RFID Tags Construction

Role of RFID Technologies in Building Construction Supply Chain Management

RFID Tags is a technology that is currently growing in use in other industries such as manufacturing and retail (Hannon, 2007).

Any construction business relies on its supply chain for the effectiveness and the speed of construction task. An overflow of the supply can create a situation of high clutter while not enough supply can easily become the bottleneck issue for the whole construction project. For such reasons, it is extremely important for the construction companies and businesses to monitor every process of supply management and determine how the supply chain system is maintained. Supply chain management includes placing orders for the supply, estimating what quantities of the products are required for different construction tasks, and ensuring that the construction workers always have enough supply of the resources to continue the work. The supply chain management also handles the work of finding alternatives to the existing supplies in case of a dispute or supply interruption. Ensuring prompt delivery of supply and an effective monitoring system has always been a challenge to the management of supply systems. Fortunately, the RFID (Radio Frequency Identification) has emerged as a perfect solution to this issue.

Background of construction technique

Any construction project follows basically the same procedure and a large part of it depends on the supply of the raw materials and the other equipment. Such items are the essential element of the whole project. The construction techniques are the traditional ways of using the supply chain management to develop the project from the scratch. While the construction project might differ in terms of techniques and the scale of the project, the supply chain method has remained utterly unchanged since the initial times. The contractors or developers initially estimate the resources required and then place it in the warehouses or at the site of construction. This makes the whole scenario very cluttered as it takes a lot of time to find the right piece of supply when it is required costing a significant amount of time in construction.

The new technique of RFID tags on the supply resources puts an advanced approach to the whole thing as it gives the task an enhanced process of knowing what goes where. Many projects depend on the small building blocks and with the help of RFID tags, the construction engineers can make it very easy to find the right piece of supply when it is needed. This is a method that saves great amount of time and also increases the accuracy of the whole construction task.

Advancement of the RFID technique

Nowadays a number of big and small construction firms are making use of RFID tags in the process of construction, locating the supply and resources and in placing the building blocks to their right place. The technology of Radio Frequency Identification tags have made great advancement in recent times and have been proved highly useful in various construction tasks. With constant development in this field, the RFID tags are now more versatile, reliable and cheaper than before. Now it is possible for a construction business to make use of RFID tags in the resources it is using and to tag every building block with help of RFID tags without putting a financial overhead on the organization. This technology doesn’t cost a lot these days and it is a onetime investment only that remains beneficial in all of the construction tasks. The construction companies can use these tags in placing the building blocks in their right places, finding the blocks and other tools easily when needed with help of tag readers. This whole approach increases the convenience of supply chain management tasks and improves the speed and efficiency of the task.

The shortcomings of the existing techniques

Even though the RFID technologies provide the potential benefit to construction industry for tracking the construction components, several limitations related to practical applications can be identified (Jang, 2007).

The development of RFID technique in the construction tasks was required due to the number of shortcomings that exist in the present situation of developing a construction projects. It is true about every large scale construction project that due to large number of resources available on the site, there is always a great deal of clutter present. Finding the right resource at the right time becomes extremely difficult, and it costs a lot of time sometimes to find the right resources when needed. This is a real situation in almost all the construction tasks and it slows down the construction process. Most companies keep some time in the estimated construction time reserved for this purpose only.

Most construction plans make use of small building blocks that go on in the actual building to finish the construction task. Putting these building blocks in the right place requires some efforts and is essential for the construction project. However, finding the building blocks and then identifying their right place in the project takes a lot of time with the current manual techniques. The site manager may need to search through every building block to find the desired one, and in a large scale construction task, there might be thousands of blocks that could take a great amount of time. To overcome these shortcomings, the construction companies need a different approach or technology that can speed things up and they have got it with the RFID tags technology as it will provide higher accuracy and better alternative of locating the resources.

Modern Approaches to Construction Supply chain management

Multiple RFID readers are deployed at fixed locations to receive the signals of active tags for tracking the tagged objects (Ustundag, 2012).

The modern approach in the supply chain management follows the rule of developing the habit of tagging all the resources and building blocks with RFID tags. This is a great way of keeping track of all the processes that are going on with the construction task. While the RFID tags might cost some nifty investment to the company in its initial implementation, these devices can really boost the speed of the construction and can help the company in finishing the whole work sooner. Each time the company finished a work in less time, that saves money to the company as the staff and machinery remains off duty or out for a new task.

RFID Tags
RFID Tags

The RFID tagging technique makes use of Radio Frequency identification tags which are placed on the various supply elements and building blocks for correct identification in the later processes of construction. This approach can very well assist the construction managers in keeping track of the individual elements and their placing at the right place. Not only it keeps the manager informed about the location of a particular supply item, but it also reveals the information about the available supplies to make sure that the manager knows when there is a need of new supply order. RFID technology is really revolutionary in the construction methods and it will surely result in great benefits.

Benefits of the modern RFID tags technology in construction business

RFID is a branch of automatic identification technologies using radio frequencies (Ruwanpura, Mohamed & Lee, 2010).

The use of RFID (Radio Frequency Identification) can surely boost the speed of the construction tasks and may very well result in modification of the present technology to a higher extent. A construction company can monitor its supply chain in a better way and certainly a more efficient way with the help of this technology. The benefits of this technology are listed below in regards to the construction supply chain management:

  • Increased speed: The RFID tags make it easier for the managers and the field staff to locate the items and supplies quickly. This helps the speed issues of the construction task and makes the whole thing go a lot faster. Even in the tasks involving placing of the building blocks for the construction process to complete, this helps the site mangers or the Crain operators to easily find the block that needs to be placed. Overall, the RFID technique is precise and fast, and any construction task can benefit from both of these aspects.
  • Accuracy: use of RFID tags provide every building block or supply item a specific code and this is not just limited to that as it can also store other information with the code. This information can involve details like where the block needs to be placed, what are the exact dimensions of it. This kind of information is readable through the RFID tag reader. This kind of technology ensures that no building block is placed at wrong place due to human error or technical mistake.
  • Long term costing: RFID tags purchasing and implementation costs a little in the first phase of development. However, it quickly recovers its cost in one or two construction projects with increased profits to the company. Finishing projects quicker helps the company save money and this becomes a profitable investment for the company.

Conclusion

The RFID based tagging technology is a great technique to manage and monitor the supply chain in a construction business. The RFID technology will enhance in the near future and will reach a level that can better assist the managers with the development tasks of construction projects. The reliability of the tags will increase and so will the lifespan of the tags. In future it will be possible to simply monitor all of the RFID tags through a single computer screen to measure if all of the building blocks in the construction project are placed at the right place or not. Anyhow, the use of RFID tags in construction supply chain management has a bright future.

