Friday, February 28, 2020
Controversy Around Groupware Research Paper Example | Topics and Well Written Essays - 500 words
Controversy Around Groupware - Research Paper Example Groupware can be used to share ideas, to solve problems, to connect with global users, to share files, and for many other purposes. It is a highly effective technology for use in project management and problem-solving. Prior to selecting a particular software solution, a company needs to decide on itsââ¬â¢ overall purpose. It is necessary to be as detailed as possible as to what kind of information-sharing is required and which people should be involved in the proposed project. ââ¬Å"One primary problem has been identifying and measuring specific performance outcomes for diverse job categoriesâ⬠(OConnor, 1999). Time and money can easily be wasted when the needs of the project are not clearly outlined from the beginning. Once these primary considerations are decided upon, the project manager may select the proper application and get started. The manager of a group project may be surprised to find that users are sometimes not in agreement about using groupware applications. This may be because they are used to a specific way of doing things, they are concerned that their efforts will go unrewarded, that they are afraid of a stigma associated with their candid opinions, or any number of other reasons. Another problem which can arise from groupware is that users may find themselves sabotaging a project by veering off-topic or initiating conflicts with other users. Some groupware problems are very similar to the problems one can experience in a traditional group setting.
Friday, February 21, 2020
How do Small-Medium Private enterprises contribute to the local Dissertation
How do Small-Medium Private enterprises contribute to the local economy in China -- look at ZheJiang Provice - Dissertation Example Research Method: To determine how private small-medium enterprises (SMEs) contribute to the short- and long-term development of Zhejiangââ¬â¢s local economy, triangulation method was used in this study. A total of 100 research survey respondents were invited to participate in an online research survey whereas a couple of research interviewees were randomly selected from the 100 research survey respondents. The couple of research interviewees were interviewed through video conferencing. Research Findings: H1 should be accepted but not H2. The presence of private SMEs in Zhejiang Province has an indirect positive impact on its social development. The short-term impact of private SMEs includes saving the jobs of millions of people and prevents thousands of SMEs from business closure. Long-term impact includes strengthening the business performance of the private SMEs which is necessary for future infrastructure development of this province. The long-term impact of its local governmen t intervention can help re-stablization of some of the private SMEs in this province. ... Establish a strong financial and institutional development; (2) Reduce regulatory and administrative Burden; (3) Encourage practice of foreign direct investment (FDI) Table of Contents Acknowledgement â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 2 Abstract â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦. 3 Table of Contents â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦. 4 1. Introduction â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 6 1.1 Research Aims â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 7 1.2 Research Objectives â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 8 1.3 Research Questions â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 8 1.4 Research Hypotheses â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 8 1.5 Scope and Limitations â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦.. 9 1.6 Rationale for Selecting the Research Topic â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 10 1.7 Si gnificance of the Study â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 11 2 Literature Review â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 11 2.1 Historical Development of Private SMEs in China â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 11 2.2 Role of Private SMEs in Chinaââ¬â¢s Economic Development and Creation of New Employment Opportunities â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦.. 13 2.3 Private SME Policies, Plans, and Programs in China â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦.. 15 2.4 Common Challenges of Operating Private SMEs â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 19 2.5 About Zhejiang Province â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 22 2.6 Th e Case of SMEs in
Wednesday, February 12, 2020
The in-game advertising industry Essay Example | Topics and Well Written Essays - 500 words
The in-game advertising industry - Essay Example Business organizations have been very quick to realize the potential profit gain from this segment. Massive Incorporated, which is the worldââ¬â¢s first video game company, operates with the mission of ââ¬Å"aggregating the gaming audience to deliver advertising across a network of premier video titles and providing measured results on consumer interaction with the advertising.â⬠Double Fusion is an Israeli in-game advertising company established in the summer of 2004. The business model of Double Fusion is very much similar to that of Massive. The product line of Double Fusion ranges from dynamic advertisements, integrated advertising, and ââ¬Å"around gameâ⬠inventory. In Game Advertising (IGA) seeks t o provide advertising services with its global computer video game media and advertising network. As opposed to Massive and other aforementioned competitors, IGAââ¬â¢s network encompasses multiple platforms including PC, console and mobile gaming and offer both stat ic and dynamic advertising. Together with Massive, Double Fusion and IGA Worldwide captures the largest market shares. Some smaller start-ups and players in the video game industry are also taking the challenge of in-game advertising.Despite the rapid growth of the video gaming industry, it also faces numerous challenges. It should be noted that customers now demand the creation of video games which have more sophisticated story lines and graphic improvements. On the other hand, the average commercial life of a video game has significantly dropped to less than one year.
