Thursday, November 28, 2019
International and local firms that operate in China
Introduction The economic growth of China has attracted the attention of many professionals who try to evaluate the long-term implications of this phenomenon. This paper is aimed at examining the competitive strength of international and local firms that operate in China. Furthermore, it is important to discuss the social effects of this economic development.Advertising We will write a custom essay sample on International and local firms that operate in China specifically for you for only $16.05 $11/page Learn More These questions are important because the increasing manufacturing capacity of Chinese firms can affect millions of people throughout the world. Apart from that, this issue can play an important role in international relations. This is why these questions should not be overlooked. Much attention should be paid to such a term as competitiveness which can be defined as the ability of producers to retain or increase its market share (Hong 2008, p . 33). These questions can be examined by looking at the operations of domestic and foreign firms that manufacture their products in China. Overall, it is possible to argue that the competitive strength of these organizations is based on the ability to reduce operational expenses and lower the price for their products. Furthermore, one can identify several impacts such as the improvement of living conditions in China and increased activism in this country. Apart from that, one should speak about the growing unemployment in advanced countries and intense competition in the labor market. Competitiveness of domestic and foreign manufacturing companies While evaluating the performance of Chinese-based firms, scholars focus on several aspects. In particular, the competitive advantage of these organizations relies on the surplus and low cost of labor force (Steinfeld 2008, p. 1971). Additionally, economists believe that the majority of exports from China are not technology-intensive (Zhan g 2007, p. 94). In other words, these products are not based on some unique and innovative design that can create extra value for users. Apart from that, these enterprises do not employ technologies that can dramatically increase the volume of production (Zhang 2007, p. 94). More importantly, a significant proportion of Chinese exports are produced by the affiliates of American or European companies that can bring new technologies to this country (Zhang 2007, p. 94). Therefore, manufacturers located in China can be very diverse, but they benefit from the excessive supply of labor. These are some of the main aspects that can be identified.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Nevertheless, one should remember that labor-intensive production can often give significant advantage of to Chinese manufacturers. For instance, the prices for Chinese products are lower by 30-50 percent low er than the prices set by American-based manufactures (Pan 2009, p. 9). In some cases, these prices are even lower than the cost of materials in the United States (Pan 2009, p. 9). This is one of the reasons why these organizations can increase their market share. Apart from that, many Western firms decided to move to China in effort to decrease their operational costs. This strategy has been affected by high-tech companies such as Apple, Google, or Nokia that prefer to assemble their products in China. These corporations have indeed increased their competitive strength; this is why this policy is adopted by other firms. This is one of the main points that can be made. These examples suggest that the strength of Chinese manufacturers relies on the labor-intensive production. This argument is particular important when one speaks about domestic companies which do not usually manufacture innovative products. In turn, some of the foreign firms can rely on the technology-intensive produc tion, but at the same time, they can benefit from the surplus of labor. Nevertheless, these organizations use the component parts that came from the United States, Japan, Europe, or South Korea (Steinfeld 2008). Therefore, one should not suppose that China dominates every aspect of the global production. This is one the issues that should be taken into consideration. Social effects of Chinese economic development Overall, the trends that were described in the previous sections have several important implications. First of all, the economic growth of China gradually increases the welfare of local workers (Appelbaum 2008, p. 69). Certainly, their income level does not correspond to the standard of living set in North America or Japan. However, even these relatively low wages can be regarded as a significant improvement in comparison with previous years. These benefits were available mostly to people living in urban areas of the country (Appelbaum 2008). This is one of the first effect s that should be identified.Advertising We will write a custom essay sample on International and local firms that operate in China specifically for you for only $16.05 $11/page Learn More Another important issue is the growing movement in support of trade unions. Researchers argue that the large concentration of workers in a relatively small area results enables them to join their efforts in order to protect their rights (Appelbaum 2008). This issue is important when one speaks about frequent abuses of workers in China (Appelbaum 2008). Additionally, increasing interaction among workers can lead to the increased activism. So, the economic development of this country can eventually influence the political culture of this country (Appelbaum 2008). This is one of the main impacts that researchers speak about. So, the growing manufacturing capacity of Chinese businesses can significantly transform this country. Yet, the long-term effects of this tendency ca nnot be accurately predicted. Finally, it is important to remember that the economic growth of China influence many people living in the advanced countries. First of all, many European and American firms choose to outsource their operations to China since in this way they try to decrease their costs. This process decreases the number of jobs that are available to local workers. Thus, the competition in the global labor market has also increased. This is one of the impacts that should be taken into account. Furthermore, the increased strength of Chinese manufacturers decreases the market share of Western manufacturers. As a result, many of these firms are forced out of business (Pan 2009, p. 9). Therefore, the economic development of China has implications for millions of people who may not be living in China. Conclusion This discussion indicates at several important issues. First of all, local and international companies rely mostly on the labor-intensive production which means that they have access to less expensive labor. This is how they gain competitive advantage over their major rivals. This tendency can affect various societies. In particular, it can lead to the relative improvement of living standards in China. Furthermore, this trend can eventually result in the political transformation of China. Finally, one can argue that this development can influence millions of people who have fewer opportunities for finding a job. So, this process makes the global market more competitive. These effects should be taken considered by people who examine the social development of China as well as other countries. References Appelbaum, R 2008, ââ¬ËGiant Transnational Contractors in East Asia: Emergent Trends in Global Supply Chainsââ¬â¢, Competition Change, vol. 12 no. 1, pp. 69-87.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Hong, W 2009, Competitiveness in the tourism sector: a comprehensive approach from economic and management points, Springer, New York. Pan, C 2009, ââ¬ËWhat is Chinese about Chinese Businesses? Locating the ââ¬Ërise of Chinaââ¬â¢ in global production networksââ¬â¢, Journal of Contemporary China, vol. 18 no. 58, pp. 7-25. Steinfeld, E 2004, ââ¬ËChinaââ¬â¢s Shallow Integration: Networked Production and the New Challenges for Late Industrializationââ¬â¢, World Development, vol. 32 no. 11, pp. 1971-1987. Zhang, K 2007, ââ¬ËInternational Production Networks and Export Performance in Developing Countriesââ¬â¢, The Chinese Economy, vol. 40 no. 6, pp. 83-96. This essay on International and local firms that operate in China was written and submitted by user Rihanna Key to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Wednesday, November 27, 2019
Caregiver vs. Caretaker
Caregiver vs. Caretaker Caregiver vs. Caretaker Caregiver vs. Caretaker By Maeve Maddox A reader wonders about the difference in meaning between caretaker and caregiver: It seems to me that they should have opposite meanings. Is there a difference in usage? Although ââ¬Å"to giveâ⬠and ââ¬Å"to takeâ⬠describe opposite actions, caretakers and caregivers both mean ââ¬Å"people who provide care and attention.â⬠Caretaker has been in the language since the mid-1800s. Its earliest meaning was ââ¬Å"one who takes care of a thing, place, or person; one put in charge of anything.â⬠Here are two early examples of the usage given in the OED: The souters wife..was servant to Gilbert Brown..and..acted as nurse and care-taker to Agnes his daughter. (1858) The caretaker of the house met them, hat in hand. (1859) Caregiver is a newcomer that entered American English in the 1960s and migrated to British English in the 1970s. It means ââ¬Å"a person, typically either a professional or close relative, who looks after a disabled or elderly person.