Thursday, October 31, 2019

Information Systems Use Security Policy Assignment

Information Systems Use Security Policy - Assignment Example When a company begins to address the proper use of its information systems, the challenges that emerge also expose the firm’s administrators to problems ranging from time delays, poor product performance and overruns in costs which come as a surprise. For a growing company, the many problems and opportunities that arise may demand different ways of approaching them. A solution that worked one year ago may no longer work in future. In a growing business, the source of information that a company uses when conducting its research needs to come from the right source. Using ineffective information systems makes it extremely difficult to get information and the purchasing behavior of customers analyzed. Even when the company begins to use and implement its information systems successfully, the systems may not present the proper view of the firm’s increased efficiency (Sousa & Effey, 2014). An excellent example in an organization is the use of emails. The use of emails is a trend in most firms, but their increases in volumes are no doubt a source of time drain for the individual and the organization. As the IT services manager for Sunshine Machine Works, I propose the use of the following guidelines. An increase of employees to more than 100 staff members and computers shows that the company is growing at a successful rate. A written policy on use of computers by all staff members in the organization is one of the best ways of preventing breach of sensitive information such as financial data, personal employee data. A guideline will also ensure that there is a centralized file storage system in the firm. Time limits: The first guideline to consider when creating this policy would be the time limits. As the administration panel in the organization, the Chief Executive officer, Chief Financial officer and general manager would be required to lead by example. Computer time should be strictly reserved for certain period, such as when files

Tuesday, October 29, 2019

Litigation involving Microsoft Corporation Essay

Litigation involving Microsoft Corporation - Essay Example Microsoft is the biggest provider of computer operating systems that facilitate communication and control of an individual’s personal computer. Microsoft also supplies other famous computer programs. Sales that come from the Microsoft software are huge and it is evident that the company is an energetic and a tough competitor. The complexity of determining competitive behavior from the anticompetitive acts is demonstrated by the Microsoft antitrust case. U.S. Department of Justice filed the case and it accused Microsoft Corporation of a variety of anticompetitive practices (Baumol and Blinder 268). The Microsoft antitrust case brings out many issues such as abuse via bottlenecks and bundling. Abuse via bottlenecks can be illustrated by the dominance of the Microsoft Windows. Microsoft Windows is an operating system that is used in almost all the personal computers. Microsoft Windows is a good example of a problem or an issue that is referred to as bottleneck; bottleneck is a pr oduct or a facility that is in the possession of a single company without which the competitor find impossible or difficult to operate. In order to reach majority of the personal computer users, the producer or manufacturer of any spreadsheet, graphics program or a word processor must make use of Windows. It is important to note that there is less likelihood that the competitors or alternative to Windows might capture a large share of consumers. (Baumol and Blinder 280). The existence of the bottleneck is in part due to the fact that Microsoft is largely considered as a good program and its user compatibility is considered desirable. There is need for communication between computer users and this can only be facilitated when they use the same or similar operating systems. In other words, there must be an existence of a network between the users of the computer products for them to be able to communicate effectively with one another and thus, the necessity for compatible software. Su ch a preference offers Microsoft a huge advantage, â€Å"because it already has so many users that a new purchaser who values such compatibility will be reluctant to buy a competing product that will make it more difficult to communicate with those many users of the Microsoft products† (Baumol and Blinder 280). The bottleneck problem or issues arises because Microsoft supplies both the Windows and most of the applications such as Internet Explorer (an internet browser), Excel (this is a spreadsheet program), and Word (this is a word processing program). However, it is worth noting that it is not illegal to become the owner of a bottleneck (Baumol and Blinder 280). The worry about the bottleneck owner (such as Microsoft) is that it uses its bottleneck product (that is, Windows for Microsoft) in a manner that it favors its programs and impairs programs supplied by the competitors (Baumol and Blinder 281). Bundling is described as the pricing agreement under which a substantial discount is offered by the supplier to the consumers if they purchase various products from the firm, â€Å"so that the price of the bundle of products is less than the sum of the prices of the products if they were bought separately† (Baumol and Blinder 281). Bundling can be either legitimate or illegitimate. Microsoft has sponsored its products through the provision of cheap products to computer manufacturers if they purchase Microsoft programs bundles rather than purchasing Windows alone. This form of practice indicates that the rival manufacturers of Internet browsers, spreadsheets, and word processors are disabled in promoting their products to personal computer owners (Baumol and Blinder 281). There are questions regarding the legitimacy and illegitimacy (for

