Tag: Evolution

  • Effortless Communication: Discover the Ultimate Computer Texting App

    Effortless Communication: Discover the Ultimate Computer Texting App

    Unveiling the evolution, features, and popular computer texting apps. Explore the world of seamless communication in this detailed article.

    Smslocal: Discover the Convenience of Computer Texting Apps

    Definition of a Computer Texting App:

    A computer texting app is essentially a program that facilitates real-time messaging between individuals or groups over an internet connection. It allows users to exchange written messages and multimedia content, and even engage in voice or video calls without being restricted by geographic boundaries or time zones. These apps often come equipped with features like emoticons, file-sharing capabilities, read receipts, and typing indicators – enhancing the overall user experience.

    Smslocal - Discover the Convenience of Computer Texting Apps Image
    Photo from ilearnlot.com

    Importance of Computer Texting Apps in Modern Communication:

    The advent of computer texting apps has ushered in a new age of instant and convenient communication. In an increasingly interconnected world, these apps have become indispensable tools for both personal and professional interactions.

    Whether it’s staying connected with friends and family across different continents or collaborating with colleagues on essential projects, computer texting apps offer unparalleled convenience and efficiency. Moreover, these apps have bridged the gap between various devices – allowing seamless synchronization between smartphones, tablets, and computers.

    As a result, users can effortlessly switch between devices while retaining access to their entire messaging history. This flexibility ensures that important conversations are never missed regardless of the device being used.

    Furthermore, computer texting apps have gained immense popularity due to their cost-effectiveness compared to traditional SMS services. With most messaging services offering free texts over Wi-Fi or mobile data connections, users no longer need to worry about exorbitant phone bills resulting from excessive communication.

    This affordability combined with the ability to reach individuals globally has made computer texting apps an integral part of modern communication. Computer texting apps have redefined how we communicate by providing a convenient and efficient means of exchanging messages in real-time.

    With their extensive features and widespread availability, these apps have become indispensable for personal and professional interactions. As society continues to embrace digital communication, the importance and popularity of computer texting apps are only set to grow further, ensuring that staying connected is just a click away.

    Evolution and History of Computer Texting Apps

    Dawn of Text-Based Communication Systems

    In the early days of computer-mediated communication, text-based systems such as Internet Relay Chat (IRC) and ICQ revolutionized how people interacted online. IRC, launched in 1988, provided a platform for real-time group chat, allowing users to engage in discussions on various topics by joining channels. ICQ, introduced in 1996, pioneered instant messaging with its user-friendly interface and the ability to send messages directly to individuals.

    The Emergence of Instant Messaging Platforms

    With the advent of the internet boom in the late 1990s and early 2000s, instant messaging platforms gained immense popularity. Services like AOL Instant Messenger (AIM) and MSN Messenger became household names, connecting millions of users worldwide. These platforms offered real-time text-based communication between individuals, facilitating conversations that mimicked face-to-face interactions.

    Transition to Mobile Devices: The Rise of SMS/MMS

    The introduction of mobile phones brought about a shift in how people communicated through written messages. Short Message Services (SMS) and Multimedia Messaging Services (MMS) emerged as dominant forms of text-based communication on mobile devices. SMS enabled users to send brief text messages instantly, while MMS allowed for multimedia content sharing such as photos and videos.

    Integration with Social Media Platforms

    As social media gained traction during the last decade, texting apps seamlessly integrated into these platforms. Facebook Messenger and WhatsApp are prime examples of this integration with their messaging functionalities becoming an integral part of users’ social media experience. These apps empowered individuals to communicate through text messages within their existing social network connections or even reach out to strangers through group chats or public channels.

    Key Features and Functionalities Offered by Computer Texting Apps

    Text-based Messaging with Real-time Delivery

    The hallmark of computer texting apps is their ability to facilitate instant and real-time communication through text messages. Users can exchange messages with individuals or groups, allowing for quick and efficient conversations regardless of distance or time zone.

    Multimedia Sharing Capabilities

    Computer texting apps have transformed communication by enabling the seamless sharing of multimedia content. Users can effortlessly send and receive photos, videos, and various document formats, enhancing the richness of conversation and bridging the gap between physical presence and virtual interaction.

    Voice and Video Calling Options

    Beyond text-based messaging, computer texting apps have evolved to include voice and video calling capabilities. These features enable users to engage in real-time audio or video conversations, creating a more personal connection that transcends written communication alone.

    Group Chats and Channels for Collaborative Communication

    One of the best features of computer texting apps is their ability to foster collaborative communication through group chats and channels. Group chats allow multiple users to engage in discussions simultaneously, facilitating teamwork, socializing, or planning events. Channels provide an avenue for broadcasting messages to a larger audience on specific topics or interests.

    By understanding the evolution of computer texting apps from early text-based systems like IRC to the integration with social media platforms such as WhatsApp. We gain insight into how these applications have revolutionized modern communication. With key features like real-time messaging, multimedia sharing capabilities, voice/video calling options, and collaborative group chats/channels at our disposal through computer texting apps today, we continue to witness their impact on interpersonal connectivity across various digital landscapes.

    WhatsApp: An Overview of Its Features, Encryption, and Integration with Facebook

    WhatsApp is undoubtedly one of the most widely used computer texting apps available today. This cross-platform messaging application offers a plethora of features that have made it immensely popular.

    One of its key strengths lies in its seamless integration with Facebook. Allowing users to connect with their existing contacts effortlessly. WhatsApp supports text-based messaging with real-time delivery, ensuring quick and efficient communication.

    Additionally, users can send multimedia files such as photos, videos, and documents easily. When it comes to security, WhatsApp also offers end-to-end encryption for all messages exchanged between users.

    This means that only the intended recipient can access and decipher the messages sent, providing a high level of privacy and data protection. Moreover, WhatsApp frequently updates its security measures to stay ahead of potential threats.

    Telegram: Focus on Its Security Features like End-to-End Encryption and Self-Destructing Messages

    Telegram has gained significant traction among users seeking enhanced security and privacy in their computer texting app experience. Notably, Telegram boasts robust end-to-end encryption for all communications carried out through the platform.

    This ensures that conversations remain confidential and are inaccessible to any unauthorized parties. In addition to encryption capabilities, Telegram offers a unique feature called self-destructing messages.

    This allows users to set an expiration time for individual messages or entire conversations. Once the time elapses, the messages automatically vanish from both sender and recipient devices leaving no trace behind—ideal for sensitive or temporary information exchange.

    Signal: Emphasis on Privacy-Focused Features like Secure Messaging Protocols and Disappearing Messages

    Signal is renowned for its unwavering commitment to user privacy within the realm of computer texting apps. It employs state-of-the-art secure messaging protocols that ensure end-to-end encryption for all conversations.

    This means that neither Signal nor any other third party can access the contents of messages, providing users with unparalleled privacy and peace of mind. Furthermore, Signal offers a unique feature known as disappearing messages.

    With this functionality enabled, messages sent through Signal automatically disappear after a specified period, leaving no trace behind. This ensures that sensitive or time-sensitive information is not stored indefinitely on devices or servers.

    Viber: Highlight its Unique Offerings such as Stickers, Games, and Public Chats

    Viber stands out from other computer texting apps due to its array of distinctive features. One of its most notable offerings is a vast collection of stickers. That allows users to express themselves creatively in conversations.

    These stickers range from emojis and GIFs to customized characters and animations. Moreover, Viber offers an entertaining element by integrating games within the app itself.

    Users can challenge their contacts or engage in multiplayer gaming experiences while still enjoying the convenience of text-based messaging. Additionally, Viber boasts public chats where users can join communities based on their interests or follow influential figures across various industries.

    This feature enables seamless engagement with like-minded individuals and facilitates meaningful conversations on specific topics. When it comes to computer texting apps, WhatsApp, Telegram, Signal, and Viber each offer unique features and functionalities catering to different user preferences.

    While WhatsApp excels in seamless integration with Facebook and overall versatility, Telegram focuses on advanced security measures such as end-to-end encryption and self-destructing messages. On the other hand, Signal places utmost importance on privacy through encrypted communications and disappearing messages.

    Viber stands out with its extensive sticker collection for expressive conversations along with fun games and public chats for engaging user experiences. Choose the best text from a computer app that aligns with your communication needs. While considering these distinct offerings within each platform’s ecosystem.

    Niche Subtopics within Computer Texting Apps

    Unique Features

    Within the realm of computer texting apps, certain unique features set them apart and enhance the user experience. One such feature is the ability to send self-destructing messages. This functionality allows users to set a timer for their messages, ensuring that they automatically delete after a certain period.

    This feature adds a layer of privacy and security to conversations, especially when sensitive or confidential information needs to be shared. By implementing self-destructing messages, computer texting apps enable users to have peace of mind knowing. That their private conversations won’t linger indefinitely in the digital realm.

    Whether it’s discussing personal matters or sharing business-related information. This feature offers an extra level of control over the lifespan of messages. Another unique feature found in some computer texting apps is the use of reaction emojis.

    These are an extensive range of emojis specifically designed for users to react and respond to specific messages more expressively. Rather than simply typing out a response or relying on generic emojis. These specialized reaction emojis allow users to convey their emotions more accurately and vividly.

    The inclusion of reaction emojis enhances communication by adding nuance and depth to conversations. It adds a touch of personalization by allowing individuals to select from a wide array of emotions. This can be especially useful when engaging with friends, family, or colleagues who may be using the same computer texting app.

    Customization Options

    In addition to unique features like self-destructing messages and reaction emojis, many computer texting apps offer customization options for users looking to personalize their messaging experience further. These customization options can include themes, wallpapers, font styles, notification sounds, and even custom chat backgrounds. Users can choose from various themes or color schemes provided by the app developers. Allowing them to tailor the appearance of their messaging interface to their liking.

