Saturday, August 31, 2019

Formal and Informal Communication in an Organization Essay

* Formal communication channels, follows the chain of command and is recognized as official. One way to view formal communication within organizations. * Vertical communication is the flow of information both up and down the chain of command. It involves an exchange of messages between two or more levels in the organization. When top-level managers make decisions, create strategic plans, convey directions, and so forth, they are often communicating downward. Downward communication flows from individuals in higher levels of the organization to those in lower levels. The most common forms of downward communication are meetings, official’s memos, policy statements, procedure manuals, information needed to conduct work, and company publications. Information sent downward may include new company goals, job instructions, procedures, and feedback on performance. Studies show that only 20% of an intended messages sent by top-level management is intact by the time it reaches the entry level performance. This information loss occurs for several reasons. First, managers tend to reply too heavily on written channels an avalanche of written material may cause the overload subordinate to ignore some messages. This is especially true with the glut of information stemming from e-communications. Second, the oral face-to-face message, which commands more attention and can provide immediate feedback, is often underutilized. Managers may e-mail the colleague or subordinate down the hall instead of walking over for a chat. They may e-mail a business client across town instead of picking up the phone. Experts agree that managers often forget that the best way to communicate the richest channel is face to face, with its potential for abundant feedback. Upward communication consists of messages sent up the line from subordinates to managers. Openness to ideas and inputs from people in the lower levels of the organization is often the hallmark of a healthy and enjoyable organization. Effective organizations need upward communication as much as downward communication. People at all levels can and will have ideas for organizational improvement. Plus, managers need to have accurate feedback to properly guide the entire organization. Upward communication from subordinates to managers usually falls into one of the following categories: * Personal reports of performance, problems, or concerns. Reports about others and their performance, problems, or concerns. * Reactions to organizational policies and practices. * Suggestions about what tasks need to be done and how they can be accomplished. This type of communication is frequently sent up only one level in the organization to the person’s immediate supervisor. The supervisor may send some of the information to the next higher level but usually in a modified form. Upward communication is beneficial to both the manager and the subordinate. For the manager, it is often necessary for sound decision making. Upward communication helps managers knows employees’ accomplishments’, problems, and attitudes and allows employees to make suggestions and feel that they are part of the decision making process. In addition, it provides feedback, encourages ongoing two-way communication, and indicates the subordinate, upward communication may provide a release of tensions and a sense of personal worth that may lead to a feeling of commitment to the organization. Achieving effective upward communication getting open and honest messages from employees to management is an especially difficult task. Although suggestion boxes, employees surveys, and open-door policies are often used to encourage upward communication, upper level manager are responsible for responding to messages from lower level employees. If they do not take advantage of this information, the chance to tap into a critical resource is lost. Managers need to act on feedback from subordinates and get back to the individuals who sent it if only to indicate that the suggestion cannot be carried out or that progress is being made about the problem or suggestion. The track record on effectively communicating upward is not especially positive. Even for managers, on average, less than 15% of their communications is to their supervisors. Also, when managers communicate upward, their conversations tend to be shorter than discussions with peers, and they often highlight their accomplishments’ and downplay their mistakes if the mistakes will be looked upon unfavorably. In addition, junior managers are not trained in nor do they seek needed information and pass it upward. As we discussed previously, a trusting relationship is almost a perquisite for effective communication. Trust cannot be mandated by policy or directives. It must be earned by the manager through credible behaviour and communication. Horizontal communication is the flow of information that occurs both within and between departments. Effective organizations encourage horizontal communication because it increases coordination, collaboration, and cooperation. Communication provides a means for members on the same level of an organization to share information without directly involving their supervisors. Examples include the communication that may occur between members of different departments of an organization and between coworkers in the same department. Self-managed teams create situations in which horizontal communication can flourish. In addition, more formal liaison roles may be created to support information flows. These are important to coordinate activities that support the organizational objectives. * Spontaneous communication channels the flows of communication described so far have been part of formal system used to accomplish the work of the organization. In addition to these formal channels, organizations have spontaneous channels of communication. Spontaneous channels communications are casual, opportunistic, and informal communication paths arising from the social relationships that evolve in the organization. They are neither required nor controlled by management. A term often associated with spontaneous channels is the grapevine. The grapevine is an informal method of transmitting information, depicted as the wandering of messages throughout the organization. It typically involves small clusters of people who exchange information in all directions through unsanctioned organizational channels and networks. We refer to this as peer-to-peer conversations. This communication is a useful and important for managers and employees at all levels and is used as much as the company newsletter or employee meetings. Peer-to-peer conversations may be personal, task focused, or organization focused. When people offer thoughts and guidance on personal issues or situations, it is considered personal. These discussions may not relate to strategic objectives, but they do build relationships among coworkers, which ultimately affect culture and communication effectiveness. Conversations may relate to the task. For example, coworkers discuss the day’s assignment or team projects. Or the organization may be the focus with the â€Å"inside† story on changes and company news. These spontaneous communication processes can potentially compete with or complement the formal communication system in the organization. The grapevine can be beneficial. Managers need to at least be aware of the grapevine because it is probably one of the most prevalent and reliable forms of communication. In fact, one well-known study found that approximately 80% of the information transmitted through the grapevine was correct. The remaining 20%, though, can often lead to serious trouble. As you probably know from your own experience, a story can be mainly true but still be quite misleading because essential facts are omitted or distorted. Information in the spontaneous channels is usually unverified and often includes rumours that are exaggerated and frequently wrong. To help prevent incorrect rumours, managers must keep the information that flows through informal channels accurate and rumours free. To do so, managers should share as much information as possible with employees, tell them of changes far in advance, and encourage employees to ask questions about rumours they heard. To some extent, the spontaneous channels are always present in any organization and are more than just a means of conveying corporate gossip. The information may be less official, but it is no less important for understanding the organization. Despite being pervasive, the grapevine has escaped being directly managed in most companies. Research by Crampton, Dodge, and Jitrendra found that 92% of companies had no policy to deal with the grapevine.

