Computer Systems in Hospital

Hospitals require to be installed with appropriate Information Technology (IT) systems in order to facilitate execution of tasks in hospitals. Application of computer systems in hospitals will help in minimizing extensive mobility within the hospitals as hospital workers move around to access physically dispersed people, knowledge and shared resources.

Hospitals computer systems should have a central database that should be used for storing all patients records. The presence of a central database will help different hospital personnel to easily access patients medical records for medication purposes.

For example, when a patient is requested to go for a lab test, the lab technician should send the patients results to a central database where the physician can easily access it and recommend appropriate medication. Similarly, a central database is essential to nurses as they can use it to confirm doctors prescriptions. Moreover, a central database will be of great importance in instances where the nurses realize that there are some inconsistencies in a patient record.

The nurses can request the concerned physician to retrieve the patients record and make necessary changes without forcing the nurse to go to the filing cabinet to retrieve the patients hand copy and take it to the physician for correction. Nursing assistants will easily record patients vitals and synchronous the information with the patients record in the central database.

The central database will be important to the physician as well as pharmacy department as it will be used to keep a record of those medicines that the hospital has stocked. This will be important to the physician during the prescription process as it will enable him/her to be aware of all the substitutes drugs that are available in the hospital in order to know which drugs to subscribe to the patient.

Providing a central database will help in managing hospital processes more effectively. For example incomplete orders from the physicians will easily be corrected. Equally, the tracking of lab and radiology orders will be easy to manage since the concerned technicians will send the results directly to the central database where physician can easily access them (Preece, 2002).

It has been observed that poor communication methods that are employed in hospitals are the main causes for the high interruptions present in hospitals that are blamed for the high instances of inefficiency in work practices. Studies have shown that there is a high association between interruption level and medical errors. Adopting computer based communication facilities will greatly boost the communication efficiency in hospitals.

For example, the use of emails will help to eliminate those communications that are synchronous in nature such as face-to-face as well as telephone conversations that are associated with high level of interruptions. Therefore, the uses of email as well as instant messaging for urgent cases are more effective in hospital setting. Relevant parties should be advised to check their emails at specified time intervals and respond accordingly (Parker & Coiera, 2000).

Hospital wards are mainly distributed work environment as a result of hospitals workers being spatially separated because of their constant mobility as well as the propensity of hospital work being distributed in time. Therefore, the presence of central database as well as use of emails for communications purposes will facilitate passing of important information from one shift to the next to ensure continuity of patients information.

To avoid interruptions, mobile communications should be used only for emergencies. Finally, the hospital computer system should be secured accordingly in order to secure patients information from unauthorized access that can render to maliciously damage or altering of the patients records (Waegemann & Tessier, 2002).

Reference List

Parker, J. & Coiera, E. (2000). Improving Clinical Communication: A review Psychology. Journal of JAMIA. 7, 4, 453-461

Preece, J. (2002). Interaction Design: Beyond Human Computer Interaction. New York: Prentice Hall.

Waegemann, C. P. & Tessier, C. (2002). Documentation Goes Wireless: A Look at Mobile Healthcare Computing Devices. Journal of AHIMA, 73, 8, 36-39.

Computer Assisted Language Learning in English

Objectives of the Proposed Study

The modern world is a highly technological environment in which all human activities sooner or later get technological solutions, and education is not an exception in this respect. The use of computer-assisted language learning (CALL) in education is becoming a more and more important part of the curriculum of the bulk of colleges and universities (Murday et al., 2008, p. 125; Leahy, 2008, p. 254). Thus, it is important to study the modern state of things with the use of CALL in education. Accordingly, the objectives of the proposed study include:

  • To study the use of CALL in English teaching for college students using English as a second language;
  • To research scholarly opinions regarding the use of CALL for college students with limited English language proficiency;
  • To study the opinions of college students and teachers regarding the use of CALL for their English courses;
  • To study the numeric data representing the effectiveness of the use of CALL for the specific purposes of teaching college students.

The above-listed objectives will allow the proposed study to focus on the theoretical considerations that surround the use of CALL and see how scholars have already researched the practical side of the CALL implementation in various educational establishments. As well, the above objectives provide for the use of both qualitative and quantitative methods of research, which will allow the proposed study to specifically consider the attitudes of college students and teachers regarding CALL as well as the actual numeric data reflecting the efficiency of the CALL use.

Proposed Study Background

The background of the topic chosen for the proposed study can also help explain why namely the use of CALL for college students is selected for the future research. Thus, it is a fact that CALL is the learning tool for students with limited language proficiency, but little is known about the relation of teachers towards the use of CALL in their practice. Kessler and Plakans (2008) discuss this topic in their article, thus contributing greatly to the research of this side of CALL. According to Kessler and Plakans (2008), teachers confidence in operating the CALL software solutions depends on numerous factors, including training, previous computer experience, specialization in a certain CALL field, etc (p. 270). Accordingly, the teachers side of the CALL use for college students programs is essential for understanding the overall efficiency of CALL in education.

Further on, CALL is obviously not a single tool for language learning. The notion of CALL, according to Futagi et al. (2008), includes the whole range of computerized, both online and offline, software solutions that help students, although to different extents, to master English as their second language through the study of collocations, i. e. basics of spoken and written language (p. 353). These solutions include the databases of word-for-word collocations, software for error recognition in written or typed collocations, web-based collocation-detection systems, and even the grammar-checkers that show the wrong variants instead of correcting them to the needed ones (Futagi et al., 2008, pp. 354  355).

Finally, the issue of CALL use presupposes the considerable preparation and training activities for both teachers and students to enable them to operate and use CALL tools at the highest rate of efficiency (Compton, 2009, p. 73; Finkbeiner, 2001, pp. 340  341). Thus, the topic of CALL for college students is rather significant.

Significance

In more detail, the proposed research of the use of CALL for college students will be a significant scholarly because the topic of computerized solutions for education is a rather widely discussed one today. Kessler and Plakans (2008, p. 270) and Finkbeiner (2001, p. 341), for example, argue that the educational needs and opportunities develop at a rather high speed, and if in the 16th century a printed book was only a fantasy for educators, nowadays students and teacher can choose among numerous software online solutions that enhance their performance in class. At the same time, the controversy that surrounds the use of CALL tools only adds to the significance of the proposed research, as it is necessary to determine, at least on the sample of several dozens of people, what is the actual effect of CALL on students performance and teachers confidence in class.

Methods

Finally, it is necessary to define the methodological approaches that will be used during the proposed study. As far as the research of the CALL use for college students will involve the direct work with people and the analysis of purely numeric data, the combination of qualitative and quantitative methods will be implemented. As Golafshani (2003, p. 597) claims reliability and validity to have critical meaning for any research, the proposed study will also be developed based on these concepts.

In more detail, the qualitative part of the methodology for the proposed study will include the review of the previous research works on the topic of CALL in education, the analysis of those works, the conduct of interviews and surveys of students and teachers. The sole aim of all the implemented qualitative methods will be to study the attitudes of students and teachers towards the use of CALL in their practices and assess, at least approximately, the efficiency of students and teachers performance while CALL methods are practiced. Golafshani (2003) defines qualitative research as any kind of research that produces findings not arrived at utilizing statistical procedures or other means of quantification (p. 600.). Accordingly, the qualitative methods listed above will deal more with the implications of the findings, rather than with their numerical meanings.

The use of the quantitative method in the proposed research will be limited to two main processes. First, the results of surveys of CALL effectiveness will be presented in the numeric form in relation to the measurements scale that will allow seeing whether a figure displayed by a student reflects the high, moderate, or low. These data will then be related to the effectiveness of students and teachers performance without CALL. Finally, both data sets will be compared and respective conclusions on the efficiency and overall necessity of CALL methods in language learning for college students will be made.

The reliability of both qualitative and quantitative methods will be supported by the objective data about the academic performance of studies students before and after CALL implementation. The validity of the research methods will be ensured through the proper sampling that will include all groups of students and teachers according to their approximate psychological, educational, personal, and professional characteristics.

References

Compton, Lily K. L. (2009). Preparing language teachers to teach language online: a look at skills, roles, and responsibilities. Computer Assisted Language Learning, 22(1), 73  99.

Finkbeiner, C. (2001). One and All in CALL? Learner-Moderator-Researcher. Computer Assisted Language Learning, 14(3), 339  361.

Futagi, Y., Deane, P., Chodorow, M., and Tetreault, J. (2008). A computational approach to detecting collocation errors in the writing of non-native speakers of English. Computer Assisted Language Learning, 21(4), 353  367.

Golafshani, N. (2003). Understanding reliability and validity in qualitative research. The Qualitative Report, 8(4), 597-606. Web.

Kessler, G. and Plakans, L. (2008). Does teachers confidence with CALL equal innovative and integrated use? Computer Assisted Language Learning, 21(3), 269  282.

Leahy, C. (2008). Learner activities in a collaborative CALL task. Computer Assisted Language Learning, 21(3), 253  268.

Murday, K., Ushida, E., and Ann Chenoweth, N. (2008). Learners and teachers perspectives on language online. Computer Assisted Language Learning, 21(2), 125  142.

