe, Asia and Africa. It has interests in the Tern Alpha, Eider Alpha, Cormorant North, Cormorant Alpha, Kestrel and Pelican fields and related sub-sea satellite fields in the North Sea. On 3 August 2009, TAQA took over operatorship of the North Sea Brent Oil Pipelines System. In addition, in 2006 TAQA acquired BP Nederland Energie B. V. Through this acquisition, TAQA get onshore and off-shore production assets, including the Piek Gas Installatie facility in Alkmaar, the project of the largest offshore LNG Regas facilities utilizing the depleted field P15/P18 just off the port of Rotterdam, and partnership in the Bergermeer gas storage project. In August 2009, it bought a 15% interest in North Sea assets from the L11b Group took over the operatorship of the L11b-A production platform. Through the acquisition of CMS Generation, TAQA has assets in the UAE, Ghana, Morocco, Saudi Arabia and India. On January 3, 2013, TAQA signed an agreement with Turkey to invest about $12 billion to develop the coal fields in the Southern Turkey. This deal is considered as the second biggest Arab investment in Turkey in the energy sector. Shareholders TAQA is listed on the Abu Dhabi Securities Exchange. The company is 75. 1% indirectly owned by the government of Abu Dhabi. The government of Abu Dhabi through ADWEA owns 51%, ADWEA transferred 24. 1% of its shareholding to the Fund for the Support of Farm Owners in the Emirate of Abu Dhabi. The balance (24. 9%) is traded publicly on the Abu Dhabi Securities Market. Finance Standard Poors has assigned A+/A-1 corporate credit ratings to TAQA. Moodys has assigned a rating of Aa3 to TAQAs long term foreign and local currency obligations. Combining world-class expertise and a dynamic and exciting portfolio of assets, TAQA has been transformed from a start-up into a truly global operator within the space of seven years. TAQA AT A GLANCE Full name Abu Dhabi National Energy Company PJSC Nature of business Oil and gas exploration and production, power generation and water desalination and Energy Solutions 2012 revenue AED 27. 8 Bn USD 7. 6 Bn 2012 profit AED 649 Mn USD 176. 7 Mn Total assets as at 31 Dec 2012 AED 122. 6 Bn USD 33. 4 Bn Number of employees 2,800 Operating in North America, Europe and Greater MENA (Middle East, North Africa and India) Founded June 2005 Listed August 2005 Abu Dhabi Securities Exchange Principal shareholders Abu Dhabi Government and Government agencies 72. 5% Public shareholders 27. 5% Power generation capacity 16,395 MW Water desalination capacity 887 MIGD Oil Gas production 135,400 boe/d * US$1. 00 (United States dollar) = AED3. 6725 (UAE dirhams) 1. 3 OBJECTIVES OF THE STUDY: PRIMARY OBJECTIVE: To study , analyze and to understand the motivational factors of employees of TAQA NEYVELI POWER COMPANY Pvt. , Ltd. , that affects their work place behavior. SECONDARY OBJECTIVE: To identify the various motivational schemes that already exists in the organization. To measure the level of motivation experienced by the employees in the organization 1. 4 NEED FOR THE STUDY: To study and know the employee motivation scenario in TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,, To know that the employees satisfaction level with the motivation factors undertaken by the company. To identify steps taken by the organization to motivates its employees. To identify the factors that influence the work place behavior of employees. 1. 5 SCOPE FOR THE STUDY: This study helps the researcher to realize the importance of effective employee motivation. This study explores the views expressed by the Respondents about the motivation and providing solutions in an attempt to develop a better system. The importance of studying employee motivation is to understand the internal satisfaction of every employee. The findings of this study help the company to fulfill the expectations of the employees. It helps to provide insights to support future research regarding strategic guidance for organizations that are both providing and using reward/recognition programs. 1. 6 LIMITATIONS OF THE STUDY: The limitations of the study are the following As the data was collected through questionnaire, the responds from the respondents may not be accurate. The sample taken for the study was only 30 and the results drawn may not be accurate. Another difficulty was very limited time-span of the project. Lack of experience of Researcher. CHAPTER-2: 2. REVIEW OF LITERATURE 2. 1 THEORETICAL REVIEW Rensis Likerthas called motivation as the core of management. Motivation is the core of management. Motivation is an effective instrument in the hands of the management in inspiring the work force . It is the major task of every manager to motivate his subordinate or to create the will to work among the subordinates . It should also be remembered that the worker may be immensely capable of doing some work, nothing can be achieved if he is not willing to work . creation of a will to work is motivation in simple but true sense of term. Motivation is an important function which very manager performs for actuating the people to work for accomplishment of objectives of the organization . Issuance of well conceived instructions and orders does not mean that they will be followed . A manager has to make appropriate use of motivation to enthuse the employees to follow them. Effective motivation succeeds not only in having an order accepted but also in gaining a determination to see that it is executed efficiently and effectively. In order to motivate workers to work for the organizational goals, the managers must determine the motives or needs of the workers and provide an environment in which appropriate incentives are available for their satisfaction . If the management is successful in doing so; it will also be successful in increasing the willingness of the workers to work. This will increase efficiency and effectiveness of the organization . There will be better utilization of resources and workers abilities and capacities. 