Monday, February 17, 2020

Human Reasorce Mangment Essay Example | Topics and Well Written Essays - 2000 words

Human Reasorce Mangment - Essay Example All this is deemed to be in tune with the specific requirements of the organization (Bloisi, 2007). Before the review and after Caf Co adopted its new outlook of its human resource management, its human resource management had a number of similarities with its new outlook on human resource management. One of the similarities was that Caf Co recognized its personnel as the most important asset of the company and to this end various amendments were made to benefit the workforce of the caf. There was also the aspect that the human resource of the organization was deemed as a very important channel of the caf achieving its objectives and goals and this played a very important part in ensuring that the personnel were well trained and recruited to ensure that they met their objectives. This brought about the similarity that the personnel of the organization were well trained and also that new employees were well recruited before joining the organization. There was also the fact that the employees were handpicked from the best selection the market had to offer and old employees were subj ected to refresher course at a certain period. This method of human resource management can be classified as the classical form of human resource management (Marchington, 2005). When Caf Co adopted its new human resource management, the human resource though being deemed as one o... When this perspective was undertaken by the organization, the human resource of the organization started receiving extra benefits which were deemed as motivators for the personnel to accomplish their objectives and also realize their targets. To this effect the benefits were awarded to various individuals who showed that they were capable of achieving the 4Cs which denotes competence, congruence, competence and cost effectiveness. This new outlook by Caf Co indicated that they had adopted the Harvard human resource management which advocates for these policies to be implemented by any organization (Bloisi, 2007). 2. Necessity of more responsibility in the line management It is important for the management of any organization to portray a high degree of responsibility in their human resource management. This is especially true to the line management because in this aspect the management is responsible for the administration of all human resource activities which when brought together plays an important part in ensuring the organizational output is well coordinated to meet the organization's objectives as well as targets. When the management portrays an attitude of more responsibility, the personnel will also view the various projects as very important and in turn will put more effort in ensuring that the objectives are met. The supervising role that the management will play will act as a motivator for the personnel to ensure that they submit a high quality results. This will in turn play a very important role in ensuring that the organization offers the clients high quality products and services and this will play a very important role in improving t he public outlook of the organization. In this respect, the sales base of the

Monday, February 3, 2020

Information Security and Privacy Essay Example | Topics and Well Written Essays - 1500 words

Information Security and Privacy - Essay Example Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders. Before beginning to discuss how networks can be secured to improve the prevention f intruders, the reason why it is important to prevent intruders will be pointed out to help understand why network security is vital for many businesses. As organizations around the world rely heavily on computers for all their information storage and processing, unprotected computers and networks can be an easy means for anyone to obtain this information. Also as organizations become increasingly dependent on computers and networks to run the business any damage can cause numerous problems for a business with possible costs within the millions. (Fitzgerald 1-7) These costs are caused by the inability to use computers therefore affecting productivity and sometimes causing the complete inability to run the business. As computer systems assist heavily in running businesses and store many f the organizations private data it is easy to see why organizations need to secure their computer systems or it will cost them. Passwords is a relatively easy and cheap ... It might seem that if companies do not connect their networks to the internet there will be no security problems. Therefore meaning security is needed on networks even if it is not connected to the internet. Two main types f security can be used here; passwords and physical security. (Fitzgerald 1-7) Passwords is a relatively easy and cheap form f security that can be implemented on a network, it also provides a good level f security as long as passwords are well kept by employees. With the use f passwords network managers can monitor the use f the network by its users by being able to see who logs in and where their logged in to, as well as what they have done. With more advanced technology network managers can also detect when and where there is an intruder and what the intruder has done. Fundamentally passwords will keep those who are not authorised away from restricted sections f the network, ultimately sustaining an adequate level f security. Physical security is basically using physical means to prevent certain employees from using certain sections or computers on the network. This may include computers being kept in secure rooms with key card or identification security. As organizations connect their networks to the internet, the risk f intruders rises dramatically as there are millions f users online; it also allows users from any part f the world to access your private network. This security issue is heightened as users within the network begin to access areas f the internet that are less secure. The most commonly used method to help prevent intruders and improve the security f the network when connected to the internet is the use f internet firewalls. Basically a firewall is capable f preventing