Thursday, October 31, 2019

Managment class Essay Example | Topics and Well Written Essays - 500 words

Managment class - Essay Example The most prominent scenes where the episodes when the colonel Nicholson was ready to die and scarify the lives of the British officers to state his position about Geneva Convention, article 27 which stated that the officers shall not be forced to work. Even after his has been sent to the punishment cell, the colonel Nicholson was sure that only one person can win and he should not go for comprise even though the officers and soldiers would have better conditions. The colonel Saito has managed to avoid a conflict when the colonel Nicholson offered a new plan of the bridge construction. By saying that the commands have been already given in response to Nicholson’s’ new plan, Saito has shown an intention to â€Å"ignore a conflict† (219). The first bit of this stage took place when the colonel Saito invited Nicholson for a dinner in order to negotiate the way of cooperation so that he could achieve the goal set. This stage implies that â€Å"there is no clear winner or loser† (219). When both colonels understood that building of the bridge did have certain benefits to both parties, they have accepted the solution that â€Å"provided incomplete satisfaction of both parties’ concerns† (219). Both parties have lost something: the colonel Nicolson – his ideology and officer’s duty, where the colonel Seito – his leadership, authority, and control over the bridge construction process. Collaborating stage took place on the moment when construction of the bridge was over and the colonel Nicholson has found a mine around the bridge. Both parties where interested in the final result – railroad path through the bridge as lots of efforts have been put to achieve this goal. Both Nicholson and Seito went together down to the river to find the problem and secure the bridge. Based on the film scenes it is possible to state that both leaders Saito and Nicholson have absolutely different

Tuesday, October 29, 2019

Career In Business Essay Example | Topics and Well Written Essays - 3500 words

Career In Business - Essay Example This report presents an analysis of the learning gained from my work placement as a result of three weeks real life work experience with an organisation. Hence, the report evaluates my performance during the work placement and the attainment of predetermined learning outcomes from the work placement. In the second year of my studies, I got the opportunity to intern with one of the fastest growing organisations in my home country. As an international student, I found this opportunity of high value and preferable as I had a vision of furthering my career as an accountant back in my country, China. I believed that taking the internship in my country would provide me the experience I needed of working in a Chinese work environment, and would further help me network around in my workplace, which would be helpful in my career after graduation. My work placement took place at Shen Zhen Underground construction Company Ltd. The construction industry is one of the highly booming industries in China (China Infrastructure Report, 2012), with Shen Zhen being one of the high growth companies in the country. Getting a chance to work in an industry that has been changing the landscape of the country was quite an honour for me and I wanted to be a part of the growth process. I worked within the accounting and finance department of the organisation, where the primary responsibilities included maintaining the petty cash and performing other tasks as directed by my supervisor. I did the work placement for three weeks this summer, and this report details the actual activities done during the time period of my placement. The remainder of the report is divided into seven sections. The first part will give a background and overview to work place organisation, Shen Zhen Underground construction Company Ltd. This is so as to understand the c ontext within which the internship was completed. The send section will identifying the intended learning outcomes from the work placement that I expected and thought I would gain from taking an internship with the company. The third section then details the work placement area and work activities as well as tasks completed. The fourth section analyses the health and safety policies as well as procedures within the organisation to understand how safe it was to work in the organisation. The sixth section will be the performance review of the work placement taking into perspective my own perception of performance as well as actual achievements in the work placement. Finally, the report will conclude to sum up the report as a whole. Overview of placement organization As noted above, my work placement took place at Shen Zhen Undergr