    This level of customization not only adds a personal touch but also enhances user engagement and satisfaction. Furthermore, some computer texting apps allow users to set unique notification sounds for specific contacts or groups, enabling them to identify incoming messages without even looking at their screens.

    Along with this, customizable chat backgrounds can be chosen to reflect one’s mood or interests, providing a visually appealing backdrop during conversations. By offering these customization options, computer texting apps empower users to create a messaging environment. That aligns with their preferences and reflects their individuality.

    Conclusion

    In this era of digital communication where efficiency and convenience are paramount, computer texting apps have revolutionized how we connect and interact with one another. With unique features such as self-destructing messages and reaction emojis. These apps offer heightened privacy and emotive expression that traditional forms of communication often lack.

    The ability to customize various aspects of the messaging experience adds a layer of personalization and engagement for users who seek a more tailored interface. Whether it’s setting notification sounds or selecting chat backgrounds. That resonates with one’s personality, computer texting apps strive to provide an immersive and enjoyable platform for communication.

    As technology continues to advance, we can expect even more innovative features in future iterations of computer texting apps. These developments will further enhance our digital conversations by providing us with greater control over our messages’ lifespan and expanding our expressive capabilities beyond mere words.

    Embracing the possibilities offered by computer texting apps opens up exciting avenues for connecting with others. While maintaining privacy and adding a touch of personal flair. So let us continue exploring the vast landscape of these remarkable tools. As they evolve into ever more sophisticated means of communication.

  • The Evolution of Digital Marketing: Unleashing the Power of the Digital Age

    The Evolution of Digital Marketing: Unleashing the Power of the Digital Age

    Evolution of Digital Marketing; In today’s fast-paced and technologically driven world. Digital marketing has become an essential tool for businesses of all sizes and industries. With the ever-increasing reliance on digital platforms and the widespread use of smartphones and internet connectivity. Also, The opportunities for reaching and engaging with audiences have expanded exponentially.

    The Evolution of Digital Marketing: Unleashing the Power of the Digital Age

    This article explores the evolution of digital marketing. Its key components, and how it has revolutionized the way businesses connect with consumers in the digital age.

    The Evolution of Digital Marketing Unleashing the Power of the Digital Age Image
    The Evolution of Digital Marketing: Unleashing the Power of the Digital Age

    The Rise of Digital Marketing:

    Digital marketing encompasses a wide range of strategies and techniques aimed at promoting products, services, and also brands through digital channels. It has experienced a significant rise in popularity due to several factors. Firstly, the accessibility of the internet and the proliferation of smartphones have made it easier. Than ever for businesses to connect with potential customers. Secondly, the ability to target specific audiences based on demographics, interests, and behavior has made digital marketing highly effective in delivering personalized messages to the right people at the right time.

    Key Components of Digital Marketing:

    a) Search Engine Optimization (SEO): SEO focuses on optimizing websites and content to improve their visibility and ranking in search engine results. By utilizing relevant keywords, creating high-quality content, and also building backlinks, businesses can enhance their online presence and attract organic traffic.

    b) Social Media Marketing: Social media platforms have become integral to digital marketing strategies. With billions of active users, platforms like Facebook, Instagram, Twitter, and LinkedIn offer businesses a vast audience to engage with. Through targeted advertising, content creation, and community management, businesses can build brand awareness, foster customer loyalty, and drive conversions.

    c) Content Marketing: Content marketing involves creating and distributing valuable, relevant, and consistent content to attract and retain a target audience. It includes blog posts, articles, videos, infographics, and more. Effective content marketing establishes businesses as thought leaders, educates consumers and helps build trust and credibility.

    d) Pay-Per-Click Advertising (PPC): PPC advertising allows businesses to display ads on search engines and other websites, paying only when users click on the ads. Platforms like Google Ads and Bing Ads enable businesses to target specific keywords and demographics, ensuring their ads are seen by relevant audiences. Also, PPC campaigns can generate immediate traffic and conversions.

    e) Email Marketing: Email marketing remains a powerful tool for nurturing customer relationships and driving conversions. By crafting compelling email campaigns, businesses can reach out to their target audience directly. Deliver personalized messages, promote products or services, and encourage customer loyalty.

    The Power of Data and Analytics:

    One of the greatest advantages of working with a digital marketing agency is the ability to gather vast amounts of data and gain insights into consumer behavior. Tools such as Google Analytics provide businesses with valuable information about website traffic, user engagement, conversion rates, and more. These insights enable marketers to refine their strategies, optimize campaigns, and make data-driven decisions to achieve better results.

    The Future of Digital Marketing:

    As technology continues to advance, the future of working with digital marketing agency holds even more exciting possibilities. Emerging technologies like artificial intelligence (AI), virtual reality (VR), and augmented reality (AR) are set to transform the way businesses engage with consumers. AI-powered chatbots and voice assistants are already enhancing customer experiences, while VR and AR offer immersive and interactive marketing opportunities.

    Digital marketing has become an indispensable tool for businesses seeking to thrive in the digital age. Also, Its ability to reach and engage with audiences on various platforms has revolutionized the way brands connect with consumers. As technology continues to evolve, businesses must stay agile, adapt their strategies, and embrace new opportunities to leverage the power of digital marketing. By harnessing the potential of SEO, social media marketing, content marketing, PPC advertising, and data analytics, businesses can unlock

  • Security Information and Event Management Systems (SIEMS)

    Security Information and Event Management Systems (SIEMS)

    Security Information and Event Management Systems (SIEMS) automate incident identification and resolution based on built-in business rules to help improve compliance and alert staff to critical intrusions. IT audits, standards, and regulatory requirements have now become an important part of most enterprises’ day-to-day responsibilities. As part of that burden, organizations are spending significant time and energy scrutinizing their security and event logs to track; which systems have existed accessed, by whom, what activity took place, and whether it was appropriate.

    Here is the article to explain, Essay of the Security Information and Event Management Systems (SIEMS)!

    Organizations are increasingly looking towards data-driven automation to help ease the burden. As a result, the SIEM has taken form and has provided focused solutions to the problem. The security information and event management systems market is driven by an extremely increasing need for customers to meet compliance requirements as well as the continued need for real-time awareness of external and internal threats. Customers need to analyze security event data in real-time (for threat management) and to analyze and report on log data and primarily this has made the security information and event management systems market more demanding. The market remains fragmented, with no dominant vendor.

    This report entitled ‘Security Information and Event Management Systems (SIEMS) Solutions’ gives a clear view of the SIEM solutions and whether; they can help to improve intrusion detection and response. Following this introduction is the background section; which deeply analyzes the evolution of the SIEM, its architecture, its relationship with log management, and the need for SIEM products. In the analysis section, I have analyzed the SIEM functions in detail along with real-world examples. Finally, the conclusion section summarizes the paper.

    What is the Meaning and Definition of SIEMS?

    Security Information and Event Management Systems solutions are a combination of two different products namely, SIM (security information management) and SEM (security event management). SIEMS also like to know as Network Intrusion Detection Systems (NIDS); SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. The objective of SIEM is to help companies respond to attacks faster and to organize mountains of log data. SIEM solutions come as software, appliances, or managed services. Increasingly, SIEM solutions stand existing used to log security data and generate reports for compliance purposes. Though Security Information Event Management and log management tools have been complementary for years, the technologies that exist expect to merge.

    Evolution of SIEM:

    SIEM emerged as companies found themselves spending a lot of money on intrusion detection/prevention systems (IDS/IPS). These systems helped detect external attacks, but because of the reliance on signature-based engines, a large number of false positives stood generated. The first-generation SIEM technology existed designed to reduce this signal-to-noise ratio and helped to capture the most critical external threats. Using rule-based correlation, SIEM helped IT detect real attacks by focusing on a subset of firewall and IDS/IPS events that violated policy.

    Traditionally, SIEM solutions have been expensive and time-intensive to maintain and tweak, but they solve the big headache of sorting through excessive false alerts and they effectively protect companies from external threats. While that was a step in the right direction, the world got more complicated when new regulations such as the Sarbanes-Oxley Act and the Payment Card Industry Data Security Standard followed much stricter internal IT controls and assessment. To satisfy these requirements, organizations exist required to collect, analyze, report on, and archive all logs to monitor activities inside their IT infrastructures.

    The idea is not only to detect external threats but also to provide periodic reports of user activities and create forensics reports surrounding a given incident. Though SIEM technologies collect logs, the process only a subset of data related to security breaches. They weren’t designed to handle the sheer volume of log data generated from all IT components; such as applications, switches, routers, databases, firewalls, operating systems, IDS/IPS, and Web proxies.

    Other evolutions;

    With an idea to monitor user activities rather than external threats, log management entered the market as a technology with architecture to handle much larger volumes of data and with the ability to extend to meet the demands of the largest enterprises. Companies implement log management and SIEM solutions to satisfy different business requirements, and they have also found out that the two technologies work well together. Log management tools exist designed to collect reports and archive a large volume and breadth of log data, whereas SIEM solutions stand designed to correlate a subset of log data to point out the most critical security events.

    On looking at an enterprise IT arsenal, it is likely to see both log management and SIEM. Log management tools often assume the role of a log data warehouse that filters and forwards the necessary log data to SIEM solutions for correlation. This combination helps in optimizing the return on investment while also reducing the cost of implementing SIEM. In these tough economic times, it is likely to see IT trying to stretch its logging technologies to solve even more problems. It will expect its log management and SIEM technologies to work closer together and reduce overlapping functionalities.

