Tuesday, October 29, 2019

Library Research Paper Example | Topics and Well Written Essays - 1500 words

Library - Research Paper Example The findings of the study conducted by the authors were used in the development of a software application, ‘EcoSiteManager’, to assist in the management of logistics for large factories (Zoran M., Christian T, Andreas M, and Uwe C, 1920). The last few years have seen a sharp increase in the volumes of shipments across the world. This has led to most of the large companies stretching to their limits in terms of their capabilities to handle the large amounts of cargo (Zoran M., Christian T, Andreas M, and Uwe C, 1800). This has in turn led to development of bottlenecks in the various transport chains across major ports. In as much as this negatively affects the transport sector and stalls business operations, it creates an opportunity for more enabling more efficiency in the transport sector. This presents a great potential for increasing efficiency in the area of transport and logistics in at various terminals, production sites and distribution centers thereby ensuring th e economy continues to grow (Zoran M., Christian T, Andreas M, and Uwe C, 2050). ... I have learnt a lot of useful information on how to improve efficiency the transport network to reduce production costs and ease congestion at various transport terminals. One most of the most fascinating fact that I have gathered from the article is the idea that technology can be used to improve the efficiency of the transport network. The EcoSitemanagement system for instance can be used to manage movement of products across a transport channel. This is very fascinating given the impact that technological developments are having on the business sector and the economy at large. This information in the article can be used in the development of other software applications to manage other areas in the transport networks such as distribution of goods. Title: Lean manufacturing practices: Problems and Prospects Author: Rajesh K. M. Mehta, D. and Naveen K. M. Date: 2012 Topic: Logistics In this article, the authors examine how manufactures can improve the efficiency of their production t hrough lean production practices. Lean production refers to the generation of additional value for consumers by doing away with activities and processes that lead to wastage of time and resources (Rajesh, Mehta and Naveen 1600). This will ensure that production costs are kept at minimum while at the same time ensuring production of quality goods and services for the consumers. Large manufacturers have complicated production processes that need good management to ensure the end product is of the highest quality as possible. Some of the activities in the production process consume a lot of time and take up many resources that would have been used in other activities. The article presents lean manufacturing as the best alternative

Sunday, October 27, 2019

Computer Crime Legislation in the UK

Computer Crime Legislation in the UK Computer crime is on the increase as there are many users of the internet and social-networking sites. Evaluate the extent to which relevant legislation has intended to serve as a deterrent to such offences. Since the launch of the computers in the mid 1970s, they have played a major role in todays society as it is impossible to live without a computer as most of us are so dependent on them. Computers is used in a number ways such as booking a flight, buying insurance, reading the news, communicating with other people. Another reason people use a computer is to commit crimes. Computer crime has risen at an alarming rate as people think they can be undetected and be anonymous. This is because it is easier to commit a crime in the cyber world than in the real world. When a crime is committed in the real world, physical evidence is always left behind such as blood and fingerprints. In the cyber world there isnt any physical evidence. The thought of their tracks would not be traced, however they are mistaken as tracking down an IP address has become easy to track making it hard for criminals to stay invisible while they are online. An IP address is short for internet protocol address and this identifies a computer on network. The IP addresses are based on the networks that use the TCP/IP protocol. Various activities are committed by not just by criminals but ordinary people as well. These activities would consist of crimes linked to child pornography such as downloading images, stealing identities, hacking to other account to gain information for the third pa rty, creating a virus and money frauds are known to become easier by the use of computers. Credit card numbers, personal id information can also be targeted by programmed automated software. People commit these crimes as they have a thrill of taking advantage of a computer system. Distributed Denial of Service (DDoS) is a common form of attack on computers. This process involves criminals can have controlled access to multiple computers and use them to attack a number of targets or one target. Another form of attack is malicious software (malware). This consists of software that allows criminal to have full control of a system and allowing the malware creator to do whatever they want. The malware can be a number of things such as a virus, worm, Trojan, adware, spyware and a root kit. A virus is the most serious form of attack. This consists the virus affecting the computer or other electronic devices that are passed by other user activity e.g. an email attachment being opened. http://www.seas.ucla.edu/2011, http://www.webopedia.com/2013 As computer crime has risen, the cost of cyber crime is also a threat to the government and the nation. According to the Cabinet office, cyber crime in the UK costs  £27bn a year. These costs are made up of  £21bn to businesses; which is more than the offices annual budget,  £2.2bn to the government and  £3.1bn to public. Baroness Neville-Jones the Security minister stated in a briefing the government was determined