Monday, January 27, 2020

Data Locations and Security Issues in Cloud Computing

Data Locations and Security Issues in Cloud Computing ANURAG JAIN   JITENDRA TAWARI   SANDEEP SONI ABSTRACT-: Cloud computing is one of todays most important technology because in this technology cost low, exciting and flexible. It is the most important technology of growing industrial areas. It allows user to access applications, documents etc., that consist location of our own computer or other Internet-connected devices. Data is stored remotely from a location.it can be stored in any location. Within the fast growing of cloud computing technology, Data security becomes more and more important. Cloud Computing offers many benefits to the enterprise there are also many issues as with any new technology. One of the main issues relates to the secure and positive result of customer data in terms of its location, relocation, availability and security .The aim is to provide some useful information and security issues for organizations preparing to migrate to the Cloud to take advantage of this computing technology. In this research paper we have proposedan encryption algorithm to solve data loca tion security issues. Keywords-:cloud computing, security of data ,data location, internet, data privacy, encryption algorithm. Introduction cloud computingrises upthe fieldinanIT. Itsattributedto operation forward as employment up to the information to the cloud based hardware and system .In a cloud computing data are transferred betweenthe clientand the server .now a day cloud computing recently technology because can store and retrieve the data on the cloud by using remote technology .Its providing the software platform and framework as a utility. Today all the it companystoreshis data on the cloud .thisfacility given by the cloud provider or cloud owner .so here is require to defend that data against illegal access and changing .security issue of datacontainsthreepoints.Thesepointsare integrity ,availability and secrecy. secrecy of the data by the using ofcryptography. in a moderndaycryptography is very famous technique. Data cryptography used to hide of the data in the form of image ,sound, text, video .during the transmission hackers cant access the our data because he will get only unreadable and meaningless. the cloud assures low price saving and given the high speed to user. the cloud technology a company quickly expand application where growth and contraction of the basic technology part can be obtained with the high and low of the trade .it can be gotten with the help of cloud supporter. such as Virtualization and grid computing, that permit application dynamically expand on the proper infrastructure. security service of the cloud -there are some type of service of the cloud to solve the security issue .these service are storage as a service (saas),software as a service(saas),platform as a service (paas),infrastructure as a service(iaas). (A)storage as A service- the cloud computingallowsa huge space that is probably infinite, and it’s ascending day by day .storage as a service authorizea cloud applicationto measurer besides bound service. Cloud computing technologyis requiredto obtain various needsfor hold the user data and information , add high capacity , stability operation. In this service the user areresponsibleto own data and hold their storage as a cloud trader proposal them the option of storing their data in the cloud .the user can access the data whenever hewants.due to the hostile character of  ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­the need of the cloud , no one method implement all in all. (B)software as a service (saas):-software as service is very famous technology. this technology also referred as software offered on requirement . its depends on multi-tenant design. software like that customer relation organization .the benefit of SaaS technique that the apps are locally run on your computer . user access can any application by using the cloud technology that user can never own from any browser .the saas technique support his user to increasing application day by day .with the help of saas technology user create and upload own data on the cloud .globally uploading data any one can access . c. platform as a service:- we are developed the software by tools and libraries given by the cloud. the user manage the software operation and design location. services offered through (PaaS) help the operation of applications exclusive of the cost and complication of buying and organization the basic hardware and software. PaaS services also contain enhancing the application life cycle processes similar to application design, application development, testing and deployment. It provides an communicate with high level of combination. That is largely in arrange to execute and analysis cloud applications. The user does not manage the overall communications but he control deployed applications and their configurations. Infrastructure as a Service(iaas) IaaS is a general which an organization outsources the equipment used to maintenance operations such as storage, hardware device, servers and networking components. The service provider keeps the equipment and is answerable for housing, running and maintaining . The customer typically pays on a . Features and modules of IaaS include: Efficacy computing service and billing model. Computerization of organizational tasks. Forceful scaling. Desktop virtualization. Policy-based services. Internet connectivity. Security issues:- Companies are fast moving onto cloud computing because they can currently usage the greatest resources present on the market in the flash of an eye and also decrease their actions’ cost radically. But as more and more information is moved to the cloud computing the security concerns have on-going to develop. (1). Data breaking is the major security issue. A trained hacker Cando simply and get into a client cross application and get into the client’s private data. (2). the Wasteful and damaged APIs and boundaries convert easy targets. IT companies that offer cloud services allow third party companies to modify the APIs and familiarize their personal functionality which in drive permits these companies to understand the internal workings of the cloud. (3). the Denial of Service (DoS) is also a main danger wherein the user is fixed partial or no access to his/her data. Companies now use cloud 24/7 and DoS can source huge increase in cost both for the user and facility provider. (4).the Connection eavesdropping means that a hacker can scan your online activities and replicate/replay a particular communication to catch into your private data. It can also central to the user to prohibited or uninvited sites (5).Data loss also is a new issue. A malicious hacker can wash out the data or some usual/man-made adversity can wipe out your data. In such cases having an offline copy is a big benefit. negligence of the service provider also able to direct data loss. (6). Compatibility between different cloud services is as well an issue. If a client decide to shift from one .cloud to one more the compatibility ensures that here is no loss of data. (7). Cloud also can be used in wrong purposes i.e. cloud exploitation. Due to the accessibility of most recent technologies on the cloud it can be used for high end calculations which cannot be complete on a normal computer. (8). Insufficient considerate of cloud technologies can guide to unidentified levels of risk. Companies transfer to cloud because it provides significant reduction in cost but if transfer is complete without proper background knowledge, the problems that happen can be still greater. (9). Insider theft in the appearance of a present or previous employee, a service provider, etc who is capable to use the data for harmful purposes. (10). Safe storage of encryption keys as well a problem. still if you are using encryption for improved security, safe maintenance of the key becomes an issue. Who should be the holder of the key? client seems to be alive the response but how diligent and careful can he/she be will choose the security of the data. The other aspects about the cloud security categorize of different type of threats about the cloud security are following Access The plan of cloud technology to offer information to the customer from several position whenever user wants. because a web technology cloud service enables the customer to access his data from wherever he want .its is valid to all the services being given by it. all the user should know that where data is