Tuesday, December 24, 2019

Terrorism The United States - 1154 Words

The United States promotes international freedom, and discourages any organization who is attempting to disrupt freedom. In recent years, terrorism has become one of the United States greatest dilemmas. Terrorism is a horrific crime against society, and the people who carry out these acts are considered people some of the worst criminals of today. Following September 11 the United States made a decision to wage war of terror. The United States â€Å"War on Terror† attempts confront these people and their organizations and remove them from power, bring peace to their home nation and hopefully establish international peace. (5) The war on terror is not only fought with guns and soldiers, but in the interrogation room as leaders attempted to learn more about the interworking of these dangerous groups. The men who are captured are dangerous and sometimes well connected leaders with lots of information. The question which logically arises after these men are detained, exactly wha t is the proper interrogation technique and exactly how far can we go to extract information. Clearly, any information these men have could save the lives of innocent people. Due to their knowledge terrorist cannot be imprisoned without making an attempt to learn what they know. This is where the War on Terror has created a huge moral dilemma, these men are dangerous and sometimes ruthless, but when they are in our hands what exactly is acceptable to save lives. Interrogation can quickly turn to torture asShow MoreRelatedThe United States And Terrorism1609 Words   |  7 Pagesthat not only does the United States have a history of torturing terrorism suspects by methods including waterboarding, sleep deprivation, solitary confinement, and threats to the self or the family, but also that the use of such torture is illegal according to United States and international law. I will also argue that the United States is guilty of the illegal extraordinary rendition of terrorist suspects. Further, I will argue that current standards for investigating terrorism suspects jeopardizesRead MoreTerrorism : The United States1530 Words   |  7 PagesTerrorism is something that has affected the lives of the American population in the United States at least once in their lifetimes. It is something that Americans have read about in history books and have seen on national television. The United States defines terrorism under Title 22 of the U.S. Code (USC) Section 2656f (d) as a, â€Å"premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audienceRead MoreTerrorism And The United States1981 Words   |  8 PagesIntroduction Today when we think of terrorism and terrorist as being something grown out of radical and fundamentalist Islamic Societies in the middle east. However, terrorism does not have to come from abroad. Terrorism can be homegrown in America and for the past 40 years that is what has been happening in cities all across the United States. Gang related terrorism is extremely high in inner cities all across the country and the Crips are the largest gang that operates in America. In 1970’s CaliforniaRead MoreThe United States Intervention With Terrorism1081 Words   |  5 PagesTerrorism, in a modern day perspective, has been molded as a Middle Eastern threat to Western Civilization; although the whole idea of terrorism itself has existed for ages. Undoubtedly, â€Å"The War on Terror,† is a western form of saying to depict the general aspect of terrorism. Through all aspects of the world, terrorism, is defined as an act of unruly and warlike tactics that mainly creates harm to civilians. Usually, these acts of violence are not simply for the use of harming citizens, but toRead MoreThe Effects Of Terrorism On The United States897 Words   |  4 Pagespeople see security and safety is changing around the world due to increase numbers of terrorism. Countries around the world are becoming more in favor of securing their border and bring in less and less immigrants. This sentiment has been gradually increasing over the years. However, one country government openly welcomed Syrian refugees and that nation is Germany. S. Akbarzadeh, and D. Conduit, (2016) state that more than 4.8 million refugees are living outside Syria, and many more are displacedRead MoreTerrorism And Its Effects On The United States1301 Words   |  6 Pageschanged on this day. It’s now remembered forever by the title of 9/11. Terrorism has been involved in the U.S. for many years. This is one, sad example of the act. There are many parts to the dreadful, sad story, including terror ism in general, the planning behind the event, who was involved, the day of, and the aftermath. Terrorism has become a big problem in the U.S. Even today it’s something that American’s can not control. Terrorism is defined as the act of people aiming to hurt a particular governmentRead MoreThe Impact Of Terrorism On The United States932 Words   |  4 PagesThese include studies by Morland, Butler and Leskin into the effects of terrorism in the United States; Vazquez, Perez-Sales and Hervas covering the social and individual effects of terrorism in Madrid; Frazier and Berman covering post-traumatic growth in female sexual assault victims; and Joseph, Williams and Yule on psychosocial perspectives on PTSD and treatment (TRG pg 19). These studies show the importance of reprogramming PTSD clients towards normalizing and coping methods and re-integrationRead