Wednesday, July 31, 2019

How Does Shakespeare’s ‘Romeo and Juliet’ Link to Different Poems?

In all the different texts that were studied, the themes of ‘Love & conflict’ are apparent. In Shakespeare’s Play ‘Romeo and Juliet’, we get the impression that perhaps the nurse has more affection for Juliet compared to her actual parents. It was the nurse that raised and breastfed her. Her parents seem to be quite remote and distanced and are more interested in controlling her. However, we see their genuine affection for her when they are grief-stricken after they discover Juliet’s death. In Catrin, like the Capulet’s, we can see the mother, Gillian Clarke attempting to control her daughter.But this is not a significant confrontation just a petty dispute in which the mother recognises that conflict will always be a part of mother/daughter relationships. This can be seen in What has Happened to Lulu, where the confrontation between mother and daughter has escalated to the point where the daughter felt she must leave. Similarly, in the p oem, A frosty Night, Alice is angry as her mother’s love is controlling and smothering. The texts suggest that relationships are not always healthy between parents and daughters.The structure of Romeo and Juliet takes the form of a traditional narrative with the developing problem of Juliet’s arranged marriage reaching a climax with her death then a resolution of the feuding families reconciling. In Catrin, the classical structure is abandoned: and replaced with a more complex narrative beginning with a flashback. It is the only at the end where we understand their conflict. In ‘A Frosty Night’ and ‘What has happened to Lulu? We see a more traditional structure with the story unfolding in a chronological way.However, what is interesting about the twentieth century texts is that none of them are resolved at the end unlike Romeo and Juliet. Shakespeare’s play is quite alike ‘A Frosty Night’ as the conflict is revealed through dialog ue while in ‘Catrin’ and ‘What Has Happened to Lulu’ the narrative is conveyed through the first person. The social and historical contexts of the texts are marked differently. Romeo and Juliet was written in the late 16th century while the other poems were written in the modern day and, therefore, reflects the attitudes and values of their times.In Romeo and Juliet, unlike today, children weren’t expected to question the authority of their parents. Moreover, it was the tradition for parents to arrange their children’s marriage and sometimes leads to serious conflict. This is evident in Shakespeare’s play and ultimately leads to the death of both children. In all the poems, the conflict in a parent-child relationship isn’t as serious as in Romeo and Juliet. While Alice and Lulu felt restricted and constrained by their mothers they could at least have acted more assertive with their parents and even leave home as Lulu’s dis appearance was.In Catrin, the conflict is of a trivial nature which would make occurrence in most families. Despite their apparent differences, what is remarkable is that parent/child conflict has persisted through time and therefore it is possible to understand the confrontation between Juliet and her parent’s even though it was written over four hundred years ago. In all the texts, powerful emotive language is illustrated. In ‘Romeo and Juliet’, we see Old Capulet verbally attacks Juliet in an aggressive and threatening manner, â€Å"Hang thee, Young Baggage!Disobedient Wretch! † he screams. While in ‘Catrin’, Clarke uses the powerful metaphor â€Å"tight red rope of love which we both fought over†. In ‘A Frosty Night’, Robert Graves ends the poem and the mother/daughter conversation with Alice shouting, â€Å"Mother let me go†. Also, in ‘What Has Happened to Lulu† the younger sibling reveals â€Å"I h eard someone cry, in anger or in pain†. Perhaps it is not surprising that emotive language is employed after all the poems are borne out of love.

Tuesday, July 30, 2019

People Living on the Continent of North America Suffer 9 Times More Chronic Fatigue and 31 Times More Chronic Depression

A recent study shows that people living on the continent of North America suffer 9 times more chronic fatigue and 31 times more chronic depression than do people living on the continent of Asia. Interestingly, Asians, on average, eat 20 grams of soy per day, whereas North Americans eat virtually none. It turns out that soy contains phytochemicals called isoflavones, which have been found to possess disease–preventing properties.Thus, North Americans should consider eating soy on a regular basis as a way of preventing fatigue and depression. The purposes of this idea try to convince the audience that the people who are living in North American continent should usually eat soy for preventing fatigue and depression. To support his proposal, he explains that, the fact of people, who are living in Asia continent, have average eating soy equal to 20 grams per day.The point is that in North America continent, no anyone eating. Nevertheless, I still found that his reasons are inconven ience in the following aspects. First of all, the writer indicates that number of people who are living in North America continent have suffer 9 times and 31 times more chronic fatigue and depression respectively than the Asian people. However, this statistic may be wrong. Static should depend on time interval. But this static don’t specific time what year of research.For example, if you research while USA has economic problem, the value of fatigue and depression should higher than Asia continent. Secondly, He expected that soy has phytochemicals called isoflavones, which have been found to possess disease – preventing properties. However, eating soy or not may be not the essential reasons. Sometime, it is style of living. For example, in most country in North America continent are urban while country in Asia almost are rural.So this is the make sense reason, which make static of fatigue and depression in North America has the value more than in Asia. Simply put, the a rgument offered by the writer is still weak. If he wants improve the credibility, he should provide more data, especially about when time of survey and other control variable like status of economic. If I have to assess this argument, I would need evidence when time of survey of chronic fatigue and depression and status of economic.

Monday, July 29, 2019

Stages in the marketing research processNike Sprint Ahead of the Essay

Stages in the marketing research processNike Sprint Ahead of the competition - Essay Example The opportunities and threat faced by the company and the scope of market research is being discusses in this case analysis. From the day Nike had its ad campaign with top athletes like John McEnroe, the ads created for Nike have been icons in setting standards for creativity. The Nike should not switch its focus from celebrities to its product. The campaigns were very effective with their image transfer approach, they casually transmits the message that how fashionable and trendy a person can become by buying a pair of Nike. Nike became a self-fulfilling image statement: if you want to be hip, wear Nike; if you are hip, you are probably wearing Nike (1). By focusing on the aura and image conveyed by the celebrity, Nike was able to attract those who wanted the image. Also the advertisements from Nike are very intensely inward focused concepts. It does not focus on the product, but has its entire focus on the person who wears it. The success of Nike in the market can be attributed mainly to its understanding of the consumer psyche. During the fitness crazy 1980s, Nike's campaign was totally tuned to the expectations of the consumers. This kind of understanding of the consumer results from market research. The research Nike should be doing now is a lifestyle study of its consumer to check whether a change approach adopted for advertising. The study that has to be done by Nike is of Descriptive in nature. For the research, the design will be as follows: 1. Interest/ theory - to find out various factors that affect the lifestyle of consumers which has an impact on the purchase of Nike 2. Conceptualization - lifestyle study involves identifying the kinds of products/ services consumed and a relationship with the demographic and psychographic factors. 3. Choice of research method - the research methods that can be used are market survey and unobtrusive methods like content analysis carried out longitudinal and cross-sectional across the target markets. 4. Population and sampling - the population for the study will be all the target markets for Nike across the world and the sample of the study can be selected randomly after segmenting the market into target groups 5. Operationalisation - the survey can be carried out online to elicit responses from various target markets globally. The content analysis can be carried out through observation and comparison of the people who buy Nike and their patterns of purchase 6. Date processing and analysis - after the data is collected a comparison and correlation study of the various factors and the lifestyle of consumers and their perception on Nike can be analyzed. Buyer behavior The Customer Focus(R) 2004: Sporting Goods study(2)by Vertis reveals that price and selection motivate consumer purchases more so than quality in case of athletic footwear. The results of the study show that consumers want choices and variety at a good price. A key tool in influencing buying behavior is advertising inserts and Customer Focus can provide guidance on the best way to use media synergistically. According to the survey, female shoppers with young children (ages 6-11) also see quality as less important than price in terms of being a key factor on why they shop at athletic footwear specialty stores. Price, selections are the key factors which play a more important role in deciding the brand and model for purchase. It is evident from the survey that, the consumers of the

Sunday, July 28, 2019

Texting and driving Research Paper Example | Topics and Well Written Essays - 1250 words

Texting and driving - Research Paper Example This paper shall exclusively try to relate texting while driving, and how the two must be kept separate when either one of these is committed into. Since texting is so common these days, the drivers do not feel the urge to park their cars at a safe location and then do the texting. Talking whilst driving might sound reasonable considering one receives the calls as and when these come, but texting can take a while to respond back. People need to realize the gravity of the problem that can linger on their heads and then find a solution to have a remedy for the same (Hermes, 2010). The remedy can be in terms of stopping one’s car and then finding the most appropriate place to park the car and do the texting bit. Recent accidents have proven that the drivers who were texting whilst driving have had more than 400 percent of their concentration diverted while doing this act. They completely block their minds and concentrate wholly and solely on what are written on the cell phone scr eens. They give up the idea that they are driving and respond to what all the content has been about. This is a grave situation which must be dealt with a stern hand, because many people can suffer on this count and are still suffering with each passing day, around the world. The cell phones can wait, they must and they should! After all, it is just a device which must not take one’s life. It does not have the power to take one’s life, but what is happening here is a totally different act altogether. The cell phones thwart the entire basis of a person’s concentration when he is driving. What this suggests is the fact that the cell phones are the attention diverters, and essentially break the ice between the concentration that the individuals have with the road and their car whilst driving (Squire, 2009). The sound of the cell phone message is enough for them to forget that they were on the car and start depending on what is written on the Inbox within their cell phones. This is a horrendous understanding which has been established by people in this day and age, where maximum concentration is laid on the fact that people need to be on their feet at all times, without any shortcomings coming to their fore, which is not humanly acceptable and possible. The birth of a social networking phenomenon has highlighted a number of negatives than bringing out any sheer advantages for the people. It is an acceptable proposition that the cell phones do create social linkages amongst people but this is no way means that the people can take their lives for granted, as well as the people who are around them (Author Unknown, 2010). A sense of empathy seems to be the missing ingredient within the thick of things, and for this proper efforts need to be made to make sure that sanity does creep in within the relevant equations. The social networking premise is such an important one that it will do away with the basics of spending a normal living pattern and bri ng into close proximity tools like cell phones and the like to remain in close contact with the people, no matter where they are and what kind of environments they are a part of. What must matter is the fact that cell phones do have to be used, and driving is no exception within the related folds. People need to unlearn what they have learned within the new dimension of cell phone usage and the

