Wednesday, August 26, 2020

Learning Organisations

Learning Organizations Moving towards a learning association is something done BY individuals, not something done TO individuals or FOR individuals by another person. In this way, the job of HR must be in empowering, encouraging, and supporting a move towards learning associations. HR can never achieve this themselves. At that point, if administrators need to move towards a learning association, they should guide their working units to do as such, and direct HR to move into a strong job. In the event that its the opposite way around, where HR gets the obligation, it never works. Information the executives (KM) any training or procedure of making, securing, catching, sharing and utilizing information, any place it lives, to improve learning and execution in associations (Scarborough 1999). Information the executives includes changing over information sources by ordering related data at that point coursing to make the data to occur. Not all data is information or all information is significant. As indicated by Blackler (1995), information is multifaceted and perplexing, understood and express, physical and mental, verbal and encoded. He additionally arranges information in four as: implanted (mechanical group), enculturel (Values, convictions aggregate), encapsulated (reasonable information individual), and grasped (hypothetical getting person). Difference on Blackler, Nonaka (1991) recommends that information could be either individual or group, can't be both. One more contention originates from Scarborough and Carter (2000). They accept that information shows up from the aggregate understanding and it is shared by individual from the gathering. Information likewise is the key element of items and administrations. Along these lines the distinction among the associations thoroughly relies upon the level to which data can be gotten and changed over into information. At the point when it is the subject of information, individuals primarily think about documentation or classifying sort of information. While that express information is basic unsaid information is much progressively fundamental as it includes an incentive for upper hand of associations. Unsaid information is unconstrained, logical, has a major association with experience, documentation can't be applied. It is accepted that inferred information speak to huge level of information on an association. In other saying, Nonaka (1991) clarified that the information is either unequivocal or unsaid. Express information is accessible, recorded data. It is kept in databases, and it very well may be organized, though unsaid information is in people groups minds. It is difficult to lucid and it gains in close to home understanding. New information begins with an individual Nonaka accepts. Unsaid information needs to venture out starting with one individual then onto the next. The principle troubl e in the making of new information is that welcoming the implicit information on a superficial level and the trouble is that it expects understanding to do as such. Information the executives is tied in with getting the important information from individuals, who have it, to individuals, who need it to build up the authoritative effectiveness. As associations are contending in data age, information is the most significant resource in the opposition field more than physical and monetary resources. Another issue is that culture of association might be hindering the information sharing. Open societies will urged individuals to share their thoughts and information. Information the executives is regarding the matter of individuals. It straight associates with people groups information and screens how the information could bolster hierarchical objective. It additionally utilizes the most significant data which is more concentration and important. There isn't sure guideline which would be hard to change. KM is regularly modifies the information and checks its common sense so as to see its helpfulness. It is by and large have rousing element on administrators to guarantee that they are cooperating to arrive at the authoritative targets. The accentuations on information have brought new position lines, for example, information laborers. There are laborers who are called information laborers. Drucker (1993) portrays them as people who have significant level of training, aptitudes and capacity to apply, so as to take care of issues. Information laborers make the information and are key players in spreading it. Tampoe (1993) features four center inspirations for information laborers. Initial one is self-awareness; the open doors for people to understand their possibilities. Second one is word related independence; a workplace where information laborers can accomplish the undertaking given to them. Third one is task accomplishment that a feeling of accomplishment from creating works that is of high caliber and the last one is cash reward. Salary is only an award for their commitment to corporate achievement. Human Research can make an incredible commitment to information the executives as procedure of spreading and sharing information start among individuals. The significant job HR has here to ensure those associations have the scholarly capital they need. The job of HR in information the board can be recorded as; make open culture, significance of which will be sharing information; make an environment where trust is the issue; guaranteeing that exercises where individuals can share information individual to-individual premise, for example, workshops, courses, and so forth; rousing individuals by remunerating them when there is information sharing; take care of the laborers who contribute information sharing by giving assets lastly it is essential to ranking directors ought to be named for the information the executives to empower them for empowering their staff for information sharing. HR has a significant job on progress of the information based collaboration. The significant point of associations is to accomplish the upper hand by creating and effectively actualizing the information. HRs job here is to urge the executives to create reason which will suit to hierarchical point. HR has likewise commitment with KM by suggesting on the structure of procedure based associations. These sorts of associations are basically organizing, cross-useful, venture groups or so where sharing information is vital. HR commitment on improving KM is additionally significant. HR offers guidance on the best way to keep the skilful and skilled individuals who are too significant information sharing society (Armstrong 2008). A few information the executives models and systems have been finished. From the above model it very well may be comprehended that there is huge and significant association between information the executives and hierarchical learning, framework and innovation, culture and procedure. Information the executives can't be performed without learning in associations. There are numerous divisions in hierarchical learning, yet there is no single structure which has effectively summed up the assortment of its contributions. Learning association has a lot more extensive and more develop than association learning just as information the executives. Learning association will be clarified in detail in later on. A complex versatile framework (CAS) comprises of countless operators, every one of which carries on as indicated by some arrangement of rules. There rules require the operators to simply their conduct to that of different specialists (Stacey, 2003). In other saying, operators work and modify themselves as per one another. A few specialists depict CAS as the following development farther than learning association. Most organizations are from the beginning of time there are a few models for business which utilized a few arranging exercises that none of them worked. To have the option to escape from this terrible predetermination now organizations are looking of information the executives, to make arranging dynamic and agreeable to the continuous globalization. However this isn't in every case enough to adapt up to quick changing precarious world. Associations must alter themselves to progressing change condition. This circumstance made associations to study complex versatile frameworks and its appropriateness to associations. Additionally in continuous quick economy, nature is in the hover of progress. These regular enhancements make disarray and confusion. Some tumult is acknowledged so as to ensure that frameworks are versatile guaranteeing long haul endurance. Business world is a lot of ready to adjust CAS. Regularly there are new anecdotes about fruitful organizations and CAS. Wal-Mart is a generally excellent model for it. Retailers of Wal-Mart presently utilize brilliant labels to follow stock things. These keen labels, which are called Radio Frequency Identification RFID) rely upon satellites to catch the development of stock things anyplace whenever. What happens is that shopping baskets show things and sum as client put them into the truck. Criticism is significant for all things considered for learning associations. It is to deal with the complex versatile framework. CAS requires two types of input which are certain and negative criticism. Negative input is if change happens the response is to fix the course of the change and keep up the general situation though positive criticism proceeding with changes. Associations adjust CAS since it gives the order to catch up the work. Butterfly impact for instance is to show that little changes can have enormous impacts. Associations need to adjust CAS so as to adjust into the serious universe of business http://www.exinfm.com/board/complex_adaptive_systems.htm Mayhem hypothesis communicates the exhibition of certain unique frameworks. The frameworks create with time and the dynamic could be delicate to initially state which alludes to butterfly impact. The single method to accumulate the advantages of confusion hypothesis in hierarchical advancement is to adjust the edge of bedlam. With edge of disarray, associations need to discover new and gainful ways, adjust new showcasing models to make due in the opposition. For these learning associations, aircraft industry is a genuine model, especially Southwest Airlines. They not exclusively did changes to endure but since wealthy too which they succeeded well overall. Then again associations which couldnt adapt or find cha

Saturday, August 22, 2020

Creatine Has Been Around Forever Because It Is In Everything That We E

Creatine has been around always on the grounds that it is in everything that we eat, for example, steak, chicken, and fish. It has been around in supplement structure since the mid 90's. Different expert, secondary school and university competitors in the United States and everywhere throughout the world use Creatine. Some large names in sports that are Creatine clients incorporate any semblance of Shannon Sharpe of the Denver Broncos. (Behind the Lines: Espn). Others are Pete Sampras and the whole University of Nebraska Football Team. (http://www.espn.go.com/tennis/usopen99/news/1999/0907/44778.html). Just as those three models, others that utilization Creatine are seventy five percent of the Denver Broncos and 60% of all significant alliance baseball players, including Mark McGuire and Brady Anderson. Muscle heads far and wide additionally utilize the enhancement since it has no demonstrated side effects on the off chance that it is utilized appropriately. (Force Supplements: http: //www.powersupplements.com/creatine.html). Creatine is an exacerbate that can be made in our bodies or taken as a dietary enhancement. The proper name for Creatine is methyl guanidine-acidic corrosive. Creatine is comprised of three amino acids, Arginine, Glycine, and Methionine. The liver can consolidate the three and make Creatine. Creatine works in view of a compound in our bodies called ATP. ATP is a vitality containing compound. The most significant thing about ATP is that the body can get vitality rapidly from an ATP response. At the point when the ATP is separated into ADP it discharges the vitality that empower your muscles to contract. Presently since after this response the ADP is left futile. This is the place the Creatine comes in. The Creatine Phosphate is utilized to change over the futile ADP into the vitality source ATP. At the point when you put more ATP in your muscles that implies you have more vitality in your muscles. It has been said that Creatine taken by youthful competitors could be perilous over the long haul. The issue with these allegations is that they can not be demonstrated in light of the fact that there is no drawn out research on the enhancement. The media has continually named Creatine as a possibly risky enhancement. A few instances of this media slamming are as per the following. In December of 98 two grapplers passed on of drying out. Creatine was continually accused for the passings of these two university grapplers since it had been accounted for that the two had been Creatine clients for the greater part of their wrestling professions. While the case is still under scrutiny it is additionally a reality that the two turned out to be in elastic suits and hadn't eaten in days to cut weight which could very well of caused their demises. (Behind the Lines: ESPN). Different wounds that are being accused on Creatine incorporate the rash of wounds at the current year's U.S. Open. These inquiries were opened in the tennis world when the main player on the planet, Pete Sampras was sidelined and seven men's draw matches finished early. (http://www.espn.go.com/tennis/usopen99/news/1999/0907/44778.html) The explanation behind all the media publicity about the Creatine supplement is the absence of information about it. One actuality that the vast majority of individuals won't know is that Creatine is in your body despite the fact that you have never taken the enhancement. Creatine is in all that you eat from meat to chicken to angle. The main thing the enhancement does is placed amplified sums into your framework. (Beam Sahelian: All about Creatine). Creatine comes in two structures fluid and powder. The powder structure must be blended in with a fluid, for example, water or squeeze. The fluid structure shouldn't be blended in with anything at all and comes in flavors. The best of the two in late examinations has the fluid structure in front of the powder. During the initial five days of utilization you should experience a stacking period. The stacking time frame is the point at which you take three or four dosages per day with a great deal of water. With the fluid structure anyway none of that is fundamental on account of the way that it is a fluid the enhancement gets to your blood quicker. After the stacking time frame is over you just need to take Creatine once every day a 30 minutes before you work out or lift and drink a ton of water while utilizing it. Creatine works extraordinary while working out or during training however it has