Friday, August 30, 2019

Most Violated School Policies Essay

â€Å"The formation of character is one of the most important features of the educational system at the University of Baguio. For this reason, the imposed discipline, while observant to the rights and feelings of others, is firm, especially when the reputation of the student body and institution is at stake. Students are expected to manifest both within and outside the University, the respect for order, morality, personal honor, and rights of others, which is required of God-fearing men and women.† (UB student handbook, Article XIV: 2010 Edition) Schools have policies that are being implemented for the general welfare of its constituents. These policies provide a set of rules that the students, teachers, etc. should follow. These rules are necessary for the order and uniformity of the students within the school premises. Even with the presence of these rules, some of the students violate them disregarding the sanctions that go along with it. The word policy originated from the Latin word politia or polity. Defined as a definite course of action adopted for the sake of expediency, facility, etc.; an action or procedure conforming to or considered with reference to prudence or expediency. (http://dictionary.reference.com/browse/policy) Educational policies are significant because these are rules that are used in schools to discipline students. These rules determine how effective and efficient the school is in managing students and personnel. The policies have great influence in the quality of education in an area. Educational policies are important because effective policies can help students in school on their day to day activity. For a policy to become effective, it must have a well-pronounced outcome, assumptions should be clear and explicit, linkage to organizational direction must be present, due process in the development has to be observed, the priority should be on the public interest, expectations have to be made, the policy must be both efficient and effective, results should be stated in measurable terms, evaluation of results should be capable, funding and allocation of resources must be appropriate, accountability should not be vague, it should be lawful and administered, it must be based from history, ideas have to be verified before implementation, and the policy results should be well stated. (http://manuals.ucdavis.edu/resources/coordinators.htm) One of the factors why students violate school policies can be explained through their different behaviours. Behaviour is the manner of behaving or conducting oneself; the aggregate of all the responses made by an organism in any situation. (http://dictionary.reference.com/browse/behavior) Based on Operant Conditioning of B.F. Skinner â€Å"All behaviour caused by external stimuli and all behaviour can be explained without the need to consider internal mental states or consciousness.† It means that the actions done by students are responses to its environment. (http://www.learning-theories.com/behaviorism) Another type of behaviourism is Radical Behaviourism which is the connection to role of emotions and the major differences in the acceptance of mediating structures and etc. In order to resolve this problem the group found out that the best solution is the use of Biometric identification systems which can be grouped based on the main physical characteristic that lends itself to biometric identification. There are different kinds of biometric system in which the fingerprint biometrics is the commonly used one. There are also other biometric identification systems such as the hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. There are biometric systems that are composed of more than two physical characteristics to be identified. Statement of the Problem 1) What are the reasons why these students violate such policies? 2) What are the most common policies that are violated by the violators? 3) How can the proposed biometric ID system control students from violating the wearing of ID? Scope and Delimitation This proposal was limited only to the students of the University of Baguio including the administrative staff, teachers, faculty and utilities. Significance of the Study With the help of this proposal, the University of Baguio would be able to control every entrance and exit of the school. The act of not wearing IDs for the students would no longer be possible because they will not be able to enter the school without their IDs. The biometric ID system would strengthen the security of the academe for the safety of the students. The time when the students would enter and leave their classes would be monitored. The system would be able to determine if the students will skip their classes. Also, the entry of thieves and pick-pocketers within the school premises would no longer be possible due to this proposal. With this modernized system to be established in the University, all of the students and personnel of the school will benefit from it. FRAMEWORK The leniency of the marshals in checking the ID’s and proper wearing of uniforms, students not following the rules and regulation of the school and to monitor the entrance and exit of the students of University of Baguio within the school’s vicinity are the reasons why the researchers proposed an ID Biometric System. The students violated the above mentioned rules due to leniency, habitual actions of students, laziness, and unwanted behaviours of students. Some students just wanted to violate such policies because they thought that it was a fun and interesting thing to do. If the proposed project will be fully implemented, there will be organization in the school campus and an effective monitoring of the passage ways in entering and going out of the school. Based on these factors that we have retrieved on the data that we have collected, the theory that would best support our proposal is the belief theory. We chose this theory because we, the researchers, believe that the proposed biometric ID system will work and we will therefore translate these beliefs into action. The researchers foresee that this would be able to control the reoccurring problems that are being done by the University of Baguio students and that is the reason why we have made this very proposal. DEFINITION OF TERMS * Biometric – pertaining to, noting, or using a person’s unique physical and other traits for the purpose of identification and security. * Coincide –to occupy exactly corresponding or equivalent positions on a scale or in a series * Identification – psychological orientation of the self in regard to something (as a person or group) with a resulting feeling of close emotional association. * Implementation – the act of implementing, or putting into effect. * Policy – a definite course of method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. * Proposal – An act of putting forward or stating something for consideration. * Scanner – a device sensing a recorded data. * System –a group of devices or artificial objects or an organization forming a network especially for distributing something or serving common purpose. * Units – a piece or complex apparatus serving to perform one particular function ASSUMPTION The group assumed that if the proposal is to be approved by the Board of Directors, it would be implemented immediately. The ordered units will be put up to the designated areas and the Biometric system will start functioning. With the new system of the school, there will be an organization in school activities. The school then will be a safe and humane place to study. CHAPTER II REVIEW OF RELATED LITERARTURE I. EXECUTIVE SUMMARY In the millennial years’ rapidly advancing technological world, the issue of security is becoming a more and more pressing matter. Computer crimes and identity theft related crimes are becoming more rampant and apparent, requiring better solutions to cope with them. One of the proposed methods for solution for future high-technology security issues lies in the field of biometrics. Biometrics defined simply in its regard to security matters is any method or technology which uses biological measurements to facilitate authentication for verification or identification of a particular user. Although still in major phases of development, biometrics is seen as a highly valuable initiative to one day replace present day security authentication practices due to its ideal concept of being virtually risk free and non-inaccurate. This paper will analyze all aspects concerning biometrics including its overall concept, how a biometrical authentication system works, controversial issues concerning its implementation, its current uses in technology, business, and governmental agencies and its future developments. II. CONCEPT OF BIOMETRICS IN SECURITY A. TWO CATEGORIES Biometrics can be subdivided into two main categories. These include physiological and behavioral categories of specific measurements. Physiological measurements include biological characteristics inherent to individual human beings. Some of these would include facial structure, fingerprints, hand structure, iris and DNA structure of a particular person. Behavioral measurements measure dynamics in individual behaviors. Some of these would include keystroke behavior, signature and voice recognition. B. VARIOUS METHODS FOR COLLECTING MEASUREMENTS FACE: Facial recognition involves technology which scans the face and interprets the data as recognizable characteristics of a particular user, including the size and shape of the face and their relationship to each other. Facial recognition is a natural method that humans use to identify people they come into contact with, but it is not an easy method to duplicate for identification on a biometric system. This is due to changes such as plastic surgery, weight gain or weight loss which can cause the results to be inaccurate. Another emerging method of collecting biometric information involving the face is facial thermograph which detects and measures the heat patterns created by the branching blood vessels within the face and emitted through the skin. FINGERPRINT: Fingerprint analysis has been around for centuries as a means of identifying people. It has been evidenced that ancient Chinese used fingerprinting to sign legal documents as long ago as 1000 BCE. Fingerprint analysis involves examining the ridges on an individual fingerprint in order to match them to a specific owner. HAND: Hands can be analyzed and measured in a few different ways. Aside from fingerprints, another way to use hands in biometrical analysis is through hand geometry which measures and compares the different physical characteristics of a person’s hand such as shape and size. Another method concerning hands is palm vein authentication which uses an infrared beam to penetrate a person’s hand and measure the complexity of the vein patterns within that person’s hand. This specific method is more useful than hand geometry measurement because palm vein patterns are internal to the body, and difficult to be counterfeited by an illegitimate use r. EYES: Eyes can be used in two different ways as a part of a biometrical scrutiny process. Iris scanning involves analysis of the rings, furrows, and freckles in the pupil of the eye of a particular human. Retina scanning involves analysis of the capillary blood vessels located in the back of the eye. DNA: DNA verification uses analysis of genetic information found within a specific person’s DNA code (or genetic code) as a means of identifying that person. DNA analysis is often used now as a method for identifying paternity of a person’s child or in forensic crime investigations as a evidence for convicting individuals for crimes such as murder or rape. ODOR & SCENT: Odor and scent analysis is a fairly new development in biometrical analysis and is based on a theory entitled â€Å"individual odor theory.† This theory is premised on the notion that each person has a particular and unique scent. In forensics, odor analysis has been used to identify people by the use of blood hounds (dogs). VOICE ANALYSIS: Voice analysis involves analyzing of the pitch, tone, cadence, and frequency of a particular user’s voice to facilitate authentication. Voice analysis can technically be seen as both a physiological trait as well as a behavioral trait because voice is not only inherent to a specific person, but also the way that person speaks is also a unique and measurable trait. SIGNATURE: Signature analysis analyzes the way a person writes his/her signature as a basic means of identification. Although handwriting techniques vary for individuals throughout their lifetimes, handwriting identification is seen as a scientifically reliable criterion for measurement. KEYSTROKE: Keystroke analysis measures the dynamics of a person’s typing rhythms to facilitate authentication of a particular person. Keystroke analysis may be more useful than other methods of identification because unlike other biometrical authentication methods, keystroke dynamics can still be measured throughout the computer session even after the access control point has been successfully passed by the user. GAIT: Another new developing biometrical technique is one which measures gait which is a person’s particular way of walking and facilitating motion. Gait can be used effectively to recognize people coming in from a distance. COGNITIVE BIOMETRICS: Cognitive biometrics is also a developing method in biometrics which uses measurements of brain activity responses when triggered by specific stimuli and matched within a computer database as a means for authentication of a particular user of the system. Currently, systems which utilize this kind of method are being created to trigger responses to odor stimuli. In the future, other triggers may be used to create responses. C. PARAMETERS Given the various methods for collecting biometrical data, each of these techniques must pass a set of parameters to a degree in order to be considered as a viable method for integration within a biometrical system. These parameters include: UNIVERSALITY: The principle of universality stipulates that every user should have the characteristic. Sometimes, in some cases this may not be true as it the case of a person with no hands who cannot use a hand analysis machine for verification. UNIQUENESS: The principle of uniqueness involves the degree of how separable the biometric characteristic is between each individual person. PERMANENCE: The principle of permanence involves how well the technique used for measuring is resistant to changes such as aging, human developmental processes such as pregnancy, or things such as plastic surgery. COLLECTABILITY: The collectability principle is related to how easy the method is to acquire. Easier methods, as well as more sanitary methods are more ideal for a viable biometrical system. PERFORMANCE: The performance principle is concerned with the accuracy, speed and the strength of the technology used to authenticate the user. ACCEPTABILITY: The acceptability principle is related to the degree of social approval for use of the technology as a means for collecting biometrical data. CIRCUMVENTION: Circumvention involves, the biometrical system’s ease of adaptation to a substitute should the system need one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS (Based on the Comparison of Various Biometric Technologies table by A.K. Jain, et. al. 2004) FACE: Facial scanning has a high level of universality because it is virtually impossible for any living human-being to possess no form of a face. Facial scanning scores low in its level of uniqueness due to the fact that it can be difficult to distinguish characteristics from person to person at times. This is due to some people having similar features which may be hard to distinguish. In the case of identical twins, this may not be a useful means for authentication at all. Facial scanning scores a medium ranking under the permanence factor. This is due to the fact that although a person’s actual facial characteristics never change, they are subject to transformations such as aging, weight gain or loss, and alterations such as plastic surgery or accidents. As far as collectability, facial scanning scores a high mark due to the fact that, going along with its high level of universality , every living human-being does have a face which is easy to locate on a human body. Facial scanning is low in performance because it can tend to be highly inaccurate due to the dynamical aspect of human faces. Facial scanning also scores high in acceptability as a comfortable and accepted way people would want to collect their biometrical data, but it scores low in circumvention because it doesn’t have an easy substitute which can replace it. Facial thermograph scores high in universality, uniqueness, collectability, acceptability, and circumvention. It scores low in permanence and medium in performance. FINGERPRINT: Fingerprinting scores medium in its level of universality. This is due to the fact that although all people inherently possess fingerprints at birth, fingerprints can still be damaged via rare skin diseases or through loss of fingers, abrasions, etc. Fingerprinting has a high level of uniqueness and a high level of permanence. Fingerprinting has a medium level of collectability and performance due to the fact that although it is easy to acquire for measurement, there is a 5% failure to enroll rate which exists for everyone even with good sensors and analysis software. Fingerprinting has a medium level of acceptability by the public as a means for collecting data. This is because although it is an easy method of measurement, it may be unhygienic, inaccurate as well as easy to duplicate unlawfully. Fingerprinting has a high level of circumvention due to its ease of adaptation to a substitute if deemed necessary. HAND: Hand geometry scores medium in its universality, uniqueness, permanence, performance, acceptability, and circumvention. Hand geometry scores high in its collectability aspect. Hand vein analysis also scores medium in universality, uniqueness, permanence, collectability, performance, and acceptability; but it scores hi gh in circumvention. The overall reason why hand analysis carries a medium ranking in virtually all the parameters listed is because of a human-beings ability to live without them. EYES: Eye analysis provides for a more accurate analysis approach in a biometric system. Iris scanning scores high in universality, uniqueness, permanence, performance, and circumvention. This is due to the complexity and exclusivity of iris patterns which does make them a better choice method of biometric authentication. Iris scanning received a medium score in collectability and a low score in acceptability due to the complexity of the method and its suitability to the general masses. Retinal scanning also received similar scores, scoring high in universality, uniqueness, performance, and circumvention; receiving a medium score in permanence, and low scores in both its collectability and acceptability. DNA: DNA analysis has split results, scoring high in universality, uniqueness, permanence, and performance, and scoring low in collectability, acceptability, and circumvention. Although DNA can be extracted from a numerous amount of different ways, a method of extracting DNA in order to be used in a biometrical authentication system cannot be done without seeming invasive or unsanitary. Also, many people may be concerned with privacy matters concerning DNA analysis. ODOR & SCENT: Odor and scent analysis scores high in universality, uniqueness, and permanence. Although scents can be masked by deodorants, fragrances and lotions, the underlying biological scent of a person cannot be concealed. Odor analysis also scores low in collectability, performance, and circumvention, with a medium score in acceptability. VOICE ANALYSIS: Voice analysis scores medium in its universality and collectability. It