Saturday, July 27, 2019

Promoting Appropriate Behavior and Respect for Others within the Essay

Promoting Appropriate Behavior and Respect for Others within the Classroom - Essay Example It is clear from the discussion that classrooms are becoming exceedingly diverse these days mainly because of the influx of immigrants and also because of transiency. Under such circumstances creating a classroom, the community is one of the earliest responsibilities of a teacher. However, to create respect for diversities and build positive identities, the teacher should set some ground rules from the very first day such as treating classmates with respect, respecting their personal belongings, listening to the views of others and responding after sentence(s) are finished.   This paper illustrates that the teacher can follow the positive reinforcement outlined by Skinner’s Behaviorist Theory. According to Skinner â€Å"behavior is a function of its consequences and the learner will repeat the desired behavior if a positive reinforcement (a pleasant consequence) follows the behavior†. Behavior which is reinforced is strengthened; keeping this in mind the teacher can i ntroduce a behavior chart in which the student who behaves the best and is most polite and helpful will get a â€Å"shining star† or a â€Å"smiley face† against his/her name. The students should also be warned of dire consequences if they exhibit inappropriate behavior towards their classmates or bully them. Similarly, the teacher must herself use positive phrases when giving feedback and during error correcting. In order to instill respect for others, the teacher must ask the students to provide feedback for the others without mocking, ridiculing or passing personal remarks. The teacher must ensure that her students understand why it is important to respect each other.  

Friday, July 26, 2019

The importance of the perception communication at work depending on Dissertation

The importance of the perception communication at work depending on the Generation X and Generation Y - Dissertation Example These diverse attitudes and principles translate differently in a workplace context, with both generations having unique values associated with what constitutes an effective and motivational business model. There are significant gaps in research literature describing what specific characteristics of a business model will motivate and inspire workers to achieve top quality performance in the job roles of Generation X and Generation Y. In most respects, knowledge on both generations tends to illustrate Generation X as an independent and headstrong generation with pre-established principles and values. In opposite accord, Generation Y is presented as more liberal, flexible, and success-minded in the organisational context. This sizeable gap in knowledge specifically includes knowledge of the importance of communications for both generations. ... 1.1 Research aims and objectives The aim of this research project is to determine the level of importance of communications in the workplace as it pertains to both generations. This is to determine if communications strategies can be an effective motivational model for both Generation X and Generation Y. This study maintains three specific objectives: Determine what actually motivates both Gen X and Gen Y in a workplace context Determine how both generations perceive communications as a motivational tool Identify proven models of motivation that have been effective in boosting performance for both Generation X and Generation Y. The study will consult with various secondary literature sources to paint a portrait of both generations, with special focus on attitudes, principles, experiences, and expectations for an organisational job role. Results of findings will be compared to a primary research project (which is described in this proposal’s methodology section) to determine wh ether communications can be considered a viable motivational model for both generations or for a single generation. The results of this study should assist in closing some of the gaps in literature that currently exists regarding motivational strategies for both generations and recommend a new model of motivation that could potentially improve business culture and strategic performance when applied to Gen X and Gen Y. The goal of the project is to create an innovation in knowledge about both generations that can provide new direction for managers in organisations that struggle with Gen X and Gen Y employees to gain top quality performance and dedication to meet strategic goals both short- and

Essenital skills for an excellent career Essay Example | Topics and Well Written Essays - 250 words

Essenital skills for an excellent career - Essay Example Poor conflict resolution skills may lead to team work breakdown, self dislike, wasting of talent and lack of motivation among others. However, conflicts are not a curse; they are a blessing if harnessed by skilled handling and solving. When conflict is handled and solved effectively, it is a promising tool in enhancing professional growth. For example, effective conflict resolution leads to increased understanding, group cohesion, and self-knowledge. The way conflict is handled differentiates between positive and negative outcomes. The article analyzes five styles proposed by Kenneth Thomas and Ralph Kilmann in the 1970s, from which they developed Thomas-Kilmann conflict model instrument (TKI). The KTI model styles are based on the intensity of the conflict. They include; competitive, collaborative, compromising, accommodating, and avoiding. The article teaches readers to take positive approaches to conflict resolution. For this to succeed in workplace, courteous and non-confrontational discussions where no individual is attacked should be employed. This way, conflict will become an event for growth rather than an attack. Manktelow, James and Amy Carlson. â€Å"Conflict Resolution: Resolving Conflict Rationally and Effectively.† Mind Tools. 1996-2013. 23 March, 2013.

Thursday, July 25, 2019

Final Exam Essay Example | Topics and Well Written Essays - 1750 words - 2

Final Exam - Essay Example Although the act adds responsibility for the chief executives it benefit’s the public shareholders and protects them from unethical business transactions. The executives are placed in a position where they can easily fall prey to accidental false records or records that are misreported by someone else. Executives could find it difficult to track company spending on lower levels and ensure that all transactions are being reported. Without security, investors will not place trust in a company they do not have accurate reports on. This also gives investors the sense that rather than having their money controlled by one person, they have a say in their money and they have a right to see where the money goes and where it grows. This security encourages investors to place this money in these companies once again. 2. If someone was reading my CAT scan from halfway around the world I would have mixed feelings. I would be impressed and feel pride in the fact that we have advanced our technology enough to have the ability to accomplish something like this. I also think it would be a great way to access other opinions. If the doctors in my area are unfamiliar with certain conditions, having access to other information sources or doctors with various experience can be very positive. I might be diagnosed or healed faster if the doctor is familiar with the type of symptoms I have. It also gives the chance for medicine to grow faster as a whole with the exchange of ideas and experiences. On the other hand, if someone over there is reading my CAT scan, then someone over here is not. As long as there are qualified physicians near me who have the same level of expertise, the job should be left to them. If the doctor across the way does it cheaper, more hospitals will be inclined to hire doctors in foreign countries and our own doctors will be out of jobs or suffer significant salary decreases. If I was certain that this type of

Wednesday, July 24, 2019

Financial Regulation & Supervision. Andrews Bank case study Essay

Financial Regulation & Supervision. Andrews Bank case study - Essay Example Adam is a newly hired commercial loan officer in training at the Andrew and Andrews Bank. After clearing several credit analysis exams, he joined the bank with zeal and fervor towards credit analysis. Several of his seniors noticed him for his intelligence and smartness. Soon Adam was promoted to be a financial analyst and was assigned to his superior, Jon Smith who was a commercial loan officer. As part of his job, Adam was required to conduct credit analysis to check credit worthiness for all new customers that Jon brought into the bank. In one such case, where Roberts and Roberts had requested for a five million pound loan, Adam was extremely confused by the way Jon had handled the situation. Adam noted that the company, a retail store chain, was very highly leveraged with most of the exposure being handled by his bank. In most of the cases, Roberts and Roberts had undertaken operating leases which were not part of the long term loans like other leases. As an accounting regulation , finance leases are classified as long term loans while operating leases only come under contingencies and commitments and in the notes. As a result, Roberts and Roberts was playing with accounting rules and noting its operating leases under notes. Subsequently, when Adam analyzed the credit worthiness of the company, he found that the company was dangerously over leveraged and therefore was not a safe investment or customer for the bank. Adam included this element into his analysis in the memorandum which he then forwarded to Jon so that she would include that in the credit file. However, Jon decided not to include that in her credit file and the file was later approved by the credit committee with the operating lease issue never coming up in the credit committee meeting. After this scenario, Adam overheard a conversation between Jon and other colleagues. Apparently, Jon had a personal mortgage loan application approved by the Sheffield Building Society. It was also found that the President of Roberts and Roberts was also chairing the board of the society. Adam also found that extremely favorable rates were offered to Jon on the personal mortgage. Adam was thoroughly confused because of the unfolding scenario and this case now portrays several ethical concerns. Following this is an outline of the ethical concerns that are raised by this case along with the action steps that Adam should take in order to fix the situat ion. Moreover, certain recommendations for the organization are also put up in order to avoid such situations in the future. Ethical Concerns Highlighted in the Case Various ethical concerns have been highlighted in the case based on the scenario outlined above. The first issue that has come up is that Jon has been given the sole responsibility to present the credit file to his superiors and the credit committee which leads to issues such as dependency on only one person who can be easily

Tuesday, July 23, 2019

Developing Leaders at UPS Assignment Example | Topics and Well Written Essays - 750 words

Developing Leaders at UPS - Assignment Example Similarly, Jovita used her skills and knowledge to progress in future which came out positive for her. She focused on her individual development and with the passage of time; she gained experience which helped her to become a successful leader. As a leader, she took challenges regardless of the results and focused her attention on learning from the experiences of other people. According to her, observation and remaining close to skilled employees helped her to gain a competitive edge in the market. She knew when to use her leadership style in which situation. Basically, Jovita’s approach can be framed as a situational leader who acts according to the situation. Secondly, she focused mainly on developing good relations with her subordinates. A good leader always focuses on building good relations with his peers, employees and subordinates. She encouraged active participation of her employees, motivated them and helped them to improve their skills through training and developmen t programs. A good leader always focuses on developing high communication with the employees, greater teamwork interaction and gives them space to act and behave within a certain limit. Jovita followed the same rules which helped her to become a successful leader in the corporate world of UPS.... Without these three basic elements, it is impossible to attain growth in the spiral of experience. Answer 3: Some of the skills that Jovita Carranza demonstrated in her career as a successful leader are: 1- Cognitive ability: Jovita possessed both raw intellectual horse power and mental flexibility (Hughes, Ginnett, and Curphy 2012). She joined UPS when she was ready to take her skills to next level. According to her, intelligence and flexibility enable a person to groom one’s skills. It was her flexibility and willingness to learn that helped her to attain her goals both personally and professionally. Leaders learn from the experiences of others and by experimenting with their practices. 2- Strategic Thinking: Strategic thinking has helped Carranza to gain global competitiveness and an edge over other competitors in the market. She knew how to make the most of her skills and thinking ability. Leaders know to compete with the other players in the market by making the most of t heir leadership potential. 3- Analytical Ability: Jovita Carranza worked in different regions with different employees from diversified backgrounds and under different situations. This helped her to develop analytical ability to analyze different situations and then to act differently according to the requirement. Also, it helped her to know the exact situation and the solution through her prior working experience in different regions. 4- As described by Jovita, it is impossible to make sound decisions and winning impression without eagerness to learn and without taking challenges, especially when one is uncertain about the results. These are the qualities of a true leader to take

