Wednesday, October 16, 2019
Future Career Essay Example | Topics and Well Written Essays - 750 words
Future Career - Essay Example I have always had a way with children. Their curiosity and complete lack of inhibition has fascinated me and I have enjoyed hours of fun and frolic with kids. I am a good listener and am patient and tactful. I enjoy an excellent rapport with kids due to my sense of humor and storytelling skills. I can be perceptive, and time spent with children never tires me - in fact I find it a refreshing change from work or study. I believe this attachment to children has been a major factor in my chosen career options of either Early Childhood Teacher or Childrenââ¬â¢s psychologist. Early childhood teaching is a specialized field; hence I shall have to pursue a Bachelorââ¬â¢s degree in Early Childhood Education. I shall also have to look up the requirements of the state where I shall want to work to attain further teaching credentials. This will enable me to get a job as an early childhood educator. I may have to begin as an assistant in order to gain some experience before I can be hired as a teacher. I shall also have to learn special skills to be able to descend to the level of my young charges and view life from their perspective in order to hold their interest and make learning a rewarding and enriching experience for them. Besides, I shall need to improve my arts and crafts skills so as to increase their creativity and learn to think on my feet in order to be able to handle sticky situations. The first years of a childââ¬â¢s life are crucial because here the foundations of their social skills, sense of self, moral values as well as perception of the ir surroundings and cognitive skills are laid. This is also the time when the human brain grows at its fastest pace. Therefore these first few years are critical to nurture healthy development of a childââ¬â¢s physical and mental abilities. At this point in their lives, when they will probably be interacting with people outside their immediate family for the first time; I shall have to adapt to the emotional needs
You decide ( should be relevant financial accounting class ) Research Paper
You decide ( should be relevant financial accounting class ) - Research Paper Example Financial statements are, therefore, the financial results that are presented in the form of reports to represent the financial condition of the organization (AccountingTools 1). Financial statements are useful in various ways. These statements are very useful in the course of determining the ability of a business as far as raising cash and cash equivalents, is concerned. It also concerns the various uses and the sources of such cash. The statements are also very useful in determining whether a business can pay back its debts (Philip 2). The information of this nature can be of much importance to the creditors to find out whether the business can pay back the money they would like to lend to it. The statements also assist the organization to be able to track financial trends and use the trends to spot any profitability issues. From the financial statements, financial ratios can also be derived to help in showing the indications about the condition of the business. Financial statements are also critical in investigating certain transactions that are carried out in the business. This paper is, therefore, aimed at investigating the types of financial statements that are commonly used, their purposes and components. There are various types of financial statements that exist. However, the commonly used financial statements are three and include a balance sheet, income statement and statement of cash flow. Financial statements need to be formatted in accordance with the major accounting frameworks when the statements are intended to be supplied to the external users such as lenders and investors. This will make it easy for the external persons to be able to understand the statements without any personalized guidance. The frameworks give a leeway on how the financial statements can be structured. To this effect, statements issued by different firms in the same industry have some particular differences in appearance. Such guidelines are not
Tuesday, October 15, 2019
Assessing the Role of Motivation on Employees Essay Example for Free
Assessing the Role of Motivation on Employees Essay In this light the study sets to identify the most ranked factors among the ten motivational factors. The analysis from the empirical findings showed that Job satisfactionâ⬠was the most ranked factor for both sub groups that made up the sample survey. However a study from previous researches used in this study showed that different results could be obtained from different groups of already working employees. This study therefore can be seen as an introduction to a more detailed study to be carried by future researchers on the field of employeeââ¬â¢s motivation. Background When looking at factors that affect job satisfaction, I find that Agency theory might be helpful as it explains the extent to which organizations need to think of their human resource responsible in producing the output needed by organizations to meet shareholders value. Agency theory is concerned with issues related to the ownership of the firm when that ownership is separated from the day-to-day running of the organization. It assumes that in all but owner- managed organizations the owner or owners (known in agency theory as the ââ¬Å"principalâ⬠) of an organization must vest authority to an ââ¬Å"agentâ⬠-corporate management- to act on their behalf. The principal recognizes the risk, here and act on the assumption that any agent will look to serve its own as well as the principal interests as it ulfils it contract with that principal. However, this is not the situation in real life situation. As all agents are perceived to be Opportunistic. These approaches are to examine the problems of human exchange derived from the field of finance and economics but they are often applied to the study of shareholders Risk Management (SHRM). Agency theory is therefore used to analyze this conflict in interest between the principal (shareholders of o rganizations) and their agents (leaders of these organizations). Whereby the ââ¬Å"Agentsâ⬠in