stored. at the any condition client can request to server to delete his data after that the data should be deleted. command the cloud technology controlling of data is very necessary because if we will not control our data then the other user can access our data. so the controlling of data is able to be seen to a few member of the cloud service provider .this data is defies the stage of control. fulfilment: the authorities of the we have to need a law of govern to protection of data on the cloud because cloud service can cross several jurisdictions approximately the all world. if any user store his data in other country and its contain sensitive data .this data only whose person which have a authorities to access the data and some set of laws apply on the data . Data reliability: Data reliability in easy terms means that the data is protected and no one change the data without the uses agreement .this is a basic need of cloud computing .the reliability of data in a cloud is a very impertinent in a present there are many algorithm design to protection of data. inspection: with the help of inspection we can check the activities occurrence on the cloud. inspection is a mechanism that keep a log and list actions to help stop infringement. Privacy Breaches: The cloud service supplier should report to its client about any violate in security. The client has to the correct to know what is incident in his/her space. How does the service provider take care of this. secrecy: This ensures that the client data is kept secret. privacy is one feature of cloud storage security that will lift question in a ordinary users mind. Cloud as such is a public system and is susceptible to new threats, therefore, privacy is very important. planned work in this paper we have planned a structure .with the help of this planned structure we involve a file which is involved securing of data files through file encryption technique. the file whose presentation on the computer will be encrypted technique based on AES algorithm. if user wants to read this file then before the user download the uploaded encrypted after that he can read it. there are many benefit of AES algorithm . in this algorithm we are using an encryption key used by AES algorithm .the order of this algorithm is 128,192 and 256 bits AES algorithm is also a lot quicker than the RSA. Thus, its superior option for safety of data on the cloud . in an AES algorithm. the proposed system works only when an internet connection accessible. (1) file upload there are some steps for the file upload process are clarified in the block. (a) take on the user name or password from user If the user is genuine then connect with the cloud. else show the Certification error. (b) the first user asks to pick file to be uploaded on a cloud . (C) ask the password from user for the encryption . (D) sure the password and make a key from this password. (E interpolate the encryption algorithm . (F) Upload an file on to the cloud. (G) ask the user if he wants to delete the file which is uploaded. delete the user selected file (F) after that connection disconnect with the cloud. stage-1 we have to first check that the user is authentic or not . and after that system will accept the user name or password. if the user name or password is valid the system will be accepted else the username or password and not match the system show error message. stage-2 in a second stage we will check the cloud is stable because the file uploading in this section. The user will upload the file. which is he wanting. stage-3 in this stage the user ask the password for encryption process The user is optional to use long passphrases as their passwords. This password is used for creation of a key. stage-4 this stage is a very important for the system. in this stage generated a key for the encryption technique. we are using AES is a symmetric key algorithm .this key used for encryption or description technology. in this technology generated a key for password to a generated function. We suggest the use of Password Based Key Generation Function. Password Based Key generation Function uses iterations for a password to default checking. this process is called a key exertion. in this stage the system saves the password which is entered once and create a key for encryption. stage-5 in this stage we are applying Advanced Encryption Standard algorithm . the Advance Encryption Standard algorithm is useful to the simple text to make the secret message text. as a result the user can be rest secure the data protected from the a variety of threats the uploaded is data is encrypted which can be decrypted when the user enters the password which he entered for the period of the encryption process. stage-6 when the secret message text is created then upload the encrypted file on the cloud and concerned with the removal of the real simple text file from the memory. The option is given by the user to delete the unique file which is uploaded on the cloud. if the user dont want to delete this file the he has a second option retaining the unique file. We suggest that the unique file should be removed. This ensures that no illegal right to use will be built up to the simple text file stored in the system. The method of file upload can be shown in bellow: successful uploaded delete original file upload encryption file user encrypted file (2) download file there are some stage of file download process describe in this part. Stage 1 The identity of the user is validation process have in this stage and the collection of files that the user has uploaded on the cloud . The user is ask to choose any one of the files from the record. stage2- the user is asked for the password during the encryption of the file justification . entered password is complete in another stage. The secret message text file uploaded when the decrypted process will completed by the user and downloaded. the same password entered during the encryption. this is only motive that the password save for the duration of encryption process so the store password is valid. AES algorithm is a symmetric key algorithm so, it wants the same key to encrypt and decrypt the data. This procedure possible only if the same password is entered into the key creator job to make the key. stage 3- the means of the generated key, the AES algorithm to decrypt the uploaded secret message text. stage 4 the user Save this decrypted simple text in the user system memory. stage 5 the user is asked if he needs to remove the secret message text file uploaded on the cloud. If the user chooses to perform, remove the encrypted file from the file. the user does not desire to download any additional files from the cloud, log out of the user account and after that cut off the recognized link with the cloud. This is the very last stage of the download process. (A) we first Accept user name and password from the user If user is genuine set up connection through the cloud Else, show verification error (B). Ask user to pick file to be downloaded (C) the user ask to enter a password used for the decryption procedure (d) verify the legality of this password If the entered password is valid, the key is generated. Else. show the error message and refuse password (D) relate the decryption algorithm (E) Download the file commencing the cloud (F) the user ask if he wish for to delete the uploaded encrypted data file . Delete the file from the cloud which is encrypted. if user selects the delete choice (G) and cut off connection through the cloud . CONCLUSION Cloud computing is an puzzle anyone can get lost in. But separate like any new technology. the cloud computing is also a double enclosed stop. On one end lies the ability of fast technology, a huge array of applications to use, superficially infinite storage ability. On the other end story various security threats which develop with collective spaces such as break of privacy, impeding of data reliability and non-availability of data. In this paper, we have projected a structure which encrypts a file before it is uploaded on to the cloud. AES (Advanced Encryption Standard) is one of the most secure encryption measures and not many attacks are successful on data which is encrypted using AES. This application solves the problem of most, if not all. the threats that data kept in the cloud faces. We have framework also suggest the use of login id and password to ensure reliable and official access to a user’s data. Thus, if we used securely, cloud computing offers a user with wonderful profits and overcomes its only disadvantage of security threat.