Monday, July 22, 2019

Compass Records Essay Example for Free

Compass Records Essay Backgrounds Alison Brown and her husband Gary West, who were both musicians, founded compass Records in 1995. Compass Records is a small independent recording company that centered on folk and roots music. Compass Records occupies only a tiny part of the 32-billion dollar music recording industry, competing with some multi-national corporations dominating 86% of the business, such as Sony/BMG, Universal Music Group, Warner Music Group, and EMI. However, the industry has witnessed a stagnant growth since 1995, with a decline on annual sales at a compound annual growth rate of 5%. By 2005, Compass Records had grown to include nearly 50 artists under contract and were averaging around 20 releases a year. With 40% of its albums selling over 5,000 units, Compass Records turned a profit on 80% of its titles in 2005. Brown and West also acquired a $100,000 recording studio in May 2004 in order to give the label and its artists more flexibility in the creative process and save $500 a day on studio rental. Problems * (General) Licensing vs. Producing and Own   * Compass Records has to decide between licensing the finished recordings, which is less risky and less expensive with a finite life to the future cash flows associated with the recordings, and producing and owning a master copy, which will be more risky and more expensive with an infinite life to the future cash flows associated with the recordings. * (Specific) How to maximize firm value through the Roscommon decision * Whether to license Adair Roscommon’s music or own the master recording outright.

