Saturday, October 5, 2019
Conflict Management neogotiation strategies slp 4 Essay
Conflict Management neogotiation strategies slp 4 - Essay Example Following this the employees are required to face the customers at the counters. There are a total of seven counters of which generally two counters are open during a normal day. On days of high volumes, the other counters are also opened and the employees working at the back end sorting the letter need to take control of the counters. The issue faced here is that there are no clear shifts that are provided to the employees and the duties of who need to be at the counters are not fixed by the management. Due to this, the employees face a huge conflict among themselves. There is a higher demand for the number of people at the back end working on sorting of the mails however the people willing to work in the section are low and this causes an imbalance and issue at the organization very often. The parties involved here are the team leaders versus the employees. The negotiation was done where the managers came to a final timetable of the work of the employees and decided the division of work which is required to be followed on a daily basis. I am on the side of the manager and it was the decision of the manager to discuss with the team leader and plan out a clear cut decision of the timetable for each employee on a daily basis. Before the negotiation Took place, the team leader, manager have held meetings to discuss the cases of the employees and to gain a complete details of the employees. These fell under the pre negotiation steps, based on which the timetables were formulated and the required strategy and preparation have been made. The only emotional reaction for the negotiating table was of an individual with a serious injury and disability. This individual found it difficult to work on the stocks and customer facing. Hence there was an exception made for the case and the rest of the employees were provided with a set timetable. These proposals were
Friday, October 4, 2019
Generalization, Miniaturization and the case of Italo Calvino Essay
Generalization, Miniaturization and the case of Italo Calvino - Essay Example With the nexus of focus on Valdrada concentric upon the ââ¬Å"eyesâ⬠, Calvino goes to great lengths to illustrate just what Marco Polo ââ¬Å"sawâ⬠within the place and how he understood/interpreted this. Whereas Marco Polo was of a relatively high social class and his level of education was above that of the average individual during Renaissance Italy, Calvino illustrates that he was not inclined to attempt to use the scientific method; instead, Polo relates complex and instrinsicly nuanced facets of Valdrada in a matter of fact way. This matter of fact detail and the pedagogical nature in which he discusses these aspects lends the reader to engage with these facets of Valdrada as nothing short of fact. Yet, by comparing the quote of Susan Stewart, provided in the introduction, the reader is cautioned as to the ramifications of not objectively considering what details might be overlooked within such a cursory approach. The visual representation that is reflected within Calvinoââ¬â¢s section on Valdrada denotes, among many other things, the following: ââ¬Å"The ancients built Valdrada on the shores of a lake, with houses all verandas one above the other, and high streets whose railed parapets look out over the water. Thus the traveler, arriving, sees two cities: one erect above the lake, and the other reflected, upside downâ⬠(Calvino 123). Within this literary statement of fact, the reader is represented with a picturesque landscape that can easily be miniaturized to reflect a greater understanding for the region and people in question.
Thursday, October 3, 2019
Looking at Women Essay Example for Free
Looking at Women Essay ââ¬Å"Looking at Womenâ⬠by Scott Sanders was first published in spring of 1989 in the Georgia Review and was later reprinted in Sanderââ¬â¢s essay collection titled ââ¬Å"Secrets of the Universeâ⬠(1991). In this work, Sanders tells us his thoughts on how men look at women, hence the title; he explains to us that he feels that men turn women into things rather than people by objectifying their bodies. He goes into great detail about how a lot of women feel their role in todayââ¬â¢s society is to exist for the pleasure of men and he questions how simple minded creatures we must be to fall for such things. Although I agree with his argument, I also see the other side of it. This could be the subject of a long drawn out debate, there is a much simpler way to approach it in that we get used to a certain way of thinking and it eventually becomes habit to look at a female and judge her, to make her feel as though she has to fit a certain image because she knows people expect that much of her, to make her want to dress and act a certain way for people to actually see her and so when she does a good job at it, she feels good. When a person is young, they look at things in an innocent manner. As they mature over time, they start to look at things in a different way. A guy for example, will start to notice things