Blog

Negotiation gone bad

Negotiation gone bad

Negotiation gone bad

Negotiation is a process whereby individuals discuss their conflicting interests to settle on a mutual agreement (Alavoine, Kaplanseren & Teulon, 2013). Below is an example of a negotiation gone bad.

An employee receives feedback on his performance evaluation. The performance is poor, and he feels that the assessment should be positive as he has been working hard and giving suggestions to improve the company’s performance. He goes to the employer and shouts, “Mr Riggs, Why did you do this to me? I have been working hard, and this evaluation does not consider my hard work”. As Riggs hears this, gets up and shouts back at the employee,” Who do you think you are to question my work? I make all the decisions and what I say must stand”. The conversation turned to a heated quarrel which led to the employer asking him to leave the office. According to Mr Riggs, the employee thinks that he is not performing his evaluations fairly, and it annoys him. After a week, the employee receives a job dismissal letter.

Analysis

The employee started the conversation in a poorly, by throwing allegations at his employer. He begins by shouting at Mr Riggs instead of politely asking for explanations and reasons for the poor feedback. The procedure would require a plan for a meeting to address the issue. After the meeting time is approved, the employee asks for clarification, and the employer justifies his actions through by explaining the reasons behind the negative feedback. Next, a proper bargain takes place by giving a concession and ways to solve the issue at hand. The employer explains the activities he has been doing, along with the results achieved and the impact it had on the company. On the other hand, Mr Riggs explains the factors he considered in developing the evaluation statement. With these two evaluations, they can analyze them and come up with a final analysis that is true and agreed on by both parties.

Through this process, the outcome of dismissing the employee from work could not have occurred. Instead, evidence of the factors that Riggs considered in coming up with the evaluation would be revealed. The employer would also get an explanation of why the human resource manager did not assess because Mr Riggs, the employer may usually be out of the office attending meetings hence has no adequate information on employee performance.

Reference

Alavoine, C., Kaplanseren, F., & Teulon, F. (2013). Teaching (And Learning) Negotiation: Is There Still Room For Innovation?. International Journal Of Management & Information Systems (IJMIS), 18(1), 35. doi: 10.19030/ijmis.v18i1.8337

Posted in Uncategorized

Negotiation Case Study

Negotiation Case Study

Negotiation Case Study

Presented by

Institution

Organizations mostly find it difficult managing their finances especially when some employees stay dormant because their services are not required. Medical Care centers have different types of staffs who have specified duties. As a manager in one of the leading healthcare center, I wished to cut down the overhead costs while maintaining the revenue cycle. The process was critical, but I managed to resolve some of the key issues. The following is a negotiation plan and the resolving steps.

Negotiation plan

Goal statement

Every financial, year Medical Care centers find themselves looking for ways of cutting down their operating costs in order to maintain their financial friability. The current business environment is extremely demanding, and managers should ensure every activity or operation in the medical practice has a financial benefit. A manager should plan on how to achieve the best results at the lowest cost possible (CaliforniaHealthline, 2012). Medical Care physicians receive much salary, but their duties are remarkably minimal because they only attend to patients when there is an emergency. In my plan to cut down the operations cost in my Healthcare center, I decided to reduce the number of visits for the physician to once every two weeks, and later once every two months. This negotiation will analyze the process of minimizing dormant staff operations, and come up with alternatives and possible outcomes for such decisions.

Analysis of the perspectives/positions of the parties involved

The physician has a clean reputation for the healthcare, and we have a perfect professional relationship although he seems to take advantage of this by visiting the patients more often. Every visit costs money and the more he comes the higher the cost of maintaining the medical practice. When medical practices fail to reduce the cost of operations several instances occur. First, the medical practice faces a drastic fall in the wealth of stakeholders due to the high cost of paying physician unnecessary salaries. This reduces government revenues leading to more pressure on Medicare and Medicaid funding whose full recovery might take years. Second, the medical practice faces a reduction in the availability of investment and credit funds. This would lead into the healthcare receiving no credits from financial institutions (Allawi, 2009). With all this pressure as a manager, I will have to analyze the productivity of this physician and design a good visit plan saves the overall cost.

The number of visits made by the physician in the medical practice should be minimized because most patients are stable and monthly prescriptions would work perfectly for them. The reduction plan would involve a perfect strategy. Budget reduction in a medical practice requires each department to cut down its expenses to a certain amount. This only occurs through doing away with operations that seem to spend more money. The physician is an external party who only comes to visit his patients. Rescheduling his visits would save the medical practice more cash and allow more staff retention. In addition, some permanent staff members receive little pay, whereas they undertake a lot of duties. The state federal law does not allow physicians to see their patients more often because they might be interested in patients’ money and not their health (Minnesota Department of Health, 2012).

The fact that the physician was my best friend led to delays in my plans because I feared he might terminate all his visits to the healthcare center. The physician could just write prescriptions for his patients, which less costly and time saving for both patients and the medical practice. On the other hand, a proper understanding between me and the physician would make things work out smart (American HealthCare Solutions, 2012. First, the approach method I used was very poor. All other negotiations were achieved but he could not allow me to cut his visit days. The expected goals were not fully met because I never involved anyone in my decision.

Cost reduction strategies in an organization require the involvement of many parties. Availability of restructuring manager ensures the strategies are well structured, and any default is fully dealt with. Second, the managers should set cost reduction goals. Negating on the impact of reducing the visiting time should be analyzed in terms of the positive and negative outcomes of the process to the medical practice, patients, and the physician. In addition, there was lack of pre-performance objectives that could only focus on the importance of reducing the amount of time the physician spends in the healthcare to twice per month.

The possible alternative outcomes

From the above negotiation, some possible outcomes could be felt at the end. First, the physician could demand a full explanation regarding why his visits should be reduced and yet the medical practice had signed a contract with him. The following outcome carries a lot of weight because the physician could sue the medical practice for neglecting patients their rights. Second, the physician could request for a compensation for the cut days. This would cost the healthcare more revenue, since the physician would be receiving his normal salary even when the trips to the medical practice are minimized. Moreover, the organization could consider offering him permanent employment with the same salary, but more duties. The following outcome could make the medical practice lay-off some of casuals in order to cater for the new salaries induced by the physician.

The steps that led to resolution 

In resolving the following issues, a labor steps were followed.

Assessing the compatibility of the suggested plans with the Fair Labor Standard Act helps in determining the best options that a manger should take while dealing with un-employment or reduction of duties.

Using conduct of labor negotiations in collective bargaining between the physician and mangers about the contract and the reasons for such decision,

Negotiating with the physician concerning the reviewed duties and their benefits to the medical practice.

Analysis of the outcomes

According to Bossidy & Charan (2002), most managers have a hard time resolving organizational issues because they always believe they are very perfect in management. Executing some critical issues in an organization is a hard task that requires techniques and understanding of the possible outcomes of the strategy. Moreover, the vision component in an organization should focus on the future results that allow equal sharing of resources. The targets and missions derived by the management wishes to achieve assists in identifying the guiding objectives that an organization adopts in order to improve its performance (Hertz, 2006). On the other hand, medical practices sometimes consider reducing the cost through in-house operations where they make use of their staff to check the patients.

