Wednesday, May 6, 2020
Ethical Dilemma On Accepting An Offer Free Essays
PART A: The Case John is a two year Graduate Engineering Trainee in an Automobile company in India, on a contract binding him to work for 3 more years after the training period. On completion of his training, John gets admission for a PG Program in Management in a reputed Institute. Because of the good impression he had created during training program, the Company grants him special leave with pay for this education. We will write a custom essay sample on Ethical Dilemma On Accepting An Offer or any similar topic only for you Order Now Further CEO personally informs him that his two year education expenses will also be taken by the company. He also expresses his hopes to have him back for a long tenure with the organization. During the last semester of his program, a Multinational Organization in Automobile business offers John a job in their Indian operations, with 6 months intensive job training in Germany. The compensation offered was almost 10 times of what he would be getting in his present employment. . The new organization would also compensate him for whatever he should pay to the present employer for returning his leave pay, education expenses or liquidated damages as per his original contract. Should John take up the decision of joining the new company? PART B: John should not leave his present company. All employment is a legal bondage, no doubt. But, the relationship of employer employee goes beyond that. The employer places full trust on the employee for a conscientious work performance. ( Heathfield, S. M, 13-04-2009) The employee delivers goods to the best of his abilities. What he is not able to do because of his deficiency in skill, knowledge or even attitude is acceptable, but knowingly withholding performance of a known skill, or causing a deliberate negligence of duty is not pardonable. Legal enforcement always has limitations. Most of the things go by moral bindings in life. Whether it is a family life or work life the element of trust forms the basic ethics of living. John should not let his present employer down. The present employer had gone out of the way to help John in fulfilling his ambition of completing a PG program in Management. In fact, it is this program opportunity had led the way for the new offer from another company. The present employer had not granted him the privileges with a parental attitude. The CEO had specifically called him, offered him the help and expressed his wish that John returns to the company job with added knowledge for a long tenure. John paying back the salaries he had earned during the special leave period or giving back the expenses which the organization had taken for his education, or for that matter sincerely remitting the liquidated damages as per earlier contract, will all belittle the basic value of human gratitude and acknowledgement. (Hunsinger, D. v. D. , 1995, p. 65) The present employer may not be able to sue him for more than what they had expended on John. Their feeling of hurt with this incident, and based on that, their attitude towards employee motivation programs will all shrink, affecting the future incumbents to the organization. So, John should not leave the employment and reject the Offer given to him by the multinational company, with ten fold compensation figures. PART C: John should take up the new offer All employment is a legal arrangement. The employer selects the right candidate, pays him a fair compensation and the employee discharges his performance with his utmost faith on his ability. The employee shall not cheat the employer in any of his work related activities. He should be faithful to his employer and work for him with total commitment. He should trust his employer and feel at liberty to ask him to give whatever he thinks right on his part to ask. He should never hesitate to remind him of a privilege or condition that the employer forgets to extend. Likewise, he shall not demand for something which is not due to him. He can always get things clarified wherever he has doubts about his rights. (Assertive Communication, 13-04-2009) Beyond this relationship, no employer has right to expect an employee to continue in employment for ever. Mostly conflict of interest arises only when one accepts another employment while at working with one organization disturbing his independence in working with the original organization. (Faculty Guide, 13-04-2009) Johnââ¬â¢s opportunity is a very rare occurrence. He can not dream of such an offer in the future. He should take it up. Giving up an opportunity, which will benefit him and his familyââ¬â¢s prosperity because of increased income will be wrong., For that matter he might be depriving the benefits to society by not contributing his competence in a wider area of work. Sometimes we confuse morals with ethics. Morals are stated