References

Ustundag, A. (2012) The value of RFID: Benefits vs. costs. Springer.

Hannon, J. (2007) Emerging technologies for construction delivery. Transportation Research Board.

Jang, W. (2007) Embedded system for construction material tracking using combination of radio frequency and ultrasound signal. ProQuest.

Ruwanpura, J., Mohamed, Y., & Lee, S. (2010) Construction research congress 2010: Innovation for reshaping construction practice. (Vol. 1, p. 247) ASCE Publications.

Hunt, V., Puglia, A., & Puglia, M. (2007) RFID: A guide to radio frequency identification. John Wiley & Sons.

Finkenzeller, K. (2010). RFID handbook: Fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication . John Wiley & Sons.

Click Here To View Construction Dissertation Titles

Cross-Cultural Communication

The Importance of Effective Cross-Cultural Communication in Business Today

Currently, globalization of business, international expansion of market and rising competitiveness has increased the interdependence of business. With the expansion of business into multiple countries, sensitivity towards the cultural differences has also augmented in the corporate environment. Global interdependence of economy has forced the business owners to provide ample opportunities of cross cultural communication to their managers. It would help in gaining skills and expertise in handling the problems of cultural differences in their organizations (Okoro, 2013). Moreover the international expansion strategies partnership arrangements like mergers, acquisitions and strategic alliances has augmented the importance of effective cross cultural communication in the business world. In highly competitive market and international scope of business, communication is considered to be the vital function in the success of business. Organizational profitability is evaluated by its communication strategies. Cultural barriers have played significant role in hindering the success process of communication in international businesses. Communication process between culturally different people has unleashed the issues of language, values, ways of thinking and religion. Mishandling of these issues would increase the chances of miscommunication (Guang & Trotter, 2012). The objective of this essay is to explain the reasons behind the importance of cross cultural communication which is followed by the explanation of problems and issues hampering the effective communication system. It would also provide the strategic approaches employed by companies to resolve the issues. In the end, organization successfully handling the cultural problems will be compared with the organization failed to cope with the problems of cross-cultural communication.

Various sources have consulted to explain the reasons that why cross cultural communication has become highly important in business today. Literature explained that high pace of globalization has made the cross cultural communication inevitable for businesses. Homogenization of markets has faded the distinctions of national markets. Along with the business development cultural differences between nations, regions and ethnic groups have become stronger. In this situation solution to overcome the cultural problems are presented to smooth the process of communication and interaction between business partners, companies, customers and coworkers (Tian & Borges, 2011). Advertising messages also hold the values, norms and cultural characteristics of different regions. Realizing the importance of cultural factors in advertising messages is very practically and financially very important for business communication As product sales are largely dependent on these advertising messages (Guang & Trotter, 2012).. Cultural values also affect the process of business negotiations and decision making process. In partnership agreements and business transactions business representatives from different countries different cultures has increased the importance of effective cross cultural communication in businesses (Peleckis, 2013) . Moreover, in multinational organizations culturally different workforce has increased the importance of effective communication for successful business operations. Management training programs are organized globally to deal with the issues of workforce diversity. These cross cultural differences have changed the organizational culture. Management styles, communication systems and motivational strategies in the organizations are modified and transformed to ensure the success of organizations (Arseculeratne & Yazdanifard, 2013).

Business students and businesses should be aware of the numerous issues regarding the importance of cross-cultural communication in business productivity and goal achievement. Three of the issues or problems are workforce diversity, cultural impact on advertising and business negotiations. Different management styles of culturally different managers and employees are one of the major issues hindering the productivity and business goals of businesses. It enhances the likelihood of miscommunication, misrepresentation and misunderstanding between the managers and employees. This miscommunication because of different national cultures and ethnic backgrounds affect the operations and productivity of the businesses. Increased emphasis on workforce diversity has made the communication system from culturally different people highly difficult (Okoro, 2013). Another issue rose by culture difference is marketing and advertising of business products and services. Culture differences affect the effectiveness of advertising messages in business environment. Different languages, different buying habits, and consumption styles of consumers from different cultures influence the marketing decisions and business decision of organizations. Moreover, market entering strategies of business are also affected by the purchase behaviors and consumptions styles of target market (Guang & Trotter, 2012). Cultural differences at organizational level affect the business negotiations, partnership agreements and strategic alliances in the global economy. In process of business negotiations, different cultures, different regions and different ethnic backgrounds largely influence the business transactions and partnership agreements. Mishandling of cultural issue and cultural insensitivity would lead to deadlock in negotiation process. In a negotiation process, representatives of high-context culture and low context culture would hamper the harmony of business transactions (Mengyu & Li, 2013).

Businesses can apply a range of strategies or approaches to overcome cross-cultural communication problems. Three strategies required by the organizations to handle these cultural problems in business environment are training sessions, cross cultural programs and enculturation strategies to equip management with the proper understanding of cultural differences. In order to resolve the problem of workforce diversity and develop mutually beneficial relationship between the employees, organizations and management organize training sessions. These training sessions would help in enhancing the managerial proficiency and operational effectiveness of organizations. Training would help in enhancing the cultural sensitivity of managers which ensure the effective intercultural communication (Okoro, 2013). Intercultural programs organized by the management would help to overcome the cultural differences of workforce. Successful implementation of these strategies would help to develop strong competitive advantage (Okoro, 2012).

Cross-Cultural Communication
Cross-Cultural Communication

Understanding of cultural differences and incorporating these cultural aspects in the advertising messages would help in smoothing the process of business communication between customer and the company. Representation of cultural values and cultural norms in the marketing messages would boost the products sales of the company. Moreover training provided to marketing representatives would help in realizing the importance of cultural factors in their marketing campaigns. These systematic strategies to smooth-line the communication system between company and customer help in increasing the profitability of businesses (Guang & Trotter, 2012). To enhance the effectiveness of international negotiations, managers and business representatives should be properly prepared to adapt according to cultural diversity. Enculturation strategies in the management and business representatives would help to ensure the success of international negotiations in partnership agreements. International managers should be properly educated and furnished with proper knowledge and skills to handle the culturally complex situations in business negotiations (Okoro, 2013).