Sunday, October 27, 2019

Aleatoric Music Of The 20th Century Music Essay

Aleatoric Music Of The 20th Century Music Essay compositional and instrumental methods utilized by John Cage. The biographical background, educational influences and examples of the musical compositions of Cage will also be illustrated. This paper continues by describing the various methods and processes employed by John Cage in the formation of music written during the minimalist movement. Contrived instruments, ambient audience noise, non-traditional tone structures and electronic music will be identified and defined. Furthermore, this paper will explore the debate over aleatoric music as art form versus noise. Traditionally, Western music is highly structured and organized- however, music written in aleatory form generally lacks traditional instrumentation, time, and other methods present in Western forms. According to whom one would ask, aleatoric music can be extremely complex, emotional and intellectual. On the other hand, there are those who believe aleatoric music is nothing more than random noise with no structure, rhyme or reason. Over the course of this paper, the reader will be able to discern that aleatoric music is a definitive musical genre. ii Aleatoric Music of the 20th Century: Compositions of John Cage An Art Form, Not Noise Introduction Aleatoric music refers to musical compositions where some aspect of the music is left to chance. The tempo, instrumentation, dynamics, order of the written music, or various other devices can be manipulated. Simply put, aleatoric music is left up to some amount of chance. However, the amount of chance is not immeasurable. In many cases, the composer only allows a portion of the entire composition to chance while the rest conforms to standard Western-influenced counterpoint. The American composer John Cage was one of the foremost composers who utilized aleatory in musical works. He was also the father of the avant-garde in music during the minimalist movement. THESIS: By studying the devices used in Cages compositions, the argument will be clearly made that aleatoric music, while sometimes free in form and function, is clearly a structured art form and not random noise. ii Aleatoric Music of the 20th Century: Compositions of John Cage An Art Form, Not Noise Outline: Aleatoric Music Explicative definition of aleatoric music Overview of aleatoric devices John Cage Early life and education B. Utilization of aleatoric devices in compositions Thesis support Compare and contrast with opposing viewpoint Acknowledge and dismiss opposing view utilizing evidenciary support Conclusion Summarize main points Reinforce the argument that aleatoric music is not random Markham 1 Selena Markham MUS 2930 Dr. Valerie Austin November 22, 2010 Aleatoric Music of the 20th Century: Compositions of John Cage An Art Form, Not Noise Aleatoric music refers to musical compositions where some aspect of the music is left to chance. The tempo, instrumentation, dynamics, order of the written music, or various other devices can be manipulated. Simply put, aleatoric music is left up to some amount of chance. However, the amount of chance is not immeasurable. In many cases, the composer only allows a portion of the entire composition to chance while the rest conforms to standard Western-influenced counterpoint. The American composer John Cage was one of the foremost composers who utilized aleatory in musical works. He was also the father of the avant-garde in music during the minimalist movement. By studying the devices used in Cages compositions, the argument will be clearly made that aleatoric music, while sometimes free in form and function, is clearly a structured art form and not random noise. One of the most prolific composers of music in aleatory, John Cage, was born September 5, 1912 in Los Angeles, California. He was the only child of Markham 2 parents Lucretia and John Cage, Sr. (two other sons passed away as infants). His father was an inventor and his mother worked on and off as a writer for the Los Angeles Times. The couple met in Greeley, Colorado. John Cage, Sr.s father was a Baptist minister who felt music was of the Devil. His mother, Lucretia (her maiden name was Harvey) was considered rebellious because she read books (a practice her family forbade). The young couple fled the restrictive atmosphere of Colorado for the more welcoming state of California. John Cage, Sr. had an avid interest in undersea vessels and, in fact, invented a device that was used in the English Channel to successfully detect German submarines during World War I. The intellect and innovative spirit of his mother and father would serve young Cage well throughout his lifetime. (Rich 142). As early as age eight, the young Cage began to express an interest for music that was slightly outside of the norm. While taking piano lessons with his aunt, the young boy confessed he enjoyed the music of Norwegian composer Edvard Grieg (Rich 145). When Cage graduated in 1928, his grades earned him the record of having the best academics in Los Angeles High Schools history. From high school, Cage spent two years at Pomona College (Struble 287). While at Pomona College, he studied ministry and writing. (Rich 145). Cage then went on hiatus to Europe for two years. While there, he composed many short works, some using mathematical formulas. Unfortunately, Cage did Markham 3 not save these early works- as he traveled, he would go through his belongings and discard any non-essential items in order to lighten his load (Nicholls 175). He returned to the United States in 1931 and in 1933, John Cage began to study piano under Richard Buhlig, who introduced the composer to serialism, an aleatoric musical device. Serialism is music which has been written with a high degree of organization (Brindle 17). Since Buhlig had premiered serialist composer Arnold Schoenbergs composition Three Piano Pieces, Cage hoped Buhlig would introduce him to Schoenberg. Instead, Cages first published piece, Sonata for Clarinet (1933), brought him to the attention of Henry Cowell, a professor teaching the new music at the New Music Society of California in San Francisco. Though Cage was able to informally study with Schoenberg, Cowell was his primary influence (Lipman 22). The Sonata for Clarinet also shows how Cage used serialism to reproduce the same pitches in retrograde in the last movement from the first movement of the same composition in a highly organized fashion. Ironically, when the Sonata for Clarinet premiered, Cage found himself performing it on piano because the clarinetist was unable to do so (Nicholls 176). Over the course of the next two years (1933-34), John Cage invented a new technique called 25-pitch non-repetitive serialism. In this technique, each voice is limited to a twenty-five note pitch area and no pitch can be repeated Markham 