to be selfish too, elsewhere (BrainMeta. Com, 13-042009) All John is expected to do is to go back to his present employer, explain the CEO the situation and his wish to go for the more prosperous job. He should be transparent enough to express his predicament. His taking up the new job is by all means for a large packet of compensation. It also gives him the opportunity in another country with more scope to improve his competence. From what has been his case all along, he is a person thriving for knowledge and this offer carries with it a good training program. He can always be grateful to his present employer on many future occasions, without damage to any of his personal or social values. For instance, there may be scope for him to be a contact to the new employer for the present employer to enter into collaboration arrangements or business arrangements. How to cite Ethical Dilemma On Accepting An Offer, Papers
The Department of Defense Security Plan
Question: Discuss thatthe department of defense is an organization who is responsible for the full security of the nation? Answer: Introduction The Department of Defense is an organization who is responsible for the full security of the nation. Various important and essential data of the whole nation are stored in the department of defense. The technology of defense is most useful in any type of problems. However there are many threats in the departments of defense. There are different types of threats such as biological threats, cyber attack threats, threats regarding the climate changes and also the crime regarding the transnational (Apte Heath, 2011). A security plan is very essential against those threats. The aim of this particular assignment is to develop a security plan that will provide security awareness policy to the department of defense (De Waal Buys, 2012). Some the necessary elements that are provided in this particular assignment are such as identity, protect, detect, respond and recover. Identify There are several threats and vulnerabilities that may cause in the department of defense. These threats are such as Biological threats The biological threats occur due to the natural calamities such as cyclone, hurricane etc. there should be secure plan for the bio threats. Also the bio weapons are used by the human resource to attack different countries. It is the duties of the defense department to track those threats and find the ways to defeat them (Deshmukh, 2012). This also includes the viruses that are spread throughout the world. Cyber attack The threats regarding the cyber attack are now-a-days become very popular. There are several hackers throughout the world. There are several important files in the department of defense that could create a great attention to the criminals. Climate changes In any type of strategic plan, climate changes became big issues for the department of defense. Tracking the issue like energy footprint creates an interest to the security department of the organization. Protect The protection of the infrastructure of the defense departments is very essential. There are several types of threats that are identified above. There is several ways to create a protection from the bio-threats. Although it is very difficult to identify the exact weather but there should be weather detector which can provide an estimate chances of the natural calamities (Dong Sutton, 2015). Also there should be medicines of all the viruses that may arise in the nations. Cyber attacks become a headache in any organization. There are hackers throughout the world. In any case if the security of the customer can break by the hacker, it will create a major issue in the department of defense. The past records of any people if hacked by any hacker, it may cause great problems in their life. There should be password and antivirus in the system of the department. The password should not be disclosed by any officer of the department. Most of the hacker uses the internet connection to hack the system. The internet security system should be tight in the department of the defense (Hutchinson Price, 2014). The security of the climate changes also should be strong in any organization. Organization should have the sensor and the detecting device that can use to observe the recent changes of the climate. Also there should be available of the medical supplies in the organization every time for any emergency situation. Detect In case of detecting several problems and threats in the department there are some objective such as Training provided to employees Inspect and test the indentified threats Trace the suppliers Qualification of the trusted suppliers are identified Detect and avoid the infected systems In case of detecting the threats before it will arise, the proper training should be provide to the employees of the department. Without a proper training the employees cannot be