Saturday, August 31, 2019
Bill Ryan
Some of the information he knows off the top of his head and other information he has to search for the correct response before he answers the customer question. He states this when he makes te comment about his favorite customer questions is the ones he have to do deep research for. Factor 2, Supervisory Controls Level 2-5 650 points. The supervisor provides administrative direction with assignment in terms of broadly defined mission or function. The employee has responsibility for independently planning, designing, and carrying out programs, projects, studies or other work.The reason why I picked Level 2-5 is because Mr. Ryans supervisor is never mentioned. The general mission of giving customer service is mention. Mr. Ryans explain how he handles his day , he independently planed, designed, and carried out programs, projects, studies or other work. He does not deal with his supervisor on a consistent basis throughout the day. Factor 3 Guidelines Level 3-1 25 points. Specific, deta iled guidelines covering all important aspects of the assignment are provided to the employee.The employee works in strict adherence to the guideline; deviations must be authorized by the supervisor. The reason why I choose Level 3-1 is because Mr. Ryan refers to policy and procedure several times in the case. There are obviously guideline he must follow when it comes to his work. Whether it be the 24 hours the company has to reply to a customerââ¬â¢s email or, the guidelines for handling a dispute. These guideline have been set for MR. Ryan and his colleagues to follow so the know how to handle the customer and their situation properly.Factor 4, Complexity Level 4-2 75 points. The work consists of duties that involve related steps, processes, or methods. The decision regarding what needs to be done involves various choices that require the employee to recognize the existence of and difference among a few easily recognizable situations. Actions to be taken or responses to be made differ in such things as the source of information the kind of transaction or entries, or other difference of a factual nature. The reason why I chose Leve; 4-2 is because Mr.Ryans work is semi repetitive, like he stated he may not get the same question 50 times in a row but his question do repeat themselves every couple of emails. The only factors that differ areâ⬠sources of information the kind of transaction or entries, or other difference of a factual natureâ⬠other then those factors the questions are ââ¬Å"easily recognizable situationsâ⬠Factor 5 Scope and Effect Level 5-2 75 points The work involves the execution of specific rules, regulations, or procedure and typically comprises a complete segment of an assignment or project of broader scope.The work product or service affects the accuracy, reliability , or acceptability of further processes. I choose level 5-2 because Mr. Ryan job is to handle the customer service aspect of Half. com. He executes specifi c rules, regulation and procedures to complete the service for half. com. His customer service position is often in the middle of customers having a pleasant experience with half. com and continuing to shop from their website or it can make the customer experience worst and the customer can decided to never use their services again. Factor 6 Personal ContactsLevel 6-1 10 points . The personal contacts are with employees within the immediate organization, office , project, or work unit, and in related or support units. Beside dealing with the customers, Mr. Ryan mostly deal with the different department that handle customer issues. In one of the paragraphs Mr. Ryan explains how he had to get in touch with Matt Walsh who is in charge of fixing catalog errors. This is the only time he speaks about contacting someone other than his buyers or sellers, and the person he contacted was in his immediate organization.Factor 7 Purpose of Contacts Level 7-1 20 points. The purpose is to obtain, clarify or give facts or information regardless of the nature of those facts. Mr. Ryan may contact other department to obtain information for his customer service issues. The issues can range from easily understood to highly technical and the information obtained is to answer his customer questions that they emailed in. Factor 8 Physical Demands Level 8-1 5points. The work is sedentary. Typically, the employee sits comfortably to do the work. We know this is a fact about Mr.Ryans job because he talks about how sitting down all day bother some people but it doesnââ¬â¢t bother him because he works out after work. Factor 9, Work Environment. Level 9-1 5 Points The environment involves everyday risk or discomforts that require normal safety precautions typical of such places as offices, meeting and training rooms, libraries, residence, or commercial vehicles. We already know that Mr. Ryans work in an office sitting at a cubicle. His environment involves everyday risk or discomforts t hat require normal safety precautions. Total points 2115 GS Grade 10
Friday, August 30, 2019
Phase Transformations in Metals
It follows that some of the parent phase volume disappears. * Transformation reaches completion If growth Is allowed to proceed until the equilibrium fraction Is attained. Two types of Nucleation 1 . Homogeneous: nuclei of the new phase form uniformly throughout the parent phase. 2. Heterogeneous: nuclei form preferentially at structural inhomogeneous, such as container surfaces, grain boundaries, insolvable impurities, dislocations, etc. Homogeneous nucleation: solidification of a pure material, assume nuclei of solid phase form In the interior of the liquid phase.There are two contributions to the total free energy change AC that accompany a solidification transformation 1 . The volume free energy Agave ââ¬â which is the difference in free energy between the solid and liquid phases. Agave will be negative if the temperature is below the equilibrium solidification temperature. The magnitude of its contribution is the product of Agave and the volume of the spherical nucleolus (4/ 3 aorta ) 2. Surface free energy y: energy comes from the formation of the solid-liquid phase boundary during the solidification transformation. Is postlude; the magnitude of this contribution Is the product of y ND the surface area of the nucleus (nor) * the total free energy change GAG Is equal to the sum of these two contributions: GAG=4/3 aorta GAG_v+rattrap y * In a physical sense, this means that as a solid particle begins to form as atoms in the liquid cluster together, its G first increases. If this cluster (embryo) reaches a size equal to the critical radius, r*, then growth will continue with the accompaniment of a decrease In LEG. An embryo with a radius greater than Is called a nucleus.A critical free energy occurs at the maximum of the curve, which corresponds to the activation energy needed for the formation of a stable nucleus. Critical radius of a stable solid particle nucleus: ) Activation free energy required for the formation of a stable nucleus: ) This volume fre e energy change is the driving force for the solidification transformation, its magnitude is a function of temperature. At the equilibrium solidification temperature (or melting temperature) Tm, Agave Is O, and with decreasing temp It becomes Increasingly more negative.Agave temperature decreases meaning, nucleation occurs more readily at temperature below Tm The number of stable nuclei n*(having r>r*) is a function of temperature as well: 1 ) changes in T have a greater effect on than on he denominator. As T is lowered below Tm the exponential term decreases such that the magnitude of n* increases *another important temperature dependent step in nucleation: the clustering of atoms during short range diffusion during the formation of nuclei. The influence of temp on the rate of diffusion: high temp increases diffusion.Diffusion is related to the frequency at which atoms from the liquid attach themselves to the solid nucleolus, VT. Thus, low temp results in a reduction in VT. The nuc leation rate N is the product of n* and VT Heterogeneous nucleation has a lower activation energy than homogeneous because he surface free energy is reduced when nuclei form on the surface of preexisting surfaces. Growth occurs by long range diffusion consequently, the growth rate G is determined by the rate of diffusion, and its temperature dependence is the same as the diffusion coefficient (recall chapter that diffusion increases as temperature increases).Most phase transformations require some finite time to go to completion, and the rate is important in the relationship between heat treatment and the development of macrostructure * for solid systems the rate is so slow that true equilibrium structures are rarely achieved, equilibrium is maintained only if heating and cooling are carried out at SLOW unpractical rates. *for other than equilibrium cooling Superimposing: cooling to below a phase transition temperature without the occurrence of the transformation Superannuating: hea ting to above a phase transition temperature without the occurrence of the transformation
Thursday, August 29, 2019
Vpn with Ipsec
1. Abstract The goal of VPNs is to provide a cost-effective and secure way to connect business to one another and remote workers to office networks. Network Security Protocols encompasses the basis for safe & reliable data transfer. These security devices should be able to provide accountability, access control, confidentiality, integrity, while all the time being cost effective. This provides us with different security protocols related to the transfer of data through a network.With a prevalent system of networks the frontier for world data communication, it is absolutely critical to be able to have these protocols provide the most secure service possible. In this report technical review IPSec protocol involved with Network Security. Internet Protocol Security (IPSec) It is a suite of protocol for securing IP communications by authentication and encryption of each IP packet of a communication session. IPSec also includes protocols for establishing mutual authentication between agent s at the beginning of the session and negotiating cryptography keys which is to be used during the session.IPSec is an end to end security scheme operating in the Layer of Internet of the IP suite. It can be used in protecting data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host. 2. Introduction to VPN A VPN is a virtual private network, which is built on top of existing physical network that can provide a secure communication mechanism for data and other information transmitted between networks. Because VPN can be used over existing networks, such as the Internet, it can facilitate the secure transfer of sensitive data across public networks.This is often less expensive than alternatives such as dedicated private telecommunications lines between organizations or branch offices. VPNs can also provide flexible solutions, such as securing communications between remote telecommuters and the organizationââ¬â¢s servers, rega rdless of where the telecommuters are located. A VPN can even be established within a single network to protect particularly sensitive communications from other parties on the same network. It is important to understand that VPNs do not remove all risk from networking.While VPNs can greatly reduce risk, particularly for communications that occur over public networks, they cannot remove all risk for such communications. One problem is the strength of the implementation. For example, flaws in an encryption algorithm or the software implementing the algorithm could allow attackers to decrypt intercepted traffic; random number generators that do not produce sufficiently random values could provide additional attack possibilities. Another issue is encryption key disclosure; an attacker who discovers a key could not only decrypt traffic but potentially also poses as a legitimate user.Another area of risk involves availability. A common model for information assurance is based on the conce pts of confidential, integrity, and availability. Although VPNs are designed to support confidentiality and integrity, they generally do not improve availability, the ability for authorized users to access systems as needed. In fact, many VPN implementations actually tend to decrease availability somewhat, because they add more components and services to the existing network infrastructure. This is highly dependent upon the chosen VPN architecture model and the details of the implementation. 