Wednesday, May 6, 2020

Working with Mobile Devices in Governance-Free-Samples for Students

Question: Write a report on Working with Mobile Devices in Governance. Answer: Introduction Nowadays each and everyone own at least one cell phone or can be more. In fact, most recent figure reveals that two-thirds of the population owns a mobile phone. It can be either feature phones (screen is limited to text and very low-end graphics) or smartphone (like small computers). However, the market trend is more towards the smartphone. In addition to that, the market for smartphones is dynamic compared with featured phones. For instance, half of the world's populations are the users of smartphones (Fernando, Loke Rahayu, 2013). Cloud computing has a very significant influence on mobile technology as it makes these devices more powerful and cheaper. With cloud computing, the users can access the applications and services located remotely. Recent market trend unveils that apple iPhone, Google android phones are showing trajectory upward. The countrys productivity can be improved by effective governance. Effective Governance also increases its competitiveness. In a country like India, service of good governance is quite a challenging task (Sundar Garg, 2005). The basic services that are provided by the government services via mobile phones help the government to deliver public services. The cell phones are coupled with innovative potential in applications of mobile that have reached to its height. These help the mobile governance as a cornerstone in different schemes of state government. Increasing the wireless penetration and services of better awareness helps in increasing the upgrade of mobile governance services in the future. The government focuses on the improvement of mobile governance (Jo et al., 2015). The services that the mobile government provides are providing information that are basic which includes alerts of natural disaster to polling via mobile phones. Key words:Mobile technology, cloud computing, mobile governance Literature Review E-governance and M-governance E-Governance: The application of ICT (Information and Communication Technology) is the E-Governance which includes delivering services of government, communication transactions, information exchange services that are held between G2C (Government to Customer) and G2B (Government to Business) and also different system of sand stone integration. There are four basic models that are available- government to employees, government to government, government to customers and government to business. M-Governance:(Mohamad, Building, Ismail, 2010)M-Governance is meant to provide access to those who are unable to access (means those prefer mobile phone or living in remote areas) the services offered by the government through the internet. By owning one cell phone and having access to one mobile network, then they can use the public services at anyplace at any time. M-governance is an innovative technology that brings government services to citizens by reducing the gap arising between them. Limitatins of M-Governance (Mohamad et al., 2010) explained about the limitations of m-governance. They are 1) Small sized phone: In rural areas, most of the people are relying on the small phone since they cannot afford the smartphone. 2) Government needs to take more care to ensure scalability and high availability of information. For this, the technology is to be more elaborated. 3) Some information is critical and needed to be safeguarded. Then will arise security and authentication problem. 4) Cost:To implement m-governance, a further channel is required in e-government. This channel will create additional costs. A substitute delivery channel can solve this to a certain extent.(Sreenivas, Manjunath, Abate, Weseni, 2016) 5) Some people use this technology for fun rather than productive activities. For example, hoax messaging. (Sreenivas et al., 2016) 6) Literacy problems: The reduced literacy rate creates some challenges in use of m-governance. (Sreenivas et al., 2016)M-Governance is an innovative technology. However, some part of the population is unable to access these technologies. For instance, poor people, illiterate peoples come under this category. Moreover, they are also denied from getting the benefits that offered by the government in other words m-digital divide. Today (2012) In this article also they agree that sometimes illiterate people face some sort of problems to access these services. This is because those people are unfamiliar with these devices and technology. The solution to this issue is that integrated speech assistance tools and by ensuring m-governance in regional languages. More and more people would use this service when proper awareness about services is given. Advancement in mobile technology will increase the usage among the masses. Tools The smart phone manufacturers group their devices to into different operating systems (Almunawar, 2015). The operating systems that are mostly used are RIM (Research in Motion), operating system with blackberry, windows operating system in mobile, symbian platform and all variation of UNIX that includes Android, Google and Apple iOS. (Mell Grance, 2011)Research in Motion has developed a system of mobile operating known as BlackBerry Operating System. Environment of Java development which includes IDE BlackBerry, Java Platform APIs, simulator of smart phones, and application of BlackBerry and vendors of third party like MobiHand are used for application developers. According to Almunawar 2015, modified kernel Linux is used to build an android operating system of Android. The maintenance and Android Development was developed by Android Inc. and was bought in 2005 by Google which is performed by Open Source Project of Android. The codes of the Android applications are mainly written in Java language by the use of Android SDK that includes a run time environment emulator for debugging and testing. The market of Google Android and different distribution channels like Handango and GetJar have an application that are distributed. The iOS of Apple comes from the Apple Mac OS X that is itself an operating system that is UNIX based and also the GUIs. The applications mainly in the Objective-c which uses iOS of Apple, Interface Builder and Xcode are built by the developers. The App Store of Apple has distributed applications which have almost 300,000 applications. The Windows mobile phone that uses Windows operating systems known as Windows Phone 7 is inherited from operating system of Windows Mobile. To make the user experience better, Microsoft designed Windows Phone 7 (Dinh et al., 2013). The codes are written through APIs by the developers such as API compass, Video API and sockets API (Presswire, 2012). The marketplace of Windows Phone distributes the Applications. There is also an operating system that has open source is known