4 until all twenty-five have been played. He also used this technique in three additional pieces he wrote during this period: the Sonata for Two Voices (Nov. 1933), Composition for Three Voices (1934) and Soloà ¢Ã¢â€š ¬Ã‚ ¦ and Six Short Inventions (1933-34). The use of this technique was generally not harmonically sound with the exception of a few phrases (Nicholls 177). John Cage composed two pieces in 1935 (Three Pieces for Flute Duet and Two Pieces for Piano) that also used the serialism technique. The harmony was paired with a highly chromatic melodic line that made the pieces overwhelmingly contrapuntal. However, these pieces tended to possess a higher percentage of harmonically pleasing subject matter (Nicholls 184). These works also coincided with his introduction to Merce Cunningham, an author, choreographer and Cages lifelong love interest. As a result, Cage began to be interested in how music correlated with dance. John Cage and Merce Cunningham collaborated to organize performances using Cages music and Cunninghams choreography over the course of their lifetimes (Thomson 77). Another interesting device John Cage used in his composition was ambient noise. In his piece 4 33 (1952), a piano or any ensemble is to conduct themselves as if they were preparing to play. However, the instrument(s) or performer(s) never utter a singular sound- for the entire four minutes and Markham 5 thirty-three seconds. The idea is to attune ones self with the ambient noise of the room, the noise entering the room from outside and the natural noises of the people within (Lipman 30). The piece has also been said to be an example of freedom in general (Brindle 122). This work had its premiere by pianist David Tudor in Woodstock, New York, on August 29, 1952, in the Maverick Concert Hall (located near where the 1969 Woodstock Festival was held). Cage (interviewed in the late 1980s by William Duckworth) stated that he listened to the piece every day and that in Indian culture, it is we that turn away from the music. However, the music is always there (Bonds 588-589). An original device employed by John Cage was an invention all his own- the prepared piano. A prepared piano is a grand piano where the inside strings are manipulated by foreign objects to produce a twelve-tone scale. Such was the case with Cages composition Bacchanale (1940)- a percussive piece he was commissioned to write to be performed with a dance group. The work was originally intended for percussion instruments, but was relegated to the prepared piano when it was deemed the concert hall was too small for all of the required instrumentation. Cage required that bolts and weatherstripping be attached to the strings connected to the 12 different notes (Bonds 590). John Cages influence in the realm of electronic music began as early as 1937. His composition Imaginary Landscape No. 1 (1939) was one of the first Markham 6 written in the electronic genre. It consisted of recording oscillatory frequencies on two 78rpm gramophone records (Brindle 99). He also wrote a piece comprised of fifty-one tapes (each twenty minutes long) produced on the computer system of Illinois University (Illiac) that could be played in any order along with seven live harpsichords and a light show of sorts. This piece was written in 1967 and titled HPSCHD (Brindle 125). John Cage began to write pieces titled by the number of performers later in his life. For example, the work titled One (1987) was for one pianist. Another work, titled Five (1988) was for string quintet. These pieces are dubbed number pieces (Moser 31). Even these odd little pieces have a structure- the structure being the amount of time the performer has to perform each measure and the number of musicians required for performance. As illustrated with the devices John Cage used in his compositions, his works are very structured and organized. Cage was one of the total serialists, who felt that music composition could be planned and analyzed with the precision of scientific experiments (Lipman 56). In his own words during a lecture in Darmstadt in 1958: The function of the performerà ¢Ã¢â€š ¬Ã‚ ¦ is comparable to that of someone filling in color where outlines are given; à ¢Ã¢â€š ¬Ã‚ ¦ is that of giving form, providing, that is to say, the morphology of the continuity, the Markham 7 expressive content; à ¢Ã¢â€š ¬Ã‚ ¦ is that of a photographer who on obtaining a camera uses it to take a picture; à ¢Ã¢â€š ¬Ã‚ ¦ is comparable to that of a traveler who must constantly be catching trains the departures of which have not been announced but which are in the process of being announced (Moser 8). It is clear by reading these words that Cage finds his music to have form, which is a staple of Western music. In addition, his music is generally left up to the interpretation of the performer- definitively not an aspect of Western music. Even still, form is readily detectable within his works regardless of how the stated form is interpreted by the performers. Another argument concerning music in aleatory is that there are no determinate ways to discern the number of possible arrangements. This simply is not true: à ¢Ã¢â€š ¬Ã‚ ¦ the exact number of realizations of an indeterminate score can often be determinedà ¢Ã¢â€š ¬Ã‚ ¦ (Moser 11). In conclusion, John Cage lived during an exciting time in American history. Just after his birth in 1912, the United States found itself fully engaged in World War I. The United States truly became a world power during this time. The enlightenment through his well-rounded and educated parents as well as the Markham 8 excitement and innovations of the new century served John Cage well, as he was able to thrive and grow as an intellectual and musician in this environment. Although his music is sounds extremely dissonant and non-harmonic, it exhibits a high amount of structure. Cages earlier works illustrate a mathematical approach to the music- meaning that the music makes sense based on mathematical principles, but not necessarily traditional ideals surrounding musical composition. The influence of John Cages music can certainly be felt today in late 20th century jazz and numerous other works that allow the performers greater freedoms. Take, for instance, the piece recently performed on the campus of the University of North Carolina at Pembroke. Dr. Joanna Hersey premiered a work for her Low Brass Ensemble at the University of North Carolina at Pembroke titled Sails, Whales and Whalers (2008) by Gary Buttery. This work included recorded whale song interspersed with the live music produced by the L ow Brass Ensemble (Hersey Krosschell). Perhaps Gary Butterys composition was influenced in some way by the works of John Cage. There is no doubt that many musicians past, present, and future have been and will continue to be influenced by Cages maverick attitude toward music. Markham 9