Friday, August 21, 2020

Dietary Precautions While Taking MAOIs

Dietary Precautions While Taking MAOIs Panic Disorder Treatment Print Dietary Precautions While Taking MAOIs By Sheryl Ankrom linkedin Sheryl Ankrom is a clinical professional counselor and nationally certified clinical mental health counselor specializing in anxiety disorders. Learn about our editorial policy Sheryl Ankrom Reviewed by Reviewed by Amy Morin, LCSW on August 31, 2019 facebook twitter instagram Amy Morin, LCSW, is a psychotherapist, author of the bestselling book 13 Things Mentally Strong People Dont Do, and a highly sought-after speaker. Learn about our Wellness Board Amy Morin, LCSW Updated on November 25, 2019 Piga Catalano s.n.c./Getty Images More in Panic Disorder Treatment Symptoms Diagnosis Coping Related Conditions In This Article Table of Contents Expand How MAOIs Work Reason for Food Restrictions Foods to Avoid Other Dietary Considerations Symptoms/Hypertensive Crisis Plan Ahead View All Back To Top Though not nearly as common as they once were, monoamine oxidase inhibitors (MAOIs) are still sometimes prescribed to treat depression, as well as off-label use for Parkinsons disease?? and anxiety disorders like panic disorder, social anxiety disorder, and post-traumatic stress disorder (PTSD).?? No matter what condition you may be taking these medications for, there are certain high-protein and aged foods that you should avoid in order to prevent harmful spikes in your blood pressure. How MAOIs Work Many people dealing with  panic disorder  are prescribed medications to treat anxiety,  panic attacks, and other panic-related symptoms. Antidepressant medications may sound like theyre only designed to treat depression, but  antidepressants  have increasingly been used to help alleviate the symptoms of panic disorder and other anxiety disorders.?? First  available to U.S. consumers in the 1950s, MAOIs were one of the earliest antidepressants prescribed. MAOIs work to impact  different  neurotransmitters, or naturally  occurring substances, in the brain that regulate various body functions. In particular, MAOIs are thought to affect the neurotransmitters of serotonin, norepinephrine, and dopamine. These are associated with the regulation of your mood, sleep, energy, and motivation and theyre also responsible for balancing the  fight-or-flight response,  which is linked to how you respond to stress and anxiety.?? These days, there are often more effective medications available that have fewer side effects, so MAOIs are usually reserved for cases when other medications havent done the job. Theyre a good choice for certain people, however. Common MAOIs include: Nardil (phenelzine)Parnate (tranylcypromine)Marplan (isocarboxazid)Emsam (selegiline) Reason for Food Restrictions Tyramine is a compound thats found in certain foods, beverages, and other substances and has an effect on your blood pressure. Tyramine is regulated by the  MAO  enzyme, which helps break it down. MAOIs work by restricting the MAO enzyme, which usually results in reducing the symptoms of depression and anxiety. However, when the MAO enzyme is inhibited, such as when youre taking an  MAOI, tyramine can reach dangerously high levels, causing your blood vessels to narrow and resulting in critically high blood pressure.?? If youre taking an MAOI, youll need to avoid foods and beverages that are high in tyramine to prevent potentially fatal blood pressure spikes that can land you in the emergency room. Foods to Avoid Protein-rich foods contain higher amounts of tyramine. Additionally, tyramine content rises in these foods as they age.  There are a few foods and beverages that are high in tyramine that you should avoid while taking an MAOI,?? including: Meat Products: Foods to avoid include  beef liver,  chicken liver,  fermented sausages like pepperoni and salami, bacon, hot dogs, corned beef, and luncheon meats.Fish Products: Stay away from  caviar,  cured fish,  dried or pickled herring, and anything that contains  shrimp paste.Milk Products: Aged and mature cheeses and other dairy products like sour cream and  yogurt are on the list of foods to avoid. You can have cottage cheese, processed cheese like American, cream cheese, ricotta, and part-skim mozzarella.Fruits and Vegetables: High-protein produce is also a concern. This includes  overripe fruits and avocados, as well as banana peels (not the bananas themselves). Also, try not to eat fava beans, Italian green beans, or snow peas. Its best to stay away from  sauerkraut, tofu, pickles, and  canned figs as well.Alcohol:  Certain fermented alcoholic beverages should be left out of your diet. This includes red wines and Chianti, vermouth, and sherry. A beer that contains yeast sh ould also be avoided, particularly home-brewed or tap beer.Yeast-Containing Foods: Its recommended that you avoid foods that contain  concentrated yeast products and  brewers yeast. Included in this group are items like miso, teriyaki, fermented tofu or bean curd, and soy sauce.Combinations: Snacks or meals that are made with any of these foods also need to be avoided. For example, you shouldnt eat foods that contain cheese such as pizza or lasagna, or foods that contain soy sauce like stir-fry. Youll also need to avoid high tyramine foods and beverages for two to four weeks after you go off of an MAOI. Your doctor will give you specific instructions. Other Dietary Considerations In foods that contain tyramine, the level increases even more during the spoiling or decay process. Its important that you eat only fresh and freshly cooked foods and use proper food safety practices, such as:?? Check packaged foods for freshness and dont consume products beyond the freshness date.Cook all foods to the proper temperature.Maintain cold foods at the proper temperature.Dont refreeze foods that have been thawed.Avoid leftovers, even if they have been refrigerated.Consume cooked foods promptly, making sure proper food temperature is maintained. Keep in mind that heat doesnt decrease tyramine, so cooking or heating up food thats high in tyramine wont make any difference. Symptoms of Hypertensive Crisis When your tyramine level starts to increase, you may notice symptoms that your blood pressure is quickly rising. When this happens, its an emergency situation called a hypertensive crisis. Symptoms include:?? Headache, which will likely be severeNauseaVomitingConfusionDisturbances in your visionFast or irregular heart ratePain in your chest that may be accompanied by shortness of breathSweatingNosebleedsSevere anxietyFainting If you notice any of the symptoms of a hypertensive crisis, and especially if you know you ate food thats high in tyramine, call your doctor or 911, or have someone take you to the emergency room. Plan Ahead In the event that your doctor prescribes an MAOI for you, talk to him or her about a complete list of foods and alcohol that you need to avoid. You may also need to avoid certain medications, whether over-the-counter or prescription, so ask about this too. Its also best to make a plan with your doctor about what to do in the event that you have a hypertensive crisis so you know exactly what to do.

Dietary Precautions While Taking MAOIs

Dietary Precautions While Taking MAOIs Panic Disorder Treatment Print Dietary Precautions While Taking MAOIs By Sheryl Ankrom linkedin Sheryl Ankrom is a clinical professional counselor and nationally certified clinical mental health counselor specializing in anxiety disorders. Learn about our editorial policy Sheryl Ankrom Reviewed by Reviewed by Amy Morin, LCSW on August 31, 2019 facebook twitter instagram Amy Morin, LCSW, is a psychotherapist, author of the bestselling book 13 Things Mentally Strong People Dont Do, and a highly sought-after speaker. Learn about our Wellness Board Amy Morin, LCSW Updated on November 25, 2019 Piga Catalano s.n.c./Getty Images More in Panic Disorder Treatment Symptoms Diagnosis Coping Related Conditions In This Article Table of Contents Expand How MAOIs Work Reason for Food Restrictions Foods to Avoid Other Dietary Considerations Symptoms/Hypertensive Crisis Plan Ahead View All Back To Top Though not nearly as common as they once were, monoamine oxidase inhibitors (MAOIs) are still sometimes prescribed to treat depression, as well as off-label use for Parkinsons disease?? and anxiety disorders like panic disorder, social anxiety disorder, and post-traumatic stress disorder (PTSD).?? No matter what condition you may be taking these medications for, there are certain high-protein and aged foods that you should avoid in order to prevent harmful spikes in your blood pressure. How MAOIs Work Many people dealing with  panic disorder  are prescribed medications to treat anxiety,  panic attacks, and other panic-related symptoms. Antidepressant medications may sound like theyre only designed to treat depression, but  antidepressants  have increasingly been used to help alleviate the symptoms of panic disorder and other anxiety disorders.?? First  available to U.S. consumers in the 1950s, MAOIs were one of the earliest antidepressants prescribed. MAOIs work to impact  different  neurotransmitters, or naturally  occurring substances, in the brain that regulate various body functions. In particular, MAOIs are thought to affect the neurotransmitters of serotonin, norepinephrine, and dopamine. These are associated with the regulation of your mood, sleep, energy, and motivation and theyre also responsible for balancing the  fight-or-flight response,  which is linked to how you respond to stress and anxiety.?? These days, there are often more effective medications available that have fewer side effects, so MAOIs are usually reserved for cases when other medications havent done the job. Theyre a good choice for certain people, however. Common MAOIs include: Nardil (phenelzine)Parnate (tranylcypromine)Marplan (isocarboxazid)Emsam (selegiline) Reason for Food Restrictions Tyramine is a compound thats found in certain foods, beverages, and other substances and has an effect on your blood pressure. Tyramine is regulated by the  MAO  enzyme, which helps break it down. MAOIs work by restricting the MAO enzyme, which usually results in reducing the symptoms of depression and anxiety. However, when the MAO enzyme is inhibited, such as when youre taking an  MAOI, tyramine can reach dangerously high levels, causing your blood vessels to narrow and resulting in critically high blood pressure.?? If youre taking an MAOI, youll need to avoid foods and beverages that are high in tyramine to prevent potentially fatal blood pressure spikes that can land you in the emergency room. Foods to Avoid Protein-rich foods contain higher amounts of tyramine. Additionally, tyramine content rises in these foods as they age.  There are a few foods and beverages that are high in tyramine that you should avoid while taking an MAOI,?? including: Meat Products: Foods to avoid include  beef liver,  chicken liver,  fermented sausages like pepperoni and salami, bacon, hot dogs, corned beef, and luncheon meats.Fish Products: Stay away from  caviar,  cured fish,  dried or pickled herring, and anything that contains  shrimp paste.Milk Products: Aged and mature cheeses and other dairy products like sour cream and  yogurt are on the list of foods to avoid. You can have cottage cheese, processed cheese like American, cream cheese, ricotta, and part-skim mozzarella.Fruits and Vegetables: High-protein produce is also a concern. This includes  overripe fruits and avocados, as well as banana peels (not the bananas themselves). Also, try not to eat fava beans, Italian green beans, or snow peas. Its best to stay away from  sauerkraut, tofu, pickles, and  canned figs as well.Alcohol:  Certain fermented alcoholic beverages should be left out of your diet. This includes red wines and Chianti, vermouth, and sherry. A beer that contains yeast sh ould also be avoided, particularly home-brewed or tap beer.Yeast-Containing Foods: Its recommended that you avoid foods that contain  concentrated yeast products and  brewers yeast. Included in this group are items like miso, teriyaki, fermented tofu or bean curd, and soy sauce.Combinations: Snacks or meals that are made with any of these foods also need to be avoided. For example, you shouldnt eat foods that contain cheese such as pizza or lasagna, or foods that contain soy sauce like stir-fry. Youll also need to avoid high tyramine foods and beverages for two to four weeks after you go off of an MAOI. Your doctor will give you specific instructions. Other Dietary Considerations In foods that contain tyramine, the level increases even more during the spoiling or decay process. Its important that you eat only fresh and freshly cooked foods and use proper food safety practices, such as:?? Check packaged foods for freshness and dont consume products beyond the freshness date.Cook all foods to the proper temperature.Maintain cold foods at the proper temperature.Dont refreeze foods that have been thawed.Avoid leftovers, even if they have been refrigerated.Consume cooked foods promptly, making sure proper food temperature is maintained. Keep in mind that heat doesnt decrease tyramine, so cooking or heating up food thats high in tyramine wont make any difference. Symptoms of Hypertensive Crisis When your tyramine level starts to increase, you may notice symptoms that your blood pressure is quickly rising. When this happens, its an emergency situation called a hypertensive crisis. Symptoms include:?? Headache, which will likely be severeNauseaVomitingConfusionDisturbances in your visionFast or irregular heart ratePain in your chest that may be accompanied by shortness of breathSweatingNosebleedsSevere anxietyFainting If you notice any of the symptoms of a hypertensive crisis, and especially if you know you ate food thats high in tyramine, call your doctor or 911, or have someone take you to the emergency room. Plan Ahead In the event that your doctor prescribes an MAOI for you, talk to him or her about a complete list of foods and alcohol that you need to avoid. You may also need to avoid certain medications, whether over-the-counter or prescription, so ask about this too. Its also best to make a plan with your doctor about what to do in the event that you have a hypertensive crisis so you know exactly what to do.