â⬠Caregiver can also refer to a parent, foster-parent, or social services professional who provides care for an infant or child. According to estimates from the National Alliance for Caregiving, during the past year, 65.7 million Americans (or 29 % of the U.S. adult population involving 31 percent of all U.S. households) served as family caregivers for an ill or disabled relative. In modern usage, caretaker is sometimes used with the same sense as caregiver, but itââ¬â¢s more commonly used with these two main meanings: 1. noun: a person who looks after property: Alan John, caretaker at Buckholme Towers School in Lower Parkstone for 17 years, died in June this year at Forest Holme Hospice. St. Louis looks to overhaul Soldiers Memorial, find new caretaker 2. adjective (or attributive noun): designating a government, administration, etc., in office temporarily: CAS Coovadia, the MD of the Banking Association of South Africa, has been appointed as the caretaker CEO of Business Unity South Africa (Busa) while the business organisation looks for a new CEO. Bulgarian president names new caretaker government A group of people being looked after by a caregiver is called a ââ¬Å"care group.â⬠An individual being looked after by a caregiver may be called anything from ââ¬Å"Mr. Jonesâ⬠to ââ¬Å"Momma.â⬠Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Misused Words category, check our popular posts, or choose a related post below:85 Synonyms for ââ¬Å"Helpâ⬠Using the Active Voice to Strengthen Your Writing9 Forms of the Past Tense
Sunday, November 24, 2019
Civil Rights Movement and The Clansman essays
Civil Rights Movement and The Clansman essays "The film is many things: repulsive, naive, biased, simplistic, historically inaccurate and astonishing in its view of history and racist glorification of the KKK. Yet it tremendously significant and powerful work of art with extraordinary effect and brilliantly-filmed sequences" (Dirks). The movie was based on one man's simple but yet repulsive story. The flaw in past American actions that can well be seen is in a group of white men named the Klu Klux Klan, who were re-influenced into their hateful rage by one man's Romantic novel, called The Clansman. The book, The Clansman-An Historical Romance of the Klu Klux Klan, was written by Thomas Dixon Jr. Growing up during the reconstruction era, he was imbued with the folk image of the Klan as the savior of the south (Kinney). When he grew up he wrote 22 novels and plays about social defects, but before that he was a southern minister. He befriended 3 presidents, including Woodrow Wilson (Cook) who he attended John Hopkins University with. As a student reading Darwin, Huxley, and Spencer, he suffered a brief period of religious doubt. But he rebounded stronger and went on to lecture on denying blacks of political equality and denying women of working out of the house (Kinney) All though, his work is mainly shunned, Dixon clearly foreshadowed the politicized television evangelists of the modern south. Perhaps the main reason he wrote the book was to express his ideas on what he felt would happen in real life. From his own beliefs, black men were horrible crazy men with only one thing on their mind, while women were innocent and helpless. With these two characters there needed to be a hero and so knowing from his own standards that the clan was the savior of the south and perhaps the nation, he used the clansman to serve as the hero in the novel, the super most being in the whole story. The book its self is a vivid portrayal of the aspects of the reconstruction. For example, the idea ...
Saturday, November 23, 2019
Research Paper on Corporation and Security of Staff Devices
Research Paper on Corporation and Security of Staff Devices Research Paper on Corporation and Security of Staff Devices Abstract In the past, people could only use computers owned and managed by a company, and no one would think of lugging in their personal computers (PC) to use in the company. However, today, many things have become quite different. Many employees use personal devices such as tablets, smart phones, and many other gadgets that promote efficacy in communication. The use of these handheld devices by the staffs within an organization has provided services as well as a constant connectivity to workers. Despite the merits of new technological devices in a corporation, they are presenting new threats to the corporate assets (Mitchell, 2004). Research Problem The employeesââ¬â¢ personal devices are causing ongoing concern in most companies concerning information security. For example, there are sensitive corporate information which can easily be transported as well as lost by using these devices. However, the Bring Your Own Device (BYOD) movement in most organizations has led to an increasing number of expensive security incidents. The main problem in this case is that most corporations are still relying on the staff personal devices such as personal laptop for business (Loader, Biggs, 2002). These ancient devices do not have the same security level than those of the company leading to serious security threats to corporate information. This research proposal will discuss on the use of personal devices within the corporate as well as the security issues associated with the use of these devices (Burke, 2006). The issue of security level has become very problematic to many organizations since the employees using these devices usually jeopardize company security through loss and theft, malware, spam, phishing and Bluetooth (Zachary, 2004). It is evident that the use of staff personal devices