3. 1 VPN TechnologiesThe Internet is a shared public network of networks with open transmission protocols. Therefore, VPNs must include measures for packet encapsulation (tunneling), encryption, and authentication to ensure that sensitive data reaches its destination without modifying by unauthorized parties. Fig: IP Packet 2. 2 Tunnels The thing that makes a Virtual Private Network ââ¬Å"virtually privateâ⬠is known as tunnel. Even though you access your network via Internet, youââ¬â¢r e not really ââ¬Å"onâ⬠the Internet, you are actually ââ¬Å"onâ⬠your company network. Although the term ââ¬Å"tunnelâ⬠feels like itââ¬â¢s describing a fixed path through the Internet, this is not the case.As with any Internet traffic, VPN tunnel packets may take different paths between the two endpoints. 2. 3 Encryption Encryption is a technique for scrambling and unscrambling information. The information which is unscrambled is called clear-text, and the information which is scrambled is called cipher-text. At either end of your VPN tunnel sits a VPN gateway in hardware of software form. The gateway at sending location encrypts the information into cipher text before sending the encrypted information through the tunnel over the Internet. The VPN gateway at receiving location decrypts the information back into clear-text. . 4 Keys A key is the secret code that the encryption algorithm uses to create a unique version of cipher-text. To put it in simpler terms, two people might go to the hardware store and buy the same lock off the shelf, but their combinations are different. In VPN encryption, the method may be the same (like the lock), but our keys are different (like the combination). Of course, VPN locks have a lot more than three numbers on the dial combination. As a matter of fact, transmission security strength depends on the length of the keys which you use. Hereââ¬â¢s the formula: 8-bit keys = 256 combinations or two to the eighth power (28) â⬠¢ 16-bit keys = 65,536 combinations or two to the 16th power (216) â⬠¢ 56-bit keys = 72,057,594,037,927,900 or two to the 56th power (256) â⬠¢ And so onâ⬠¦ In other words, if you used a 16-bit key, a fake attacker might have to make 65,536 attempts at cracking your combination. Obviously, this would be a quick and simple task for computers. Thatââ¬â¢s why a lot of VPN products on the market today are using 168-bit keys, creating 374,144, 419,156,711,000,000,000,000,000 ,000,000,000,000,000,000,000 Possible combinations.There are some enterprises out there going even higher. Even the fastest computers today would need extended time to crack a code that is complex. You might be tempted to make a policy of always using the highest-bit encryption method available, but keep in mind that processing such complicated cipher-text will require significant, dedicated CPU processing power. There are other ways to use keys to the outmost security to fit your needs. For example, it does, indeed, take time to crack the higher-bit keys. If you establish a policy of periodically changing your keys, the trespassers wonââ¬â¢t be able to keep up. . 4. 1 Symmetrical Keys Symmetrical keys means the same key is used at each end of the tunnel to encrypt and decrypt information. Because a symmetrical key is being shared by both parties, there must be an understanding between the two to take appropriate steps to keep the key secret, which is why symmetrical keys are oft en referred to as ââ¬Å"shared secrets. â⬠These keys become more difficult to distribute, since they must be kept confidential. A technique called ââ¬Å"key splittingâ⬠may be employed to reduce the potential of key disclosure during transit.This allows participants to use public channels such as the Internet. More commonly, however, distribution of symmetrical keys is more of a manual operation using paper, removable media, or hardware docking. 2. 4. 2 Asymmetrical Keys Asymmetrical keys are slightly more complicated, but, logistically, much easier to manage. Asymmetrical keys allow information to be encrypted with one key and decrypted with a different key. The two keys used in this scenario are referred to as private and public keys, or the ones you keep to yourself and the ones you distribute to your remote users.Consider this example: Letââ¬â¢s call our business FQT and HIQT. FQT has a set of two keys, a public key and a private key. His public key has been prog rammed to encrypt data so that only his own private key can decipher it. In order to communicate securely, FQT hands his public key to HIQT and tells him to encrypt anything he sends with that code. Using this asymmetrical keying method, both are assured that only FQT will be able to read those transmissions because he retains the private decoder key. If the communication is to be bi-directional, HIQT would share his public key with FQT in the same manner. . 5 Key Management Configuring pre-shared secrets in smaller VPNs does not necessarily require software automation or large infrastructure investments. However, larger networks might benefit from deploying a Public Key Infrastructure (PKI) to create, distribute, and track digital certificates on individual-user basis. You can use pre-shared keys or digital signatures if your equipment supports these authentication alternatives. However, if you decide to use certificates, there are options. For example, you may use third-party Cert ificate Authority services.Or, you may build your own Certificate Authority using software from Entrust, Xcert, or Baltimore Technologies. Either option will help you establish a comprehensive PKI, which is especially useful in large organizations needed to extend secure, limited network access beyond their own internal users to business partners and customers. 2. 6 Authentication The last bit of housekeeping involved in VPN transmission is authentication. At this step, recipients of data can determine if the sender is really who he says he is (User/System Authentication) and if the data was redirected or corrupted enroute (Data Authentication). . 6. 1 User/System Authentication Consider, again, our two business named FQT and HIQT. When FQT receives a message signed from HIQT, FQT picks a random number and encrypts it using a key which only HIQT should be able to decode. HIQT then decrypts the random number and re-encrypts it using a key only QT should be able to decode. When FQT ge ts his number back, he can be assured it is really IQT on the other end. 2. 6. 2 Data Authentication In order to verify that data packets have arrived unaltered, VPN systems often use a technique involving ââ¬Å"hash functions. A hash function creates a sort of fingerprint of the original data. It calculates a unique number, called a hash, based on fixed or variable length values of unique bit strings. The sender attaches the number to the data packet before the encryption step. When the recipient receives the data and decrypts it, he can calculate his own hash independently. The output of his calculation is compared to the stored value appended by the sender. If the two hashes do not match, the recipient can be able to assume the data has been altered. 3.VPN Protocols used for tunneling 3. 1 IPSec IPSec is a standard for secure encrypted communication that provides two security methods: Authenticated Headers (AH) and Encapsulating Security Payload (ESP). AH is used to authenticate packets, whereas ESP encrypts the data portion of packets. It can work in two different modes: transport mode and tunnel mode. IPSec is commonly combined with IKE as a means of using public key cryptography to encrypt data between LANs or between a client and a LAN. IKE provides for the exchange of public and private keys. 3. 2 PPPIn networking, the Point-to-Point Protocol (PPP) is commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption, and compression. 3. 3 L2TP Layer 2 Tunneling Protocol (L2TP) is an extension of the long protocol used to establish dial-up connections on the Internet, Point-to-Point Protocol (PPP). L2TP uses IPSec rather than MPPE to encrypt data sent over PPP. 3. 4 PPTP Point-to-Point Tunneling Protocol (PPTP) is commonly used by remote users who need to connect to a network using a dial-in connection of modem.PPTP uses Microsoft Point-to-Point Encryption (MPPE) to encrypt data that passes between the remote computer and the remote access server. 3 Technical Review of IPSec over VPN 4. 1 IPSec IPSec is the Internet standard protocol for tunneling, encryption, and authentication. It was designed to protect network traffic by addressing basic usage issues including:- â⬠¢ Access control â⬠¢ Connection integrity â⬠¢ Authentication of data origin â⬠¢ Protection against replays â⬠¢ Traffic flow confidentiality The IPSec protocol allows two operational modes.In Transport mode, everything behind the packet and not including the IP header is protected. In Tunnel mode, everything behind and including the header is protected, requiring a new pseudo IP header. While the IPSec protocol was under development, two other protocols ââ¬â L2TP and PPTP used as temporary solutions. L2TP (Layer 2 Tunneling Protocol) encloses non-Internet protocols such as IPX, SNA, and AppleTalk inside an IP envelope. However, L2TP has to rely on other protocols f or encryption functions. PPTP (Point-to-Point Tunneling Protocol) is a proprietary Microsoft encryption and authentication protocol.Although originally developed as a temporary solution, Microsoft continues to deploy L2TP as its tunneling protocol instead of IPSec tunneling. When comparing the three, IPSec is, the most widely used protocol, and the only one that addresses future VPN environments (such as new IP protocols). 4. 1. 2 IPSec Architecture The architecture of the IPSec implementation refers to the selection of device and software to provide IPSec services and the placement of IPSec endpoints within the existing network infrastructure.These two considerations are often closely tied together; For example, a decision could be made to use the existing Internet firewall as the IPSec gateway. This section will explore three particular aspects of IPSec architecture:- gateway placement, IPSec client software for hosts, and host address space management. Fig: Gateway-to-Gateway VPN for Remote Office Connectivity 4. 1. 3 IPSec Functions Internet Protocol Security (IPSec) has emerged as the most commonly used network layer security control for protecting communications. IPSec is a framework of open standards for ensuring private communications over IP networks.Depending on how IPSec is implemented and configured, it can provide any combination of the following types of protection: Confidentiality. IPSec can ensure that data cannot be read by unknown parties. This is accomplished by encrypting data using a cryptographic algorithm and a secret key. A value known only to the two parties exchanging data. The data can only be decrypted by someone who has the secret key. Integrity. IPSec can determine if data has been changed (intentionally or unintentionally) during transit. The integrity of data can be assured by enerating a message authentication code (MAC) value, which is a cryptographic checking sum of the data. If the data is altered and the MAC is recalculated , the old and new MACs will be different. Peer Authentication. Each IPSec endpoint confirms the identity of the other IPSec endpoint with which it wishes to communicate, ensuring that the network traffic and data is being sent from the expected host. Replay Protection. The same data is not delivered multiple times, and data is not delivered grossly out of order. However, IPSec does not ensure that data is delivered in the exact order in which it is sent.Traffic Analysis and Protection. A person monitoring network traffic does not know which parties are communicating, how often communications are occurring, or how much data is being exchanged. However, the number of packets being exchanged can be counted. Access Control. IPSec endpoints can perform filtering to ensure that only authorized IPSec users can access particular network resources. IPSec endpoints can also allow or block certain types of network traffic, such as allowing Web server access but denying file sharing. 4. 1. 