Wednesday, December 25, 2019

European Factory Workers and Urban Artisans - 718 Words

In the eighteenth century much of Europe was experiencing an industrial production, furthering toward a more industrial society. Many people were supporting the new society, while others were criticizing it. From 1845-1847 Europe was experiencing poor harvests, which caused the Irish famine. Irish peasants died from starvation, while others migrated. Artisans and factory workers were undergoing a process called proletarianization. It was where an owner would pay a wage and the worker would lose all ownership of production. If the factory ran smoothly, then it would be a better chance that the workers would have a safe workplace, but if that wasn’t the case then the workers may have to work in poor work conditions. Urban artisans†¦show more content†¦At midcentury, the women accounted for less than half of all employment. In France, the working women continued to work on the land. In England, they were domestic servants. Women’s working conditions were almost always harsh and they were always exposed to exploitation. Social Disabilities Confronted by All Women During the early nineteenth century womenShow MoreRelated The Working Class Essay1578 Words   |  7 PagesRevolution consisted of scientific innovations, a vast increase in industrial production, and a rapid growth of urban populations which consequently shaped a new social structure in the European continent. Initially in the late eighteenth century, the new industrialization period produced dominant bourgeoisie employers and a united men, women, and children workers. The continued increase of factories coupled with a need for employees made the Proletariats within a short period of time a large, underprivilegedRead MoreEffects Of The Industrial Revolution On European Societies906 Words   |  4 Pagesthe ways European countries produced goods. The Revolution encompassed the years 1750 through 1850, and generated many innovations and ideas that have changed European service industries forever. The effects of the Industrial Revolution ca used a dramatic change in the way European societies functioned. These changes in society caused by the Industrial Revolution initiated an unprecedented growth rate of the European middle class, which led to a sharp increase in their involvement in urban politicsRead MoreThe Factors and Results of the Industrial Revolution1710 Words   |  7 Pagesindustrial economy centered with large metropolitan cities. Industrial revolution is fundamentally linked with the rise of factories and the decline of skilled artisans in manufacturing. The time period from 1870s to 1930s not only the expanded of industrialization but also urbanization. The pace of rural to urban migration of the native born picked up during this era, but domestic urban ward migrants were dwarfed by the flood of immigrants coming to cities. Immigrants were concentrated in the rapidlyRead MoreApush Ch 91650 Words   |  7 Pagesstarted to have more effective systems then European nations and became richer and subsequently a global power. In what ways did the emerging industrial economy conflict with artisan republicanism? How did wage laborers respond to the new economy? The Industrial Revolution was dramatically changing the lives of Americans, but it also changed the nature of work and workers lives. From early to the mid 19th century, many American craft workers embraced artisan republicanism. The men wanted to assertRead MoreThe World Of Trade And Business, The Industrial Revolution Essay1593 Words   |  7 Pagescenturies in which rural, agrarian societies in America and Europe were transformed and became urban and industrial. Prior to this period that began in Britain; the manufacturing was mainly done in homes through hand tools and other basic machines that were not widely in use (MacLeod). The period of industrialization marked the beginning of a shift to power, specialized machinery, mass production and factories. Among other industries, the iron and textile industries played a major role assisted by theRead MoreThe Decline Of The Industrial Revolution1462 Words   |  6 Pagesgrowths in only some sectors, but it was a period marked by p rofound changes in industry, the mechanisation of production and the factory system. It was not Britain s economic growth which was revolutionary but the innovation which took place, the use of machinery to replace labour and provide rapid product production. Further the factory system which made use of the urban working class population, including families which also fired the revolution was a major change. The pursuit of profit and productivityRead MoreThe American Of The United States1192 Words   |  5 Pagesold patriots shared concern at the inability of their peers to live up classical republicanism’s social ethic. By the middle of the 1780s, â€Å"extra-legal popular associations designed to promote the interests of particular groups—debtors, farmers, artisans, seaman (74)† were emerging throughout the states. In order to get their points across, they frequently resorted to vigilante methods. As soon as the war stopped, trade with the British seemed to start where it left off. British ships clogged AmericanRead MoreAmerica: From the Signing of the Constitution to the Civil War1177 Words   |  5 Pagespopulation reaches 17 million. As technology in transportation advanced, immigration grew faster, mainly from impoverished European countries. The Westward expansion began almost immediately, the steam locomotive began traversing the landscape that widespread social change began to occur. The Industrial Revolution itself refers to a change from hand and home production to machine and factory. The industrial revolution brought two powerful inventions, the spinning and weaving machines. This helped increaseRead MoreDevelopment of Human Societies2092 Words   |  9 Pagessupply is far more reliable, pastoral societies can support larger populations. Since there are food surpluses, fewer people are needed to produce food. As a result, the division of labor becomes more complex. For example, some people become craft workers, producing tools and weapons that help in trade. This trade helps to create inequality, as some families acquire more goods than others do. These families often gain power through their increased wealth. Agrarian societies use agricultural technologicalRead MoreThe Academic Definition Of Immigration1727 Words   |  7 Pagesand if the state didn’t have it. Trade would help because if the one state didn’t have the resource then a trade could benefit both. Immigrants could get the resources they need to survive. According to hstry for education â€Å" it was expensive for Europeans to cross to the American colonies (poor British and German) purchased an indenture, from a sea captain that brought people over, beneficial to both employer needed labor, employee did not get wage but was provided with food, accommodation, clothing

Monday, December 16, 2019

The Biblical Story Of Genesis And The Epic Of Gilgamesh

