Saturday, December 28, 2019

A Discussion On Leadership And Management - 891 Words

The discussion of what actually compiles a leader is constantly a debate. The definitions of leaders, followers, and the characteristics that they each have are never the same between two people, which makes it a difficult topic to openly tackle. Once the conversation begins, one might have a solid stance on what he/she defines as leadership but as the conversation unfolds and more questions are asked, what he/she thought she knew can be completely turned upside down. It is the kind of topic that one could walk away from knowing less about his/her stance than when one came into the discussion. This is certainly what happened to me last week in our first discussion on leadership. It was clear to me when I left, but it because even clearer when I reevaluated the agree/disagree statements and saw that what I said at the beginning of the conversation was not the exact opposite in some of the cases. The first statement was â€Å"leadership and management are basically synonymous termsâ⠂¬  which I originally agreed with, but after our discussion and reading the articles I switched my answer to disagree. When I first read the statement, I felt as though in order to do one successfully, you must be able to do both. That a leader must be able to manage people and a manager must be a leader. The words of John Kotter in the Harvard Business Review certainly made me look at the phrase with a new twist. He sums the two up at the very beginning by saying that they are two very different andShow MoreRelatedNursing Leadership Critical Discussion of a Change Management Project Strategy4391 Words   |  18 Pagesï » ¿Nursing Leadership Critical Discussion of a Change Management Project Strategy: EHR and Patient Safety Issues Objective The objective of this study is to crucially discuss and reflect on a change management project of strategy that has been undertaken in a health-related organization and specifically the implementation of Electronic Health Records (EHR) and patient safety issues. I. Aim of the Change (In Relation to Organizational Mission and Strategic Goals/Objectives) The aims of the changeRead MoreLeadership Model Essay730 Words   |  3 PagesWhat is leadership? Leadership is the behaviour of an individual when he is directing the activities of a group towards a shared goal. (Hemphill and Coons, 1957, p.7) A leader is interpreted as someone who sets direction in an effort and influences people to follow that direction. How they set that direction and influence people depends on a variety of factors. To really comprehend the territory of leadership, one should briefly scan some of the major theories, notice various styles of leadershipRead MoreThe Challenges Of Leadership During The Modern World1412 Words   |  6 PagesBennis, W. (2007). The challenges of leadership in the modern world: introduction to the special issue. American Psychologist, 62(1), 2-5 This article covers a survey of contemporary trends in leadership. The aim of the author is to develop an understanding of the various challenges that contemporary leaders face so as to come up with effective theoretical models to resolve those challenges. Among the major challenges of leadership, Bennis notes that leadership of human institution is one. The articleRead MoreEssay Leadership and Change1675 Words   |  7 Pagesâ€Å"Not all leadership is about changing or challenging people’s vision of the future† (Stanley, 2011, p. 57). The term leadership can be applied to varying positions within healthcare, from management to the clinical setting. However, while those in a management position may wear the title of â€Å"leader†, this type of leadership can be far removed from that of a clinical leader. I believe that the above quote by Stanley (2011) is true from the perspective that not all styles of leadership are instrumentalRead MoreChinese Management Style and Western Style1169 Words   |  5 PagesCompare and contrast common Chinese management styles and common Western management styles By Di Yang 09114786 Accounting, Xi’an Jiaotong-Liverpool University Introduction It is a fact that the economic trade tends to occur among counties all over the world. The managerial styles about how to plan a project and control a complete process as well as directing work of subordinates in companies especially in the multinational enterprises become similar in the economicRead MoreNoki Values, And Decision Making1042 Words   |  5 Pagestrouble, executive management took initiative and got stakeholders involved to change the culture and strategy. This research will highlight a short overview of the case study Nokia: Values that make a company global, the actions taken by Nokia leadership to re-examine the company’s values, and an explanation of why this approach was so successful. This research will include three leadership theories to support the discussion and focus on how the strategies (including leadership, communication, andRead MoreEmployee Engagement Market Utilizing A Software As A Service ( Saas ) Distribution Model981 Words   |  4 Pages monthly per user fee to gain entry into the market. The iLead360 Value Proposition iLead360 is a mobile application for companies that want to alleviate the pain of leadership feedback, empower their management teams, and increase organizational performance. Unlike others, iLead360 connects the dots by inspiring leadership behaviors that will engage employees and deliver increased joy and satisfaction to the workplace. iLead360’s analytics result in customized content based on feedback andRead MoreMGT367 Learning Contract Proposal Essay1744 Words   |  7 PagesAssessment Item2: Learning Contract Proposal MGT367/Leadership Issues Student’s Name: Xinyi Zhang/11559176 Teacher’s Name: Dr Vanaja Karagiannidis Date: April 9, 2015 Content 1. Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦1 2. Theoretical Discussion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦1 2.1. Charismatic Leadership †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦1 2.2. Transformational Leadership †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..2 2.3. Transactional Leadership†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.2 3. Managing Diversity Relates Leadership Issues†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦2 4. Gap Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Read MoreMy Clinical Experiences Working With My Preceptor906 Words   |  4 Pagesand leadership skills necessary to interact with stakeholders at all levels within the organizations. My preceptor provided guidance and insight in choosing my project focus, to create another infection control position in the hospital, because I have never performed this function in my management role. Joyce believed the proposing approval for an additional position for the Infection Control Department would be the most beneficial learning experience for my practicum to tie in both leadership andRead MoreLeadership And Management Of The Administration Of Criminal Justice Agencies1742 Words   |  7 PagesLeadership Introduction It can be complicating for people to distinguish the difference that exists between leadership and management, both as concepts and practice. Indeed, as it was revealed by Stacey (2012), most people use the concepts interchangeably. While this is the case, leadership and management are entirely different. The present paper seeks to assist the reader with understanding and delineating the two concepts. Additionally, the paper will attempt to determine two concepts in the practice

Friday, December 20, 2019

Language And Its Effect On Language Essay - 1727 Words

Language has been around for as long as human beings, yet defining it is still something quite difficult to do. What is known is that it can be cognitive (our thoughts), material (written), social (conforming to societal conventions) or all three at once (Gee Hayes 2011). Language is learned behavior that traditionally began orally, and would have been used to convey real-time statements of facts, however as time progressed the cultural invention of written language developed, changing the ways in which language could be used to communicate (Gee Hayes 2011). This evolution has greatly diversified language, creating many different varieties in the way of accents, regional varieties, professional varieties, urban varieties, age varieties, social varieties (Gee Hayes 2011). Take for example Englishes; while theoretically ‘English’ is one variety of language, there are many sub-varieties of this, such as Australian and New Zealand English, which furthermore divides into Australian English, Aboriginal English, New Zealand English and Maori English. Within Australia, Standard Australian English (SAE) is the standard language, used in formal settings and academic writings alike (Green 2006). All human languages share the same fundamental properties, such as vowels, constants, syllables, nouns, verbs, sentences, and clauses, which are used to conduct our everyday life, we use it daily to convey information, our thoughts, our feelings, to provoke actions, to make decisions.Show MoreRelatedThe Effects Of Language On Language Influences1909 Words   |  8 Pagesproposed that language influences or determines the way in which an individual thinks (Whorfian Hypothesis). Subsequently, Miller and McNeil (1969) distinguished three versions of this hypothesis, simply ladled â€Å"strong†, â€Å"weak† and â€Å"very weak†. The â€Å"strong† hypothesis emphasizes the role of language when creating cognition, essentially language determines thought. The â€Å"weak† states that language influences memory perception. Finally, the â€Å"very weak hypothesis states that language influences memoryRead MoreModern Language And Its Effect On Language1514 Words   |  7 Pages Languages are an ever-changing phenomenon. As we as humans develop, so does our language use and skill, and as time passes, so do certain fashions in languages. It is safe to assume that one of the key elements in the evolution of languages is that of integration. It is only natural that when people