2. 1. 1 The concept of motivation The word motivation has been derived from motive which means any idea, need or emotion that prompts a man in to action. Whatever may be the behavior of man, there is some stimulus behind it . Stimulus is dependent upon the motive of the person concerned. Motive can be known by studying his needs and desires. There is no universal theory that can explain the factors influencing motives which control mans behavior at any particular point of time. In general, the different motives operate at different times among different people and influence their behaviors. The process of motivation studies the motives of individuals which cause different type of behavior. 2. 1. 2 Definition of Motivation â€Å"Motivation in the real world is the art of getting the extra effort from everyone including yourself†. Management Research, October 2007, ICFAI University press. 2. 1. 3 Saul W. Gellerman According to â€Å"Saul W. Gellerman†, â€Å"Motivation is the process of attempting to influence others to do their work through the possibility of gain or reward†. HRM Review, July 2008, by Saul W. Gellerman . 2. 1. 4 Motivation According to Webster’s New Collegiate Dictionary, a motive is â€Å"something a need or desire that causes a person to act†. â€Å"Motivate, in turn, means â€Å"to provide with a motive,† and motivation is defined as â€Å"the act or process of motivating†. Consequently, motivation is the performance or procedure of presenting an intention that origin a person to capture some accomplishment (Shanks. N. H. ). According to Butkus Green, motivation is derived from the word â€Å"motivate†, means to move, push or influence to proceed for fulfilling a want Business Management and Strategy ISSN 2157-6068 2012, Vol. 3, No. 1 2. 1. 4 Significance of Motivation Motivation involves getting the members of the group to pull weight effectively, to give their loyalty to the group, to carry out properly the purpose of the organization. The following results may be expected if the employees are properly motivated. 1. The workforce will be better satisfied if the management provides them with opportunities to fulfill their physiological and psychological needs. The workers will cooperate voluntarily with the management and will contribute their maximum towards the goals of the enterprise. 2. Workers will tend to be as efficient as possible by improving upon their skills and knowledge so that they are able to contribute to the progress of the organization. This will also result in increased productivity. 3. The rates of labor’s turnover and absenteeism among the workers will be low. 4. There will be good human relations in the organization as friction among the workers themselves and between the workers and the management will decrease. 5. The number of complaints and grievances will come down. Accident will also be low. 6. There will be increase in the quantity and quality of products. Wastage and scrap will be less. Better quality of products will also increase the public image of the business. 2. 1. 5 Motivation Process. 1. Identification of need 2. Tension 3. Course of action 4. Result –Positive/Negative 5. Feed back 2. 1. 6 Theories of Motivation. Understanding what motivated employees and how they were motivated was the focus of many researchers following the publication of the Hawthorne study results (Terpstra, 1979). Six major approaches that have led to our understanding of motivation are Mcclelland’s Achievement Need Theory, Behavior Modification theory; Abraham H Mallows need hierarchy or Deficient theory of motivation. J. S. Adam’s Equity Theory, Vrooms Expectation Theory, Two factor Theory. McClelland’s Achievement Need Theory. According to McClelland’s there are three types of needs; Need for Achievement ; This need is the strongest and lasting motivating factor. Particularly in case of persons who satisfy the other needs. They are constantly pre occupied with a desire for improvement and lack for situation in which successful outcomes are directly correlated with their efforts. They set more difficult but achievable goals for themselves because success with easily achievable goals hardly provides a sense of achievement. Need for Power It is the desire to control the behavior of the other people and to manipulate the surroundings. Power motivations positive applications results in domestic leadership style, while it negative application tends autocratic style. Need for affiliation It is the related to social needs and creates friendship. This results in formation of informal groups or social circle. Behavioral Modification Theory; According to this theory people behavior is the outcome of favorable and unfavorable past circumstances. This theory is based on learning theory. Skinner conducted his researches among rats and school children. He found that stimulus for desirable behavior could be strengthened by rewarding it at the earliest. In the industrial