scores low scores in uniqueness, permanence, performance, and circumvention, making it not an ideal method for use in a biometrical system. This is because not only does a person’s voice change throughout time, but people can knowingly change their voice or use technology to change their voice (such as a recording) in order to dupe a system. Voice analysis scores high in acceptability due to the simplicity of the method. SIGNATURE: Signature analysis scores low in universality, uniqueness, permanence, performance, and circumvention. It scores high in collectability, and acceptability. Signature analysis may not be an ideal method for authentication because although graphology experts can distinguish identities through meticulous handwriting analysis, it may be more difficult for a biometrical system to accurately analyze differences in handwriting for each individual person. This is because a person’s handwriting can change depend on various things such as the mood of the person. Also some people may write similarly or use forgery to try to dupe the system. KEYSTROKE: Keystroke analysis is another method which may be seen as not as reliable as some of the other methods for collecting biometric information. Although it has the advantage of being able to simultaneously authenticate a user while he/she is still within the work session, keystroke analysis scores low for universality, uniqueness, permanence, and performance. It also has medium scores for collectability, acceptability, and circumvention. This may be due to the behavioral aspect of typing which can be easily changed if a person learns to type in different ways. GAIT: Gait scores medium in universality and circumvention. Gait has low scores in uniqueness, permanence, and performance. Gait also has high scores in collectability and acceptability. Of all the various methods for collecting biometric data, some of the most reliable methods (according to the table by A.K. Jain et. Al) are iris scanning, retinal scanning, facial thermograph, fingerprint analysis, and DNA analysis. Some of the least reliable methods are keystroke analysis, signature analysis, and voice analysis. Overall, it appears that physiological data is seen as a more reliable method for collecting data than behavioral data. III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEM A biometrical system although seemingly complicated, has only two main steps, regardless of the methodology or the technology used to facilitate it. The system begins with a process called enrollment which is when the biometric information from individual users is collected and stored within a database and translated into a code or graph. In some instances data may be stored on a smart card which can be carried away with the user. The next operation of the biometrical system is called testing. During this portion of the system, biometrical data is detected and compared with that which is in the database. In order for a biometrical system to be robust, it is necessary that the storage and retrieval of data within the system be highly secured. (http://upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.png/800px-) A biometrical system can carry out two main functions. These include verification or identification. In verification, the system’s objective is to authenticate the user in conjunction with another method such as a smart card, a username, or a password. With identification, the system’s intention is to authenticate the user only on the basis of the biometrical data alone. The goal of this function is to identify the user according to the closest match within the allowable limit of the system. B. PERFORMANCE MEASUREMENTS The performance of a biometric system’s technology can be broken down into a variety of probability descriptions. These descriptions indicate the level of accuracy the system is able to achieve. FAR- The first measurement is entitled False Accept Rate. This measurement determines the likeliness of a biometric system incorrectly accepting access to the system by an un-authorized user. This measurement is calculated by dividing the number of false acceptances by the number of times an identification attempt has been made. FRR- The second measurement is called a False Rejection Rate which measures the probability that a biometric system will incorrectly reject an authorized user from using the system. This number is calculated by dividing the number of false rejections by the number of authentication attempts. EER- Equal error rate stands for the rate at which FAR and FRR are equal. This measurement can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- Receiver operating characteristics deals with the system’s accuracy within certain environments as it relates to False Rejection and False Acceptance Rate results. FTE- FTE stands for failure to enroll rate. This measurement is calculated as a percentage of the data which failed to pass through the system due to invalidity. Failure to enroll typically happens when the sample data is of poor quality and does not match the data which is stored in the database of the system. FTC- FTC is the failure to capture rate. This measurement measures the probability that the system will fail to pick up on a biometric characteristic when it is presented accurately. High calculations of this measurement typically mean that this authentication method will be difficult as well as frustrating to use. C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICS The three most susceptible areas of vulnerability for attack of a biometric system are: 1) Copied-biometric attacks- where the attacker obtains a substitute for the true biometric sample in order to cause proper authentication to occur via the normal system procedures. 2) Replay attacks- where perpetrators obtain valid templates from the original user and then use them to directly dupe the biometric system. 3) Database attacks- where perpetrators access a template database and obtain the ability to replace valid templates with invalid ones. IV. ISSUES WITH BIOMETRICS A. IDENTITY THEFT ISSUE Although the ideal goal of biometrical authentication is to have ultimate prevention of identity theft, the issue of an illegitimate user having the ability to commit identity theft still exists within biometrics and can have even more dire circumstances than with non-biometrical authentication systems. Depending on the method used to collect the biometrical data, a person’s identity can be stolen easily. An example of this would be in the case of fingerprints which can be taken from inanimate objects such as glassware or metal objects and then duplicated in order to be used to dupe a biometrical system. The main problem concerning this issue is in the fact that if an individual’s identification is stolen by another, the legitimate user may never be able to undo the damage which has been created because, unlike with non-biometrical authentication, once biometrical data has been compromised, it is compromised for the entirety of the legitimate user’s existence. One proposed possible solution for solving the issue of identity theft is to only use a portion of the biometric data, so that if the data does become compromised, it will not be entirely lost. This way, if one part of the data is stolen, another part of the original user’s biometric data can be used to replace it. B. PRIVACY ISSUE Privacy can also be a staggering issue with the implementation of a biometrical system from a societal standpoint. Many people may not care to have all of their biological characteristics recorded on some medium for a variety of reasons. One concern is that if information is recorded on systems used at more than one location or by more than one entity, an individual’s movements can be tracked preventing anonymity. Safety of the legitimate users can become compromised, if malevolent individuals choose to target that person in order to obtain their goal. Another issue regarding privacy involves physical harm which can be done to an individual using a biometrical system. Physical harm can occur by use of unsanitary instruments used in the technology to obtain the biometrical information, which may cause the system to be considered unsafe. Another issue regarding privacy lies with the administrative ability to misuse user’s biometrical data without the consent of those users. Currently, few regulations exist to protect biometric information of individuals. C. SENSOR OBSTACLES Different types of technology (hardware & software) used within different biometrical systems can counteract one another, making it difficult to have standardized biometrical data. One of the reasons this problem exists is because each vendor of biometrical technology generates their own encryption methods for the recorded information. Unfortunately, many of these encryption methods do not coincide with one another making the use of biometrical systems more difficult and less efficient. The only way unification of the different biometrical systems can occur is by a standardizing process which would require exposing of all the concealed data. Unfortunately, this can also present a serious threat. D. FAILURE TO MEET PARAMETERS Another issue concerning implementation of biometrics is in the issue of a system’s failure to meet parameters. In order for biometrical data to be interminable, the biological characteristic must be unique, universal, acceptable, collectible, reliable in regards to the performance and circumvention of the technology used to collect the data, but most importantly, the data must be permanent, which is the most fragile issue concerning the parameters of biometrical data. Unfortunately, most if not all biological characteristics are not guaranteed to be permanent. Many of them can be compromised via accidents, health problems or alterations such as surgery. V. CURRENT USES OF BIOMETRICS Although the field of biometrics as a whole is still in need of major development before widespread implementation will ever occur there are some entities including private industry and governmental agencies which currently utilize biometrical technology. Certain examples of American organizations which currently use biometric technology include: 1) Walt Disney World: Walt Disney World uses fingerprint analysis technology to authenticate the fingerprints of guests in order to ensure that season tickets are used by the authorized ticket owner. This is in order to prevent lost sales through ticket sharing, as well as thefts. 2) First Tech Credit Union: First Tech Credit Union is an Oregon based credit union which utilizes keystroke recognition technology for authentication of users on its online website. 3) Casinos: Over 100 American casinos such as the Imperial Palace casino in Las Vegas use facial recognition technology to identify and prevent known cheaters or dishonest patrons from entering into their establishments. 4) Missing Children’s Clearinghouse: A West Virginia based organization entitled Missing Children’s Clearinghouse uses biometric technology which utilizes scanned digital photographs to search for missing children. 5) Citibank Singapore: Citibank in Singapore uses fingerprint scanning technology for customers who use their clear platinum card for point-of-sale purchases. 6) Coca Cola: Coca Cola uses hand scanning machines to replace time cards for employees in order to document worker time keepinsg records. 7) Welfare crack-down: New Jersey as well as six other states use biometric technology to crack down on individuals who abuse the welfare system by claiming benefits in multiple names. 8) Notebooks: Computer products such as the Compaq Armada E500 are being developed to use fingerprint scanning technology to verify the identity of the user. 9) Prisons: Up to 100 American Prisons use biometric technology to regulate methadone dispersement among prisoners. VI. FUTURE DEVELOPMENTS IN BIOMETRICS Since the occurrence of the September 11, 2001 terrorist attacks, a surge in the demand for biometric technology has begun. Stocks in publically trade biometric companies such as Visionics, Viisage Technology, and Indentix have soared with the overall biometric technology industry projected to have revenues approaching $10 billion dollars annually by 2020. Emerging trends for future uses of biometric technology seem to lean more towards law enforcement, homeland security, and security within certain types of private industry such as in airport security or finance. Many credit card companies such as Mastercard and Visa are beginning to implement biometric authentication methods to verify card users. Also, the Immigration and Naturalization Service may begin implementing biometric technologies to identify illegal immigrants. Certain types of biometric technology which are becoming more widespread include access control facial recognition technology which is used to permit only authorized individuals to enter upon certain facilities, facial recognition passive surveillance technology which is used to monitor premises in order to identify possible terrorists or suspect individuals, and alert management which includes the use of real-time technology in association with biometric technology to provide security alerts of potential security breaches. Applications which use biometric technology will also have an effect on commerce, particularly in e-commerce to provide extra security for online purchases, and installation within certain personal items such as cars and cell phones. VII. CONCLUSION Although not that long ago, the concept of having biometric technology as a part of our mainstream society may have been seen as a science-fictional impossibility, technological innovation has grown to the point where it is becoming more and more of a reality. Although we are not quite ready for widespread implementation of this technology, as the need for better hi-tech security increases, research as well as investor and consumer confidence and innovation within the biometric industry is also expected to improve. Although no single biometric system method is without flaws, combinations of these various methods and technologies may provide the ideal security that we hope to attain one day. CHAPTER III METHODOLOGY There was difficulty in determining the real students of the University of Baguio because of the hard-headed students who cannot abide with the simple rules and regulations which was the reoccurring problems of the security. Due to this problem, the â€Å"mandos† and â€Å"magnas† can easily enter the school’s premises victimizing a lot of students. This was one of the reasons why such simple violations became a huge problem for the school. Regarding this matter, the group came up with an idea for a topic for their action research. Before they finalize their topic, the group went to the Office of the Student Affairs and interviewed the dean to know which rules are commonly violated by the students. After the interview, the group determined that the rules which are commonly violated are: a) wearing of I.Ds inside the school campus; and b) wearing of uniforms on the designated days. The group then convened and finalized their topic that would focus on â€Å"A proposed Biometric ID system to control the reoccurring violations by University of Baguio students.† Since there was already a topic to be talked about in the research, the group started to gather data which were relevant to the research proper like that of related studies and researches and terms that are significant to the study. After collecting relevant information for the research, the group prepared communication letters addressed to the deans of the different schools of the University and respondents likewise with the survey questionnaire. Upon approval of the deans of the different schools, the group administered the questionnaires to the respondents. The survey forms were distributed to the eleven schools of the University having ten (10) respondents each to see which results have the same percentage which were used to know the reasons behind these actions. After distributing the survey questionnaires, the group then retrieve the questionnaires and start tabulating the results. The tabulated data showed the reasons why the students violate these simple policies of the school. The result of the survey supported the proposal that were passed to the Board of Directors. The group then proposed the biometric ID system that will be put up in every entrances and exits of the buildings in the University. The biometric ID system will most likely be very costly but disregarding such amount, the administration will approve it and immediately ordered the said system. By the time the systems that had been ordered arrive, the people designated by the higher ops will put up such systems on the designated areas to make the University a safe and humane place to study. CONCLUSION In light of the findings, the following conclusions are hereby presented: Not wearing of ID has been a habit of the students. Sometimes the teachers themselves forget to check their students ID. The security guard also are not lenient in checking the IDs of these students. Because of this attitude most number of the student no longer uses their IDs. The students think that it is just fine not use their IDs. The researchers are found out that the school really need a biometric ID system. Approximately, one unit of the biometric system will cost more or less two hundred fifty thousand pesos. In such case the University of Baguio can still afford this system since it does not only help the students but it can also secure their safety With the help of this proposal it will lessen the burden of the security personnel. This proposal can also lessen the number of students violating the proper use of IDs. In such situation students can no longer use any ID because of the presence of finger prints. The students whether they like it or not would still be forced to use their IDs. Also, this proposal can help in the security of the school campus because outsiders can no longer come in because of the presence of finger prints. RECOMMENDATION Drawing from the conclusions that the researchers arrived at, the following recommendations are forwarded. The researchers would recommend the strict implementation of the rules and regulations of the university and the maintenance of the biometric ID system. In addition, each of the gates should be closed. Also, the lenient checking on the wearing of IDs should be done. The guards should monitor every student entering the university. In case the students lost their IDs, we recommend that a password that would allow them to enter would be provided by the OSA during the time of the ID’s loss. BIBLIOGRAPHY BOOKS * Addiction Today, Sept. 27, 2008. â€Å"Prisons Use Biometrics to Manage Methadone.† * Germain, Jack M., Sept. 11, 2003. â€Å"Beyond Biometrics: New Strategies for Security. * New York Times, Nov. 15, 2008. â€Å"Technology and Media, a Surge in the Demand to use Biometrics. * Osborn, Alice, Aug. 17, 2005. â€Å"Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko, Raymond R., Corporate Computer and Network Security. New Jersey: Prentice Hall, 2004. * Risk Management, Mar. 15, 2005. â€Å"Biometrics: The Future is Now. * Technology and Human Values Senior Seminar, 2008. â€Å"Biometrics. * Tilton, Catherine J., Feb. 2006. â€Å"The Role of Biometrics in Enterprise Security. * Wikepedia, Nov. 13, 2008. â€Å"Biometrics.† ONLINE * http://www.addictiontoday.org/addictiontoday/2008/09/prisons-use-bio.html. * http://www.ecommercetimes.com/story/31547.html?wlc=1226777438 * .http://query.nytimes.com/gst/fullpage.html?res=9F06E0DB163EF934A25751C1A9679C8B63&sec=&spon=&pagewanted=1 * http://www.video-surveillance-guide.com/future-of-biometrics.htm * http://www.riskmanagementmagazine.com.au/articles/FF/0C02DDFF.asp?Type=124&Category=1240 * http://www.dell.com/downloads/global/power/ps1q06-20050132-Tilton-OE.pdf >. * http://en.wikipedia.org/wiki/Biometrics#cite_note-jain_short_article-20 >.