Wednesday, February 5, 2020
Brightware Corporation Essay Example | Topics and Well Written Essays - 1250 words
Brightware Corporation - Essay Example Until the past 3 years, the sales of Brightware Corporation were unparalleled by any other company in the fray. In fact, our products had received maximum points as part of a general quality survey conducted by the Bureau of food standards, both in terms of quality as well as safety of use. However, there ware some serious reasons for the company not being able to perform with similar momentum during the previous year. In order to determine the exact causes of this slump, I visited a number of places associated with the company. Firstly, I spent considerable time at the warehouse facilities of Brightware Corporation to determine whether there were any lapses in terms of efficiency or quality. I met with a number of key personnel and also had performed an analysis on the efficiency at various stages of the production line. From my investigation at these facilities, I succeeded in figuring out a few key aspects that were hampering smooth supply. In this regard, I made observations that in addition to a slip in the employee morale, there was also an increased incidence of absenteeism among the personnel and this was directly having an impact on overall efficiency to the tune of a drop of 20%. The reasons for t The reasons for the fall in employee morale are not restricted to a single aspect. Firstly, upon visiting the 6 warehouse facilities of the company, I discovered that the working conditions were not up to the standards. Over the years, much of the machinery that had started to get old had not been replaced. It was also found that much of the warehousing equipment such as cranes and forklifts (almost 65% of the total equipment) required a major overhaul. The increased sales over the past few years that had grown by 125% over the past 4 years had increased the workload of the staff, who at most times, were unable to cope with the heavy demand and supply forces. This increased work pressure combined with a lack of efficient equipment has been found to be the major contributor for the fall in employee motivation. In addition to this, unable to cope with the extreme work pressure, many of the employees had been forced to absent themselves on a regular basis. In fact, a look at the attendance registers over the past years suggests that the rate of employee absenteeism had increased from a mere 6% to a staggering 15% within the span of a single year. Apart from this, as the business had grown, the supply chain had become overburdened and the lack on the part of the company to open up additional warehouses (calculations show that we require to open 4 new ones as of now) as a measure to satisfy the increased demand. Therefore, transport at the existing warehouse facilities of the company had to wait for prolonged periods, which was having an impact both on the supply from manufacturers as well as the supply to the retail chains. In fact, this has grown to such proportions that the overall productivity of our company has dropped by nearly 20%. A part of my interaction with some of the
Friday, January 31, 2020
Information Security College Essay Example | Topics and Well Written Essays - 750 words
Information Security College - Essay Example Information security essentially requires that the genuine parties to a transaction are identified, the actions they are allowed to perform are determined and their actions are limited to only those that are necessary to initiate and complete the transaction. Anything beyond that means that an intrusion attack is taking place. A new technology that has come up to secure information is the use of "tokens". Token is a form of two-factor authentication whereby the user needs a combination of something he knows for e.g. a password and something he has e.g. a token, to log on to a system. Tokens come in various shapes and sizes and they are mainly of two types; "passive tokens" are storage devices that contain a secret code that allow users to gain access to a network, whereas "active tokens" are usually small stand-alone electronic devices that generate a one-time password that is only useful for a single log-on and the user logs on to the system using this one-time password. Currently there are 20 vendors who are involved in the marketing of these handheld devices and the price ranges from $30 to $100 per unit. Companies wanting to use this technology can choose anything that serves their need and purpose because it can be customized and costs accordingly. However, four vendors are the market leaders because their products are sold the most; three vendors have the token device the size of a small calculator with a keyboard and use a 'challenge response' strategy. The fourth vendor supplies a device that is the size of a credit card and operates on a random number basis. Tokens are becoming increasingly popular among major companies today because they provide a very good and reliable solution to safeguard information. Over the years, companies have tried various means by which the network and information of the company would remain safe and not get in the wrong hands. However, more often than not, expert hackers have managed to break in and damage the whole network of companies. As a result of this, companies have faced enormous amounts of losses and experienced damages beyond repair. Companies using the technology of tokens are realizing that it is becoming extremely significant for the smooth running of their business without fearing the attack from