he didnââ¬â¢t before such as the way a girl walks, how tight her clothes are, the curves on her figure, and other things. And these of course, are all things he has seen before, just never in this light. So he continues to look and as that happens over time he get in the habit of searching for these fine details, even if he isnââ¬â¢t necessarily interested. Sanderââ¬â¢s addressed that thought in Looking at Women when he stated that ââ¬Å"what attracts our eyes and rouses our blood is only partially instinctualâ⬠(187) which implies that some of it is learned. The way men look at women over time has reached a point where it has become degrading and on some level can be disrespectful. The things we do as women to get men to look at us are not required to get the same end result, and this is also approached with in the text where it says that ââ¬Å"The fraction of desire that leads to procreation is â⬠¦ irrelevantâ⬠(Sanders 180). Sometimes men do look because theyââ¬â¢re interested in the woman herself.. However most of the time, he will look and in his mind he has already have graded this woman on a scale of 1-10 without even realizing it because heââ¬â¢s so used to doing it. I think a lot of people would agree that females have always been painted as submissive, delicate things who are there to be dependant and cared for. Weââ¬â¢re supposed to do ââ¬Å"girlyâ⬠things like paint our nails, cook, clean, and wear high heels while the men go out and get all the attention. We are portrayed as a ââ¬Å"fluff pastry â⬠¦ plastic figurine â⬠¦ to achieve the status of artâ⬠(185). We are works of art though, we do not wake up with our faces painted and hair perfect ââ¬â we have to make it happen and like true art, it takes time and effort. We are to be delicate and beautiful, something worth bragging about, a thing to look at and admire. With this type of thinking, we slowly become objects, instead of people. Scott Sanders poses the question, a few times in the story ââ¬Å"Why â⬠¦ do so many women decorate themselves like dolls?â⬠(184). Upon further reading, we will come to see that the answer (qtd. in Le Deuxieme Sexe) lies within the text: we do it simply because ââ¬Å"it is the most potent identity available to (us)â⬠(Sanders 184). While it might be nice as a man to have a woman to take of you or even to have one dependant on you, itââ¬â¢s not what defines us as a species and it certainly isnââ¬â¢t the only role we are capable of playing. As this is the role we identify most with, we feel this need to be good at it. It is typically viewed as an immoral, degrading thing (trying to be sexy) but with a little bit of tweaking and experience (also stores such as Victoriaââ¬â¢s Secret help), we can perfect it to where it then becomes a tool, a weapon, a trap. ââ¬Å"Women need not make spectacles of themselves in order to draw the attention of menâ⬠(186), in other words we donââ¬â¢t need to dress up and put makeup on our faces or wear shoes with heels that prevent us from walking. We know we donââ¬â¢t and that if men really want to look, they will do so regardless of what we look like or what weââ¬â¢re wearing. Although, itââ¬â¢s easier to just conform to the role society as created for us. For some women it can even be fun, if they happen to be bored or insecure enough to crave that type of attention. They donââ¬â¢t see themselves as a pretty damsel in distress, rather a lion or a tiger with the strength, cunning, and speed needed to hunt and capture its prey. They can entice a man, and make him want more, make him crave it. Sheââ¬â¢ll draw him in with a false sense of security, because as a man, he naturally assumes he is in control. But heââ¬â¢s not, heââ¬â¢s just flying along and suddenly caught in a web. And just like that, like the lion pounces on the gazelle, he has fallen victim to ââ¬Å"put-ons whose only purpose is in being taken offâ⬠(184). And just like that, the roles are reversed. Two spiked heels, a ton of lace, and one tube of bright red lipstick later, she is on top and he is an object she is toying with. He then becomes a trophy of what she is capable of, and what she has accomplished. She is proud because she has done so with the role society designed to diminish her. As time goes on, these social roles with change and hopefully everyone will be seen for whom they are not what they look like. Sanders made many interesting points in his story about the way society views women and we take that idea and run with it. Society took us and tried to turn us into an object that canââ¬â¢t be feared, an object simply for admiration and we became works of art that we too can be proud of. However, we should not be proud of the fact that this has become a habit and that we insist on making people feel like they need to fit a certain image in order to be proud of themselves. While society may not like it, we are strong and independent and can handle anything they throw at us. Weââ¬â¢re champions and theyââ¬â¢re going to hear us roar. Works Cited Sanders, Scott. ââ¬Å"Looking at Women.â⬠The Norton Reader. 13th ed. Eds. Linda Peterson. New York: W. W. Norton Company, Inc. 2012: 179-189. Print.
