Monday, January 27, 2020

Security Issues Concerned With E Commerce Information Technology Essay

Security Issues Concerned With E Commerce Information Technology Essay Rapid advancements in technology is allowing everyone to send and receive information from anywhere in the world. Initially people used to share information but slowly this technology started emerging to business areas such as marketing, buying and selling, is called E-commerce. In which all the business transactions are made online. E-commerce is providing many comforts to everyone at the same time there is a chance of misusing the technology. In this essay, E-commerce is discussed in detail about the security issues associated with that. Familiarity with securities increases the benefits of E-commerce to a maximum extent.   INTRODUCTION E-commerce is a type of business model for a small or larger business that enables a firm or individual to conduct business using electronic media such as internet. It can be divided into four major areas based on type of business and the parties involved in business. They are business to business, business to consumer, consumer to consumer and consumer to business. This essay explains about E-commerce, importance of E-commerce, latest applications, advantages and draw backs. This is also explains in detail about current security issues, E-commerce threats, risks and privacy issues related to various areas of e commerce. IMPORTANCE OF E-COMMERCE: In e-commerce, time plays a vital role in both the businesses and consumers. From the business point of view, with less time spent during each transaction, more transaction can be attained on the same day. As for the consumer, they will save up more time during their transaction. Because of this, Ecommerce steps in and replaced the traditional commerce method where a single transaction can cost both parties a lot of valuable time. For example, a banking transaction can be completed through the Internet within a few minutes compared to the traditional banking method which may take up to hours. This fact clearly proves that Ecommerce is beneficial to both business and consumer wise as payment and documentations can be completed with greater efficiency. APPLICATIONS OF E-COMMERCE: Now a days development of E-commerce applications is taking place rapidly. This is mainly due to the increased  number of internet users  and awareness of technology in people. Many people using internet to shop online, make bills payment and  money transfers  etc. ADVANTAGES OF E-COMMERCE APPLICATIONS: People paying more attention to do electronic transaction using internet because, they can do these from any place in the world at any time they wish. This is saving lot of time and effort and providing comfort.   The other important advantage of e commerce is the cheapest means of doing business. From the buyers perspective also ecommerce offers a lot of real advantages. Reduction in buyers sorting out time. Better buyer decisions Less time is spent in resolving invoice and order discrepancies. Increased opportunities for buying alternative products. DIS ADVANTAGES OF E-COMMERCE: However there are several benefits of E-commerce applications, there are few limitations and risks involved in using those applications. The main disadvantage of E-commerce is the lack of a business model, lack of trust and key public infrastructure, slow navigation on the Internet, the high risk of buying unsatisfactory products, and most of all lack of security. It has a great impact on traditional business system. For example,  telephone bill payment  in traditional method was expensive and time consuming than the recent online payment. Of course, the recent online payment system is cost effective but, cant provide employment in the transportation system like traditional payment method. So the major disadvantage of E-commerce applications is, it perpetuates unemployment. In some way it can provide employment to few people like  data base administrator,  internet security providers  etc. where as privacy, security, payment, identity, contract comes under drawbacks of the e- commerce. SECURITY ISSUES CONCERNED WITH E-COMMERCE: In spite of its advantages and limitations E-commerce has got some security issues in practical. E-commerce  security is nothing but preventing loss and protecting the areas financially and informational from unauthorized access, use or destruction.   Due the rapid developments in science and technology, risks involved in use of technology and the security measures to avoid the organizational and individual losses are changing day to day.  Ã‚  There are two types of important cryptography we follow for secured E-commerce transactions. Symmetric (private-key) cryptography:  This is an  encryption system  in which sender and receiver possess the same key. The key used to encrypt a message is also used to decrypt the encrypted message from the sender. Asymmetric (public-key) cryptography:  Ã‚  In this method the actual message is encoded and decoded using two different mathematically related keys, one of them is called public key and the other is called private key. To provide the maximum security using cryptography we target the following five areas: 1.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Integrity 2.