Internship in the Computer Service Department

Work plan status

I think that I am on track in relation to what I have done in the last two weeks. I have learned quite a lot with regard to my internship in the Computer Service Department, which is headed by very competent supervisors. In fact, I know that I am on track because I have been assessed by the leaders in the facility with the aim of establishing whether I have gained the required skills and knowledge. In addition, at this point, I can compare my achievements with my goals that were set to be accomplished within the fortnight.

Key achievements

In the last two weeks, I have achieved a lot vis-a-vis gaining practical skills and knowledge. At the start of the level 2 internship training, I began creating an image using Windows. Although it was my first time to build an image using a computer application, I built it with a lot of ease, implying that I rarely needed my supervisors assistance. However, whenever I encountered problems in making sense of the steps outlined in the CDs and DVDs provided, I could request my supervisor to guide me to understand them.

In fact, the supervisor and other personnel in the department were very willing to assist students, implying that they were committed to effective training. Due to the fact that the level 2 of the department was involved in formatting and preparing laptops for new students, I was able to learn the essential aspects in relation to formatting laptops typified by relatively high levels of new technologies. In addition, I gained critical knowledge vis-a-vis fixing problems associated with videos.

Toward the end of the first week, I was taught how to prepare a sheet that was important in formatting a Dell laptop. At the start of the second week, I started working at the level 3 in the department, which was offering computer-networking services. I achieved a lot when I interacted with the universitys network architect, who provided a presentation that contained networking information.

After the presentation, I was exposed to practical sessions that involved types of network, types of cables, wireless connections, components of data centers, firewalls, and servers. Personnel could be called to solve problems and I could accompany them, which enabled me to learn a lot. Some of the problems that I learned to fix were related to access points, wireless connections, office telephone connectivity, and printer-computer networks. In fact, I could be given a chance to assess the source of a problem and apply the best solution that could result in improvement of the performances of different devices.

Problems and solutions

Within the fortnight, it is important to state that I encountered some issues that negatively impacted my learning. In the first week, I could hardly follow instructions in the learning resources provided, which were CDs and DVDs. They contained critical documentation that was aimed at helping learners to understand concepts involved in creating images using applications based on Windows platforms. I solved the issue by asking my supervisor to guide me.

Second, it took me some time to know all the workers in the department, which affected me due to the fact that I could hardly interact with them at the beginning. I found that it was important to interact with all the staff in order to solve the problem. Finally, it took me a relatively long period to adapt to the working environment in the level 3 because of changing from the level 2 after one week. I solved this by increasing the level of interaction with my supervisor and other workers.

Potential problems and solutions

In the future, I would anticipate two problems. First, I think that I would experience a problem associated with implementing software documentation. A perfect solution to the issue would be to request my supervisor to explain to me the content in learning resources. Second, I would face the challenge of limited time within a training level of my internship. This would be solved by suggesting that I spend more time within a section of a department.

Lessons learned

I learned a lot in the fortnight of my internship within the department. From a general point of view, everything went well, but for the few aforementioned problems. I learned important aspects, such as formatting laptops, creating computer images, implementing software documentation, fixing network problems, among others. In the future, I think that I can improve my speed of fixing computer network issues.

Organization and culture

Personnel who aimed at producing excellent performance outcomes typified the work environment. Effective communication was used from the top to the bottom and vice-versa. I also learned that the department had supervisors who considered views of their juniors.

Miscellaneous

In conclusion, the fortnight was one of my best learning periods. I established professional networks that would go a long way in helping me in my career in the future. Given another chance, I would go to the department to continue learning various concepts.

Foreign Direct Investment in the South Korean Computer Industry

The assessment of political risks and legal environments is a necessary stage before deciding on the foreign direct investment (FDI) in the concrete country. The reason is that the political situation in a country can have negative effects on the companys development and the safety of investments. Therefore, international legal environments need to be assessed to propose efficient strategies for the company planning the FDI (Debaere, Lee, & Lee, 2010). The computer and high technology industry are actively developing in South Korea, and it is characterized by a qualified workforce. Therefore, the decisions regarding the FDI in this country are mostly made by IT companies and producers of laptops and computer components. This paper aims to assess political risks and examine specific legal factors that can affect the decision on the FDI in the computer industry in South Korea with the focus on the macro and micro perspectives, and the other purpose is the provision of recommendations to address the situation.

Expropriation and Confiscation Threats

In South Korea, threats of expropriation and confiscation for laptop production centers are minimal. The reason is that the country refers to the international laws regarding the practices of expropriation of the invested properties (Foreign direct investment hit record in 2014, 2015; Lall, 2013, p. 20). Thus, the foreigners private property is protected by laws, and this principle is also relevant for producing and selling laptops because they represent the significant niche in the technological market of the country (U.S. Government, 2015, p. 3). Although the confiscation is not prohibited in the country directly, the compensation for the possible expropriation of the property for the public use is guaranteed.

It is important to state that South Korea has many regulations regarding business development and foreign investment. Therefore, the use of business models that are not authorized or adopted in the South Korean environment has legal consequences (Chung, 2014, p. 223). Moreover, the level of government interference in various industries and businesses is different, and it is correlated with the level of the industry openness to the FDI. The laptop industry of South Korea is open to the FDI, and the level of government control is low (U.S. Government, 2015, p. 2). As a result, many producers of laptops choose to invest in South Korea in order to use the significant technological base and the high-quality workforce.

Foreign Goods and Labor Laws in South Korea

The regulation of business development in South Korea is perceived differently by investors. The opinion shared by the majority of foreign executives operating in South Korea is that it has the overly burdensome regulatory environment (U.S. Government, 2015, p. 3). This approach is also reflected in developing campaigns limiting the entrance of foreign goods in the country. However, in spite of the fact that the South Korean market is mainly protected from foreign goods, this practice is not relevant for the laptop production as a part of the computer industry (Vu & Im, 2013, p. 19). Such campaigns do not work for marketing laptop components that are produced abroad (Kotrajaras, 2010, p. 13). Many foreign investors are officially invited to the laptop industry to build partnerships with Korean companies and develop the research and development sector (U.S. Government, 2015). Thus, the FDI in the South Korean computer industry is supported without focusing on threats of foreign goods dominating the market.

Planning the investment in South Korea, executives rely on attracting a high-quality workforce. Nevertheless, foreign investors in South Korea need to refer to the labor law on unions and associations at the workplace revised in 2011 (Seol, 2012). Employees working for the foreign-invested business should have the opportunity to join the union and receive the associated benefits (Kang, Lee, & Park, 2011). The mandatory labor laws include the provision of paid leave and the recruitment of diverse people and persons with disabilities. These laws should be strictly followed by foreigners producing laptops because the high-quality technicians work in this sphere is valued.

Political Risks Leading to Economic Changes

To decide on the FDI in the South Korean laptop industry, it is also necessary to assess the role of such political risks as civil wars and violent conflicts in influencing changes in taxation, inflation, and currency devaluations. The reason is that such risks directly affect the profitability of the developing business and investors revenues. Traditionally, South Korea is discussed as a country with a low potential for political risks (Geun-Hye, 2011; South Korea: Country risk report, 2015). However, the problem is in the fact that South Korea is in a state of war with North Korea. As a result, any escalation of the conflict, as it was in August of 2015, has adverse effects on the countrys business environments (Park & Kim, 2015, para. 2). Still, South Korea works to protect the interests of foreign investors in the country, and the production of laptops can be affected only indirectly.

The dependence of the economy on the political situation is supported by the fact that the escalation of the conflict between North Korea and South Korea in August of 2015 led to increasing the risk of currency devaluations and to changes in the inflation rate. In August of 2015, the inflation rate was 0.70 in contrast to the lowest level in 0.40, recorded in April of 2015 (Trading Economics, 2015). Discussing the taxation in South Korea, it is important to state that taxes typical for the laptop industry in the country are minimal. According to the South Korean Foreign Investment Promotion Act (FIPA), the regular increase in taxation is not related to this industry, and the focus is on providing the tax incentives and decreased rental fees for foreign investors in the laptop sector (Lee & Min, 2011; U.S. Government, 2015). However, such political and economic changes can affect the laptop industry because of the threat of freezing the projects and decreasing the local demand.

Discussion of Political Risks from Both Macro and Micro Perspectives

Political risks are discussed from two perspectives. The macro perceptive analyzes political risks related to all foreign investors operating in the concrete country. The micro perspective explains the risks associated with a certain industry (Kotrajaras, 2010). In the case of South Korea, the macro perspective, political risks, and legal factors are threats of expropriation, necessities to follow the labor laws strictly, and risks of the further conflict escalation between North Korea and South Korea (Poulsen & Hufbauer, 2011, p. 12).

Focusing on the micro perspective, it is important to state that the laptop industry is under the threat of intensifying governmental and legal regulations and changes in FDI and taxation laws (South Korea property investment guide 2013, 2013). The problem can arise if South Korea limits the foreign investors impact and control in the industry after revising the list of industries available for the investment. The problematic political situation regarding the development of the North Korea-South Korea conflict can also result in restricting tax incentives for the FDI in the high technology industry.