Cross-Cultural Communication Problems

Many businesses have been successful in dealing with cross-cultural communication problems, while others have not shared this success. Successful organization is Volvo Construction Equipment with its acquisition Samsung Heavy Industry’s division while the company which has completely failed in integrating two diverse cultures is BenQ, a Taiwanese company which acquired Siemens. Reasons behind the successful integration of cultural strategies at post acquisition level in Volvo Construction Equipment helps in ensuring the success of acquisitions. New human resource management policy was implemented which completely changed and modified the formal and informal structures of the combined organization. It provided equal opportunity for both companies culturally different to equally participate in workforce and devise organizational structure. Variety of in house training programs and career development programs has equipped the Korean employees of Samsung Heavy Industry with necessary skills and competencies. It helped them to progress in combined organization at higher levels in the hierarchy. Increased stress on the team work facilitated in integrating strengths, concepts and skills of two different cultures (Lee et al., 2014). International education programs at education level enhanced the cultural sensitivity and positive results of these programs exhibited that it enhanced the quality, experience and adaptability towards different cultures (Brydon & Liddell, 2012). BenQ failed to integrate two culturally different organizations because of inefficient allocation of time and resources for integrating and assimilating the culturally diverse organizations. Ineffective communication system, absence of clearly defined objectives and performance expectations lead to the failure BenQ after acquiring Siemens (Cheng & Seeger, 2012).

In conclusion, homogenization of markets, globalization of businesses and increased workforce diversity has augmented the importance of effective cross cultural communication in business world. Increased cultural integration has emerged the issues of workforce diversity in employees and cultural effect on advertising and negotiation processes. Different cultural norms, values and different ethnic backgrounds have increased the problems of miscommunication, misrepresentation and misunderstandings. It affects the profitability, productivity and operational effectiveness of the businesses. These problems of cultural miscommunication could be handled by training programs, cross cultural education programs and introduction of enculturation strategies in the corporate environment. It would help in understanding and realizing the importance of cultural differences to ensure the success of advertising messages, business negotiations and business transactions. Volvo Construction Equipment successfully integrated the culturally different organizations by introducing new human resource management policies. While in comparison BenQ failed to integrate two culturally different organizations because of inefficient allocation of time and resources for integrating and assimilating the culturally diverse organizations. In my opinion, development in international business and global trade importance of cross cultural communication has increased. To fully capitalize on the benefits of international markets and diverse workforce, business organizations need to devise comprehensive strategies of cultural education. Cultural educations programs, in-house trainings would enhance the cultural adaptability of employees and ensure the integration of culturally different organizations in mergers and acquisitions.

References

Arseculeratne, D. & Yazdanifard, R., 2013. Barriers to Cross Cultural Communication and the steps needed to be taken for a MNC to Succeed in the Global Market.

Brydon, K. & Liddell, M., 2012. Supporting international students undertaking Australian university studies. Social Work Education , 31(8), pp.995-1011.

Cheng, S.S. & Seeger, M.W., 2012. Cultural Differences and Communication Issues in International Mergers and Acquisitions: A Case Study of BenQ Debacle. International Journal of Business & Social Science, 3(3), pp.116-27.

Guang, T. & Trotter, D., 2012. Key issues in cross-cultural business communication: Anthropological approaches to international business. African Journal of Business Management , 6(22), pp. 6456-6464.

Lee, S.-J., Kim, J. & Park, B.I., 2014. Culture clashes in cross-border mergers and acquisitions: A case study of Sweden’s Volvo and South Korea’s Samsung. International Business Review.

Mengyu, P. & Li, C., 2013. Research on the Effects of Culture Differences on Business Communication Between China and U.S.- ACase Study of Cross-cultural Management of Joint Venture Enterprise in China. Universal Journal of Management and Social Sciences, 3(9), pp.45-50.

Okoro, E., 2012. Cross-cultural etiquette and communication in global business: Toward a strategic framework for managing corporate expansion. International Journal of Business and Management , 7(16), pp.130-38.

Okoro, E., 2013. International Organizations and Operations: An Analysis of Cross-Cultural Communication Effectiveness and Management Orientation. Journal of Business & Management (COES&RJ-JBM), 1(1).

Peleckis, K., 2013. International Business Negotiations: Culture, Dimensions, Context. International Journal of Business, Humanities and Technology, Lituânia.

Tian, K. & Borges, L., 2011. Cross-cultural issues in marketing communications: An anthropological perspective of international business. International Journal of China Marketing, 2(1), pp.110-26.

Click Here To View Business Dissertations

Wireless Security Dissertation

Wireless Security

The technology of Wireless Security Networking is one of the most common networking and accessible technology but still the security problems are of great interest of this type of technology. This research paper will prospect the wireless networking and its security as well as will focus on the companies which are involved in this technology and future prospects for this technology.

These days’ computer clients are more fascinated in attaining the Internet wirelessly because of its accessibility and mobility. These days, business travelers prefer and utilize the wireless laptops to keep in contact with the office, home, and friends. A wireless network can unites or connect the computers at various places of your business and home without any involvement of any cords and permit you to work anywhere within the range of network on laptop (Bulk, 2006).

The wireless networks are established on the basis of IEEE criteria and standards which belong to 802 family which contains (802.3) Ethernet that is largely utilized today in offices and homes. Even though the growth and development of the 802.11 standards and technology have been in progress since the late 1990s, basic acceptance of “wireless Ethernet” only originated in year 2000-2001 when (AP) or access point devices turned cheap enough for the home user. (Bulk, 2006) The following items simply provide an overview of the 802.11 family which includes: 1-802.11b (a)- Most widespread (b)- 11Mb maximum, 2.4 GHZ band, 2- 802.11 (a)- Next generation (b)- 54MB maximum, 3- 5GHZ band 3- 802.11g (a)- 54MB maximum, 2.4 GHZ band (b)- Compatible with 802.11b 4- 802.11X (a) Uses Extensible Authentication Protocol (EAP) (b) Supports RADIUS 5- 802.11i (a) TKIP (b) Draft (Bulk, 2006).

The disadvantage of a wireless network is that, except someone takes positive protections, any individual with a wireless laptop or computer can access your network. That means that hacker can attain the personal data and information on your laptop or computer. And if an unaccredited person utilizes your network to commend a crime or transmit spam, the action will be traced on your account. The 802.11 authoritative standard is, in its functioning principles, not that practically different from the Ethernet. It employs a conventional “one can speak, others hear” media access control strategy; the simple difference is that instead of wires, the carrier of the signals are assigned radio frequency. In year 2004, (ISRC) or Information Security Research Center of Queensland University declared that any 802.11 network installed in any business environment could be halt in few seconds simply by transmitting a signal that hinders the other users or parties from trying to talk. On the other hand, same is true for Ethernet; apart from that you must be able to join with the network plug at first, which certainly makes the attacker much easy to trace the trouble in order to solve it (Nichols, & Lekkas, 2006).