hackers and losing valuable information. Tokens offer several advantages mainly: The password used in tokens is dynamic and cannot be re-used or guessed as it is a one-time password only. Tokens save costs as less money is spent on installing security technologies like firewalls etc and expert personnel don't need to be hired for the maintenance of these technologies. Since all the transactions require digital signing, it validates user identity. Even if the token device is lost or stolen, other built-in features prevent illegal access. Some tokens also have an audit trail and a built-in alarm that alerts the security director or mainframe operator to illegal access attempts. The size of the devices are such that they are portable and enable authentication for members of the company from anywhere, anytime. As more and more businesses are going online, the need to protect the company's network from attacks is greater than ever. A large amount of high-tec information passes to and fro among
Monday, January 27, 2020
The Challenges Posed By Digitalization And The Internet Media Essay
The Challenges Posed By Digitalization And The Internet Media Essay No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher? Perhaps, we all have read this phrase or a similar phrase somewhere at sometime. Similar warnings can be found in the movie credits, covers of music albums and similar other digital works which we can find in the Internet and other digital devices. How many of us have actually paid heed to such warnings? Almost always, nobody does. Everybody uses the Internet as if it is a limitless source of all that we need and want. The Internet is one big library. It is made up of numerous computers and devices which are connected together and carry data which can be transmitted to the other computers in the database. It has all the information that everyone virtually needs. Books, music, photos, news and many other kinds of information can be found on the Internet. Some for free and some for a fee. It is one big library without a librarian. And that is where the big problem lies. Nobody actually monitors what information you get from the internet and how you intend to use it. Most of the time, you can save or download any information that you need and do whatever you want to do with it at the click of a button. The Internet not being owned by anyone nor controlled by anyone is thus considered as a public domain. Everybody can have access to digital information which is usually free and available for all. With the Internet, the privacy of millions is threatened. Is there anything that we can do if a photo we posted online is being reposted by someone unknown in another website? Can we stop another person on the other side of the globe from copying the thoughts that we have posted on the blog? Are there even laws spanning across territories that we can invoke to protect us? Is it even possible to know and pinpoint who the person responsible is? Almost always, the answer to these questions is a big resounding No. This privacy problem is even compounded in areas of Intellectual Property. It refers to those property rights which result from the physical manifestation of original thought (Martin, 2002). Copyright is one of the areas covered by Intellectual Property Laws. According to the World Intellectual Property Organization, Copyright refers to that system of legal protection an author enjoys in the form of expression of ideas. This covers protection given to authors with regards to his scientific, educational, literary or other works; musical compositions of a composer; painters and other artists with respect to their work of arts; and many others not limited to such enumeration. Prior to the era of digitalization and the Internet, these copyrighted materials only exist in printed form, usually on paper or on canvas. These works have specific laws which protect their use from infringement. Any unauthorized reproduction, distribution, display or derivatives can be considered infringement, subject to certain rules and standards set in the laws. However, as we have reached the digital age, these works have been made available through the Internet also. Due to this, the problems have arisen, problems which have not been covered by most Copyright laws. What constitutes reproduction or distribution or display in tangible form does not equate to reproduction, distribution or display over the Internet media. Strictly speaking a work cannot be the subject of an infringement unless there is something tangible which shows such. The same no longer holds true with the digitalization and Internet. The Copyright System and Laws are thus unable to effectively respond to the challenges posed by digitalization and the Internet. The Challenges Posed by Digitalisation and the Internet We know that schools, businesses, hospitals and various other institutions have date which can be useful to other organizations. Many of these data can be accessible by digital copies and through online. This resulted to the era of databases which can be accessed by almost everyone in the planet. Some argue that this is an invasion of privacy as well as an infringement of copyright rights. Copyright may be vested in a work closely similar or even identical to an earlier, already patented work, provided that the former is truly original (Martin, 2002). The Internet, as helpful and convenient as it is, has been a cause of a major problem when it comes to intellectual property laws. The Internet has paved way for the unauthorized collection, use or sale of copyrighted materials. It