Wednesday, May 13, 2020

The Growth Of Trade Between Africa - 1037 Words

The growth of trade between Africa, Asia and Europe influenced a very important religion. The location of the Islamic world was ideal for trade, it lay between the Mediterranean Sea and the Indian Ocean. Muslims traveled by land and sea, creating a network of trade. A Muslim scholar named Ibn Battuta traveled around Europe, Africa and Asia for about 7 years. Ibn Battuta traveled all around West Africa, Europe and Asia. The goods they traded were silk, paper, dishes, spices, gems and coconuts. By A.D. 1000, Islam had the world’s largest cities outside of China. One of the biggest trade networks ever recorded is the Gold-Salt trade. There are 3 stages to the spread of Islam in West Africa; containment, mixing, and reform. Most of the†¦show more content†¦The Trans-Saharan caravan routes began in North Africa along the Northwestern border of the Sahara. In 1352, a Muslim named Ibn Battuta crossed the Sahara with a trade caravan. Battuta’s caravan began at the Oasis city of Sijilmasa, on the northern edge of the Sahara in the foothills of the Atlas Mountains. Battuta stayed in the Sijilmasa for a few months, waiting for the rainy season to end. When the Oasis’s were full, the traders set out. They traveled from Oasis to Oasis. Walking across the desert was dangerous, one time during the trip the traders could not find water so they slaughtered there camels and drank there water. The caravan stopped at Taghaza, a village where salt mines were located. They took on a load of salt. There entire journey took about 2 months (Frey, History Alive). The traders used to just trade between settlements when trade was hard. After a while the traders gained new methods of travel and this helped them carry more supplies across the Sahara. The first traders traded Yams, Mahogany and Grains. The new ones traded Silk, Paper, Dishes, Spices, Gems and Coconuts. By A.D. 1000, Islam had the world’s largest cities outside of China. One of the most famous cities is Timbuktu. â€Å"Timbuktu is one of the oldest cities in the Islamic world to have more than 1 universities† (afrolegends.com). Sijilmasa is one of the