Gilgamesh and Genesis Marena A. Dials World Literature ENG 231 Professor Sylvia Basile October 1, 2015 Gilgamesh The biblical story of Genesis and the Epic of Gilgamesh share many similarities throughout their text. One correspondence they share is the relationship between Enkidu and Harlot and Adam and Eve. Enkidu was a wild man who had no knowledge about his surroundings except for the animals and the wildness. When Enkidu is exposed to the â€Å"uncertain† and â€Å"desire†, for which the Epic of Gilgamesh is represented by a woman and the task of womankind (sex), everything that is unacquainted to Enkidu suddenly becomes familiar. Enkidu soon becomes aware his surroundings, and considers himself more like a god now, because he knows well and he knows evil. Enkidu later have intercourse with the harlot until he was sated with her charms. But when he turned his to his animals, the gazelles saw Enkidu and jetted off, the wild animals distanced themselves from his body. Then he drew himself up, for his understanding had expanded. The harlot said to Enkidu: â€Å"You ar e beautiful, Enkidu, you are become like a god.† What she kept saying found favor within him. Becoming aware of himself, he sought a friend.† In Genesis God told Adam and Eve they could eat from any tree in the Garden of Eden except for the tree of knowledge. But of course they were tempted by the serpent who said â€Å"You shall not be doomed to die. For God knows that on the day you eat of it your eyesShow MoreRelatedSimilarities Between Gilgamesh And Noah818 Words   |  4 Pagescompared to the creation story, the Laws of Hammurapi compared to the last four books of the Pentateuch, and the Confusion of Tongues compared to the Tower of Babel. However, I will focus on the Epic of Gilgamesh, comparing and contrasting it to the Biblical narrative of Noah. While both the Epic of Gilgamesh and the Biblical narrative of Noah explore a global flood, there are key differences in their use of gods and the specific details of the flood. Gilgamesh and the Biblical narrative of Noah seemRead MoreBiblical Flood Story Vs. Gilgamesh Flood1981 Words   |  8 PagesBiblical Flood Story versus Gilgamesh Flood Story The Biblical Flood story and the Gilgamesh Flood story include similarities and differences. There are two versions we know of the flood story in Babylonian literature, and both have different hero’s in each, although the cause of each flood is different. I will prove that I understand the task at hand by reading both of the stories, and taking it apart piece by piece to understand it in a whole. By doing this, I am able to know what I am readingRead MoreSimilarities Between Paradise Lost And Paradise Lost1239 Words   |  5 PagesParadise Lost comparison to three epics of antiquity There are many ways to compare and contrast Paradise Lost with the three other epics of antiquity. The epics are Paradise Lost, Aeneid, The Epic Gilgamesh, and The Iliad. The most obvious difference is era. Paradise Lost is an epic poem from the 17th century and is written in blank verse which is the most modern phrasing method. According to an article on Enotes, out of the other three epics, the Iliad and Aeneid came from the same dactyllicRead More The Biblical Flood of Genesis Based Upon the Flood of the Epic of Gilgamesh1650 Words   |  7 PagesBiblical  Flood Based Upon the Flood of Gilgamesh      Ã‚  Ã‚   In the middle of the nineteenth century, archaeologists unearthed twelve clay tablets. Around the turn of the twentieth century, archaeologists finally managed to decipher the tablets written in Akkadian, the language of ancient royalty and diplomacy. The tablets tell of the story of Gilgamesh. (1) The eleventh tablet tells that Gilgamesh, in his quest for immortality set out on a long journey to look for his ancestor, UtnapishtimRead More Comparing and Contrasting Epic of Gilgamesh and the Bibles Noahs Ark642 Words   |  3 PagesComparing and Contrasting Epic of Gilgamesh and Noahs Ark Many cultures have stories of a great flood, and probably the best known story is of Noahs Ark. The next most notable is the Sumerian story of Ut-Napishtim found in the Epic of Gilgamesh. In the ancient Babylonian depiction of the flood story, the god Enlil creates a flood to destroy a noisy mankind that is disturbing his sleep. Gilgamesh is told by another god, Ea, to build an ark (Monack 1). The Epic of Gilgamesh has broadly the sameRead MoreGilgamesh vs Bible1424 Words   |  6 PagesMany of the same old past stories can be found in different cultures. Each story differs in some views but the general themes and the main idea these stories want to transmit to their people who believe in their own God can have striking similarities. That why the Epic of Gilgamesh compares to the Bible in many different ways and the epic also has an extraordinarily different perspective than the Bible does. Yet the Bible and Gilgamesh, story or truth, myth or religion, these are questions that areRe ad MoreThe Epic Of Gilgamesh And The Biblical Narrative Of The Genesis1332 Words   |  6 Pagesvariation among symbolism and moral values, however collective literary essentials exist. For instance, an abundance of flood stories that expand across the world verifies a connection among the traditions of mankind. The strong resemblance between the flood accounts in the ancient Mesopotamian myth The Epic of Gilgamesh and the biblical narrative of Noah’s Ark in The Genesis propose a closer relationship that encourages further analysis. The major plot points are echoed in both texts despite differentiationRead More Comparing the Great Flood in Epic of Gilgamesh and the Biblical story of Noah’s Ark1162 Words   |  5 PagesComparing the Great Flood in Epic of Gilgamesh and the Biblical story of Noah’s Ark Many of the same ancient stories can be found in different cultures. Each story differs in a small way, but the general idea remains synonymous. One story that is paralleled in several cultures is the legend of a great flood. The epic of Gilgamesh resembles the Bible’s story of Noah’s Ark, but specific details differ in several aspects.   Ã‚  Ã‚  Ã‚  Ã‚  The story of Gilgamesh originates from twelve fire-hardened,Read MoreComparing the Epic of Gilgamesh and Genesis1005 Words   |  5 Pages The Epic of Gilgamesh has many similarities to the Bible, especially in Genesis and it’s not just that the both begin with the letter â€Å"g†Ã¢â‚¬â„¢! One major similarity being the flood story that is told in both works. The two stories are very similar but also very different. Another being the use of serpents in both works and how they represent the same thing. A third similarity being the power of God or gods and the influence they have on the people of the stories. Within these similarities there areRead MoreEssay on Gilgamesh vs. Genesis1436 Words   |  6 PagesGilgamesh vs. Genesis In our society, which is overwhelmingly Judeo-Christian, students often find it difficult to compare Bible stories with tales from other cultures, because our own belief system is wrapped up in the prior, and it is hard for many of us to go against our traditional faith to evaluate them objectively. But in a comparison of the Biblical book of Genesis with the ancient Sumerian text, Epic of Gilgamesh, many parallels suggest that the same type of spiritual

Sunday, December 8, 2019

Research Report on Vulnerabilities on Mobile Platform Security