MoreTerrorism and the United States Essay1250 Words   |  5 PagesTerrorism and the United States A cloud of anthrax spores loomin g in the sky of San Diego California designed to inflict a horrible death within ninety-six hours on anyone who breaths it. At first, thousands of victims think they have mild influenza or a cold that recedes after a day or two. However, when their symptoms return, and their lungs starts filling-up with fluid the victim realize that anotherRead MoreTerrorism And Its Effects On The United States1776 Words   |  8 PagesPreventing Terrorism in the United States is a hard thing to overcome, but the government is trying their best to control and prevent terrorist attacks from happening. â€Å"The terrorist attacks on September 11, 2001, were a turning point in American history and demonstrated that the government must have the authority necessary to defend against future attacks, including the right to use the best technology to intercept potentially conspiratorial communications (Jacobs and Newton 1). Having advancedRead MoreTerrorism And Its Effects On The United States2408 Words   |  10 PagesTerrorism has continuously played a brutal role in frightening societies across the world. There are many nations that have faced horrible issues and continue to try to find a solution but to no avail, because terrorism still exists around the world. There are many questions that have still gone unanswered and many governments are finding some relief â€Å"with considerable assistance from anti-terrorism organizations (Fischer, 2002).† Terrorist can strike not just large cities, but communities of any

Monday, December 16, 2019

Ford Motor Co. Case Report Free Essays

string(145) " communication at every level, lack of interaction between product development and purchasing, and resistance to change within the organization\." r [Type the company name]| Ford Motor Company: Supply Chain Strategy | [Type the document subtitle]| NICOLE | Table of Contents Page 3. Executive Summary Page 4. Identification Issues Page 5. We will write a custom essay sample on Ford Motor Co. Case Report or any similar topic only for you Order Now Identification Issues, Environmental and Root Cause Analysis Page 6. Alternatives Page 7. Recommendation, Implementation, Control Page 8. Conclusions, References Executive Summary This case report addresses the challenges to implement virtual integration in Ford Motor Company, one of the largest automobile manufacturing companies in the world. It focuses on the viability of implementing a supply chain strategy following Dell’s â€Å"Direct Business model† Dell’s direct business model used information and technology to revolutionize the PC industry; it focused on developing effective supplier partnerships and JIT manufacturing becoming a highly horizontal or â€Å"virtual integrated† company. Dell skipped the intermediate retailers, selling to customers directly eliminating the reseller’s markup and the cost and risk associated with carrying large inventories. All this combined gave Dell a leading position in a very competitive market in only a 13 year period time. In 1970’s Ford’s main competition was with General Motors and Chrysler. However with the entry of Japanese companies like Honda, Toyota and Nissan the American firm faced a harder competition. In order to maintain its leading position, in 1995 Ford initiated the Ford 2000 plan; aimed to restructure many of their key processes like Order to Delivery (OTD) and Ford Production System (FPS). They wanted to reduce the OTD from 60 or more to 15 or less days. FPS was created to convert the supply chain from a push type to a pull type basing their forecast, production and inventory decisions on real market demands. The decision to radically redesign Ford’s supply chain infrastructure may significantly affect in a positive way the growth and competitiveness of Ford Motor Company in a short, mid and long term period. I strongly support the implementation of virtual integration and a pulled based system in Ford’s supply chain. It has been proven by Dell’s KPI’s that producing based on actual customer requirements using information technologies for the efficient information flow from the consumers all the way down to suppliers will directly improve the supply chain by reducing inventory levels and the related cost, reducing lead times, making your suppliers, the production systems and the overall SC more responsive and efficient. This new strategy will include the creation of an IT platform which its objective is to support an online operation, it will establish procedures to enable customization and ordering by customers via advanced EDI, this platform will be integrated to the physical dealerships as well so they can transmit in real time customer’s requirements. All customer orders would be taken either via Ford’s web site or by phone and then produce. A pull system would be implemented completely. This Platform will also virtually integrated Ford’s supply chain where Ford and all its suppliers would share information by an intranet and Internet to coordinate in real time the flow of materials and production. Issues Identification Industries Differences One major issue is the differences between the auto business and the computer business were compared to Dell’s; Ford’s supplier network had many more layers and many more companies making Ford’s supply chain more complex than Dell’s. Change Management (short term issue) For the reasons above