Conclusions and Recommendations

The assessment of the political and legal environment for investing in the laptop industry in South Korea demonstrates that the overall environment for the FDI is rather beneficial because South Korea focuses on following the international laws regarding the FDI. The FIPA also contributes to creating positive conditions for foreign investors operating in this industry. However, a year ago, South Korea was discussed as one of the most stable economies to invest in, and the situation is different today. Although the compensation for the possible property confiscation is guaranteed for foreign investors, the development of the military conflict can affect this situation. The other important risk is the strengthening of regulations in the laptop industry that remains open for the FDI and having limited governmental control. The current unstable situation in the country can have adverse effects for producers of laptops investing in South Korea because any political changes will lead to economic losses, and radical political changes will lead to property confiscation without reasonable compensation.

It is possible to formulate the recommendations for planning the FDI in the laptop industry in South Korea. Currently, the risk for the FDI is rather high, but the implementation of certain recommendations can decrease the risk to a minimum. Thus, the following recommendations need to be used by the companys management:

  1. the choice of the political risk insurance for those situations when compensation is not paid to the investor;
  2. the examination of the countrys legal base to determine the secure strategies for the business development;
  3. and the formulation of the strict agreement with the South Korean partners on principles of the FDI that is supported by the international and national laws on the FDI.

Such an agreement should reflect the laptop industry specifics. In addition, prior to making the final step and investing in business activities in South Korea, it is important to complete the additional monitoring of the political, legal, and economic situation in the country.

References

Chung, S. (2014). Environmental regulation and foreign direct investment: Evidence from South Korea. Journal of Development Economics, 108(1), 222-236.

Debaere, P., Lee, H., & Lee, J. (2010). It matters where you go: Outward foreign direct investment and multinational employment growth at home. Journal of Development Economics, 91(2), 301-309.

Foreign direct investment hits record in 2014. (2015). Web.

Geun-Hye, P. (2011). A new kind of Korea. Foreign Affairs, 90(5), 13-18.

Kang, S. J., Lee, H., & Park, B. (2011). Does Korea follow Japan in foreign aid? Relationships between aid and foreign investment. Japan and the World Economy, 23(1), 19-27.

Kotrajaras, P. (2010). Foreign direct investment and economic growth: A comparative study among East Asian countries. Applied Economics Journal, 17(2), 12-26.

Lall, S. (2013). Direct investment in South East Asia by the NIEs: Trends and prospects. PSL Quarterly Review, 44(179), 19-28.

Lee, B., & Min, B. S. (2011). Exchange rates and FDI strategies of multinational enterprises. Pacific-Basin Finance Journal, 19(5), 586-603.

Park, J., & Kim, S. (2015). Web.

Poulsen, L. N., & Hufbauer, G. C. (2011). Foreign direct investment in times of crisis. Peterson Institute for International Economics, 1(2), 11-23.

Seol, D. H. (2012). The citizenship of foreign workers in South Korea. Citizenship Studies, 16(1), 119-133.

South Korea property investment guide 2013. (2013). Web.

South Korea: . (2015). Web.

Trading Economics. (2015). Web.

U.S. Government. (2015). Korea investment climate statement. Web.

Vu, T. B., & Im, E. I. (2013). Impacts of FDI relations between the US and East Asia on economic growth. Asia-Pacific Journal of Social Sciences, 5(1), 18-27.

Computer-Based Learning and Virtual Classrooms

E learning is a wide range of processes that include computer-based learning and virtual classrooms that is received and sent through the Internet, audio and videotape, satellite broadcast, CD-ROM, and intranets. We can generally term it as electronic means of communication, education, and training.

E-learning adds technology to instructions and also utilizes technologies to advance potential new approaches to the teaching and learning process. However, e-learners need to be prepared in the case of a technology failure which is the most common challenge faced in e-learning.

There is need to plan strategies to enable learners become successfull online learners. The learners should come up with time management strategies to enable them to cope up with assignment deadlines. Developing skills on effective use of technology is an essential strategy to having a successful online learning; such strategies include technology plan and e-mail skills, which are very useful when using the computer to research, type using Microsoft word software, save in storage devices and even send the work via e-mail.

It is important that learners develop a personal technology contingency plan to help during technology failure. The contingency plan includes having an alternative computer in case the primary computer being used fails and power back up systems that supply the computer with battery energy incase of frequent electricity failures.

E-learners need to install antivirus and anti-spyware software to protect their computers against virus, malware, Trojan horses, and spyware that are approved to harm and break down computers (Watkins & Corry, 2011, pg 75).

Online learners should also have contact information of their faculty, two classmates, and those of technology support services to get assistance during technology failure. Above all these measures, there is need to include a back up schedule to be able to access important information when a learner cannot access a computer. The back up will include data storage devices such as external drive, rewritable CD, and floppy disks (Watkins & Corry, 2011, pg 75).

Exceptional skills on the use of e-mails also need to be developed by online learners to enable them succeed in e-learning. It is important to improve on written communication skills in the use of e-mail to compose and reply to mails via the internet. These skills enable e-learners to professionally draft concise and grammatically correct messages and documents.

Online learning seeks to close the gap in education system between how students live and how they learn, e-learning therefore pushes education environment to be more relevant to the current living environment. Students and teachers continually engage themselves in learning and doing new things but hardly access new ways of learning and doing them (Holmes and Gardner, 2006, pg17).

Global education and E-learning primarily use computers that provide tutorial materials for learners to gain knowledge from, the learner is then tested with the use of multiple questions regarding the knowledge they are expected to have learnt.

E-learning pays little attention to the learners compared to teachers who interact with students during the learning process. This mode of learning demands that course management, design procedures, and guidelines are developed to enable and ensure there is active student participation (Holmes and Gardner, 2006, pg 32).

In the current and ever developing world technology has become a huge part in education and economic development for students and employees in the dynamic and innovative business world. This is a major breakthrough in technology and education industry.

E-learning is dynamic and is increasingly becoming more complicated with time. This has necessitated the need to develop new types of learning systems and web-based learning infrastructure that needs to be managed efficiently to cope up with e-learning dynamics. Different presentations are used to help in the learning process due varied learning characteristics of individuals.

Web based learning object selection may also be adapted to optimize e-learning in relation to the learners background and performance with specific learning objects (Ma, 2006, pg 57).

Time management strategies and effective use of technology have become the pillars of successful online learning. These strategies form the core issues of challenges facing online learners whose success mainly depends on the implementation of the above measures to help them in online learning.

References

Holmes, B. and Gardner, J. (2006). E-learning concepts and practice. NY: Pine Forge Press.

Ma, Z. (2006). Web based intelligent e-Learning systems: Technologies and applications. PA: Idea group inc.

Watkins, R., and Corry, M. (2011). E-learning companion: A students guide to online success. OH: Cengage Learning.

Leasing Computers at Persistent Learning

The current case study entails leasing computers at Persistent Learning, an educational software company. Leasing Computers is in the midst of making a financial decision on the most appropriate way of acquiring assets (computers and related hardware) for purposes of expansion. Owing to its financial position, the company has two options of financing its expansion objective. The options are to undertake a fair-market-value lease and the one-dollar-purchase.

Under the fair-market-value lease the company would be under rental agreement while under the one-dollar-purchase the company would provide financing for the computers purchase. This case study analysis is an attempt to answer different questions relating to the fair -market-value less and one-dollar-purchase less options. In addition, it provides the most effective and appropriate choice between the two leasing options.

Based on the case study, Persistent Learning competitors own their computers which give them a competitive advantage over rivals. Competitors own their computers because they have a higher cash-flow compared to Persistent Learning. In addition the companies have an outstanding capital base that enables them to purchase computers. Companies with their own competitors treat the computers as fixed assets which is a long term investment in an organization.

Also, the companies with computers are flexible as they do not have to negotiate with third party capital equipment providers. This saves time and a lot of paperwork often incurred during a leasing process. By owning capital equipment such as computers, such an ownership enables the companies to enjoy economic life of the capital. Furthermore, the companies can easily sell old computers or upgrade them at a much cheap prices.

Accounting for fair-market-value and one-dollar-purchase

Within a period of three years, fair market value lease would be accounted for as an operating expense or lease payments as opposed to an asset to Persistent learning. On the other hand, one dollar purchase would be accounted for as an asset since the company would get to own the computers after a period of three years.

Under the fair market value the equipments are accounted for as operating expenses because the company would be paying for the equipments for which they lack ownership obligations. The fair market value as a leasing expense is accounted for on the companys income statement.

One dollar purchase would be accounted for as both a liability and an asset and recorded on the balance sheet. It is accounted for as an asset as it reflects the equipments value to the organizations. On the other hand, it is accounted for as a liability because Persistent Learning has an obligation to pay the lease expenses to the lesser.

As an asset, the equipment acquired through the one dollar purchase would depreciate during the three year period. As a result, it would be accounted for as a depreciation expense in both cash flow and income statements. Since Persistent Learning does not own the equipment, there is no depreciation expenses realized under the fair market value. In addition, no liability is accorded to the leasing company thus it cannot be accounted as a liability.