is not only famous authors or artists which are protected by copyright laws. Davis (1997) once suggested the idea that individual users of the Internet also have property rights. Whatever we write or put on the Internet which are from our own personal thoughts or ideas or works are our own private intellectual property and as such we have the right to protect it and should not be copied by just about anyone online. Copyright puts a limitation on the volume of information or material that a person can reproduce without getting a license to copy first (Gillespie, 2007). A copyright can also be a limitation on artistic choices as artists cannot even make artistic works which are similar to that which has already been copyrighted (Burrell Coleman, 2005). This may sound as nothing important for Internet users but for people who are the owners of copyrighted works, this is very important. Many people in fact do not understand the idea of Copyright Laws and how it works. Lets examine the case of authors and the books they write. With the digitalization and the Internet, books in paper have been transformed into electronic books and can be easily saved in millions of copies in a device even smaller than a matchbox. Electronic books, otherwise called ebooks are books in electronic form which can be read on the computer or any ebook reader device (Schwabach, 2006). These days, people dont buy books as often as before. Thanks to the Internet. Or perhaps, no thanks to the Internet? Remember way back ten years or more ago, people buy encyclopedias, almanacs and atlases which come in 20 book sets or more. People buy Bible books for children in sets of 10 or more. Often, these are done in set-ups of monthly installments which in this day and age seem illogical. Why would you need 20 books when you can just Google? Why would you need four feet of space for a set of books and magazines when you can just buy a computer and use two feet of space for information which cannot be contained in even a room full of books? We admit, more and more people are reading ebooks, they are cheaper, they do not take space and they can last a lifetime. Many of these ebooks can be copied online for free and are allowed to be disseminated over the Internet for several reasons, such as when they are already available in the public domain or the author chose to publish it free for all (Schwabach, 2006). However, not all authors are like this. There are also many authors who have placed restrictions in the ebooks and thus do not allow any unauthorized or unpaid copies to be made and distributed. There goes the problem with the Copyright Laws. Another favorite in the Copyright infringement with this boom of the digital and Internet era is the mass reproduction and dissemination of movies. Movies are cinematographic works of art. Usually, the producer has copyright for purposes of exhibition; for all other purposes, the producer, the author of the scenario, the composer, the film director, the author of the work are the creators and thus have the copyright protection. In this day and age, anyone can download movies through the Internet and store them in memory drives. One downloaded movie can be reproduced a million times, recopied in DVDs, transported to different areas of the globe, and watched in millions of homes countless times. This is very common and not everyone knows that this is actually infringement. Third scenario, have you ever heard of controversies involving speeches made by people and would later be found to be copied verbatim from a speech made on the other side of the globe and which can be found online? We have heard of these a lot. You can use it as a speech in a remote area and when fortune favors you, nobody would ever know that you copied that piece from an article you read online. No one will ever know and everyone who has listened to such speech will think of how brilliant a speaker you are. Little did they know, you not only plagiarized the speech, you have also broken certain laws. Yes, you are in the eyes of the law, a criminal. In these scenarios, somewhere, someone has the right to relief and damages for such mass reproduction and dissemination of the movies, for the plagiarized speech, for the ebooks which have been copied and passed hundred of times. The one who is responsible for the infringement exposes himself to criminal liability wherein the law prescribes penalties of imprisonment and fines. This can be easy in the past. But in this world of vast connection of wires all over the globe, how easy is it to catch who is responsible? How can authors, musicians and artists ask for damages when they do not know in the first place who is responsible? And, is there really a clear law which defines infringement of Copyright laws over the Internet? In the past, it has been clearly laid down what constitutes copyright infringement and which doesnt. In the past, it has been clearly laid down who is entitled to copyright protection. In the past, it has been clearly laid down who owns the copyright. In the past, it has been clearly laid down what constitutes Fair use. The Fair Use Doctrine refers to the fair use of copyrighted work for the purpose of criticism, educational purposes, news reports, research and other similar purposes. Fair Use does not constitute infringement. In this instance, fair use in tangible media and fair use over the digital networks and the Internet seem to be the same. In the payment for damages, some laws lay down rules on assessment on the basis of the proof given by the author or artist of sales made by the infringer