Thursday, August 29, 2019

The US-led war in Iraq Essay Example | Topics and Well Written Essays - 750 words

The US-led war in Iraq - Essay Example Iraq had a devastated economy from 1980 to 1988 due to the internal war of the country. The country was made to be the largest military country in the region of Persian Gulf. The country was invaded by Kuwait in 1990 but the United States-led UN coalition forced them out in 1991. This led to social instability in the Kurdish side of the country where the Shia Muslims were against the government, which was led by Saddam Hussein. The government was forced to use force in order to suppress this rebellion. This led to a massacre where thousands of individuals were killed and a lot of property was damaged. The United States government and other superpower countries were forced to declare the country to be a no flying zone due to the instability of the region. The country was even sanctioned by the United Nations Security Council since the country refused to surrender their weapons so that they could be inspected. The country remained unstable from the 1900s to 2000s. The United States-led coalition invaded the country in 2003 after it was reported that the country had refused to be inspected by the United Nation. This led to the Iraq war between the United States and Iraq. Iraq’s dictator was overthrown in this war after the invasion had taken place. The country was left under the control of Coalition Provisional Authority (CPA) that handled the governmental affairs of the country, which later led to the formation of the government. The Iraqi interim Government took over after the CPA was disbanded in June 2004. The transitional government later took over after the election was held in January 2005 and in September the countries constitution was completed. December of the same year marked another election that initiated a four-year government, which took over power in March 2006, and was in accordance with the constitution. Even after the elections had been conducted in the country, there were still casers of instability and reports of violence across the country. This made the United States forces to be increas4ed in the region to calm the violence. The US started leaving the country in June 2009 after the two countries came up with a plan to ensure that the troops were out of the country’s urban areas (Jenkins, 57). The Iraqi war officially ended in December 2011 as majority of the US troops had left the country. The governance of Iraq changed after the invasion by the United States. This government is an establishment of the parliamentary democracy where it has branches of executives. The president is the chief of states and the prime minister is the head of government. The legislative branch of Iraq is has a unicameral council of representatives. The judicial branch of the country does not exist. However, the CIA Fact book implies that the judicial governance and management should start with Higher Judicial Council, which is followed by Federal Supreme Court Federal Court of

Wednesday, August 28, 2019

Prepare a memo to the judge.The Honorable Levon Warner.advocating for Essay

Prepare a memo to the judge.The Honorable Levon Warner.advocating for the Drug Treatment Court in lieu of incarceration. As - Essay Example To maintain his habit, Mr. Jones began to commit petty larceny to provide the funds he needed. He was caught and sentenced to Rikers Island for sixty days back in 2008. However, he simply returned to his lifestyle of drugs once he exited the correctional facility. His continuous arrests and repeated removals to Rikers Island have continued since 2008 to the present. His frequent returns to Rikers have proved more harmful than beneficial. By returning to Rikers, Mr. Jones learned more effective ways to commit petty larceny in order to provide himself with drugs. A better alternative to Riker’s Detention Center is, we believe, a Drug Treatment Court. The ultimate goal of a drug treatment court is to see those convicted of drug possession completely drug-free. They have greatly expanded and improved in New York City over the last several years. One of the first programs to offer an alternative was the â€Å"Drug Treatment Alternative to Prison† (USDEA, 2011). It began in 1 990 and has been the scene of helping many drug addicts successfully reenter society and overcome their addictions to drugs to this day (USDEA, 2011). This is just one example of how drug treatment courts work.

Tuesday, August 27, 2019

Advantages of Intellectual Property Essay Example | Topics and Well Written Essays - 1000 words

Advantages of Intellectual Property - Essay Example Firstly, it provides a legal protection against unscrupulous business owners who would wish to use ones idea and goodwill under someone or a business name. Certainly, the concept of property right rights is not a new concept in business laws. The use of trademarks such as logos, color codes and pictures by two different businesses has been a center of controversy that has resulted in numerous lawsuits (Stim 67). For instance, of the 23 cases on intellectual property that were filed in U.S courts 2005-2013, a total of 15 were decided in favor of the suit (Stim 69). Certainly, in an environment where the courts open orders retention of ideas to the original firm or person, it shows the effectiveness of the laws against duplication. Patents protection refers to the prevention of ones idea from being used by a second property without the owners knowledge or compensation. For entrepreneurs, the idea is a business and the need to protect it is as important as protecting a business. With increased competitive market demands, there is certainly increased tendencies duplication of another business. The patent laws offer protection against such unethical tendencies. Secondly, the protection of patents helps to enhance creativity in the economy through discouraging armchair duplication of already existing enterprises. While the laws of Intellectual Property (IP) may appear selfish and sometimes too harsh, the impact on the U.K economic growth has been tremendous.The IP-intensive industrial operations have consistently shown that stringent laws against ideas duplication has spurred creativity and subsequently economic progress. Notably, in 2010-2011 following the economic crisis in U.S, there was a 1.6% increase in employment in IP-intensive industries as compared to 1% in IP-non-intensive industries. In addition, by 2011 there was a remarkable increase in exports from IP-intensive

Monday, August 26, 2019

Compare and contrast the Erechtheum and the Pantheon Essay

Compare and contrast the Erechtheum and the Pantheon - Essay Example Of course it had always been referred to that the Romans were imitative of Greek culture. The same can be said in their architecture. Barstow makes for an interesting commentary when he said that â€Å"Roman architecture has been called merely Greek architecture imitated with greater richness but less refinement. No doubt the Greeks were greater originators, but the Romans were more practical, and, being great builders they extended the art in every direction. Yet, where they changed or modified the Greek, they did not always improve it (p. 49). The columns are the very main foundation of both the Erechtheum and the Pantheon. It served not only a decorative, and magnificently so at that, but also as the main source of strength of the two buildings. When we see the Erechtheum and the Pantheon we are immediately transported to the culture of a former world and its lush sense of style that has continued to captivate the essence of design up to this day. There are many similarities between these architectures and this may be palpable in the two structures but there are also differences that may be perceived, especially in the Pantheon which came much later than the Erechtheum and thus contains some improvements and innovations. The Erechtheum is a temple built for the goddess Athena Polias with Ionic design. The design is characterized by two chambers where one faces west and the other faces east. There is a debate as to which direction is actually devoted to Athena but there is belief that it is the western end the Erechtheum while in the eastern portion is that of Poseidon-Erechtheus, Hephaestus and Boutes. The Erechtheum is actually the name of one of its cellas, the same way the Pantheon derived its name. An interesting tidbit of history was divulged by Pausinias to describe the worship for Athena of the people. He tells that even though there are many of those who had already converted to Christianity, they still hold a special reverence for Athena and the Erechtheum. The image in the Acropolis was considered to be most holy. Legend says that it fell from the sky with a lamp that never goes out of oil easily though it is lighted throughout (George, n.p.). The most distinct design of Roman architecture is their use of arches. This was not new when they incorporated it into their construction but it was revolutionized by the Romans. Where the Greeks usually employed straight lines, the Romans made use of arches to give a softer feel to the look of the buildings. This is an integral aspect of the Pantheon which is essentially a dome that fully embraces the use of an arch. This transformed the total design of a building. It was also during the time of the Romans where the use of cement which is basically rock that were ground and sand mixed as a wet component proliferated. This technique was actually responsible and made it possible to build the Pantheon. But unlike the Greeks, the Romans built more than temples