able to understand the threats. A regular inspection and testing should be following in the department to understand the arriving threats of the organization (Kupiecki, 2015). The suppliers of the organizations are required to trace and only the trusted suppliers should be allowed in the organization. The supplier should be qualified and should contain the required knowledge. The untrusted system should be detect and avoid in the organization. The risk management is also done in the defense organization. The risks are identified such as the data may loss in case of virus arrives in the system (Massingham, 2015). It will provide a great impact on the life of the customers. After analyzing of the risk, it is required to avoid or remove the risk. The security system should be stronger so that no risk could arrive. To regular monitoring of the risk, it is required to implement the risk management system in the organization. Respond A response team should be prepared to detect the problems and the threats of the organization. The responsibilities of the response team are to detect the threats before it is arrived in the organization and find the ways through which the threats can be removed (Rakowska, Valdes-Conca de Juana-Espinosa, 2015). The response team should keep the track of the present and upcoming threats and should take a required action against the threats. The response team should prepare a response plan and all the member of the team should follow the plan. According to the plan all the threats like the climatic changes, bio-threats and the cyber attack should be detect by the response team. The investigation of the threats should be done from the source and also find to remove the threats. Recover The organization should contain a recovery team to recover the disaster arises in the department of defense. The disaster regarding to the biological weather should be recover by creating new techniques. The members of the weather department should be heir to manage the geographical disaster. The techniques used in the recovery of the natural calamities should be according to the type of the disasters. In case of any loss of the infrastructure, the best engineer should be heir in the department of the defense. The disaster created by the man such as nuclear attack of the hacking, should be handled differently. The IT professional should be heir to get reed of the virus infects the system. Also to recover the data that are lost due to the viruses should be tried to recover. The manager of the organization should take care some of the situation that have arises by creating any problems to the customers (Vasilache, 2014). The proper security should provide to the customers in case of any problem arises. Recovery team should use some strategies and needed to keep the backup plan for the files and the record of the organization so that all the files can be get recovered easily by using the backup (Wendel, 2014). IT specialist should be required in case of restoring the files from the backup. Conclusion From the above discussion, the conclusion can be done that the organization should always prepare for any of the threats which can be manmade of can be geographical. To recovery of the threats that have arrived through hacking should be handled by the IT specialist and tried to recover the files and the records of the past years if required. The geographical threats like the natural calamities and the climate changes should be handled by the weather specialist. Also the response team should require investigating the current and the upcoming threats of the organization. This team will responsible to identify the threats and to find the ways through which the threats can be removed. References List Apte, A., Heath, S. (2011). Request and Response Processes for Department of Defense Support during Domestic Disasters. Journal Of Homeland Security And Emergency Management, 8(1). doi:10.2202/1547-7355.1824 De Waal, J., Buys, A. (2012). INTEROPERABILITY AND STANDARDISATION IN THE DEPARTMENT OF DEFENCE: AN EXPLORATORY STUDY. The South African Journal Of Industrial Engineering, 18(1). doi:10.7166/18-1-140 Deshmukh, D. (2012). A Brief Study of Defence Mechanism. IJSR, 3(7), 128-129. doi:10.15373/22778179/july2014/42 Dong, B., Sutton, R. (2015). Dominant role of greenhouse-gas forcing in the recovery of Sahel rainfall. Nature Climate Change. doi:10.1038/nclimate2664 Hutchinson, M., Price, D. (2014). On the continued acceleration of bomb casing fragments following casing fracture. Defence Technology, 10(2), 211-218. doi:10.1016/j.dt.2014.06.001 Kupiecki, R. (2015). The Promise of NATO Defence Planning. Security And Defence, 6(1), 5-14. doi:10.5604/23008741.1152445 Massingham, P. (2015). Knowledge Accounts. Long Range Planning. doi:10.1016/j.lrp.2015.02.003 Rakowska, A., Valdes-Conca, J., de Juana-Espinosa, S. (2015). Affecting Factors of Public Employees Ganizational Commitment. Ijsr, 3, 5. doi:10.17951/ijsr.2014.3.0.5 Vasilache, A. (2014). Great power governmentality? Coincidence and parallelism in the new strategic guidance for the US Department of Defense. Security Dialogue, 45(6), 582-600. doi:10.1177/0967010614552543 Wendel, J. (2014). U.S. Department of Defense deems climate change a national security threat. Eos, Transactions American Geophysical Union, 95(43), 392-392. doi:10.1002/2014eo430004