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Non-repudiation 3.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Authenticity 4.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Confidentiality 5.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Privacy INTEGRITY: Integrity is nothing but message must not be altered or tampered with. There are several chances for damage of  data integrity  in the E-commerce area. Errors could take place when entering data manually. Errors may occur when data is being transmitted from one computer to another. Data could be modified or theft because of software  bugs  or  viruses. Data could be lost due to the unexpected hardware damages like server or disk crashes. There is possibility of data loss due to the  natural disasters  like  fire accidents. There are many ways to minimize these threats to data integrity. We can maintain the  Back up  of our data efficiently by updating regularly.  Ã‚  Modern technology provides us various security mechanisms to controlling access to data.  Ã‚  We can improve the data integrity through designing  user interfaces  that prevent the input of invalid data, for example menu driven applications which allow user to choose particular they are looking for.  Ã‚  We can use the  error detection  and correction software when transmitting data to develop integrity.   NONREPUDIATION: Prevention against any one party from reneging on an agreement after the fact.  For E-commerce and other electronic transactions, including ATMs (cash machines), all parties to a transaction must be confident that the transaction is secure; that the parties are who they say they are (authentication), and that the transaction is verified as final. Systems must ensure that a party cannot subsequently repudiate (reject) a transaction. To protect and ensure digital trust, the parties to such systems may employ  Digital Signatures, which will not only validate the sender, but will also time stamp the transaction, so it cannot be claimed subsequently that the transaction was not authorized or not valid etc. AUTHENTICATION: In E-commerce, authentication is a process through seller validates the information provided by the buyer like credit card information. In this  process verification of both the cardholders identity and the payment cards details are checked. In E-commerce transactions sellers must be very careful and responsible to provide good payment authentication services. A well developed and implemented transaction authentication process will decrease the number of customer disputes and charged-back transactions. If the E-commerce website do not have the good authentication system could lead a great loss of both data and money.     CONFIDENTIALITY: Confidentiality is protecting our data from unauthorized users. That means whatever the data or information shared by the merchant and the customers should be accessed by those two parties only. No other should be able to access such data. To maximize the confidentiality we must follow good  encryption and decryption methods, proper authentication and authorization procedures. We must use good antivirus or software error detections system. PRIVACY: Privacy is a major concern in E-commerce area which tells the E-commerce user how long his or her personal information is going to be stored in web site owners database, how safely they delete such personal information and what are the legal actions will be taken if the ecommerce website is misused. In online transactions, the website owner or service provider will have the ability to keep a record of all the purchases made by a consumer. Each E-commerce website has its own privacy policy, as per the needs of the organization.  Ã‚  So the customers must go through the privacy policy before they utilize E-commerce website for online shopping. Otherwise the customers have to phase big problem as the seller has the legal rights to take an action on customer for misusing their website. To get rid of this problem now a days we are able to use many tools like filtering website with low privacy ratings In the e-commerce security, some of the issues to be considered in this issue they are digital signatures, certificates, secure socket layers, firewalls. I will explain each and every concept with detail explanation. Digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. A digital signature can be used with any kind of message, whether it is encrypted  or not, simply so that the receiver can be sure of the senders identity and that the message arrived intact. Digital certificate is an electronic credit card that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holders  public key  (used for encrypting messages and  digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Some digital certificates conform to a standard, X.509. Digital certificates can be kept in registries so that authenticating users can look up other users public keys. In Security socket layer, Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. SSL uses PKI and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client agree to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates. Some of the protecting networks are fire wall and proxy servers. Fire wall is to protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees where as proxy servers (proxies) is a  server  (a computer system or an application program) that acts as a go-between for requests from  clients  seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. E-COMMERCE SECURITY THREATS: However we follow security measures, there are is a chance of threats in several ways. We can classify such threats in to four types. 