Sunday, August 25, 2019

What does Intel's presentation of their financial information tell you Essay

What does Intel's presentation of their financial information tell you about how they use financial information in decision making - Essay Example According to Answers.com, financial information systems describe a "system that accumulates and analyzes financial data in order to make good financial management decisions in running the business.If managers at any company, including Intel, wish to make the best decisions possible, they need to have certain information readily accessible at their fingertips. Financial information can be used for the functions of planning, implementation, and control. The basic objective of the financial information system is to meet the firm's financial obligations as they come due, using the minimal amount of financial resources consistent with an established margin of safety. Outputs generated by the system include accounting reports, operating and capital budgets, working capital reports, cash flow forecast, and various What-If Analysis reports. The evaluation of financial data may be performed through ratio analysis, trend evaluation, and financial planning modeling. Financial planning and forec asting are facilitated if used in conjunction with a Decision Support System (DSS)" (2008). The purpose of this paper is to determine what Intel's presentation of their financial information tells you about how they use financial information in decision making.In order for any company, including Intel, to determine how it is performing in the marketplace, it must keep tabs on its financials at all times. This is often done in the form of financial statements such as the income statement and balance sheet. These two financial statements can provide very valuable information to managers and stakeholders provided they can be interpreted correctly and used accordingly. If they are utilized to their fullest extent, Intel can spotlight any challenges such as low sales or high costs early on and correct them. They can also use this financial information to determine whether or not inventory and credit are being mismanaged, if certain fixed assets are tying up too many funds, or to spot tre nds so that they can adjust the appropriate budgets accordingly. The bottom line to consider, however, is how these things affect the performance of management. Our case study tells us: As a case in point, consider Intel Corp., one of the leading lights of the technology sector for the past 30-some years. They've had their ups and downs, but have been reasonably consistently financially successful. And one of the reasons, of course, is that they have attended very carefully to the financials, and to their relationships with their investors. A quick visit to Intel's Investor Relations website reveals that the company provides certain types of information to the public and the financial markets. This information includes financial information such as earnings results, business outlook, annual reports, 10-Ks, proxy statements, fundamentals, financial statements, and SEC filings. They provide stock information such as a historical stock chart, historical price lookup, investment calculator, stock splits, stock buyback summary, dividend summary, SEC section 16 filings, analyst coverage, earnings estimates, Intel's Transfer Agent, stock purchase and dividend reinvestment. They also offer some of this information through online subscriptions (Intel, 2008). The way in which Intel uses financial information to make decisions is evident in their 10K statement. Underneath the 'Management's Discussion and Analysis of Financial Conditions and Results of Operations,' they state: We make equity investments in companies around the world to further our strategic objectives and support our key business initiatives, including investments through our Intel Capital program. We generally focus on investing in companies and initiatives to stimulate growth in the digital economy, create new business opportunities for Intel, and expand global markets for our products. The investments may support, among other things, Intel product initiatives, emerging trends in the technology industry, or worldwide Internet deployment. We invest in companies that develop software, hardware, or services supporting our technologies. Our current investment focus areas include

Saturday, August 24, 2019

Analyze a Major Retailer Term Paper Example | Topics and Well Written Essays - 2500 words

Analyze a Major Retailer - Term Paper Example Over the years, Macy’s continued success saw the company open regional stores and take over other retailers to increase its presence in the market (Macy’s, 2011) \. Way back in November 25, 1929, another revolution was being made in American retail when Abraham & Straus of Brooklyn, Filene's of Boston, F&R Lazarus & Co. of Columbus, OH, and Bloomingdale's of New York combined together to form Federated Department Stores, Inc. which was later renamed Macy's, Inc. in June 2007(Macy’s, 2011). Each of these retailers had marked and prominent presence in the market with the backing of their rich history. The company grew to be one of the biggest retailers in the company and acquired other stores and retailers in the coming years. It had its own ups and down but in the 1990’s, Federated Department Stores acquired Macys to form Macy’s Inc. Macy's, Inc.  is the owner of both Macy's  and  Bloomingdale's  department stores (Macy’s, 2011). As Fu hrmann (2011) adds, with an annual 2010 sales of $25 billion, Macy’s currently serves its customers in over 800 stores throughout the country and specializes in retail clothing, fashion accessories such as jewellery, handbags and shoes along with household items such as furniture and kitchen items. Macy’s is not just a simple retailer; from its traditional Macy’s Thanksgiving Day Parade and the 4th of July Fireworks to its Annual Flower Shows and the tree lightings and animated window displays at the time of Christmas, Macy’s has always been in the forefront in creating its own distinctive and unique identity (Macy’s, 2011). Innovation at its forefront, Macy’s is very well known as bringing many ‘firsts’ in the retail industry. Macy introduced several revolutionary business practices in the industry; it initiated the one price system, in which an item was sold across the shops to every customer at one price. It also was the firs t company to quote prices of different products in the newspapers. Macy also made history when it assigned Margaret Getchell, the first female executive in the retail industry. It also was the first retail store in New York to hold the license to sell liquor. With its corporate philosophy revolving around the customer, Macy’s has always recognized the importance of directing its strategies towards providing localized shopping experience to its customers. The Corporate Financial objectives of Macy’s, Inc. are: Increasing sales; Increasing profitability levels Have better return on invested capital; Shareholder return should be maximized (Macy’s, 2011). According to Fuhrmann (2011), keeping in mind the above objectives, Macy’s has seen an increase in sales in the year 2010 by 4.6 % as compared to the previous year while its operating income increased by 7.6% of sales in the year 2010. SWOT ANALYSIS A  SWOT  analysis critically studies a company's  int ernal Strengths and  Weaknesses in relation to the external  Opportunities and  Threats it faces coming from its environment. To understand the environment of Macy’s, a SWOT analysis has been conducted. STRENGTHS Diversity: With the acquisitions of small retailers at all regional levels, Macy’s has strategically aligned and integrated diversity in all aspects of its operations. For Macy’s, diversity has become the most integral and essential part of business. Macy’s caters to a much-diversified market and this has made it very beneficial to its customers, vendors, suppliers and business

Law and ethics Essay Example | Topics and Well Written Essays - 500 words

Law and ethics - Essay Example There are instances when the paramedics are faced with extreme pressure, especially when there are patients who refuse to be treated and withhold their consent. This is the exact situation in the case at bar, where the patient Jack refuses any medical treatment and does not want to be taken to the hospital. Hence, the paramedic attending to Jack should be able to practice the â€Å"doctrine of necessity†. â€Å"The Medical Treatment Act of 1988 provides a provision for the competent adult to refuse medical treatment even if the refusal may place their life at risk† (Steer, 2007). In the case of Malette V. Shulman, [1991] 2 Med LR 162, Donnelly J., pointed out that â€Å"the right to refuse treatment was an inherent  component of the supremacy of the patient's right over his own body not  premised on the risks of refusal. He further where a competent adult rejects and medical treatment, â€Å"the courts cannot be dictated by its view of what would be in the best  interests of the patient, but must look to the validity of the refusal in  terms of the capacity of the patient to give such refusal and to determine whether it  must be respected†.

Friday, August 23, 2019

Poverty in Texas Essay Example | Topics and Well Written Essays - 1750 words

Poverty in Texas - Essay Example One such example is of Texas which is under the territory of United States of America. It is analyzed that around 3.8 million people living in Texas were below the poverty line specified by the government in 2006. And if the previous records are analyzed it can be said that the rate of poverty is going to increase further in the recent years (Center for Public Policy Priorities 2008). Â  Texas is the second largest state in the United States of America with an area of at least 697,200 km square. The state has an old history relating to civil unrest and wars and got independence in 1836. However, it got included in the territory of the United States later in 1861. Since then the state of Texas has been suffering from the problem of poverty. The nineteenth century can be marked as a difficult era for the state of Texas as major developments made in the region attracted the population towards the state. This made the state undergo a more financial crisis. This essay would further discuss the changes in the rate of poverty in accordance with the nineteenth century. Â  The early nineteenth century marked a development era for the state of Texas and only in this era was natural resources found in the state. In 1901 the first Oilwell was found in the state of Texas and this developed the state further. ... Â  The poverty rate by the 1920s was stabilized; however, after the great depression in 1929 things began to change again for the residents of Texas. As the Texan economy was recovering from the blow of Great Depression another disaster struck the state which is known as Dust Bowl which took place in the 1930s. This forced many of the residents living in Texas to move further towards other parts of America to survive. The new president took notice of the disasters after getting elected in 1933 and sought out deals to revive the economy. President Roosevelt provided the poor and displaced people with incentives and tried to stabilize the economy once again. The poverty rate in the state of Texas once again had stabilized as many people left the state after the disasters looking for better options. However, on the contrary, many immigrants also entered the densely populated area of Texas to look for a way to survive and this created difficulties for the state of Texas. The problem of poverty rose up to a certain level that it was once again taken into notice by the government in the 1950s and 1960s. Poverty in the United States at that time was defined as the relative income which a family would need to attain certain necessities of life in order to survive. The people who suffered poverty in the 1960s could not afford proper health and educational facilities in the state and these people were usually counted in the group of the poor ones.

Thursday, August 22, 2019

Violence in Society Essay Example for Free

Violence in Society Essay Every evening we turn on the news only to see that mankind has developed new and inventive ways of killing each other. Violence has become commonplace in many areas throughout the world. However there is still hope that one day mankind will learn to live together in peace. Violence is caused by a combination of genetics, fear, ignorance, emotional outburst, and prejudice. Most of these causes can be cured by education. However the capacity for violence may always be hard wired into our genes. (www. Yale. du) By educating people as to what causes violence and how to effectively deal with the emotions that lead to violence, I believe that we can eliminate approximately 90% of the violence in the world. However, I do not feel that mankind will ever completely remove violence from society due to the fact that violence is integrated into our genetic structure. Before we can stop violence in our society we must first learn to take responsibility for our actions and for our children. Today we are having children at a younger age than ever before. When children are born to parents who have not reached the emotional maturity necessary to properly raise children then mistakes are made and the proper values are not taught correctly or at all. This problem can be resolved for the most part by teaching our children the consequences of their actions. For example, we need to teach our children that as much fun as sex can be, sex has some very real consequences. These consequences can only be handled correctly be those people who have had the life experience and have the emotional maturity to know how to properly deal with these consequences. Adolescence is a difficult time for most young people, a time of confusion and unstable emotions. The added pressure of parenthood on top of the normal pressure of adolescence is almost unbearable of some young parents. (kidshealth. org) Today’s children are surrounded by images of violence in the media. Parents should take responsibility for what their children of are exposed to. Kidshealth. org offers A Parent’s Guide to Surviving Adolescence which says, â€Å"Television shows, magazines and books, the Internet kids have access to tons of information. Be aware of what your child is watching and reading. Know what your child is learning from the media so you can explain whats being said or clear up mistakes. † By knowing what your child is watching parents can prevent their children from making the assumption that violence is the correct way to handle a situation. Besides taking responsibility for our children we also have to learn to take responsibility for our own actions. People today have a tendency to rationalize whatever action that they feel will benefit them personally. For example, there have been reports in the news about people who have been killed over little more than the change in their pockets. A need for wealth and power can lead some people to rationalize the murder of another person if it would benefit them in some way. In The United States people have been increasingly asking the government to regulate several aspects of our lives, including everything from which video games are allowed to be sold to telling us what our children should be allowed to watch. I am not against a rating system for movies, however I do feel that this rating system should be used only as a guide and the parents should be ultimately be responsible for which television shows or movies that children are allowed to watch. We should be responsible for our own actions. We should not rely on the government or anyone else to tell us how to behave. Millions of years ago when mankind first appeared on this planet we developed the â€Å"fight or flight† response to danger. This response is instinct and takes place on a subconscious level. The â€Å"fight or flight† response was developed to help keep us alive. When faced with danger such as a predator this instinct helps us to determine quickly if we should run for safety or stand our ground and fight. Over time as mankind has evolved and learned to develop the technological marvels we are so accustomed to today this instinct has become almost obsolete. The average person today lives in a well constructed home not a cave or teepee. We have learned to avoid danger in almost every aspect of our lives. There are many ways that we have learned to protect ourselves, from safety equipment to the warning labels on the side of an over the counter medication package. All of these safety measures that have become a part of our everyday lives have all but eliminated the need for the â€Å"fight or flight† response. Although we have virtually eliminated the need for this instinct we have not learned to deal with the emotional impact that fear has on us. This can lead to people making rash and unreasonable decisions during the times that this instinct is in effect. By educating people from a young age about the â€Å"fight or flight† response and the strong emotions that it produces we can learn to control our fear and to have more control over our actions during these times of heightened emotion. Religion has been used to justify violence in places like the Middle East, where people have been killing each other for generations simply because they do not agree with the others religion. There have been several religious conflicts over areas where important religious events have taken place. Anger over another religious group claiming these holy lands have lead to generations of fear and hatred between these religious groups. By educating the children of these religious groups to be tolerant of religions and cultures these groups can learn to compromise, and find nonviolent solutions to these problems. Have you ever been so angry that you wanted to hurt someone? Emotional outbursts are also sometimes used to justify violence. Anger, jealousy, even greed have been known to be motivating factors in violent crimes. Being human we have powerful emotions that can overwhelm us if we do not know how to properly control them. At one point or another we have all felt justified in hurting another person, either through anger, jealousy, fear, or any one of dozens of emotions. At least part of, the key to controlling these emotions is realizing that there is no shame in feeling these emotions. It is only how we choose to act on these emotions that can be wrong. By giving in to emotion and choosing to injure another person we only continue the cycle of violence. Methods such as meditation, counting to ten, and just simply talking to someone can be used to control anger. Fear can usually be resolved through education. A fear of snakes for example can usually be overcome by learning about snakes and how to handle them. Greed is more difficult to control. The desire for wealth and power can lead people to do things that most people would never dream of doing. However, by teaching our children to value life and the lives of others over wealth and material possessions we should be able to all but eliminate greed from our society. Another factor that can lead to violence is stereotypes. Stereotypes are dangerous because they can lead to fear and prejudice. Humans have a tendency to fear that which we don’t understand. Generalized assumptions about a group of people can only lead to unreasonable fear of that group which in turn can lead to violence against that group of people. For example, if I said that all black people believe that all white people are ignorant rednecks, that would be a stereotype, and may result in some white people being angry with black people for thinking that all white people are ignorant rednecks, even though most black people do not actually believe that all white people are all ignorant rednecks. By educating our children in how to deal with emotions such as anger, hate, and prejudice we can make great strides in eliminating violence from our society. (Anger management violence in society) Children in today’s society are constantly struggling with emotions that they have no idea how to deal with properly. Sometimes when overwhelmed by emotions that they do not understand these children lash out violently. When parents help their children to learn how to properly handle their emotions, children are far less likely to react violently to these emotions. Violence is caused by many factors. Although we may never fully eliminate violence from our society, by educating ourselves about these factors we can greatly reduce the amount of violence in our society. Violence is â€Å"wired† into our genes, but, we can learn to use good judgment to help us overcome the outdated responses we have developed as we have evolved. The best defense against the many factors that cause violence is education.