who speak different languages integrate with one another, that their languages will merge to some extent. This often happens at different speeds and with differing results. Two languages merging togetherRead MoreEffects Of The Mother Language On The Second Language797 Words   |  4 PagesIn this section, I am all for the effects of the mother language on the second language. ELLs are influenced by their backgrounds and their experiences shape their knowledge in the new language they learn. The research findings revealed the effects of native language on the new language. There are many examples of those learners who successfully they do in the target language and that because of the lev el of their knowledge in their native language. Multisensory Structured Instructions: In myRead MoreThe Negative Effects Of Sign Language And Sign Language1086 Words   |  5 PagesOver the last few decades, baby sign language has been a consistent hot topic all around the world. Parents are bringing American Sign Language into the home as tool to communicate with their infants from a very early age. Despite controversial debates regarding how sign language can negatively affect a child’s development of speech, there have been findings that prove this to be untrue. Teaching sign language to infants facilitates early communication skills and better interactions with the peopleRead MoreThe Effect Of Globalisation On Language Essay1747 Words   |  7 PagesAbove all of these is language; Human language is a rare communication structure that is taught from birth instead of being inherited (Palomar College, 2006). It is estimated that there is around seven thousand spoken languages in the world today, with less than one hundred thousand people using up to ninety p ercent of those languages (BBC, 2014). As a result of globalisations effect on language, the English language has become a lingua franca, also known as a ‘global language’ (Dewey, 2007). WithRead MoreCultural Effects on English Language Collocation as Foreign Language1991 Words   |  8 PagesAbstract In English language, there are many fixed, identifiable, non-idiomatic phrases and construction. Such groups of words are called recurrent combinations, fixed combination or collocation. Collocation fall into two major groups: grammatical collocation and lexical collocation. For people who regard the English language as a foreign language or second language, it’s so difficult to express it as perfect. This â€Å"mini research paper† talks about â€Å"Cultural Effect on English Language Collocation asRead MoreThe Effects Of Language On Personality Perception1452 Words   |  6 PagesLanguage is, according to Merriam Webster dictionary, â€Å"the system of words or signs that people use to express thoughts and feelings to each other†. Language is important in that it is our main sources of communication between others. It allows us to express ideas, share experiences and create connections. For many of us, languages are also our main tool for communicating with ourselves. Our thoughts are encoded with languages before us even conscious of it, but every language is different. Do differentRead MoreEffects Of Language Impairments On Children1542 Words   |  7 Pages Language impairments has affected all types of people of all types of age. Language impairment has no specific target to effect. Many people who suffer from a traumatic event, aphasia disease, or simply a stutter; are all cases known for having communication disorders. Over six million people in the U.S. suffer from a language impairment; out of that six, one million suffer people suffer from aphasia, and three million suffer from stuttering. Through various research, many analysts have discoveredRead MoreEffects Of First Language Acquisition1038 Words   |  5 PagesFirst language acquisition is something most average people go through without giving it a second thought. According to Freeman and Freeman (2014), â€Å"Acquisition refers to a natural process that occurs without conscious effort or any kind of direct teaching† (p.21). Due to the fact that language acquisition is something almost everyone goes through without conscious effort and is still partially a mystery, it has become a widely studied subject. Researchers from many differen t fields have studiedRead More Technology and Language in Education: The Effect of New Technology on Teaching Languages1539 Words   |  7 PagesTechnology and Language in Education: The Effect of New Technology on Teaching Languages Annie Moore, a 15-year-old girl from Ireland arrived at Ellis Island in New York City on January 1, 1892. She was the first immigrant to come to that United States immigration station, but she was certainly not the last. According to the U.S. Census Bureau (2000), 28.4 million of the 285.2 million US residents in 2000 were foreign-born. With such a large amount of our population being foreign-born, the

Thursday, December 12, 2019

Security of Electronic Health Records †Free Samples to Students

