Monday, January 27, 2020

Rape And Issues In The World Today Criminology Essay

Rape And Issues In The World Today Criminology Essay Rape is a huge issue that plagues the world today. It is a worldwide issue, and is not specific to any one country. Rape also can impact anyone at any time. It is not specific to any one neighborhood, race, gender, sexual orientation, age, or financial status. Rapes continue to happen frequently, and yet many are not reported to the police. Rape is widely thought to be the most underreported crime. There are many stigmas that go along with rape, so it makes it difficult to come forward. Also, it is sometimes difficult to prove rape when there are no physical signs. The victim may also fear being further victimized through the investigative process, so the crime is not reported. Furthermore, with the easy availability of illegal drugs, date rape has become more commonplace. Although date rape can occur without drugs, many times people use illegal substances to render their victims powerless against their advances. This is one form of date rape. In these cases, the victims do not even know what happened to them, and if they were even raped. Some of the drugs can create loss of memory, so it makes it impossible for the victim to express what happened. There are many different drugs used for date rape. Some, like alcohol, are not illegal substances. However, many of the drugs used in date rape are illegal substances. Rape can leave the victim feeling powerless. Many victims experience rape trauma syndrome, which can severely impact their lives. With the prevalence of rape in all communities, it is crucial for people to stay vigilant and aware of their surroundings. Although it is impossible to ensure complete security, there are ways to maintain safety. It is important for everyone to make their own drinks so that no one can slip any drugs into them. Also, a buddy system can be very beneficial to help everyone stay safe, and not end up a bad situation. Reasons Why Rape is Underreported Rape is one of the most underreported crimes. The Uniform Crime Report is an annual report that includes offenses reported to law enforcement agencies at the city, county, and state levels (Meadows, 2010, p. 5). This report details the offenses that are reported to the authorities. The National Crime Victimization Survey is a source of data that recognized incidents not reported to the police and includes a detailed report of crime incidents, victims involved, and trends affecting victims (Meadows, 2010, p. 9). Both the Uniform Crime Report and the National Crime Victimization Survey include information about rape, yet they each report drastically different numbers. There are significantly more rapes reported in the National Crime Victimization Survey than in the Uniform Crime Report. It has been reported by the U.S. Department of Justice that only 31% of all rapes are reported to the authorities (Arrigo, 2006, p. 108). This creates a problem in the criminal justice field because it is difficult to put a stop to rape when most people do not report their victimization. There are many reasons why rape is underreported. The National Crime Victimization Survey found that the most common reason given by victims of violent crime (including rape) for not reporting a crime was that it was a private or personal matter (Meadows, 2010, ps. 9-10). Other reasons why victims may not report rape include fear of reprisal, embarrassment, or the belief that the victim may not be believed (Meadows, 2010, p. 10). These issues all contribute to the underreporting of rape. Rape is a profoundly different type of crime as the attacker is using their body as a weapon. Instead of merely stealing some personal item that can be replaced, the attacker takes something from the victims body and mind, which can never be replaced. This ordeal may only last a few minutes, but feels like hours to the victim as they wonder what will happen next. Also, it can last longer in cases of gang rapes. Once the event is finally over and the victim realizes they have survived, they may not want to talk about it with anyone, and especially not law enforcement officers and prosecutors. Rape truly is the most personal of all crimes. Many people do not talk about sexual matters at all, so they are even less likely to discuss rape. If someone was raised in an environment where they did not talk about sexual things, they will be less likely to report a rape as an adult. It is difficult enough for the victim to get through the actual experience, and victims do not want to have to relive it several times with many different people. Unfortunately, that is the only way to bring justice to the attacker. If the victim comes forward about the attack, they will have to talk to the police at least once, talk to the prosecutor, and talk to the judge or jury depending on the type of case. It would not be as difficult if the victim only had to discuss the issue once, but they continually have to discuss it with different people, all of whom are strangers to them. Rape can occur between a stranger and a victim, but many sexual assaults, however, occur between victims and offenders who know each other (Meadows, 2010, p. 98). This leads the victim to fear retaliation if they do report the attack. Many rapists may even threaten the victim to prevent them from going to the police. Victims take these threats seriously because the attacker has already shown their violent nature, so they may be capable of much worse. In the case of date rape, the attacker may know where the victim lives and works, and this makes their threats more dangerous because they know how to find the victim. A survey of college women showed that 38% reported sexual victimization that met the legal definition of rape or attempted rape, yet only 1 in 25, or 4% reported the incident to the police (Arrigo, 2006, p. 109). This is just a small illustration of how many rapes go unreported, and how many rapists are free to rape again. Rape victims also have to fear the embarrassment that a rape case can bring. When someone does report a rape and it goes to court, the defense may try to prove it was consensual, or that the victim wanted it. Also, the police officers may ask questions that appear to blame the victim. Although there are laws protecting rape victims to a certain extent, there is still embarrassment that goes along with reporting a rape. Many date rape victims are reluctant to report the act for fear that their own behavior will be scrutinized by others (Meadows, 2010, p. 98). This may be because many of the victims of date rape had been drinking or otherwise involved in some type of festivity when the rape occurred (Meadows, 2010, p. 98). Because of their partying, victims may not want to come forward. This also brings embarrassment into their family. It the rape is reported to the police, the family will find out eventually, and the victim may not want them to know. They may want to protect their fam ily, or are simply too embarrassed about the attack. They may not want their parents to know the terrible thing that was done to them. They also may feel partially responsible because they had too much to drink. Ultimately, they do not want to have to talk to complete strangers about what someone did to their own body. Rape is also underreported because victims fear they will not be believed. Many rape cases end up being he said, she said because there is no physical evidence. If there are no bruises or cuts on the victim, it is difficult to prove rape. The emergency room doctor can do a rape kit shortly after the attack to see if there is any evidence. However, even if bodily fluids are found on the victim, that only proves that there was a sexual encounter, it does not prove whether or not it was a consensual act. Many rapists may use verbal threats to get the victim to comply, so there may be no physical marks or bruising. Some women fight back, but others do not because of fear. Rapists may have a weapon they threaten the victims with, so it may be smarter not to fight back in that case. However, this makes it difficult to prosecute. If victims know that there are no bruises or cuts on their body, and it will be difficult to win a case, they many not even report it. Some victims may not report rapes because they do not trust the police. This is especially seen in certain cultures that exhibit a distrust of law enforcement. This may be for many reasons. They may have grown up in a low-income environment where many people participated in illegal activities. They also may have had negative personal experiences with police officers. Also, if they are in the country illegally, they are less likely to report a crime. They may also have a friend or family member who was arrested, and that makes them dislike the police as well. It can also be difficult for victims to come forward regarding sexual assault due to the large percentage of male law enforcement officers. When someone reports a rape, they are asked extremely precise and intimate questions about what exactly the attacker did to them. They have to give details about the encounter that may be difficult to talk about, and it is even worse when the victim is female, and has to discuss it with a male. Although males can be victims of sexual assault, many victims are females, and they have to talk to male officers about their sexual assault. It is uncomfortable for many people to talk to a stranger about anything sexual, so to discuss a sexual assault is even worse. This is made even more challenging as officers can sometimes seem to be uncaring. The officers job is to collect the information about the crime. They are not responsible for consoling the victim, so they may come across as being abrupt or unsympathetic. This only causes the victim more pain as they have to discuss the assault and feel like they are not getting any sympathy. These are only a few of the reasons why rape is underreported. Victims have their own reasons for not reporting rapes, including fear of embarrassment, fear of retaliation, and the fear that they will not be believed. They also may not want to discuss this due to the personal nature of the crime. Victims may just want to move on with their lives and act like the assault never happened. What is date rape? There are many different types of rape. One type is called stranger rape. This is when a complete stranger rapes someone. These rapists often use weapons and threats of violence to gain the victims submission (Arrigo, 2006). However, the