Wednesday, May 6, 2020

An Introduction to the Im Profession and Ethics Paper Free Essays

string(39) " take control of an affected computer\." De La Salle University – Manila An Introduction to the IM Profession and Ethics Paper Presented to The Faculty of the College of Computer Studies De La University – Manila In Partial Fulfillment Of the Requirements for the Degree of Bachelor of Science of Information Systems By: Changcoco, Amos Dimla, Ysabel Nicole Ramchand, Pavan Tanchuling, Bianca Denise Tibayan, Jan Michael 1. 0 COMPUTER AND INTERNET CRIME 1. 1 Types of Exploits 1. We will write a custom essay sample on An Introduction to the Im Profession and Ethics Paper or any similar topic only for you Order Now 1. 1Virus It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files. The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails. An example of a computer virus would be the Pikachu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region. The virus was an email titled, â€Å"Pikachu Pokemon† with the message, â€Å"Pikachu is your friend. † The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokemon, with the message, â€Å"Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND. † The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser. The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user. 1. 1. 2Worm A worm is a malicious code that is used for bringing down the computer system. A worm does not infect files, however, it monopolies the computer’s CPU and operating system and is capable of deleting data and programs. It infects a computer by finding vulnerability in an application or operating system. A worm is self-replicating and uses a network to replicate itself to other computer. It does not rely on human interaction for spreading to other computers. An example would be the Morris Worm or also known as the Great Worm. Created by a Cornell University student named Robert Tappan Morris in the year 1968, the Morris Worm consisted of 99 lines of code. Robert Morris wanted to know how big the Internet was and made the worm to find the answer. It is noted that the creator did not have malicious intent in making this worm; however, the worm infected immense amounts of stability problems that made many systems unusable. The damage was over 6,000 infected UNIX machines which cost between $10,000,000 and $100,000,000. This example is an ethical dilemma because the creator did not have evil intentions in making the worm but did have bad effects on most people in America. This dilemma would be ethical based on the psychological egoism theory because Robert Morris acted on his selfish motive whether he should or not, which made him moral. Based on the hedonism theory, it was ethical of Morris because he was only doing his duty without knowing that his actions would bring upon negative effects. 1. 1. 3Trojan Horse Named after the Trojan horse from Troy which was used to infiltrate the enemy’s territory through a disguise, the Trojan horse is disguised as something else (such as a program or file) but is actually a malicious code or may contain malicious code. Similar to viruses, a Trojan horse is executed when the file with the virus is opened or the program with the malicious code is executed also. A Trojan horse can do from light damages such as changing the desktop and the like, to threatening damage, such as deleting files, stealing data, or activating and spreading other malware, to the victim’s software. Trojan horses are also used to create a ‘back door’ in the operating system so that the hackers can access the system. However, the Trojan horse cannot duplicate itself nor it can self-replicate. It would need the user to spread to other computers. An example of a Trojan horse would be from the pirated version of Apple’s suite of software, iWork. iServices was the Trojan horse part of the pirated version of iWork, which would signal the hackers that the Mac is infected and the hacker has access to the system. This is an ethical dilemma because the people who buy pirated software such as the iWork do not know that there is a Trojan horse in the software. It was unethical of the sellers to place a Trojan horse in the software without the consent of their customers’ because deontology theory states that it was not the duty of the vendors to hack into the systems of their customers in the first place. Another reason why it was unethical because of the theory of altruism because the interest of others was not thought about since many people will suffer due to the actions of the vendors. This is another reason why it is unethical, because of the utilitarianism, which is consequences-based. Lastly, the social contract theory states that the actions of the vendors were unethical because it is against the law to hack and infiltrate private property. Logic bomb is a type of Trojan horse that is triggered only by a series of specific events such as a specific sequence of keystrokes or a change in a file. 1. 1. 4Botnets A botnet is a network of infected computers that are controlled by bots. Named after the word ‘robot’, a bot is a type of malware that allows an attacker to take control of an affected computer. You read "An Introduction to the Im Profession and Ethics Paper" in category "Essay examples" Criminal can take over the controlled computer such as sending out spam, spread viruses, attack computer and can even cause crime and fraud, without the owner knowing it. Bots are also called computer zombie because the computer has no control over its actions since hackers are in charge of its actions. 1. 1. 5Distributed Denial-Of-Service Attacks (DDoS Attacks) A Distributed Denial-of-Service Attack is when a malicious hacker controls computers through the Internet. It is an attempt in preventing the computer owner to use network resource or machine. It is composed of one or more people trying to disenable a certain host from being connected to the Internet. 1. 1. 6Rootkits The name rootkit comes from the two words ‘root’, which pertains to the point it attacks, which would be the administrator or the source or the root, and ‘kit’ because of the set of programs. A rootkit is a set of programs that enables its user to gain administrator level access to a computer without the user’s consent or knowledge. The owner of the rootkit is capable of executing files and changing system configurations on the target machine, as well as accessing log files or monitoring activity to covertly spy on the user’s computer usage. It is hard to detect if a computer system has a rootkit malware. 1. 1. 7Spam E-mail spam is when e-mail systems send unsolicited e-mail to large numbers of people. Spam mostly comes off as cheap advertisements of strange products such as pornography, ‘get-rich-quick’ schemes and the like. Spam can also be used to deliver harmful worms or other malware. . 1. 8Phishing Phishing is an attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site. 1. 2Types of Perpetrators 1. 2. 1Hackers and Crackers Hackers are people who test the limits of the system, find the â€Å"holes†, and check which data they could access. The knowledge that they get is actually obtainable in various media, usually the internet. They are not usually considered bad; but due to many of them who used such knowledge to cause harm to systems, the term became negative. A more appropriate term for these kinds of people is actually called crackers. 1. 2. 2 Malicious Insiders Malicious insiders are people who obtain goods, services, or property through deception or trickery, also known as fraud. In other words they lie to gain. 1. 2. 3 Industrial Spies Industrial spies are people who illegally obtain information from competitors for the benefit of their sponsor. The act is called industrial espionage and the opposite which is to obtain information legally is called competitive intelligence. In 1993, Opel accused the rival Volkswagen of industrial espionage after the former’s chief of production and seven executives moved to the latter company due to missing documents. (Julian, 2011) 1. 2. 4 Cybercriminals These perpetrators hack to the company’s system and will do anything with the information just to gain money. One of the most famous hackers of the world is Albert Gonzalez, who used hacking to steal and resell millions of card and ATM numbers in a span of three years. He did this by attacking many systems which would eventually give him the information needed to steal the card numbers. Verini, 2010) Albert Gonzalez is in ethical dilemma because he used his skills to steal the information for money. Based on the deontological theory, it’s unethical because it is not the duty of hackers to steal information. Based on hedonism under the utilitarian theory, it is ethical because he found pleasure from the act. Social contract theory, however, makes th is act unethical, and so does virtue theory. 1. 2. 5 Hacktivists and Cyberterrorists Hacktivists, combining the words â€Å"hacking† and â€Å"activist†, are people who hack to promote political ideology. Cyberterrorists attack to get the attention of the government as part of their political objectives. Anonymous is one of the most famous hacktivist groups due to their appearance on various media in which members appear wearing the Guy Fawkes mask. Their advocacy is to oppose the Internet censorship and surveillance, government corruption and homophobia. This is why they attacked several government sites. (Katich, 2013) The ethical dilemma the group faces is that they use hacking skills to infiltrate the systems yet they belong to the side of the people as their objective is to make the government hear their voice. This is ethical based on deontology because it is their duty to make the government listen to them their voice. This is also ethical based on the altruistic approach as more will benefit from their act. However, social contract theory states that it is unethical since this act has violated the law. 1. 3Laws for Prosecuting Computer Attacks 1. 3. 1Electronic Commerce Act of 2000 (RA 8792) 1. 3. 1. 1E-Commerce in Society The process of buying and selling goods electronically by consumers and from company to company through computerized business transactions. This act has the purpose of protecting those who pursue business in electronic means through multiple communication networks through the Internet. 1. 3. 1. 2 Elements in the Law Electronic data messages – these are generally the information that is in every transaction of the business. Electronic document – these are the type of information specified with text, symbols, or other modes of written expression yet similar in nature with the electronic data messages. Electronic Signature – these are any distinctive marks that approve a transaction which are done by a person or an entity using electronic means. . 3. 1. 3Relation to other Laws Such laws that are affected with this are the Intellectual Property Rights, Copyrights Protection. These laws give protection to the parties involved in any business activities through electronic means. Fraud is also related as the government can charge you when you make accept payment illegally by disguising your site as a reliab le option for payment. 1. 3. 1. 4 CASE in E-Commerce Censorship is very an essential tool to distinguish the moralities of websites and the cooperation of companies to acknowledge said moralities. In China, Google’s operations created a storm of criticism when the company agreed to comply with the government’s wishes and censor pro-democracy and other websites. In 2010, Google relocated its Chinese operations to Hong Kong, putting it outside China’s censorship regime. Supporters of the decision say Google shouldn’t cooperate with China’s repressive policies, while critics say Google’s withdrawal cut off millions of Chinese citizens from the company’s services and weakens its presence in one of the world’s largest markets. This case has very evident ethical issues including the move of Google to relocate its operations to Hong Kong. This made the jurisdiction of China’s censorship policy not reachable so that they can use their assets more freely. These however made the citizens of China that is inside the jurisdiction of the censorship policy long for their beneficial search engine. If seen in Google’s benefits this is a rather good trade for them to maximize the use of their services in a commercial area such as Hong Kong yet they could’ve served the citizens so they can keep up their reputation of improving life in the world and be consistent of the famous line â€Å"Don’t be evil†. I generally disagree with their decision to relocate as they could’ve followed the updated utilitarianism and give their services to those who would need them the most. Still they acted the ethical egoism to censor pro – democracy sites which are morally good to their perspective. 1. 3. 1. 5Another Example Including Google Google gathers incredible amounts of data on people who use its search engine. As of 2011, the company’s website states that although it stores records of your searches as a tool to improve corporate efficiency, it renders them anonymous after nine months and deletes cookies used to track visitors after two years. Governments could use Google’s information to investigate individuals visiting particular websites, however, and Google Earth’s photo collection also has raised privacy questions: In 2008, a couple sued on the grounds the online photos of their home violated their privacy, but a judge threw out the lawsuit the next year. This case is provides insight to how Google can be of every use to our society as they can help the government catch fugitives, suspects and criminals with their records of the searches of the every person using their search engines yet this leaves them to violate certain privacy issues when they abuse that kind of power. The lawsuit of the couple may be dismissed by a judge but their lawsuit are supported by ethical theories namely the rights – based theories which states that there are social contracts that should be acknowledged and that includes their right for privacy. They may be legal to store records such as the photo from their Google Earth but they should have to limit their power to exercise their duty as they are also supported by the duty – based theories due to their daily or continual task of improving corporate efficiency as well as giving us access to unlimited knowledge. 1. 3. 2 Cybercrime Prevention Act of 2012 (RA 10175) 1. . 3. 1 Preliminary Provisions 1. 3. 3. 2. 1. 1 Brief History of RA 10175 Cybercrime Prevention Act of 2012 or also known as Republic Act No. 10175 was approved on September 12, 2012. This is first law in the Philippines which specifically criminalizes computer-related crimes. The Cybercrime Prevention Act in its current form is the product of House Bill No. 5808, authored by Representative Susan Tap-Sulit of the second district of Tarlac and 36 other co-authors. The final version of the Act was later signed into law by President Benigno Aquino III on September 12, 2012. 1. 3. 2. 1. 1 Declaration of Policy The main objective of this Act is to protect the people from cybercrimes and also from the harmful effects associated with it. The state also aims to recognize the vital roles of information and communications industries in the country. The state also recognizes the need to protect and safeguard the citizens of the state, and also to protect the integrity of computers and its users. The state also wants to recognize the importance of providing an environment conducive to the development acceleration, and rational application and exploitation of information and communications technology. . 3. 3. 2. 1 General Provisions 1. 3. 3. 2. 2. 2. 1 Punishable Acts In this Act, there are 10 punishable acts indicated in the bill, and those punishable acts each have penalties that are associated. In the next sentences, the punishable acts will be discussed briefly. Offenses against the confidentiality, integrity, and availability of computer data and systems: A. Illegal Access – accessing a computer or a part of a computer without any right B. Illegal Interception – the interception made by the use of any technical device without any right of non-public transmission of datum to or from any computer system including electromagnetic emissions from a computer system carrying such data C. Data Interference – the intentional or any reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without any right including the transmission or transferring viruses into a system. One example is the ILOVEYOU message transmitted through electronic mail way back in the year 2000. D. System Interference – the intentional or any reckless hindering or interference with a functioning computer system, or a computer network by inputting, transmitting, damaging, deleting, deteriorating, altering, or supressing computer data or computer program without any right or authority in doing so. E. Misuse of Devices – the use of any material without any right of it. Acts like producing, manufacturing, selling, and distribution. F. Cyber-squatting – the simplest way is identity theft, using another individual’s identity to gain profit or scam other people in the internet. G. Computer-related Forgery – the illegal use of a computer into copying one’s work, and gaining illegal access to a computer to copy the content of a system or database. H. Computer-related Fraud – the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system. I. Computer-related Identity Theft – the intentional acquisition, use, transfer, or possession of any identifying information belonging to another person, whether natural of juridical. Under these are Cybersex and Child Pornography. J. Libel –    defined as a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any acts, omission, condition, status or circumstance tending to discredit or cause the dishonour or contempt of a natural or juridical person committed through a computer system or any other similar means which may be devised in the future. The above stated are the punishable acts by the law enforced and written in the bill, and these acts have corresponding penalties if have been proven to the court. The penalties include: imprisonment or a fine of at least two hundred thousand pesos (Php. 00,000. 00) up to a maximum amount commensurate to the damage incurred or both. Prison mayor is equivalent to imprisonment from 6 years and one day to twelve years. 1. 3. 3 Ethical/ Moral Dilemmas 1. 3. 4. 2 Situation A 16-year old male named â€Å"Josh Evans† was registered on the account used for bullying messages to a girl named Megan Mier. Lori Drew, the mother of Sarah, a former friend Mier, later admitted creating the MySpace account. She was aided by Sarah and Ashley Grills, an 18-year-old employee of the elder Drew. The senior Drew and several others ran the fake account, with an aim to get information about Megan and use that information against her and also for her to be humiliated. This caused spreading gossips about Megan, and thus creating a traumatic experience not only for her but also to her family. 1. 3. 4. 3 Analysing using the Four Major Ethical Theories A. Duty-based Theory According to the Duty-based theory, an act is considered ethical if it has good intentions. Given the situation, I can clearly state that it is not an ethical thing to do. Creating or spreading false rumours is not even close to be called as a good intention. Also, gathering information about a certain person is not ethical if it will be used against or be held against to a person. Using the Duty-Based Theory, I can clearly state that the situation of gathering information of Megan is not ethical because it does not serve a good intention. B. Utilitarianism According to the Utilitarianism Theory an act is only to be considered ethical if it produces desirable consequences or outcomes. The outcome of the situation stated earlier is that the experience Megan was traumatic not only for herself, but it also affected her family. Just by looking at this outcome, we can say that it is not also considered ethical in this theory, because of the outcomes that the actions of the group had caused not only their target but also the relationship of other people to Megan. C. Social Contract Theory According to the social contract theory an act is considered ethical if the act does not violate any rules or laws; according to the Civil Code of the Philippines: Persons and Family Relations, under Chapter 2 which is Human Relations the Articles 19, 20 and 21 discusses the different rights a person possesses and how a person should exercise his or her rights. Chapter 2 Article 19 presents the basic principles that are to be observed for the rightful relationship between human beings and the stability of the social order. Chapter 2 Article 20 presents that you are liable for any damage that you have caused to another person, whether wilfully or negligently. Chapter 2 Article 26 presents that right must never abused, the moment that it is abused, the moment rights are abused they ceased to right. D. Virtue According to the Virtue theory, the action that is considered to be ethical is when the action is came from a good moral principle. Looking to the situation, it is not an ethical thing to do because it does only harm the person involved but also the moral principles of the suspect is to be questioned. 1. 3 Trustworthy Computing 1. 4. 1 Microsoft’s 4 Pillars of trustworthy Computing The 4 Pillars of trustworthy computing help identify the key elements in computing especially in an organization with numerous employees to manage. Guidance is a key to help implement a good and stable system such as how the pillars guide not just Microsoft employees but users alike. 1. 4. . 1 Security Creation of a trust worthy environment for a safe computing environment 1. 4. 2. 2 Privacy The protection and confidentiality of design, development and testing in any organization is essential as to be part of the competitive market today. 1. 4. 2. 3 Reliability Working as expected or promised by the developers and their entity 1. 4. 2. 4 Business Integrity Being responsible and transparent in you duties and expectation as part o f a work force that strives to be excellent a mistake is bound to happen. Admitting a mistake is the 1st step to a growing process of learning new things to come. 1. 4. 2 Risk Assessment It is the process of assessing security related risks to an organization’s computers and networks from both internal and external (Reynolds, 2011) A risk assessment is a process to identify potential hazards and analyse what could happen if a hazard occurs. (Federal Emergency Management Agency, 2013) The assessment would assure the IT security team that they will be ready when an attack comes because of the determined risk assessment they perform. 1. 4. 1 General Security Risk Assessment Process Step 1: Identify IT assets and prioritize ones that are of most importance Step 2: Identify the threats/risks that could occur Step 3: Assess the likelihood of threats Step 4: Determine the impact of each threat, how large to small is the impact if affected Step 5: Determine how each threat can be prevented/blocked Step 6: Which is the most effective prevention method Step 7: Perform cost benefit analysis before taking any action Step 8: Make the decision to implement or not to implement the decided risk prevention found through thorough research and development 1. 4. 3 Establishing a security policy Defines an organization’s security requirements, as well as controls and sanctions needed to meet those requirements. (Reynolds, 2011) A good security policy can possibly improve and provide a smooth flow of operations within an organization. NIST (National Institute of Standards and Technology) is a non-regulatory federal agency within the US department of commerce. The computer security division creates security standards for organizations to implement in their own system. 1. 4. 4 Educating the Employees, Contractor and Part-Time Workers Surveys show that most security problems come from negligence and unawareness of the security policies. Teaching good security practices like not giving out your passwords, making sure you do not meddle in different departments. Knowing the Dos and DONTs of everyday computing will help guide any workplace and direct them to the good ways of being a good user. 1. 4. 5 Threat Prevention The key to a threat prevention system are layers of security systems that challenge the perpetrator to hack into the system. Firewall – stands guard between an organization’s internal network and the internet Intrusion Prevention Systems – prevents an attack by blocking viruses, malformed packets and other threats from getting into a protected network. Antivirus software – should be installed on each user’s personal computer to scan a computer’s disk drives and memory regularly for viruses. User accounts that remain active after employees leave cause an uncertain threat to the company, IT staff must promptly delete and make sure to wipe out all the privileges of the former employee. The US-CERT (United States Computer Emergency Network Team) and SANS(SysAdmin, Audit, Network,System) Institute – regularly update a summary of the most frequent and high impact threats to a computer system specifically viruses and worms. . 4. 6 Security Audit An important prevention tool that evaluates whether an organization has a good security policy and if it is being followed. An example would be a requirement to change passwords every week or month with this in place a security for companies are much more protected compared to others without this requirement. Basically to test, check and review the system’s secur ity and look for loop holes and easy targets. 1. 4. 7 Detection The preventive measures made for a computer system is not always enough to protect important data. Intrusion detection system – is a software/hardware that monitors system and network resources, notifies a system admin when an intrusion occurs Knowledge based intrusion system – contains information about attacks and system vulnerabilities, then trigger an alarm (ex. Repeated login, repeated data events) Behaviour based intrusion system – compares users system behaviour with an admin created model that detects when a user is not following the required model, this would trigger an alarm. (Example: Unusual activity with an account in the HR department accessing the IT department’s data. 1. 4. 8 Response An organization should be prepared for the worst, like a system attack that stops all operations and steals data from the company. The top priority during an attack is not to catch the perpetrator but to regain control and save what is left. Who needs to be informed? And who not to notify? Reputation and credibility is at stake in any security breach. A company should document all details of a security breach and be able to review it after to assess and further study. Eradication of the damaged/breached information is essential but before everything a log is required to keep track 1. . 9 Ethical Moral Dilemmas You are a member of a large IT security support group of a large manufacturing company. You have been awakened late at night and informed that someone has defaced your organization’s website and also attempted to gain access to computer files containing a new product under development. What are your next steps? How much time would you spend tracking down the hacker? -Deo ntological 1. 5 References * (1999, 10). Electronic Commerce. StudyMode. com. Retrieved 10, 1999, from http://www. studymode. com/essays/Electronic-Commerce-731. tml * THE ELECTRONIC COMMERCE ACT (R. A. 8792) AN OVERVIEW OF IT? S (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). ‘www. ustlawreview. com/pdf/vol. L/Articles/The_Electronic_Commerce_Act_RA_8792. pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? – Cisco Systems. (n. d. ). Cisco Systems, Inc. Retrieved from http://www. cisco. com/web/about/security/intelligence/virus-worm-diffs. html * What Is A Rootkit? (n. d. ). Internet / Network Security – Tips, Advice and Tutorials About Internet Security and Network Security. Retrieved from http://netsecurity. about. com/od/frequentlyaskedquestions/f/faq_rootkit. htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www. businesspundit. com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive. wordpress. com/2013/02/25/anonymous-annie-katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www. nytimes. com/2010/11/14/magazine/14Hacker-t. html/ How to cite An Introduction to the Im Profession and Ethics Paper, Essay examples