That’s not the place where problem terminate. Where the 802.11 standard tried to prevent carrier-level hits, it actually failed dejectedly. The (WEP) or Wired Equivalent Privacy (WEP) method was planned for wireless networks to supply a stage of security and protection against hackers on network sessions by outside members or parties, therefore offering security nearly equivalent to conventional LANs. Though, there are numerous design flaws were found in the WEP scheme in 2001 by the researchers of Zero Knowledge System and University of California, which showed the scheme hideously incompatible. Unfortunately, even by that time Wi-Fi had been deployed extensively to create compulsory adjustments hard to execute or implement (Nichols, & Lekkas, 2006).

General Wireless Security

Now the question arises why it is necessary to concentrate on the security of Wi-Fi. As we know that the general area of 802.11 network security zones are one of the leading bases for future security interests and concern: Any hacker or attacker can be laid where nobody considers him or her to be and keep well away from the network’s authorized premises. Furthermore, the other reason to concentrate on the security of Wi-Fi is its great and widespread utilization and use of 802.11 networks. In year 2006, it is reported that the quantity of shipped 802.11 enabled hardware devices were calculated to outgrow 40 million units, even the cost of these units are keep falling. After the popularity of 802.11g devices in the market, the price of the several 802.11 products dropped to the price level of 100BaseT Ethernet client cards. However, there are various speed disadvantages, but not every network requires fast speed, and in majority of the cases the implementation of wireless network is highly demanded. On the other hand, another reason to concentrate on the wireless security is the offices situated on different areas of the engaged streets, office park and highway (Nichols, & Lekkas, 2006).

 Wi-Fi security problems are addressing with 2 different troubles: Privacy and authentication. Authentication or verification guarantees that only valid clients get access to the entire network. Privacy maintains communication safe from hackers. The implementation of WPA technology properly addressed these two fundamental troubles. Although we have the much strong security technology but accidents and mishaps can occur at any time, to obtain an enjoyable and pleasant practice of Wi-Fi technology users should have sufficient knowledge of the security weaknesses and vulnerabilities, that’s the reason the Wi-Fi Associations suggests that users of wireless networks implement the similar point of care they’ve learned to employ to keep away from scams in the wired world. Moreover, end users must modify their passwords frequently, not to answer or respond the doubtful e-mails, and should look for protected and secured connections. Customers require creating various new and uncomplicated security protections. A habit like linking through a supplier or provider that employs encryption with a list of committed and trusted hotspots, using a VPN, and constantly changing and enabling security inside a home network. Furthermore, customer should make it a point to prefer those products that are having Wi-Fi certification for the utilization of WPA™ (Wi-Fi Protected Access) or WPA2™ security (Nichols, & Lekkas, 2006).

As far as technology is concerned, WEP or Wired Equivalent Privacy is a protocol that supplies security to (WLANs) or wireless local area networks based on the 802.11  Wi-Fi regulations. Moreover, WEP is a (layer 2) or OSI, Data Link Layer security technology that can be switched “on” or “off.” This technology is configured to offer wireless networks the equal level of privacy security as a comparable wired network. Moreover, WEP technology is based on the security scheme known as RC4 that utilize an assemblage of system generated values and secret user keys. The primary enforcements of WEP supported so-called 40-bit encryption, containing a key of 40 bits and 24 extra bits of system produced data. Research has revealed that it is very much easier to decode the 40-bit WEP encryption, and as a result product vendors nowadays use 128-bit encryption or better 256-bit (Hardnono, & Dondeti, 2008).

When communicating through wire, WEP utilize keys in order to encrypt the data stream. The keys generally are not sent on the network rather they stored in the windows registry or on the wireless adapter. Despite of how it is configured on a wireless LAN, WEP just signifies only one aspect of an overall WLAN security scheme. The standard of 802.11 explains the communication that takes place within wireless local area networks (LANs). The (WEP) algorithm is utilized to defend wireless communication from hackers. A secondary purpose of WEP is to stop the illegal approach to a wireless network. WEP depends on a confidential key that is distributed between the access point and the mobile station. The secret key is generally used in order to encrypt the packets before they are transmitted, and integrity verification is used to make sure that packets are not customized during transmission. Another WEP technology offered by the Agere Systems is known as WEP+, which enhances the security by neglecting “weak IVs”. The WEP+ provides its maximum excellence when it is used at both ends of the wireless connection, as this can’t easily be enforced, however, possibilities are always there that possible attack against WEP+ will finally be found (Hardnono, & Dondeti, 2008).

Moreover, Wi-Fi protected access or WPA is another security technology for  Wi-Fi networks. WPA technology improves the encryption and authentication feature of WEP. Actually, WPA was developed in response to the deficiencies of WEP by the networking industry. On the other hand, the technology used behind the WPA technology is the utilization of the (TKIP) or Temporal Key Integrity Protocol as this protocol deals with the encryption weaknesses of WEP. Another advantage of the WPA technology is the built-in or default authentication that is not offered by the WEP technology. Furthermore, another variation of the WPA technology is termed as WPA-PSK or WPA Pre Shared Key, is a simple but still strongest structure of WPA most appropriate for business and home Wi-Fi networking (Hardnono, & Dondeti, 2008).

There is another form of WPA technology which is more advanced and safe and is known as WPA2. This technology provides both data integrity and confidentiality. It is observed that WPA2 provides more security to the wireless network. However, WPA2 can’t offer enterprise security alone. Generally IEEE 802.IX port-based protocol is combined with the WPA2 which provides maximum security and guarantees the secure wireless communication. The technology of WPA is utilized with the TKIP protocol, which further utilizes the RC4 cipher, and it can be executed in software having driver or firmware update. WPA supplies integrity checking using MIC, occasionally termed as “Michael. Meanwhile, WPA2, utilizes a new encryption technique known as CCMP or (Counter-Mode with CBC-MAC Protocol), which is stronger than the RC4 (Hardnono, & Dondeti, 2008).

As far as the future of wireless security is concerned the new 802.11 standards simplify this challenge? However time will tells the best. Moreover, the 802.11i standard is the latest wireless security standard designed to put back WEP and give much effective wireless security. 802.11i was believed to be launched together with the 802.11g, however, as we know that we are not living in the perfect world. (WPA) or Wireless Protected Access Alliance certification version 1 executed various features of current 802.11i development, although, not all products of 802.11 which are sold in market having WPA certification. In the current scenario there are currently many 802.11g networks arranged that are still using non-secure and old versions of WEP (Guna, 2009).