    Relation between SIEM and log management:

    Like many things in the IT industry, there’s a lot of market positioning and buzz coming around regarding how the original term of SIM (Security Information Management), the subsequent marketing term SEM (Security Event Management), the newer combined term of SIEMS (Security Information and Event Management Systems) relate to the long-standing process of log management. The basics of log management are not new. Operating systems, devices, and applications all generate logs of some sort that contain system-specific events and notifications. The information in logs may vary in overall usefulness, but before one can derive much value

    out of them, they first need to enable, then transported, and eventually stored. Therefore the way that one does gather this data from an often distributed range of systems; and get it into a centralized (or at least semi-centralized) location is the first challenge of log management that counts. There are varying techniques to accomplish centralization, ranging from standardizing on the Syslog mechanism; and then deploying centralized Syslog servers, to using commercial products to address the log data acquisition, transport, and storage issues.

    Other issues;

    Some of the other issues in log management include working around network bottlenecks, establishing reliable event transport (such as Syslog over UDP), setting requirements around encryption, and managing the raw data storage issues. So the first steps in this process are figuring out what type of log and event information is in need to gather, how to transport it, and where to store it. But that leads to another major consideration about what should one person want to do with all those data. It is at this point where the basic log management ends and the higher-level functions associated with SIEM begin.

    SIEM products typically provide many of the features that remain essential for log management; but add event-reduction, alerting, and real-time analysis capabilities. They provide the layer of technology that allows one to say with confidence that not only are logs existing gathered but they are also living reviewed. SIEM also allows for the importation of data that isn’t necessarily event-driven (such as vulnerability scanning reports) and it knows as the “Information” portion of SIEM.

    SIEM architecture:

    Long-term log management and forensic queries need a database built for capacity, with file management and compression tools. Short-term threat analysis and correlation need real-time data, CPU, and RAM. The solution for this is as follows:

    • Split the feeds into two concurrent engines.
    • Optimize one for real-time and storage up to 30 days of data. (100-300GB)
    • Optimize the second for log compression, retention, and query functions. (1TB+)

    The block diagram showing the architecture of the SIEM is as follows:

    A collector is a process that gathers data. Collectors exist produced in many shapes and sizes from agents that run on the monitored device, to centralized logging devices with pre-processors to split stream the data. These can be simple REGEX file parsing applications, or complex agents for OPSEC, LEA, Net/WMI, SDEE/RDEP, or ODBC/SQL queries. Not all security devices are kind enough to forward data, and multiple input methods, including active pull capabilities, are very essential. Also, since SYSLOG data do not encrypt, it may need a collector to provide encrypted transport.

    Analysis engine;

    A threat analysis engine will need to run in real-time, continuously processing and correlating events of interest passed to it by the collector, and reporting to a console or presentation layer application about the threats found. Typically reporting events that have happened for 30 days is sufficient for operational considerations. A log manager will need to store a great deal of data, and may take either raw logs or filtered events of interest, and need to compress store, and index the data for long-term forensic analysis and compliance reporting. Capacity for 18 months or more of data is likely to require.

    Year-end closing of books and the arrival of the auditors often necessitate the need for 12 months of historic data plus padding of several months while books exist finalized and an audit to complete. At the presentation layer, a console will present the events to the security staff and managers. This is the primary interface to the system for day-to-day operations, and should efficiently prioritize and present the events with a full history and correlation rationale.

    SIEM functions:

    With some subtle differences, there are four major functions of SIEM solutions. They are as follows:

    1. Log Consolidation; centralized logging to a server
    2. Threat Correlation; the artificial intelligence used to sort through multiple logs and log entries to identify attackers
    3. Incident Management; workflow – What happens once a threat identified? (link from identification to containment and eradication). Notification – email, pagers, informs to enterprise managers (MOM, HP Openview…). Trouble Ticket Creation, Automated responses – execution of scripts (instrumentation), Response and Remediation logging
    4. Reporting; Operational Efficiency/Effectiveness, Compliance / SOX, HIPPA, FISMA, and Ad Hoc / Forensic Investigations.

    Coming to the business case for SIEM, all engineers exist perpetually drawn to new technology; but, purchasing decisions should by necessity based on need and practicality. Even though the functions provided by SIEM are impressive they must choose only if they fit an enterprise’s needs.

    Why use a SIEM?

    There are two branches on the SIEM tree namely, operational efficiency and effectiveness, and log management/compliance. Both are achievable with a good SIEM tool. However since there is a large body of work on log management, and compliance has multiple branches; this coursework will focus only on using a SIEM tool effectively to point out the real attackers; and, the worst threats to improve security operations efficiency and effectiveness.

    It can believe that the most compelling reason for a SIEM tool from an operational perspective is to reduce the number of security events on any given day to a manageable, actionable list, and to automate analysis such that real attacks and intruders can discern. As a whole, the number of IT professionals, and security-focused individuals at any given company has decreased relative to the complexity and capabilities demanded by an increasingly inter-networked web.

    While one solution may have dozens of highly skilled security engineers on staff pouring through individual event logs to identify threats, SIEM attempts to automate that process and can achieve a legitimate reduction of 99.9+% of security event data while it increases the effective detection over traditional human-driven monitoring. This is why SIEM prefer by most companies.

    Reasons to use a SIEM:

    Knowing the need for a SIEM tool in an organization is very important. A defense-in-depth strategy (industry best practice) utilizes multiple devices: Firewalls, IDS, AV, AAA, VPN, User Events – LDAP/NDS/NIS/X.500, Operating System Logs… which can easily generate hundreds of thousands of events per day, in some cases, even millions.

    No matter how good a security engineer is, about 1,000 events per day is a practical maximum that a security engineer is about to deal with. So if the security team is to remain small they will need to equip with a good SIEM tool. No matter how good an individual device is; if not monitored and correlated, each device can bypass individually, and the total security capabilities of a system will not exceed its weakest link.

    When monitored as a whole, with cross-device correlation, each device will signal an alert as it stands attacked raising awareness and threat indications at each point allowing for additional defenses to exist brought into play, and incident response proportional to the total threat. Even some of the small and medium businesses with just a few devices are seeing over 100,000 events per day. This has become usual in most of the companies says the internet.

    Real-world examples:

    Below are event and threat alert numbers from two different sites currently running with 99.xx% correlation efficiency on over 100,000 events per day, among which one industry expert referred to as “amateur” level, stating that 99.99 or 99.999+% efficiency on well over 1,000,000 events per day is more common.

    • Manufacturing Company Central USA – 24-hour average, un-tuned SIEM day of deployment
    • Alarms Generated 3722
    • Correlation
    • Efficiency 99.06%
    • Critical / Major
    • Level Alerts 170
    • Effective Efficiency 99.96%

    In this case, using a SIEM allows the company’s security team (2 people in an IT staff of 5), to respond to 170 critical and major alerts per day (likely to decrease as the worst offenders exist firewalled out, and the worst offenses dealt with), rather than nearly 400,000.

    • Financial Services Organization – 94,600 events – 153 actionable alerts – 99.83% reduction.
    • The company above deals with a very large volume of financial transactions, and a missed threat can mean real monetary losses.

    Concerning the Business Case, a good SIEM tool can provide the analytics, and the knowledge of a good security engineer can automate and repeat against a mountain of events from a range of devices. Instead of 1,000 events per day, an engineer with a SIEM tool can handle 100,000 events per day (or more). And a SIEM does not leave at night, find another job, take a break or take vacations. It will be working always.

    SIEM Selection Criteria:

    The first thing one should look at is the goal. (i.e.) what should the SIEM do for them. If you just need log management then make the vendor can import data from ALL of the available log sources. Not all events exist sent via SYSLOG. Some may exist sent through:

    • Checkpoint – LEA
    • Cisco IDS – RDEP/SDEE encryption
    • Vulnerability Scanner Databases – Nessus, Eye, ISS…
    • AS/400 & Mainframes – flat files
    • Databases – ODBC/SQL queries
    • Microsoft .Net/WMI

    Consider a product that has a defined data collection process that can pull data (queries, retrieve files, WMI API calls…), as well as accept input sent to it. And it is essential to be aware that logs, standards, and formats change, several (but not all), vendors can adapt by parsing files with REGEX and importing if one can get them a file. However, log management itself is not usually an end goal. It matters about for what purpose these logs are used. They may be used for threat identification, compliance reporting, or forensics. It is also essential to know whether the data captured is in real-time. If threat identification is the primary goal, 99+% correlation/consolidation/aggregation is easily achievable, and when properly tuned, 99.99+% efficiency is within reach (1-10 actionable threat alerts / 100,000 events).

    Reporting;

    If compliance reporting is the primary goal, then consider what regulations one is subject to. Frequently a company is subject to multiple compliance requirements. Consider a Fortune 500 company like General Electrics. As a publicly-traded company, GE is subject to SOX, as a vendor of medical equipment and software; they are subject to HIPPA, as a vendor to the Department of Defense, they are subject to FISMA. GE must produce compliance reports for at least one corporate division for nearly every regulation.

    Two brief notes on compliance, and one should look at architecture: Beware of vendors with canned reports. While they may be very appealing, and sound like a solution, valid compliance and auditing is about matching output to one’s stated policies, and must be customized to match each company’s published policies. Any SIEM that can collect all of the required data, meet ISO 177999, and provide timely monitoring can be used to aid in compliance. Compliance is a complex issue with many management, and financial process requirements; it is not just a function or report IT can provide.