Tuesday, May 5, 2020

Philanthropy &Corporate Social Responsibility-Samples for Students

Question: What is the difference between Corporate Social Responsibility and Philanthropy? Illustrate with examples. Answer: Introduction: Corporate social responsibility and corporate philanthropy are closely related concepts and philanthropy is a part of social responsibility of business or organization. Both the concept have the potential of creating positive impact on the overall performance of company. A corporate social responsibility (CSR) is a program that is built by company based on shared experience. Corporate philanthropy is the dimension of corporate social responsibility (Kozlowski et al., 2015). Discussion: The concept of corporate social responsibility can be referred to as voluntary soft regulations that organizations adopt for improving several aspects of company such as issues relating to environmental, labor and human rights. There exist ambiguity in defining the corporate social responsibility concept despite several efforts to bring an unbiased definition. Employment of programs of corporate social responsibility is about companies taking actions and having responsibilities that is beyond their economic, business and legal obligations. On other hand, one of the specific type of activity involved in the CSR program of business is corporate philanthropy. It is the actions on part of corporations donating resources and profits to nonprofit companies. Corporate giving or philanthropy can either be done through corporate foundation or handled directly by corporation (Beare et al., 2014). Philanthropy is the primary and first CSR activity of many organizations and the charitable actions is done using corporate resources for engaging in activities such as charitable activities and donations and voluntary working by engaging personnel. Such activities does not seek any direct benefits to business and they take place outside the immediate business of organization. However, organizations or corporation are able improve their reputation by minimizing invasive public policy. Employment of activities of corporate social responsibility leads to collaboration and integration of shareholders with other group of stakeholders for building credibility, managing potential risks and trust creation in society. Philanthropy is considered as social and voluntary dimension of CSR activities as these activities are not prescribed by laws and it is more a voluntary actions of organization. CSR is understood by business activities that helps in addressing philanthropy that can be a source for non-government organization. From the perspective of company, philanthropy is about donating charities that leads to taking efforts for assisting distressful people by funding them. Some of the example of corporate philanthropy involves donating funds or money to orphanages, charities, old age homes, financing clothing and food to people hit by Tsunami and to countries that are hit by natural calamities. CSR activities adopted by organization is about the integration of economic, social and environmental considerations into the processes and decision making structures of business. Employment of such programs helps in producing direct benefits for the bottom line. Some of the examples of CSR activities of organization is recycling of materials and reduction of waste. An organization can have economic and environmental benefits simultaneously by adoption of co efficient actions (Ioannou Serafeim, 2014). This would help in generating positive profitability by contribution to stronger financial performance. Organizations are able to derive ample benefits for engaging in CSR activities. Such benefits involves development of better relations with stakeholders and communities, improved branding, innovation and productivity. CSR is becoming part of strategic behavior of increasingly small, medium and corporations operating at international level. Organization should not behave in a socially irresponsible way by dumping waste and chemicals into water bodies and creating pollution. The factor at core of CSR activities is performing business in an ethical and legal way. With regard to the concept of philanthropy, there are two types of such activities that is traditional philanthropy and strategic philanthropy. Former involves organization to devise and set strategy and outcome measurement in relation to companys interest (Milne Gray, 2013). On other hand, strategic philanthropy is designed in such a way that it taps companys expertise and bringing specialized knowledge to company. Carrolls social responsibility pyramid: (Source: Carroll et al., 2016) An organization can be called socially responsible if all the four level of responsibilities are met that is philanthropic responsibilities, ethical responsibilities, legal responsibilities and economic responsibilities. Philanthropic responsibilities of corporations is on the top of pyramid and according to this pyramid, every organization should incorporate philanthropy in their business policy as a part of their responsibility towards serving wellbeing of community. Nature of philanthropic activities is discretionary or voluntary in nature (Janek et al., 2016). Participation in such activities are guided by desire of business activities to engage in social activities. For fulfilling perceived philanthropic responsibilities of organization, an organization or corporation engage in variety of giving activities such as service and products donation, gifting monetary resources, community development, volunteerism by management and employees and other contribution to the group of stake holders that make up the community. Most of the times, business engage in philanthropic activities for augmenting reputation of their business and sometimes it is a utilitarian decision. Establishment of philanthropy as a part of strategic activity of company in socially responsible framework provide organization with immaterial importance, valuable and competitive advantage. Competitive position of organization is ensured by building reputation and image of company by performing philanthropic activities and overall activities of being corporate socially responsible (de Villiers Maroun, 2017). For promoting the aspects of being socially responsible and contribution of incorporating philanthropy, it is required by organization to explore more as it is depicted by trends that profit of organization is increased by social responsible economy. Conclusion: Corporations has the responsibility towards serving community and society besides thinking about probing return to shareholders and creating satisfaction for customer and employees. Some of the integral part of corporate social responsibility involves moral values, business ethics and environmental concerns. Philanthropic activities forms the integral part of organization being socially responsible. When an organization decides to contribute for any nonprofit cause by engaging in philanthropic activities, utilitarian calculation should be done by making comparison of benefits and cost of decision (Kozlowski et al., 2015). Social responsibility of organization can be met through philanthropic ventures that would help in enhancing reputation and image of company. References list: Beare, D., Buslovich, R., Searcy, C. (2014). Linkages between corporate sustainability reporting and public policy. Corporate Social Responsibility and Environmental Management, 21(6), 336-350. Carroll, R. J., Primo, D. M., Richter, B. K. (2016). Using item response theory to improve measurement in strategic management research: An application to corporate social responsibility.Strategic Management Journal,37(1), 66-85. de Villiers, C., Maroun, W. (Eds.). (2017). Sustainability Accounting and Integrated Reporting. Routledge. Ioannou, I., Serafeim, G. (2014). The Consequences of Mandatory Corporate Sustainability Reporting: Evidence from Four Countries. Harvard Business School. Working Paper, 11-100, August 20, 2014. Retrieved July 12, 2016 fromhttps://www. hbs. edu/faculty/Publication% 20Files/11-100_7f383b79-8dad-462d-90df-324e298acb49. pdf. James, M. L. (2015). THE BENEFITS OF SUSTAINABILITY AND INTEGRATED REPORTING: AN INVESTIGATION OF ACCOUNTING MAJORS'PERCEPTIONS. Journal of Legal, Ethical and Regulatory Issues, 18(1), 1. Janek, C., Riccerib, F., Sangiorgia, D., Guthrie, J. (2016). Sustainability and integrated reporting: A case study of a large multinational organisation. Kozlowski, A., Searcy, C., Bardecki, M. (2015). Corporate sustainability reporting in the apparel industry: an analysis of indicators disclosed. International Journal of Productivity and Performance Management, 64(3), 377-397. Milne, M. J., Gray, R. (2013). W (h) ither ecology? The triple bottom line, the global reporting initiative, and corporate sustainability reporting. Journal of business ethics, 118(1), 13-29.