keeping with the interest of the shareholders and organizational goals turn to use financial motivational aspects like bonuses, higher payrolls, pensions, sick allowances, risk payments, perks to reward and retained their employees and enhance their performance. There is a strong lobby propounding the view that human resources and their management are the source of competitive advantage for the business, rather than, say, access to capital or use of technology. It is therefore logical to suggest that, attention needs to be paid to the nature of this resource and its management as this will impact on human resource behavior and performance and consequently the performance of the organization. Indeed Boxall and Steeneveld (1999) argue that there is no need to prove the relationship between firm critical influence on performance and labour management as it is self evident that the quality of human resource management is a critical influence on the performance of the firm. Concern for strategic integration, commitment flexibility and quality, has called for attention for employees motivation and retention. Given this perception, the principal in an organization feels unable to predict an agentââ¬â¢s behavior in any given situation and so brings into play various measures to do with incentives in other to tie employeeââ¬â¢s needs to those of their organization. Thus getting employeeââ¬â¢s identification with respect to the organization, and thus increasing their commitment level. As an approach to mediate the employment contract, elements of human resource strategy (especially those to do with rewards and retention) can offer a way of ensuring an efficient transaction process that enables both parties to get committed towards the fulfillment of each other needs. The fundamental problem, dealt with is what drives or induces people to exploit their potential resources in the way they do in organizations? The issue of motivation and performance are they positively related? By focusing on the financial aspect of motivation problem like bonus system, allowances perks, salaries, etc. By paying attention to the financial aspect of motivation, I intend to probe in to the role this aspect has on enhancing employeeââ¬â¢s performance. I believe, financial motivation has become the most concern in todayââ¬â¢s organization, and tying to Mallowââ¬â¢s basic needs, non-financial aspect only comes in when financial motivation has failed. Though in some situation, it is being operated side by side. But as a research topic for my thesis I will employ the financial aspects of motivation used by the agents of organization in enhancing their employeeââ¬â¢s performance and the extent to which non-financial aspects of motivation turn to enhance employeeââ¬â¢s performance. To evaluate the methods of performance motivation in organization in organizing some motivational factors like satisfies and dissatisfies will be used to evaluate how employees motivation is enhanced other than financial aspects of motivation. Problem Statements As a research question, the research seeks to answer what role motivation plays in enhancing performance in organization. This will be possible through analysis of information gathered from students. Hence this thesis is mainly quantitative. * Objectives In trying to find an answer(s) to the research question and on the basis of the above background discussion and research question, the main purposes developed for this thesis is to assess the factors t hat motivate employees to perform best at work. This is done by carrying out a survey in which respondents responding to a survey, ranked the least two most important factor on a list of ten factors, and how these factors influence them. * Limitations and Demarcations The limitation is being considered in relation to the natural explanation to which the researcher has limited the study and the active choices to limit the study area that is financial motivation as a determinant of performance. The study is limited to existing theories and models, and their influence and limitation on performance enhancement. By considering the financial and non-financial aspect of motivation on employeesââ¬â¢ performance relating to existing theories and models, I intend to mark a demarcation for the study. Here I have considered limitation in line with the research objective that is the study is limited. I believe that with the changing nature of the work force, recent trends in development, information and technology, the issue of financial motivation becomes consent on one of the most important assets in an organization. A lot has been said on the outside forces of an organization. This research considers the inside forces as a starting point. Ideally, a study of all the explanatory variables will be considered appropriate in order to capture the interactive influences of other variables and thus be able to come up with holistic and generally more acceptable results, of financial motivation and performance. * Definitions Motivation: Motivation by definition refers to what activates, directs human behavior and how this behavior is sustained to achieve a particular goal. Also it can be defined as the set of processes that arouse, direct and maintain human behavior towards attaining some goals. Jones (1955) argues thatâ⬠Motivation is concerned with how behavior gets started, is energized, is sustained, is directed, and is stopped and what kind of subjective reaction is present in the organization while all this is going on. â⬠Role of financial motivation: The potential role of money is ââ¬â (1) Conditioned reinforce (2) An incentive which is capable of satisfying needs (3) An anxiety reducer (4) Serves to erase feelings of dissatisfaction Employee satisfaction: This refers to the positive or negative aspects of employeeââ¬â¢s altitude towards their jobs or some features of the job. Organizational Goals: A concept, which refers to the focus of attention and decision-making among employees of a sub-unit. Organizing: This involves the complete understanding of the goals of organization, the necessity of proper co-ordination, and the environmental factors that influence the goals and employees within the organization. Employee attitudes: Mental state of readiness for motive arousal.