References

Allawi, S. A. (2009). Reducing Costs: Execution is Critical. Retrieved from;

www.performancelogic.com

American Healthcare Solutions. (2012). Labor Relations. Retrieved from:

http://www.americanhs.com/strategy/labor-relations.aspx

Bossidy, L. & Charan, R. (2002). Execution: The Discipline of Getting Things Done. Atlfeld,

Inc.a

CaliforniaHealthline. (2012). Medical practices Taking Steps To Reduce Operating Expenses.

Retrieved from:

http://www.californiahealthline.org/articles/2011/2/7/medical practices-taking-steps-to-reduce-operating-expenses.aspx

Cassidy, J., (1995). An evaluation of Section 232(4) of the Corporations Law and the

directors’ duty of due care, skill, and diligence. Australian Business Law Review, 23(3), pp. 184-184.

Hertz, H. (2006). Health Care Criteria for Performance Excellence: Baldrige National

Quality. Business and Economics. DIANE

Minnesota Department of Health. (2012). Code of Federal Regulations Medical practice Conditions of

Participation. Retrieved from:

http://www.health.state.mn.us/divs/fpc/profinfo/lic/cfrhosp.htm

Posted in Uncategorized

Cycle Menu Plan for Irish family

Cycle Menu Plan for Irish family

2379345-361950Cycle Menu Plan for _______Irish family_____________________

Cycle Menu Plan for _______Irish family_____________________

Week 1 of 2 week Cycle Menu

Sunday Monday Tuesday Wednesday Thursday Friday Saturday

Breakfast

3 ounces of Pineapples(Fresh), 1 cup of Beverages(Hot)

2 Boiled eggs with 3 ounces of Corn flakes 3 ounces of Seasonal fresh fruit

3 ounces of Fresh toast

1 cup of Milk 1glass of Grape Juice

3 ounces of Special K

3 ounces of Sliced of Bread 1 glass of Apple Juice

3 ounces of Pancakes syrup

1 cup of Milk 3 ounces of Fresh Orange wedges

1 Scrambled egg with 3 ounces of cheese

1 cup of Milk 1 glass of Orange Juice

1 cup of Milk

3 ounces of Biscuits 1 glass of Orange Juice

3 ounces of Banana Muffin

1 cup of Milk

Lunch

3 ounces of Apples, 4 ounces of roasted Turkey, 3 ounces of rice, with 1 scrambled egg 4 ounces of left over roasted Turkey and 3 ounces of sandwiched Cheese

3 ounces of Whole wheat roll 3 ounces of Spanish rice

3 ounces of Mexican cone 1 cup of Milk 4 ounces of Breaded Fish

3 ounces of Mexican Cone

1 cup of Milk 4 ounces of Baked chicken

3 ounces oof Whole wheat roll

3 ounces of Peaches 3 ounces of Baked beans

3 ounces of Tossed Salad, 1 cup of milk

3 ounces of of Peas and carrots

4 ounces of Chicken nuggets

3 ounces of Lettuce, 3 ounces of Pickle and tomato

Snack

2 ounces of Animal Crackers

4 ounces of Yoghurt 3 ounces of Blue berry Muffin

1 cup of Milk 3 ounces of Fruit cocktail

4 ounces of Yoghurt 1 glass of Orange Juice

4 ounces of Cheese crackers 3 ounces of Oatmeal meal cookie

1 cup of Milk

3 ounces of Graham Crackers

3 ounces of Banana

1 cup of milk 3 ounces of Vanilla Wafers

3 ounces of Apple sauce

1 cup of milk

Dinner

4 ounces of grilled Chicken and 2 noodles

2 ounces of Peaches

3 ounces of Conned bread 4 ounces of roasted leftover Turkey and 3 ounces of Cheese

4 ounces of left over roasted Turkey and 3 ounces of Spaghetti

3 ounces of Peaches 4 ounces of barbeque Chicken and 3 ounces of Vegetable star fry

3 ounces of Pineapple Tidbits

4 ounces of left over roasted Turkey

3 ounces of Cooked carrots

2 ounces of Oven fries 4 ounces of Barbeque Chicken

3 ounces of Mixed vegetables

3 ounces of Brown rice

4 ounces of roasted Turkey 3 ounces of Mashed potatoes

4 ounces of Broccoli

2 ounces of Green Peas

Notes On Sunday there was a party in which a whole turkey was roasted, the leftover turkey was then used for lunch on Monday The family has tried to minimize its consumption of red eat to avoid problems with their weight On Saturday dinner upon receiving visitors another turkey was roasted its left over was used for dinner on Tuesday 2903220-361950Cycle Menu Plan for __________ Irish family _____________________

Cycle Menu Plan for __________ Irish family _____________________

Week 2 of 2 Cycle Menu

Sunday Monday Tuesday Wednesday Thursday Friday Saturday

Breakfast

1 glass of Orange Juice

1 cup of Milk

2 ounces of Waffles

3 ounces of Cantaloupe cubes

2 ounces of Crispix Cereal

1 cup of Milk

3 ounces of Banana

2 ounces of Apple zings cereal

1 cup of Milk

2 Scrambled eggs

3 ounces of English muffin

2 ounces of Toast

1 cup of Milk

1 glass of Orange Juice

1 cup of Milk

2 ounces of Waffles

3 ounces of Apple sauce

1 cup of Milk

4 ounces of Banana bread 1 glass of Grape Juice

1 cup of Milk

2 ounces of Cinnamon Toast

Lunch

4 ounces of roasted Turkey and sandwiched Cheese

3 ounces of Whole wheat roll 4 ounces of left over roasted Turkey and sandwiched Cheese

3 ounces of Whole wheat roll 4 ounces of Barbeque Chicken

3 ounces of Mashed potatoes

4 ounces of Broccoli

3 ounces of Green Peas 4 ounces of Chicken nuggets

3 ounces of Lettuce, Pickle and tomato 4 ounces of left over Barbeque Chicken

2 ounces of Mixed vegetables

2 ounces of Brown rice

4 ounces of Sliced Turkey

3 ounces of Mixed vegetables

2 ounces of Mashed Potatoes 4 ounces of roasted Chicken and 3 ounces of Vegetable star fry

3 ounces of Pineapple Tidbits

Snack

1 cup of milk and 2 ounces of cheese slice and Pita bread 2 ounces of Granola bar milk 1 cup of Milk and 1 ounce of Oatmeal

cookies 3 ounces of Fresh Broccoli Florets 2 ounces of Assorted crackers and I cup of milk, 4 ounces of Cheese crackers and 1 glass of Orange Juice

I cup of milk, 3 ounces of Orange wedges and 2 ounces of Graham Crackers 1 cup of milk and 2 ounces of cheese slice and Pita bread

Dinner

4 ounces of fried fish

2 ounces of Whole wheat roll

3 ounces of Spinach salad

3 ounces of Sliced 4 ounces of fried fish

1 ounce of Pizza

1 ounce of Fruit cocktail

2 ounces of Macaroni and cheese

3 ounces of fried fish

1 ounce of Hamburger patty

2 ounces of Mixed vegetables

1 ounce Peaches 3 ounces of Salisbury steak

1 ounce of Broccoli

2 ounces of Tater tots

1 glass of Milk 4 ounces of fried fish

2 ounces of Whole wheat roll

3 ounces of Spinach salad

3 ounces of Sliced tomatoes 3 ounces of Salisbury steak

2 ounces of Baby Green lima

3 ounces of Pineapple Tidbits 4 ounces of roasted Chicken strips

2 ounces of Mashed potatoes

2 ounces of Black eye Pears

Notes The family prefers white meat to red meat because it is healthier. Since the family has issues with weight, they are allowed to take between 3-4 ounces of roasted chicken and turkey. On Sunday, Lunchtime the family roasted a whole turkey and the remainder was used as left over on Monday lunch. Milk is a rich source of proteins and the family has ensured it is in every breakfast meal. On Tuesday lunchtime the family bought a lot of Barbequed Chicken the remainder was used as left over on Thursday lunch time. The family of Mister and Miss Robert and Stephaney Williams is an Irish family that lives in Massachusetts. Mr. Robert Williams is a banker by profession and works for the America Bank as a manager in charge of logistics. Mrs. Stephanie Williams is a nurse by Profession and works at the John Hopkins hospital as a Ward Manager. The two live with their aging mother and a son and daughter aged 12 and 10 respectively. The two are in elementary school. Andrew Williamson, their son, has a knack for carbohydrates but since the entire family is ten to fifteen pounds overweight, they have tried to reduce their calorie consumption levels. On the other hand, Susan has stopped taking calories since her peers tease her for her overweight. She takes more of skimmed milk and few snacks.