GSM Implementation

GSM Implementation GSM Implementation in various places Transaction terminals: SMS messaging can be used by machines like the EDC, POS terminals to conform transaction from the main server. Supply Chain Management: The GSM M2M technology can be used to fulfil the needs of SCMs huge IT infrastructures with leased lines, data centre, workstations. Multiple Remote Data Collection Points: With the help of the GSM modem connected to PCs, GSM electronic terminals PCs one can send and receive data from all over the world. This help client to receive data from branch offices, business associates, warehouses, and Mobile phones. Large Transaction Volumes: GSM SMS messaging is capable of handling large number of transaction data in a very small period of time as it can receive large number of messages on your server without internet connectivity. With the help of GSM at a time the shopkeeper can handle hundreds of transaction. High Uptime: GSM mobile network have high uptime as compared to other communication networks so it helps business. It can be used in communication industries as it doesnt require any kind of wires for setting up the network so there is no fear of cutting of wires. Implementation of GSM Technology There are three main parts of the GSM Network * Mobile Station (MS):-The subscriber carries out this part. * Base Station Subsystem (BSS) :- It controls radio link with mobile station. * Network and Switching Subsystem (NSS):- This part keeps track of the call switching between two mobiles and also looks over Memory management and also between fixed network users and mobile. Network structure All of the elements when combined together produce many GSM services such as voice calls and SMS. Mobile Station Consists of: * Mobile Equipment (ME):- These consist of equipment such as hand portable and vehicle mounted unit * Subscriber Identity Module (SIM):- It is a chip size object which contains the information about the user like its identification, secret keys. The BSS In the above diagram the Base Station Subsystem (BSS) is shown containing the Base Station Controller (BSC) and the Base Transceiver Station (BTS) which are connected together on to A-bis interface. The Packet Control Unit (PCU) is also shown connected to the BTS although the exact position of this depends on the vendors architecture. The Air Interface or Um is used to connect the mobile to the BSS which is connected by the A interface to the NSS. The NSS The Network and Switching Subsystem(NSS)comprises of the MSC connected via the SS7 network to the HLR. The AUC and EIR, although function differently from the HLR are shown together as combining them is a standard in all Vendors networks. The NSS is connected by the A interface to the BSS. It is directly connected to the PSTN from the MSC. There is also a connection to the Packet Core (called the Gs) although this is optional and not always implemented. The GPRS Core Network The GPRS Core Network shown here consists of SGSN which is connected to the BSS by the Gb interface and the GGSN. These two devices are connected together to a private IP network called the GPRS backbone shown as the Gn Reference Point. http://www.pulsewan.com/data101/gsm_basics.htm http://sinarsuryakomindo.blogspot.com/2008/10/gsm-history.html http://foosms.com/gsm.htm MODULATION TECHNIQUE Modulation is the technique of embedment of a signal into the carrier frequency (wave). There may be analog (includes FM, AM) or digital modulation. In digital modulation Binary values 0 and 1 is embedded in the carrier frequency by changing its frequency, amplitude or phase. In this way digital modulation may be ASK (Amplitude shift keying), FSK (Frequency shift keying) or PSK (Phase shift keying). In GSM, GMSK (â€Å"Gaussian Minimum shift keying†, also known as â€Å"Gaussian filtered Minimum Shift Keying†) Modulation technique is used which is a type of FSK that continuously uses Phase modulation. Advantages of GMSK over other techniques-> * Being able to carry digital modulation and efficiently using spectrum. * Sidebands do not extend outwards from main carrier like other phase shift keying and thus, it avoids interference. * No discontinuities as change in frequency occur at â€Å"carrier zero† crossing points. * Being continuous frequency shift keying modulation scheme. It uses the frequency hopping technique, which involves switching the call frequency many times per second for security. GMSK Fundamentals The unique factor of MSK (Maximum Shift Keying) is that frequency difference between the logical 1 and 0 states always equals to half of data rate, expressed in modulation index terms and always being equal to 0.5. MSK modulation Signal using MSK modulation Sidebands extend can be easily traced in the plot drawn for the spectrum of an MSK signal. Therefore before applying it to the carrier modulating signal is passed through a low pass filter (Gaussian filter). Before filtering it must have narrow bandwidth, sharp cut-off and impulse response should have no overshoot. Finally MSK signal gets converted to GMSK modulation. Spectral density of MSK and GMSK signals Spectral density of MSK and GMSK signals Generation of MSK Modulation There are mainly two ways of to generate MSK modulation. Description of First way- The filtering of Modulating signal is done using Gaussian filter and then it is applied to frequency Modulator to set modulation index to 0.5. It is the simplest way. Its limitation lies in the fact that Modulation index must exactly equal to 0.5, which is practically not suitable as drifts are experienced by the components (which is not possible to be set exactly). Generating GMSK using a Gaussian filter and VCO Generating GMSK using Gaussian filter VCO Description of second way- Quadrature Modulator (or I-Q Modulator) is one of the ways. Here the phase of a signal lies in quadrature or 90 degrees to other one. It uses one signal, known as to be in-phase and another being quadrature to the first one. Use of Modulator of this type the Modulator index is exactly maintained to 0.5 without any further setting. Thus it is much easier to use and also it provides the required level of performance. Block diagram of I-Q modulator used to create GMSK Block diagram of I-Q modulator used to create GMSK For Demodulation the above techniques can be used in reverse. BASIC IMPLEMENTATION REQUIREMENTS HARDWARE AND SOFTWARE REQUIREMENTS- The three systems of GSM are * Switching system (SS) * Base station system (BSS) * Operation and support system (OSS) The Switching System- It is responsible for all call processing and other functions with following described units. GSM Network Elements Home Location Register (HLR)- It is the most important database of an operator storing every important details of subscribed customer. Whenever a customer buys a new connection his registration is made in HLR. Mobile services switching centre (MSC)- It performs telephony switching functions of system including controlling calls to and from other telephone and data systems. Visitor Location registers (VLR)- When a cell phone roams into a new MSC area, VLR connected to that MSC requests for data about mobile station from HLR. Later VLR will not need to interrogate HLR whenever customer makes any call. Authentication centre (AUC)- It verifies each callers identity and ensures confidentiality of each call. Equipment Identity Register (EIR)- This database stores information of Mobile devices thus preventing calla from unauthorised or stolen ones. Base Station System- It consists of Base Station Controllers (BSC)- It is the switch serving as physical links between MSC and BTS also providing functions like handover, cell configuration data, and control of Radio frequency (RF) power levels in BTS. Base Transceiver Stations (BTS)- It is the radio equipment which serves each cell in Network. A group of BTS are controlled by BSC. GSM Telecommunication Tower Operation and Support System (OMC)- This entity (connected to all equipment in switching System and to BSC) helps the operator to govern the whole system and offer customer cost-effective support and maintenance activities need for GSM network. Additional Elements- Message centre (MXE)- It Handles SMS, voice mail, fax mail, email, and cell broadcast. Mobile Service Node (MSN)- It governs Mobile intelligent network (IN) services. Gateway Mobile Services Switching Centre (GMSC)- It interconnects two networks. MSC then known as GMSC. GSM Interworking Unit (GIWU)- It consists of Hardwires and Software both and acts as an interface to various network for data communication. Problems in Implementation of Technology:- Ø Implementation of GSM technology requires a number of equipment. Many equipment need to be installed like tall towers. These towers are fixed at proper area in line of sight. Also satellites functionality also requires attention. Ø Installation of Several equipment and devices require huge amount of money. Thus GSM architecture is very costly. Ø Maintenance of equipment used in GSM is practically not affordable time and again. Ø There are several protocols applied in GSM Technology, resulting problem in implementation. Ø There is possibility of breaking into GSM networks that use cipher text-only cryptanalysis encrypted communication. These attacks are based on security flaws of the GSM protocols, and work whenever the mobile phone supports A5/2. Ø The available radio frequencies need to be re-used closer together and continuously within the network so that spectral efficiency can be unlimited. Ø There is huge consumption of power in GSM implementation, which is not convenient. Ø GSM is also not secure as the sent signal or message is not so much hard to be decoded. So the third party may avail of it somehow using some technology. ABOUT THE TECHNOLOGY GSM (Global System for Mobile communications: originally from Groupe Special Mobile) is the most widely used digital cellular technology for transmitting mobile voice and data services in the world. It uses SIM (SubscriberIdentityModule) cards, which acts as digital identity, and is tied to the cellular network by searching for cells towards the towers (bts) in the nearby location. GSM is a second-generation (2G) cell phone system used by over 3 billion people across more than 212 countries and territories. In over twenty years of development, GSM has been continuously upgraded to provide better signal, speech quality and thus fulfil the mass demands. It also facilitates to roam, switch carriers and the operators without replacement of handsets. 01-01-10 The GSM technology originally originated by the European Conference of Postal and Telecommunications Administrations (CEPT) in 1982 when it firstly created Group Special Mobile (GSM) for the purpose of designing a pan-European mobile technology. European Telecommunications Standardization Institute (ETSI) later in 1991 adopted the GSM standard. GSM technology was firstly commercially lunched in 1991 in Finland, although it has been for testing purposes since 1980. 01-01-5 Newer versions of the standard are much compatible with the original GSM system. For example,Release 97,the General Packet Radio Service (GPRS) added the packet data capabilities to GSM technology. Release 99 introduced higher speed data transmission usingEnhanced Data Rates for GSM Evolution(EDGE). It uses variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). Data is digitized and compressed and, sent down a channel with two other streams of user data, each in its own time slot. Most 2G GSM networks operates in the 900MHz or 1800MHz bands. It operates on four different frequencies worldwide. GSM calls are either based on data or voice. Voice calls use audio codecs called half-rate, full-rate and enhanced full-rate. Data calls can turn the cell phone into a modem operating at 9600 bps having ability to carry 64 kbps to 120 Mbps of data rates. GSM technology even keeps people in touch while roaming also as it home operators are having roaming collaboration with foreign operators. IMPORTANCE OF TECHNOLOGY GSM is the most popular, reliable and the fast growing wireless technology for mobile phones in the world. It has approximately covered the 89% share market of the global mobile telecom in more than 219 countries and territories with more than 3.8 billion people as per May 2009 study. Its signalling and speech channels being digital differs it from its and so pronounced as a second generation (2G) mobile phone system. This has also meant that data communication was easy to build into the system. It also provides the integrated high-speed data, fax, paging, voice mail and short messages services (SMS) capabilities and thus offering communication to be secure, private and fraud prevented. Many operators provide access to ISDN services to transmit data fast. Several offer GPRS facility to connect to high speed data communication channel (9600 bps). Global GSM Growth GSM market share has grown at exponent rate over recent years. However the target to achieve 1 billion customers took 12 years (Feb 2004) but later it was a surprising fact that it crossed the 2 billion mark only in another 2.5 years (By June 2006) and 3 billion GSM customers in another less than 2 years. Now the Telecoms and Media hope to surpass 5 billion targets by 2013. GSM is the legacy network of the evolution to the third generation (3G) technologies Universal Mobile Telecommunication System, (UMTS) also known as WCDMA, and High Speed Packet Access (HSPA). Maximum Mobile phones manufacturer develop their products based on GSM technology and all mobile companies provide their customers GSM networks. The Social Impact of Mobile Telephony Mobile telephony is undoubted one of the most superb developments telecommunications industry. The number of subscribers is rapidly increasing in tremendous way. More and more people are being connected to the telecom. GSM technology has greatly affected the social life. The various operators have been proving a number of offers to fascinate their customers. Due to aspects like reliability, security, voice and data transmission facilities GSM is much popular among the users. People are shifting to wireless communication from their fixed phones. Rapid increase in GSM market Popularity Reasons of GSM Technology * Improved spectrum efficiency. * High speech quality. * International roaming. * Better signal quality. * Offer voice, data and fax. * Offer secure communication and privacy. * Low-cost mobile sets and base stations (BSs). * Flexibility SIM. * High share market capture. * Low terminal and service cost. * ISDN compatibility. * Compatibility with Integrated Services Digital Network (ISDN) for data transmission. * Support for new services like VAS. Backbone for 3G and other evaluating technologies GSM customer growth in India Health Issues It is the recent report that use of GSM mobile technology poses Health Hazards. Its regular and continuous use for hours may create heath problems like irritations, allergies, headache, ears pain etc. It is fact proved by scientists that radio waves of frequencies that it utilises can create electric fieldsin human cells and brain. Long term exposure may have adverse health effects too. Many research institutions controlled by government and independent bodies are continuously studying over it. Also research results are being revived by ICNIRP (International Commission on Non-Ionizing Radiation Protection) and the WHO (World Health Organisation) at global level. Use of cellular phone is highly restricted to be turned off while in flight as the radio frequencies may interfere. The same case happens at hospitals as the radio signal may create interference with electronic medical devices at short rang or cause uneasiness among patients. While driving use of cell phone is advised to avoid and in petrol pumps as the radio waves used in GSM technology may cause interference. d> GSM SECURITY:- 1. PURPOSE OF USING GSM SECURITY:- As we know that security is the essential feature in any service. Hence, GSM network also follows certain level of security in the services which it provides. Hence, there are mainly two security purposes which are kept in mind when it is concerned of the GSM network:- First of all, to protect the Accessibility to the mobile services and secondly to prevent disclosure of any crucial information/data at the radio path to achieve the privacy regarding that particular data. 2. THE SECURITY FEATURES OF THE GSM SERVICES:- There are several features of the GSM service for the security of its customers. Some features are stated below: 1. Authentication is being provided to the registered customers only. 2. The process of encryption is being used for secure data transfer. 3. The identity of customer is being verified. 4. The cellular phones are useless without a SIM card. 5. A secret key Ki is being used to achieve authentication. 3. Representation of the GSM Security:- GSM security is represented in two ways:- a. Authentication b. Encryption A. Authentication: The process of authentication is being categorized in to various stages which are stated below:- 1. First of all an IMSI (International mobile subscriber Identity) is being send to the network by the mobile station. 2. After that the IMSI is being received by the network and the KI corresponding to that IMSI is found. 3. A 128 bit random number (RAND) gets generated by the corresponding network and is send to the mobile station through the medium of air. 4. Through the use of the algorithm A3, the network (AuC) and the MS (SIM) use KI and RAND to produce a signed result (SRES). 5. The SRES is being sent to the network by the MS. 6. For the validity purpose network performs the testing on the received SRES. B. Encryption: The process of encryption gets started by ciphering mode request (i.e.: secretly executed request) command from the GSM network. After receiving the request the process of encryption and decryption of data gets performed by the mobile station. Different key stream is involved in the encryption of each frame over the air traffic. Different key stream is generated for each frame as the A5algorithm which is used to encrypt the data is initialised with the KC and the number of the frame to be executed resulting in the generation of different key stream. The same KC gets executed as long as it does not get verified by the MSC (Mobile services switching Centre) through the MS(mobile station) which results in the generation of the new KC. The Authentication of MS is an optional process and is usually not performed in the beginning of a call. Hence it is assured that the KC will not get changed during a particular call. As it gets switched off IMSI (International mobile subscriber identity) gets stored by the mobile station on the SIM card to assure that is gets available when it is switched on again. In the hardware of the mobile phone the A5 algorithm gets executed as data is being encrypted and decrypted through the air. 4. The Algorithm used in the GSM Security: There are three algorithms which are used in the GSM security:- 1> A3: The MS Authentication Algorithm:- In the GSM model, A3 acts as the authentication algorithm. This algorithm generates a 32 bit output as it gets the RAND (128 bit random number) from the MSC (Mobile service switching Centre) and the secret key KI as input from the SIM. The size of KI and RAND is of 128 bits. The A3 algorithm is represented as a one-way hash function. This function produces an output which is of fixed length as a random input is given to it. A COMP 128 algorithm is used for the A3 algorithm by every GSM operator in the world. This algorithm acts as the reference algorithm for the various tasks which has been pointed out by the GSM association. 2> A8, The ciphering Key Generation Algorithm: In the GSM network, A8 algorithm acts the session key algorithm. The A8 algorithm generates 64 bit output by taking two 128 bit input. The output generated is 64 bit session key KC. COMP128 acts the reference algorithm for the A8 algorithm also as it is there in the A3 algorithm. At one run, COMP128 generates both the session key KC as well as the SRES response. 3> A5, the stream-ciphering algorithm: In this algorithm encryption of data over the air occurs. For secure data, there are three possibilities in the case of GSM; it includes the A5/0, A5/1 and the A5/2 algorithm. This algorithm came into existence because the GSM standard was designed for Europe and as per the export regulations it did not allow the implementation of the technology outside Europe. f> Advantage of GSM Services:- Following are the Advantage of GSM service: - 1>First of all the GSM network is fully developed which means that it contains stability with proper features and services. Hence it has over 450 million subscribers worldwide. 2> The other advantage of GSM network is that it contains better voice quality and low- cost alternatives to make calls, such as Short message service (SMS) . In the case of GSM network the quality of voice is fine inside the buildings. 3) Another advantage of this service is that the equipments are easily available from the vendors who execute the following service. 4> GSM services provide the roaming facility to its customers so that they can use the service anywhere in the world. 5) GSM networks provide higher talk time due to its pulse nature of transmission and its ability to use routers. 6) GSM provides the facility of International Roaming which is highly beneficial in context to its customers. 7> The presence of Smart Cards which acts as subscriber Identity Modules through which encryption of data occurs in a secure manner which is highly advantageous with respect to commercial background. 8> lastly the common advantage of the GSM service is that it provides the user the freedom to choose a mobile set of his/her choice and the SIM card is also being selected by user of their choice. They also have the option of making the changes to both the equipments accordingly. Disadvantage of GSM Services:- The GSM service has following Disadvantages:- 1> The first disadvantage is that the algorithms which are being used in this service for the security purpose is not available to the public. 2> In the GSM service only Access security is being provided and the different communications occurs only in a fixed network. 3> The major disadvantage of the GSM service is that it lacks the access to the American market. 4> For the usage of this service, the user needs the requirement of higher power and the coordination between cell to cell. 5> The network coverage of this technology is not better in the rural areas as compared to its competitor service of the CDMA technology. Reference: http://sawaal.ibibo.com/computers-and-technology/what-advantages-gsm-technology-3g-technology-245344.html http://www.connectindia.in/posts/list/gsm-what-are-the-advantages-of-gsm-technology-how-it-works-910021.htm http://www.edaboard.com/ftopic200835.html http://in.answers.yahoo.com/question/index?qid=20070202053500AA6OrQt http://www.gsm-security.net/papers/securityingsm.pdf http://cryptome.org/jya/gsm061088.htm