Thursday, April 2, 2020

Picture of a House

It is said that every family has skeletons in the cupboard. If only old houses could speak, they would tell a lot of fascinating stories about bad and good times of their inhabitants. At first glance, an old house in the picture may seem to be a mere building consisting of walls, windows and doors, but its atmosphere and every its part would mean a lot for several generations that were born and grew up in it.Advertising We will write a custom essay sample on Picture of a House specifically for you for only $16.05 $11/page Learn More A paved path leading to the terrace steps looks so inviting that it is hard to resist the temptation and enter the building. Stepping on this winding trail, a guest would inevitably think of those people who had walked this path millions of times day by day in the past. It is possible that these were small children who ran skipping along and perhaps even fell after stumbling over one of the stones on the path. These could als o be elderly people who went slowly because it was already difficult for them to walk. Young people could walk this path in a hurry from and to work without even noticing beauty of the house. With all these thoughts in mind, a guest would find himself/herself on a desert terrace. Knocking on the door, the stranger would imagine children playing games on this terrace and an elderly man sitting in a rocky chair. However, now there are no lights in the window and the terrace is desert. Nobody would open, and it seems that now only memories and family secrets live in this house. Not able to enter the house, a stranger would stay outside and walk in the garden. It is autumn, and the bare trees share the mood and loneliness of the house. However, there are no leaves on the lawn, and it means that somebody has collected them. Someone who is now invisible has gathered the autumn leaves and neatly cut the lawn. The presence of invisible but caring owners surround the house with atmosphere of mystery. The red tiling on the roof of the house and a gabled tower make the building look like a castle from a fairy tale. There is a small chimney on the roof, and obviously small children growing up in this house were waiting for Santa Claus to come through it every Christmas Eve. Children grew up and do not believe in miracles anymore, but a small chimney remains as a commemoration of those old good times. The large windows of the house are similar to somebody’s curious eyes and connect the inhabitants of the building with the surrounding world. It is obvious that there are even more windows in this house than it is necessary for lighting the rooms in a proper way. Most rooms of the house have two or even more windows which demonstrate the openness of the inhabitants and make the building look even more inviting. It is possible that previously the house was more hospitable than on this autumn morning and guests crowded on its small terrace and in its brightly-lit rooms. However, now the house looks desert and sleeps, hiding all its secrets behind thick curtains on the windows.Advertising Looking for essay on art? Let's see if we can help you! Get your first paper with 15% OFF Learn More Looking at the exterior of the house in the picture, strangers can only make guesses concerning the lives of its inhabitants and the true meaning of the elements of the building. A winding path, bare trees in the garden and large windows would seem only the elements of the construction to a stranger, but would tell much more to people who have spent at least a part of their lives in this house. This essay on Picture of a House was written and submitted by user Jul1anKeller to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, March 8, 2020

An Overview of Territories of the World

An Overview of Territories of the World While there are fewer than two hundred independent countries in the world, there are more than sixty additional territories that are under the control of another independent country. There are several definitions of territory but for our purposes, we are concerned with the most common definition, presented above. Some countries consider certain internal divisions to be territories (such as Canadas three territories of Northwest Territories, Nunavut, and Yukon Territory or Australias Australian Capital Territory and Northern Territory). Likewise, while Washington D.C. is not a state and effectively a territory, it is not an external territory and thus not counted as such. Another definition of territory usually is found in conjunction with the word disputed or occupied. Disputed territories and occupied territories refer to places where the jurisdiction of the place (which country owns the land) is not clear. The criteria for a place being considered a territory are fairly simple, especially when compared to those of an independent country. A territory is simply a external piece of land claimed to be a subordinate location (in regards to the main country) that is not claimed by another country. If there is another claim, then the territory can be considered a disputed territory. A territory will typically rely on its mother country for defense, police protection, courts, social services, economic controls and support, migration and import/export controls, and other features of an independent country. With fourteen territories, the United States has more territories than any other country. The territories of the U.S. include: American Samoa, Baker Island, Guam, Howland Island, Jarvis Island, Johnston Atoll, Kingman Reef, Midway Islands, Navassa Island, Northern Mariana Islands, Palmyra Atoll, Puerto Rico, U.S. Virgin Islands, and Wake Island. The United Kingdom has twelve territories under its auspices. The United States Department of State provides a nice listing of more than sixty territories along with the country that controls the territory.

Thursday, February 20, 2020

Revolt on the Nile Essay Example | Topics and Well Written Essays - 1250 words

Revolt on the Nile - Essay Example Therefore it is prudent to say that the Nile shocks had been responsible for most of the social instabilities that existed at the time (Chaney). Throughout history, it is evident that partly the bad economic times have normally given way for liberalization and room for democratic changes that had been witnessed before. Despite this fact, not all changes along the democratic lines followed this line of thought. This is because of the rise of institutions which lead to support autocratic regimes like the religion through the religious leaders. Such institutions worked closely within the social frameworks and in agreement with the autocratic governments to suppress the people (Chaney). This therefore placed the religious institutions in determining the balance within the society in the manner they operate. This does not though have empirical data though its acts have been on record and can be proven. There is therefore a negative relationship between the Nile floods and the actions by the religious groups. This is because during the Nile floods the religious groups became stronger and since they worked closely with the oppressive governments of the day, they lead to the suffering of the people. This was strengthened further as the high judge had no probability of quitting office during such a time when the Nile outburst their banks. At the time when the Nile experienced the shocks, more religious institutions were formed and became stronger. As a result the political power of the religious leaders increased. This power made the high judge wield excessive power and exert such influence on the social hierarchy given that the political power itself was a product of the influence they possessed (Chaney). The Nile floods caused an environment of social unrest where the leaders such as the high judge could swim through heightened political power.

Wednesday, February 5, 2020

Religion Personal Statement Example | Topics and Well Written Essays - 250 words

Religion - Personal Statement Example He fasted in the wilderness for forty days and forty nights (matt 4: 1-11), where the devil tempted him and he overcame all the temptation because he had faith and believed and worshipped one God (Hauer & Young, 2011). Some lessons learnt are, there is need for one to know the bible scriptures so well, as it’s a necessity in believers lives as it is full of temptations. Through the scriptures knowledge one can overcome all temptations as it acts as a weapon. Through prayers we can overcome temptation as it’s demonstrated by Jesus, and this made us to believe Jesus as the only begotten son of God as he had power to defeat Satan. Also we need to be obedient to God as we are not supposed to be swayed by the earthly belongings as in today’s times but instead obey God because with God everything is possible (Hauer & Young, 2011). There is need to trust in God because he is powerful and we do not need a spectacular thing so that you can believe. There need to wait for the perfect time of God to fulfill his plan, so as Christians we should not go for shortcuts in life but instead wait for the appropriate time (Hauer & Young,

