Thursday, October 31, 2019

Wayward Essay Example | Topics and Well Written Essays - 250 words

Wayward - Essay Example Due to the circumstances of the shooting such that Bobbie was shooting over his shoulder as he ran, the killing of the victim occurred as manslaughter. Under the proximate causation, Sam committed a felon murder as it is due to his dangerous act of firing at Bobbie that Bobbie returned fire killing the victim. Additionally, had Sam not shot at Bobbie, no killing could have resulted. Under intervening cause, the unanticipated turn of event that Bobbie would return fire led to the death of the victim thus validating the cause. Had Sam shot at Bobbie killing him, the bystander would not have been killed, hence, the intervening causation is a valid stance. Finally, under the agency theory, although dealing and buying make both Sam and Bobby criminals for handling cocaine and possessing firearms, they were not co-felons thus the agency theory does not hold grounds. If Sam and Bobbie were co-felons in the sense of having the same goals and objectives in the commission of the felony, the death of the victim would be covered under the agency

Tuesday, October 29, 2019

Are silver dressings helping in the treatment of diabetic foot ulcers Essay

Are silver dressings helping in the treatment of diabetic foot ulcers - Essay Example In spite of the progress made over the decades in the understanding and treatment of these complex chronic wounds, most wounds do not respond to conventional treatments. Silver has been used for centuries in the treatment of wounds. The antimicrobial properties of silver are well documented since ancient times. Even as early as 750AD, silver vessels were used to store water in recognition of silver’s medicinal properties. Crede is credited for producing the first scientific papers in 1881, on the use of silver for preventing eye infection in neonates. In 1965, Moyer et al reported on the antibacterial action of 0.5% silver nitrate compresses applied to extensive burns (Maillard, 2006). Commonly used vehicles for delivery of silver include foams, alginates, films, sheets and hydrocolloids. In addition, a number of technologies like silver salts, absorbed ionic silver (in silver charcoal metallic silver products), and nanocrystalline silver coatings (silver vapour sprayed onto the backings of dressing materials) are available that are capable of releasing varying concentrations of silver cations to wounds (Maillard, 2006). The increased prevalence of bacterial resistance to antibiotics has resulted in advances in impregnation techniques and polymer technologies. A variety of silver-based dressings, varying in their structure, formulation and concentration of silver are now available. These dressings are designed to improve healing by reducing or controlling the wound bioburden (Maillard, 2006) Since diabetic foot ulcers are a significant cause of morbidity and mortality, it becomes imperative to use an ideal antimicrobial dressing, which also takes into account the increasing bacterial resistance to antibiotics. The aim of this study is to review literature for evidence regarding the use of various silver-based dressings and their efficacy in diabetic foot ulcers. Original articles