The family, which lives in Massachusetts, meets every day for all their meals since the children go to the nearby elementary school while the parents work near the home. The parents have two different cars while the children are chauffeured in one car. The Irish family has a liking for Irish food but since they have lived in America for quite a long time, they have tried to blend it with the American and Mexican food types.

Massachusetts is a multicultural state and is made up of over 80% white and 75% non-Hispanic whites. The Irish in Massachusetts are part of the many immigrants who have moved into this state over the years. Owing to cultural assimilation, most of their foods complement a mix up of all the cultures in this state. While some have a liking for Spanish foods, others have a liking for Mexican dishes while others just like it American. The Williamson have been in Massachusetts for at least two decades and are familiar with most of the groceries in their neighborhood where they prefer to go for shopping. The family also loves the great outdoors and in most cases do their own cooking. Since all members of this family are overweight, all their meals are special starting with breakfast with plenty of fresh juices and fruits, Chicken and turkey that are preferred because they are white meat for lunch and supper. . Since the family has a chauffeur, they ensure that he takes packed food for the children in school every day at lunch hour.

Posted in Uncategorized

Negative Leadership Behaviors

Negative Leadership Behaviors

Negative Leadership Behaviors

A leader’s behavior is an authoritative demonstration of mannerisms that bear the prospects and standards of an organization and establish the organizational climate (Grojean et al., 2004).Leadership behaviors are either task or relations oriented. Task-oriented leaders gear to reaching organization goals. A leader who displays task-oriented behaviors explains staff roles and objectives, monitors individual performance and actions as well as set short-term goals (Yukl, O’Donnell)

Relations-oriented leadership behaviors dwell with developing close, trustworthy relations with staff (Holloway, 2012). A relations-oriented leader displays supportive, developmental and approval behaviors (Holloway, 2012). Behaviors that indicate a leader supports his employers are showing acceptance, being concerned and sensitive to the needs and feelings of others. A display of developmental behaviors is seen when a leader provides probable welfare to supervisors, peers, subordinates or colleagues new to an organization. Approval mannerisms are illustrated through compliments and gratitude for effective performances, achievements and imperative assistance to an organization (Holloway, 2012).When a leader fails to possess the task or relation oriented leadership, the leader is considered to have negative leadership behavior. Leaders who display negative behaviors are incompetent, inflexible, intemperate, insensitive, fraudulent, blinkered or evil (Kellerman, 2004)

EXPERIENCE

In 2009, I joined a community based organization comprising of members from my community volunteering to assist teenagers live positively. The organization was started by six couples. The purpose of the organization was to guide teenagers on life issues like employment, relationship, dressing and communal living as well as sensitize the teenagers on the challenges and risks associated with being a teenager. According to the organizations policy, membership was free and so were the services. The organization operations relied on sacrifice from parents and teenagers. On each meeting, one or maximum two of the committee parents were assigned to perform the duties to educate and train .it was mandatory that all Sunday afternoons, the committee members would confine in one of the homes and analyze the progress of the organization as well as possible improvements. With time, word spread and the organization nurtured to a point where teenagers outside our community enrolled for the project. However, this positive progress did not last long. Concerned persons commenced raising concerns on negative behaviors among the organization leaders.

First, a committee couple accused a fellow committee member of being unwilling to adjust to new ideas and developments. There were complaints that a male committee member was having a sexual relationship with girl member. One leader was accused of being offensive and harsh to the teenagers. According to the sources he was fond of humiliating teenage members and was not concerned with their welfare. He only claimed to be part of the organization because his wife dragged him into it. This same leader was accused of posing as the organization’s treasurer and used the title to charge new uniformed families for the services. When investigations were conducted, all these accusations were confirmed true. Unfortunately, it was too late for the organization to recover as it had collapsed due to bad image.

ANALYSIS

The leadership traits mentioned in the experience segment above are negative leadership traits which steered the downfall of the organization. Leaders were corrupt, intemperate, callous, corrupt, rigid and insular. Corruption is displayed where a leader lied to be the treasurer in order to extort money from the newly joining families. By posing as a treasurer, he lied. By extorting money from the unknowing families, he cheated. He was dishonest to both the family and the organization. A corrupt leader is one who cheats, lies or steals (Kellerman, 2004).This is a negative leadership trait because leaders should place public interest prior to private interests. Corruption leads to mistrust among followers.

Rigidity is displayed where some leaders declined to adapt new ideas. A rigid leader is one who is reluctant to adapt to fresh information, changing times or new notions (Kellerman, 2004).Rigidity is a negative leadership trait because it deters development yet a good leader is supposed to initiate and perpetuate development. Without development, organizations cannot grow or adapt to external factors not within their control. This way the organization will always be a victim of such factors. An organization whose growth is stagnant cannot achieve its goals.

Intemperance is displayed when a male leader had sexual relationships with a female teenager. An intemperate leader falls short of self-control (Kellerman, 2004).As a leader; one should always be an example to followers. It was bad enough for the leader to educate the disadvantage of teenage sex but still have intercourse with a teenager. Such a leader is no role model. Intemperance is a negative leadership trait as it misleads the followers who are susceptible to emulate their leader’s actions. The objectives of an organization cannot be achieved if both the leaders and followers are behaving unethically.

Callous leadership was displayed when a leader criticized the teenage group members. This was ill and insensible. It is easy to conclude from the critics words “I am here because my wife dragged me into this” that the welfare of the teenagers was not of his concern. This was an insular leader. A callous leader is unkind and uncaring (Kellerman, 2004). The leader under limelight did not care for the teenagers’. A leader who is callous displays negative leadership trait. This is so because by being insensitive and hostile leaders show no support to follower who in turn loose moral and reduce productivity. A good leader should support, appreciate and care for his follower’s welfare failure to which the followers will lose interest and trust in their leadership, collapsing an organization. This leader was also insular. An insular leader degrades the welfare of others (Kellerman, 2004). A perfect example is that of Bill Clinton ignoring the Rwanda genocide or George Bush failing to intervene when summoned to help sojourn the Liberian massacre (Kellerman, 2004).

Summarily, it is recommendable that leaders strengthen their leadership. This is possible if leaders embrace ethics. An ethical leader puts public interest before personal interest. Leaders should incorporate positive character traits in work such as courage, patience and time consciousness. In addition, should be committed to their duties and impose interest for common good. In addition, leaders should support and listen to their followers, be good role models, be honest and perform their tasks with utmost efficiency.

