Tuesday, January 28, 2020
Review of a qualitative research article
Review of a qualitative research article This essay is a review of a research article of how Local Authority Social workers make decisions when they are considering referrals of children. The title of the study is Threshold Decisions: How Social Workers Prioritize Referrals of Child Concern by Dendy Platt (2008). I would attempt to critically appraise this Qualitative journal article based on essential elements of the research which include the Title, Abstract, Introduction, Method, Findings and Conclusion. The study examined how social workers make choices on individual cases of children concern referrals, if to carry out a an initial Assessment i.e. Sect 17 of the Children Act 1989 or if to undertake the Child Protection Procedure under the Sect. 47 of the Children Act 1989. The major finding suggests that Social workers prioritize their referrals based on five key areas, Specificity, Severity, risk, parental responsibility and corroboration. It was refreshing to know that data were collected from Social workers and that Parents were also involved. Title It is worth noting that the title adequately prepares the reader as it gives good insight into what the study is about. The title of an article is very important as it exposes the reader to an article. The key words were appropriate and sufficient as they did retrieve the article upon typing the key words in the search engine. (According to Descombe 2008 p.88), a topic needs to be a very much more narrowly defined area of its study. Abstract The major finding in this article suggests that social workers evaluate referrals based on five key factors, specificity, severity, risk, parental responsibility and corroboration. It is worth noting the abstract did prepare a reader for this study. The abstract clearly highlights that the aim of the study is to find out how social workers reach decision when to carry out an initial assessment (Sect 17 of children act 1989) or a core assessment, (Sect 47 of children Act 1989) when considering referrals about child concerns. The abstract clearly stated that the study chose a qualitative approach. According to (Punch 2000 p. 243), qualitative approach is often sensitive to context and process to lived experience and local groundedness, where the researcher tries to get closer to what is being studied. Using qualitative method allows the researcher to find out a lot about the study. He went further to explain thatqualitative research methods are the best way we have of getting the insiders perspective (Ibid) Qualitative method allows the researcher to generate new theoretical ideas. This happens because they are able to observe and speak to the people (person) being studied and allows them to come up with new ideas through out the study. Being bias is one of the limitations of qualitative research method because researchers can write their own view or even opinion on the matter. But as we can see that reaching difficult area is a great advantage to qualitative research method.) Introduction Looking at the introduction, it seems clear that the problem that led to the research was that the interpretation of the developments of the refocusing initiative has contributed to a climate where social workers work often feel pulled and pushed in different directions by political and popular opinion. The introduction touched on relevant government policies and initiatives such as refocusing initiative which was initiated by the government in 1990 and the framework for Assessment of children in need. In my view, the author attempted to appraise the refocusing initiative policy which attempts to refocus social work practice and to initiate any necessary changes. I partly agree with this notion as the study may bring about positive changes in the child protection climate. But also the author needs to acknowledge where he points on that the climate of child protection is one of uncertainty, that social work itself is a profession full of uncertainty. The researcher explained that the implication of the refocusing initiative is the rise in the threshold for acceptance of a child protection referral as it was thought that the cost to family of child protection procedures were not acceptable in the cases where allegations are minor. In my view, the identification of gap of knowledge shows that the problem has significance for social work practice and the research may positively inform practice. Interestingly, the researcher acknowledges and analyses previous work on the child protection field ( what is known) but also points out the knowledge gap as it demonstrates how application of these factors differs between cases of child concern and cases of child protection (What is desired to be known). I would argue that these reasons amount to sufficiently justification of this study. Literature Review