as Symbian. These operating systems are used for smart phones of Nokia. A Java application of ME with services layer are used in the service layer of operating systems. The developers of applications write all the codes in Java language, Perl, c++ or SDK that are customized for the developer of IDE who uses the applications. (Calheiros et al., 2011)The above mentioned mobile technologies have approached the technology of cloud in a broader way. The iCloud service of the Apple or androids helps the user to store data that includes pictures, audios, videos and also documentations. Apple has its different approach in developing cloud application of its own so that it can support the backup and storage of its own devices instead of going with the industry flow. The Apple operating system provides a reliable and secure synchronization feature with the cloud. Government perception The mindset of the government is not that easy to change. The government has built many infrastructures over the decades which do not easily communicate with each other. The perception of the government is changing day by day. They are using the concept of cloud to build scalable, secure and safe cloud solutions so that the efficiency of the government is increased (Dinh et al., 2013). The perception of government has now changed because they are able to deploy solutions that on the demand and also receives access to all the infrastructures without buying tools that are expensive. For ensuring cloud services in government, the agencies of government are looking for vendors who provide cloud services and also employ professionals who help them to move to cloud very efficiently and quickly. By existing infrastructures that are with bridges of networking, an efficient and controlled cloud can take place.(Sreenivas, Manjunath, Abate, Weseni, 2016) (Today, 2012)Mentioned the Current working areas of central government are bill payment system and filing income tax returns. They have been developing a framework for these services. Advantages of this framework are interoperability across several service providers and government departments (Sreenivas et al., 2016). Soon, we can expect services like disaster alerts in mobile phones as the m-governance is constantly developing. Possible m-Government Application Areas are: Notifications for payment of taxes, traffic condition information, notifications for civic authorities, disaster/crisis alerts, bill payment, support for education and government healthcare campaigns. Benefits of M-Governance for both citizens and public servants are: 1)The civil servant must carry data in either head or portable files when they are in the field. However, the emergence of m-governance helped them a lot to make better decisions and actions with the digitized government, 2)one of the major benefits is that the citizen can access the services and information at any place at any time (Today, 2012). In another way, it is beneficial for government also that they can ensure very critical information such as terror alerts are reaching the masses quickly and directly, 3)m-governance improves public interaction. since it provides a channel for interactions among policymakers, service consumers, service deliverers, civil society representatives, 4)m-governance lowers the effort and time needed in communication thereby motivating more and more communication, 5)m-government will boost the public servants productivity by allowing them to enter data and information at real time. Thus, it reduces the time needed them to spend on data related activities. In fact, they can use this time for other productive activities and 6) Availability of information at any time anywhere breaks the boundary and create a truly integrated digital nervous system for government. In a way to broadening the m-government concept, they are encouraging the citizen to use the full potential of their services. Citizens perception Almunawar MN (2015) narrated in his article about an issue related to client side. That is since the client (mobile users) is geographically dispersed, means long distance away from the cloud. As a result, it could affect the internet speed that in turn affects the performance, especially in data-intensive computation. The citizen thinks that the cloud has helped them to connect to their friends over social media (Computer, 2010). Connecting with all the old buddies has never been such an easy way that is now today. The citizen thinks that they are able to educate themselves through the medium of cloud computing. The whole world is connected together by the help of cloud computing which helps the citizens to save, upload or share files in the Internet. Security (Zhang, 2012) explained about the Challenges that are faced in the governance system come from three aspects of cloud computing: 1.the resources located on the data centre of service providers, 2. the client those interact with the resources, 3.the communication channel that connects client and resources. We will go through each aspect to study the most significant security challenge there, and come upwith appropriate solutions. As the results, our work will be including following three sections: secure computation with resources in a remote site, prevent information leak through the communication network and protect sensitive information on the client devices. Secure computation with resources in the remote location. Dividing task and keeping sensitive data on private cloud and rest can be maintained on the public is the solution. That is hybrid cloud computing. However, its cons are that it does not support data-intensive computing frameworks. Here they are suggesting MapReduce programming model as the example, and try to leverage the unique features which automatically partitions the job that is computing on all the data it works upon. Almunawar MN (2015) also cited in article regarding privacy issues and suggested a solution for this. Obviously, about the sensitive information of government agencies. Since the data is located remotely somewhere else, there arise one question like can the cloud providers offer the same protection as if it is stored locally? The third party cannot be trusted completely, since they do not provide any security and privacy to the data stored in the cloud. In this article, they are suggesting one solution to this issue as security-related activities can be assured to a third party such as ISO 27001 or SAS 70. Another one that is highly related to one as mentioned earlier is that since the data on the cloud is accessing through the open network like the internet, there affects the confidentiality of data. The major ones that arise as a topic of discussion among the researchers were security and privacy issues. Some of the proposals regarding security and privacy issues are appended. Protection is given to the identity of a mobile user from hackers. Xiao and