Thursday, February 27, 2020

HR Working Practices & Patterns Essay Example | Topics and Well Written Essays - 3750 words

HR Working Practices & Patterns - Essay Example Industrial Revolution: Industrial revolution brought in picture big organizations and factories first in England and later in North America. The concept of Economies of Scale also came in the picture according to which large people were required to work to achieve cost benefits. The involvement of large number of people in work areas brought complexities. In the initial days, however, the emphasis was more on machines than people. The working conditions favored machines and their efficiency rather than people and their capabilities. As a result, working conditions were dismal for people. Welfare/Social Secretaries: The growing issues associated with the work force, made them raise their voices against human problems. Employees started forming Unions to make their voices heard. In order to deal with such issues the post of welfare secretaries or social secretaries was created. This can be considered as the most primitive form of HR function after the industrial revolution. The initial task of such secretaries was to keep workers from directly reaching managers for their grievances. Secondly, they were required to discourage employees from dealing with unions or forming unions for their problems. The creation of the post of secretaries can be considered a move to give a specialized status of dealing with the issues related to employees. Before such posts were created operating managers were also dealing with the issues of employees. The creation of these new posts relieved operation managers of this extra burden. Birth of Scientific Management: Frederick Taylor was the person who put forward the concept of scientific management. He emphasized on the inclusion of scientific study in the management arena. He suggested improvement in management practices i.e. study of different situation be carried out to bring about improvements. He basically worked on A steel plant called Bethlehem Steel Plant and studied the typical procedures and made his recommendation to improve the whole process. He also introduced an incentive system to improve the whole process and so human capital management made an important component of his study. "He worked out an incentive system that paid each man $1.85 a day for meeting the new standard, an increase from the previous rate of $1.15. Productivity at Bethlehem Steel shot up over night" (Daft 1997). Primitive HR: 1900 brought primitive HR departments within large organizations like AT&T. So welfare secretaries were replaced by these new departments that were called personnel department. This change started from the period ending World War I. "While historians disagree on the specific date assigned to the appearance of the first personnel department, most agree that, between 1900 and 1920, more organizations were employing specialists to assist with personnel matters" (Jamrog & Overholt 2004). Their tasks generally included compensation handling, dealings with unions and other employee concerns. Though a separate department was dealing with the needs of employees, but production, finance and to some extent marketing was considered important functions or departments. However, with the passage of time the personnel department started getting more attention from top management. Hawthorne Studies: Hawthorne studies conducted at Western Electric's Hawthorne plant can be considered instrumental in bringing changes in the HR function.

Tuesday, February 11, 2020

Penetrating testing techniques Research Paper Example | Topics and Well Written Essays - 1500 words

Penetrating testing techniques - Research Paper Example This article will analyze some of these modern computer attacks, how they happen and ways of mitigating them. A DDoS attack is an ill attempt to make a network or server resource unavailable to users, often through disrupting or suspending the services of a connected host from the internet. The DDoS attack can be achieved by two main ways. First, the attacker, using malware or Trojan can take over several computers on the internet, creating a botnet in the process. Secondly, the attacker then controls the affected computers and makes them attack simultaneously the target thus achieving their initial goal (Gu & Liu, 2007). The DDoS attacks can be resolved, mainly through the incorporation of blocking and detection mechanisms, that apply even during the spoofed attacks, when attacker profiles and identities are constantly changing. Others include, giving more complete capabilities of verification than either IDS signatures or static routers filters can provide. Prevent dependence on configuration changes or network device resources. In-built intelligence processes being infused with only contaminated traffic packets that would guarantee minimum scaling costs and maximum reliance. Implement procedures for communication standards to help guarantee maximum reliability and interoperability. Blocking and identifying individual spoofed packages to guard genuine business transactions (Patel & Patel, 2014). TCP session, or session hijacking, is generally a means of taking over a session of a web user by obtaining surreptitiously the session Id and pretending to be the official session user. Once accessed, the invader can pretend to be the official user and freely access and manipulate data as they please. Hackers popularly use routed IP packets from the original source to hijack a session. Through re-routing the communication to go through his computer, he can communicate with the different machines simultaneously. An effective example of such