    Advanced SIEM Topics:

    Risk-Based Correlation / Risk Profiling; Correlation based on risk can dramatically reduce the number of rules required for effective threat identification. The threat and target profiles do most of the work. If the attacks are risk profiled, three relatively simple correlation rules can identify 99%+ of the attacks. They are as follows:

    • IP Attacker – repeat offenders
    • IP Target – repeat targets
    • Vulnerability Scan + IDS Signature match – Single Packet of Doom

    Risk-Based Threat Identification is one of the more effective and interesting correlation methods, but has several requirements:

    • A Metabase of Signatures – Cisco calls the attack X, ISS calls it Y, Snort calls it Z – Cross-Reference the data
    • Requires automated method to keep up to date.
    • Threats must be compiled and threat weightings applied to each signature/event.
    • Reconnaissance events are low weighting – but aggregate and report on the persistent (low and slow) attacker
    • Finger Printing – a bit more specific, a bit higher weighting
    • Failed User Login events – a medium weighting, could be an unauthorized attempt to access a resource or a forgotten password.

    Buffer Overflows, Worms, and Viruses -high weighting -potentially destructive; events one needs to respond to unless one has already patched/protected the system.

    • The ability to learn or adjust to one’s network Input or auto-discover; which systems, are business-critical vs. which are peripherals, desktops, and non-essential
    • Risk Profiling: Proper application of trust weightings to reporting devices (NIST 800-42 best practice); can also help to lower “cry wolf” issues with current security management

    Next-generation SIEM and log management:

    One area where the tools can provide the most needed help is compliance. Corporations increasingly face the challenge of staying accountable to customers, employees, and shareholders, and that means protecting IT infrastructure, customer and corporate data, and complying with rules and regulations as defined by the government and industry. Regulatory compliance is here to stay, and under the Obama administration, corporate accountability requirements are likely to grow.

    Log management and SIEM correlation technologies can work together to provide more comprehensive views to help companies satisfy their regulatory compliance requirements, make their IT and business processes more efficient, and reduce management and technology costs in the process. IT organizations also will expect log management and intelligence technologies to provide more value to business activity monitoring and business intelligence. Though SIEM will continue to capture security-related data, its correlation engine can be re-appropriated to correlate business processes and monitor internal events related to performance, uptime, capability utilization, and service-level management.

    We will see the combined solutions provide deeper insight into not just IT operations but also business processes. For example, we can monitor business processes from step A to Z; and, if a step gets missed we’ll see where and when. In short, by integrating SIEM and log management; it is easy to see how companies can save by de-duplicating efforts and functionality. The functions of collecting, archiving, indexing, and correlating log data can be collapsed. That will also lead to savings in the resources required and in the maintenance of the tools.

    CONCLUSION:

    SIEMS (security information and event management systems) is a complex technology, and the market segment remains in flux. SIEM solutions require a high level of technical expertise and SIEM vendors require extensive partner training and certification. SIEM gets more exciting when one can apply log-based activity data and security-event-inspired correlation to other business problems. Regulatory compliance, business activity monitoring, and business intelligence are just the tip of the iceberg. Leading-edge customers are already using the tools to increase visibility; and the security of composite Web 2.0 applications, cloud-based services, and mobile devices. The key is to start with a central record of user and system activity; and, build an open architecture that lets different business users access the information to solve different business problems. So there is no doubt in SIEM solutions help the intrusion detection and response to improve.

    Security Information and Event Management Systems (SIEMS) Essay Image
    Security Information and Event Management Systems (SIEMS) Essay; Image by Pete Linforth from Pixabay.
  • Microfinance in India 4 Stages Development Evolution

    Microfinance in India 4 Stages Development Evolution

    4 Stages of Microfinance in India with their Development and Evolution; The Grameen Bank model of microfinance based on the “joint liability” of members has received wide international appeal and popularity in numerous emerging economies like India. The developing economies have even tried to replicate these models for developing small-scale businesses and reducing poverty levels.

    Here is the article to explain, Development and evolution of Microfinance in India with its 4 Stages!

    The evolution of Indian microfinance can broadly divide into four distinct phases:

    The Cooperative Movement (1900-1960);

    During this phase, there was the dominance of two sources of credit viz. institutional sources and non-institutional sources. The noninstitutional sources catered to 93 percent of credit requirement in the year 1951-52; and, institutional sources accounted for 7 percent of total credit requirements about that year. The preponderance of informal sources of credit was due to the provision of loans for both productive and nonproductive purposes; as well as for short-term and long-term purposes and simple procedures of lending adopted.

    But they involved several malpractices like charging high rates of interest, denial of repayment, misappropriation of collaterals, etc. At that time, the government considered cooperatives as an instrument of economic development of disadvantaged masses. The credit cooperatives were vehicles to extend subsidized credit to the poor under government sponsorship.

    They existed characterized as non-exploitative, voluntary membership, and decentralized decision-making. The Primary Agricultural societies (PACS) provide mainly short-term and medium-term loans; and Land Development Banks provide long-term loans as a part of the cooperative movement.

    Subsidized Social Banking (1960 – 1990);

    It stood observed that cooperatives could not do much as existed expected of them. With the failure of cooperatives, the All India Rural Credit Survey Committee in 1969 emphasized the adoption of the “Multiagency Approach to Institutional Credit”; which assigned an important role to the commercial banks in addition to cooperatives. Even Indian planners in the fifth five-year plan (1974-79), emphasized “Garibi Hatao” (Removal of poverty) and the “growth with social justice”.

    It was due to this approach that in 1969, 14 leading banks stood nationalized, and later on; five regional rural banks stood set up for the purpose on October 2, 1975, at Moradabad and Gorakhpur in Uttar Pradesh, Bhiwani in Haryana, Jaipur in Rajasthan and Malda in West Bengal. Hence, as a result of the Multiagency approach and other planning initiatives; the Government focused on measures such as the nationalization of Banks, expansion of rural branch networks; the establishment of Regional Rural Banks (RRBs), and the setting up of apex institutions.

    Such as the National Bank for Agriculture and Rural Development (NABARD); and the Small Scale Industries Development Bank of India (SIDBI). The Reserve Bank of India (RBI) as the central bank of the country played a crucial role by giving overall direction for providing credit and financial support to the national bank for its operations. Therefore, after the multiagency approach, the commercial banks and regional rural banks assumed a major role in providing both short-term and long-term funds for serving the poorest of the poor.

    Part 01;

    Despite, the multiagency approach adopted; a very large number of the poorest of the poor continued to remain outside the fold of the formal banking system. While these steps led to reaching a large population, the period stood characterized by large-scale misuse of credit; creating a negative perception about the credibility of micro borrowers among bankers; thus further hindering access to banking services for low-income people.

    However, the gap between demand and supply of financial services still prevailed due to shortcomings of the institutional credit system; as it provides funds only for productive purposes, the requirement of collateral, massive paperwork leading to inordinate delays. As a response to the failure of the formal financial system in reaching the destitute masses; microfinance through Self-help groups existed innovated and institutionalized in the India scenario.

    “While no definitive date has been determined for the actual conception and propagation of SHGs; the practice of small groups of rural and urban people banding together to form a savings and credit organization well establish in India. In the early stages, NGOs played a pivotal role in innovating the SHG model and in implementing the model to develop the process fully”.

    Part 02;

    The first step towards Microfinance intervention was the establishment of the Self Employed Women’s Association (SEWA); a nonformal organization owned by women of petty trade groups. It stood established on the cooperative principle in 1974 in Gujarat. This initiative existed undertaken for providing banking services to the poor women employed in the unorganized sector of Ahmadabad. Shree Mahila Sahkari Bank stood set up as an urban cooperative bank. At the national level, the SHG movement involves NGOs helping in the formation of the groups.

    During this time, the planners and policymakers were desperately searching for viable ways of poverty alleviation. Around that time, the Government of India launched the Integrated Rural Development Program (IRDP); a large poverty alleviation credit program, to provide credit to the poor and underprivileged; which involved the provision of government-subsidized credit through banks to the poor. But the IRDP was a “supply-led” program and the clients had no choice over the purpose and the amount. At this stage, it existed realized that the poor needed better access to these services and products, rather than cheap subsidized credit. That is when the experts started talking about microfinance, rather than microcredit.

    Part 03;

    Keeping in view the economic scenario of those days, a strong need existed felt for alternative policies, procedures, savings and loan products, other complementary services, and new delivery mechanisms; which would fulfill the requirements of the poorest, especially of the women members of such households. It was during this time, NABARD conducted a series of research studies independently and in association with MYRADA, a leading NGO from Southern India; which showed that a very large number of poor continued to remain outside the fold of the formal banking system. Later on, PRADAN in its Madurai projects started forming women SHG groups”.

    During 1988-89, NABARD in association with Asia Pacific Rural and Agricultural Credit Association (APRACA) undertook a survey of 43 NGOs in 11 states in India, to study the functioning of microfinance SHGs and their collaboration possibilities with the formal banking system. Both these research projects laid the foundation stone for the initiation of a pilot project called the SHG linkage project.

    SHG-Bank Linkage Program (1990 – 2000);

    The failure of subsidized social banking lead to the delivery of credit with NABARD initiating the Self Help Group (SHG) Bank Linkage Programme in 1992 (SBLP), aiming to link informal women’s groups to formal banks. This was the first official attempt in linking informal groups with formal lending structures. “To initiate this project NABARD held extensive consultations with the RBI. This resulted from the RBI issuing a policy circular in 1991 to all Commercial Banks to participate and extend finance to SHGs” (RBI, 1991). This was the first instance of mature SHGs that were directly financed by a commercial bank. “The informal thrift and credit groups of poor were recognized as bankable clients. Soon after, the RBI advised Commercial Banks to consider lending to SHGs as part of their rural credit operations thus creating SHG Bank Linkage”.

    The program has been extremely useful in increasing banking system outreach to unreached people. The program has been extremely advantageous due to the reduction of transaction costs; due to less paperwork and record keeping as group lending rather than individual lending involved. The SHG bank linkage is a strong method of financial inclusion; providing unbanked rural clientele with access to formal financial services from the existing banking infrastructure.