Classification of leases

Fair market value lease would be classified as an operating lease while the one dollar purchase would be classified as capital lease since under the fair market lease, capital equipment is only leased for the operating period. On the other hand, the one dollar purchase ensures ownership of the property or capital equipment after the agreed lease period. Therefore, under the former a firm does not own the equipment while at the later the equipment is treated as owned.

It is important to note that both capital and operating leases either have no effects or different effects on income statement, cash flow statement, or the balance sheet. Although an operating lease may not have an effect on the balance sheet, it tends to affect the income statement.

On the other hand, capital lease has an effect on the balance sheet and income statement. For instance, depreciation of funds under the capital lease lowers their value on the balance sheet, while at the same time recording a depreciation of expenses, which is seen in the income statement.

Operating lease is reflected on the income statement as expenses incurred during the accounting period. Therefore, operating expenses act as lease payment which is an expense that reduces net income. Total cash flow statements are not affected by capital and operating leases since the actual cash flow remains constant even if a lease is accounted for as an operating lease of a capital lease.

With regard to income statement, cash flow under the income statement tends to be comparatively higher in comparison with cash flow under an operating lease. The reason behind this is that under capital lease, a lease is treated as an asset which depreciates as cash flow inclines during the lease period.

Appropriate lease alternative for Persistent Learning

The best leasing alternative for Persistent Learning based on the case study is the Fair-market-value lease. In this alternative, the company would engage in a rental agreement. It is the cheapest option under the circumstances and the most appropriate type of lease as it is flexible and Persistent Learning can still purchase the equipment after a period of three years at the prevailing market fair value.

The company is certain that the capital equipment would be needed for a period of three years. Because of market uncertainty and obsolescence of equipments, Persistent Learning would choose the Fair-market-value lease. In addition, the company would not require the computers after three years. So there is no need to own computers at the end of three years and sell them at lower prices. Having to dispose or sell the computers is a time consuming process which is also costly.

Based on the case study, the company plans to use the computers in three years and the economic life of the computers is 5 years. Therefore, the lease period is defined to be less than 75% of the capital equipments expected economic life which makes Persistent Learning qualify for fair market value lease.

On the other hand, the present value for the lease payments is less than 90 percent of the equipment. Persistent Learning would have to pay for the equipment usage for three years and supposing that it still needs the equipment for another year, the company has the choice to renew the lease.

Alternatively, Persistent Learning can choose to purchase the computers at the fair market value. In this kind of purchase, Persistent Learning would buy the computers after calculating the equipments depreciation in a period of three years. Lastly, the monthly lease rates are lower in fair market value lease compared to the one dollar purchase. Therefore, I would prefer the fair market value lease to the one dollar purchase.

Principal arguments for and against capital leases

Initially, capital and operating leases were recorded differently but the reevaluation by the FASB would now ensure that all leases are treated as capital leases. In other words, all leases would be recorded as liabilities and assets. Capital leases have the capacity to recognize expenses (liabilities and depreciation expenses) compared to operating leases. As a result, leases would be recognized as liability and as an asset when accounted for in a balance sheet.

Consequently, firms (lessee) would be in a position to claim for depreciation of the leased capital equipment annually. In addition, the lessee would be allowed to deduct the interest expense in each financial year. Operational leases are not shown on a firms balance sheet like it is the case for capital leases. Therefore, treating all leases as capital leases would ensure that leases are recorded on the balance sheet thus showing the financial position of a firm to creditors.

One of the major arguments against this move is that debt level reported would increase. This is because classification of operating leases as capital leases would require the levels of reported debts to be exposed to financiers which have effect on individual credibility. In addition, this would have an impact on debt covenant compliance. Another argument against the change is an anticipated increase in lease expenses.

Under operating leases, the lease expenses remained constant for the agreed period. However, treating leases as capital leases would increase lease costs. By reclassifying the leases, the level of debt indicated in the balance sheet would be increased by firms operating large operating leases. This may have negative effect on the financial position of an organization. Lastly, the commitments by lessee to not assume ownership of capital equipment after the lapse of lease period should not be treated as a debt but rather as a rational choice.

Ergotron Inc Computer Workstation Environment

Executive Summary

The literature in IT industrial ergonomics point out that it is important to provide a contented work environment in order to avoid suffering from wide-ranging musculoskeletal stress disorders (MSDs) linked with the use of IT device such as the computers. Physiological disorders that could be developed because of strained eye, neck, or back fatigue headache as well as emotional stress can be avoided when better ergonometric designs are applied.

This paper will focus on the ergonomic factors that have been put in place by the Ergotron Inc. to improve their computer workstation environment. Ergotron Inc. is a technology firm specializing in the manufacture and use of computers. In fact, a lot have been published on the ergonometric factors that are involved in the improvement of the computer workstation designs.

However, this paper objectively aims at providing reasonable anthropometry information and guiding principles, which could be drawn on in generating apt as well as approved human workplace milieu within such corporations and afar. In other words, the paper, using documented information and the anthropometric data, focuses on various ergonomic factors applied by Ergotron Inc. to make its computer workstations friendly and comfortable to the workers.

Introduction

Ergonomic Factors

In the past fiscal years, various technical research studies focused on the human or ergonomic factors that are incorporated in designing workplaces. In fact, the studies have acknowledged that ergonomic factors must be considered when analyzing and implementing systems safety. Most of these researchers state that human or employees take part in the systems disposal, maintenance, designing, management, operations, as well as procurement. Thus, human factors are correlated to the failures and triumphs of the companies systems. Furthermore, various theoretical frameworks appraising the causes of organizational accidents tend to recognize the central role played by ergonomic factors towards ensuring the safety of systems used by human. For instance, ergonomic factors play decisive roles such as acting as sources, barriers, and contributors to recovery from industrial risks as well as safety incidents (Lowe n.d).

In any corporation, failure to incorporate ergonomic factors in the management of human resources and production processes could cause stress and accidents that might render the company obsolete. This implies that, proper management of human factors ensures that systems are safe for use and can hardly cause loss of life, stress or harm to the company employees.

In fact, ergonomics also dubbed as human factors entails the comprehension of the correlations amid various organizational systems and the employees. This paper aims at analyzing the ergonomic factors in a specific organization. It also offers a proposal on how to make the workplace safer and less physically and psychologically stressful. Secondary anthropometric data will be used in the study while content analysis will be used to analyze gathered data.

Causes of stress in an organization

Several persons undergo stresses that originate from the intrinsic organizational natural surroundings. A number of ergonomic factors that cause stress at work place are specified in several printed writings. However, policies of the organization, absence of control, as well as physical milieu are the only publicized prevalent causes by the cautious scrutiny carried out by the scholars.

The organizational physical surroundings

An exterior surrounding whereas any employee can be existent may denote a physical milieu. In fact, such environs affect the growth and manners of the workforces in an organization. The ergonomic factors that can influence employee development and behavior encompass conditions that are jam-packed, the extent of noise, exposure to air, and the structural constructions within the premises.

Therefore, safety as well as psychological and physical wellbeing of the personnel in an organization requires healthy and clean environment (Alqahtani, 2012). Nevertheless, the organizational stress as well as insecurity of workers emotional and physical welfare augments due to unhealthy surroundings.

Conversely, stress and workplace injuries are related to the physical milieu once it fails to bump into the measures of standards at fundamental stages. The scholars assert that insalubrious physical environs results from the pessimistic indicators such as employee thronging and noises.

Labor forces experiences inferior presentation on chores that are cognitive as an outcome of abridged sensation of control for instance. Indeed, the situation is an indicator of employee stress owing to crowding and noise that is exceeds limits. The ultimate results of such human factors in the physical setting of an organization render the employees to possess impaired competence of coping with their duties (Alqahtani, 2012).

Dearth of organizational control

Stress is supreme among the organizational workforces because of the diminutive rheostat over the operations and strategies guiding their work. As such, better-quality performance and condensed stress can be fostered through having good sense in certain types of control. In addition, a part from control of the organization, an individual control is also necessary for the reduction of stress and mandate of safety.

On the contrary, employees might experience antithetical effects from the abiding controls such as career accountabilities (Alqahtani, 2012). Hence, the intrinsic environment in the occupation brings about stress at work place. Stress and insecurity increases since such adverse effects are directly linked to the characteristic of natural surroundings of the work instead of the institution itself.

Policies of the organization

In this context, the guiding principles and comprehensive rubrics for organizational activities are used to delineate the strategy of an organization. The rudimentary principles and goals for carrying out business in the organization can be specified by means of the policies. In point of fact, the executives employ these policies as their principal guides in ensuring quality in the jobs they engage in.

So, strategies can be established from the practice of the previous years or they are implied or printed simply (Antai-Otong, 2001). Thus, policies can generate stress due to poor relational rapport, insufficient perceived appreciation, as well as the ambiguity of the starring role.

A meager social support due to lowly relational rapport diminishes work gratification and thus stress. The manual workers therefore find it necessary to enact sufficient and good relational affiliation for the social backing. In regards to the perceived insufficient preferment, supposed an employee is no longer acknowledged for job elevation they probably undergo circumstances of stress at their work places.