Sunday, October 27, 2019

The history and future of identity theft

The history and future of identity theft Throughout our lives ever since we were born we needed protection. From the time we were just newborn babies to when we are older we seek protection. Even the world as we know it is designed for human safety. From the cars we drive which have seat belts to when we are conducting science lab experiments and have to wear goggles. The same type of protection is needed in the internet. One main problem we have in todays society is concerning Identity theft, which is when someone uses your identity for their benefit. Short History Many people believe that identity theft began with the advent of the internet. But the truth of the matter is that Identity theft started before the advent of the internet. Statistics say that identity theft is much more common now than it has ever been in the past. This is largely due to the advent and widespread use of the internet. However, identity theft did not begin over the internet. Before the Internet came along, identity thieves could steal your identity by searching your trash to find personal information on papers like your bills and other important documents. Other ways they could find your personal information is through phone scams. For example, an identity thief could phone someone to inform them that they won a prize, and for them to receive it they would need to give some personal information, and then use it for their benefit in the way they choose. Ever since the internet came along, with other new technologies, identity theft has become more consistent, easier to do, and safer to execute it without getting caught. The rapid growth of identity theft The fastest growing crime in the world is widely starting to be considered Identity theft. Increasing identity theft is caused by the many ways in which we live our lives and process information. All these processes make it easier for identity thieves to access our person identifying information and ultimately snatching our identities. The internet is a bypass of giving out your personal information quickly and easily resulting in it being sometimes less secured. If we really think about it we access our credit cards online, pay our bills online, and shop and make credit card transactions online. All of these things are quick and convenient but at the same time can pose a rick toward us Some identity thieves create programs called spyware that is installed when we try installing different programs from the internet. The installed spyware basically spies on what youre doing. Every time you go on a website, type your password, transmit information, the spyware keeps track of it. The people receiving this data can either keep it for themselves or pass it on to another person for money. One type of spyware called Trojan horse allows their creator to access through remote the computer and hard drive. When people make online transactions, online retailers of the store save both our contact name and credit care information on their databases. Then Marketing agencies collect the information from our spending habits as well as contact information, which seem to be secure. But the people that work there sometimes tend to sometimes have access to this information and use it for their own benefit. They may sell it or may be bribed to give out other peoples personal information breaking company policy. Some times credit card companies give promotional offers to customers and have their credit card numbers on them, and if not disposed properly with a shredder than identity thieves going through your garbage and can use your personal information for their own benefit. Data about Identity Theft The Identity Theft Resource Center which is a non-profit organization identifies that theft can be sub-divided into five categories: business/commercial identity theft (using anothers business name to obtain credit) criminal identity theft (posing as another when apprehended for a crime) financial identity theft (using anothers identity to obtain goods and services) identity cloning (using anothers information to assume his or her identity in daily life) medical identity theft (using anothers information to obtain medical care or drugs) Elaboration on certain types of identity theft Identity Cloning and Concealment In this situation as the name suggests, is when an identity thief takes someones identification and impersonates them for an indefinite period of time. This may be done by someone who wants to avoid being arrested for a crime he/she did, to stay hid if working in a country illegally or a person hides from creditors. Criminal Identity Theft This type of theft is when a criminal breaks the law and is charged. And when the police ask for identification the thief would give a fake ID. After charged have been placed on the fake ID, the criminal is released. When it comes time for the court hearing the thief would not come, and the person whose name was given would be given a warrant under the assumed name. The victim might learn that he is charged through either a suspended driver license, or if they did a background check performed for employment or volunteering. Synthetic Identity Theft This type of identity theft, called Synthetic Identity theft is becoming more common, in which their identities are completely or partially made-up. Combining a real social security number along with a new birth date and name is one of the most common techniques in doing this. Synthetic Identity theft is quite hard to tract down, because it doesnt show on a persons credit card report directly but may appear as a completely new file in the credit bureau. Synthetic Identity theft mainly targets the creditors the unwittingly grant the thiefs credit. It can also affect consumers because their name can become confused with the