Saturday, August 31, 2019

Cross-Culture Analysis on “Outsourced”

Due to Western Novelty’s Outsourcing scheme, Todd Anderson is sent to India. Upon arrival, Todd has completely no idea of what territory he is stepping into. With the lack of awareness of the Indian culture, he first falls victim to a taxi driver’s trickery, has to literally â€Å"hop† on a train and although he is offered a seat on the â€Å"can-packed† train carriage by a boy, but in return he has to offer up his lap for the boy to sit on. On first sight, Todd experienced a culture shock from the manifest culture of India (Sathe, 1985) that attacked his own â€Å"core† and starts to form judgments about this seemingly dirty and primitive country. The initial contact with a new culture gives rise to cultural differences and Todd finds himself struggling with them. This is the result of the differences in cultural dimensions. The first dimension contrasting India and Todd, would be Collectivism versus Individualism. Individualism refers to how much a person is self-centered and free from control; Collectivism refers to how the overall group’s interest is placed above an individual. (Hofstede, 1980) Using scores from the GLOBE project, India scores a high 5. 92, much higher than the USA’s score of 4. 5 on the collectivistic scale where higher refers to more collectivistic. (House et al. 2004) Todd, originating from the US, is characterized as an employee who only has to worry about himself, does not involve himself with other employees. In the first scene, employees from the US have a very big private space to themselves and the boss Dave has an even more private enclosure. The office space reflects the culture of individualism from the US. However, in India, we see that employees interact with each other more frequently, such as Asha helping out with employees and smaller desks for closer working conditions. Even the supervisor’s desk lacked privacy due to the missing glass, which Todd makes a big fuss about and showed closeness between the employer and employees. It is apparent that the employees in India have a more collectivistic corporate culture and this affected Todd’s individualistic values and beliefs. However, later in the film, Todd’s individualistic personality slowly evolves into a collectivistic one as he immerses himself into India’s culture and changed his leadership style. This showed during the incident when there was flooding, Todd and the staff members worked together as a team and Todd even asked his neighbour to help with the power connections to benefit the group’s goal. What Todd went through during his immersion in India’s culture is called Primary Socialization (Berger & Luckman, 1967) where he learned India’s culture through living with Puro’s Aunt and socializing with the locals. Without the change in Todd from an individualist to a collectivist, the business could not have been as motivated or productive or achieved its goal. Power distance is the extent to which power is unequally distributed in a collective. A higher power distance score reflects high unequal distribution of power. From the GLOBE scores India has a higher power distance than the US (India = 5. 47; US = 4. 88) (House et al. 2004). In the movie, the Indian employees show a high power distance because they treat their superiors with respect. This could be seen in the actions of Puro. When he was reprimanded for the first time, he did not end up in an extreme debate with Todd regarding the high level of the MPI. On the second incident, when he was scolded, he was very apologetic and was thoughtful to bring clean food for Todd. This showed Puro’s deep reverence for the leader of the office. Another example was how the employees did not ask about better working conditions and accepted whatever Todd had dictated on them from the start until much later. However, when compared with the way Todd talks to Dave, the barrier between him and the superior is thin. Todd can express his thoughts and freely rebut Dave with his own opinions – such as calling Dave â€Å"corporate slimeball†, arguing over the MPI or the freight of company products. The language used through the communication between Dave and Todd sounds too casual to represent a high power distance. The impact power distance had on Todd was great because he had to change his casual methods, as seen during the accent classes, to exerting his leadership on the employees. However, the Power Distance between Todd and Dave did not change. The humane orientation of India ranks much higer than the US according to GLOBE project (India = 4. 57; US = 4. 17) (House et al. 004) The business in India does show a more humane style of working such as Asha caring for the employees, Puro caring Todd by taking him into his family circle and even caring for his well-being such as bringing him clean food. This dimension also affected the business when Todd finally changes his style of leadership. His humane orientation changes from a negative, sulky manager who lashes out at every opportunity he can to a more encouraging manager who becomes a positive influence to the employees. However, throughout the film we see that Dave does not seem to care about the employees in India or even those who were outsourced right from the start. The carefree words he used when he wanted to fire his US employees tell us that he was more interested in cutting the costs of employment and his position as boss rather that the futures of the employees. This impacted the business in India later when he continued to cut costs further by bringing the business to China. Additionally, Dave keeps bossing and pushing Todd around, first sending him to India, giving him a hard time over his contract and even tried to send him to China. We have already established that India tends towards a collectivist culture and the US an individualist culture. Hence, different dimensions will require different motivational and leadership patterns. An individualist culture has both the employee and employer trying to make communal decisions that will benefit both parties, while in the collectivist culture, the reliance on the leader to have the whole group involved is much greater. (Thomas, 2003) The cultural dimensions of India affects the way things are done in the corporate Indian office and Todd has to see them. Earley (1993) also proved a relationship that collectivist cultures would show more work motivation and productivity. Using Vroom’s Motivational theory, there lies a central theme of Expectancy Theory. From there we can identify different motivational factors in the film. Expectancy theory is based on of deciding how much effort should be put into a job for an outcome. The process of Expectancy Theory has 3 components – Effort, Performance and Outcome. Among these 3 components, there are 2 expectancies. First is the Effort to Performance expectancy that is the belief whether making effort will lead to an expected success. The second is the Performance to Output expectancy that is how much value of the reward of the outcome. (Vroom, 1964) What the expectancies mean is that if a person believes that a certain performance will lead to a desired outcome, they will then input effort that will produce the required performance to achieve the outcome. In the middle of the film, this theory can be applied when Todd decided to introduce an incentive programme for employees. The programme allowed employee discounts for western novelty products. Additionally, as part of the motivational process, he gave an edict that whoever improves the Minutes Per Incident (MPI) for the day would get their pick on merchandises from their best sellers of their products. This is the work of Expectancy theory taking place – with the new incentive programme, the employees clearly know what performance will lead to a desired outcome, hence they will instinctively put in effort to achieve the performance required. Whereas for Todd, his outcome is to leave India and the performance is to bring the MPI to 6. 0. Hence his effort component will require him to comply with the collectivist culture of the Indian branch to achieve the outcome. Thus we see that their performance component to achieve a 6. 0 MPI is the same, their effort and outcomes are different because of differing roles, and individual goals. These differing roles and goals can be attributed to the differing individual needs. We can also apply Herzberg’s Motivation-Hygiene Theory to the film. His theory suggests that satisfaction and dissatisfaction are two separate dimensions instead of two extremes of one dimension. (Herzberg , 1968) His hygiene factors refer to external factors such as factors outside an employee’s job that influences him. These are ‘dissatisfiers conditions’ – if they are present, the worker is neutral; but if absent, the worker will be dissatisfied. In the film, after the Day of Holy, Todd acknowledges his mistake of trying to run the Indian branch as an American office and asks how he could change the way the office is run. Suggestions include bringing family pictures to work, allowing them to bring what they want to the office as long as it doesn't get in the way of work, and wear whatever they want to work including ethnic clothing. We can tell from the employees’ faces that without proper working conditions, they were dissatisfiers to their productivity and after Todd had acknowledged change, it put a smile to their faces. For Todd’s position, when he first arrived in India, the working conditions were a total dissatisfier because the working conditions were different from his usual ones, especially because the place was in a rural lace and even animals were in the office. The culture shock resulted in him becoming difficult in the workplace such as scolding Puro a few times. However, later on in the film, other hygiene factors such as the build up in relationships between the characters helped overpowered his original hygiene factors. The second factor from Herzberg is the Motivation f actor that is intrinsic in nature. These include interesting work, responsibility or career advancement. If they are present, the worker will be satisfied, but if absent the worker remains neutral. Asha did not want to sign up for the incentive programme, and from her other actions and words, we can assume that her motivational factor was the work itself, or a career advancement – when she took the initiative to act as supervisor on the Day of Holy and acting as a supervisor when they setup the office on the roof. Todd also promoted her to be the future assistant call manager. For Todd, it was after the Day of Holy where he became motivated to take on the challenge and responsibility of the business. We can also use McClelland’s Learned Needs Theory, to spot other motivational differences between the characters. The Learned Need Theory states that there is three major needs that influences people’s behaviour – need for achievement, power and affiliation. (McClelland, 1966, 1985) The need for achievement relates to individuals who want success or failure. This can be identified with Dave who’s only concern was himself, maximize the company’s profits by outsourcing the lowest cost possible services and neglecting the benefits of others. This need for achievement can also be identified in Todd when he first arrives and is only concerned about himself and forcing the MPI down to 6. 0. However, he then realized that to achieve this, he has to had establish a reputable presence in the company which is the second need in the Learned Need Theory. The need for power relates to achieving reputation, and control over others. We might only see this through Todd in the later part of the movie whom starts to understand his position in India and makes the best of it by being the best manager possible and trying to win over the employees. But this was still done so that he can leave India when the MPI reaches 6. 0. So Todd achieves this by gaining respect from his subordinates by introducing an incentive programme. Todd knows that by introducing the programme, it will motivate him further. The need for affiliation relates to establishing relationships with others. This is seen in Asha who helps employees every now and then in the film. Asha’s needs are also different from other employees, as she does not want any of the incentives outlined by Todd. Rather she establishes relationships between herself, the employees, Puro and Todd. This need is also manifested in these three characters because of the collectivistic corporate nature of the Indian branch. The relationship between the three characters deepens throughout the movie because they realized they were in the same boat and they had to achieve a common goal together, which becomes a shared need. To sum up, the film showed us how our protagonist, Todd, developed his cultural intelligence (CQ). The distinct cultural differences between India and US, the contract between Todd and Dave left the protagonist with the uncontested choice to stay put and that had in effect, supported his development of cultural intelligence. Todd had went through the stages of CQ development – Reaction, Recognition, Accommodation, Assimilation and Proactivity (Thomas 2003) Not only did he learn about and adapt to the new culture, he had also learned that he had to alter his corporate processes to make the business work. At the end, when Dave recommended Todd to move to China, he declined probably because Todd knew how hard it was to change and adapt to a new culture. References: Berger, P. and Luckmann, T. (1967) The Social Construction of Reality. New York: Doubleday. Earley, P. C. 1983) â€Å"East meets West meets Mideast: Further Explorations of Collectivistic and Individualistic Work Groups,† Academy of Management Journal, 36 (2), 319-48 Herzberg, F. (1968) â€Å"One more Time: How Do You Motivate Employees† Harvard Business review, Jan-Feb Edition, 53-62 Hofstede, G. (1980) Culture’s Consequences: International Differences in Work-Related Values. Beverly Hills, CA: Sage. House, R. J. , Ha nges, P. J. , Javidan, M. , Dorfman, P. W. , and Gupta, V. (2004). Culture, Leadership, and Organizations: The GLOBE study of 62 societies. Sage Publications: London. Javidan, M. , Dorfman, P. W. , de Luque, M. S. , and House, R. J. (2006) â€Å"In the eye of the beholder: Cross-Cultural lessons in leadership from Project GLOBE. † Academy of Management Perspectives, 20(1): 67-90. McClelland, D. C. (1966) â€Å"That Urge to Achieve† THINK Magazine. McClelland, D. C. (1985) Human Motivation, Glen vview, IL: Scott, Foresman. Sathe,V. (1985) Culture and Related Corporate Realities. Homewood, IL: Irwin. Thomas D. C. , Inkson K. (2003) ‘Cultural Intelligence: People skills for Global Business’, Berrett-Koehler Publishers Vroom, V. H. (1964) ‘Work and Motivation’, New York: Wiley. 331p.