Question: Describe the Research report on vulnerabilities on Mobile platform Security? Answer: Introduction Mobile devices are not merely used for making or receiving calls, as it was done in earlier days. Users can use the device for different purposes like checking e-mail, online purchases, e-banking, and many others. These can be done with the help of a specialised application or web browser. The information entered by the users for e-banking is quite confidential in nature. As the nature of information that has been shared by the user is highly confidential, it has to be protected. At present, the OSs used by the mobile phones are quite untrustworthy in nature. This increases the risk of information being hacked by any unauthorised individual. Some of the problems that can be faced by the users include booting, sandboxing mechanism, and others. Such factors can affect the performance of the applications and increase the possibly of fraudulent activities. The platform vulnerability has to be analysed, as it presents the loop that is present in the security system within the device. Rega rdless of the effectiveness of the operating system, the loop present within the system impacts the security of the data that has been stored in the system. In this case, it becomes possible for the users to exploit the software and the information that has been stored within the system. There are possibilities that the system might not perform as it was expected to do. It is essential to analyse the factors that causes the deviations, as the correct measures can be taken to control the changes or security threats. With the help of the security platform, the control system can be analysed and corrective measures can be taken to implement the required changes. This would protect the data that has been stored within the system. Through the security control measures it is possible to restrict the access of important information that is stored within the system. This will encourage the users to make the best use of the application system, which is meant to simplify the process. Also, it becomes quite easy to access the data used for reading or writing that has been stored in a particular file. Thus, it is necessary to analyse different types of threats that can impact the system of information storing and will encourage the users to make the best use of the system. Besides this, the important information that needs to be shared between the users has to be highlighted as this will help in improving the quality of tasks that is being performed by the system. (Alavi, and Leidner, 2001) Literature review As per Aciicmez, et. al. (2008), the mobile operating system is considered to be quite complex, and this makes it quite challenging to introduce an effective security system. In many cases, the sand-boxing system provided by the OS is not in the uniform formal. This makes to it quite challenging to analyse the issue and implement an effective security measure. Apart from this, the system also shares codes with certain open sources that include Linux and GNU. However there are no security measures that have been introduced to secure the confidential information that has been entered into the system. With the help of effective security measures, it is possible for the company and the users to introduce an effective system that would detect the vulnerable factors. This is done after analysing the mobile device code that can affect the performance of the applications. Thus, the needs for introducing an effective isolated security measures has been felt by many users. The implementation process has to be done in an effective manner, as it is necessary not to break the trust that has been developed with the host application. In this case, it is imperative to find the type of security measures that needs to be introduced for securing the data that has been entered into the system by the user. The present Smart phones use an effective hardware support system that functions effectively. It easily isolates different types of execution environment that are related to the security features. (Becher Hund, 2009) Due to increase in the issues related to threat factors, the demand for different types of mobile applications has tremendously increased. This has also increased the need for implementing or introducing an effective add-on hardware system that will secure the security properties. The hardware system that exists in the handset performs different tasks that are associated with the execution of the security features that are considered to be necessary for protecting the information. Some of the features that are present within the handset are not good enough to protect the applications that have been downloaded by the users from various sources. It is quite essential to understand the relevance of the hardware and software system. Such factors basically concentrate around different stakeholders that include OEM, mobile network providers, device owners, and application developers. The carriers play a key role in integrating the platform that is used by the mobile users. (Genoulaz Mille t, 2005) Relevance of the knowledge sharing method In management application system, it becomes imperative to share knowledge or information that would help the users to find relevant information. Based on the features of the application method, the users would be able to use different applications that would help in gathering the required information. Also, the use of the supported devices, price, and support options play an important role in the execution of the task. In this case, the issues related to the security factors holds a major stand, as the users would want to secure the details that has been stored in the system. Users preferably use the handset for accessing and storing information for business purposes. In such a situation it becomes quite important to secure the necessary information from any unauthorised access. Users basically use the documents for sharing tools, which sends and store the sensitive data that is required. As per ====, it is important to research the type of security measures that needs to be impleme nted by the users depends upon various factors. The steps intended to be followed has to be planned to secure the details and data the confidential information. Security features basically concentrates on the documents or information that needs to be implemented by the company. (Christiaanse and Venkatraman, 2002) It is important to analyse the impact of the vulnerability has to be analysed in advance as this will help on handling the issues. The operating system present in the handset is considered to be responsible for handing different resources that is used for accessing the information. When the platform for vulnerability is manipulated, the key security control system helps in managing the resources. In this case, the resources are bypassed, which makes it possible for used to access the information with any authority. In the unusual process, the application method has certain limitations to the access of the information that is used for the resources. When the best security system is applied, it becomes possible to access the important information including the resources that is managed by the operating system. The issue is escalated as this will allow the malware functions to compromise with most of the sensitive data that are stored within the system. Also, the conduct of the other ma licious activities becomes quite possible. (Dai, et, al, 2010) Different types of threats There are different types of mobile threats that can impact the information that has been stored within the system. It is necessary to identify the same and use the details in the best possible manner. This will help in controlling the unknown and known threats that can directly impact the details that are stored with the system. Some of the different type of threats that can impact the mobile platform has been mentioned below Proximity attacks- In such type of issues, the attacks are basically performed through physical access to the handset. This increases the possibilities of vulnerabilities that can impact the details or the information that has been stored within the system. Jail-breaking In this process, the end users analyse the factors that causes the malicious malware functions. The prime objective for conducting the research for malware is finding the impact of the security measures. Through