4 IP Sec FundamentalsIPSec is a collection of protocols that assist in protecting communications over IP networks. IPSec protocols work together in various combinations to provide protection for communications. The three primary components of the IPSec protocol that provides the protections for the communication are ESP, AH and IKE. Encapsulating security Payload (ESP) ESP is the second core IPSec security protocol. In the initial version of IPSec, ESP provided only encryption for packet payload data. It can perform authentication to provide integrity protection, although not for the outermost IP header.Also, ESP. s encryption can be disabled through the Null ESP Encryption Algorithm. Therefore, in all but the oldest IPSec implementations, ESP can be used to provide only encryption; encryption and integrity protection; or only integrity protection Authentication Header (AH) AH, one of the IPSec security protocols provides integrity protection for packet headers and data, as well as user authentication. It can optionally provide replay protection and access protection. AH cannot encrypt any portion of packets.In the initial version of IPSec, the ESP protocol could provide only encryption, not authentication, so AH and ESP were often used together to provide both confidentiality and integrity protection for communications. Because authentication capabilities were added to ESP in the second version of IPSec AH has become less significant; in fact, some IPSec software no longer supports AH. However, AH is still valuable because AH can authenticate portions of packets that ESP cannot. Internet Key Exchange (IKE) The purpose of the Internet Key Exchange (IKE) protocol is to negotiate, create, and manage security associations.Security association is a generic term for a set of values that define the IPSec features and protections applied to a connection. It can also be manually created, using values agreed upon in advance by both parties, but these security associations c annot be updated; this method does not scale for a real-life large-scale VPNs. In IPSec, IKE is used to provide a secure mechanism for establishing IPSec-protected connections. 4. 1. 5 IPSec Protocol Basics Transport mode is used to provide secure communications between hosts over any range of IP addresses.Tunnel mode is used to create secure links between two private networks. Tunnel mode is the obvious choice for VPNs; however, there are some concerns about using tunnel mode in a client-to-site VPN because the IPSec protocol by itself does not provide for user authentication. However, when combined with an authentication system like Kerberos, IPSec can authenticate users. 4. 1. 6 Cryptography Used in IPSec Sessions Cryptography policy involves choosing encryption and integrity protection algorithms and key lengths. Most IPSec implementations offer the HMAC-MD5 and HMAC-SHA-1 hashing algorithms.Neither of these algorithms is computationally intensive. Although both plain MD5 and pl ain SHA-1 have known weaknesses, both are still considered sufficiently secure in their HMAC versions. In some implementations of IPSec, the cryptography policy settings are not immediately apparent to admin. The default settings for encryption and integrity protection, as well as the details of each setting, are often located down several levels of menus or are split among multiple locations. It is also challenging with some implementations to alter the settings once they have been located. . 1. 7 Authentication Used for Identifying IPSec IPSec implementations typically support two authentication methods: pre-shared keys and digital signatures. To use pre-shared keys, the IPSec admin creates a key or password string, which is then configured in each IPSec device. Pre-shared keys are the simplest authentication method to implement, but key management is challenging. Because of scalability and security concerns, pre-shared key authentication is generally an acceptable solution only f or small-scale implementations with known IP addresses or small IP address ranges.In the digital signature method, a certificate identifies each device, and each device is configured to use certificates. Two IPSec endpoints will trust each other if a Certification Authority (CA) that they both trust has signed their certificates. Many organizations are currently implementing public key infrastructures (PKI) for managing certificates for IPSec VPNs and other applications such as secure e-mail and Web access. 5. Conclusion VPNs allow users or corporations to connect to remote servers, branch offices, or to other companies over internetwork of public, while maintaining secure communications.In all of these cases, the secure connection appears to the user as a private network communicationââ¬âdespite the fact that this communication occurs over internetwork of public. VPN technology is designed to address issues surrounding the current business trend toward increased telecommuting a nd widely distributed global operations, where workers must be able to connect to central resources and communicate with each other. This paper provides an overview of VPN, VPN over IPSec and describes the basic requirements of useful VPN technologies: user authentication, address management, data encryption, key management, nd multiprotocol support. 6. Reference 1. S. Farnkel, K. Kent, R. Lewkowski. (December 2005). Guide to IPSec VPN. Available: http://csrc. nist. gov/publications/nistpubs/800-77/sp800-77. pdf. Last accessed January 20 2011. 2. Tom Olzak. (Jan22, 2007). SSTP: Microsoft VPN. Available: http://www. techrepublic. com/blog/security/sstp-microsofts-vpn/149. Last accessed 25 January 2011. 3. Open VPN. (2011). Open VPN cryptographic layer. Available: http://openvpn. net/index. php/open-source/documentation/security-overview. html. Last accessed 28 January 2011. 4. Erik Rodrigues-Types of VPN [online]. Resources as well as Images) Available from: http://www. skullbox. net /vpn. php[Accessed on: Feb 12 2011] 5. Internet Protocol Security [online]. Available from: http://www. interpeak. com/files/ipsec. pdf[Accessed on: Feb 4 2011] 6. SSL VPN VS. IPSec VPN [online]. Available from: http://www. arraynetworks. net/ufiles/File/SSLVPNvsIPSecWhitePaper021006. pdf[Accessed on: January 29 2011] 7. Available from: http://www. windowsecurity. com/articles/VPN-Options. html[Accessed on: Feb 14 2011 ] 8. Download the Green Bow IPSec VPN client [online]. Available from: www. thegreenbow. com/vpn/vpn_down. html [Accessed on: Feb 2012] . YouTube video of using the Green Bow software Available from: http://www. youtube. com/watch? v=m6fu6saaNhQ [Accessed on: Jan 29 2008] 7. Appendix The step by step setup of ââ¬Å"The Green Bow IPSec VPN clientâ⬠is described below. Running the setup file. Language screen appears and click OK. Fig: Choose language screen. Welcome screen appears and click next. Fig: Setup Welcome screen. License and information regarding license s then click I Agree. Fig: License and information screen. Install location screen appears and click next. Fig: Installation location screen. Choosing start menu folder screen appears and click Install.Fig: start menu folder screen. Installing screen appears. Fig: Installing setup screen. Windows Security screen appears and click install. Fig: Windows Security screen. Setup Complete screen appears and click finish Fig: Completing Setup screen. How to use This Software System Tray Icon VPN Configuration Three step Configuration Wizard Step 1 of 3: Choice of remote equipment You must specify the type of the equipment at the end of the tunnel: VPN gateway. Step 2 of 3: VPN tunnel parameters You must specify the following information: the public (network side) address of the remote gateway he preshared key you will use for this tunnel (this preshared key must be the same as key in the Gateway) the IP address of your company LAN (e. g. specify 192. 168. 1. 0) Step 3 of 3: Summary The thi rd step summaries your new VPN configuration. Other parameters may be further configured directly via the ââ¬ËConfiguration Panel' (e. g. Certificates, virtual IP address, etc). VPN Tunnel Configuration How to create a VPN Tunnel? To create a VPN tunnel from the Configuration Panel (without using the Configuration Wizard), you must follow the following steps: 1. Right-click on ââ¬ËConfiguration' in the list window and select ââ¬ËNew Phase 1' 2.Configure Authentication Phase (Phase 1) 3. Right-click on the ââ¬Ënew Phase 1' in the tree control and select ââ¬ËAdd Phase 2' 4. Configure IPSec Phase (Phase 2) 5. Once the parameters are set, click on ââ¬ËSave ; Apply' to take into account the new configuration. That way the IKE service will run with the new parameters 6. Click on ââ¬ËOpen Tunnel' for establishing the IPSec VPN tunnel (only in ââ¬Å"IPSec Configurationâ⬠window) VPN Configuration Please refer to Phase 1 and Phase 2 for settings descriptions. Authe ntication or Phase 1 What is Phase 1? ââ¬ËAuthentication' or ââ¬ËPhase 1' window will concern settings for Authentication Phase or Phase 1.It is also called IKE Negotiation Phase. Phase 1's purpose is to negotiate IKE policy sets, authenticate the peers, and set up a secure channel between the peers. As part of Phase 1, each end system must identify and authenticate itself to the other. Interface Network interface IP address of the computer, through which VPN connection is established. Remote Gateway IP address or DNS address of the remote gateway (in our example: gateway. domain. com). This field is necessary. Pre-shared key Password or shared key with the remote gateway. IKE Encryption algorithm used during Authentication phase (DES, 3DES, AES, AES128, AES192, AES256).Authentication algorithm used during Authentication phase (MD5, SHA-1, SHA-256). Key group is key length. Phase1 Advanced Settings Description Config-Mode If it is checked, the VPN Client will activate Config-M ode for this tunnel. Config- Mode allows VPN Client to fetch some VPN Configuration information from the VPN gateway. If Config-Mode is enabled, and provided that the remote Gateway supports, the following Parameters will be negotiated between the VPN Client and the remote Gateway during the IKE exchanges (Phase 1): Virtual IP address of the VPN Client DNS server address (optional)WINS server address (optional) Aggressive Mode If checked, the VPN Client will used aggressive mode as negotiation mode with the remote gateway. IPSec Configuration or Phase 2 What is Phase 2? ââ¬ËIPSec Configuration' or ââ¬ËPhase 2' window will concern settings for Phase 2. The purpose of Phase 2 is to negotiate the IPSec security parameters that are applied to the traffic going through tunnels negotiate during Phase 1. Phase 2 Settings Description VPN Client address Virtual IP address used by the VPN Client inside the remote LAN: The computer will appear in the LAN with this IP address.It is import ant this IP address should not belong to the remote LAN (e. g. , in the example, you should avoid an IP address like 192. 168. 1. 10). Address type The remote endpoint may be a LAN or a single computer, In case the remote endpoint is a LAN, choose ââ¬Å"Subnet addressâ⬠or ââ¬Å"IP Rangeâ⬠. When choosing ââ¬Å"Subnet addressâ⬠, the two fields ââ¬Å"Remote LAN addressâ⬠and ââ¬Å"Subnet maskâ⬠become available. When choosing ââ¬Å"IP Rangeâ⬠, the two fields ââ¬Å"Start addressâ⬠and ââ¬Å"End addressâ⬠become available, enabling TheGreenBow IPSec VPN Client to establish a tunnel only within a range of a predefined IP addresses.The range of IP addresses can be one IP address. Incase the remote end point is a single computer, choose ââ¬Å"Single Addressâ⬠. When choosing ââ¬Å"Single addressâ⬠, only ââ¬Å"Remote host addressâ⬠is available. Remote address This field is ââ¬Å"Remote LAN addressâ⬠depending of the add ress type. It is the remote IP address or LAN network address of the gateway that opens the VPN tunnel. Phase2 Advanced Settings Script configuration Scripts or applications can be enabled for each step of a VPN tunnel opening and closing process: Before tunnel is opened Right after the tunnel is opened Before tunnel closes Right after tunnel is closedRemote Sharing Global Parameters Lifetime (sec. ) Default lifetime for IKE rekeying. Minimal lifetime for IKE rekeying. Maximal lifetime for IKE rekeying. Default lifetime for IPSec rekeying. Maximal lifetime for IPSec rekeying. Minimal lifetime for IPSec rekeying. Dead Peer Detection (DPD) Check interval (sec. ) Interval between DPD messages. Max number of retries Number of DPD messages sent. Delay between retries (sec. ) Interval between DPD messages when no reply from remote gateway. Miscellaneous Retransmissions How many times a message should be retransmitted before giving up. USB Mode Step 1 Step2 Step3 Step4