On the other hand, ambiguity in policies augments and causes stress in an organization as an outcome of starring role uncertainty. Congruently, lack of safety at the place of work might also result from the ambiguity of the tasks. All these tresses amount when there are inadequate guidelines of any job an employee is likely to execute as indirectly triggered by organizational policies.

The management of stress in an organization

In the organizations bid to make the workstation safer and physically or psychologically stress free, an organization can manage or diminish stress by employing more than a solitary tactic. In this perspective, the use of behavioral approach does not underestimate the other tactics like prescription of the anti-anxiety drugs, which is a psychological approach. Before any attempt to manage stress, the organizational executives need to presuppose three elegances of managing stress.

The employees in an organization should further be in readiness for the challenge, commitment, and control for hardihood to be effective. For personal control to help eradicate stress and augment safety, an organization should make self-efficacy and the rheostat locus certain.

Any employees will be capable of enduring the conditions of stress when the locus of control is situated internally. Additionally, a resilient self-efficacy that is the trust in personal aptitude of performing enables the employees to manage stress (Antai-Otong, 2001). Nonetheless, individual workers should mug up exactly on how to animate with stresses if situations are beyond their control.

Case Study: Ergotron Incorporation

Ergotron Inc is amongst various organizations that incorporate ergonomic factors in its strategic plans and daily operations. The system operation and employees management strategies adopted by Ergotron Inc warrant workplace safety and reduced physical and psychological stress among employees. However, there are various challenges encountered by this corporation in an attempt to incorporate ergonomic factors into the organizations daily operations (Sweere, 2002).

Challenges attached to ergonomic factors

In an attempt to make the workplace system live and operational, Ergotron Inc tends to integrate human factors in all the organization aspects. As an IT organization, the company views that personnel are part of its success and failure.

Thus, when planning to correct, create, or implement new and old procedures as well as policies, Ergotron Inc focuses on the technical and social components also called ergonomic factors that may generate stress and insecurity to the employees (Lowe n.d). Some of the possible ergonomics challenges the company faces include:

  • The practical integration amid stress, safety systems, and ergonomic factors poses challenge given that Ergotron Inc systems are concerned with the incorporation of various safety and stress management functions that are consistent in the entire company.
  • In all the production and functional operations, Ergotron Inc utilizes possibly the excellent technical ergonomics frameworks to ensure that the processes undertaken run smoothly. Thus, the company encounters structural challenges when implementing ergonomic factors.
  • Challenges emerge from the operational factors such as considering the employees issues including the associations and contacts, which establish the final results emerging from the assumed or implemented procedures and processes

Ergonomic factors at Ergotron Inc

Ergotron Inc can be compared to a computer workstation given that most productions require the incorporation of the ergonomic factors to reduce both physical and psychological stress as well as make the workplaces safer. The ergonomic factors that must be incorporated in the daily operations include:

  • Space saving and accessibility to the components
  • Ease of adjustability and task lighting
  • Wrists and foot rests
  • Proper designs of chair and adjustable work surface
  • Adjustable Visual Display Technology (VDT)

Incorporating all the above mentioned production factors into Ergotron Inc daily operations is a daunting task. However, the issues must be properly addressed by the company to eliminate or reduce various classes of physical as well as psychological stress and disorders related the poor designs and improper integration of the ergonomic factors at workplace.

In case the company fails to deal with such factors, chances that workplace could be stressful and unsafe are high. In fact, poor integration of the ergonomic factors in the company operational plans brings about musculoskeletal stress disorders that cause:

  • Synovitis, tendonitis, and tenosynovitis
  • Carpal tunnel syndrome
  • Diseases related to the shoulders, elbow, hands, and wrists
  • Headache and fatigue among employees
  • Back, neck, and eyes strains

At Ergotron Inc, there are various major causes of such strains and visual problems that the company has been addressing from time to time. For instance, the Ergotron Inc workplace seemed stressful and rather unsafe for the employees due to:

  • The inability to regulate the VDT screens stature to the levels preferred by each employee
  • Poor positioning of the vertical keyboards including tilt, aft, and fore
  • The angles for viewing the VDTs were improper and could not be adjusted by the employees to suit their requisite viewing angles particularly the big computer monitors
  • The incapacity to alter the inappropriate Video Display Technology

Proposal: Making Ergotron Inc workplace safer and less psychologically and physically stressful

Expanding the workplace environment

The networking expertise has recently advanced making all operators and companies like Ergotron Inc to integrate workstation in all operations including appropriate locations and applications. In fact, desktops are hardly believed to be just focal points for the designers of ergonomic workplace or corporate ergonomics.

Mainframes found at Ergotron Inc hospital rooms, warehouses, and factory floors appear to be a few instances of non-workplace PCs that emerged prevalent over the past years. Most of the current workplace applications call for diverse ergonomic appliance interfaces different from the customary seated counter display that study literatures have published.

In a company like Ergotron Inc, fresh operational ranks namely session and footholds ought to be integrated alongside various mainframe constituents increasing preferences for instance portable appliances, floorboards, maximum, and partition mounts. While considering such applications, constituent adjustability appears to be somehow imperative compared to Ergotron Inc workplace milieu.

The applications may allow different employees to run similar machine during different as well as similar work-shifts (Sweere, 2002). The desktop workplace cannot allow such functioning since it becomes fixed immediately the appliances are incorporated for specific operators.

Excellent design standards for the ergonomic factors should be used in all cases to allow the employees to have the optimal machine-operator boundary along with the requisite adjustability that could avert workplace injuries and minimize workforce discomforts. The specific VDM know-how meant to be drawn on in such occupation milieus could be utilized in the PC cases so as to secure room and proffer adjusting conditions for the human parameters.

The Novel Display Technology (VDT)

The invention of the VDT provided novel avenues for incorporating ergonomics into corporate operations and improving various work milieus. The VDTs are light in weight and small in size thus allowing for the growth and progression of novel mounting resolutions which might effortlessly deal with adulthood setbacks including screen tilt-ability, distances, and elevation adjustability.

The VDT offer special ergonomic devices including vertical adjustability, stand-sit appliances, comfortable bifocal viewing users, and screen distance adjustability of about 95.0% and 5.0% for male and female users respectively (Sweere, 2002).

Screen height

When feasible, Ergotron Inc VDT heights ought to be adjustable in order to allow for the individuals employees preferences working during the day and night shifts. The VDT monitors should be elevated somewhat below 1.0 to 2.0 of the operators eyes stature. This applies whether the operators are standing or sitting in order for the Ergotron Inc employees to be in relaxed and comfortable positions.

Screen tilts

The Ergotron Inc screens should be tilt-able ranging from 12.0 degrees to 20.0 degrees dependent on the VDT dimension. However, particular care ought to be observed for the minimization of VDT glares. Tilting upwards should provide for optimal screening given that it offers for a dependable central span whenever examining from the VDT bottom to top.

The distance of VDT from the users

Ergotron Inc management should ensure that the VDTs are distantly positioned from the users founded on each employees capacity to comprehend information offered on the VDTs. The span of focus for various employees are 30 and above. Based on ergonomic standards, the space for observing the VDTs should range from 18.0 to 28.0.

The location and elevation of the PC keyboard

At Ergotron Inc stockroom, office, and clinics, the PC handles used ought to be tactically situated to let the employees hold the gadgets with fingers inclined a bit descending while forearms remaining planed. The angle of tilting should range from 90.0 degrees to 110.0 degrees amid the lower and upper arms.

Recommendations

The ergonomic factors found in an organization are many and their management requires proper planning and implementation. Based on study literature, in order to warrant that workplace is safe, an organization must first ensure that all safety management systems are operationally improved.

However, to realize this, the organization systems must be developed from the perspective and better comprehension of the ergonomic factors (Spector, 2006). For instance, the organizational systems must be made amenable to all the perspectives of the ergonomic factors. Thereafter, the ergonomics perspectives should then be adopted or constructed into an operational framework.

Workplace can be stress free and safe only if the organization model integrates the following activities:

  • The safety and workplace systems must be changed or adjusted to accomplish the novel requirements and budding challenges
  • The management should put in place mechanisms that provide feedbacks to the employees using the organization systems
  • The human resource managers should regularly respond to and manage the organization safety systems. These may incorporate:
  • The investigation and response to the occurrence of safety breaches
  • The managers should survey the ergonomic safety indicators when the employees assume their normal operations
  • The organization management ought to maintain all safety management actions during daily functions (Spector, 2006). At this point, the human resource managers should the following decisive sub-responsibilities:
  • The introduction of new changes geared towards controlling and eliminating any risks caused via the hazards already identified
  • The appraisal of the effects of the organizational risks with respect to the acceptable safety level
  • The identification of the organization hazards
  • The organization should plan and organize all changes supporting the ergonomics safety and stress management operations
  • The company must also write, create, maintain or update the corporations safety and stress management standards and policies

Conclusion

The ergonomics include both the social and technological aspects of an organization. For example, any organization system entails the physical or technical aspects namely the software and hardware alongside their correlations as well as social components such as the interactions amid groups and individuals.