situation, this relevance of this theory may be found in the installation of financial and non financial incentives. More immediate is the reward and stimulation or it motivates it. Withdrawal of reward incase of low standard work may also produce the desired result. However, researches show that it is generally more effective to reward desired behavior than to punish undesired behavior. Abraham H Maslow Need Hierarchy or Deficient theory of Motivation. The intellectual basis for most of motivation thinking has been provided by behavioral scientists, A. H Maslow and Frederick Herzberg, who’s published works are the â€Å"Bible of Motivation†. Although Maslow himself did not apply his theory to industrial situation, it has wide impact for beyond academic circles. Douglous Mac Gregor has used Maslow’s theory to interpret specific problems in personnel administration and industrial relations. The crux of Maslow’s theory is that human needs are arranged in hierarchy composed of five categories. The lowest level needs are physiological and the highest levels are the self actualization needs. Maslow starts with the formation that man is a wanting animal with a hierarchy of needs of which some are lower ins scale and some are in a higher scale or system of values. As the lower needs are satisfied, higher needs emerge. Higher needs cannot be satisfied unless lower needs are fulfilled. A satisfied need is not a motivator. This resembles the standard economic theory of diminishing returns. The hierarchy of needs at work in the individual is today a routine tool of personnel trade and when these needs are active, they act as powerful conditioners of behavior- as Motivators. Hierarchy of needs; the main needs of men are five. They are physiological needs, safety needs, social needs, ego needs and self actualization needs, as shown in order of their importance The above five basic needs are regarded as striving needs which make a person do things. The first model indicates the ranking of different needs. The second is more helpful in indicating how the satisfaction of the higher needs is based on the satisfaction of lower needs. It also shows how the number of person who has experienced the fulfillment of the higher needs gradually tapers off. Physiological or Body Needs: The individual move up the ladder responding first to the physiological needs for nourishment, clothing and shelter. These physical needs must be equated with pay rate, pay practices and to an extent with physical condition of the job. Safety: The next in order of needs is safety needs, the need to be free from danger, either from other people or from environment. The individual want to assured, once his bodily needs are satisfied, that they are secure and will continue to be satisfied for foreseeable feature. The safety needs may take the form of job security, security against disease, misfortune, old age etc as also against industrial injury. Such needs are generally met by safety laws, measure of social security, protective labor laws and collective agreements. Social needs: Going up the scale of needs the individual feels the desire to work in a cohesive group and develop a sense of belonging and identification with a group. He feels the need to love and be loved and the need to belong and be identified with a group. In a large organization it is not easy to build up social relations. However close relationship can be built up with at least some fellow workers. Every employee wants to feel that he is wanted or accepted and that he is not an alien facing a hostile group. Ego or Esteem Needs: These needs are reflected in our desire for status and recognition, respect and prestige in the work group or work place such as is conferred by the recognition of one’s merit by promotion, by participation in management and by fulfillment of workers urge for self expression. Some of the needs relate to ones esteem e. g. ; need for achievement, self confidence, knowledge, competence etc. On the job, this means praise for a job but more important it means a feeling by employee that at all times he has the respect of his supervisor as a person and as a contributor to the organizational goals. Self realization or Actualization needs: This upper level need is one which when satisfied provide insights to support future research regarding strategic guidance for organization that are both providing and using reward/recognition programs makes the employee gives up the dependence on others or on the environment. He becomes growth oriented, self oriented, directed, detached and creative. This need reflects a state defined in terms of the extent to which an individual attains his personnel goal. This is the need which totally lies within oneself and there is no demand from any external situation or person. J. S Adams Equity Theory Employee compares her/his job inputs outcome ratio with that of reference. If the employee perceives inequity, she/he will act to correct the inequity: lower productivity, reduced quality, increased absenteeism, voluntary resignation. Vrooms Expectation Theory Vroom’s theory is based on the belief that employee effort will lead to performance and performance will lead to rewards (Vroom, 1964). Reward may be either positive or negative. The more positive the reward the more likely the employee will be highly motivated. Conversely, the more negative the reward the less likely the employee will be motivated. Two Factor Theory Douglas McGregor