Talent Development for Sustainability Essay Example | Topics and Well Written Essays - 2500 words
Talent Development for Sustainability - Essay Example At the same time, an organizationââ¬â¢s ability to manage knowledge becomes a critical factor in improving productivity of the pooled talent. Questions always arise on the interrelatedness of talent development and knowledge management. The two are undoubtedly independent, but there has to be interplay for an organization to post consistent success. One thing that should be understood at this point is that knowledge management is derived from historical engagements and experiences and remains put in an organization. On the other hand, talent management practices maybe defined and consistent but actual talent as represented by certain employees will continually change as people come and leave the organization. Irrespective of these differences in practice and form the two are major determinants of organization success. In this study, talent development and knowledge management will be evaluated and their place in determining organization success. ... Though different, these two definitions express knowledge management as a lifelong organization activity which seeks to ensure organization effectiveness (King, 2010.p.4). The basis of such efficiency is past knowledge and experiences which are utilized to ensure the organizations current and future situations are improved. On the other hand, talent development is a concept under talent management which encompasses assessing, developing and deploying the right people with the right skills into the right jobs (Galagan, 2011.p. 2). Talent management and development has its root in the McKinseyââ¬â¢s ââ¬Å"War for Talentâ⬠study which highlighted recruitment as the number one concern for business leaders (Caplan 1). Looking at the definitions, it is easy to look at talent management and development as the most crucial aspect of an organization. This is mainly because it determines the people in an organizationââ¬â¢s fold and their different abilities. However, an organizatio n that seeks growth must seek to be efficient. Efficiency is not always determined by the caliber of employees (talent) but is also defined by the organizationââ¬â¢s structure and culture. It is in the latter that knowledge management assumes the greatest importance. This is because overtime, an organization has learnt crucial lessons on that which works and that which does not. Through managing these experiences an organization is able to cultivate the right attitude, develop the appropriate culture and maintain a productive management structure and employee approaches. The repository for these experiences is the knowledge management system. The process of knowledge management involves acquisition, creation, refinement, storage, transfer, sharing, and utilization (White, 2008.p.4). The knowledge
Wednesday, August 28, 2019
The Concept of Organizational Leadership Essay Example | Topics and Well Written Essays - 1250 words
The Concept of Organizational Leadership - Essay Example Second, leaders must be able to articulate that vision to other members of the team and to obtain their commitment to that objective. Thirdly, leaders must develop and implement a plan to attain that goal. Good leadership is a result of careful application of the skills. Leadership in the 21st Century requires a special skill set because of the changing pace of business, fluctuating market conditions, increased competition, and changes in the workforce. Successful leaders are vital to successful organizations, so it is imperative that today's leaders are skilled at using techniques that fit our changing world. Leadership also concerns listening, as well as making a real connect with other people. Leaders create followers. The duty of a leader is to support people to get things done. Leaders and followers are symmetrical because they need each other. They discover ways to make groups of followers, and with that, group they change a lot of things. After examining the evolution of leadership I realized that it demonstrated leadership in today's world requires more than the ability to manipulate data and manage people. To survive in the 21st century, we're going to need a new generation of leaders--leaders, not managers. These two managerial functions are certainly aspects of the commonly held views of traditional leadership, but to survive in today's world, leaders cannot rely only on managerial skills. To develop strong leadership, leaders need to think about their role in a more holistic sense by shifting away from traditional paradigms of leadership and employing a learning attitude within their leadership role. Holistic leadership requires using creative and critical thought as an agent of change. In the past 15 years, leadership has undergone tremendous change. The typical decision-making through the top-down corporate hierarchical structure has given way to organizational teams empowered with decision-making capabilities .I believe that creativity and critical thought play a key role in successful leadership. As companies become larger and more diverse, necessity dictates that leadership be a shared activity. Shifting the locus of control from a single individual to smaller groups of stakeholders ensures that the business will continue to expand and remain competitive. Consider the world of competitive sports as an example of team members working toward a common goal. The coach plays the role of team leader and each player uses his strength for the success of the team. Good leaders know that leadership is dynamic; every new experience provides opportunities for reflection, learning, and change. In athletics, the team works as a whole to practice for improvement. High performing teams are supportive and encouraging causing the creativity of the work environment to mature at warp speed. Effective leaders develop work teams to facilitate learning which leads to more rapid growth and change. As the para digm shifts from top down leadership to team leadership, change occurs. Senge's (1990) theory suggests that effective leadership combines five
Tuesday, August 27, 2019
Technology Management Essay Example | Topics and Well Written Essays - 750 words
Technology Management - Essay Example I have discussed various strategies and techniques that can be used to improve the management of technology in a business organization and their impact. Each strategy is given a specific time which if accurately followed will produce some projected results. Technology Management The role of technology in the production industry can never be overlooked. It is clear that the more the use of advanced technology in the industry the better the results. However, the use of technology must be managed appropriately to ensure that it has been used efficiently and that the technology meets the expected results. Hence it is good for a business organization that incorporates technology in production to consider proper management of technology to increase profits and avoid losses. There are several issues of concern that are practices of poor technology management. One of them is having a weak internal technical support (Treat, 2011). Often the technical support is given to the computer experts w ho perform the work in addition to their regular job responsibilities. This causes the expert not to give their full attention to this work and this leads to poor performance. Another aspect is the keeping of older technology for too long. Old methods of technology in production need a lot of repair and fail often. This leads to a high business downtime, where the systems of production are rarely available (Bidgoli, 2010). This means that production time is wasted during repair hence reducing production. Older technology also work slowly and inefficiently hence does less work compared to use of up to date technology. Hence we can conclude that keeping older technology for too long is a poor practice that heavily costs productions. One more issue concerning poor technology management is lack of proper training to the employees (Tesar et al. 2004). Proper understanding of a computer system to the employee will enable them to easily perform the expected operations. When new technology or application is introduced into the organization, proper training of the users is essential for increased productivity. Another very crucial aspect of management of technology is the lack keeping the current software licenses (Harrison & Samson, 2002). If a business organization fails to keep their software licenses current, they greatly miss out on critical software updates. This also hinders access to technical support that would expose the users to new ideas and features and this holds back people from being as productive as possible. There are several strategies and techniques that can be used to improve technology management. One of it is to keep the users well trained on all the operations of technology. Training should not be done only when the user in been introduced to the technology, but should be frequently done so as to perfect the users knowledge and expertise on the use of technology. Another very effective technique is to put in place a strong internal technical sup port team. This team should be completely dedicated to technical operations support and research and should not have any other responsibilities. This empowers the team to concentrate on the use of technology in the most efficient way to increase production. Use of a good data backup is critical in good technology management. This technique ensures regular data backup to all business related information. Good policies and tools to manage backup of information regularly should be established. This ensures that even if the
Monday, August 26, 2019
Death Penalty Assignment Example | Topics and Well Written Essays - 250 words
Death Penalty - Assignment Example This is the only way of undertaking death penalty in Colorado. Earlier, there were a number of ways in which the death sentence was being undertaken that included gas chamber etc (Palmer, 2013). The debate of death penalty is Colorado is not proposing the demolishment but rather consider it as an effective strategy against criminal offences. However, the implementation requires a lot of investigation before the overall decision. Recently, the case of Nathan Dunlap has gained much attention by the media as the legislation has been questioned for its effective decision-making in finding necessary evidence (Palmer, 2013). In order to make sure that all acute criminal offences are being addressed with proper implementation of death penalty, seventeenth aggravating factors were listed. These included the murderer to be heinous, murdererââ¬â¢s purpose to gain pecuniary benefits, the victim was kept as a hostage, the victim was personnel of governmental institution, the defendant committed treason against the national interest etc. (Palmer,
Sunday, August 25, 2019
Benefits of E-Recruitment on Human Resource Supply Chain Management Dissertation