Monday, January 27, 2020

The takeover of HBOS

The takeover of HBOS Introduction Mergers and acquisitions have become the most frequently used methods of growth for companies in the twenty first century. Nowadays the information about mergers and acquisitions (MA) can be seen every day in newspapers, internet, television MA can suddenly become a hot topic at anyones workplace because their company is going to merge with another. There are many sides to an MA transaction strategic, legal, financial, and technological to getting a deal done. One very important element to every deal is the human element, this should always be kept in mind. We are going to evaluate the challenges faced by the management of the new organisation in terms of Human Resource Management (HRM) with reference to the recent takeover of Halifax Bank of Scotland (HBOS) by Lloyds TSB in September 2008. The evaluation will include the role of HRM in analyzing the Lloyds TSBs decision to make a takeover bid for HBOS, how this analysis related to Culture, Conflict and Change within the organisatio n and possible dilemmas facing Lloyds TSBs stakeholders. Background and purpose of the takeover of HBOS by Lloyds TSB Background On 17 September 2008, very shortly after the demise of Lehman Brothers, HBOSs share price suffered wild fluctuations between 88p and 220p per share, which lost almost half its market value in the week, despite the Financial Services Authoritys assurances as to its liquidity and exposure to the wider credit crunch. However, on 18 September 2008 the terms of the recommended offer for HBOS by Lloyds TSB were announced. The two lenders also revealed plans to raise a combined  £17 billion under a government-funded recapitalisation programme aimed at strengthening the UK banking sectors capital reserves. The government backed the deal using a special national interest clause on the grounds that a collapse of HBOS would have had a disastrous impact on the UK. On 16 January 2009 the Lloyds TSB acquisition of HBOS was completed following final court approval and Lloyds TSB was renamed Lloyds Banking Group plc. Purpose of the takeover: The proposed acquisition of HBOS would combine two powerful financial institutions, and would be another significant and positive step on our journey to provide substantial benefits and value for customers and shareholders alike. Challenges faced by HRM in MA Organisational Behaviour Model Due to the resulting pressure for the MA to succeed, the management of the new organisation is forced to find new strategies as well as evaluate the additional challenges faced. To answer the question of how well the management performed during the integrating activity, it is useful to look at internal factors using the McKinsey 7-S framework. This framework was developed in the early 1980s by Tom Peters and Robert Waterman. The basic premise of the model is that there is a framework which maps a constellation of interrelated factors that influence an organisations ability to change. The McKinsey 7-S model involves seven interdependent factors which are categorized as either hard or soft elements: Hard elements are easier to define or identify and management can directly influence them: these are strategy statements; organisation charts and reporting lines; and formal processes and IT systems. Soft elements, on the other hand, can be more difficult to describe, they are less tangible and more specifically related to HRM. These soft elements are as important as the hard elements. A conservative estimate is that roughly 10% of people at work at any one time are directly affected by transformations of this sort. Moreover, another 30% are closely related to those experiencing combination-related tensions and trauma (Buono and Bowditch, 2003). These figures show how the critical challenges faced by management in every MA relate specifically to HRM. The company that effectively addresses people-related issues up front and throughout integration will have a better chance of succeeding and gaining the competitive advantage it seeks. The challenges faced by management in term of HRM in MA. The HRM issues in the MA can be classified in two phases; the pre-MA phase and the post MA phase. HRM should be involved from the beginning and throughout all stages of the MA process. Due diligence is important in the first phase while integration issues take the front seat in the later phase, including: Cultural clashes: Each organisation has a different set of beliefs and value systems. The exposure to a new culture during the MA leads to a psychological state called culture shock. Dissimilar cultures can produce feelings of hostility and significant discomfort which can lower the commitment and cooperation on the part of the employees, therefore post-merger cultural clashes are often blamed for disappointing MA outcomes. According to Anders Spilling and Jarle Hà ¸ien, managers in BearingPoints Business Strategy and Transformation pratice, there are five areas of cultural conflict: Leadership: every companys leadership style can seem unique. When post-MA senior leaders sitting at the same table motivate their staffs and resolve conflicts in diverse ways the resulting friction often creates additional risks. Examples of these risks could be a lack of commitment to new company goals or a high level of turnover among key employee groups. Governance: effective corporate governance requires much more than a system to protect stakeholder interests. It must encompass the way decisions are made in each part of the company and across organisations. One problem that usually arises is the debate over whether the new organisation should adopt one merger partners governance model or define a different model. Communication: Attitudes about confidentiality, preferences for formal versus informal channels and the frequency of communications may all come into play. By anticipating these risks well in advance, the acquiring companys leadership can develop communication tactics that best support the merger objectives. Business process: most companies have distinct ways of developing, updating and enforcing core business processes which must be understood and respected during the integration phase. If changes in core business processes are not deliberately and systemically thought through during the integration phase, organisations face the risk of internal breakdowns and failures in delivery of products and services to customers. Performance management and reward systems: new organisation should include efforts to harmonize performance standards and compensation systems where possible, while explaining important differences when necessary. Newly merged companies must help employees understand that their different recognition and reward systems are fair, even if not always uniform across the organisation. Because cultural change involves both hard and soft issues, HRM considerations will include visible manifestations such as key performance indicators, communication styles, employee interaction, as well as less tangible corporate values and assumptions about how a company does business, such as how leaders drive and assess results and new organisation governance model These findings have important implications for how organisations can anticipate post-merger cultural clashes and tailor leadership programs to address their underlying roots, ultimately enhancing merger success rates. Uncertainty job security: The MA leads to duplication of certain departments, bring about the excess manpower and downsizing is, unfortunately, an inherent result. Hence talking about MA, the first set of thoughts that occur in the minds of employees are related to security of their jobs, changes in designation, career path, working in new departments and fear of working with new teams. The MA also changes future opportunities for the employees in the organisation. Some employees also have to be relocated or assigned new jobs. This may have an impact on the performance of the employees and cause the organisation to lose some talent. The enormous challenges posed by an MA to the HRM are keeping all employees informed of all crucial decisions as well as enhancing effective two-way communication by involving line managers; ensuring an equitable and fair treatment of employees and in case of lay-offs, HRM should offer outplacement services and fair severance packages. All these efforts from HRM can help build trust, quell the rumour mill, relieve anxiety, focus people on the business and its possibilities and lessen productivity loss. Inability to manage changes: Often there are rapid changes in the business environment after MA. Internally HRM will manage a bigger work force, externally HRMs industrial relations will be extended The role of HRM is to quickly develop a HR plan to lead the process for helping the company to achieve the synergies it needs. The HRM must fully be prepared for the significant role they will play throughout the MA process. The issues faced by HR professionals when supporting the MA are extremely demanding they require the creation of a single unified organisation with a clear purpose and set of values from two groups of people with different cultures. HRM should continuously update their knowledge and skills in managing, controlling and monitoring the enlarged workforce, HRM need the ability to adapt to changing circumstances, acknowledge the problems when they arise, improving communications skills, create training programme, explain new roles to employees, implement stress reduction programmes and orientation pro grammes, help post merger team building and feedback helpline for employees. The issues faced by HR during MA deals are enormous, yet it is clear that the key to the success of an MA is the management of people. By identifying the common challenges and finding solutions which work for the new organisation. The value of HRM in the MA should be realised early enough to enhance the chances of a successful deal. Analysing Lloyds TSBs decision in making a takeover bid for HBOS. Issues related to Culture, Conflict and Change: The theory mentioned above regarding issues related to organisation development in term of culture, conflict and change applied very closely to the general challenges faced by the new Lloyds TSB organisation in the post-takeover period. Culture The basis of corporate culture is shared values. These values must be stated as both corporate objectives and individual values, explicit or implicit fundamental beliefs, concepts, and principles that underlie the culture of an organisation. Lloyds TSB and HBOS were two of the UKs leading financial services companies, they have some similarities in organisational structure. According to Charles Handy (1985), who popularized the work of Roger Harrison (1972), has linked organisational structure to organisational culture, both Lloyds TSB and HBOS have Role culture in where people have clearly delegated authorities within a highly defined structure. Power derives from a persons position and little scope exists for expert power. Lloyds TSB and HBOS rest on the strength of strong organisational pillars-the functions of specialists, for example, customer advisors, banking advisors, personal financial advisors On closer inspection, each of them will have its own unique culture, and like most large businesses are likely to be something of a mix of culture and even, each branch, or division has its own culture. From table 1- Soft elements by McKinsey 7-S framework in Lloyds TSB and HBOS, while Lloyds TSB creates an exciting place to work with a lively and fun atmosphere, they affirmed on their website that they have a work hard, play hard culture. HBOS seems to have a more formal working environment with very professional attitude in their approach to work, results-driven, always looking for more ways to move forward and over-achieve. About leadership style, Lloyds TSB built a feedback and coaching culture with regular appraisals twice annually based on Key Performance Indicator system with hierarchy structure. HBOS employed a non-hierarchical culture where everyone was treated equally, fairly. The communication system in Lloyds and HBOS followed these styles as well, hierarchy and non-hierarchy respectively. I dont think these differences in leadership style and communication system were sufficiently considered in the takeover decision. Governance model of Lloyds and HBOS were almost the same, the core purpose was to make it better for their staff, customers and to maximise shareholders value over time. Both groups were led by a board comprising executive and non-executive directorswith wide experience.The roles of the chairman,the group chief executiveandthe boardand its governance arrangements, including the schedule of matters specifically reserved to the board for decision, were reviewed annually. Lloyds and HBOS had very different ways of doing business. Lloyds was very conservative, largely a consumer bank. HBOS was aggressively following the high risk business model, HBOS transformed their traditional banking activities into global trading and speculative operations with little oversight and policing. Although the way of doing business is very important in choosing a strategy for the organisation, the unexpected result of HBOSs strategy and the dominance of Lloyds in the takeover meant that the new merger organisation did not take time to affirm which business model should be followed, therefore this aspect was not critical in the decision making of the takeover. The performance management and reward systems: The Lloyds performance approach includes objective setting using a balanced scorecard, Lloyds has regular performance reviews with competitive remuneration package. HBOS has results-driven rewards, always looking for more ways to move forward and increase achievements. The salary they received is only the beginning because for every role there was a tailor-made total rewards package which was based around three key areas: Performance, Flexibility and Choice. Furthermore, remuneration package for each role, contributory pension scheme, share-save and share-plan schemes, numbers of holidays. are hard to match between the two organisations. These differences of culture will involve much due diligence to identify implicit as well as explicit issues and will require time to build up a proper plan for HRM. The outcome of this plan has an integral role in the decision of the takeover. As the result of the takeover, the above differences in culture mean that the exposure to a new culture is unavoidable. The employees of both Lloyds and HBOS not only need to abandon their own culture, values and belief but also have to accept an entirely different culture. The takeover also leads to changes in organisational climate, the main source of organisation conflicts, which are summarized below Conflict Post-takeover integration demands significant involvement in all level of organizations, both Lloyds and HBOS, causing conflict at work from individual level to organisation level. Organisation cultural: there is no doubt that Lloydss culture is dominant and may lead to feelings of superiority among some of the employees. The employees of non-dominating culture, HBOS, may also get feelings of loss of identity associated with Lloyds. The dissimilarity in the cultures can produce the feelings of hostility and significant discomfort, for example HBOS may feel uncomfortable with the hierarchy of organisation structure and the communication system of Lloyds. In case of