Gong ha suggested a process which involves environment of mobile computing to create dynamic credential for all users of mobile. Next is all about malicious content in mobile devices. A platform is called cloud antivirus platform in which a separate network service or cloud have given the detection capabilities. However, R.Chow et al. suggested an inbuilt authentication platform to tackle the privacy issues. In fact, Jia et .al suggested two schemes called PRE (proxy re-encryption)and IDE (identity-based encryption) to solve security issues related to data. The factors that thrive mobiledevice to use cloud computing are less energy, less security, low storage, limited processing power, and battery. (Zhang, 2012)Prevent information leak through the communication network. Users are communicating with the client using client software. So there can be a possibility of side channel attacks. Web application components are used in both browser and web server. Therefore communication is essential, and this can lead to side-channel attacks. The automatic quantification and detection of solution is possible on side leaks of side channel in the web applications. Impact of cloud on M-Governance Research and Markets, 2012 explained about the impact of cloud on m-governance. For the public citizens, telecommunication corporations and government agencies, the cloud-enabled mobile governance offer boundless opportunities.The result of a survey in December 2010 by1105 government information group is that the apex three reasons which thrived the public bodies to include cloud to governance are quick access to data and information, simplifying IT framework and management and reduction in cost. The development in technology enhances the performance and adoption of cloud (Ferrer-Garcia, Gutirrez-Maldonado Riva, 2013).Cloud application is possible in many fields. One of the interesting areas is mobile technology. In this article one of the major areas of discussion is how the cloud computing environment can enhance the overall functions of all the device of mobile. According to Dihal et.al,2013 there so many factors that affect the mobile devices capability and availability.(Kumar and Lu,2010) explained these factors as memory storage, input methods, battery lifetime, processor capability. The issues of mobile devices can be mitigated by cloud computing (Chun and Maniatis, 2009). Aforementioned is beneficial to both consumers and service developers. As far as consumers concerned, they can access services like music, movies, and services despite their devices capabilities. In the case of developers since they had to manage only one version of their services in the cloud. Key findings/future references New intelligent services of mobile are enabled by cloud computing (Mohamad, Building Ismail, 2010). Cloud computing also collects the data from sensors of devices that provide the services that are customized (Wang and Deters, 2009). Research and Markets, 2012 cited in his article as mobile cloud computing is a still-evolving concept with various challenges includes reliability, delay in handover, data integrity, bandwidth limitation, task division for offloading, security of data and information in the device as well as in communication channel (Computer, 2010). According to the article written by Chen et al. 2011, the cloud computing recently has introduced a technology that allows the users so that the users get access to all the storage, development environment, infrastructure and software that is based on the model that is based on pay what the users use. The dynamic nature of cloud environment cannot be handled by the forensics of digital that are traditional. So an approach that is efficient to forensic investigation is proposed by the use of snapshots of Virtual machine. The future work on cloud computing is the architecture will the pattern of server less architecture. The server less pattern of architecture will determines the infrastructure that is needed dynamically. Conclusion Cloud computing has a very significant influence on mobile technology as it makes these devices more powerful and cheaper. With cloud computing, the users can access the applications and services located remotely. Recent market trend unveils that apple iPhone, Google android phones are showing trajectory upward. Effective Governance increases its competiveness. In this report, the details of mobile cloud computing is given which defines the m-governance and the e-governance. This report gives a detailed structure on what the government and the citizens think about mobile cloud computing and also illustrates the security that is provided by mobile cloud computing. There is also a detailed structure about the impact of m-governance in present world and some future works is detailed which helps to improve the mobile cloud computing. References Almunawar MN (2015) Benefits and Issues of Cloud Computing for E-Government. Review Pub Administration Manag3:e105. doi:10.4172/2315-7844.1000e105. Calheiros, R.N., Ranjan, R., Beloglazov, A., De Rose, C.A. and Buyya, R., 2011. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms.Software: Practice and experience,41(1), pp.23-50. Chen, K., Hu, C., Zhang, X., Zheng, K., Chen, Y. (2011). Cloud Computing.IEEE Network, 4. Computer, E. (2010). Mobile Devices May Pose the Greatest Threat to Confidential Information , ISACA, 12. Dihal, S., Bouwman, H., de Reuver, M., Warnier, M., Carlsson, C. (2013). Mobile cloud computing: state of the art and outlook. Info, 15(1), 416.are https://doi.org/10.1108/14636691311296174. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Ferrer-Garcia, M., Gutirrez-Maldonado, J., Riva, G. (2013). Virtual reality based treatments in eating disorders and obesity: a review.Journal of Contemporary Psychotherapy,43(4), 207-221. Jo, M., Maksymyuk, T., Strykhalyuk, B., Cho, C. H. (2015). Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing.IEEE Wireless Communications,22(3), 50-58. Mell, P., Grance, T. (2011). The NIST definition of cloud computing. Mohamad, R., Building, A., Ismail, N. A. (2010). Journal of Internet Banking and Commerce. Journal of Internet Banking and Commerce, 15(1), 111. https://doi.org/10.1007/978-3-531-92534-9_12 Presswire, M. (2012).Research and Markets: 4G Cloud Services for Mobile Governance. Sreenivas, N., Manjunath, G., Abate, Y., Weseni, T. A. (2016). Analyze on m-Governance for Better G2C Service in Ethiopia. International Journal of Trend in Research and Development, 3(1), 123126. Sundar, D. K., Garg, S. (2005). A Framework for Indian Urban Local Bodies. The Proceedings of Euro mGov, 395402. Today, C. (2012). MVAS Empowering the Nation, (Jan), 15. Zhang, Y., Juels, A., Reiter, M. K., Ristenpart, T. (2012, October). Cross-VM side channels and their use to extract private keys. InProceedings of the 2012 ACM conference on Computer and communications security(pp. 305-316). ACM.