this system it is possible for the users to modify the system that has been used for partition in the installation of the unauthorised application. This can be also used for modifying the platform configuration that has been used for securing the details that has been stored within the system. Trojans - In this method, the type of malicious program that contains more than one exploits are taken into consideration. The process includes analysing the platform vulnerabilities that are basically used for jail breaking purpose are analysed. It also includes the exfiltration data has to be analysed. SMS phishing It basically includes analysing the type of messages that are used for linking to different websites that has been accessed by the users. In this case, the leverage vulnerability present in the browser and media readers is analysed. (Devaraj Kohli, 2003) The mobile vulnerability is related to the mobile threats that is associated with the proximity attach on the IOS device or system. This encourages the bypassing of the lock screen system that is being used for the security purposes. The attack basically has been classified into two types of Attack#1 and Attack #2. In this case, the effective steps have to be taken for protecting the mobile from platform vulnerability that can destroy the details or the information that is being used by the users. The device is being used for running some of the latest versions for firmware on the handset. Through this process, the firmware can easily update the close platform that has vulnerable features. In such a situation, the vulnerable charters leave the device in susceptible situation, which makes it easy to be exploited. Apart from this, it becomes necessary to take the necessary steps through which the security measures can be implemented by the users. This has to be done at the time of downloading the sources or the contents that is downloaded through the malicious applications. In some cases, the applications or the games that contains exploits from the platform vulnerabilities has to be analysed. This can impact the performance or the data that has been stored within the system. There are different types of application softwares that are downloaded by the users. This increases the possibility of downloading the malware that can impact the security system that has been implemented in the system. In some cases, the users basically use the system for storing the important information like e-mails and others. It becomes socially enabled knowledge application system. Some of the applications like the bloom fire usually accomplish the easy to use content that helps the users to use the creative and curated tools. Such tools can be used for various purposes. At the time of downloading the software or application it becomes imperative to adopt and implement an effective strategy through which the information can be secured by the users. Such applications are basically used for commercial purposes. Thus, it becomes imperative to introduce an effective system through which the information can be protected by the users. (King Marks, 2008) In this case, the current mobile platform system that has been used by the users has to be analysed. This includes evaluating different mechanism that would help in authenticating different types of information that are accessed by the users. It includes internal and external information that has been used by the users. The public portion is related to the signing the key information that has been stored within the device. This, the capabilities are analysed so as to check the OEM's and the carriers like the software devices, updates and assigning various identifies to the mobile. (Mabert, Soni Venkataramanan, 2000) Methods In this research study, there will have an attempt for the process to understand how an organization can create value through information security. Thus the research will depend on qualitative and quantitative methods. The majority of the study will depend on qualitative and quantitative method for successful analysis. Quantitative method: Quantitative research is the unstructured process that is used to gather the data and it will be helpful for data findings and conclusion will be based on the quantified data. The researcher will focus on interviews and other methods of data collection such as questionnaires and textual analysis. (Mouelhi, 2009) Qualitative method: It is the scientific method that helps to seek responses for the particular question and the findings are based on important collection such as in case of semi-structured methods, interviews and observations would be used for data collection. The open ended questions would be used for information gathering and the number of objectives will be restricted for the in-depth analysis and information. (Valero, 2014) Process: Sampling process is the method that helps to improve the accuracy and also increases the data collection methods. (Selwyn, 2002) Research questions: Does business create value with information security and security policy? What are the security issues on mobile devices? How could the organization manage the mobile threats? (Priem Butler, 2001) Hypothesis: H0: Does the organization create value through the use and implementation of information security and policy? H1: The organization does not create value through the use and implementation of information security and policy? (Jennings, 2014) Data collection methods: The researcher will focus on interviews and survey methods to collect the qualitative data from the respondents and this process is very lengthy that contains high time. In case of qualitative method, the data support the feelings of the respondent and the information is gathered via interviews, observations and online surveys as well as questionnaires. Interviews: It is the direct and face to face approach that helps to gather the data on the particular subject. It involves either a single person or a group of people. An interview is known to be the best method of data collection that deals with the information from the respondent. This states that interview is the meaningful transfer of information that achieves success and it helps to collect the valid and reliable data to respond to the objectives and research questions. (Ward, 2014) Questionnaires: Questionnaires offer primary data to support to the outcomes and it strongly is based on the correct data to meet the objectives by the questionnaire. The questionnaire is aimed to understand the views gathered by the information and the conclusion. This way, the questionnaires are designed to collect large amount of data that will be feasible as well as cheaper. Thus questionnaires that are poorly framed produces poor outcomes as the data collection will be irrelevant. The good questionnaire will collect reliable information that produces the more precise conclusion. Thus to compare the interview questions and methods are easy and the data collection is more accurate however, this method is more expensive. (Robey, Ross and Boudreau, 2002) Online surveys: The most important method of data collection is online surveys and these responses would be gathered by emails and the questionnaires would be prepared by email. This method will be the latest method and there will have sufficient time to complete the survey. Thus the manner of survey is interesting that attracts the respondents. These surveys are gathered by companies, employees and other organizations. There is no additional or financial cost involved and the cost effect is very low. (Grimsley, 2014) Observations: It is the very critical method of