to work with industry to tackle cyber crime. At the moment, cyber criminals are fearless because they do not think they will be caught The Police and Justice act 2006 is an act of parliament in the UK. Part 5 of the act the miscellaneous section under chapter 48 introduced the Computer Misuse Act 1990 (CMA). The Computer Misuse Act 1990 (CMA) was passed in 1990 and is part of the UK Parliament. The principle of the act to is frame legislation and controls any activity linked to computer crime and internet fraud. The act was introduced to deal with issues that have occurred by the misuse of computers. The act are based on three offences that cover Unauthorized access to computer material unauthorised access to a computer with intent to commit or facilitate the commission or a further offence and unauthorised modification of computer material The first act Unauthorised access to computer material even though there isnt any physical damage, its an offence when a person is found guilty of using any computer material without permission which makes it illegal. An example of this would be the case of R v Astrid Curzon. Curzon 49 was found guilty of gaining access to a schools email system. She gained access from her home and therefore found private emails from the head teacher to staff members. The email contained discussions about employment of other staff members. Another example of this would be the case of DPP v Bignell [1998]. Two police officers already had access to the police national computer (PNC) that is only used for police purposes. The pair asked the computer operator who used to the computer to obtain information from the DVLA through the police national computer without knowing it was for their own pleasure purposes. The divisional court had stated that the two polices officers didnt commit a crime under section 1 Unauthorized access to computer material. the divisional court believe that the two police officers didnt commit a crime and their conclusions were right, as the decision wasnt over ruled by the House of Lords in Bignell. It was a possible view of the facts that the role of the officers in Bignell had merely been to request another to obtain information by using the computer. The computer operator did not exceed his authority. His authority permitted him to access the data on the computer for the purpose of responding to requests made to him in proper form by police officers. No offence had been committed under section 1 of the CMA. In a more recent article in the Daily Mail online(PUBLISHED: 05:00, 17 December 2012) Hollywood stars Scarlett Johansson, Mila Kunis and Christina Aguilera computer was hacked by Christopher Chaney 36, was arrested for wiretapping and unauthorised access when he hacked into their email accounts. He managed to gain access by using Google and then using the i got forgot my password button. He tried a number of combinations of names and then he reset account passwords by finding pet names, where they were born, and the name of their schools. The most serious incident when Chaney posted nude photographs of Johansson and her then husband all over the internet. The second act unauthorised access to a computer with intent to commit or facilitate the commission or a further offence as stated in the first act no actual physical damage to the computer material. Using the system without permission would make it illegal and committing a on the system would be illegal too. This act mainly covers actions such as using email contents for blackmail. An example of these would be the case of R v Delamare [2003] the defendant was working in bank and was offered  £100 to use the banks computer systems to gain information of other bank details. The third act unauthorised modification of computer material an example of this act would be the case of R v Pavel Cyganok and Ilja Zakrevski [2012].( published 2 July 2012 Last updated at 11:23 2 July) Cyganok and Zakrevski were arrested and convicted of masterminding hi-tech crimes. The pair used a SpyEye Trojan to obtain login details for online accounts. The stolen data was then uploaded to servers which the pair had access to.  £100,000 of the stolen money was stolen and laundered through online accounts allowing criminals to access. The acts are associated with penalties for both individuals and groups of people that are part of a gang. The penalties can be severe for breaching the three offences. The penalties are varied based on what act have been breached. Each of the offences are divided into summary penalties a trail without a jury and an indictment penalties a trail with a jury. In the first act if the individual was found guilty the summary conviction in England and Wales the prison sentence would be a term of 12 months or a fine up to the statutory maximum ( £5000) or both. On a conviction, the prison sentence would be of two years that shouldnt be exceeded or a fine or both. In the second act, the summary conviction is a prison sentence of 6 months or a fine that is not allowed to be exceeded the statutory maximum or both. On a conviction, the prison sentence would be term of five years or a fine or both. In the third act, if the individual was found guilty the summary conviction would be prison sentence of one year or a fine that is not allowed to be exceeded the statutory maximum or both. On a conviction, the prison sentence would be 10 years or a fine or both. Section 35 of the Police and Justice 2006 had amended the Computer misuse act 1990. The amended act looks at new offences which offences 1 and 2 are now combined together into a new offence. A new offence was added into the act 3a offence. This affect took place on 1st October 2008. The three new offences are as follows: Unauthorised access to computer materials (hacking), Carrying out unauthorised acts in relation to a computer and Making, supplying or obtaining articles for use in computer misuse offences. The penalties were also added to the new offences. The police and justice act increased the penalties for the first offence unauthorised