To ensure that such organizational ergonomic components warrant safety at workplace and reduce incidences of employees stress, the human resource managers must make certain that the technical, cultural, and social dimensions are incorporated in the daily organization operations and management. That is, all the artifacts and tools like documentations, databases, information sources, and procedures used by employees when discharging their duties must support safety measures.

Works Cited

Alqahtani, Ayedh. Organizational Stress: Causes and Management. International Journal of Innovation in Business, 1.1(2012): 1-11. Print.

Antai-Otong, David. Creative Stress Management Techniques for Self-Renewal. Dermatology Nursing, 13.2(2001): 31-39. Print.

Lowe, Christopher. A Human Factors Perspective on Safety Management Systems. Bristol, UK, n.d. Print.

Spector, Paul. Perceived Control by Employees, a Meta-Analysis of Studies Concerning Autonomy and Participation at Work. Human Relations, 39.11 (2006): 1005-1016. Print.

Sweere, Harry. Ergonomic Factors Involved In Optimum Computer Workstation Design: A Pragmatic Approach. Constant Force Technology, 2002: 1-14. Print.

Doing Business in India: Outsourcing Manufacturing Activities of a New Tablet Computer to India

Introduction

The main aim of the report is to explore and state the conditions according to which it is possible to choose India as the most appropriate country for outsourcing in relation to the tablet computer industry. The justification of the choice is provided in the report with references to the criteria which are significant for operating within the industry successfully.

India can be discussed as the most suitable country for outsourcing because its labour market is characterised by the highly educated and skilled work force, high quality services provided, possibilities for cost savings, and developed technologies along with favourable government policies, and the fast growing infrastructure, and these factors can be considered as beneficial for implementing effective outsourcing policies (Bullen, LeFave, & Selig, 2010; Thite & Russell, 2007). Moreover, Indias location is strategic for transporting the materials and products easily.

The report also includes a study on suppliers and competitors as well as the nature of the market, and it provides the expert recommendations on these aspects in relation to the specifics of the industrys micro- and macro-environment. Another aim of the report is to analyse the requirements for the establishment of the company in India, studying the competitors in the industry and their experience.

The study can show the level of the technology required and accentuate the particular features of the capital project. Presenting the analysis of the correlation between the companys required characteristics of outsourcing effectively and Indias markets possibilities, this report aims to convince the Board to choose India as the country for outsourcing the companys production activities.

The Requirements for Choosing the Country

Socio-Economic Requirements

To make the process of producing goods profitable, the companies leaders are inclined to orient to outsourcing to the countries which can provide the lower costs in relation to labour costs and production. To compete within the industry successfully, it is necessary to reduce labour costs. Thus, cost saving is one of the main reasons for companies seeking for outsourcing services from India.

Furthermore, there are significant differences between labour costs in India and in the other third world countries (Bullen, LeFave, & Selig, 2010). The producers expect to obtain benefits from hiring the Indian population because of the Indians level of education and their competence in the English language (Davies, 2004). Moreover, the companies in India have the definite freedom to manage their own budgets and gain huge profits (Thite & Russell, 2007).

India can be also discussed as the attractive destination for companies willing to offshore their IT operations and manufacturing processes to other countries in order to lower the costs (Vestring et al., 2005). The particular features of the high technology industry are the orientation not only to the cheap labour and pricing flexibility but also to the highly skilled worker to operate the equipment, machinery, and other technologies (Lacity & Rottman, 2008).

The countrys labour market consists of engineers of different specialisations who can work with high technologies and of a large number of highly skilled and educated people who can perform the various technical activities (Thite & Russell, 2007).

The fact is important for companies producing tablet computers because they need skilled labourers to manufacture the innovative products which can compete favourably with the competitors goods. Moreover, the Indian government worked out the acts on the intellectual property to guarantee the absence of the informations leakage to the competitors because of members of the staff (Chesser & Cohen, 2006).

Demand/Buyer Characteristics

To organise the production of the tablet computers in India successfully, it is necessary to refer to such aspects as proximity, ethical issues associated with the working conditions, infrastructure, and buyers attitudes to the other brands. According to the first point, the location of the country provides the company with opportunities to organise quick transportation of the materials and products within the country and from the countries-suppliers (Bullen, LeFave, & Selig, 2010).

Thus, the countrys closeness to Korea and Taiwan, the major suppliers of processor chips and memory cards for the industry, is advantageous for producing the tablet computers in time according to the quality standards and the companys expectations (Salwan, 2007). Furthermore, the developed transport connections with the mentioned countries make the distribution of the product more efficient, faster, and cheaper.

The next point of the discussion is the working conditions. The third world countries are often considered to be the territories with the worst working conditions round the globe (Lacity & Rottman, 2008). In spite of the fact India has the reputation of the country where foreign companies can find the highly skilled labourers, it is important to pay attention to the issue of contributing to the satisfied working conditions in order to meet the ethical requirements.

During the last decades, the Indian government tries to control the situation in the labour market, supporting the companies invested by the foreign corporations. New regulations and ethical laws were developed to protect the labourers rights and provide the satisfied working conditions for the labour force (Davies, 2004).

It is important to note that buyers brand associations are based on the success of the advertising campaigns and on the quality of the producing goods. The tablet computer industry is highly competitive, and the role of the buyers interest in the product is significant.

Today, the tablet computers are at the growth stage of the development cycle (Thite & Russell, 2007). That is why, the present situation in the economic and technological spheres is the best time to operate within the industry and try to gain the great profits, competing in the market. The following graph illustrates the potential growth of the tablets sales.

The graph illustrates the potential growth of the tablets sales.
Figure 1 (Tablet Sales Trends, 2010).

In spite of the fact the large percentage of the companys products should be oriented to the international market and Western countries, Indian people can be also discussed influential consumers of the tablet computers with references to the latest tendencies.

The Indian government has offered subsidies for college students to buy the tablet computers at a lower price in comparison with the average price set for the other countries markets (Akash tablets commercial variant, 2011). Thus, it is possible to discuss India not only as a producing country but also as a potential consumer. This fact can encourage firms to seek for outsourcing services from India.

Barriers to Entry into the Market

The company, which orients to producing the new tablet computers, operates within the developed Hi-Tech and IT industry. The problem is in the fact the success of the company depends on capitals investing into the production (Thite & Russell, 2007). The establishment of factories in India specialised in producing tablet computers requires much financing, and it is the first barrier to entry into the industry.

The first barrier is closely associated with the fact that the production of a tablet computer is very intensive in relation to labour and capital issues. The production is based on using expensive equipment and machinery along with hiring highly skilled workers (Vestring et al., 2005).

However, today the contribution to the development of the Hi-Tech and IT industry in India is a top priority of the Indian government, which offers the attractive and effective IT policies to support the industry by giving tax-related and other benefits to the company which is inclined to invest in the industry (Chesser & Cohen, 2006). The government also continues to improve infrastructure and communication networks (Thite & Russell, 2007). From this point, India is the best variant for outsourcing to it.

Economies of scale can be also analysed as the important factor for the companys progress. The scales principle can be used to reduce the companys costs and increase the productivity. The availability of the technical staff allows speaking about maximising the companys profits through economies of scale.

The costs minimisation is the main reason for outsourcing and it provides the firms in India with the possibility to gain from the industrys competition (Thite & Russell, 2007). It is important to not that there will not be significant retaliation from competitors against a newcomer because the size and competitiveness of the industry reduce the retaliatory reactions of the already established companies such as Apple and Samsung (Sonaje, 2012).

There are very little or no protectionist policies in the High-Tech and IT industry in India. No tariffs are applied to companies willing to export their products (Thite & Russell, 2007). It reduces the cost of production leading to the companies gaining profits (Gay & Essinger, 2000).

Supply Issues

It is possible to determine such important supply issues as the transportation of processor chips, memory cards, display screens, and GPS trackers significant for producing high-quality tablet computers from different countries.

The factory located in India can have the opportunity to discuss its location as the advantage in relation to the question of transporting the necessary components from Korea and Taiwan as the major suppliers within the industry. Thus, few big suppliers for the mentioned components are located in Korea and Taiwan, and these manufacturers have the bargaining power in the industry (Chesser & Cohen, 2006).

Technological Requirements

The production of the tablet computers requires the orientation to using the developed technologies. The contemporary tendencies to support the progress of the Hi-Tech and IT industry in India are important for organising the production of the tablet computers which can be discussed as a high-tech consumer product (Thite & Russell, 2007).

The advantages of India for being chosen for outsourcing are in the quality of the labour force and a number of highly skilled and experienced engineers who are ready to work within the industry (Davies, 2004).

In spite of the fact the research and development can be based on the human resources of the head company, the qualification of the workers is important for producing the new tablet computers and for controlling the process organised according to the innovative technologies improvements (Chesser & Cohen, 2006). Thus, to produce the tablet computer, it is necessary to hire highly skilled workers to operate the machinery and equipment and follow the instructions.

