Friday, December 27, 2019

Cross Cultural Management Group - Free Essay Example

Sample details Pages: 3 Words: 901 Downloads: 4 Date added: 2017/09/20 Category Management Essay Type Argumentative essay Tags: Advantages And Disadvantages Essay Study Essay Did you like this example? Cross Cultural Management Group Case Study Introduction This report will evaluate the situation that occurred between the telecom companies Telia (Sweden) and Telenor (Norway). The two countries had plans to merge to gain a competitive advantage in their region of North Europe and also to begin competing on an international level. The benefits of this merger at first look, outweigh any apparent problems or disadvantages, however as we will learn Culture plays a big role in our lives and that doesn’t by any means exclude the business world. Analysis Both these countries share many basic similarities in Culture as it has been traditionally defined. Their languages are similar they have the same preferences in risk avoidance, power distance, individualism and many other factors. Both countries are considered to have very feminine characteristics, which in previous theory would lead one to assume that Negotiations would be easier than if it were two masculine cultures o r a mix of the two. We must now realize how important historical events when it comes to the forming of a culture, especially when it relates to bias and resentment held against another country. The not so distant history of the two countries and the ways they interacted in the past (big brother – little brother), were only mirrored throughout the whole negotiation process, whether intentional or unintentional. This is in our opinion the main cause for the falling out between the two companies. The fact that government factors were involved would have also intensified these feelings as both parties had to take into consideration the national position in this dealing. It is safe for us to state that Culture, and how cultures interact, can not only be look at by breaking down their preferences and tolerances. History and situations which have occurred between certain countries must also be considered strongly (more so when history between the two is recent). Let us take a n example of the USA and Russia, they have had many conflicting ideas throughout history and are very different in the traditional context of culture, and their differences are only negatively affected by Wars fought (The Cold War). Sweden Throughout the history of the Nordic and Baltic region Sweden has been the super power, although they somewhat had good intentions with Norway when they acquired the territory from Denmark. They tried to be as autonomous with the Norwegians and allow them freedom. Basically they wanted to act as their overseers (Big Brother). This had a negative effect on the people of Norway, this is understandable, why would they have to feel like they need to be taken care of, or guided. In order for them to feel fully fulfilled as a people they need to be free of any ties regardless of how much freedom their â€Å"owners† are with them. Norway So Norway was somewhat resentful towards the Swedes and their desire to control them, this in turn has gi ven them a strong sense of Nationalism as Rosengren so insensitively joked (fair enough he didn’t know he was on camera). For the Norwegians it is clear that they are proud that now they are their own people and any return to a situation of being controlled in any framework, especially by the Swedes would have to be ill received. The Negotiation The Negotiation Started well, as it was clear it was a win- win situation, and the CEOs of both companies were friends and had a good idea of what and why they wanted to do what they did. This negotiation had been initiated originally and later declined it took secret meeting to get it back on track. This in future could have caused a lot of mistrust between parties especially since the two original secret negotiators were not present throughout the whole process. There are a few instances that we can look at that would relate directly to the history and cultural â€Å"mistrust† that is apparent between these two countries. The sizes of the companies The ration in size of the companies share was to be 60/40 for Telia and Telenor respectively this mirrors the advantage of power that the Swedish held in the past The Headquarters The head quarters situation was clearly a childish affair and just a last grasp of glory much like a little brother fighting over a toy with his older sibling. As mentioned in the case this is a very easy situation to find a solution to when thinking in a reasonable state and there are not so many EMOTIONAL and FEMININE factors at stake. The Publicity Slip by Rosengren In a time when the dealings were already falling apart, this member of the Swedish â€Å"contingency†, made the comment that would have just confirmed what all the Norway’s assumed about their counterparts, that would have been the final draw I am sure. There are many other details which caused this snowball effect Conclusion In conclusion the Overbearing nature of Sweden when it comes to Norway , in addition to the resentment that Norway feels toward Sweden for their past colonial state, is the reason for this merger falling apart. Both parties meant well and were looking for advantages, but the Swedes weren’t sensitive enough to the Norwegians feelings and maybe the Norwegians were overly sensitive, that is a subject for debate. However this case shows us the impact that history can have when talking about cultural issues. Don’t waste time! Our writers will create an original "Cross Cultural Management Group" essay for you Create order