    Other things;

    The major benefit of linking SHGs with the banks is that it helps in overcoming the problem of high transaction costs of banks; as the responsibility of loan appraisal, follow-up, recovery of loans is left to the poor themselves. On the other side, SHGs gain by enjoying larger and cheaper sources.

    Later, the planners in the Ninth Five-year plan (1997-2002) emphasized “Growth with Social Justice and Equality”. The objective of the Ninth plan as approved by the National Development Council explicitly states as follows:

    “Promoting and developing participatory institutions like Panchayati Raj Institutions, cooperatives, and Self -Help Groups”.

    Hence, it was a ninth five-year plan that expressly laid down the objective of establishment of Self Help Groups to achieve the objective of Growth with Social Justice and Equality” as a part of the microfinance initiative. Meanwhile, in 1999, the Government of India merged various credit programs, refined them; and launched a new program called Swaranjayanti Gram Swarazagar Yojana (SGSY). SGSY aimed to continue to provide subsidized credit to the poor through the banking sector to generate self-employment through a Self-Help Group approach.

    Commercialization of Microfinance: The first decade of the new millennium;

    This stage involves greater participation of new microfinance institutions that started taking interest in the sector not only as part of their corporate social responsibility but also as a new business line in India. Several institutions have been set up over time; which stood required to meet the credit requirements of the new society and downtrodden.

    At present Eleventh Five Year Plan (2007-2012) aims at “Towards More and Inclusive Growth”. The word inclusive growth means including and considering; those who are somehow excluded from the benefits which they (poor) should avail. Microfinance is a step towards inclusive growth via inclusive finance; which moves around serving the financial needs and non-financial needs of the poor to improve the level of living of rural masses.

    Microfinance in India 4 Stages Development Evolution Image
    Microfinance in India 4 Stages Development Evolution; Image by Mohamed Hassan from Pixabay.
  • 7 Evolution Development of ERP Enterprise Resource Planning

    7 Evolution Development of ERP Enterprise Resource Planning

    What is the 7 Evolution or Development of ERP Enterprise Resource Planning Systems? The construction industry is one of the major industries contributing to the economy, even though it is measured to be one of the most highly fragmented, inefficient, and geographically detached industries in the world. Thousands of major construction firms and increasing numbers from other sectors as well, either have just completed their first ERP implementations or are in the middle of this major undertaking. 7 Evolution and Development below are; Pre material requirement planning, Material requirement planning (MRP), MRP- II, ERP, Extended ERP, ERP Planning–II, ERP-A manufacturing perspective.

    Here is the article to explain, 7 Evolution and Development of ERP Enterprise Resource Planning with their history!

    The history of ERP can trace back to the 1960s when the system focuses mainly on inventory control. During the 1970s, a shift of focus towards MRP (Material Requirement Planning) did observe. This system helped in translating the master production schedule into requirements for individual units like sub-assemblies, components, and other raw material planning and procurement. This system did involve mainly in planning the raw material requirements.

    Then, in the 1980s came the concept of MRP-II (Manufacturing Resource Planning) which involved optimizing the entire plant production process. In the beginning, MRP-II was an extension of MRP to include shop floor and distribution management activities. Afterward, it did further extended to include areas like Finance, Human resources, Engineering, Project Management, etc. This gave birth to ERP (Enterprise Resource Planning) which covered the cross-functional coordination and integration in support of the production process.

    Role of ERP;

    The role of enterprise resource planning (ERP) does not match its name, we talk about their Evolution and Development. It is no longer related to planning and resources but is rather related to the enterprise aspect of the name. ERP attempts to unify all systems of departments together into a single, integrated software program based on a single database so that various departments can more easily share information and communicate with each other. The ERP includes the entire range of a company’s activities. It addresses both system requirements and technical aspects including client/server distributed architecture, RDBMS, object-oriented programming, etc.

    ERP systems are designed as an integrated set of software modules, all linked to a common database, handling a host of corporate functions such as finance, human resources, material management, sales, etc. Russell and Taylor (1995) suggested that the ERP of today differ from traditional MRP II system in the areas of relational database management, graphical user interface (GUI), fourth-generation languages (4GL), client-server architecture, and open system capabilities.

    Few differences;

    In addition, Kapp et al. (2001), stated that the difference between ERP and MRP II is the inclusion of a variety of manufacturing processes within ERP, in which modern ERP software can handle both discrete work orders and flow orders, JIT and MRP, EDI, and hand-entered orders. Wainewright (2002) also stated that MRP was used for tracking suppliers, work-in-progress, and the output of finished goods, while ERP was used for all types of business with additional functions including financials, payroll, and human resources management.

    Furthermore, Kremzar and Wallace (2001) also stated that ERP is far better than MRP II for three reasons:

    • ERP applies a single set of resource planning tools across the entire enterprise;
    • ERP provides real-time integration of sales, operating, and financial data, and;
    • Also, ERP connects resource planning approaches to the extended supply chain of customers and suppliers.

    Reasons;

    According to Koch(2002) the main reasons that companies take ERP to summarize below:

    • Because of its Integrated Financial Information i.e. to create a single version of the information which cannot question because all the members of the company use the same system.
    • The information integrates into one system rather than scattered on many different systems that cannot communicate which each other, so that the company can track orders and can coordinate with different related departments across many different locations at the same time.
    • It standardized and speed up the process using a single integrated system which can save time and increase productivity.
    • Reduces inventory by improving the observation ability of the order process inside the company.

    The popularity of ERP systems started to soar in 1994 when SAP, a German-based company, released its next-generation software known as R/3. In the following years, companies began to pour billions into ERP systems offered by SAP and its major competitors such as Oracle, Baan, J.D. Edwards, etc. Recently, ERP vendors add more modules and functions as “add-ons” to the core modules giving birth to the new term i.e. extended ERPs or ERP II. It is the enterprise system for the 21st century.

    ERP extensions include advanced plan;

    These ERP extensions include advanced planning and scheduling (APS), e-business solutions such as customer relationship management (CRM), and supply chain management (SCM). ERP II systems are about optimizing the supply chain through collaboration with trading partners. It crosses all sectors and segments of business, including service industries, government, and asset-based industries like mining. According to Zrimsek (2003), ERP II systems are web-based, open to integrate and interoperate with other systems, and built around modules or components that allow users to choose just the functionality they need.

    Difference between MRP and ERP;

    Here are a few differences between MRP and ERP.

    • MRP method material requirement making plans ERP means employer useful resource planning.
    • MRP is a solo software program, but ERP software can combine with different systems or software programs easily.
    • You can integrate the MRP software program with another software program, however, it’s miles tough. ERP systems combine with other software programs or modules without any problem.
    • MRP fits production industries, whereas ERP fits all kinds of industries, specifically huge companies due to the fact it could fulfill the requirements of all the departments of huge industries with its modules.
    • Types of MRP users are minimal because only one branch, this is, the manufacturing branch makes use of it. But types of ERP customers are most with prolonged customers in special departments.
    • ERP is extra steeply-price, while MRP is much less high-priced.
    Difference between open supply ERP and cloud ERP;

    What is the considerable difference between open source ERP and cloud ERP? The great distinction between open source ERP and cloud ERP is source code. In an open-supply ERP system, the supply code is publicly accessible. But in a cloud system, you have to pay to get the license of supply code.

    • In open source ERP, you could personalize the code, rewrite the code, and generate a new code version. But in cloud ERP, you cannot edit the code.
    • Open supply ERP suites industries with less required functionalities. Cloud ERP suits massive industries that require a huge style of features.
    • Open source ERP is entirely loose, and for cloud ERP, subscription prices are there.

    Future evolution or development of ERP systems;

    In evaluation with the history of ERP enterprise resource planning, its future is greater dynamic due to the development in a generation.

    • Due to the reduction of computation fee and statistics garage cost, gathering each minute element of business events are viable. In addition, it opens up the possibility of giant information analysis and superior reporting.
    • Based on previous statistics and industry benchmarks, gadget learning can assist in suggesting better business selections.
    • Automation of data-driven decision-making will take the front seat with the help of artificial intelligence.
    • For business transactions between multiple events, they may be organizing information integrity with the blockchain era.
    • To avoid frictions due to physical proximity, the virtual fact for better interactions.
    • Jobsite controls the use of five G-enabled smartphones.
    • Internet of Things or Factors (IoT) for higher facts alternate among human-to-machine and gadget-to-gadget.
    • The evolution and development in the era has constantly accompanied the records of ERP. It keeps boosting the commercial enterprise boom.

    With SaaS-based cloud ERP systems, increasingly companies can start using corporation aid planning answers of their commercial enterprise operations.

    7 Evolution or Development of ERP Enterprise Resource Planning Systems Image
    7 Evolution or Development of ERP Enterprise Resource Planning Systems Image!

    References; Enterprise resource planning. Retrieved from https://www.ukessays.com/essays/construction/enterprise-resource-planning.php?vref=1

  • Merchant Banking: Functions, Origin, and Evolution

    Merchant Banking: Functions, Origin, and Evolution

    Meaning of Merchant Banking: Dictionary meaning of Banking points at merchant bank as an organization that underwrites securities for corporations advises such clients on mergers and involves in the ownership of commercial ventures. The term “Merchant Banking” has been used differently in different parts of the world.

    Learn, Explain each topic of Merchant Banking: Functions, Origin, and Evolution!

    While in the UK, merchant banking refers to the “Accepting and issuing houses”, in the USA it knows as “Investment banking“. The word merchant banking has been so widely used that sometimes; it applies to banks who are not merchants, sometimes to merchants who are not banks, and sometimes to those intermediaries who are neither merchants nor banks. Explain the Organizational setup of Merchant Bankers in India!