synthetic identity. Medical Identity Theft Medical Identity theft is when an identity thief uses someones name as well as their insurance number to reap some benefits, without that persons knowledge. They obtain medical services and goods, or use the persons name to make false claim for medical services and goods. This results to wrong entries being put in existing medical records under the victims name. Negative Social Impacts of Identity Theft Identity Theft Statistics Millions of people per year are victims of identity theft. In 2003-2004, the Identity Theft Resource Center had surveyed victims of identity theft and named the findings in a paper called The Aftermath Study. These results are great estimates of the effects of identity theft on its victims. Discovery of Victimization 38-48% of victims find out about the identity theft within 3 months of it starting 9-18% of victims take 4 years or long to discover that they are victims of identity theft Time Involved in Being a Victim Victims spend from 3 to 5,840 hours repairing damage done by identity theft. This difference is due to the severity of the crime for example a lost credit card versus the use of your social security number to become your evil twin. The average number of hours victims spend repairing the damage caused by identity theft is 330 hours. 26-32% of victims spend a period of 4 to 6 months dealing with their case and 11-23% report dealing with their case for 7 months to a year. Monetary Costs of Identity Theft 40% of business costs for individual cases of identity theft exceed $15,000. The Aberdeen Group has estimated that $221 billion a year is lost by businesses worldwide due to identity theft Victims lose an average of $1,820 to $14, 340 in wages dealing with their cases Victims spend an average of $851 to $1378 in expenses related to their case Practical and Emotional Costs of Identity Theft 47% of victims have trouble getting credit or a loan as a result of identity theft 19% of victims have higher credit rates and 16% have higher insurance rates because of identity theft 11% of victims say identity theft has a negative impact on their abilities to get jobs 70% of victims have trouble getting rid of (or never get rid of) negative information in their records 40% of victims find stress in their families as a result of anger over the identity theft 45% of victims feel denial or disbelief 85% of victims anger and rage 45% of victims feel defiled by the identity thief 42% of victims feel an inability to trust people because of the identity theft 60% of victims feel unprotected by the police Uses of Victim Information More than one third of victims report that identity thieves committed cherub account fraud. 66% of victims personal information is used to open a new credit account in their name 28% of victims personal information is used to purchase cell phone service 12% of victims end up having warrants issued in their name for financial crimes committed by the identity thief Imposter Characteristics and Relationships to the Victim 43% of victims believe they know the person who stole their identity 14-25% of victims believe the imposter is someone who is in a business that holds their personally identifying information The most common reported perpetrator in cases where a childs identity is stolen is the childs parent 16% of identity theft victims are also victims of domestic harassment/abuse by the same perpetrator. These victims believe that the identity theft is used as another way for the abuser to continue and demonstrate his harassment and control. Responsiveness to victims Overall, police departments seem to be the most responsive to victims of identity theft, with 58% taking down a report on the victims first request 1/3 of victims have to send dispute information repeatedly to credit reporting agencies Only 1/5 of victims find it easy to reach someone in a credit reporting agency after receiving their credit report 20% of victims will have the misinformation and errors removed from their credit report after their first request for the credit reporting agency to do so Positive Social Effects of Identity Theft There are no positive social effects for identity theft. The thief might temporarily benefit, but its not worth breaking the law and being punishable by it. Future Trends of Identity Theft In modern day society with so many companies giving out your personal information, in the future its going to be more likely that your identity might be stolen some point in the future. New reports from the US say that identity theft has come to such a point that convicting an identity thief has come close to impossible. Things arent that downhill though. In 2007, specifically 26% more of identity thieves were caught than the year before. Thats great statistically wise but that still means that only 1943 people were caught out of 1.6 million reports of identity theft on file with the federal trade commission. This is due to the changing technology. Because when our technology changes so does the identity thieves making it much harder to track them. Conclusion In todays modern world, this highly increasing act of identity theft is becoming more and more common. Its really important to learn how to protect yourselves from this. Some simple things you could do to protect yourself from identity theft are: Do not carry your Social Insurance Number around Write down credit card numbers and write down Continue to check on your credit report and correct any mistakes immediately Memorize important passwords and your SIN number, and if written on a piece of paper, dont put it in your wallet Shred Old Statements and Sensitive documents Be Alert of anyone trying to get personal information out of you By adopting these simple habits and telling others about them, can help reduce the chances of your identity become stolen.