Wednesday, October 2, 2019
Developing A Mobile Application For Kingston Library Computer Science Essay
Developing A Mobile Application For Kingston Library Computer Science Essay As part of my course, I will be developing a mobile application for Kingston University Library for my dissertation. The application will be designed for Android devices. I chose Android platform because it is distributed under open source licence and becoming hugely popular. Also Android app developer can take advantage of the mobile hardware design and can sell the app easily in Android market. The main users of my application will be students where they can access the system by login using their ID and password. My application will have a library catalogue search feature which will return a brief summary, book details and availability for each entry. The application will also include basic information about all libraries, such as locations, opening times, contact details etc. Accessing the online resources and Epay are currently not included in the requirements but which can be implemented if time permits or at a later stage. As the code will be written in Java, JDK from Sun has to be installed on the system. I will be using Eclipse IDE to develop the application. Android developer website offers all the guidance and required tools needed to develop an Android app which will be extremely beneficial for me as I am completely new to mobile application development. The initial stages in project development will include SWOT analysis, Use Case diagrams, requirements specification, and UML diagrams. A project plan and a risk analysis has been devised for the smooth running of the project by taking into consideration of the varying demands of each phase. Introduction and Background Mobile devices have evolved significantly during the last decade making it a necessity in everyday life. They are now more than just a means to make a phone conversation. The smart phones cater for all kinds of users whether they want to do business or just to have fun. This created a boom in mobile software applications ranges from simple games to complex navigational systems. There are apps suitable for every customer making them a must have to make life a lot easier in todayà ¢Ã¢â ¬Ã¢â ¢s busy lifestyle. The most popular Smartphones in the current industry are Apple iPhone, Blackberry, Microsoft Windows Mobile, Android and Symbian. I have chosen Android platform by Open Handset Alliance to develop my application because it is open source and its members such as Google, HTC and T-mobile offers extensive developer support through its developer website. According to market research Android phones are set to increase their current market share of 9% to 30% by 2014. As the Android market offers an online application store to download both paid and free apps for its customers it is easier to access a variety of Android apps. I will be developing an Android application for Kingston University Library System that will enable the students to access the library account to login, search books, renew books and access library hours, location and contact information. My initial approach will be to focus on Android platform but if possible I would develop this app compatible with other platforms as well. Some institutions such as Cambridge University have their library app already implemented. So this will be a first step towards having a mobile library application for Kingston University. I will be looking into other organisationsà ¢Ã¢â ¬Ã¢â ¢ mobile library applications as well to give me an insight into the field. The major stakeholders of this application will be I and students of Kingston University but maybe in the future this learning experience will enable me to develop apps for other institutions or create a universal library system by collaborating with other institutions. Aims and Objectives The main aim of the project will be to design and deliver a mobile application for the Kingston University Library on time. During this process I can learn about the latest trends and technologies available in the market so that after the completion of my course I can either secure a job in the mobile app development or work as a freelance app developer. This project will enable be to implement the skills I have learned so far during the course and widen my knowledge about mobile application development tools and techniques. I am hoping to produce a professional and effective library app for Kingston University. I will take this learning experience as an opportunity to explore the latest standards and approaches towards developing effective mobile applications. I am planning to implement extra functionalities that are not already available in other mobile apps such as adding credit to library card, though the security in mobile devices is questionable. Technologies and Resources Android software comes with an operating system, a middleware and key applications. It