1.  Ã‚  Ã‚  Intellectual property  threats:  Ã‚  Some browsers use the information personally from a website without permission of the website owner. For example, music downloads, software pirating  etc. To get rid of this problem website owners have to use secured authentication system 2.  Ã‚  Client computer threats:  Ã‚  Sometimes client computers may impose for electronic threats like  Trojan horse, viruses. Which enters the client computer without users knowledge, steal the data and destroy or crash the client computer. To avoid these types of threats we need to use good antivirus system which should be updated regularly. The website owners should implement a strong privacy policy.   3.  Ã‚  Communication channel threats: As internet allows anyone to send and receive information through many networks. Data may be stolen, modified by unauthorized users of hackers. Hackers can develop software to steal the user Identification and pass words as well. Spoofing is another major threat while data is being transmitted electronically.  Denial of service  is also one of communication channel threat, where hackers sends unlimited number of requests to the target server, which big number of requests may not be handled by the server. Obviously the genuine user will find websites of that server are always busy.  Ã‚   We can overcome the communication channel threats using public key encryption and private key encryption.  Ã‚  We can also use proper protocols to get rid of communication channel threats. Digital signatures are another way we can follow to minimize these kinds of threats. Where the actual message which we need to send is decrypted and bound with senders private key and a signature is added to that will be send to the receiver. The receiver uses senders public key and signature for decryption to see the actual message. 4.  Ã‚  Server threats: Denial of service is a major threat for the servers, where hackers generate a program which sends many requests from the client side that cannot be handled by the server. Spamming  is another important threat for the servers. To protect our server from the above threats we can use authentication for web access, digital signatures and firewalls. Firewalls check the incoming requests packets and if anything which does not match with the server related data, they simply reject those requests. Some of the tools to achieve the security they are encryption, firewalls, security tools, access controls, proxy systems, authentication and intrusion detection. HOW TO DEVELOP AN E-COMMERCE SECURITY PLAN: Perform a risk assessment Develop a security policy Develop an implementation plan Create a security organization Perform a security audit Firstly, security plan starts with risk assessment which means an assessment of the risks and points of vulnerability. Secondly, security policy is a set of statements prioritizing the information risks, identifying acceptable risk targets and identifying the mechanisms for achieving these targets where as in the implementation plan it will take to achieve the security plan goals. Thirdly, security organization educates and train users, keeps management ware of security threats and breakdown, and maintains the tools chosen to implement security. Lastly, security audit involves the routine review of access logs. MANAGING RISK IN E-COMMERCE: To be able to manage the risk in E-commerce first step is identify the risk factor whether it is intellectual property threat, communication channel threat, client computer threat  Ã‚  Ã‚  or server threat. Then we take a counter action against the relevant risk as explained above. If we dont do this regularly, E-commerce may mislead the customer because of the data stealing of modification. Customers and the website owners may lose valuable account numbers; pass words and other personal information. As E-commerce is worldwide, it could lead for the global loss for both customers and sellers. CONCLUSION E-commerce is a type of business model for a small or larger business that enables a firm or individual to conduct business using electronic media such as internet. In e-commerce, time plays a vital role in both the businesses and consumers. E-commerce  security is nothing but preventing loss and protecting the areas financially and informational from unauthorized access, use or destruction.  Due the rapid developments in science and technology, risks involved in use of technology and the security measures to avoid the organizational and individual losses are changing day to day.  In the e-commerce security, some of the issues to be considered in this issue they are digital signatures, certificates, secure socket layers, firewalls. To develop a security plan five major steps have to be considered they are risk assessment, developing security policy, implementation plan, create a security organization and performing a security audit. To reduce the risk from the Trojans, worms ev ery one should implement the security plan.