most common type of rape is called date rape. This occurs when someone is raped by a person they know. They may be on a date with this person, or be socializing with them at a party. This is extremely common, and often happens on college campuses. Date rape can also include when the assailant uses some type of drugs to make the victim powerless against the attack. Most rapes occur between victims and attackers who are known to each other. In fact, among victims 18-29 years old, two-thirds had a prior relationship with the rapist (Meadows, 2010, p. 97). Many rapists attack ex-girlfriends, casual acquaintances, or people they are currently dating. These rapes are especially difficult as the attacker is someone the victim knows and trusts. The victim may even have to see the rapist around town if they decide not to report the rape. In addition, studies on college campuses have indicated that date rape is increasing (Meadows, 2010, p. 98). An alarming survey shows that more than half of a representative sample of more than 1,000 female students at a large urban university had experienced some form of unwanted sex (Meadows, 2010, p. 98). Of these reported acts, twelve percent were done by casual dates, while 43 percent were done by steady dating partners (Meadows, 2010, p. 98). One study found that many women raped by men they know do not think of themselves as rape victims (Meadows, 2010, p. 98). Perhaps they think the rape was simply a misunderstanding. Still another study shows that date rape primarily occurs when the date was unplanned or the woman had been picked up in a social setting (Meadows, 2010, p. 98). Further studies have shown that 1 in 4 college women . . . [have] been raped or [have] suffered an attempted rape (Arrigo, 2006, p.109). These studies show the frequency of date rape occurring on colleg e campuses. Many researchers have attempted to determine why date rape is so prevalent on college campuses. Mary P. Koss is considered to be one of the most prolific researchers on rape (Schmalleger, 2009, p. 403). Koss conducted much research on college campuses, and found that 73% of the rape victims reported that the offender was drinking (Schmalleger, 2009, p. 403). Some researchers point to the college lifestyle as the reason why date rape is so common. Fraternities can contribute to the formation of attitudes that and behaviors that objectify women and normalize sexual coercion (Schmalleger, 2009, p. 403). Fraternity parties have a long history of underage drinking and random sexual acts. This is a problem when the sexual acts are not consensual. Furthermore, fraternities are about brotherhood, and this creates a preoccupation with loyalty, group protection and security, use of alcohol as a weapon, involvement in violence and physical force, and an emphasis on competitiveness and superiori ty (Schmalleger, 2009, p. 403). This brotherhood mentality makes it difficult for anyone to come forward if they witness anything inappropriate. Even if a victim comes forward, the attackers entire fraternity house may come to his defense, making it difficult to win a criminal case. Date rape is far too common amongst young people today. Victims do not typically come forward to report what happened, which leaves the rapist able to do the same thing to yet another victim. The partying lifestyle found at some colleges contributes to the rape problem. Parties can end up being a place where drunken men force themselves upon others, who are unable to resist. The victim is left feeling helpless and afraid, and in some cases may not even know what happened. Drugs Used in Date Rape Sometimes rapists use drugs to make their victim drowsy or unable to fight back. There are many different types of drugs used in this way. Rohypnol, gamma hydroxybutyric acid (more commonly known as GHB), and ketamine are just a few date rape drugs that may be slipped into an unwilling participants drink. These drugs are used for date rape because they produce prolonged sedation, a feeling of well-being, and short-term memory loss (Meadows, 2010, p. 98). In addition, many drugs on the market have no particular color, smell, or taste, which makes it easy to add to a victims drink without anyone knowing (Meadows, 2010, p. 99). Because these drugs can create short-term memory loss, the victim may not even know if they were raped or not. Rohypnol is a drug prescribed for insomnia, and is also used as preoperative anesthetic (Meadows, 2010). It also has medical uses as a muscle relaxant, hypnotic, anti-convulsant, sedative, and anti-anxiety medication (Schmalleger, 2009). Rohypnol is the trade name for flunitrazepam. It is a benzodiazepine, and is a central nervous system depressant. Rohypnol can incapacitate victims and prevent them from resisting sexual assault (Meadows, 2010, p. 99). It also can create anterograde amnesia, which makes the victim not remember anything that happened while under the influence of the drug. The effects of Rohypnol can be felt within about thirty minutes of ingesting the drug (Weiss, 2008). The effects of Rohypnol can last from one to eight hours (Schmalleger, 2009). This can make the entire night a blur, and the victim may not remember anything about the night. A further danger of Rohypnol is that it can be lethal when it is mixed with alcoholic beverages or other depressants. This coul d cause a date rape to turn into a murder. This drug is not approved for use in the United States. However, the drug became more commonplace in the 1990s for date rape purposes, and became known as a roofie (Meadows, 2010). Gamma hydroxybutyric acid is another central nervous system depressant. GHB, also called Liquid X, has been used since the 1990s in the United States for its euphoric, sedative, and anabolic (body-building) effects (Meadows, 2010, p. 100). This drug was actually sold in health food stores in the 1980s and the early 1990s (Meadows, 2010). Like Rohypnol, GHB can have negative effects if taken with alcoholic beverages. It can cause breathing problems and nausea (Meadows, 2010). GHB can take effect within fifteen minutes of being drugged (Weiss, 2008). The effects of GHB can last between three and six hours (Meadows 2010). Some of the effects of GHB use are slurred speech, disorientation, drunken behavior without odor of alcohol, [and] impaired memory of events (Schmalleger, 2009, p. 540). Also, a study was conducted with 17 GHB users being interviewed about their drug use. This study found that while on the drug, 65% of users had an increased sexual desire, and 47% had decreased sexual inhibitions (Lee Levounis, 2008). Some of the subjects even mentioned that GHB could cause poor decision making in sexual situations (Lee Levounis, 2008, p. 245). This further illustrates why assailants would use this drug. If the victim is given too much GHB, the effects of overdose include shallow respiration, clammy skin, dilated pupils, weak and rapid pulse, coma, and possible death (Schmalleger, 2009, p. 540). This drug can be very dangerous. Ketamine, also known as Special K, is another date rape drug. Ketamine is used in the United States as an anesthetic, and is predominantly used on animals in veterinary offices (Justice.com, 2011). According to the United States Drug Enforcement Administration, recent press reports indicate that a significant number of veterinary clinics are being robbed specifically for their ketamine stock (Justice.com, 2011). Thieves are stealing the ketamine and selling it as a drug to party-goers. It can come in a clear liquid form, so it is very easy to slip into drinks undetected. This drug is often used as a club drug, so it is easily accessible to students who may be planning a date rape. Some of the effects of ketamine are delirium, amnesia, depression, and long-term memory and cognitive difficulties (Justice.com, 2011). This drug, like GHB and Rohypnol, leaves the victim unsure of what has taken place. The effects of ketamine can be felt almost immediately (Weiss, 2008). Also, the victim m ay be aware of what is taking place, but unable to stop it (Weiss, 2008). One date rape drug that is commonly used at parties is alcohol. According to the National Womens Health Information Center, any drug that can affect judgment and behavior can put a person at risk for unwanted or risky sexual activity (Weiss, 2008). This definition includes alcohol. Even though the victim may be willingly ingesting the alcohol, someone may take advantage of them once they are drunk. Alcohol can make it difficult to think clearly, harder to tell if a situation is dangerous, and harder to fight back if attacked (Weiss, 2008). Also, like the other date rape drugs, alcohol can cause memory loss, or a black out (Weiss, 2008). The victim may black out and be raped, and not remember what happened the next day. One common effect of date rape drugs is their ability to inhibit the victims memory. These drugs cause short-term memory loss so the victim is unsure if they were raped. This makes it less likely that the victim will report the incident to the police. In fact, the victim may not even realize they were drugged at all. If the victim was drinking the night before, it is possible they will think they simply had too much to drink. This further illustrates why date rape is drastically underreported. What Happens in the Emergency Room? After someone is raped, they may need medical attention. Most often they visit their local emergency room for treatment. It is estimated that 75% of female rape victims require medical attention after their attack (Arrigo, 2006, p. 109). Although different areas and hospitals may have different procedures for handling a rape victim, typically the process is similar. The medical staff will call law enforcement to make a police report, will call the local rape crisis group, will call the Division of Family and Children Services if a minor is involved, and will perform a full examination of the victim. When the police officer arrives to take a report of the alleged rape, they must speak to the victim. They will ask the victim to recall everything that happened in the attack. If the area has a local rape crisis advocacy group, there may be a victims advocate there to help the victim with this process. In an ideal situation, the victim can explain to the officer, victims advocate, and medical staff what took place at the same time so they do not have to repeat themselves. However, many times all parties are not present at the same time, and the victim is forced to relive the event multiple times. The victim must give details