access to computer material. The computer misuse act can be compared to other laws and legislations. The Computer Crime Act (CCA) was passed in 1997 is an act of the Malaysian government introduced the legal framework to ease the growth of ICT systems called Cyber laws of Malaysia. The act was given a Royal Assent on June 18, 1997 but didnt come into force on June 1, 2000. This act was introduced purpose of protecting consumers and people that provide a service. The act also protects online businesses and owners of intellectual property. The act was designed to stop offences as computers are misused in a number of ways, as this was added to other existing criminal legislation. The Computer Crime Act and the Computer Misuse Act do have a number of similarities in the case of the three offences; however it differs in more ways. As the Computer Misuse Act as the three offences, the computer crime act looks at a wider range of offences. The CCA looks at the understanding of computers, the computer network, output, c omputer data and the functions it uses. The act looks at computer programs and premises. The definition of a computer in CCA is summarised as any electronic devices that are programmable and has the ability to store data. The CCA looks at more severe penalties compared to the CMA. For the first offence, unauthorised access to computer material the Malaysian law states that if the individual were found guilty the prison sentence would be a maximum sentence that shouldnt be exceeded five years and or a fine of not exceeding RM 50,000 ( £10,273,45) for the 2nd offence, the Malaysian law states for the offence of unauthorised access with intent to commit or facilitate commission of further offences if the individual were found guilty the prison sentence would be a maximum sentence ten years that shouldnt be exceeded and or a fine not exceeding RM 150,000( £30,820,35). For the 3rd offence unauthorized modification of the contents of any computer the Malaysian law states that if the individual was found guilty the prison sentence would be not exceeding seven years and or a fine not exceeding RM 100,000( £20, 546, 90) On a liable prison sentence not exceeding ten years if the act was intentionally brok en and or a fine not exceeding RM 150,000, which is the equivalent to ( £30, 820, 35)   The computer misuse act can also compared to the American law the Computer fraud and abuse act 1986. The act was passed by the united congress. The act is a federal legislation that is aimed to restrict computer crimes that come under the federal jurisdiction.the whole purpose of the act was to strengthen, widen, and clarify to protect computer systems from vandalism. The act also includes the usage of virus and programs that have been intended to destroy a computer system. The law prevents the unauthorized access of any computer system and the obtainment of classified government information. http://ecommerce.hostip.info.2013 Comparing to The Computer Misuse Act and The Computer Crime Act (CCA) 1997, the Computer fraud and abuse act 1986 has more severe penalties. If the individual were guilty of physical damage to a computer system, the prison sentence would be a term of 20 years that shouldnt be exceeded and the fine reaching $250000 ( £155,870.00). Under this law, Prosecutors are challenged to prove that the defendant intentionally caused damages to a computer. The other acts are not so severe than this act.   Even though the computer misuse act is in place, the act still does not stop criminals from committing an offence. In the BBc news online (4 July 2011 Last updated at 19:24 ) The crimes are committed as people want to gain information and sell to a third party. In 2011 it was reported back in 2002 the News of the World newspaper had hacked in to Milly Dowler mobile phone and had listened to the voicemails and then deleted the messages. Later the news of the world was forced to shut down the paper after the hacking scandal as they had admitted interfering with teenagers phone. The victims family and friends said it gave them false hope that she was still alive and Milly had deleted the messages herself. By the time the messages were deleted. By this time, the teenager was already murdered. The hacking was classed as an unlawful interception of communications. This comes under Section 1 of the Regulation of Investigatory Powers Act 2000. In an article in the Daily Mail online, (PUBLISHED: 02:08, 9 June 2012 ) 11,000 people are believed to hunted by the police for using a service of a cyber-crime gangs website that offered false identification and tips on how to commit a crime. The gang had cloned a number the identities of people who a high credit rating. Pay slips bank statements, passports and driving licenses was also sold to the gangs members. The website also offered other services such as different tiers of access as the users where trusted to use the website. One of the services included a platinum profile that cost  £5,500 that came with instructions on how to commit identity fraud. For  £2,000, Confidential Access (CA) offered a 100% Creditmaster profile, which was exclusive to VIP members of the website. The website was claimed to worth be  £200million and had a turnover of  £11m between 2004 and 2008. The paying customers paid from around  £50 for a utility bill to  £800 for a set of three year s professionally sealed. Detective Inspector Tim Dowdeswell said: This was a sophisticated operation which has netted millions of pounds over the years. These cyber criminals not only provided the tools to commit fraud, they instructed their clients in how to use them to make the maximum amount of money, whilst ruining real peoples credit histories into the bargain. We have already brought many of their students in crime to court and will continue to work with other police forces and partners to bring those people who bought and used these identities in their own frauds to justice.   