Saturday, January 18, 2020

Wal-Mart: Ethical or Unethical

Wal-Mart: Ethical or Unethical? Almost everyone living in North America undoubtedly knows what Wal-Mart is and has already conceived some sort of opinion, whether it is good or bad. On one hand people complain that they are ruining competition, they are treating their employees’ terribly or that they are given extreme unfair advantages that no other company receives. However, on the other spectrum there are those that believe in the free market, as well as those that say Wal-Mart is cutting down the cost for low to average income families’ cost of living or even those who claim that although wages are not perfect they are in fact employing a large amount of people whom would otherwise not have a job. Whichever end of the spectrum your beliefs may lay, there is no doubt that Wal-Mart does create very affordable prices for those families in need; however are these incredibly low prices taking an even greater toll on Wal-Mart employees and community members? Throughout this paper we will explore the two main ideas of whether Wal-Mart’s way of conducting business is ethical or unethical, and let you decide which end of the spectrum you are on. The American Economy is built upon Capitalistic Principles. American’s have pride in their free market economy with the largest GDP in the world. Income in a capitalist system takes at least two forms, profit and wages. Profits are used to expand a company, creating more jobs and wealth. Every company’s primary goal is to produce profit. The means by which each company produces profit contrasts in accordance with the market said company is in. Companies can attempt to differentiate themselves in their business model but generally certain sectors of the market produce similar profit strategies. Wal-Mart’s strategy relies upon low-wage labor by discouraging the unionization of its employees. Wal-Mart’s strategy of low-wage labor to reduce their costs is hardly unique. Wal-Mart’s competitors: Target, Kmart Corp. and Home Depot all pay similar wages and give comparable benefits. Competition arises when more than one producer is trying to sell the same or similar products to the same buyers. Competition leads to innovation and more affordable prices. Economic freedom is afforded to the private sector (such as Wal-Mart, Kroger, etc. ), allowing the private sector to make the majority of economic decisions in determining the direction and scale of what the U. S. economy produces. Relatively low levels of regulation and government involvement enhance this. Although Wal-Mart's revenues are greater than the combined sales of its top competitors Target, Sears Roebuck, Costco Wholesale, Home Depot and The Kroger Co, Wal-Mart needs to continue its business strategy (including low-wages) in order to keep the edge it has built. Wal-Mart is one of the biggest employers in the United States, with 1. 4 million associates. Wal-Mart is not only one of the largest employers in the United States but the largest in Mexico and one of the largest in Canada. Wal-Mart is also a diverse employer with more than 257,000 African American associates, more than 41,000 Asian, 5,900 Pacific Islander, 171,000 Hispanic, 16,000 American Indian, and 869,000 women associates. Along with the diverse employment the majority of the employees work full time. Wal-Mart full time average hourly wage is $11. 5 and is even higher in urban areas. Employees can receive performance-based bonuses and receive opportunities for advancement. Wal-Mart grants â€Å"full time† benefits to those working as little as 34 hours per week, but does not limit workers to just 34 hours per week. Wal-Mart has a health care benefit for all of its employees and recently announced that over 1. 2 million associates are covered under its healthcare program a nd the number of uninsured associates dropped by nearly 25 percent in the past year and more than 40 percent between 2007 and 2009. Both full time and part time can be eligible for health benefits. The benefits are for all levels of the company from the part times workers to the full time managers. Along with all the health care benefits, Wal-Mart also added a new program called â€Å"Life with Baby,† in which the program helps mothers and their babies get a healthy start for the child’s life. Wal-Mart saves money for families. Wal-Mart has health care benefits for 94. 5 percent of their employees worldwide. One of Wal-Mart's biggest goals is to save families money. In 2006 Wal-Mart saved American families on average $2,500. Saving money means more money in consumer pockets, which also in turn mean more business for other businesses. Wal-Mart is helping the economy by saving money for families with their lower prices. First of all, according to the document Wal-Mart provides unequal salary payment to men and women. The company uses gender discrimination to scale the wage difference to pay for it employees, which is unethical for employees’ job opportunity. Moreover, it is unfair when both men and women do the same job in the store, but women get less money than men do. In 2001, six women sued Wal-Mart in California claiming the company discriminated against them by systematically denying them promotions and paying them less than men. The lawsuit has expanded to potentially the largest class action in U. S. history – on behalf of more than 1 million current and former female employees. While two-thirds of the company's hourly workers are female, women hold only one-third of managerial positions and constitute less than 15 percent of store managers. The suit also claims that women are pushed into â€Å"female† departments and are demoted if they complain about unequal treatment. One plaintiff, a single mother of four, started at Wal-Mart in 1990 at a mere $3. 85 an hour. Even with her persistent requests for training and promotions, it took her eight years to reach $7. 32 an hour and seven years to reach management, while her male counterparts were given raises and promotions much more quickly. Secondly, the Chinese employees working for 24 hours a day and seven days a week all year round, and their wage is about $3. 0 per day. The company has factory in China and it offers a low quality of life and poor work environment. Wal-Mart also charges apartment and utilities fees from the factory workers before paying their salaries. Moreover, if the workers want to move out from the dorm, they still have to pay for the apartment rent to the company. Wal-Mart is paying eleven million dollars to settle Federal allegations it used illegal immigrants to clean its stores and also Wal-Mart is facing a class-action lawsuit for discrimination against $1. 