data collection that records every bit of information. The researcher collects all minor informations and happenings. The personal experiences would be included in the research study to make the research successful and the method of observation will bring an honest approach that is regarded as important information and offers better view on research solution. (Saunders, 2007) Quantitative method: The data collected in terms of figures and mathematical approach is the best form of data interpretation and is known as quantitative data. As per surveys, the research objectives and the analysis depend on resources and results. The survey will be based on the gathered form of questionnaires and the result will be the best mathematical as well as statistical approach. (Saunders, 2009) Validity and reliability: The term validity and reliability are the critical factors that help the research to be involved in the survey. Every process in the research has been developed with respect to guidance and the interview has been conducted with the guidance of the researcher. Every process in this research has been gathered the questions and the interview has been conducted with the individual responses and views provided by the participant to establish the validity. (Slack, 2007) Limitations of research (primary and secondary data) Every research has its own limits and the limitations of the research were primary and secondary research, thus the findings will strongly depend on secondary data. The secondary data contain certain limitations and the behaviour of the respondent plays an important role when the respondent is positive with the research question. Conclusion can be influenced by primary research and questionnaires filled quickly due to less time cannot be dealt as the valid information. Thus the evaluation of the questionnaires happens after the even just like any other research approach. There is a fair change that respondents might forget major problems. There can be a gap in accurate data and the data offered by the respondents. (Cropanzano, et.al, 2001) Research ethics: Every research follows certain ethics and there are many issues to identify the respondents. Ethics in a research helps to identify the responsibility of the assessor to gather the information. The researcher will point out the levels of ethics that needs to be followed to offer security to the respondents by offering personal details confidentially. The researcher is confident that the ethics has been followed and the respondent is motivated and encouraged to provide reliable information. (Slack, 2007) Results and findings In this section, the various results have been obtained from the surveys and questionnaires and interviews will be analyzed and presented in the form of tables and charts. The data relating to the business performance, proper information regarding value development, IS maintenance will be presented and analyzed. The sample size to collect the data is 192 members and they will hold the position of managers, employees and top level position in the companies. To collect the information successfully, quantitative methods has been selected and through data collection and the questionnaires, the result were gathered and obtained. (Rigo, 2014) Research result Age of Respondents Age Group No. of Respondents 21-25 19 26-30 22 31-35 35 36-40 116 Total 192 As per the above graph, the total number of respondents was 192 followed in the category of age group such as 19 belongs to 21-25 age group, 22 belongs to 26-30 age group, 35 belongs to 31-35 age group, 116 were from 36-40 age group. Participated Respondents' category and their Marital Status Male 116 Female 76 Total 192 With the help of table and pie chart, the researcher found that 116 members were from male category and 76 belong to female category. Income Slab Number of Respondents Percentage Upper middle 30 38% Middle 130 26% Lower middle 20 24% Lower 12 12% Total 192 100% (Wang, 2014) With the help of analysis, it has been found that 12% respondents were earning the lower income, 24% belong to lower middle class, 26% were from middle class and 38% were from upper middle class. Major issues in business performance: According to the above figure, it has been found that business generally faces security threats and challenges and major issues in business performance relates to technical implementation. As per the research, it has been found that 122 respondents believe that security issues are the major reason for low performance in business, 45 respondents believe marketing issues also affect the business performance followed with 25 respondents that believes operational challenges also impact the level of business performance. (Kapurubandara Lawson, 2006). Major mobile threats are: As per the above figure, it has been observed that the major mobile threats are based on network threats as it is supported by 60 respondents; the application based threats are the other parameter that is the reason for difficulty in information security which is supported by 56 respondents, the web based threats could also be the reason of challenge which is believed by 30 respondents followed with the 23 respondents who supported that privacy threats are the issues in information security in organization and 23 respondents believe that all the parameters have threats with information security so it should be taken care with best information. (Reed, 2013) Best technology for value development: As per the above diagram, it has been found that information security implementation would be the best technology for creating value and development. This is supported by 101 respondents and as per 45 respondents, it is believed that cloud will be the best technique for value development followed with 23 respondents who believes data warehouse management and decision support system would be the best technology for value development. (Reed, 2013) Conclusion: To conclude, it has been proved that the organization can create value through the use and implementation of best security system. This can be done via successful maintenance of IS, implementation of security policies in the organization etc. The performance of the company can be increased with the successful implementation of security system. This is required for handling the challenges that are related to competition in todays business scenario. The business requires different types of information and requires processing the same in the best possible manner. This would help in handling the challenges related to the production activities and other factors that are related to the business performance. With the help of the best information security system, the company would be able to process the required information in the best possible manner. Therefore, it is recommended that the business should implement the security system for possible success and performance. This will create hi gh values in the business. References: Aciicmez O, Latifi A, Seifert A, and Zhang X, 2008. A Trusted Mobile Phone Prototype, in Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, jan. 2008, pp. 12081209. ARM Limited, 2009. TrustZone API specification 3.0. Technical Report PRD29-USGC-000089 3.1, ARM. Alavi M, and Leidner D, 2001. Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues, MIS Quarterly (25:1), 2001. Azema J and Fayad G, 2008. M-Shield mobile security: Making wireless secure. Texas Instruments WhitePaper. Becher M and Hund R, 2009. Kernel-Level Interception and Applications on Mobile Devices, Department for Mathematics and Computer Science, University of Mannheim, Tech. Rep. TR-2008-003, 2009. Bharadwaj A, 2000. "A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation." 