Wednesday, December 18, 2019

Conducting a Salary Survey Assignment Example

Essays on Conducting a Salary Survey Assignment The paper "Conducting a Salary Survey" is a great example of an assignment on finance and accounting. Conducting a salary survey provides an avenue for the collection of data essential in planning, understanding the actual remuneration that one deserves on specific jobs in specific industries and easing employers in rating their workforce. The survey allows members to have comparisons of the different compensation packages through which the value of education becomes assessed and ascertained. The survey covered other regions too involving China, and other Middle East countries to provide for a comparative analysis of the packages within and outside the US. Other countries too were considered in the survey with over 81 across the world providing their response with different countries showing different response levels. The response rate covered a higher number of female respondents in Asia while the other regions balanced well in relation to gender. These provide for inclusivity in th e study that provides a more widely considered level of analysis after the collection of data. The majority of the respondents held baccalaureate degrees with over 98% with those in the European countries found to have more advanced degrees with Certified Management Accountant designations (2014 Global Salary Survey, p.4).   Conducting these surveys proves essential in the provision of data on salaries in different fields. These have provided for a better understanding of the fields of study that students engage in when pursuing careers and choices of the places to work. The salary surveys have allowed for fairness in the fields of work. Such surveys provide information banks for various research surveys and for employers to understand the value of the skills they hire. The employees have information for deciding where to work and the remunerations to expect in their work life.