Sunday, May 3, 2020
Adolescence and Emerging Adulthood-Free-Samples for Students
Question: Write what is emerging adulthood and then relate it to erikson's stages with examples and use every stage which relates to emerging adulthood in ekison stages and explain it with examples. Answer: Emerging adulthood has been reckoned as a phase in an individuals life spanning from age 18 to 25 years that falls within the period encompassing late adolescence and early adulthood. It has been designated as the age of identity exploration characterized by vital attributes such as instability, self-focus, sense of plethora of possibilities for the future alongside feeling in between adolescence and adulthood. This proposed distinctive stage has been found to vary significantly between developed and developing nations (Arnett, 2014). The normative social in addition to the psychological conditions are depicted by virtue of this stage that may be further equated and corroborated with the Eriksons psychosocial theory of development which aims to emphasize on personality build up from childhood to adulthood through consideration of the external factors, society and parents (Syed, 2015). As per Eriksons theory, a persons life cycle is divisible into eight interrelated stages that a pers on must pass through during his or her lifetime. The age group for emerging adulthood may be related to the young adulthood phase as described by Erikson. In this age group of young adulthood, people tend to seek companionship and love whereby psychological strengths rest on these virtues primarily. A crisis for intimacy over isolation often engulfs this vulnerable group. They are on the lookout for satisfying relationships and deep intimacy at this phase and in case of non-conformance to such ambitions, isolation might occur. Associations and bonding tend to be stronger with the marital partner and friends through nurturing (Dunkel Harbke, 2017). Thus, it may be said that emerging adulthood and Eriksons stage of young adult is essentially interrelated. References Arnett, J. J. (2014).Adolescence and emerging adulthood. Boston, MA: Pearson. Dunkel, C. S., Harbke, C. (2017). A review of measures of Eriksons stages of psychosocial development: Evidence for a general factor.Journal of Adult Development,24(1), 58-76. Syed, M. (2015). Emerging adulthood: Developmental stage, theory, or nonsense.The Oxford handbook of emerging adulthood, 11-25.
Wednesday, March 25, 2020
Anne Frank as my hero essays
Anne Frank as my hero essays The one historical figure that has had a dramatic impact on my life, and more than likely numerous others, is Anne Frank. I feel the courage and emotions that she was able to exhibit and display to herself as well as many others in dire times, is something to be admired by all. In 1942, when the Nazis began to invade her country, the Frank family was forced into hiding. Due to the horrible persecution of Jews, Anne Frank and her family were forced to hide in an attic of a warehouse. The Franks daughter, Anne, kept a thourough diary of that horrific experience. Just minutes before the Franks were discovered and captured in the attic they had been stowed in for two years, young Anne made an entry to her diary. Her words stated, In spite of everything, I still believe that people are really good at heart. This expression of pure love for all mankind, can only be spoken by Anne. If we could all aspire to have this type of outlook on life we would all be much better off. Even though Anne unfortunately had to endure and suffer so much, her courage and character only grew stronger. Before Anne Frank went into hiding, she led a blissful and joyous life. She was always surrounded by her family, friends, and those who loved her. She was torn away from this ideal and peaceful life and placed into the harsh and cruel reality of war and the Nazi agenda. Anne was only thirteen years old when she had to witness all these acts of hatred and violence. As I mentioned before the Frank family was persecuted because of their religious beliefs. Although they were facing threats of death, the family never abandoned their faith and belief. They always remained true to themselves and their faith, no matter the consecunces. I can not even begin to imagine what it must have been like for young Anne. Even though Im Hispanic and a Catholic I most likely will never get to the point of suffering that she endured, ...