Wednesday, August 21, 2019

Use of the path-goal theory

Use of the path-goal theory Use of the path-goal theory The Reasoning for the Use of the Path-Goal Theory in the Jeanne Lewis Case Jeanne Lewis, by any measure of the imagination is any prospective employers dream team member. She was committed, articulate, productive, smart, sensitive, motivated, and responsive to challenges. According to Peter Drucker (1998), â€Å"Effective leadership is not about making speeches or being liked; leadership is defined by results, not attributes† (Hersey, Blanchard Johnson, 2008, p. 109). Lewiss team tripled direct product profitability (DPP) and invigorated sales of under-performing stores. All these and much more were demonstrated time and time again throughout Lewiss career at Staples. The Leadership Behaviors that Lewis Used with Her Employees Lewis engaged in different types of leadership behaviors depending on the situation at hand. Her approach to situations and the type of behavior she used further supports Marian Andersons statement that â€Å"Leadership should be born out of the understanding of the needs of those who would be affected by it† (Hersey, Blanchard Johnson, 2008, p. 108). Shortly after Lewis assumed the position of the marketing manager at Staples, she assessed the situation regarding low performance of the stores, and she quickly came to the conclusion that strong leadership was lacking. As a result, she substituted 25 store associates over a 12-month period, which turned around the stores performance for better. Achievement-oriented leadership behavior was what Lewis utilized to achieve this result. Secondly, the tripling of the direct product profitability (DPP) by Lewiss team was another area where Lewis demonstrated a different type of leadership behavior-participative. Lewiss direct report s and peers appreciated her thoroughness when it came to getting her to support their position. The fact that her team members understood this much about her indicated she carried her team along while making decisions. Another way Lewis demonstrated a different type of leadership behavior was duringthe time she tried to foster relationships between the marketing organization and the in-house advertising agency. Her bimonthly meeting was met with stiff resistance. Realizing this was not a good strategy, Lewis changed the meeting to a one-on-one type that yielded results. Here, Lewis demonstrated a supportive type of leadership behavior, since this is what appeared to be desirable to the team members at this point. Also, Lewis used a directive leadership style when she warned her staff she would want to â€Å"ride shotgun† with them. She made it clear to the team what her expectations were. This leadership behavior typically results in improved satisfaction and performance. The director of marketing administration was satisfied with Lewiss strategy to such an extent that she set up one-on-one meetings between her team members and Lewis. Lewiss Leadership Behavior as it Relates to the Characteristics of Path-Goal Theory Path-Goal theory was premised not only on explaining which leadership style was effective, but why the leadership style was effective. House and Mitchell (2008) described path-goal theory as how a leader influences a followers perceived work goals, personal goals, and path to goal achievement. House and Dessler (1974), described path-goal theory as the effective leadership behavior needed in any instance which depends on the characteristics of the situation and the followers characteristics. Theresult Lewiss team was able to achieve as a result of her strategy change could have influenced her team members work goal, thus prompting them to perform well. Secondly, the tripling of the direct product profitability (DPP) by Lewiss team was another area that showcased path-goal theory. Lewiss team members and peers appreciated her thoroughness when it came to getting her to support their position. The fact that her team members had this level of understanding about her clarified the path to their goal, which then showed on the DPP result. Another way Lewis demonstrated characteristics of the pat-goal theory occurred duringher initial days as the vice president of retail marketing, where she set up several one-on-one meetings with her direct reports so that she could understand what part of the marketing puzzle each of them constituted. The marketing administration director saw something in this strategy, which led her to make a move to setup one-on-one meeting between Lewis and each of her own team members. This could have been as a result of the fact that Lewiss behavior was motivating to the extent that this director saw it could influence the attainment of her goal. Furthermore, the productivity that ensued after Lewis changed her strategy to be having a one-on-one status meeting with her team members after her initial bimonthly meeting approach flopped exemplified path-goal theory in that her team members could have gotten their work done due to the fact that th ey saw a clear path to them achieving their goal. The Behavior of Employees in Relation to Lewiss Leadership Style Several of Lewiss direct reports commented on her behaviors. One of them said: â€Å"Jeannes charm could be disarming. She worked really hard, and her personality motivated you. She tended to manage tightly at first, then loosened the reins. She challenged us a lot, and invited us to challenge each other†(Suesse Hill, 2005, p. 86). The directive leadership behavior Lewis used when she warned her staff she would want to â€Å"ride shotgun† with them was well accepted-as shown by the reaction of the marketing administration director. She was so satisfied with Lewiss strategy that she setup one-on-one meeting between her team members and Lewis. Employeeswarmlywelcomed Lewiss supportive leadership style as depicted with her change in strategy after the time she tried to foster a relationship between the marketing organization and the in-house advertising agency. Even though her bimonthly meeting was met with stiff resistance, her one-on-one meetings yielded good results. Thirdly, the participative leadership style used by Lewis during the tripling of the direct product profitability (DPP) was received well by employees. Initially they had mixed feelings about Lewiss leadership behavior, which one of them first felt was micro-managing before realizing that Lewis was just someone who liked to promote dialogue and debate to ensure that the best decision was arrived at. The fact that Lewis and her team in marketing while she was a manager there were able to invigorate sales performance within a 12-month period was an indication that she carried them along well and they were pleased with the things that they were able to archive together. This is consistent with achievement-oriented leadership behavior. Aspects of the Relationship of Employee Behavior as it Relates to the Characteristics of the Path-Goal Theory Path-Goal theory explains leaders effectiveness and the impact that leaders have on the followers motivation. The framework of instrumentality theory and path-goal theory suggest that the effectiveness of any leader at any given point depends on the characteristics of the situation and the characteristics of the follower. Several instances of this were observed throughout Lewiss carrier at Staples. It was repeated time and time again that Lewis had a personality that many may have misconstrued because of its confrontational nature. During her early days at Staples, Lewis herself acknowledged that she might not be able to work across the organization. At this point, she had barely been appointed a leader. One could then infer that all the zeal and the willingness to get things done was as a result of the belief that her hard work would someday get her into a management position, which she highly valued. The rejection that Lewis received when she started a bimonthly meeting was not a result of the ineffectiveness of the new structure she was trying to put in place; it was due to the fact that this did not influence her team members expectations, and their work and personal goal perhaps did not hinge on this. The same structure when changed to a one-on-one status meeting yielded the desired results. According to the observation made by one of the managers about the one-on-one status meetings, â€Å"She asks the kind of questions that provoked real interaction, so it really is a joint discussion† (Suesse Hill, 2005, p. 86). The South Africa studies around participation, individual differences, and job satisfaction among black and white employees results are better explained by the path-goal theory. Contrary to the expected conclusion that participative leadership is positively related to the individual differences, the theory concluded that participative leadership actually depends on the attributes of the task regardless of the predispositions of the subordinates. In the same vein, a study of the subordinates achievement (NACH) and affiliation (NAFF) needs as moderators of leader path-goal relationship conducted in Pennsylvania State University, drawn several interesting conclusions. One of the findings is that high NACH individuals prefer leaders with good strategies, policies, and rules who clarify paths to achievement (Orpen Ndlovu, 1977).

