Saturday, December 28, 2019

Women s Social Construction Of Gender - 1524 Words

Fred Ward, an American actor, producer and model, once said, â€Å"I think we re struggling with trying to redefine various positions at this point in history. To allow freedom for women, freedom for men, freedom from those sharply defined gender roles.† Ward mentions how much society emphasizes gender to create this social construction of gender, which restricts personal freedoms. Many articles have been written about the social norms of gender, and the differences between men and women. Jamaica Kincaid’s â€Å"Girl† (1978) illustrates a conversation with a woman and a young girl about how a girl is to behave. The women advises that the goal is to not be deemed a slut by doing woman’s work, keeping good hygiene and behaving in a respectable manner. Aaron H. Devor’s â€Å"Becoming Members of Society: Learning the Social Meanings of Gender† (1989) describes how children see gender and adopts the world’s social construction of gender in terms of behavior, personality and appearance. Michael Kimmel’s â€Å"â€Å"Bros Before Hos†: The Guy Code† (2008) explains how a man is to behave and appear in terms of competing with other men and asserting dominance as a sex. Kincaid’s â€Å"Girl,† Devor’s â€Å"Becoming Members of Society: Learning the Social Meanings of Gender† and Kimmel’s â€Å"†Bros Before Hos†: The Guy Code† persuade the audience to believe the social constructs that define men and women into completely separate categories, making men the more dominant sex, based on appearance, behavior and job roles.Show MoreRelatedEssay on The Social Construction of Gender1511 Words   |  7 PagesGender is a very strange topic in todays society. Many people dont know what to do with people who are transvestites or transsexuals and they often times hate them because they are different. People always think that there can only be two types of gender : masculine and feminine. People also feel that these genders most always correspond to a persons sex. So if the person is a male, then most people wouldnt accept that person into society if they acted feminine. For human beings there is no essentialRead MoreSocial Construction of Gender1183 Words   |  5 Pagesexactly is â€Å"Gender† and what a â€Å"Social Construct† means. GENDER In a layman’s language, Gender is simply the distinction between male and female. However, if we look deeper in well, we will notice the gender construction starts with the association of sex category at the time of birth. Sex is the biological distinction between a man and a woman and gender is based on sex. A sex category becomes a gender status through naming, dress and the use of other gender marksRead MoreDomestic Violence Against Indigenous Women947 Words   |  4 PagesIn the article â€Å"Domestic violence against indigenous women is everybody’s problem† domestic violence is depicted as a serious social problem that involves â€Å"unspeakable acts of violence† that leaves victims experiencing fear and despair (Taylor 2014). More specifically, the social construction of domestic violence will be discussed with an emphasis on Aboriginal women and a typology of intimate partner violence. The social construction of domestic violence has serious implications for victims of domesticRead MoreDistinction Between Sex And Gender1740 Words   |  7 Pages distinction between sex and gender be defined? In discussing whether the distinction between sex and gender can be defined I am going to use the early distinction between the two and how this has been socially constructed to identify if there is a distinction. Additionally, I am going to use a variety of feminist influences since the 1960’s, to draw upon the main issues when defining sex and gender. I will investigate the implications of defining sex and gender by looking at sexism. I hope thisRead MoreEssay on The Social Construction of Gender Roles848 Words   |  4 PagesThe Social Construction of Gender Roles Gender or sex roles are the expected patterns of behavior assumed to follow from a persons sex. Gender roles are not natural. They are formed by and vary within society, culture, geographic location, politics and time. There is a strong relationship between the social construction of gender and compulsory heterosexuality. People are programmed into certain gender roles and social categories throughRead More‚Äà ºGender‚Äà ¹ and the Importance of ‚Äà ºthe Social Construction of Gender.‚Äà ¹835 Words   |  4 Pagesâ€Å"Gender† and the Importance of â€Å"The Social Construction of Gender.† Gender is an individual s natural sense of themselves existing as a male or female, which may hold opposing views from their biological sex. I believe sex and gender are two terms used interchangeably. Sex implies the biological characteristics among females and males. Whereas gender implies the social qualities connected with being a female or male. As Lorber states, â€Å"I am arguing that bodies differ physiologically, but theyRead MoreSocial Construction Of Gender And Masculinity1689 Words   |  7 Pagesactions and attitudes regarding the social construction of gender, specifically masculinity and femininity. Children’s attitudes are influenced by a variety of external sources, but are most strongly influenced by their home life and parents. Parents are responsible for nurturing and teaching children about multiple aspects in life, including gender norms; this occurs both consciously and unconsciously. One-way parents pass