JPMorgan Chase Essay

JPMorgan Chase is one of the oldest and most respected banks in the United States. However, during the summer of 2012 Chase announced trading losses and bad investment decisions that resulted in a loss of approximately $5.8 billion. Not only did they report this substantial loss they admitted to falsifying their first quarter reports, were they where attempting to conceal the massive loss. Three months prior to this event JPMorgan Chase was viewed as the top American bank. The first question to be discussed in this paper will be what actions can Administrative Agencies such the Securities and Exchange Commission (SEC) and or the Commodities Futures Trading Commission (CFTC) take to prevent high risk gambles in securities/banking which are one of the main cornerstones of this country’s economy. According to the SEC, their â€Å"main mission is to protect investors, to maintain fair, orderly, efficient markets and facilitate capital formation† (www.sec.gov) One of the ways that SEC does this is by requiring public companies to disclose meaningful financial information to the public to help the public decide which companies will be the best to invest in. In response to the JPMorgan Chase revelation SEC Chairperson Mary Shapiro told the Senate Banking Committee that â€Å"her agency’s investigation is limited, because the trades happened in divisions of the banking giant that are not subject to SEC regulation†. She also stated that â€Å"we (the SEC) did not have any direct oversight or knowledge of the transactions†. In addition to the above statements Ms. Shapiro stated that â€Å"the SEC’s investigation would target the appropriateness and completeness of the entity’s (JPMorgan Chase) financial reporting and other public disclosure s† (Liberto, 2012). Next I will discuss the Commodity and Futures Trading Commission’s (CFTC) main purpose as well as some of its other responsibilities. The Commodity and Futures Trading Commission’s (CFTC)  main purpose is to regulate commodity futures and options markets. Its goals include the promotion of competitive and efficient futures markets and the protection of investors against manipulation, abusive trade practices and fraud (www.sec.gov). Gary Gensler, chairman of the CFTC told the Senate Banking Committee that â€Å"he couldn’t provide specific information about the investigation, but he did say that he first learned about the questionable trades from press reports. He also stated that the CFTC does not have regulators on the ground to look at bank trades yet. Chairman Gensler also told the Banking Committee that currently, the American public is not protected in that way (e.g. having regulators looking at the trades as they happen) (Liberto, 2012). Regulators have been struggling for months trying to figure out who should be included in a new crackdown on swaps and derivatives. Swaps and derivatives are complex financial bets derived from other financial products. Gensler made it clear that once the Dodd-Frank Wall Street reforms are fully implemented it will be illegal for JPMorgan Chase to make the kinds of trades that resulted in the $5.8 billion loss. He also clarified that Dodd-Frank allows for trades made to hedge against â€Å"individual and aggregate positions† – not to guard against future economic losses, as the JPMorgan trades have been described (Liberto, 2012). Next I will cover the elements of a valid contract, as well as discuss how consumers and banks each have a duty of god faith and fair dealing in the banking relationship â€Å"A contract is a legally enforceable promise or set of promises. If the promise is broken, the person to whom the promise was mad – the promise – has certain legal rights against the person who made the promise – the promisor† (Bagley, 2012). There are 4 basic elements to a contract and they are: 1) offer and acceptance, 2) consideration, 3) both parties must have the capacity to enter into a contract, 4) the contract must have a legal purpose. â€Å"The offer is a manifestation of willingness to enter into a bargain that justifies another person in understanding that his or her assent will conclude the bargain† (Bagley, 2012). Acceptance indicates the receiving person’s willingness to enter into the agreement proposed in the offer (Bagley, 2012). Consideration is something of value that is provided by both parties (Bagley, 2012). Lastly, a valid contract requires that both parties have the capacity to enter into the agreement (Bagley, 2012. Next I will discuss the duty of god faith and fair dealing  in the consumer/banking relationship. Prior to 1929, Massachusetts expressly provided that good faith was applicable to all contracts. In 1929, the Supreme Judicial Court, in addressing a breach of contract claim under an option agreement for the purchase of stock in an oil-producing leasehold, expressly stated, for the first time, that there was an obligation of good faith and fair dealing in all contracts. The court emphasized that a business contract â€Å"is to be interpreted as a business transaction entered into by practical men to accomplish an honest and straightforward end†. Beginning in 1936, the duty of good faith was defined as a covenant â€Å"that neither party shall do anything which will have the effect of destroying or injuring the right of the other party to receive the fruits of the contract†. This â€Å"fruits† articulation of the duty of good faith remains intact today and is regularly quoted as the operative standard (Weigand, 2013). The next topic is to compare and contrast the differences between intentional and negligent tort actions. There are several types of intentional torts and they are: torts against persons, intentional torts that involve personal property, and intentional torts with regard to economic interest and business relationships. There are also several types of negligent torts. Two of which are: duty to rescue and duty to invitees. Intentional torts against consist of battery, assault, false imprisonment, intentional infliction of emotional distress, defamation, and invasion of privacy. The key word in all of these intentional torts is intent or purpose to cause harm to another. Intentional torts against property include trespass of land, nuisance, conversion, and trespass to personal property. Intent and purpose are also why these are considered intentional. The key difference between these two torts is that one is against people and the other is a misuse of another’s property. An individual has to purpose commit these acts. Negligent torts consist of different types of duties. Duty is when a person with a legal duty to another is required to act, reasonably, under the circumstances to avoid harming the other person. Some examples of this are duty to rescue and duty to invitees. Duties are basically an obligation that one person is legally bound to perform for another. In comparing the two types of torts we find that intentional torts are torts that people commit against other people. Negligence also others but it is a failure to perform that causes the injury or unjust action. An  example of this comparison is the intentional tort of battery and failure to perform the duty to rescue. When I commit battery I cause harm to another, when I fail to perform the duty to rescue the other individual also suffers harm but it is because I failed to act. In contrast intentional torts are actions committed against another and negligence is when I fail to take action on another. Next I will discuss the tort action of â€Å"interference with contractual relations and participating in a breach of fiduciary duty†. Interference with contractual relations protects the right to enjoy the benefits of legal ly binding agreements. It provides a remedy when the defendant intentionally induces another person to breach a contract with a plaintiff. Interference with contractual relations requires intent to interfere. The existence of a contract is the difference between tortuous interference and the more difficult to prove tortuous interference with prospective contractual relations. The most famous case of tortuous interference was Pennzoil v Texaco which occurred in 1983 (Bagley, 2013). Similarly a defendant who knowingly participates in, or induces a breach of fiduciary duty by another commits the tort of participation in a breach of fiduciary duty. Lastly, I believe that if god grounds exist for the interference, such as exists in the JPMorgan Chase case then I should be able to prevail in the tort action. Lastly, I will cover how banks protect the software that allows for online transactions. Most banks protect the customers who participate in online transactions through what is called the Online Banking Guarantee. This protection covers your banking and personal information. It is the banks responsibility to ensure the customers protection while the customer engages in online transactions. In most if not all case the customer is 100% covered in the case of theft of funds. One of main defenses for software protection is through complex encryption systems. Another deterrent is simply the vast amount of software that is available for online banking. So between the wide array of software and encryption systems online banking transaction are relatively safe. In this paper I have covered several topics and they are as follows: What actions Administrative Agency’s take to be effective in preventing high-risk gambles in securities and banking, the elements of a valid contract and the duty of good faith and fair dealing between banks and consumers, comparing and contrasting intentional and negligent torts, the tort action of  Ã¢â‚¬Å"Interference with contractual relations and participating in a breach of fiduciary duty, and lastly, how banks protect the software that they use for online banking. References Bagley, C. (2013). Managers and the Legal Environment: Strategies for the 21st Century, 7th Edition. Mason: South-Western, Cengage Learning. Liberto, J. (2012) CNN Money. (n.d.). Retrieved March 1, 2013, from http://money.cnn.com/2012/05/22/news/economy/jp-morgan-senate/index.htm U.S. Commodity Futures Trading Commission. (n.d.). Retrieved March 1, 2013, from U.S. Commodity Futures Trading Commission: http://www.cftc.gov/index.htm U.S. Securities and Exchange Commission. (n.d.). Retrieved March 1, 2013, from U.S. Securities and Exchange Commission: http://www.sec.gov/ Weigand, T. (2013) . The Duty of Good Faith and Fair Dealng in Commercial Contracts in Massachusetts, Massachusetts Law Review. Retrieved 10Sep13