Tuesday, December 10, 2019

Security Issues Faced By the Business-Free-Samples for Students

Question: Discuss about the Challenges in Cyber Security for Business. Answer: Introduction Cyber security has become an important issue for business worldwide with financial as well as reputational cost of the data braches that create a critical headache for management of a business organization. On the other hand, while technology is assisting the business organizations in order to optimize operations through several innovative procedures, the number of cyber security threats increases. The present study explores the objective of doing the project and scope of the project in present and future circumstances. In addition, literatures from several books, journals, articles and websites are reviewed in the study that helps to get an appropriate conclusion from the study. Project objective Objectives of the project can be listed as followed. To identify different types of cyber security in business To critically analyze how cyber threats impact on business To scrutinize the challenges faced by the organizations to tackle cyber security To recommend solutions for overcoming the challenges Project scope As cyber security becomes one of the major focal points about security risks faced by the business organizations in twenty-first century, the project would be helpful to find out the factors responsible for cyber security issues in the business organization. It also helps the organization to take necessary measures to minimize the cyber security issues in the business. On the other hand, researching on the same topic can get effective information regarding the topic. Moreover, the staffs of the business organization can be aware regarding the issues and familiar with the use as well as cyber security laws published by the government and agencies to be safe and secured on internet. Literature review The Global Risks 2015 report published by World Economic Forum (WEF) stated that there are 90% of enterprises worldwide recognize that they are not adequately prepared for protecting themselves against cyber attacks (Van den Berg et al. 2014). There is 50% small business respondents stated that they had data breaches that focused client and employee information. Being customer, it is required to consider the measure of information that is sharing with the organizations. In online purchase, the business is probably going to have a record of your email address, the place of residence; telephone number and possibly payment information can be leaked. Liu and Wong (2017) stated that cybercrime harms are expected to cost the world $6 trillion by 2021, while organizations and government foundations are scrambling to ensure themselves. By 2019, IT specialists predict a cyber security aptitudes deficiency of almost 1.5 million open occupations. Perceiving the requirement for gifted experts in the field, North central University propelled the Master of Science in Technology and Innovation Management program, had practical experience in Cyber security (Elmaghraby and Losavio 2014). With the cyber security field developing, there will be a requirement for people prepared to oversee dangers, alongside fundamental initiative aptitudes expected to oversee groups of capable cyber security experts. Take in more about the Cyber security degree programs at NCU. Tisdale (2015) stated that there are several types of attack faced by the organization in business such as ransomware, distributed denial of service (DDoS) attacks, hacktivism, insider threats, fake ads and feedback. Ransomware: It typically prevents the users from accessing vital information on the machines or networks until giving payment. On the other hand, cyber criminals do not free up the devices after meeting ransom (Reddy and Reddy 2014). In addition, they try to extort more money out of victims. Denial of service attacks (DDoS): The particular attacks are crippled through several big names over the few years. Denial of service attack is not scaled up to a terabit per second in some of the instances. The volume as well as scale of the breaches can challenge to defence the organizations. Hacktivism: The attacks are dangering compared to the traditional threats for trying to make a statement by hacktivists overrising safety mechanisms. The Internet of Things (IoT): McAfee gauges there will be roughly 1.8 billion associated gadgets in purchaser hands by 2019. Hacking into such systemns will turn out to be more typical over the coming years, with ransomware and hacktivism thought to be key issue zones. There is additionally a noteworthy privacy threat, as smart gadgets regularly contain a lot of confidential data that cyber criminals could get to (Gunes et al. 2014). As per McAfee, a few items sold for the current year may have backdoors that are installed through leveraging by criminals. Dronejacking: The enterprises as well as customers are utilizing drones in new as well as existing methods. The cyber criminals take benefits of increasing popularity through hacking into the technology (Sendelj et al. 2014). A report by McAfee experts explored that it is very easy to take over toy drone and landing it on the roof of the business organization and hack local wireless networks. Insider threats: Rawat and Bajracharya (2015) commented that organizations don't simply confront external threats; there is a critical shot of digital security issues emerging inside. The IBM 2016 Cyber Security Intelligence Index found that 60% of data breaches in the former year were because of insider threats. Of these, more than 66% were individuals with malicious threat, while the rest of the occurrences were because of inadvertent actors (Sajid et al. 2016). The last alludes to honest people who unintentionally permitted assailants access to data, or who neglected to take after safety efforts. Machine learning: Machine learning algorithms are assisting business organizations to perform complicated information examination undertakings on gigantic amounts of information at exceptional paces with insignificant manual information. Mendel (2017) mentioned that the technology is utilized to identify misrepresentation, predict the achievement of marketing efforts and automate customer products item recommendations, and additionally various other innovative applications. On the other hand, McAfee predicts machine learning will be utilized to carry out violations, for example, supporting fraudsters in distinguishing high-esteem focuses among huge datasets. Mobile malware: As a developing number of individuals utilize cell phones to perform regular business assignments, the probability that cyber criminals will endeavour to abuse shortcomings in the innovation rises. Kaspersky Lab as of late uncovered that versatile malware assaults tripled in the vicinity of 2015 and 2016, with the firm recognizing 8.5 million malicious installations (Baylon 2014). The enterprise likewise found that cases of both mobile banking Trojans and portable ransomware expanded by a rate of 1.6 times over a year term. The significance of system security as well as network security initial endeavor is something most organizations know about. However, what is regularly expelled is the way that keeping up a digital security framework is a progressing obligation. The resistance systems or frameworks and practices are constantly advancing as dangers seem to be. The business organization needs progresses toward becoming in danger once a state of complacency settled on. Depending on obsolete cyber security infrastructure cyber security issues of the organization relied. Organizations of all sizes need to take measures to secure their data from cyber criminals. There are approaches to secure private data from cyber threats listed below. Introduce a firewall: Similarly as a genuine firewall secures an organization from spreading security threats. In addition, a PC firewall blocks undesirable data and individuals from entering a business' PC framework from the Internet. Once the