Sunday, January 19, 2020

Online Reservation

Introduction of online reservation system Hotel Reservation System is an easy-to-use reservation management software that can manage your hotel or motel, Ideal for reservations, Hotels and guest houses, Affordable – no cost per booking charges, Easy To Use, Track Customers and avoid Double Bookings, Analyze Reservation Patterns,Automatic Calculations, Reporting System, Multi-users and rights managements, RoomTypes Rooms managements and RatePlan managements. Hotel reservation software with a difference. The ideal alternative to manually tracking customers. No longer is there a need to keep mounds of paper or lose customer details. Hotel Reservation is a reservation software system designed to simplify the booking process and allow you to get on with running your business. Enter the computer age and reap the benefits of automating the reservation process. Track customers and more importantly help keep the repeat customers. You can analyze reservation trends and work towards your future needs. Rearrange reservations and allocate rooms without an eraser in sight! Managing repeat customers and recording customer preferences helps you to retain your customers. Make your customers feel unique and special by recording personal notes. Welcome them with their nickname at the door! Following the long term trends is important in your hotel. Hotel Reservation makes this easy with our reporting system. With just one click you can analyze trends. Monitor the performance of your promotions and advertising quickly and easily. Each time you make a reservation, the room status is updated and the customer details are added to your hotel database. Conceptual Framework of the Study Figure1, shows the paradigm of the study that online reservation is must for the INN to gain higher-level of competitiveness among its competutor Input Process Output Provide faster, more Accessible & to lessen failures in room reservation. Gain higher level Competitiveness. INN Service Query Customer Information Inn Reservation Online Reservation System Figure 1. paradigm of the study RBC INN Provide faster, more Accessible & less effort in INN room reservation. http://www. oppapers. com/essays/Online-Reservation-System/632909 http://www. fileguru. com/Hotel-Reservation-System/info http://www. scribd. com/doc/19244137/Online-Hotel-Management-Syst em Online Reservation Introduction of online reservation system Hotel Reservation System is an easy-to-use reservation management software that can manage your hotel or motel, Ideal for reservations, Hotels and guest houses, Affordable – no cost per booking charges, Easy To Use, Track Customers and avoid Double Bookings, Analyze Reservation Patterns,Automatic Calculations, Reporting System, Multi-users and rights managements, RoomTypes Rooms managements and RatePlan managements. Hotel reservation software with a difference. The ideal alternative to manually tracking customers. No longer is there a need to keep mounds of paper or lose customer details. Hotel Reservation is a reservation software system designed to simplify the booking process and allow you to get on with running your business. Enter the computer age and reap the benefits of automating the reservation process. Track customers and more importantly help keep the repeat customers. You can analyze reservation trends and work towards your future needs. Rearrange reservations and allocate rooms without an eraser in sight! Managing repeat customers and recording customer preferences helps you to retain your customers. Make your customers feel unique and special by recording personal notes. Welcome them with their nickname at the door! Following the long term trends is important in your hotel. Hotel Reservation makes this easy with our reporting system. With just one click you can analyze trends. Monitor the performance of your promotions and advertising quickly and easily. Each time you make a reservation, the room status is updated and the customer details are added to your hotel database. Conceptual Framework of the Study Figure1, shows the paradigm of the study that online reservation is must for the INN to gain higher-level of competitiveness among its competutor Input Process Output Provide faster, more Accessible & to lessen failures in room reservation. Gain higher level Competitiveness. INN Service Query Customer Information Inn Reservation Online Reservation System Figure 1. paradigm of the study RBC INN Provide faster, more Accessible & less effort in INN room reservation. http://www. oppapers. com/essays/Online-Reservation-System/632909 http://www. fileguru. com/Hotel-Reservation-System/info http://www. scribd. com/doc/19244137/Online-Hotel-Management-Syst em

Saturday, January 11, 2020

Labor Relations Project and Presentation Essay

