Tuesday, December 31, 2019

Company Uses For Reward Employees For Performance

Introduction Compensation refers to a wide array of benefits and pay that a company uses to reward employees for performance. Strategic compensation refers to any type of compensation strategy that is aimed at rewarding good performance. Because the variety of companies and their internal structure varies wildly, compensation strategies can vary wildly. For example, many direct sales companies where employees are actually independent contractors use strategic compensation strategies, giving prizes for hitting certain sales goals and increasing compensation percentages with sales. On the other end of the spectrum, large corporations almost always include stock options in higher-level compensation strategies, which directly ties the†¦show more content†¦Furthermore, it is important to keep in mind that what works in the United States may differ from what works in other countries. While there is a largely global business environment, the regulations, rules, and business no rms that govern U.S. corporate structure may make some types of strategic compensation more critical in the United States. For example, in most industrialized nations, the availability of universal healthcare means that health insurance as part of an overall compensation structure is not that important. Furthermore, different rules regarding maternity leave, family and medical leave, and retirement savings can all make international models inapplicable to an American setting without making some significant alterations to those strategies. Knowledge Management Capacity Of course, strategic compensation does not exist in isolation in any business environment. Instead, strategic compensation packages and idea are often indicative of a greater attitude towards recognizing and rewarding employee innovation. As a result, it should come as no surprise that companies that practice strategic human resources practices are more likely to have greater knowledge management capacity (Chen Huang, 2009). Knowledge management capacity is positively related to innovation performance (Chen Huang, 2009). Therefore, it is critical to examine an entire corporate culture when looking at the relationship between employee performance and strategic compensation