Knowledge gap was identified but author did not explain how his work would attempt to close the gap. Author made an effort to critically review the work of others and points out inconsistencies. The purpose of the research is to examine ways social workers in England made decisions at the initial referral stage. It is my believe that since the author decided to collect information form social workers and families suggest that research is from a grounded theory approach. According to Punch (2000 p.163) Grounded theory is best defined as a research strategy whose purpose is to generate theory from data, To be grounded means basically the theory is generated from data. (ibid) My rational for asserting that a grounded theory approach was implemented is that the author made sense of the data through concepts primarily informed by social workers and the discovery of these concepts begins from the interviews with the social workers. (Somekh and Lewin 2006p.49) point out that grounded theory is best described as an integrated theoretical formulation that gives understanding about how organization experience and respond to events that occur. From this definition, it could be argued that grounded theory was the most effective way to approach this study. Researchers do bring perspective to the research, although these perspectives tend to guide the question and influence interpretation, but they dont drive the research. (ibid p.51). However one of the drawbacks from this approach is that research may be influenced by the researchers personal experiences and previous studies which thus disable the research in approaching the study with an open mind. Finding In my view, the researcher study has a strong internal validity, the researcher made a good effort to eliminate the alternative explanations in his findings. The result however cannot be applied beyond the sample. It would be clearly naà ¯ve to believe that the findings reflect how social workers in the UK decision making. Method The Researcher implemented ethical principles. The social workers involved have to be made aware of what they were getting into before deciding to collaborate. I would argue that appropriate procedures were implemented; also the participant understood what the purpose of the research. The researcher effectively anonymised participants identities, which protected participants privacy. The likely outcome the research aim to achieve include possible changes in policy, examine practice issues for social workers carrying out initial assessment, where in the past, it would have been a child abuse investigation ( Sect 47 of the children Act 1989) One of the strengths of case study is that multiple methods and data sources can be used to explore and interrogate case study thereby leading to a good description of a research from the perspective of the participant (Someth and Lewin 2006 p.33). I do admire the fact that the research implemented the case study approach as this gives the reader a very rich description of the study and also gives a reader a good understanding on the issue. Reliability of the finding was promoted by the data collection from two local authorities who have a very different procedures and practice, also All interviews were tape- recorded. According to (Silverman 2006p. 285), working with the audio and video recordings eliminates at one stroke many of the problems that researchers have with the unspecified accuracy of field notes and limited public access to them However the generalization of the research may not be possible. The weakness of case study is that it is not possible to generalize statistically from a small number of cases to a population as a whole (Someth and Lewin 2006 p.34) References Punch, K.F. (2000) Introduction to Social Research Quantitative and Qualitative Approaches. London: Sage Publication. Somekh, B. and Lewin, C. (2006) Research Methods in the Social Sciences. Sage Publication: London. Silverman, D. (2006) 2nd Edition. Qualitative Research. Theory, Method and Practice. Sage Publication: London. Denscombe, M. (2008) Ground Rules for Good Research, a 10 guide for social researchers. Open University: Buckingham.
Sunday, January 19, 2020
Matsushita Electronic Industrial Essay -- essays research papers