6 million former and current female employees. Wal-Mart keeps its wages low even by general industry standards. The average supermarket employee makes $10. 35 per hour. Sales clerks at Wal-Mart, on the other hand, made only $8. 23 per hour on average, or $13,861 per year, in 2001. About one-third of Wal-Mart's employees are part-time, restricting their access to benefits. These low wages complicate employees' ability to obtain essential benefits, such as health care coverage. All in all, Wal-Mart's success has meant downward pressures on wages and benefits, rampant violations of basic workers' ights, and threats to the standard of living in communities across the country. The success of a business need not come at the expense of workers and their families. Such short-sighted profit-making strategies ultimately undermine our economy. In conclusion, Wal-Mart is undoubtedly making the lives of millions of consumer’s much easier, but is it coming at too big of a cost to those that are employed by them? This is really the basis of the whole ethical versus unethical argument, and in the end both sides will probably never be able to come to an agreement. The fact of the matter is this, in order for a corporation to grow to the magnitude of Wal-Mart there has to be millions, if not billions of people who continue to shop there and keep putting their money into it. So the next time you are at Wal-Mart you need to ask yourself, is this low price coming at too high of a cost to employees and community members? If the answer is no, then purchase that item, but if the answer is yes go ahead and walk out of the store to shop somewhere else. Just remember with whatever decision you make, the decision is always yours to choose where you will consume.

Friday, January 10, 2020

Education Plays A Very Important Role Education Essay

Education plays a really of import function in bring forthing human resources for all states around the universe. A state can go good developed based significantly on the quality of human resources and this can be achieved through carry oning instruction. Cambodia is one of the states in the universe which need a good instruction system to bring forth qualified human resources for developing the state. The instruction system in Cambodia is divided into four degrees, Pre-School Education, Primary Education, Secondary Education ( lower and upper ) , and Higher Education ( UNESCO, 2008 ) . The Royal Government of Cambodia ( RGC ) has set the end to assist kids acquire basic instruction to at least grade nine. After finishing grade 9, pupils can either travel to upper secondary schools or secondary vocational preparation plan provided by the Ministry of Labour and Vocational Training ( MOLVT ) . After finishing upper secondary school, pupils can either enter vocational preparation or uni versities ( UNESCO, 2008 ) . Technical Vocational Education and Training ( TVET ) plays a critical function in the socio-economic development of any state. The Royal Government of Cambodia ( RGC ) is committed to economic and societal development as a precedence. The ‘Rectangular Strategy ‘ , the sanctioned national economic development model, and the more elaborate 5 old ages National Strategic Development Plan 2006 – 2010 are committed to skills development. Cambodia will accomplish the Millennium Development Goals ( MDGs ) of Poverty and Starvation Reduction, Enhancing Gender Equity and Creation of Globalization Partnership for Development partially through a antiphonal and better quality preparation system. For growing, employment, equity and efficiency the RGC is committed to beef uping the Technical Vocational Education and Training ( TVET ) sector, ( NSDP, 2006 – 2010 ) . To accomplish this committedness, the RGC mandated the constitution of a new ministry, the Ministry of Labor and Vocational Training ( MOLVT ) , in 2004. Within the ministry the Directorate General of TVET ( DGTVET ) was established and under this sits the National Training Board ( NTB ) with a mission to guarantee that Cambodia meets its economic and development ends through an industry driven, quality TVET system, ( National TVET Development Plan, 2008 ) . A cardinal scheme to accomplish quality effectual TVET and competence based course of study and preparation is designation one of the TVET teacher instruction institute, runing under the Directorate General, TVET, as a Lead Institute and a Centre for Excellence for TVET instructor preparation in Cambodia. That institute is responsible for VET Teacher Training and Development for instructors serving both the Regional and Provincial Training Centers in throughout the state, ( National TVET Development Plan, 2008 ) . There are 38 TVET establishments run by Ministry of Labour and Vocational Training ( MOLVT ) in Cambodia and those establishments are separated as Provincial Training Centers ( PTCs ) , Regional Training Centers ( RTCs ) , and TVET institutes, ( National TVET Development Plan, 2008 ) . TVET instructors instruction are trained by a TVET establishments under the umbrella of MOLVT and it is the lone establishment which has the chief responsibility to develop TVET instructors both Senior and Junior degree for all of the 38 TVET establishments throughout the state. Since 2005, the MOLVT has set the policy to enroll three 300 of TVET teacher trainees every twelvemonth, ( National TVET Development Plan, 2008 ) .1.2 Problem statementA survey conducted by Nock and Bishop ( 2008 ) showed the major causes of Kampuchean instructor dissatisfaction such as low wage, corruption/nepotism, hapless leading, hapless life conditions, pupils behavior, and working environment. The same survey revealed tha t 99 % of the respondents said that they could non last on their salary and this problem caused 93 % of them to keep a 2nd occupation. Furthermore, other surveies in Cambodia besides found out the increasing discourtesy from society toward instructors in public schools ( CITA, 2010 ) . MoEYS ( 2010b ) admitted that many instructors have left their instruction places, transferred to new occupations, and reached the retirement age. The jobs besides occur in MOLVT. These surveies above did non stipulate the jobs in TVET but they outlined the common jobs go oning in the Kampuchean instruction environment. In add-on to the affairs mentioned above, it is widely accepted that TVET is a really hapless sector in Cambodia and it is frequently considered as the 2nd pick to all people including