about the location of the attack, and what the attacker did specifically. They must tell exactly where the attacker touched them, and where the attacker kissed them. All of this information is crucial for the evidence collection process. Once the police officer has made the report, they will leave. The victim will undergo a thorough medical examination to ensure there are no health concerns. Depending on the nature of the attack, the victim may have a pregnancy test done. Charlotte Murton, a rape crisis specialist, noted that it is also common for the medical staff to check for gonorrhea and Chlamydia (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). The victims must follow up with their personal doctor or local health department to have a more complete sexually transmitted disease screen at a later time. Most victims are also given antibiotics to ward off possible infection. The medical staff will also check for any tearing or irritation in the areas of the attack. When the victim goes to the emergency room, they may have the option to do a rape kit or evidence kit. If the assault happened within 120 hours of the emergency room visit, the medical staff can do the evidence kit (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). This will help collect evidence for a possible trial if the victim decides to press charges. This process is extremely invasive and can even be painful, but it is the only way to collect certain evidence. Typically a rape crisis advocate will stay with the victim throughout the entire process. The process for collecting evidence in Augusta, Georgia is very specific, although the order may be changed. First, the victim must stand on a large piece of paper and undress. The paper is there to collect any loose fibers as the victim undresses. The victims clothes will then be bagged up separately in case there is evidence on the clothes (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). All of t he clothes, including underwear, will be kept as evidence. Once the victim is undressed, the medical staff will do a visual inspection to see if there are any obvious injuries. If so, these injuries will be documented and photographed. Then the victim will have to give 25 hairs from their head (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). This serves to show the DNA of the victim. Any areas the victim was licked or kissed will be swabbed for possible DNA. There also may be a swab of the victims mouth if there was any type of oral contact. The victim will then lie down with a large piece of paper below them to catch any loose hairs or fibers. The nurse will use a comb on the victims pubic hair to gather any loose hairs that may be from the attacker (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). The nurse must then use a special comb that rips out hair to gather 25 of the victims pubic hairs from the root (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). This process is especially painful. The nurse will also use a black light to see if there are any fluids that fluoresce. If something does show up, that area will be swabbed (Rape Crisis and Sexual Assault Services Volunteer Training, September 17, 2010). If the victim fought against the attacker, the nurse will clean under the victims nails to get possible debris. The nurse will also swab the victims vagina, anus, or penis depending on the nature of the attack (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). If the victim was drugged and is unsure what happened, all areas will be swabbed. There will be several swabs of each area. The victim will then be given clothes or scrubs to wear home. In areas that have a rape crisis center, volunteer advocates are on call at all times to help a victim in need. They are called in to be with the victim throughout the entire emergency room visit, and will follow up with the victim at a later date. These advocates act as liaisons between the victim, medical staff, and police officers. They can let the victim know what to expect in the examinations, and what to expect if they press charges. They also have information about places to obtain counseling and support. This is particularly important for victims who do not have family or friends with them in the emergency room. The process that victims undergo at the emergency room can be very painful and draining. They have to relive the experience to many different people and discuss extremely private matters. Many times, law enforcement officers are male, and the victim must discuss sexual things with this male. This proves to be a difficult experience as sometimes victims are not even able to articulate what happened. They may want to forget about it or not talk about it. Then they have to go through a medical examination to make sure they are healthy. If they decide not to do an evidence kit, it is still recommended that a doctor do a pelvic exam and take swabs for possible sexually transmitted diseases. If the victim does decide to go through with an evidence kit, it is a painful and invasive process. There may even be pictures taken of the victims body if there are bruises or cuts. In addition, in some areas the rape kits may not even be tested. The Texas Tribune reports that the state is so behind i n testing rape kits that it is impossible to catch up (Grissom, 2011). Some unprocessed rape kits in Texas date back to the 1980s (Grissom, 2011). Even if the kits are processed, it can take a year before the results are known (Grissom, 2011). This gives insight into why so many rapes go unreported, and why so many people choose not to have an evidence kit. Consequences of Rape Rape is a horrifying and invasive crime. It has the potential to completely change the victims life. With some crimes, once the actual crime is over, the victim can move on with their life. This is not the case with rape victims. Once the attack is over, there are many other issues the victim will encounter. Many victims of rape experience long-term consequences of their attack. There may be physical consequences deriving from the attack. There also may be emotional consequences. Many rape victims have difficulties returning to their normal lives after the attack. They may exhibit symptoms of rape trauma syndrome, a type of post-traumatic stress disorder. There are many physical consequences that can arise from rape. The victim may become pregnant from the attack. This leads to a difficult decision for the victim, made even more difficult if they do not believe abortion is an appropriate option. Some women may have religious or personal views that prevent them from getting an abortion, and thus are forced to go through a pregnancy resulting from a rape. In addition, the adult rape pregnancy rate is actually increasing based on United States Census Reports (Meadows 2010). It is estimated that there may be 32,100 rape-related pregnancies annually among America women over the age of 18 years (Meadows, 2010, p. 102). This statistic does not even include all the minors who become pregnant due to a sexual assault. Rape victims can also contract sexually transmitted diseases from the attack. Depending on the disease, there may be an easy cure, or they may have to live with the disease for the rest of their lives. If they contract acquired immune deficiency syndrome, more commonly known as AIDS, their life may actually be shortened. This is why many emergency rooms administer antibiotics when someone claims they have been raped. This is an attempt to cure a disease before it is even diagnosed. Also, some emergency rooms may have prophylactic treatment for those who may have been exposed to AIDS. Rape victims may also have acute injuries resulting from the rape (Meadows 2010). Depending on the level of violence in the rape, these injuries can be minimal to severe. Typically the most violent rapes are stranger rapes. This is because stranger rapists are more likely to involve the use of a weapon (Arrigo, 2006, p. 109). This weapon is most frequently a knife (Arrigo, 2006). If the attacker used the knife to stab the victim, there may be internal injuries or bleeding. Attackers also may beat their victims. This can lead to simple cuts and bruises or more complex injuries like broken ribs. In addition, the victim may experience vaginal or rectal tears from the rape. There are both emotional and psychological issues resulting from rape that are included in rape trauma syndrome. There are two phases of rape trauma syndrome. The first phase is the acute phase. In the acute phase, the victim experiences a complete disruption of her life, resulting from the violence she experienced (Meadows, 2010, p. 38). The victim may have a range of emotions during the acute phase, including crying, shouting, swearing, or laughing inappropriately (Meadows, 2010, p. 38). The victim may experience severe mood swings, and change emotions very quickly. They may be fearful to even leave their home. If the attack happened in their home, they may not feel safe living there anymore. The second phase of rape trauma syndrome is the reorganization phase. In the reorganization phase, victims must reorganize their lives (Meadows, 2010). This is accomplished with help from friends and family members (Meadows, 2010). During this phase, the victims have to learn ways to cope with their daily lives, and the disturbing thoughts that may enter their minds at any time. They may return to work and attempt to move on, but the pain and fear is still present in their minds. There are many different symptoms of rape trauma syndrome. Some of the symptoms include fear, helplessness, shock, disbelief, guilt, humiliation, embarrassment, anger, self-blame, flashbacks of the rape, avoidance of previously pleasurable activities, avoidance of the place or circumstances in which the rape occurred, depression, sexual dysfunction, insomnia, and impaired memory (Meadows, 2010, p. 102). These symptoms greatly inhibit the victims ability to heal and move on with their life. They may be happy one moment, and then suddenly be overcome with sadness and not able to understand where the sadness originated. While in the acute phase they may experience a wide range of emotions. When they enter the reorganization phase, they may not have quite as many mood swings, but may experience flashbacks of the attack. This contributes to their insomnia. Victims are afraid to go to sleep because they may have nightmares of the attack. They also lost their sense of control when they were attacked, and going to sleep leaves them vulnerable yet again.

