Tag: Essay

  • Taoism vs Buddhism Differences or Distinction Religion Essay

    Taoism vs Buddhism Differences or Distinction Religion Essay

    The distinction or differences between Taoism vs Buddhism Religion Essay; Taoism originated in China and many believe that it started in the sixth century B.C; whereas Buddhism said originated in the 500’s B.C. in India. Both Taoism and Buddhism are great philosophical traditions and religions that have long histories; and had strongly influenced and shaped the Chinese culture and values.

    Here is the article to explain, What is the Religion Essay of distinction or differences between Taoism Vs Buddhism?

    These two religions have some similarities, they exist even considered as one kind in Malaysia’s culture. Both Taoism and Buddhism believe in reincarnation which means life after death and both have similar ultimate goals. However, they are very different in their beliefs, practices, and perspectives; about individual life, society, values, culture, the environment, and even the universe.

    Different objective principles;

    Taoism vs Buddhism have different objective principles; different views and beliefs about life after death which exists widely known as reincarnation; also different ways and solutions to cooperate and solve the problems in life, and different perspectives and practices about marriage.

    The word Tao of Taoism in Chinese means the way or the path. In Taoism, its objective is to achieve Tao; which means to attain the right path in life, and by doing so; we will be able to become immortal. Besides that, Tao is sometimes also considered as the origin of everything; which already existed and guided the whole world; and everything to work on their roles before the universe existed existing formed.

    In Taoism, it is more focusing on personal or individual philosophy; because it is more focusing on how to achieve Tao, harmony, and balancing of one-self; and it does not motivate people to find ways and solutions to help; and, improve the community or society as in every individual should do it by herself or himself. It also said that everything in the world is simple, correct, and good; life becomes complex is because human beings choose to live a complex life.

    On the other hand, in Buddhism’s beliefs life is suffering; which other compares with Taoism believes that life is all about goodness; Buddhists believe that having illness or suffering is the nature of life that we cannot escape from. Birth, getting old, getting sick or ill, and death is the natural cycle of life.

    8 Path;

    According to Buddhism, the only way to put suffering in life to an end is to understand the four noble truths of life and practice the noble eightfold path; which are the right knowledge or understanding, right intention, right speech, right behavior or action, right livelihood, right effort, right mindfulness, and right concentration (Buddhist Temples).

    8 Best Noble or Path;
    1. The first noble eightfold path is right knowledge that refers to the correct understanding of what is life about or the understanding of the four noble truths of life.
    2. The second path is right intention means the right wills aspect; which is to abstain from lusts, to gain immunity from negative emotions; such as hate and anger, and to be innocuous which is not to be violent or aggressive.
    3. The third path is right speech which brings the meaning of not talking bad or harmful words and to being aware of what we are saying by choosing the right words and right tone.
    4. The fourth path is right behavior or right actions; which are to act correctly and the reasons of action or behavior; and this consists of the five main rules of Buddhism; which are not to kill, pilfer, consume alcoholic drinks, commit sex crimes, and also to be honest.
    5. The fifth path is right livelihood which is to gain or earn money and wealth legally and morally.
    6. The sixth path is right effort involves practicing the right will and controlling self-serving devotion and thirst.
    7. The seventh path is right mindfulness which is to be aware; and have the ability to see things without being affected by other people or the environment.
    8. The eighth path is right concentration refers to the mental force of focusing on the ultimate goal of Buddhism; and this involves practicing meditation which is to clear your mind and develop the right concentration.

    Believes;

    Taoism vs Buddhism believes in life after death which knows as reincarnation. They believe that the life cycle does not have a beginning or an ending; which simply means that life, death, and rebirth perceive as a continuous cycle; they think that death is not the end of life (Valea E., n.d.). But both of them have different explanations and perspectives on reincarnation.

    According to Taoism, the soul or spirit never die, it will shift to the other body; which is to reborn to be another person and this will repeat until it attains the Tao. It said that everyone has an inner light of oneself that can guide us back to a clean; and clear mind and pull away from distractions and lusts; Tao can only obtain by following this inner light of oneself. Taoism also believes that the soul has the ability to travel through space; and time and becomes immortal when Tao achieves it.

    Whereas in Buddhism beliefs, samsara, the wheel of rebirth, and the sufferings of life will only come to an end when one achieves Nirvana which is the highest or final state of the life cycle, and become immortal. The other belief of reincarnation in Buddhism that is different from the belief in Taoism is that Taoism believes that reborn is a transformation of the soul from one human body to another, but according to the Buddhism belief, the cycle of birth, death, and rebirth consists of good and evil behavior which divides the transmigration into three different stages and this lead to the transformation of souls into different forms respectively.

    Rules and practices;

    The ones who act totally different way from the rules and practices of Buddhism will send to hell and this is the first stage of transmigration. In the second stage, those who did something; which consider quite evil will be transmigrating into animal forms; yet spirits will become more alike to humans or rebirth as a human again after turns of transmigration.

    The following stage which is the third stage involves the spirit becomes chaste by putting down self egos; and lusts which is the change from aesthesis to non-aesthesis; and it also consists of going through many phases of spiritual transformation and rebirth; finally, reach Nirvana which is the ultimate goal of Buddhism. The stages of reincarnation determine by one action, it says that the past action decides the current life; and present action decides the future life; because Buddhists believe that one’s behavior is according to the mind and thoughts but not fate; therefore one shall deserve what it takes from the result of what he or she did.

    Perspectives and beliefs;

    Besides the perspectives and beliefs, the difference between Buddhism and Taoism is the ways of handling and solving problems in life such as health problems. According to Taoism, everything in this world has its own natural order, and the way to handle problems first is to understand nature; the Yin-yang concept is the core concept of this particular principle. Yin-yang concept state that reality is binary which consists of the combination of two opposite elements to form the entirety by balancing these two opposite elements.

    In addition, conquering the defectiveness of the soul by attaining the balance of oneself; then leads to conducting the mental or cosmic energy that knows as Chi in one self’s body believe; that can help to heal illness or sickness of the body. The creation of the Tai Chi exercise is based on the Yin-yang concept which can help to circulate and balance; the Chi in the body and maintain body health; because Taoists believe that illnesses cause by the imbalance or jamming of Chi in the circulation of the body.

    Problems source;

    Meanwhile, in Buddhism’s beliefs, problems in life like illness and sickness are a part of life; hence they should accept as the nature of life. Buddhism requires the finding of problems source; meditation is the practice of Buddhist that guides people to find focus, peace, and calm in oneself, and the presence of focus, peace, and calm will help to identify the origin of problems and guidance to take good actions to overcome the problems. At the same time, unlike Taoists healing illness by balancing the opposite elements and conducting the Chi, Buddhists seek medications. However, because Buddhists believe in life, herbal medications which extract and purified from the plants are the only medication used by Buddhists.

    Relationships and marriage;

    Buddhism and Taoism are also different in how they look at relationships and marriage. According to Buddhism beliefs, marriage is not a necessary event in one’s life; so there is no special type of ceremony or practice for getting married. Besides that, sexual activity is only accepted socially and ethically when it takes place in marriage; and it does not accept when there is not within a marriage relationship.

    Buddhism believes that in a marriage, both husband and wife will need to possess four important qualities to become well-matched and maintain a good marriage, the four qualities are faith, virtue, generosity, and wisdom. Faith requires the understanding between the husband and wife, it is through understanding each other that helps to build up trust, honor, and faith, and faith is the main key that will lead to the development of virtue, generosity, and wisdom.

    According to Buddhism beliefs, satisfactions of the five senses and reproduction are the two main purposes of marriage because it said that not a single figure, sound, smell, savor and touch can attract a man more than a woman and this same goes for a woman. Besides that, reproduction is important to society because of the obligations of the family which means children will be the ones who are responsible to take care of and support the parents and protect and continuing the unique customs of the family.

    On the other hand;

    Taoism believes that woman represents Yin and man represents Yang, and the Tao means the path to harmony will achieve when a woman and a man get into a relationship and commit together as one, the Yin chi will accept by the man and Yang chi will receive by the woman, then both Yin and Yang will combine into one and balanced. Some people relate the word Tao with marriage by saying that marriage is the Tao to future means the way or path towards the future because the life after marriage is like a new life and through marriage, babies are born: babies are the hope and creation for the future.

    At the same time, since Taoism emphasizes on balancing and harmony of nature, it also laid stress on the harmony of the relationships between people, especially for husband and wife. Thus, husband and wife should avoid confrontations and serious conflicts. Prevention of confrontations or even conflicts can make by calm, love, caring, respect, acceptance, humility, communication, emotional control, self-awareness, self-reflection, sacrifice, and support and understanding of each other.

    On the whole, Taoism vs Buddhism are religions that guide people on how to live a good life and teach the important values of life. These two religions have some similarities and sometimes these similarities may even cause people to mistake that both of them are the same religion or some may mistake the beliefs and practices of Buddhism and the beliefs and practices of Taoism.

    Death and life cycle;

    There are similar beliefs between these two religions such as both of their belief in the life after death and life cycle never end and also Taoism vs Buddhism have a similar ultimate goal, but their objective principles, their understanding, beliefs, and interpretation about the life after death, their perspectives and methods to deal with the problems especially health problems in life, and their point of view and practices in relationships and marriage are very different. Taoism and Buddhism have their unique and different way of thinking and interpretation of life.

    Taoism vs Buddhism Differences or Distinction Religion Essay Image
    Taoism vs Buddhism Differences or Distinction Religion Essay; Image by Sasin Tipchai from Pixabay.
  • Global Digital Divide Examples Essay

    Global Digital Divide Examples Essay

    The phrase global digital divide has become a global phenomenon and has taken the world by storm, with It an Essay and Examples. What exactly does this term mean and what does it entail? This phenomenon became current during the mid-1990s and define as the segregation between those; who have access to advanced forms of technology and those who do not have access to advanced forms of technology specifically between the developing and non-developing world.

    Here is the article to explain, The definition of Global Digital Divide with an Essay and Examples!

    The global digital divide is an ongoing debate that includes a variety of contributing factors that will discuss in this paper such as cultural, political, and economic issues specifically within the context of how two African nations South Africa and Mauritius are combating the global digital divide.

    Moreover, this paper will utilize the success story of Mauritius as a comparison of how once government institutions; and powers are actively involved within communities by providing subsidized internet access; the division caused by the global digital divide examples minimizes.

    Furthermore, this specific case study of Mauritius provides hope and ambition to other African states specifically in the context of South Africa; that if a community-supported with powerful institutions and federal resources combating the global digital divide examples is possible. Likewise, this paper will focus on both the quantitative and primarily the qualitative research measures that differ between how Mauritius successfully combated the global digital divide along with the obstacles; which hindered South Africa’s potential success of combating the digital divide; the challenges which prevented the success of South Africa.