Labor Relations is a very delicate part of a business that should be properly reviewed and studied before implementing or changing a businesses conduct. Happy Trails is a medium-sized company that is trying to minimize cost to continue to serve its tenants with a cost effective service. Unfortunately cost has to be reviewed in all possible ways and strategies. We will be covering a few of the advantages and disadvantages of unionizing. A recommendation will be given to help guide Happy Trails. A review will also be conducted of the issues a union might raise during the organizing effort. The steps that should be covered by the LPN’s will also be presented. We will then present the labor practice that the LPN’s should avoid. We will then advise the independent living home management on what we feel they should do. We will cover the arguments and defense the hospital will rise to the unions organizing issues. Then we will take a look at what the company must do if they resist unionization. We will then see what unfair labor practices need to be avoided by management. We will finalize this paper by reviewing what activities Happy Trail management should and should not engage in. Advantages & Disadvantages The advisement to unionize, or not, is a complicated stance. There are advantages and disadvantages on both sides of the decision. With a decision to unionize, the LPNs would be protected and guaranteed wages and certain work conditions. On the other hand, Unionizing immediately creates an adverse relationship between members and the employer sometimes out weighing the benefits. In the event that a group of employees has a community of interests coupled with concerns about their treatment as an employee by an employer for any reason, the employees have the right under the National Labor Relations Act (NLRA), (Bennett-Alexander & Hartman, 2007). Recommendation In this case, the recommendation for the LPN’s would be to unionize. This would protect them from being over (or under) worked, insure that proper wages and entitlements were established, as well as make sure Happy Trails was not expecting or giving RN level care through the lesser qualified LPNs. Steps to Unionize For the group of LPN’s at Happy Trails, the first step would be to contact the local healthcare union representative mentioned in the overview. This would be a perfect starting resource for information, questions and answers. This is also the step in which the union should become clear about what issues are important and expected to be addressed by the collective bargaining. For the LPN’s at Happy Trails, their issues should be concentrated on wages, minimum hours worked, overtime terms, benefits, as well as clearly understanding the scope of their expected duties. Secondly, the LPN’s would need to decide to join an already established industry union, or to create a union of their own. In either case, a sufficient number of authorization cards (or petition signatures) must be acquired, and the union must be voted in during a union representation election, or by asking the employer to voluntarily recognize the union. The National Labor Relations Board supervises and the union election, and certifies the results (Bennett-Alexander & Hartman, 2007). The last step is to win a strong union contract. The LPNs in this case would need to negotiate wages paid, overtime payment terms, benefits, and minimum expected hours worked. Any union is only as valuable as the contract agreed upon. Unfair Labor Practices that should be Avoided by the LPNs Generally, most unfair labor practices are committed by the union or the employer. The only unfair labor practice the LPNs should avoid is to not try to coerce their fellow workers to join the union. Should Happy Trails Oppose Unionization? Although unionization of groups like nurses is typically non-traditional, over the past 10 years there have been many registered nurses’ groups that have unionized across the country because of the demand for their employment and the shortage of nurses. Because of the need to have every American be able to afford healthcare, licensed practical nurses are in demand more because of their lower wages. Happy Trails should not oppose unionization. There are many other healthcare facilities in the area who are working with unions Happy Trails would benefit by negotiating with a union also. Because of the unhappy nurses at Happy Trails, trying to block unionization would probably be the worse step for the organization take. Employees may feel that management’s trying to manipulate them and this can decrease employee morale. The nurses may go to any of the other facilities to seek work and representation by the union for better working conditions. If Happy Trails loses more nurses, it may be hard to recruit new workers. Steps to Resist Unionization Tactics and strategies must be implemented in order to resist unionization. One strategy that has been used in the past is to hire consulting firms, also known as union busters (Bennett-Alexander & Hartmann, 2007). These firms use methods that discourage employees from voting to have union representation. This strategy is a costly one and should only be used if basic steps are not working. One important step to avoiding unionization is through employee relations (Thomas & Associates, 2009). Employee relations programs have the employees best interest in mind. An effective program will help employee/employer communication, which can help resolve any issues or dissatisfaction. If step one does not stop union organizing, the next step is to prevent the union from gaining employee support. Throughout this step the company should inform the LPN’s of the cons of signing a union authorization card. If the employees are informed and feel valuable to the company they will be less likely to sign a union card. Information can be provided through meetings, letters, and bulletin boards. If an election campaign begins because 30 percent of employees signed cards, the next step is to resolve any employee issues and to legally convince employees that their best interests are served by rejecting the