Sunday, January 19, 2020

Management Information System †Nokia Essay

1.1 History of Nokia Nokia started as a wood-pulp mill in southern Finland and started to manufacture paper in 1865 by engineer Fredick Idestam. Since the demand for paper and cardboard was high and there was European industrialization, Nokia become successful. In 1895, Nokia is passed to Gustaf Fogelholm. In 1920s, the Rubber Works started to use Nokia as their brand name. Nokia produced footwear, tyres, rubber bands, industrial as well as raincoats. After World War II, the Finnish Cable Works, which was a company that had increased its market share massively as there was increasing demand for power transmission, telegraph and telephone networks. Over a period of time, the ownership of the Rubber Works and the Cable Works companies consolidated. In 1967 the companies were merged to form the Nokia Group (link to Nokia company logos). The products of the Finished Cable Works were cables for telegraph and telephone networks. In 1960’s, research was conducted into semiconductor technology by Nokia ´s Cable Work’s Electronics department which was established in the 1960. This marked the beginning of Nokia into telecommunications. In 1967, the digital switch (Nokia DX 200) which was developed by Nokia. Nokia DX 200 was equipped with high-level computer language and Intel microprocessors which had gradually evolved into the multifaceted platform that is still the basis for Nokia’s network infrastructure today. In 1981, Nordic Mobile Telephony (NMT) was formed by Nokia. It is the world’s first multinational cellular network. At the end of the 1980s, Nokia developed a a common standard for digital mobile telephony which was Global System for Mobile Communications (GSM). In 1991 Nokia made agreements to supply GSM networks to nine European countries and by August 1997 Nokia had supplied GSM systems to 59 operators in 31 countries. During the 1980s, Nokia’s operations rapidly expanded to new business sectors and products. Nokia was a large television manufacturer and the largest  information technology company in the Nordic Countries in 1988. Nokia’s telecommunications and mobile phones divisions supported Nokia during the deep recession in Finland at the beginning of the 1990s. In May 1992 Nokia changed its business strategies to fully focus on telecommunications. The company’s 2100 series phone was an amazing success. In 1994, the goal was to sell 500,000 units of phone but Nokia sold 20 million. In 1999, Nokia launches the Nokia 7110. It was a phone that had rudimentary web-based functions, including email. Then in November 2001 Nokia launches its first phone with a built-in camera, the Nokia 7650, and in September 2002 its first video capture phone, the Nokia 3650. In 2005, Nokia sells its billionth phone – a Nokia 1100 – in Nigeria, and global mobile phone subscriptions pass 2 billion. Two years later, Nokia is recognised as the 5th most valued brand in the world. By 2010, smartphone market is growing and competitors such as the iPhone and Android-based devices are affecting the sales of Nokia. However, Nokia realises it and is on its way to beat its competitors. 1.2 Mission and Strategy Nokia’s mission is simple: Connecting People. Nokia aims to build great mobile products that enable billions of people worldwide to enjoy more of what life has to offer. Nokia’s mission statement is powerful. Connecting people from all over the world is what Nokia planned to achieve. The mission statement of Nokia can be seen in its logo. Its mission statement is so powerful when people think of Nokia, they will immediately think of its mission statement. In order to achieve Nokia’s mission, Nokia has formed a strategic partnership with Microsoft in the hope to conquer smartphone market. Nokia-Microsoft ecosystem will deliver differentiated and innovative products with unrivalled scale in terms of product breadth, geographical reach and brand identity. On the other hand, Nokia’s strategy is to is to leverage its innovation and strength in growth markets to connect even more people to their first internet and application experience Nokia will continue the renewal of its Series 40 platform in QWERTY, touch  & type, dual SIM, Nokia services, including Maps, Browser, Life Tools, Web apps and  Nokia also develops its assets (platform, software, apps) from time to time to bring a modern mobile experience to consumers and enable business opportunities for developers. 1.3 Business Process Every company has its own business process in order to carry out its business activities such as planning, managing, production as well as sales in order to achieve the company’s goals. The same goes to Nokia Company. People are important to any organization as they are the asset of all the company while customers are equally vital as without them, the company will not be able to sustain the business. In Nokia, the management of people or employees is stressed. Nokia uses Human Resource Management System to manage its company personnel. On the other hand, to manage a good relationship with the customers, Customers Relationship Management (CRM) which is under Knowledge Management System is used. As in planning for Nokia’s future plans, Decision Support System (DSS) which is under Knowledge Management System is used to help managers to make decisions. The managers or leader of Nokia need to make tremendous decisions daily in operating Nokia’s business. In order to make Nokia’s business more productive, Supply Chain Management System is used to interlinked Nokia’s supplier, manufacturers, sales and logistics providers as well as customers. In conclusion, the business process of Nokia is carried out with the help of information technology and information system. 1.4 Leadership Team Stephen Elop is the President and CEO of Nokia Corporation. He is Nokia Board member since May 3, 2011 and Nokia Leadership Team member and Chairman since 2010. He joined Nokia as President and Chief Executive Officer as of September 21, 2010. He is assisted by Nokia’s Executive Vice Presidents. 2.1 Knowledge Management (KM) Information System 2.1.1 Introduction Knowledge Management is the discipline about learning, managing, and using the knowledge in terms of people, organization, technologies, technique, and other knowledge-based things. As the environment of cell phone industry has become more challenging where Nokia has to face a series of competitor such  as Apple. Inc, Sony Ericsson and Samsung Company, adapt into the new business world, survive in the market and make profit. In order to achieve these objectives and improve business performance in this knowledge era, elements such as critical thinking, creative and innovation, technology usage, ability and knowledge of employees are extremely important. Therefore, knowledge management information system is used by Nokia in order to keep up the pace of competitors and to improve the value and performance of the organization. Basically, there are three approaches to knowledge management which are system-theoretical, humanistic approach as well as sociotechnical approach. i) System theoretical approach System theoretical approach is the study of managing the information that can be applied. ii) Humanistic approach Humanistic approach is the study of how to manage the people or employee as well as emphasizing on leadership of every level of management. ii) Sociotechnical approach Sociotechnical approach is the study of the system that combines the advantages that can be achieved from both of the previous approaches. Knowledge management system that have been applied by Nokia is not necessary to be a computer system but it can be the process of various knowledge management activity such as organizing and utilizing the information, as well as other business action like strategic planning, solving problem and decision making. Input, Process, and Output Basically, there are three main elements in this information system which represents the input, process and output of the system respectively. These elements are people (input), process (process), and system (output). 2.1.1 Input (People) The system will enable Nokia company to form a long term program team which will last for one and a half years to unite the members and make sure everyone is on the right path towards the goal. Members are required to over communicate at every levels and the culture of knowledge sharing and collaboration must exist within the group. 2.1.2 Process (Process) In the process, a product taxonomy will be created to define the management process and the content acquisition for every source. In order to ensure all employees are able to access to validate the system, clear use cases are created. During the process, key metrics such as customer satisfaction, knowledge management cycle time, and other business aspect are defined. The process of information sharing also occurs within the group. The process also will identify the modification of Nokia business process. 2.1.3 Output (System) The output of the system is the better performance of business and higher ability of Nokia’s employees which represented by the knowledge management system. There is a mirror test system which enables the employee to access for testing as well as the demo of new information. This knowledge management system emphasize on the stability and efficiency of the employee that lead to higher business performance of Nokia. Diagram 2.1.1: Input, Process and Output of Knowledge Management System 2.2 Supply Chain Management System (SCM) 2.2.1 Introduction In order to ensure the entire product delivering process is undergoing correctly in term of date, destination, and quantity, Supply Chain Management (SCM) System is used by Nokia. One of the examples is Nokia-China has established an important department called Supply Logistics. Aspects such as production, material planning, resources allocating, inventories management, shipping and other supply chain activities are related to this department. The modern logistics is being described in term of the process of planning, organizing and controlling the flow and storage of products and services and these definitions are prompt to ensure customer satisfaction. The logistics activities can be divided into three parts which are supply logistics, business logistics and also sales logistics. The supply chain management system is an operational management technology that helps to manage Nokia’s activities involved from producing a product from raw  materials until the delivering of the product or service to the customers. The supply chain management is the expansion version of the integrated management of logistics with the goals to connect supplier’s partner, production and customers. 