Monday, October 14, 2019
Forensic In Digital Security Information Technology Essay
Forensic In Digital Security Information Technology Essay Computer forensic is a branch of forensic science that involves largely around computer crimes and legal evidence that pertain and revolve around digital evidence. The main aim of computer forensics is to explain the current state of the digital artifact and to provide analysis on the data as evidence to the court. Acquisition of evidence from the scene of crime A police officer or investigator upon receiving the laptop from the parents should first establish if the laptop is switch on or not. If the laptop is running perform a force shutdown by holding down onto the power button and take out the battery. If the laptop is showing clear signs of data of apparent evidentiary value onscreen. The police officer should first seek trained technical personnel who have experience and training in capturing and preserving volatile data before proceeding. The police investigator would also immediately shutdown the laptop through irregular shutdown if there is any sign or indication of activity onscreen indicating data is being overwritten or deleting. Indication of destructive process is being performed on the computer data storage system. This is to ensure that no further evidence is being lost or being tamper. The investigator would also need to check if there is any disk in the disk drive and take a picture of the disc on the disc drive before putting into the anti static bag. The investigator would next place tapes across all disk drives so that no media would be placed in the disk drives. The investigator would also place tapes on the power button on the laptop. This is to ensure that no the evidence would not be tamper in order to preserve the integrity of the data. Documentation If there is cables and wires attached to the laptop. The investigator would also uniquely label, document and take pictures of the wires, cables and devices connected to the laptop. If there is devices attach at the other end of the cables it would also be photographed and documented of it being connected to the laptop. The device, cables and wires would then be individually documented and photographed before putting in the evidence bag. The documentation of the evidences should also include a detail record of the notebook brand, model, serial number, attachments on the notebook and it current state. The surrounding environment where it was being use should be also photograph as evidence. If the notebook is running photographing the screen help in visually documenting the state of it and what was running upon the initial response. Taking photos of front, side and back of the computer. A photograph of the notebook and the surrounding environment and the devices connected help in the reconstruction of the setup should the notebook need to be taken to the lab for further investigation. Documentation is important as it allow the court to verify that correct forensic procedures are being adopt and undertaken. It also effectively allows the recreation of the activities that are performed during the initial response. Evidence Custody Form An evidence custody form is also necessary in order to proof the chain of custody has been in place. As it proof that proper custody of the evidence and the state of the evidence upon custody to proof that proper forensic evidence has been taken place. Handling Digital Evidence All potential evidence should be à ¢Ã ¢Ã¢â¬Å¡Ã ¬Ãâ¦Ã¢â¬Å"Bag- and-tagà ¢Ã ¢Ã¢â¬Å¡Ã ¬Ã refers to the process of placing crime scene evidence into bags and tagging them with single or multi evidence form. This help in withholding the chain of custody and also the integrity of the evidence. Evidence should be kept in anti-static bags to prevent damage through electrostatic discharge. Computer manuals of the laptop if there are any would also be taken for reference in the lab. A copy of the hard disk image will also be created using programs and also generating of a hash sum to check for consistency or integrity in it. The copy data would then be handed to the appropriate party assisting in the investigations. The source copy would be retained in a locked room with limited or restricted access and kept in anti static bags. This is to ensure that there is a chain of command in place and that the source data is always available and not tamper. In order to preserve the main copy evidence and also allow recreation of procedures if necessary. Transportation When transporting digital evidence, the investigator or the first responder should take note in preserving of the evidence state. The first responder should always keep digital evidence away from magnetic fields produced by radio transmitters, magnet or any other form of magnetic field that might affect the state of the evidence. Potential hazards like heat, cold, humidity or static electricity should be taken note. While transportation, mobile phones should always be kept in faraday isolation bag. Storage Digital evidence should be stored in a secure, climate-controlled environment that is not subject to extreme temperature or humidity that might damage hardware. Digital evidence should not also be expose to magnetic fields, moisture, dust or vibration that might affect the state of the evidence or destroying it. Evidence custody form should also be use to identifies the evidence, who has handled it and the date. Hardware resources for analyzing notebook Hardware Resources The hardware and tools that needed to analyze a notebook are: Laptop Large-Capacity disk drive IDE ribbon cable, 36 inch Linux Live CD ( Backtrack 4.0 ) Laptop IDE 40- to 44 pin adapter Write-blocker Anti static evidence bag Evidence log form Firewire or USB dual write-protect external bay IDE disk drive box Faraday isolation bag ( For cell phone ) Architectural differences between a notebook and desktop One of the key differences between notebook and desktop are that due to the size of the desktop and it ability to be customized the hardware generally follow a certain guidelines or rules. This make forensic easier on desktop as the tools available are able to process most desktop computers. However with notebooks becoming more common in today society tools that are commonly use for desktop are required to be modified and change. The main architecture difference is that a notebook being compact and much smaller in size requires hardware to be much smaller, like the motherboard, ram, and hard disk. Also with some manufacturer installing drivers on their laptop for certain function eg. Webcam, biometric fingerprint scanner set a level of difficulty in investigation as some of this program might not be able to run on a different computer system without the appropriate driver. The difference in architecture of laptop and computer requires different forensic technique and procedures. The interface of an IDE laptop hard disk for instance due to manufacturer maybe smaller than a normal 40 à ¢Ã ¢Ã¢â¬Å¡Ã ¬ pin ATA ribbon connector. As due to the constraint of a laptop size the hard disk might be smaller. The internal structure of a laptop is much more delicate so it is much harder for the investigator to get the hard disks and component for imaging or storage as evidence. Smaller size laptop known as netbooks are not installed with a CD Rom drive unlike a desktop computer due to their restriction in size. This further complicate forensic process which certain forensic tools that required live CD are not able to be use. This would require the use of USB thumb drive loaded with the OS in order to extract images and information. Laptop unlike Desktop computer also does not allow the use of more than one hard disk at the same time. So imaging process of hard disk would take longer time as it cannot be done simultaneously. Most laptops do not allow the use of CD-Rom and the floppy disk at the same time. Unlike the Computer desktop system this complicates the process of common tools used for desktop. Forensic Tool for Disk Imaging FTK Imager and DCFLdd command would be use for imaging. FTK Imager is a forensic windows based acquisition tool found in various forensic toolkits like HELIX , SANS SIFT Workstation and FTK Toolkit. FTKImager support storage of disk image in EnCase or Smart file format and dd format. With Isobuster technology being built in it, it allows FTKImager to image CD to a ISO/CUE file combination. DCFLDD is an enhanced version of dd it allows hashing for the transmitted data, wiping of disk with known patterns and verifying that the image is identical to the harddisk, using bits. It can also split into multiple files, logs and data can also be piped into external applications. The use of two different imaging software with it generated hash value allow comparison in order to ensure that there is consistency and integrity in the hash value of both image. Additional evidence for clues to victim whereabouts It is important to obtain as much information as possible from the surrounding environment as they might be crucial to investigation and solving of the case. As they might be able to provide a clue to the time line, possible password phrases, that might help in aiding the steps in investigations and step. Additional evidence might include papers with possible password phrases, handwritten notes, blank pads of paper with impression of prior writing on it. Hardwares, software manuals and documentations. Calendars, literature or graphic material these form of materials and article should be treated as possible evidences and preserved in compliance with department policies or protocols. Preserving integrity of digital evidence Hashing is a method for reducing large input into a smaller input. Common hashing algorithm like MD5 and SHA-1 are commonly used to check the integrity of the data as evidence for the court. It is required to have 3 independent checks on the consistency of the image to be computed and recorded for further reference and support as evidence in court. The first check would be against any tool that is running. The second check would be after the disk image duplicate is complete to check that there is consistency in the disk images. The last check would be the consistency of the recipient data image against the source data. Bad File Headers In most file the file headers contain identifying information for the computer to recognize it. Image file headers are often manipulated to trick investigator into overlooking it. The user would often change the file header into different format eg. JPEG to DOC file format. If a forensic investigator were to conduct a search on the machine for pictures, he would simply see it as a doc file and skip it. Another reason is that examining recovered data remnants from file in slack or free space. The file header might be damage and cannot be readable. Thus there is a need to examined it file header using a HEX editor in order to repair it for it be able to view. Source Phillips, Amelia, Nelson, Bill, Enfinger, Frank. (2005).Ãâà Guide to computer forensics and investigations. Course Technology Ptr Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition by National Institute of Justice April 2008 Computer Crime and Intellectual Property Section Criminal Division, United States Department of Justice. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. http://www.cybercrime.gov/ssmanual2002.htm