firewall is set up and working never turns it off of any PC in the business. Set up an Access Control List. This will enable your business' system administrator to control which representative approach the PC framework or certain parts of the PC framework and whether they can sign in remotely or just from the workplace. Change the default passwords: A report says that particularly are organizations neglecting to change the POS password word credentials from the maker's default setting to a custom watchword for the organization. The report additionally prescribes ensuring that all third part vendors need tp change passwords also. Build up security polices and obligations. Recognize which representatives need access to the business data and set up obligations regarding those workers. The Federal Communications Commission prescribes setting a timeframe a worker must be in the part before get to rights are conceded. Build up security roles and responsibility: If the business needs to restrict the utilization of the Internet and web-based social networking to break time, it is required to ensure the representatives know the arrangement. Utilize a Web-filtering system: These programs can block malicious software and in addition from attacking the system as well as compromising data. Utilize Internet security programs on every PC: The programs work notwithstanding the firewall to help blocking malicious software from attacking the PC and compromising data. Be careful about peer-to-peer sites: In the event that your organization utilizes distributed sharing, it is required to be mindful of the security of such organizations and realize what the companion site's securities are. Get cybercrime insurance: This sort of arrangement covers the obligation of the organization on account of a cyber attack or an information break (Jajodia et al. 2015). A few polices can cover legal liability, direct loss as well as consequential loss in order to determine exposure risks for attacking of the organization. In order to minimize the issues, threat intelligence software can be used. It utilizes complex intends to assemble and comprehend online traffic suspicion of an attack. These programs start by classifying data about the identities, inspirations, qualities, and techniques for attackers. This information is set in setting against ongoing action to distinguish obtrusive conduct with evidence based learning. Customisation is likewise conceivable, fitting instruments to suit the system, as danger cautions ought to be instructive, not quite recently disturbing. Enhancing digital security abilities Reddy (2015) stated that over what is said above, up to half of undertakings have experienced the issue of obsolete cyber security instruction. Old data about programmer strategies are as futile as obsolete infection definitions. Instructional courses, introductions, and gatherings are a misuse of exertion on the off chance that they are being keep running on old and incorrect data, and missing key themes. Shockingly, just 46% of employers offer more training than a one-time refresher course. This is not sufficient to be familiar with. Representatives require nonstop progressing instruction. Over re-establishing energy, going to gatherings it is required to enable security policies to drench themselves. Organizations can without much of a stretch get a more profound comprehension of new dangers and approaches to battle them by taking an interest in workshops, white-papers and online classes. Reliable mindfulness is increased through after cyber security sites and perusing exchange distributions. Furthermore, it is needed to exploit any security merchant accomplices, figuring out the most out of the instruments and demand however much ability from them as could reasonably be expected. Developing a case for beginning a training system ought not to be a hard offer since a lot is on the line enough. There is a lot of confirmation that proposes that counteracting numbness based vulnerabilities is an insightful hazard administration technique. In the event that client training is not regarded critical, consider how costly settling a hack is, and also how it could forever remove your business from the diversion (Kuypers et al. 2016). Like keeping up a house the cyber security system is a progressing obligation and it is best to be proactive about keeping everything in great working request. On the off chance that there is a probability of powerlessness or a risk performer, address worries before they progress toward becoming emergencies (Razzaq et al. 2013). It is fundamental that to comprehend the security stance of the enterprise. Security needs to wind up noticeably a key differentiator for your business. It can be the refinement amongst winning and losing an aggress ive contract for administrations, or constraining brand harm from an information rupture. Conclusion From above discussion, it can be stated that it is important for an organization to develop security policies for securing the organization from cyber threats. On the other hand, enabling technology like firewall, anti-virus software cab be helpful to minimize the security issues faced by the business organizations. In addition, it is crucial to be aware on using system, network and confidential information of the company that can allow the organization to be hampered by cyber security criminals. Training program to the staffs of the organization can be helpful to achieve this and secure the business organization from cyber security issues References Baylon, C., 2014. Challenges at the Intersection of Cyber Security and Space Security.International Security. Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), pp.491-497. Gunes, V., Peter, S., Givargis, T. and Vahid, F., 2014. A survey on concepts, applications, and challenges in cyber-physical systems.TIIS,8(12), pp.4242-4268. Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. and Wang, C. eds., 2015.Cyber Warfare: Building the Scientific Foundation(Vol. 56). Springer. Karim, M.E. and Phoha, V.V., 2014. Cyber-physical systems security. InApplied Cyber-Physical Systems(pp. 75-83). Springer, New York, NY. Kuypers, M.A., Maillart, T. and Pat-Cornell, E., 2016. An Empirical Analysis of Cyber Security Incidents at a Large Organization.Department of Management Science and Engineering, Stanford University, School of Information, UC Berkeley, https://fsi. stanford. edu/sites/default/files/kuypersweis_v7. pdf, accessed July,30. Liu, F. and Wong, M., 2017. Challenges of Cyber Security and a Fundamental Way to Address Cyber Security.Cybersecurity and Privacy-Bridging the Gap, p.189. Mendel, J., 2017. Smart Grid Cyber Security Challenges: Overview and Classification.e-mentor, (1 (68)), pp.55-66. Rawat, D.B. and Bajracharya, C., 2015, April. Cyber security for smart grid systems: Status, challenges and perspectives. InSoutheastCon 2015(pp. 1-6). IEEE. Razzaq, A., Hur, A., Ahmad, H.F. and Masood, M., 2013, March. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. InAutonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on(pp. 1-6). IEEE. Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging trends on latest technologies.arXiv preprint arXiv:1402.1842. Reddy, Y.B., 2015, April. Security and design challenges in cyber-physical systems. InInformation Technology-New Generations (ITNG), 2015 12th International Conference on(pp. 200-205). IEEE. Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges.IEEE Access,4, pp.1375-1384. endelj, R., Lombardi, F., Ognjanovi?, I. and Guarino, S., 2014. Cyber Security in Montenegro: Practice, Framework and Challenges. Tisdale, S.M., 2015. CYBERSECURITY: CHALLENGES FROM A SYSTEMS, COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE PERSPECTIVE.Issues in Information Systems,16(3). Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L., Van der Lubbe, J., Van den Berg, B. and De Bos, T., 2014. On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. InProceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium(pp. 13-14