Question: Discuss about the Security of Electronic Health Records. Answer: Introduction: A record management system is an information storage and retrieval system that acts as an authoritative source for particular information. The mode can be manual or electronic. Manual record keeping systems include the filing, while electronic storage systems are computer-based databases. Notably, the records system must ensure security and data integrity to prevent discrepancies during information storage and retrieval. According to (Maguire, 2005) electronic record keeping is more efficient, easy to locate and secure; however, they are liable to file format conversion, time frame changes, multiple edits, and bugs. Also, paper-based filing is time-consuming and susceptible to damage by fire or floods. The record management systems should be easily accessible, up-to-date, accurate, and comprehensive. For instance, in real estate, the sold prices, listings and property appraisals are routinely stored to provide information for audit, and other business operations. Records systems ensure information preservation, timely availability, accurate updating, and more accessible control of resources such as computers and space (Demirtela Bayram, 2014). For example, in real estate, the landlord can easily access information regarding the tenants security and rent payment. In this way, the concept ensures necessary property information and unit specific expenses are readily available. The unit costs include worksheets, security deposits, depreciation, and fees; while essential information consists of repair receipts, insurance documents, mortgage papers and instruction manuals. According to (Tough, 2011) excellent record keeping helps maximize profits, measure business performance and protect the investment. Notably, records are the basis of electronic and physical documentation consisting of business details, legal agreements, and transaction amounts and dates. For example, property appraisals detail information on the market value of real estate property. Today, most businesses utilize the electronic record systems to store information, update and generate reports when required. The concept is advantageous compared to the manual filing system in that data is stored for longer and securely. Cumming (2007) suggests that good record systems for the real estate business include the sold properties, sales prices, listings and sales figures, property appraisals, rental ranges, rental vacancy rates, sales reports and comparisons between agencies and client expectations of prices, sales, and rental fields with the actual costs. Notably, record keeping in the real estate business depends on the transaction files, length of time and disclosure provisions specified by the sales representatives, brokers and real estate developers. In this way, record systems prevent money laundering and corporate espionage because receipts, invoices, and checks are readily available. The record systems are subject to legislative rules and regulations such as the Proceeds of Crime Act. Information storage is essential for business records because it allows real estate agents to examine and analyze current trends and developments in the industry. Further, it will enable potential tenants to analyze local sales before deciding on the suitable residency. Examples of record systems in real estate include the property appraisals; listings and sales figures; sold properties; rental vacancy rates; sales prices; rental ranges and returns; and agency property management reports. Schreier, Wilson Resnik (2006) suggests that property appraisals indicate the economic value of the real estate business. However, the evaluation relies on the appraiser, market value, and the insured property. Notably, a written appraisal is essential for property buying, selling, insuring and mortgaging of the real estate business. Further, it allows evaluation of cases involving compensation of destroyed or damaged property. According to (Ngoepe, 2015) listings includes placing the firms shares on the stocks lists for the stock exchange. Sales figures and listings of real estate businesses allow the owners to assess the tenants confidentiality and their overall sales within a particular period. Notably, sales prices are the actual costs of which property sold. Johnston (2005) suggests that sales prices allow real estate agents to analyze the market depending on previous sales and propose values of the available products. Further, the sales reports provide information for potential tenants who are interested in buying and selling the property. Ryan (2005) suggests that rental ranges and returns allow the owners to determine the expected returns from the investment before maintenance fees, tax deductions, and other costs. Further, agency property management and sales reports enable the companies to record sold properties for audit purposes. Notably, records on past, existing and prospective clients allows real estate agencies to identify contacts and other valuable assets relating to the tenants. Maguire (2005) explains that good record systems must ensure the safety of