Tuesday, August 20, 2019

Foreign Tourist Behavior And Perceptions Of Indian Tourism

Foreign Tourist Behavior And Perceptions Of Indian Tourism Tourism industry is one of the major industries of the world. Various sub-sectors of this industry have been developing special relationships among themselves to eliminate competition and cost. Tourism is an important part of economic life and is closely associated with services like travel, food and accommodation. A significant part of human activity is connected with tourism. We can consider the structure of tourism industry in a form in which certain countries offer better destination, quality, and improved programmes with innovations laced with ideas of establishing product differentiation. The aim of this paper is to provide a practical approach towards the satisfaction pattern of foreign tourist behavior towards Indian tourism. This paper also depicts a clear study of behavioral understanding of foreign tourist which is presented through a qualitative research framework. Findings highlight the satisfaction level of foreign tourists with respect to Indian tourism. Gap is evaluated between satisfaction and dissatisfaction, and strategies to enhance Indian tourism are suggested for future to create a differentiation. KEY WORDS: Tourism, customers satisfaction, differentiation. INTRODUCTION: Tourism is travel for recreational, leisure or business purposes. The World Tourism Organization defines tourists as people who travel to and stay in places outside their usual environment for more than twenty-four (24) hours and not more than one consecutive year for leisure, business and other purposes not related to the exercise of an activity remunerated from within the place visited. Tourism is an industry that operates on a massively broad scale: it embraces activities ranging from the smallest sea-side hotel; to air-lines, multi-national hotel chains and major international tour operators. Originally, non-traditional industries such as tourism emerged as a solution to strike a balance between ecology and industry. The tourism industry is now one of the largest sectors earning foreign exchange for the exchequer. In the face of such benefits, many countries have started assigning due weight age to the tourism industry in their national development agenda. The Holistic view of Tourism Industry in India: India has been ranked the best country brand for value-for-money in the Country Brand Index (CBI) survey conducted by Future Brand, a leading global brand consultancy. India also claimed the second place in CBIs best country brand for history, as well as appears among the top 5 in the best country brand for authenticity and art culture, and the fourth best new country for business. India made it to the list of rising stars or the countries that are likely to become major tourist destinations in the next five years, led by the United Arab Emirates, China, and Vietnam. India attracted about 4 million foreign tourists in 2006 that spent US$8.9 billion. The tourism industry in India generated about US$100 billion in 2008 and that is expected to increase to US$275.5 billion by 2018 at a 9.4% annual growth rate. The Ministry of Tourism is the nodal agency for the development and promotion of Tourism in India. It maintains the Incredible India campaign. However, Indias tourism sector currently lags behind less endowed countries and faces serious challenges including shortage of hotel rooms and security of foreign tourists. In 2007, there were only 25,000 tourist-class hotel rooms in the whole of India. Among other factors hindering the growth of the tourism industry in India are stringent visa requirements and congested airports. Despite short- and medium-term setbacks, tourism revenues are expected to surge by 42% from 2007 to 2017. Despite some upheavals, the upward trend in tourism is noticed almost everywhere. Terrorism, threats of wars and economic problems have not been able to harm the industry except for short periods. The overall global picture of tourism arrivals and revenues has been quite good everywhere. The basic spark for tourism comes from the quest for knowledge of different cultures and some illusive or real charms of distant destinations. Adventurous spirit acts as a magnetic pull for many people. Time and resources permitting, they want to leave their places of residence intermittently. This gene of curiosity and favorable factors like politico-economic developments and technological change leading to increase in speed and comfort of travel has brought about a revolution in the tourist activity. After the stalemate of World War II, many countries worked hard to improve their infrastructure facilities for the tourists. The laissez faire tourism policy of leaving the job to bureaucrats or clerks was given up in favor of scientific management with high productivity and efficiency. In several countries, a proper management of the tourism sector was undertaken and an intensive study of different aspects of innovation tourism was carried out. Some tourism inducing factors like favorable government policies, higher incomes, more holidays and leave opportunities have been conducive to the growth of tourism. People want to move out because of the increasing stress at work and tension and also because of the desire to get away from a polluted atmosphere. Social and seasonal pressures too, generate a short term feeling of the need for abandonment, peaceful relaxation or recuperation. It could be also escapism or an adventurous idea. Each situation gives rise to different types of tourists. Marketing of tourism and tourist / consumer behavior: Tourism is a service sector which earns a substantial foreign exchange to developing countries. In India, Kerala is one of the important destinations for the international tourists with its unique nature beauty with backwaters, mountains and beaches. To make the tourism a great success one has to take advantage of the modern technology to full extent. Present paper is an attempt to market tourism by adapting the service marketing approach for achieving great success. Being a service product it has to adopt Service marketing principles. This process is explained through the service triangle. (SERVICE MARKET TRIANGLE) a) Company: The company in the Tourism Sector can be the Central Government, the State tourism Corporations, Tour Operators such as SOTC, ITDC, etc. The company carries out External Marketing as well as Internal Marketing External Marketing: It makes promises to the customers, for e.g. the Malaysian governments advertisement Malaysia, Truly Asia that promises a veritable cultural paradise to the customer. Internal Marketing: The Company enables the Providers to fulfill the promises made by it to the customers. For example, the Malaysian Government maintains the local transportation within the country, maintains the tourist spots such as KL Towers, etc. b) Providers: The Providers include all the entities that finally fulfill the Companys promise to the Customers. They undertake Interactive Marketing, because they are in touch with the final customer. Thus in the case of the Malaysian government, this would include the transportation providers (Malaysian Airlines, Air India, local bus transportation, local trains in Kuala Lumpur, car and two-wheeler rentals), the different hotels within Malaysia (Tanjam Putri), souvenir outlets at tourist areas, tourist spots (Genting highland, KL Towers, Twin Towers, etc.), restaurants (KFC Joints, Mary Brown, Pizza Hut), etc. c) Customers: These are the end users of the final service delivered by the providers. The satisfaction and dissatisfaction will depend upon the efficiency of the delivery in the service process as well as the promises kept by the service providers. EX. If jet Airways promises to reach a particular destination on a given time, the satisfaction of travelers will depend upon the timely arrival of that flight. Applications of the Gaps Model: Perceived service quality can be defined as, according to the Gaps model, the difference between consumers expectation and perceptions which eventually depends on the size and the direction of the four gaps concerning the delivery of service quality on the companys side (Parasuraman, Zeithaml, Berry, 1985). Customer Gap = f (Gap 1, Gap 2, Gap 3, Gap 4) The magnitude and the direction of each gap will affect the service quality. For instance, Gap 3 will be favourable if the delivery of a service exceeds the standards of service required by the organization, and it will be unfavourable when the specifications of the service delivered are not met. First of all the model clearly determines the two different types of gaps in service marketing, namely the customer gap and the provider gaps. The latter is considered as internal gaps within a service firm. This model really views the services as a structured, integrated model which connects external customers to internal services between the different functions in a service organization. Important applications of the model are as follows: The 10 determinants of service quality (Parasuraman, Zeithaml, Berry, 1985) 1. The gaps model of service quality gives insights and propositions regarding customers perceptions of service quality. 2. Customers always use 10 dimensions to form the expectation and perceptions of service quality. 3. The model helps predict, generate and identify key factors that cause the gap to be unfavourable to the service firm in meeting customer expectations. Thus, Perception, expectation and delivery are three basic features on which the success of Tourism depends. Knowledge sharing, change and innovation in human societies, as well as economic renaissance have much to do with tourism, which is accompanied by a cross of experiences, social movements, nascent explorations, interaction and coordination of a variety of social system. A tourist is basically interested in a well satisfying experience at a tourist destination. His decision starts with a conglomeration of perception and expectation in the context of the place to be visited. An understanding of a tourist journey can be highly revealing if we can carry out an analysis of three basic factors associated with a tourist. These are his perception, expectation and delivery of the tour. OBJECTIVES OF THE STUDY: The proposed paper has the following intended objectives: To identify how foreign tourists influences the Indian tourism. To envisage the attitude of foreign tourist about Indian tourism. To suggest strategies to bridge the gap between expectation of tourist and delivery process. HYPOTHESIS: Following hypothesis were set for this study: 1. H1: Safety and security is an important factor in foreign tourism 2. H2: Foreign tourists experience overall satisfaction from their visit to India 3. H3: Indias rich diversity in culture plays a major role for attracting foreign tourist RESEARCH DESIGN USED: In this case, a descriptive research and causal research design study is used to study the relationships in question. Descriptive research facilitates the study to obtain accurate and complete information regarding a concept or a situation or a practice. The objective of a descriptive research revolved around who, what, when and how of a topic. Causal research facilitates the study to know whether one variable is having an effect on another variable. DATA COLLECTION: Here, both primary and secondary data is considered. Secondary data is collected from the international and national journals like Journal of Research in tourism, reputed working papers and other reputed journals. Primary data is gathered using Questionnaire as a tool for data collection. Sampling Technique: Stratified Random Sampling is done for selection of respondents. Sampling Population- place selected: The respondents were foreign tourists in Mumbai. Sample Size: Total 100 foreign tourist respondents were surveyed in Mumbai. DATA ANALYSIS: Data collected through Questionnaire was tabulated using Excel Personal Details: 1. Gender: Out of total 100 foreign tourist respondents, 53% respondents were females and 47% were males. 2. Marital Status: Out of total 100 foreign tourist respondents, 57% respondents were married and 43% were single. 3. Country of domicile: Out of total 100 foreign tourist respondents, 46% were American, 27% belong to Europe, 17% were from Asia, and 10% were from other country of origin. 4. Purpose of Visit: Out of total 100 foreign tourist respondents, 50% of respondents visited India for conferences, 37% for holiday/ sight seeing, 7% came to visit friends and relatives, 3% came for studies and 2% came for business purposes. 5. Age: From the above, it is seen that 40% respondents belong to 41-50 years age group, 33% belong to 31- 40 years age group, 27% belong to 20-30 years age group, none of the respondents were under 20 years and above 51 years. DETAILED ANALYSIS: The detailed analysis of the data is given below. 1. Levels of expectation on the following aspects before tour visit to India: 1.1 Information on India as a tourist destination: The data presented reveals that nearly 57% of foreign tourist respondents had High expectation from Indian tourism and 17% of foreign tourist respondents said that they had very low expectation from Indian tourism. 