Benefits of E-Recruitment on Human Resource Supply Chain Management - Dissertation Example The researcher has taken help of diffusion of innovation theory (DIT) in order to formulate the research model. Findings ââ¬â Benefits of e-recruitment such as cost efficiency, broader access to potential candidateââ¬â¢s profile and short recruitment cycle can positively increase efficiency for human resource supply chain management for Indian healthcare companies and also can help them to achieve competitive advantage in terms of profitability and return on investment. Originality/value ââ¬â This research will try to shed light on relational matrix between e-recruitment and human resource supply chain management in terms of Indian healthcare industry perspective, the research problem for the study is ignored by the previous researchers for a long time. Findings of the researcher will create not only scope for future researchers but also help companies to decide e-recruitment strategy. Keywords ââ¬â E-recruitment, Recruitment, Human resource management, Health care ind ustry, India Paper type- Research paper Table of Contents Table of Contents 3 Chapter 1: Introduction 4 Chapter 2: Project approach 5 Chapter 3: Literature review 6 Chapter 4: Critical evaluation and analysis of the data 11 Chapter 5: Discussion 26 Chapter 6: Conclusion 29 Reference 31 Appendices 38 Chapter 1: Introduction According to research scholars such as Ensher et al (2002), paradigm shift of traditional human resource strategy to e-HR strategy is a major breakthrough in the field of human resource management. Ensher et al (2002, p. 238) have defined e-HR policies as, ââ¬Å"increased emphasis on HR as a strategic business partner whose primary challenge is to recruit, develop and retain talented employees for the organizations.â⬠Other research scholars such as Lengnick-Hall and Moritz (2003) and Ulrich (2000) have stated that e-HR policies and e-recruitment not only help companies to reduce time and cost regarding recruiting employees through ââ¬Å"HR middlemanâ⬠but also help make HR professionals more competent by challenging them to learn new technological applications. On the other hand, Joyce (2002) and Dixon (2000) have pointed out that, e-recruitment or recruiting employees by using the internet has become a revenue generating options for third party recruiters. E-recruitment has become latest buzzword in service sector of India and other South Asian countries, South-East Asian countries (Labanyi, 2002; Fisher, 2001; Gomolski, 2000 and Galanaki, 2002). Teo (2001), Sanchez-Franco and Roldan (2005), Liu and Wang (2007) and Karlsen et al (2006) have found that, e-recruitment system with less technological complexity attracts more job seekers, hence it is a challenge for organization to build an effective e-recruitment strategy which is simple but effective. According to the limited knowledge of the researcher, very few researchers have tried to understand benefits of e-recruitment in context to Indian healthcare service industry; such g ap in the literature has encouraged the researcher to develop following research objectives. 1.1 Research objective To investigate how benefits of
Saturday, August 24, 2019
Macroeconomics Essay Example | Topics and Well Written Essays - 2500 words - 2
Macroeconomics - Essay Example The organization of petroleum exporting countries decides by them the cost per barrel of petroleum. The present price of petroleum in the world market has skyrocketed in the last few years because the OPEC members have agreed to limit the output per country. Since the agreed output has been reduced, the prices of petroleum per barrel have skyrocketed for the past few years. A study of the non ââ¬â OPEC member nations, government and other academic researchers have shown that the non OPEC member nations may have equal sales with the OPEC member states in 2010. The worst case scenario is predicted by some scientists showing the worldââ¬â¢s population will squander the limited petroleum oil supply. When the petroleum will dry up, then the worldââ¬â¢s population will have a feeling that we are approaching the end of the world. Exxon has warned OPEC countries that the oil supply will not last forever. In some countries, solar energy research have been successful replacements for petroleum. Oil production can be subdividied between the OPEC member countries and the non OPEC. Countries have started looking for non-petroleum product replacements. An example is the electric power batteries. The solar powered homes and calculators are big successes. The introduction of the substitutes will help lower the the increasing barrel cost of petroleum (fossil) fuel. In fact, ââ¬Å"Many large-scale projects, such as shale processing and synfuels (e.g., coal to liquids), were begun in the early 1980s, but these were abandoned when the price of oil fell drastically in 1986. However, research has continued at a steady pace since that time. Even producing oil from tar sands is now a alternative major industry in Canada. Plants to produce liquids from natural gas are operational, and much larger plants are under construction. Ethanol production from sugar cane and corn is now done on an industrial scale. Thus,
Friday, August 23, 2019
Unemployment Rate or GDP OR CPI Research Paper Example | Topics and Well Written Essays - 500 words
Unemployment Rate or GDP OR CPI - Research Paper Example Thus, since GDP is a full representation of economic growth and production, it has a relatively large impact on nearly every aspect in the economy. When a certain economy is considered healthy, there are a number of related characteristics; low rate of unemployment and an increase in the level of wages as many businesses demand more labor in order to cater for the ever growing economy (Brezina, 20). Any slight change in the level of GDP is significant to a given economy since it affects the entire stock market. Economists have always argued that any bad economy is always associated with lower profits which implies that there are lower prices o stock in the markets. Thus, many investors in any economy will ever worry about the negative growth of GDP as it is a sole factor used to determine if an economy is on recession or not. A recession is associated with declining revenues in businesses, unemployment and layoffs (Lochner, 3). Moreover, when the growth rate of GDP is relatively fast, most Federal Reserve raise the rates of interest in order to stem inflation or rather the increasing prices in an economy. This could imply that the loans which are meant for homes and cars will become more expensive and thus businesses will experience high cost of borrowing. GDP is an extremely important measure in any countryââ¬â¢s economy. Despite the fact that GDP cannot be easily determined, its value represents so many aspects in any given economy. This measure is significant to overall spending of a nation since depressions and recessions of a particular country are largely caused by the overall rate of spending. Furthermore, GDP is a measure of confidence since when the government, companies and individuals spend; it is a likely indication of a growing economy. However, when no one is spending, it is a likely indication of a contracting economy. Therefore, this
Thursday, August 22, 2019
The issue of tragedy Essay Example for Free
The issue of tragedy Essay The term, tragedy, by dictionary definition, can be defined as A story with a sad or unhappy ending. (Arthur Miller, Tragedy and the Common Man). Although there is some truth to this, the true definition of tragedy goes much deeper. The notion of tragedy has been a part of English literature since the beginning of the Classical times. Tragedy is available in almost all literary forms, such as, novels, play wrights, film, etc. Shakespeare, for example, has written numerous world renowned tragedies since the turn of the seventeenth century. Four centuries later, with all the changes to the world of literature, tragedy continues to prevail, as a popular form of literature. Through comparing and contrasting William Shakespeares, Hamlet, with Arthur Millers, Death of a Salesman, it is clear that tragedy continues to have many of the same features as it did so long ago and it continues to appeal to audiences today. This is demonstrated through the tragic hero, the heros tragic flaw, and the catharsis. With these three elements included, a more exact definition of tragedy is defined by Aristotle as, the imitation of an action that is serious, complete, and of a certain magnitude, in language embellished with each kind of artistic ornament, the several kinds being found in separate parts of the playthrough pity and fear effecting the proper purgation of these emotions. (Aristotle, The Poetics). Although each and every tragedy is slightly different or even quite dissimilar, every true tragedy includes the presence of a tragic hero. The tragic hero can be defined as man as both beautiful and terrible (Class notes, Tragedy and The Tragic Hero). It is most often the heros unjustified life which turns his story into a tragedy. The tragic hero has been a critical role since the beginning of tragedies and it continues to be today. However, views of how the hero should rank in society, have changed over time. According to Aristotle, it is thought that the heros position in society is to be much above the average man. Aristotle defines the hero to be a character of noble stature and has greatness. (Aristotle, Aristotles Idea of Tragedy). This can be seen in Shakespearean time, through such plays as, Hamlet. Hamlets noble stature comes from his position as a prince; he is the son ofà the late king and nephew to the new king. Hamlets strong loyalty and dedication to his family has been interpreted as his greatness by many critics. This can be seen as Hamlet learns the truth about his fathers death, and his father asks him to seek revenge on his uncle, the new king, Haste me to knowt, that I, with wings as swift As meditation or the thoughts of love, May sweep to my revenge. (Shakespeare, Hamlet, III, v, 23-24). Hamlet reveals that he will do whatever it takes to seek revenge upon his uncle and is not worried about the consequences. With this quote, It becomes obvious that Hamlet is in fact the tragic hero of the play. Although it is partly the consistency of tragic heroism that attracts viewers to tragedy today, the status of the tragic hero has been viewed differently by great philosophers today, than it was hundreds of years ago. Arthur Miller, for example, believes that the common man is as apt a subject for tragedy in its highest sense as kings were. (Arthur Miller, Tragedy and the Common Man). The tragic hero, Willy Loman, in Arthur Millers, Death of a Salesman , unquestionably conforms to this description. Willy Loman is a common man, which is evident through his family life, his career as a salesman, and his position in society. Viewers can easily identify with him, which further classifies him as a tragic hero. Although Willy is a common man, he still has some greatness. His greatness lies in his struggle to claim some shred of dignity. He fights back against a system that is bigger than he is, that destroys little men like him. He demonstrates an ability for self sacrifice. (Class notes, Death of a Salesman- Is it a Tragedy). This is demonstrated through Willys discussion with Howard about getting further ahead in his business, You cant eat the orange and throwà the peel away-a man is not a piece of fruit. (Arthur Miller, Death of a Salesman, pg. 84). Willy is attempting to justify his position in society and fight back against the system, which he inevitably fails miserably at doing. By comparing Shakespeares Hamlet with Willy Loman in Arthur Millers, Death of a Salesman, it is evident that the tragic hero is a key element to every tragedy. Although their positions in society are slightly different theyà both posses qualities of greatness and will eventually be doomed by these qualities. A tragedy would not be a true tragedy without the presence of the tragic hero, which is why audiences are still attracted to tragedies after hundreds of years. Although the tragic hero is acclaimed to be deemed with the qualities of greatness, the tragic hero is certainly not perfect. In fact, this strong imperfection is know as the heros tragic flaw. The heros tragic flaw is what distinguishes him from any other character. This can be seen in both Death of a Salesman and Hamlet. It may be exactly this unique tragic flaw which continually attracts audiences to tragedies today. The heros tragic flaw is unique to each character and it is what makes him/her a true tragic hero. In Shakespeares, Hamlet, Hamlets tragic flaw comes from his boundless loyalty to his family. It is because he strives to follow his fathers orders to the absolute fullest that he eventually causes his own demise. Hamlet is overly passionate, indecisive, excessively intellectual, and overly infantile. He has never grown up. Hamlet suffers from oedipus complex and cannot accept the reality that he has a mother with sexual needs. It is his tragic flaw which make Hamlet bound for destruction. This becomes evident to the audience when Hamlet is in his mothers room and hears a scream, without looking he assumes it is the voice of Claudius, How now, a rat? Dead for a ducat, dead. [Makes a pass through the arras, Polonius falls and dies]. (Hamlet, III, iv, 72) This is Hamlets character flaw, he doesnt think before he acts, he simply wants to follow his fathers commands to the fullest and so he acts with excessive passion. The tragic hero always has the potential to excel in his greatness but he/she inevitably succumbs to his/her weaknesses/tragic flaw. (Class notes, Tragedy and the Tragic Hero). The tragic hero, Hamlet, is very different