    Essay Part 01;

    Additionally, Mauritius is a small island nation within the Sub-Saharan region of Africa. Mauritius has a population of about 1.2 million and an estimated 70% of the nation’s population aged between 15-64; as well as an estimated 88% are literate. Despite English being the official language; it spoke by less than 1% of the population, while the majority (80%) speak Creole.

    Interestingly enough, Mauritius existed previously colonized by both the Dutch and French; although either french or dutch are prominent languages in Mauritius. Mauritius adopted towards establishing an English-speaking nation after the colonial period; which has significantly helped them in the world trading market and ultimately increased the nation’s literacy rate to 88%. As well as “These efforts have​ been acknowledged in the e-government readiness ranking by United Nations”​.

    Furthermore, the government of Mauritius proposed a five-year National ICT Strategic Plan in 2007. This plan aspires to convert Mauritius into a favored hot spot for ICT skills, expertise, and employment in the region. Additionally, once Mauritius converts into an ICT hub; this will allow Mauritius to have the necessary skills they need to access the Internet without any challenges.

    Essay Part 02;

    Therefore, once this establishes the strategic plan also aims to target social indicators by the year 2011; which includes increasing personal ownership by at least 12,000 in primary schools, 20,000 in households; increasing broadband internet penetration by at least 250,000, and establishing 150 public internet kiosks across the island.

    Furthermore, the targeted installment of kiosks throughout Mauritius primarily in geographically located areas; such as rural neighborhoods has been positively linked with ICT use. Findings include that perceived usefulness and subjective norm are both factors that lead to the positive use of ICT.

    Perceived usefulness can define as “a degree to which an​ individual believes that using a particular technology would enhance performance”.

    To guarantee the relevance of internet kiosks, a diverse range of sources; such as internet browsing, word processing, health care, and e-mail is more efficient compared to third-party sources; which typically come at a cost. Thus, these advances are more likely to encourage the use of publicly subsidized Kiso’s.

    Essay Part 03;

    Additionally, the subjective norm positively links to ICT use. Subjective norm can define as “an individual’s perception of the extent to​ which important social referents would desire the performance of a behavior”, this factor is relevant in Mauritius. For example, if a relative or friend suggest the use of public internet kiosks is helpful and encourages one to make use of it; the individual is more likely to believe his or her friend or relative and in return has the motivation and intention to use the public internet kiosk.

    Moreover, this essay will focus on a case study of South Africa; and the challenges that this nation faces with combating the global digital divide. In the article Addressing the digital divide. Online information review (2001).​

    Cullen highlights that a major issue is the lack of physical access to ICT’s. The constraint with physical access to ICT use in South Africa is that the majority of ICT centers; and hubs are located in major cities as opposed to geographically isolated areas such as rural neighborhoods. Similarly, constantly commuting to these locations is not feasible along with another obstacle; which is the challenges that disabled people encounter.

    Essay Part 04;

    Therefore, not only are an absence of ICT use in rural areas but the commute cost is to the ICT centers is not feasible along with the significant challenges that these commutes can be for disabled people. Also, according to statistics on world connectivity; findings show that during the year 2000 South Africa’s number was 440,000 compared to Mauritius’s number of 1.8 million.

    Likewise, in the article Reevaluating the global digital divide: Socio-demographic and conflict barriers to the internet revolution. Sociological Inquiry (2010).​

    Robinson and Crenshaw, highlight a vital constraint towards Internet connectivity which is oftentimes dismissed. This constraint is the impact and influence that political leaders have on the nation. Nations which have liberal and democratic leaders are more likely to have citizens that are proactive and engaging in internet activity. Similarly, these leaders are also more likely to incorporate activities and programs; which motivate ICT use similarly to Mauritius Strategic Plan. Moreover, the turmoil of the post-apartheid conflict in South Africa is still significantly relevant in today’s society.

    Although this conflict occurred over 20 years ago, South Africa’s trajectory was stagnant for a few years; and it hasn’t been until recent presidential figures that democratic values became acceptable. Thus, this greatly impacts political institutions to confidently and successfully incorporate and introduce ICT; use simply because South Africa’s primary concern was moving past an apartheid government; basic values such as marrying someone of the opposite race; and freedom of speech were primary concerns rather than Internet connectivity.

    Essay Part 05;

    Additionally, in the article Information access for development: A case study at a rural community center in South Africa (2006).

    Jacobs and Hersleman argue the barriers which restrict ICT use in South Africa. These barriers include, “lack of awareness of the benefits of ICTs” ​ ​and”lack of ICT skills and​ support”. As mentioned above, South Africa is progressing rather slowly post-apartheid. This plays a significant role in the barriers of ICT use because; although they may have established ICT hubs in populated cities Capetown, Durban, and Soweto; there is one problem that contributes to both the lack of awareness of benefits and lack of ICT skills and support.

    This constraint is that “Facilities like community centers can assist by​ increasing user’s familiarity with technology in non-threatening, social settings”. Therefore, utilizing the staff and volunteers at community centers is imperative in increasing the motivation and engagement of ICT use; especially because incorporating ICT use at facilities such as community centers do not provide much use; if the community is unaware that these resources are available to them and how exactly they can access these resources.

    Essay Part 06;

    Furthermore, in the article Time machines and virtual portals: The spatialities of the digital divide. Progress in development studies ​ ​(2011).

    Graham highlights that cultural barriers play a significant role in contributing to the lack of Internet connectivity, information, and access. English is commonly spoken throughout South Africa; however, it does not speak outside of main cities such as Capetown and Durban.

    Also, not only is English not commonly spoken outside of these main cities, the degree of English use on computers or Kiosks and other forms of ICT are not at a beginner level.

    Ultimately, this creates a significant barrier to access to the Internet. Another challenge in South Africa is that has 10 main languages spoken throughout the country excluding English.

    The languages spoken depend on which region or part of South Africa an individual is in. Unlike Mauritius, English is not the most common and main language spoken in South Africa; therefore an alternative can be to provide translators at community centers or providing installing alternative language options on computer or kiosk settings.

    Essay Part 07;

    Moreover, in the article The impact of connectivity in Africa: Grand Visions and the mirage of inclusive digital development. The Electronic Journal of Information Systems in Developing​ Countries ​(2017).

    Friederici, Ojanperä, and Graham highlight that “telecommunication services have been​ found to lessen the financial vulnerability and susceptibility to shocks of poor households in South Africa”. Although, the poorest households may not necessarily benefit simply because they do not have access to telecommunication services.

    These constraints could be because poor households reside in rural areas; which do not have telecommunication services nearby and the commute cost is out of their means as well as the comprehension of English is poor. Unlike the Mauritius case study, the government and other institutions placed publicly subsidized kiosks in both rural and urban areas to mitigate the lack of mobility and accessibility as a constraint.

    Essay Part 08;

    Overall, the highlighted challenge that South Africa faces to combat or mitigate the global digital divide is the lack of physical access; ICT’s do not place in geographically isolated areas such as rural neighborhoods; thus making the commute costly and challenging for those with disabilities.

    Another challenge that South Africa faces is that there is a significant lack of awareness of present or available ICT’s and how exactly one can navigate ICT’s; community members do not encompass sufficient skills to navigate ICT’s. Furthermore, a final constraint that South Africa faces is a lack of English literacy.

    English spoke throughout South Africa, however, it is not the dominant language, and providing ICT’s with intricate levels of English is a barrier that prevents successful ICT use. Comparingly, Mauritius was successful in mitigating the global digital divide examples because English is their main language and they placed publicly subsidized kiosks in rural areas as well as provided the necessary skills needed to navigate kiosks.

    Essay Part 09;

    Moreover, as mentioned above there is a variety of contributing factors that have been constraints in South Africa’s success in combating the global digital divide. The supporting articles of the challenges that South Africa faces in this essay provide significant support for both quantitative and primarily quantitative research.

    Throughout, the articles surrounding South Africa, there has not been a great deal of statistical data as opposed to Mauritius. Additionally, South Africa’s recent history with geopolitical affairs and conflict plays a significant role in their trajectory towards combating the global digital divide.

    Mauritius had both fewer geopolitical and post-colonization obstacles compared to South Africa. As well, suggestions for South Africa are to place ICT’s in geographically isolated regions with different language options as well as advertising where ICTs can find along with having staff or volunteers at the ICT locations that are knowledgeable on how to successfully navigate ICT’s trajectory towards combating the global digital divide.

    It is clear that Mauritius had both fewer geopolitical and post-colonization obstacles compared to South Africa which allowed them to be successful in combating the global digital divide, further research needs to determine the current status of South Africa’s trajectory with the global digital divide. In conjunction, this paper demonstrates that if the government understands the need and importance of combating the global digital divide by incorporating publicly subsidized kiosks and other forms of ICT’s, it is possible to strengthen internet connectivity.

    The definition of Global Digital Divide with an Essay and Examples Image
    The definition of Global Digital Divide with an Essay and Examples! Image by StockSnap from Pixabay.
  • Biometric Authentication Methods Information Technology Essay

    Biometric Authentication Methods Information Technology Essay

    Biometric Authentication Methods Introduction Robustness, Types, Futures and Scopes in Information Technology Essay; The world is advancing with the technology, and as technology will advance, security too needs to advance and hence will play a crucial role. When we think about information security, authentication will play a crucial role in it. Numerous systems make use of biometric authentication methods such as tablets, mobile phones, and laptops. The authentication may be biometric, which may be our fingerprints, facial recognition, iris scan, or any physiological parameters.

    Here is the article to explain, Biometric Authentication Methods Robustness, Types, Futures and Scopes in Information Technology Essay!

    In this articles, we will provide a brief introduction about biometrics, types of biometrics, their robustness, and the future and scope of biometrics.

    Introduction to Biometric Authentication;

    The assurance of confidentiality, integrity, and availability is the primary concern when we think about information security. When we are talking about security, authentication will play a crucial role, and so biometrics come into play. What is biometric authentication methods? Biometrics may be any physiological parameter that can use to authenticate and establish a one-to-one correspondence between an individual and a piece of data. Best define of Data Visualization and Information Visualization; Biometrics provides a soft flush of confidence and security for authentication. Mobile phones use fingerprints of facial recognition to unlock, or some security doors may use an iris scan to let an individual entry.

    “According to a recent Ping identity survey, 92% of enterprises rank biometrics as an effective to a very effective way to secure identity for the data stored”.

    All the biometrics works in a similar manner, which includes a scanner, computer, and software. The scanner will scan the physiological feature and will detect the required parameter and will send it to the computer. The computer will have sophisticated software that may be dependent on pattern matching software, which will generate a code. That code will be first taken as input and later will used for authentication purposes. Usually, multiple samples taken to improve efficiency.