    Functions of Merchant Banking:

    The basic function of a merchant banker is marketing corporate and other securities. Now they require to take up some allied functions also.

    A merchant bank now takes up the following functions:

    1. Promotional Activities:

    A merchant bank functions as a promoter of industrial enterprises in India He helps the entrepreneur in conceiving an idea, identification of projects, preparing feasibility reports, obtaining governmental approvals and incentives, etc. Some of the merchant banks also assist technical and financial collaborations and joint ventures

    2. Issue Management:

    In the past, the function of a merchant banker had mainly been confined to the management of new public issues of corporate securities by the newly formed companies, existing companies (further issues); and the foreign companies in dilution of equity as required under FERA In this capacity the merchant banks usually act as sponsor of issues.

    They obtain the consent of the Controller of Capital Issues (now, the Securities and Exchange Board of India) and provide several other services to ensure success in the marketing of securities. The service provided by them includes the preparation of the prospectus, underwriting arrangements, appointment of registrars, brokers, and bankers to the issue, advertising and arranging publicity and compliance of listing requirements of the stock exchanges, etc.

    They act as experts of the type, timing, and terms of issues of corporate securities and make them acceptable for the investors on the one hand and also provide flexibility and freedom to the issuing companies.

    3. Credit Syndication:

    Merchant banks provide specialized services in preparation of the project, loan applications for raising short-term as well as long-term credit from the various bank and financial institutions, etc. They also manage Euro-issues and help in raising funds abroad.

    4. Portfolio Management:

    Merchant banks offer services not only to the companies issuing the securities but also to the investors. They advise their clients, mostly institutional investors, regarding investment decisions. Merchant bankers even undertake the function of purchase and sale of securities for their clients to provide portfolio management services. Some merchant bankers are operating mutual funds and offshore funds also.

    5. Leasing and Finance:

    Many merchant bankers provide leasing and finance facilities to their customers. Some of them even maintain venture capital funds to assist entrepreneurs. They also help companies in raising finance by way of public deposits.

    6. Servicing of Issues:

    Merchant banks have also started to act as paying agents for the service of debt- securities and to act as registrars and transfer agents. Thus, they maintain even the registers of shareholders and debenture holders and arrange to pay dividends or interest due to them

    7. Other Specialized Services:

    In addition to the basic activities involving the marketing of securities, merchant banks also provide corporate advisory services on issues like mergers and amalgamations, tax matters, recruitment of executives and cost and management audits, etc. Many merchant bankers have also started making bought-out deals of shares and debentures. The activities of the merchant bankers are increasing with the change in the money market.

    Origin of Merchant Banking:

    The origin of merchant banking can trace back to the 13th century when a few families-owned and managed firms engaged in the sale and purchase of commodities were also found to engage in banking activity. These firms not only acted as bankers to the kings of European States, financed coastal trade but also borne exchange risk.

    To earn profits, they invested their funds where they expected higher returns despite the high degree of risk involved. They charged very high rates of interest for financing highly risky projects. In turn, they suffered heavy losses and had to close down. Some of them restarted the same activity after gaining financial strength. Thus merchant Banking survived and continued during the 13th century.

    Later,

    Merchant Bankers were known as “Commission agents” who handled the coastal trade on a commission basis and provided finance to the owners or supplier of goods. They made investments in goods manufactured by sellers and made huge profits. They also financed continental wars. The sole objective of these merchant bankers was profit maximization by making investments in risky projects.

    Then came the industrial revolution in England. The scope of international trade widened to include North America and other continents. Many people were attracted to take up merchant banking activities to transfer the machine-made goods from European nations to other nations and colonies and bring raw material from other nations and colonies to Europe and to finance such trade.

    During the early nineteenth century, merchants indulged in overseas trade and earned a good reputation. They accepted the bills of the lesser reputed traders by guaranteeing the holder to receive full payment on the due date. This practice of accepting bills has grown over the years with expansion in trade and has become part of merchant banking activity.

    Merchant Banking Functions Origin and Evolution
    Merchant Banking: Functions, Origin, and Evolution! Image credit from #Pixabay.

    Evolution of Merchant Banking:

    Hundi” was the main instrument of credit used by indigenous bankers before the coming of western merchants in India. It was in 1813 when merchants came from European countries to trade with India. Agency houses were set up by merchant bankers based in London.

    These agency houses raised deposits at cheaper rates of interest viz. 4% to 5% from their home and made advances to native merchants at 10% to 12%; and also, they charged high commissions on every kind of service provided to the clients.

    Easy availability of money at the spot from the agency houses had eliminated the role of acceptance house or merchant banking in India. It was only with the entrance of East India Company that restrictions were put on the operation of agency houses.

    During the 19th century,

    Foreign merchant bankers operated in India through “East India House”. East India House members moved into real estate business viz. tea and rubber plantation, cotton mills, etc. They faced tough competition from Persian finance houses who were willing to grant credit to the trade with India.

    It was in 1860 when the merchant’s interest in joint-stock banking started growing and with their investments, they floated joint-stock banks. Some new banks were founded which included Orient Bank in 1845, Chartered Bank of India and Asia in 1853, Chartered Mercantile Bank of India, London & China in 1857, and so on.

    These banks financed trade transactions. The control and management of these banks lied with managing agents. Also, the managing agency system enabled a single firm to look after several firms in complementary industries.

    With the result,

    The banking industry flourished in India with the support of London-based merchant bankers; and, the merchants who had full control of the Board. Telegraphic transfers improved banking links and the business.

    The managing agents acted as merchants banks and performed functions of promoting financing and marketing of securities. They developed strong roots in depth of India’s economic, commercial and industrial structure. Also, they served the industry, trade, and commerce as the merchant bankers were doing in the UK; and, European countries or the investment bankers were doing in the USA.

    Managing agents acquire a large share of investible capital initially; and, later on, dispose of the shares once the company gets established. In other words, Managing Agency Houses acted as an issue house for securities. It founds that 600 industrial establishments did manage under the managing agency system in 1951.

    Few Indian managing agency houses did also established in pre-World War II who started as the family business, later on, converted into partnership and public limited companies.

    Examples of prominent managing agency houses included:
    • Tatas,
    • Birlas,
    • Dalmia’s,
    • Singhanias,
    • Thapar’s,
    • Narang’s etc.

    These managing houses had the necessary skills and expertise which helped in the development of projects.

    Functions performed include:
    • Investing funds like venture capital in promoting the enterprise.
    • Assist the enterprises in procuring finance by guaranteeing bank loans and advances.
    • Raising public deposits.
    • Enter into negotiation with foreign capitalists.

    Thus, they acted as intermediaries of investment by holding the shares of new companies; motivating people to invest, and keeping deposits for investment.

    In Post-World War II, Amendments in the Companies Act, 1956 led to the streamlining of the procedure for capital issues and facilitated the growth of the capital market in India.

    To speed up the pace of economic development, efforts did make to channelize household savings into investment in industry and trade. Significant amendments did make in the Companies Act, Capital Issues (Control) Act, Banking Companies Act to regulate the growth of business enterprises.

    In 1948,

    Industrial Finance Corporation of India (IFCI) did set up to provide long and medium-term finance to industrial enterprises and underwrite new securities. At the state level, State Financial Corporations did also established in 1951 to provide financial assistance to the industry.

    In 1955,

    The Industrial Credit and Investment Corporation of India (ICICI) did set up to provide developmental finance to industrial concerns. Also, ICICI invests in equity by way of direct subscription and also underwrites shares and debentures.

    Many more financial and investment institutions emerged at national and state levels e.g. LIC, RCI (Refinance Corporation for Industry), Industrial Development Bank of India (IDBI), Unit Trust of India (UTI), State Industrial Development Corporation (SIDC), etc. over the years.

    The basic objectives of setting up all these institutions were to boost the industrial sector, improve the capital market; make finance easily available and support the investment climate in the country. These institutions also underwrite the capital issues besides the lending support of broking houses.

    The need for merchant banking services did widely felt. It was during this period that National & Grindlays Bank (now Grindlays Bank) took a lead by taking up merchant banking activities; and announced the inauguration of its “Merchant Banking Division” in January 1969.

  • Why Change to Human Resource Management?

    Why Change to Human Resource Management?

    Learn and Understand, Why Change to Human Resource Management?


    From the late 1970s and early 80s, we witnessed many developments and challenges which disturbed the stability of economic, political, technological and academic environment experienced in the 1960s. The Evolution and Development of HRM are Continue, Next, Why Change to HRM? with PDF, PDF Reader, and Free Download. Also learned, MIS, Why Change to Human Resource Management?

    Loader Loading…
    EAD Logo Taking too long?

    Reload Reload document
    | Open Open in new tab

    Download [217.58 KB]

    These challenges have had enormous impacts on people management in organizations perhaps more than at any time in human history.

    The shift in global macro policy framework:

    The late 1970s and early 80s was an era of neoliberalism in which market forces were a driver of institutional frameworks of nation states and organizations. This was a period when we witnessed strong arguments against direct state involvement in the economy. It is not clear what was the ‘chicken’ or ‘egg’ between politicians and academics or who these people, often referred to as ‘experts’ of the World Bank and the International Monetary Fund are, and what their role in the architecture and birth of neoliberalism and marginalisation of the role of government in economic development is.

    However, whatever the case may be, both politicians and consultants were important in the doctrine of neoliberalism. One of the foremost advocates of neoliberalism was the former conservative British Prime Minister Margaret Thatcher and her counterpart conservative president of the United States of America Ronald Reagan whose philosophies were known by their names, that is, Thatcherism and Reaganism respectively.