Friday, October 25, 2019

Decline of Indian Southwest Essay -- Native Americans History Papers

Decline of Indian Southwest Lord Acton said, â€Å"The most certain test by which we judge whether a country is really free is the amount of security enjoyed by its minorities.† In the late 1800’s the security of the minorities in the southwest was in serious jeopardy. For the Apache’s the security was promised but rarely upheld by the American government. The minimal security the Navajo enjoyed vanished by 1846. Men like Kit Carson desired but often failed to maintain the peace and security for these Indian tribes. Kit Carson’s actions and the actions of others began the deterioration of the Indian culture in the southwest. The decline of the Indian southwest was caused by the idea of Manifest Destiny, which led to Indian confinement to reservations and the decline of Native American society. The idea of Manifest Destiny led the Americans to war with Mexico. In 1846, America gained control of what is now the Southwest. With this acquisition, America inherited years of Navajo-Mexican warfare. The Mexicans became American citizens; the Natives, being Indians, did not. Therefore, Indians were punished for attacks on Mexicans but not vice-versa (Brown 14). General Stephen Watts Kearney put it this way, addressing the Mexicans: 'The Apaches and the Navajos come down and carry off your sheep and your women whenever they please. My government will correct all this. They will keep off the Indians, protect you in persons and property " (L. Bailey 2). American officials, in an attempt to halt conflict between the Indians and the new settlers, prevent expensive wars, and open up lands to white settlers, created reservations for the Indians, crowding the Indians into areas and constricting them from finding or growing food. Wi... ...hwest might still thrive today. Bibliography Bailey, Lynn. The Long Walk. Pasedena: Socio-Technical Books, 1970. Brown, Dee. Bury My Heart At Wounded Knee. Chicago: Holt, Rinehart and Winston, 1970. Debo, Angie. Geronimo The Man, His Time, His Place. University of Oklahoma Press, 1976. Hurtado, Albert L, ed. Major Problems in American Indian History. Lexington, Massachusetts, D.C. Heath and Company, 1994. Quaife, Milo Milton. Kit Carson’s Autobiography. University of Nebraska Press, 1935. Simmons, Mark S. â€Å"Kit and the Indiansâ€Å" University Press of Colorado, 1996. Treaty of Guadalupe Hildago, 1868. Utley, Robert M. The Indian Frontier of the American West 1846-1890. Albuquerque: University of New Mexico Press, 1984. White, David. It’s Your Misfortune and None of My Own: A New History of the American West. University of Oklahoma Press, 1991. Decline of Indian Southwest Essay -- Native Americans History Papers Decline of Indian Southwest Lord Acton said, â€Å"The most certain test by which we judge whether a country is really free is the amount of security enjoyed by its minorities.† In the late 1800’s the security of the minorities in the southwest was in serious jeopardy. For the Apache’s the security was promised but rarely upheld by the American government. The minimal security the Navajo enjoyed vanished by 1846. Men like Kit Carson desired but often failed to maintain the peace and security for these Indian tribes. Kit Carson’s actions and the actions of others began the deterioration of the Indian culture in the southwest. The decline of the Indian southwest was caused by the idea of Manifest Destiny, which led to Indian confinement to reservations and the decline of Native American society. The idea of Manifest Destiny led the Americans to war with Mexico. In 1846, America gained control of what is now the Southwest. With this acquisition, America inherited years of Navajo-Mexican warfare. The Mexicans became American citizens; the Natives, being Indians, did not. Therefore, Indians were punished for attacks on Mexicans but not vice-versa (Brown 14). General Stephen Watts Kearney put it this way, addressing the Mexicans: 'The Apaches and the Navajos come down and carry off your sheep and your women whenever they please. My government will correct all this. They will keep off the Indians, protect you in persons and property " (L. Bailey 2). American officials, in an attempt to halt conflict between the Indians and the new settlers, prevent expensive wars, and open up lands to white settlers, created reservations for the Indians, crowding the Indians into areas and constricting them from finding or growing food. Wi... ...hwest might still thrive today. Bibliography Bailey, Lynn. The Long Walk. Pasedena: Socio-Technical Books, 1970. Brown, Dee. Bury My Heart At Wounded Knee. Chicago: Holt, Rinehart and Winston, 1970. Debo, Angie. Geronimo The Man, His Time, His Place. University of Oklahoma Press, 1976. Hurtado, Albert L, ed. Major Problems in American Indian History. Lexington, Massachusetts, D.C. Heath and Company, 1994. Quaife, Milo Milton. Kit Carson’s Autobiography. University of Nebraska Press, 1935. Simmons, Mark S. â€Å"Kit and the Indiansâ€Å" University Press of Colorado, 1996. Treaty of Guadalupe Hildago, 1868. Utley, Robert M. The Indian Frontier of the American West 1846-1890. Albuquerque: University of New Mexico Press, 1984. White, David. It’s Your Misfortune and None of My Own: A New History of the American West. University of Oklahoma Press, 1991.