the stored information. In this way, the agencies prevent fraud, identity theft, and corporate espionage. Further, the concept allows protection of information from unauthorized use, access, inspection, theft, modification, and destruction. According to (Ngoepe, 2015) security entails methodologies and processes created to ensure confidentiality of record management systems. For instance, paper-based records are backed-up in different locations for protection from floods or fire. Another method of providing security for hard copy documents is safe storage to avoid damage or theft. Backing up involves copying virtual or physical files to secondary storage in case of any catastrophe or equipment failure (Khan Batool, 2016). The concept allows rapid and reliable retrieval of the duplicated copies in case need arises. Further, it prevents information corruption and deletion. Real estate firms must restrict backup files to authorized employees only this prevents crucial passing information to unscrupulous personnel. Further, real estate companies can create a security policy limiting access to the record keeping system this protects physical records and electronic documentation from unauthorized personnel. Smyth (2005) suggests that hackers target the information storage systems, and therefore, companies must ensure proper storage of information in a secure facility. Win (2005) demonstrates that record systems relating to real estate involve accounting journals and a summary of all business transactions. Primarily, the business checkbook allows for future reference. In this case, proper record keeping is essential in preventing misunderstandings and unfair claims from the agencies employees. Notably, the records system details information of current tenants which allows easy monitoring of the rental property. Lomas (2010) suggests that sales price enable the agents to analyze and estimate the market value of their real estate property this attracts potential tenants seeking cost-effective accommodation. Record-keeping is essential in that it allows secure and efficient information storage. For the agency in Jonesville, the record management system will involve both manual and electronic filing. For instance, files consisting information such as sales prices, rental vacancy rates, sales prices, rental ranges and returns and property appraisals should be physically documented and safely stored on shelves. On the other hand, electronic documentation will involve property appraisals, agency listings, and necessary information regarding the clients. In this case, information storage features in databases management systems (DBMS) such as MySQL. The database allows secure storage of data and sequential access for authorized personnel only (Blansit, 2008). Further, MySQL enables information modification, addition, rearranging and updating of the records. Notably, information regarding the 200 properties from another agency and 15 exclusive properties for sale will be backed up in software such as the Microsoft SQL Server. In this way, data storage takes place in case of loss from the primary sources. Staff training is a crucial sector in any organization; it aims to effectively direct and manage labor provisions for an organization to achieve their desired targets. The primary functions of the human resource are to access the performance, development, training, selection, and recruitment of human labor force. Also, they are typically responsible for managing promotions and dismissals to the employees (Liu et al., 2014). Adequate employee training should incorporate the age difference. Among employee, the age difference allows development of various generations depending on the training methods utilized. Strategies used in continuing professional development of employees clustered in age groups. The cluster is necessary because professional goals for young employees differ from their older counterparts. Young entry stage business employees are still timid in undertaking various business procedures. Employees at this stage need more formal training to improve their performance in d ealing with the system (Sharma, 2016). Middle ages employees need practice for them to realize the best specialization. Employees who are nearing retirement have different mentalities they require training to improve with their commitment with the system (Pool et al., 2015). Practical training on software systems includes employee engagement in software selection this helps them understand the benefits of the new system. Further, it makes the system more endearing to the employees and creates awareness about the software's usability.While implementing the new software packages, the agency will set definite and measurable learning objectives for what workers are going to achieve from the training. For instance, when implementing the MySQL database, provide employees with transactional entries to retrieve particular information this develops their ability to relate the practice to real-life situations. Since the agency's workers occur across