References

Grojean, M. W., Resick, C. J., Dickson, M. W., & Smith, D. B. (2004). Leaders, values, and organizational climate: Examining leadership strategies for establishing an organizational climate regarding ethics. Journal of Business Ethics, 55(1), 223-241.

Holloway .J.B (2012) Leadership Behavior and Organizational Climate: An Empirical Study in a Non-profit organization. Retrieved November 25, 2012 from http://www.regent.edu/acad/global/publications/elj/vol5iss1/ELJ_Vol5No1_Holloway_pp9-35.pdfKellerman, B. (2004) Bad Leadership: What It Is, How It Happens, Why It Matters Leadership for the Common Good Series. Boston: Harvard Business Press

Yukl, G., O’Donnell, M., & Taber, T. (2009). Influence of leader behaviors on the leader member exchange relationship. Journal of Managerial Psychology, 24(4), 289-299.

Posted in Uncategorized

Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state

Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state

Author’s Name

Institutional affiliation

Introduction

Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state to maliciously penetrate another state’s computer networks for the main purpose of disrupting or causing damage is a major cause of national and global concern. This threat, which is often politically motivated, has in this year and for the very first time, been regarded to be a larger threat than terrorism or Al Qaeda by various U.S intelligence authorities (Dilanian, 2013). Computer security is indeed is an important concern for governments, businesses and individuals (OPC, 2011, p.11; Guttman & Roback, 1995). In this paper, we investigate the concept of cyberwarfare and explain why it is an area of concern for governments, businesses and individuals. Also investigated is how individuals attempt to breach computer security in this domain (methods of attack). This paper also presents the active and passive defenses that governments, businesses and individuals can use in combating cyber attack. The methods that security specialists employ in safeguarding computer systems are also explored in great detail.

The concept of cyberwarefare

The concept of cyberwarfare is basically a computer hacking activity which is politically motivated for the sake of espionage and sabotage. It is a special kind of information systems warfare which is sometimes viewed as analogues to the conventional warfare (O’Connel, 2012).As noted earlier, this threat, has in this year and for the very first time, been regarded to be a larger threat than terrorism or Al Qaeda by various U.S intelligence authorities (Dilanian, 2013).Indeed this makes cyberspace the 5th domain of military warfare (Taddeo, 2012, p.209).

So grave is the issue of cyber security that the U.S Department of Defense (DoD) has formally acknowledged it as a new domain in global warfare (Lynn, 2010).Lipman Report clearly indicated that several of United State’s key sectors of the economy as well as other nations are at great risk of cyber attacks. Cyber threats range from those targeting private to public facilities such as banking and financial sectors, transportation, education, medical, and manufacturing and government operations. In this regard, we can safely regard cyberwarfare as an event exhibiting characteristics of a conventional warfare but waged only in the cyberspace.

Methods of attack

According to Andress and Winterfield (2011), individuals and nation-states can use several methods in order to wage a cyber attack. These range from the use of malware, viruses, Distributed-denial of service (DDoS) attacks to the use of electromagnetic pulse (EMP) bombs. Wilson (2008) categorized the methods into three distinct issues; physical damage of computers as well as communication lines, the use of electromagnetic pulse to damage computers and the use of malware to manipulate as well as sabotage computer networks.

Malware attack involves the use of malicious software to infect individual, corporate or government computers. A perfect example of a malware that has been used in the past is Stuxnet, a malware which is arguably the most sophisticated cyberweapon ever designed (Bodenheimer, 2012). This malware was developed by United States in collaboration with Israel in order to sabotage the Iranian nuclear enrichment program. Its deployment was hugely successful to its creator since it completely destroyed the computers that were being used for the enrichment operations.

Physical damage of computers as well as communication lines is another method used in waging a cyber attack. This is usually achieved through the destruction as well as sabotage of computer hardware, aerials, cables as well as satellites. The use of EMP is also effective since it completely destroys all computer and communication equipment that are transistor-based.

Manipulation of computer networks is yet another example of cyberwarfare. It involves the use of programs to interfere with the integrity, availability as well as confidentiality of the computer and communication systems. This type of attack involves the use of DDoS attacks as well as man-in-the-middle attacks.

How to combat cyberwarfare

Cyber attacks can be combated through the application of active and passive anti-cyber attack strategies. There is a need for individuals, corporations and governments to develop methods for predicting, identifying and countering cyber attacks. Currently, several entities within the United States cyber community campaigning for the adoption of an anti-cyber attack campaign that is able to strategically as well as tactically deal with the eminent cyber threats (Menn, 2012). These anti-cyber attack strategies involved the application of active and passive defensive strategies to protect computer and communication systems against cyber attacks. Anti-cyber-attack strategies are mostly associated with both active and passive cyber attack defense measures that are used in protecting computer systems while counter-cyber-attack measures are mainly pre-emptive offensive techniques that are used to analyze behaviors and signatures and then subsequently deter, prevent, pre-empt as well as neutralize all sorts of hostile acts or intrusions (Swanson,Astrich,Robinson,2012).

Individuals, corporations and governments must therefore work together with security specialists in coming up with proper anti and counter-cyber-attack measures in order to ensure that the confidentiality, integrity and availability of computer and communication networks are never compromised. Intrusion detection systems must be used to help in forming a strategy that is more predictive than reactive. An early warning framework such as Lockwood’s 12-step Analytical Method for Prediction (LAMP) must also be implemented (Lockwood, 1996).The use of antivirus updated software such as Kaspersky Antivirus must also be used. Firewall must also be used with suitable policies put in place.

Conclusion

Cyberwarfare is a concept that can never be avoided in our current and future societies. Individuals, corporations and governments must therefore work together with security professionals in combating all sorts of offensive cyberwarfare. Active and passive defense mechanisms must therefore be designed to be used for predicting, identifying and countering cyber attacks. Otherwise, we might just be headed for a cyber Armageddon!

References

Andres,J.,Winterfield.,S. (2011).Cyber Warfare: Techniques, Tactics and Tools for Security

Practitioners. Waltham,MA: Syngress

Bodenheimer,DZ.(2012).Cyberwarfare in the Stuxnet Age Can Cannonball Law Keep Pace

With the Digital Battlefield? The SciTech Lawyer, 8 (3) (Winter,2012).Retrieved on 17 April,2013 from HYPERLINK “http://www.crowell.com/files/2012-bodenheimer-the-scitech-lawyer.pdf” http://www.crowell.com/files/2012-bodenheimer-the-scitech-lawyer.pdf

Clarke, R,A.(2010).Cyber War.New York,NY:Harper Collins

Guttman,B., Roback,EA. (1995). An Introduction to Computer Security: The NIST Handbook.

Nist special Publication800-12. Retrieved on 17 April,2013 from HYPERLINK “http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf” http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf

Dilanian, K (2013)”Cyber-attacks a bigger threat than Al Qaeda, officials say”, Los Angeles

Times, March 12, 2013. Retrieved on 17 April,2013 HYPERLINK “http://articles.latimes.com/2013/mar/12/world/la-fg-worldwide-threats-20130313” http://articles.latimes.com/2013/mar/12/world/la-fg-worldwide-threats-20130313

Lynn, W.J. ,III. “Defending a New Domain: The Pentagon’s Cyberstrategy”, Foreign Affairs,

Sept/Oct. 2010, pp. 97–108

Lockwood, J. (1996). Lockwood Analytical Method for Prediction, DC: JMIC.