    Robustness;

    Robustness is the property of being strong and healthy in constitution. When it transposed into a system, it refers to the ability of tolerating perturbations that might affect the system’s functional body. In the same line robustness can define as “the ability of a system to resist change without adapting its initial stable configuration”. “Robustness in the small” refers to situations wherein perturbations are small in magnitude, which considers that the “small” magnitude hypothesis can be difficult to verify because “small” or “large” depends on the specific problem. Conversely, “Robustness in the large problem” refers to situations wherein no assumptions can made about the magnitude of perturbations, which can either be small or large. It has been discussed that robustness has two dimensions: resistance and avoidance.

    Face Biometric Authentication in Information Technology Essay Image
    Face Biometric Authentication in Information Technology Essay; Image by teguhjati pras from Pixabay.

    Factors of Robustness;

    For considering factors of robustness, consider three inputs as sample input (input1), a correct input that matches the sample input(input 2), and a wrong input that does not match the sample input (input 3).

    • False Accept Rate (FAR): The probability of a system that claims that the system has a successful match between the input one and input 3.
    • False Reject Rate (FRR): The probability of a system that claims that the system has an unsuccessful match between input two and input 3.
    • Relative Operating Characteristics (ROC): A graph plotted between FRR and FAR this showing the characteristics.
    • Equal Error Rate (EER): This is the rate when FAR is equal to FRR. ROC helps to show clearly how FAR, and FRR changed; the lower the EER, the better and accurate a system is.
    • Failure to Enroll Rate (FER): The percentage of data that fails to input into the system.
    • Failure to Capture Rate (FTC): The percentage when systems fail to detect biometric characteristics.
    Results of Robustness of each authentication;

    The following were the results of the various biometric authentication methods using the above parameters.

    Part 01;
    • Fingerprints: The fingerprint could not detect the impression correctly due to the moisture between the finger and sensor.
    • Iris Scan: The false analogy of the iris is virtually impossible because of its distinct properties. The iris closely associate with the human brain and said to be one of the first parts to disintegrate after death.
    • Retina Scan: The main drawback of the retina scan is its impulsiveness. The method of obtaining a retina scan is personally nosy. Laser light must conduct through the cornea of the edge. Also, the transaction of a retina scanner is not secure. An adept operator require, and the person being scanned has to follow his/her direction.
    • Palm Vein Recognition: Its position to use is that the hand must place accurately, governed marking have been incorporated, and units seated so that they are at a comfortable height for most of us.
    • Ear Recognition: This method has not achieved an exceptional level of security yet. It is simple, and recognizable features of the ear cannot provide a strong establishment of individual identity.
    Part 02;
    • Voice Recognition: Even though this method does not require any specialized or lavish hardware and can used via a phone line, but the background noises cause a significant problem that shrinks its accuracy.
    • Facial Recognition: The accuracy of this method is expanding with technology, but it is yet not very astonishing. The current software does not find the face as ‘face’ at an appropriate place, which can make the result worse. The problems with this technology can create problems when there are distinct twins or any significant changes in hair or beard style.
    • Signatures: A person does not make a signature persistently the same way. So, the data achieved from the signature of a person has to allow for quite some variability. Most of the signature dynamics pattern verifies the dynamic only. They do not wage consideration to the resulting signature.
    • DNA: The environment and management can affect measurements. The systems are not precise and require integration or further hardware, and also they cannot be rest once compromised.

    Types of Biometric Authentication Methods;

    There are many types of biometric authentication methods, which may fingerprints, physiological recognition, signatures, or DNA.

    Fingerprints;

    The way a digital fingerprint biometric may work is the transient way of the old traditional method of fingerprint authentication in which we were required to create a fingerprint impression using a colored ink on a document that was later sent to a fingerprint scanner and used for authentication. In the present, it works digitally, where a scanner uses a light-sensitive microchip to yield and sends it to the computer. The computer will use sophisticated pattern-matching software, which will generate a code that will be first used as input and later for authentication purposes.

    Physiological recognition;

    The subsections below suggest an apprised overview of mostly used physiological characteristics for the automated recognition of a particular person.

    Iris Scan;

    Iris scan depends on the patterns in the colored part of our iris. They patterns are very distinct and obtained from a video-based acquisition system. Iris Scan biometric works in a similar manner as other biometrics. A high-resolution grayscale camera takes an image of the eye 10-40cm away, which is then processed through a computer. The computer runs on a sophisticated pattern-matching software which generates a code and thus uses for authentication.

    Retina Scan;

    Retina Scan is very similar to Iris Scan. The whole process which goes on for iris scan, retina scan follows the same. The only difference is that while the image of the eye is being taken, infrared light pass onto it as retina lies at the rear of our pupil. The camera captures the pattern of blood vessels behind the eye. These patterns are distinctive. The image thus obtained goes through a sophisticated pattern-matching software which generates a code and thus uses for authentication purposes.

    Palm Vein Recognition;

    Palm vein recognition does not work on the palm just by itself; rather, it depends on the geometry of the arrangement of our vein. Palm vein biometric works in a similar manner as fingerprints and retina scans. The scanner uses infrared light and a microchip the detect vein patterns. The patterns thus obtained go through a sophisticated pattern-matching software, which thus generates a code and uses for authentication.

    Ear Recognition;

    This recognition works in a similar manner as an iris scan. An ear has distinctive marking and patterns which may be complex to understand. A high grayscale camera captures the image of the ear 10-40cm away. This image then gets transfers to the computer, which runs on the sophisticated software that depends on pattern matching software, which generates a code and uses for authentication. Such a type of software was firstly produced by French company ART techniques. This recognition mainly use in law enforcement applications like crime scenes and is still in progress of getting better.

    Voice Recognition;

    Voice recognition does not depend on the pronunciation of speech itself; rather, it depends on the vocal tract, mouth, and nasal cavities, and other speech refining sources of the human body. This biometric uses the acoustics visage of speech, which is distinctive. The speech thus obtained from the recorder gets transferred to the computer. The computer then runs through a sophisticated pattern-matching software and generates code which use for authentication.

    Facial Recognition;

    Facial Recognition Does not depend on the face by itself; rather, it depends on the distinctive facial features like the positioning of eyes, nose, mouth, and distances between them. A high-resolution camera takes an image of the face, which then resized to a pre-defined sized template, which may range between 3-5KB. The template thus obtained gets transferred to the computer, which later runs on sophisticated pattern-matching software and generates the code.

    Signatures;

    Signature authentication does not depend on the signature itself rather than gesture while making a signature. The gesture measure by the pressure, direction, acceleration, dimensions, and direction of the strokes. The most significant advantage of the signatures is that it cannot stolen by any fraudster by just looking at how it was previously written. The information about gestures thus obtained runs through a sophisticated pattern-matching software on a computer, which thus generates a code.

    DNA;

    DNA sampling requires a form of blood, tissue, or other bodily shaped. Their biometric is invasive at present and still has to defined as the analysis of DNA takes 15-20 minutes. DNA sampling could not matched with real-time witch current technology, but later, when technology advances, DNA sampling may become more significant.

    Futures and Scope of biometric authentication methods;

    Following are the approaches by which we can resolve the issues of these biometric authentications:

    Part 01;
    • Fingerprints: A fingernail plate can used, which segregates features on the surface of the fingernail plate with more precision.
    • Iris Scan: Various papers have been suggested with more developments on the veracity of iris scanning for the authentication mode in which a three-dimensional camera primarily prefer for this principle.
    • Retina Scan: We can use a steep resolution sensor for capturing more precise images of blood vessel samples.
    • Palm Vein Recognition: We can facilitate the sensor device in order to reduce the overall cost of feature eradication of an individual’s palm vein.
    • Ear Recognition: We can put some extra effort into pattern recognition in order to increase its complexity.
    Part 02;
    • Voice Recognition: If we develop an excellent combination of artificial intelligence and current voice recognition, it will be a massive profit for biometrics.
    • Facial Recognition: We can use a three-dimensional camera for data collection. We can also use more precise sensors to capture images of face skin, which looks for the peculiar features in a user’s face skin such as visual spots, lines, or birthmarks.
    • Signatures: If we combine current digital signatures with other methods of verification, signatures, too, will have more potential to cut down fraud and identify fraud by adding more layers of security to the biometric.
    • DNA: At the moment, time taken to perform a DNA test is usually 15-20 minutes. If we try to integrate the DNA analyzer and combine it with other methods of biometrics, it will become a very secure way for authentication.

    Conclusion;

    Biometric Authentication has an excellent scope for private, public, and government agencies. Although the reality is that biometrics is the future of the security industry and it is quickly becoming more recognized as the most accurate identification in today’s world. However, it is easy to beat the current generation of biometrics if they used solely. However, if we combine biometrics with new technology or combine different biometrics, it will be advantageous to add/increase the accuracy of the current generation of biometrics. Biometrics products will become more flexible and capable of serving different purposes, thus accomplishing more than just authentication.

    Biometric Authentication Methods Information Technology Essay Image
    Biometric Authentication Methods Information Technology Essay; Image by ar130405 from Pixabay.
  • Information Visualization Futures Advantages Disadvantages

    Information Visualization Futures Advantages Disadvantages

    Information Visualization IV Meaning, Futures, Benefits, Advantages, Drawbacks, and Disadvantages in Information Technology Essay; It is the process of showing the data in a graphical display; which we cannot explain using words and text in other words; it is a set of technologies that use visual computing to amplify human cognition with abstract information. The greatest advantage of information visualization is its ability to show the amounts of information that are beyond the capacity of textual display. They can significantly improve productivity.

    Here is the article to explain, How to define Information Visualization Meaning, Futures, Benefits, Advantages, Drawbacks, and Disadvantages in Information Technology Essay!

    Users can explore large amounts of data, rapidly assimilate information from many sources, reason with it, understand it and create new knowledge based on it. With the right visual picture, people can make better decisions, faster, backed with more information. One of the most obvious benefits of visualization is helping people see trends and anomalies in data; which can be particularly valuable in real-time environments.

    Visual techniques such as heat maps and tree maps; which help reveal patterns in homogenous data, were virtually unknown so many years ago; but used today in many places ranging from public Web sites to advanced trading applications. Real-time environments require rapid comprehension of a dynamically changing situation; whether in the stock market, an emergency response center or an operations control center. Visualization can also help reveal patterns in complex, heterogeneous, rapidly updating data.