2.2.2 Input In this phase, customer order and the planning of manufacturing element are the main element for the system. The Nokia supply chain management system will receive the customer’s orders and start the planning of the manufacturing element such as resource preparation and distribution for production. The information about the delivering destination, type of product and quantity also will be identified during input processes. 2.2.3 Process During this stage, the supply chain management will complete the production proposal based on the information retrieved from the input stage. The system will allocate the production work to the available factories and distribute the amount of production based on the factor such as amount of worker and geographical reason. At the same time, the system will now start planning on the shipment schedule for the product as well as preparing the export quarantine QA form. The system will have to arrange the transportation route such as truck on land, cargo ship on sea or the flight on air, based on the location of final destination of products delivered. Once the products are finished, the production department staff will be required to attach a job ticket on the product in term of variance or not variance. Besides that, the system also needs to confirm the payment in order to release the shipment of the product as well as ensure the products are in good condition. 2.2.4 Output After the finished products are prepared to be delivered, the system will make the auto billing and perform the customs declaration. The goods will now be delivered to the final destination of the order via the decided route based on the efficiency of the route. 2.3 Human Resource Management System (HRMS) 2.3.1 Introduction HRMS is the structure and system which is progressing at the joint between human resource management (HRM) and information technology (IT). It combines HRM as a discipline and in precise its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standardized procedures and packages of enterprise resource planning (ERP) software. In Nokia, HRIS helps it to automate and manage their company’s activities, including human resource, payroll, and management, accounting activities. Throughout the process, HRIS able to allow strategic analysis of key business trends for better planning and informed decision-making. HRM is in charge of appealing, choosing, training, assessment, and rewarding of Nokia’s employees, also to manage an organization’s workforce. HRM also involve in overseeing organizational direction and philosophy, and guaranteeing obedience with employment and labour laws. HRM can be classifies into five main activities, which are Employee Record Management, Promotion and Recruitment, Training, Evaluation, Compensation and Benefits Management. 1. Employee Record Management(ERM) is an electronic and digitized system which allows Nokia members to modernise key administration tasks in easier way without looking back at filing cabinets, spread sheets or other complex processes, for example, using Microsoft Access to keep all personal info in soft copies. ERM keep and organize all personnel records of all organizational members by Human Resource department to satisfy laws requirements, for tax calculation and deposit and periodic reporting. 2. Promotion and recruitment of present and new Nokia’s employees both can be nominated by automating the process through searching database of applicants and present employees with precise requirements. Announcement of position vacancy through intranet, that works and supports Web application within organizational network able to reduce time and spending for open recruitment by allowing wide exposure. 3. Training of Nokia’s employees to increase and improve employees’ knowledge and skills is one of the important functions of Human Resource. Multimedia software training which include 3D  virtual reality simulated environment using information technology cuts training costs intensely, at the same time, reduces the risks and time taken in actual and traditional way of training. 4. Evaluating performances of Nokia’s employees periodically by supervisors, then up flow to Human Resource department is important to review individual working ability and to analyse future possibilities and planning. Employee’s practical capability, communication skills, professional behaviour and general performance are included using evaluation software to standardize the evaluation process and future comparison. 5. Compensation and benefits management that involves in Human Resource management which includes salary, wages, commissions and bonuses earned by individual and other benefits such as health and life insurance, and leave days, meanwhile, programs use by HRM could calculate pay and taxes automatically. All these are essential to encourage and compensate Nokia’s employees so they would improve and perform better in future, soon generate greater achievements for Nokia. 2.3.2 Inputs The input function of HRMS offers the capabilities needed to get the human resource information into HRMS. Some of the main things that must be established are the procedures and processes required to gather the essential data. In other words, they are the how, when and where the data will be collected. After collection, data must be entered into the system after classification. Once the data has been inserted, it must be authenticated to guarantee that it is correct. Validation tables may be used to determine if the data is acceptable. The system should have the ability of effortlessly updating and changing the validation table. For example, while open recruiting for new employees, personnel information and resumes are well kept and computerized in accordance to their experiences and performances. 2.3.3 Process The process or data maintenance in HRMS function is responsible for the actual updating of the data stores in the storage devices. As changes arise in human resource information, these should be attached into the system. As new data is brought into the system, it is often necessary to maintain the old data as future reference. For example, evaluation of employees’ performance by supervisors are noted and gathered with constructive upcoming steps and suggestions, current salaries fixed and planned increment of salaries in certain periods, and keep updating the latest information about employees include personal details. 2.3.4 Output The output function of an HRMS is the most acquainted one because the majority of HRMS users are not involved with collecting, editing/validating and updating data, but they are concerned with the information and reports produced by the system. Most human resource reports contain of selecting sections of the total population for further assessment, performing some type of calculations, using the population and providing a report containing specific information concerning the particular population and the calculation of results. The demands on the output function are the major factors that affect the specific type of software to be used. For example, departments of company are assessable into database of company with exact and current information enables to ease the process of planning and implementing new ideas and projects, information of talented and capable employees are displayed when there are vacancy for certain positions. Diagram 2.3.4 Input, Process and Output of Human Resource Management System 3.4 Information Requirements 3.4.1 Knowledge Management System There are three levels of management which are strategic level, middle level, and operational level that need to acquire different information and make different decision based on the levels of management respectively. Examples of the scope of technologies for knowledge management are business intelligence, document management, intelligent agents, knowledge resource directories, groupware and collaboration technologies, and other related technologies. The below is the information requirement for the three levels of managements: Strategic level Strategic level of management makes long term planning and decision for the company and a great deal of uncertainty is involved during the process. The  knowledge management information system provides the strategic level management with analytical information such as data mining and data warehousing, and application of other information system such as decision making system, business intelligence, and other related information system. The knowledge management systems improves the usage of these information systems by the members of the organization and retrieve data to make strategic planning and gain competitive advantage. There are some technologies are enabled as well to contribute to the strategic planning decision making process such as intelligent agents, data analysis, and reporting tools. Middle level (Tactical Planning) The middle level management that makes tactical planning can retrieve information such as asset management from knowledge management information system. Information or skills such as intellectual property, knowledge valuation, knowledge repositories document management, and content management can be acquired from the knowledge management system. As an example, the document and content management as well as the knowledge valuation allow middle level management makes better and more precise planning such as working capital, budgets formulating, production scheduling. Tools that can help in this management level are document management tools, knowledge maps and library systems. Operational level The knowledge management system plays an important role in this level of management because the system provide information that help to increase Nokia’s operational worker’s ability as well as introducing new way to smoothen the business operation process and improve efficiency. Types of information that can be retrieved from this system are transactional (case-based reasoning, help desk application, service agent support applications), process (Process improvement, lessons learned, methodology, quality management), and developmental (skills development, staff competencies, learning and teaching). The technologies available are process management tools, rule-based expert system and computer based training. 