Friday, March 6, 2020
American Torture Techniques Against Detainees
American Torture Techniques Against Detainees The U.S. government has been accused of using torture-lite or moderate physical pressure against detainees, persons held in custody for political reasons, typically because they pose a distinct threat to the U.S. or possess information crucial to American security. In practical terms, what does this mean? Palestinian Hanging This form of torture is sometimesà referred to as Palestinian hanging due to its use by the Israeli government against Palestinians. It involves binding the prisoners hands behind his back. After fatigue sets in, the prisoner will inevitably fall forward, putting full body weight on his shoulders and impairing breathing. If the prisoner is not released,à death by crucifixionà may eventually result. Such was the fate of U.S. prisonerà Manadel al-Jamadià in 2003. Psychological Torture The number one criterion for torture-lite is that it must leave no physical marks. Whether U.S. officials are threatening to execute a prisoners family or falsely claiming that the leader of his terror cell is dead, a steady diet of misinformation and threats can be effective.à Sensory Deprivation Its remarkably easy for prisoners to lose track of time when theyre locked up in cells. Sensory deprivation involves removing all noise and light sources as well. Guantanamo prisonersà were additionally bound, blindfolded and wore earmuffs. Whether prisoners subjected to long-term sensory deprivation can still tell fiction from reality is a matter of some debate.à Starvation and Thirst Maslows hierarchy of needs identifies basic physical needs as the most fundamental, more so than religion, political ideology or community. A prisoner may be given just enough food and water to survive. It may take as long as a week before he appears physically thinner, but his life will come to revolve around a quest for food and he may be more inclined to divulge information in exchange for food and water.à Sleep Deprivation Studies have shown that missing a nights sleep temporarily drains 10 points from a persons IQ. Consistent sleep deprivationà through harassment, exposure to bright lights and exposure to loud, jarring music and recordings can drastically impair judgment and wear down resolve.à Waterboarding Water torture is one of the oldest and most common forms of torture. It arrived in the U.S. with the first colonists and has cropped up many times since then. Waterboardingà is its latest incarnation. Ità involvesà a prisoner being strapped down to a board then dunked in water. Hes brought back to the surface and the process is then repeated until his interrogator secures the information being sought.à Forced Standing Most common in the 1920s, forced standing involves prisoners standing in place, often overnight. In some cases, the prisoner may face a wall, standing with his arms extended and hisà fingertips touching it.à Sweatboxes Sometimes referred to as a hot box or simply as the box, the prisoner is locked up in a small, hot room which, due to lack of ventilation, essentially functions as an oven. The prisoner is released when he cooperates. Long used as a form of torture in the U.S., it is particularly effective in the arid Middle East. Sexual Assaultà and Humiliation Various forms of sexual assault and humiliation documented in U.S. prison campsà as forms of torture include forced nudity, forcible smearing of menstrual blood on prisoners faces, forced lap dances, forced transvestitism and forced homosexual acts on other prisoners.
Wednesday, February 19, 2020
World Bank Essay Example | Topics and Well Written Essays - 3000 words
World Bank - Essay Example The fundamental role of the Bank has undergone various conflicting opinions. Some of the shareholding countries borrow from it while others may provide fund. It is a financial intermediary working for the advancement of the national interest of the countries. The project brings forth the role of World Bank towards the international public policy management in the present scenario. It includes conflict prevention and changing international environment, fighting poverty, the health and food provisions for the poor countries, monitoring various socio-economic conditions, helping for improving global trading, project structuring and its monitoring and much more. World Bank has various international public policies and instruments which are used for the betterment of various countries especially in the conflict affected countries. It works at different levels according to the different phases of conflicts, analyzing them and implementing those into strategies and programs. One of the special measures taken is for poverty reduction and other for the Low-Income Countries Under Stress (LICUS). For the implementation of these policies and instruments the Bank has started for the Watching Brief where normal Bank assistance will not be possible; e.g. Haiti, Somalia, Sudan. It would allow the Bank to maintain minimum level of engagement, to monitor evolving socioeconomic conditions as well as the prospects to change. This would allow the Bank to re-engage with additional activities whenever needed or asked by the countries. (AEA, 2004)1 Another policy adopted by World Bank is the Transitional Support Strategy (TSS). It is a short to medium term Bank assistance strategy for the countries that