Friday, August 30, 2019

Founder/Ceo

Wangoh Dynamics Technologies Network and Telecommunication Services and Solutions Memo To: The Government of Sierra Leone (West Africa) From: Saa E. Fillie-Founder/CEO and Network Engineer Date: March 20. 2013 Ref: The Cost Benefit of Virtualization Technology Many enterprising companies are looking for ways to better IT departments, improve business models and create lower operating costs. Until a few years ago, it seemed as if an all-encompassing solution to those problems has been taken care of by virtualization that is now a reliable, efficient and customizable solution to those business requests and more.Whether used to provide better customer service, to be more eco-friendly or to gain more company memory, the virtualization technology of today offer many benefits to enterprising companies all over the world, creating innovative solutions to work based problems on a daily basis. Virtualization has not only captured the business world by storm with its innovative and creative so lutions but it also offers proven advantages in several areas of industry, IT and service. Below is a list of a few of the advantages and solutions that virtualization technology can offer the enterprise around the globe.Virtual Desktops Many corporations and enterprises are looking to reduce their footprint and create more efficient operating systems. This can be done with one aspect of virtualization, virtual desktops. Virtual desktops have the ability to create more space within a desktop computer or on actual desk space through the use of software which expands a desktops environment beyond physical limits through virtualization. This can create a more eco-friendly environment with less computers using energy and lower operating costs as well as offering continuous transitions between multiple operating system.Enhanced System Security A fear of many enterprises considering virtualization in their business is that all the advantages of this technology will compromise the security of sensitive, private and legal company information. However, that is not the case; in fact virtualization in business provides enhanced security, making it more difficult for hackers to find key information. Unlike other security systems, virtualization has the ability to single out and trace requests.If a request seems fishy or unsuitable, virtualization security technologies will reroute hackers to another location, securing and keeping enterprising business information safe from harm. Better System Reliability Non-virtualized networks and systems are more prone to crashes and memory corruption due to software installments such as device drivers. Through virtualization, I/O resources can be isolated providing better security (see above,) reliability and even availability across devices for business purposes. Disaster RecoveryAlong the same lines as better system reliability, virtualization also provides enterprising businesses with better, faster and more secure disaster recover y. This is possible because this technology is able to take a virtual image or information and transfer it to another server in the instance that the original server may be crashing. This prevents information loss and provides a constant stream of secure and safe information. Space and Server Consolidation When an organization has a physical database, it can take up to ten machines to provide the same amount of workload to one virtual machine.This means that up to ten applications can be ran on a solitary virtual machine, consolidating physical space as well as server use, therefore saving energy usage, operating costs and server expenses. Scalability One advantage of virtualization technology is its unique ability to be scalable. What this means is that unlike purchasing X amount of computer memory or RAM for a company, the possibilities with virtualization are endless. The workload and space needed one month may change in the next and virtualization accommodates those changes by f luxuating to fit the needs of an enterprise at the time of use.This also saves on energy consumption and operating costs because virtualization service providers oft will only charge for what was used. Endless Memory and Accessibilities One aspect of scalability is virtualization’s advantage of seemingly endless memory. Enterprising businesses can take advantage of limitless memory to house business information, client details, invoices and financial records all in an accessible, crash protected and secure place. Virtualization is accessible anywhere there is an internet connection, allow for access to important company information anywhere in the world.This is great for traveling business owners, work from home employees or access away from work. This also allows companies to offer better customer service to clients because of the ease of access as well as the quick pull up of saved information stored in a limitless memory location. Many enterprising companies are looking fo r ways to better IT departments, improve business models and create lower operating costs, all of which can be accomplished with the modern marvel technology that is virtualization.Whether used to provide better customer service, to be more eco-friendly or to gain more company memory, the virtualization technology of today offer many benefits to enterprising companies all over the world, creating innovative solutions to work based problems on a daily basis. Return on Investment School of thoughts have argued in various platform about the huge capital investment return in virtualization, there are multiple factors which determine how to go about deciding what type of monitoring an Information Technology (IT) department should embark on.In order to properly evaluate a specific IT environment, one must first determine whether or not to virtualize. Virtualization can be stressed as a life saver for countless IT departments over the past few years. What first needs to be determined howev er, is if in fact an organization really needs to virtualize. Perhaps database, application servers, network services, etc don’t truly need to become virtualized, maybe they do. What we are trying to determine today is the Return on Investment (ROI) for virtualization.Technologist, Researchers and Students helps quantify virtualizing an IT infrastructure. If an organization is in the process of acquiring a new company (or being liquidated) and subsequently moving locations, they must first take a look in their server room*. If it is overcrowded, under powered or outdated, then yes†¦ virtualization is probably important. What everyone in the IT department wants to know then, is virtualization right for my organization and more importantly my department? [pic]The resources being saved on just power and hardware along are staggering. Keeping costs lower for the overall organization is obviously crucial, especially when it comes to things such as never having to redeploy app lication solutions*. This will save you time and subsequently money: no server hardware refreshing costs, limited annual server-related power costs*. The greater questions then arise, how much time will it take a department to make the complete switch? Will the ROI be worth the increased labor hours to become fluent with the virtualized world?What types of challenges will come about from the overall business perspective? |Reducing Infrastructure Costs Through Virtualization | | |   | | |Introduction | | |Nowadays, we live in uncertain times all around the world.When it comes to architecture | | |and design, we must think a lot more in costs—unlike in other times, when we used to think| | |first of the solution and then in costs. If we had a streamlined and defined return on | | |investment (ROI), only then did the project get the green light. Today, if we think about | |projects, it is necessary to have a precise budget and defined cost first before we can | | |start to t hink about the project. | | |Upon brief reflection of what IT architecture is, one finds that the model that the whole | | |world favors (because of costs and the evolution of technologies) is the virtualization | | |model.Ten years ago, it was all about decentralization—both in data centers and servers, | | |and in communication and desktops. When we thought of an application, we always tried to | | |have the layers of such an application as close to the client as possible; data centers, | | |databases, and e-mail servers were distributed all over. | |This situation was the result of being unable to face the huge cost of having hardware | | |equipment of multiple large capabilities (such as an eight-processor server and lots and | | |lots of RAM gigabytes) or having redundant point-to-point communication links with good | | |bandwidth—the cost of which only large companies could consider including in their | | |architecture.All of this encouraged a decentralized IT ad ministration model that required| | |specialists in the different platforms of each site. | | | | |   | | |The Original Model | | |Although this model worked for years, many things were not considered that today have | | |rendered this model not as efficient as was initially thought. | |[pic] | | | | | |Figure 1.Typical scheme | | |   | | |Taking as an example the analysis of a distributed application that was devised 10 years | | |ago, there was an architecture in which it was important to have the data near the client,| | |which led to the following scheme: | | |A database in the central office in which the information from the different sites, the | | |database from each site, the application server from each site, and the local applications| | |that were installed on each desktop were all consolidated. | | |A replication scheme among the databases was used for the distribution of information. | |This drove us to have database administration for each site, besides havi ng on each site | | |an infrastructure administrator who had thorough knowledge. | | |Initially, this had (as variables within the equation) high communication-link costs, | | |large servers that represented a very high cost, and operative systems that were neither | | |very solid nor rigid with regard to changes and also had little functionality—that is, | | |they offered very few functions or roles within the operative system. | |For many of the needs of the company, it was necessary to add software that could comply | | |with that functionality. In addition, in order to carry out the tiniest of changes, it was| | |necessary to set the server offline and have IT personnel who represented an average cost. | | |The variable that was not really considered was the updating and maintenance of the whole | | |structure, which at the time—due to the fact that technology did not evolve in the way | | |that it does today—was not such an important aspect. | |If we consid er basic accounting principles (which I have learned during recent years), one| | |should always see the IT personnel as an asset to the company, with both amortization time| | |(which is the time that it takes to shape the person, according to the culture and needs | | |of the company) and an updating cost (which is what must be invested to have a person | | |trained in the different technologies as they evolve). | | |Over time, all of this changed; the variables in this equation also changed, and the | | |updating and maintenance variable (which in many cases had not been taken into account) | | |started to gain more and more importance. | |This is the equation that we face nowadays: | | |Average to low communication-link costs (taking into account the virtual private network),| | |large servers with many RAM gigabytes at average to low cost, operative systems that had | | |hundreds of embedded and flexible options and lots of functionality (many things already | | |come solved an d embedded in the operative system, so that in general it is not necessary | | |to set the server offline to make these changes), average to high personnel costs, and | | |average to high updating and maintenance costs. | |Within the scheme that is encouraged today, many things must be considered; it is | | |necessary, therefore, to have the whole scheme in mind—not just a part of it—to avoid | | |making the same mistakes that we incurred in the past. | | |Nowadays, when uncertainty (crises, corporate mergers, acquisitions, and constant changes)| | |is all around, it is vital to work toward an environment that would basically support | | |constant dynamic changes. More than ever, it is necessary to think about platform and | | |application updating, growth, and corporate and budget contractions.This, of course, will| | |highly influence the model that is to be chosen, and that model (taking into account the | | |aforementioned equation) should be based mainly on the up dating and maintenance variable. | | |When we consider all of the preceding, we will see that the model that best fits is the | | |virtualization model applied to all of the possible levels, where all of the equation | | |variables are considered in order to determine feasibility and total cost of ownership | | |(TCO). | |There will be infinite virtualization scenarios—from choosing cloud computing in specific | | |services and virtualizing (or outsourcing) the whole or part of the IT department to using| | |virtualization for servers, applications, or desktops. | | |   | | |Server Virtualization | | |Today, there are many important players and technologies that have been widely tested, | | |such as Microsoft Hyper-V and VMWare.The hardware costs have gone considerably down: If | | |we were to compare four- to eight-processor equipment of the past to one today, it would | | |result in an important cost margin that would be an improvement, and it would be necessary| | |to a dd the progress that has been made in technologies and redundancy within equipment, | | |board, hot-plug memories, and so on. | | |Generally speaking, almost all the components of the server can be changed without having | | |to take the server offline.The same thing applies to operative systems. This means that | | |we can do away with the theory that was used in the past, according to which we used to | | |divide into different hardware pieces the different business applications. In addition to | | |this, the advantages of tolerance to failure in the virtualization schemes that are used | | |today make it possible to take a physical server offline without affecting the virtual | | |server that is running in that physical server.This, of course, means that from a simple | | |technical point of view, there is already a huge advantage in the use of server | | |virtualization. | | |From an architectural point of view, this allows us to respond to organizational changes | | |quickly. A bove all (and this is something to consider nowadays), this also enables us to | | |achieve substantial savings at the time of shaping a data center. There will also be | | |savings in the electrical bill, refrigeration costs, physical space, and hardware. | | |Moreover, deployment and disaster recovery will be much simpler. | |All of this will result in lower maintenance costs—whether we have our own IT department | | |in 100 percent administration of this platform or a virtualized environment of the IT | | |department (later, we will develop the IT department cost, as well as the options and the | | |reasons behind virtualizing it). This all leads to there not being almost any scenario in | | |which virtualization is not applied and which will not result in a much lower TCO. | |   | | |Desktop Virtualization | | |In this regard, it is also possible to find very well-developed and well-tested | | |technologies, such as Microsoft Terminal Server, Citrix, and so on. This k ind of | | |virtualization was previously thought about for remote points or links that had a | | |relatively small bandwidth.Nowadays, it is used as a method to reduce | | |desktop-administration expenses, because (thanks to this technology) it is possible | | |technically to have tolerance to failures, add it to the server-virtualization scheme, and| | |create a pool of servers. There is substantial reduction of the desktop-maintenance cost | | |and the cost of desktops themselves, because with equipment that has smaller hardware, it | | |is possible to run any kind of application and still have centralized control and | | |deployment of applications and security policies. | |   | | |Virtualization of the IT Department | | |In the past, there was a relatively low or not-so-significant IT department cost, compared| | |to the one nowadays. Today, there is a high IT department cost, and it is necessary to | | |consider the following variables: training in new technologies, trainin g in the company | | |environment, the cost of personnel search, and the time during which the search takes | | |place. All of this leads to the IT department not being able to respond with the speed | | |that the company needs. In ddition, we currently experience a high labor turnover, which | | |means that many times this process has to start again—which, of course, drives the cost | | |upwards. | | |If we consider all of these factors, especially the costs and the time that the search | | |involves, we will see that having a virtualized IT department results in a lower TCO and | | |in every possible advantage. With virtualization, all of these IT-department problems are | | |moved to an external company that is exclusively devoted to IT, particularly as it refers | | |to specialists in technology or in specific technologies.This would mean that there is no| | |point in having a specialist as part of the internal IT department. | | |   | | |Cloud Computing | | |Currentl y, there an infinite number of services are available on the Web, from e-mail | | |services (as has been the case for a very long time) to CRM, ERP, Document Managers, and | | |other services.This solution naturally offers a world of advantages: It is unnecessary to| | |have a specialist in this technology within our IT department, it is equally unnecessary | | |to maintain that technology from either the hardware or the software point of view, and | | |keeping security copies of the information is no longer required. Depending on the kind of| | |hired service and service-level agreement (SLA), it will be possible to have a redundant | | |and always-online service. In some cases, the cost for this kind of service can be | | |high—depending on both the number of users within our organization who require this | | |service and the characteristics of the service—and is worth considering. | |   | | | | | | | | | | | | | | | | | | | | | | | | | | |Example of Archit ecture | | |(Example based on a company with 500 employees. ) | | |[pic] | | | | | |Figure 2.Current architecture | | |   | | |As an example, we will use a virtualization architecture that uses such Microsoft | | |technologies as Hyper-V and Terminal Server. Number of servers: 15. | | |Typical structure of IT department: One manager, two IT administrators, one database | | |administrator (DBA), and five Help Desk employees. | | |Based on everything that was explained previously, we will take the best of each | | |virtualization technology to carry out a cost reduction. | |Server Virtualization | | |It will be possible to reduce approximately 15 noncritical servers into 4 physical servers| | |that will be able to support these 15 virtual servers. It will be necessary to carry out a| | |load analysis and distribute the servers and business applications correctly. Nowadays, | | |given the kind of roles of a typical company server, there are not many servers that have | | |a high p rocessing consumption; thus, it will be necessary to isolate these kinds of | | |servers, so that a resource competition conflict is not generated.It will also be | | |necessary to include (if we do not already have it) an external storage in which our | | |virtualization scheme will be stored (so that it is possible to work on it in a cluster) | | |and which will have tolerance to failure of all of the virtual equipment. All of this will| | |be possible by using Microsoft Windows Server 2008 64 bits and Hyper-V System Center | | |Virtual Machine Manager to carry out the P2V conversions. | |Cost Reduction | | |Within this example, it will be possible to reduce approximately 70 percent of the energy | | |consumption, as a result of less consumption on the part of the servers. In addition, | | |there will also be a reduction of approximately 70 percent in the refrigeration | | |consumption, as a result of the use of storage. | | |The licensing cost will also decrease (when we use Micr osoft licensing) very | | |substantially. The Microsoft licensing scheme is based on Table 1. In the table, we can | |see that by using Windows Server 2008 data-center server licensing, it will be possible to| | |obtain a reduction in licensing from 15 servers (which will be able to use different | | |versions of Windows Server 2008, depending on the processor and RAM needs) to only 4 (with| | |data-center or enterprise licenses). Depending on the versions of Microsoft Windows that | | |are used, in the least favorable scenario, we will achieve a reduction in cost of 50 | | |percent. | |Version of Windows Server 2008 host | | |Covered virtual servers | | | | | |Standard | | |1 | | | | | |Enterprise | | |4 | | | | | |Data center | | |Unlimited | | | | | |Table 1.Microsoft Licensing Scheme | | |   | | | | | | | | |Desktop Virtualization | | |Depending on the memory consumption of the applications, it will be possible to implement | | |approximately five virtual servers for Terminal Server— typically, in five physical | | |servers to cover 500 work positions.The main advantage of having virtualized servers is | | |that this will automatically commute to any other, in case of a failure in any physical | | |equipment. | | |In this way, we will be able to have a desktop with fewer resources, and it will be | | |possible to update the applications more rapidly, as with deployment, management of | | |printers, and any other desktop problem. In turn, this will also enable us to make the | | |desktop of the user available to remote or external users. | |Cost Reduction | | |If we consider, on the one hand, the cost of updating 500 desktops as a result of the | | |installation of some business application and, on the other hand, the purchase of five | | |32-GB RAM servers and two Quad Core processors each, we will obtain a cost reduction of | | |approximately 90 percent. | | |Virtualization of the IT Department | | |It is first necessary to analyze the c ritical and noncritical applications; it is | | |important also to analyze the IT labor market in the country in which it is applied. | | |Generally speaking, the advice that is given is to virtualize whatever is difficult to get| | |in the market and to have partial virtualization of the IT department.For this | | |example—and considering the current work market—we will opt to virtualize (for example) | | |only one IT administrator and one DBA; the Help Desk, one IT Administrator, and the IT | | |manager will continue to be physical. By having an SLA with external suppliers and a | | |framework work contract, it will be possible to increase rapidly the IT department or | | |change swiftly the scheme without a great increase in initial costs. It will also be | | |possible to decrease training costs, hiring costs, and so on. | |[pic] | | | | | |Figure 3. Virtual-server scenario | | |   | | |Cost Reduction | | |If we consider the TCO, hiring costs, training costs, an d salaries, we will obtain a cost | | |reduction of approximately 55 percent. | |Cloud Computing | | |Let us take an application that will not be worth having internally, because of the size | | |of the company. For this example, we will use a CRM. Ten CRM licenses will be hired | | |online. In this way, no costs will be associated to the initial licensing, administration | | |training, CRM server deployment, disaster-recovery policies, or anything that pertains to | | |administration of the CRM. | | |Cost Reduction | |Based on online services, there will be a cost reduction of approximately 80 percent—based| | |on 10 licenses, and considering the initial cost of having a server, trained personnel, | | |backup policies, and so on. | | | | | | | | |Financial Benefits of Virtualization | | |. | |â€Å"Leveraging virtual computer environments has increased the opportunities for teaching and| | |learning. This particular solution is cost effective and sustainable in many diffe rent | | |ways. Tech related costs have reduced by a little over $250,000 a year. That is a | | |combination of lower software costs, app software costs, and extending the life of the | | |hardware. That in turn reduces the cost of the hardware by about 35-40% when they do | | |replace it.Computers can be renewed with hardware that is much more cost efficient | | |because it does not need to be the latest and greatest machine. The computers that are | | |replaced cost around $500 or less. | | |IT staff numbers are down, mainly because of a reduction in PC technicians. Everything is | | |moving back towards the data center and, because of the way they implement their | | |environment, every time a user accesses an app or a desktop they are actually accessing a | | |copy of a perfect image.Every time you open up Word it is a brand new fresh copy and when| | |you are done using it that image goes away so you are not really re-using it. SCC does | | |manage their profile information so if they create custom shortcuts it will be applied | | |over that virtual application. This way they still get that customized personalized | | |environment. Pooling resources reduced hardware and software costs while extending the | | |life of current hardware resources. This lowers the school’s total cost of ownership and | | |makes a very significant difference. | | |To read the rest of this report, Desktop Virualization for the Real World, IMF members can| | |log-in | | | | | | | | | | | | | | | | | |   | | |Conclusion | | |The virtualization scenario makes it possible to make structural changes in the IT | | |department with the speed that the market actually needs. | | |We can have strong cost reduction, because with a physical structure, we often do not use | | |all of the resources—hardware, software, employees, and so on—at 100 percent.On the other| | |hand, with virtualization we have the opposite case: We use and push the resource | | |utilizat ion as far as possible, and then we add more resources to virtualize. | | |In our example, we can see the individual cost reduction; if we look at it globally, | | |however, the cost reduction is more significant. | | |   | | |   | |