    Futures of Information Visualization;

    The earlier Versions of IV has given an option to users to become familiar with basic forms of graphical representations of data. In the future we can expect to see even more advanced representations, which may even allow the user to enter into the data and explore. Today there are many organizations and universities working to develop new methods of information visualization to explore the challenges that are facing today, such as AT&T’s IV Research Group, the Pacific Northwest National Laboratory and NIST, as well as a wide range of international conferences focusing on industry-specific applications.

    If we are able to develop cheap and cost effective Virtual reality devices future of information visualization may lie in some sort of ‘full immersion’ technology, in which the user may enter the representation itself to allow them to better understand and manipulate visual data in other words an user will be able to enter in the graphical representation and will be able to manipulate data. Whether this type of true 3D representation would actually improve the user’s ability to figure out the data is as yet unclear, though it does seem likely that in the near future the field of IV will move beyond the constraints of the 2 dimensional computer monitor.

    Technology;

    As computer technology is improving we are likely to see better graphics applications and analysis software. New methods of visualizing data will ultimately drive traditional forms of data presentation. Their graphical presentations have already been introduced; and with time we can expect to see better and more advanced presentations. They do not only used to communicate information to the public; but also by scientists as their main tool for understanding environmental changes on the global scale.

    When dealing with many different data points, sometimes the only way to understand the “big picture” is to make a picture. The visualizations that created in the process overlay colors and patterns onto the familiar image of the globe, creating an image that is both strange and familiar. Many environmental systems move too slowly or involve too many interrelated variables to be comprehensible without the aid of visualization tools. “Scientific visualization of simulation data allows one to zoom around at will, run forwards or backwards in time at any rate, and transform and filter the data arbitrarily”.

    Benefits or Advantages of Information Visualization;

    Some of the other advantages of information visualization are:

    • Increasing the memory and processing resources available to the user.
    • Reducing the search for information.
    • Using visual representations to enhance the detection of patterns.
    • Enabling perceptual inference operations.
    • Using perceptual attention mechanisms for monitoring.
    • Encoding information in a Manipulable medium.

    Drawbacks or Disadvantages of Information Visualization;

    Some of the other disadvantages of information visualization are:

    • The potentially misleading perception of reliability of a visualization.
    • User will get carried away by the graphics used for representing the data. Making the user stay focused on what they exactly want to do is difficult; if the graphical representation is an eye catching design.
    • The (multiple) implicit meanings inherent in visualizations (leading to ambiguous interpretations).
    • For the user to make sense out of the graphical representation or to understood; the data used should be familiar to the audience and interesting. If the user doesn’t know what exactly represent in the graphics users might misunderstand the data.
    • The high prerequisites for diagram interpretation.

    Usage of Information Visualization;

    Visualization is extremely powerful for analysis. Visualization makes use of what called external cognition External resources used for thinking. People relieved from having to imagine everything. Instead they can just look at an image. This is only possible because human vision has a very large bandwidth, the largest of all senses. Data Visualization, They applied in numerous areas covering every industry and all tasks where understanding of the core structure in data is crucial.

    Some prominent examples are:

    • Economical/financial analysis
    • Representation of large hierarchies
    • Medical training/assistance
    • Engineering/Physics
    For Example:

    As shown in the figure below the data which is very difficult to understand displayed graphically using colors and shapes; which makes a user understand easily Table Versus IV. The table shows only 50 rows x 9 columns out of 80,000 rows of data. The visualization scatter plot shows 80,000 points with 5 attributes (x position, y position, height, size, color) – more than one hundred times what is visible in the table.

    To be understood, the data used should be familiar to the audience and interesting; and also user must have some experience using the IV. A normal person who is just being exposed to the IV will not understand the data if it is a complex image.

    This potential disadvantage belongs to the category of cognitive problems caused by the designer of a graphic representation. It occurs when visualization distracts a person from the main goal he or she tries to achieve or when several items in a graphic emphasized at the same time, thus confusing the viewer about where to start or to focus.

    Conclusion;

    Information Visualization systems, appear to be most useful when a person simply does not know; what questions to ask about the data or when the person wants to ask better, more meaningful questions. It is much easier to explain using demonstrations than words. However, to understood, the data used should be familiar to the audience and interesting. Ultimately, however, we believe that it is up to the community of IV researchers; and practitioners to create techniques and systems that clearly illustrate the value of the field.

    In general, we can also come to positive conclusions for almost all parameters; and hence predict a bright future for IV. The number of potential users is very large. It is a very useful tool in the IT as to manage systems in data centers. When all the servers graphically represented, it will be very easy to understand; which one is faulty and it is easy to trace where and what had happened.

    Information Visualization Futures Advantages Disadvantages Image
    Information Visualization Futures Advantages Disadvantages; Image by Mohamed Hassan from Pixabay.
  • Process Reengineering Examples Meaning Definition Steps 2400

    Process Reengineering Examples Meaning Definition Steps 2400

    What does mean Process Reengineering with their Examples, Meaning, Definition and Steps involved 2400 words Essay; It isn’t just a change, but actually, it’s a dramatic change and dramatic improvements; this can only achieve through overhauling the organization structures, job descriptions, performance management, training, and therefore the most significant, the utilization of IT i.e. Information Technology. it’s the act of adjusting an organization’s major functions to extend efficiency, improve product quality, and/or decrease costs. This starts with an in-depth analysis of the business workflows and identifying key areas that require improvement; those that do that quite work are often remarked as PR specialists hire by companies to facilitate transitions to more standardized processes.

    Here is the article to explain, Process Reengineering Examples, Meaning, Definition and Steps involved 2400 words Essay!

    Your agency is making first-rate progress. You’re assembly goals without problems, but the way you meet desires is wherein the problem is. Business strategies play a vital position in driving dreams; but, they’re now not as efficient as you’d like them to be. Making modifications to the procedure gets increasingly hard as your business grows due to conduct and investments in old techniques. But in reality, you can’t enhance procedures without making changes.

    Process Benchmarking, Processes ought to be reengineered carefully because experiments and errors carry in lots of confusion. In Process Re-engineering, corporations start with a blank sheet of paper and rethink existing procedures to deliver more fees to the patron. They usually undertake a brand new value gadget that locations increased emphasis on customer wishes. Companies reduce organizational layers and remove unproductive activities in two key areas. First, they redecorate practical companies into go-useful groups. Second, they use the era to improve statistics dissemination and choice-making.

    It’s important to differentiate between this and enterprise process development; which makes it a specialty of clearly updating an employer’s modern-day procedures. PR, however, has ambitions to make fundamental adjustments to the whole scope of a business’ structures. PR specialists exist in all sorts of industries, so the specific everyday obligations will vary from process to activity. Below are you’ll study process reengineering examples, their history, meaning and definition, and also the Steps involved.

    History of Reengineering;

    The concept of reengineering started in the nineteen nineties when the Massachusetts Institute of Technology (MIT) conducted research entitled “Management in 1990”. The sole purpose of that research was to know the role played by information technology organizations during that time. Since that time a lot of research has been done on reengineering and different authors have different views on reengineering; which has raised a lot of controversy and disagreement among authors.

    There are some like Druker who believed that inputs from new and innovative concepts should be used to optimize the productivity of all the operations; while there are some who believed that reengineering is a misconception and will soon disappear. In the 1880s Frederick Taylor suggested that process reengineering was used by managers to discover; the best process (way) to perform the work thereby increasing the productivity of the whole operation.

    In the early 1900’s Henri Fayol originated the concept of reengineering and explained; it as a concept to derive optimum advantage from all the available resources by finding the best process to perform the work. During the time of Taylor and Fayol, technology was a bit of a constraint; and it was really difficult for the large companies to design the process in a cross-functional or cross-departmental manner.

    Meaning and Definition of Reengineering;

    The most popular meaning and definition of reengineering is;

    “the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service, and speed.”

    This definition of reengineering includes four essential points which can summarize as follows:

    Fundamental Rethinking:

    While doing reengineering, business officials must ask them basic questions about their business like “what is their business”? “What are they do they want to do in their business”? And “what do they want to change?” Asking these questions brings clarity about the business operations and forces the people to look at the tactic rules; which their organization follows for doing business. Reengineering works in two steps. First, it determines what the company must do for the improvement and second, how they have to do it. Reengineering accepts nothing as it is, it ignores what is it like and concentrates on what it should be like.

    Radical Redesign:

    The radical redesign means to get into the details of the things and not to make superficial arrangements for the things which are already in the place; but, to get into the roots of the things and look for new innovative and efficient ways to do the same thing more productively.

    Dramatic improvements:

    It is often said that business reengineering is about business reinvention and not about business enhancement, business improvement, or business modification. Hence, Reengineering is not about making small improvements but about making big, efficient, and noticeable changes to achieve quantum leaps in performance. Marginal improvement requires the fine-tuning of the operations but reengineering should only buy-in when there is a need for big changes for dramatic improvements Reengineering should buy in only when there is a need for drastic improvements which include changing the old things with the new things.

    Processes:

    The word “process” is central to reengineering and it gives hard time to most of the managers of the organizations; because most of the managers job-Oriente rather than process-oriented. Job-oriented managers focus mainly on the job (task) at hand rather than the process involved in the job. Business processes are the collection of activities that takes in inputs of different kinds and create the output; which is of value for the client or the customer of the organization. Reengineering not only focuses on the different departments of the organization; but also the organization as a whole because of which reengineering sees the full picture of the work moving from one department of the organization to the another with keeping an eye on the operational hindrances on the way.

    Steps involved in Process Reengineering;

    Process reengineering methodology mainly includes the following steps below are;

    Planning for reengineering:

    Planning and preparation play a vital role for any process or event to be successful and the same applies to reengineering. Since reengineering involves major changes and is not for small improvements; and also it may include heavy costs, there should be a dire need for reengineering. This step starts with the consensus of executives of the firm for the process of reengineering. During reengineering the processes are reengineers in such a way that they actively work in tandem with the mission & vision statements of the firm. Understanding customer expectations is most important because the processes need to be re-engineered in a way that will lead to the maximization of customer satisfaction.

    Mapping and Analysing As-Is Process:

    Before reengineering any process, the reengineering team should know the existing process. The underline aspect of business process reengineering is to bring the changes drastically. Process reengineering is not for small and slow changes. Many people advocate that it should be a “To-Be” Analysis instead of an “As-If” Analysis. The usefulness of this step is in identifying anything that prevents the process from achieving desired results and in particular information transfer between organizations or people and value-adding processes and implemented by using different models used for the creation and documentation of activity and process models. Then with the use of activity-based costing amount of time and amount of cost consumed by each activity calculate.

    Designing To-Be process:

    This phase starts with looking for alternatives in the current situation; which molds well with the strategic goals of the organization. The first part of this phase begins with benchmarking which is a comparison of the firm with the other firms in the same industry. It’s a general practice to select industry leaders for the comparison so that the firm can use its best practices. This is not necessary to select the firm for comparison from the same industry; one can choose any firm from any industry with similar processes.