Sunday, July 21, 2019

Reliability and Validity of Personal Interviews

Reliability and Validity of Personal Interviews Reliability and Validity of Personal Interviews as a Selection Technique In the Introduction define or identify the general topic, issue, or area of concern, thus providing an appropriate context for reviewing the literature. In order to provide an appropriate context for this reviewing literature, it is necessary identify which is the framework of personal interviews as a selection technique,   and what is the definitions for this XXX tool, as well as the concepts of reliability an validity. En el à ¡mbito de la Psicologà ­a de las Organizaciones y mà ¡s concretamente en seleccià ³n de personal uno de los instrumentos que rara vez està ¡ ausente en cualquier proceso selectivo es la denominada `entrevista de seleccià ³n de personal ´, haciendo con ello referencia a la rela ià ³n de dià ¡logo que se establece entre do o mà ¡s personas, con la finalidad de obtener informacià ³n y evaluar las cualidades del candidato a un puesto de trabajo (Dipboye, 1992). De las distintas herramientas utilizadas en el proceso de seleccià ³n, la entrevista de trabajo aparece como la mà ¡s empleada (Muchinsky, 1986; Levy-Leboyer, 1990), muy por encima, con diferencia, del resto (referencias, tests, centros de evaluacià ³n, datos biogrà ¡ficos, grafologà ­a). La entrevista de trabajo es la fase definitiva, dentro de cualquier proceso de bà ºsqueda de empleo o de cambio de trabajo. Todos los pasos anteriores como la toma de informacià ³n, preparacià ³n, envà ­o, de la carta de presentacià ³n y seguimiento de currà ­culo, han estado dirigidos a conseguir una entrevista de seleccià ³n con la empresa. Es el momento del contacto personal, donde de una forma individual y directa, el entrevistado tiene la ocasià ³n de convencer al entrevistador de que à ©l es la persona idà ³nea para el puesto. Nos jugamos mucho en poco tiempo. In the field of Personnel selection is a process used by organizations (companies, institutions, organs of public administration, etc.) decide which of the aspirants for a particular position is the most appropriate. In other words, personnel selection is a decision-making process about the suitability of the candidates for vacant positions. The instruments that can be employed in the selection process are extremely numerous, and include: application forms, curriculum vitae, employment records, interviews, cognitive skills tests, psychomotor skills tests, personality tests and questionnaires, simulations (group dynamics, in-basket tests, business games, etc.), work-sample tests, references, and so on. Various processes are used to identify the most promising candidates; generally more than one process is used. Most organisations ask for a rà ©sumà © or job application from all candidates. A selected group of candidates is then invited to attend an interview, a system of tests, or an assessment centre, or some combination of these. En el à ¡mbito de la Psicologà ­a de las Organizaciones y mà ¡s concretamente en seleccià ³n de personal uno de los instrumentos que rara vez està ¡ ausente en cualquier proceso selectivo es la denominada `entrevista de seleccià ³n de personal ´,haciendo con ello referencia a la rela ià ³n de dià ¡logo que se establece entre do o mà ¡s personas, con la finalidad de obtener informacià ³n y evaluar las cualidades del candidato a un puesto de trabajo (Dipboye, 1992). En este sentido, resulta paradà ³jico que, mientras los datos acumulados a travà ©s de diferentes investigaciones, tanto cuantitativas como cualitativas, ponà ­an de manifiesto que las propiedades psicomà ©tricas de la Entrevista de Seleccià ³n resultan dà ©biles, mostrando bajos coeficientes de fiabilidad, asà ­ como una validez de criterio muy reducida (Wagner, 1949; Mayfield, 1964; Ulrich y Trumbo, 1965; Wright, 1969; Schmitt, 1976; Arvey y Campion, 1982; Reilly y Chao, 1982; Hunter y Hunter, 1984), constituà ­a uno de los recursos de seleccià ³n mà ¡s utilizados tanto en Europa como en Amà ©rica. Las razones que explican el uso intensivo de esta herramienta, a pesar de su debilidad psicomà ©trica, probablemente se deban a un efecto de validez aparente subyacente (Goodale, 1982). Sin embargo, a partir de la dà ©cada de 1980 comienzan a aparecer nuevos modelos de entrevistas de seleccià ³n, cuyas caracterà ­sticas en tà ©rminos de estructura y contenido son de naturaleza claramente distinta. Las investigaciones realizadas para determinar las propiedades psicomà ©tricas arrojan unos valores similares a los tests cognitivos en cuanto a fiabilidad y valores mà ¡s que aceptables en cuanto a validez (Anderson, 1992; Campion, Palmer y Campion, 1997; Harris, 1989; Huffcutt y Arthur, 1994; McDaniel, Whetzel, Schmidt y Maurer, 1994; Salgado y Moscoso, 1995; Wiesner y Cronshaw, 1988). De acuerdo con estas investigaciones, elincremento de tamaà ±o de los coeficientes psicomà ©tricos, estarà ­a relacionado por una parte, con el aumento del grado de estructuracià ³n de las preguntas y, por otra parte,con la incorporacià ³n de contenidos relativos a la exploracià ³n o bà ºsqueda de conductas relevantes para el desempeà ±o del puesto. point out overall trends in what has been published about the topic; or conflicts in theory, methodology, evidence, and conclusions; or gaps in research and scholarship; or a single problem or new perspective of immediate interest. establish the writers reason (point of view) for reviewing the literature; explain the criteria to be used in analysing and comparing literature and the organisation of the review (sequence); and, when necessary, state why certain literature is or is not included (scope). En el à ¡mbito de la Psicologà ­a de las Organizaciones y mà ¡s concretamente en seleccià ³n de personal uno de los instrumentos que rara vez està ¡ ausente en cualquier proceso selectivo es la denominada `entrevista de seleccià ³n de personal, haciendo con ello referencia a la relacià ³n de dià ¡logo que se establece entre dos o mà ¡s personas, con la finalidad de obtener informacià ³n y evaluar las cualidades del candidato a un puesto de trabajo (Dipboye, 1992). 1. Various processes are used to identify the most promising candidates; generally more than one process is used. Most organisations ask for a rà ©sumà © or job application from all candidates. A selected group of candidates is then invited to attend an interview, a system of tests, or an assessment centre, or some combination of these. One of the best ways of identifying whether someone is going to be an effective member of staff is to work with them for a period. Thus, inviting university students to work during their vacations enables you to assess them thoroughly in the working environment, or you can make an offer to a contractor who has impressed you with their work. But for most hiring, it is necessary to assess candidates by more artificial methods. There are two criteria which selection techniques need to meet if they are to be useful in predicting performance: Validity: Does a factor which is used in selection-for example, educational level or experience-actually predict job performance? Reliability: Does a selection technique produce consistent results? For example, a test in which the same person obtained the same score on a number of occasions would be considered more reliable than a test on which the same person obtained different scores on different occasions. Unfortunately, there is usually a trade-off between validity and reliability. It is simple to devise a test of high reliability which has little predictive value; and tests of the factors which do predict job performance are often subjective and thus unreliable. However, it is much better to have a valid test of limited reliability than a reliable test of little validity-at least a valid test tells us something. For example, it is easy to test if someone can do calculus, or can understand a set of technical terms. It is not easy to devise a reliable test which shows that a candidate can do innovative design, or persuade customers, or deal with difficult people, yet these kinds of ability are much more important in most jobs than highly specific knowledge which can be learned in a short time. 2. Personel selection ersonnel selection is a process through which organizations (companies, institutions, organs of public administration, etc.) decide which of the aspirants for a particular position is the most appropriate. In other words, personnel selection is a decision-making process about the suitability of the candidates for vacant positions. The instruments that can be employed in the selection process are extremely numerous, and include: application forms, curriculum vitae, employment records, interviews, cognitive skills tests, psychomotor skills tests, personality tests and questionnaires, simulations (group dynamics, in-basket tests, business games, etc.), work-sample tests, references, and so on. The particular instruments employed ultimately depend on the selection approach or model used by the organization in question. INSTRUMENTS USED IN PERSONNEL SELECTION Regardless of whether the selection model used is the traditional one or the strategic one, the appositeness of the recruitment decision will depend on the validity of the instruments used for making that decision. Hence, it is appropriate to review the latest data on the validity of the tools used, or with potential for use, by professionals involved in recruitment. At present, the most widely used method for reaching a conclusion on the validity of an instrument is meta-analysis, a quantitative technique of integration of research results (Hunter Schmidt, 2004). Today we have access to meta-analyses carried out to determine the validity and utility of nearly all the instruments employed in personnel selection (see Salgado, Viswesvaran Ones, 2001 and Schmidt Hunter, 1998, for a fuller review). b) Interview The interview is without doubt the most widely used instrument for personnel selection, both in Spain and in all the other countries for which such information is available. The conclusion of numerous studies is that practically 100% of those recruited for a position must get through at least one interview during the personnel selection process (Salgado et al., 2001). For this reason it is clear that the interview merits special consideration among the set of instruments used for personnel selection. Over the last 70 years there have been periodical reviews of research on the validity of the personnel selection interview. Up to 1987 there had been 7 large-scale reviews of the literature, all of them concluding that the interview was characterized by low reliability, that is, first, that two different interviewers scarcely coincided in their appreciations of an applicant, and second, that their validity was low or even zero, and that they contributed nothing to the prediction of performance obtained through other instruments, such as cognitive ability tests. This raised a significant paradox: easily the most widely used instrument for predicting candidates job performance was an instrument incapable of predicting it. How, then, could the widespread use of the interview be explained? Possible responses to this question include: (1) The interview is an easy instrument to use. Practically anyone can, apparently, use it without the need for any particular qualification; (2) It is a highly versatile instrument, since it can be applied to any position, organization or situation; (3) It is the best means of getting to know candidates personally; (4) It permits candidates to explain personally their merits in relation to the post; (5) It allows the applicant to be provided with personalized information about the organization; (6) It is relatively cheap by comparison with other selection instruments; and (7) It is more acceptable to both managers and applicants than other instruments potentially involved in selection processes. Such explanations, while sufficient for maintaining the interview among the selection instruments to be considered, do not constitute an argument for its use as a tool for making recruitment decisions. Even so, recent research has shown that, with certain characteristics and in certain conditions, the selection interview boasts reliability and validity, increases the validity of batteries of selection instruments and has appreciable economic advantages(Salgado Moscoso, 2005). It is the format (degree of structuring) of the interview that seems to most influence its lack of validity, and to remedy this situation several alternatives have been proposed, which would fall into the general category of structured behavioural interview (see Salgado Moscoso, 2005 for a fuller treatment of this type of interview). The main defining characteristics of structured behavioural interviews, as against conventional interviews, would be: (1) the questions making up the interview are developed based on jobs analysis, employing the Critical Incidents technique; (2) they involve questions whose content refers exclusively to behaviours in the relevant post; (3) each candidate is asked all the questions prepared; (4) the interview process is repeated with all the interviewees; (5) applicants responses are assessed by means of behavioural observation scales or rating scales with behavioural anchoring, also developed through jobs analysis (EVAS; see Salgado Moscoso, 2005, for a description of these scales). Moscoso(2000), reviewing the predictive validity of the personnel selection interview, was able to show that, compared to the case of other types, the structured behavioural interview presents a validity similar to that of the best instruments employed in personnel selection (e.g., cognitive ability tests), and even superior to that of some (such as personality measures or assessment centres). Recent studies carried out in Spain (Saez, 2007; Salgado, Gorriti Moscoso, 2007) have shown the validity of structured interviews applied in panel form to be .63, which indeed situates them among the best instruments for personnel selection. In recent years some studies have also been conducted with the aim of clarifying what the selection interview actually measures. For example, Salgado and Moscoso (2002) carried out a metaanalysis in which they classified interviews according to their degree of structuring: low-structure interviews (which would correspond to conventional interviews) and high-structure interviews (structured behavioural interviews). Their results showed that the two types of interview are related to different variables. Thus, conventional or low-structure interviews appear to be basically measuring general mental ability and personality characteristics, that is, when interviewers carry out this type of interview they focus on intrinsic factors of the candidate. However, highly structured or structured behavioural interviews principally measure knowledge about the job and work experience. Thus, such interviews concentrate on finding out whether the candidate would perform well in the job 1. AMETA The employment interview is a tenaciously popular but controversial selection method. In particular, reviewers