Thursday, August 29, 2019

Post bureaucracy does not constitute an advance on bureaucratic forms Essay - 1

Post bureaucracy does not constitute an advance on bureaucratic forms of organisation. Do you agree with this statement Explain your answer using theory and examples - Essay Example Over time, there has emerged some post bureaucratic tendencies in organizational management. Although there have been a number of transformations in the management system in terms of bureaucratic wellbeing, post bureaucracy constitutes an advance on bureaucratic forms of organization. Weber (2002) derived the theory of rationality to help explain some aspects of human behavior in specific set ups (Weber 2000, p. 35). Being rational has to do with thinking through a decision before implementation. Weber came up with two types of rationality in his theory. The types of rationality coined by Weber were Substantive and instrumental rationalities. Substantive rationality is when the actions of an individual are in tandem with the predominant values inherent in a person (Weber 2000, p. 122). On the other hand, instrumental rationality is when a person decides to use the most appropriate means to achieve an objective. Substantive has all to do with the individual’s well being and no consideration is laid on the means through which satisfaction is derived. Substantive is where the decisions that a person makes are based on values and ethics. The means through which output is achieved in substantive rationality is not a matter of concern. Weber notes that in a bureaucratic system, the outcomes are more critical than any other thing. Substantive was replaced by the formal procedures in the sense that emphasis is laid on technical means through which outcomes are enhanced (Weber 2000, p. 122). Instrumental rationality has all to do with having the best outcomes without considering how it is done. Bureaucratic system demands that the end product must be of high quality without any considering how quality is achieved. It can lead to workers employing dirty tactics or going extra miles to achieve some ends (Weber 2000, p. 123). Max Weber (2000) is synonymous with coining the concept of bureaucracy to a large extent (Weber 2000, p. 13). What

Wednesday, August 28, 2019

Projects, Processes & Systems Essay Example | Topics and Well Written Essays - 2000 words

Projects, Processes & Systems - Essay Example It also deals with motivating and managing all the people involved. The ultimate aim of project management is to complete the assigned project within the agreed time, cost and performance (KNUTSON, Joan and Bitz, Ira, 1991). The key players of a project include the client, the users, the project control groups, the project manager(s) and the stake holders (HEALY, Patrick L., 1997). The client is the person who pays for the project from the beginning till its end. It is the client for whom the project is being conducted. The users are those which will the run the project after the completion. For example, after the completion of a new product facility, those who will be running it, will be its users. These users are required to be considered during the project and some of them should be represented during the project so that they can contribute their skills. The project control group is a committee which usually has a number of representatives from various sections. The contractor is one who conducts the project management task for the client. There stakeholders are all the persons who are affected by the project. The Project Manager is the person who manages the whole project. His ultimate duty is to successfully complete the project as per the requirement of the customer. ... The Project Manager constitutes a team at the start, which should have all the required members for doing various tasks included in the Project. For example, when the state appoints a Project Manager for establishing a fire service in a new town, the Project Manager should have labor for infrastructure construction, finance department to keep check and balance, logistic department to bring necessary materials for construction, administrative department to see who is working to what extent and assigning tasks, engineering persons to design the infrastructure, decide on what vehicles to be bought for the service and IT persons to develop the network for complaint receiving. To constitute the team members and to work smoothly and efficiently on project, project managers need the full support of functional managers. The functional mangers are those which are working on the actual operations of the organization and are appointed for longer period of time. Project managers are appointed fo r specific tasks, after completion of which, their duties are no longer required. Functional managers expect their departments to exist indefinitely and they need resources for full-time while project exist for definite period and needs resources for a temporary period of time (HAYNES, Marion E., 2002, p.3). The importance of collaboration between functional and project managers can be elaborated with the example of expanding an airport services. Project managers might need people from functional managers who can tell the different locations of the airport. He might require info about the idle timing so that he can carry construction work so that flights are

Tuesday, August 27, 2019

European Union Law, Final Referred Course Work Essay

European Union Law, Final Referred Course Work - Essay Example However, Article 230 names the Member States, the Council, the European Parliament and the Commission as privileged applicants, who have the right to attack any act. It further names the Court of Auditors and the European Central Bank as institutions who may invoke Article 230 as a matter of course but only to protect their own prerogative powers. All other persons are termed non-privileged applicants. The focus of this paper is to critically evaluate the Community approach to determining locus standi of individuals as non-privileged applicants against to challenge the validity of Regulations in particular. As mentioned above, the Article 230 method of challenge hinges on the Community act being amenable to review. In the case of Parti Ecologiste ‘Les Verts V. Parliament2 it was held that â€Å"Article 230 (ex173) †¦ makes a direct action available against â€Å"all measures adopted by institutions†¦ which are intended to have legal effects†3. Furthermore, the relevant piece of Community legislation must have legal effects and satisfy the requirement of being a â€Å"reviewable act† to be amenable to challenge under Article 230. For example, in the case of Cimenteries v Commission4 it was reiterated that measures which create legal effects are subject to review under Article 230. Additionally, in the case of Parliament v Council5 it was held that an act must be implemented by one of the Community institutions in order to be amenable to review under Article 230. Moreover, in the case of Commission v BASF6 it was held that â€Å"acts tainted by an irregularity whose gravity is so obvious that it cannot be tolerated by the Community legal order†7 will be subject to review under Article 230. Any party seeking a review under Article 230 must have locus standi and national governments will have privileged application locus standi and can challenge any measures adopted by

Monday, August 26, 2019

Industry Project Assignment Example | Topics and Well Written Essays - 500 words

Industry Project - Assignment Example g, the company experienced exponential growth due to the high demand of their products that had cutting edge technology occupying the largest segment in the market. Recently however, Samsung expects a decline in the demand of their product due to the increased competition brought by more players in the industry selling cheaper smartphones who have comparative technology to Samsung. The things that affect the supply for smartphones is the sales projection of a company for it to be able to deliver profit for its shareholders. For example, Apple and Samsung have profit projections for a certain period that would improve its performance from the previous period delivering profit to its shareholders and also to project a positive image for the company so that its value and shares of stocks will increase. They will in turn stimulate demand in the market through their marketing campaigns so that the available supply will be bought and them realizing their sales objectives. Another would be the discovery and introduction of a breakthrough technology in their products that is not present in competition. For example, if Samsung can make its smartphones wearable just like watch because of its bendability, consumers will be surely be interested to have the new smartphone. Samsung would in turn increase its supply and jack up the price due to the increased demand. The demand for smartphones this product is elastic. It is elastic because the consumption and use of the product can be influenced by certain factors such as competition and price. Smartphones can also be replaced by cheap cellphones without drastically impairing one’s connectivity or by less known brands that have similar features. Concretely, this was evident when Samsung announced that the company expect a lower sales in Q2 of 2014 due to the increasing number of competition and availability of cheaper smartphones and indeed the company posted a poor sales performance (Triggs, 2014). The presence of

Sunday, August 25, 2019

Market analysis in Abu Dhabi Research Paper Example | Topics and Well Written Essays - 1250 words

Market analysis in Abu Dhabi - Research Paper Example Abu Dhabi is the biggest of all seven emirates in UAE as well as the capital of the country. The population of the city is about 1.3 million out of 3.8 million of UAE and also covers the 87% of the entire area. The city has a booming retail real estate market for residential buildings, offices other tourism places. The real estate market condition in the United Arab Emirates is, as a whole, facing a boom. It has the most secure and profitable market in whole Gulf region. Abu Dhabi is currently enjoying real estate investment from all over the world. The Abu Dhabi market possesses number of opportunities in the real state sector. It has been difficult for the authorities to meet the ever rising demand for real estate projects in the city.This paper presents an overview of economy, demographics and real estate of the retail market growth in the UAE region. It primarily illuminates the major retail real estate markets of Abu Dhabi, reflects on existing and future demand and supply, and provides recommendation for stabilization in the sector.UAE came into being as a result of alliance of seven emirates and Abu Dhabi was made the capital of the state. Abu Dhabi has supremacy in almost all fields i.e. economically and geographically etc. Abu Dhabi covers approximately 87% of total UAE area. According to a census that took place in 2005 the official population of UAE was 3.8 million approximately while the Abu Dhabi population was around 1.3 million. 300,000 people were those non-nationals who did not become a part of the census (Emirates: Abu Dhabi-Country Profile). Economy UAE is one of largest oil and gas producing countries of the World. It has 9% of oil reserves and approximately 5% of gas reserves. Abu Dhabi has the predominant share in these reserves i.e. 95% and 92% of oil and gas reserves. Like almost every Middle East country natural resources are the back bone of economy of UAE. The IMF report says that the GDP group of UAE is around 12% in 2005 and expectedly more in near future (Emirates: Abu Dhabi-Country Profile). The government of UAE, however, does not want to rely completely on oil and gas due to the fluctuation in its prices. It has been focusing on minimizing the country's economic reliance on oil and gas exports. With the government efforts and local and foreign investment in real state retail, tourism and industry the 64% of GDP now consists of non oil and gas sector. The government put huge investment and established Abu Dhabi Tourism Authority (ADTA) and that has been handled by the Tourism and Development Investment Company (TDIC) to promote tourism and real estate sector. Hence, the economy is moving towards the right dimension in the whole UAE and especially Abu Dhabi, which is undergoing rapid economic growth due to huge foreign and local investment in the country from banks and financial institutions (Emirates: Abu Dhabi-Country Profile). . Real Estate The current boom in the real state market of the United Arab Emirates took place over the last few years and has made a significant difference to the economy. The ratio of real state was 2.5% of the economy which has reached to10.5% (Walters, Kadragic and Walters 78). The real estate is one of those sectors contributing heavily to the overall economy. This huge investment reflects the government interest in the development of real estate market. The whole Gulf region is showing its keen interest in developing its economy while supporting the real estate sector. Abu Dhabi attracts abounding investment from the region in its real estate market. Al-Futtaim is going to launch project of $9.5 billion. That would take approximately 10 years to be done. The project includes residential, commercial, hotel and several office towers (Woods) REAL ESTATE RETAIL MARKET IN ABU DHABI . Abu Dhabi is a different market than any other market in the region for instance Dubai, Sharjah etc. The city is ideal because of its property market and pricing that also