Menn, J. (2012, June 18). “Hacked companies fight cyber criminals.” Retrieved on 17

April,2013 from the Canada.com website: HYPERLINK “http://www.canada.com/technology/Hacked+companies+fight+cyber+criminals/” http://www.canada.com/technology/Hacked+companies+fight+cyber+criminals/

O’Connel,ME (2012).Cyber Security without Cyber War. Oxford :Oxford University Press

Office of the Privacy Commissioner of Canada (2011).

“Fundamental Privacy Rights within a Shared Vision for Perimeter Security and Economic Competitiveness”.Submission by the Office of the Privacy Commissioner of Canada to the  Government of Canada’s Beyond the Border Working Group public consultation.

Taddeo, M (2012). “Information Warfare: a Philosophical Perspective.”Presented at the 2012

4th International Conference on Cyber Conflict. Retrieved on 17 April,2013 HYPERLINK “http://www.ccdcoe.org/publications/2012proceedings/3_5_Taddeo_AnAnalysisForAJustCyberWarfare.pdf” http://www.ccdcoe.org/publications/2012proceedings/3_5_Taddeo_AnAnalysisForAJustCyberWarfare.pdf

Wilson,C (2008). Botnets, Cybercrime, and Cyberterrorism:Vulnerabilities and Policy Issues for

Congress.CRS Report for Congress Order Code RL32114.Updated January 28,2008. Retrieved from HYPERLINK “http://www.fas.org/sgp/crs/terror/RL32114.pdf” http://www.fas.org/sgp/crs/terror/RL32114.pdf

Posted in Uncategorized

Negative Impacts of Social Media on People’s Lives Analysis of Social Media is Attention Alcohol by Derek Thompson

Negative Impacts of Social Media on People’s Lives Analysis of Social Media is Attention Alcohol by Derek Thompson

Negative Impacts of Social Media on People’s Lives: Analysis of “Social Media is Attention Alcohol” by Derek Thompson

In his article, Derek metaphorically compares social media usage to alcohol consumption. He argues that social media is a product that is beneficial but addictive and naturally unwholesome in large doses. Derek writes that although many people use social media regularly, love it and are okay with it, many abuses it, and some develop unhealthy compulsions. Additionally, he proposes that thinking of social media as alcohol can guide reform efforts towards managing its use and impacts. Social media has serious negative effects on people lives; it creates feelings of inadequacy, affects mental health, enhances bullying, creates unrealistic expectations and creates addiction.

Social media creates feelings of inadequacy about life and appearance. Social media gives people a tool to compare themselves with others and to question their self-worth. The life and photographs people view on social media make them feel insecure about what is going on in their lives and how they look. Resulting in feelings of inadequacy and dissatisfaction with their real personal lives. Similarly, social media provides a platform for people to show their best looks, from classic clothes to body and facial appearance. This impacts self-esteem and triggers feelings of inadequacy in people who do not feel good enough. For instance, Derek documents that Facebook and Instagram make young women, especially teen girls, feel worse about their bodies.

Secondly, social media negatively affects the mental health of its users. Social media triggers comparison in people, which is a sure path to anxiety and depression. Social media users tend to post the best parts of their lives, which most people compare to the worst in their personal lives; comparing yourself to another person creates the idea of missing out and negatively impacts self-esteem resulting in depression and anxiety. Derek documents that Instagram and Facebook users, especially teen girls, admit that what they see on these sites negatively affects their mental health. Also, those who already struggle with mental health acknowledge that Facebook and Instagram usage makes it worse. Similarly, the growing use of social media is limiting face to face interactions. Human beings need face to face interactions to be mentally healthy. Therefore, the more people use social media over face-to-face interactions, the more they risk developing mood disorders such as anxiety and depression.

Additionally, social media encourages bullying. Cyberbullying is a constant and ever-present threat in society. Social media platforms provide avenues for people to spread hurtful rumours, abuse or lie about others anonymously or use their real names. Most people who use social media, especially teens, experience bullying from their peers or are subjected to offensive comments. Victims of cyberbullying remains with lasting emotional scars, and some end up harming themselves physically or committing suicide.

Furthermore, social media creates unrealistic expectations, promotes self-absorption and creates confusion between reality with online. Social media platforms form unrealistic expectations of friends and life in individuals minds nurturing a severe lack of authenticity and encouraging lying. For instance, people use social media platforms to showcase exciting adventures, their love for friends and significant other and different successfully aspects of their lives. Although this can be a façade, people always use them as a yardstick to what life should be, creating unrealistic expectations in their personal lives. Similarly, social media platforms provide an avenue to make friends; most people confuse this with actual communication, in-person interactions, and socialising. Most friends on social media networks are not friends and can even be strangers. Additionally, sharing endless information about personal life and innermost thoughts on social media creates unhealthy self-absorption and can affect people’s ability to develop real-life connections.

Besides, social media creates addiction. Social media like cigarettes and alcohol can be addictive. Social media has a powerful draw that keeps people checking all the time without thinking. It is difficult for people with social media accounts to go an entire day without checking updates, commenting or posting. For instance, when individuals post a picture or update on social media platforms, they keep on motoring the likes and comments and replying. These activities can take an entire day without an individual realising. Also, it can build the need and desire to do so the following day. Derick documents that young teenagers often feel addicted to social media sites and are unable to stop themselves. He also documents his personal experience, “sometimes the content is unfavourable, and I regret how I spend my time…only to open the applications again, several minutes later (Thompson, 2021)” This shows some level of addiction.

In conclusion, although social media has beneficial qualities, its dark sides negatively impact the lives of individuals in society, especially teenagers. It affects people’s self-worth, causes cyberbullying, negatively affects people’s mental health, and wastes time due to its addictive nature. Like Derek Thompson proposes in his article “Social Media is Attention Alcohol”, social media should be subjected to guidelines like alcohol consumption to limit its impacts on individuals, especially teens.

Bibliography

Thompson, D. (2021, September 17). Social media is attention alcohol. The Atlantic. Retrieved November 11, 2021, from https://www.theatlantic.com/ideas/archive/2021/09/social-media-attention-alcohol-booze-instagram-twitter/620101/.

Posted in Uncategorized

Cyberloafers and Cyber sleuths

Cyberloafers and Cyber sleuths

Title of Essay: Cyberloafers and Cyber sleuths

Student’s Name:

Grade Course

Tutor’s Name

Date of submission:

Introduction

Advances in technology have given rise to a more sophisticated ways of social interaction. Man can now interact with the real world via computer-stimulated systems. This has encouraged social interaction which in turn improves the welfare of the concerned parties. However, the use of company facilities to pursue personal ambitions has raised eye brows between the employees and the employers.

To begin with, the functionalists argue that a society is comprised of different and interdependent structures including economy, education, religion as well as the family. These institutions are related and interdependent and functions together to enhance the stability and social order. It is therefore important that employers understand the significance of such relations and allow their workers to coordinate with their environments on pertinent issues in the society (Layder, 1981).

Besides, it is important to appreciate the differences and conflicts that emerge in a society. According to Karl max in his conflict theory, embraces the tensions and conflicts in the society and argue that such conflicts are necessary in fostering social stability and cohesion. The employers have a right to control what their employees are doing with the company computers during work time. On the other hand, the employees are social beings and have to interact with their colleagues in the society. Cyber slacking should not be encouraged in the workplace as employees are supposed to perform their office duties during such times. In cases where the activity of cyber slacking is rampant, the employers may be forced to initiate cyber sleuthing so as to enhance accountability in the workplace (Lichgate, & Zuckerman, 1997).