is growing rampantly and affecting the corporate of all sizes. Therefore, the organizations that allow their staff to bring in personal organization in the premises should ensure that there is proper security implemented to control these risks (Quigley, 2008). From the research collected in various organizations, it is indicated that about 93% of the staffs have mobile devices that connect to the corporate networks and 67% allow personal devices to connect to corporate networks. It is also evident that the staff personal devices are causing challenges especially for the corporate IT security department (Mitchell, 2004). Most of the companies that allowed personal devices to access their networks, it was reported that the employees used their own smart phones, tablets, and other devices to handle business information leading to security issues (Zdziarski, 2008). The most common challenge faced by the IT corporations include the secu rity breaches particularly regarding the corporate information, tracking and controlling access to corporate and private networks, and managing personal devices containing the corporate as well as personal data and applications (Relationship and Resource Management in Operations, Securities Institute Operations Management, 2003). Aim of the Research The research proposal will discuss the corporation reliance on staff using their personal laptop, smart phones for business purposes. The justification for focusing on this issue is that the employeesââ¬â¢ personal devices seem not to possess the same security level like those of the company. The aim of this research paper is to contribute to the understanding of various risks issues that are brought upon by using personal devices within an organization (IFPO, 2010). Significance of the Research Most staff members often feel comfortable using their own devices as opposed to using the corporate machines. In the United States of America, about 46% of the businesses are today allowing their staffs to use personally owned PCs (Steinberg, 2007). Several researches in this sector, such as the information technology research and advisory company continue reporting that in the future, employers will require their employees to supply their own devices to be used for business purposes (Lee, Swartz, 2007). Today, the significance of using personal computers is mainly focuses on the factors of choice and convenience for employees as well as saving costs for the employers. Most corporations rely on the staffsââ¬â¢ personal devices because they cause a significant time shift in the working behavior of the employees (Keyes, 2010). However, some corporations that allow staffs to carry their personal devices in the company have become successful in certain respects (Winch, 2010). For ins tance, the devices enable employees to conveniently send and reply to emails at any time, and from any location. This particularly applies to situations where the staff members are taken to do a field research by the organization (Reddy, 2010). Personal devices have enabled catching up on emails to be quite easy and fitted with employee performance. By using the devices, employees quickly handle even the most challenging tasks by relying on the personal devices for communication while managers can obtain prompt responses to their enquiries as well (Keyes, 2002). The other benefit of using personal devices in corporate is that the users will find the devices to be always at hand as compared to big machines implemented within the organizations. Therefore, staff members tend to have ready access to the businesses, personal information as well as check on the organizations latest business figures. The ready access to information offers a greater choice in a way the staff members work (Mahmood Szewczak, 2010). Research Methodologies Mobility can bring both advantages as well as risks to the corporate. As the staff members bring their personal devices into the workplace, most organizations are motivated to encourage the use of these devices for business purposes because they increase employee productivity within the premises (Lucas, 2012). Personal devices especially the portable ones can give the employees access to the corporate resources and continuous collaboration with business partners. The other advantage of using these devices is that they reduce the IT costs by allowing employees to often pay for their own personal devices rather than rely on the ones provided by the company. Therefore, most companies save IT spending on the device purchases and communication services (Zdziarski, 2008). The research also showed that the use of personal devices for work has become very consistent across all the sampled companies (Winch, 2012). Little variation was seen in the number of businesses claiming that they have p ersonal devices on their corporate networks, from the smallest business, which is about 65 % to the largest 68%. Corporation reliance on employees using their personal laptops and smart phones would promote productivity as this allows flexibility and mobility (Wolowitz, Tharp, Rubin, 