Competitors

There are few suppliers of the tablet computers and a relatively large number of buyers that is why the market can be discussed as Oligopolistic. This means that a new company in the industry can develop in the market with references to competitive pricing and controlling quality to entice the large number of consumers and win the industrys rivalry (Vestring et al., 2005).

The main companys competitors are Apple, Samsung, Amazon, ASUS, and HTC. These companies offer tablet computers in a number of different sizes and functionalities. The share of ASUS in the market is 2.3%, RIM presents 2.3%, Amazon -4%, Samsung  7.5%, Apple  63% (Sonaje, 2012).

These companies are some of the largest multinational companies in the world, and there are challenges for the successful entry to the industry (Chesser & Cohen, 2006). The accents should be made on the non-price competition as effective in the tablet industry. That is why, it is important to implement innovative technologies to follow the world tendencies and compete successfully.

Other Important Factors

To provide the complex analysis of the industry and determine the advantages of choosing India as a country for outsourcing the manufacturing activities, it is necessary to pay attention not only to political, economic, socio-cultural, technological, and legal aspects but also to the problem of the environmental sustainability as the key factor of the industrys macro-environment (Bullen, LeFave, & Selig, 2010).

It is important to note that the issues of the environmental sustainability are traditionally accentuated by Western companies, and the main methods to solve the problem can be also used in India in relation to following the governments recommendations in the field (Chesser & Cohen, 2006). Thus, the problem of the environment protection is urgent for India that is why the technological processes should be organised to meet the governments requirements and the principle of the environmental sustainability (Davies, 2004).

Conclusion

To conclude, it is possible to note that India can be chosen for outsourcing the manufacturing activities in relation to the tablet computer industry because the conditions provided in the country meet the basic requirements stated by the company. Thus, the characteristics, which are required by the producer, are the supporting micro- and macro-environment.

The company pays attention to such forces typical for the macro-environment as political, economic, socio-cultural, technological, environmental, and legal factors and to the components of the industrys micro-environment where the accents are made on the role of competitors, suppliers, partners, and customers.

The findings of the industrys analysis and the position of India in relation to the Hi-Tech and IT industry allow speaking about India as the beneficial variant for outsourcing.

It is possible to determine such reasons as the favourable government policies developed to respond to the contemporary intellectual property issues, the orientation to the highly-skilled labourers with references to the engineers and technical workers, the availability of cheap labour while reducing the labour and production costs, the advantageous location of the country to contact with the suppliers and customers successfully, and the presence of the ethical laws and labour regulations controlled by the government.

Modern India is oriented to the progressive participation in the foreign business with references to providing the sources for offshore manufacturing because of the variety of benefits for the companies-producers and for the development of the Indian economy.

References

. (2011). Web.

Bullen, C., LeFave, R., & Selig, G. (2010). Implementing strategic sourcing. Zaltbommel, Netherlands: Van Haren Publishing.

Chesser, W. L., & Cohen, S. A. (2006). Outsourcing in India: Practical approaches to intellectual property issues from the Indian company perspective. The Indian Journal of Law and Technology, 2(1), 65-86.

Davies, P. (2004). Whats this India business? London: Nicholas Brealey International.

Gay, C. L., & Essinger, J. (2000). Inside outsourcing. London: Nicholas Brealey Publishing.

Lacity, M., & Rottman, J. (2008). Offshore outsourcing of IT work: Client and supplier perspectives. London, UK: Palgrave Macmillan.

Salwan, P. (2007). Best business practices for global competitiveness. New Delhi: Sterling Publishers Pvt. Ltd.

Sonaje, H. (2012). . Web.

Tablet Sales Trends. (2010). Web.

Thite, M., & Russell, R. (2007). India and Business Process Outsourcing. In J. Burgess & J. Connell, (Eds.), Globalisation and work in Asia (pp. 38-59). Oxford: Chandos Publishing.

Vestring, T., Rouse, T., Reinert, U., & Varma, S. (2005). . Web.

Impact of Computers on Business

The advent of the 21st century saw mass adoption of commercial electronics in various industries which led to the emergence of the digital age. While operational business computers were introduced as early as the 1970s, the devices everyone is familiar with today and can easily use for daily functions came in the late 1990s. With decades, computers have grown to be more complex but powerful, usable for a variety of purposes, and adaptable. As business massively adopted computers the very core nature of doing business and managing operations changed for all stakeholders (Petersen, 2019). This paper seeks to explore the impact of the computer and technology on the business world.

Data Storage and Manipulation

Prior to computers, all information was stored on paper. Information had to be written or typed and organized in complex bookkeeping in each business. This was ineffective, time-consuming, and took-up significant resources. Paper files could be easily misplaced, human error was prevalent, and it was costly. Computers allowed for digital file storage, which completely revamped how businesses collected, stored, and used data and information, both about their own business and outside contexts. Once the Internet arrived, data could be stored even more safely, in virtual clouds, while information was accessible at a moments notice (IBM, n.d.). Digital file storage presented many benefits, including organizing and storing data with greater ease, reducing human error, creating back-up copies, and allowing for search of that data to find the necessary information at a moments notice. Any given file can be retrieved, shared, and manipulated in any means needed for the business in a matter of seconds.

As it is well-known, the very concept of digitally collected data has fundamentally changed how businesses operate. While business decisions were reliant on empirical data in the past, it was rudimentary statistics based off data points collected and reported on paper. Digitization of data has now meant that data points from both historic and present operations could be used. First, the shift in various processes as discussed later had allowed for much more sophisticated data point gathering in both internal functions and commercial endeavors. At last, computers provided opportunities to perform highly complex manipulations, statistics, and calculations based on a range of algorithms (Leonard, 2018). Depending on the business, this could provide highly accurate and predicting data strategies in their enterprise decision-making and commercial success.

Job Functions and Processes

As mentioned, the digital transformation brought companies into a completely new space. Multiple business functions critically changed, redundant ones were removed, and new ones added. The core function of most businesses is now to operate within the digital realm whether through marketing, building logistics chains, e-commerce, and others. Work could be done much faster on computers and new programs were developed for various functions ranging from finance to HR to team management. Many corporations had to transition, with the majority of the global workforce now working from behind a computer. The computer age was one of the catalysts to bring about the white collar revolution, essentially shifting many jobs from blue-collar industrial jobs or low-skilled labor into the office (Browne, 2017). This was especially relevant for highly developed countries, which then outsourced much of the manual labor to the developing world. Therefore, the computer not only brought changes to the companies and their processes but has fundamentally shifted the economy and ultimate geographical distribution of labor, essentially contributing to the globalization of business processes.

Communications

The foundation of all businesses from pre-digital times to modernity has been communication. Both internal communication among staff to external communication with stakeholders, clients, and consumers. The computer and digital tools have revolutionized the art of communication in business. Originally, when computers emerged, e-mail became the popular tool of communication, and still is highly used and effective. It allowed to quickly transmit written messages in a matter of seconds, distributing information to whomever and to as many people as needed (LaMarco, 2019). As technological solutions developed, various other tools emerged, such as corporate instant messaging services and the latest of which (under remote working), video conferencing to replace face-to-face meetings but being able to still discuss information in greater detail and human interaction than would be possible via written messages (Harris-Briggs, 2018). These digitally driven communication methods have impacted business structures and operations towards more effective information sharing and reduced inefficient face-to-face contact and meetings (Trint, 2021). Furthermore, the more effective and affordable communication is, which digital solutions are typically free or highly cost-efficient, the more businesses can save.

Mobility and Flexibility

Computers brought a certain level of freedom to many businesses. As discussed, the ability of one device to perform virtually all backend tasks to business operations has provided much greater flexibility. As computer technologies developed with powerful laptops, tablet PCs, and smartphones, it has given rise to what is known as IT mobility. An individual does not have to be physically present at the workplace to do their job or even monitor key aspects of manufacturing or other physical operations. This has given much social flexibility, as was demonstrated by the COVID-19 pandemic when people were forced to work from home (ColoradoSupport, n.d.). It also allowed for international business to develop as an employee could be halfway across the world fulfilling their duties.

Modern developments such as cloud computing allows to store information and even generate the computing power on remote servers, essentially streaming the data to any eligible device. This means that business employees can engage in virtually any task with a good internet connection, regardless the computing power of their respective device, because the computing power is done on the servers. In contemporary contexts, this IT mobility offers significant benefits to businesses in terms of flexibility and fulfilling their needs as any employee they need can be remotely found to fulfill tasks as needed.

The Internet of Things

The internet of things (IoT) is a web of physical electronic devices ranging from computers to sensors to other technologies which are interconnected within the same network, allowing to exchange data with other devices and systems over the Internet and communication networks. It is estimated that by 2025, 55.7 billion connected devices will be in the marketplace, with 75% being part of an IoT platform (Consolidated Technologies Inc., 2021). IoT is a critical technological development in businesses across various industries. This can range from smart light bulbs to networks of industrial machines with oversee the manufacturing process and report data back. Using the series of devices and sensors, IoT allows to collect and then analyze massive amounts of data on behaviors, processes, environments, and other key points. The machines can then enact various forms of change, either under human direction or via artificial intelligence to self-correct and make processes more efficient (Zhang & Wen, 2016). This takes the components of data storage and analysis discussed earlier and takes to a new level.