Monday, December 23, 2019

Essay on The Maturity of Telemachus - 1057 Words

Prince Telemachus of Ithaca was living in a world of greed and disrespect during his fathers twenty-year hiatus. His father, King Odysseus, had set off to fight along with fellow Greeks in the Trojan War. After the war, all the Greeks who did not perish during the battles had made it back to their homelands, with the exception of Odysseus. During this time suitors had taken over Odysseus palace and were courting his wife. It was time for Telemachus to take action against the crude suitors and become a mature adult. In The Odyssey by Homer, a young prince sets off to learn news about his father. At the same time Telemachus meets influential people who introduce him to a whole new world, which propels him to become a mature and†¦show more content†¦When Telemachus sees this, he tells his mother that the bards are here for entertainment not to dishearten anyone. He then sends his mother off to her room so he could address the crude suitors. After these two events the su itors were in awe that Telemachus had the poise to stand in front of them and tell them to leave. The suitors did not think much of his actions and went back to dancing and singing. These two actions show the beginning of Telemachus maturity. When Athena came in disguise to help Telemachus, the name Mentor was appropriately fitting. Before Mentor approached Telemachus, no one was trying to control the suitors or make them leave. But, the advise Mentor gave Telemachus encouraged him to take action against the shameless suitors. He proves to be the man of the house by standing up to his mother so he could address the crowd. He is learning how to take control of a situation, which he does not stand for, and how to stand up for himself and his family. Next, Telemachus did as Mentor told him and sailed off to Pylos in search of his father. When Telemachus landed on the shore of Pylos, he found King Nestor and his son sacrificing bulls to the Gods. Telemachus is graciously received by Nestor, and is invited to be a guest at dinner. After dinner Telemachus and Nestor introduce themselves and Telemachus explains the reason for his visit. Nestor does not provideShow MoreRelatedAnalysis Of Homer s The Odyssey 1276 Words   |  6 PagesArle chia Nisby Professor Parker World Literature Sept 24,2015 Telemachus: Test of maturity In Homer s heroic poem the Odyssey,Telemachus is an important character because will be the one to become king of Ithaca if his father s Odysseus does not return home. However during this time he is not only protecting his mother from a suitor s hand in marriage,but is forced to mature within a year s time. Telemachus share strong physical characteristics of his father and based of the knowledge of hisRead Mo reWhat Determines When A Boy Becomes A Man?1296 Words   |  6 PagesHomer’s ideas on how to become a man. Throughout the epic, Homer establishes a clear hypothesis of this transition directly with the character of Telemachus, a feeble child that eventually surprises many. With the help of the goddess Athena, Homer connects the theme of becoming a man with Telemachus’ actions. In The Odyssey, the sub-story of Telemachus’ guided actions towards manhood is a direct result of his power to overcome the pain of abandonment, to assume the responsibility of hospitality,Read MoreComparing The Odyssey And Gilgamesh986 Words   |  4 Pagesking and the other has been king for some time, although one of them is part god, but this does not make a difference in their journeys to maturity. Odysseus’s son Telemachus was a child when he left to got to war with Troy. His son did not have the guidance that most kings’ son would have as Odysseus was gone for over 10 years. It came to a time that Telemachus had to take charge of his father’s kingdom with no confidence and training, but Athena tells him â€Å"You must not cling to your boyhood anyRead MoreOdysseus V Telemachus Essay1469 Words   |  6 PagesJon Dunlap 3/8/12 Odysseus v Telemachus Period 2 â€Å"Maturity has more to do with what types of experiences youve had, and what youve learned from them, and less to do with how many birthdays youve celebrated.† – Anonymous (Thinkexist.com). Maturity is a key theme during the journeys of Telemachus and Odysseus. In Homer’s Odyssey the journeys of Telemachus and Odysseus have many similarities and differences such as their common goal and the lessons they learn; and only by overcomingRead MoreThe Odyssey - Telemachus Journey1219 Words   |  5 Pagesthe next ten years trying to get home. He left behind an infant son, Telemachus, and a devoted wife, Penelope. Although they longed for Odysseus return, Penelope and Telemachus were the perfect hosts to wayward strangers - even as their estate became overrun with arrogant suitors - men intent on marrying Penelope and taking possession of the throne. Athena, goddess and daughter of Zeus, is instrumental in encouraging Telemachus to begin his journey to adulthood s aying, You must not cling to yourRead MoreAnalysis Of Homer s Odyssey By Homer1202 Words   |  5 PagesTelemachus, who is the son of Odysseus was seen to be insecure and immature that had trouble in making decisions in his life. He had trouble coping with the idea of losing his father and letting others to rule Ithaca. It is noticeable from the beginning of The Odyssey, written by Homer that Telemachus finds himself in a complicated situation where his life is seen to be in danger. He is a character of being distance from people. The idea of Telemachus becoming his own father, threatens suitor’s controlRead MoreTelemachus-Odysseus Father Son Relationship Essays987 Words   |  4 Pagesrelationships with his family and friends of Ithaka. It’s possible the restoration of his relationship with his son, Telemachus, is the most significant event of all. This reconnection carries out three main purposes. First, it serves to characterize Telemachus likeness to his father i n the virtues of wisdom, humility, patience, and organization. Secondly, it enables Odysseus a chance to coach Telemachus on how to be a powerful ruler like he is. Lastly, Homer uses the reconnection to highlight the importanceRead MoreRelationships Between Telemachus And Characters Essay1069 Words   |  5 PagesThe Various Relationships Between Telemachus and Others in his Household Vanesa Martinez-Chacon In the Odyssey Telemachus has varying relationships with his mother, Penelope, the suitors, and his nurse, Eurycleia; a mother and son but also head of household and subordinate member of the household, a young boy and superior men, and a son and mother but also a master and servant. In the poem, Telemachus must find out what became of his father, Odysseus, who never returned home from the Trojan warRead MoreVirtue in Telemachus’ Life946 Words   |  4 PagesTelemachus is the son of Odysseus and Penelope in the Odyssey. He was raised without a father and this caused him not to have a strong male example in his life. He was forced to mature into a man on his own and become the man his father was. Telemachus is required to figure out ways to be honorable on his own and this causes him to have a deeper responsibility than the normal man of his age. In Telemachus’ life, he is able to mature into an adult man capable of making virtuous decisions and actingRead MoreThe View Of Fate Over Free Will, And Vice Versa1599 Words   |  7 Pagesevent influence what happens with the other characters. First, let us start with the growth and maturity of Telemachus. For three years while Penelope was executing her plan, Telemachus stood by and watching one hundred and eight men slowly chipped away at his household and father’s legacy, festering disgust and hatred towards them. Since his mother appeared to have the situation under control, Telemachus didn’t grow up and confront the situation because he didn’t need to; it wasn’t his time yet. However