pupils, ( ADB, 2009 ) . TVET is a freshly established establishment which merely started developing in 2004, the twelvemonth that MOLVT was established. The registration rate in TVET is really low if compared to academic instruction, ( ADB, 2009 ) . Furthermore, the leading, learning installations, and particularly human resources are in the bad status, ( ADB, 2009 ) . Yet, there are many alumnuss who come and apply for the entryway scrutiny to be a TVET instructor at a TVET instructor instruction institute in Phnom Penh. Based on my occupation, I am able to acquire the information from disposal office and I see that, normally the figure of appliers who applied for the entryway scrutiny ever far exceeds the figure of recruits. For illustration, in the academic twelvemonth 2012 – 2013, there are more than 1,800 campaigners have applied for the entryway scrutiny while MOLVT recruits merely 300 of instructor trainees. Given the relatively low position of TVET, it is ill-defined why there are so many alumnuss enter the entryway scrutiny to go a TVET instructor.1.3 Research QuestionTo go through the entryway scrutiny at the TVET teacher instruction institute is non easy. Yet, there are some trainees who drop out from this preparation plan when they have another pick or better occupation chance. Therefore, this research is fundamentally aimed at happening out the chief motive factors that encourage trainees desiring to go a instructor in the TVET sector. The specific inquiry that the survey seeks to reply is: â€Å" What are the motivative factors of university alumnuss who have entered the proficient instructor developing establishment in respect to their pick of a proficient vocational instruction and preparation instructor calling? †1.4 Significance of the researchThis survey will be utile in some countries as following. First, this survey will lend to determination shapers or policy shaper when enrolling TVET instructor trainees. These people will hold some basic findings from this research so that they will be able to do good determinations when be aftering TVET teacher preparation. If TVET contrivers understand teacher motive, they will be able to turn to any failings in that motive. Second, through understanding teacher motive, this research helps to retain instructors in TVET instruction. Last, but non least, the survey will lend to the present literature on TVET teacher preparation sector, a sector in which virtually no research has been done on TVET instructors.Chapter II Literature reappraisalBy utilizing the hunt engine Google Scholar and the James Cook University Library hunt engine with cardinal footings including: Teacher motives, Motivation to go instructors, Motivations to go TVET instructors, and perceptual experiences of university alumnuss toward TVET instructors career, I have found and downloaded many valuable stuffs for my literature reappraisal related to my subject. Those stuffs give an overview on my subject, and they work as a footing of cognition to back up the literature reappraisal.Teacher MotivationsThe international contextA figure of surveies have been conducted in many states throughout the universe over the last 20 old ages researching the motive of those who decide to go school instructors ( Kyriacou & A ; Coulthard, 2000 ) . Such surveies indicate that the chief grounds for taking instruction as a calling autumn into three chief countries. First, selfless grounds: these grounds deal with seeing learning as a socially worthw hile and of import occupation, the aspiration to acquire kids successful, and the aspiration to do society developed as we can see that many people wish to portion their cognition and expertness to other people in order to supply the capable affair to their community. Second, instrinsic grounds: these grounds screens facets of the occupation activity itself, such as learning kids activities, and the willingness to utilize their capable affair cognition and expertness in which 95 % of pupils in this survey rated that they find the occupation gratifying as really of import factor in taking learning calling. Third, extrinsic grounds: these grounds cover facets of the occupation which are non built-in in the work itself, such as long vacations, degree of wage, and position as there are many people choose teacher calling for their ain benefit such as good payment, for journey, or for pleasance. The consequences of such surveies have received peculiar attending because of the enlisting cr isis confronting many states in pulling people of sufficient quality into the instruction ( Kyriacou & A ; Coulthard, 2000 ) . Kyriacou, Hultgren, and Stephens ( 1999 ) argued similar grounds to what is mentioned in the paragraph above. In this survey, 105 pupil instructors in Stavanger College School of Teachers ‘ Education, Norway, and 112 pupil instructors in University of York, United Kingdom, were asked to finish the questionnaire at the beginning of their instructor preparation class. They revealed the consequence that both groups of pupil instructors reported that their picks came from being strongly influenced by basking the topic they would learn, desiring to work with kids, the fact that teacher calling would give them opportunities to utilize their topic, and long vacations every bit good as societal hours. DeLong ( 1987 ) conducted a survey about â€Å" Teachers and Their Careers: Why Do They Choose Teaching? † in Brigham Young University, Provo, by indiscriminately selected 139 simple and secondary instructors to take part in the survey. The consequence found some similar grounds to the above paragraph why people choose their calling in learning as following: most people rated ‘I like working with children/youth ‘ the most follow by ‘I like to assist others larn and develop ‘ , following is ‘it fulfills a demand of mine to experience useful/contributing ‘ , and so ‘I wish the hours and holidaies ‘ , least rated one is ‘It ‘s a profession that besides allows me clip to prosecute other occupations or concern ‘ and ‘I wish money ‘ . The survey besides stated about the influences on instructors ‘ credence of first learning occupations such as geographical location, learn my country of expertness, me rely needed a occupation, occupation satisfaction, good administration/bosses, long-range security, a opportunity to be originative, good physical environment, benefits, liberty, and promotion into school disposal. The consequence of this survey suggests that instructors go into learning for really different grounds and are influenced in different ways to take learning as calling. Ebru ( 2012 ) surveyed 974 Turkish pre-service instructors to analyze their perceptual experiences about the instruction profession and to seek for ground for taking instruction as a calling. The consequences showed that the motive for taking learning that was highest rated was the â€Å" societal public-service corporation value † of the learning profession such as part to societal, determining the hereafter for kids or striplings, heightening societal equity, etc. Another motive was Personal public-service corporation value of learning profession, for illustration, clip for household, occupation transferability, and occupation security. Besides, the following most rated motive was the anterior instruction and acquisition experiences. Most of the engagement in this survey besides listed their personal abilities and accomplishments as a major ground to take instruction and â€Å" work with kids or striplings † was the following most often mentioned motive of the partici pants. Berger and D ‘ Ascoli conducted a survey about â€Å" Motivations to Become Vocational Education and Training Educators: A Person-Oriented Approach † and they argued some similar to what is discussed above. 605 in-service VET pedagogues in Switzerland were surveyed and the consequences revealed that the most of import for taking a calling as VET pedagogue are intrinsic calling value, perceived teaching ability, personal public-service corporation value, and chance. These consequences showed rather the same survey consequences in general instruction.The Kampuchean contextThe survey by Nock and Bishop ( 2008 ) about the instructor motive in Cambodia has stated the most common grounds why people want to travel to learning are: a strong involvement in the occupation, a desire to assist Cambodia ‘s development by bettering instruction, and because of they enjoy contact with kids. However, some instructors said that they were influenced by their household, had no other o ccupation chance, and chose learning to avoid muster into the ground forces. These three grounds seem to be contrasted with all the literature discussed above. The survey went farther to discourse about the features of a motivated instructor are as following. First, they have good relationship and communicating with pupils with a happy and pleasant personality. Second, they focused on and committed to the occupation by hardworking, punctual, painstaking, and confident, with a serious attitude. Third, they obey the regulations and ever hold a good working environment in the schoolroom and ever keep good pupil attending. Fourth, they are adept and willing to actuating pupil acquisition and accomplishing good consequences. Fifth, they behave in a normal manner and suitably. Sixth, they have a good lesson readying and are flexible when it is used. Seventh, they have good relationship with other members and ever portion each other the utile resource. Eighth, they are originative in learn ing by utilizing ocular AIDSs and schoolroom show. Last, but non least, they take pupils on field trips, Teach pupils about Khmer civilization, and doing betterments in the school environment. In drumhead, most old surveies have shown the most common motive factors that encourage single in taking learning calling. Those factors included: the desire to work with kids and immature people ; the willingness to do the society developed, desiring opportunities to utilize their originative endowment ; and the belief that instruction is a well-paid occupation with respectful from other people. Furthermore, many instructors besides claimed that they like learning calling and they learning is an gratifying occupation. However, some instructor besides stated that they were influenced by their household to be a instructor, they have no other better occupations, and to avoid to be conscripted into ground forces in some political crisis society, ( Nock & A ; Bishop, 2008 ) .Chapter IIIMethodologyResearch designTo carry on this research program, qualitative attacks will be used. Ary, Jacobs, and Sorensen ( 2010 ) depict the intent of qualitative research as being to contextualize finding s, interpret behaviour and purpose, or to understand positions. Qualitative research is used to analyze persons, households, and a assortment of group, organisations, industries, and more ( Ary, Jacobs & A ; Sorensen, 2010 ) . Lodico, Spaulding and Voegtle ( 2010 ) describe qualitative research workers focus on the survey of societal phenomena and on giving voice to the feeling and perceptual experiences of the participants under survey. Gay, Mills and Airasian ( 2009 ) stated that â€Å" Qualitative research is the aggregation, analysis, and reading of comprehensive narrative and ocular ( i.e, nonnumerical ) informations to derive insight into a peculiar phenomenon of involvement † ( p.7 ) . The survey will hold several strengths. The research worker has a good web or entree to the mark institute. Therefore, the research worker will be able to roll up the necessary information that might be needed in the survey. With this facilitation, the research worker will be able to randomly place teacher trainees in the field of agribusiness and technology. This will assist the research worker collect dependable informations. However, this survey will be limited by three factors. First, it will be a instance survey merely, which will be conducted in merely one moderate-sized TVET instructor developing institute in Phnom Penh. Second, the survey will aim merely 60 instructor trainees from agribusiness and technology group. Therefore, the findings will non be generalizable to other instructor trainees in concern Fieldss. Furthermore, the determination might non good plenty due to the sample size is non big. Finally, the sample choice of this survey might non guarantee wholly dependable findings. In this sense, research workers, bookmans, and pupils, carry oning researches from these findings should be careful about doing generalisations from this survey. However, these findings will decidedly offer the foundation for other research on TVET instruction establishments in Cambodia in which no research has been conducted in this field yet.Tools/instruments for informations assemblageSince the construct of factors act uponing university alumnuss ‘ determination to analyze at a TVET instructor instruction institute are complex and qualitative in nature, the research worker will utilize a study questionnaire and interviews as the chief qualitative informations aggregation methods. Furthermore, since there several different countries that trainee instructors being trained, the research worker will split the participants and interviews into two chief classs: agribusiness and technology. Both primary and secondary informations will be collected. The extended secondary informations demands to be consulted foremost. This includes assorted paperss, publications, books, and paperss from the cyberspace. After the secondary information has been collected, the primary informations research will be done through a guided questionnaire study. The questionnaire will be administered chiefly to trainee instructors in a TVET instructor developing institute. The obtained information will go a model for informations analysis and reading.Site, population, sample size and sampling methodThe survey will be conducted at a TVET instructor developing institute. The population of survey consists of TVET instructor trainees, pupils who are being trained to go instructors. In qualitative attack, the informations aggregation should include the purposeful sampling attack and informations aggregation signifier such as observations, interviews, paperss, etc. , ( Creswell, 2009 ) . Therefore, the sample will be made up of 60 respondents selected utilizing the purposive sampling technique. The sample includes 30 participants from agribusiness group, and 30 participants from technology group. The instructor trainees will be selected from the 12th Cohort at a TVET instructor preparation plan at a TVET instructor instruction which is being trained in the academic twelvemonth, 2012- 2013. Three 100s of TVET teacher trainees are recruited and trained every twelvemonth and all instructor trainees are divided into different categories based on their major accomplishments. Thirty instructor trainees will be indiscriminately selected from each category base on their countries of survey, where they come from, and the ages so as to guarantee the research is representative. Then, the selected respondents will be courteously asked to make full in the questionnaires and six of them will be selected to be interviewed.Data collection processsData will be collected from a TVET instructor ins truction institute, referred as Institute A, in Phnom Penh by agencies of two chief classs of study questionnaire and interview, aiming 30 in agribusiness big leagues and 30 in technology big leagues.Survey questionnaireThe research worker will explicate about the intent of research to all groups of instructor trainees and randomly choice 60 of them in the field of agribusiness and technology. All selected teacher trainees will be asked to finish a study signifier with some multiple picks inquiries and open-ended inquiries. The inquiries focus on the motive factors or grounds why they have chosen TVET as their calling. For illustration, what were the two chief grounds why you have chosen a calling in TVET? Who influence your determination to go a TVET instructor? There will be some more inquiries about their background. To guarantee success in the expected research program and expect possible troubles, the research worker will carry on a pilot survey prior to the existent research. The research worker will choose six teacher trainees indiscriminately to reply the inquiries in the questionnaire. After they have answered all the inquiries, the research worker will larn if the instructor trainees understand the inquiries and are able to wholly complete all the inquiries in a fit period of clip. The research worker will do any necessary alterations if he/she finds any misunderstand inquiries to suit with the existent state of affairs and besides to guarantee the expected consequence in the existent survey.Interviewing pupilsThe research worker will non-randomly choose three trainee instructors from each group, agribusiness and technology. The pupils will be asked about what factors influenced their determination to analyze at the TVET teacher instruction institute and what outlooks they are keeping from their survey after their graduation and travel to the existent instruction work. Along with the two major inquiries, there will be some more relevant inquiries about their background. The interview inquiries will be developed based on three of import phases. First, interview inquiries will be designed based on audiences with experient research workers. Second, the subjects which emerge from the study questionnaire I will administrate will supply a footing for some inquiries. Finally, semi-structured interviews will be conducted along with some extra inquiries for respondents ‘ elucidation if necessary in order to roll up more in-depth information.Ethical considerationsThe survey will be conducted in a TVET instructor instruction institute in Phnom Penh. The research worker will inquire for a missive from the MEd Program at RUPP to seek permission from the mark institute prior to informations aggregation. The intent and significance of the survey will be attached with the perm ission-seeking missive and clearly explained to the manager of the institute and all the participants. The manager will be asked to subscribe an blessing for the survey in his/her institute. Likewise, the research participants ( teacher trainees ) will be asked to subscribe an understanding to bespeak their willingness to take part in the survey. The names of the participants or IDs and the institute will be kept anon. . No information refering the study and the interviewees ‘ responses will be used other than the intent of the survey. Besides, the engagements in this survey will be genuinely voluntary. While replying the inquiries, the participants can retreat from the interview or jump any inquiries if they prefer to make so. Creswell ( 2009 ) stated that â€Å" the research proposal needs to turn to the function of the research worker: past experiences, personal connexions to the site, measure to derive entry, and sensitive ethical issues ( p.201 ) † . The connexions between the research workers and the participants, where the research worker behavior the survey at his/her ain organisation, will confront hard power issues and the consequence will be biased and uncomplete, ( Creswell, 2009 ) . Therefore, as the research worker in this survey work as a lector in the institute being studied, there will be a power inequality between the research worker and the participants. However, the research worker will inform the participants that they will experience comfy to decline the requesting to take part in the survey. After the publication of the concluding findings, a transcript of the consequences will be given to the institute.