on their beliefs about gender and gender norms are through the giving of heteronormativeRead MorePopular Culture Is A Direct Reflection Of Social Change1549 Words   |  7 PagesSeptember 28, 2015 â€Å"Popular culture is a direct reflection of social change, having the ability to alter, destroy, or praise social constructions. â€Å"(John Podhoretz) As suggested in the introductory quote, popular culture is powerful, characterized by the capability to heavily influence society. Throughout the past century, popular culture in the form of social media has been blamed for promoting negative social constructions such as gender stereotypes and racialization. The promotion of theseRead MoreNo Daughter By Sandra Cisneros894 Words   |  4 Pagesmore that women, and both should have equal opportunities and mutual respect for each other. However, in today’s society women are been oppressed by sexism and racism ideologies, not only based on gender differences, but in skin color, body shape, and culture as well. Furthermore, the short story â€Å"Only Daughter† by Sandra Cisneros can be effectively analyse through the feminist lens in the belief of oppression, constructions of patriarchy, and multiple traditions ; to illustrate women struggle inRead MoreThe Social Construction Of Reality1128 Words   |  5 Page sProfessor Fox Sociology I August 6, 2015 Social Construction of Reality Reality does not exist externally, but they do internally, as it is because each individual or group could interpret it differently and it is always changing. Reality is not really an objective that are being imposed on us but we actually create it. Conley defined social construction as â€Å"an entity that exists because people behave as if it exists and whose existence is perpetuated as people and social institutions act in accordance with

Friday, December 20, 2019

Employee Welfare Facilities - 9555 Words

Introduction The principle source of any organization is the people managing its people are the most important aspect of managing organization. No longer is manpower one of the resources in industries or business and establishment. It is the most important of all resources. Manpower is that resource through which the management directs and controls resources like material, money, machines and others. A. Human resource management: Personnel management is the planning, organizing, directing and controlling of the procurement, development, compensation, integration, maintenance and separation of HR to the end that individual, organizational and societal objective and accomplished. Objectives of Human Resource Management a)†¦show more content†¦The function of HRD at EXIDE: The basic function of the department is to achieve result through effort of people employed by it: this can be achieved smoothly only if cooperation on the part of the employee is generated for achieving the objective of management. The effort of human being cant be directly controlled as a process of machine can be, hence we must create an environment in which co-operative action is spontaneous. Current issues: âž ¢ Pay and other benefits âž ¢ Promotional policy âž ¢ Job evaluation âž ¢ Manpower planning (recruitment-reservation-induction placement, service record-merit rating-transfer-promotion-resignation/ retirement) âž ¢ Training (in-house training, external training programmes âž ¢ Management development programmes 6. Employee welfare: Definition: Welfare means faring or doing well. It is a comprehensive term, and refers to the physical, mental, moral and emotional well being of an individual. Labour welfare also referred to as betterment work for employees, relates to taking care of the well being of workers by employers, trade unions and governmental and non-governmental agencies. It is rather difficult to define the term Labour precisely because of the relativity of concept. Merits and demerits of welfare measures: Labour welfare is justified for several reasons. It is desirable to recollect the services of a typical worker in this context. The social and economic aspects of the life of aShow MoreRelatedEmployee Welfare And Services Facilities1157 Words   |  5 PagesIntroduction Employee welfare /services facilities, â€Å"effects on the behavior/culture of the all employees and on the productivity of the organizations†ALPS industry management must provide the better facilities to all employees or vendors in such way that employees become satisfied. In this industry, introduce to a state of living a group, welfare is a broad concept, in the environments, social. Alps industry promotes the economic welfare because this is related to company growth. An employee coversRead MoreEmployee Benefit And Welfare Activities Essay1490 Words   |  6 PagesEmployee benefit and welfare activities The responses received are tabulated and analysis is done to determine the result. Table no: 4.01- Employee benefit and welfare activities Particular Percentage No. Of Respondents Yes 98.7 148 No 1.3 02 Chart no: 4.01- Employee benefit and welfare activities Analysis: The above table shows that 98.7% of the respondents accept that the organisation provides them with the employee benefit and welfare activities, which is one positive result for the studyRead MoreClassification Of Employees On The Base Of Quality Of Work Life1472 Words   |  6 Pages Classification of LIC Employees on the base of Quality of Work Life The application of factor analysis by principle component method derived Eight factors of