a varied region, with different time zones, online coaching is suitable. The practice occurs from a given set-up room and requires the internet connection for employee interaction. In this case, pre-requisite coaching takes place via e-learning and other emerging learning platforms. During this step, the employees become conversant with the software packages and business methods relating to its application. Online training is efficient and cost-effective because it saves the workers productive hours. Further, the approach provides updates of the area unit and necessary changes to the package software processes and steps. The action involves developing coaching modules as per the responsibilities and roles of the workers. Sharma (2016) suggests that the course should consist of a spectrum of characters, rather than one duty. In this case, workers undergo training on the software functions about their roles and responsibilities. Notably, role-based coaching involves training workers in individual departments on the supported tasks and daily usage of the software package (Voegtlin et al., 2015). The step makes the training relevant and enhances its worth. Feedback in software package training sessions is essential this is because it helps the trainer to wedge the user acceptance of newly installed software. Meng Arunkumar (2018)explains that collecting feedback builds necessary enhancements to the educational program. The step involves supporting queries, suggestions, views, and doubts that allow the trainer to improve the training methods continually. Employees will fill the sample table after training Question Training to be done here by the trainer. Trainees feedback Dou you know what the system explains? Explanation of the functioning of the system in general. Do you understand the functioning of the system? Is the system relevant to the organization? Explanations of the benefits of the system to the organization Do you think the system is beneficial to your workplace? Explanations of the benefits of the system to the users What is your overall experience with the system? Showing employees all the functionings of the system The flowchart below shows the sequence of how events will happen in training. References Schreier, A., Wilson, K., Resnik, D. (2006). Academic Research Record-Keeping: Best Practices for Individuals, Group Leaders, and Institutions. PMC , 42-47. Arunkumar, G. M. (2018). Construction of employee training program evaluation system of three exponential forecast based on the sliding window. Cluster Computing, 1-6. Batool, Y. K. (2016). PERCEIVED RELATIONSHIP BETWEEN TRAINING AND DEVELOPMENT PRACTICES AND EMPLOYEE PERFORMANCE AT COMMERCIAL BANK IN PESHAWAR. Journal of Management Research (JMR), 2 (2), 140-160. Bayram, H. D. (2014). The efficiency of Electronic Records Management Systems: Turkey and Example of Ministry of Development. Procedia - Social and Behavioral Sciences, 147 (25), 189-196. Blansit, D. (2008). The Basics of Relational Databases Using MySQL. Journal of Electronic Resources in Medical Libraries, 3 (3), 135-148. Voegtlin et al. (2015). How to empower employees: using training to enhance work units' collective empowerment. International Journal of Manpower, 36 (3), 354-373. Cumming, K. (2007). Purposeful data: the roles and purposes of recordkeeping metadata. Records Management Journal, 17 (3), 186-200. Johnston, G. (2005). The benefits of electronic records management systems: a general review of published and some unpublished cases. Records Management Journal, 15 (3), 131-140. Liu, Z. (2014). Chinese firms' sustainable development-The role of future orientation, environmental commitment, and employee training. Asia Pacific Journal of Management, 31 (1), 195-213. Lomas, E. (2010). Information governance: information security and access within a UK context. Records Management Journal, 20 (2), 182-198. Maguire, R. (2005). Lessons learned from implementing an electronic records management system. Records Management Journal, 15 (3), 150-157. Ngoepe, M. (2015). Justice delayed is justice denied: Records management and the travesty of justice in South Africa. Records Management Journal, 25 (3), 288-305. Pool, A. (2015). Strategies for continuing professional development among younger, middle-aged old: A biographical approach. International Journal of Business Records Studies, 52 (5), 939-950. Ryan, D. (2005). The future of managing electronic records. Records Management Journal, 15 (3), 128-130. Sharma, P. (2016). Employee training and motivation as the predictors of Job performance: Empirical evidence from Indian Insurance Sector. International Journal of Management, IT and Engineering, 6 (2), 276-289. Smyth, Z. (2005). Implementing EDRM: has it provided the benefits expected? Records Management Journal, 15 (3), 141-149. Tough, A. (2011). Accountability, open government and record keeping: time to think again? Records Management Journal, 21 (3), 225-236. Win, K. T. (2005). A review of Security of Electronic Health Records. Health Information Management Journal, 34 (1), 13 - 18.