Thursday, October 24, 2019

Strayer Cis500 Assignment 1

1. Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. In recent years, the idea of predictive policing, or the use of statistics and data to make policing decisions, has become widely popular in the United States. In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (Computer Statistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify â€Å"hotspots†, and map problem areas.COMPSTAT has amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that run against the historical data to predict future crimes for police departments. The purpose of this paper is to briefly examine predictive policing and how tools such as COMPSTAT allow police departments to respond more efficiently to criminal activity. Using information technology to fight crime by the police officers is becoming increasingly effective in apprehending the crime perpetrators.Predictive policing, or programs such as COMPSTAT, involves using data from disparate sources, analyzing them and then using the results to anticipate, prevent and respond more effectively to future crimes. â€Å"The predictive vision moves law enforcement from focusing on what will happen and how to effectively deploy resources in front of the crime, thereby changing outcomes,† writes Charlie Beck, chief of the Los Angeles Police Department (Predictive Policing: The Future of Law Enforcement, NIJ, 2012). From the early 1800s to the 1980s, patrol and criminal investigation dominated policing.Uniformed police patrolled the streets to prevent crime, to interrupt crimes in progress, and to apprehend criminals. However, research since the 1960s has shown the limits of both patrol and investigation for controlling crime. Patrol officers did not eff ectively prevent crime by questioning suspects, victims, and witnesses. In the 1990s, the police adopted  predictive policing strategies  in which police initiate action instead of waiting for calls. Patrol remains the backbone of police operations. It consumes most of the resources of police agencies.On patrol, a police officer makes regular circuits or passes through a specific area. Studies of foot patrol indicate that these patrols are costly and do not reduce crime. Because crime is not evenly distributed throughout a community, which means some places need more patrol than others. The tradition of giving each neighborhood an equal amount of patrol wastes police resource, so the tradition of giving each neighborhood an equal amount of patrol just wastes police resources, however, which can make citizens less fearful of crime and improve citizen attitudes toward the police(CliffsNotes. om. ). While predictive police operations focus on the concentration of crime in certain o ffenders, places, and victims. Predictive operations include using decoys, going undercover, raiding, relying on informants, stopping and frisking suspects, shadowing repeat offenders, policing repeat-complaint locations, and saturating an area with police to maintain order which can be an effective method to prevent crime(CliffsNotes. com. ). 2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS functions: 1.Input, 2. Processing, 3. Output, 4. Feedback. COMPSTAT is the name given to the New York City Police Department's accountability process and has since been replicated in many other departments. COMPSTAT is a management philosophy or organizational management tool for police departments, roughly equivalent to  Six Sigma  or TQM, and is not a computer system or software package. † (State of CA, 2010). COMPSTAT as an information system implements the four basic IS functions in the following ways: InputData gathering process which is th e building block of COMPSTAT is comprised of information compiled from variety of sources like police incidents, arrest reports, suspect debriefing, telephone calls, and field interview reports. Pushing the data into the Incident Reporting System will help to maintain a database for future reference (Willis et al. , 2003). Processing The collection of data is presented during every COMPSTAT meeting. This would be entered into a database using a data management program like MS Access. This task is performed by the Crime Analysis Unit (CAU).These analysts classify, categorize, aggregate and analyze the data in order to gain a detailed report including many details like date, location, day and other information related to the crime. At this stage they would be able to identify a targeted response that may be the source of concern. This report provides useful identification of crime patterns like the point of entry for a burglary or make and model of a stolen vehicle (Willis et al. , 20 03, Pg 48-50). Further by using GIS (Geographic Information Systems) data and spatial analysis geographic hot spots are located and mapped to the data.Output Once the data is processed, it is presented to the department commanders. With available intelligence they should devise a strategy and deploy resources with expertise to