    They brutally blamed earlier liberal governments for causing the economic crisis of the 70s through excessive government control of economies and overprotection of employees. The privatization of state-owned organizations, relaxation of legislation in favor of the private sector and the urge for profit maximization became the new agenda and both the desired and required framework for managing organizations and the workforce. Therefore, costs consciousness and the pressure to justify the role of employees in developing and sustaining organizations in the market became a challenge. Failure to respond to these challenges through proper personnel management strategies was seen as a slippery slope towards the collapse of companies that had long historical roots of the successful business.

    Business competition:

    The 1980s and early 90s witnessed an uncertain, chaotic and often turbulent business environment. Increased competition from Japan and other international companies with cheaper but high-quality goods was a challenge to American and European organizations. In reaction to the new competition and as a strategy for coping with the crisis, a substantial number of organizations experienced takeovers, mergers, and business closures. These were also accompanied by heavy losses of work, working on part-time, the need for individuals to become multi-skilled, and the contracting out of some work. Partly as a way of addressing these challenges the role of the personnel specialist had to change from reactive to proactive and from routine to strategic approach to the management of personnel functions so as to be able to match the unpredictable environment.

    Change in customer needs and expectations:

    A change in customer taste, fashion, and quality of goods to reflect their purchase price put more pressure on the organizations to get the best out of their production systems, processes, and employees. This could only be achieved by getting the best people from the labor market, develop, reward, and ensure that they are committed to high-quality service to the organization. In order to achieve these objectives, an enabling environment for employee creativity and innovation became a necessity. This new demand had an impact on recruitment and selection criteria, staff development and reward systems as well as the roles of personnel specialist’s vis-à-vis line managers in personnel management functions. The role of personnel had to change from that of a doer of personnel functions to that of a partner in providing support services to other departments to perform personnel functions. Also learned, Guide to Theories in Human Resource Management!

    Technological change:

    The competition was also intensified by the organizations that could adopt and adapt flexible specialization technologies to meet customer needs and expectations. The implications were that organizations had fewer, but better-trained people, flexible to cope with rapid technological changes. Continuous learning and adaptation based on teams became a natural area of focus on people management. Information technology destroyed knowledge monopoly. The power of knowledge became how best to use it, rather than who owns it.

    Change of philosophy of employee relations:

    The power of employees was through legislated trade unions where thousands of employees under the industrial production system held power. Therefore, the power of individual employees in the employment relationship was vested in a collective solidarity. Mass redundancies, less protective role of the state, as well as the declining role of trade unions, made life more individualistic than collective. The change of employee relations from collectivism to individualism was an automatic consequence of the above changes. Employment relations became more based on arrangements and agreements between the employee and employer as opposed to the use of trade unions and labor legislation.

    Developments in the academia:

    Building on the knowledge accumulated in previous decades and research that was being conducted particularly in the 1980s and early 1990s, it appeared that organizational strategy and strategic approach to managing employees was the best option for responding to challenges facing organizations (Hendry 1995). The Human Resource Management School, advanced by academics from America and Europe, which spearheaded the concept of ‘strategic approach’ to managing people, became the center of debates and development of human resource management as a philosophy distinct from personnel management. The Excellence School propounded by Peters & Waterman and their followers on the role of strong organizational cultures and commitment to excellence also have had a remarkable influence on the development of human resource management (Storey 1989). Some areas of corporate management including the size, structure, strategy, culture, product, and organizational life cycle were now included in human resource management (Schuler 2000).

    The major issue was how personnel management functions could make an impact on the functional level, as part of supporting other departments, as well as being part of business strategy. Personnel managers had to become partners in the business. As part of improving employees’ utilization, a more rigorous method of assessing the performance of employees in relation to rewards was also developed. The introduction of performance management systems and reward systems based on performance was an indication of changes in personnel management practices.

    Within these changes, personnel management was redefined and the concept of ‘human resource ‘vis-à-vis ‘personnel’ was adopted, although the debate concerning the differences continues (Storey 1989). However, as may appear in the literature, the difference between ‘human resource’ and ‘personnel’ may be clear or unclear (Armstrong 1995). This difference depends on the taste, or on the taste and fashion rather than on what managers do, this is notwithstanding the fact that most academics and managers in organizations use the term human resource management as opposed to personnel management when referring to people management even without making the conscious effort to distinguish between the two.

    Perhaps the most popular definitions of human resource management are those suggested by Storey and Armstrong because such definitions are based on thorough reviews of earlier works from both American and European human resource management debates. Storey looks at human resource management as:

    … A distinctive approach to employment management which seeks to achieve competitive advantage through the strategic deployment of a highly committed and capable workforce using an integrated array of cultural, structural and personnel techniques.

    It is worth noting here that the focus of human resource management is on employee management techniques that are directed towards gaining competitive advantage depending on the adopted business or organizational strategy. Armstrong also appreciates the role of strategies but goes further by emphasizing the need for robust personnel systems, which will take care of employees (individuals and teams), as valuable assets where investment is crucial. Thus, he defines human resource management:

    … As a strategic and coherent approach to the management of organizations’ most valued assets – the people working there who individually and collectively contribute to the achievement of business objectives.  

    By looking at the various debates in academia and good practices in personnel and human resource management, human resource management may be further defined as a strategic approach and management practice of managing employees so that there is the sustainable achievement of an organizational mission, goals, and objectives. These definitions are conclusively derived from the American and European schools of thought.

    The evolution and development of human resource management have relied on two traditions. These are the American, alias Harvard and European under the leadership of British academics, particularly from the University of Lancaster.

    Why Change to Human Resource Management - ilearnlot


  • The Evolution and Development of Human Resource Management!

    The Evolution and Development of Human Resource Management!

    Learn and Study, The Evolution and Development of Human Resource Management!


    Human resource management as a practice happens wherever there is more than one person. The Evolution and Development of HRM with PDF, PDF Reader, and Free Download. It starts at the family level where family members take different roles and responsibilities for the accomplishment of family objectives. The head of the household would harness all available resources including people to find the best in them in order to achieve whatever may be needed or desired. Indeed, the division of labor depends on the philosophies, values, and expectations of family members and which are rooted in the wider society, be it a clan, a tribe or religion. Also learned, Guide to Theories in HRM! The Evolution and Development of Human Resource Management!

    Loader Loading…
    EAD Logo Taking too long?

    Reload Reload document
    | Open Open in new tab

    Download [217.58 KB]

    Managing people in an organizational setting is well documented throughout the history of mankind. Organisational structures evolved, leadership emerged or was formed, roles and responsibilities were assigned to people, accountability systems were laid down, and rewards and punishments were also provided. In this regard, the division of labor, specialization, and accountability were systematically organized to achieve a specific purpose.

    However, the documentation of the evolution and development of human resource management practices can be traced back to the booming European economy of the 1900s. This economy created the necessary environment for more serious thought on the role of effective people management in the emerging labor market of the time. The economies were preparing for the First World War and its aftermath where industrial production required a mass of skilled, well organized and disciplined labor force. The challenges revolved around mobilization of resources including people, which led to the evolution and development of four stages in managing labor. The stages were mainly identified by looking at the changing titles of officers responsible for managing the workforce and different roles that were emerging over time.

    Therefore, although personnel management literature often states particular dates or decades of transformation from one phase to another, as a matter of principle, such dates or decades are more for convenience and reference purposes than being actual historical events. The same recognition is used to provide a picture of the chronology of the evolution and development of human resource management as we see it today. Figure 1 displays the stages in the evolution of human resource management.

    Welfare stage in industrial age:

    Historically, the 1900s was a time of increasing technological and economic breakthroughs arising from continued advancement in general and scientific knowledge through creativity and innovations. Indeed, the advancements had the serious impact on economic growth and demand for goods and services in Europe and in Germany in particular for the preparations of World War I. More goods were demanded, and the massive production of goods could be done more efficiently than ever before, under one industrial roof. This was a common phenomenon across.

    Figure 1 Stages in the evolution and development of human resource management.

    Western Europe particularly in Britain, France, Spain, and Italy. For the Germans who were secretly preparing for war, the production of war materials created a chain of industrial networks with forwarding and backward linkages. Managing the increasing workforce in the emerging complex industrial production systems was an ever-more difficult challenge. The search for solutions, which included how to organize employees and ensure that their welfare was provided for, led to the need for better people management techniques that were not necessarily important only a few years before.

    Welfare services such as a canteen and other needs required some kind of officer whose sole purpose was to take care of workers. This is the genesis of employees’ welfare services in organizations and the famous title of welfare officers we have in some organizations even today.

    Change of focus from welfare to personnel administration:

    The 1920s and mid-30s are generally regarded as decades of personnel administration. The growing size of organizations and pressure to improve productivity called for the need to recruit, select, train, keep records, appraise, motivate, control, and improve production of job entry level of employees and those in the job as part of job orientation. These administrative tasks were best handled by welfare officers because of their experiences in welfare matters. However, since the roles of welfare officers changed in nature and scope and became more demanding in terms of knowledge, skills and behavioral attributes, the whole situation suggested that the title of welfare officer was not good enough to describe what was actually happening. To address these new dimensions of a welfare job, the title had to change from welfare officer to personnel administrator.

    Evolution and development of personnel management:

    This covers the period during and after World War II. In the 1940s and 50s, there was an ever-growing role for personnel administration to cope with the rising challenges and demands of the job which included craft, supervisory training and labor disputes that were threatening employees and organizational efficiency. These new dimensions in employee management were exacerbated by developments in academia, professional managers interested in academics and consultants where efforts were devoted to study behavioral factors in job performance.

    Such developments include human relations’ school, which was pioneered by Elton Mayo and Kurt Lewin, who emphasized on improving the work environment and work groups as a strategy to improve productivity. Treating employees as human beings rather than working tools was a new doctrine that was revealing other aspects of people management in other phases of personnel management. This period marked a shift in emphasis from managing an individual employee to managing groups/teams in the organization.