from Death of a Salesmans tragic hero, Willy Loman, yet the tradition of the tragic flaw continues. Willy Lomans tragic flaw differs dramatically from Hamlet, yet audiences are still attracted to the tragic flaw today as much as they were in Shakespearean time. In Arthur Millers, Death of a Salesman, Willy Lomans tragic flaw comes from the unnecessary, immense importance he puts upon success, class, and respect through the eyes of society. Willy becomesà obsessed with obtaining a high position in society that it becomes his only reason for living. It is his tragic flaw which eventually leads him to his own death. As Arthur Miller comments, the tragic feeling is evoked in us when we are in the presence of a character who is ready to lay down his life if need be, to secure one thing- his sense of personal dignity. (Arthur Miller, Tragedy and The Common Man). This describes Willy Loman exactly. The feeling of pity is evoked in viewers because Willys tragic flaw is so easy to identify with. Willys flaw has good intentions, for he wants Biff to follow in his footsteps and benefit from his values, but Willys true flaw is his blindness to see that his obsession with these values is causing his own demise. This is demonstrated when Willy gives his two sons advice about getting ahead in the world the man who makes an appearance in the business world, the man who creates a personal interest, is the man who gets ahead. Be liked and you will never want. (Miller, Death of a Salesman, Pg 33) Obtaining a high position in society and being respected in the business world are what Willy feels are the most important aspects of life. As Bradley writes, [The tragic hero] need not be good, but should have so much of greatness that in his error and fall we are vividly conscious of the possibilities of human nature. (Class notes, Tragedy and The Tragic Hero). The feeling evoked is that if waste. Both Hamlet and Willy had great possibilities in life but the blindness of their tragic fall caused them to waste their chances and waste their life. This expected tragic feeling has remained constant over time and is what continues to appeal to audiences time and time again. Tragedies are literary works which are continually filled with suffering, destruction, and most often death. However, through this suffering, the tragic concept is that man endures and gains through suffering. (Class notes, Tragedy and the Tragic Hero) The destruction in each tragedy is never meaningless, it has significant relevance. Although, emotions are aroused, tragedy does not leave viewers feeling depressed. The goal of a tragedy is to leave viewers in a state of catharsis. The word catharsis implies that tragedy purges, removes, or unclogs negative emotions, such as pity and fear that build up within the human spirit. (Some thoughts About Tragedy, bothà literary and mundane) Tragedy cleanses, purifies, and thus rids viewers of negative emotions, such as, anger, pity, and fear, and turns them into something good. Viewers endure the tragedy but then gain through suffering by purifying their unhealthy emotions into something healthy. Catharsism is evident in both Hamlet and Death of a Salesman and it continues to attract viewers to tragedies today, as it did hundreds of years ago. At the end of Hamlet, viewers are left with a very negative scene of blood, and many meaningless deaths. As depressing as it may seem, it is not meant to leave the audience feeling depressed. The audience is left with a feeling of cleansing, ridding any feelings of revenge. Viewers accept a feeling of a new beginning, due to the prior line of madness being destructed. Hamlet displays a portion of this optimism just before his death, Give me the cup. Let go. By heaven, Ill havet. O God, Horatio, what a wounded name, Things standing thus unknown, shall live behind me! If thou didst ever hold me in thy heart, Absent thee from felicity awhile, And in this harsh world draw thy breath in pain To tell my story (Hamlet, v, ii, 120). Although Hamlet is dying, he asks for his story to be told so others can benefit from the story of his life. It turns a depressing notion into something optimistic. Arthur Millers Death of a Salesman follows this same trait. Without personally reading or viewing, Death of a Salesman, one might think that Willy Loman taking his own life is a very depressing notion. However, like Hamlet, Death of a Salesman leaves the audience with the feeling of a catharsis when Willys life tragically ends. Audiences can easily relate to Willy Loman in his time of despair, as he fails again and again to obtain recognition from society. It is his entire reason for living until he eventually gives up and lays down his life in order for Biff to benefit. The tragedy allows the audience to purge themselves of feelings of pity and fear due to the strong connection with Willys character. Happy realizes what Willy has done for Biff and as he stands at his fathers funeral, Happy defends Willy by saying Im gonna show you and everybody else that Willy Loman did not die in vain. He had a good dream. Its the only dream you can have-to come out number-one man. He fought it out here, and this is where Im gonna win it for him. (Miller, Death of aà Salesman, Pg. 138-139). The audience realizes that Willy has almost turned his own defeat into a triumph, which replaces any negative emotions, with positive ones. There is no doubt that in every tragedy, there is endless suffering and destruction, however it is ones recognition with these feelings which allows the audience to cleanse themselves of these emotions and gain through the suffering. These qualities have been a large component of tragedy since tragedy began and continue to attract and appeal to audiences today. Tragedies are often extremely varied and each one is slightly different. The content of tragedies can be extremely diverse and often have nothing in common with any other tragedy. However, there are a few components which must be present in every true tragedy. Three important aspects which are contained in every true tragedy is the tragic hero, the heros tragic flaw, and the catharsis. This becomes evident through comparing and contrasting William Shakespeares, Hamlet, with Arthur Millers, Death of a Salesman. It is these features which allow tragedy to appeal to audiences today, just as much as they did hundreds of years ago. Tragedies have been popular for centuries and they will continue to be popular for centuries to come.
Wednesday, August 21, 2019
Juvenile Offenders Essay Example for Free
Juvenile Offenders Essay Steinberg states that there are some issues which are very challenging to the society concerning the nature of human development and justice when it comes to serious juvenile crimes (para, 1). This is due to the fact that people do not expect crimes to be committed by children let alone children being criminals. The unexpected connection between childhood and criminality brings about a dilemma that is hard to resolve (Steinberg para, 1). Some of the ways out of this dilemma are: trying to redefine the offense as something of less magnitude than a crime and redefining the offender as somebody who is not actually a child. For almost a century now, the American society has chosen to redefine an offense as something less than a crime (Siegel and Welsh p, 211). Hoge, Guerra and Boxer states that most juvenile offenses have for long time been treated as delinquent acts that need adjudication within a separate justice system for juveniles (p, 154). This system is designed in such a way as to recognize the exceptional needs as well as the immature condition of young persons and stresses more on rehabilitation over punishment. Steinberg asserts that the two guiding principles that have prevailed concerning young people are that: they have different competencies as compared to adults, which necessitates adjudication in a different type of system, and that they have different potential for change and therefore qualify for a second chance as well as an attempt at rehabilitation (para, 4). The operations of juvenile courts are carried out under the presumptions that offenders are immature meaning that their development is incomplete, their judgment is immature, and their character is still undergoing development. However, in the recent past as Steinberg states, there has been a tremendous shift concerning the way crimes committed by juveniles are treated by policymakers as well as the general public (para, 6). This shift has resulted in great changes concerning policies that deal with the way juvenile offenders are treated. Gale argues that instead of choosing to defend offences committed by young people as delinquent, the society has opted to redefine them as adults and transfer them to the criminal justice system that deals with adult crime (p, 76). Some proponents in society have come to agree that there are those young offenders who should be transferred to the adult criminal justice system due to the fact that they pose a serious threat to the safety of the society where other juveniles live (Siegel and Welsh, p. 214). Proponents, as Hoge, Guerra and Boxer illustrates, argue that the magnitude of the offense committed by these youth deserves a relatively more harsh punishment (p. 174). They also argue that the history of repeated offenses do not augur well for definitive rehabilitation of juvenile offenders. This however, does not describe the large number of young people who are currently being put on trial in the adult criminal justice system. Steinberg argues that majority of these have been charged with crimes that are not as violent to merit such a harsh punishment (para, 7). When this transfer of juvenile offenders to adult system begins to become a rule instead of an exception, it characterizes a primary challenge to the very ground that the juvenile system was anchored in- that young people are different from adults. Debates concerning transfer policies can be viewed from different angles. Developmental psychologists would ask whether the differences drawn between people of various ages under the law are rational in light of what is known concerning age variation in different aspects of social, emotional, and intellectual functioning (Hoge, Guerra and Boxer, p. 79). One major issue based on developmental psychology that emerges is about the creation of a boundary between young people and adults in matters of criminal justice. Developmental psychology seeks to identify the scientific reasons that justify the separate treatment of adults and young people within the criminal justice system, especially with reference to the age bracket, 12-17 years, highly under political analysis currently (Steinberg para, 9). First and foremost, this age bracket is an intrinsically intermediary phase. It involves swift as well as dramatic changes in individualââ¬â¢s social, intellectual, physical, and emotional capacities. It is a phase where a line concerning competence and incompetence of individuals can be drawn. Secondly, teenage years are a period of potential flexibility (Gale p, 98). Young people are heavily influenced by experiences in school, at home, as well as other social settings. To the level that flexibility is possible, transfer of young people into a criminal justice system that rules out a rehabilitative response may be an unrealistic public opinion (Siegel and Welsh, p. 11). Adolescence is a decisive phase through which numerous developmental trajectories are firmly set up and increasingly hard to change. Numerous experiences that adolescents go through have devastating cumulative impacts. Irrational decisions and poorly formulated policies relating to young offenders may have unpredictable harmful outcomes (Gale, p. 104). According to Steinberg, mitigating factors such as mental illness, emotional stress and self defense should be critically evaluated when trying a young person (para, 14). A punishment that is fair to an adult may be unfair to a young person who was not aware of the penalties of his/her actions. It would therefore be unethical to give life sentences to juvenile offenders. The way laws are interpreted and applied should vary when dealing with a case in which a defendant understanding of the law is limited by intellectual and emotional immaturity. The repercussions of administering long and severe punishment are very different when the offender is a young person as compared to when he/she is an adult (Steinberg, para. 17).