Concluding this essay, computer crime will still be on the increase. Crimes will be committed depending what the motivation is such as greed and pleasurable need. The Computer misuse act 1990 has a number of flaws as it failed in the case of DPP v Bignell [1998] as the prosecutor felt that no crime was committed under section 1 of authorised access. The police national computer (PNC) was used when a police officer obtained information for their own pleasurable needs, even though police officers had access to the PNC. The Computer misuse act 1990 should not have failed, as the police national computer should be used for policing only. Another way it can fail is the source of the crime such as the IP address and hackers would find ways and use another IP address to avoid them getting caught. I do believe that the computer misuse act can work as a deterrent, as it has a high knowledge that projects any computer system that involves criminating activities. The act helps to keep people safe and their personal information safe too. My views on the Computer misuse act 1990 that their punishment should be severe as the Computer fraud and abuse act 1986. I say this because i feel with a harsher punishment people will learn their lesson on not to commit a crime. If an individual served a 12 month prison sentence with a small fine, they would be tempted to commit another crime as they would feel that their punishment was not harsh enough. My recommendations would be that the Computer misuse act 1990 should have harsher punishments matching up to the penalties of the Computer Misuse Act and the Computer Crime Act (CCA) 1997. I also believe that the government should have more power over the individuals who commit crime as 27bn was wasted on computer crimes. I also i believe that the act should at other aspects and not focusing on three sections. If prosecutors are dealing with computer crime cases, they themselves should have an understanding of the act and not allow anymore cases to be dismissed. References BBC News News of the World hacked Milly Dowler phone. 2013. BBC News News of the World hacked Milly Dowler phone. [ONLINE] Available at: http://www.bbc.co.uk/news/uk-14017661. [Accessed 29 December 2012]. Cyber-criminal fraud gang who lived lavish lifestyles jailed for multi-million pound ID scam | Mail Online. 2013. Cyber-criminal fraud gang who lived lavish lifestyles jailed for multi-million pound ID scam | Mail Online. [ONLINE] Available at: http://www.dailymail.co.uk/news/article-2156724/Cyber-criminal-fraud-gang-lived-lavish-lifestyles-jailed-multi-million-pound-ID-scam.html. [Accessed 19 December 2012] Christopher Chaney: Computer hacker who leaked nude photos of Scarlett Johansson is sentenced to 10 years in prison | Mail Online. 2013. Christopher Chaney: Computer hacker who leaked nude photos of Scarlett Johansson is sentenced to 10 years in prison | Mail Online. [ONLINE] Available at: http://www.dailymail.co.uk/news/article-2249693/Christopher-Chaney-Computer-hacker-leaked-nude-photos-Scarlett-Johansson-sentenced-10-years-prison.html. [Accessed 20 December 2012] The cost of cyber crime | Cabinet Office. 2011. The cost of cyber crime | Cabinet Office. [ONLINE] Available at: http://www.cabinetoffice.gov.uk/resource-library/cost-of-cyber-crime. [Accessed 19 December 2012] Bobby Stocks 2013. Why Do People Commit Computer Crimes? | eHow.com. [ONLINE] Available at: http://www.ehow.com/about_4709031_do-people-commit-computer-crimes.html. [Accessed 19 December 2012] What is IP address? An IT Definition From Webopedia.com. 2013. What is IP address? An IT Definition From Webopedia.com. [ONLINE] Available at: http://www.webopedia.com/TERM/I/IP_address.html. [Accessed 20 December 2012] Malicious Software. 2011 Malicious Software. [ONLINE] Available at: http://www.seas.ucla.edu/security/malware.html. [Accessed 20 December 2012] What is DDoS (Distributed Denial of Service) attack? A Word Definition From the Webopedia Computer Dictionary. 2013. What is DDoS (Distributed Denial of Service) attack? A Word Definition From the Webopedia Computer Dictionary. [ONLINE] Available at: http://www.webopedia.com/TERM/D/DDoS_attack.html. [Accessed 20 December 2012] Computer Fraud and Abuse Act of (1986) Information, Law, System, and Damage . 2013. Computer Fraud and Abuse Act of (1986) Information, Law, System, and Damage . [ONLINE] Available at: http://ecommerce.hostip.info/pages/248/Computer-Fraud-Abuse-Act-1986.html. [Accessed 21 December 2012] CyberCrimes: Computer Crime Act 1997. 2009. CyberCrimes: Computer Crime Act 1997. [ONLINE] Available at: http://cybercrimes09.blogspot.co.uk/2009/10/computer-crime-act-1997.html. [Accessed 10 January 2013]. Computer Misuse Act 1990: not yet in force: Legal Guidance: The Crown Prosecution Service. 2013. Computer Misuse Act 1990: not yet in force: Legal Guidance: The Crown Prosecution Service. [ONLINE] Available at: http://www.cps.gov.uk/legal/a_to_c/computer_misuse_act_1990/#an07. [Accessed 10 January 2013]. IMPACT ®:The amended Computer Misuse Act: IMPACT guide to the essentials. 2006 IMPACT ®: The amended Computer Misuse Act: IMPACT guide to the essentials. [ONLINE] Available at: http://impact.freethcartwright.com/2006/11/a_while_ago_we_.html. [Accessed 10 January 2013]. Former beauty queen spied on headteachers email (From Swindon Advertiser). 2012. Former beauty queen spied on headteachers email (From Swindon Advertiser). [ONLINE] Available at: http://www.swindonadvertiser.co.uk/news/local/9881311.Former_beauty_queen_spied_on_headteacher_s_email/. [Accessed 10 January 2013]. Computer Frauds Unauthorised Access + Intent + Modification. 2012. Computer Frauds Unauthorised Access + Intent + Modification. [ONLINE] Available at: http://legal.practitioner.com/regulation/standards_9_3_22.htm. [Accessed 10 January 2013]. BBC News Online bank robbers face jail time for e-crimes. 2012. BBC News Online bank robbers face jail time for e-crimes. [ONLINE] Available at: http://www.bbc.co.uk/news/technology-18672068. [Accessed 10 January 2013]. INTERNET COMPUTER CRIME. 2013.. [ONLINE] Available at: http://www.stjohnsbuildings.com/resources/s/n/4/ComputerCrimeNotes.pdf. [Accessed 10 January 2013].