tactfully pre-empt a crime situation and follow it up to ensure performance and results were as desired. These are key steps or principles which guide the departments patrol and investigative work: * Accurate and timely intelligence, * Rapid deployment * Effective tactics, and * Relentless follow-up and assessment (William J. Bratton, 1999 pg-15). Feedback The key element of improvement is feedback.As it includes data, any error related to this aspect should be avoided. Consistent and correct data has to be entered into the incident reporting system and database. Accurate report writing should be followed while recording incidents. Extensive data analysis to i dentify the root cause of crime becomes mandatory. Regular meetings and brainstorming session should be conducted to improve data collection and teams involved should be evaluated. Learning from past mistakes should never be avoided. Continuous aiming at innovation and integration with latest technology to keep the system up to date can provide better results.Periodic assessments of performance and gaps in accomplishing set goals and objectives should be reviewed so that corrective measures can be taken to fill the gaps to meet desired results. 3. Determine how information systems have allowed police departments that implement tools such as COMPSTAT to respond to crime faster. With the implementation of information systems real time access to data has become easier. Identification of hot spots related to crime is possible and problem solving has become proactive instead of reactive. Monitoring of multiple locations and futuristic crime and its patterns can be detected.This allows op erations to be carried with fewer resources, and reduced random patrols. Further it provides a platform for administering vast information which enables better decision making and problem solving. By demanding accountability it facilitates team work and police personnel are now working together to accomplish set goals faster thereby reducing crime. 4. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf of police departments that intend to implement predictive policing. SWOT Analysis of Predictive Policing SWOT Analysis of Predictive PolicingStrengths: The strength of predictive policing is that it allows resources to be used more efficiently because they can be deployed to specific locations in which crimes are likely to occur and for specific types of crimes. In this regard, it is also easier to prevent crime from occurring as opposed to merely responding to it (Goode, 2011). Weaknesses: Predictive policing is often treated as being solely related to the use of computers and data to the detriment of involving front-line police officers in the decision-making process.This can result in police officers feeling both disrespected and unimportant in performing police work (Willis, Mastrofski ; Weisburd, 2003). Opportunities: Predictive policing provides for the opportunity for police departments to reduce criminal activity at a lower cost to taxpayers. Police departments can prevent crime from occurring rather than using limited resources to respond to crimes once they have occurred and hoping responses will deter other criminals (Pearsall, 2010).Threats: The primary threat related to predictive policing is that some police officers, particularly older police officers, are skeptical of the use of statistics and data in place of traditional street patrols. This could result in predictive policing efforts not being carried out in a way that will allow them to be as successful as possible. Conclusion The information containe d in this brief paper has shown that with the use of information technology and programs such as COMPSTAT, predictive policing can result in a reduction in crime by predicting where it will occur rather than responding to it once it has occurred.However, predictive policing can have problems if the sole focus is on the use of information technology. Instead, police officers and the general public must be included in the process. Their feedback must be solicited as part of the larger process. Otherwise, they have the ability to derail any reductions in crime and improvements in performance that might be possible from predictive policing. References 1. Goode, E. (2011, August 15). Sending the police before there’s a crime. Retrieved from http://www. nytimes. com/2011/08/us/16police. html 2. Pearsall, B. (2010, May).Predictive policing: The future of law enforcement? National Institute 3. Willis, J. J. , Mastrofski, S. D. , ; Weisburd, D. (2003). Compstat in practice: An in-dept h Analysis of three cities. Police Foundation. Retrieved from http://www. policefoundation. org/pdf/compstatinpractice. pdf 4. CliffsNotes. com. Police Strategies. Retrieved April,12th, 2012, from http://www. cliffsnotes. com/study_guide/topicArticleId-10065,articleId-9953. html 5. Bratton, W. J. ; Malinowski, S. W. (2008). Police performance management in practice: Taking COMPSTAT to the next level. Policing, 2(3), 259-265.