In the coming future it is expected that the next Wi-Fi speed standard, 802.11n, will considerably provide a bandwidth of maximum 108Mbps. Moreover, this 108Mbps will become the industry standard. The latest specifications will be launched at least 1 year before by the IEEE. However, draft-based devices and products could come up with compatibility troubles in case if the authorized standard varied from the draft version. Therefore, it’s much better to stay and wait for the ratified standard before building network over non-authorized gears (Tynan, 2004).

On the other side, in coming future, the possible changes regarding Wi-Fi include the methods and procedures to make this technology more and more dependable and secure. Within a year or two the standard of 802.11i standard will be finalized, which will greatly enhance the security level. Moreover, in future in order to handle the data encryption the majority of the 802.11 i-compliant will need the separate co-processors, which indicates that current Wi-Fi devices and equipment will be replaced to achieve the maximum security (Tynan, 2004).

Wireless Security
Wireless Security

Lastly, in the coming future another advanced standard 802.11e will be largely employed for the special tasks. 802.11e will address the issues of quality services and the delivery of data packets on time. This standard is very much important for certain streaming applications like videoconferencing, and its importance is really vital as business more toward utilizing Voice Over IP on their wireless networks. Some companies have already launched 802.11e standard for some of their products like Broadcom (Tynan, 2004).

These days there are several companies around the globe, which are providing wireless security but when the question arises regarding pioneers the name which strikes first to the mind is “Broadcom.” This company is providing network solution and recently “Broadcom” has declared that the (WAPI) security standards required for all WLAN devices which are sold in China. Moreover, this company declares that it is in the list of companies who first made WLAN chips to present WAPI-enabled assistance designed for mobile devices and wireless routers, including In Concert BCM4325 that joins WLAN, FM technologies and Bluetooth “CBR, 2009).

It is mentioned by the Broadcom, that all the chips control its digital architecture and radio to supply the wireless connectivity in order to share support triple play service and broadband connectivity. According to the Michael Hurlston, general manager as well as vice president of Broadcom, said: “We are delighted to maintain the WAPI standard being a leader in the field of WLAN we are confident and feel proud to be a pioneer of the rapidly increasing wireless communications.” Furthermore, Broadcom, is making effort to promote the global standards for the wireless communication (“Broadcom”, 2003).

The fairly new solution offers an entirely new system to protect the wireless networks against the threats of real world by launching active wireless methods of testing, which are able to evaluate the daily deployed wireless access points. By this approach, the wireless Vulnerability Assessment resolution facilitates IT administrators to find vulnerabilities remotely within their wireless network and automates the authorized agreement reporting, facilitating customers to decrease the operating cost (“Computer Technology Review”, 2009).

Motorola is offering a complete and comprehensive range of WLAN infrastructure resolutions planned to enable the genuine wireless venture, despite the dimensions and size of the business. The company is offering IP or Internet Protocol coverage in outdoors and indoors simultaneously. The company’s wireless range includes mesh, enterprise WLAN, fixed broadband and Motorola solutions for AirDefense wireless security. Moreover, Motorola’s solutions decrease network maintenance and deployment costs, and guarantee the accessibility of commercial and cheap wireless connectivity. By replicating active attacks from the hacker’s viewpoint, the Motorola AirDefense wireless solutions in case of vulnerability Assessment permits the administrator proactively evaluate and assess the level of security of delicate systems over the wireless network, like cardholder data systems. Furthermore, by using the radio device of the wireless sensor to stimulate a wireless client station, the method empowers the IT administrators to perform remotely the assessment of wireless vulnerability from a hacker’s approach (Messmer, 2009).

Motorola Company is recognized around the globe for modernization in the field of communication and is generally centralized on progressing and advancing the mode of style through which world connects. From enterprise mobility, broadband communications infrastructure and public security solutions to mobile devices and high-definition video, Motorola is directing to the next phase of advancement and innovation that will enable people, governments and enterprises to be more attached and more mobile. It is reported that Motorola had sales of nearly US $30.1 billion in year 2008 (Darkreading, 2009).

The issues of spectrum pricing, data protection, and level of security are of primary concern and are having great importance for the advancement and growth of the wireless communication industry. The most important regulatory issue in field of wireless technology is associated with the security, as this issue will be face by the wireless industry over the next two decades. On the other side, the confidence level of the customer in online transactions over the wireless medium is also of great importance. Security contains not only the safety of data but also the safety from monitoring. Distaste for investigation is widely considered as the expected inhibitor of wireless network utilization (Green, 2009).

The basic issues that should be considered are: Wireless communication: as it doesn’t need physical connectivity, also having more chances to survive in case of natural disasters like floods, hurricanes, earthquakes, tornadoes and volcanoes. The other issue is Wireless transmission: as it is easier to seize and intercept than those running over wire-line or fiber connections. Though, fiber can also be intercept however, it is hard to hack it as compare to the wireless. Moreover, public is having common perception that physical connections are having more security and protection. Also, the employment of digital encryption is really helpful to protect the wireless transmission, however, the public concern regarding security and privacy are of great importance and will be addressed in the coming decades by the wireless industry (Green, 2009).

As far as the global implication of wireless security is concerned there are few steps which should be adopted for the implication of wireless security. The initial step towards successful and effective global wireless security is creating a standardized verification infrastructure. However, the user should be required to authenticate on the network. But for the global implication users cannot be enforced to organize or manage multiple user authentication, accounts, identity and passwords. Furthermore, there must be a single set of access identification which must offer for verification at any site or location. Preferably this must be the similar set of certification used to login to the user’s own-workplace. On the other hand, the network systems should be arrange to recognize realms, domain names as well as various other regional identifiers in order that verification or authentication requests can be routed to the approved set of validation servers. By implementing this principle, the user will be able to travel to any place in the world or to any enterprise location and will be granted access to most appropriate networks (Green, 2009).

The second step for the implementation of global wireless security is the change in the access method. It required that the access method should be reliable and consistent everywhere the user travels. Moreover, users don’t want to adjust or reconfigure their systems as they travel from the corporate offices to their branch offices and homes. This indicates that there is a need for the same (Service Set Identifier) or SSID, which should be installed or present everywhere with having same encryption and authentication policies. Additionally, every place must have same authentication infrastructure so that user may not feel any problem. Moreover, users are free enough to be able to start their email application at corporate office, put their laptops in a sleep mode, go home, and start their work again without any need of a separate VPN client (Green, 2009).

Conclusively, the third step is the implementation of the voice mobility. It is observed that many companies and organizations are assessing their (Vo WLAN) or Voice over  WI-FI LAN technology today with estimated wide range deployments occasionally in 00 or 0 0. One of the major outcome and benefit for this technology will be the capacity to utilize it everywhere where there is an availability or access of wireless LAN service. When users move to the remote areas or travel to the remote locations, the service of (Vo WLAN) and voice mobility usually permits their Vo-WLAN handsets to start operation in the same manner as they perform in the normal work locations. Moreover, the mobile network infrastructure must offer secure transmission of voice traffic back to the corporate telephony server, quality of service control and reliable encryption and authentication methods all over the global network (Green, 2009).

References

Broadcom, (2003) Broadcom wireless LAN solutions now Wi-Fi protected access

Bulk, Frank. (2006) The Abcs of wpa2 Wi-Fi security. Network Computing, 17(2), 65-3.

CBR, (2009) Broadcom features wapi security standard on its wireless offerings.

Computer Technology Review, (2009, August 20). Motorola debuts wireless LAN security solution for remote wireless security testing.

Cox, John. (2009) what’s next for Wi-Fi?

Darkreading, (2009) Motorola introduces wireless LAN security solution for remote wireless security testing.

Green, Jon. (2009). Building global security policy for wireless LANs.

Guna, (2009) The Future of wireless security.

Hardnono, Thomas, Dondeti and Lakshminath (2008) Security in wireless LANs and mans.      London: Artech House, Inc.

Messmer, Ellen. (2009). Motorola boosts wireless network security.

Nichols, Randall K., & Lekkas, Panos C. (2006) Wireless security: models, threats, and  solutions. Berkshire, UK: McGraw-Hill Telecom.

Tynan, Daniel. (2004) The Future of wireless.

Click Here To View More IT Dissertations

Budgetary Control Systems

Budgetary Control Systems

Budgetary control

Budgetary control is always followed by budget preparation. Budget needs not only top management assistance but also the control is supported by “participation of budgets holders into the investigation of solution to the problems which arise”

Budgeting acts as a service function because these did not put back management. Organizations draw budgets to achieve excellence and meet strategic business plans to avoid from any failure in future. These strategic business plans are divided into midterm and short term plans for cost minimization and profit maximization. This is a benchmark to measure the results of planned budgets. Reynolds told that budget planning is a source for the endurance of organizations in these highly competitive and challenging organizations.

A case study “Budgeting and budgeting control in business organization” written by Chika Agu (2006) defined that Budgetary control is the deployment of budget as a tool which regulates and guides the business activities and operations. The case study showed that budget is a measuring tool to administratively control operations and to determine whether planned goals are achieved on desired time or not?

Budgeting control system controls cost through budgets. It compares actual results with budgeted one by keeping in view whether obtained outcome matches with planned results. If any divergence from budgeted results is obtained, corrective measures proposal is established to achieve actual performance that matches with planned budget. Core objectives of budgetary control system are comprised of planning, synchronization and control. All these functions are interconnected (Arora, 1995).

Budget meets two fundamental prerequisites in the entire control procedure:

Feed forward

It provides fundamental control which can better help in decision making process in initial phase. These budgetary controls should be made whether the desired goals are rationale or not? Amendments should be made if budget is found irrational.

Feedback

Feedback provides foundations to measure the effectiveness and efficiency once point of action has been taken into account. This helps to improve previously committed mistakes and unmanageable impediments.

Budgetary control system has following functions:

Planning

Planning being an important part of budgetary control system encompasses long term, strategic and short term planning as well. Further, he stressed upon short term budgeting that must admit current environment, tangible, human and financial resources which is available in the organization. (Sizer, 1989). Planning is made by selecting goal and ways to attain them. It has a strong association with budgeting due to similarity in nature. Top management primarily focus upon the importance of planning and they plan where to invest, how to finance and how to increase market share keeping customers loyalty towards their brand. It is also certain that only planning and budgeting are the key survival for an organization.

Participative Budgeting

Research publications by various authors have substantial concern for participative budgeting despite of contradictory findings. Cherrington & Cherington (1973) found that negative relationship exists between budget participation and performance. Merchant (1987) and Brownell (1982) found positive relationship. Participative budgeting is utilized mostly when lower management has immense knowledge than middle management.

Monitoring

Budgetary monitoring and control approach is systematic and unremitting which is simplified by different steps: Establish departmental target performance of each organization by establishing goals to be attained so as to improve overall monitoring and performance of each organization. Communicate detailed budgetary strategy to entire stakeholders to greet and admire established goals and objectives. It boosts ownership of the consequences obtained at the end. Monitoring of real revenues data is evaluated by comparison of actual performance with the budgeted performance; thereby, reporting differences to the concerned officers on continual basis. The reason for variation in achieved data can be sort out and recommendation can be made (Drury, 2006).

Control

Control is set by comparing actual performances with planned and differences are addressed to management for intriguing corrective acts. Control is impossible without planning and it facilitates to maintain expenditures within planned perimeters. (Alesina and Perotti, 1996).

Achievement and accomplishment of the anticipated output data and results, their monitoring and assessments is compulsory. Both monitoring and evolution sustains steadily environment irrespective of various challenging forces; therefore, it is significant to local government effectiveness as well. It is also found that monitoring and evaluation need just raw data for test purpose and consumes a lot of time to scrutinize performance. Therefore, a valuable control system is needed for organizational development and continuous improvement with significant growth.

Budgetary Control Systems
Budgetary Control Systems

Performance Measurement

Horvath & Seither (2009) stated that performance measurement is a continuous process which quantifies the effectiveness and efficiency of each action, being a versatile concept; it also tells use of technology can better improve business functions. It is comprises of entire management planning, controlling and leading concept. Performance measurement could vary from business to business i.e. service sector and manufacturing sector but overall concept remains the same. In case of financial sector, budget performance can be quantified which helps to learn from mistake and perform better in the future.

Performance Indicators

Performance indicators include input, output, efficiency, effectiveness, cause and effects and outcomes as well. Input can be defines as all the necessary efforts required to keep on a project i.e. land labor, capital, raw material and money to meet necessary expenses. While, output is the outcome of input efforts and these are end results. Example may include budgeted overhead in production department which are calculated by costing department.