Matsushita Electronic Industrial Pham Thach Executive summary: Matsushita Electronic Industrial (MEI) is a very successful company in both Japan and the global in the 1970s and 1980s. MEIââ¬â¢s success in this period came from its diversification of productions, dominance domestic market, unique corporate culture, and divisional structure in both domestic and international market. However, in 1987, under new circumstances, such as the change Yen prices, and the pressure of integration of information technologies that need international transfers, sharing, and synergies, MEIââ¬â¢s faced declines in sales and profits because its structure was exposed some weakness. To overcome these problems, MEI should choose Worldwide Product Division Structure. Matsushita Electronic Industrial (MEI) was established in 1918 by Konosuke Matsushita to produce a double-end socket in Japan. This company grew rapidly, in 1977 MEI was praised by Fortune as ââ¬Å"the most dazzling corporate success in Japanâ⬠, and then ranked 20 on Fortune list of the worldââ¬â¢s largest by 1985. In the 1980s, MEI became the worldââ¬â¢s largest producer of customer electronics product, and the forth largest electrical and electronics firm in the world with the compounded annual sales growth and annual growth in net profits was 11.6 percent and 14.6 percent, correspondingly. The success of MEI in the 1970s and 1980s is contributed by its global strategy in which, its diversification of productions, dominance domestic market, unique corporate culture, and divisional structure in both domestic and international market. Contributing to MEIââ¬â¢s rapid growth and consistent profitability in the highly competitive world consumer electronics industry in the 1970s and 1980s was its diversification of productions. Originally, MEI only produced double-end sockets, then its list of products was unceasingly expanded. MEI introduced various of products to markets: battery-powered bicycle lamp and an electronic iron (1923), radio (1931), Domestic fans and light bulbs, small motors for domestic appliances, then appliances (1935), black and white TV sets (1952), transistor radios (1957), stereos, tape recorders, air conditioners (1958), driers, and disposal unit (1959), color TVs, dishwashers, electric oven (1960). In term of the numbers of its products, MEI outdistanced its competitors. MEI grew rapidly and gained consistent profitabil... ...mashita initiated Operation Location and Action 86 programs to shift more activities to its vast oversea operation, and shift its business emphasis. However, some subsidiary managers worried that this program could weaken their relationship with headquarters managers and reduce their access to central resources and expertise. Some managers were afraid that by deemphasizing traditional products, the company might lose its competitiveness in its existing market, and its capabilities in responding quickly and flexibly to market changes, change Matsushitaââ¬â¢s culture and philosophy, undermined its source of strength. However, under new circumstance, the traditional structure were exposed these flaws mentioned above, and its impact was the decline of MEI sales and profits. To be a firm that was reasonably diversified and, accordingly, originally had domestic structures based on product divisions, MEI could apply Worldwide Product Division Structure. By that, MEI could easier to p ursue the consolidation of value creation activities at key locations necessary for realizing location and experience curve economies, and to transfer of core competencies within a divisionââ¬â¢s worldwide operation.
Saturday, January 11, 2020
Mcdonaldââ¬â¢s Practices/Operations in Turbulent Environment
McDonaldââ¬â¢s strategic plan is called ââ¬Ëplan to winââ¬â¢ which helps McDonaldââ¬â¢s to be the best fast food restaurant chain rather than the biggest fast food restaurant chain. (kspain, 2008) In turbulent environment, McDonaldââ¬â¢s tries to achieve high performance by applying the 5 Pââ¬â¢s: people, product, price, promotion, and place or distribution. Product involves both intangible and tangible offerings of the business which customer can see, feel, taste or smell. (Kukreja, 2011) Next, price consists of all the costs of production and delivery of the product or service. Then, promotion comprises all the types and manner of communication that companies use to make products or services known to the customer. Finally, place or distribution is the channel that connects the products or services to the consumers. McDonaldââ¬â¢s focuses primarily on its people or focusing on maintaining and improving employee satisfaction in order to maintain good relationship between the employees and the customers. In order to improve employee satisfaction, McDonaldââ¬â¢s uses flexible schedules for the employees to fit their working schedule into the way they live their life. McDonaldââ¬â¢s also uses celebrating diversity in their hiring way to combining their ideal work force with different people from different backgrounds with different interests. (Mcdonalds, 2011) Besides that, McDonaldââ¬â¢s also simplifies the restaurant environment for their staff and customers in a faster speed. To enhance the relationship between employees and the customers, McDonaldââ¬â¢s ensures their staffs are friendly and as well as fast with hospitality training. Finally, McDonaldââ¬â¢s also provides cost-efficient, relevant training for their world-wide workforce and provide career opportunities for people to achieve their potential. In