QWL, namely, Organizational Climate Culture, Work-Life Balance, Working Environment, Welfare Measures, Compensation of Employees, Participation in Decision-Making, Opportunity for Growth Development, and Social Relevance of Work. The perception of Employees over these 8 factors is classified into heterogeneous groups through k-means ClusterRead MoreThe Imperative Advantages Of Welfare879 Words   |  4 Pagesadvantages of welfare measures can be condensed as takes after: †¢ They give better physical and psychological wellness to labourers and along these lines advance a sound workplace Offices like lodging plans, health advantages, and instruction and diversion offices for labourers families help in raising their ways of life. †¢ This makes specialists to give careful consideration towards work and consequently builds their efficiency. †¢ Businesses get steady work power by giving welfare offices. LabourersRead MoreA Report With Text Supported By Images, Photographs And Drawings As Appropriate1303 Words   |  6 PagesScenario You have been appointed as a junior site engineer for D.B.REALITY, You have been asked to produce Health and safety legislation information for the responsibility of employers and employee at work, including people assigned with specific duties related to health and safety. Your presentation should be in the form of a report with text supported by images, photographs and drawings as appropriate. Task 1(p1): You need to discuss the use of approved codes of practice to ensure complianceRead MoreThe Health And Safety At Work Act 1974747 Words   |  3 PagesRegulations 2010 and Approved Documents which may impact health and safety. HASAWA Act 1974 outlines the responsibilities of both employer and employee. Employers Responsibilities: †¢ Ensure that all plant and machinery is well maintained †¢ All hazardous activities have the necessary safe systems of work in place †¢ Maintain the work place and provide welfare facilities as required †¢ Compile and review company health and safety policy and when revised alert all employees †¢ Ensure site access and egress isRead MoreAn Investigation At The Occupational Health And Safety Legislation1420 Words   |  6 PagesSUMMARY A furnace used for heat-treating of small iron and steel components exploded in the one of the research facility of a company. Hydrogen gas was used as a catalyst during the process in order to produce a steel and iron with a bright surface finish. During the incident, there was a new employee working in the room, of his first time undergoing the heat treatment process without a supervision of the experts. The main cause of the incident was due to insufficient amount of purging before lightingRead MorePolicy Identification And Explanation Of The Ag Gag Law1411 Words   |  6 Pageswith agricultural production if the person knowingly: is not employed by an agricultural production facility and enters an agricultural production facility, obtains records of an agricultural production facility, or obtains employment by force, threat, misrepresentation or trespass. Also, if a person enters an agricultural production facility that is not open to the public and, without the facility ownerâ €™s express consent or pursuant to judicial process or statutory authorization, makes audio or videoRead MoreSpeech At South Africa ( Robson )922 Words   |  4 Pagescontribute to the organizational growth and prosperity. Organizations must have the optimum competent staff for various executions. It goes without saying that managing people is a key task for any company. This task is the key to success since the employee segment forms the main cost on one hand and the important driver of value creation on the other. Obviously the small deviations in man-management area can lead to major bangs in returns. Managers also need to ensure that employees interests areRead MoreHealth And Safety At Work Act 19741605 Words   |  7 Pagesensure the health and safety of their employees and anyone affected by their activities so far as reasonably practical †¢ Regulation 3 covers risk assessments – Employers must carry out and complete suitable and sufficient risk assessments where an employee may suffer from work related risk by the company’s activities. This should also be regularly recorded and reviewed †¢ Regulation 5, an employer must give appropriate arrangements for the effective planning, organisation, control, monitoring and review

Thursday, December 12, 2019

Internet of Things Communication Interface

Question: Discuss about the Internet of Things for Communication Interface. Answer: Introduction Internet of things is an important idea surrounding the idea of connecting every object using sensors and communication interface through the internet. In this case, they can communicate vital information in their current state, and relevant responses offered towards possible adjustment. The technology behind the idea applies in several sectors of the economy such as manufacturing industry, logistics, energy efficiency, and the area of health (Xia,Yang, Wang, Vinel, 2012). The concept has received full recognition and adopted by governments and the international community in most of their operations. The technology allows for the purchase of items already connected to the internet such as light bulbs, refrigerators, cars, and medical machines, which can remain monitored and operated remotely increasing service efficiency. Following the trend, everything will soon appear on the internet making the