Friday, October 25, 2019

Panoptical Power in China Essay examples -- Prison Jail Imprisonment E

Panoptical Power in China Jeremy Bentham, a leading English prison reformer of the late 18th and early 19th centuries, developed an architectural plan for an ideal prison that he called the Panopticon. Such a prison would consist of a ring of individual cells encircling an observation tower. Each of the cells would open toward the tower and be illuminated by its own outside window. So, by the effect of backlighting, a single guard in the observation tower could keep watch on many prisoners--each of whom would be individually confined--without himself being seen. And because the prisoners could not see their supervisors, they would have to assume that they were being watched at all times--even if they were not. The Panopticon was designed to maximize the power of a dominating, overseeing gaze upon a transparent society of inmates. The purpose of the Panopticon was not so much to punish wrongdoers as to prevent wrongdoing by immersing prisoners in a field of total visibility in the expectation that the possibil ity of constant surveillance would serve to restrain the inmates (Foucault, 1980). Such surveillance would be aimed toward the interiorization of the supervisor's gaze so that each prisoner would, in effect, become his/her own overseer. Thus, through self-policing, surveillance would become permanent and pervasive in its effects--even if it was not continuously exercised. Although relatively few prisons have been constructed according to the plan of the Panopticon given Bentham's optimism about its practical utility, Foucault (1975/1977; 1980) has articulated the Panopticon as a generalizable model of the functioning of power in modern disciplinary societies with applications beyond the prison including hospitals, the... ..., J., Dubois, A.-M., Le Barbier, F., Olivier, J.-F., Peemans, J.-P., & Wang, N. (1979). China: The people's republic, 1949-1976. New York: Pantheon. Cheshire, G. (1992). The long way home. Film Comment, 28, 36-39. Foucault, M. (1977). Discipline and punish: The birth of the prison (A. Sheridan, Trans.). New York: Vintage. (Original work published 1975) Foucault, M. (1978). The history of sexuality, Volume I: An introduction (R. Hurley, Trans.). New York: Vintage. (Original work published 1976) Foucault, M. (1980). Power/knowledge: Selected interviews and other writings, 1972-1977 (C. Gordon, Ed.). New York: Pantheon. Link, P. (1992). Evening chats in Beijing: Probing China's predicament. New York: Norton. Min, A. (1993). Red azalea: Life and love in China. London: Victor Gollancz. Rayns, T. (1992). Nights at the opera. Sight and Sound, 2, 10-13.