    For example, both textile mills and food processing industries use Reverse Osmosis technology (process) for water purification; hence they can compare for the water treatment process. Next, we do activity-based costing analysis for analyzing the time and costs involved for different processes. Once ABC analysis is done To-Be models prepare using different modeling techniques. This is important to know that this modeling is an iterative process and different To-Be models prepare for the analysis. At last, we make a trade-off matrix to select the best To-Be scenario.

    Implementing Reengineered Process:

    The implementation phase is that phase where reengineering encounter maximum resistance. It is because the environment is not readily changeable and hence; it is the most difficult phase of all the phases in reengineering. As the firm invests a lot of time and incurs heavy expenses for the planning phase; it is justifiable to invest in training programs for the employees of the firm for the cultural change. Winning the hearts of all the employees and motivating them is crucial for process reengineering.

    The next step is to make a transition plan to move from As-Is to the redesign process. The plan should choose in a fashion that goes well with the long-term strategy of the firm. Implementation of information technology that supports reengineering is a must for the process. The total amount of work that needs to be done for the reengineering broke down into different components using work break down structure techniques and these individual components are worked upon.

    Improve Process Continuously:

    The last but most important phase of any reengineering process is continuous monitoring of processes and the results which come from modified/improved processes. If there are deviations from the expected to actual then they should take care of immediately. The performance of reengineering measures the competitive advantage the firm gain by reengineering; the amount of satisfaction of the employees, and the amount of commitment management shows. Next, you know and understand why we need process reengineering in business from a few examples.

    Process Reengineering Examples:

    The ascendant popularity of business process reengineering since the 1990s means there are many business process reengineering examples. The most illustrative and frequently cited model is that of Ford Motor Company. In the 1990s, Ford began to use business process reengineering to make itself more competitive against global competitors such as Toyota, Honda, and Mazda.

    In comparing operations to their more efficient Japanese competitors; Ford noticed they were employing a hugely outsized number of people in their Accounts Payable division: 500 in comparison to Mazda’s 100. Also, Ford used business process reengineering to understand and solve the problem of this overstaffing. Ford found that every time their purchasing department wrote an order for purchase.

    A series of processes were triggered that required accounts payable to do not one but three things process the order from the purchasing department; process the copy of the order sent by the material control department, and process the copy of the receipt sent by the vendor. All of this took place before the accounts payable clerk could match the three orders and finally issue a payment. As part of the business process reengineering, Ford used digital technology to redesign the process and eliminate the inefficiency.

    Ford process reengineering examples;

    In the 1980s, many expanding American companies were looking for ways to cut down on administrative and overhead costs. Ford was no different. When ford started looking for things that could improve in the organization; they have spotted that their account payable department currently employs 500 people.

    When Ford looked at their smaller competitor, Mazda, they were astounded to find out that their accounts payable department consisted of 5 workers. This meant if Ford implemented a similar technology, the company could reduce the number of workers to 100.

    To understand, how they can make the department more efficient, Ford analyzed the old process:

    • Once the purchasing department writes a purchase order, they have to send a copy to accounts payable manually.
    • Then, the person responsible for resource allocation would receive the goods, and send a copy of the related document to accounts payable.
    • Afterward, the vendor would send a receipt for the goods to accounts payable.
    • The old process involved 3 distinct human interactions that required approvals, which had to obtained manually.

    Ford decided to implement the innovative (at that tie) strategy of using computer software and databases to store and transfer information automatically. When done digitally, accounts payable processing becomes quicker and reduces the number of workers involved. The redesigned process worked like this:

    • Purchasing office issues an order and inputs it into an online database.
    • The resource manager receives the goods and checks if the order matches the information in the database
    • If there’s a match, material control accepts the order on the computer.
    The company selling commemorative cards Examples;

    In a company that offers products such as Christmas, anniversary, commemorative cards, etc., renewing the stock and changing the design of the cards is constantly fundamental. On average, it takes three months for new items to reach the shelves. Across market research, it’s possible to realize that there would ideally be new products every month.

    At first glance, it’s easy to say that the delay was at the production stage. When analyzing and mapping the process, it’s verified that the creation stage was the most time-consuming. Oftentimes the creative team receives the concept and several employees begin to perform the same task (duplicate actions), or an idea takes days to get off the paper. With this information, we can redesign the process completely, defining a cross-functional team from concept and creation, with incredible results in speed, costs, and effectiveness.

    Cereal products Examples;

    The process of transforming food into cereal products begins on the farm with the harvest. This follows by primary processing, packing, and transportation to the processing plants (depending on the grain). This large company analyzed its process and discovered a serious logistical problem. It lost almost 20% of the grains harvested during transportation from farms to the factories, located near the biggest consumption centers, due to the precariousness of the roads.

    After a study, this Business Process Reengineering case concluded that it would be more profitable to move the factories nearer to the farms. Afterward, they transport final products to large centers with much fewer losses. The old factory sheds were transformed into distribution centers, helping to reduce the impact of the initial investment; they already had haddocks and other ready-made logistics infrastructure. The above examples of process reengineering are a very simple explanation, you may try our best Studybay Essay writer.

    Process Reengineering Examples Meaning Definition and Steps involved 2400 words Essay Image
    Process Reengineering Examples, Meaning, Definition and Steps involved 2400 words Essay; Image by Mohamed Hassan from Pixabay.
  • Process Benchmarking Meaning Definition Steps 1000 Essay

    Process Benchmarking Meaning Definition Steps 1000 Essay

    Meaning, Definition, and 6 Steps, 4 Important of Process Benchmarking 1000 words Essay; Benchmarking involves the comparison of 1 firm’s processes thereupon of other firms while reengineering worry about the redesign of operational processes. Benchmarking involves thorough research into the most effective practices followed by other organizations within the industry where the corporate operates and it helps in breaking down the organizations’ activities to process operations and modifies them to the best-in-class for a specific operation.

    Here is the article to explain, Process Benchmarking Meaning, Definition, 6 Steps, and 4 Important 1000 words Essay!

    The word benchmarking has been derived from the set of activities employed by cobblers to mark the scale of the foot of their customers. For measuring the dimensions of the foot they are accustomed to asking the customer to place their foot on the “bench” so that they’ll “mark” the foot employing a pen. Benchmarking processes of a 1 company compare with the processes of the industry leader to determine the practices and the way these industry leaders operate and to change their processes.

    Process benchmarking may be a popular method for developing requirements and setting goals. In general, Process benchmarking consider as measuring one firm’s performance against that of firms that are leaders in their respective industries, it helps in knowing how the industry leader firms achieve excellence in their processes, then using that information as a reference for processes in one’s own company’s mission, long run and short term strategies, and implementation.

    6 best Steps involved in Process Benchmarking;

    Process benchmarking methodology mainly includes the subsequent steps;

    Identifying problem areas:

    Process benchmarking requires inputs within the style of information for comparison. the kind of knowledge required by benchmarking process depends on the method which must compare. a spread of research techniques used for the processing of the data so that comparisons are often made quickly and effectively. It includes getting information on all the mandatory sources.

    Customers are vital for any business and are the simplest source of knowledge for the firm hence their inputs should include processes should design in ways that include their suggestions and processes should make sure of their issues associated with the processes. Exploratory research supported one-to-one interviews and group interviews can sometimes influence be very useful during this exercise.

    Identifying industries with similar processes:

    In this step, we glance for industries that have similar processes. Sometimes different industries use similar processes, in this case, one can choose companies from other companies to check particular processes. Say as an example boiler employe within the cement industry also as the sugar industry. Hence, a sugar company may compare its boiler processed steam operation therewith of cement industries’ boiler processed steam.

    Identifying industry leaders in these areas:

    In this step, we glance for firms with whom one must compare its processes. Normally industry leaders chose for the comparison and it’s due to their superior processes which play an important role within the overall performance of any firm. For this one must do thorough research, customers of the corporate, its staff and internet is wont to get this information.

    Involving domain experts for measures and practices:

    Domain experts and survey companies are very useful within the selection of comparable companies and processes as they’re expert in getting information and masking the counseling of the client firm which give data theft security to the client.

    Visit companies to search out their “best practices”:

    In this step, one has to visit different companies, people who consider pretty much as good companies therein industry. During the visit, he should notice all the simplest practices followed by the corporate and think logically about whether he can apply those practices in his company or not since every organization is different. Generally, companies readily exchange those details and data which are helpful to any or all members within the benchmarking group.

    Implement new and improved business practices:

    After knowing all the business processes of one’s company and therefore the best practices of other leading companies; one can compare the operation processes of his company to the leading company.

    4 important of Process Benchmarking;

    Here are some reasons why process benchmarking is important for a business:

    Helps understand your current position;

    When you have process benchmarking in situ; you recognize where your business process stands compared to the opposite process that you simply are comparing it with; also this could facilitate your knowing where you’re currently and where you wish to travel; this can be not a foul thing because you can’t do something unless you recognize something is missing. This clear path enables you to grasp exactly where you’re thereby what must be done to attain your goals.

    Enables making improvements that matter;

    Without process benchmarking in situ, you won’t understand how far better you’ll be able to get. Process benchmarking provides you with a particular outcome that you simply have the goal to realize; and, it enables you to understand that you just can do better; this could be wont to set standards and thereby make improvements. Through benchmarking, making improvements that benefit your business overall becomes easier because you recognize what your aim is.

    Encourages planning and aligns goals;

    Your business won’t grow if you don’t do something about where you’re lacking or not doing the most effective you’ll; after you have a process like a process benchmarking in situ; then you encourage to plan because you set goals and ways to attain them so you grow your business; this allows a radical to explore your process shortcomings and allows you to figure on them; also this permits for zero confusion to be present.

    Helps outline clear roles;

    Your employees will love what they are doing after they know what must be done. Through process benchmarking, this becomes a doable task. The processes and also the people behind those processes mention and analyzed so your employees know their roles intimately; this may help encourage them to figure out their best for the advantage of the corporate; and that they become productive within the process thereby benefiting the business.

    Process Benchmarking Meaning Definition Steps 1000 Essay Image
    Process Benchmarking Meaning Definition Steps 1000 Essay; Image by Gerd Altmann from Pixabay.
  • Duty of Care Law English and Irish Approaches 2000 Essay

    Duty of Care Law English and Irish Approaches 2000 Essay

    Duty of Care Law difference between English and Irish Approaches 2000 words Essay; The duty of care arises in the tort of negligence, a relatively recently emerged tort. The general principle is that you should not harm those people to whom you owe a duty of care law by your acts of omission. If you fail in the standard of care owed; you will be liable for your acts or omissions due to negligence.