Wednesday, December 4, 2019

Ethics and Professional Practice ICT

Question: Discuss about the Ethics and Professional Practice for ICT. Answer: Introduction The use of Information and Technology has been causing various issues especially in terms of ethical concerns related to the protection of personal privacy in various terms like protection of personal and intellectual property, protection of personal information, user responsibility issues, access to information and inappropriate use of information, issues of proper licenses in terms of usage of software for various applications and piracy issues. In this article, we would explore the topic: Privacy is a perennial issue. Privacy on internet and its usage has to be protected. The software companies should be aware of the usage of the personal information of various Users and the Government should also exercise proper control in establishing rules and policies in order to curb any additional and illegal usage of personal information on the internet. Exploring the usage of Information and Technology involves various malpractices related to the ethics and the technological advancements. These ethical issues are increasing with an urge to be resolved. In the present times, the usage of Information and Technology has increased drastically and has been raising various ethical questions with relation to individuals and Organizations. The major ethical issues which have been on the increasing side are intrusion into the personal privacy of a persons life, getting to know their personal information, usage of their personal passwords in relation to various transactions, invasion of personal and societal rights and value preservation. The main cause of the issue is that the present period in which we are leading our lives involves Information and Technology arena even in the cases where we are to deal with our personal and financial transactions owing to the high end development of Information and Technology. These issues can also be owed to the increase in the knowledge of the employees and willing to work in the field of Information and Technology and people becoming more developed and open in their thinking and accepting newer technologies to deal with their lives (National Security Agency 2016). The paradigm shift has led to newer ethical and judicial issues. Even before we deal with solving the issues of Information and Technology, we need to look into the concept of Information and Technology. Ethical Implications of the Usage of Information and Technology Information and Technology has a major impact on collecting and storing information which has been entered in the systems where the main ethical issue is that it stores and helps in manipulating the information and helps in providing the information simultaneously to any sources who might be trying to procure the information legally and illegally (HIPAAdvisory nd). Impact The major impact of this context is that the personal information of a person becomes available to almost any source. The usage of technology monitors any transaction of a person including their personal information. Some of these areas are Electronic monitoring of the mails and any communication which is being made by all its employees in the work environment. There could be situations where some of the personal information also could be passed to any required source and this might be stored in the company records. This is called as a panopticon phenomenon where this method gives rise to causing great concerns to the Employees that they are being monitored at all times The transmission of all types of email communication where in some situations the employees might have to share some personal information to their friends and this information is also monitored and stored in the records Integration of personal information is a common issue where some of the Companies integrate all the personal information of the people into one main database. The issue here in this context might not be the integration however it is the purpose of integration and maintenance of the personal information. Benjamin 1991 has confirmed that The US Government has taken measures to pass the Computer Matching and Privacy Protection Act Shopping also poses major risks with the usage if buying cards where whenever we make a purchase using a shopping card, it stores the information in a microchip within it and it stores the complete information of the shopper. The Marketing Companies retrieve all the information from these data bases and use it to contact the Customers later Hacking has become a common trait of most of the illegal Information and Technology Users where these Hackers have the potential to get the personal information of the Users There are software which are available to decode any personal information or information related to any aspect and this is the common method which is used to hack the personal information of the Users Effects of the Growth of the Issues of Information and Technology The individuals and companies will have major effects with the type of issues Information and Technology poses where the people will suffer a loss of personal information and security and there are companies which have been established to do business with the personal information of the Consumers who use the internet technology to do any transactions (Branscomb 1994). Ethical Norms which can be applied to solve the issues with the usage of Information and Technology The ethical norms can act as standard rules and regulations which can help in solving the ethical issues and they can be formed under 3 heads like Integrity Integrity can act as the truth ethical norm where facts and information being collected should be used for appropriate reasons Declaration Norm The individuals should be given their space in order to let their information out to the companies looking for. Human Rights Norms The Individuals should be allowed to choose the extent to which their information can be shared and they should also be able to restrict the usage of their personal information. Ethical Rules Various rules and regulations can be formed in order to protect the privacy of the People using the Information and Technology. The rules and regulations should be under 2 heads like the