Sunday, October 27, 2019

Computer Forensics And Crime Investigations Information Technology Essay

Computer Forensics And Crime Investigations Information Technology Essay With the progression of time and advancement in technology, our digitized nation has and will become more dependent on computers as we use them in our daily lives whether it be at school, work, or for personal use. By evaluating past trends it is safe to calculate a rise in crimes using computers. Today criminals put a strain on computer forensic examiners, because there are few crimes that are committed without the involvement of a computer or any other computing device of some sort. Today with computer hardware and software becoming more sophisticated and portable along with wireless technology this broadens the definition of computers, but for this research a personal computer is the extent of the subject. With technology constantly evolving and with the definition updating what is to be considered evidence, this is why proper training and education is necessary. This is why it is imperative to examine crimes where computers play a role in a crime and it is essential to find any potential evidence located on the digital media. For a person charged with an offense, their charge in the case can be weakened if the investigation fails to find any such evidence. This is why it is imperative to create, build, and improve a national standardization and certification for the computer forensics field. The Statement of the Problem The definition of computer forensics may vary slightly depending on the authors on the subject. One of commonly known definition refers computer forensics as the acquisition, examination, and reporting of information found on computers and networks that pertain to a criminal or civil investigation (Kessler, 2005). Computer forensics is becoming increasingly important due to growth of crime-rates involving the use of computers and the Internet. Although such a trend is difficult to control completely, computer forensics technologies and applications provide necessary tools to law enforcement and other agencies to assist in crime investigations. Computer forensics is effectively used in solving cybercrimes; however, its use reaches far beyond just that. As many criminals engage in more sinister crimes-such as murder, kidnapping, sexual assault, and terrorism-also maintain incriminating information on their computers, recovering damning evidence from their computers often provides law enforcement crucial discoveries during investigations. There are numerous real-life crimes that were solved by use of computer forensics, and the significance of computer forensics continues to increase as technologies develop. However, computer evidence does not always provide solid traces of information necessary to prosecute a criminal due to computers volatile and virtual nature of data storage. Proper processing of computer evidence is essential to establishing credibility of evidence collected from computers and other peripherals, and it is computer forensics experts responsibility to ensure that the evidence is valid, uncorrupted, and unq uestionable. Why research this topic During a computer investigation, the computer system that is suspected to have to possible evidence must be properly handled by a professional. They investigator must create a copy or true image (bit stream) of the original media, which would be inspected later in the process for crucial evidence. When inspecting the copy the investigator will look for specific expressions or key words to establish any vital digital evidence that exists or has been deleted. The types of incriminating digital evidence could be many such as: racial discrimination, sexual discrimination, stock fraud, blackmail, and numerous others. To help promote fast turnaround time computer forensic professionals have the aid of commercial software packages like X-Ways Forensics, Encase, and several other commercial and open source utilities. Unfortunately, the consequences of not following precisely these steps can lead to the lost of evidence itself, and therefore it is important to create, build, and improve the m ethods of performing well-organized searches in order to trace evidence. The need for a current study in the computer forensics field is important for the future of not only the computer forensics field, and law enforcement, but for the legal system and everyone else who uses a computer. Today in our digital nation, we are becoming more dependable on technology and its many branches of devices. This has lead to make investigators ask themselves what type of computer crime has happened, what is considered evidence, and how to handle it. Methodology As time and technology progresses computer forensics is a very important factor on the war in computer crimes in our nation. Most reading suggest in order for computer forensics to properly be considered by the courts as a scientific discipline there has to be proper education, training, and testing for adequate certification. The time frames from the readings were 2000-2010, but a majority of them were from 2004 2006. There has been improvement in recent years to develop a national unified approach in undergraduate and graduate programs. Hypothesis Computer forensics is a relatively new field and discipline in the private sector compared to other forensic sciences. Computer forensics is the science of acquiring, preservation, identification, extraction/retrieving, and documentation of computer evidence that has been processed by electronic means and stored on a computer without altering any of the data in the process. With our rapidly evolving improving technology this has lead the definition of computer forensics to be interchangeable with digital forensics, which expands the definition to include PDAs, cell phones, and other portable devices. When conducting a forensic investigation with computer evidence; the investigator must perform particular procedures to guarantee successful evidence collection. The evidence collected can be useful in civil disputes, criminal cases, computer system break in, recover data, and human resources/employment proceedings. As