the product strategy, McDonaldââ¬â¢s offered a wider variety of food. McDonaldââ¬â¢s strategic planning focuses on breakfasts, chicken, beverages and convenience. The Southern Style Chicken Biscuits are launched for breakfast in McDonaldââ¬â¢s. However, the Southern Style Chicken Sandwiches are launched for lunch and dinner. McDonaldââ¬â¢s introduced new hot specialty coffee offerings on a market-by-market basis in their beverages business. Besides that, McDonaldââ¬â¢s also offered burgers-and-fries instead of just offering snack foods and desserts. Despite of negative image of McDonaldââ¬â¢s for the unhealthy food, McDonaldââ¬â¢s offers oatmeal and salads to replace high calorie breakfast sandwiches for somewhat healthier options. Lastly, the Happy Meal is one of the good product strategies which aim kids providing kidââ¬â¢s favorites such as small French fries and chicken nuggets along with a small toy. ECUATORIALL, 2012)These planning enables McDonaldââ¬â¢s to satisfy customersââ¬â¢ desire for food that fit into todayââ¬â¢s lifestyle. For the price strategy, McDonaldââ¬â¢s had introduced value meal for their customers. The value meal allows customers to buy a sandwich, French fries, and beverages at a discount price when purchased together. McDonaldââ¬â¢s restaurant offer seven to twelve value meals for the lunch and breakfast menu. McDonaldââ¬â¢s also offers a dollar menu which consisting many individual items costing only $1. 00 each. investopedia, 2009) Other than that, some of the individual franchise owners offer daily specials of special menu items with lower price such as Big Mac Mondays. These helps McDonaldââ¬â¢s to offer affordable prices to customers and also to be profitable for the company. McDonald's spent huge amount of money on promotion which is presented in marketing, leadership and trust. McDonaldââ¬â¢s focuses primarily on targeting the children. With this, McDonaldââ¬â¢s offers happy meals which targeted children by giving along the small toys with the meals. ECUATORIALL, 2012) McDonaldââ¬â¢s also offers various schemes for winning prices by giving lucky draws and also scratch cards when an order is placed on various mean combos. On the other hand, McDonaldââ¬â¢s also does its promotion by advertising to make people aware of an item, feel positive about it and remember it. They do their promotion through television, hoardings and bus shelters. Some of the most famous marketing campaigns of McDonaldââ¬â¢s are ââ¬Å"You Deserve a break today, so get up and get away- To McDonaldââ¬â¢sâ⬠, ââ¬Å"Aap ke zamane mein ,baap ke zamane ke daamâ⬠, ââ¬Å"Food, Folks, and Funâ⬠and ââ¬Å"Iââ¬â¢m loving itâ⬠. (scribd)
Friday, January 3, 2020
Data Leakage Detection System For Cloud Based Storage Systems
Data Leakage Detection System for Cloud-based Storage Systems K.Haritha+ M.HariPrasad+ D.LakshmiTeja + CH.ManiTeja+ *G. Rajesh Chandra *Assistant professor, Department of Electronics and Computer Engineering, K L University, India. B Tech, Department of Electronics and Computer Engineering, K L University, India Abstract: In this age of cloud computing the incidences of theft/leakage of valuable, sensitive data is on the rise. Data security has gained greater significance than ever before. This paper attempts to deal with the problem of data leakage and its detection, a rising phenomenon especially in big organizations. We are all too familiar with stories of data loss from laptop theft, hacker break-ins, and backup tapes being lost or stolen, and so on. It is possible only by Data Leakers, who usually are authorized persons. The identification of the Data Leaker is very big task. In the past methods such as Watermarking and fake data addition were used to identify leakers. But in such methods reliability, consistency is very low and largely incompetent in the present age. Thus a sophisticated system to confront such activities with reasonable competence is highly essential. This paper proposes a highly effective system employing various techniques to cleverly detect data leakage and the le akers. Keywords: Watermarking, Guilty party, Forged Data. 1.Show MoreRelatedCloud Computing Is Becoming The Most Popular Topic1693 Words à |à 7 Pages Cloud computing is becoming the most popular topic in the realm of Information technology. Its popularity stems from the ability to allow with limited knowledge, to be able to access their information anytime and anywhere while reducing overhead and costs. Additionally, reduces the need for backups; this is because backups are done automatically, between different servers in the ââ¬Å"cloudâ⬠. Even with the obscurity, cloud computing is really just a way to outsource computing resources, and have a thirdRead MoreThe Reliability Of Cloud Computing Essay1660 Words à |à 7 PagesReliability Studies have been done in assessing the reliability of cloud computing. However, the number of studies on fog