2010). However, over-reliance on employeesââ¬â¢ personal gadgets would compromise the security of corporate data and information. Therefore, the corporate needs to recognize that when the employees connect mobile devices to the organizations systems, the devices must then be treated just like any IT equipment with appropriate security controls (Keyes, 2010). The security issues of these devices should be addressed by the corporate at the outset because the devices used may become a point of security weakness, which threatens to disclose business information. It is evident that most hackers have discovered that the staff members carrying their personal devices to the corporate may have linked both business and personal data within the system (Snoyer, 2004). Therefore, it would be easy for the hackers to get more and more information regarding the corporate. Given that personal devices platforms have not been natively designed to provide comprehensive security, hackers have a strong incentive of developing new techniques or create the mobile-centric malware for the devices (Zdziarski, 2008). Access to Data The access of data to this research proposal will be gained by using both the primary and secondary sources. The data will also be collected using interviews and questionnaires for the corporate who allow their workers to bring in their personal devices to the organization. Access to these data will not be conditional because many corporate have for many years endured security issues in regards to allowing the staff to bring in their personal devices to the organization (Burke, 2006). Ethical Issues In the research Employees can compromise the security of a corporation by abusing their personal devices in various ways (Schultz, 2006). For instance, they may use these devices for other functions other than the stipulated official purposes. Blogging and spending so much time on social networking sites are other forms of abuse that eat into staff working hours and bring unnecessary costs to the organization (Melky Harnest, 2010). These issues can be addressed by pre-programming the devices or network proxy for authentication and access control. Conclusion Employees who bring their personal computers within the corporate usually do this for personal convenience and they are privy to the fact that they are publicizing their preferences even to hackers. The number of organizations that allow their staff to use their personal devices such as smart phones and iPhones are at an all-time high because these companies tend to give the employees greater say over their used devices. Today, workers on the other hand are also driving the tablet sales and point to tablets as the preferred method of consuming content. Caution should be taken by the corporations and employees to ensure that corporate information is secured away from the reach of hackers. Visit our research paper writing service which will help you with writing a research paper on any topic and discipline. Just visit our writing company!
Thursday, November 21, 2019
UV Index Forecast Essay Example | Topics and Well Written Essays - 250 words
UV Index Forecast - Essay Example There are five categories for UV index, level 1-2 (low--can safely enjoy being outside), level 3-5 (moderate--take precautions by wearing a hat and sunscreen SPF+15; seek shade during midday hours), level 6-7 (high--protection against sun damage is needed; use sunscreen SPF+15; wear long sleeves and pants where applicable), level 8-10 (very high--protection against sun damage needed; try not to be outside between 10am-4pm; shirt, hat sunscreen are a must; seek shade) and level 11+ (extreme--same as very high category). The UV Index is a next day forecast of the amount of skin damaging UV radiation expected to reach the earthââ¬â¢s surface at the time when the sun is highest in the sky (solar noon). The amount of UV radiation reaching the surface is primarily related to the elevation of the sun in the sky, the amount of ozone in the atmosphere, and the amount of clouds present. The UV Index can range from 0 (night time) to 15 or 16 (in the tropics under high elevations with a clear sky). The higher the UV Index, the greater the dose rate of skin damaging and eye damaging UV radiation. The higher the UV Index, the smaller the time it takes before skin damage occurs. Ultraviolet (UV) radiation is a specific part of the sunââ¬â¢s entire spectrum of wavelengths. UV-C spectrum is entirely absorbed by atmospheric ozone adn does not reach the earthââ¬â¢s surface. UV-B is mostly absorbed by the ozone, but can affect plants and animals, and affects humans by reddening of the skin, and possible development of skin cancer. UV-A radiation is needed by humans for the synthesis of Vitamin-, but too much UV-A causes toughening of the skin and other irritations. The variation throughout the day of UV radiation is much like that of visible light. The UV Index is a forecast of the probable intensity of skin damaging ultraviolet radiation reaching the surface during the solar noon hour (11:30-12:30 local time).