Friday, October 25, 2019

Madcap Case Analysis Essay -- Marketing Management

Madcap Case Analysis Problem Definition: Considering 4 elements of the marketing mix and the case discussion of the general trends in the industry, it seems that MCB is experiencing problem with place and determining its target market. The case provides many examples of the company's difficulties in gaining more retail locations, maintaining sufficient inventory level, and, the most important, improper positioning of its product, which impeded the MCB to reach its potential customers. Key Facts: 95% of beer was distributed through a three-tier system: producer - wholesaler - retailer. Since there were about 6 thousand brands and the retails stores could only carry forty - fifty brands, it was quite difficult to persuade distributors to deal with the MCB products. However, the distinct packing drove much of distributors' attention to Zebra beer. According to the case, the problem with production was the lead time. Due to the timing in supply of the painted bottles and the lengthy brewing process, the company could not provide beer to their distributors at any time they needed it. The company could not afford to distribute its product to other states than Ohio, Kentucky, and Indiana because bottle taxes and shipping costs would eat up all the profit. It was noticed that if the beer is displayed in a refrigerator or a cold box, the sales were higher so the company was willing to double the commission for distributors if they could place Zebra in cold boxes The beer brands were classified as popular, premium, super premium, and ultra-premium. The distinguishing factor determining if brands belonged to different classes was whether beer was produced by four largest companies (Anheuser-... ... other hand, exploring new areas to distribute Zebra, the company might potentially run into a situation described by Rob Daumeyer from Cincinnati Business Courier. According to the article, when Madcap introduced its three types of beer, they ."..were caught short when they discovered Heidelberg Distributing Co. ordered 6000 cases as an introduction." (Daumeyer 1) They did not expect such popularity and could not effectively handle it. Bibliography: Daumeyer, Rob. "Beware of Too Much Business" Cincinnati Business Courier (June 1996): 9pars. 28 June 1996 Mullins, John W., et al. Marketing Management. 5th Edition, New York: McGraw Hill, 2002 Rosental, David W., Twells, Richard T. Madcap Craftbrew & Bottleworks, Inc.: Zebra Beer - It's Not All Black and White. Miami University, 1999

Thursday, October 24, 2019

Group Discussion

Introduction Discussions of any sort are supposed to help us develop a better perspective on issues by bringing out diverse view points. Whenever we exchange differing views on an issue,we get a clearer picture of the problem and are able to understand it. The understanding makes us better equipped to deal with the problem. This is precisely the main purpose of a discussion. The dictionary meaning of the word Group Discussion is to talk about a subject in detail. So,group discussion may refer to a communicative situation that allows its participants to express views and opinions and share with other participants.It is a systematic oral exchange of information,views and opinions about a topic,issue,problem or situation among members of a group who share certain common objectives. G D is essentially an interactive oral process. The group members need to listen to each other and use voice and gesture effectively,use clear language and persuasive style. GD is structured: the exchange of ideas in a GD takes place in a systematic and structured way. Each of the participants gets an opportunity to express his/her views and comments on the views expressed by other members of the group.GD involves a lot of group dynamics, that is, it involves both -person to person as well as group to group interactions. every group member has to develop a goal oriented or group oriented interaction. A participant needs to be aware of needs of other group members and overall objectives of the discussion. Definition: Group discussion may be defined as – a form of systematic and purposeful oral process characterized by the formal and structured exchange of views on a particular topic,issue,problem or situation for developing information and understanding essential for decision making or problem solving.Group Discussion and Other forms of Oral Communication There are several types of oral group communication. In Public Speaking,the speaker is evaluated by the audience;however there is not much interaction between audience and speaker. Audience,for the most part would only listen to the speaker. In the interview,a panel of members would assess the candidate for the requirement of selection or promotion etc. In meetings,there are discussions on issues mentioned in the agenda. Meetings may have multiple agenda.A chairperson conducts the meeting and controls and concludes the deliberations.. Group Discussion differs from debate in nature,approach and procedure. Debates include representation of two contrasting viewpoints while GD can include multiple views. A GD may help achieve group goals as well as individual needs. The examiner observes the personality traits of several candidates who participate in the G. D. Importance of Group Discussion skills A Group Discussion helps problem solving , decision making and personality assessment.Whether one is a student, a job seeker ,a professional engineer or a company executive one needs effective GD skills. Students need to participate in academic discussions, meetings, classroom sessions or selection GDs for admission to professional courses. A job-seeker may be required to face selection GDs as part of the selection process. Professionals have to participate in different meetings at the workplace . In all these situations, an ability to make a significant