3.4.2 Supply Chain Management In Nokia-China , the supply chain management system can help out the performance of the company as the system has the following function: i.) Improve the efficiency and the exchange of information between organization by simplifying the management. ii.) Provide the goods and services to the customers within a shorter period of time. iii.) Fully utilize the available resources. Strategic level The information that can be acquired by this strategic level manager are strategic alliance formulation, focused customer service analysis, development and refinement of ability and chances where all these information are help in strategic planning. This allows manager makes strategic planning and decision to achieve higher business performance in long term. Tactical level There are two type of information that can be acquired from the supply chain management system: i) Decision analysis The decision analysis information helps Nokia’s managers to do their planning and scheduling with information like route of transportation, inventory management, network location configuration and also vertical integration with the third party. ii) Management Control The management control provides the measurement information such as financial, assets, productivity and quality that enable the manager of Nokia to do effective budgeting and controlling the product quality. Operational level Under operational level management, the information that is required are mostly related to the transaction-based information such as order entry, shipping details, pricing and invoicing, order verification and customer inquiry. These information allow Nokia’s operational manager to make a better performance in especially the production lines as well as increase the effectiveness and efficiency of the production work. 3.4.3 Human Resource Information System (HRMS) Strategic level At strategic management level of Nokia Company, HRMS is used mainly for formulation of long term plans to make decisions by company’s decisions makers, such as Chief Executive Officers and other active stockholders. Information requirement in this level will be external, very wide and aggregate in nature. HRMS is used to improve the organization’s consciousness of its surroundings situation and its competitive position in terms of attraction and maintenance of talented individuals that could contribute in its competition of certain industry. HRMS is important in strategic management level for the top users to access into information, for example the effectiveness, profitability and cost of different departments members, the availability and cost of raising new internal talent pool, total cash need and capital equipment needs to upgrade existing employees and to make decisions whether to increase or reduce costs of human resource in overall. The enterprise widespread decision support system (DSS) is a HRMS that supports decision at the top management. Here, the HRMS is more interactive and is capable of developing decision models on many tactical issues. Tactical level At the middle or tactical level, normally derives from informal sources and is collected, evaluated, investigated and measured by the manager personally. HRMS is uses to evaluate and report on the organizations activities such as, over shooting of expenses on overtime payment for employees, estimation of funds by competitors to train and improve their employees, new legislation and labour laws, industrial relation HRM trends, and so on. Statistical analyses, predicting, investments, appraisal models by HRM are important for future planning of a company, such as forecasting the amount of human resource needed while opening a new franchise company within or outside country, how much to invest to generate better production of products and services, and other future planning that relates to other departments. The importance in this level is shifting from EDP level to management information systems (MIS) level with more inquiry and report generation flexibility. This is intended for middle level managers to control operation, matching budget or projection. Operational level In operational level, Nokia is interested in mechanizing processing of routine information, where the information required is largely internal, well defined, narrow and detailed. HRIS focuses is on data storage, processing and information flows at operational level of organization. Information required in this level is linking to routine or short term information needs of the organization for example, working hours of part time employees, rate of pay per hour, detail of employees deductions and additions, attendance records of the employees, or daily working syllabus and requirements by supervisors or HRM, with the purpose of wages examines details of the time each man spent on individual work during the week or month. Due to its capabilities to provide information for processing transaction of the organization, the information system is known as Transaction Processing System or Data Processing System. Some examples of information provided by such systems to other departments such as Finance and Production Departments are processing of orders, posting of entries in bank, evaluating overdue purchaser orders etc. In HRMS it is called Electronic Data Processing (EDP) which enables data and files storage. HRMS is mainly accessible by all the operational level operators, but only showing the basic information of each and every of the employees. Management Activity Level| Human Resource Management Strategic| Strategies for recruitment, salary, training, and benefits. Analysis of shift pattern of employment, education and wage rate etc.| Tactical| Variance analysis in hiring and firing, cost of recruitment, composition of skills inventory, cost of training, salary paid, and distribution of wage rates.| Operational| Decision on hiring, training, termination, changing pay rates and issuing benefits.| Table 3.4.3Matrixes of Management Activity Level and Human Resource Management (R. Panneerselvam) Chapter 4: Importance of Each Information System 4.1 Importance of Knowledge Management System As the business world is getting more competitive since the advantage of technologies and changing of customer preference and buying trends, company  like Nokia need to improve the overall ability of the organization in order to maintain the market status. Effective knowledge management can lead to a greater revolution in business such as bringing innovative elements into business in order to create new innovative product or services. As the knowledge management system can help to improve the ability and knowledge of the workers or managers, therefore, the overall performance of everyone in Nokia can be improved. Eventually, Nokia is able to gain competitive advantage by employing higher knowledge-based worker and achieve greater business performance in the market. 4.2 Importance of Supply Chain Management System One of the key factors that enable the company to gain competitive advantage in the market and improve business performance is to have an effective and efficient SCM system to work on daily operations. The SCM system plays an important role in Nokia since it is related to other business activities such as marketing, customer relationship management and product sales. By having a good supply chain management system within the company, Nokia is able to achieve competitive advantage such as low-cost production and value-added service. Diagram 4.2.1: Importance of Supply Chain Management System 4.3 Importance of Information System towards Organization An operative HRIS delivers information on just anything Nokia needs to track and study about employees, former employees, and future employees. With an appropriate HRIS, Nokia’s Human Resources staffs enable employees to do their own benefits updates and address changes, thus freeing HR staff for more strategic functions. Additionally, data necessary for Nokia’s employee management, knowledge development, career growth and development, equal treatment is facilitated. Finally, Nokia’s managers can access the information they need to legally, ethically, and effectively support the success of their reporting employees. The Human Resources Information System provides details on administration, payroll, recruitment, and training. This system is expected to deliver valuable results to their human resources division and their organization as a whole. It is a critical tool that aids  management in making strategic decisions. An HRIS can attest to be useful in the following ways: * Management of all Nokia’s employee information. * Reporting and analysis of Nokia’s employee information. * Company-related documents such as Nokia’s employee handbooks and safety guidelines. * Benefits administration comprising enrolment, status changes, and personal information updating. * Complete incorporation with payroll and other Nokia monetary software and accounting systems. * Candidate tracking and resume management. 