some Ford’s SC staff thought that the Dell’s direct business model will not deliver the same results for Ford. Ford’s staff never faced with the challenge of modifying work flow processes and standard operating procedures, this can result in employees being uncomfortable, dissatisfied and challenged by this new system, therefore they may fall back to their original habits. The adaptation of this new initiative at staff level will be a major challenge for Ford. Purchasing (short term issue, potentially long term issue) Different from Dell’s were purchasing activities reported to product development, Ford’s purchasing division is separate from product development, this is another source of disconnect in the supply chain. The efficient roll-out of new products may be impacted negatively due to lack of communication between these two key departments. Also suppliers were picked based on cost, and little regard was given to the overall supply chain cost. At this level of the supply chain restructuring may be difficult due to corporate history and politics. Information Technologies (short term issue, potentially long term issue) An important issue is the lack of technological knowledge and application throughout Ford’s supply chain, were first tier suppliers well developed IT capabilities interacting with Ford via EDI, but they were not able to invest in new technologies at the same rate as Ford did. The understanding of modernity technology rapidly decreased in the lower tiers of the supply chain. This situation was different to Dell’s supply chain, were by using new technologies Dell shared information in a real time fashion with its suppliers, helping them know Dell’s daily production requirements making the supplier more responsive to Dell’s needs. Also Dell only kept suppliers that maintained their leadership in technology and quality making the overall supply chain more competitive. Lead Times/Production Process (short term issue, potentially long term issue) The production at Ford is based on a predetermined schedule making its production system push based, creating high inventory levels with low turnover, in addition to this; bottlenecks were an issue in the material planning and vehicle production processes. So far this production system created a lead time of 65 days from the time a customer placed an order until the product was delivered, making the overall supply chain inefficient. Environmental and Root Cause Analysis Ford, as any other corporation is looking to achieve the ultimate goal; increase profit margins. The OTD and FPS initiatives established an aggressive goal to reduce lead times from over forty five days to fifteen days. To do this, it is necessary to improve the flow of information throughout the supplier network and reduce manufacturing time. The challenges faced include the unavailability of accurate demand information, poor supplier communication at every level, lack of interaction between product development and purchasing, and resistance to change within the organization. You read "Ford Motor Co. Case Report" in category "Papers" Ford’s current OTD time requires production to guess the real demands. Consumer demand is therefore met through a push rather than a pull manufacturing process. To move to a pull system and to improve demand forecasting, Ford must implement a process that will provide earlier demand notification to the supplier network. They must also be able to immediately link the actual orders to the manufacturing schedule at any of their almost two hundred manufacturing locations. Purchasing must also play an integral role in this process to insure the correct suppliers are receiving the information. Another important step for Ford is to coordinate thousands dealerships to transmit data sales efficiently, Dell’s business model involves direct manufacturer contact with the consumer, this greatly reduces order time by removing middle-man interference and inventory requirements. But for the automobile industry without the distribution channels will be impossible for a potential customer to decide to buy a car without testing it, seeing it and feeling it. For this reason the auto industry lacks this ability. Considering all the issues above and their associated challenges, would be fair to say that Ford’s multi-layered supply chain is in great need of a technological solution to its information sharing and communication needs. Alternatives 1. Keep Ford’s existing supply chain and initiatives of improvement without investing in a new IT platform: The existing initiatives such as FPS and OTD and their overall objectives and their supply management goals are a step in the right direction for providing the necessary data sharing with suppliers and therefore achieve the goals of Ford’s initiatives. Ford will have to rely on the actual technology (EDI) such as phone or email in some cases depending if it is a tier 1 suppliers can depend in a more sophisticated tools such as the FRN or the extranet created to connect ford with its suppliers in the B2B initiative. The advantage of this is that there will not be major changes and additional cost involved besides the ones related to the overall SC efficiency, the disadvantages of this is that it has been proven that any enterprise which is not up to date with the newest information technologies will not stay competitive and in a leadership position within mid and long terms, facing the chance of getting behind in a such competitive market. 