contribution to group deliberation and helping the group in the process of decision making is required.The importance of GD has increased in recent times due to its increasing role as an effective tool in a)problem solving b)decision making c)personality assessment. In any situation of problem, the perceptions of different people are discussed, possible solutions are suggested. The best option is chosen by the group. While taking a decision, the matter is discussed, analysed, interpreted and evaluated. While using GD as a tool for personality assessment, a topic-a problem, an opinion or a case – is given to the group consisting of eight t o ten members seated in a circle.The total time given for discussion is usually 30 minutes. Each candidate is expected to voice his opinion and offer counter arguments. The selection committee evaluates the candidates on the basis of their personality,knowledge,communication skills and leadership skills. Hence it is important to be able to take part in the GD effectively and confidently. Participants should know how to persuade their group members, how to reflect leadership qualities and how to make the group achieve its goal. Characteristics Of Successful Group DiscussionFor any group discussion to be successful,acheiving group goal is essential. Following characteristics are necessary: Having a clear objective: The participants need to know the purpose of group discussion so that they can concentrate during the discussion and contribute to achieving the group goal. An effective GD typically begins with a purpose stated by the initiator. Motivated Interaction: When there is a good level of motivation among the members, they learn to subordinate the personal interests to the group interest and the discussions are more fruitful.Logical Presentation: Participants decide how they will organise the presentation of individual views, how an exchange of the views will take place, and how they will reach a group consensus. If the mode of interaction is not decided, few of the members in the group may dominate the discussion and thus will make the entire process meaningless. Cordial Atmosphere: Development of a cooperative, friendly, and cordial atmosphere avoid the confrontation between the group members. Effective Communication skills: The success of a GD depends on an effective use of communication techniques.Like any other oral communication, clear pronounciation, simple language, right pitch are the pre-requisites of a GD. Non-verbal communication has to be paid attention to since means like body language convey a lot in any communication. Participation by all can didates: When all the members participate,the GD becomes effective. Members need to encourage each other in the GD. Leadership Skills: Qualities like initiation, logical presentation, encouraging all the group members to participate,summarizing the discussion reflect the leadership qualities. Evaluation in a GDIn any kind of GD, the aim is to judge the participants based on personality,knowledge,communicative ability to present the knowledge and leadership skills. Today team players are considered more important than individual contributors. Hence the potential to be a leader is evaluated and also ability to work in a team is tested. The evaluators generally assess the oral competence of a candidate in terms of team listening, appropriate language, clarity of expression, positive speech attitudes and adjustments, clear articulation, and effective non-verbal communication.Personality: Even before one starts communicating,impression is created by the appearance,the body language,eye-c ontact,mannerisms used etc. The attire of a participant creates an impression,hence it is essential to be dressed appropriately. The hairstyle also needs to suit the occassion. Other accessories also have to be suitable for the occasion. The facial expression helps to convey attitudes like optimism,self-confidence and friendliness. The body language, a non-verbal communication skill gives important cues to personality assessment.It includes the posture of a person, the eye-contact and overall manner in which one moves and acts. In the entire participation in the GD,the body language has an important role in the impact created. As non-verbal cues such as eye contact, body movements, gestures, facial expressions, and so on can speak louder than words, examiners closely watch the non-verbal behaviour of candidates. They generally evaluate the body language cues of candidates to determine personality factors such as nervousness, cooperation, frustration, weakness, insecurity, self-confi dence, defensiveness, and so forth.So, it is important to be careful while using non-verbal messages. However, one should recognise the power of non-verbal messages and use them effectively. Content: Content is a combination of knowledge and ability to create coherent, logical arguments on the basis of that knowledge. Also a balanced response is what is expected and not an emotional response. In a group discussion, greater the knowledge of the subject more confident and enthusiastic would be the participation. Participants need to have a fair amount of knowledge on a wide range of subjects.The discussion of the subject must be relevant, rational, convincing and appealing to the listeners. One needs to keep abreast with national and international news, political, scientific, economic, cultural events, key newsmakers etc. This has to be supplemented by one's own personal reasoning and analysis. People with depth and range of knowledge are always preferred by dynamic companies and orga nisations. The topics for GD tests may include interesting and relevant ideas pertaining to social, economic, political or environmental problems; controversial issues,innovations or case studies.To read daily newspapers, relevant magazines and periodicals, to watch news bulletins and informative programmes on television are is