5.0 Impact of Usage of Information System 5.1 Advantage of Knowledge Management Information System First of all, the knowledge management system enables the business analysis to collect more precise report in a shorter period of time by retrieving only the important and relevant information from the documents. The knowledge management system provide more significant advantage to Nokia that business is conducted globally where the system allow the manager from different location to communicate by using the accurate and relevant information that facilitated by the knowledge management system. Besides that, the systems also offer intelligent search which only search for the relevant information that helps the managers in their decision making g process. Furthermore, knowledge management system also helps to improve Nokia’s customer services as the system can adapt the customer feedback and provide a better solution or services to the problem faced. 5.2 Disadvantage of Knowledge Management Information System One of the disadvantages of using the knowledge management system is the inability of the system to consistently deliver the expected performance in term of information retrieving. Other than that, integrating information  technology to knowledge management requires acceptance from all aspects of an organization. 5.3 Advantage of Supply Chain Management System Supply Chain Management System allows Nokia to provide faster responses to customer needs as the advancing information technology able to shorten the time of good product delivering. The system also changes the focus of the operation from forecasting into customer demand which maintain providing efficient service at the same time. The system also using small variation of management in order to be fault-tolerance in case the unexpected accident or any damage to the system occurs. The examples of the events are the delay of receipt issue, damage of material or product and incorrect deliver destination. Other than that, the system also maintains the low inventory level with the aim to decrease the burden of stock and material as well as improved the turnover rate to ensure the fully utilization of the stock. In term of saving cost in transportation, the system has made an innovative change which gathers the shipment of small quantities with great quantities of integrated transport where this change will decrease the cost of transportation. As the system has strengthen the requirements of quality of the product and the improvement on quality control, production process are controlled well to make sure no damage is occurred and the quality of the product is maintain before delivered to customers. There will be reduction happens in the inventory that attributed to the use of supply chain information system. The company can actually use the saved money from the reduction to spend it in other resources. 5.4 Disadvantage of Supply Chain Management System Even though the usage of the supply chain management is able to bring out a lot of advantages to Nokia, yet there are still some barriers or disadvantages. In order to create a great-performance and high-security supply chain management system, a large amount of investment of time and money is required to be made into aspect such as machinery, customer needs, shipping planning and supplier selection. 5.5 Advantage of Human Resource Management System Human resource management system is a system that human resource department used to manage the process of recruitment and keep all the date and records of all the employees under Nokia company. There are a lot of benefits can be obtain from this system. A case in point, all the data and records are gathered together in one system for external as well as internal use. By this way, it allows the management team to easily access to the details of each and every single employee in their company. Besides that, this system also makes use of the advance of technology with the big storage of data that can store thousands or millions of employee’s data and records. Furthermore, the information in the human resources management system are more accurate compare to the manually records data. There will be no changes or errors made after all the details are key in. Besides that, the data can only be access by the members allowed with high privacy and password. As such, this system can protect the privacy of the information of their company. In addition, not only the managers, the employees can also get all the human resources information in a high speed and not need to personally go to the human resources department to ask for the information needed. 5.6 Disadvantage of Human Resource Management System On the other hand, there are also some disadvantages of this system. Although everything can be computerize, but human error might occurs during the process of input. There might be some typing errors or wrong information that key in into the wrong profile. Therefore, the person in charge has to beware of these mistakes to be happened. Next, the technology of this system has to be upgraded as there might be not enough application to support the system of the current human resources needs. This upgrading of the technology might cause to the increment of expenses happen as the system upgrades are very costly. Last but not least, the demands of the expertise in the information technology are high and these expertises are getting lesser and lesser. It is being more difficult to find a qualified person in this field. Chapter 6 Conclusion In a nutshell, information technology (IT) is important to all organization in order to attain competitive advantages and success in the competitive  world. Nokia understands the importance of utilizing IT and hence Nokia involves the use of IT in the company. Information system helps Nokia to make decisions in strategic, tactical and operational levels of Nokia. We get to understand why information system is so important nowadays and why is it there is a growing trend of people or organization using IT. In Nokia, Knowledge Management (KM) System helps it to learn, manage and use the knowledge of people, organization, technologies, technique as well as other knowledge-based stuffs. On the other hand, Supply Chain Management (SCM) System helps Nokia to manage the activities from procurement of products to handling Nokia’s products to the customers. Resource Management (HRM) System helps Nokia to manage its personnel in a better way. From this assignment, we understand that information technology (IT) helps Nokia in surviving in the competitive cell phone industry. IT helps a company to remain competitive in the growing competitive market. Now we understand why Nokia can remain competitive in the market as Nokia utilize massively information technology References 1. Dresser & Associates, Inc (2012) What is a Human Resources Information System (HRIS)?. (online) (cited 11 Mar 2012) Available from: http://www.dresserassociates.com/what-is-hris.php 2. eNotes (2012) Human Resource Information Systems. (online) (cited 11 Mar 2012) Available from: http://www.enotes.com/human-resource-information-systems-reference/human-resource-information-systems 3. Itinfo.am (2012) Human Resource Management. (online) (cited 17 Mar 2012) Available from: http://www.itinfo.am/eng/human-resource-management/ 4. Itinfo.am (2012) Human Resource Management. (online)(cited 19 Mar 2012) Available from: http://www.itinfo.am/eng/human-resource-management/ 5. Jouni Meriluoto, 2003. Knowledge management and information systems : finding a sociotechnical golden mean (online)(cited 20 Mar2012)Available from : http://www.knowledgeboard.com/download/629/KM_IS.pdf 6. Techriz.com (2009) techriz.com-Week-1-Systems Analysis and Design – Complete Tutorial for Software Engineering. (online) (cited 13 Mar 2012)Available from: http://www.techriz.com/SA-Week-1.html 7. Nokia (2012) The Nokia Story. (online) (cited 14 Mar 2012) Available from: http://www.about-nokia.com/history/ 8. Nokia (2012) Nokia Leadership Team. (online)(cited 15 Mar 2012) Available from: http://www.nokia.com/my-en/about-nokia/company/governance/leadership/nokia-leadership-team/ 9. Jouni Meriluoto, 2003. Knowledge management and information systems : finding a sociotechnical golden mean (online)Nokia Research Center (cited 17 Mar 2012)Available from : http://www.knowledgeboard.com/download/629/KM_IS.pdf 10. R. Panneerselvam. (2005) Production and Operations Management, 2nd Ed.,New Delhi: Pertice-Hall, p.3. 11. Techriz.com (2009) techriz.com-Week-1-Systems Analysis and Design – Complete Tutorial for Software Engineering. (online)(cited 20 Mar 2012) Available from: http://www.techriz.com/SA-Week-1.html

Saturday, January 11, 2020

Campari Case