Interaction theory on the other hand emphasizes on the creation of social structures through interactions among the people in the society. According to the theory, the people themselves define what a social reality as well as what other people are doing. In a workplace for instance, the employers and the employees’ choice of behavior should be determined by existing situation. The interaction between the two parties should bring forth a standardized code of behavior in the company. Employees should understand that the company computers are only used to perform company duties during work time and not other social duties. However, such computers may be used to perform personal duties when situation demand. For example, an employee may want to attend to argent matters of his family such as sickness of a family member. In such situation, the employer should understand and allow the employee to use the company asset. In cases where employees are engaged in rampant cyber slacking, the employer has a right to initiate cyber sleuthing to ensure worker responsibility as well as accountability (Layder, 1981).

Generally, positive interaction between the employer and the employees in a workplace creates an atmosphere enjoyed by all the parties in the environment. Employees are entitled to respecting the company rules and regulations so as to execute their duties responsibly. They are supposed to carry out company duties during work time and perform personal work outside work time. They should not be engaged in cyber slacking or cyber loafing in an attempt to pursue their personal duties using the company computers during work time. However, employers should embrace some tolerance in situations of agency as mentioned earlier. Employers on the other hand are bestowed with the authority to ensure that the company regulations are adhered to. In cases where the employees are involved in rampant cyber slacking, the employers are left with no other alternative except to initiate cyber sleuthing so as to ensure responsibility and accountability in the workplace (Layder, 1981. However, cyber sleuthing may create conflict in the workplace as many employees would feel that their privacy has been invaded. In such cases, the company should adopt other methods of controlling cyber slacking including assigning workers duties that would be completed within the stipulated office hours.

Conclusion

All the stakeholders in the society should embrace the changes in the technologies as well as appreciate the importance of social interactions as a means of enhancing social stability. Companies should adopt strategies that do not create conflict between the workers and the employers as they pursue their duties and responsibilities in the workplace. Very strict rules in the company should also be avoided including cyber sleuthing which is considered invasionary to the privacy of the workers. More importantly, all the stakeholders should be encouraged to understand and respect the corporate culture and do what is right at the right time and place.

Referencing List:

Lichbach, M. & Zuckerman, A. (1997). Comparative politics: rationality, culture, and structure.

Cambridge University Press.

 Layder, D. (1981). STRUCTURE, INTERACTION AND SOCIAL THEORY. Routledge.

Posted in Uncategorized

Needs And Important Of Shareholders

Needs And Important Of Shareholders

Needs And Important Of Shareholders

Introduction

Stakeholders are directly or indirectly involved with the organization and they include suppliers, customers, employees, financiers, communities and so on. The stakeholders’ theory is a concept that has gained popularity as a contributor to business ethics. The theory can be applied in the management of organizations, and business ethics which focuses on the morals and values in management of organizations (Phillips,2003). The concern for stakeholders has become a highly recognized and defining feature the ethical management of organizations. The theory requires that managers strike a balance when it comes to all the interests of the stakeholders rather than advancing the interest of shareholders only .I concur with this argument and this outline will highlight the areas to be covered on the issue.

Importance of stakeholders

The section will highlight the importance of each of the stakeholders associated with the organization .It will also look at the roles and contributions of the stakeholders to the organization (Friedman, Andrew, &Samantha 2006). With this knowledge t is easy to get the relevance and importance of striking the balance of their interest.

What stakeholders want

It is of great importance to find out exactly what the stakeholders want from the organization. This section will look at the association that exists between the organization and stakeholders’ .It will clearly give an indication of exactly what the stakeholders want to achieve from their association with the organization. The managers will be able to strike a balance of the interests of the stakeholders knowing exactly what each of them wants.

Balancing the interests of all stakeholders

This section highlight on exactly how managers are supposed to strike a balance between all the stakeholders interest. It will give an indication of actions the managers should take in order to achieve this (Phillips, 2003).

Importance of striking a balance in stakeholders interests

This section will highlight on the benefits an organization and stakeholders will get if there is a balance between the interests of all the organizations stakeholders.

Position of shareholders

This section will look at the views of those for the idea that the interests of shareholders being advanced exclusively (Hollington, 2006). It will look at various reasons why the shareholders should be the people to be exclusively considered in an organization.

Conclusion

The conclusion will contain overall remarks on why the managers of organizations should ensure that they strike a balance in the interest of shareholders instead of advancing the interests of the shareholders only. It will explain how the stakeholders’ theory can be put into application in organizations.

References

Friedman, Andrew L., and Samantha Miles. Stakeholders: theory and practice. Oxford: Oxford University Press, 2006.

Hollington, Robin. Shareholders’ rights. 5th ed. London: Sweet & Maxwell, 2007.

Phillips, Robert. Stakeholder theory and organizational ethics. San Francisco: Berrett-Koehler, 2003.

Zakhem, Abe J., Daniel E. Palmer, and Mary Lyn Stoll. Stakeholder theory: essential readings in ethical leadership and management. Amherst, N.Y.: Prometheus Books, 2008.

Posted in Uncategorized

Cybercrimes In Terms Of How The Problem Started, And Its Current Position

Cybercrimes In Terms Of How The Problem Started, And Its Current Position

How Cybercrime started and its present status

INTRODUCTION

In the present day context, computer technologies and internet have become essential elements in the day-to-day life of individuals. There has been a significant increase in the number of individuals accessing ‘World Wide Web’ every hour and in every minute. People access the internet and use computers both for legitimate purposes and for illegal motives. The advancement in the field of internet has developed a virtual environment where activities can be executed through networked computers. Currently, criminal activities have increased to a significant extent due to easy and restriction free availability of information from the internet as well as free communication services offered by online service providers both locally and internationally. Illegitimate uses of these services through the internet, as a source of adequate information and economically beneficial way of communication, have become a prime cause of criminal activities over the internet, commonly referred as ‘cybercrime’. This paper addresses Cybercrimes In Terms Of How The Problem Started, And Its Current Position. The paper also looks at various harms that such crimes have to internet uses, the motivating factors, and the possible solutions to this increasing problem.

General Problem of Crime and Internet

The origin of cyber crime can be attributed to the technological advancements of the late 1980s and the 1990s. During the mid and the late 1990s, a lot of innovations were being evident among the developed nations. Wall (pg.1) claims that the availability of various opportunities in innovation were the main initiating aspects of cybercrimes. The United States has had some programs that encourage celebration of genius youths (Wall, pg.4). Such youths could be a major threat to internet use and computer safety. Many individuals and organizations were viewing the technological change from the basis of being a great opportunity for technological and economic growth thereby having nothing to worry about the many growing evils brought in by the computer technology. Such advancements gave birth to computer crime as people looked for better chances to benefit both rightly and through evil actions such as cybercrimes. In contrary to what everyone thought to be a smooth achievement, problems emerged with many companies and individuals losing money to cybercriminals. The deterioration of ethical values was also a major result of cybercrime. Problems like cyber pornography have been a growing issue over the past few years even though many countries prohibit the sale or use of such materials through laws and regulations (Wall, pg.6).