Tuesday, May 5, 2020

Leadership Effects on Innovation Propensity

Question: Discuss about the Leadership Effects on Innovation Propensity. Answer: Introduction: The beginning of the 19th century saw a rise in the innovation sector as is evidenced by the immense industrial revolution. It gave a rise in the use of technology and thus it witnessed a subsequent increase in the standard of living of the common people. This essay critically discusses the theories of innovation, change and leadership of innovation and change. It then moves on to discussing two of the instances of innovation and change of the present day. Finally, the write up projects a self-assessment of leadership skills of the writer, focusing on the strengths and weaknesses. In the initial phase of the 20th century, Everett M. Rogers, the leading theorist propounded the Diffusion of Innovation. He defined the term as the process by which an innovation is communicated through certain channels over time among the members of a social system. The diffusion of innovation is divided into five distinct stages. They are awareness, evaluation, trial, interest and adoption. Awareness is the stage in which the people become aware of an innovation. It then moves on to the stage of interest, in which an individual gets interested in the new idea and therefore tries to seek additional information about it. In the evaluation stage, an individual mentally prepares to adopt the innovation and applies it mentally to the present and anticipated future. Rogers evaluates whether or not to try the innovation. In the trial stage, the individual makes a full use of the innovation and tries it personally. Adoption stage calls for the adoption and use of the innovation by the ind ividual (Sznajd 2013). According to Nan, Zmud and Yetgin (2014), the five stages of the theory was later amended to the following: persuasion, implementation, decision, knowledge, and confirmation. Knowledge is the new idea, and the individuals of the society having an understanding about the idea. During this stage, the innovation is not yet found out by the individuals. Persuasion is the stage where individuals try to find out about the new innovation. An individual actively tries to find out more about the innovation. In the decision stage, the individuals of a society decide whether or not the innovation has to be bought or adopted (Nan, Zmud and Yetgin 2014). In this stage, the individuals weigh in the pros and cons of adopting the innovation. In the implementation stage, the consumer of a product decides to give a trial to the product that he wants to purchase. He or she decides on the usefulness of the innovation and then takes a decision as to whether to purchase the product or not. According to Bu kin (2015), the confirmation stage is the stage where an individual accepts or rejects the innovation depending upon the potential of the innovation (Bukin 2015). In the year 1962, Rogers came out with the theory of diffusion of innovation to properly understand the process by which an innovation is perceived and adopted by the society. Innovation is the basic backbone of a nation. It forms the basic framework on which a country operates and develops. It helps the country to move ahead and reach the desired level of prosperity. The process of the diffusion of innovation theory has five distinct stages based on the adoption rate of an innovation. They are early adopters, innovators, late majority, early majority and laggards. The diffusion of innovation theory in the present day and age has a lot of takers. The theory of diffusion of innovation has a lot of strengths and weaknesses. According to OMahoney (2016), the strength of this theory lies in its applicability in the world of today. The theory offers a significant advancement over the previous theories (OMahoney 2016). The theory is very practical and is consistent with all the findings from all the surveys and experiments. It was the foundation for numerous promotional communication and marketing theories (Hayes 2014). Despite all these strengths of this theory, there are many weaknesses of this theory also. On the contrary, Di Benedetto (2015) said that one of the main weaknesses of the theory is that it is of a linear structure and is source-dominated. It is so because it presents the view from the perspective of the elite class. Another weakness of this theory is that it undermines the power of media. It gives importance to different types of peo ple who are important to the process of diffusion. Rogers failed to take into account the fact that media can also be used to provide a basis for group discussion. Another main weakness of the theory is that it inspires acceptance by groups who is not positive about the innovation (Di Benedetto 2015). This theory explores the stages through which an innovation passes down from the stage of manufacturing to the stage of availability to the consumers. The outcome of the theory is that it gives the idea of the stages that goes in the process of the distribution of an innovation in the market. The theory helps in the understanding of the stages through which a product passes in the market. The outcome can help us to understand the process of diffusion of an innovation. The theory can help us to understand the stages and thus analyze the process that goes on in the distribution of any new idea or innovation in the market. The outcome can help us to understand the process in which a product or an innovation, which might be an idea also, gets distributed in the world market. The understanding of the outcome can help us in getting a better perception of the stages of diffusion of an innovation, which can help to create successful planning of product launch in the future. The change management theory incorporates five building blocks of successful change. They are awareness, desire, knowledge, ability and reinforcement (ADKAR). The theory talks about the ability to implement new skills and the ability to implement the change and understands the barrier that may hinder in implementing the change. It talks about the reinforcement to sustain the change and the mechanisms that are needed to keep the change in place. It also takes into account the recognition, rewards, incentives and successes. The ADKAR describes the key building blocks for a successful change (Day and Shannon 2015). According to Cameron and Green (2015), the theory essentially outlines knowledge, tools, resources, and the systematic approach to deal with change (Cameron and Green 2015). However, from Rock (2014), it can be also known that the theory shows how teams and people are influenced by a change in an organization. It deals with various disciplines that range from information tech nology to social, behavioral sciences, and business solution (Rock 2014). According to Hughes et al. (2016), change is pivotal and necessary in all organizations. It is an invariable process. However, the way the change is initiated, can vary from organization to organization. It can come as an external force or sometimes from the realization that some kind of change is necessary. The change in an organization allows companies to compete in a better way. It is required so that the company is better equipped to compete with its rivals (Hughes et al. 2016). According to Pugh (2016), it helps an organization to better understand the current trends and thus change keeping in mind the current trends of a market. It helps the individuals or the employees to better understand the need for change in an organization. It helps to understand the reason why the change was necessary. With the change, individuals will have a stake that is greater in the outcome since they help to implement the plan (Pugh 2016). However, according to Kazmi and Naarananoja (2014), there are certain weaknesses or disadvantages that this theory brings. In an organization if change is not implemented properly or clearly, then it can cause the failure of any project. If there is a lack of a thorough understanding of the culture of the organization amongst the employees, then it may lead to incorrect or corrupt information about the change. A bad change management plan can ruin the future of the company. Any kind of change brings with it a certain amount of negatives. Employees of an organization need to understand the after-effect and the repercussion of absorbing a change in an organization (Kazmi and Naarananoja 2014). This theory is essentially used to gauge the steps through which a product is adapted by the consumers. It depicts the five distinct stages through which a change is implemented. It discusses the force that brings along the change and the things that are required to keep the change in place. The outcome of the theory is that it provides a better understanding of the procedure of change in an organization. It helps to get a keen understanding of the stages of change. The outcome of the theory can help us in understanding the procedure of implementation of change in a company. In the future, it can help in implementing the plan for a change in a company. To bring about a change in a professional institution, the management must have a clear understanding of the outcome of the theory. Innovations and changes can be implemented in an organization only with the help of a capable and strong leader. Innovation leadership is a technique and philosophy that combines different kind of leadership styles to influence the workers to embrace new technologies and produce creative products, ideas and services. Encouraging creativity, supervisory encouragement, work group encouragement and organizational encouragement, all play a crucial role in deciding the adoption of change or innovation in an organization that can come in only with the help of a strong leader. A successful leader always finds out ways to make the innovation appealing to the employees of an organization to bring about a change in the organization. The theory is used to find out different kinds of leadership styles that is necessary in an organization. The outcome of the theory is to find out the way that a leader in an organization must function in order to bring about a change. The outcome can help us in understanding the new technicalities of the change that might affect the organization. The outcome can help the future managers to understand the need for a change in a company and help the employees to be motivated and open to bringing in the change. To illustrate these theories two instances of innovation can be taken into consideration: one successful and another one a lesser successful. 2007 witnessed Indias largest company in commercial and automobile sector, Tata Motors launching a four-seater car for a price of just 1450 Euro. This innovation from the house of Tata Motors became the worlds cheapest car where the company deliberately lessened the cost of production reducing the performance of the car and directing its focus towards low-cost design. Tata Nano is a product that has been poised out of eminent technological solutions like procedure of plastic in place of metal, indistinguishable and modular components. Tata Nano became a product drilled out of the companys successful innovation strategy, which is worth to be emulated by its rival in future years. People loved what they saw and Tata Nanos sale got bigger and better. The car did put India on the global map and Tata Nano was deemed a path breaker. Having a big brand name does not always guarantees success, Pfizer found that out when they made a fatal mistake of associating an identifiable brand name to something that was essentially out of nature. Ben-Gay aspirin was not the product people liked swallowing to ease off the pain, that taste of aspirin was more like the pain-relieving balm from the same brand that people demanded to let go their pain. The burning sensation that people talked about negated the companys idea of an aspirin product as a substitute of the balm. As is exemplified from the instance above, the transformational leadership skills is something that I would personally prefer. The transformational leadership entails the incorporation of change in a particular organization to bring about an overall alteration of the existing workings of a company. By adopting this type of leadership, I would be clear as to what kind of change is required to make my company succeed and develop in this fast and competitive world. I would prefer to challenge the status quo of the organization by introducing a new and innovative method of doing something. I would like to introduce new and creative innovations into the organization in order to make the company more successful. As this type of leadership indicates, I would work with my juniors and subordinates to find out the change that is needed in the company (Avolio and Yammarino 2013). I would try to inspire and begin the procedure of implementing the change in the company. The strengths of adopting this approach of leadership are that it will help to find a better way of doing things in an organization, I will have an edge over identifying the areas of the company that are not working, I can cater to many niche markets and explore the possibility. The weakness of adopting this type of leadership is that many people can be wary of the amount of risk involved in this procedure and it can put off people who are resistant to any type of change. References: Avolio, B.J. and Yammarino, F.J. eds., 2013. Introduction to, and overview of, transformational and charismatic leadership. InTransformational and Charismatic Leadership: The Road Ahead 10th Anniversary Edition(pp. xxvii-xxxiii). Emerald Group Publishing Limited. Breevaart, K., Bakker, A., Hetland, J., Demerouti, E., Olsen, O.K. and Espevik, R., 2014. Daily transactional and transformational leadership and daily employee engagement.Journal of occupational and organizational psychology,87(1), pp.138-157. Bukin, K., 2015. Diffusion of innovation: a model of evolutionary processes.Economic Policy,6. Cameron, E. and Green, M., 2015.Making sense of change management: a complete guide to the models, tools and techniques of organizational change. Kogan Page Publishers. Day, G. and Shannon, E.A., 2015. Leading and managing change.Leading and Managing Health Services: An Australasian Perspective, pp.295-304. Di Benedetto, C.A., 2015. Diffusion of innovation.Wiley Encyclopedia of Management. Hayes, J., 2014.The theory and practice of change management. Palgrave Macmillan. Hughes, D.L., Dwivedi, Y.K., Simintiras, A.C. and Rana, N.P., 2016. Change Management. InSuccess and Failure of IS/IT Projects(pp. 57-65). Springer International Publishing. Kazmi, S.A.Z. and Naarananoja, M., 2014. Collection of Change Management Models-An opportunity to Make the Best Choice from the Various Organizational Transformational Techniques.GSTF Business Review (GBR),3(3), p.1. Nan, N., Zmud, R. and Yetgin, E., 2014. A complex adaptive systems perspective of innovation diffusion: an integrated theory and validated virtual laboratory.Computational and Mathematical Organization Theory,20(1), pp.52-88. O'Mahoney, J., 2016. Archetypes of Translation: Recommendations for Dialogue.International Journal of Management Reviews,18(3), pp.333-350. Pugh, L., 2016.Change management in information services. Routledge. Rock, D., 2014.Quiet leadership. HarperCollins e-books. Ryan, J.C. and Tipu, S.A., 2013. Leadership effects on innovation propensity: A two-factor full range leadership model.Journal of Business Research,66(10), pp.2116-2129. Sznajd-Weron, K., 2013. Diffusion of innovation.