IoT impacts businesses primary by offering accessibility to tremendous amounts of data in regard to their processes. As mentioned, it can track both physical performance of manufacturing, as well as digital characteristics such as customer behaviors and product sales. IoT allows for continuous optimization of business processes and can serve as a tool for strategic decision-making, improving key performance indicators, and even benefit in human resource management such as team engagement. The more complex and comprehensive the technology becomes, the more data points it can collect and greater range of uses that it can be applied to across industries. This represents computers taken to a new generation of computing devices.

E-Commerce

E-commerce is the latest digital development of businesses, which has grown to a multi-billion-dollar market. E-commerce refers to the buying and selling goods over an electronic network, particularly the Internet. As e-commerce grew in popularity, driven in part by massive online retailers including Amazon and global events such as the COVID-19 pandemic, businesses began to shift their sales online virtually in any way possible. A business typically conducted three major elements online that were payment processing, website development, and advertising. E-commerce added on it, also simplifying the sale process significantly for both, the seller and the consumer. In both cases, business-to-consumer and business-to-business interactions, the buyers could list catalogs of available goods either on the sellers website or through third party retailers. Upon selecting necessary goods, they can place the order with all necessary details, pay online which would immediately go through, and all would be left is for the seller to ship the goods or offer the service, with logistics costs often built-in to the price (Chai, n.d.).

E-commerce in its rudimentary forms was around as early as the 1990s, but it has had tremendous impact on businesses. In many cases, doing business online has shifted entire business models or led to the creation of new ones. Some examples are Netflix who transitioned from a physical media business into fully online streaming, as well as Paypal, a payment processing company which saw a gap in the market of digital payment systems which at the time was necessary since not every retailer could easily set up credit card processing. In 2022, e-commerce is one of the primary forces of the current market economy and the majority of business is done online via computers and smartphones. It has also shifted the way companies do business, in terms of advertising, ease of access to purchase products, and other means to make the experience for consumers smooth and flawless.

Conclusion

Computers are one of humanitys most innovative inventions, significantly revolutionizing the world. The majority of systems, platforms, and processes that everyone is familiar with today came as a result of the computer and the subsequent digital and technological revolution. Businesses, which are commonly complex organizations, rely heavily on consistency, functionality, communications, and sales of goods and services. The computer was able to effectively combine, simplify, and multiply efficiency of all the core business processes. In turn, this has allowed for the development of ultra large corporations with global logistics and networks that can function to provide goods and services around the world.

References

Browne, C. (2017).

Chai, W. (n.d.). .

ColoradoSupport. (n.d.). .

Consolidated Technologies Inc. (2021). .

Harris-Briggs, N. (2018). .

IBM. (n.d.).

LaMarco, N. (2019). Chron.

Petersen, L. (2019). . Chron.

Leonard, K. (2018). . Chron.

Trint. (2021). .

Zhang, Y., & Wen, J. (2016). . Peer-To-Peer Networking and Applications, 10(4), 983994.

Computer Attacks and Critical Privacy Threats

Introduction

Computer security is one of the major challenges in the twenty-first century. It is commonly associated with dire consequences, especially in case of virus attacks. The issue is even more significant when virus attacks are initiated at larger scales  for instance, when they are regional. However, the most astounding problem is the fact that they occur on a timely basis. Therefore, the paper at hand will provide an overview of two computer attacks  the worst in history and one of the most recent ones  as well as speculate on the most critical privacy threats as of 2017.

The Worst Virus Attack

Attack under consideration is Slammer  worm outbreak first registered in 2002. It was reported as SQL server vulnerability detected by Microsoft. Widespread panic began in January 2003. The specificity of this worm is that it was not distributed via e-mail like viruses commonly spread during other attacks. Instead, even though it could not write itself on any of computer discs, it could be duplicated online, so around 15,000 servers around the globe were affected. It was spread via the Internet due to the fact that the malware used UDP Protocols. It means that all machines already infected with the worm, spammed the network they were connected to, so the volumes of the attack increased swiftly.

It is assumed that Slammer was the worst virus attack because its costs summed up to almost $1 billion (The 8 Most Famous). However, what is even more critical, it was one of the fastest virus attacks because it spread over the Internet during 15 minutes. During this time, more than 75,000 people became its victim. Still, there are even more challenging details to recall. Slammer was a malware that affected 911 services, ATM servers, and almost half of the operating online servers. At the same time, there were issues with e-tickets and checking-in, so flights were delayed (Bell). All in all, it became the cause of severe panic. In addition, even 13 years later, there have been records of the worm attack, so it is a lasting one (Pauli).

Recent DoS Attack

Distributed denial-of-service (DDoS) attack is a common example of DoS attacks. One of the recent attacks is one that hit BBC in 2015. It was initiated on New Years Eve, and the majority of BBC servers have been down for around three hours. The attack affected BBC domain, including such services as radio and television (5 Biggest DDoS Attacks). It is essential to point to the fact that television and radio have been working with issues for the rest of the day. This DoS attack was launched by an organization that referred itself to as New World Hacking. It cracked a previous record (334Gbps) by reaching 602 Gbps (Korolov).

For this reason, it became one of the most critical DoS attacks of that time. The representatives of the group said that their attack was an experiment to test their capabilities to compromise other powerful servers, such as Trumps campaign website and ISIS website. In fact, they wanted to demonstrate their power, pointing that it is the hacking organization that has resources and strengths to change the news and rule the world, not the news agency.

Major Privacy Threats

Even though there has been impressive progress in the sphere of computer security, there are still some critical privacy threats to consider. It is commonly associated with the fact that regardless of developing new and progressive security technologies, cybercriminals are constantly outrunning software developers, so threats become more intricate and challenging. As of 2017, there are several risks to keep in mind.

To begin with, the most critical problem is that of the growing instances of cybercrimes. It is associated with the breaches of both databases and personal information. In this case, personal and corporate data can be stolen by cybercriminals who either seek benefits by asking victims to pay for returning it or want to make benefit of the stolen information (for instance, like in case of stealing details regarding credit cards or other financial information).

Here, it essential to point to the fact that this threat may be easily coped with because the increased risks of security breaches are related to insecure activities of individual users or companies, such as poor passwords, ignoring the criticality of updating software and installing anti-malware applications, browsing sketchy and not reputable websites or registering on them, and paying no attention to the origin of downloaded software (Nguyen).

Even though this privacy threat is usually initiated by individuals and their insecure behaviors on the Internet, it is considered to be critical due to the fact that more than 200 million letters consisting malware applications were sent in 2013, while almost 13 million people became victims of personal information theft (Nguyen). However, what is even more challenging, these figures are constantly increasing.

This privacy threat is commonly referred to as ransomware (The Biggest Security Threats). Using malicious applications, hackers steal personal or corporate data and demand money for returning control over this data to the initial owner (Olavsrud). The main challenge with the problem is the fact that hackers select influential companies or individuals, as well as health care facilities, as their targets. In other words, they choose those people or enterprises that are likely to suffer the most from the loss of personal information (Komando).

Regardless of the powerful influence of individual behavior on the increased online privacy threats, there are as well other issues to pay attention to  those initiated by companies and states decisions. One of the appropriate examples is the threat deriving from the growing popularity of big data. In fact, it is connected to online trace left by an individual. In this case, it is essential to note that it is the risk for those people who have mobile devices with the Internet and geolocation options.

Even though potential benefits of big data are fantastic, it is as well related to several significant threats. First and foremost, people are connected to the global network that means that their location is no longer a secret. In some case, all of their actions are as well recorded, especially keeping in mind information collected from city surveillance systems and geolocation details (Olavsrud). From this perspective, personal privacy turns into an illusion if one has a mobile device with the switched on Internet.

Another common challenge is the fact that human element is absolutely eliminated from the process of analyzing big data because it is simply too complicated for one person to cope with it. In this case, the challenge is associated with being potentially manipulated by the outcomes of data analysis and overvaluing this process (Llic).

Works Cited

5 Biggest DDoS Attacks. Abusix. 2016. Web.

The Biggest Security Threats Coming in 2017. Wired. 2017. Web.

Bell, Steve. Which Is the Worst Computer Virus in History? Heres Out Top 10. Bullguard. 2014. Web.

Komando, Kim. The 3 Biggest Security Threats of 2016. USA Today. 2016. Web.

Korolov, Maria. DDoS Attack on BBC May Have Been Biggest in History, CSO Online. 2016. Web.

Llic, Danny. 3 Biggest Cyber Security Threats of 2017. ITProPortal. 2017. Web.

The 8 Most Famous Computer Viruses of All Time. Norton. 2016. Web.

Nguyen, Peter. The 6 Biggest Online Privacy Threats You Should Be Considered with. HotSpot Shield. 2013. Web.

Olavsrud, Thor. 4 Information Security Threats That Will Dominate 2017. CIO. 2016. Web.

Pauli, Darren. Slammer Worm Slithers Back Online to Attack Ancient SQL Servers. The Register. 2017. Web.