Cybercrime poses problems to both computers user and network user by making the use of internet unsafe in various capacities. According to Wall (pg.8), there are many confusions in terms of who cybercrime victims are and the way they are often victimized. Some case could depict the victims as individuals but most effects are felt in terms of corporate entities. In a typical case, certain computers could be used in committing cybercrimes or the same computers could be targeted. Cybercrimes involve offenses committed against certain individuals or even several groups of individuals. Such offenses are mainly done with criminal motives such as internationally harming the victims reputation, cause physical or mental damage to the cybercrime victim, or benefit financially using the wrong tactics.

Most individuals initiating cybercrime do it with a key aim of benefiting from the criminal actions, which could be direct or indirect. Cybercriminals could be highly skilled to do their job or they could only have adequate experience to execute such crimes but mainly they have high skills, which enable them handle complecated tasks in a smart way (Burns and Price, pg.70). Most, modern telecommunication networks are used, which increases the possibility that those affected have hardly any knowledge links to the cybercrime initiators. Internet tools and techniques used include chat rooms, groups, emails, and notice boards. Other than being a major problem to individuals or small groups, cybercrime has the potential of threatening national security as well as a country’s financial health after the problem has grown to the national level (Burns and Price, pg.72). This aspect has made cybercrime be considered as a high profile issue.

The most appalling cybercrimes are those that revolve around aspects like cracking, copyright, child pornography, child grooming, and infringement. Aspects like pornography are illegal in many countries especially when entailing children. Cybercrime take these legal barriers as an advantage to harm the victims or benefit financially from them. Other than this problem, privacy has become an issue making confidential information face risks of being intercepted or lost. Most of cybercriminals are young, a factor that could being interpreted by the much time that the young population has due to lack of commitments in jobs or in family obligations.

Different Types of Cybercrimes and their respective Problems

Cybercrime involve a number of computer and internet activities that are typically illegal and harmful to many computer users. According to Young Literature (Pg.10), there are four categories of cyber-trespassing. The fore trespassers include utopians, cyberpunks, cyber-spies, and cyber-terrorists. The utopians are cyber trespassers who believe that whatever they are doing is for the societal benefits given that their actions demonstrate the vulnerability of the society. In this case, it would be difficult to stop their cybercriminal activities since they believe that their actions are hardly harmful. Cyberpunks on the other hand are very aggressively anti-establishment. Their actions are intentional and they are directed to causing harm within an international scope but their main target the people who have offended them at some point (Carr, pg.84). Their actions are therefore intentional and specific. Cyber-spies work by obtaining private information without seeking any permission from the users. Lastly, cyber-terrorists are programmers who break into other people’s computers with a motive of stealing or destroying personal information. Their actions are motivated by terrorism intentions according to Wall (pg.5)

Hacking is another major computer crime that is organized in a systematic way. Hackers first target an organization; identify the key interest, and find more about it using search engines. They also identify such targets’ vulnerability using the internet. They then use basic software tools to break into, destroy, or acquire organizational or individual data depending on their motives (William, Boni and Gerald, pg.110).

Cybercriminals using computer devices or networks to make advancements on the other ends include fraud, cyberstalking, information warfare, and phishing scams. Crimes such as spam involve unauthorized emails sent for commercial purposes. This cybercrime is greatly handled by the law. Other cybercrimes such as fraud involve misrepresentation of information. This could lead to wrong processes or information loss. Fraud as a cybercrime also involves the alteration of information in a way that is hardly authorized. Cybercriminals in this case only require some technical expertise. It is common among employees who could enter force data or enter unauthorized instructions. People could as well use unauthorized processes to execute their criminal plans.

Challenges Posed by Cybercriminal to Criminal Justice Systems

Criminal justice systems could only be in a position of helping within the cybercrimes by seeking help from internet users. Internet users should be in the capacity to identify and formulate a report on cases of cybercriminal activities committed against them. The main challenge in this case is that the internet is too wide and endless to point out who exactly committed a given cybercrime. The justice system thus lack the necessary ground of passing judgments on suspected cybercriminals.

In the case of common forms of cybercrime such as offensive content, it may be difficult to point out who exactly committed the crime. Websites and the information contained in websites are controlled such that no obscene content would reach the users. Such obscene content could be created and spread for various reason, most of which are illegal but encryption could be employed to disguise the identity of the cybercriminals. The aspect of the information being illegal varies significantly across different countries and within nations, resulting to another challenge that the justice systems face in passing judgments on cybercrimes.

Again, people have strong but varying beliefs concerning obscene information created on various websites. This aspect makes the intention of the cybercriminals in this category achieve their intended goals and objectives. A major case in this cybercrime is internet pornography which has gone to the extent of child pornography but most of the contents are unknown as to who posts them. Such contents also have warning information on who should or should not view the content. It could be difficult to pass judgment on what seems to be crime in this case especially given that such websites clarify the minimum age as a condition of viewing the web content. People are also warned about the use of unknown websites. Online transaction are also initiated with stun warnings that users need to be careful especially where personal information is required. This could be the best way of preventing cybercrime even without straining the justice systems (Wall, pg.179).

Real World Problems and the Solutions for both Technical and non-technical Professionals

In order for individuals or agencies to protect their personal information or critical information belonging to their companies, such individuals or agencies should be able to recognize any possible cybercrime treats to their businesses in terms of assets, data, and information. It is possible that cybercrime threats could come from a multi-directional perspective, both from within the organization, business or government agency, or from the outside respectively (William, Boni and Gerald, pg.92). In any business organization or government agency, it is good to initiate basic training on aspects related to the way people could identify and recognize threat agents in terms of their motives, opportunities, and rationalization for their illegal actions (William, Boni and Gerald, pg.92).

Internet’s role in information warfare

A number of ways to protect and avoid any attacks from cybercriminals or internet attackers exist. Some organizations or individuals within government agencies however facilitate such attacks due to their actions and motives to benefit from such illegal activities (Carr, pg.67). Some companies and agencies in the United States such as the United States Department of Defense systems aid such cybercrime activities and promote their vulnerability to cyber attacks. The United States Department of Defense systems for instance fail to update their I-way system updates or could simply fail refuse to update thereby ending up to lose millions of dollars. Such losses are as a result of negligence especially by the people in charge o making such updates. This problem is faced by many other organizations in which there could be internal participants promoting such attacks.

Actual Internet Crime cases

Actual cases of internet crimes exist. A good case is Bank Fraud, where a website was set-up for cybercrime motives to obtain funds from ignorant web users. The case involved the reporting of the website as an online transaction business for the Bank Bumiputra Malaysia. This false website asked depositors to give their account numbers and other information to be eligible for a Lucky drawing according to South China Morning Post (8/17/98). Another case is that of Credit Union Fraud where hackers charged more than $1 million to the debit cards of credit union members by using a computer to guess the account members of the members according to the Washington Post (8/15/98).

Fighting Cybercrimes

Complexity of the Emerging Cyber threat

The cases of cybercrimes are today countless. As the frequency of using the internet increases, cybercriminals get even more and better opportunities to exercise their motives. While such cases increase, there are many ways of reducing or eliminating cybercrimes. As technology advances, complexities in the use of internet and the emerging threats increase. Nations find it difficult to deal with cybercrimes due to the lack of the necessary cyber power to handle such criminal situations (Nye and Scocroft, pg.66). The problem of cybercrime has generate a great cognitive cyber stress to the entire world. The world can only deal with such problems by dealing with the cybercrime problems legally, legitimately, and in very organized way (Nye and Scocroft, pg.66).