union. Happy Trails would need to build a strong campaign and reinforce the value of the existing benefits and the excellent working conditions. Arguments against Unionization by Happy Trails Arguments Happy Trails can use against unionization include the following: †¢ Funding the workers’ salary if a union exists †¢ Relationships between employee and employer may be threatened with a union †¢ Union dues paid by employees is taken from their paycheck †¢ The union cannot guarantee anything What unfair labor practices need to be avoided by management? a) Management should not try to control or interfere with union affairs. They should not try to get their favorite/certain candidate to be elected to the union office. b) Management should not discriminate against employees who join or is in favor of brining in a union. They should not discriminate against employees â€Å"who exercise their rights under the law (e.g., terminating, demoting, or giving poor working schedules to such employees).† (Bennett-Alexander & Hartman, 2007, pg 666) c) Management should not interfere, threaten or restrain their employees from exercising their rights under the labor law legislation, for example, they should not tell employees that they are not allowed to have unions or they will be punished or terminated if they do bring a union). d) Management should not refuse to bargain with the union. And they should not refuse to bargain in good faith. †¢ Happy Trails’ management team may engage in any number of activities during the unionization. Which of the following would you advise? Explain why or why not? Activities during Unionization Promote LPNs, offer bonuses, and place some into leadership and management roles. Unionization can be a long process but is quite beneficial for the LPN’s. Unions are typically formed because employees are unhappy with their pay, working conditions, or poor benefits. For that reason the activity management should engage in is to actively promote LPN’s, offer bonuses, and place some into leadership and management roles. This is the best tactic to use and could benefit Happy Trails as well as the LPN’s. However, the company has to make sure the tactics do not interfere with the employees’ efforts to unionize. Raises and opportunities must be given to everyone, not just union supporters; otherwise the National Labor Relations Act (NLRA) could view the act as illegal and as unfair labor practices. As long as the employer bargains in good faith no law has been broken. Tell employees salary increases must cease to finance the collective bargaining agreement. This option is not viable therefore I do not recommend it. Utilizing scare tactics and threatening to cease salary increases will do more harm than good. Strikes could occur, which would have a negative impact on the company. The LPN’s shouldn’t feel like they are being punished for going with the union. Explain current employee benefits to the LPN’s, comparing them to union promises. Though this option is informative it is timely. There are cons to being in a union such as dues and possible strikes. Providing information to employees could sway their decision especially if they are not familiar with the union practices. However, overall the union has benefited employees, which is why this method could be more wasteful than effective. Most union members have better benefits and pay than non-union members. The LPN’s are aware of the superior wages and benefits other LPN’s in the areas have received therefore there is not much to explain. Threaten to close facility due to union campaign Being that Happy Trails is a health care facility, closing the facility would not be practical. It would also be considered discrimination against employees if they closed the facility down due to the union campaign. The NLRA does not allow discrimination against employees for participating in union activities. By staying open, they have the upper hand and it would give them more opportunity to explain the disadvantages of a union to their employees. Assist in circulation of antiunion petitions. During a unionizing campaign an employer cannot assist in antiunion petitions. Assisting in this activity could be considered interference by the employer. Participating in these activities is illegal and viewed as unfair labor practices. Counter union exaggerated claims on flyers. We recommend the management not to send the flyers with exaggerated counter offers to union claims. The management is not supposed to â€Å"promise wage increases or other benefits if employees don’t join the union.† (Bennett-Alexander & Hartman, 2007, pg 673) And they are not supposed to e-mail, post or circulate any intimidating letters or leaflets (flyers). The management can however give pay raises or benefits, but they have to give them all across the boards, not only to the union supporters. However, this tactic is limited if the management decides to do this after the union has applied for the certificate or has given notice to the management to bargain its first agreement. Tell employees they do not need to talk to union organizers, that they may vote against the union, and that the independent living home does not welcome the union. We recommend the management to talk with the employees, and tell them that they have the option to join the union, but it’s not mandatory for them to join. They can also tell the employees that the independent living home does not welcome the union, but if the employees vote for the union, the management will follow the good faith bargaining agreement. Solicit employees to request the return of their authorization cards. We would recommend the management not to ask employees to return the authorization cards (badges) that mean you are letting them go. Employers can not threaten to fire, lay-off or terminate employees for supporting or joining a union. Tell employees they may be replaced if they vote for the union. We would recommend the management not to tell employees that they will be replaced if they vote for the union. That would mean the management is threatening the employees. Management can’t threaten to fire, lay-off or terminate employees for supporting or joining a union. Appeal to the employees to defeat the union. We would recommend the management to talk with the employees and tell them not to vote in favor of the union. The independent living home will do everything possible to raise the wages and benefits as much as possible if the union is defeated. The management has to be careful not to negatively influence the employees against the union. The management can also tell the employees, that if the union is organized, we will treat the collective bargaining process with full faith and not follow any unfair labor practices. The management also can state that we will follow exactly what the law requires. Statistics for union members in United States and California (Statistics, 2013): [pic] Conclusion When making huge changes that change an employees, benefits, pay, rights, and responsibilities it is very important and should be done very carefully. A company must remember how important these changes are to people and what issues could be created if the employees feel they are not being taken into consideration. When an employee feels violated they can go to extreme measure like becoming part of a union. A union can become a huge burden for a company and cost employees money. Many of the reasons why employees look at unions can usually be avoided and handled in house. Employees should also remember that a union cost money and they should search for a union that is worth their money. Unfortunately sometimes employees end up loosing more than winning when they become part of a union. If the people in the union are not doing their job and looking out for all employees then they might just be spending their money and not getting what they deserve. References: Bennett-Alexander, D. D., & Hartman, L. P. (2007). Employment law for business (5th ed.). Boston, MA: McGraw-Hill. Ch. 14-Labor Law. Pg. 666 & 673. Labor Union Statistics. Retrieved on February 17, 2013. http://www.bls.gov/ro9/unionca.htm Thomas & Associates (2009). Avoiding Unions. Retrieved February 18, 2013 from http://www.employersattorneys.com/employment-law/California-employer-how-to-

Friday, January 3, 2020

Essay on A Farewell to Arms - Use of Weather - 774 Words

A Farewell to Arms is a gripping novel that tells the tale of an American soldier, Frederic Henry, in Italy during The Great War who is torn between his duty as an officer and the love of his life, a nurse named Catherine. In the novel, Ernest Hemingway brilliantly uses nature to symbolize and foreshadow certain events in the couples difficult journey to escape the war and be with each other. Rain, snow, lakes and rivers all represent either loss, safety, or freedom for the two. Rain clearly symbolizes loss, death and tragedy in the story. This is established very quickly, as in chapter one Henry states that, At the start of the winter came the permanent rain and with the rain came cholera ... in the end only seven thousand died of it†¦show more content†¦It also represents safety when Henry and Catherine are in their home up in the mountains, completely surrounded by snow, where the war would not reach them nor the battle police to arrest Henry. It was because of this knowl edge, how the snow brought an end to the fighting, that many people were hoping it would come once rumors of an enemy offensive were surfacing because snow would make it difficult for the enemy to fight and advance. When Henry returns to the front, the major says, I dont believe they will attack now that the rains have started. We will have the snow soon (165). Because the snow would be coming soon, the Italians didnt believe that an offensive was coming and were thus caught completely off guard when it did. In that way, snow symbolizes safety in the story. Symbols for freedom in the novel are natural waterways. Twice, Henry is able to escape war by either a river or a lake. During the retreat, many officers in the Italian army were being blamed for the armys embarrassment and shot. Henry, being an officer, was pulled to the side and put in a line to be shot. Not allowing himself to be killed, Henry, ducked down, pushed between two men, and ran for the river(225). He sprang into the river and was eventually able to get out downstream. He was then able to find new clothes and was completely free from the army, the river being his liberator. Once reunited with Catherine, they stay at a hotel on a lake. One nightShow MoreRelatedA Farewell To Arms And The Lottery By Shirley Jackson1392 Words   |  6 PagesKelly Warner 29 September 2017 EN 234 – Introduction to Fiction Setting and Symbolism In the novel â€Å"A Farewell to Arms† by Ernest Hemingway and the short story â€Å"The Lottery† by Shirley Jackson, there are distinct similarities and differences in the setting and symbolism