world more of a robotic operation. Application of Internet of Things Building and Home Automation Internet of Things applies vastly in the building and home automation systems ranging from security enhancement, energy consumption reduction to cost maintenance. Various sensory devices are used to monitor movements within buildings and relay information to the relevant quotas for a possible action. Doors connected to the internet have the ability to sense registered persons and grant access allowing a monitoring team to detect their authenticity. In a similar manner, the sensors can regulate room temperature by adjusting appropriately whenever the weather changes to offer important condition. In the case of excessive cold, a sensor relays information, and a substantial amount of adjustment occurs to allow for heat in the room. The operations can occur from a person connected to the internet from a different location. At the same time, sensors interlinked in the bulbs can detect the presence and absence of individuals in a room and turn off the lights to save energy (Miorandi, Sicari, De Pellegrini, Chlamtac, 2012). On the other hand, the sensors allow the lights to turn on whenever movement in a room occurs. The operation allows for security lights to turn themselves off whenever daylight comes in and vice-versa in the evening. Smart City Operations Smart cities can use the technology in reducing costs and maximizing efficiency in their daily activities. The technology allows for surveillance activities, system control, and lighting. Here, the sensors installed on the products allow for detection in the pipeline connected to a city calling for a prompt response from a relevant group of technicians (Suny Cortland,2016). At the same time, the technology can relay e-meter readings increasing efficiency and timely relay of bills to clients. Similarly, the system remains installed on the streetlights command center where the lights turn themselves on and off at relevant times and a monitor team can detect a faulty light and respond to the same (Want, Schilit, Jenson, 2015). The technology comes in handy in traffic control where operations go on swiftly according to the load without necessarily including the human resource in the command centers. The sensors installed relay traffic situation that enables those at the control center determine the next course of action feedbacked for effective action. In the process, the technology reduces operation time, increases efficiency and saves costs for manual operations. Smart Manufacturing Industry Internet of things has vast application in the manufacturing industry as the sensors provide real-time information report on various processes. First, it is essential in inventory reporting where a manager sitting in a remote location can ascertain the inventory record and plan for either an increase or decrease according to the market demand. Therefore, it is vital for record keeping. At the same time, goods on transit can be tracked using the sensors installed where the owners and product consumers can track the progress and get the assurance of their product flow. At the same time, the technology allows for predictive maintenance where the sensors relay information on equipment service duration and operation efficiency allowing the support team to act swiftly limiting low production due to break up (Bi, Da Xu, Wang, 2014). The sensors allow for an automatic firmware update whenever a new useful update is out thereby allowing for a natural diffusion of technology in operations. The technology enables a track of employee presence at different workstations guaranteeing their safety through a timely response that turns on the security apparatus in case of an emergency. Wearables In the wearable market, the technology provides benefits through the smart watches that relay information on weather conditions and other environmental factors. At the same time, the sensors provide location information essential in tracking down children and other persons for security purposes. Health Sector The health sector benefits greatly from the technology in patient care. Patients on treatment can be monitored and necessary action taken by medical personality without their physical presence. In case a sensor indicates a change in body temperature or inadequate response to treatment, the information relayed to a doctor enables one to prescribe and change medication and observe the same According to Jog, Sharma, Mhatre, Abhishek, (2015). Hospitals can track their asset and report when a malfunction occurs allowing for a timely maintenance thus enhancing service efficiency. At the same time, it increases patient safety by allowing authorized personnel in restricted areas promoting accountability to the industry. Automotive Industry In the automotive sector, many changes have been incorporated using the technology allowing for information relay on various motor vehicle engine and parts. It allows for predictive maintenance by transmitting information on engine service due dates, wire malfunction, and non-compatible parts installed. Vehicle tracking during shipping and normal operations occur by using information relay from the sensor to relevant car owners. The technology has revolutionized vehicle tracking and maintenance that can be done remotely. Internet of Things Applications for Development As a firm active in the connectivity web technology, the business can develop applications that aim to expand