individual rights and the legal rights. The rules which can be applied in this context are The Sites which take the personal information of the Users should declare that they would not use the information for any purpose than the one for which it has been shared for The Sites should also share the information records through email which they have been maintaining on behalf of the Users Merging of the procured Client information has to happen with the Clients permission and the Clients have to be given the access of the information to which they can log into the Central data base and procure the information which belongs to them with a set of personal user name and password (Jakobs 2009) The use of the personal information which is maintained on the records should be communicated with the users Any unnecessary personal information should not be stored in the databases even unintentionally Any personal information which has been collected in the past and is no longer useful should be destroyed on a timely basis and should be notified to the Customers The Government should regulate norms and policies with regard to framing of rules with relation to segregating the information as personal and private and the limits of personal protection which has to be maintained Information and Technology Crime Laws There are various laws with relation to solving the ethical issues of Information and Technology especially in the US where The Computer Fraud and Abuse Act 1986 has been framed in order to protect the individuals from computer and online fraud (Wjtowicz Cellary 2013).This law has been amended in 1996 by the National Information Infrastructure Protection Act which has changed various reforms and has imposed higher penalties for any such occurrences of online crime. Countries like US have taken the ethical crime punishments to a different level where they have imposed stricter punishments like 20 years imprisonment (EPIC nd). Conclusion The Organizations and Information security Professionals should help in maintaining the security through framing and implementing the security policies (Casanove Lambert 2016). The policies should also list the acceptable and nonacceptable behaviours of the employees at the work place and the policies should essentially consist of the following aspects (Averweg 2011). Laws of Discrimination The laws which are made should be essentially available to all the employees without any discrimination Review policies The Organizations should ensure that all the employees have essentially read and understood all the policies and the rules with relation to the information security The Organizations should be in a position to test and confirm that the employees have understood the rules and policies with relation to the Information and Technology Protection. Compliance documents should be signed by the employees that they have agreed to the norms in order to ensure that they would comply with the policies by their acts. All the Information and Technology Organizations should be well aware that the usage of technology raises various risks to the individual rights and protection acts. Ethics Technique Sheet What is the main component used in committing the online crime Smart Shopping Cards is a method through which the Companies and the brands collect the personal information of the Consumers and in turn give it to the Marketing Companies What is the key component of sharing as a violation to the privacy of an Individual Data is being swapped as a commodity to share the personal information of an individual or an entity Which law has amended the Computer Fraud and Abuse Act of 1986, and what did it change? The Computer Fraud and Abuse Act 1986 has been framed in order to protect the individuals from computer and online fraud. This law has been amended in 1996 by the National Information Infrastructure Protection Act which has changed various reforms and has imposed higher penalties for any such occurrences of online crime. Which law was specifically created to deal with encryption policy in the United States? Security and Freedom through Encryption Act of 1997 have changed the ways in solving any of the issues related to encryption policies in the US. What are the three general categories of unethical and illegal behavior? There are 3 categories under which unethical and illegal behaviour is caused like ignorance of the issue and ignorance of the law which prevails in order to protect the incident from taking place, accidental occurrence where the incidents happen without the knowledge of the person and intentional occurrence where the crime is committed with an intention to cause harm and damage to the Individuals and the Organizations (WTO nd). References Casanove, A Lambert, I. (2016). Effective Standardization Management in Corporate Settings (pp. 1-17). Retrieved on Sep 29th 2016. www.irma-international.org/chapter/how-corporate-standardisation-shapes-tomorrowsbusiness/141756/ Benjamin, L.M. (1991). Privacy, computers and personal information: Towards equality and equity in an information age.Communications and the Law, 13 (2): 3-16. Branscomb, A.W. (1994).Who Owns Information?: From Privacy to Private Access. New York: Basic Books.A division of Harper Collins Publishers. EPIC. (nd). The Clipper Chip. Retrieved on Sep 29th 2016. www.epic.org/crypto/clipper/. HIPAAdvisory. (nd). HIPAA Primer. HIPAAdvisory Online. Retrieved on Sep 29th 2016. www.hipaadvisory.com/REGS/HIPAAprimer.htm. Jakobs, K. (2009). International Journal of IT Standards and Standardization Research (pp. 76-77). www.irma-international.org/article/first-itu-kaleidoscope-conference/2600/ National Security Agency. (2016). Information Assurance. Retrieved on Sep 29th 2016. www. nsa.gov/ia/ Averweg, U.R. (2011). Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements (pp. 89-105). Retrieved on Sep 29th 2016. www.irma-international.org/chapter/developing-internet-intranet-usage-policy/45381/ Wjtowicz, A Cellary, W .(2013). IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 857-878). Retrieved on Sep 29th 2016. www.irma-international.org/chapter/access-control-model-dynamic-applications/75060/. WTO. (nd). Understanding the TRIPS Agreement. Retrieved on Sep 29th 2016. www.wto.org/english/thewto_e/whatis_e/tif_e/agrm7_e.htm