Thursday, October 24, 2019

Make and Recieve Telephone Calls

The telephone that I use for work is a complicated phone and I don’t use all of its features, the basic features it has are the function to answer the phone and transfer calls to another person, it also allows me to answer a call from some else’s phone that is in my group. To transfer calls to another colleague I have to press R on the phone and then enter my colleague extension number for the call to be transferred. If I wanted to answer another colleagues phone I simple have to press *84 on the keypad and pick up the phone to receive their call.I am able to adjust the volume of the ring and I am able to place the call on loud speaker. I am also able to turn on or off the microphone in the handset as well as view the list of the numbers that I called last. I am also able to create a directory of number on the phone to be able to make calls quickly, on top of this there are 12 preset phone numbers with quick dial buttons on the phone however the previous owner had set t hese up and I am unable to change them.The phone is also capable of diverting the call to another phone and send messages between phones although I haven’t used this yet. Before making a phone call it’s a good idea to identify the purpose of the call as it would make me the caller sound more professional as I know exactly what I want and would waste no time with anything else, it would also allow me to have information that I can then use to prepare questions to ask and get the necessary details which I may require.An example of this is when a colleague requested that I acquire some information regarding the prospectus of the local colleges I had to identify whom I was going to make the call to and what the call would be regarding, after speaking to my colleague more and gaining the knowledge of exactly what they wanted me to get I was able to identify that the purpose of this call was to contact the college and ask what lessons they would be providing that relate to t he request made by my colleague.There are multiple ways to acquire the telephone number of people in my organisation as I can use the local address book to get there details, for example if I only knew there phone number which within the organisation would only be their extension number, I could use that to acquire their name and location as well as the department they work in, and I could do the same with only their name. Another method of gathering the contact details of someone is either using the internet to look up their business and get the information from their or ask a colleague if these have access or know the individuals name or number.I was request to book a venue for a stakeholder workshop for a colleague and they provided me with the specifics of the workshop but not where the workshop would be, they left that up to me to decide, therefore I had to determine which venue would best suit the requirements made. I spoke to another colleague that recommended Dillington Hous e, however they were unable to provide any contact details for me. Due to Dillington House not being within the organisation I was unable to use the local address book so I had to use the internet to acquire their contact numbers.After locating their website via a Google search I found the contact details for a Robin Kyd who arranged bookings. To finally make the call to the individual within the organisation I would simple enter their extension number on my phone and the call would be put through. On the other hand if I need the contact details of someone outside the organisation I would either have to research their details on the internet, this would include looking up their business, and getting their number from their website.However this number may only be a general enquiry number and I would then contact them and ask for the relevant details I need. However to make the phone call to someone outside the organisation I simply have to enter the number 9 before entering their ful l phone number to make the call. An example of me doing this is when I had to make a phone call to Dennis Quick who works for Taunton Deane, I was given his contact details from a colleague when they passed a message along to me.When I first made the call the line was engaged and I couldn’t get through, but when I rang again later that day I reached Dennis’s secretary who said he was available and transferred my call along to him, it was confirmed that I was speaking to the correct person when he introduced himself as Dennis Quick. The purpose of giving a positive image of myself and my organisation is to give me a polite, efficient and professional image otherwise people will not respect or take you seriously and if you have a professional image then this reflects well on the organisation.If you have a positive image then communication between people both within and outside the organisation would be better and more efficient possibly allowing for the transfer of infor mation quicker and efficiently. Summarising a telephone conversation before the call ends can be beneficial to both parties as it allows everyone to agree on what has been said and ensure there are no confusions this is especially useful when the telephone conversation has been going on for a long period of time and various things have been discussed, its easy to lose focus on what has previously been said and summarising overcomes this.It also allows objectives to be clear and information fresh in the mind for both parties to write down or relay to another person or persons. An example of this is when I had to make alterations to a booking that I had made with a business called Monks Yard in Ilminster. After discussing with the person that was arranging the meeting on their end, I ended the telephone conversation