Saturday, August 24, 2019

Financial Analysis Assignment Example | Topics and Well Written Essays - 500 words - 1

Financial Analysis - Assignment Example The move have been associated with the recent change plan in the company that has forced customers to pay monthly installments of over twenty months other than offering subsidized phones (Zachariadis, 2014). The installment and the contract plan both present an effect of binding the customers to the carriers. Having a huge number of customers floating without an obligation to the company presents a financial risk since the number of sales will go down. Apart from the customers issues the company is also facing financial risks from competitors such as T-mobile US inc., Sprint corp. and Verizon communication Inc. The three competitors present a financial risk to the company as they compete with AT &T for the available market (Summary for AT&T Inc.- Yahoo! Finance, 2014). The graph below is an income statement of the AT & T Inc. the total revenue of the company has registered improvement as per the information of the last three years. Operating income has also declined with 2013 registering the period when the company utilized a lot of capital as operating capital. Diluted EPS indicate the profit per each share. The company recorded high profit per share in the year 2013 as compared to the two different years (Summary for AT&T Inc.- Yahoo! Finance, 2014). The total revenue of the company increased from $127, 434 to $ 132,447 showing a great improvement that was the highest in the past five years. However, the gross profit recorded a decline from $77,288 to $71,836. The company was able to register the highest gross profit in 2013. However, it is the within the same year that the company utilized the highest amount of money $30,447 as operating income. Additionally, in 2013, the company was able to register a high income amount of around $18,249 with a decrease of up to $ 6,224 in the year 2014. The company also recorded a profit per share

Friday, August 23, 2019

Proofread recommendation Essay Example | Topics and Well Written Essays - 1000 words

Proofread recommendation - Essay Example Thus, the normal ordinary high school student who has not yet developed met cognitive skill will see Jaehyeukas one-step above analysis and he is able to be clean in the understanding of what he does. In addition, because of the high degree of concentration and patience, that Jaehyeuk has and his logical reasoning skills and mathematical problem solving ability has provided him with top grades and he has been able to maintain these grades. Because of this, Jaehyeuk would be an excellent candidate to be a college student in the University. A high level of education receive at the school at bipyeongjunhwa() region among Parkjaehyeuk students than showed that anyone else could have academic enthusiasm and sincere efforts for high academic achievement, history, and mathematics. It is important to know how to think critically, have historical context, understand historical or social phenomenon and a distinct view of history based on the national history curriculum, and have a wide range o f knowledge and a lot of dokseoryang (). Korean history, which is organized by the National History Compilation Committee Language Proficiency Test Level 2 (5/10/2010) and Class 1 (08.25.2010) has acquired mathematical conjecture about any object, and the ability to find and prove an ability to excel in math curriculum and math internal problem-solving skills and the application of the problem-solving skills is outstanding. Gyeonggi () English communication skills certification class (11/06/2009), English, Chinese English courses and courses in higher interest acquired, many Chinese in China-related books for extensive reading in many areas, including China's political, cultural and economic attention to lessons and activities have been very actively and aggressively read. We are confident that these points right after college are important in a person’s lifelong research in the field they want to show enough ability in to do well. Autonomous, adaptive, and event activities i n the first year of basic life habits are well-guarded rules of the class, and training activities (04/01/2009 ~ 04/03/2009, balwangsan () members) involved in the natural protective cleanup activities have been very important. Grade 2 states that one should always comply with school regulations and I have been working diligently to maintaining a clean environment on campus. I have been interested to learn the culture and the natural ecology of the Jeju () Island through on-site experiential learning (03/01/2010 - 04/03/2010) and I actively participate in the activities. Third grade is a time when students are educated, well mannered, and they have a young man exercise. As the order practice, Fuyuan was engaged in his career to establish his own identity as a rational thinking, exploring, and on-site learning experience (05/19/2011). One must find development activities in the first year of activities in the 'Kanji -1' water supply was excellent to know the exact sound and meaning o f Chinese characters in Sino literacy classes which I found interesting. Through a discussion of activities in Grade 2 when 'reading Hanmun () discussing wealth, the book was selected for a presentation in front of many people through the process with confidence and hope. The degi (Hwang Sok-yong)' movie 'Peppermint Candy' provided a good personal insight and dismal history to show

Progress Can Kill Essay Example | Topics and Well Written Essays - 750 words

Progress Can Kill - Essay Example I know that it is tempting to assume that we can solve the world’s oil shortage problems by exploiting the territory occupied by this indigenous population. However, the main issue is whether or not we can do this without exploiting the rights and dignity of this indigenous population. Let us first consider the rights and dignity of this indigenous population. They have been occupying this territory for centuries, not ten or thirty years. Mostly in the world, when an individual occupies a home or a piece of land for 12 years without an objection from the true owner, the state recognizes and protects the occupant’s right to claim and use the property absolutely as he or she wishes. Can we honestly deny that this indigenous tribe does not enjoy the same right, continued and unmolested, to occupy their territory? I would take this step further and argue that given the long and continued occupation of it by the indigenous tribe, it is not only our legal, but also our moral responsibility to protect and recognize their right to claim and use that territory absolutely and free of outside influences and intrusions. This is not just a question of the right to occupancy. This is also about the protection of the universal human rights. In particular, this tribe has adapted itself to a particular way of living and preservation consistent with their animistic religious beliefs. As members of the UN we have pledged that no state shall disrespect the religious beliefs of the individual. How then can we justify even asking this tribe to move aside and allow us to exploit their territory for the purpose of looking for oil? Let us consider the Holy City of Mecca. What if we think suddenly that the Holy City of Mecca most likely sits on untapped oil reserves. Could we in good conscience approach Muslims in the holy city and talk to them about the possibility of turning their city upside down for oil exploration purposes? I don’t think that we would even cons ider taking this approach because we respect the right of religious organizations to practice their religion as long as that practice does not involve activity causing harm to others. On the contrary, far from causing harm to others, this indigenous people have preserved the rain forest at the time when concerns about the destruction of the rain forests globally have been a major issue for environmentalists. We should, therefore, be celebrating the fact that this tribe has preserved the rain forest and not think of ways that we can deplete yet another portion of the world’s rain forest. While we are considering the possibility of oil exploration in this particular area, let us also consider the dignity of this tribe. The dignity of indigenous people has been assaulted throughout our history. Colonial and imperial powers have mercilessly uprooted indigenous people, exploited their territories and with the total disregard for their right to self-determination have left them wit hout dignity and without their own system of governance. Unfortunately, history dictates that indigenous people have a long history of exploitation and injustice. Do we want to stop the cycle of exploitation or do we want to re-establish it? The UN International Covenant on Civil and Political Rights informs that we have a duty to protect the right of indigenous population to self-determina