Tuesday, December 3, 2019

The Idea of Narcissism in Media

Narcissism in the White House The idea of narcissism is widely spread nowadays: people are eager to survive under the conditions they create, and even the most powerful people are under a threat of being influenced by a number of narcissistic tendencies. There are many examples narcissism in media, and it is hard to define what case is more interesting and more educative. Still, if the necessity to define and to understand narcissism is urgent, it is more captivating to pay more attention to the case inherent to the political sphere of life.Advertising We will write a custom essay sample on The Idea of Narcissism in Media specifically for you for only $16.05 $11/page Learn More In New York Times, there is a section where Ross Douthat finds it rather interesting and even provocative to comment the situations which take place in the White House and challenge various politics. In one of his comments, he focuses on self-pity that is now widely spread in the White House and may be regarded as a powerful example of narcissism inherent to politicians. What do people call narcissism? It is a kind of trait that is intrinsic to many people. It is selfishness that may help to achieve the cherished purpose or, vice versa, to destroy a person from the inside. It is hard to define the main characteristics of narcissism, specially for those people, who suffer from it. In the article under consideration, there is no certain attention to the idea of narcissism, still, there are so many hints so that the reader is able to make conclusions independently. The representatives of the White House demonstrate how they can regret about something or even how they are unsure of personal decisions and forecasted outcomes. This story identifies several politicians, still, it is not obligatory to focus on the names. Politicians are great in numbers, and the feeling of narcissism that is inherent to the vast majority of them is great and influential indeed. Seve ral narcissistic tendencies defined prove that the political sphere is not perfect, and, as it is inherent to narcissism, these tendencies are hard to define, still, they exist and influence human lives. Such feelings like pity should not be connected with the politicians because they have a number of purposes to be achieved so that the living conditions, relations between people, and future may be improved. As Narcissus, the character from the picture, is so deeply involved into looking at himself, as well as the activities of the politicians are of wrong direction. They find it more captivating and urgent to evaluate personal traits and discontents instead of taking care of the country.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More A narcissistic person also has a tendency to think only of him or herself in any given situation. This makes it very difficult to form and maintain healthy relations hips. And this is the main message of the article as well as the theme of narcissism – there are many elements of narcissisms in the world, and the vast majority of people are too weak to identify each element properly and get a chance to improve the conditions they have to live and work under. This essay on The Idea of Narcissism in Media was written and submitted by user Ulises F. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.