is a multi user Linux system in which each application is treated as a different user. The platform uses Java programming language. Android 2.3 is the latest version of Android operating system for Smartphone which will be used in developing my application. Android Architecture Following are the major development tools required: Sunà ¢Ã¢â ¬Ã¢â ¢s Java Development Kit Eclipse IDE Android Software Development Kit The Android Developer tool (ADT) Plug-in for Eclipse The Android emulator can be used to debug applications but latest Android phones such as Samsung Galaxy S || which uses Android 2.3 can be used to run the application in a real time environment. Kingston Universityà ¢Ã¢â ¬Ã¢â ¢s current library system uses Aquabrowser by Serial Solutions which has a user friendly interface and a feature rich environment. It will be a challenge to implement all the features of Aquabrowser for a mobile device. So at this point I am concentrating on the basic library operations. During the project analysis phase, SWOT analysis will be executed to get a better understanding of the industry. A requirements analysis will be carried out to specify the functional and non-functional requirements. UML diagram is also very useful in plotting the activity and sequence diagrams so is the Use Case analysis. I will be adopting Agile software development approach to execute my project which involves iterations that are of short time frames. Project Planning A project plan has been developed using Gantt chart by breaking the project in to small manageable processes for the smooth operation. The duration allocated for each steps reflect the effort and skills needed, allocating maximum duration for implementation. Project Management Gantt Chart Tasks Start Date Duration End Date Project Proposal 01/02/2011 30 03/03/2011 Analysis 01/03/2011 32 02/04/2011 Design 02/04/2011 31 03/05/2011 Interim Report 20/06/2011 10 30/06/2011 Poster Presentation 24/06/2011 10 04/07/2011 Implementation 03/05/2011 83 25/07/2011 Evaluation 25/07/2011 21 15/08/2011 Documentation 15/08/2011 31 15/09/2011 Submission 15/09/2011 7 22/09/2011 Risk Assessment and Evaluation The major risks involved in this process that will make the project to fall behind schedule will be lack of development knowledge, hardware failure, and requirements modifications. I have developed an action plan to minimise these risks and any unforeseen circumstances not to affect the project deadline. Risks Action Requirements modifications Update the requirements and continue Conflict in requirements Update the requirements and continue Hardware failure Always back up, Locate alternatives Competitors new releases Propose something different Flaws in schedule Edit and update the schedule Lagging behind schedule Always keep a diary to note activities Poor productivity Update skills and allocate more time
Comparing Gothic Romanticism in The Fall of the House of Usher and Lige
Gothic Romanticism in The Fall of the House of Usher and Ligeia The Gothic style found in the majority of Edgar Allen Poeââ¬â¢s short stories is obvious to the average reader. The grotesque, the desolate, the horrible, the mysterious, the ghostly, and, ultimately, the intense fear are all the primary aspects of the stories which are emphasized. But few writers remain uninfluenced from their contemporaries and Poe is no exception. He is clearly a product of his time, which in terms of literature, is called the Romantic era. Poe combines these two threads in almost all of his stories. For this reason critics often call Poeââ¬â¢s style ââ¬Å"Gothic Romanticism.â⬠The two stories ââ¬Å"The Fall of the House of Usherâ⬠and ââ¬Å"Ligeiaâ⬠are very similar to Poeââ¬â¢s other short stories, in that they to have this thread of Gothic Romanticism. The Gothic and Romantic themes can be analyzed separately in each of these two stories but together these themes drive the plot and the ultimate success of each. One common characteristic of Romanticism is the importance of the intuitive and emotional and the rejection of the rational and intellectual. Such is the case in ââ¬Å"Usher.â⬠Those who are skeptical of Poeââ¬â¢s Romantic influences would use this aspect of Romanticism to claim that he is not a Romantic because throughout the story the narrator attempts to explain the unexplainable with the rational. An example of this is when the narrator attributes an ââ¬Å"iciness, a sinking, a sickening of the heartâ⬠merely to the ââ¬Å"combination of very natural objects which have the power of thus affecting usâ⬠(Poe, ââ¬Å"Usherâ⬠). This argument is week because the narrator fails miserably to provide solid rational explanations for these ââ¬Å"strangeâ⬠events and f... ...ic thread seek to further Poeââ¬â¢s overall goal of terror. Either they develop the character in such a way that would increase the gloomy, mysterious, and supernatural mood of the stories, establish the mood through the setting, or help to further this mood in some other way. The combination of the Romantic thread in these two stories is no different. Poe uses various aspects of Romanticism, such as obscurity and the emphasis of emotion and intuition to increase the terror felt by the reader. But perhaps, the most important aspect of Romanticism is one which is also common in the Gothic tradition is the emphasis on one effect. In the Gothic tradition this single effect is that of terror. ââ¬Å"Ligeiaâ⬠and ââ¬Å"Usherâ⬠are no different in that Poe establishes this terror through the use of his own style of Gothic Romanticism. 