Friday, April 17, 2020

Preparing For ISEE Sample Essay Prompts

Preparing For ISEE Sample Essay PromptsThe ISEE sample essay prompts and sample essays help students to prepare for essay test in order to get through the first part of their semester. In fact, a lot of students who take the test and write the essay are not able to finish the entire assignment on time because they were not given enough practice.There are some students who have spent a lot of time just in preparing their sample essay prompts and samples. On the other hand, there are also some students who do not know how to start with writing a first line and even less know about how to deal with grammar. One way to solve this problem is to seek help from professionals.If you have been attending classes since the first semester, then you must be more prepared for the essay test, but if you are still struggling to find ways to improve your essays, then the best way to help you is to consult a professional. A professional can help you learn the basics of writing an essay without getting to the point where you become frustrated and cannot finish the whole assignment. This way, you can avoid the problem of giving a poor grade or receiving complaints from the teacher.Besides, you can choose from the different types of sample essay prompts that you can use to help you finish your assignment in less time. In order to do this, you should first begin by doing some research on the topic. By doing so, you will be able to find out which part of the essay that you need to be working on. Of course, you can also go through the list of sample essay prompts in order to find out the types of topics that you will need to write about.Before you even begin writing your essay, you should remember to write the first sentence first. After you finish the first sentence, then you can proceed with the rest of the essay. Otherwise, it is likely that you will forget the parts that youhave already written and you will just end up re-writing it once you read the first sentence. Once you have finished the first sentence, you can then move on to the following paragraph.For the remainder of the essay, you should start writing in the appropriate order so that you will know how to write the first paragraph and the rest of the essay. Do not worry if you do not fully understand everything that you are reading and writing. The more experience you gain, the easier it will be for you to read and write essay questions.After finishing all the samples, you should check the parts that you have written and compare it with the original examples. If you found something wrong with the samples, then you should rewrite the sentences. However, if you feel that you wrote the sentence correctly, then you can move on to the next sentence and finally the beginning of the essay.Always remember that even if you do not completely finish the essay before the deadline, there is no need to worry about it. Most essay tests are much easier than the ones you had taken in the past. So do not be too anxio us and just take your time to finish your work before the deadline.