Trust of leadership Essay Example | Topics and Well Written Essays - 750 words
Trust of leadership - Essay Example Trust is the only way to make people follow you, thus every leader should do his/her best to gain trust. First of all, it is important to understand that trust depends on healthy communication. Leaders should be able to listen and promote honesty in workplace relations. In every company communication is a tool to create understanding between employees and senior managers (Lord et al, 1986). Leaders should improve their communication skills in order to establish healthy relationships with employees. Relations at the workplace should be based on the mutual respect and ethical principles established in the organization. Leaders should take care about workplace ethics as it should be among the top priorities. ââ¬Å"Most people don't know how to think about the organizational and societal consequences of low trust because they don't know how to quantify or measure the costs of such a so-called "soft" factor as trust. For many, trust is intangible, ethereal, unquantifiable. If it remains that way, then people don't know how to get their arms around it or how to improve it. But the fact is, the costs of low trust are very real, they are quantifiable, and they are staggeringâ⬠(Covey). In order to make people trust you it is essential to try to meet their needs. A leader should help workers feel comfortable at the workplace. Many people appreciate responsive leaders, who do not stay indifferent to their needs and remember that people are not robots. It is a real art and not an easy task for leader to be responsive and exacting at the same time, but all of the leaders should try to manage this art and adopt the way of behavior that would allow them to gain employeesââ¬â¢ trust and not to lose authority at the same time. ââ¬Å"The job of a leader is to go first, to extend trust first. Not a blind trust without expectations and accountability, but rather a "smart trust" with clear expectations and strong accountability built into the process. The best leaders al ways lead out with a decided propensity to trust, as opposed to a propensity not to trustâ⬠(Coveyà ). Leaders often make serious mistakes by making decisions themselves not sharing their plans with the employees. People usually do not like to follow orders not knowing what they are taking efforts for. They want their employers to value their creativity and to provide them with the opportunity to express it. All the important decisions taken by the leaders of the company should be agreed with the employees. If employees take part in the decision- making process, they will understand that their leaders trust their opinion and, moreover, they need it. That will make employees trust their leaders and believe in them (Lord et al, 1986). The main task of a leader is to make his/her subordinate believe that they are working for both the benefit of the company and their own benefit. In every organizing there should be a spirit of a goal that is the one for everybody and everyone sho uld try to do his/her best to achieve this goal. Employees should believe that reaching the goal of the company will help them reach their own goal and this is the guarantee of success (Lord et al, 1986). Trust is the most important component in leadership. Employees who trust a leader will follow all his/her requirements. The performance of the company will also gain if employees trust their leader. Thus, leaders should take effort to make employees tr
Wednesday, November 20, 2019
Legal case study memorandum Example | Topics and Well Written Essays - 500 words
Legal memorandum - Case Study Example 2. Forestland and Ecoland is both signatory of GWA that requires reduction in carbon emissions. The two states have devised measures to deal with the issue. Forestland have built on dams and Ecoland have introduced ECTR, patent and labeling regulations. 3. ECTR levy tax depending on the level of carbon emissions with the higher the carbon the higher the tax. ECTR classify RecycloFuel as carbon-neutral manner (ââ¬Å¾BCNsââ¬Å¸), while ForestFuel as non-carbon-neutral manner (BCsââ¬Å¸) on the grounds that forest fuel powered by hydroelectricity emits carbon emission. Nevertheless, there is no conclusive evidence that this is true (Prezi, 2015). 4. Eco-labeling mandates the labeling of the products depending on the fuel used. Products made from RecycloFuel are labeled using a ââ¬Å"happy marmotâ⬠label, product made from ForestFuel have ââ¬Å"unhappy marmotâ⬠label and products made from fossil fuels have ââ¬Å"furry marmot unfriendlyâ⬠5. Section 66. 6 requires no patent to inventions directed in prevention of commercial exploitation in which it is necessary to protect the public or morality comprising of animal and plant life or health, humans or to avoid grave consequences on the environment. 6. Ecoland in this case wish to protect, a special species, marmot that helps in distribution of Ecolandian Fir tree, the main source of biofuel. The climate has changed in the last five years with a drop in ski slopes and global warming that has consequently saw a reduction in Fir trees. In this effort, Ecoland is trying to have eco-label to protect the environment. The Indonesia government brought the case forward to the panel in respect to clove cigarette labeling regulations. US in this case had prohibited production and sales of cigarette with cloves. The panel ruled out that the aimed at improving public health to smokers. Canada and Mexico brought a case the TBT panel in regard to the action of US on labeling regulation. The
Subscribe to:
Comments (Atom)