Sunday, October 13, 2019
Comparing Beggars and The Sailors Mother Essay -- comparison compare
Analysis of Beggars and The Sailor's Motherà à As is obvious, the stories contained in the Wordsworthian poems "Beggars" and "The Sailor's Mother", despite being contemporaneously individual and distinct, are intrinsically linked. The underlying message which the notable author seems to be trying to communicate is that the poor and afflicted are possessed of a greater nobility of spirit than may generally be accepted in society. In each instance, as in others, Wordsworth seeks out the quiet dignity of such individuals, uncovering and emphasising positive aspects of their character and lives. Even when he allows negativity to creep into his tone, it becomes an almost paternal remonstration ("yet a boon I gave here, for the creature / Was beautiful to see ââ¬â a weed of glorious feature.") In his encounter with her children, despite their evident lies, the narrator is neither judgmental nor harsh with them for this; he goes on to describe them as "joyous Vagrants", displaying that love of the affable rogue common to all genial 'men of the world' ââ¬â even going so far as to wish supernal gifts upon them ("Wings let them have.") The poems both have in common the use of pathetic fallacy very early in each poem: the weather is "raw", "wet" and "in winter time" for a melancholy tale, and casts forward "summer's ... heat" for a far more cheery and positive encounter. This not only immediately provides a recurrent frame of reference for anyone familiar with some of Wordsworth's other poems, but is a statement of the author's intentions for the rest of the narrative. In both instances nature and weather references repetitively enter and sustain the poem's form and mood: "a crimson butterfly", "yellow flowers the gayest of the land", "... ...ence of style also: the fact that exactly one half of the verses of "The Sailor's Mother" are a chronicle of her son's life-story give Wordsworth only odd lines of those verses in which to inform us of the mother's continuing life story ââ¬â a task which he fulfils admirably. Though the phrase "[she] begged an alms" is used in both poems, there is a humbler nature inherent to the sailor's mother than the "haughty" Amazonian ââ¬â she is more obviously pious and truly in need, no "weed" is she, and says "God help me for my little wit!" in self-deprecation. There is something as charming as the roguish nature of the beggar boys in the way she carries this bird with her; a feeling as strong, though Wordworth induces it through differing methods. This is the power of his poetry: he makes us feel the lives of others; he makes us feel that life has something to offer. à Ã
Saturday, October 12, 2019
Outsourcing and Offshoring of IT to India :: Workforce Work Jobs Globalization
Outsourcing and Offshoring of IT to India Introduction One of the hottest trends today for big corporations is outsourcing and offshoring. Outsourcing simply means a company based in one nation will hire from other nations in order to more efficient accomplish its goals. It makes sense on the part of the corporation, why pay a programmer in the US $80,000 a year when they can pay a programmer in India less than 1/10th of that salary, and make him a very happy man. This because even when he is earning 1/10th of the US salary, he is still earning more money than he ever hoped to get in that industry in India. It seems like a win-win situation1, but there is still a loser: The growing unemployed population of the US. As more jobs go overseas, more US citizens are finding themselves becoming obsolete. Recent History of IT in the US Between 1987 and 1997 imports used in US manufacturing rose from 10.5% to 16.2%2 and in High Technology rose from 26% to 38%. The US has a long history of outsourcing blue-collar jobs, including those that are intermediate steps within business processes in many industrial sectors. Manufacturingââ¬â¢s outsourcing success can be attributed to the lower cost structures found in many East Asian countries such as China, Taiwan, South Korea, and Malaysia and others2. These countries not only provide a lower cost structure, but also have a highly educated work force and business friendly environment. Outsourcing of blue-collar jobs has increased the demand of white-collar jobs in the US. The focus on white-collar jobs by US firms has pushed US profitability upwards. The outsourcing trend continues to eat up the value chain from blue-collar jobs to white collar jobs3. The software industry is experiencing an outsourcing trend to countries such as China and most significantly to India. The proliferation of the Internet has opened easier access to information and collaborative environments. Previously communication costs and access to mind power was limited. The Internet made communication costs virtually free and collaboration with groups around the makes software engineering and collaboration tasks easier. In additional, liberalization of free markets across international lines has made it easier for companies to set up and outsource engineering tasks throughout the world. Business-process and software outsourcing rely on cheaper cost structure as found in East Asia with manufacturing4.