by asking the person to repeat the amendments that I wanted them to make and once I was happy that he had everything correct by checking with the list that I had in front of me at the time, I thanked them and ended the call.When a call comes into the office I’ll always take a name (full if possible and preferably) and the company they are calling from, I’ll try and obtain from the caller either what the problem is exactly or from which department the problem arisen from and if they know who within the department they spoke to. I’ll pass messages along to departments or relevant staff members and see what information can be found to resolve the problem.If this is not possible try and locate a member of staff who can help from the information obtained from the caller e. g. A company was expecting a Goods Receipt Note via SAP a week ago, I logged into SAP and saw that I needed to send the Goods Receipt Note but as I didn’t have an training and didn’t know what to do, I located a staff member who I knew had training on this and could help me, I contacted her department and was put through to her and she talked me throug h the problem, however I hadn’t been set up correctly and couldn’tsend out a Good Receipt Note and had to contact IT and get it fixed, during this entire period of getting it fixed and finally sending out the GRN I kept the company informed on what happened and gave them an estimated time that they would receive the GRN. The organisational structure of County Hall is that of a hierarchical structure which uses clear reporting lines and it is easy to see what each team is called and how many people are in that team and how they relate to other people in the system.The communication channels for us are different per team or department for me my phone is linked with everyone else’s in my team and I am able to answer their phone by entering *84 however I am not able to answer any other phone on the floor this way. I can contact anyone internally as long as I know their extension number as this is the main method of contacting anyone internally and I can call anyone externally by simply entering the number 9 before entering their phone number.When I make a external call I introduce myself by saying my name and company that I’m calling from, if I know prior to the phone call which member of staff or department that I want to call I would request to speak to them. If I don’t know who I’m reaching I would explain why I’m calling and request help on locating the member of staff that can help me. When I’m connected to this person, I ideally should have some questions ready or know exactly what information I require.At the end of the call I should summarise the call and recap information to make sure that it is accurate. If a fault was to occur with my telephone I would simply call the IT department and inform them when the problem occurred and how frequent it is happening, they would resolve the issue by either providing a replacement handset until it is fixed or locating the fault and fixing it at their earliest c onvenience.When I received a call I should identify who the caller is and their needs to do this I should follow my phone call procedures and gather the callers name and who they calling from, with this done I have now identified my caller and go about identifying their needs. Sometimes the caller will not provide you with their name at the start of the call as for example in a telephone conversation I had with a man asking for a colleague who was away from the desk, after following call procedures I asked to take a message, once the caller had given me his message, I asked who the call was from and he provided me with his name.Following procedures I will then ask the caller what I can help them with and they should briefly explain why they are calling, depending on why they have called and what my job entails I will either transfer them to another member of my team who can deal with their call, check the availability of a team member and inform the caller that they will call them b ack at a certain time or providing the information that they require to the best of my ability, although I will inform them that I am new and may not be able to answer all their questions.An example of this is when I received a phone call from a lady who wanted to submit a complaint to our department, after taking her name and contact details, she proceeded to tell me why she was complaining and what she would like done about it.During this telephone call I was taking notes so I could pass along her message when the call had ended, at the end of the call when she had finished explaining the problem, I repeated to her the points that I had taken and asked if these were correct, after making some small arrangements I summarised the information that she had given me and once she confirmed it was all correct, I informed her that I was going to pass this along to the relevant person and he would respond as soon as he can, I also informed her that I would call her when I had done this so she would know that action had been taken and it would also create a positive image of myself and my team. Giving accurate information to callers means when someone calls they have done so with the anticipation of getting their question or query answered promptly and professionally. Having up to date information available in a clear and concise manner will confirm in the callers mind that they question has been answered properly. For example if someone rang up asking for details on the most recent consultation regarding one of the teams projects and I gave them a out of date or incorrect document details then it would make a bad impression for the team and could affect their reputation as they may be deemed unreliable.From a callers point of view they