2. Support Ford’s FPS and OTD initiatives by creating a specialized IT frame that will help to achieve the virtual integration in Ford’s SC. The initiatives above must now incorporate an advanced IT solution to be linked to the outside groups, tier-2 suppliers and upstream to the distribution network. The IT system will focus on developing the open sharing of real time demand information between the distribution network and the supplier pool. Further development of long-term supply contracts with key vendors and a continued focus on the sub-systems supply format will improve confidence while simplifying and speeding the entire process. Building linkages from the dealerships (Also is necessary to invest in the E-business infrastructure) all the way down to the lowest tiers, so the right people get the necessary data in the fashion and time that is needed to improve the SC. The disadvantage of this will be in the short term and probably midterm period, due to all the effort and extraordinary monetary investment that an initiative like this requires. If the system is poorly chosen, the entire initiative will fail. Technology costs, if not monitored and controlled, can escalate uncontrollably. Also while the platform is operational there may be unexpected issues which the staff and suppliers will not be able to solve causing inefficiencies in the supply chain, affecting Ford’s and its suppliers revenue directly. The advantage is that with an infrastructure like this Ford will virtually have automated its supply chain translating in achieving Ford’s initiatives and therefore their ultimate goal â€Å"Be more profitable and a leader automobile manufacturing company† Recommendation I strongly support the implementation of alternative number 2. Dell’s direct business model will be the guideline to follow when applying this model in Ford’s organization. Although there are several major differences between the companies, Dell’s direct business approach can be applied to every facet of Ford’s operation. The decision to support virtual integration will help redefine Ford as a competitive, cost effective and profitable company. Instead of remaining static, Ford must pursue continually evolve along with the new technologies trends, failure to incorporate the latest information technologies will result in continued inefficiencies and eventually Ford will be displaced from the automobile manufacturing leading positions. Implementation Stage 1 Accurate and timely information should be the primary focus of the IT implementation. For this stage, the existing FPS initiative should be combined more extensively with the existing intranet and extranet. Ford should leverage the B2B capabilities to incorporate upstream ordering information from the distribution network. To minimize risk, stage 1 should be applied on a specific product line and only with key suppliers (pilot projects). Initially, the information sharing may be a simple as providing real time demand to suppliers on a secured web site. Stage 2 Once this first stage has achieved quantitative results the IT objective will be to automate the order-to-scheduling process to adapt processes that would notify suppliers of orders and their manufacturing locations based upon every day orders from the dealerships. The objective is to develop information flow upstream from the suppliers. Ford will need to know on an accurate and real time fashion the suppliers individual daily capacities, only then Ford will be able to effectively allocate orders. Control Understanding this challenge, implementation plans will require phasing and adequate training, with follow through at all levels to ensure a predictable and comfortable transition. This stage should be split into manageable groups, action plans should be in place for addressing specific challenge areas, such as technically issues. The control will focus in monitoring the KPI’s within Ford and its suppliers, by this stage the refined IT solution will help to achieve FPS goals such as lower inventories, faster inventory turnovers, leaner manufacturing process, making the overall supply chain more cost effective and responsive, achieving the 15 days lead-time established by ODT. Conclusion Ford is an example of a company who can evolve at any stage of its existence; it is committed to be leader in the automobile market. They decision to implement major changes within the organization shows the determination to do anything to stay competitive, Ford knows that if they don’t keep up with the new trends, they will lose ground easily over the time. Once again I realize how the â€Å"information† plays the most important role within any organization, the effective and efficient manage of it will smooth any operation helping to achieve the expected results. Whether your company is vertical, horizontal or virtual integrated a key issue is to build based on real requirements delivered in real time. If everything starts with the right step, all of the following levels of the SC will enjoy a more organized and efficient process. Supporting these basic ideas with and efficient IT infrastructure will give the ultimate competitive advantage to any company it is applied. In conclusion if the recommended strategy is implemented successfully and in a timely manner, Ford will be positioned to become a dominant player in the automotive market enjoying great growth and larger profit margins. References Ford Motor Company: SC Strategy Case Study Harvard Business School by Robert D. Austin The Power of Virtual Integration: An Interview with Dell Computer’s Michael Dell by Joan Magretta. How to cite Ford Motor Co. Case Report, Papers