1.2 Accessibility to India from other parts of the globe (ease of getting visa, availability of flights and trains): The data presented reveals that nearly 77% (13% very high and 64% high) of foreign tourist respondents had high expectation with respect to accessibility parameter and 3% of foreign tourist respondents said that they had very low expectation for the same. 1.3 Quality of infrastructure, amenities of hotel/ lodge/ guest house/ hostel available: The data presented reveals that 37% of respondents had very high expectation with respect to Quality of infrastructure, amenities of hotel/lodge/guest house/ hostel facility in India 43% of foreign tourist respondents had high expectation and 3% of foreign tourist respondents said that they had low expectation for the same, 17% of respondents said that they had moderate expectation i.e. neither to high nor to low. 1.4 Quality and variety of food: The data presented reveals that 27% of respondents had very high expectation with respect to Quality and variety of food in India, 46% of foreign tourist respondents had high expectation and 7% of foreign tourist respondents said that they had low expectation for the same, 20% of foreign tourist respondents said that they had moderate expectation i.e. neither to high nor to low. 1.5 Level of hygienic condition: The data presented reveals that 20% of foreign tourist respondents had very high expectation with respect to Level of hygienic condition, 40% of foreign tourist respondents had high expectation and 14% of foreign tourist respondents said that they had low expectation for the same, 3% of foreign tourist respondents said that they had very low expectation and 23% of foreign tourist respondents said that they had moderate expectation i.e. neither to high nor to low. 1.6 Postal and Banking facilities with money changing facilities: The data presented reveals that 30% of respondents had very high expectation with respect to Postal and Banking facilities with money changing facilities available in India, 36% of foreign tourist respondents had high expectation and 7% of respondents said that they had low expectation for the same and 27% of foreign tourist respondents said that they had moderate expectation i.e. neither to high nor to low. 1.7 Travel agents and guide services: The data presented reveals that 30% of respondents had very high expectation with respect to Travel agents and guide services available, 36% of foreign tourist respondents had high expectation and 7% of foreign tourist respondents said that they had low expectation for the same and 27% of foreign tourist respondents said that they had moderate expectation i.e. neither to high nor to low. 1.8 Safety and Security of Tourist: The data presented reveals that 30% of foreign tourist respondents had very high expectation with respect to Safety and Security of Tourist in India, 40% of foreign tourist respondents had high expectation and 3% of foreign tourist respondents said that they had low expectation for the same and 27% of foreign tourist respondents said that they had moderate expectation i.e. neither to high nor to low. 1.9 Attitude of local people towards tourist: The data presented reveals that 27% of respondents had very high expectation with respect to Attitude of local people towards tourist in India, 43% of respondents had high expectation and 10% of respondents said that they had low expectation for the same, 3% of respondents said that they had very low expectation and 17% of respondents said that they had moderate expectation i.e. neither to high nor to low. 1.10 Tourist information centers at prominent locations: The data presented reveals that 23% of respondents had very high expectation with respect to Tourist information centers at prominent locations in India, 35% of respondents had high expectation and 13% of respondents said that they had low expectation for the same and 29% of respondents said that they had moderate expectation i.e. neither to high nor to low. 1.11 Responsiveness to customer complaints: The data presented reveals that 20% of foreign tourist respondents had very high expectation with respect to Responsiveness to customer complaints, 40% of foreign tourist respondents had high expectation, 10% of foreign tourist respondents said that they had low expectation for the same and 23% of foreign tourist respondents said that they had moderate expectation i.e. neither to high nor to low. 2. Levels of satisfaction on the following aspects after tour visit to India: 2.1 Information on India as a tourist destination: The data presented reveals that nearly 43% of respondents were satisfied from Indian tourism after their visit and 13% of respondents said that they were dissatisfied from Indian tourism, 44% of respondents said that they were neither satisfied nor dissatisfied from Indian tourism. None of the respondents were delighted from the same. 2.2 Accessibility to India from other parts of the globe (ease of getting visa, availability of flights and trains): The data presented reveals that 53% of respondents were satisfied with respect to accessibility parameter to India and only 3% of respondents said that they were delighted for the same. 37% respondents said that they were neither satisfied nor dissatisfied with respect to accessibility parameter to India and only 7% said that they were dissatisfied from the same. 2.3 Quality of infrastructure, amenities of hotel/ lodge/ guest house/ hostel available: The data presented reveals that 57% of foreign tourist respondents were satisfied with respect to Quality of infrastructure, amenities of hotel/ lodge/ guest house/ hostel facility in India, 13% of foreign tourist respondents said they were delighted with the above said parameters, 27% of foreign tourist respondents said that they were neither to satisfied nor to dissatisfied. 2.4 Quality and variety of food: The data presented reveals that 67% of respondents were satisfied with respect to Quality and variety of food in India, 23% of respondents said that they were delighted, 3% of respondents said that were dissatisfied for the same, 7% of respondents said that they were neither to satisfied nor to dissatisfied with the quality and variety of food in India. 2.5 Level of Hygienic conditions: The data presented reveals that 47% of respondents were satisfied with respect to level of hygienic conditions in India, 13% of respondents said that they were delighted, 10% of respondents said that were dissatisfied for the same, 30% of respondents said that they were neither to satisfied nor to dissatisfied with the quality and variety of food in India. 2.6 Postal and Banking facilities with money changing facilities: The data presented reveals that 47% of foreign tourist respondents were satisfied with respect to the Postal and Banking facilities with money changing facilities in India, 20% of foreign tourist respondents said that they were delighted, none of foreign tourist respondents said that were dissatisfied or very dissatisfied for the same, 33% of foreign tourist respondents said that they were neither to satisfied nor to dissatisfied with the Postal and Banking facilities with money changing facilities in India. 2.7 Travel arrangements (Travel agents and guide services): The data presented reveals that 43% of foreign tourist respondents were satisfied with respect to Travel arrangements (Travel agents and guide services) in India, 10% of foreign tourist respondents said that they were delighted, 7% of foreign tourist respondents said that were dissatisfied for the same, 40% of foreign tourist respondents said that they were neither to satisfied nor to dissatisfied. 2.8 Safety and Security of tourist: The data presented reveals that 43% of foreign tourist respondents were satisfied with respect to safety and security measures of tourist in India, 7% of foreign tourist respondents said that they were delighted, 7% of foreign tourist respondents said that were dissatisfied for the same, 40% of foreign tourist respondents said that they were neither to satisfied nor to dissatisfied. 2.9 Attitude of local people towards tourist: The data presented reveals that 50% of foreign tourist respondents were satisfied with respect to Attitude of local people towards tourist in India, 10% of foreign tourist respondents said that they were delighted, 17% of foreign tourist respondents said that were dissatisfied for the same, 23% of foreign tourist respondents said that they were neither to satisfied nor to dissatisfied. 2.10 Tourist information centers at prominent locations: The data presented reveals that 37% of respondents were satisfied with respect to Tourist information centers at prominent locations in India, 13% of respondents said that they were delighted, 17% of respondents said that were dissatisfied for the same, 3% said that they were very dissatisfied, 30% of respondents said that they were neither to satisfied nor to dissatisfied. 2.11 Responsiveness to customer complaints: The data presented reveals that 47% of respondents were satisfied with respect to responsiveness to customer complaints in India, only 3% of respondents said that they were delighted, 30% of respondents said that were dissatisfied for the same, 3% said that they were very dissatisfied, 17% of respondents said that they were neither to satisfied nor to dissatisfied. 3. Miscellaneous: 3.1 Respondents visit to India before: Out of total 100 respondents, 63% respondents said that they have visited India before, 37% respondents said that they have not visited India before. 3.2 Rating the overall satisfaction with respect to the respondents experience about touring in India: The data presented reveals that 47% respondents said that they had overall satisfaction with respect to the experience about touring in India, 13% respondents were extremely satisfied, 33% respondents said that they were neither satisfied nor dissatisfied with respect to the experience about touring in India, 7% respondents said that they were dissatisfied for the same. 3.3. Based on the experience, recommendation given to friends, relatives to visit India: The data presented reveals that 13% respondents said that they will always recommend to their friends and relatives to visit India due to their own experience, 53% respondents said that they will almost always refer the same, 20% respondents said that they will sometime refer, 7% respondents said that they were rarely refer and 7% respondents said that they will never refer to their friends and relatives to visit India. 3.4. Rating the extent of importance by the respondents to each of the activities when they are on tour in India: a) Getting away from stress: The data presented reveals that 13% respondents said that getting away from stress is very important factor for them to come on tour in India, 17% respondents said that it is an important factor, 46% respondents said that getting away from stress is not at all an important factor for them to come on tour in India, 17% respondents said that it is not important factor and 7% respondents said that it is not important nor unimportant factor for them. b) Health reasons: The data presented reveals that 13% respondents said that health reason is very important factor for them when they to come on tour in India, 27% respondents said that it is an important factor, 7% respondents said that it is not at all an important factor for them to come on tour in India, 10% respondents said that it is not important factor and 43% respondents said that it is not important nor unimportant factor for them. c) Learning about India and its culture: The data presented reveals that 27% respondents said that learning about India and its culture is very important factor for them when they to come on tour in India, 23% respondents said that it is an important factor, 3% respondents said that it is not at all an important factor for them to come on tour in India, 10% respondents said that it is not important factor and 37% respondents said that it is not important nor unimportant factor for them. Testing of Hypotheses: 1. H1: Safety and Security is an important factor in foreign tourism Rating the expectation level about Safety and Security factor of Tourist: The data presented reveals that 30% of respondents had very high expectation with respect to Safety and Security of Tourist in India, 40% of respondents had high expectation and 3% of respondents said that they had low expectation for the same and 27% of respondents said that they had moderate expectation i.e. neither to high nor to low. Rating the satisfaction level about Safety and Security factor of Tourist: The data presented reveals that 43% of respondents were satisfied with respect to safety and security measures of tourist in India, 7% of respondents said that they were delighted, 7% of respondents said that were dissatisfied for the same, 40% of respondents said that they were neither to satisfied nor to dissatisfied. The above data revels that majority of foreign tourists have high expectations about security and safety parameter and at the same time most of them are satisfied and delighted from the same. This states that foreign tourist care about their security and safety. Thus, H1: safety and security is an important factor in foreign tourism holds true. 2. H2: Foreign tourists experience overall satisfaction from their visit to India Rating the overall satisfaction with respect to the respondents experience about touring in India: The data presented reveals that 47% respondents said that they had overall satisfaction with respect to the experience about touring in India, 13% respondents were extremely satisfied, 33% respondents said that they were neither satisfied nor dissatisfied with respect to the experience about touring in India, 7% respondents said that they were dissatisfied for the same. Thus, from the above it is seen that most of the foreign tourists are satisfied with their overall experience about touring in India. H2: Foreign tourists experience overall satisfaction from their visit to India holds true. 3. H3: Indias rich diversity in culture plays a major role for attracting foreign tourist Rate the extent of importance: Learning about India and its culture The data presented reveals that 27% respondents said that learning about India and its culture is very important factor for them when they to come on tour in India, 23% respondents said that it is an important factor, 3% respondents said that it is not at all an important factor for them to come on tour in India, 10% respondents said that it is not important factor and 37% respondents said that it is not important nor unimportant factor for them. Thus, the above data shows that majority of foreign tourist visit India for its rich diversity in culture and heritage. H3: Indias rich diversity in culture plays a major role for attracting foreign tourist, holds true. CONCLUSION: All types of tourism in India have registered phenomenal growth in the last decade ever since the Indian government decided to boost revenues from the tourism sector by projecting India as the ultimate tourist spot. The reason why India has been doing well in all types of tourism in India is that India has always been known for its hospitality, uniqueness, and charm attributes that have been attracting foreign travelers to India in hordes. From the study it is evident that mostly male foreign tourist visit India mostly for attending conferences. India attracts tourism for its richness in diversity and culture of which Medical tourism is also picking up pace in India, attracting foreigners. Overall foreign tourists are satisfied with the tour in India, some gap exits in expectation and perseverance pattern. This gap is bridged in recommendations. RECOMMENDATION: The study revealed the gap that existed between perception and expectation of foreign tourist. This gap is bridged as follows. a) Perception: Perception is the process by which information from the environment is received and interpreted and used in decision making through the interaction of various senses with known aspects of the tourist activity. The accuracy and nature of a persons perception determines the quality of decision and the subsequent action. Perception requires a stimulus which can be something visual or otherwise. The perception about a tourist spot may depend on the nature of the spot under consideration as well as the nature of the tourist who is bounded by his own ideas, possibly based on his values and current attributes. The nature of the spot would be judged by its location, surroundings and characteristics depending on the taste of the tourist who may or may not be bothered about external appearances. A fun loving tourist will have a very different perception of a spot in comparison with an academic minded tourist. Perception is used to make decisions. The actual experience which depends on the delivery pattern influences future decisions. Different individuals have different perception about the same thing. It may so happed some tourist are interested in some aspect of tourist spot which they consider specific or important. The differences of opinion may be based on their education and background. The int