want their personal details kept secure and confidential by showing this when dealing with a caller I am showing them that I can be trusted with their personal information and from my point of view, I need to keep the information priva te and respect their privacy otherwise I could become liable for prosecution under the Data Protection Act and with the information that my team handles a lot of it is private and confidential so this is a daily thing. If any confidential or information to do with security is given out, then it is causing a threat to others. Types of information that could affect confidentiality and security are people’s personal details so in my case it would be personal phone numbers and addresses. Therefore to reduce the risk of breaking confidentiality the information should only be handled by those that absolutely need access to it and if anyone requests the information then I should ask the persons whose information it is if they can have it or inform the person asking that someone will contact them.The Data Protection Act was setup to prevent confidential and security information from being given out and it is breaking the law if I was to do so. All these sorts of information should be handled by a maximum of 2 people and seen by no one else; this way no information will be revealed. After answering the call following the team’s procedure, I’d ask the caller if they know the name of the person they wish to speak to, if they don’t ask regarding which department. If they caller doesn’t know who to speak to then I would find out briefly, as they call may be regarding a private matter, what the call in about. Using the information I had gathered it would make it easier to transfer the call to the right person or department.If the person the caller is trying to reach is unavailable either because they are out of the office or away for the moment, then I would try to located someone else that may be able to take the call and explain to them the name of the caller, and what they are calling about as this would save time for the caller as they wouldn’t have to relay the information again. A lot of the time the case with transferring a c all is that the caller would either leave a message or inform me that they would call later, however with some calls that I receive the person they are trying to reach have left the desk momentarily and return while I’m still talking to the caller allowing me to transfer the caller to the person they were trying to reach. I would then inform the caller that I am transferring them to that particular person and explain why they would be more useful and helpful to deal with their request.Another option would be to leave a message I would either leave a message on their answering machine or a note on their computer, I would leave the following details; who the caller was, full name, where they were calling from, the time that they rang and the details of the call and any specific details or requests the caller wanted the intended receiver to know. A problem that could occur and has occurred it when transferring a call to a colleague the connection to the caller has become lost du ring the transfer, To amend this I would simply call them back apologising for the inconvenience, also ringing them back would show that I am keen to help them and am trying my best to provide good customer service. I would then log the problem as a technical fault, however if the problem kept occurring then I would report the problem with the IT department.Another problem that could occur is that I may transfer the caller to the wrong person this may have happened due to a system fault or a technical fault, though in my case it could be due to the fact that I’m new and could have made a mistake. If the caller went to the wrong number then the call would circulate around back to me and I would deal with the call accordingly. However if a call had been transferred to me by mistake then I would explain to the caller that unfortunately they had been transferred to the wrong person, though not necessarily the wrong department. I would apologise to the caller and ask for them to e xplain the problem and then transfer them to the correct person.I would then take a note of the problem and if the problem continued I would contact the transferee informing them that they have transferred the call to the wrong person and if it persists then I would inform IT about the problem. When receiving a phone call from an individual I would follow my teams phone call procedures this would involve doing the following things. If it was my phone that was ringing I was answer it as promptly as possible with the greeting, â€Å"Isaac Young, Major Programmes†, If it was another member of my teams phone that was ringing and due to the layout of the office it is hard to tell which phone is ringing, It is procedure to wait for the phone to ring three times and if it hasn’t been answered by then, I would enter *84 on the phone to take the call and answer with the previous greeting.Once I am connected to the caller I would obtain who the caller is and where they are from, by now the caller has usually mentioned the person they wish to speak to, if the caller mentions why they are calling this is noted when transferring the call and it is not company procedure although it is recommended that you ask what the call is in reference to. When reporting a fault to the IT department I have to be as exact as possible as this will help the issue to be resolved as fast as possible. Having an accurate account of when the problem first started and the frequency the fault occurred, what is actually happening, which can be obtained by the fault log that I have written down. I would request IT to provide a replacement phone while the problem is amended.