Outcomes and organization’s mission are closely related with each other. Outcome measures and evaluation of effectiveness defines the degree, the firm is attains its missions and objectives.

Disadvantages

  • Budget is totally based upon estimations and there is always uncertainty and ambiguity as future is uncertain.
  • Budget assumptions may or may not actually happen in real life. Many organizations face bankruptcy and insolvency problem due to poor liquidity.
  • We cannot blindly focus on it and it may affect long term planning and organizations nay face profitability issues.

References

Arora, M.M (1995). Cost Accounting, Principles and Practice (4th ed.) Vikas Publishing.

Sizer, J. (1989). An insight into Management accounting (3rd ed). Penguin Books Limited.

D.J. & Cherington, J.O. (1973). Appropriate reinforcement contingencies in the budgeting process. Journal of Accounting Research.17 (2), 225-253

Brownell, P., Dunk, A.S. (1991). Task Uncertainty and Its Interaction with Budgetary Participation and Budget Emphasis: Some Methodological Issues and Empirical Investigation. Accounting, Organization & Society.16 (8), 693-703

Drury, C. (2006), Cost and Management Accounting (6th ed). Boston Irwin. McGraw-Hill, 422-471

Alesina, A. & Perotti, R. (1996). Reducing Budget Deficits. Swedish Economic Policy Review, 3(1)

Horvath, P. & Seiter M. (2009). Performance Measurement. Die Betriebswirtschaft, 69 (3), 393-413

Agu Chika E., (2006) Budgeting and Budgetary Control in Business organization. (A case study of Emenite Nigeria Limited Emene Enugu Branch)

Budgetary Control Relevant Links

Budgeting Methods

Click Here To View Finance Dissertation Topics

Foreign Outsourcing

Foreign Outsourcing

Foreign outsourcing is a byproduct of the globalization where societies and the cultures across borders have become integrated. This integration had been through globe-spanning network of communications and executions of the national economies. As a result, the economies integrated into international economy through trade, cash flows, foreign direct investments, migration and spread of the technology. However, national economies integration has given rise to controversies owing to outsourcing. Though, it appears to the economists to be an opportunity for states to gain growth through comparative advantage aspect, there are various critiques on the same regarding its demerits. For this case, therefore, it is a twofold-problem which seems debatable among the persons of US and across nations (Snyder &Jeremy 2010, p. 20-22).

Among foreign outsourcing companies, for instance, Delta airlines outsourced 1,000 jobs to India in search of cheap labor. The company realized $25 million in savings and hence allowed the company to add 1,200 reservations and sales positions as well. Similarly, positions in IT had gone offshore with a total of 400,000. US positions recorded. Meanwhile, a total of US employment increase from 129 in 1993 to 138 million in 2003 mainly in services was also recorded. This way, it reveals that despite of heated public debate, outsourcing in US America is very positive to the American economy.

This paper, therefore, takes into consideration of the background of the study; US companies move to outsource factories to undeveloped nations. Besides, it critically looks into the business ethics regarding the barely faire wages that employees receive relative to their performance.

Foreign outsourcing background

It is a practice which had gain fame in the recent past decades as a way that is commonly used by different companies to reduce labor cost. Outsourcing is an effective cost-saving strategy used by transferring portion companies’ work to the outside suppliers rather than completing it internally. It is a practice which relies on the comparative advantage principle; at times it is more affordable to purchase a good or source labor from companies with comparative advantages rather than to produce internally.

Benefits of Foreign outsourcing

Outsourcing jobs to foreign countries has boosted American business to compete in the global economy. As the world economy has become less restrictive as a result of liberalization, US. companies modify their strategies to meet these contemporary world challenges. Competition in the world economy escalates the globalization, in turn incorporates the need for outsourcing for cheap labor. This way, outsourcing is a tool used to obtain a competitive edge in a globalized economy.

American trade across border for cheaper labor had been a crucial movement which has made a number of nations strives economically. Especially, its relationship with undeveloped countries had been an essential to their economic growth by a margin. This way, more and more of the American companies are hiring employees abroad hence enhancing job creation in undeveloped countries.

Outsourcing barely pays well

Many aspects of the average American’s good lifestyles can be solely attributed to trade relationship between US and Asia. That is, a significant proportion of clothes they put on, toys they nature their childhood, and given technologies the use at work or homes, was produced somewhere in Asia. Similarly, commerce with developing nations majorly China and Indonesia is as well reportedly crucial for America’s owned progressive economic achievements. Accordingly, manufacturing investments in developing states are in tens of billions of dollars and a huge number of contracted plants with American companies. However, many of Americans are barely aware that their appetite for consumerism fuels to heights controversial industry. Put simpler, just as the manufactured goods are in plenty than to meet the eye, sweatshops are very complicated (Hira, & Hira, 2005, p. 44-56).

Sweatshops are those factories which are considered to have unreasonable authoritative overseas, enforces long working hours with low payments, giving very harsh working conditions which are either physically or psychologically unhealthy. These outsourcing factories barely pay well regarding to the working conditions employees are subjected to. Considering the living wage, which is barely met by outsourcing factories, is a wage required by a million of workers to met their basic needs for survival. However, it is one of the brands which will remain unreality especially where government of state favors minimum wage. On the other hand, minimum wage is the amount of payment legally set as a benchmark by the states. In which it has to be met by the factories in a host country (Linder& Jane, 2004, p.75-90).

Reasons why outsourcing companies pay minimum wage

There exist some excuses why these sweatshops barely pay well for a living their employees overseas. Despite of the escalating food, energy, housing prices and transport fee around the world outsourcing factories has left workers a dire poverty. They barely receive a living wage to gather for their basic needs and those of their family members. Whether these manufacturing firms operate in Bangladesh, Cambodia, China, or in Philippines, their brands use all sorts of tricks to avoid paying their workers a sustainable living wage (Krishnan, 2007, p. 48).