Sunday, April 12, 2020

Visual and Contemporary Arts

Introduction The theme of identity explains how individuals view themselves as part of the wider society and culture. This is because people’s culture is all about connecting amongst themselves and with other members of the society.Advertising We will write a custom essay sample on Visual and Contemporary Arts – My Bed by Emin Tracey and Nan and Brian in Bed by Nan Goldin specifically for you for only $16.05 $11/page Learn More The works My Bed by Emin Tracey and Nan and Brian in Bed by Nan Goldin present the theme of identity in detail. This paper will compare and contrast Tracey Emin’s work of art by the name My Bed with Nan Goldin’s work Nan and Brian in Bed. Comparing and Contrasting Tracey’s ‘My Bed’ and Goldin’s ‘Nan and Brian in Bed’ As a famous storyteller, Emin Tracey has used her work My Bed to explore the emotions that define the human soul. Through this work, different themes in art like body, emotion, place, identity, and science are evident. Emin has used this confessional work to explore herself as a human being with a certain identity (Robertson 32). She achieves this by integrating her own art and private life thereby establishing a unique bond and intimacy between herself and the viewer. She identifies herself as a normal person who can be disoriented and heartbroken when things go wrong. Through her own work of art, Tracey has decided to portray her own bed to explain her detachment with her soul. She has used the work to identify herself as a normal person who stands the chance of getting torn and insecure. As it is the case with every person, she uses the theme of identity to show her inner feelings and connection with the world. She is in pain just as it is the case with the bed. What we observe in this work of art is that Tracey’s bed is in a mess. She presents it in its embarrassing moment and glory. There are fag butts, worn clothes and panties, empty bottles and dirty sheets. This portrays a bloody situation characterizing her point of breakdown (Robertson 45).Advertising Looking for essay on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn More This is an artistic way of identifying herself with the wider society. This is because life is usually hard and torments people by it at times. This brings a lot about the soul as something vulnerable to breakdown, anxiety and endless pain. The work of art by Tracey portrays the aspects of the soul thereby identifying her feelings with the wider natural context. By presenting the bed in such a situation, Tracy has managed to share her own space. She reveals how insecure she appears to be. She identifies herself as a normal human being who is not perfect all the time (Robertson 43). This means that he is normal and imperfect just like the entire world. With her bed in a mess, the viewer learns a lot about the weaknesses of the human soul especially when faced with heartaches and pain. She has used her own bed to explore her personal life as ordinary and full of mishaps and misfortunes. This brings out the theme of identity since every individual has emotions and attachment to certain behaviors motivated by certain events. Just like any other person, the artist has used her work of art to identify herself as someone who fits in the society. Our culture and the people we interact with determine our actions and inner feelings. My Bed by Tracey Emin The work makes it possible for Emin to identify herself as a woman who affected by a breakdown. Everything around her bed is messy. The idea here is that her life is messy and therefore she must be seeking some form of re-invention in order to get back in track. She has presented the bed to show her identity and connection with the human race. She examines a deeper meaning and emotion of the human soul. The bed is what identifies the artist and the kind o f pain she must be facing (Robertson 67). The bed is a work of art used to identify the life situation of the artist in the wider context of the society.Advertising We will write a custom essay sample on Visual and Contemporary Arts – My Bed by Emin Tracey and Nan and Brian in Bed by Nan Goldin specifically for you for only $16.05 $11/page Learn More As part of the theme of identity, the work of art presents a new sub-theme of essentialism. In the work of art, the artist has conveyed a conventional idea that human beings are natural beings with specific emotions. Apart from the common held stereotype, Emin has brought out the idea that identity of individuals is not something peculiarly relevant or attached to some cultures and not others. The artist has presented the bed as a depiction of human emotion as something that is independent of people’s race or culture. It is something born deep in us, and affects the way we reason, behave and a ct during some our darkest hours (Robertson 34). Emin finds herself in a mess simply because she had a break-up and this affected herself psychologically. It is because of this fact that she finds herself disoriented and unattached to her inner feelings. It is therefore acceptable that the art explores the unique identity of human beings. It explores how human beings identify themselves with their inner feelings and emotions. Because of what is going on in a person, he/she acts in a similar manner thereby affecting the wider relation with other people around. The other idea presented by the work of art is how surroundings and settings define people. This is the case with Emin, who is deep trouble and faced a breakdown. The bed is her only companion and the reason she finds herself not pairing well with it and everything else that she uses including her own clothes. From this work of art, we are compelled to observe that identity is something important as a theme in art (Robertson 84 ). This is because people are performing various identities depending on their situations and conditions. This affects their emotions as well as how they relate with other during certain critical moments. In the second work of art Nan and Brian in Bed, the viewer observes that Nan Goldin has painted herself with one of her lovers by the name Brian. The self-portrait has a number of themes including sexuality, identity, domesticity and gender. This is the outstanding different with Tracey work which presents the themes of identity, emotion and place (Robertson 49). Goldin is famous for documenting works with women in barrooms, sexual acts, and the culture of dependency. This exact thing stands out in the work Nan and Brian in Bed.Advertising Looking for essay on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn More Nan and Brian in Bed by Nan Goldin However, it is notable that the theme of identity is identifiable in the self-portrait by Nan Goldin. In this painting, Nan has presented herself as a natural human being who has emotional and sexual desires. She views herself as part of the wider societal setting and the reason she presents herself as a sexual being through the work of art (Robertson 78). By portraying herself in this self-portrait, it is notable that Nan has identified her unique stand as a human being and the way she relates with her audience. After carefully examining the portrait, the viewer observes that the work of art depicts drug use, aggressiveness, and violence. This shows the kind of life she might have led as well as how it affected herself as a woman. Through the work, Nan has managed to identify herself as someone different from what might be the expectation of the society (Robertson 87). She explores her work beyond male centric behaviors. Nan stands out as an achi ever in a field dominated by males because of her work. However, while she is a great artist, this does not make her different. She is therefore a normal human being who has desires just like any other person. In this self-portrait, Nan brings out the theme of identity. She identifies herself as a human being who loves life. While Tracey presents herself indirectly through her bed, Nan identifies herself in an outwardly manner by painting herself in bed with her lover. By so doing, she presents herself as someone who has attitude and feelings. The similarity in the two works of art is that they explore and present a deeper meaning and idea within the human soul. Pain and affection are two unique feelings that define the human soul and identify a person within the wider societal context (Robertson 104). The self-portrait by Nan has also underscored the sub-theme of essentialism. For years, people have stereotyped women as individuals used by males for sexual purposes and desires. Thi s is something that widely examined and studied for years. However, the artist has explored the issue from a different perspective. She uses her work of art to bring out a new meaning and concept about life and love. The theme of identity comes out from the painting with Nan being in control of the situation. This is because she is a person who can interact with others and gain satisfaction in her life. By presenting herself in the self-portrait, the artist has explored the idea that she is a free person who knows what she needs in her life. By so doing, she identifies herself as a successful person who is performing her identity without any foreign control (Robertson 106). It is therefore agreeable that the artist has used a self-portrait to portray her own identity and pass her message to the audience. By relying on the theme of identity, Nana has managed to break the traditional notion or mold whereby issues of sexuality and works of art tend to be male-dominated. She has present ed her independence through the work of art thereby identifying herself as a successful artist to the audience. While Nan has identified herself as a contented person in life, Tracey relies on the same theme to identify herself as a normal person with weaknesses just like any other person. Conclusion It is agreeable that the two paintings present the theme of identity to the viewers. The artists have managed to present this theme by analyzing the gap between life and the soul. As human beings, the artists have feelings that define their behaviors and attitudes towards life The attachment of people and the bedroom is also a part of human identity. It is notable that we can rely on art to express our stands, feelings, emotional attachments and lifestyles. The two artists have therefore managed to use their works of art to bring out the theme of identity. This has helped the viewer understand how people interact with their environment as well as their inner self. Works Cited Robertson, Jean. Themes of Contemporary Arts Visual Art after 1980. New York: Oxford University Press, 2005. Print. This essay on Visual and Contemporary Arts – My Bed by Emin Tracey and Nan and Brian in Bed by Nan Goldin was written and submitted by user Imani Mooney to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, March 11, 2020