of the infringing work deducted by whatever costs the infringer may be able to prove (Martin, 2002). With the copyright infringement happening on the Internet, sometimes sales do not even take place, there is but a free for all reproduction of copyrighted works. We can see that in addition to losing protection from infringement, the author or artist also loses any chance of getting any amount of damages for compensation. Are information found online in this age of the Internet and digitalisation owned absolutely by their authors or artists, or is there some form of joint ownership with all the other users of the Internet? Does the fact that a copyrighted photo is found online give the Internet users the absolute right to use it? If that is so, then it goes to say that we have all become owners of whatever information that we can find on the Internet, right? Wrong. In some instances, there are owners of copyrighted materials such as music and books which allow specific transfers to internet users without any copyright infringement taking place (Rimmer, 2007). For example, the importation of a copy of a work by an Internet user for solely personal purposes shall be permitted without the authorization of the author of, or other owner of copyright in, the work under certain circumstances as laid down by law. When copyrighted materials are sold over the internet, there is no tangible medium. It is thus only the right to use which is being passed to the one who is buying the copyrighted digital works (Schwabach, 2006). Thus, technically speaking, a digital work which is sold online may not be sold by the buyer to another. That right to sell only belongs to the real owner of the digital work. The buyer only has the right to use, he can read or listen to the digital work but he does not have the right to sell it. The same analogy goes true when buying a DVD. If you buy a DVD and you copy the contents of the DVD and then sell the copied DVD, you are guilty of infringement. These are just some of the hundreds of challenges that are faced by the Copyright System and which have to be dealt with to protect artists, authors and others who have created manifestations of their brilliant ideas. It is therefore important to examine and to address the rights associated with the people who are owners of information or media disseminated over the internet (Gillespie, 2007). We, the billions of Internet users in the planet, are not the owners of every thing that we can find on the Internet. There is nothing to prevent you or me from downloading the latest movies, or posting a video of yourself online singing the latest chart-topping song of a music phenomenon, or posting an exceptionally beautiful painting made by your neighbor and claiming it as your own. A cornerstone in helping the problem with copyright protection is to inform the general public about rights and duties of owners of copyrighted materials and the Internet users (Wolf, 2003). Being socially responsible for whatever we download and use from the Internet may seem like the best possible option at present. Sad to say, but authors and other owners of copyrighted materials do not seem to have any avenue to defend their Copyright protection. Novel efforts must be made to explore how Intellectual Property Laws on Copyright can be amended and streamlined for the digitalization and Internet use. No matter how good the countrys Intellectual Property Laws are, these are still not designed for the digital and the Internet era. These laws have proved lacking, giving more freedom to Internet users and stripping Copyright owners of the Copyright protection that laws have given them. Conclusion What the Internet and digitalization gives away with one hand, it usually takes away with the other. The Internet and digitalization may have opened a whole lot of doors for everyone, but it also creates a very serious problem with regards to the use and abuse of information. Different jurisdictions all over the world have made the recognition that with the boom of digitalization and the Internet, privacy is almost impossible and the laws on copyright are unable to effectively respond to this. Movies, books, music and similar digital works have been the subject of numerous infringement which does not seem to stop anytime soon. Many challenges are faced by Copyright Laws because of digitalization and the Internet. Among these problems are the inapplicability of present Intellectual Property Laws, the lack of control in the information dissemination of the Internet, the easy access and download of various digital works over the Internet and the seeming lack in social responsibility and awareness of many Internet users, to name a few. A lot of people are actually unaware that not everything that we find on the Internet can be copied and used to our hearts content. And even if people knew, they either do not understand or do not care. Besides, what would stop them from infringing copyrighted works? The vast interconnection of wires and computers almost makes it virtually impossible to catch someone who is responsible for downloading and copying several copies of a movie, a song, a book, a photograph or similar works. In conclusion, until a perfect law against infringement of copyrighted digital materials over the internet is made and implemented, or a perfect socially responsible Internet- and digitally-savvy community of users exists, there is no specific and effective solution to help the owners of Copyrighted materials against these challenges that they face in this age of digitalization and the Internet.