our homes, workplaces, and organizations become more incorporated wit h the aid of information technology and the Internet; we also have to take into consideration the human element as a factor. This is why current research is needed to tailor programs for computer forensics to keep up with advanced criminals. background In order to prepare for the future we need to look in the past and try to figure out how we got here and how to fix some of the problems. Technological progress is like an axe in the hands of a pathological criminal. (Albert Einstein) As technology changes and the words that explain it there is the unchanged motives and emotional needs that drives the criminal behavior. With this in mind we need to understand the intentions of the inventors for the computer and the Internet. Before the invention of personal computers and the Internet these technological tools were used exclusively for scientific leaders and the military; which were located in either military bases or major university campuses. Half a century ago, the technology we use today might have seemed like science fiction. The first general-purpose electronic computer was the ENIAC, Electronic Numerical Integrator And Computer. The intentions of the creators were to design a machine for mathematical power for computing. The Un ited States Department of Defense began funding of ARPA (the Advanced Research Projects Agency) and in 1969 the Internets first long distance electronic communication was made. The intentions of the creators were to create an instrument to guarantee an infrastructure between military installations. The goal of computer forensics is to recover and preserve digital evidence and to understand as much information regarding to the data as possible. The need for a computer forensics examiner is after the fact electronic information has been altered, deleted, or stolen in a computer crime. As with any other types of crimes it is a fact that the criminal leaves behind traces of their activity and these traces are the smoking gun that leads to prosecution in the court system. A computer forensics specialist is more than a computer expert; they must know how to effectively perform complex evidence recover procedures. These procedures include: data duplication/preservation, data seizure, data recover, document searches, expert witness services, media conversion, computer evidence service options, and miscellaneous services. A computer forensic examiner must follow federal guidelines for data seizure. One course of action allows a representative to examine and duplicate designated documents or data compilations that may include evidence, and it is The Federal Rules of Civil Procedure. When data is duplicated or preserved the main concern is that data must not be altered in any way. Data recover is performed using dedicated tools for computer forensics to safely recover and analyze evidence. A document search is the ability to understand storage technology and perform a search with speed and efficiency. Media conversion is the ability to find and cross-examine data from the source or unreadable device, extract data and convert it into readable formats. Part of being a computer forensic specialist is to at times be an expert witness, and explain complex technical processes in an easy to understand manner. Some level of services that should be offered is on-site, standard, emergency, priority, and weekend s ervices. Other miscellaneous services include analysis of computers and data, on-site seizure in criminal investigations. Also an advantage is the ability to work on both PC and Mac O/S and a fast turnaround of time. Overview of Computer Crime Today criminals usually are one step ahead of law enforcement agencies and they have the knowledge to use computers to their gain, and they have the ability to cover their tracks. Since technology is constantly changing definitions are quickly becoming outdated as new definitions expand new offenses to computer crimes. However, computer crime can be generally categorize into four categories and they are criminal activity that involves using a computer as an instrument to commit a crime, criminal activity that has a computer as a target, such as hacking into, criminal activity when the computer was unintentionally part of the crime, and crimes frequently associated with the use of computers. With this new definition computer crimes in 2009 have increased 22% from 2008. The computer as an instrument of a crime When a criminal uses a computer as an instrument in a crime we can think of it as when a burglar uses a crowbar or lock picks as in instrument to enter a house. For this research, when a computer is used as an instrument of a crime there objective is to obtain data to commit fraud, theft of service, harassment and other illegal activities through a network by copying data rather than deleting. Theft is when a criminal unlawfully takes and carries away property or service without the permission of the owner. The property and service can range from personal/private information, financial information, security information, human resources information, internet access and trade secrets. With the stolen property or services the criminal can reproduce false identification, copyright material, and distribute child pornography among other types of crimes. Another use of a computer is by writing letters or e-mails to make threats, harassments, or stalk individuals. Computer as a target When a criminal targets a computer as part of the crime they launch an attack on computers or networks trying to deny service by denying the rightful user access to their own computer system or data. Another attack could be to damage or alter the computer system or data by browsing through valuable information stored or saved on the computer. When a computer is vandalized this also is considered as a computer as a target, because valuable information stored in the computer is denied to the rightful owner. The computer as incidental to a crime In a crime scene a computer can be seen as a subsidiary tool to a crime when criminals use the computer to simplify their transactions. These crimes could happen without technology, but the