Friday, October 11, 2019
Best practices in project quality management/leadership for information technology Essay
Most people simply accept low quality from many information technology (IT) products. So what if ones laptop crashes a couple of times a week? Just ensure there is back up for data. So what if one cannot log in to the business intranet or the internet right now? Just attempt a little later when it is less busy. So what if the latest version of word-processing software was shipped with several bugs? One may like the softwareââ¬â¢s new features, and all new software has bugs. Is quality a real problem with information technology projects? Yes, it is! IT is not just a luxury available in some offices, homes, or schools. Firms throughout the world provide employees with access to computers. The majority of people in the US use the internet, and usage in other countries continues to expand rapidly. It took only six years for 60 million people to use the internet compared to 20 years for 60 million to use cell phones (Kathy, 2008, p. 292). Many issues of individual and or group lives depend on high-quality IT products. Food is produced and distributed with the help of computers; vehicles have computer chips to monitor performance; students use computers to aid them learn in school; organizations depend on technology for many business functions; and millions of people depend on technology for entertainment and individual communications (Kathy, 2008). Many IT projects develop mission-critical systems that are utilized in life-and-death circumstances. Such as navigation systems on aircraft and computer components built into medical equipment. Financial institutions and their clients also depend on high-quality information systems. Clients get very upset when systems present inaccurate data or display information to unauthorized people that could result to identity theft. When any of these systems fails, it is much more than a mere inconvenience (Taguchi, 2004). 1. 1 Definitions Before one can enhance the quality of IT projects, it is good to understand the fundamental concepts of project quality management. Indeed, it is hard to define project quality management. According to the international organization for standardization (ISO) quality can be defined as the totality of features of an organization that bear on its ability to satisfy stated or implied requirements (Kathy, 2008). It can also be defined as the extent to which a set of inherent features fulfils needs (ISO9000). Other professionals define quality based on adherence to needs and fitness for use. Adherence to needs means projectââ¬â¢s products and processes meet laid down specifications. Fitness for use implies a product can be used as it was intended. The purpose of project quality management is to make sure that the project will fulfill the requirements for which it was undertaken. Project management involves among others things meeting or surpassing stakeholder requirements and anticipations. The project group must initiate good relationships with core stakeholders, especially the primary client for the project, to comprehend what quality implies to them. Many technical projects fail because the project management group aims only at meeting the written requirements for the project (Juran and Frank, 2002). Quality, therefore, must be on an equal basis with project scope, cost, and time. If the projectââ¬â¢s stakeholders are dissatisfied with the quality of the project management or the end products of the project, the management group will require adjusting time, cost, and scope to fulfill stakeholder needs. In which case meeting only documented requirements for time, cost, and scope is not sufficient. To attain stakeholder fulfillment, the project group must come up with a good working relationship with all stakeholders and comprehend their implied or stated requirements. Best practices: over the years, organizations have become mesmerized with the term-best practice-but after continued use, experts began scrutinizing the expression and now better definitions exist. A best practice starts simply with an idea. Knowing that there is a process, tool, activity, or method that can deliver results effectively than any other method and provides one with the desired results with less barriers and predictable complexities is a welcome. As a result, one apparently ends up with an efficient way of completing a task by use of a repeatable procedure that has stood the test of time for quite a large number of IT projects (Kathy, 2008). As project quality management evolved, so did the meanings of best practices. Some definitions of best practices are complicated while others are somehow simple. Yet, they both address the same aim of encouraging project quality management throughout the organization. Firms must decide on the depth and extent of their best practices. Must it be at high level and generic or at a low level and detailed? A generic best practice may not attain the desired efficiencies whereas a detailed one may not have unlimited applicability. Basically, any firm can decide to have own definition of best practices and there might even be company quality requirements on the definition of such best practices. For example, a best practice can be defined as something that: works, works well, works well on a repetitive basis, leads to a competitive advantage, can be identified in quest to improve business, and prevents the firm from problems. 