businesses on a global platform. With the current environmental issues, it is essential for the enterprise to develop Internet of Things application that reduces environmental wastes. Some government is grappling with environmental problems, and the applications would be readily adopted as part of the environmental concern (Rubens, 2014). Green Street Lighting Control The firm proposes a sensor that can be used in the effective street lighting that sets the light on a few minutes to dusk and a few minutes to dawn. The application is interconnected and allows the control system to check the malfunctioning lighting programs. In this case, efficiency is achieved through proper use of non-renewable sources. In most countries, it is evident to observe security lights running through the day continuously depleting the non-renewable resources (Burntz, 2016). Therefore, the application using automated sensors would enable energy consumption reduction and bring responsibility to the city management. At the same time, it would save costs since fewer power bills would be made in areas where the sensors exist. The sensors lighting system shall encompass the sensors thus driving benefits to the company and growing its brand name. Fang, Xu, Zhu, Ahati, Pei, Yan, Liu, (2014) suggest that it would ease maintenance activities by sending a quick notifier to the electrical department for a prompt response on the non-functioning streetlight. Smart Parking Technology At the same time, firm proposes developing parking lots applications that are installed in parking lots and informs the vehicle owners on empty parking slots. The application would substantially reduce the amount of carbon emitted to the environment spent while searching for parking lots (Parth, 2014). As vehicle owners approach a car park, the sensor would indicate empty spaces controlled by the system that detects whenever a car leaves, raising a red button at the entrance. Developed and developing countries are embracing concepts that reduce gas emission to the environment, and the idea would be widely accepted in the international cities Yang, Geng, Du, Liu, Han, (2011). Fuel emission has been a persistent issue towards global warming, and by reducing the emission levels, the world would be safer and better for the current and future generation (Fang, Xu, Zhu, Ahati, Pei, Yan, Liu, 2014). Detection of Excessive Pollution Levels In a bid to remain committed to the environment, the firm shall develop an application that detects the extreme level of emission in factories and other related sectors and sends the message to the monitoring department for proper adjustment. The sensors, connected to the main company shall monitor the levels according to the international standards and therefore become an environmentally friendly application. Data Security Strategies All the three applications are environment-friendly thereby standing high chances of performing in the market already aware of the global warming effects. In securing the data transfer from the sensor to the control center, the firm shall ensure data encryption occurs on its network and recommend the use of strong passwords and access control to ensure the information remains free from interruption. At the same time, it shall support for a tiered data protection using perimeter defense rings in countering threats. Further, it shall recommend for a firewall protection with antispyware and virus detection sets on the servers (Cheswick, Bellovin, Rubin, 2003). Once the data enters the central server, the firm shall provide a cloud storage platform completely secured and peculiar to a host organization access. According to Sanyal Iyer, (2013) cloud storage is one of the secure methods used by the current organizations in safety promotion. Issues Surrounding Internet of Things Advantages of IoT Communication Internet of things allows for real-time communication between devices helping them stay interconnected Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M. (2014). For instance, one can read information from a remote center through a smartphone or computer interconnected. Therefore, it promotes transparency-allowing producers to monitor inventory records and plan for possible supply schemes. Security The technology, through the automatic control systems, allows only restricted persons and controls movements enhancing safety and bringing individuals to account (Perera, Zaslavsky, Christen, Georgakopoulos, 2014). Through this, its possible guarantee secures operations and lighting in diverse areas. Monitoring Benefits In the past, a lot has been done to monitor including physical presence of individuals. However, internet of things allows for sensor installation on security cameras that monitors operations and determines when a change in action can be done, more so from a remote location (Buzzle, 2016). Time The technology reduces service time where a real-time solution to problems is offered as information transfers from two locations as opposed to the traditional models of monitoring (Hajdarbegovic 2016). Costs Internet of things allows for faster operations that limit human efforts that involve physical movement to carry out tasks in different locations. In the health sector, change of medication can be done without physical presence and can be administered to various patients thus saving enormous costs. Efficiency Internet of things, in the energy sector, reduces environmental issues of waste as the technology allows