introduced the theory with the help of two views; X assumptions are conservative in style Assumptions are modern in style. X Theory Individuals inherently dislike work. People must be coerced or controlled to do work to achieve the objectives. People prefer to be directed Y Theory People view work as being as natural as play and rest People will exercise self direction and control towards achieving objectives they are Committed to. People learn to accept and seek responsibility Types of Motivation. Intrinsic motivation occurs when people are internally motivated to do something because it either brings them pleasure, they think it is important, or they feel that what they are learning is morally significant. Extrinsic motivation comes into play when a student is compelled to do something or act a certain way because of factors external to him or her (like money or good grades) Incentives An incentive is something which stimulates a person towards some goal. It activates human needs and creates the desire to work. Thus, an incentive is a means of motivation. In organizations, increase in incentive leads to better performance and vice versa. Need for Incentives Man is a wanting animal. He continues to want something or other. He is never fully satisfied. If one need is satisfied, the other need arises. In order to motivate the employees, the management should try to satisfy their needs. For this purpose, both financial and non financial incentives may be used by the management to motivate the workers. Financial incentives or motivators are those which are associated with money. They include wages and salaries, fringe benefits, bonus, retirement benefits etc. Non financial motivators are those which are not associated with monetary rewards. They include intangible incentives like ego-satisfaction, self-actualization and responsibility. INCENTIVES Financial Incentives Non-financial incentives Wages and Salaries. * Competition Bonus * Group recognition Medical reimbursement *Job security Insurance *Praise Retirement benefits *Workers participation *Suggestion systems Motivation is the key to performance improvement There is an old saying you can take a horse to the water but you cannot force it to drink; it will drink only if its thirsty so with people. They will do what they want to do or otherwise motivated to do. Whether it is to excel on the workshop floor or in the ivory tower they must be motivated or driven to it, either by themselves or through external stimulus. Are they born with the self-motivation or drive? Yes and no. If no, they can be motivated, for motivation is a skill which can and must be learnt. This is essential for any business to survive and succeed. Performance is considered to be a function of ability and motivation, thus: Job performance = f (ability) (motivation) Ability in turn depends on education, experience and training and its improvement is a slow and long process. On the other hand motivation can be improved quickly. There are many options and an uninitiated manager may not even know where to start. As a guideline, there are broadly seven strategies for motivation. There are broadly seven strategies for motivation. Positive reinforcement / high expectations Effective discipline and punishment Treating people fairly Satisfying employee’s needs Setting work related goals Restructuring jobs Base rewards on job performance Essentially, there is a gap between an individual’s actual state and some desired state and the manager tries to reduce this gap. Motivation is, in effect, a means to reduce and manipulate this gap. 2. 2 RESEARCH REVIEW The research problem here in this study is associated with the motivation of employees of TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,. There are a variety of factors that can influence a person’s level of motivation; some of these factors include 1. The level of pay and benefits, 2. The perceived fairness of promotion system within a company, 3. Quality of the working conditions, 4. Leadership and social relationships, 5. Employee recognition 6. Job security 7. Career development opportunities etc. Motivated employees are a great asset to any organization. It is because the motivation and Job satisfaction is clearly linked. Hence this study is focusing on the employee motivation in the organization. 2. 3 RESEARCH HYPOTHESIS A hypothesis is a preliminary or tentative explanation or postulate by the researcher of what the researcher considers the outcome of an investigation will be. It is an informed/educated guess. It indicates the expectations of the researcher regarding certain variables. It is the most specific way in which an answer to a problem can be stated. Research hypotheses are the specific testable predictions made about the independent and dependent variables in the study. Hypotheses are couched in terms of the particular independent and dependent variables that are going to be used in the study. The research hypothesis of this study is as follows. HYPOTHESIS: There is significant relationship between income and motivation level of the employees CHAPTER -3 3. RESEARCH METHODOLOGY. Research is a systematic method of finding solutions to problems. It is essentially an Investigation, a recording and an analysis of evidence for the purpose of gaining knowledge. According to Clifford woody, â€Å"research comprises of defining and redefining problem, formulating hypothesis or suggested solutions, collecting, organizing and evaluating data, reaching conclusions, testing conclusions to determine whether they fit the formulated hypothesis. † 3. 