Wednesday, October 23, 2019

Social Change and Modernization

* Define social change. What are the key features of social change? Provide four examples of social movements, current or past, and describe the key features of each movement. * * Define modernization. What are the key features of modernization? Provide four examples of modernization and describe the key features in each example. Social change can best be described as â€Å"the transformation of culture and social institutions over time and modernization, it has brought change to the way of life. The key features of social change are such things as event that are not planned, that could result in controversy, due to fast pace and even prolonged lasting. The four types of social movements are in no particular order are as followed: the first one would be alternative social movement, second the redemptive social movement, third the reformative social movement, and the fourth is the revolutionary social movement. I believe one of the key features of the alternative social movement is that it’s based and limited to smaller populations and is considered to be the less threatening of all four of them. Now as for the redemptive social movement one key feature is that it has a more extreme radical change which centers and targets individuals with the same belief. I believe MADD better known as mothers against drunk drivers is one good example of redemptive social movement. It bases its’ movement toward the stopping individuals from getting behind the wheel while their drunk or while their intoxicated. Now as for the reformative social movement, which targets everyone yet its ‘feature’s are of limited change. I believe through recycling is a prime example of social change with the reuse of products, the reduction of waste through the form of recycling. The last of the movements revolutionary social movement with the up most radical and a rather extreme change is the last of the movements. One prime example would be the Indian independence movement led by Ghandi which created such said movement. Modernization can best be described as a change that takes place during the occurring way into industrialization, with features that includes personal choice through expansion, resulting and the reduction of smaller ommunities, based on cultural background in way of diversity. One prime example can be said are the American expansion of cities. I n todays time an age more and more people live in cities rather than in smaller towns. Another form of Modernization can be said to be through communication in form of the internet, Cars with sense of more freedom due to different schedule’s and even housing because of the number of people living in the suburbs.