do not have Country Assistance Strategy (CAS) or the ones that are not still ready for CAS e.g.: Afghanistan, Sierra Leone, Timor-Leste while in transition from conflict. The main objective of this policy is peace and recovery along with the needed assistance. With the stages of Watching Brief and TSS the World Bank would be able to assist even under full fledged CAS. These three levels of engagement are set out in OP/BP 2.30 and provide enough flexibility to the Bank for its involvement and assistance. CPR unit has also developed a Conflict Analysis Framework (CAF) to help Bank analyze more systematically while preparing policies, strategies and programs (CPR 2002e).2 World Bank also takes initiatives in project design and its implementation in developing countries. For Example in the recent project assessment for Sri Lanka the lack of sensitivity to any conflict may also constrain World Bank's interventions (World Bank 2003b)3. World Bank and IMF are the world's largest public lenders and help avoiding Great Depression-like economic disasters. But this help comes with strings attached in the form of policy perceptions as "structural adjustment policies". It means across the country privatization of public utilities and publicly owned industries. It focuses resources on growing export crops for industrial countries than supporting family farms for local communities. This has led to serious problems of inequality and environmental destruction in Latin America, Africa and Asia. (WBIMF, 2007) 4
Tuesday, February 4, 2020
Climate Change, Global Warming, Renewable and Nuclear Energy Essay
Climate Change, Global Warming, Renewable and Nuclear Energy - Essay Example However, the recently experienced variation particularly in the rise of global temperatures is arguably not as a result of natural variation alone but also the contribution of human activities. These activities are responsible for the heightened Carbon Dioxide levels and other heat trapping gases. Carbon Dioxide (CO2) and other Green House Gases (GHGs) such as Methane (CH4), and Nitrous Oxide (N20), contribute to global warming through their green house effect. These gases trap and retain the heat reflected from the earthââ¬â¢s surfaces, hence leading to extreme temperature rise (Turk & Bensel, 2011). The U.S. National Climatic Data Center indicates that global temperatures have been on the rise for the past three centuries. The last century saw an average rise in global temperatures of about 1.58 F with the Arctic warming twice as much (Turk & Bensel, 2011). The past 50 years data on severe temperatures have indicated a significant rise in temperatures; in other words, frosts, cold days and nights were less whereas heat waves, hot days and nights were more prevalent (Turk & Bensel, 2011). Also, this warming has not been attributed to the earth alone but also the oceans which have for the past years absorbed most of the heat present in the atmosphere. As a result, the oceans temperatures have increased significantly too. With time, this heat (from the oceans) will be released back to the atmosphere and this might result in further atmospheric warming. Currently, vast research suggests that global warming is ever increasing due to the high concentration of green house gases within the atmosphere. The green house effect is experienced widely. In fact, scientists at NASAââ¬â¢s Goddard Institute for Space Studies have established that there is a lot of absorption of sunââ¬â¢s energy than its emission. Hence, this imbalance is the chief cause of the green house effect (Pewclimate, 2011). The U.S. Global Change Research Program (USGCRP) produced a report in 2009 regarding the status of impacts of climate change in the U.S. According to it, human activities have greatly contributed to the rise in the concentration of the three main green house gases: Methane, Carbon Dioxide and Nitrous Oxide. Indeed, from the pre-industrial period these gases have increased in astonishing percentages. Carbon Dioxide has increased by 40 percent; Methane by 148 percent and Nitrous Oxide by 18 percent (Harding, 2007). Predictions indicate that with th e current rate in increase of global temperature, 2050 will be devastating as the global average temperatures will exceed to almost 280 C. This will result in sudden and irreversible changes such as loss of the Amazon forest, vast melting of the Greenland cap, and release of Carbon dioxide from the soils (Turk & Bensel, 2011). Worse still, it is feared that smoke, hazes and specks emitted from the fossil fuel and vegetation could be currently mitigating global warming by acting as a cover which could be averting solar energy back to space. The current trend of cleaning up air pollution will eradicate this ââ¬Å"global dimming effectâ⬠resulting in future increases in average global temperatures by almost 100 C (Turk & Bensel, 2011). Renewable Energy Recently, there has been a major concern to switch from using fossil fuels to the renewable forms of energy. However, to achieve this, we should take note of two things. First, there should be intensive research so as to offer alte rnative sources of energy in order to cut down on the prices of energies. Second, there is need for the energy prices to depict their true value; in other words, these prices should reflect hidden costs such as the environmental costs which are linked to the
Subscribe to:
Posts (Atom)