of the interviewing literature repeatedly question the predictive validity of the employment interview (Arvey Campion, 1982; Mayfield, 1964; Milne, 1967; Reilly Chao, 1982; Rodger, 1952; Rowe, 1981; Schmitt, 1976; Ulrich Trumbo, 1965; Wagner, 1949; Webster, 1982; Wright, 1969). These reviewers of the interviewing literature have, however, aggregated interview validity coefficients in a subjective fashion, referred to as a narrative review by Hunter, Schmidt Jackson (1982), rather than utilizing an empirical approach. Specifically, these reviews do not adjust interview validity coefficients for differing sample sizes in each of the studies nor do they adjust for statistical artifacts such as sampling error, measurement error and restriction or range. As a result, conclusions drawn about the validity of interviews from narrative reviews may be misleading. Hunter et al. ( 1982) have advocated the use of meta-analytic techniques as a method of aggregating a number of validity studies while accounting for the abovementioned statistical artifacts. The purpose of this paper is to resolve some longstanding controversies in the interviewing literature by first presenting a model of the employment interview as a predictor of employment outcomes and then testing this model by subjecting a very large dataset of interview validity coefficients to meta-analytic procedures. In the Body group research studies and other types of literature (reviews, theoretical articles, case studies, etc.) according to common denominators such as qualitative versus quantitative approaches, conclusions of authors, specific purpose or objective, chronology, etc. summarise individual studies or articles with as much or as little detail as each merits according to its comparative importance in the literature, remembering that space (length) denotes significance. provide the reader with strong umbrella sentences at beginnings of paragraphs, signposts throughout, and brief so what summary sentences at intermediate points in the review to aid in understanding comparisons and analyses. In the Conclusion summarise major contributions of significant studies and articles to the body of knowledge under review, maintaining the focus established in the introduction. evaluate the current state of the art for the body of knowledge reviewed, pointing out major methodological flaws or gaps in research, inconsistencies in theory and findings, and areas or issues pertinent to future study. conclude by providing some insight into the relationship between the central topic of the literature review and a larger area of study such as a discipline, a scientific endeavour, or a profession. http://www.papelesdelpsicologo.es/english/1534.pdf PERSONNEL SELECTION IN INDUSTRY AND PUBLIC ADMINISTRATION: FROM THE TRADITIONAL VIEW TO THE STRATEGIC VIEW b) Interview The interview is without doubt the most widely used instrument for personnel selection, both in Spain and in all the other countries for which such information is available. The conclusion of numerous studies is that practically 100% of those recruited for a position must get through at least one interview during the personnel selection process (Salgado et al., 2001). For this reason it is clear that the interview merits special consideration among the set of instruments used for personnel selection. Over the last 70 years there have been periodical reviews of research on the validity of the personnel selection interview. Up to 1987 there had been 7 large-scale reviews of the literature, all of them concluding that the interview was characterized by low reliability, that is, first, that two different interviewers scarcely coincided in their appreciations of an applicant, and second, that their validity was low or even zero, and that they contributed nothing to the prediction of perfo rmance obtained through other instruments, such as cognitive ability tests. This raised a significant paradox: easily the most widely used instrument for predicting candidates job performance was an instrument incapable of predicting it. How, then, could the widespread use of the interview be explained? Possible responses to this question include: (1) The interview is an easy instrument to use. Practically anyone can, apparently, use it without the need for any particular qualification; (2) It is a highly versatile instrument, since it can be applied to any position, organization or situation; (3) It is the best means of getting to know candidates personally; (4) It permits candidates to explain personally their merits in relation to the post; (5) It allows the MULTIPLE PREDICTION OF JOB PERFORMANCE BASED ON THE BEST INSTRUMENTS AND VARIABLES Once the validity of the different personnel selection instruments (variables) and methods is known, we can establish the maximum degree of prediction that can be achieved through the NEW CHALLENGES FOR PERSONNEL SELECTION IN SPAIN Having established the predictive capacity of personnel selection procedures, it is worth considering the challenges to be met in the coming years. In our view, research on personnel selection in Spain will have to provide responses in relation to three crucial aspects: (a) the possible effects of indirect discrimination in selection procedures; (b) the economic utility of the procedures, and (c) legal modifications in the public administration context and their consequences for selection. Let us briefly consider these three challenges facing selection. GENERAL CONCLUSION In recent years, both in Spain and the rest of Europe, substantial progress in research on personnel selection has been made, and many of the limitations that previously affected this area have been addressed. Today, professionals involved in personnel selection have at their disposal a vast arsenal of instruments and access to a large body of research that enables them to establish the validity of these instruments, thus allowing them to choose the most suitable ones in accordance with their specific needs. As a consequence of such progress, the work of these professionals has been strongly endorsed, and their role in organizations has become increasingly acknowledged and appreciated http://www.le.ac.uk/oerresources/psychology/psa/unit5/page_03.htm Entrevista de trabajo http://es.wikipedia.org/wiki/Entrevista_de_trabajo De las distintas herramientas utilizadas en el proceso de seleccià ³n, la entrevista de trabajo aparece como la mà ¡s empleada (Muchinsky, 1986; Levy-Leboyer, 1990), muy por encima, con diferencia, del resto (referencias, tests, centros de evaluacià ³n, datos biogrà ¡ficos, grafologà ­a). La entrevista de trabajo es la fase definitiva, dentro de cualquier proceso de bà ºsqueda de empleo o de cambio de trabajo. Todos los pasos anteriores como la toma de informacià ³n, preparacià ³n, envà ­o, de la carta de presentacià ³n y seguimiento de currà ­culo, han estado dirigidos a conseguir una entrevista de seleccià ³n con la empresa. Es el momento del contacto personal, donde de una forma individual y directa, el entrevistado tiene la ocasià ³n de convencer al entrevistador de que à ©l es la persona idà ³nea para el puesto. Nos jugamos mucho en poco tiempo. Las caracterà ­sticas definidoras de la entrevista de seleccià ³n son que: a) se realiza a partir de un anà ¡lisis de puestos, b) es uniforme para todos los candidatos, c) los entrevistadores poseen un alto grado de formacià ³n especà ­fica y d) la decisià ³n de contratacià ³n se realiza despuà ©s de haber desarrollado todas las entrevistas (Campion, Palmer y Campion, 1997). Tipos de entrevista [editar] Individual: està ¡ndar o formalizada, informal, de choque o tensià ³n. Tambià ©n puede ser para verificar alguna cosa en concreto de las que figuran en el curriculum; por ejemplo: para saber si es cierto que el candidato habla inglà ©s. Si se trata de un puesto importante puede haber, là ³gicamente, varias entrevistas individuales. Colectiva: varios entrevistadores. En este tipo de entrevista es bastante frecuente que haya un psicà ³logo de empresa. Para ambas: puede ser directiva, no directiva o mixta (la mà ¡s comà ºn). Ventajas e inconvenientes [editar] La buena utilizacià ³n de la entrevista confiere a esta grandes ventajas tales como la posibilidad de indagar en aspectos no medibles ni observables por otras tà ©cnicas, o conocer personalmente al candidato. Posee, ademà ¡s, una gran flexibilidad en cuanto al tiempo que se puede dedicar y al nà ºmero de personas que se pueden entrevistar por dà ­a, asà ­ como la gran cantidad de informacià ³n que se puede recoger (Hough y Osdwald, 2000). Pero presenta tambià ©n diversos inconvenientes, sobre todo los relativos al alto coste que supone el tiempo necesario para su preparacià ³n, realizacià ³n y anà ¡lisis de la informacià ³n (al igual que la mayorà ­a de las tà ©cnicas cualitativas, pero sobre todo a la falta de preparacià ³n y formacià ³n en su utilizacià ³n debido a su aparente facilidad, de manera que muchos empresarios o directivos se sienten capacitados para preguntar a los candidatos. La realidad, sin embargo, es que la tà ©cnica de entrevista es difà ­cil y compleja, requirià ©ndose una gran capacitacià ³n y experiencia en su manejo (Bretones y Rodrà ­guez, 2008). Junto con estos inconvenientes, debemos seà ±alar, ademà ¡s, su bajo nivel de generalizacià ³n con respecto a otras pruebas de recogida de informacià ³n (Hunter y Hunter, 1984, Harris, 1989) sobre el comportamiento futuro de los candidatos (mà ¡s baja que las pruebas profesionales, tests cognitivos, centros de evaluacià ³n o las referencias, por ejemplo). De hecho, en los distintos estudios psicomà ©tricos realizados en su aplicacià ³n en los procesos de seleccià ³n de personal, se muestran coeficientes de fiabilidad y validez moderados. Una de las estrategias para superar tales carencias en cuanto a su validez serà ­a formular las preguntas a modo de incidentes crà ­ticos ocurridos al candidato en otras experiencias anteriores (cuà ©ntenos una experiencia concreta sobre cà ³mo resolvià ³ un problema con un empleado, por ejemplo), bajo el supuesto de que las conductas pasadas pueden predecir conductas futuras. http://proquest.umi.com.ezproxy.library.uq.edu.au/pqdweb?TS=1270715376SST=4sid=1moreOptState=CLOSEDSSM=CSQ=%28%28LSU%28%7BINTERVIEWS%7D%29+OR+LSU%28%7BINTERVIEW%7D%29%29+AND+LSU%28%7BVALIDITY%7D%29%29clientId=20806SSI=7RQT=305 http://www.questia.com/googleScholar.qst;jsessionid=L9ycFmx07DrRchbg8X4PJ9c6qyCJ8pWmPkRm2hW1yLtybbhmbk6j!450074560!-234547230?docId=5000120818 The employment interview: guaranteed improvement in reliability. Validity: Does a factor which is used in selection-for example, educational level or experience-actually predict job performance? Reliability: Does a selection technique produce consistent results? For example, References TOPIC: Reliability and Validity of Personal Interviews as a Selection Technique Research raises doubts about the VALIDITY and RELIABILITY of personal interviews as a selection technique INTRO DUCTION BACKGROUND Entrevista de Seleccià ³n http://www.aiteco.com/entrevis.htm#p4 La entrevista es, probablemente, el mà ©todo mà ¡s utilizado en la seleccià ³n de personal, al tiempo que es el elemento que, con frecuencia, tiene mà ¡s peso a la hora de tomar una decisià ³n respecto a la admisià ³n o no admisià ³n del candidato. A pesar de la profusià ³n de su uso,es uno de los instrumentos menos conocidos y peor utilizados de la seleccià ³n de personal. Por otra parte, las personas que la ponen en prà ¡ctica no tienen, frecuentemente, los conocimientos y destrezas necesarios para adoptar juicios à ºtiles respecto al candidato, ni utilizan una metodologà ­a que le permita obtener buenos resultados. La entrevista no ha demostrado, en general, poseer mucha validez, no obstante pensamos que debe seguir utilizà ¡ndose ya que, ademà ¡s de su funcià ³n selectiva, tiene otras de importancia tales como verificar la informacià ³n dada anteriormente por el candidato, presentar la organizacià ³n a à ©ste, establecer con el candidato una relacià ³n personal y dar a à ©ste la oportunidad de resolver algunas dudas respecto a su futuro trabajo. Por otra parte, la tà ©cnica de la entrevista de seleccià ³n puede ser realmente mejorada. En este sentido, numerosos estudios apuntan al formato a utilizar para incrementar la fiabilidad y validez de la misma. Hay que tener tambià ©n en cuenta que, normalmente, no debe de utilizarse como à ºnico elemento de evaluacià ³n, sino que debe acompaà ±arse con otros mà ©todos que completen la informacià ³n. Various processes are used to identify the most promising candidates; generally more than one process is used. Most organisations ask for a rà ©sumà © or job application from all candidates. A selected group of candidates is then invited to attend an interview, a system of tests, or an assessment centre, or some combination of these. There are two criteria which selection techniques need to meet if they are to be useful in predicting performance: Validity: Does a factor which is used in selection-for example, educational level or experience-actually predict job performance? Reliability: Does a selection technique produce consistent results? For example, a test in which the same person obtained the same score on a number of occasions would be considered more reliable than a test on which the same person obtained different scores on different occasions. POSITIVE ASPECTS XXXX NEGATIVE ASPECTS http://www.akronshrm.org/pdfs/Faking%20Interview.pdf   Faking interview.A Model of Faking Likelihood in the Employment Interview Structured interviews provide less opportunity for intentional distortion; however, some components of structure may actually increase faking. Finally, job candidates distort their responses in job desirable ways. The past research on IM in interviews has identified different tactics that job candidates may use to impress the interviewers. Job candidates may use IM tactics to present themselves in the best possible way without being dishonest or untruthful. For example, they may use self-promotion tactics to describe their existing job related credentials. Alternatively, job candidates might simply fake interview questions in order to provide the best answer. Moreover, many researchers suggest that people are surprisingly effective at convincingly faking their emotional expressions, attitudes, and even personality characteristics (DePaulo, 1992) and perceivers usually are unable to detect such faking (Barrick Mount, 1996; Furnham, 1986; McFarland Ryan, 2000; Sackett Harris, 1984; Sackett Wanek, 1996; Toris DePaulo, 1984). It could be argued that deceptive IM or faking represents a real threat to the validity of the interview. implies that deceptive IM does not add a constant to the scores of all applicants, but instead the relative standing of applicants and thus the predictive validity of the interview could be affected. On the other hand, some candidates might exaggerate a great deal about their responsibilities, skills, workrelated experiences during an interview. Faking in the Interview Impression management refers to the intentional distortion of responses to create a favorable impression and is distinguished from self-deception