24(1): 169-196. Brynjolfsson E and Hitt L, 2000. Beyond computation: Information technology, organizational transformation and business performance, Journal of Economic Perspectives (14:4), 2000, pp. 23-48. Christiaanse E, and Venkatraman N, 2002. "Beyond Sabre: An Empirical Test of Expertise Exploitation in Electronic Channels." 26(1): 15-38. Clarke, R. (2005). The path of development of strategic information systems theory: Porters strategic theory. Dai S, Liu Y, Wang T, Wei T, and Zou W, 2010. Behavior-Based Malware Detection on Mobile Phone, in Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on, Sept 2010, pp. 14. Devaraj S, and Kohli R, 2003. "Performance Impacts of Information Technology: Is Actual Usage the Missing Link?" 49(3): 273-289. Dewan S, and Kraemer K, 2000. "Information Technology and Productivity: Evidence from CountryLevel Data." 46(4): 548-562. Ikebe Y, Nakayama T, Katagiri M, Kawasaki S, Abe H, Shinagawa U, and Kato K, 2008. Efficient Anomaly Detection System for Mobile Handsets, in SECURWARE 08: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society, 2008, pp. 154160. Leyden J, 2009. Sign mobile malware prompts Symbian security review. 2009. Retrieved February 23, 2010 from https://www.theregister.co.uk/2009/07/23/sms_worm_analysis/ Jennings, R. (2014). Sources of finance and their advantages and disadvantages. Small business financing sources. Kapurubandara, M. Lawson, R. (2006). Barriers to Adopting ICT and e-commerce with SMEs in developing countries: An Exploratory study in Sri Lanka. University of Western Sydney, Australia. [online] Retrieved from https://www.collecter.org/archives/2006_December/07.pdf King W, and Marks V, 2008. . Motivating knowledge sharing through a knowledge management system, Omega 36, 2008, pp. 131-146. Klein G, Elphinstone K, Heiser G, Andronick J, Cock P, Derrin D,et al, 2009. Formal verification of an OS kernel. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2009 Koistiainen K, Reshetova E, Ekberg J, and Asokan N, 2011. Old, new, borrowed, bluea perspective on the evolution of mobile platform security architectures. In Proceedings of the first ACM conference on data and application security and privacy (CODASPY). Kulp S, Lee H, and Ofek E, 2004. "Manufacturer Benefits from Information Integration with Retail Customers." 50(4): 431-444. Levy, M. Powell, (2010). SME flexibility and the role of information systems: Small business economics. Vol. 11, pp. 183-196. Melville N, Kraemer K, and Gurbaxani V, 2004. "Information Technology and Organizational Performance: An Integrative Model of IT Business Value." 28(2): 283-322. Menon N, Lee B, and Eldenburg L, 2000. "Production of Information Systems in the Healthcare Industry." 11(1): 83-92. Miettinen M and Halonen P, 2006. Host-Based Intrusion Detection for Advanced Mobile Devices, in AINA 06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications. Washington, DC, USA: IEEE Computer Society, pp. 7276 Mulliner C and Vigna G, 2006. Vulnerability Analysis of MMS User Agents, in Computer Security Applications Conference, 2006. ACSAC 06. 22nd Annual, dec. 2006, pp. 7788 Mulliner C, Vigna G, Dagon D, and Lee W, 2006. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones, in Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), ser. LNCS, vol. 4064. Berlin, Germany: Springer, July 2006, pp. 91108. Mouelhi, B. (2009). Impact of the adoption of information and communication technologies on firm efficiency in the Tunisian manufacturing sector: Economic Modelling. Vol. 26, pp. 961967. Priem R, and Butler J, 2001. "Is the resource-based 'view' a useful perspective for strategic management research?" Reed, K. (2013). Interview: Mime cast CFO peter Campbell. Financial director. Retrieved from Ruitenbeek E, Courtney T, Sanders W, and Stevens F, 2007. Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms, in DSN 07: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Washington, DC, USA: IEEE Computer Society, 2007, pp. 790800. Schmidt A, Clausen J, Camtepe S, and Albayrak S, 2009. Detecting Symbian OS Malware through Static Function Call Analysis, in Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009). IEEE, 2009, pp. 1522 Shabtai A, Fledel Y, Kanonov U, Elovici S, and Glezer C, 2010. Google Android: A Comprehensive Security Assessment, IEEE Security and Privacy, vol. 8, pp. 3544. Sambamurthy V, Bharadwaj A, and Grover V, 2003. "Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms." 27(2): 237-263. Saunders A, and Brynjolfsson E, 2007. Information Technology, Productivity and Innovation: Where Are We and Where Do We Go From Here? Center for Digital Business Working Paper, No. 231. Saunders M.; Lewis P.; Thornhill A.(2007). Research methods for business students (fourth edition), Pearson professional Limited. Saunders, M.N.K., Thornhill, A., Lewis, P. (2009), Research methods for business Students. England: Print hall. Selwyn, N. (2002). Defining the digital divide: developing a theoretical understanding of inequalities in the information age. Cardiff School of Social Sciences Occasional Paper. 49. School of Social Sciences, Cardiff University, Cardiff. [online] Retrieved: www.cf.ac.uk/socsi/ict/definingdigitaldivide.pdf Singh, D. (2010). Ethical and social impacts of information system: Knowledge store. Slack, N. (2007). Operations management: 5th edition. Harlow prentice hall. Stiroh K, 2002. Information Technology and the U.S. Productivity Revival: What Do the Industry Data Say? The American Economic Review (92:5), 2002, pp. 1559-1576. Tanriverdi H, 2005. "Information technology relatedness, knowledge management capability, and performance of multibusiness firms." 29(2): 311334. Teece D, 2001. Strategies for managing knowledge assets: the role of firm structure and industrial context, in Managing Industrial Knowledge: Creation, Transfer and Utilization, I. Nonaka and D. J. Teece (eds.), Sage Publications, London, UK, 2001, pp. 125144 Valero, C. (2014). Applications of qualitative and quantitative techniques of management in administrative decision making in institutions of higher education in Virginia. Vol. 2, No. 5, pp. 32-34 Von, E, 2005. Democratizing Innovation, MIT Press, Cambridge, MA, 2005 Wang, C. (2014). Secure and practical outsourcing of linear programming in cloud computing: IEEE explore. Ward, S. (2014). 5 disadvantages of cloud computing: Small business Wheeler B, 2003. "NEBIC: A Dynamic Capabilities Theory for Assessing Net-Enablement." 13(2): 125-146. Zahid S, Shahzad M, Khayam S, and Farooq M, 2009. Keystroke-Based User Identification on Smart Phones, in Recent Advances in Intrusion Detection, ser. Lecture Notes in Computer Science, E. Kirda, S. Jha, and D. Balzarotti, Eds. Springer Berlin / Heidelberg, 2009, vol. 5758, pp. 224243

Sunday, December 1, 2019

Internship Report L T free essay sample

