Monday, January 27, 2020

Performance Management Purposes and Definitions

Performance Management Purposes and Definitions INTRODUCTION Managing people in organisations is becoming more and more important nowadays so as to produce the best result and achieve efficiency. Therefore employees should be managed efficiently so as to add value in organisations. Performance management is not new, despite the fact that nowadays more emphasis is being laid on it, especially in the public sector. Performance management system is considered as a tool to an organisation. Performance management is a whole work system that begins when a job is defined as needed. It ends when an employee leaves your organisation. The performance management system is a process which increases competence, decreases cost and promotes quality. Performance management is a term borrowed from the management literature. The term performance management was first used in the 1970s, but it did not become a recognised process until the later half of the 1980s (Armstrong Baron, 1998). It has been among the most important and positive developments in the sphere of management in recent years. The meaning of performance management has evolved and continues to evolve. While in the sixties and seventies performance management was often equated to some form of merit-rating, in the eighties and nineties it has been linked to new management paradigms such as Management by Objectives, Performance Appraisal, Behaviourally Anchored Rating Scales and Performance-related Pay. The ultimate competitive asset of any organization is its people (Band et al., 1994), thus organizations should develop employee competencies in a manner aligned with the organizations business goals. This can be achieved through performance management systems (Moullin, 2003), which act as both behavioural change tool and enabler of improved organizational performance through being instrumental in driving change. ORGANIZATION INDIVIDUAL Defines mission, values, strategies and objectives Understands and agrees objectives Define tasks, standards and performance measures Understands and agrees tasks, standards and performance measures Monitors organisational, team and individual performance Monitors own performance Develops team and individual performance Develops own performance Figure 1: The contribution of the organisation and the individual in performance management Performance management therefore aims to emphasize and encourage desired and valued behaviours (Risher, 2003), thus is a key tool of communication and motivation within organizations seeking a competitive edge through strategic change and control. Performance management then becomes a system for translating organizational intention and ambition into action and results delivering a strategic goal, such as behavioural change (Band et al., 1994). References: Band, D.C., Scanlan, G. and Tustin, C.M. (1994), Beyond the bottom line: gainsharing and organizational development, Personnel Review, Vol. 23 No. 8, pp. 17-32. Moullin, M. (2003), Defining performance measurement, Perspectives on Performance, March, p. 3. Risher, H. (2003), Refocusing performance management for high performance, Compensation and Benefits Review, Vol. 35 No. 5, pp. 20-30. DEFINITION OF PMS Fowler (1990) defines performance management as: the organisation of work to achieve the best possible results. From this simple viewpoint, performance management is not a system or technique, it is the totality of the day-to-day activities of all managers. The (then) Institute of Personnel Management (1992) produced a similar definition: A strategy which relates to every activity of the organisation set in the context of its human resources policies, culture, style and communications systems. The nature of the strategy depends on the organisational context and can vary from organisation to organisation. Storey and Sisson (1993) define performance management as: an interlocking set of policies and practices which have as their focus the enhanced achievement of organisational objectives through a concentration on individual performance. Fletcher (1992) provides a more organisational definition of performance management: an approach to creating a shared vision of the purpose and aims of the organisation, helping each individual employee understand and recognise their part in contributing to them, and in so doing manage and enhance the performance of both individuals and the organisation. Performance management systems are defined as: the formal, information-based routines and procedures managers use to maintain or alter patterns in organizational activities (adapted from Simons, 2000). Reference: Simons, R. (2000), Performance Measurement and Control Systems for Implementing Strategy: Text and Cases, Prentice-Hall, Upper Saddle River, NJ. