Friday, February 14, 2020

Cross-cultural management Essay Example | Topics and Well Written Essays - 2500 words

Cross-cultural management - Essay Example Then and only then the cultural importance demanded a better understanding of the market forces. Another factor that contributed to nonchalance was the fact that the markets really lay elsewhere. The real market was always back at home for which the trading primarily took place. Obvious examples are the markets in Great Britain and Europe for whom the Eastern delicacies and materials were procured and either sold or manufactured for mostly local consumption. Here the targeted segment of the market was the affluent British or the Europeans populations. Hence the need to develop management practices for the overseas suppliers like India was never really felt or needed. India was basically considered a supplier of resources which were needed elsewhere and in those days this supply chain needed no managerial input except to get hold of materials at the lowest possible cost. All management skills of marketing and competition were practiced in UK and Europe. That is not to say that back then there was no market in India. While it is true that the products manufactured in UK were in demand in India, yet the market was highly concentrated with only the rich who could afford these goods and they lapped it all up with need to market the same as these were rarities for them and their dominated minds were already in favour of these products over local wares. Little or no management skills were required to organise this effort. Times however changed. Countries like India grew in affluence and capabilities, they out grew the Worldwide Empire and local Maharaja Modes and became independent and largely democratic. The local population became more educated and aware of themselves as well as the world around them. Above all, they became consumers and large enough to deserve attention resulting in need for better management practices by the same western companies who earlier felt no need for the same. As a result

Saturday, February 1, 2020

Research methods applied to the cyber crime like identity theft( use a Thesis

Research methods applied to the cyber crime like identity theft( use a proper name if you want) - Thesis Example Such developments has made communication a second’s task, where a large amount of data and information can be collected and used for a number of purposes easily. However, these developments can be seen as positive for human beings, but these can also be seen as a negative phenomenon. It is usually called as the â€Å"double edged sword†, where it has both bright and dark sides. Though computer and information technology has proved to be much useful for communication and business development, but it has also created new ways for doing illegal or criminal activities (Gordon, Hosmer, Siedsma, & Rebovich, 2003). A number of commercial websites are performing business activities online, or others using computers to gather and accumulate critical information in order to use it for business purposes. Such businesses have been nowadays facing the issues of misuse of information or other kinds of crimes with regard to the sensitive information. In order to combat these criminal and delinquent activities, they have to perform overwhelming, and expensive job of safeguarding their critical information, which can be used for delinquent actions. In these days, it is easier to do crime, as criminals are able to encode the data, which is showing some proofs against their delinquent actions, and also transfer such data regardless of having fear of being noticed from Police side or Law agencies. Such criminal activities has made it more complex to detect any corruption. As the internet has astonishing effects on this area, where it is being impossible to detect a person due to the fact that the crime can be held regardless of any geographical area. This situation has convoluted the enquiry of cybercrime to the greater extent (Gordon, Hosmer, Siedsma, & Rebovich, 2003). In this regard, there are a number of new studies and fields of a study are emerging, and among these a Cybercrime Science is such an evolving field of study targeting to thwart the