hostility in certain environment, some teams may develop us versus them attitude which may be detrimental to the organisational growth. Conflict in maintaining stability: The need for reform in organisation structures, redefinitions of assigned duties and responsibilities, adjusting the procedures and methods of work after the takeover, can result in conflict in maintaining stability. There should be a commitment to maintain employment in those parts of the UK in which either HBOS or Lloyds TSB currently have significant operations. This should be backed by a commitment to take all possible steps to avoid involuntary redundancies in order to avoid the potentially devastating impact on local communities and economies of large site closures. Conflict in investment in resources: both Lloyds and HBOS have their own large resources that may already be committed to investments in other areas or strategies before the takeover. As this takeover had a short notice period, assets such as branch offices, CRM software, equipment and people which have just been invested cannot easily be altered, thence conflicts arise. Which invested categories should be dropped? In fact, HBOS had in-house call centre operations, while Lloyds had a policy to outsource or off-shore its call centre. Each call centre model has its own advantages and disadvantages, what operation model should be maintained? In the short term, HBOS calls for Lloyds TSB to review all existing and planned outsourcing or off-shoring of operations to maximise employment opportunities in the UK for current employees. Conflict with past contracts or agreements: Both Lloyds and HBOS entered into contracts or agreements with other parties, such as government, trade unions, suppliers, customers and their own employees. These contracts and agreements can conflict with the changes cause by the takeover. For example, there should be a statement from Lloyds TSB committing that HBOS employees pay, pension provisions, employment benefits will be protected. Also, there should be a commitment that if there are new terms and conditions of employment for HBOS and Lloyds TSB staff, those should be no less favourable than the terms and conditions applying before the acquisition. Conflict in power or influence: Another practical problem is differences in the grading or organisational structures. The organisational structures used have different designations for the employees. During the integration Lloyds need to develop a mechanism to remove the differences in the grading systems, bring them to equal levels between Lloyds and HBOS, introducing standard levels of control over decisions, resources or information. Lloyds TSB should make a commitment to dignity at work for all employees and commit to the highest standards in relation to equality, diversity, equal pay and future career development opportunities post-takeover. The reaction of the employees in conflicts can vary from anger to dejection and depression. There can also be a fall in the morale, commitment and loyalty which can lead to impaired performance. Identifying the conflicts in advance will help Lloyds TSB management decide on the takeover. I think Lloyds TSB management was confident enough in their ability to control the above defined conflicts and believed that they would get more chances of success in the changes below: Change: In the decision of the takeover bid for HBOS, Lloyds TSB management board had targeted the opportunity to change for a stronger Lloyds Banking Group. As a common reaction, every change in the enlarged Lloyds TSB is resisted at both the individual and the organisational level. According to Alvin Toffler (1970), people are naturally wary of change and suspicion is out of control. Besides the changes in strategic, legal, financial and technology, the changes in HRM should be carefully designed and proceed with gradual pace. As part of the decision regarding the takeover, Lloyds TSB had considered the strategy to overcome the individual resistance and organizational resistance. Monday 19 January is Day one, the two brands still remain separate. A spokesperson for Lloyds TSB said: It is business as usual. This statement helps to maintain the secure feelings in customers, shareholders and employees. From the early stage of the takeover, Lloyds TSB had set up a guiding team to provide change leadership and handle every steps of the change process. They have created a website to update on a regular basis to shareholders, employees and customers on the proposed acquisition of HBOS by Lloyds TSB and to give them information about the Lloyds Banking Group in this rapidly changing environment.Divisional changes will be communicated via line management and divisional intranet sites. HBOS partner unions, Accord and Unite, will continue to play an important role as before in the new business. There will be no major changes for the vast majority of HBOS employees. The existing HR policies and procedures remain in place. The 2009 pay review will be in May as usual. There will be little immediate change to Total Reward. The current pension arrangements will continue for all employees. Initially, there will be no change to the HBOS performance management approach. Employees will be introduced to the Lloyds Banking Group performance approach during 2009. Lloyds TSB was aware of the default response of resistance during the change of the takeover decision. Therefore they had suitable response to manage the sustaining of a healthy climate in order to gain a commitment to change in the whole organisation. Dilemmas facing Lloyds TSBs stakeholders Lloyds TSB and HBOS had, on a number of occasions over the years since 2000, discussed the possibility of a merger. It was only the unique circumstances of September 2008 that enabled this transaction to happen with the nature of the Governments involvement in the banking sector. In particular, the purpose of Governments interventions that is to stabilise the banking system, provide liquidity and to encourage more lending. Following the collapse of Lehmans, closely followed by the nationalisation of the worlds biggest insurance company AIG and the spreading of the world recession meant that the Government needed to take swift and decisive action by taking the extraordinary step of waiving competitions concerns to get the deal done. Lloyds TSB management board was very aware of the compelling logic of this transaction, including the substantial market positions they would secure and the significant and substantial synergies, the opportunities for growth which a stand-alone Lloyds TSB might not have been in a position to deliver to the same degree. Furthermore, the opportunity to acquire HBOS only came about in the middle of economic adversity and in conditions which are unlikely to be repeated. Besides the support from Government and the opportunity for growth, Lloyds TSB management board was very mindful of the difficult economic backdrop to this transaction with the prospect of further declines to come. However, Lloyds TSB purchased  £17.9 billion of HBOS net asset value for  £7.7 billion so, they were very much convinced that this was the right transaction for Lloyds TSB. The short-term outlook was indeed difficult and problems with the finances of HBOS will not disappear overnight. However, the earnings potential of Lloyds Banking Group will be significantly improved in the longer term. Lloyds TSB directors also understood that after the takeover, to reduce the systemic risk in the UK banking system, the recapitalization scheme has already cost Lloyds its 240-year-old independence. The UK Government, as part of the capital raising process, has now become a 43.4 per cent shareholder in the group. As part of Her Majestys Treasury (HMT) recapitalisation scheme, the Group was required to suspend the payment of cash dividends to ordinary shareholders until the HMT preference shares issued as part of the scheme are repaid. This is considered as a noticeable contribution from Lloyds TSB shareholders in their favourable voting for the takeover. One big concern to the Lloyds TSB employees and unions is the redundancy issue during the global financial recession. Although Lloyds TSB and the government dismissed reports of redundancies involving one third of the workforce and pledged to continue using HBOS headquarters in Scotland, the union leaders believe the job cuts will be about 15,000 in one year out of a 140,000 workforce. This brings concern to the employees about the serious plan which is designed to protect the members jobs and terms conditions of employment. The governments dilemma is how to stabilise the banking system and maintain an equitable business environment. The management boards dilemma is how to continue growing and manage the burden of the ailing HBOS, between short term and long term outlook. The shareholders dilemma is the potential of future substantial share value versus waiving current dividends or the workforce redundancies. In the context of the economic downturn in autumn 2008, Lloyds TSB had to consider the weighting between the benefits and adversities of the takeover, it was really the hard dilemma facing Lloyds TSBs stakeholder in making the decision of the takeover. Conclusion: 2008 was a very difficult and challenging year for the banking industry, the deteriorated market conditions have continued into 2009, both in the UK and overseas, a prolonged period of economic difficulty for many households and companies. The UK Government had to intervene in the banking system by providing capital and liquidity where the markets had failed. At times of great economic and financial uncertainty, many apparently settled ideas come under great scrutiny. When Lloyds TSB announced it was acquiring HBOS plc; and now about a year since the transaction was completed (16 January 2009), the deal is still receiving ceaseless criticism. Critics should consider what would have happened to the UK banking industry and the UK economic situation if the takeover had not taken place? If HBOS had failed, how many HBOS branches would have closed? How many employees would have lost their job? How many bank accounts of customers would have been affected? As a bank with a strong focus on customer relationships, Lloyds TSB is committed to helping its customers wherever possible to manage their way through these challenging times. Without doubt, the Lloyds Banking Group have spent great deal of time to overcome the challenges faced and fulfilled all necessary obligations to society. Here, never forget to mention about the crucial role of Human Resource Management during the pre-takeover and post-takeover. With only a short period of time for preparation, Lloyds TSB Human Resource Management have tried their utmost to create new HR practices and strategies that meet the requirements of the takeover. Employment law challenges, culture clashes, talent retention, employee engagement, recognition and conciliation conflicts, the HRM of Lloyds TSB has harmonised all activities in all phases leading to the creation of a unified organisation with a mission, vision, a clear purpose and values from two culturally different groups. Although there a re some shortcomings due to subjective and objective factors, the job that Lloyds TSB Human Resource Management is doing for employees and company is very valuable and highly valued, and it managed not to cause a big disturbance in the UK labour market. Finally, the decision by Lloyds TSB to takeover HBOS appears to have been the right transaction for the company. The support from government was definitely necessary and the favourable vote from both Lloyds TSB and HBOS shareholders showed that they believed this to be the best solution to the problems of both banks. The short-term outlook for the enlarged Group is challenging. Whenever economic conditions do begin to normalise, however, we believe Lloyds TSB will be in a very strong position to reap the benefits. Their strong franchise across the whole range of product lines will enable them to do just that. One of the most important ways in which leading businesses differentiate themselves from their peers is through the quality of their people and their strong commitment and Lloyds Banking Group believes that they have the qualities and the right people to ensure the bright future. APPENDIX 1: Background of Lloyds TSB and HBOS Lloyds TSB Bank Plc is a UK-based financial services group, which employed about 70,000 people. It was established in 1995 by the merger of Lloyds Bank, established in 1765 and traditionally considered one of the Big Four clearing banks, with the TSB Group which traces its origins to 1810, creating Britains largest retail bank, over all, Lloyds-TSB would be the fourth-largest bank on the stock exchange in terms of assets. Lloyds provides a wide range of banking and financial services to personal and corporate customers. Its main business activities are retail, commercial and corporate banking, general and life insurance, pensions and investment provision. Its services are offered through a number of brands, including Lloyds TSB, Cheltenham Gloucester and Scottish Widows. Its UK turnover in 2007 was  £18 billion. HBOS is a financial services group, which employed about 72,000 people in the U.K., was created in 2001 in the 9.7 billion-pound merger of Yorkshire-based mortgage lender Halifax Plc and Edinburgh-based the Governor and Company of the Bank of Scotland. It is the UKs largest mortgage lender. HBOS provides a range of banking, insurance, financial services and finance-related activities in the UK and abroad. Its UK turnover in 2007 was  £4.25 billion. The deal of takeover of HBOS by Lloyds TSB was concluded on 16 January 2009. The three main conditions for the acquisition were: Three Quarters of HBOS shareholders voted in agreement with the boards actions; Half Of Lloyds TSB shareholder voted to approve the takeover; UK government dispensation with respect to competition law. On 19 November 2008, Lloyds TSB shareholders voted 95.98% in favour of the takeover. They also approved plans to raise  £5.5bn by issuing new shares and special preference shares. On 12 December 2008, the takeover was approved by HBOS shareholders. A group of Scottish businessmen challenged the right of the UK government to approve the deal by overruling UK competition law, but this was rejected. The government has allowed the takeover of HBOS by Lloyds TSB to bypass normal competition rules. The exchange of HBOS shares for Lloyds Banking Group shares took place at an exchange ratio of 0.605 of a new Lloyds Banking Group share for every one HBOS share held. As a result, the UK Government through Her Majestys Treasury owned approximately 43.4% of the enlarged ordinary share capital of Lloyds Banking Group. Lloyds Banking Group is now the largest financial services franchise in the UK with a range of leading market positions in important product lines, such as savings, current accounts, mortgages, insurance and long-term savings. They are also a leading player in the Small and Medium Enterprise (SME) and wholesale banking sectors. The Group clearly has a very significant retail banking footprint and, with approximately 3,000 branches, is present in more UK locations than any other financial institution. Lloyds TSB Chief Executive Officer Eric Daniels will be Chief Executive of the enlarged company, and the banks Victor Blank will be Chairman. References Mullins, L.J. (2007) Management and organisational behaviour. 8th edn. London: Prentice Hall Buono, A.F. and Bowditch,