Impact of FDI on Host Country
Impact of FDI on Host Country ABSTRACT This project critically examines the negative effects that FDI poses to the host economy. The impact of FDI on the host economy can be understood with the help of The Standard Theory of International Trade and The Theory of Industrial Organisation. FDI has both positive and negative impacts on the host-country. FDI has an adverse effect on the host countrys economy, environment, domestic firms, political environment, labour market and trade balance. Through this project, it is concluded that the government policies should be such that they exploit the benefits of FDI completely in order to overrule its drawbacks. INTRODUCTION There is an increasing acknowledgment to recognize the forces of economic globalization which first requires looking at Foreign Direct Investment (FDI) by multinational corporations (MNCs): that is, when a firm based in one country locates or acquires production facilities in other countries. (Blonigen, 2006). Over the past decade Foreign Direct Investment (FDI) has grown noticeably as a major form of international capital transfer. Between 1980 and 1990, world flows of FDI- defined as cross-border expenditures to acquire or expand corporate control of productive assets have approximately grown three times (Froot, 1993). ââ¬Å"FDI has turned out to be a major form of net international borrowing for Japan and the United States, the worlds largest international lender and borrower respectivelyâ⬠(Froot, 1993, pp. 1). The most introspective effect of FDI has been seen in developing countries, wherein annual Foreign Direct Investment flows have increased from an average of less than $10 billion in the 1970s to an annual average of $208 billion in 1999 (Source: UNCTAD). A large portion of global FDI is driven by mergers and acquisitions and internationalization of production in a range of industries (Graham and Spaulding, 2005). Despite the noticeable importance of FDI and MNCs in the world economy, research on the factors that decide FDI patterns and the impact of MNCs on parent and host countries is in its early stages. The most significant general questions are: what factors determine where FDI occurs, and what impacts do those MNC operations have on the parent and host economies? This report mainly analyses the negative impact of FDIs on host economies. FORIEGN DIRECT INVESTMENT ââ¬Å"Foreign Direct Investment reflects the objective of obtaining a lasting interest by a resident entity in one economy (ââ¬Å"direct investorâ⬠) in an entity resident in an economy other than that of the investor (ââ¬Å"direct investment enterpriseâ⬠)â⬠(OECD). In other words, it is a direct investment made by a corporation in a commercial venture in another country. What separates FDI from portfolio investment is the control over the investment (Gillies, 2005). In case of FDI at least 10 percent of the voting rights must be held by the foreign investing company (Daniels et al., 2004). The difference between FDI and other ventures in foreign countries is mainly that the new venture operates completely outside the economy of the companys home country. The main motivators behind FDI are resource acquisition, sales expansion and risk minimisation. Besides this governments may also encourage FDIs due to various political motives (Daniels et al., 2004). TYPES OF FDI Foreign Direct Investment can be classified into three broad categories on the basis of direction, target or motives. On the basis of direction FDI can be classified into Inward or Outward FDI. When foreign capital is invested in local resources, it is referred to as Inward FDI, on the other hand when investments are made by local firms in foreign resources it is referred to as Outward FDI. Outward FDI is also known as ââ¬Å"direct investment abroadâ⬠and is always backed by government support in case of any risks. On the basis of target FDI can be classified into Greenfield Investments, mergers and acquisition, horizontal and vertical FDI. Greenfield Investment refers to direct investment in new arenas or the development of existing amenities. This leads to creation of production capacity, employment opportunities, transfer of technology and expertise as well as linking of the host economy to the global marketplace. Mergers and acquisition are a major kind of FDI whereby there is a transfer of existing resources from local businesses to foreign businesses. Cross border mergers take place when the management of resources and business operations is relocated from a local company to a foreign company, with the local organisation becoming an associate to the foreign organisation. Acquisitions take place when the foreign company takes over a domestic company, and establishes itself as the new owner of the domestic company. Horizontal FDI refers to an investment made by a foreign company in the same industry in which it operates in its home country. Vertical FDI can be classified further into backward and forward vertical FDI. Backward Vertical FDI occurs when a domestic firm is provided input by a foreign firm in order to aid its production process whereas Forward Vertical FDI occurs when the output of a domestic firm is sold by an industry abroad it is known as forward vertical FDI. Lastly on the basis of motives, FDI can be classified into four types. The first type is of FDI takes place when the various factors of production may not be available in the home country of the firm or be more efficient in the host country, thereby encouraging firms to make investments. This is known as Resource seeking FDI. The second type of FDI which can be used as a defensive strategy is Market-seeking FDI. These investments are made either to maintain existing markets or to penetrate into new markets. The third type is Efficiency Seeking FDI, where the firms hope to increase their competency by exploiting the advantages of economies of scale and also common ownership. The firms thus try to achieve the objective of profit maximization. the last type is Strategy -asset seeking FDI, which is a common tactic used by firms to stop their competitors from acquiring resources. Thus these are the various types of FDI. IMPACT OF FDI ON HOST ECONOMY There are two approaches in economic theory which contribute to studying the effects of Foreign Direct Investment on host countries. One is the standard theory of international trade by Macdougall (1960). This theory is a ââ¬Å"partial equilibrium comparative-static approach intended to examine how marginal increments in investment from abroad are distributedâ⬠(Blomstrom, 1997, p.1). The main assumption of this model is that there is an increase in the marginal productivity of labour and a decrease in the marginal productivity of capital. The other theory was proposed by Hymmer (1960) and is called the theory of industrial organisation. The main question of the theory is why firms make investments in other countries in order to manufacture the similar goods they manufacture at home. The answer to this question has been rightly devised by Kindleberger, 1969, p.13), who says, ââ¬Å"for direct investment to thrive there must be some imperfection in markets for goods or factors, including among the latter technology, or some interference in competition by government or by firms, which separates marketsâ⬠. Thus firms of home countries must have some asset which is going to be lucrative for its associate in the home country (Blomstrom, 1997). Foreign Direct Investment has both positive and negative effects on the host economy. POSITIVE EFFECTS OF FDI ON HOST ECONOMY FDIs have a number of positive impacts on the host country. It encourages economic development by increasing the productivity and exports of the host countries. There are four channels which help in increasing the productivity of host country, namely imitation, skill acquisition, competition and exports (Gorg Greenaway, 2004). The local firms in the host countries benefit by the indirect technology transfer that takes place between the MNC and the domestic companies. Local firms can compete more successfully in the export markets by copying the superior technology or management techniques used by the multinationals (Blomstrom, 1991). Domestic firms become more exposed to the foreign markets and subsequently their knowledge of the international markets increases. The Managers and other qualified employees of the domestic firms acquire the superior managerial and technical skills, which increases their efficiency. Multinationals increase the existing market competition, instigating the local firms to become more efficient by investing in physical or human capital. They help to increase industrial efficiency and improve resource allocation in host countries by entering markets which had many entry barriers. Thus by entering these monopolistic markets they increase competition and force the local firms to become more proficient. This is how, domestic firms are provoked by multinationals and other overseas firms to improve their performance and productivity. Multinationals also influence the local suppliers of intermediate products to become more efficient with delivery speed, quality and reliability of the products so as to meet the high standards of the overseas company. It is seen that FDI has a positive impact on labour market. If the productivity of domestic firms increases by copying the multinationals production style which is based on increased labour productivity, then the domestic firms will not hesitate from paying higher wages to the labour (Lipsey Sjoholm, 2010). Multinationals also increase the standard of the host countrys labour market by providing the labourers with training and making them qualified enough to handle complicated machinery and increasing their productivity. Lastly FDI affects the economy of the host country positively by increasing their revenues in the form of taxes, strengthening the exchange rate of the country and instigating the government to make policies which would attract more MNCs towards it. NEGATIVE IMPACT OF FDI ON HOST ECONOMY As seen above FDI has a number of positive effects on the host economy but these effects do not come free of cost. FDI brings along with it a number of negative effects which prove harmful to the country in various ways. Extend of the negative effects of FDI depends on the characteristics of the multinational companies, the host country and the policies of the host country. Some of the negative effects have been highlighted below: ENVIRONMENTAL DEGRADATION With increasing competition all over the world, companies are shifting their production base to developing countries where they can carry out the production of goods that are pollutant to the environment. These countries have flexible environmental regulations and are less stringent with their enforcements. Thus by carrying out production in such countries they are able to get a competitive edge over companies which carry out production elsewhere. Lowered trade obstacles are leading to a shift of polluting industries from countries with austere environmental regulations to countries with moderate environmental regulations. This leads to an increase in pollution in countries with lenient environmental policies because they refuse to tighten them in order to gain a stronger position over others in international trade. Trade may modify the environmental outcomes through a number of different channels. The scale effect is one such channel that has harmful implications to the environment. This is because when multinationals set up manufacturing facilities or outsource these to other local businesses, it leads to an increase in output which in turn leads to an increase in pollution (Liang, 2006). MARKET STRUCTURE FDI has a negative impact on the market structure as well. As the multinationals enter the market, it leads to the increase of concentration levels within the economy which in turn hampers market control. Therefore risk is prevalent. FDIs tend to assemble in exceedingly concentrated industries. The relationship between presence of foreign organisations in the host countries and the concentration within the economy is indebted to the nature of multinational ownership benefits rather than to anti-competitive activities. In small economies, proficient exploitation of modern advanced technology leads to concentrated market structures. If such economies have lenient trade administration then the risk of anti-competitive activities is diminished to a great extent (Lall, 2000). However it is evident that successful competition strategies are very important as multinationals have the capability to simply control an industry in a host economy. TECHNOLOGY FDIs open the doors for the host country to access new technology but this technology is controlled and possessed only by the MNEs. MNCs generally invest in capital-intensive technologies and have strict proprietary rights which prevent its spill over to local firms. The technology bought in by the MNC may not be favourable to conditions of the host country. For example if the host