Saturday, July 20, 2019

Media Manipulation Exposed in George Orwells Shooting an Elephant Essa

Media Manipulation Exposed in George Orwell's â€Å"Shooting an Elephant† The phrase â€Å"the power of the press† is used often, but what exactly is the power of the press? Since the beginning of news reporting, it’s been known that what actually gets into the news reports is monitored and carefully picked by higher authorities. What isn’t widely known, however, is that the media can use specific wording and phrases that, on the surface, look like normal news coverage, but are actually a technique of the media to control the images people see and the words they hear and read. From this, people then form their ideals, but are these actually ideals of those people if the media from which they based them off of was controlled to begin with? It is the power of the press to control and manipulate the public’s ideals by what is released in the media. In childhood, it’s evident from the start that the parents are the ones who hold the power. As the child grows and develops, the parents show him that they are in control by correcting the things he does wrong and by making it clear that they know more than he does about life. Until the child is old enough to create his own ideals of what is right and what is wrong, the parents shape his ideals for him. As the child grows older, however, the parents relinquish this hold on him and allow him to form his own ideals of the world around him. But as he ventures out in the world, is he actually forming his own ideals, or is he still being shaped by an even larger, more powerful source? In George Orwell’s Shooting an Elephant, Orwell suggests just that; one can form his own ideals, but they will either be changed by the media (symbolized in his essay by the Burmese natives) or constructed from... ...d and has left them with only the ideals which the press wanted them to have in the first place. The power of the press is not to share the truth about everything; it is the power to control what everyone thinks about everything. Works Cited Crocker, Brandon. â€Å"What Really Matters.† The American Spectator. 11 May 2004. Farah, May. Rev. of About Baghdad, pro. Sinan Antoon. The Daily Star. 30 June 2004. Franklin, H. Bruce. â€Å"From Realism to Virtual Reality: Images of America’s Wars.† The Brief Arlington Reader. Ed. Nancy Perry. Boston: Bedford/St. Martin’s, 2004. 384-400. Murphy, Maureen Clare. Rev. of Peace, Propaganda, and the Promised Land, dir. Bathsheba Ratzkoff & Sut Jhally. The Electronic Intifada 26 March 2004. Orwell, George. â€Å"Shooting an Elephant.† The Brief Arlington Reader. Ed. Nancy Perry. Boston: Bedford/St. Martin’s, 2004. 334-339. Media Manipulation Exposed in George Orwell's Shooting an Elephant Essa Media Manipulation Exposed in George Orwell's â€Å"Shooting an Elephant† The phrase â€Å"the power of the press† is used often, but what exactly is the power of the press? Since the beginning of news reporting, it’s been known that what actually gets into the news reports is monitored and carefully picked by higher authorities. What isn’t widely known, however, is that the media can use specific wording and phrases that, on the surface, look like normal news coverage, but are actually a technique of the media to control the images people see and the words they hear and read. From this, people then form their ideals, but are these actually ideals of those people if the media from which they based them off of was controlled to begin with? It is the power of the press to control and manipulate the public’s ideals by what is released in the media. In childhood, it’s evident from the start that the parents are the ones who hold the power. As the child grows and develops, the parents show him that they are in control by correcting the things he does wrong and by making it clear that they know more than he does about life. Until the child is old enough to create his own ideals of what is right and what is wrong, the parents shape his ideals for him. As the child grows older, however, the parents relinquish this hold on him and allow him to form his own ideals of the world around him. But as he ventures out in the world, is he actually forming his own ideals, or is he still being shaped by an even larger, more powerful source? In George Orwell’s Shooting an Elephant, Orwell suggests just that; one can form his own ideals, but they will either be changed by the media (symbolized in his essay by the Burmese natives) or constructed from... ...d and has left them with only the ideals which the press wanted them to have in the first place. The power of the press is not to share the truth about everything; it is the power to control what everyone thinks about everything. Works Cited Crocker, Brandon. â€Å"What Really Matters.† The American Spectator. 11 May 2004. Farah, May. Rev. of About Baghdad, pro. Sinan Antoon. The Daily Star. 30 June 2004. Franklin, H. Bruce. â€Å"From Realism to Virtual Reality: Images of America’s Wars.† The Brief Arlington Reader. Ed. Nancy Perry. Boston: Bedford/St. Martin’s, 2004. 384-400. Murphy, Maureen Clare. Rev. of Peace, Propaganda, and the Promised Land, dir. Bathsheba Ratzkoff & Sut Jhally. The Electronic Intifada 26 March 2004. Orwell, George. â€Å"Shooting an Elephant.† The Brief Arlington Reader. Ed. Nancy Perry. Boston: Bedford/St. Martin’s, 2004. 334-339.