Sweatshops posits that, paying a living wage seems impossible because there is lack of consensus on how to calculate it. However, from the workers point of view the problem has a little sense in this argument. Even though factories cannot agree on the figure many of similar firms had made no attempts to raise wage at all. Over the past years, of this dilemma have been in existence, multi-stakeholders such as Asia Floor Wage Alliance an alliance of 80-plus garment workers unions, workers representatives and the NGOs from six Asian garment producing nations have attempted to reach consensus but have failed in 2009. It is not the case that consensus is impossible to be reached rather it is just that sweatshops does not want to find it. The living wage was a workers buying power figure suggested to companies as a benchmark solution to the dilemma. Majority of the companies even was to the opinion but to date no company has started to officially it as a living wage benchmark (Snyder &Jeremy 2010, p. 20-22)

Outsourcing companies also argues that consumers do not want to purchase more of the products produced in this firms. For instance, consumers pay only a very small amount on their clothing needs. This way, sweatshops argues that it worth nothing however that a garment worker’s wage is merely 1-3% of the total cost of the garments. If a consumer is willing to spend eight Euros for a shirt, then means the worker though in harsh working conditions is receiving 24 cents. This as well is disputable in that doubling this wage would merely be another 24 cents. The consumer will barely realize the increased figure and if the consumer fails to, the factories will neither notice it. These profits have been observed being observed in the sweatshops profits margins and yet workers’ wage is still way below living wage (Krishnan, 2007, p. 48).

Sweatshops argue that low wage payments enable the hosting nations to gain competitiveness. This dilemma is also argues by the government of states giving reasons for setting minimum wage. Simply because, allowing living wage by the states would shun away the benefits from the sweatshops hence losing competitiveness edge. Cheap labor is a factor that entices production in majority of countries. For instance, China population attracts cheap labor force as well as the productivity of the industry is efficient. Contrary, increased wage rate have been an observed factor that boost morale of productivity, reduce absenteeism and employee turnover. This way, paying the workers a living wage is ideal to improve quality and flexibility. For this reason, therefore, allows the enlighten suppliers to retain a competitive edge (Bosniak et al., 2005:40).

Foreign Outsourcing
Foreign Outsourcing

Developing countries are desperate for jobs owing to their unemployment rate. On this note, outsourcing companies hold that they boost these countries significantly as they create job opportunities. It is actually the truth that workers getting jobs at sportswear and garment factories are better than some of the alternatives available to them. The flow of the cash flow from a country into another country has a detrimental impact of paying unfair wage yet they reap massive returns. The slave pay is not at all correlates to the returns realize even though the create employment to most of the developing countries. Generally it is unethical.

Outsourcing payments is unethical

Some of the world leading economists have recognized outsourcing as a necessary step in modernization and development. Jeffrey et al of Massachusetts Institute of Technology have asserted that sweatshops manufacturing in foreign countries, especially, in production of goods like garment and shoes are essential move towards a prosperous economic. This economic growth rate has been evidence in Asian tigers; Korea, Honking, Singapore and Taiwan. A study by University of Santiago de Compostela on the poverty relief and development also indicates that, sustainable international investments have been an economic progress in low income countries (Babin et al., 2012, p. 123-138)

However, foreign outsourcing by garment and footwear factories such as Nike, Converse, GAP, and Levi’s, has been genuinely linked to sweatshops as they are overwhelmingly lucrative. This is because they capitalize immensely on low-wage labor to significantly reduce cost of production. Such factories have been criticized as being involved with other agents, the government of US and developing countries, US corporate business which employs sweatshops labor, and the laborers in the developing countries, in exploitation of the workers. This is because they have been failing to correct the malpractices, in which they are pretty aware of but often claim they are hard to be corrected as purported by NGOs, workers alliances and so forth.

Rawls’ (1971, p.56-70) argument from the veil justice of ignorance would provide a view that foreign outsourcing is unfair and unethical. This is because there are great in equality between the US and the developing states. In developing countries which are relatively worse off the US, the laborers are exposed to the worst working conditions. Besides, it is unfair to as there exists difference in their payment as well. They actually take advantage of the developing country’s desperate need for job. It is true low-income countries are in great need for job creations which outsourcing countries are well-position to provide help. However, outsourcing companies have failed to justify their special obligations on either part of Enterprises Corporation or sweatshops to bare the shift of high wages, good working conditions and so forth.

Even though, outsourcing US companies are not charitable organizations and they are actually subjected to the stiffer market mechanisms, it does not mean that they have to maximize on their returns and fail to regard the socio well-being of its laborers. According to Immanuel Kant’s practical moral comparative posits that human beings ought to be treated as ends in themselves and not only as a means of exploitation to strive (Paton, 1999, p. 19-39). This way, sweatshops are not acceptable at all from their capitalism perspectives to mistreat their labors. It is unethical and unethical to use workers overseas as instruments in the amassing of the ventures profits (Zwolinski & Matt, 2007, p. 689-727)

Conclusion

The controversies surrounding the outsourcing companies in the US labor are suggestive of the ethical challenges. These are inevitable challenges which face US-Asia relationships. Besides, outsourcing companies’ reasons given for low-income payments to sweatshops workers are unethical and not justifiable. Their Laborers are the critical units that constitute and contribute to the nation’s economy at large. For this reason, US and Asia relations contribution to the overall progress needs not to overlook the moral obligations of respecting human rights. It is an essential need to be negotiated by the agents on the incompatibilities between the relative costs and the accruing advantages that are realized as results from their interactions.

Work cited

Babin, Ronald P, and Brian Nicholson. Sustainable Global Foreign Outsourcing: Achieving Social and Environmental Responsibility in Global It and Business Process Outsourcing. Houndsmills, Basingstoke, Hampshire: Palgrave Macmillan, 2012:123-138. Print

Bosniak, L. and others. Working Borders: Linking Debates about Insourcing and Outsourcing of Capital and Labor. Texas International Law Journal, Vol. 40, 2005

Ganesh, S. Foreign Outsourcing as Symptomatic. Class visibility and ethnic scapegoating in the US IT sector. Journal of Communication Management, 11.1: 71-83, 2007

Hira, Ron & Hira, Anil. Outsourcing America: What’s behind Our National Crisis and How We Can Reclaim American Jobs. AMACOM, 2005

Krishnan, J. Outsourcing and the Globalizing Legal Profession. William and Mary Law Review, Vol. 48, 2007

Linder, Jane. Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation. AMACOM, 2004, p.75-90

Mitchell, Edwin T. A System of Ethics. New York: Charles Scribner’s Sons, 2005:485-490. Print

Paton, H J. The Categorical Imperative: A Study in Kant’s Moral Philosophy. Philadelphia, Pa: University of Pennsylvania Press, 1999:19-39.

Snyder, Jeremy. “Exploitation and Sweatshop Labor: Perspectives and Issues.” Business Ethics Quarterly 20.2 (2010)

Zwolinski, Matt. “Sweatshops, choice, and exploitation.” Business Ethics Quarterly (2007): 689-727

Rawls, John. A Theory of Justice. Cambridge, Mass: Belknap Press of Harvard University Press,  1971:56. Internet resource

View Finance Dissertation Topics Here