2177 1 Marlow Engl. 12 Sect. 37 Comparing Gothic Romanticism in The Fall of the House of Usher and Lige Gothic Romanticism in The Fall of the House of Usher and Ligeia The Gothic style found in the majority of Edgar Allen Poeââ¬â¢s short stories is obvious to the average reader. The grotesque, the desolate, the horrible, the mysterious, the ghostly, and, ultimately, the intense fear are all the primary aspects of the stories which are emphasized. But few writers remain uninfluenced from their contemporaries and Poe is no exception. He is clearly a product of his time, which in terms of literature, is called the Romantic era. Poe combines these two threads in almost all of his stories. For this reason critics often call Poeââ¬â¢s style ââ¬Å"Gothic Romanticism.â⬠The two stories ââ¬Å"The Fall of the House of Usherâ⬠and ââ¬Å"Ligeiaâ⬠are very similar to Poeââ¬â¢s other short stories, in that they to have this thread of Gothic Romanticism. The Gothic and Romantic themes can be analyzed separately in each of these two stories but together these themes drive the plot and the ultimate success of each. One common characteristic of Romanticism is the importance of the intuitive and emotional and the rejection of the rational and intellectual. Such is the case in ââ¬Å"Usher.â⬠Those who are skeptical of Poeââ¬â¢s Romantic influences would use this aspect of Romanticism to claim that he is not a Romantic because throughout the story the narrator attempts to explain the unexplainable with the rational. An example of this is when the narrator attributes an ââ¬Å"iciness, a sinking, a sickening of the heartâ⬠merely to the ââ¬Å"combination of very natural objects which have the power of thus affecting usâ⬠(Poe, ââ¬Å"Usherâ⬠). This argument is week because the narrator fails miserably to provide solid rational explanations for these ââ¬Å"strangeâ⬠events and f... ...ic thread seek to further Poeââ¬â¢s overall goal of terror. Either they develop the character in such a way that would increase the gloomy, mysterious, and supernatural mood of the stories, establish the mood through the setting, or help to further this mood in some other way. The combination of the Romantic thread in these two stories is no different. Poe uses various aspects of Romanticism, such as obscurity and the emphasis of emotion and intuition to increase the terror felt by the reader. But perhaps, the most important aspect of Romanticism is one which is also common in the Gothic tradition is the emphasis on one effect. In the Gothic tradition this single effect is that of terror. ââ¬Å"Ligeiaâ⬠and ââ¬Å"Usherâ⬠are no different in that Poe establishes this terror through the use of his own style of Gothic Romanticism. 2177 1 Marlow Engl. 12 Sect. 37
Tuesday, October 1, 2019
Computer Fraud – an Analysis on Oracle Corp vs. Sap Ag
Information system has been playing a grave essential role in daily business activities. Over the past decade, the detection rate of computer crimes concerning information system attacks has risen sharply. According to Kunz and Wilson (2004), reported computer crimes have been septupled from 2000 to 2003 and leads to inestimable economic loss. Therefore, themes on information security, especially the prevention of computer fraud, have attracted increasingly attentions (Romney and Steinbart, 2009). However, it seems that perpetrators can always find new techniques to theft invaluable business secrets stored, processed or protected by those information systems. Moreover, some abuse techniques have been used in economic espionage, which causes a yearly loss of $250 billion (ibid). Oracle Corp vs. SAP AG could be one of the relating cases occurred in the recent 2007 and is not yet closed till present. This essay will firstly introduce the Case. Then by using Fraud Triangle, analyze the reason of SAPââ¬â¢s commitment of computer fraud and data theft. Finally, suggestions on how to improve the security of companyââ¬â¢s information system will be addressed with some reflections of the Case. It has been reported that the worldââ¬â¢s software giant SAP AG was sued by its largest competitor, Oracle Corporation, for computer fraud and data theft in March 2007 (Anon, 2010). In the Complaint, Oracle Corporation (2007) stated that in November 2006, unusual heavy download activities were spotted on Customer Connection, a website Oracle used to serve its customers. The uncovered access