computer assists the criminal in their transactions which might include child pornography, money laundering, leads to other crimes and other criminal information. This computer crime evidence could have names of victims, associates, clients, and perpetrators personal information. Crimes associated with the prevalence of computers Technology advancements have created new targets of conventional crimes and the targets are on the industry. This includes academic property, software piracy/counterfeiting, copyright infringement of computer programs, black market computer equipment, counterfeit equipment, identity theft, and programs, and theft of technological equipment. The most common use of this crime is piracy or the violation of copyright infringement of commercial software COMPUTER FORENSICS SERVICES Today on television there are shows that portray crime scene investigation while using computer forensics, and they give the audience a little glimpse into the world of computer forensics. When in reality computer forensics is meticulous work, but the shows leave out all the details of the process. Computer forensic today based on a theory of trace evidence, and this theory is build upon the development of forensic science. One of the motivating factors in the development of forensic science was by 20th century forensic scientist Edmond Locard, and his theory was called the The Locard Exchange Principle. The Locard exchange principle states there will always be an exchange when two items come into contact, and that the contact(s) will bring something into the scene of the crime and leave behind something in the scene, therefore leaving a trace of evidence. Although trace evidence might be small yet important information found in a computer, it alone is not enough to make a case. Traces evidence can might be the smoking gun that leads to a successfully win in a court case. No matter how well the criminal tries to cover up their tracks, in todays society with computers hooked up to a network or wirelessly leaves traces of stored data on a computer to be found. This is where the skills and services of a computer forensics specialist will come in handy. This section is where computer forensic specialist and self proclaim computer experts get divided into separate groups. The field of computer forensics is vital to law enforcement agencies, because the procedures to protect and present evidence in court are followed by the requirements of the judicial system. There are plenty of computer experts who know how to search through files, point, click, copy, and make directory listings, but a computer forensics specialist does more than this. A computer forensics specialist must be familiar with and understand in detail how files systems are created, accessed, deleted, and changed. With training and experience a computer forensics specialist understands the methods and techniques for securing and acquiring evidence without altering it in a legal manner. Acquisition Just as any other type of evidence, digital evidence also comes across some difficulty. So why go through the trouble of collecting it? It is because if we dont try to figure out who committed the crime, why they did it and how, then we will never be able to stop them or anyone else from committing a crime again. This is why trying to recover all possible deleted files is crucial. Areas to look evidence can be in the hard drive, page files, temporary or swap files, and unallocated space. When collecting evidence in this step no changes or modifications to the evidence must be made or else the evidence will be considered inadmissible. Preservation When a proper warrant is issued the ability to protect data from a recovered system must be protected and unaltered in any way. The computer forensic specialist should pay close attention to this step in trying to avoid the notorious Murphys Law. To avoid this mishap at this point in time an exact duplicate copy should be made in order to preserve the best evidence, the original evidence. One of the most effective ways to back up is the use of bit stream image back-ups. This method copies and preserves all data enclosed partition, logical drive, and physical drive in the hard drive. Another idea to think about when preserving digital evidence is where to save it, and that depends on the investigator and the organization they work for. Analysis The person conducting and analyzing the evidence in the investigation but be able to guarantee that the result of an conclusion came from the evidence, and were not in any way a part of contamination or error. One area that the computer forensic specialist can control is making sure hardware and software are working properly. They can also check to make sure their equipment is up to date with updates, verify licenses, and know how to use the equipment. A vital process to conduct analysis is creating a hash value. The hash value is created with software to produce a unique value, like a digital fingerprint, produce a mathematical value. Documentation This process is crucial in the field, because if one mistake is made in reporting of evidence, then any other evidence could be questioned. Once the evidence has been indentify everything encountered with the use of a digital camera, video camera, or pen and paper or a combination of two. Once this is done, then all evidence must be labeled and any devices attached to the computer along with ports and wires connected the two. In case a computer forensics investigator is testifying in a court case, then the documentation process will help the investigator jog their memory. In conclusion, following these steps is crucial in computer forensics because it builds stronger methods within time. Experience and training of software can result in better search techniques to build a better and faster turnaround time. There is a need for a current study to identify future trends and concerns in judicial system on the subject of digital evidence and computer forensics. With the data gathered on future trends schools and computer forensic field can educate and train future forensic investigators with current and proper techniques to keep up with criminals. References