options to turn off energy not in use even from a remote location Botta, De Donato, Persico, Pescap, (2014). In monitoring pipeline flow, the technology reduces leakages due to faster response and stoppage of the same. Disadvantages Privacy/security As data transmits from one source to another, vital data might be hacked or used by other unintended persons. Therefore, it poses a risk, especially to information confidentiality. Data encryption issues affect the technology reducing its usage among those unable to find protective devices Sheng, Yang, Yu, Vasilakos, McCann, Leung, (2013). If a notorious hacker changes a drug perception, it may lead to a patient's death thus a safety risk. Compatibility Issues Lack of a common standard between interconnected devices sets back on the technology penetration among industries. Job Loss Individuals replaced by the machine operation, especially in the monitoring and tracking risk job loss, thereby affecting income levels (Taggart, 2016). As services get automated, a large number of individuals are rendered jobless. Overreliance on Technology As technology takes place in all operations, people tend to be lazy as everything is controlled. In the process, errors might occur, for instance, if an alarm goes on, and once one switches it off, it allows for a coffee maker to go on and an automatic shower. In the process, much energy shall be lost when an individual has not woken up for the services (Borne, 2014). Ethical, Privacy and Legal Issues Due to system integration and linkage through sensors, a new set of moral and legal challenges emerge surrounding legality of data transfer, data ownership, and security. Ethical issues on data handling and sharing, and inappropriate use shall occur limiting the proper use of the same. At the same time, lack of universal laws surrounding the technology poses a challenge to the existence and good use of the technology. According to Pittenger, (2003) information privacy would be an issue with the current hacking menace that changes tactics often. Personal privacy in institutions would cause significant safety challenges as criminals might use the same information to execute illegal activities. As much as the technology increases connection, lack of proper use results into a technological crisis. According to (Suo, Wan, Zou, Liu, (2012, March) the flow of irrelevant information in the form of advertisements flowing to various interconnected sectors would jeopardize the success of the technology. Conclusion The Internet of Things has brought a revolution in the way things occur in the current world. The technology comes with energy saving, cost cutting, and securing, and staying in control of our belongings. Enabling items of daily use with applications that enable us to watch their movements and changes derive benefits to the current users. As a firm concerned in the Internet of Things, the opportunity for development remains open and can be used to bring the eco-friendly products to the market. At the same time, Internet of Things has several benefits ranging from time saving, efficiency in factories, environmental concerns, faster processing techniques, and saves time. However, there are serious challenges such as unemployment where machines replace human labour, privacy infringement issues, overreliance on technology, and raising a lazy generation dependent on automatic operations. Despite the challenges, several benefits derive from the technology overshadowing the negativities. Therefore, the firm should take the opportunity of the present technological wave to invent applications that influence the current and next generation. In so doing, the firm has to put into consideration ethical procedures to avoid a negative effect on the firms future operations. Privacy is a key concern coupled with product quality that is achievable through incorporating qualified personnel in the product development stage. At the same time, the firm has to seek legal solutions to product copyright issues to ensure themselves as the sole producers apart from operating according to the legislative laws surrounding electronics production. Since people are increasingly becoming more aware of their environment, developing products that tackle related issues sounds viable in the business world. The world is embracing technology in every operations that has to be utilized by everyone to the utmost. Therefore, Internet of Things is a blessing to the modern generation that brings much ef ficiency in operations and remaining concerned to the changing environmental landscape. Recommendations Strategy in business is a key tool towards organizational success. In this case, the Internet of Things presents wide opportunities for the firm to grow and build its brand name. In this respect, I recommend for the analysis and execution of the three projects concurrently. I am certain on the projects viability in the market basing on not only the increased use of internet of things concept, but also the growing concern to protect the environment. I, therefore, recommend the firm to take up the three projects; parking lot sensor, emission reduction, and smart street lighting technologies t thrive in the environmentally sensitive world. Government policies currently encourage such technology ventures, providing an assurance of the business success both locally and in the international scene. Since the product is new in the market, I recommend the firm to outsource system developers