originated from an IP address in one of SAPââ¬â¢s braches with log-in IDs of PeopleSoft and J. D. Edwards customers. It is discovered later that TomorrowNow and SAP TN, two SAP subsidiaries, committed a series of unauthorized access to Oracleââ¬â¢s customer service system and more than 10,000 illegal download activities. Mass of important materials, including copyrighted software codes and confidential documents was theft. In this way, SAP was capable of establishing a service library for PeopleSoft and J. D. Edwards products, and launched a marketing campaign to snatch Oracleââ¬â¢s customers. The fraud resulted in Oracleââ¬â¢s 120 copyrights infringed and posed the threats of losing 358 customers (Kawamoto, 2007). On 24 November 2010, the U. S. Federal District Court for Northern California announced that Oracle won the Case with SAP liable for $1. 3 billion compensation. As Slappendel (2010) points out, this is the largest amount ever awarded in copyright infringement cases. The core reason may lies that the verdict is based upon the fair market value of the licenses for utilizing those resources instead of Oracleââ¬â¢s profit loss. After the verdict, SAPââ¬â¢s stock price has been falling significantly and TomorrowNow had to be shut down (Anon, 2011; Team, 2010). Although SAP accepted the liability and apologized for its inappropriate behavior, the company has been arguing that the penalty was contrary to the reality of the damage caused by the fraud (Margan, 2011). It is also reported that SAP has filed motions to the Court and therefore SAPââ¬â¢s computer fraud case does not seem to end at present. The action of data theft has brought unnecessary troubles to both SAP and Oracle. In order to prevent computer fraud effectively, it is essential to fully examine the reason of SAPââ¬â¢s behavior. Fraud Triangle will be used as an analysis tool. It is estimated by Romney and Steinbart (2009) that Fraud Triangle consists of the three normal conditions for fraud to occur: pressures, opportunities and rationalizations. Figure 1 shown below is a brief summary of Fraud Triangle in the Case. 5. Homely meals in software industry FIGURE 1 FRAUD TRIANGLE OF SAP Pressure Opportunity Rationalization 2. Oracleââ¬â¢s insufficient security management 4. Theft by other companies (i. e. Siebel Systems) before 1. Financial ââ¬â fierce competition in the market 3. Few evidence ââ¬â may not be spotted Firstly, SAP is probably under the severe pressure of maintaining the top one throne in the software market. During the last decade, competition between Oracle and SAP has greatly increased and the rivalry has developed into a feud. Particularly in 2004, Oracle began a series of acquisitions, aiming at increasing the share of enterprise applications market, where SAP owned the leadership (PeopleSoft, 2011). After realizing the seriousness, SAP fighted back by offering special discounts to woo customers, and thus a cruel price battle initiated. However, the strategy did not seem to rescue much, SAPââ¬â¢s market share remains downward sloping (Team, 2010). Currently, Oracle and SAP are vying for the third-party enterprise software support and maintenance market. The enormous pressure of winning may contribute to the commitment of computer fraud, especially for spying the business secrets of the largest competitor. The following two external conditions may possibly be linked to SAPââ¬â¢s unwise actions: Oracleââ¬â¢s insufficient security management and an opportunity to conceal the fraud. Oracle has provided the Customer Connection as a supplementary of its service to the customers. However, the semi-open system, which stores countless precious information, does not appear to be equipped with superior security management techniques. A huge defect exists that allows easy access to resources supposed to be protected from outsiders. In terms of the flaw, Oracle may be partially liable of its loss. Even though Oracleââ¬â¢s detection of abnormal access is relatively sensitive, it could not take a step ahead of the crime. Besides, Oracleââ¬â¢s dependence on service website offers the probability to conceal fraud, since comparably less evidence would be left for detection. With technology improvement, computer fraud may become far more difficult to spot in the future (The National Fraud Center, Inc. , 2000). Moreover, the experience of being a casualty of computer crimes might have lifted SAPââ¬â¢s rationalization of being a perpetrator. It is recorded that in 1999, SAP filed a lawsuit against Siebel Systems and claimed of being a victim of the so-called White Collar Crime (Kawamoto, 2007). Additionally, it may be reasonable to recognize the fact that most people in software industries regard the occurrence of computer fraud as homely meals, because almost all businesses in this market have grabbed some most advanced computer techniques, together with some abuse techniques obviously. As a result, SAPââ¬â¢s fraud behavior may not be