    Here is the article to explain, the difference between English and Irish Approaches in Duty of Care Law 2000 words Essay!

    The questions arise as to who duty owed and more significantly as to the standard to the duty owed. In Ireland, a duty is generally owed to any person who can class as your neighbor; which involves issues of proximity, foreseeability, and policy considerations. Differences exist in Irish and English law in terms of who owed a duty of care. As regards the standard that owes, it is that of the “reasonable person”. The cornerstone of the duty of care principle existed expanded based on the “neighbor principle” by Lord Atkins in Donoghue v Stevenson. [1932] AC 562.

    The case involved a woman who had suffered shock and gastroenteritis upon the consumption of a bottle of ginger ale. The shock and gastroenteritis resulted from a decomposed snail at the bottom of the bottle. The plaintiff had no action against the shop owner, as he had not been negligent in any way. The question was whether she could take an action against the manufacturer of the ginger ale. The court rules in her favor, finding that a duty of care existed owed to your ‘neighbor’. Lord Atkins stated that:

    “The rule that you are to love your becomes in law you must not injure your neighbor and the lawyer’s question who is my neighbor? receives a restricted reply. You must take reasonable care to avoid acts or omissions which you can reasonably foresee would be liable to injure your neighbor. Who then in law, is my neighbor? The answer seems to be persons who are so closely and directly affected by my act that I ought reasonably to have them in contemplation as being so affected when I am directing my mind to acts or omission which call into question.”

    The English Approach;

    This duty of care law mentioned above was later endorsed in Anns v Merton London District Council [1978] AC 728. The facts of this case were the plaintiffs were leasees of flats in Wimbledon. The borough of Merton approved a set of plans to build a block of flats. Eight years after the building was complete and the flats stood rented the foundation started to deteriorate. The tenants brought an action against the city for the cost of the repairs. The plaintiffs sued the local authority because their predecessor’s inspectors had either not inspected the foundations or, if they had, had done so negligently. The House of Lords held that the local authority owed the plaintiff a duty of care.

    It was in this case that lord Wilberforce established a two-stage test:

    • First one has to ask, as between the alleged wrongdoer and the person who has suffered damage; there is a sufficient relationship of proximity or neighborhood such that, in the reasonable contemplation of the former; carelessness on his part may be likely to cause damage to the latter- in which case a prima facie duty of care rises.
    • Secondly, if the first question answer affirmatively, it is necessary to consider whether there are any considerations; which ought to be negative or to reduce or limit the scope of the duty or the class of person to whom; it owed or the damages to which a breach of it may give rise.
    More Approach;

    In subsequent cases in England, this ruling was initially approved, but rejected in Murphy v Brentwood District Council [1991] 1 AC 398, as it lacked precision and created a duty of care of general application. In this case, the defendant Brentwood District Council failed to inspect the foundations of a building adequately; with the result that the building became dangerously unstable. The claimant, being unable to raise the money for repairs, had to sell that house at a considerable loss; which he sought to recover from the district council.

    The plaintiff’s actions failed and it stood held that the defendants did not owe a duty of care to the purchasers. As a result, in England, the law has developed certain categories of negligence, as suggested by Lord Bridge in Caparo Industries Plc v Dickman [1990] AC 605 where he stated the law should be allowed to develop on an incremental basis rather than along the broad lines it had been followed since Anns.

    Lord Bridge referred favorably to the Australian High Court decision of Sutherland Shire Council v Heyman where Brennan J had suggested that:

    “it is preferably in my view that the law should develop novel categories of negligence incrementally by analogy with established categories; rather than a massive extension of a prima facie duty of care restrained only by indefinable considerations; which ought to negative or to reduce or limit the scope of the duty and the class of person to whom it should owed”.

    Ultimately the court in rejecting the earlier tests laid down; their three-step test required foreseeability, proximity, and the imposition of a duty that would be “just and reasonable”. This third criterion would essentially allow the courts to restrict the unfettered expansion of the duty of care to new situations.

    The Irish Approach;

    Until recently, the approach of both the Donoghue and Anns stood accepted by the Irish Courts; whose approach involved an examination of the issues of proximity and foreseeability; and any policy considerations that would limit negate the scope and the duty of care law. In Ward v McMaster, Louth Co. Council and Nicholas Hardy & Co. Ltd. [1985] IR 29, it stood held at the duty of care arose from the proximity of the parties; and the foreseeability of the damage, balance against “ absence of any compelling exemption based on public policy”.

    However, recent decisions of the Supreme Court discussed below, indicate a retreat from; this approach and adoption of the English approach. In the abovementioned Ward case, the plaintiff had purchased a house with the aid of a local authority housing grant. He later learned that the house was severely substandard and structurally unsound. He subsequently brought an action against the builder, the local authority, and the value of the local authority.

    The local authority existed required by law to value the house before issuing the housing grant. They did so and their valuer found no defects. However, the valuer did not have any construction knowledge and existed therefore not held liable. He was an auctioneer and had never put himself forward as competent to value the house. The local authority, however, existed found to be negligent; as it had failed to engage a person competent to carry out the investigation. The local authority maintained that it failed in duty, not to the plaintiffs; but, to the public whose rates and taxes went into funding the local authority.

    More Approach Part 01;

    The court rejected this holding that there was proximity between the parties. It held that it was foreseeable that the plaintiff would rely on the local authority’s valuation. The fact that the plaintiff had applied for a housing grant was proof that he was not wealthy; and, would therefore have been unlikely to carry out a separate valuation in particular; the court heard that the failure of the local authority to warn the plaintiff not to rely on its valuation was relevant in finding it liable.

    The builder existed also found to be reliable on the law since including Donohue v Stevenson. The Supreme Court ruled that the duty owed would be to avoid foreseeable harm; and also to avoid any financial harm that might arise from having to repair defects in the house. This ruling changed the common law position that a builder could not be liable in such a case. McCarthy J stated that the duty arose “from the proximity of the parties, the foreseeable of the damage and the absence of the compelling reason bases upon public policy”.

    More Approach Part 02;

    In McNamara v ESB [1975] IR 1, a young boy sustained when he broke into an ESB substation. The substation stood surrounded by a fence which stood being replaced by a wall. The accident occurred at a spot where there was wire meshing. There stood easily reachable un-insulated conductors at the ESB station and for this reason; the ESB had placed barb wire above the mesh fencing to prevent intruders from entering the site. The ESB also knew at the time that children were entering the substation.

    The temporary fence stood severely criticized both by an architect and an engineer hired as experts by the plaintiff. The court found the ESB liable based on proximity and foreseeability. Also, The court did consider the steps taken by the ESB to prevent entry and decided that there were unreasonable circumstances. The court considered whether the children could also be liable. It concluded that they were not, as they did not appreciate that; there was a danger and this danger had not been communicated to them.

    More Approach Part 03;

    The recent Supreme Court judgment of Glencar Exploration plc and Andaman Resources plc v Mayo County Council [2002] 1 I.R. 84 demonstrates a retreat from the traditional stance of the Irish courts, bringing Irish law into line with English law. This judgment stood followed in Fletcher v Commissioners of Public Works in Ireland, Supreme Court, unreported, 21 February 2003. The plaintiffs in the Glencar case had been granted ten licenses by the Minister for Energy to explore for gold in the Westport area and had invested heavily in such mining over 24 years between 1968 and 1992.

    In 1991, they set up a joint venture with an Australian company, Newcrest Mining Limited. However, this joint venture collapsed following the introduction of a mining ban by Mayo County Council according to its 1992 draft county plan. The plaintiffs successfully challenged the mining ban in a judicial review proceeding in the High Court. They subsequently sought to recover damages from Mayo County Council for breach of duty in an action before the High Court, which dismissed the claim. The reason behind the dismissal was that although Mayo County Council had been negligent in adopting the mining ban, according to Kelly J, this negligence did not give rise to any right to damages.

    More Approach Part 04;

    The High Court decision stood appealed to the Supreme Court, which again dismissed the action. Keane CJ dealt with the duty of care and the neighbor principle at length. He questioned whether the two-step test of Anns was the correct test to follow in this jurisdiction and reinterpreted the decision of the Ward case. He stated that:

    “There is, in my view, no reason why courts determining whether a duty of care arises should consider themselves obliged to hold that it does in every case where injury or damage to property was reasonably foreseeable; and the notoriously difficult and elusive test of ‘proximity’ or ‘neighborhood’ can said to have been met unless very powerful public policy considerations dictate otherwise. It seems to me that no injustice will be done if they require to take the further step of considering whether, in all the circumstances; it is just and reasonable that the law should impose a duty of a given scope on the defendant for the benefit of the plaintiff … ”

    The Glencar judgment involves an additional third step to the Anns’ two-step test. The question must ask as to whether it is just and reasonable to impose a duty of care. Arguably, this may be no different than the policy considerations inherent in the two-step test. However, it adds the third hurdle for litigants to overcome. The Glencar judgment is in line with the approach favored by the English courts.

    Duty of Care Law difference between English and Irish Approaches 2000 words Essay Image
    Duty of Care Law difference between English and Irish Approaches 2000 words Essay; Image by LEANDRO AGUILAR from Pixabay.

    References; The duty of care. Retrieved from https://www.lawteacher.net/free-law-essays/tort-law/the-duty-of-care.php?vref=1

  • Sierra Leone History Religion Education 1300 words Essay

    Sierra Leone History Religion Education 1300 words Essay

    Sierra Leone History, Religion, Education, and 1300 words Essay; Sierra Leone is rustic in West Africa, at the Atlantic Ocean. It acknowledges the white-sand seashores lining the Freetown Peninsula. The country owes its name to the 15th-century Portuguese explorer Pedro de Sintra, the first European to sight and map Freetown harbor. The original Portuguese name, Serra Lyoa (“Lion Mountains”), referred to the range of hills that surrounds the harbor. The capital, Freetown, commands one of the world’s largest natural harbors.

    Here is the article to explain, Sierra Leone History, Religion, Education, and 1300 words Essay!

    Although most of the population engages in subsistence agriculture, Sierra Leone is also a mining center. Its land yields diamonds, gold, bauxite, and rutile (titanium dioxide). Internal conflict crippled the country from the late 1980s onward, culminating in a brutal civil war that took place from 1991 to 2002. Since the end of the war, the government of Sierra Leone has undergone the arduous task of rebuilding the country’s physical and social infrastructure while fostering reconciliation. A critique of the Sierra Leone Education Policy;

    History of Sierra Leone;

    This discussion focuses on Sierra Leone from the 15th century. For a treatment of earlier periods and the country in its regional context, see western Africa, history of. Archaeological findings show that Sierra Leone has been inhabited for thousands of years. Traditional historiography has customarily presented it as peopled by successive waves of invaders, but the language pattern suggests that the coastal Bulom (Sherbro), Temne, and Limba have been in continuous settled occupation for a long time, with subsequent sporadic immigration from inland by Mande-speaking peoples, including Vai, Loko, and Mende. They organized themselves in small political units—independent kingdoms or chiefdoms—whose rulers’ powers existed checked by councils. Secret societies, notably the Poro society, also exercised political power, as well as instructing initiates in the customs of the country.