Saturday, December 14, 2019

Depreciation and Useful Life Free Essays

Buildings, machinery, equipment, furniture, fixtures, computers, outdoor lighting, parking lots, cars, and trucks are examples of assets that will last for more than one year, but will not last indefinitely. Over time, these assets depreciate. Depreciation is defined as a non-cash expense that reduces the value of an asset as a result of physical or functional factors over time. We will write a custom essay sample on Depreciation and Useful Life or any similar topic only for you Order Now Therefore, the costs of the fixed assets should be recorded as an expense over their useful lives, since they depreciate and must be replaced once the end of their useful life is reached. Physical depreciation factors include wear and tear during use or from being exposed to such things as weather. Functional depreciation factors include obsolescence or changes in customer needs that cause the asset to no longer provide services for which it was intended or needed. When it comes to computing depreciation, there are three factors that determine the depreciation expense for a fixed asset: the asset’s initial cost, expected useful life, and estimated residual value. And there are also three different ways to calculate depreciation: the straight –line method, the units-of-production method, and the double-declining-balance method. The straight-line method of depreciation provides the same amount of depreciation expense for each year of the asset’s useful life, and is known to be the most commonly used method of calculating depreciation. The unit’s-of-production method of depreciation provides the same amount of depreciation expense for each unit of production. Based on what the asset is, the unit’s-of-production method can be expressed in terms of quantity produced, miles, hours, etc. and is often used when the fixed assets in service time or use varies from year to year. The double-declining-balance method of depreciation provides for a declining periodic expense over the expected useful life of the asset. The double-declining-balance method shows a higher depreciation in the first year of the asset’s use, followed by declining depreciation amounts in the years following, which is why this method is also referred to as an accelerated depreciation method. There are several different types of assets that depreciate over time. Depreciation refers to fixed assets, which exist physically, thus making them tangible assets. In some cases, there are assets that do not depreciate. An example of an asset that does not depreciate would be land since it has an unlimited useful life. If land has a limited useful life, as is the case with a quarry, then it is acceptable to depreciate it over its useful life. One example of an asset that would depreciate would be a MacBook Pro laptop. This is an asset that I would use the straight-line method for being that while computers and technology are constantly changing; devices such as MacBook Pro’s seem to consistently hold their value. Let’s say you purchased the MacBook Pro for $2800 with an expected useful life of 5 years and an estimated residual value of $700, according to the straight-line method of depreciation, it would be calculated as: Annual Depreciation = Cost –Residual Value = $2800-$700 = $420. 00 Useful life 5 Another example of an asset that would depreciate over time would be a vehicle. This is an asset that I would use the units-of-production method for being that the usage and mileage may vary from year to year. Let’s say you purchased the vehicle for $59,900 that is expected to have a useful life of 95,000 miles and an estimated residual value of $19,560, and during the year the vehicle was operated 21,000 miles. According to the units-of-production method of depreciation, it would be calculated as: Step 1: Depreciation per Unit = Cost –Residual Value = $59,900 -$19,560 = $0. 42 per mile Total Units of Production 95,000 miles Step2: Depreciation Expense=Depreciation per unit X Total Units of Production Used Depreciation Expense = $0. 42 X 21,000 Miles = $8,820 How to cite Depreciation and Useful Life, Papers