to aid in the manufacture process and in the process build experience on the existing staff who can then continue with the manufacture system. Competition is real in the industry, and developing strong products would increase the chances of developing a greater market share. Each staff should take an oath of allegiance to the company and promise not to divulge the business and manufacturing tactics to any other firm for malicious reasons. The step is in good faith to guarantee product safety and as an ethical consideration on privacy. However, particular concern has to be made regarding privacy of information, ethics, and safety when handling the project. Restriction to information should be maintained and done with adequate permission and request to end users. Sicari, Rizzardi, Grieco, Coen-Porisini, (2015) suggest for the considerations of the privacy of information through encryption recommendations to the purchasing team remain a key selling point to the technology application. Ethical concerns are essential as product manufacturer and distributor, and in this case, privacy remains a central concern that might affect the business. Therefore, I recommend for the management team to come up with policies and measures that shall ensure product privacy. In this case, the company shall transfer the same to the buyers through manuals. Furthermore, the company shall offer after sales services, where the firm offer assistance on any issues of contention regarding privacy. The systems shall undergo testing to ascertain their quality essential in building a trusted name on the market and as an ethical act to the general consumers. Adding on, a two-year warranty should be placed on the products with a timely response to enable a quick sale promotion for the products. Internet of things is a transformation that if well handled yields positive results to the global village concept and is bound to drive profits for the company. References Bi, Z., Da Xu, L., Wang, C. (2014). Internet of things for enterprise systems of modern manufacturing. IEEE Transactions on Industrial Informatics, 10(2), 1537-1546. Borne, K. (2014). 14 benefits and forces that are driving the internet of things. Retrieved from https://www.mapr.com/blog/14-benefits-and-forces-are-driving-internet-things Botta, A., De Donato, W., Persico, V., Pescap, A. (2014, August). On the integration of cloud computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 23-30). IEEE. Burntz, B. (2016). Why the IoT is coming to street lights. Retrieved from https://www.ioti.com/smart-cities/why-iot-coming-street-lights Buzzle. (2016). Pros and cons of internet of things (IoT)-What you need to know. Retrieved from https://www.buzzle.com/articles/pros-and-cons-of-internet-of-things-iot.html Cheswick, W. R., Bellovin, S. M., Rubin, A. D. (2003). Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc.. Fang, S., Da Xu, L., Zhu, Y., Ahati, J., Pei, H., Yan, J., Liu, Z. (2014). An integrated system for regional environmental monitoring and management based on internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1596-1605. Hajdarbegovic, N. (2016). Are we creating an insecure internet of things. Security challenges and concerns. Retrieved from https://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things Jog, Y., Sharma, A., Mhatre, K., Abhishek, A. (2015). Internet of Things as a Solution enabler in health sector. International Journal of Bio-Science Bio-Technology, 7(2), 9-24. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516. Parth, S. (2014). Internet of things has a large role to play in smart cities. Retrieved from https://www.governancenow.com/views/interview/ternet-things-has-a-large-role-play-smart-cities Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D. (2014). Sensing as a service model for smart cities supported by internet of things. Transactions on Emerging Telecommunications Technologies, 25(1), 81-93. Pittenger, D. J. (2003). Internet research: An opportunity to revisit classic ethical problems in behavioral research. Ethics Behavior, 13(1), 45-60. Rubens, P. (2014). How to develop applicants for the internet of things. https://www.cio.com/article/2843814/developer/how-to-develop-applications-for-the-internet-of-things.html Sanyal, S., Iyer, P. P. (2013). Inter-Cloud Data Security Strategies. arXiv preprint arXiv:1303.1417. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A. V., McCann, J. A., Leung, K. K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91-98. Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164. Suny Cortland. (2016). The internet of things. Retrieved from https://sites.google.com/a/cortland.edu/the-internet-of-things/disadvantages Suo, H., Wan, J., Zou, C., Liu, J. (2012, March). Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 3, pp. 648-651). IEEE. Taggart, M. (2016). 3 threats and 3 benefits of the internet of things. Retrieved on 9th September 2016 from https://www.atlanticbt.com/blog/3-threats-and-3-benefits-of-the-internet-of-things/ Want, R., Schilit, B. N., Jenson, S. (2015). Enabling the Internet of Things. IEEE Computer, 48(1), 28-35. Xia, F., Yang, L. T., Wang, L., Vinel, A. (2012). Internet of things. International Journal of Communication Systems, 25(9), 1101. Yang, G., Geng, G., Du, J., Liu, Z., Han, H. (2011). Security threats and measures for the Internet of Things. Journal of Tsinghua University Science and Technology, 51(10), 1335-1340. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22-32.