    Education History;

    Education and Practices of Uncertainty in Sierra Leone; Also, Education was historically valued in Sierra Leone as a possession that conveyed and expressed elite status, with the revered, authoritative teacher being the gatekeeper. The erosion of teachers’ authority through government policies designed to universalize access to education has called into question the once-certain high status of the educated. With the future now ambiguous, students and teachers undertake “practices of uncertainty,” engaging in symbolic boundary work to distinguish themselves from the uneducated; but at the same time undertaking the same manual labor as the unschooled.

    They socially level the elite and concurrently seek entrée to their networks; and react to an uncertain future with contradictory practices. The work undertaken by students and teachers lies within and reinforces extant social values that emphasize the importance of both distinction and belonging, revealing education’s enduring value in the social imaginary. This explains the tenacity of the idea of education even in a persistently desultory employment climate.

    Religion;

    About two-thirds of the population are Muslims, while about one-fourth are Christians. Less than one-tenth of the population practice a variety of traditional religions. However, this number does not include the many Sierra Leoneans who practice traditional religions in tandem with their professed Muslim or Christian faiths. Other religions—including Bahāʾī, Hinduism, and Judaism—are practiced by small percentages of the population.

    Liberalization and Conflict;

    Externally encouraged policies of liberalization in Sierra Leone in the 1970s and 1980s fed into civil war in the 1990s; yet such policies are now being revived. This article analyzes the impact of liberalization on the war in Sierra Leone, suggesting that it affected the conflict in four ways; first, by encouraging inflation, extreme devaluation, and private oligopolies; second, by reducing key state services such as education and health; third, by fueling corruption as real state salaries were cut; and fourth, by taking attention away from soldiers’ abuses under the military government of 1992-96; a government that existed praised and rewarded for its liberalization agenda.

    Making a case for critical African drama;

    This paper posits that continued adherence to the inherited British model constitutes one of the major problems inherent in the educational system in Sierra Leone and that the introduction of what the author is calling critical African drama could constitute a major and specific step toward the decolonization and Africanization of education in Sierra Leone. The author outlines some of the problems of education in Sierra Leone, critiques the tentativeness with which African elements have been introduced, puts forward proposals for change, and advances critical African drama to illustrate how these proposals could implement in and what they would mean for the specific subject area of literature/drama studies in secondary schools.

    Education;

    The standard of education in Sierra Leone before and immediately after independence was one of the best around the world. With the University of Sierra Leone established in 1827, Sierra Leone stood dubbed, “Athens of West Africa”. But that educational system fell on hard times. Over a long period of neglect, the country witnessed an erosion of standards in its educational system. From 1970 to 1985, the average growth rate for primary school enrollment was slightly more than 6.0 percent; while that for secondary school enrollment was just over 6.5 percent. From 1985 to 1990, the average annual growth rate for primary school enrollment fell to 2.0 percent; while that for secondary school enrollment fell to 1.6 percent. Besides these enrollment concerns, the outputs of institutions at the technical/vocational and teacher education levels had also been found wanting.

    Government education policy;

    Goals of education by the ministry of education, science and technology Taking into consideration its statutory mandate, the ministry developed the government goals of education that take into cognizance international markers such as the Education For All (EFA) programs, the Millennium Development Goals (MDG) and the desperate desire to recover from the throes of war.

    The goals are:

    • Reduction and relief of poverty using education
    • Significant increase in the literacy rate
    • Free and compulsory quality Basic Education
    • Gender equity in access to and participation in education
    • Increase in access to quality education at post-Junior Secondary School level
    • Empowerment of youth through education
    • Increased access to education for the disadvantaged and disabled
    • Decrease in regional and district disparities in access and quality education
    • Greater decentralization of education and devolution of authority by the increase in community ownership of schools.

    The government has progressively increased allocation to the Education sector to about 23% of the national budget. This increased allocation has facilitated improved access to fundamental quality education.

    Religion within education;

    The Sierra Leone constitution provides freedom of religion and the government generally protects this right and does not tolerate its abuse. About religion in Sierra Leone, the predominant faith is Islam, which is practiced by around 60% of the population; 30% adhere to Christianity, and 10% adhere to their indigenous religions. Unlike many other African countries, the religious and tribal mix of Sierra Leone rarely causes religious or tribal conflict.

    The nature of schooling costs in Sierra Leone; Sierra Leone is one of the poorest countries in the world with a literacy level of 51%. The government has officially abolished school fees; however, families still have to cover various education-related costs for their children. This paper analyses the nature of the schooling costs in Sierra Leone. It shows that despite the abolition of school fees, schooling costs remain prohibitively high. Based on field research – which involved the observation of schools and interviews with teachers, pupils, and parents – the paper posits that institutional factors may prevent the reduction of these costs.

    Sierra Leone History Religion Education 1300 words Essay Image
    Sierra Leone History Religion Education 1300 words Essay; Image by Charles Nambasi from Pixabay.
  • Strategic Planning Essay Need Methodologies

    Strategic Planning Essay Need Methodologies

    What is the Strategic Planning? Explain their Meaning, Essay, Need, and Methodologies; It is a manner of making positive selections within an enterprise. It can describe as a designed manner that supposes to support organizational leaders both domestically and internationally in phrases of operations techniques, goals, and objectives. Alternatively, strategic planning can define as a control tool used to allow an enterprise to work efficaciously and efficaciously toward reaching its goals and objectives, Strategic Management.

    Here is the article to explain, Strategic Planning Meaning, Essay, Need, and Methodologies!

    The procedure of dealing with the operations of a commercial enterprise knows as strategic as it involves how exceptional a commercial enterprise corporation responds to the occasions arising from a dynamic and in different instances hostile enterprise surroundings.

    Meanwhile, a Small business is a sort of commercial enterprise entity that owns privately using a character or a group of companions and that which operates with a small variety of labor forces. Small corporations can also encompass privately-owned partnerships, sole proprietorships, and corporations. Nonetheless, it’s far essential to word that the prison definition of a small commercial enterprise varies greatly in line with various international locations of the arena; this additionally relies upon the kind of industry in which a business entity may categorize into.

    This study’s paper will observe strategic making plans; with regards to this, the essay will have a look at the strategic making plans, practices, significance of strategic making plans, and the pitfalls of strategic planning amongst small agencies and ultimately offer a conclusion approximately strategic planning in small businesses.

    Meaning of Strategic Planning;

    Strategic planning is the process of deciding on the goals of the organization, on changes in these goals, on the resources used to attain these seals, and on the policies that are to govern the acquisition, use, and disposition of these resources. The word strategy uses here in its usual sense of deciding on how to combine and employ resources. Thus strategic planning is a process having to with the formulation of long-range, strategic, policy-type plans that change the character or direction of the organization.

    In an industrial company, this includes planning that affects the goals of the company, policies of all types (including policies as to management control and other processes); the acquisition and disposition of major facilities, divisions, or subsidiaries, the markets to serve and distribution channels for serving them; the organization-structure (as distinguished from individual personnel actions); research and development of new product lines (as distinguished from modifications in existing products and product changes within existing product lines); sources of new permanent capital, dividend policy, and so on. Strategic Planning decisions affect the physical, financial, and organizational framework within which operations carry on.

    Need for Strategic Planning;

    Strategic planning is the lengthy-time period of planning and carrying on on the pinnacle level of management. It involves identifying the goals of the agency. Management, after studying its strengths and weaknesses and based on the threats it faces and the opportunities, to be had to it, instructions of the enterprise. Strategic planning has to turn out to be an essential exercise for the top management of corporations because of the more turbulence in the environments wherein such establishments perform.

    Decisions to expand or dissatisfy pretty regularly emerge from the exercise of strategic questioning businesses when huge turnover and running in diverse fields normally have a separate branch which worried inside the manner of comparing the modifications in the surroundings and its implication for the organization. It likewise involves the valuation of the latest possibilities. Since businesses constantly have interaction with their surroundings and given that handiest the pinnacle control can make choices, that have long way-achieving long-term implications at the agency, the pinnacle management constantly scans the surroundings for viable possibilities.

    Thus only a few people are concerned about this system. In instances, strategic choices require secrecy and not communication until the decisions are taken. Most of the information for strategic making plans derives from the outside surroundings, e.G., industry demand, estimates of investments in new centers, and new flora. There is likewise an excessive degree of uncertainty related to the projections revamped a long duration and consequently, strategic planning has to recognize this truth.

    Methodologies of Strategic Planning;

    The following Strategic Planning Methodologies below are;

    Benchmarking;

    Benchmarking is the process of comparing your results with competitors or best practices. It is an essential business activity that is key to understanding competitive advantages and disadvantages. This method is a way of discovering what is the best performance being achieved. It is also a gain insight to ensure that benchmarking is in alignment with the company’s management objectives.

    This method will help the company for future analysis like what they have to do, what they need to change in the product, and how they have to represent the product in the market. Assessing the overall methodology looks at how industries compete and how their focused needs line up with their procedures. If the general system goes for expanding benefit, it isn’t predictable with going up against an organization on cost. Benchmarking focuses on the execution of industry leaders and enhances the execution by demonstrating the arrangement of necessary needs.

    SWOT Analysis;

    SWOT analysis is the best tool for understanding the assess issues within and outside the organization. This is a powerful way of evaluating the company or project. It helps us to get the exact or the nearby information about the company. It helps us to know which of the company’s strengths can use to maximize the rate of opportunities. Also, It helps to use the company’s strength to minimize the threats you identified. And helps you to take immediate actions in minimizes the company’s weakness using the opportunity as strength.

    Strength at the organizational level involves properties and abilities by which an organization gains an advantage over other organizations and competitor organizations that reveal as a result of the analysis of its internal environment. In other words, organizational strength defines the characteristics and situations in which an organization is more effective and efficient compared to its competitors. An organization can describe as strong, equal, or weak compared to its competitors based on five criteria. For the organization, it is as important to know its weaknesses as its strengths. The reason is that no strategy can be built upon weaknesses.