that severe in the eyes of the decision makers. Hence, accelerate the germination of computer crimes. After fully assessment of why SAP may err, suggestions on how to improve the security of enterpriseââ¬â¢s information system will be addressed with reflections of the Case. In the perspective of prevention, several control methods could be considered to raise the security capability of the enterpriseââ¬â¢s information systems. First of all, persuade or enforce all employees, even the customers, to use strong password to access to companyââ¬â¢s database or service websites (Standler, 2007). Requirement of password changes at regular time intervals would be necessary to prevent some former employees of customersââ¬â¢ company from entering the system, which may exactly Oracle needs. Secondly, restrict physical and remote access to system resources unless the both the log-in ID and IP address are authorized (Backhouse and Dhillon, 1995). Thirdly, safeguard and double encrypt all data and programs. For example, materials on the Customer Connection could be double encrypted so that without further encoding, the downloaded materials would remain useless for non-employees or non-customers. Besides, techniques such as anti-virus software and firewall could to some extent protect the system from worms and viruses attack. Although using the above prevention method could avoid some dispensable loss, perpetrators penetrate everywhere (Romney and Steinbart, 2009). Therefore, an efficient detection system should be ready for any possible incidences. The establishment of a fraud hotline is recommended, which contains the employment of computer security officers, consultants and forensic specialists. The control system will be engaged in monitoring all malicious actions and reporting back as soon as possible. In the Case, Oracle took advantage of its superior detection system and made SAPââ¬â¢s fraud evidence traceable and suppressible (Oracle Corporation, 2007). Despite prevention and detection, there are other preparations could be made ahead of the arrival of any disasters with the intention of reducing the loss caused by computer fraud (Kunz and Wilson, 2004). These routines mainly concern insurance application, recovery plans constitution, material back-up within the whole information system. Furthermore, timely crime reporting to the government crime center and effectively legislative tool using might be helpful for retrieving fairly compensations from perpetrators, as it has been done by Oracle Corporation in the Case. Some ERP market analysts even suspect that the Lawsuit could be a sort of Oracleââ¬â¢s strategy to decrease the competition in the third-party enterprise software maintenance and support market. Whatever the original purpose is, Oracle has achieved benefit from winning the Lawsuit for the current period. To conclude, SAPââ¬â¢s situation has satisfied all of the three conditions presented in Fraud Triangle, some of which heavily depend on industrial environment as well as the design of Oracleââ¬â¢s information system. Thus, objectively, SAP may not liable for all the censure, though it really has been occupied in illicit competition using computer fraud. Oracle could be considered partially responsible for its loss and the sentenced $1. 3 billion seems somewhat too cruel for SAP to bear. Although some experts may argue that the breach of intellectual property is unforgivable culpable negligence, it looks possible for the Court to adjust the amount of penalty towards a more realistic number. Since the next round hearings will not start until July 2011, all the outcomes remain unpredictable (Margan, 2011). It is undeniable that, however, computer fraud could bring about huge losses for the entire society, especially when it is used in economic espionage. In the speeding advancing information century, nearly all of the impossible could be made possible. Consequently, it seems that only the creation of a healthy competition environment, emphasis on business ethics and proper education may aid in bringing down the upward climbing computer crime rate. REFERENCE Anon. (2007) SAP-We Will Aggressively Defend Against Oracleââ¬Ës Claims [online]. Ziff Davis Media, United Press International. Available at: [30 April 2011] Anon. (2010) Oracle Awarded $1. 