a simple ways to gather the general knowledge. One can use the Internet to improve one's knowledge about recent developments in different areas. Internet is a valuable source to acquire information along with mulitimedia form. Subject knowledge also includes the ability to analyse facts or information in a systematic way and to place them in the context of the framework of one’s personal experiences. For the expertise in the GD, the only way is to practice wherever one can.The other members can evaluate the performance and give suggestions. Communication Skills: First and foremost feature of communication skills is that it is a two way process. Hence t he communicator has to keep in mind the listeners and their expectations. The participants need to observe the group dynamics. Since GD tests one’s behavior as well as one’s influence on the group, formal language and mutual respect are obvious requirements. One may not take strong views in the beginning itself but wait and analyse the pros and cons of any situation. If one needs to disagree, learn to do so politely.One can directly put forward the personal viewpoint also. One may appreciate the good points made by others;can make a positive contribution by agreeing to and expanding an argument made by another participant. An idea can be appreciated only when expressed effectively. A leader or an administrator has the ability to put across the idea in an influential manner. Hence the participants in a group discussion must possess not only subject knowledge but also the ability to present that knowledge in an effective way. Since oral skills are used to put across the ideas, the ability to speak onfidently and convincingly makes a participant an impressive speaker. The members of the selection committee closely evaluate the oral communication skills of the candidates. The effective communication would imply use of correct grammar and vocabulary, using the right pitch, good voice quality, clear articulation, logical presentation of the ideas and above all, a positive attitude. It is expected that there are no errors of grammar or usage and that appropriate words, phrases etc. are used. One should try to use simple and specific language. One should avoid ornamental language.Clarity of expression is one of the important criteria of communication. When there is clarity of thinking, there is clarity in usage of language. Positive Speech Attitudes is another criterion of evaluation in the GD whereby the participant’s attitude towards listeners including other group members is judged. The temperament of the participant is also evaluated through t he speech pattern. Listening Skills: Lack of active listening is often a reason for failure of communication. In the GD, participants often forget that it is a group activity and not a solo performance as in elocution.By participating as an active listener, he/she may be able to contribute significantly to the group deliberations. The listening skills are closely linked to the leadership skills as well. Leadership Skills: The success of any group depends to a large extent upon the leader. One of the common misconceptions about leadership is that the leader is the one who controls the group. There are different approaches to the concept of leadership. By studying the personality traits of great leaders or actual dimensions of behavior to identify leadership one can learn to cultivate essential traits of leaders.In a GD, a participant with more knowledge, one who is confident,one who can find some solution to the problem and display initiative and responsibility will be identified as the leader. A candidate's success in a GD test will depend not only on his/her subject knowledge and oral skills but also on his/her ability to provide leadership to the group. Adaptability, analysis, assertiveness, composure, self-confidence, decision making, discretion, initiative, objectivity, patience, and persuasiveness are some of the leadership skills that are useful in proving oneself as a natural leader in a GD.The leader in a group discussion should be able to manage the group despite differences of opinion and steer the discussion to a logical conclusion within the fixed time limit. The examiners will assess whether each participant is a team player who can get along with people or an individualist who is always fighting to save his/her ego. Employers today look for candidates who can work in a team-oriented environment. GD participants need a number of team management skills in order to function effectively in a team. Some of the skills needed to manage a group effective ly include adaptability, positive attitude, cooperation, and coordination.In a selection GD, the group, which may consist of six to ten persons, is given a topic to discuss within 30 to 45 minutes. After announcing the topic, the total GD time, and explaining the general guidelines and procedures governing the GD, the examiner withdraws to the background leaving the group completely free to carry on with the discussion on its own without any outside interference. In the absence of a designated leader to initiate the proceedings of the discussion, the group is likely to waste time in cross talks, low-key conversations, cross-consultations, asides, and so on.The confusion may last until someone in the group takes an assertive position and restores the chaos into order. It could be any candidate. In order to get the GD started, the assertive, natural leader will have to remind the group of its goal and request them to start the discussion without wasting time. A few examples of the ope ning lines are given below: †¢ Well friends, may I request your kind attention? I am sure all of us are keen to begin the GD and complete it within the allotted time. Let me remind you that we have only thirty minutes to complete the task. So, let us get started. My dear friends, may I have your attention please? As you all know, we