1. 2 Principles Generally, there are 3 basic principles/processes of project quality management: 1. 2. 1 Planning quality Planning for quality involves identifying which quality standards are relevant to the project and how to fulfill those standards. Integrating quality standards into project design is a core portion of quality planning. For an IT project, quality standards include enabling system growth, planning a considerable response time, or making sure that the system produces accurate and consistent information. The core outputs of quality planning are a quality management plan, quality metrics, quality checklists, a process improvement plan, and project document updates. 1. 2. 2 Performing quality assurance Performing quality assurance includes periodical evaluation of the whole project performance to make sure that the project will meet the desired quality standards. The process involves assuming roles of quality in the entire project life cycle. Senior management must take the lead in emphasizing the roles all employees play in quality assurance. The core outputs of this process are organizational process asset, project management, project document, and change requests updates (Kathy, 2008). 1. 2. 3 Performing quality control Performing quality control involves monitoring specific project results to make sure that they adhere to the desired quality requirements while identifying methods to enhance ultimate quality. This process is mostly linked to the technical techniques and tools of quality management, such as quality control charts, statistical sampling, and Pareto charts. The main outputs of quality control include quality control measurements, validated deliverables, change requests, validated changes, organizational process asset updates, project management plan, and project document updates (Kathy, 2008). This research seeks to: â⬠¢ Incorporate the best practices in project quality management with quality leadership/ team work within a quality focused company, â⬠¢ Evaluate the significance of project quality management for IT products and services, â⬠¢ Understand the techniques and tools for quality control, and â⬠¢ Describe how leadership model relate to enhancing quality in information technology projects. 2. 0 Review of Literature In his book on quality control, Juran (2002) stressed the significance of top management commitment to continuous product quality improvement. In 2000, Juran published the fifth edition of his famous book. In both texts, Juran developed and built upon a trilogy involving quality improvement, quality control, and quality planning. Juran emphasized the difference between the manufacturerââ¬â¢s view of quality and the clientââ¬â¢s view. He observed that manufacturerââ¬â¢s focused on adherence to requirements, but clientââ¬â¢s focused on fitness for use. In this book, Juran developed 10 stages to quality improvement. These include; building awareness of the need and chance for improvement, set goals for improvements, organize to reach the goals, provide training, carry out projects to solve problems, report progress, give recognition, communicate results, keep ratings, and maintain momentum by establishing yearly improvement part of the regular systems and processes of the economy. Crosby (1979) wrote Quality Is Free and is best known for suggesting that firms struggle for zero defects. He stressed that the costs of low quality must include all costs of not doing the work right the first time, such as rework, scrap, wasted man hours and machine hours, customer ill will and wasted sales, and warranty costs. Crosby proposed that the cost of low quality is so misappropriated that firms can profitably spend unlimited amounts of money on enhancing quality. Like Juran, Crosby developed 14 stages for quality improvement; these include making it clear that management is committed to quality, organizing quality control teams with representatives from each section, establishing where current and potential quality problems lie, evaluating the cost of quality and explaining its use as a management tool, raising the quality awareness and personal concern of all employees, take actions to correct problems identified through previous steps, establishing a committee for the zero defects program, training supervisors to actively carry out their part of the quality improvement program, holding a-zero defects day-to allow all employees realize that there has been a change, encouraging individuals to establish improvement goals for themselves and their teams, encouraging employees to communicate to management the barriers they face in achieving their improvement goals, reorganizing and appreciating those who participate, establishing quality councils