Thursday, January 2, 2020

Swot Analysis - 1268 Words

Antillean Baking Company produces and sells a variety of baked products such as bread, biscuits and buns on the local market. In recent years it has lost market share and management has decided to do a SWOT Analysis of the following areas-: (1) Customers, (2) Suppliers, (3) Competitors and (4) Intermediaries. (a) What does the term SWOT Analysis mean? (4 marks) (b) Identify and outline the impact on the company’s operations of the TWO trends in EACH of the four areas identified above. (21 marks) (a) In order to develop a marketing plan or strategy which can identify preferred and likely directions, the firm can conduct a SWOT Analysis which is a general and quick examination of a business’s current position. The SWOT Analysis†¦show more content†¦Furthermore, If Antillean receives raw materials late or faulty materials, the products may be defective or behind production targets. If the firm produces faulty products it may earn a bad reputation and loose customers. Also, if the firm is not able to meet orders on time it may loose customers this, reducing market share. Discounts on purchases are a promotional strategy many firms use and may well be a trend developed by Antillean’s suppliers. If the suppliers give discounts for bulk purchases the larger firms may benefit since they may have the capital to purchase the bulk stock. This may allow these firms to have a competitive advantage over Antillean. There firms may be able to lower prices due to the d ecrease in the cost of production. The firm may be able to attract Antillean’s customers through the lower prices. This strategy will decrease Antillean’s market share. However, it must be noted that once Antillean has the capital to purchase the bulk stock they may gain the same advantage as the larger firms. The food industry is one of the most competitive industries as businessmen are aware of the fact that food is a necessity and there is always a demand for it. The competitiveness of this industry may have caused business men to become more innovative as a means of competing effectively. Becoming more innovative in the bread and pastries industry may mean opening shops and restaurants selling only the firm’s products. ForShow MoreRelatedSwot Analysis Of Swot And Swot Analysis738 Words   |  3 Pagesknown as SWOT analysis. The SWOT analysis is business analysis method that business can use for each of its department when deciding on the most perfect way to increase their business and future growth. This procedure identifies the internal and external strengths, weaknesses, opportunities and threats that are in the markets. SWOT analysis helps you decide your position against your competitors, identifies best future opportunities, and highlight current and future threats. SWOT analysis is an acronymRead MoreSwot Analysis Of Swot Analysis : Swot1223 Words   |  5 PagesOnStar – SWOT Analysis To help OnStar determine if home monitoring services should be added to its list of products and services, a SWOT analysis should be completed. A SWOT analysis is a situation analysis or tool used to identify the strengths, weaknesses, opportunities and threats of an organization (SWOT Analysis Definition | Investopedia, 2005). Thus, it is a basic straightforward model that determines what an organization, like OnStar, can and cannot do, as well as determines its opportunitiesRead MoreSwot Analysis Of Swot Analysis : Swot911 Words   |  4 Pages SWOT Analysis In the article â€Å"SWOT analysis† Harmon (2015) offered a definition for SWOT analysis, the purpose of the SWOT analysis, the advantages of performing a SWOT analysis, and outlined and discussed the four components of the SWOT analysis. SWOT analysis is a planning and brainstorming tool that helps people evaluate an idea or project for a business or formulate a business plan (Harmon, 2015). It should be noted that SWOT analysis is an acronym for Strengths, Weaknesses, OpportunitiesRead MoreSwot Analysis : Swot And Swot1081 Words   |  5 PagesSWOT Analysis: A SWOT analysis (SWOT matrix) first used by Stanford Research Institute during 1960-1970 and it was presented by Mr. Albert S. Humphrey a American business and management consultant by using data from fortune 500 companies. We can succeed in our life if we use our talents to our full extent. Similarly, we‘ll have some problems if we know our weakness are, and if we manage these weaknesses so that we don’t matter in the work we do. To understand more about our self and our externalRead MoreSwot Analysis : A Swot1708 Words   |  7 Pages A SWOT analysis is â€Å"a structured planning method used to evaluate the strengths, weaknesses, opportunities and threats involved in a project or in a business venture.†(en.wikipedia.org/wiki/SWOT analysis, 03/11/14). A swot analysis can also be used to examine a person’s attributes. The strengths and weaknesses usually are internal factors whereas threats and opportunities are mainly external. Advantage Disadvantage Internal Strengths 1. Self-motivated 2. I am organised; accurate and pay attentionRead MoreSwot Analysis : Swot And Swot2320 Words   |  10 PagesSWOT analysis focuses on the internal factors which are the company’s strengths and weaknesses as well as the external factors which are the opportunities and threats which are gained from situational analysis, which focuses on summarizing all the pertinent information acquired about the key three environments of internal, customer, and external (Ferrell Hartline, 2014, p. 39). A SWOT analysis further gives a company precise advantages and disadvantages in satisfying the needs of its selectedRead MoreSwot Analysis : A Swot852 Words   |  4 PagesStrength, weaknesses, opportunities and threats, commonly known as a SWOT analysis is used by businesses. Organizations use the SWOT analysis technique to figure out and understand their areas of strong suits (strengths), their inevitable flaws (weaknesses), prospects that the organization could look into (opportunities) a nd things that pose as intimidations to the organization (threats). There are many obstacles to overcome when it comes to international expansion. Obstacles such as; language andRead MoreSwot Analysis : Swot And Swot1957 Words   |  8 PagesSWOT analysis focuses on the internal factors which are the company’s strengths and weaknesses as well as the external factors which are the opportunities and threats which are gained from situational analysis which focuses on summarizing all the pertinent information acquired about the key three environments of internal, customer, and external (Ferrell Hartline, 2014, p. 39). A SWOT analysis further gives a company precise advantages and disadvantages in satisfying the needs of its selected marketsRead MoreSwot Analysis : The Swot1215 Words   |  5 PagesThe SWOT analysis was originally introduced by Andrews Christiansen, Guth and Learned in 1969 and its basic organizing principles have remained largely unchanged in the field of str ategic management. [BADEN-FULLER, C. H. A. R. L. E. S., STOPFORD, J. (2002). The Firm Matters More than the Industry. Strategy for Business: A Reader, 123.] It is a systematic framework which helps managers to develop their business strategies by appraising their internal and external determinants of their organization’sRead MoreSwot Analysis : The Swot1888 Words   |  8 PagesThe SWOT analysis, a strategic planning tool was developed by Albert Humphrey in the 1960’s and 1970’s. Albert is said to have come up with this strategic planning tool through the use of data the Fortune 500 companies in the United States of America at that time (Lancaster Massingham, 2011). A SWOT analysis determines the strengths, weaknesses, opportunities and threats, which are a relevant part of any organization especially the ones that get involved in new ventures. This tool assists the users