Sunday, December 8, 2019

Ethical and Social Issues

Question: Discuss about the Ethical and Social Issues. Answer: Introduction The Corporates are dealing with employees right to privacy in the work place as one of the issues where this has started to become an increasingly complex issue especially in the period of advanced technology. Technology has enabled the Employers and the individuals with super powers in terms of managing and connecting with people around the world. With such a revolution in place, technology has also enabled the Employers to monitor all the work place communication done by the Employees using the internet and the email platforms at the workplace. Employees tend to accept this act as an intrusion into their privacy however it is an acceptable code of ethics which is adapted and implemented by all the Organizations as per the regulations of Law. Hypothesis Employees, as a result, suffer a lower self confidence when monitored in their work place because of the right to privacy. Explanation of the Definition of the Hypothesis The activities of the Employees in the work place are monitored to an extent which includes their email and their technological communication using any of the devices including their mobile phones and computers. Some of the Employees activities are not monitored till date like their personal cupboards and personal belongings in their lockers. Analysis Email communication and the communication especially using the companys properties are critical as they are meant to be used for conducting their official duties in the first place and they are not intended for conducting communication to their personal sources Monthly Labour Review (2003 p -2). When the companys property is used as the media of communicating, the company has every right to monitor and curtail any of the communication being passed. Most of the Corporates have a specific email monitoring system in place where they retain a copy of the email while they are sent to the other systems in order to monitor the productivity of the message being passed and also to keep a track of the illegal issues which might have been taking place Monthly Labour Review (2003 p -2). This fact has been proven in most of the wrong doings where the misconduct has been traced and confirmed based on the email messages being passed from their official systems to the personal systems Managers (2008). Apart from the communication being sent through email messages there have been cases of misconduct which have been traced in the form of customer information and personal details in terms of their banking account information Managers (2008). The technological revolution has provided the employee force with immense benefits of work around where they can take work home and support their official work being away from the premises. This provision has transformed the ways in which people presume about their work and they instantaneously feel the power of being independent where this would also secure a seat in their minds that they are free to do their work in their own way and they can also take decisions. This, in short has given the provision for the employees to escape from long working hours at their office. In this connection, there were some recent surveys which have been conducted in some of the work places in order to gauge the opinions on Internet and email. Amongst the population which has participated in the employee survey, 87% of the employees have declared that they find it genuine to attend to their personal technological needs at their work places and 55% of them have declared that they should be given a good proportion of time on a daily basis in order to attend to their personal work. With these percentages being reported, there are almost 83 85 % of the Employees who spend a whopping 50 55% of their work time attending to personal email and communication related work (Australian Bureau of Statistics 2006). Within these numbers, 55% of the Employees that they could not deliver their 100% potential being distracted at work (Monthly labour review 2003, P 2). A similar survey conducted for the Employers have also revealed almost similar numbers where 83 85% of the Employers felt that the Employees can be allowed to go through their personal stuff of communication at work. This provides us an insight into the cases of misconduct which happen in the Organizations especially in terms of data breach and customer data records collection. Among these employers, 30 31% of them have reported that they monitored their employers email communication at work and through official systems (Monthly labour review 2003, P 2). Reasons and Evidence to Support your Position Stated in your Hypothesis Statement A large proportion of the employees have an impression that they should not be monitored though it could be their official mail. The proof of evidence from a legal standpoint is different where the law has confirmed that the right of the employees to use their personal email and personal communication does not exist in the official premises (Blunn 2005). The law does not see a need for the employees to conduct their personal work in the official environment and had permitted the Organizations to monitor their official communication (Office of the