Crafting effective domestic and international cyber policy

Policy implementation could be a very effective way of combating cybercrime problems. One of the main actions to combat cybercrimes is make some follow-ups and track source computers for evidence as part of the key policies within organizations and government agencies. In this case, keeping track on possible threat should include even people working within security agencies. According to William, Boni and Gerald (pg.92), people from within a given business or a governemnt agency among other organizations could be characterized by gread, financial pressures, jealousy, and other traits that could push them to initiate cybercrimes aginst such organizations. The best way out is to handle such people by keeping a close eye on them and deal with them according to the law (William, Boni and Gerald, pg.92).

From a law perspective, internet service providers in many countries are required to keep meaningful log-files within a given period of time. This is usually a requirement by law. Countries without such laws could implement the same to avoid the cultivation of cybercriminals (Parker, pg.47). Again, justice systems should create tough penalties on cybercrimes or increase such penalties if such penalties already exist. Such penalties could cover crimes such as the unauthorized use of computers, creation of obscene contents, hacking of websites, sending encrypted emails, posting threats, and sending harassment contents to people among other internet crimes like changing people’s passwords (Parker, pg.234). The main failure in these combating efforts includes the case of various companies and agencies that hardly keep update the I-way system updates. A major instance in this case is the US Department of Defense, which through negligence, millions of dollars are lost through cybercrime (William, Boni and Kovacich, pg.119). In general, the injuries caused by cybercrime should be compensated through the charges or penalties (William, Boni and Kovacich, pg.53).

Conclusion

Cybercrimes may seem meaningless to many people especially to those who have never faced the resulting effects. The problem is not only an individual issue or a national problem but it is also a global concern. It may come out that most of the cybercriminals are based in those countries where the local laws are hardly strict on such crimes. While education, technical, and internet skills are critical to every country’s economy, there should be some limits on the way people could technologically use their skills. The use of technology to harm other people should be curtailed as much as possible. The use of internet should be only based on good motives to all parties (Parker, pg.32). Again, given that efforts to combat cybercrimes would turn out to be successful, people have to assist their governments and the responsible authorities. The basic idea in this case is that a problem that is facing another person could possibly face any other individual irrespective of their locations. Again, people should be very conservative when using the internet, especially during online transactions or whenever personal or confidential details are required. A combined effort would be the best way forward to combating cybercrimes.

Works Cited

Burns, Nicholas and ‎Jonathon Price. Securing Cyberspace: A New Domain for National Security. Aspen Institute, 2012 . Print.

Carr , Jeffrey. Inside ‘cyber ‘warfare. 2011. Print.

Nye, Joseph S. and Brent Scowcroft. Securing Cyberspace, edited by Nicholas Burns & Jonathon Price. 2012. Print.

Parker, Donn B. Fighting Computer Crime. 1998. Print.

Wall, David S. Crime and the Internet . London: Routledge , 2001 . Print.

William, C., Dr. Boni and Gerald L. Kovacich. I-Way Robbery: Crime in the Internet . 1999 . Print.

William, C., Dr. Boni and Gerald L. Kovacich. Netspionage The global threat to information. 2000. Print.

Posted in Uncategorized

NEEDLESTICK INJURY PREVENTION AND SAFETY (1)

NEEDLESTICK INJURY PREVENTION AND SAFETY (1)

NEEDLESTICK INJURY PREVENTION AND SAFETY

NAME

PPROFESSOR

INSTITUION

COURSE

DATE

Health care workers face a major exposure to a wide variety of hazards in the working environment especially in the medical equipment. Injuries from contaminated needle exposes workers to blood borne pathogens which may lead to serious infections. Most needle stick injuries mostly occur in healthcare settings such as hospitals, ambulatory settings, physician’s offices, nursing homes and home health settings.

Risks associated with infections from contaminated needle sticks or sharp objects in the medical field is majorly dependent on the pathogens involved, the severity of the injury and the ability to use appropriate treatment for the infection. Health care organizations should initiate needle stick prevention programs aimed at improving their compliance with the current blood borne infection standards. These standards by OSHA (Occupational Safety and Health Administration) were established in 1991. The standards require organizations to utilize safety-made sharps and needless systems in their medical practitioners.

Needle stick and sharp injuries can be prevented by use of certain methods. The nursing fraternity should ensure elimination of the use of needles when safe and make proper use of effective alternatives to help reduce such infections and injuries. Strategies should also be outlined to make use of devices with safety features. Such devices should be well evaluated to determined the most effective and efficient ones thus considering their acceptability for use. Analysis of needllestick and sharp related injuries should be always carried out in the specific nursing fields to point the current hazards and injuries.

Major priorities and strategies should be set out to improve prevention through close examination and evaluation of both local and national information and data about the possible risk factors for needle stick injuries. This will help formulate successful viable efforts and measures for intervention. Health care workers should be well trained on how to safely use and dispose needles and sharp objects in their work environment. Modifications should be made in the work practices that seem to pose needle stick injuries so as to make them safer.

The nursing fraternity should establish procedures to encourage immediate reporting and timely close follow-up of all needle stick injuries and other sharp-related injuries. Evaluations should be made in concern with the effectiveness of preventions methods and efforts. This will pave a viable way on how monitor feedback on performance of medical workers. In case of any hazards from needles in the work environment, health care workers should make reports. They should also make an active participation in blood borne pathogen trainings to enlighten people on the recommended injury prevention practices.

The management of health care facilities should ensure that they make a thorough review of their exposure control plans each year. This will reflect changes and new trends in the modern technology thus giving an upper hand to reduce exposure to blood borne pathoges.They should also inculcate a behavior of involving the non-managerial personnel in evaluation and safe selection of safety engineered devices for use. The employers of health care workers should maintain a sharp injury log in their record systems. This will ensure the privacy of employees and contain information about the type of brand device involved in the occurrence of the incident, the location of the incident and a description of the incident.

The management should also implement universal precautions and ensure provision of personal protective equipment such as gloves and face shields. Implementation of work practice controls should be ensured such as no needle recapping, disposing of sharps anyhow after use.

Needle stick prevention also requires proper disposal of needles and other sharp devices. Health care workers should ensure that they always place sharps disposal containers where sharps are mostly used. Replacement of sharp disposal containers should be done promptly when full to avoid overfilling. The selected disposable containers should be closable, resistant to punctures and leak proof. Clear labeling of the disposable containers should also be ensured and also use of lockable containers for areas under threat of security issues.

Most needle stick injuries can be prevented with the proper use of safety devices with conjunction with enhanced worker education and training and work practice controls. The nursing team should be proactive in ensuring prevention of needle stick injuries in their working environment. In relation to use of safety devices, permission to use needles should only be granted to the practitioners only at all times. The safety devices should be simple and easy to use to avoid complications. They should be made in a way that they can be effectively used by both right and left handed workers. The safety features in the devices should be activated when in use. The devices a should be safe and effective for patient care.

Personal protection and prevention is also very important in case of a needle stick infection. One should seek immediate medical help to assess the risk of developing a further infection. One should also ensure that he or she gets a hepatitis B vaccination and report to a medical officer in case of any nededlestick and any other injuries.

REFERENCES

Wilburn, S.Q & Eijkemans, G. (2004) Preventing Needle stick injuries among Healthcare Workers: A WHO-ICN Collaboration.Int J Occup Environ Health.

Tatelbaum, M.F. (2001) Health Law Review: Needle stick Safety and Prevention Act. Pain Physician.

Posted in Uncategorized