have to complete the discussion in 45 minutes and we have already used up five minutes. I think we should start the discussion now. Hello everybody. I am sorry to interrupt but I have something very important to say. We are here to discuss the topic — † Human cloning should be banned. â€Å"—and the time given to us is just 30 minutes. Let us begin, shall we? Leadership functions during a GD include initiative,analysis,assertiveness and so on. GD doesnot have a formal leader, hence one of the participants is xpected to take the initiative. The leader will promote positive group interactions; point out areas of agreement and disa greement;. help keep the discussion on the right track and lead the discussion to a positive and successful conclusion within the stipulated time. The ability to analyse a situation is a quality of leadership. Analytical skills and objectivity in expressing opinions are absolute requirements for leadership. With patience and composure one can develop the analytical skills. Reaching consensus by considering the group opinion will make the GD successful.Assertiveness, that is an ability to bring order to the group by handling the conflict is another desirable quality of leadership. Self confidence is a quality which helps win the agreement from other participants. In GD, participants can make a favourable and forceful impact on the group by being persuasive and convincing. In order to be persuasive, one has to advance strong, convincing, and logical arguments properly supported by factual data and forceful illustrations. A firm tone and a sober voice would also help in establishing on eself.A leader's ability to convince others and make them accept his/her views and suggestions will establish his/her credentials for leadership. Leaders are charactrerised by a high level of motivation and can motivate others too. A person with motivation can work hard to do the best job possible and can achieve targets. Team Management skills are important for a leader to manage the members of varied interests. Some of the skills needed to manage a group effectively include adaptability, positive attitude, cooperation, and coordination. Try this quiz

Wednesday, October 23, 2019

Sustainable Tourism from Http: //Www.Sustainabletourism.Net/Index.Html

ISSUE: As more regions and countries develop their tourism industry, it produces significant impacts on natural resources, consumption patterns, pollution and social systems. The need for sustainable/responsible planning and management is imperative for the industry to survive as a whole. FACTS: TOURISM IMPACTS: †¢880 million people travelled internationally in 2010 and this is expected to reach 1. billion by 2010 †¢The average international tourist receipt is over US$700 per person †¢Travel and tourism represents approximately 10% of total global Gross Domestic Product (GDP) (if it include tourism related business (eg catering, cleaning) †¢The global travel and tourism industry creates 10% of world employment (direct & indirect) †¢At least 25 million people spread over 52 countries are displaced by violence, persecution and/or disasters – tourism receipts in every country are affected by this. ENVIRONMENTAL IMPACTS: †¢The average Canadian household used 326 liters of water per day†¦. a village of 700 in a developing country uses an average of 500 litres of water per month AND a luxury hotel room guest uses 1800 litres of water per person per night†¦ †¢The average person in the UK uses approximately 150 litres of water per day – 3 times that of a local village in Asia †¢A species of animal or plant life disappears at a rate of one every three minutes †¢70% of marine mammals are threatened The Western world (with 17% of the worlds' population) currently consumes 52% of total global energy. †¢1 acre of trees absorbes 2. 6tonnes of CO2 per year †¢58% of the worlds coral reefs are at risk †¢Seawater is expected to rise 70 cm in the next 10 years †¢By 2050 climate change could have directly led to the extinction of 30% of species, the death of 90% of coral reefs and the loss of half the Amazon rainforest. †¢Since 1970 a third of the natural world has been destroyed by human activity †¢Half the world's population lives in urban areas and this figure is expected to increase. In Latin America and the Caribbean, 76% of the population live in urban areas †¢By 2036, there will be 1200 million cars on earth – double the amount today †¢A European uses 14x more energy than someone living in India †¢For every 1 degree rise in temperature above 34 degrees Celsius, yields of rice, maize and wheat in tropical areas could drop by 10% †¢Although 70% of the earth's surface is water, only 3% is potable Sources: FOC, 2002, WTO, 2000 & 2002, UNWTO, 2011, www. risingtide. co. uk, 2004, UN, 2003, Gov't of Canada, 2005, Tourism Concern, 2011, Science Msusuem, 2006) SOLUTION: Sustainable tourism is about re-focusing and adapting. A balance must be found between limits and usage so that continuous changing, monitoring and planning ensure that tourism can be managed. This requires thinking long-term (10, 20+ years) and realising that change is often cumulative, gradual and irreversible. Economic, social and environmental aspects of sustainable development must include the interests of all stakeholders including indigenous people, local communities, visitors, industry and government. WHAT CAN YOU DO? Address environmental and social concerns through policies, practices and initiatives with others. †¢Are you traveling? Use these guidelines for being a responsible traveler? †¢Are you traveling? Use these guidelines for being a carbon conscious traveler? †¢Are you a business or organization? Use these questions to guide you. †¢Have us help you with policy development, environmental management, business planning and marketing efforts. †¢ Read more or contact us directly. Click here for definitions and information about sustainable tourism.