Friday, July 19, 2019

Game Theory in Nature :: essays research papers

Game Theory in Nature: Biologists observe that animals and even lower organisms often behave altruistically. Such behavior is obviously beneficial for the species as a whole. Although it is difficult to measure how an animal’s altruistic behaviour affects its chances for survival and reproduction, theoretical research is starting to fill in the picture of how cooperation may survive natural selection. Some of the most illuminating ideas are coming from game theory, the field of mathematics that studies strategic behavior in competitive situations. For decades, game theorists' basic paradigm for the puzzle of cooperation has been the scenario called the prisoner's dilemma, in which each player has a powerful incentive to exploit the other. The game is set up so that cooperation is best for the group, but each player individually does better by taking advantage of the other. TIT FOR TAT: Things look rosier for cooperation in situations where a participant plays the prisoner's dilemma repeatedly with the same opponent and learns from previous games. After all, it can be risky to exploit someone you know you're going to encounter again. A player using the tit-for-tat strategy cooperates in the first round and then in each subsequent round mimics the opponent's behavior in the previous round. In a population containing a mix of defectors and tit-for-tat players, the latter generally do better, provided there are enough of them. When they meet another tit-for-tat player, both cooperate and get a high payoff. When they meet a defector, they get suckered once, but only once. If repeatedly losing the game translates into low fitness, often the defectors do so poorly that they eventually die out, leaving an entirely cooperative population. Ultimately, a better understanding of the interplay between cooperation and exploitation could help explain the emergence not just of cooperation but also of life itself. After all, life owes its origins to primeval acts of inanimate cooperation, in which RNA, proteins, and other molecules banded together to form cells. Game Theory in Nature :: essays research papers Game Theory in Nature: Biologists observe that animals and even lower organisms often behave altruistically. Such behavior is obviously beneficial for the species as a whole. Although it is difficult to measure how an animal’s altruistic behaviour affects its chances for survival and reproduction, theoretical research is starting to fill in the picture of how cooperation may survive natural selection. Some of the most illuminating ideas are coming from game theory, the field of mathematics that studies strategic behavior in competitive situations. For decades, game theorists' basic paradigm for the puzzle of cooperation has been the scenario called the prisoner's dilemma, in which each player has a powerful incentive to exploit the other. The game is set up so that cooperation is best for the group, but each player individually does better by taking advantage of the other. TIT FOR TAT: Things look rosier for cooperation in situations where a participant plays the prisoner's dilemma repeatedly with the same opponent and learns from previous games. After all, it can be risky to exploit someone you know you're going to encounter again. A player using the tit-for-tat strategy cooperates in the first round and then in each subsequent round mimics the opponent's behavior in the previous round. In a population containing a mix of defectors and tit-for-tat players, the latter generally do better, provided there are enough of them. When they meet another tit-for-tat player, both cooperate and get a high payoff. When they meet a defector, they get suckered once, but only once. If repeatedly losing the game translates into low fitness, often the defectors do so poorly that they eventually die out, leaving an entirely cooperative population. Ultimately, a better understanding of the interplay between cooperation and exploitation could help explain the emergence not just of cooperation but also of life itself. After all, life owes its origins to primeval acts of inanimate cooperation, in which RNA, proteins, and other molecules banded together to form cells.

Ishmael Essay -- essays research papers

Ishmael The book Ishmael, which was written by Daniel Quinn, is an adventure for the human mind and for society as a whole. Throughout the book Quinn explores many factual scientific principals, but the intent of the book is not to give one a lecture on science. The intentions of Quinn are to discuss and examine the beginnings and also the history of our ecologically dominating culture in which we live in. In this book, Ishmael is a telepathic, highly educated gorilla who explores with his fifth pupil the stories of the Takers and the Leavers. The Takers is a society in which man has freed himself from living day to day, through this wondering if he will be able to find food tomorrow. Takers believe that through technology they can achieve a perfect world where no one suffers from hunger, disease, and poverty. Ishmael though points out that through this search for this perfect world that this has lead to the desecration of the Leaver culture and a decline in community diversity; humanity mus t find a different way to live. The Leavers are a different culture with a different outlook than the Takers. The Leavers live within their means and do not exempt themselves from the laws of competition. From Ishmael, â€Å"The Leaver lifestyle it’s about letting the rest of the community live---and agriculturalists can do that† (Quinn 250). Leavers see the world before the humans as orderly, and in perfect working condition. As a result of the Leavers not producing excessive food their numbe...

Thursday, July 18, 2019

Smartphone Competition

Sizable market: Nowadays, more and more people tend to spend more time on telephone, from exhibit 1 we can see that each person almost spend 14 minutes on smart phones for playing games (Shane Richmond, 2012). What is more, 33% of people are playing games via smart phone and 25% people are playing games via handled devices (esa, 2012). These data indicates that more people prefer to play games on smart phones than other devices, and people are willing to spend more time on smart phones to play games.Especially, from the survey we can know that all respondents they hold smart phones, which means this market is extremely sizable based on the large users. What is more, Phantom Company is small company, which means that they do not have enough funds to create games on diverse devices, and they do not have sufficient resources and experts to create games on diverse devices. Therefore, smartphones can be the proper platform for Phantom Company to create games. Opportunistic market: Further more, if the company can focus on creating games on smart phones in Canada, the market size will be attractive.That’s because there are 10. 5 million smart phone users in Canada, the number of users may increase to 16. 4 million by 2016 (Innovation Report 2012 Trend Watch, 2012), and 60% of smart phone adults users prefer using cell phones to play games, which means that all of these user can be the potential target customers for Phantom Company. Especially, all of them are adults, they have purchasing power for the game apps, if the company can attract these people, and they can have lucrative market in the smart phone game industry. Profitable market:Based on the survey we can see that most respondents are willing to pay more money on quality games, especially most of them has purchasing power, therefore, as long as the games are attractive for these people, this smart phone market can be profitable. Competition: The smart phone game market is good news for customers, becau se it creats convenience, flexibility, and more entertainments for life. However, the fierce competition will put pressures on companies. Firstly, which brand Phantom should launch their phones. There are divers brands of phones in the arket, these brands possess diverse kinds of games on their phones, for example, Samsung Electronics, LG Electronics, HTC, Apple, Motorola, and RIM. The highest market share smartphone is Samsung, which is 26. 0%, and LG’s is 17. 7%, Apple occupy 17. 5%, Motorola is 10. 9% and HTC is 6. 2%( Eric Abent, 2012). This fact shows that Phantom should choose carefully for which brand to launch their games in order to game more people to play and have profitable market in the future. Secondly, the video game competition in Canada is fierce. There are currently 348 video game companies operating in Canada.The average Canadian Video Game Company employs 45 people, and there are more game companies in Ontario than other provinces, which mean that all of t hese companies are Phantoms’ direct competitors (Matt Hartley, 2011). Especially, there are lots of famous companies in Montreal, which means it will be tough for Phantom to compete with these mature video companies based on its scarcity of expert resources and innovation capabilities, and brand recognitions. Competitions during the industry: There are diverse competitors in the video game industry in Canada.There are three famous video game companies, where were listed top 10 video game companies in 2012. These companies are Toronto’s XMG Studio, Montreal’s Gamerizon, and Toronto’s Capybara Games (Knowlton Thomas, 2012). These companies are well-known companies that lead to high reliability and loyalty in the market. What is more, famous and big companies posse sufficient expert sources and innovation capabilities, which are the key successful factors for the video game companies. Especially, these companies have sophisticated experiences on developing m obile games in the past.Subsequently, these company posse diverse advantages, which Phantom needs and lacks. In addition, more and small companies are established these days in Canada, they are also competing with Phantom now. They may have similar capabilities with Phantom, or they may have more funds than Phantom to develop more innovative games than Phantom. These companies also threaten to Phantom’s future. Appendixes: Exhibit 1: Source: Shane Richmond, 2012 http://www. telegraph. co. uk/technology/mobile-phones/9365085/Smartphones-hardly-used-for-calls. html References Shane Richmond, June 29, 2012.Smartphones hardly used for calls. Retrieve on November 8, 2012 from: http://www. telegraph. co. uk/technology/mobile-phones/9365085/Smartphones-hardly-used-for-calls. html esa, 2012. Game player data. Retrieve on November 8, 2012 from: http://www. theesa. com/facts/gameplayer. asp Innovation Report 2012 Trend Watch, August 2012. Retrieve on November 18, 2012 from: http://www. newmediatrendwatch. com/markets-by-country/11-long-haul/45-canada? start=2 Eric Abent, November 2012. Comscore deliver mobile market share report for September 2012. Retrieve on November 8, 2012 from: http://androidcommunity. om/comscore-delivers-mobile-market-share-report-for-september-2012-20121102/ Matt Hartley, May, 2011. Canada’s gaming industry is kicking  butt. Retrieve on November 18, 2012 from: http://business. financialpost. com/2011/05/30/canadas-home-grown-video-game-industry-shines-on-international-stage/ Knowlton Thomas, March 30, 2012. Three Canadian Companies Named in Worldwide List of Top 10 Mobile Game Developers to Watch in 2012. Retrieve on November 18, 2012 from: http://www. techvibes. com/blog/three-canadian-companies-named-in-worldwide-list-of-top-10-mobile-game-developers-to-watch-in-2012-2012-03-01