Friday, October 25, 2019

Student :: essays research papers

Throughout the eighteenth century until the nineteen fifties, different countries have participated in the acts of industrialization and modernization more fully then others. There were many factors that permitted these countries to industrialize and modernize at a much greater pace than their significant opponents in the world industry. While rapid urbanization in Britain and dictatorship in Argentina and Russia promoted industrialization and modernization, the imperialist policies and ideas of Britain hindered industrial development in Egypt. Rapid urbanization played a very important role in the industrialization and modernization of Britain. Industrialization was a long hard process in Britain; however they were the first group of people to undergo this long process. The reason industrialization occurred in Britain was due simply to the fact that they had an astronomical jump in population. Within a one hundred year span, Britain’s population grew from 5.5 million in 1750 to over 16 million in 1851. The large population growth caused a great deal of economic and agricultural improvements for the British people. Farming was made easier and more efficient due to England undergoing a process of agricultural improvement that enabled fewer farmers to feed more people while cultivating the same amount of land. â€Å"People also migrated at an unprecedented rate- from the Countryside to the cities† (Bulliet, page 610). This caused a great population shift from the agricultural southeast to the midlands and t he north. Due to the fact that people started to search for jobs, a large portion of the population started to migrate to the midlands and the northern parts of the country; this gave a large source of inexpensive labor for the rich business owners to profit. (Bulliet, pages 609-612) A great deal of the British Industrialization was involved in the cloth and clothing industry. Britain was importing raw material such as cotton and silk from India, mass producing it, and then selling it back to India for an enormous profit. Now that urbanization brought a huge amount of the labor force to the factory towns and cities, this made it so that Britain could now produce more and more cloth and before they even knew it they were the largest producers of cloth in the world. (Bulliet pg.610) Historians propose a number of reasons for the cause of industrialization and modernization in Britain. Among the most persuasive is the enormous increase in food production following the establishment of the enclosure laws of the