1 RESEARCH DESIGN: A Research design is plan that specifies the objectives of the study, method to be adopted in the collection of the data, tools in analysis of data and helpful to frame hypothesis. â€Å"A research design is the arrangement of condition for collection and analysis of data in a manner that aims to combine relevance to research purpose with economy in procedure†. Research design is needed because it facilitates the smooth sailing of the various project operations, thereby making the project as efficient as possible yielding maximal information with minimal data collected. 3. 2 Sampling Design. A sample design is a finite plan for obtaining a sample from a given population. Simple systematic sampling is used for this study. 3. 3 Universe. The universe chosen for the research study is the employees of TAQA NEYVELI POWER COMPANY Pvt. , Ltd. , 3. 4 Sample Size. Number of the sampling units selected from the population is called the size of the sample. Sample of 30 respondents were obtained from the population. 3. 5 Sampling Procedure. The procedure adopted in the present study is probability sampling, which is also known as chance sampling. Under this sampling design, every item of the frame has an equal chance of inclusion in the sample. 3. 6 Methods of Data Collection. The data’s were collected through Primary and secondary sources. 3. 6. 1 Primary Sources. Primary data are in the form of â€Å"raw material† to which statistical methods are applied for the purpose of analysis and interpretations. The primary sources are discussion with employees, data’s collected through questionnaire. 3. 6. 2 Secondary Sources. Secondary data’s are in the form of finished products as they have already been treated statistically in some form or other. The secondary data mainly consists of data and information collected from records, company websites and also discussion with the management of the organization. Secondary data was also collected from journals, magazines and books. 3. 6. 3 Nature of Research. Descriptive research, also known as statistical research, describes data and characteristics about the population or phenomenon being studied. Descriptive research answers the questions who, what, where, when and how. Although the data description is factual, accurate and systematic, the research cannot describe what caused a situation. Thus, descriptive research cannot be used to create a causal relationship, where one variable affects another. In other words, descriptive research can be said to have a low requirement for internal validity. 3. 6. 4 Questionnaire. A well defined questionnaire that is used effectively can gather information on both overall performance of the test system as well as information on specific components of the system. A defeated questionnaire was carefully prepared and specially numbered. The questions were arranged in proper order, in accordance with the relevance. 3. 6. 5 Nature of Questions Asked. The questionnaire consists of closed ended, dichotomous questions and open ended question. 3. 6. 6 Pre-testing A pre-testing of questionnaire was conducted with 10 questionnaires, which were distributed and all of them were collected back as completed questionnaire. On the basis of doubts raised by the respondents the questionnaire was redialed to its present form. 3. 6. 7 Sample A finite subset of population, selected from it with the objective of investigating its properties called a sample. A sample is a representative part of the population. A sample of 30 respondents in total has been randomly selected. The response to various elements under each questions were totaled for the purpose of various statistical testing. 3. 6. 8 Variables of the Study. The direct variable of the study is the employee motivation, Indirect variables are the motivational schemes, motivational level and job satisfaction and effectiveness of employees. 3. 6. 9 Presentation of Data. The data are presented through charts and tables. 3. 6. 10 Tools and Techniques for Analysis. Statistical method: Percentage method Bar chart Statistical tool used: To arrange and interpret the collected data the following statistical tool used is ANOVA. CHAPTER-4 4. DATA ANALYSIS AND INTERPRETATION: 4. 1 PE

Wednesday, November 20, 2019

Any topic you think is good for my paper 'but look to the assigment Assignment

Any topic you think is good for my paper 'but look to the assigment sheet befour u start' - Assignment Example Using logos as a means of persuasion, Boot provided narrative details of historical claims and identified nautical miles that establish sovereignty to lands according to international law. Likewise, incidents of current events that detail both countries’ active claim through positioning respective vessels in the area have been detailed. The apparent lack of support and active participation of the United States, known as an ally to the Philippines proven by a 1951 treaty, was likewise allegedly established through assuming a neutral stance. The author used ethos by establishing his credibility as a â€Å"senior fellow at the Council on Foreign Relations and author of the forthcoming (book)† (Boot par. 13). By indicating that he is not among the two claiming parties’ citizen, he appeared to present objective and unbiased arguments on this matter. Through establishing appropriate logical reasoning, the author effectively established logos as a rhetorical appeal and has likewise appropriately used ethos to credibly confirm his unbiased character as an author and to provide an objective report on the subject of

