Thursday, February 20, 2020

Managing employee relations Coursework Example | Topics and Well Written Essays - 2250 words

Managing employee relations - Coursework Example The change in employee relations over the last 30 years and its effect on the different stakeholders of the organization has been considered based on the UK point of view. The strategies developed by them have been studied in order to understand the issue in a more proper fashion. Employee relations: The term employee relations may be defined as the employer and the employee relationship which aims at creation of trust, harmony and commitment within the organization so that the aims and the objectives of the organization are reached and to make the workplace a secure and a productive place. The employee relation in an organization is determined by the relationship which exists between managers and the individual workers and also on the overall relationship between them. (Employee relations, n. d)The government and the trade Unions take a crucial role in maintaining the regulation of the relationship which exists between the employee and the employer. Over the last few decades various environmental factors had their influence over the change in employee relations. The concept of globalization and the emergence of the multinational corporations and their vast geographic presence have affected the changing pattern of the relationship. ... (Blyton & Turnbull, 2004) Political context: The political context includes the factors which are in support for the new economic policies incorporated by the government and its effects. The inclusion of mergers, acquisition and the entry of the foreign sectors in the market raises key concern for the economy. The trade unions raise against such government initiatives and such an environment raises insecurity among the employees regarding their jobs. (Singh, n. d, p.129) The political system involves the process of managing the conflicts and the disagreements between the societies but often it creates disturbance within the framework. In the context of the British political system, it primarily deals with framing and implementing public policies for governing the society. The British political system has faced major political change over the years and the election of the conservative government in 1979 marked the beginning of policy which started the change in the British labor marke t. The activities of the trade union were curtailed and the government aimed to enhance the flexibility of the market. The government thought that such measures will help in the promotion of the growth in the employment. The government promoted entrepreneurship and the concept of individualism emerged within the market. The market was characterized by a sufficient number of competitive products and managerial authority was established. As a result the workings of the management of the organizations also changed considerably. Proper human resource management was in effect which was marked by the concept of individualism. There was a direct communication with the employees and appraisal system was introduced. The support in favor of the trade unions and collective

Tuesday, February 4, 2020

Security breaches and incident handling in organization Research Proposal

Security breaches and incident handling in organization - Research Proposal Example nctions Interest of management to gain control for the security of business functions along with cost These three factors need to be handled to provide better security. In order to tackle all three factors, Christian Fruhwirth, recommended an event based intrusion detection system in 2008. The system will support these three factors by (, SWBC - Thesis: Improving security incident management in multination IT service providers - Software Business Community): Advanced tools incorporated with IDS to detect intrusions and eliminate attacks Standardized frameworks to handle legal compliance Efficient security management application tools to handle the management. Moreover, an article was published related to compromise recovery and incident handling. The article highlighted mishaps from concerned security administrators for installing default programs from a compact disc. These stored programs on a compact disc facilitates hackers to breach security by storing porn contents, configuring an illegal server, initiating attacks on other information assets and breaching server on the network. In order to eliminate all these threats and vulnerabilities, reviewing and learning the functionality of threats is essential. This will certainly reduce the probability of security incident in organizations (Compromise Recovery and Incident Handling. 2003). One more research was conducted related to a Proposed Integrated Framework for Coordinating Computer Security Incident Response Team. Conventionally, computer security incident response teams (CSIRT) are responsive for viruses, hacking and unauthorized access of employees. The CSIRT is defined as â€Å"Computer security incident response team (CSIRT) is a term used by the CERT Coordination Center (CERT/ CC) to describe a service... This will certainly reduce the probability of security incident in organizations (Compromise Recovery and Incident Handling. 2003). One more research was conducted related to a Proposed Integrated Framework for Coordinating Computer Security Incident Response Team. Conventionally, computer security incident response teams (CSIRT) are responsive for viruses, hacking and unauthorized access of employees. The CSIRT is defined as â€Å"Computer security incident response team (CSIRT) is a term used by the CERT Coordination Center (CERT/ CC) to describe a service organization that responds to computer security incidents† (Computer Security Incident Response Team. 2007). The research transformed these teams in to efficient tools that will maintain efficiency of business operations, compliance along with new regulations and homeland security. Those organization possessing incident response teams follows a systematic approach and steps to recover the system efficiently from any securi ty breach or incident. Moreover, the existence of teams, eliminates loss or information theft and service disruption. Furthermore, the information gained by detecting and resolving an incident, facilitates support teams to be more efficient for handling future incidents (, Central Washington University - Networks: Incident Handling).Likewise, these teams are called security incident response teams (SIRT). They are triggered when a security breach shows its existence within the network of an organization. However, these teams conduct investigation of suspect workstations and servers.