    The organizational weaknesses that have the potential to lead the organization to inefficiency and ineffectiveness should know and improve. Solving the existing problems that would cause difficulties and limitations for long-term plans and strategies, and foreseeing potential problems are obligatory. All environmental factors that can impede organizational efficiency and effectiveness are threats. The new world order formed as a result of globalization involves both opportunities and threats. This system enhancing opportunities as well as threats directs organizational management to be careful of and act more strategically on the developments in and outside their environments.

    ANALYSIS;

    Strategic planning must have to understand the need of their employees as they would recognize the talent of their employees as they would offer the recognize. They should give extra to their employees at the company to work extra for the company. For example, employees get opportunities to get work with the team to put CCTV cameras on the building as they did with perfect they would get rewards for them. This kind of thing helps to motivate the employees and build a better work environment as well.

    Maslow’s needs theory:

    There might be distinctive progression or request of needs for various representatives. The order of needs may not stay the same for workers at all levels. Workers whose lowest level needs have not been met will settle on choices that will decide based on pay, security, or dependability concerns. Permit social associations that introduce the feeling of having a place in the premises, recognize achievements to induce confidence and give chances to workers to satisfy their possibilities.

    McClelland’s Need Theory:

    Each individual has one of three principle driving motivators: the need for achievement, affiliation, or power. Achievers always find a solution and achieve their goals. E.g. those with a solid requirement for connection don’t prefer to emerge or take risks; and, they esteem connections above everything else. Those with a solid power motivator get a kick out of the chance to control others and be in control.

    Herzberg’s two-factor theory:

    It is less demanding to apply Herzberg’s Theory combined with Maslow’s Hierarchy of Needs. This serves to reinforce Herzberg’s Theory as it improves its application as a system to motivate workers. By distinguishing the requirements in Maslow’s order, the motivational elements can acquire and in this way satisfied. Herzberg perceives that genuine motivation originates from inside a man and not from the environment, or outside variables. Herzberg’s Theory can connect by directors to motivate employees. By identifying the hygiene factors, directors can satisfy the essential needs of workers and evacuate any component of disappointment. At the point when workers have no disappointment emerging from the activity condition; they are in a superior mode to motivate.

    Expectancy theory:

    Increased efforts would lead to expanded execution, given the individual has the correct tool to take care of business. The normal result depends upon regardless of whether the individual has the correct assets to take care of business, has the correct aptitudes to do the job requirements to be done, and must have the help to take care of business. That help may originate from the supervisor or by simply being given the correct data or instruments to complete the activity. Although many individuals associate high rewards. It additionally identifies with different parameters, for example, position, exertion, obligation, training, etc. It is vital to recollect that there is a distinction between incentives and motivators. Motivating forces are non-material articles. They control by directors and pioneers with the end goal to motivate representatives to do desired tasks.

    Synthesize of analysis;

    This activity is related to strategic planning and company methods; the meaning of strategy is the first stage of learning business things. So in this whole assessment, I learned about different strategic methods; some methods that I read or understand the first time like the Boston matrix & competitive analysis method. So through this learning, I came to know about the four types of product market, product life cycle; and the types of competitor analysis, like how, why, and when a company follows their competitor’s strategy like competitor dance, the trawler, waiting room. In this report, I have learned new& unique things such as qualitative and quantitative data analysis and related to strategy; methods that are more helpful for doing analysis and give me a right & clear vision towards an organizational strategic planning

    Porter Says;

    Through Porter’s five forces model came to know about the different five factors; and, how it affects the company value, and how it helps to company in doing improvements also. The risk of a new section is very high. On the off chance that anybody looks as though they’re making a supported benefit, new competitors can come into the business effortlessly for the benefits. Competition is a great degree high. If somebody raises costs, he or she will be rapidly undercut. Exceptional rivalry puts solid descending weight on costs. Buyer Power is solid, again suggesting a solid descending weight on costs.

    There is some risk of substitution. Benchmarking is another more interesting method through; which I came to know about decision-making that helps to improve the overall performance of the company. When the SWOT brainstorming process with the administration finish; check the outcomes so you can see all the positive changes; and any negative patterns—that could influence the system, and how we operate on the whole. After that development of strategy, the map takes place. After the implementation of strategies, programs should be built to help overcome weaknesses and run after opportunities.

    Strategic Planning Meaning Essay Need and Methodologies Image
    Strategic Planning Meaning, Essay, Need, and Methodologies; Image by Michal Jarmoluk from Pixabay.
  • Observation Methods in Research Case Study Essay

    Observation Methods in Research Case Study Essay

    Case Study of Observation Methods in Research Essay; This essay will look at the difference between two research methods; Case Study and Observation. A case study is the understanding of complex issues or can extend experience or add strength to what is already known through previous research. It is an in-depth study of an individual, group, incident, or community. Case studies emphasize the detailed analysis of the event or conditions and their relationship.

    Here is the article to explain, Case Study of Observation Research Methods Essay!

    Sometimes researchers use the case study method for real-life situations and use sources of evidence to prove their study. Observation method of data collection in research methodology; The first step to take in the case study is to collect all data about the case and should organize to draw attention to important points in the case. The case study’s questions are most likely to be information questions “why “and “How “therefore these questions are helpful to focus on the study’s goal.

    David;

    In this case, study researchers gather facts from different sources, and conclusions made of these facts. Here is a case study of David’s behavior,” David, 13 year old who has been admitted to a detention facility in California. Police reports indicate that he and another boy stood arrested for breaking into a private residence. David grew up in an upper-middle-class section of California. David’s father is a professor at a college, and his mother is a dentist who works for a health care group. Even as a small child, David seemed unable to restrain himself. He would bound around the house, crashing into walls and objects, frequently breaking items or destroying house plants.

    David entered puberty at the age of 11, and at that time, his behaviors became more destructive. He frequently got in fights with his classmates, and would verbally assault teachers. His parents suspect that he may have tried smoking cigarettes and may have experimented with sniffing glue. After his arrest for breaking, David began to cry and told his parents that he felt bad for what he had done. He added that he was unable to control himself.”

    In David’s case study which took a long time to study David’s behavior from his childhood to his teenage and in different circumstances David’s behavior had changed and resources have been used to prove his behavior such as his parents or police.

    Another example for case study research;

    it’s Freud’s little Hans case study,

    “Freud used a case study method to investigate little Hans’ Phobia however the case study was carried out by the boy’s father who was a friend of Freud. Freud probably only met the boy once. The father reported to Freud via correspondence and Freud gave directions as to how to deal with the situation based on his interpretations of his father’s reports. Freud noted that it was the special relationship between Hans and his father that allowed the analysis to progress and for the discussions with the boy to be so detailed and so intimate.”

    “The first reports of Hans are when he was 3 years old. When Hans was almost 5, Han’s father wrote to Freud explaining his concerns about Hans. He described the main problem as follows:’ he is afraid of the horse will bite him in the street, at age 19 the not so little Hans appeared at Freud’s consulting room having read his case history. Freud believed that the findings from the case little Hans supported his theories of child development.”

    Observation involves looking and listening to the object very carefully. Researchers in observation studies an individual or group in their natural settings without being informed of the observation in advance. Observational data usually detailed information about a particular person, group, or situation and reveals changes.

    Non-participant observation;

    In a non-participant observation researchers observe the behavior of the subject without interacting with the subject whereas in participant observation the researchers put themselves in the subject’s position; so the researchers become part of the world of the subject while focusing on their study and indirect observation; people know that you are watching them, and there is concern that sometimes individuals change their actions; while not showing what you are looking for or what they look like.

    Research led by Charlton,

    “studied the effect of television on children’s behavior when it was introduced to an island of St Helena in mid-1990s, The researchers focused specifically on pro-and-anti-social behavior. Using video recording, they found that, compared with playground observation on three to eight years olds made four months before television started, five years after its introduction 5 out of 64 measures were showing a decrease in pro-social behavior. However for boys, only there was a significant increase on two pro-social measures and a significant decrease on two anti-social measures. In other words, for boys at least there was almost as much positive as a negative effect.”

    The research led by Charlton was a naturalistic observation that use to collect behavioral data in real-life situations. The data-gathering device in this research was the video recording, which taped the children’s interaction daily.

    There is another example of Whyte studies about Italian gangs for an Observation research study,

    “Whyte studied an Italian street gang in Chicago by joining it. It was obvious Whyte was not a normal gang member. His ‘cover’ was that he was writing a book about the area. He made the famous statement that ‘I began as a non-participating observer. As I became accepted into the community, I found myself becoming almost a non-observing participant.”

    Whyte;

    Whyte’s research study existed undisclosed participant observation. Whyte as an observer kept hidden his study about the gang from gang members; Whyte aimed the understanding of the gang by putting himself in their position; and observed gang members in their natural setting, as they were busy in their everyday lives.

    Ethical issues;

    Two ethical issues Consent and Deception, both are very important issues to concentrate on before deciding on psychological research. Consent should obtain in an early time of research; this would involve informing the participant about the grounds for the research and their role in the research; however, there are some cases where this does not require; if the research is something in public where they would normally expect to observe; they would need permission to observe on the other side in deception; participants should never deceive about any aspect of the study they are taking part in. Same as consent participants should be provided with sufficient information at the earliest stage.

    Other ethical issues;

    Other ethical issues are, the introduction where both sides’ confidence need between the researcher and the participants, and the data protection act protects participants in the research; therefore confidentiality and privacy are important to agree on both sides except in a situation where the human life is in danger. And participants must inform of their right to withdraw from the research at any stage of the research. After debriefing, participants have the right to ask for their details in the study to destroy in their presence. Participants should not ask to risk their lives in any circumstances during the study.

    The publication is another important part of the ethical issues; it’s the responsibility of the researcher to publish is his research; this is because if the research failed has cost a lot of time; and money someone else might have the same idea and might invest lots of time and money, which would waste.

    Colleagues;

    It’s the researcher’s responsibility to monitor his colleagues in research to ensure that code follow; and, if the researcher becomes aware of the participant’s problems in the study; the researcher should refer them to someone qualified to advise them on the issue if the participants wish to.

    In Zimbardo’s Stanford prison experiment, participants existed deceived and existed physically harmed; they do not inform properly about all that took place later in the research; therefore deception does not allow in any circumstances; and, all that is going to take place in research should talk to participant in an earlier stage. And the participant’s consent existed not obtained before the research and participants do not inform of the reason for the study

    This involves informing the participant of the reasons for the study and what is expected of them. There are few cases where this does not require; if someone is doing something in public where they would normally expect to observe, they permit to observe.

    Observation Methods in Research Case Study Essay Image
    Observation Methods in Research Case Study Essay; Image by Arek Socha from Pixabay.

    References; Case study and observation research methods. Retrieved from https://www.ukessays.com/essays/psychology/case-study-and-observation-research-methods.php?vref=1, http://www.holah.karoo.net/freud.htm