While doing the internship we got to enhance our knowledge as well as learned unction and activities of HER department. What LT is and basically what the Power department of LT is into is brought into lime light in this report. Table of Content This report is in accordance with the internship carried after Pith Semester as to gain experience about corporate life and about the work done in an organization. Lengthener was carried in Larsen Doubt Ltd under the branch of LT Power. The focus of the internship was on Human Resource Department of Power.The report contains various functions like Learning and Development, Recruitment, Performance Appraisal, Statutory Compliances, Employee Engagement, Employee Benefits, Compensation and Manpower Planning/ Budgeting and also includes the Employee Life Cycle . Certain practical work like Document Management and a glimpse of HER audit was given by the organization to experience and Theoretical knowledge about the HER practices taken in the organization. We will write a custom essay sample on Internship Report L T or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Larsen Doubt Limited Larsen Doubt is a technology, engineering, construction, manufacturing and service company with global operations. Strong customer-orientation, an innovative spirit and the constant quest for top-class quality have enabled LT to attain and sustain leadership in its major lines of business for over seven decades. LT has set several global benchmarks of scale, speed and complexity in the projects it executes and the wide range of products it manufactures. With offerings that impact infrastructure development, hydrocarbon, power, aerospace and defense, the company is seen in the role of Nation-Builder.Internationally, LT has a wide presence with a manufacturing footprint that straddles eight countries, offices around the globe and collaborations with multiple global majors. HISTORY The company was found in 1938 by two Danish engineers- Henning Holly- Larsen and Sorer Kristin Doubt from a fledgling partnership firm in Iambi, it has grown into a publicly held company, With the distinction of having a significant part of its equity held by its own employees Mr.. Holly Larsen and Mr. .S. K. Doubt Were Chemical and Civil Engineers respectively, who where working with a Danish company for there cement plant business. They visited India to explore cement business opportunities here. But during the world war, they found opportunity to start their own repair shop for military equipment, daily equipment, etc. The company soon started manufacturing daily equipment and started Engineering Construction Company nil 944. In the early 1 asss, L became public limited company.VISION L shall be a professionally-managed Indian Multinational, Committed to total customer satisfaction And enhancing shareholder value. L-ites shall be an innovative, Entrepreneurial and empowered team Constant .NET creating value And attaining global benchmarks. L shall foster a culture of caring, Trust and continuous learning While meeting expectations Of Employees, stakeholders and society. Chapter I: POWER L is uniquely positioned as the only private sector company in India with al-encompassing capabilities in the power sector.It delivers complete EPIC solutions for coal-based supercritical and gas-based thermal power plants. The capability spectrum extends across every facet -? engineering, manufacturing project management, construction and commissioning. In- house capabilities account for 85% of the total power generation value chain. Customized offerings include: *Complete EPIC *BAT Island *Boiler Island *Turbine Island * Complete Balance of Plant. It has Global alliances with the industry leaders like Sergeant Lund, MI, MELEE, Hoyden, Clyde Bergmann and CM ensure the benefits of state-of-the-art technology.L Power believes in growth in consonances with the aspirations of society and the nation. Its commitment to environment is exemplified through its distinctive super- critical technology, widely acknowledged as being more environment friendly than conventional modes of generating power. L Power has one of the worlds largest integrated manufacturing facilities for power at Hazier (Gujarat). A waterfront location offers logistical advantages for shipment and transport. The CEO and MD of LT is Mr.. K. Pentagrams and Executive Chairman is Mr.. A. M. Nazi.POWER L Power shall be Indians most preferred provider f equipment services and turnkey solutions for fossils fuel-based power plants and a leading contributor to the nations power generation capacity. MISSION L Power shall provide Products based on efficient and environment-friendly technology, consistently surpassing customers expectations of quality on-time delivery. L Power shall follow fair, transparent and ethical practices in its interactions with all stake holders and achieve performance excellence by innovation and continuous improvement in people, product and services.L Power shall foster a cuter of care, trust, challenges and empowerment among its employees Organizational Structure Employee Grade Structure: Chapter II: HUMAN RESOURCE MANAGEMENT The Human Resource Team at L Power is segregated into 3 main parts, they are: Talent Acquisition People Management Process Learning and Development Talent Acquisition: Talent Acquisition can be termed as the first phase or segregation of HER Department. This basically does the work of Recruiting and Selecting. This phase is carried on through a complete planned procedure. The procedure is as follows; 1 . Sourcing: Sourcing is basically selecting the source through which the recruitment is actually to be carried out from. The source can be external or internal. External is wherein biblically notice is given or outsourcing. Internal sourcing is wherein the employees themselves suggest people for the organization through the scheme of Mantrap. Or when transfer or promotion is given. L Power the Internal sources like Re-employment of ex- employees, internal advertisement, Transfer, and Promotion were as external sources are Campus interviews, consultancy firm, Portals, Agency and walk-in- interviews are used. 2. Screening: The given applications are screened and the unnecessary or irrelevant applications are rejected. The most relevant axis for screening are experience, skills, education, behavior etc. 3. Interviews: After screening, the applicants who are selected are called for an interview wherein the skills and qualification is assessed.Here the candidates are either selected, rejected or kept in hold by the company. 4. Offer disclosure: If selected, an offer disclosure is given to the candidate, at this stage, where he is disclosed with the package and grade, and he can negotiate and accept or reject the job offer. If kept on hold, the company may call him in future. 5. Joining Formality: In this stage the employees joining formalities like preference check, examination, signing of bond and such procedures are done. 6.Appointment Letter: Here the employee is given Appointment letter and it is the first contractual document of an employee with the company. People Management Process: This process is where the company maintains and manages the employees. Employees are the biggest asset of an organization. In todays competitive world, an organization which aspires for sustainable growth must realize that they need to adopt right people strategies to ensure that employees feel motivated and valued in the organization. Researches have proven that an engaged and motivated employee contributes to the overall productivity of an organization.Hence, employee engagement is the differentiating factor and provides competitive edge to the organization. People Management Process is the backbone of an HER function and immensely contributes to employee engagement by ensuring that the basics are in place and by deploying systems to build a culture of high performance. Our key focus in last three years was to bring more transparency in HER policies, enhance our service standards by responding promptly and effectively to employee quests and creating a Pe rformance Management System which is fair and objective. The MS is operated through CRISP Portal. PM team has partnered with business by taking up following roles a) Staffing Attendance, Leave Management, Salary Administration etc. B) Managing employee