Thursday, October 24, 2019

Fast Food Industry Research Proposal Essay

To study the attitude towards consumption of healthy food within the fast food industry Background We are a marketing research team of a fast food chain store. With increasing awareness about healthy food among the masses and with consumer preferences changing towards healthy food, we intend to launch a health food segment to cater to this need of the customers. We are also concerned about the pricing of the product that whether it should be priced same as that of normal fast food or the customers would be willing to pay a premium for healthy food. But before launching that product we want to know that â€Å"Is it worth it to our fast food restaurant to market healthy food†. To answer this management decision problem, we intend to conduct a marketing research within the region of West Delhi. Introduction * What is fast food? Definition1. Fast food have been defined by Bender and Bender (1995) as a â€Å"general term used for a limited menu of foods that lend themselves to production-line techniques; suppliers tend to specialize in products such as hamburgers, pizzas, chicken, or sandwiches†. Definition2. In Data Monitor’s (2005) survey the fast food market is defined as the sale of food and drinks for immediate consumption either on the premises or in designated eating areas shared with other foodservice operators, or for consumption elsewhere. Definition3. As per â€Å"the free dictionary† fast food is â€Å"inexpensive food, such as hamburgers and fried chicken, prepared and served quickly†. Definition4.According to Merriam-Webster online dictionary fast food is â€Å"designed for ready availability, use, or consumption and with little consideration given to quality or significance * Why fast food? * Brief history of fast food industry in India * Fast food industry trend, facts and figures, key players in India * According to a study by the Tata Strategic Management Group, the size of the Indian health-and-wellness food market will rise from an estimated Rs101.5bn in 2010 to Rs550bn by 2015, implying annual growth of 35-37%. * Why healthy food? Health food is preferred by people mostly because of the various health issues associated with eating fast food: * Trans Fats which is commonly found in fast food have a negative effect on health * The fast food consumption increase calorie intake, promote weight gain, and elevates risk for diabetes. * Obesity is also linked to various other diseases * What is Healthy food? Definition1: As per â€Å"the free dictionary† healthy food is â€Å"Any natural or prepared food popularly believed to promote good health† Definition2: * Food with low content of edible oil used. * Lower fat, lower cholesterol and lower sodium. Major segments H&W products in India could be classified into three dominant categories, i.e. Better-for-You(BFY), Functional / Fortified, and Natural categories. Research Objective The main aim of our research is to derive indications that may contribute to better strategic and tactical marketing decisions. The overall objective of the study is â€Å"To study the attitude towards consumption of healthy food within the fast food industry† this has been divided into following sub-objectives: 1) To study the consumption pattern towards fast food and health/wellness food. * What all sort of fast food people prefer, at what time, at what places they go, * What is the driving force behind it, e.g. taste, spiciness, ease , price, time factor etc. * Most popular fast food 2) To study the factors that influence the consumers to go for healthy food * Sickness * Obesity * Awareness * Who 3) To study the consumer perception about healthy food vis a vis normal fast food w.r.t. two factors i.e. taste and price * What does consumer think about healthy food e.g. taste , price 4) To identify the possibility/impact of nutritional value of fast foods on consumer purchase decision. Research Questions and Hypothesis Question: Do customer think healthy food is as tasty as fast food? H1: customers perceive healthy food to be of same taste as normal fast food. Question: Do customer think healthy food is costs same as normal fast food? H2: Customers perceive healthy food costs same as normal fast food. Question: Is there any impact of nutritional value of fast foods on consumer purchase decision? H3: Nutritional value of fast foods has no impact on consumer purchase decision. Research Design Qualitative Research Purpose Because of the exploratory nature of some of the aspects of the objectives, we need to have detailed qualitative information. The qualitative research will probe the following: * the consumption frequencies, the categories of product consumed and the main reasons to use these products * At what time and at what places do they prefer to go, * What is the driving force behind their preference, e.g. taste, spiciness, ease, price, time factor etc. * Most popular fast food * Whether they would prefer to pay more for healthy food * What factors influence the customers to eat healthy food Population and sampling Samples for the study will consist of youth segment (indicated as consumer in this study) in the age group of 20 to 27 years. Convenience samples are drawn from West Delhi region among the college students. We propose to conduct 4 focus groups with the following profiles: Group 1&2: Dwarka Region Group 3&4: Janak Puri Quantitative Research We propose to conduct a study using questionnaire within the markets of Dwarka and Janakpuri region and also an online survey of the relevant respondents. Purpose This stage intends to quantify the factors that influence the respondents to eat healthy food. It will also give the percentage of each category of fast food which customers generally prefer to eat out and at what place &at what time. It will also help us to quantify that how many customers perceive healthy food as of same taste as normal fast food and of the same price. By establishing classified data we will know what type of people prefer healthy food and what price they are willing to pay. Also we will know that how many customers look at the nutritional value of the product before taking a purchase decision. Population and sampling Samples for the study will consist of youth segment (indicated as consumer in this study) in the age group of 20 to 27 years. Convenience samples are drawn from West Delhi region among the college students. Our definition of convenience samples includes only one dimension that is easy access to the sample units otherwise it was random selection of individuals from a large number of customers at the fast food outlets. We will be carrying out a survey of 200 Indian Customers The face to face interviews will be carried out in different days and in different outlets such as, open markets, traditional shops and supermarkets. A pilot test on 15 consumers will be conducted in order to ensure that the statements are clear and to identify redundant variables and questions that were difficult to understand. Procedure We will develop a questionnaire for this purpose. The questionnaire will probe the following: * the consumption frequencies, the categories of product consumed and the main reasons to use these products * The factors which influence the customers to eat healthy food * Which category of fast food people generally prefer and the main reason to use that product * Do customers perceive healthy food to be as tasty as normal fast food * Whether customers are willing to pay more for healthy food * Is there any impact of nutritional value on their purchase decision Analysis: Statistical analysis such as descriptive statistical analysis and frequency distribution. t-test factor analysis cluster analysis Timing Week | Activity| 1-3 weeks | Desk research| 4-6 weeks| Qualitative field work| 7 week| Questionnaire development| 8-9 week| Quantitative stage(n=200)| 10 week| Coding and data preparation| 11 week| Analysis | 12 week| Presentation and Report available | Costs Phase | Description | Costs | Qualitative research | four focus groups-travel cost | 1200| Quantitative research | 200 interviews-Stationary-travel cost| 5001200| Total | | 2900| Limitations This study has some limitations that however do not liquidate the purpose of the study. Data for the study will be collected from West Delhi region mainly Dwarka and Janakpuri. Sampling units are primarily of young unmarried consumers. Annexure 1: Definitions of Health & Wellness Categories †¢ Better-For-You: Food products with lower levels of ‘bad’ ingredients /nutrients for the consumers like sugar or fat are called BFY products. Various low-fat, low-sugar or diet products would fall under the BFY category. †¢ Fortified / Functional: Food products fortified with additional ingredients or produced / suitably modified to provide a distinct health benefit are termed as functional or fortified foods. Functional drinks, vitamin / mineral fortified milk or fruit juices and bakery products with added fiber would be classified as functional foods. †¢ Natural: Products sold under the Natural platform are specifically manufactured with no chemicals, additives or artificial substances / chemicals. 100% natural juices, ready meals without preservatives, etc. are few examples of such products. †¢ Organic: These are made from foods that are grown without use of chemicals (fertilizers, pesticides) during their cultivation. †¢ Naturally healthy: These foods are considered healthy in their natural form itself like milk, olive oil, fruit juices etc. References: 1) Naresh K. Malhotra, Marketing Research- An Applied Orientation, 3rd Edition 2) Anita Goyal and N.P. Singh, â€Å"Consumer perception about fast food in India: an exploratory study† 3) Andrea Freeman, â€Å"fast Food oppression through poor nutrition†Ã¢â‚¬â„¢ California Law Review, Vol. 95,issue 6 4) â€Å"Healthy Ambition†, Economic Intelligence Unit, April 6th 2011,Vol XVIII No. 7 5) â€Å"The Health & Wellness Foods Industry in India: An Overview†, Tata Strategic Management Group(2009)