    Other contributions were from the work of Abraham Maslow on the human hierarchy of needs and the power of employee’s motivation on productivity. Later, Chris Argyris and Frederick Herzberg wrote about the concept of employee’s satisfaction and the significant impact this concept has had on the organizational practices in improving the quality of work in organizations. The organization development school driven by Bennis & Schein provided equally useful inputs to personnel practices particularly in areas of effective communication and the need to reduce conflict in the workplace.

    Therefore, to suit the fashion of the time, there appeared to be a difference between ‘administration’ and ‘management’. Likewise, there is a difference between ‘administrator’ and ‘manager‘, where the former appears to be dealing more with routine activities, the latter deals with more strategic issues. There is, however, an on-going debate in academia on the semantics and the actual substance of personnel jobs.

    During the 1950s and 60s personnel management as a professional discipline matured as characterized by most personnel management theories, practices, and processes we know today. In addition to the services provided in the earlier phases, other areas covered in the functions of personnel management, particularly in the 1960s, were organizational development, management development, systematic training and manpower planning. Better processes and techniques of employee selection, training, wages and salary administration and performance appraisal were introduced. The other area was industrial relations in which personnel managers became experts in labor law and represented their organizations in industrial relations disputes.

    Therefore, personnel management as a type of management in organizations has evolved into a distinctive discipline. Perhaps one of the most widely accepted descriptions of the meaning of personnel management is the one given by Michael Armstrong in 1995. This definition is not very different from the ones found in revised editions and other textbooks on human resource management throughout the 2000s. Armstrong (1995) defines personnel management as ‘the process and practice of getting people in an organization, assessing and rewarding for performance, and developing their full potential for the achievement of organizational objectives’.

    By looking at personnel management in this perspective, as may also be noted from other work by the same author, and many other experts including Dessler (2005) and Bhatia (2007) there are many functions that ought to be performed in a designated functional department (personnel department). However, as shall be observed later, these functions are not by themselves necessarily different from those under a human resource management conceptual framework.

    The personnel functions are summarised and explained below as follows.

    • Establishment of the organizational structure:

    This involves establishing the organizational structure in a way that will enable the realization of the intended mission, vision, goals, objectives, strategies, and tasks. It is like an African saying that ‘you scratch your back where your hand can reach’. No single organizational structure can suit all organizations because the suitability of an organizational structure will depend on where the organization is, and what its future prospects are. If the mission of the organization involves rapid growth and expansion, a tall bureaucratic structure may not be desirable because such a structure slows the decision-making process, which in turn, stifles flexibility, creativity, and innovation. A personnel officer who is fundamentally responsible for effective manning levels in the organization has the mandate to become part of the organizational structure design team.

    • Human resourcing:

    Resourcing is a concept that has emerged with the use of the term ‘human resource planning’ as we shall see later. It involves a process of enabling the organization to have the right people, doing the right jobs at the right time. This is in line with the challenges facing managers in staffing organizations. It is about planning for the number and quality of employees required under different job categories and to make sure that staffing process such as recruitment, selection, placement, promotions, transfers, and downsizing are effective.

    • Managing performance appraisal:

    The personnel department has to initiate the system, process, techniques and tools for individuals, teams and organizational performance measurement. It has to ensure that performance targets for individuals, teams, sections, and departments are set and agreed upon and measures to address performance gaps are in place and are working. This is not an easy task because it requires a value judgment about employees. Indeed, there are no other areas of personnel management that make personnel officers more uncomfortable and unpopular than the appraisal function. This is because whatever process or tool is used to appraise staff and reward them accordingly, there is always tacit or explicit dissatisfaction from staff based on the feelings that such decisions were biased. Progress has been made towards improving staff appraisal systems, which will be covered later under performance management.

    • Personnel training and development:

    Since the performance of the organization depends on the competence of the workforce, training and development are important, not only for the present job but also for the future job and organization. The head of the personnel department has to design tools for assessing the need for training that will be used to identify training and development gaps and develop effective strategies and programmes for training and developing staff. In most large organizations and more so in government ministries, there are departments and officers responsible for ensuring that personnel training and development functions are carried out effectively.

    • Compensation/Rewards management:

    The words ‘compensation’ and ‘reward’ are often used interchangeably in contemporary personnel management. Although in principle, the two concepts may mean the same thing, they have different philosophical roots. Whereas the former is based on the interpretation that work is not necessarily a good thing and hence those who work lose something which should be compensated, the later considers work positive and something which has to be rewarded depending on the quantity and quality of accomplishment. Therefore, employees need different types of compensations or rewards for the effort they expend on the job and enable the organization function. It is the duty of the human resource department through the responsible officers to evaluate different types and levels of jobs in order to develop appropriate compensations or rewards in terms of pay and other incentive packages.

    • Personnel relations:

    Relationships between an employer and employee and among employees in the workplace need to be nurtured to avoid conflicts and disputes which will ultimately lead to unproductive behavior. The personnel department is well placed for this job as it has staff trained in people management particularly in industrial legislation, labor laws, and conflict management. Some industrial organizations employ lawyers as industrial relations officers, but qualified personnel officers should be able to perform this role. However, other experts such as lawyers and professional counselors may be consulted where necessary.

    • Other routine personnel administration functions:

    There is a myriad of other personnel functions, which are basically routine work and constitute day-to-day administrative activities performed by personnel officers depending on the size and scope of the organization. These functions include but not limited to, health, transport, security and safety, pensions, deaths, and personal information system.

    The Evolution and Development of Human Resource Management - ilearnlot


  • Explain are Evolution, Elements of an Organizational Climate!

    Explain are Evolution, Elements of an Organizational Climate!

    First, learn Evolution, after Elements of an Organizational Climate: Classical organization theory dominated management thinking during the first half of the twentieth century. Its organization can trace back to the ideas of Adam Smith who is the wealth of nations showed, as early as 1776, how the division of labor could improve the productivity of pin markers a hundredfold or more. However, it was only in the early 1900s that men like Fredrick, W. Taylor, Henry Fayol and Max Weber developed the full philosophy of the classical theory.

    Learn and Understanding, Evolution, Elements of an Organizational Climate!

    The classical approach to organization design was based on;

    (a) The full decision of labor, (b) Rigid hierarchy, and (c) Standardization of labor to reach its objectives. The idea was to lower costs by using unskilled repetitive labor that could train easily to do a small part of a job.

    The said approach did result in a substantial increase in economic productivity. As it turned out, however, these gains often involved considerable human cost. Because of an excessive division of labor and over-dependence on rules, procedure, and hierarchy, the workers became isolated from his fellow workers and felt alienated. The result was higher turnover, absenteeism, and decline in the quality of products.

    It took the academicians and practitioners of management some time to recognize the nature and severity of the problem. Roethlisberger and Dickson offered a behavioral interpretation of management based on their findings from the famous Hawthorne studies. They stressed the importance of individual differences, informal group interactions, and participation in decision – making.

    The sum total of these and many other such activities creates an internal an environment within each organization, which accounts for its uniqueness and identify members of an organization who work within and continuously influenced by this the internal environment which is also called organizational culture or organizational climate. Each organization deals with its members in a variety of ways in the course of their employment to obtain their co-operation in achieving organizational objectives.

    The management of an organization must satisfy various needs of the employees, through activities such as allocation of resources, rewards and punishment, the pattern of communication, mode of decision making, style of leadership, and so on. An organization influences the feelings, attitudes, and behaviors of its members.

    The Following Elements of an Organizational Climate are!

    The organizational climate is the general set of attitudes that the members of an organization, especially its management, have. These attitudes can affect decision-making and member satisfaction with the organization. Organizational climate concepts apply to businesses, nonprofit organizations, clubs and any other situation where groups of people gather for a common purpose.

    Diversity

    Each organizational climate has its own attitude towards diversity, either positive, negative or somewhere between. Ideally, all organizational climates should have a positive attitude toward diversity. Organizations should not discriminate against people based on race, religion or gender.

    Centralized or Decentralized

    Organizational climates are either centralize and hierarchical or decentralize, Centralize organizations give certain individuals power over others. Decentralize organizational cultures have authority spread out among different members.

    As workers become more specialized, they need more autonomy and self-regulation. Since authority figures will not always have the knowledge necessary to manage more sophisticated tasks. However, workers have more responsibilities placed on them in decentralized organizations than in centralized organizations, since they mainly decide which actions they will take, not the superiors.

    Formal or Informal

    The climate can have a more formal or informal structure. Formalized structures have standardized rules about how workers carry out activities in the organization, While less formalized structures give members the freedom to engage in alternative solutions to problems, with members having more freedom.

    Social Interaction

    The level of social interaction in organizational climate influences. How innovative and cooperative the climate is, according to Chung-Jen Chen and Jing-Wen Huang in the International Journal of Information Management. Some organizational climates are more teamwork-oriented, While other organizational climates have isolated members operating on their own. Teamwork-oriented climates are more supportive.

    Integration

    Integration is the extent of where the subdivisions of the organization work together. Organizations that are highly integrated have more opportunities for the members to work together. Share information, learn from each other, solve problems and identify potential problems that other members miss.

    Self-Direction

    Organizations vary in the extent to which the members feel like they have control over themselves and the organization. Some organizational climates have a high degree of stress, which increases the chances that members will experience burnout and increases the rate at which members leave due to low satisfaction with the organization. Workers experience burnout when they feel exhausted both emotionally and with their work.

    Explain are Evolution Elements of an Organizational Climate - ilearnlot
    Explain are Evolution, Elements of an Organizational Climate!

    Reference

    1. Evolution of OC,
    2. Following Elements of OC, and
    3. Photo Credit URL.