life cycle in the organization -Joining, Confirmation, Promotion, Transfer Separation c) Retention of Talent -? Attrition Analysis, Benefits Claims, Performance Appraisals Feedback Employees are our customers and one of the key roles performed by PM team is to receive and resolve employee queries in an effective and timely manner.A proper query resolution mechanism reduces the stress an employee otherwise goes through, helps us building good relationships with employees strengthens employees bond with the organization. Following are the key functions performed by People Management Process: a) Attendance and Leave Management b) Compensation Benefit Administrations c) Transfers, Postings and Deputations of the employees d) Long service awards e) Rewards and Promotions f) Door Access car ds, SEE cards and ID card issuance g) Confirmation, Resignation and Separations h) Site HER and Administration i) Employee service Portals Learning and Development:The Learning and Development team keeps training programs, arranges seminars and such programs for the development of their employees. Following are the kinds Of training provided by Learning and Development tear: a) Technical b) Functional c) Behavioral/ Managerial Technical training is business specific train innings, given for working with boilers, pipes, turbines etc. Through institutions like IMP (Institute of Project Management). Functional training is training program which is not dependent with the main domain of operations.Egg. Training for excel, Tally, Training related to SAP portals etc. Managerial Training is a long term training aerogram, where soft skills required at every level of organization, while joining/probation period or during promotions, are developed. Chapter Ill: HER PRACTICES in POWER The Main strength Of the companys HER practices lies in rigorous and continuous training in general management, technical disciplines and business policy and this made LT as one of the top companies with most innovative human resource management practice. . Employee Service Portals: Employees generally route their queries and grievances regarding any of the above stated functions through following modes: a) Through e-mails b) Through Telephone / In Person ) Through Employee Service Portals Since the use of the Portals, Organization has constantly evolved in terms of its systems, policies and its ability to integrate employees joining from various organizations. It was felt that many of the queries and grievances arise due to lack of awareness among employees can be reduced if some of this information is made available to employees at their desk. Hence, certain proactive steps are taken to make the information assistance available to employees in a manner convenient to them.Following steps have been taken to address the root cause of queries and grievances: a) Clearly defined role ND responsibility structure for the team members to ensure timely resolution of queries b) A well-structured joining process to make new joins feel welcome c) Effective admit castration of Attendance Leave Rogue laryngitis d) Transparency in Compensation benefit related policies e) Focused HER Intervention for Project Sites Many of the employee queries emanate due to lack of adequate information on HER Policies and procedures at the time of joining.Hence, conscious efforts are made to understand the expectation of a new joins with regard to his basic comfort, j oining process, clarity on the policies related to benefits, lams etc. There are various Employee portals used in HER Department which are as follows: a) SC (Share Service Center): This portal is mainly for employees Salary and Benefits. B) CRISP: This portal is maintained for Time and Attendance of the employees. ) E-Campus: Its for the Travel Tickets, Guest House, Holiday Home, Employee Directory and other such benefits. D) TEEMS: Its mainly for Travel Expenses Settlement. Most of the HER Activities and Function carried through SAP System (System, Applications and Products in Data Processing). There are three environments in SAP which are: 1. Development, 2. Quality Assurance and . Production. It can be customized according to business requirement. L power is currently using SAP-RE which is a client server and has Multi-user System. In HER. Allowing SAP Modules have been used for business information management solutions: Personal Administration (PA) Organizational Management (MM) Time and Attendance (TA) Performance Management System(MS) Employee Document Management System(DEEMS) Salary Reward Management Training and Development Employee Service Portal is a useful tool to achieve the following: a) Transparency in HER Policies and Processes b) Reduction in the processing time for Employee Benefits ) Smooth and effective handling of queries and grievances d) Capturing employee feedback, ideas etc.Employee Portals broadly encompasses: Employee Service Request a) Service Request: Employees can raise queries/requests b) HER Benefits: Employee can apply for HER benefits through system c) My Requests: Employees can check status of their requests under four categories: Service Requests Employee Benefit Requests New L Requests Wish t o Join New L Assistance: To assist new L if any initial support is awaited Mantrap: Links to the employee referral scheme Mantrap Information Section ) Employee Hand Book: PDF copy of Employee Hand Book available for employee reference b) Holiday list: Holiday list of all locations are available c) Celebration Photographs: Photographs of celebrations d) L Anthem, L Values, Vision Mission: PDF copies of each is available e) Executive Health Checkup: List Contact details of hospitals tied up with L f) My Planner: Employee can maintain his own calendar of important meetings, activities, appointments etc. Employee Bonding a) Birthday Wishes: Birthday wishes can be send to colleagues via email b) Appreciate: Appreciation messages for colleagues can be put here c) Society:Car Pool, Accommodation sharing Buy Sell, Discount Offers Employee Voice a) Your Ideas b) Opinion Poll c) Survey Corner d) Feedback e) To recognize employee voice through suggestions, opinion polls and surveys Other F eatures a) Training Calendar b) Training Team details c) Training repository d) Induction Presentations e) Fun @ Work: Fun Quotient- Four teams for employees to join based on interests f) Weekend Splash: Interactive sessions with experts for building work life balance on topics like health, hobbies etc. Some of the Key Features of Employee Portals: News Updates: This feature is used by HER to make important announcement or communicate any update in policies, procedures, simple facts about application procedures of Leaves, Employee Benefits etc. New L Assistance: Often when employees newly join the organization, they are not aware of whos who and at times feel lost. The New LT-ites Assistance is a feature were which enables a new joins to easily access the policies and seek assistance by a simple click Of button.A form is available to employees which they can fill and submit to raise any type of query. Quick Processing of Employee Benefits: Employees can now get information about arioso HER policies on portal, easily access the forms and apply for these benefits. On receipt of the approval from concerned authority, the form flows back to the employee confirming the status for his/her request. This feature has made the application process extremely simple faster. HER policy Repository: This tab has been created to centrally maintain all policy documents related to HER. It includes four types of documents Restricted, Confidential, General Standard Formats.