Tuesday, November 19, 2019

Management Essay Example | Topics and Well Written Essays - 1500 words - 1

Management - Essay Example f Brazil. This retail sector organization is considered as one of the leading retailers as well as largest employers in private sector of Australia (Coles Myer Ltd 2000). The origin of Coles Myer was around 100 years ago was from the two Australian retailers namely â€Å"G. J. Coles & Coy and The Myer Emporium† (Coles Myer Ltd 2000). They have their operations in Australia along with New Zealand and possess about 2,000 retail stores in those places. Coles Myer has shareholders numbering above 380,000 (Coles Myer Ltd 2000). The organization’s businesses are generally classified into five groups which include Food & Liquor, Myer Grace Bros, General Merchandize, e.colesmyer and Apparel & Home. The retail stores have an annual sale of more than $24 billion. The various brand of Coles Myer are Grace Bros, Coles, Myer, Target, Bi-Lo, Kmart, Liquor land, Fosseys and Officeworks. This retail sector organization has provided employment to over 167,000 staffs (Plunkett 2005). Col es Myer has adopted wide communication strategies in order to contact with their staffs, suppliers, customers, stakeholders, shareholders by replying through letters and intranet site. They believe that satisfying customers will bring their success and collecting customers’ feedback will help them to make necessary improvements if it is needed. They want to provide best services to the customers and preserve good relationship with them (Coles Myer Ltd 2000). Coles Myer provides ongoing practical training to the staff in order to facilitate them to handle properly the customers and provide quality services to them. The training is provided with a basis of making their staff to have an actual understanding of their compliance responsibilities (Coles Myer Ltd 2000). Coles Myer is entering into the retail market of Brazil with the aim of business expansion as well as spreading their brand name beyond the Oceania region. As Brazil is considered as one of the world’s largest retail markets, thus Coles Myer can get scope of extension of their retail business. Though the store will be located in Brazil but the services will be provided by the Australian organization. However, several Brazilian staffs will be hired for the retail store but the training will be provided by the Australian managers since they are extremely customer oriented. They want to provide best services to the customers of Brazil to build their brand name. The main purpose of the report is to prepare an environmental analysis of the Brazil’s business environment for an Australian retail sector organization Coles Myer who wants to enter in the market of Brazil. The company faces various challenges and can gain opportunities while expanding its business in new Brazilian market. In this paper the PESTL analysis along with SWOT analysis of Coles Myer is conducted and subsequently recommendations are provided for the organization for entering into the

Saturday, November 16, 2019

Internet security Essay Example for Free

Internet security Essay In the developed and developing world, the use of the internet has increased in popularity. The use of the internet has become the preferred mode of communication and resources for various players like industries, corporations, telecommunications, and governments and in business. In business, the internet has facilitated financial transactions that have greatly changed the face of business making it fast and simple and in conformation to the global village the technology has created. With the increased use of the internet, there has been a corresponding increase in cyber crime from criminals who are seeking either financial gains or other advantages for example military. The frequency of these attacks is very high and the levels of sophistication used are great . This makes it difficult for many organizations to determine new threats, their risk factors and ways of dealing with the menace (Cetron, et al, 2009). Many times it is difficult for the organizations to determine which attacks to deal with first and how to allocate resources to deal with them. In the commercial sector, attacks on electronic financial transactions have resulted in great financial losses and corresponding reductions in user confidence. Electronic transactions consist of funds transfers, data interchange, trade confirmations and benefits transfers. Many crimes that occur have plagued the industry for years like theft, service denial, extortion demands or fraud. Technology has however; greatly magnified the ability of major crimes to be committed in a matter of seconds. Electronic security is an industry that is growing and becoming globalised. This industry offers services in the categories of assessment, access and utilization. To demonstrate the severity of attacks on April, 2009, Chinese and Russian spies managed to infiltrate the United States of America electrical grid and inserted disruptive software into the system (Cetron, et al, 2009). An attack which occurred prior to this one on September 2008 would have caused the collapse of the global economy were it not for intervention. Unidentified