CAMPARI CASE STUDY Andrea Dimichele 4105507 QUESTIONS: * What are the functional areas in the supply chain function and which is the guiding element of the whole function? * What may be the advantages and the disadvantages of a stable production cycle producing batches of large dimensions? * How do Campari's distribution flows work and which logics do they satisfy? * What is the role of customer service and what do the people involved in this function do? * How does the online auction system work? The functional areas in the supply chain of Campari are: Procurement of materials Production: sites where the products are made and ready to the first delivery, to the distribution center there are 13 all over the world. Logistics and transports: that is probably the guiding element of the whole supply chain. A huge products portfolio let Campari’s group to focus the attention on the distribution process. It is split in two different channels, the modern one (GDO, DO) and the traditi onal one (wholesalers, liquor stores and ho. e. ca day and night). Certain areas let Campari to distribute its products directly to customers such as disco for spirit segment or directly to restaurants for Wine segment (i. e. Sella ; Mosca). Distribution strategy so is fundamental to GARANTIRE a constant and efficient position and to be close to customers. For this reason Campari group in Italy decide to outsource this process of supply chain. In fact the central distribution center is owned by ‘’Gruppo Zanardo’’. As DonatellaRampinelli, Customer management director, highlight ‘’ the choice to outsource the distribution process in founded on logics of efficiency and EFFICACIA. Until 1991 distribution process was owned by Campari but this generate very high cost for the company so starting from 1995 they decide to outsource the process (also more focused in GDO channel) and this permit also to maximizing the effect on warehouse management ( sto cking, order management, inventory). Export Management: that involve foreign order, management of commercial border and custom paperwork and physical delivery management.Administrative: that involve administrative and physical paperwork related to import/export, management of warehouses, or the introduction of new products (custom codes and quantification of taxes). Customer management * The advantages of having a stable production cycle producing batches of large dimensions is that it could facilitate planning of production, warehouses, distribution, and order. Standardization of the process. Another could be cost saving in terms of production process, using economies of scale or the fully disponibilita of products in order to maintain customer loyalty.On the other hand disadvantages are related to higher stock and warehouse costs (also due to taxes) †¦.. * The distribution process start from the order of the customer, it could be inserted directly from headquarters (fax-mail) or arrive from the SAP CIS through EDI (electronic data interchange) or via CRM (customer relationship management) through the sales force. The process of distribution end with the shipment that could be shipped from production plants directly to customer or passing through distribution centers.The process of shipment as already said is outsourced in order to reduce transportation costs, in order to obtain better quality and have on time information on the status of deliveries. Obtaining information in real time about the status of the shipment is fundamental in order to be able to inform the customer in real time and also in order to a better planning of next shipment, warehouses and problem solving (returns, substitutions, delays, urgencies, and so on). * Customer service†¦Ã¢â‚¬ ¦ How does the online auction system work? *

Thursday, January 2, 2020

Credit Card Fraud Essay - 3025 Words

Credit Card Fraud: Overview, Analysis, and Recommendations Credit card fraud is a significant problem in the U.S. with losses exceeding $5.718 billion annually (Sullivan, 2010). Perpetrators are continually developing new methods to circumvent established and evolving fraud prevention controls. With economic expansion continuing its advance into the digital era and electronic forms of payments increasingly common, the problem of credit card fraud is likely to increase. Internet-based credit card fraud is nearly 15 times higher than in-person transactions (Bhatla, Prabhu Dua, 2003). Advances in investigative methods, legislation authority, and technology innovations are required to combat this broadening problem. Credit card†¦show more content†¦Within 2 years, the popularity of the Diners Club Card expanded to over 20,000 cardholders and created the opportunity for the emergence of American Express. The Diners Club Card and American Express operated on a closed loop system, meaning the c ard issuer handled all aspects of the transaction. The modern credit card most commonly associated with today’s revolving balances was created in 1966 by MasterCard and Visa (Woolsey Gerson, 2014). Unlike Diners Club and American Express, MasterCard and Visa are not independent merchants, but rather they are payment networks that create an electronic system that links banking associations with consumers by utilizing an open-loop system. Banks grant the credit, credit card companies process the credit, and consumers use the credit. This created an efficient, cost-effective system and grew in popularity exponentially. Soon after, other card issuers such as Discover and various other department cards joined the credit card momentum (Woolsey Gerson, 2014). Despite the efficiency of the credit processing system, it created a unique environment for various kinds of frauds to prosper. Credit card fraud can change through the technology and methods employed. To combat credit card fraud, it is first important to understand the various types of methods used and the modus operandi of fraudsters. The main fraud schemes are account takeovers,Show MoreRelatedCredit Card Fraud1910 Words   |  8 PagesRunning Head: Credit Card Fraud Impact of Credit Card Fraud Outline Card Credit Fraud Thesis Statement: Credit card fraud is an inclusive term for larceny and deception committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to attain goods without paying, or to achieve illegal resources from an account. Credit card fraud is also an appendage to identity theft. According to the Federal Trade Commission, while identityRead MoreCredit Card Fraud Essay2919 Words   |  12 Pagesform of credit card, brought in convenience and made life simpler for us, but along with it came the Pandora’s Box. While credit cards have made life easy for us, they have also managed to make life easy for the crooks. While enabling us to purchase things we fancy whilst seated on our couch, it has on the other hand made it easy for fraudsters to guzzle away money that is not truly theirs. In this paper, I would be: i. Problem Statement ii. Introducing the topic about credit card fraud iii.Read MoreCredit Card Fraud And Money Laundering2028 Words   |  9 Pages Running head: CREDIT CARD FRAUD MONEY LAUNDERING 1 White Collar Crime: Credit Card Fraud and Money Laundering Datuawn Frazier Lillian Esedebe Morrisville State College CREDIT CARD FRAUD MONEY LAUNDERING 2 Abstract In this paper we will be exploring white collar crime and specifically credit card fraud and money laundering. We will be discussing what exactly credit card fraud entails and how it takes places explaining the different methods of how criminals can stealRead MoreEssay on Technology, Privacy and Credit Card Fraud706 Words   |  3 PagesTechnology, Privacy and Credit Card Fraud The advancement of technology over the years appeared to be the greatest thing known to mankind.   With the Internet, the world is at ones finger tips and just about anything can be accessed using it.   This is not necessarily a good thing, with crimes like creidt card fraud going around.   The number of credit card fraud incidents is rapidly increasing as the years progress.   Anybody with a credit card could possibly be a victim of this crime and it shouldRead MoreEssay on Credit Card Fraud4202 Words   |  17 Pages- PDF  (90 K) Credit card fraud: awareness and prevention Katherine J. Barker,  Jackie DAmato,  Paul Sheridon.  Journal of Financial Crime.  London:  2008.  Vol. 15, Iss. 4;  pg. 398 Abstract (Summary) To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers. A range of recent publications in journals and information from internet web sites provide corroboration and details of how fraudsters are using credit cards to steal billionsRead MoreWorld Wide Credit Card Fraud1353 Words   |  6 Pages Credit card fraud transpires daily and in a variety of ways. Often times the consumer that has been a victim of credit card fraud is unaware until they notice the fraudulent charges for purchases they never made. Thieves obtain credit card information in a number of way, data breaches, compromised card information, a dishonest employee at a restaurant or retails store, by a fraudulent website, by giving out credit card information to someone over phone with malice intent. According to StatisticRead MoreCredit Card Fraud Should Be A Federal Offense1120 Words   |  5 Pages Abstract Credit card fraud is a federal offense and can get an offender up to 20 years in prison depending on the severity of the situation. Should it be a federal offense? Credit card fraud is becoming more and more relevant especially in the United States , matter of fact it increased by 16% in 2016 alone. This is a serious problem in today s society. The hypothesis that s being examined in this paper is that credit card fraud should be a federal offense. This has become a relevantRead MoreDigital Credit And Debit Card Fraud Essay741 Words   |  3 PagesThe Problem: Worldwide credit and debit card fraud resulted in losses amounting to $16.31 billion during the year 2014. The United States has been disproportionately affected by this fraud, due to their lack of adoption of the EMV Chip security measure. According to the 2012 Nilson Report, American card issuers lost $3.4 billion and merchants lost another $1.9 billion. America makes credit card fraud easy for fraudsters, by still relying on cards with magnetic strips which are less secureRead MoreCredit Card Fraud, An Integral Part Of The World s Economy1259 Words   |  6 Pagesmoney. Credit and Debit cards have become an integral part of the world’s economy. Due to this extensive usage of cards, we have become a â€Å"cashless society†. We make use of credit cards to make online payments, to buy items at retailers and grocery stores; almost anywhere we go and purchase, we extensively make use of credit cards. This over dependency and usage of credit cards has given rise t o new form of crime called the Credit Card fraud. Credit card fraud is the use of one person’s credit cardRead MoreEvolution Of Credit Card Fraud Within The Growing E Commerce Industry1716 Words   |  7 PagesA565_section_14447_Tina Pang _Credit Card Fraud_ Final Paper_10/11/2014 I examine the evolution of credit card fraud within the growing e-commerce industry. Online Shopping: Risk of Paying More than You Receive I examine the evolution of credit card fraud in regards of the technology or methodology fraudsters used specifically within the e-commerce industry, and discuss various security concerns companies have for establishing online shopping sites. The appearance of credit cards and the growing e-commerce