Privacy Commissioner 2007). There were cases especially in the Banking sectors where the Employees have sent official data through personal email and it has created a large chaos in terms of outsourcing business to some of the Countries in the world (wbcoft 2008 p- 3). There was also a case of the Pillsbury company where the company management was sued by a former employee that the company had an inappropriate mechanism of communication system in their Organization (Monthly labour review 2003, P 2). This is in alignment with the Australian Code of Privacy Policy Privacy Act (1988) as per the Schedule 1 where it proves that the personal information collected by any Organization will be used for the purpose intended and not for any of the personal use (ACS 2014). The email communication system which is provided in any Organization is intended to promote the internal communication between the employees across various sites and also with their Clients and Support employees. All the Organizations promote a code of ethics and code of conduct where it is explained to the employees during their induction to the Company that they should follow the codes of ethics within the Company and they should not violate any of the laws and practices. The Companies also communicate to their employees through a disclaimer that all the communication is private and confidential and should essentially be treated in a confidential way. The Companies also communicate the consequences of violation of any of the Companys policies in their codes of practice in order to ensure that the Employees are well aware of the breach of their code of conduct (Monthly labour review 2003, P 3). Addressing one Objection to My Position With due consideration of the legal regulations and policies with relation to the Organizations communication system, I feel that there should be a mechanism where the Organizations can change their codes of practice to an extent where they can have a check balance in place in order to monitor the critical words being used, data being transmitted in terms of financial data and financial records and customer information. With the introduction of such policies, the Company would also contribute to engaging their Employees at their work place and in contributing to their work life balance which is the main factor of attracting the Employees in most of the Organizations in the present times(Mitrou Karyda 2006). With a close monitoring of the type of communication and the data, the Organizations would be able to meet their legal standards however permitting their employees to cater to their personal needs as well (Anderson 2006). This allows us to reflect on the hypothetical statement of the case considered that the Employees, as a result will not suffer a lower self confidence when monitored in their work place because of the right to privacy and in turn they will also develop a right to protect their Organizational policies. This in addition also proves to be in support of the ACS code where the ACS values are intended to enhance the quality of life of the Employees apart from framing the codes of professional conduct (ACS 2014 p 5). Conclusion The cases we have considered and the insights of details have given us an understanding that the Employers have the rights to frame their codes of conduct in terms of monitoring the communication messages using the official technical systems. The Employees are given protection of their personal data in some situations like their laws of contract (Privacy rights 2016). It is critical that the Employers mention to the Employees about their policies of conduct and get them agreed to them in order to avoid any of the unavoidable situations in future. All this information can be shared with the employees through hand books and contracts where they can keep them and the information can be shared with the peers constantly in meetings or any of the Companys internal trainings (Privacy rights 2016). References ACS 2014, ACS Privacy Policy, Viewed on August 24th 2016, https://www.acs.org.au/privacy-policy ACS 2014, ACS Code of Professional Conduct, Viewed on August 24th 2016, https://www.acs.org.au/__data/assets/pdf_file/0014/4901/Code-of-Professional-Conduct_v2.1.pdf Anderson, Sandra M 2006, Albertas Statutory Privacy Regime and its Impact on the Workplace, 43 Alberta Law Review 647. Australian Bureau of Statistics, Australian Social Trends 2006, Trends in Hours Worked (Cat no. 4102.0) Blunn, Anthony S 2005, Report of the Review of the Regulation of Access to Communication, Public Affairs Unit, Australian Government Attorney Generals Department Chadwick, Paul 2006, The Value of Privacy, Law Week address at the State Library of Victoria, Future of Journalism Summit, Melbourne. Charles J. Muhi 2003, Workplace e- mail and Internet use: Employees and Employers beware, Monthly Labour Review, Viewed on August 24th 2016, https://www.bls.gov/opub/mlr/2003/02/art3full.pdf Privacy rights 2016, Workplace Privacy and Employee Monitoring, Viewed on August 24th 2016, https://www.privacyrights.org/workplace-privacy-and-employee-monitoring Wbcoft 2008, Workplace Fraud, Viewed on August 24th 2016, https://www.wbcoft.org.uk/Attachments/Articles/Employment/Workplace%20Fraud.pdf Mitrou, Lilian and Karyda, Maria 2006, Employees Privacy vs Employers Security: Can they be balanced, 23 Telematics and Informatics 164. Office of the Privacy Commissioner 2007, The Operation of the Privacy Act Annual Report, 1st July 2006.