computing and its reliability are relatively lower in number. Researchers have also identified problems in terms of the methods and approaches used for assessing reliability. Research has shown that reliability can be improved through checking and rechecking the failure of networks, rescheduling the launching of failed tasks and through integrating advanced technologies and measuresRead MoreSecurity Issues Of Cloud Computing Essay1512 Words à |à 7 PagesStatement: The problem statement of report denotes the security issues in Cloud infrastructure accentuating as major constraints in the adoption of the technology. With the sophistication of the cyber attacks, the security infrastructure of cloud does not promise the expected robustness and efficiency in order to prevent the different kinds of threats and attacks. Hence the report shall deal with the security issues of Cloud and how must it be addressed in order to ensure the technologyââ¬â¢s adoptionRead MoreAdvantage And Challenges Of Cloud Computing1010 Words à |à 5 PagesAdvantage and Challenges of Cloud Computing Background The evolution of Information Technology is inevitable, not only on the telecommunication and networking industry, but, it is also gaining more popularity in the business industry by way of Enterprise Resource Planning (ERP) system and rapidly making its move towards the accounting and auditing industry through Data Analytics Software, however, as the IT innovation continues and the concern of capacity and storage progress, and the demand forRead MoreAnalysis Of Cloud Computing And Cyber Security1695 Words à |à 7 Pages CLOUD COMPUTING AND NETWORK SECURITY ISSUES(Z5140305) Executive Summary In this fast-paced technology era, organizations are always looking for new innovative ways to increase productivity and efficiency. One emerging technology adopted by many organisations is cloud computing. Cloud computing is a model that uses internet and remote servers for maintaining data and applications (Association of Modern Technologies Professionals 2017). It replaces expensive infrastructure and need of maintenanceRead MoreCloud Computing Case Study1078 Words à |à 5 PagesCloud computing is the collective use of remote servers to handle data, rather than having a local server/computer handling the data. Cloud services provide a lot of convenience to businesses and personal use, because it alleviates the need for costly personal servers/ server maintenance. The issue with implementing this into a business, however, is the dependence on another companyââ¬â¢s servers. It also faces security issues such as: lack of direct, physical control over the servers the company uses Read MoreThe Data Loss Prevention Approach2136 Words à |à 9 PagesData Loss Prevention Approach A success of DLP strategies can be achieved by not just mitigating data loss risk or Data breaches incidence, but actually involving people, process and technology in it by educating and managing employeeââ¬â¢s behavior, planning policies and enforcing it via appropriate technology [4]. Strategies/approaches for DLP implementation is broadly classified in three categories according to the place where it is implemented. Figure 1 DLP approaches [6] 1. Network focused (aRead MoreRun Public Auditing Of Cloud Computing Using Protocol Blocker For Privacy Essay1775 Words à |à 8 Pagesin Cloud Computing Using Protocol Blocker for Privacy Babita Baghat (Computer Engineering) Dhanashri Patil (Computer Engineering) Abstract - Cloud Computing is huge computing, it is the internet based computing, where all users can remotely store their data into the cloud so as to enjoy the latest and high quality applications and services. In outsourcing data , users can be relieved from the burden of local maintenance and data storage .Thus, enabling public auditability for cloud data storageRead MoreDetermining The Cloud Computing And Compliance Issues1758 Words à |à 8 PagesDetermining the cloud computing and compliance issues Organizations and Infrastructures are moving towards cloud computing technologies because of what it has to offer, i.e scalability, cost reduction and new service offerings. Though Cloud computing seems to be like a shiny objects that attract business organizations; the issues that needs to be addressed are compliance issues. Tackling all security and compliance issues that come up in this dynamic environment seems daunting unless you boil theRead MoreCloud Computing3770 Words à |à 16 PagesTop Threats to Cloud Computing V1.0 Prepared by the Cloud Security Alliance March 2010 Top Threats to Cloud Computing V1.0 Introduction The permanent and official location for the Cloud Security Alliance Top Threats research is: http://www.cloudsecurityalliance.org/topthreats à © 2010 Cloud Security Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance ââ¬Å"Top Threats to Cloud Computingâ⬠at http://www
Subscribe to:
Posts (Atom)