hackers robbed the lucrative American financial market accounts a total of five hundred and fifty million dollars in a little less than two hours. If the accounts would not have been closed by the Treasury Department they would have lost almost six trillion dollars. This would have caused the global economy to collapse in approximately twenty four hours. One security threat is phishing. Phishing involves the acquisition of sensitive information like passwords, credit card details, usernames and pin numbers. It makes its presentation as being a legal entity. The unsuspecting victims are lured by receiving communications which purport to be from a popular website or payment processors. It is usually done through instant messaging services or emails (Shu-Min Shann-Bin, 2006). These communications directs the users to enter their details at a fraudulent website which bears a great semblance to the authentic one. Phishing attacks were observed on two popular brands which provide payment services for banks globally in the United States of America in February 2010. The fraudsters created phishing sites in English and other languages, the most popular being French. These websites targeted customers by sending spam mails with the subject proving the card number and claiming that there was a risk of fraudulent transactions taking place. This attack was created using two types of phishing websites. The first utilised Uniform Resource Locators which were created with domain names with many top level domain variants. The most popular domain which was utilised was . cz which represented the Czech Republic. Upon entering their sensitive information into a card holder page for the false verification, the page redirected to the real website. The second attack utilised Uniform Resource Locators with Internet Protocol domains which were hosted on servers based in the United States (Glaessner, 2002). The Uniform Resource Locators’ strings were very long, typically with more than seven hundred characters. The pages asked for sensitive data but had an auto signed debit card or credit card number. This auto signing was done by placing stolen numbers of cards obtained from earlier attacks on the form. Upon receipt of information the page was redirected to a blank page. Cross site scripting is a form of phishing that occurs in programs or websites that allow user input. If the input data is not properly sanitized the program may then process thee input or execute the codes which the original program was not to do. This has been used to redirect users to fake websites. Users are advised not to click on suspicious links in emails and to check the Uniform Resource Locator’s of the website to authenticate brands. It is also advised that one should type the brand domain name directly into the browser address instead of following links. The use of security software has also been recommended. Pharming involves redirecting the redirection of websites traffic and taking it to a false website. Pharming is done by either converting the hosts file on the victims’ computer or exploiting Domain Name Systems servers’ software (Basu, 2009). These Domain Names Systems servers main task is to convert internet names to their real addresses. A compromised server therefore does not direct traffic to legitimate websites. Highly vulnerable sites of compromised are near internet leaves. If wrong entries on a computer’s host file are made it results in circumvention of name lookup using its own name to Internet Protocol mapping, this makes it a popular target for malware. Once it is rewritten a user can be redirected to a fake copy. The better targets for pharming are desktop computers as they receive poor administration in comparison to most other internet services. Host file compromises can compromise the network router. Many routers specify Domain Name Systems to clients on the network and wrong information here spoils the entire local area network. A compromise in routers is very hard to detect. Pharming also occurs by infecting the victim’s computer with malware or a virus. This causes the redirection of a website to a fake one. An unsuspecting user may enter information site unaware. To avoid pharming, users are advised to search for details that prove that the website is authentic. Typing the sites address into the browser bar also offers some protection. Use of an antivirus to reduce virus infiltration into the computers is also recommended. Vigilance is important in warding off attacks. Trojan horses are also a great threat to internet security. Trojan horses present themselves as valuable software which is available for downloading on the internet. This fools many people into downloading the virus in the presumption that it is another application. A Trojan horse is usually separated into parts which are the client and the server. The client is usually disguised as important software and is situated in some sharing networks like peer to peer or uncertified websites for downloads. As soon as the client Trojan is executed in the computer, the attacker who is the person operating the server has great control over the computer and can destroy it depending on his purpose. The spread of the Trojan horse virus can occur through email attachments using various spamming techniques. Malware creators spread the virus through chat software like Skype and Yahoo Messenger. The virus may also infect other machines by distributing copies of itself