Friday, February 14, 2020

Perception of Leaders' Decision Making Dissertation

Perception of Leaders' Decision Making - Dissertation Example This essay declares that the research will also employ correlation collection design to gather information from workforce with the aim of determining the relationship between perception of leader’s decisions making and organizational culture. This design enables the identification of connection among variables. It is an effective and accurate information gathering method. The design allows generalization from a selected sample to the main study population therefore; inferences are easier done with fast turnaround and reduced costs. The employees will be required to first work on individual basis and second as team to answer various questions in the survey. The respondents will be requested to offer the organizational structure views, to rate their leader’s decision-making perception, the effectiveness of their company culture and leadership. This will be the age and the job status of the participants. This paper makes a conclusion that a leader’s decision-making is a pertinent in an institution who guides procedures, organizations and processes. Experts agree that by performing these tasks, a leader’s decisions act to manipulate culture or altering its aspects. Therefore, leader’s choices act to alter procedures and formal administrative process of an organization. Leaders’ decision-making play a critical task in altering organizational performance and the nature of results of the organizations influence the structure directly.

Saturday, February 1, 2020

The Value of Digital Privacy in an Information Technology Age Research Paper

The Value of Digital Privacy in an Information Technology Age - Research Paper Example In the wrong hands, unauthorized access to information may lead to the destruction of vital information or usage of information for destructive purposes. Another way through which individuals can access private information is through phishing. Spear-phishing, in particular, has become increasingly common. It involves hacking individuals’ computers or accounts by sending e-mails to individuals’ accounts. These e-mails often get citizens to provide sensitive information. They are personal, crafty and deceitful messages that easily pass security protections. According to security software maker RSA, about one in every 300 emails in 2011 was a phish. Data cables are also used to access private information. Network cabling companies collect personal and non-personal information. Different cabling companies have different terms of use in regard to privacy. The companies, through their websites, collect information ranging from names, physical address, e-mail address, age, pas sword and other information necessary to conduct business with these companies. This information may then be used to facilitate citizens’ use of websites, to send information to citizens and to conduct business. ... Access to private information may lead to crimes such as identity theft, fraud, defamation, slandering and discriminatory practices. Also, gaining access to confidential information increases the risks of such information being disclosed. This causes dissatisfaction and encourages mistrust in individuals. In America, identity theft has become increasingly common and it destroys an individual’s financial reputation. Invasion of personal privacy shows inefficiency on the government’s part and other organizations that keep citizens’ records. Access to private citizen information through computer applications has greatly facilitated investigations into financial crimes, drug crimes and sex crimes (Soghoian, 2011, 18-20). Therefore, law enforcers are able to track crimes across borders. Because criminals have established highly complex networks across the globe, computer applications enable law enforcers to deter international crimes. Technological advancements go a g reat length in facilitating security and policing. Through soliciting â€Å"suspicious information†, the police and law enforcers can prevent crimes that threaten humanity and the dignity of humanity such as terrorism and identity theft. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. To guard private information, citizens can implement measures that recognize the dangers of unwarranted access to private information. Preventive measures should be promoted to limit these dangers.