Thursday, August 22, 2019

Family Health Assessment Essay Example for Free

Family Health Assessment Essay The emphasis of Gordon’s functional health patterns concentrates on 11 categories which include: health perception/management, nutritional/metabolic, elimination, activity/exercise, cognitive/perceptual, sleep/rest, self perception/self concept, role/relationship, sexuality/reproductive, coping/stress tolerance, and value/beliefs (Nursing Planet, 2013). These series of questions are effective when accumulating data that can be interpreted and diagnoses can be applied for actual, as well as potential issues. Issues are identified, decisions on interventions, education, and promotion of a realistic, as well as a practical lifestyle (Edelman, Kudzma, Mandle, 2014) can be chosen. Discussion in detail of the interview from the Gouker family assessment follows. They have six daughters. Mr. and Mrs. Gouker have been married for 40 years. Utilizing the 11 functional health patterns by Gordon, a family assessment was completed on the Gouker family. The emphasis of health perception/promotion centers on the individuals’ impression of their wellness and how they govern their health (Edelman, Kudzma, Mandle, 2014). Due to their age, the Gouker family’s health perception presently revolves around their yearly health examinations and eating healthy. Mr. Gouker is 74 years old and Mrs. Gouker is 68. Mr. Gouker (personal communication, March 11, 2014) revealed that only after having experienced weakness did he begin having annual examinations, as he had been healthy his entire life. Mr. Gouker does not take any prescribed medications. Mrs. Gouker participates in yearly examinations and currently has blood work completed every six months due to her chronic diabetes mellitus. Mrs. Gouker (personal communication, March 11, 2014) currently takes daily medications for this condition. Since Mrs. Gouker (personal communication, March 11, 2014) shops for the family, she stated that they only consume chicken and fish, which is broiled, and scarcely eats beef or pork. She also prepares vegetables with the evening meal. Snacks consist of fresh fruits. The primary meal is dinner, which is eaten together. Mr. Gouker (personal communication, March 11, 2014) states that breakfast consists of coffee and rarely has time for lunchtime. Mrs. Gouker (personal communication, March 11, 2014) eats breakfast daily which consists of coffee and toast, whereas lunch consists of a salad. Mrs. Gouker has scheduled dentist visits every six months, whereas Mr. Gouker only schedules dental visits every year. According to Edelman, Kudzma, Mandle (2014), elimination pivots around the expulsion of contents in the bowel and bladder, but also includes the skin. Both Mr. and Mrs. Gouker prefer to drink water and they frequently urinate. Mr. Gouker (personal communication, March 21, 2014) states, that he has multiple bowel movements daily, whereas Mrs. Gouker has daily bowel movements. Mr. and Mrs. Gouker bathe daily. As stated by Edelman, Kudzma, Mandle (2014), activity and exercise concentrates on the patterns pertaining to activity, exercise, recreation, and leisure. Mrs. Gouker is retired and Mr. Gouker owns a business. Mrs. Gouker utilizes the treadmill for walking. Leisure and recreational activities include yearly travel, and attending professional sporting events. The main focus of cognitive and perceptions are patterns seen in regards to cognition, perception, and the senses (Edelman, Kudzma, Mandle, 2014). Mr. Gouker has an Associate’s degree in business administration, whereas Mrs. Gouker graduated high school. When expressing his views on pain management, Mr. Gouker (personal communication, March 11, 2014) stated he rarely experiences pain, but if the situation arises he will take an Aleve. Mrs. Gouker (personal communication, March 11, 2014) expressed that she only takes Aleve for pain or discomfort. Mrs. Gouker finds satisfaction in reading and completing crossword puzzles, whereas Mr. Gouker manages the business. The main concept of sleep and rest centers on patterns which give priority to sleep, rest, and relaxation (Edelman, Kudzma, Mandle, 2014). Mr. Gouker sleeps four to seven hours per night while Mrs. Gouker sleeps seven to eight hours per night. Both Mr. and Mrs. Gouker (personal communication, March 11, 2014) state they unwind by watching their favorite television programs or sitting in their rocking chairs on the porch. According to Edelman, Kudzma, Mandle (2014), the focal point of self perception and self concept is on the persons’ viewpoint of themselves which correlate to their self esteem, their self worth, and body appearance. Mr. Gouker (personal communication, March 11, 2014) believes that he can accomplish anything he so chooses. He believes that whether a person is a success or failure depends upon your state of mind. Mrs. Gouker perceives herself as a kindhearted woman and views herself as a genuine individual who is helpful to those around her. With regards to body image, Mr. Gouker stands five foot nine inches tall and weighs 175 lbs and is aware that he is overweight. Mrs. Gouker is five foot four inches tall and weighs 182 pounds and perceives herself as slovenly. The focal point of the role and relationship patterns centers on the persons role in the family and the relationship they have with the other family members (Edelman, Kudzma, Mandle, 2014). Mrs. Gouker cherishes being a mother and wife. Mr. Gouker (personal communication, March 11, 2014) states that he is blessed. He loves being a father and provider to all his children. Both Mrs. and Mrs. Gouker are content with their personal relationships with family and friends. According to Edelman, Kudzma, Mandle (2014), the patterns of sexuality and reproduction center on the individuals’ satisfaction or dissatisfaction with their sexual style. Mrs. Gouker was modest when speaking of their sexual relationship, yet Mr. Gouker was open. Both parties are content with their sexual relationship and have no complaints concerning sex. The focus of coping and stress tolerance pertains to how the individual detects stress and the techniques utilized when encountering stressful events (Edelman, Zudzma Mandl, 2014). This family has always used communication skills to rectify any problems. Prayer is utilized and their faith that God’s guidance assists them. Edelman, Zudzma Mandle (2014) noted that patterns in relation to values and beliefs focus on spiritual beliefs, values, and goals that direct those choices. The Gouker’s are Lutheran and attend services weekly. Upon interview completion of the Gouker family, two wellness and family diagnoses are: Both are at risk for imbalanced nutrition: more than body requirements since their individual body mass index (BMI) both exceed 20 percent. Both Mr. and Mrs. Gouker are at risk for body images disturbance. Education for the Gouker’s included the impact of exercise and how this will decrease their body mass index. It is evident that nurses impact the lives of those being cared for regardless of the setting. Education is instrumental is assisting patients and their families to make positive changes in promoting a healthier lifestyle. References Edelman, C. , Kudzma, C. Mandle, C. L. (2014). Health Promotion Throughout the Life Span (8 ed. ). : VitalSource Bookshelf. Nursing Plant. (2013). Functional Health Patterns. Retrieved March 11, 2014 from www. nursingplanet. com/theory/functional_health_patterns. html Appendix 1)Health prevention and health management. a. How do you feel about keeping your regular doctor visits? b. What, as an individual, do you do to support your health? 2)Nutritional and metabolic a. Regarding your dental needs, what are your oral habits? b. What are your nutritional practices like in general? c. What sort of foods do you consistently eat? 3)Elimination a. How do you manage your bladder and bowel habits? b. What do you do to take care of your skin? 4)Activity and exercise a. How do you spend your time off from work? b. When participating in leisure interests, how many hours do you devote on a weekly basis? c. What do you do for getaways? 5)Cognitive and perceptual a. How do you manage pain? b. What exercises do you do participate in to improve your memory? 6)Sleep and rest a. As an individual, how do you relax? b. On average, how many hours do you sleep at night and what are your sleeping patterns like? 7 )Self perception and self concept a. What is your prospective on your self image today? . In regards to your body image, how do you view your body image? 8)Role and relationships a. As an individual within your family, what is your position in the family? b. In your current position within your family, what makes you satisfied or dissatisfied? 9)Sexual and reproduction a. With your current sexual relationship, are both individuals satisfied or unsatisfied? 10) Coping and stress tolerance a. How do you handle stress? b. When managing situations that are stressful, what do you do? 11)Value and beliefs a. What is your religious denomination? b. In regards to your religion, what guides you towards your goals?

Wednesday, August 21, 2019

Impact of Feminism on Public Administration

Impact of Feminism on Public Administration Impact of Feminism on Public Administration Literature Review The article is all about the impact of feminism on Public administration. It discusses the feminism and feminist perspective in Public administration as well. It narrates the role of woman in public administration on the basis of challenges, duties and capabilities of woman with respect to public administration. The article also describes the nature of woman and discusses it in depth with the help of different phenomena discussed in the different other classic articles that were relevant to the topic as well. The article gives a better view of role of women in public administration, their management skills, their thinking and decision making abilities and tries to sum up the impact which feminism imparts on public administration. The article has following sections. Literature Review Integration with article from PAR Case Study Women are the greater part of world population. They are taking part in every course of life at equality with the men. In the west women are also involved in public administration as well and doing their responsibilities in a satisfactory manner. It is really important to understand the natural difference that Nature has drawn between the aptitude of men and women. In general women are far much sensitive than the men so it’s really important for the employers who have women employees, because as compared to men women just don’t like to be bossed and given orders. But when it comes to the public administration women have to follow the orders. This leads us to think about the way and mechanism of giving orders. High ups must realize that they should not make feel their subordinates down and should be very careful and professional while issuing orders. This concept becomes more complex when the subordinate is a woman because if a manager or high rank officer makes a woman feel that she is solely bound to his order. She would definitely show some resentment which can be the violation of deadlines, compromising the quality of work or in worst case it can cause resignation of that woman employee. (Follett, 1926) The most important factor with respect to the impact of feminism’s impact on public administration is gender discrimination. According to Maslow’s theory of human motivation, it’s a basic right of an individual to get a job regardless of the gender. But it is quite tragic that if we analyze this situation in a broader perspective, we come to know that apart from some developed countries in the west, there is huge gender discrimination in rest of the world. Even in the west when the women become the part of the system, they have to face a lot of gender discrimination that really affects their performance and also renders their management skills. (MASLOW). Apart from the way of giving orders and gender discrimination another thing that is relevant to impact of the feminism on public administration is the importance of woman as a resource of an organization. Analyzing an institution in terms of its human resource helps the organization to minimize the differences be tween employees and high ups. (McGregor). After discussing the general things that play a vital role in terms of deciding the impact of feminism on public administration, now it’s important to apply these things in a particular environment that is public administration and bureaucracy. (Krislov, 2003). Women can be good administrators if they are assigned the duties which match their capabilities and address all the differences that Nature has drawn between the men and women. In other words feminism can imparts some good impact on the public administration even if the concept of feminism is understood and conceived properly. Integration with article from PAR It’s been quite a while that in the developed world women are given equal chances to contribute in public administration as well. It is a fact that they are doing their responsibilities in an appropriate manner and many of the women are playing major role in the overall governance of their countries as well. West has done a fabulous job in order to empower the women empowering them with the confidence that they can be the part of government as well and can play a major role to better the overall governance of the country as well. But it’s still a need of time that rest of the world also realize this fact and provide equal chances to women in order to prove their management and administrative skills by playing their role in public administration. The world has become a global village and now the mode of governance has also been modified to a greater extent. Most of the developed countries have realized that it’s all about devolution of power and authority in order to better the overall governance. Devolution of power involves a long series of acts but with our perspective the most important one is to give equal rights to women to serve their country. The most common example of empowering the women is to give them chances to be a part of public administration. Inclusion of women in public administration can be a real good for the all other women in the country as it is a fact that women are much more aware of the problems of their gender and it can be useful to take their input. It is really important to make sure the devolution of power in order to better the governance because it is the need of time as world is evolving at a really faster pace. Hence, the role of government becomes very crucial as it has to take some steps in order to empower all the communities of society in some way. One of the most common ways of doing that is to encourage the inclusion of women in public administration. Case Study How gender affects women’s status in public administration? The case study is relevant to all the discussion done in above sections. It is really important to perceive the effects of gender discrimination on the performance of women who are playing their role in public administration in different capacities. Although west has done a remarkable job in terms of perishing the negative effects of gender discrimination but still there can be found a significant number of women complaining about the gender discrimination in public administration. Most of them complained that gender discrimination caused their performance to decrease and eventually they felt retarded. They said that throughout their professional career, they have faced a lot of gender discrimination. This shows that women in the west are also facing the curse of gender discrimination and that too in the public administration that is really crucial for any country and society. It is really important that a workplace should be depolarized and appreciates the both men and women. (Schumacher, 2009) It becomes even more important when it comes to public administration as negative effects of gender discrimination do not only affect the women but eventually they impart bad impact on the whole society as well. Public administration is related to public affairs and all the officials related to this sort of work should be focused only on their work. But when the employees will face issues like gender discrimination, it would be a tragic situation for the whole society. Gender discrimination creates a trust deficit among the women involved in public administration and eventually they are just unable to fulfill their duties in an appropriate manner. Works Cited Follett, M. P. (1926). The Giving of Orders. Krislov, S. (2003). Representative Bureaucracy. M.E Sharpe, Inc. MASLOW, A. H. (n.d.). A THEORY OF HUMAN MOTIVATION. McGregor, D. (n.d.). The Human Side of Enterprise. The Human Side of Enterprise . Schumacher, M. E. (2009). Foundations of Public Administration. Retrieved September 10, 2014, from http://www.aspanet.org: http://www.aspanet.org/public/ASPADocs/PAR/FPA/FPA-DIV-Article.pdf