Friday, December 6, 2019

Discussion on Internet Usage Policy-Free-Samples -Myassignmenthelp

Question: Analyse the Security Vulnerabilities and Threats in an Organization. Answer: Introduction Security policies can be defined as set of rules and regulations that is obeyed by organizations in order to protect the organization from any type of harm. Every organization follows a set of policies that can be used to protect the organization from security issues. An Internet Usage Policy can be defined as a type of control. This policy controls what the employees of an organization can access by using the internet. It also protects the users from any content that would affect the users in a wrong way. This report outlines the Internet Usage Policy in depth. This report clearly defines the guidelines for the Internet Usage policy of organizations. It talks about the authorized and prohibited users. This report also gives an effective guideline for usage of Internet in an organization. Literature Review Security Policy Security policies are set of norms and regulations that are used for protecting information of an individual, community or a company (Banuri et al. 2012). This policy lays down rules that are to be obeyed by the employees of an organization. Every organization follows different security policies as per their requirements. Violation of these rules and regulations leads to penalty. The security policies are responsible for addressing the constraints on the conduct of the employees of an organization (Alam and Zhang 2012). Security is a crucial factor in the present generation of Internet. Every organization must obey it in order to protect itself from any kind of harm. Internet Usage Policy In this era of information and communication technology, every organization needs the access to Internet for running the business. Internet Usage Policy is a set of guidelines that restricts the access of internet for all the employees working in the organization (Bayuk et al. 2012). It makes sure that the internet is used only for the purpose of business purpose. The following services are allowed over the Internet in an organization: Sending files and documents for the use of business via File Transfer Protocol. Send or receive emails. Management has the control of allowing the employees to access certain services and restrict the usage of other services. Need of Internet Usage Policy It has been seen that the unmonitored usage of internet in an organization affects the organization in several ways: Productivity: Surfing different websites that are of no use to the business causes loss of productivity (Berger 2014). Employees will get involved in unprofessional activities and harm the business. Virus: Downloading unwanted files and documents affects the system with viruses. This will harm the system resulting in loss of important data. Inappropriate content: Surfing inappropriate content over the internet causes serious issues in the work environment. It hampers the ethics of the employees of a company. Transferring unencrypted business data causes serious insecurity to the business. If the sensitive data of a business is lost then it will harm the business in several manners (Cheng et al. 2013). The competitors can gain access to such information and outperform the company. The above mentioned issues require an organization to use the Internet Usage Policy. Policy Resource Usage: Based on the job description and role of an employee, they will be permitted to use the internet only for the purpose of business (Choyi and Vinokurov 2012). Change of unit of an employee to a non internet usage job will disallow the employee form accessing the internet. Allowed Usage: acceptable use of internet will include certain activities like communicating between employees for the purpose of work, downloading essential software, reviewing vendor websites, finding technical information and to carry out research. Personal Usage: Using the companys internet for private use will lead to serious troubles that can even cause termination of the employee (Gouflidis, Mayridis and Hu 2014). Users should store their personal data at their own risk. All companies create an audit log that reflects the out-bound and in-bound addresses for the purpose of periodical review. Prohibited Usage: Dissemination, storage and acquisition of data that is illegal and inappropriate is prohibited (Ifinedo 2012). The company also prohibits the access to any kind of political related information and fraudulent activities. Employees must be access sensitive information related to the company and misuse it. Software License: Company adheres strictly to the license agreement that is provided by the vendor. Public Information Review: Directories those are publicly writeable are reviewed and also cleared every evening (Neisse, Steri and Baldini 2014). This also prevents the anonymous information exchange. Periodical Review: To be sure about the compliance with all policies, there is a review conducted on a monthly basis (Orr et al. 2012). Reviews are also conducted to check the effectiveness of the usage. Criteria for Internet Usage Policy There are certain criteria that must be maintained in order to have a successful Internet usage Policy. The policy must be adaptable to any kind of change in the company (Knaap and Ferrante 2012). It must be flexible to meet the goals of the organizations. The policy that is adopted must always be enforceable (Ouedraogo, Bienner and Ghodous 2012). The policy should not be hidden and must help the employees to remember about their activities and also the implications if they break any rule. Steps for developing an Internet Usage Policy Certain steps need to be followed to carry out the development process in a company. They are as follows: Initiation and establishment of the structure: First step should be to decide who will take the responsibility of making the rules ( Pieters, Dimkov and Pavlovic 2013). Research and gather all information that is needed to form such a policy. A draft policy must be prepared. The policy must be circulated before implementing it. Ratification is needed by the board of management. Next step is to implement the policy. Monitoring is the most important step in the process and must be done on a periodical manner. Evaluation of the effects of such policies must be carried out. Benefits of the Internet Usage Policy This policy has several advantages if they are monitored properly. Some the benefits are as follows: It enables the employees to