Wednesday, October 23, 2019

How important is it for the organization Essay

Of many of the problems that the organizations face these days, one of the vital one is of employee dissatisfaction and lower motivation for work. Employees feel dejected and demotivated when their basic needs and requirements are not met; those needs might include hygiene and motivating factors that involve the presence or absence of working conditions, salary, empowerment or authority, job status, social relationships, etc. Organizations need to develop such a Human Resource department that effectively performs its activities by understanding the changing trends of the environment and so the employee needs and requirements. The decisive thing here in this case is that the HR department must scrutinize the productivity level, motivation, direction, attitude, and overall performance of the employees towards their assigned tasks and prosperity of the firm as a whole. HR managers emphasize on keeping the employees motivated, directed, and contented by adapting to several measures; some of which are explained as follows. First of all, the main responsibility of the Human Resource department is to hire or recruit the employees at their very best, who have best available skills and abilities that would result in the provision of value to the organization. The process of hiring and recruiting plays a vital role in determining an employee’s productivity and efficiency. Many organizations use references to hire the applicants, but the clear-cut method based on merit must be adopted. Taking written test, arranging group discussions, and conducting interviews with different managers help the Human Resource department to effectively analyze an applicant’s potential and skills whether he should be hired or not. Second, the managers must consider an employee as a person and treat him with due respect; offensive comments and remarks must not be passed out in order to avoid unwanted consequences. Mutual respect among the managers and employees must be maintained so that employees may feel that they are part of the organization. Third, many employees join the company with their basic motivation of salary; hence the salary package must be handsome enough to make the employee contented or even satisfied. Every human being has some needs as mentioned by Maslow in his pyramid of needs that starts with physiological needs, and then follows safety and security needs, then social and affection needs, esteem needs, and finally self-actualization. It should be understood at first hand by the managers or supervisors that employees are given enough time, resources, and opportunities to satisfy such basic needs such as, safety and security and physiological needs. Competitive benefits should be offered to the employees by analyzing the industry trends as in how much salary, benefits, or allowances are being paid by the competitors, and then the blend of competitive benefits should be offered. This may include providing compensation packages to the workers according to their job design; such as, low-level or assembly-line workers must be ensured enough security and medicinal allowances. Motivation can be categorized as the key to improved performance, and hence must be developed among the employees. This can be overcome by the managers by properly understanding their needs and wants and acting accordingly to fulfill them. Fourth, showing the chance of being promoted to the upper level definitely creates a sense of motivation among the workers. Often in many organizations, there comes the problem of glass ceiling where women and minorities are not give the chance to be promoted, hence this should not happen in order to keep the employees motivated. Fifth, Human Resource departments have a very significant responsibility of designing tasks, matching them with the employees, and assigning them. Employees, based on their skills and abilities, are assigned the tasks to work on and that suits them the most. Avoiding monotonous jobs and assigning them with interesting and innovating tasks develops interest in doing work and keeps the workers directed. Sixth, managers must create a sense of Task Identity and Task Significance among the employees that is to what extent their jobs are important for the company. Seventh, training is an essential process carried on by the organizations to keep their employees’ skills and capabilities inline with the changing environment. Several of training methods include hiring skilled expertise from various organizations or universities who train the employees for a limited period of time; moreover, organizations also send their employees abroad for training purposes as in to attend conferences or training sessions. Managers can arrange the workshops or lecture sessions within the organization for addressing the latest developments and challenges being occurred in the market or industry. Eighth, timely, accurate, and effective feedback must be provided by the managers to point out the strengths and weakness of the employees in their performance. And, involving the employees in the decision-making processes and empowering them by giving more authority to practice is also another wise strategy to motivate the employees. Often employees are not provided with accurate and corrective feedback such as; they are not pointed out their negatives just because of avoiding unwanted atmosphere or relationships. Therefore, many managers and supervisors prefer providing feedback that is usually positive even if the employee has some negative points about his work or attitude. Another issue is of providing of feedback from supervisors with whom the employee has good relationships or who favors the employee in each and every aspect of work life. This results in overvaluation of an employee, hence giving him points more than actually he deserves. Therefore, in order to have an effective feedback program, human resource departments must ensure that they adapt the 360 degree feedback method, which involves the provision of feedback from various sources such as, managers, directors, supervisors, colleagues, and peers. This method is very effective since it confirms different sorts of feedback provided by different sources. Consequently, to sum up the essay, we can say that the role of Human resource departments in almost every organization is like that of a brain in a human body. Since this is the era of globalization and immense competition, hence organizations are seeking to cut costs, save time, and be effective and efficient in carrying on their business activities. All the roles and responsibilities of the Human Resource department mentioned above do have significant importance because if they are performed effectively and wisely, they can result in saving huge amount of costs for the organization. Moreover, effective implementation of such measures and tactics can result in providing a company with great talent, expertise, working environment, high sales, high profits, high growth, good reputation, and most of all, efficiency.