3bn In SAP Data Theft Case [online] 24 November. BBC News. Available at: [28 April 2011] Anon. (2011) SAP Posts Sharp Profit Drop Due To Oracle Lawsuit [online] 26 January. Available at: [29 April 2011] Backhouse,J. and Dhillon,G. (1995) Managing Computer Crime ââ¬â A Research Outlook [online]. Computer and Security: 14(1995) 645-651. A vailable at: [29 April 2011] Granick,J. S. (n. d. ) Faking It: Calculating Loss In Computer Crime Sentencing [online]. Available at: [1 May 2011] Kawamoto,D. (2007) Oracle Sues SAP On Spying Charges [online] 22 March. CNET News. Available at: [28 April 2011] Kunz,M and Wilson,P. (2004) Computer Crime And Computer Fraud [online]. Available at: [1 May 2011] Margan,T. P. (2011) Oracle, SAP Still Going At It Over TomorrowNow [online] 28 February. Available at: [29 April 2011] Niccolai,J. (2010) SAP: Court Lops $500M Off Oracleââ¬â¢s Potential Damages [online] November. IDG News. Available at: [1 May 2011] Oracle Corporation (2007) Oracle Vs. SAP Lawsuit Complaint [online]. Available at: [28 April 2011] Panorama Consulting Group. (2010) Clash Of The Titans: An Independent Comparison Of SAP Vs. Oracle [online]. Available at: [10 April 2011] PeopleSoft (2011) Oracle vs. SAP [online] 1 May. Available at: [1 May 2011] Romney,M. B. and Steinbart,P. J. 2009) Accounting Information Systems, 11th Ed. Pearson Prentice Hall. Shaw,E. et al. (n. d. ) The Insider Threat To Information Systems: The Psychology Of The Dangerous Insider [online]. Security Awareness Bulletin: No. 2-98. Available at: [29 April 2011] Slappendel,S. (2010) Oracle v. SAP: Highest Damages Awarded For A Copyright Infringement Lawsuit [online]. Available at: [28 April 2011] Standler,R. B. (2007) Tips For Avoiding Computer Crime [online] 25 November. Available at: [29 April 2011] Team,T. (2010) SAP-Oracle Lawsuit Could Weigh On SAP Market Share, Stock Price [online] 14 December. Available at: [29 April 2011] The National Fraud Center, Inc. (2000) The Growing Global Threat Of Economic And Cyber Crime [online] December. Available at: [1 May 2011] APPENDIX: A COPY OF THE NEWS REPORT Oracle awarded $1. 3bn in SAP data theft case 24 November 2010 Last updated at 07:32 GMT Oracle chief executive Larry Ellison testified during the case European software giant SAP has been ordered by a Californian court to pay US rival Oracle $1. 3bn (? 820m) after losing a data theft case. The case revolved around customer-support documents and software stolen by SAP's subsidiary TomorrowNow. Oracle alleged that the German company intended to use the data to poach the 358 customers involved, and demanded $1. 65bn compensation. SAP had claimed it owed only $40m, but the jury decided in Oracle's favour. SAP said it was disappointed with the jury's decision and would look to challenge the verdict. [We will] pursue all available options, including post-trial motions and appeal if necessary,â⬠it said in a statement. It did, however, reiterate that it had made a mistake: ââ¬Å"We regret the actions of TomorrowNow, we have accepted liability, and have been willing to fairly compensate Oracleâ⬠. ââ¬ËBig dreams' Oracle co-president Safra Catz expressed her satisfa ction with the verdict: ââ¬Å"For more than three years, SAP stole thousands of copies of Oracle software and then resold that software and related services to Oracle's own customers. ââ¬Å"The trial made it clear that SAP's most senior executives
Hazel Essay
Hazel who worked for Fortune 500 Company for 15 years shows her loyalty and devotion in the company. It is surprising therefore why she was one of the chosen employees to be terminated by the new CEO to downsize the company. It is a question whether Hazel tried to ask the company why she was terminated despite the fact that she has been with the company in the long period of time. It is a need for her to know to fully understand the reasons. It might be even beneficial for her in long run to improve her weaknesses, flaws and mistakes if there are any. The rejection sheââ¬â¢s receiving from her application in finding employment must be very hard for her. But her need of survival motivated her to try another line of job. It must be very challenging since she was used to office or paper works perhaps, from the company she previously worked to. Moving lawns, weeding gardens, and trimming shrubbery are all not an easy job. It requires so much energy, effort and perspiration. But Hazel perceived it optimistically believing that it will do her good in the long run. After 15 years being used to be governed and overshadowed by the companyââ¬â¢s superiors, rules and policies, Hazel is now taking a different path. She can be more creative in this way in managing her life in terms of time management, communication with her clients, service price and all. Now everything is not routinary. In addition to this she can be more in touch with her clients thus creating opportunities to make friends and learn more. From being an employee, she now has her own business in accordance to her interest and creativity. She can creatively fashion her neighborââ¬â¢s backyard. Her business will eventually give her opportunities to apply her learningââ¬â¢s from her previous job. It is not bad to make some switch in career at times especially with Hazelââ¬â¢s case after a number of years of building experience and gaining knowledge in one particular field or profession. However switching a career can be wonderful chance to identify some careers that match well with your skill set and personality. Hazel will learn to be flexible in the long run who can both explore blue and white collar jobs.
Subscribe to:
Posts (Atom)