used throughout. In order to see what the authors are trying to say, from time to time, you have to look deeper into the facts in the writing and analyze. Both of these stories are extremely stimulating, while still being heartbreakingRead MoreSymbolism Of Rain In Ernest Hemingways A Farewell To Arms1246 Words   |  5 PagesSymbolism of Rain in A Farewell to Arms In A Farewell to Arms, the change of weather and physical setting play an important role in the emotional changing of the book itself. Due to the time period in which A Farewell to Arms was written and the themes used, Hemingway is known to be a writer of the modernism literary era, which was characterized by the frailty, disbelief, and eventual brokenness felt following World War 1. When Frederic Henry physically changes location, there is a shift in the bookRead MoreThe Symbolism of Water in A Farewell to Arms by Ernest Hemingway603 Words   |  3 PagesThe Symbolism of Water in A Farewell to Arms by Ernest Hemingway A Farewell to Arms, by Ernest Hemingway, is a story about love and war. Frederic Henry, a young American, works as an ambulance driver for the Italian army in World War I. He falls tragically in love with a beautiful English nurse, Miss Catherine Barkley. This tragedy is reflected by water. Throughout the novel Ernest Hemingway uses water as metaphors. Rivers are used as symbols of rebirth and escape and rain as tragedy andRead MoreAnalysis Of Ernest Hemingways A Farewell To Arms1843 Words   |  8 PagesHemingway returned home he began writing a book based on his experiences of WWI. That book is A Farewell to Arms. In 1929 he published this book and it was met with mixed feelings and calls for it to be banned. I believe that A Farewell to Arms should not be banned because it brings to light many different viewpoints about the war as well as strong literary strategies beneficial to good writing. A Farewell to Arms by Ernest Hemingway is a book about love and war set in Italy during WWI. The book beginsRead MoreThe Motif of Ernest Hemingway ´s A Farewell to Arms 1073 Words   |  5 Pagesevents that remind humans of morals or things that are important. In the novel â€Å"A Farewell to Arms† many events come again and again. Usually, these events that repeat or come again have a deeper message inscribed in the text. This is not unlike whereas the novel â€Å"The Great Gatsby† has weather that unfailingly matches up with the tone and mood of the text. The author Ernest Hemingway has created â€Å"A Farewell to Arms† with a motif that is very precise. The motif of rain and nature in Hemingway’s novelRead More Farewell to Arms Essay2405 Words   |  10 PagesFarewell to Arms The symbolism in â€Å"A Farewell to Arms† by Ernest Hemingway is vivid and dynamic, and in the novel the rain and other factors, symbolize despair. The symbols all are presented in varying forms. The other symbolic factors include; lakes, rivers, snow, ice, mountains, plains, night, seasons, weather, Catherine’s hair, Frederic’s beard, officer stars, riding crop, the painted horse and the silhouette cutter. The symbolic concepts are; the baby, war, love, wounds, and the enemy. Read More heroarms A Comparison of Code Heroes of A Farewell to Arms and For Whom the Bell Tolls2088 Words   |  9 PagesThe Code Heroes of A Farewell to Arms and For Whom the Bell Tolls      Ã‚  Ã‚  In Ernest Hemingways fiction, there is something known as the Hemingway Hero.   This term is usually applied to the male protagonist in his works.   The Hemingway hero illustrates a variety of traits, ranging from heavy drinking to his role as a leader among the characters with whom he interacts.   Traits of this hero also resemble the personal characteristics of Hemingway himself, and the hero usually finds himself inRead MoreThe Jilting of Granny Weatherall Essay748 Words   |  3 Pagesmasterpiece, has chosen the name Weatherall for the main characters name, throughout this essay, and during of the story we see how the name comes to be of importance. Granny has had a very difficult life and for her last name to be Weatherall, (weather-all means to endure whatever it takes to still be standing strong) is a play on words I think the author put in just to awake the reader. At the beginning of the story we are introduced to an elderly Granny Weatherall who has become bed strickenRead MoreLiterary Analysis : A Farewell To Arms1112 Words   |  5 Pages-- called the â€Å"Lost Generation† -- has a different demeanor towards religion and humanity than past generations. They view life as the following: fleeting, violent, full of loss, despair, and unavoidable change. In Ernest Hemingways novel A Farewell to Arms, Hemingway follows the story of Lieutenant Frederic Henry, an ambulance driver in the Italian army during WWI. Through Lt. Henry’s journey, Hemingway sends the message that people are powerless to change the events happening around and to themRead More Analysis of Hawthornes Young Goodman Brown Essay1517 Words   |  7 PagesGoodman Brown begins, we are introduced to goodman Brown and his wife Faith as they bid farewell to one another on the streets of Salem village. It is sunset and goodman Brown is setting off on a journey to r un a secret errand. We later find out that he is planning on meeting Satan and sacrificing his soul to pure evil. Throughout the story, goodman Brown is tormented by the idea of evil and he is doubtful of weather or not he should continue on his journey. He is finally persuaded, however, when he