Tuesday, August 20, 2019

The Blocking of Viber in Saudi Arabia

The Blocking of Viber in Saudi Arabia Mansour Alaithan Ali alakalifa INTRODUCTION What’s Viber ? Viber  is a app for instant messaging  also for Voice over IP  (VoIP) for smart phones  owned by Viber Media. Not only voice messaging but also users able send and receive images, video and audio media messages, Viber was founded by four  Israeli partners and they are Talmon Marco, Igor Megzinik, Sani Maroli and Ofer Smocha. Viber Mediais registered as a Cyprus company in  Las Vegas  and its development centers located in Belarus  and  Israel. The foundeders of the company are Talmon Marco  and Igor Megzinik, who are friends from the  Israel Defense Forces. The company is running from Israel, with lot of the app’s developments outsourced to Belarus in order to lower labor-costs. It was founded in 2010, with the four Israeli co-owner of the company who have each increased their exploitation by more than 30 times on the startups $900 million sale to  Rakuten. What happened? In March Saudi government have warned encrypted messaging services like Viber and others that would be blocked if they don’t provided a means to be monitored. The head manager Marco had refused to provide the requested data to Saudi officials. It was expected that Vibers free voice calls and text messaging service is no longer working in Saudi Arabia is not entirely unexpected. Telecoms regulator of Saudi Arabia had warned them also warned Skype and WhatsApp .they would be blocked if they did not provide the date requested . Saudis and expatriates that lives in Saudi Arabia were prompted by this warning to protest against this move. Others started to censor their messages, in case they were already being monitored. The head manager told BBC that Saudi IPS and mobile operator begun to asking for information about the internal workings of the service a couple of months ago of that time . Circumventing the problem: Marco said Viber had faced the same problem of blocking the app in other county. There, he said he believed the motive was political, but in Saudi Arabia it was unclear whether commercial interests might also be at stake. Marco ( the head of the messaging application) Viber has said people in Saudi Arabia have had basic freedoms taken away, after his service was blocked there. So we face here a freedom of speech problem . The head manager Marco told the BBC he did not know the reason for the move, but that Viber would be restored soon. So this problem rises couple of question, like what is the meaning of freedom of speech, what are the limits and law in Saudi Arabia, and what the ethical issue did Viber rises by not providing information. what is the meaning of freedom of speech Freedom of speechis the civil right to connect ones opinions and ideas. The word freedom of expressionis occasionally used synonymously, but contains any act of seeking, getting and telling information or ideas, nevertheless the medium used. Rules restrict speech with varying limits. Common limits on speech relate to slander, libel,  obscenity,  sedition,  pornography, incitement,  fighting words,  classified information,  hate speech,  copyright violation,  trade secrets,  non-disclosure agreements,  right to be forgotten,  right to privacy, public security,  public nuisance,  public order, campaign finance reform  and  oppression. Whether these limits can be defensible under the harmbe contingent upon whether manipulating a third partys opinions or activities harmfully to the second party founds such harm or not. The words offense principle is also usedto grow the range of free speech limits to forbid forms of expression where they are measured offensive to people, different interest groups or persons. For example, freedom of speech is limited in many rules to broadly different grades bysystems, religiousor  incitement to ethnic or racial hatredrules. Privacy Privacy is the gift of an individual or group to separate themselves, or information about themselves, and thereby definite themselves selectively. The limits and content of what is measured private vary among cultures and individuals, but share common themes. When something is private to a person, it usually means that something is integrally special or sensitive to them. The domain of privacy partly overlays security, which can include the ideas of appropriate use, as well as defense of information. Privacy may also take the procedure of bodily integrity. The right not to be subjected to illegal invasion of privacy by the government, businesses or individuals is part of many countries privacy laws, and in some cases, compositions. Almost all countries have laws which in some way bound privacy. An example of this would be law concerning assessment, which normally require the distribution of information about personal income or earnings. In some countries individual privacy may clash with freedom of speech laws and some laws may need public expose of information which would be measured private in other countries and cultures. Privacy may be willingly sacrificed, normally in exchange for professed benefits and very often with exact dangers and losses, while this is a very strategic view of human relations. In the business world, a person may agree personal details (frequently for advertising purposes) in order to bet on winning a prize. Private information which is voluntarily shared but then stolen or misused can chief to identity theft. what are the limits and law in Saudi Arabia Human rights in Saudi Arabia are proposed to be created on the Hanbali Islamic religious laws under complete rule of the Saudi royal family. Saudi Arabia has a Counter-Radicalization Program the drive of which is to fight the spread and appeal of intemperate beliefs among the general populous and to impart the true values of the Islamic faith, such as tolerance and moderation. This tolerance and control has been termed into problem by The Baltimore Sun, based on the reports from Amnesty International regarding Raif Badawi. Speech, the press and other methods of communicative media, containing television and radio broadcasting and Internet reception, are actively censored by the government to prevent political opposition and anything deemed, by the government, to be offensive to the Wahhabi culture or Islamic morality. In 2008, a noticeable Saudi blogger and reformist Fouad al-Farhan was caged for posting comments online that were dangerous of Saudi business, religious and media figures, signifying a move by the government to step up its censorship polices of the Internet within its limits. Online social media has progressively come under government search for dealing with the forbidden topics. In 2010 a Saudi man was punished and given jail time for his sexually suggestive YouTube video making. That same year another man was also caged and ordered to pay a fine for arrogant about his sex life on television. And there is a lot of other examples happened with similar problems. It show that the low in Saudi Arabia does not tolerate any action that against the religion or the security of the country in anyway and allowing a free call like Viber and other that share tons of information without being monitor by the government is can cause an infringement of the rules in Saudi Arabia . That’s add a pros to the Saudi Arabia side that they have a right to ask for information. It’s the country rights to track down and search for crimes and protect the religions lows. But still one problem is the privacy of the people and that’s a pros in Viber side. So how this issue is unethical to privacy and what are the limits and the concept of privacy in Saudi Arabia Privacy in Saudi Arabia Data Safety under Shariah Values Shariah ethics protect each individual’s right to privacy and forbid any assaults thereon. In Shariah principles, revelation of secrets is forbidden except inter alia where the owner of the relevant secret agrees to such confession or if the public attention requires so. The Holy Qu’ran and the Sunnah do not specify a consequence for revelation of secrets; however, as clarified above, such release may be punishable by a value that a judge, in his discretion, deems right and fair. Such consequence may include a fine, imprisonment or scarcity of certain rights such as suspension of a practicing license. Data Protection under Saudi Arabian Law In general, there is no exact data protection law in KSA. Therefore, in the absence of specific necessities on data protection, Saudi Arabian courts and adjudicatory bodies will understand data privacy abuses under general Shariah principles, which are, as described above, often sent in general terms and afford courts and adjudicatory bodies huge discretion. We understand, however, that a new individual data protection law is under review by the Shura Council Discussions and Recommendations The Saudi government should have the right to protect its people and the whole system. Meanwhile the Viber wants to give the privacy to its user which is what people needs. Saudi Arabia follows the Shariah which proved the privacy to people , and that why it should and not block it just to monitor the users private message in KSA , and by return it and unblock the service , they’ve done the right thing . Conclusions Saudi Arabia tried to provide the security to people but did not puts in count the other basic fundamental right which is providing privacy to people. References: http://www.bbc.com/news/world-middle-east-22806848 http://en.wikipedia.org/wiki/Viber#Company http://en.wikipedia.org/wiki/Human_rights_in_Saudi_Arabia#Freedom_of_press_and_communication Data Protection in the Kingdom of Saudi Arabia: A Primer Noor Al-Fawzan and Omar Elsayed