Wednesday, October 23, 2019

Memo Performance Management Essay

Hi Marylee, having found our recommendations for the compensation and benefits strategy satisfactory to Clapton Commercial Construction’s needs I will next outline a performance management plan. â€Å"Performance management (PM) includes activities which ensure that goals are consistently being met in an effective and efficient manner.† (â€Å"Performance Mangement,† 2013, para. 1). According to â€Å"My Strategic Plan† (2012), â€Å"Performance Management is also known as a process by which organizations align their resources, systems and employees to strategic objectives and priorities†(Glossary). The performance management system is part of the companies strategic plan in achieving the goals set forth each year. There has to be an ongoing communication process with the managers and the employees throughout the year as part of the performance management plan. Below are actions that are part of the performance management system. (â€Å"Performance Management – Meaning, System And Process†, 2013). ââ€" ª Developing clear job descriptions and employee performance plans which includes the key result areas (KRA’) and performance indicators. ââ€" ª Selection of right set of people by implementing an appropriate selection process. ââ€" ª Negotiating requirements and performance standards for measuring the outcome and overall productivity against the predefined benchmarks. ââ€" ª Providing continuous coaching and feedback during the period of delivery of performance. ââ€" ª Identifying the training and development needs by measuring the outcomes achieved against the set  standards and implementing effective development programs for improvement. ââ€" ª Holding quarterly performance development discussions and evaluating employee performance on the basis of performance plans. ââ€" ª Designing effective compensation and reward systems for recognizing those employees who excel in their jobs by achieving the set standards in accordance with the performance plans or rather exceed the performance benchmarks. ââ€" ª Providing promotional/career development support and guidance to the employees. ââ€" ª Performing exit interviews for understanding the cause of employee discontentment and thereafter exit from an organization. Effectively implementing a performance management system benefits the organization, manager, and employee in several ways. Your company will benefit with employee retention and loyalty, improved productivity, which will result in cost savings. The manager benefits are saving time, reducing conflicts, ensuring efficiency and consistency in performance. The employee has clear expectations of the job and clearly defined career paths. Providing open and transparent feedback will have a positive influence on job satisfaction and loyalty. (Managementstudyguide, 2013). After implementing the performance management system in order for it to be effective the employees have to understand their roles and importance to achieving the goals set forth. Making the employee aware of the goals and having a performance metric and job description in writing is the role of each manager to go over with the employee prior to started any job. The managers will go over the in detail the key result areas with the employee and set up a reward package if the goals are exceeded in these areas. Benchmarking is a method that can be used to measure performance metrics. In the commercial construction field quality, time and cost are very important dimensions measured against best practices and other companies in the business. Benchmarking will be invaluable to the success of the Clapton Commercial Construction. Benchmarking is a method to evaluate the performance, and will show the strengths and weaknesses within the company. Benchmarking will ensure the Clapton Commercial Construction can keep job costs, cycle times, and productivity within the industry averages. It will give you the data necessary to see the areas that additional training is  necessary. The managers will be responsible to get the employees the proper on the job training to be the most productive while keeping costs down. The performance appraisal component of the performance management system is where the manager will twice a year evaluate the employee’s performance. The manager will do a mid -year PE to determine areas of improvement needed to achieve or exceed the goals and deadlines set forth. For the employees which fail to meet or exceed expectations based on the performance metric set forth at the beginning of the year can be put on a performance improvement plan (PIP). This plan will set expectations and guidance for the employee to follow to help meet expectations by the end of the year. The final PE of the year will determine if the employee qualifies for a salary increase and bonus and how much it is. If the employee was put on a PIP and improved in the key areas and meet expectations set forth he/she will also be eligible for a salary increase and a bonus. The performance management system is an important component of the organizational strategic plan for measuring and analyzing data to measure the performance of the company. It requires the cooperation and support of all employees, especially upper management to be successful. The performance management is proactive system for managing the individual and organization to achieve desired results. (â€Å"Performance Management – Meaning, System And Process†, 2013). References Benchmarking. (2013). Retrieved from http://Wikipedia. (2013). Retrieved from http://en.wikipedia.org/wiki/Benchmarking Managementstudyguide. (2013). Retrieved from http://www.managementstudyguide.com/benefits-of-performance-management-system.htm My Strategic Plan. (2012). Retrieved from http://mystrategicplan.com/resources/section/glossary/ Performance Management – Meaning, System and Process. (2013). Retrieved from http://www.managementstudyguide.com/performance-management.htm Performance Mangement. (2013, Septmeber). WIKIPEDIA, (), . Retrieved from http://en.wikipedia.org/wiki/Performance_management