to those in the address book of the infected computer. There are many types of Trojan horses. Remote access Trojans give attackers complete control of he victim’s computer and access to any information stored in the files. Password Trojans copy all passwords and look for passwords as they are keyed into a computer and send them to a certain email address. Key loggers log the keystrokes used by victims and send the log information to the attacker and can be configured to online and offline modes of recording. Destructive Trojans cause destructions to files and deletes them completely from infected computers. They are able to delete all system files of a computer (Basu, 2009). While there are other types of Trojans not mentioned here, it should be noted that a Trojan may work with a combination of some of the functionalities explained. To best avoid a Trojan hose virus attack, one should open email attachments or files received from strange senders. Installing and updating an antivirus program is also helpful. For secure electronic online transactions certain criteria have to be addressed and met. There must be secure access control which determines who has access to a system and be able to deny access to intruders. Proper authentication of users and message integrity must also be established. Privacy of the parties involved must also be safeguarded and maintained (Shu-Min Shann-Bin, 2006). Non-repudiation must be ensured where the sender cannot deny (falsely) sending a message. The use of online signatures has also been manipulated to commit fraud. Electronic signatures are a recognized electronic way of showing that a person has accepted the contents of a message sent electronically. These signatures are increasingly being used in electronic commerce and have evolved into digitized signatures which are encrypted and more secure than a simple electronic signature. While they are themselves subject to fraud the purpose of their creation was to combat fraud (Hansen, 1995). Electronic signatures are based on legal principles which have to be understood by the institutions which wish to use it. The use of digital signatures is a code that authenticates the origins of a document. A well done electronic signature causes the signer to be uniquely identified. It also causes the document to be locked using encryption technology and is electronically stamped throughout the process with time and date. It also stores the document for access without fear of being lost or its existence denied. The security of electronic financial transactions can also be enhanced by the use of digital certificates against phishing and pharming. To avoid manipulation of transactions in signature based online banking, utility of Class-3 electronic card readers should be explored. Virus scanners should be used to protect from Trojan horses. Care when downloading software should be exercised. With the mass adoption of technology, countries around the world are increasingly using technological based solutions to address their needs and carry out their functions. The use of the internet has created a highly competitive market. While cyber crime has not infiltrated or integrated itself equally in many countries it is an industry that is growing very fast and deserves much global attention (Shu-Min Shann-Bin, 2006). As earlier discussed, it has the potential of destroying whole markets and creating great havoc. Attempts to control cyber crime have not been concerted. Many challenges have arisen in trying to control this threat. Technology is a fast changing and cyber crime has achieved very high levels of sophistication. Cyber criminals have designed malware which are virtually undetectable and are difficult to diagnose. It has proved challenging to design and keep up with these creations (Glaessner, 2002). Due to the high levels of vulnerability to cyber attacks there is an urgent need to formulate clear policies. These policies should include guidelines on how to cyber crime is to be dealt with. This should include coming up with laws that will outline prosecution of cyber criminals due to the potential of these criminals to create damage and go unpunished and detected. Users of the internet and the various services it offers should also assume personal responsibility for their own safety (Cetron, et al, 2009). Studies have shown that the ‘human factor’ is largely the cause of the success of cyber crime rather than advancements in technology. In the United States, despite various public campaigns on internet security, people continue to be reckless with their personal information. This leaves them very vulnerable to attacks by cyber criminals. Predictions have been made that incidences of cyber crime will continue to increase. Users should therefore be very vigilant in monitoring their information. Software to combat cyber crime is available and users should take the initiative to acquire this software to alert them of suspicious websites or claims. They should also regularly update their software like antivirus which is highly dynamic due to the creation of new viruses and malware that occurs at a very high rate (almost daily). In conclusion, electronic financial transactions have created great savings in terms of financial savings for both providers and users and reduced the wastage of time. The use of this technology has correspondingly exposed its users newer forms of crime and every effort must be made to combat cyber crime.