Free Essays on Gulliver’s Travels As Both Story & Satire

At the surface, Gulliver’s Travels is a rousing adventure story, full of strange, comical and wondrous lands and beings. It is a straightforward tale of several voyages and adventures, wild and imaginative. However, scratch beneath this surface and you will find scathing commentary on the state of mankind. Gulliver’s first voyage to Lilliput can be seen as a critique of English party politics and the small-mindedness Swift ascribes to it. The final voyage, though, we see Gulliver, soured by what he has seen throughout those long years, finally abandon humanity illustrated (at least in his eyes) by the vile Yahoos. In the end, Swift portrays Gulliver as equally flawed and absurd as the other beings he encountered by not allowing him to see the potential in his fellow human being. This book is not merely an adventure, but a depiction of the human condition, its debased nature as well as its promise. The first voyage begins with a violent storm, which strands Gulliver on an uncharted island. He soon finds himself captured by the miniscule Lilliputians. Gulliver engages in a treaty with the king and begins to learn about their society. Gulliver, the fictional author of these accounts is as straightforward as the prose, taking Lilliputian society seriously and without criticism. Swift, however, has made these tiny, petty men to represent his attitude towards English party politics. By having Gulliver tower over the people of Lilliput, Swift exaggerates their smallness of character, creating a more absurd view of their legalese, boasts of vastness of realm, and the almost Babylonian description of their king. Their pettiness is further illustrated by the charges of treason leveled at Gulliver for his various actions to save the castle from fire, and the realm from invasion. Several parallels can be made between the Lilliputians and England of the 17th and 18th centuries. The eternal war with Blefuscu can be seen as the centuries long ... Free Essays on Gulliver’s Travels As Both Story & Satire Free Essays on Gulliver’s Travels As Both Story & Satire At the surface, Gulliver’s Travels is a rousing adventure story, full of strange, comical and wondrous lands and beings. It is a straightforward tale of several voyages and adventures, wild and imaginative. However, scratch beneath this surface and you will find scathing commentary on the state of mankind. Gulliver’s first voyage to Lilliput can be seen as a critique of English party politics and the small-mindedness Swift ascribes to it. The final voyage, though, we see Gulliver, soured by what he has seen throughout those long years, finally abandon humanity illustrated (at least in his eyes) by the vile Yahoos. In the end, Swift portrays Gulliver as equally flawed and absurd as the other beings he encountered by not allowing him to see the potential in his fellow human being. This book is not merely an adventure, but a depiction of the human condition, its debased nature as well as its promise. The first voyage begins with a violent storm, which strands Gulliver on an uncharted island. He soon finds himself captured by the miniscule Lilliputians. Gulliver engages in a treaty with the king and begins to learn about their society. Gulliver, the fictional author of these accounts is as straightforward as the prose, taking Lilliputian society seriously and without criticism. Swift, however, has made these tiny, petty men to represent his attitude towards English party politics. By having Gulliver tower over the people of Lilliput, Swift exaggerates their smallness of character, creating a more absurd view of their legalese, boasts of vastness of realm, and the almost Babylonian description of their king. Their pettiness is further illustrated by the charges of treason leveled at Gulliver for his various actions to save the castle from fire, and the realm from invasion. Several parallels can be made between the Lilliputians and England of the 17th and 18th centuries. The eternal war with Blefuscu can be seen as the centuries long ...

Sunday, February 23, 2020

Heritage Tourism, two subtopic questions Coursework

Heritage Tourism, two subtopic questions - Coursework Example The countries committed to developing a way that could see them honor and acknowledge their past as they moved to establish a future that was safe, peaceful and accommodating everyone into their countries. Therefore, elimination the past for a country is very suicidal because the future generations may lack a benchmark on which to make informed decisions regarding the future. According to Digance (2003), the past offers a platform on which to avoid those ideas and systems that did not work and failed in one way or another. in this regard, the study of it helps in shaping the future by offering better ways of creating social and economic systems of life for a country. From the time of its civil war, Serbia has managed to establish a country that respects peace and harmonious co-existence among its people. Every country has a way of ensuring that its history is well protected so that its future generations can learn from it and tread into their esteemed future. Almost every country has well established and stocked museums that contained various cultural aspects. These cultural centres provide good memories to the people who often are motivated with the spirit of adventure, wanting to know how their countries came into existence. According to Goulding & Dominic (2008), Croatia is one of the countries that contain a rich past, detailing how the country made its way from Yugoslavian colonial rule, creating an economy that is fostered on developing a peaceful country that values and appreciates peace. One of the reasons why mapping a country’s history is important is informed by the need to preserve its cultural heritage. In this regard, this heritage serves as a good reminder of the country’s past, explaining the way of life in the olden days. By having this understanding, people can easily understand why and how life is changing. Secondly, mapping a country’s history

Friday, February 7, 2020

LAW 5 forming business Essay Example | Topics and Well Written Essays - 500 words

LAW 5 forming business - Essay Example India is one of the fastest emerging economies with huge potential for business. The company’s 2011 annual report shows that while the sales had declined in volumes in Europe, South America, Middle East and Canada, it had shown significant increase of 7% in Asia (Emerson AR, 2011). India therefore, is considered a critical geographical position to exploit emerging opportunities, especially in climate technologies and network power. There is considerable concern for climate change and deteriorating environment conditions. Emerson, being leading technology firm with global presence, is equipped with the knowledge, experience and capabilities to explore and exploit new opportunities. Most importantly, in the current times of recessive economic conditions, identifying and exploiting new elements of competitive advantage become highly desirable for the firms (Barney & Hesterly, 2005). Human threats to environment are also vital factors of development processes. The increasing urbanization, deforestation, growing population etc. are external factors that produce great burden on the existing resources like land mass, water, air etc. that adversely impact ecological conditions (Dyson, 2005). Indeed, various drivers of climate change affect sustenance and quality of life. Moreover, they are also major factors for environmental conditions like global warming and increased number of climate related natural calamities like tsunami, tornadoes etc. Carbon emission and green house effects have also emerged as important factors for environment. As Emerson climate technologies have developed into leading tools for businesses and residents for mitigating climate related problems, India presents vast scope for expansion. 1. With more than one billion population, India presents huge potential for introducing green technologies that would promote environment conservation. Emerson therefore must make efforts