Thursday, January 23, 2020
In-Depth Summary of Expectancy Theory Essay example -- BTEC Business M
In-Depth Summary of Expectancy Theory In todayââ¬â¢s organization, there is a need for ways in which to effectively motivate employees. Expectancy theory addresses the underlying issues that are associated with the belief that a performance or outcome is attainable. Developed initially by Edward Tolman and Kurt Levin, introduction of the theory into the workplace was not achieved until quite some time later by Victor Vroom (Bradt, 1996). It is his first utilization of the theory that enabled others to develop and recognize the potential the theory played in motivating individuals. This essay will address not only the fundamental mechanics behind expectancy theory, but also how it can be correlated with education, performance appraisals, and leadership roles in the workplace. When an individual is confronted with a task within the workplace they first assess if the effort that is required will produce a successful performance. Underlying issues such as self-esteem, educational background, and duration of the task all can aid in the individual's perception of probability in achievement. If an individual's perception of the task has a high probability of success, then motivation will ensue. Subsequently, if the individual feels there is little chance, then a lack of motivation occurs. From there the individual will attempt to analyze the probability that if this task is achieved, the desired outcome or reward will be acceptable and bestowed. This analysis of probability is labeled performance-to-outcome expectancy (Moorhead & Griffin, 2001). Desired outcomes vary depending on the individualââ¬â¢s needs, wants, and expectations. It is with this knowledge of diverse needs that the manager is able to realize the potential differences in how to best satisf y the employeeââ¬â¢s outcome perception. This assessment of importance of the outcome to the individual is its valence. Having discussed the fundamentals involved with expectancy theory, we will know look more closely at how it can further be applied to motivation through education in the workplace. Studies have shown that there is a definite correlation between education and motivation amongst employees. When an individual assess their effort-to-performance probability, factors such as self-esteem and expectations can play a significant role. Lack of basic fundamental skills among individuals who have ... ...nd a feeling of insecurity there is now more then ever a reason for the organization to develop more effective ways to motivate employees. After analyzing just a few of the hybrids associated with expectancy theory, it is clear that employee perceptions and expectations play a vital role in the success and productivity of the organization. The ability of the manger not only to identify, but also to utilize, this information is essential in fostering an environment of willing and highly motivated employees. Through analyzing and offering education, relevant performance appraisals, and leadership an environment of motivation can be achieved. Works Cited: Bradt, J. (1996, March). Pay Employees for Their Contributions. Personnel Journal New Product News Supplement, 7-9. Clinton, M. (1998, Nov). Uncertain Effects: Can Basic Skills Education Improve Motivation. Technical Training, 9(6), 35-37. Isaac, R. & Zerbe, W. (2001, Summer). Leadership and Motivation: The Effective Application of Expectancy Theory. Journal of Managerial Issues, 13(2), 212. Moorhead, G. & Griffin, R. Organizational Behavior: Managing People and Organizations. Boston: Houghton Mifflin Company, 2001.
Subscribe to:
Posts (Atom)