surf the Internet in a safe and secured manner. It makes sure that the employees are using the resources in a fair and legal manner (Safa, Von and furnell 2016). The intellectual properties are protected from any kind of harm. It also protects the privacy (Sommestad et al. 2014) Methodology In order to carry out this report a secondary and primary research is done. The primary research involves gaining knowledge from different experts. Data is collected by giving out questionnaires to several participants and analysis of the answers provided by the participants. The secondary research involves finding out information about several topics. The initial search was about finding about security policy and its use. Then the details about Internet Usage Policy are learned including the reasons for using such policies and the various types of Internet usage Policies (Vance and Siponen 2012). Secondary research also includes finding and setting appropriate guidelines for the effective usage of the Internet Usage Policy in an organization. Several criteria for developing a good Internet Usage Policy is also found out via the secondary research method. The organizations needs are found out and also the government polices that are suitable for monitoring such internet usage as well as taking actions against any violation are found out. The organization must be aligned the government rules and policies with the Internet usage policy in order to protect the organization and improve its productivity. Research is also carried out to find the benefits of the Internet usage Policy in a company in details. Key Recommendations Guidelines for the effective usage of the Internet Usage Policy based on the findings of the literature review The Internet Usage Policy should be applicable for all the employees working in an organization. There should be certain terms and conditions for the usage of internet in an organization (Wall, Palvia and Lowry 2013). Certain category or employees, depending on their roles and responsibilities must be exempted from certain restrictions and usage. Only official messages must be communicated among the employees for the purpose of the business operations. No personal usage should be allowed in order to enhance the productivity of the business. The company information must be sent to the outsiders. The employees must be explained about the need of such policy so that they can cooperate with the company. Access to any illegal data must be prohibited by the organization. A web monitoring software must be used to keep an eye of the activities of the users. If any employee is seen to violate the rules and regulations, then action must be taken against them. Employees shall be allowed to use the internet for downloading files that are related to the work and that agree with license of the vendor. The administration staffs should also follow certain rules and regulations and should not access the details about any employee in the network. Certain websites must be blocked by the organization in order to protect the company and its ethics. Conclusion This report concludes that the Internet Usage Policy is very effective for the proper functioning of a company. A code of conduct is followed by obeying this policy of using the internet. Internet usage in an organization must be restricted otherwise it hampers the productivity of the company in a severe way. It also protects the sensitive information of the company. This report gives a brief idea about the different internet usage policies like personal usage, resource usage and prohibited usage. This report also gives guidelines for the effective use of the internet usage policy in a company. This report also points out the benefits of using the internet usage policy in a company. This report also gives a brief outline on the steps and criteria for developing an internet usage policy. References Banuri, H., Alam, M., Khan, S., Manzoor, J., Ali, B., Khan, Y., Yaseen, M., Tahir, M.N., Ali, T., Alam, Q. and Zhang, X., 2012. An Android runtime security policy enforcement framework.Personal and Ubiquitous Computing,16(6), pp.631-641. Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J. and Weiss, J., 2012.Cyber security policy guidebook. John Wiley Sons. Berger, T.U., 2014. Norms, Identity, and National Security.Security Studies: A Reader. Cheng, L., Li, Y., Li, W., Holm, E. and Zhai, Q., 2013. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory.Computers Security,39, pp.447-459. Choyi, V.K. and Vinokurov, D., Alcatel Lucent, 2012.System and method of network access security policy management for multimodal device. U.S. Patent 8,191,106. Gouglidis, A., Mavridis, I. and Hu, V.C., 2014. Security policy verification for multi-domains in cloud systems.International Journal of Information Security,13(2), pp.97-111. Ifinedo, P., 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.Computers Security,31(1), pp.83-95. Knapp, K.J. and Ferrante, C.J., 2012. Policy awareness, enforcement and maintenance: Critical to information security effectiveness in organizations.Journal of Management Policy and Practice,13(5), p.66. Neisse, R., Steri, G. and Baldini, G., 2014, October. Enforcement of security policy rules for the internet of things. InWireless and Mobile Computing, Networking and Communications (WiMob), 2014 IEEE 10th International Conference on(pp. 165-172). IEEE. Orr, D.B., Ptacek, T.H. and Song, D.J., Arbor Networks, Inc., 2012.Method and system for authentication event security policy generation. U.S. Patent 8,146,160. Ouedraogo, W.F., Biennier, F. and Ghodous, P., 2012, April. Adaptive Security Policy Model to Deploy Business Process in Cloud Infrastructure. InCLOSER(pp. 287-290). Pieters, W., Dimkov, T. and Pavlovic, D., 2013. Security policy alignment: A formal approach.IEEE Systems Journal,7(2), pp.275-287. Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations.computers security,56, pp.70-82. Sommestad, T., Hallberg, J., Lundholm, K. and Bengtsson, J., 2014. Variables influencing information security policy compliance: a systematic review of quantitative studies.Information Management Computer Security,22(1), pp.42-75. Vance, A. and Siponen, M.T., 2012. IS security policy violations: a rational choice perspective.Journal of Organizational and End User Computing (JOEUC),24(1), pp.21-41. Wall, J.D., Palvia, P. and Lowry, P.B., 2013. Control-related motivations and information security policy compliance: The role of autonomy and efficacy.Journal of Information Privacy and Security,9(4), pp.52-79.