country is a labour-intensive country and the technology used by the multinational is capital-intensive then gradually it will have a negative effect on the host economy. Once the domestic firms start imitating the foreign firm and start using the same technology used by them, labourers will lose out on their jobs. Thus this would lead to unemployment problems which will negatively affect the economy of the host country. A country attracts FDI so that the national economy grows by creating new job opportunities but in this case it would work in the opposite direction. Pollution-intensive technology may also be exported from countries where they are banned. COMPETITION FDIs have an adverse affect on competition and hamper the prevailing market equilibrium. In developing countries, the domestic firms may not be able to cope up with the competition put up by the MNCs. Thus they would lose out on business. Some multinationals acquire monopoly status in highly profitable sectors. With their monopolistic power they wipe out all competitors from the market. New enterprises are not willing to enter these markets because of the huge capital and risks involved. Thus these multinationals are able to demand unreasonable prices form the customers, leaving them with no other choice but to pay excessively higher charges due to the limited choices available. These monopolistic companies do not even invest in new technologies to bring down their costs since they are already enjoying the luxury of irrational prices. PRODUCTIVITY Atiken and Harrison (1999) and Konings (2001), have suggested that MNCs decrease the productivity of local organisations through competition effects. MNCs are able to carry out productions at lower costs since they bring along some proprietary knowledge which is firm specific. In addition they have superior managerial and marketing skills, reduced production costs, bulk purchases, etc which helps them reduce their marginal costs. Therefore, the demand for goods produced by MNCs increases, which in turn reduces the demand for locally produced goods. This ultimately leads to a decrease in domestic production increasing the average costs. With the establishment of multinationals, the demand for foreign inputs increases in comparison to local inputs which hinder the domestic firm from producing to its optimum capacity. Thus the domestic firms are not able to take advantage of economies of scale. Domestic firms may not be quick enough to grasp knowledge from the foreign firms, losing out on competition in the short run (Gorg Greenaway, 2004). MNCs usually offer higher wages to domestic workers, thereby attracting all the skilled ones, leaving behind only the semi or unskilled labour for the local firms. It is a common trend amongst MNCs to offer higher wages in comparison to the domestic firms in developed as well as developing countries. LABOURERS The workers in the host countries may not be comfortable with some of the foreign policies adopted by MNCs. One of the most attractive features for FDI in a host country is cheap labour. They take advantage of the cheap labour by producing labour intensive goods and thereby decreasing their costs of goods. With the establishment of labour intensive technology by MNCs, a country becomes highly dependent on them for its employment. Now multinationals are always trying to reduce their costs, so if they are able to find places with cheaper labour, they shift their base to that country. Thus there is always a fear of unemployment due to FDI withdrawal. GOVERNMENT POLICIES The government of the host country may face problems due to the establishment of FDIs. The government has less control over the operations of the foreign company that is functioning as the wholly owned subsidiary of an overseas company. Taking advantage of this, the MNC may not abide by the economic policies of the host country. They hamper the various environmental, governance and social regulations laid down by the government of the host country. With FDI there is risk that confidential information of the host country could be leaked out to rest of the world. It has been seen that due to FDIs the defence of a country has witnessed various risks. It is also noticed that multinationals are very reluctant to pay taxes of the host country. MNCs exploit the tax structure of the country by taking advantage of the lenient tax regulations of the host country and lack of enforcement by the government (Velde, 2001). Another huge problem faced by host countries is that of transfer pricing which is a financial accounting device used by MNCs to maximise profits. Transfer pricing refers to the price charged by one associate of a company to another associate of the same company. Transfer pricing relates to all transactions that take place within a company including raw materials, management fees, royalties, finished products, etc. Transfer pricing is an illegal way of making huge profits for the MNCs. Transfer prices can be fabricated, thus different from the price that unrelated firms would have to pay. Thus by using transfer prices as a weapon, MNCs manipulate their books of entry and acquire huge amounts of profits without an actual change in their physical capital. Profit transferring is a way of avoiding or saving taxes by MNCs through illegal ways. If the MNCs pay lesser taxes in the home country of their foreign affiliates in comparison to their host countries, then in order to increase profits, MNCs manipulate their book of accounts. They will inflate their expenditure on import of materials from their foreign partners or subsidiaries, this will show higher profits in the books of accounts of the foreign affiliates and less profit in the MNCs account in the host country. Thus evading taxes and at the same time they will artificially transfer profits to the home country. CROWDING OUT OF DOMESTIC INVESTMENTS FDI crowds out domestic investments by creating a monopolistic environment. This can be explained in two ways. Firstly MNCs raise funds locally in the domestic market, increasing the demand for money and in turn increasing the interest rates, which crowds out domestic investments. Secondly when MNCs enter a new country, they bring with them huge investments which increases the overall money flow of the country. This increases the aggregate demand, leading to an increase in prices, i.e. inflation, which will then increase expenses, reduce savings and ultimately force people to borrow money, leading to higher interest rates. Thus is this way the local investments are crowded out (Borensztein et al., 1997). Foreign firms have better advertising powers, ability to dominate the market and predatory pricing to prevent entry. INFRASTRUCTURE CONSTRAINTS Multinationals come in the way of a countrys infrastructure development. It is seen that multinationals are always attracted towards the more favourable regions of a country. Now with the establishment of multinationals in these regions, more efforts are put towards the betterment of these regions. As a result the rural and poor regions are ignored and they continue to remain underdeveloped. COUNTRYS TRADE BALANCE FDI has an adverse effect on the Balance of Payment of the host country (De Mellow, 1997). Financial inflows raise the exchange rates, making it unfavourable for exports. When MNCs enter a country, they bring along foreign exchange and thus increase their supply, which strengthens the host-country currency, making the domestic products more expensive in the international markets, and as a result of this the total exports of the host country reduces. Thus there is a decrease in the net exports (Total Exports- Total Imports) of the country. Hence the BOP may become unfavourable. The capital and current account are also hampered. When the MNC enters the host country, it might have previous raw material suppliers, or intermediary product suppliers, from whom it continues to buy its secondary material; this would lead to an increase in the import of the country making the BOP unfavourable. Secondly MNCs transfer their profits, management fees, royalty fees, etc back to their home country, hampering the capital account of the country. ECONOMY Multinationals usually tend to exist in close proximity to each other. It is seen that MNCs have a tendency to concentrate in the certain sectors taking advantage of the location, labour and resources. Thus the economy becomes extremely reliant on the MNC. A withdrawal of MNC from such areas could seriously hamper the economy and this is seen as a very severe problem in the backward areas. RECOMMENDATIONS CONCLUSION This research paper was carried out to analyse the negative effects of FDI on the host economy and we have come to a conclusion that even though FDI helps in the development and growth of various countries all over the world, these benefits do not come free of charge. FDI can have several harmful effects on the host country. To overcome these harmful effects some recommendations gave been proposed To overcome the negative impact of environmental hazards, the host countries can use a variety of channels. One such channel is the technique effect where the local firms of the host country could learn from MNEs who often use superior technology or these firms may also exit from the market if the foreign firms seize the market share as well as labour supply. Therefore directness to trade will help in improving the quality of the environment. Another channel is the income effect whereby the local electorate may demand better environment standards as well as more strict regulations which are more enforceable by the government when the multinationals increase the income in the economy by creating jobs and thus increasing employment (Liang,2006). To overcome the competitive barriers in developing countries, the domestic firms could use various protective corporate agreements. They could either combine local firms or begin cooperative ventures with the foreign firms. Government of the host company should become more stringent with their policies. They should adopt policies which encourage proper social and environmental principles by the foreign companies. Multinationals should be penalised if they do not adhere by the policies of the country Measures should be taken to curb consumer and labour exploitation and at the same time competition should be created in the labour and product market, removing all entry barriers from the domestic markets. Encourage education, train labourers and promote infrastructure to increase the local capacity to absorb and disseminate the superior new traditions pioneered by overseas companies. By taking a few precautionary measures and by amending the government policies, the harmful effects of FDI can be avoided. Thus, these policies should be such that they are able to maximise the benefits of FDI and curtail their negative effects. REFERENCES Blomstrom, M. (1991). Host Country Benefits Of Foreign Investment. NBR Working Paper 3615, pp 1-33. Blomstrom, M. and Kokko, A. (1997). The Impact Of Foreign Investment On Host Countries: A Review Of The Empirical Evidence. World Bank Policy Research Working Paper 1745, pp 1-42. Blomstrom, M. and Kokko, A. (1998). Multinational Corporations And Spillovers. Journal Of Economic Surveys 12(2), pp 1-31. Blonigen, B. (2006). Foreign Direct Investment Behavior of Multinational Corporations. NBER Reporter: Research Summary. Borensztein E., Gregorio De J. And Lee J-W (1997). How does Foreign Direct Investment affect economic growth? Journal of international Economics 45(1998), pp 115-135 Daniels, J.D., Radebaugh, L.H. and Sullivan, D.P. (2004). International Business Environments And Operations. 10th ed. Delhi: Pearson Prentice Hall. De Mello L.R. (1997). Foreign Direct Investment in Developing Countries and Growth: A Selection Survey. The Journal of Development Studies 34(1), pp 1-34. Froot, K. (1993). Foreign Direct Investment. London: The University of Chicago Press Ltd. Gorg, H. and Greenaway, D. (2004). Much ado About Nothing? Do Domestic Firms Really Benefit From Foreign Direct Investment? The World Research Observer 19(2), pp 171-197. Graham,J.P. and Spaulding, R.B. (2005). Understanding Foreign Direct Investment. Citibank international portal. Lall, S. (2000). FDI and Development: Research Issues In The Emerging Context. Policy Discussion Paper 20, pp 1-27. Letto-Gillies, G. (2005). Transnational Corporations and International Production concepts, theories and effects, Cheltenham: Edward Elgar Publishing House Limited. Liang, F.H. (2006). Does Foreign Direct Investment Harm the Host Countrys Environment? Evidence from China. pp 1-24. Lipsey, R.E. (2002). Home And Host Country Effects Of FDI. NBR Working Paper Series 9293, pp 1-76. Lipsey, R.E. and Sjoholm, F. (n.d.) The Impact Of Inward FDI On Host Countries: Why Such Different Answers? Does FDI Promote Development pp 23-43. Velde D.W. (2001). Policies Towards Foreign Direct Investment in Developing Countries: Emerging Best-practices and Outstanding Issues. Overseas Development Institute, London.
Subscribe to:
Posts (Atom)