to communicate on a regular basis, and reworking to emphasize that the quality improvement program never ends. Crosby (1979) initiated the Quality Management Process Maturity Grid. Such a grid can be applied to a firmââ¬â¢s attitude toward product usability. For instance, the initial level in the grid is ignorance, where employees might think they do not have any difficulties with usability. The last level is wisdom, where employees have changed their attitude so that usability defect prevention is a routine part of their activities. Ishikawa (1976) developed the concept of quality circles and pioneered the utilization of cause-and-effect graphics. Ishikawa made notable contributions to quality management, the most important being Ishikawaââ¬â¢s total quality perspective, organization quality control and emphasizes to human based quality, the quality diagram, and the creation and use of his 7 basic quality tools. The tools are: Pareto analysis, stratification, cause and effect diagrams, check sheets, scatter charts, histograms, and process control charts. Ishikawa believed these 7 tools must be known in depth, if not by all, in a firm and used to evaluate problems and create enhancements. Used effectively the tools form a powerful quality kit. Genichi (1998) believed it is good to develop product that is stout and or insensitive to manufacturing process variation, rather than trying to control all variations during manufacturing. To practice this idea, he embarked on the already developed knowledge on design and made it more practical and usable for quality experts. Genichiââ¬â¢s idea was mainly about the routine maximization of process and product prior to actual processing rather than quality control through inspection. Reliability and quality are ensured at the designing stage. Genichi went on to break off-line quality into 3 core levels. These levels include; system design, tolerance design, and parameter design. Foster (2004) identified leadership as being core to the quality improvement process, assuming minimal difference between management and leadership. The role is of a facilitator, and the foundation is-managing by walking, allowing the leader to be in touch with clients, people, and innovation, the three primary sections in the expedition of excellence. Foster believes that, as the leader walks, three main operations are occurring: listening, facilitating, and listening; suggesting caring, able to provide instant help, and transmission of values respectively. Foster, having analyzed key American firms concluded that any smart concept to organizing had to take into account 7 variables, a framework that was designed to include both the software and hardware of a firm. 3. 0 Findings 3. 1 Best practices Every organization has its own point of view of best practices. But generally there seem to be four basic reasons for embracing best practices. The four are: â⬠¢ Improving efficiency, â⬠¢ Standardization, â⬠¢ Improving effectiveness, and â⬠¢ Consistency In whatever definition, the company must identify which of the four, or combination therein, the firm targets. The paper focused on best practices as practiced at Orange Soft-Link Ltd, an IT company based in Switzerland (Crosby, 1979). â⬠¢ A best practice is an experience based, published, and proven way to achieve company objectives. â⬠¢ The company has detailed best practices in its procedures/policies and work flows. There are templates and guidelines as well as procedures that the company embraced. Additionally, when it closed a project, the company conducts a formal lesson learned section. The session involves the sponsors, core team, project manager, and other stakeholders impacted by the project. The lessons are stored in a common database and reviewed with the whole team. Its best practices depend on lessons learned. The company shares these practices with other IT firms for those vendors for which the company is a reference site. All Orange Ltd templates, procedures/policies, and work flow can be accessed when necessary and, by request, the quality leadership team set conferences to give feedback as well as explain in details all practices. â⬠¢ Any tool, activity or template used by a quality manager that has had a positive impact on quality delivery, knowledge, and process. For example, performing to satisfy customers is a best practice in this IT Company. This is done by assessing each phase of a project. â⬠¢ Generally the company views a best practice as any process or activity that enhances a given quality issue, eliminates the need of other more complicated procedures, or significantly improves an existing procedure. Each best practice is a living unit and subject to amendments, removal, or review. â⬠¢ For Orange Soft-Link ltd, a best practice is any process or method that has been successful in producing the desired outcomes through practical application. This IT Company do not embrace professional or industry standards as a best practice until it has been proven that the process or method works in its corporate environment (Kathy, 2008).
Subscribe to:
Posts (Atom)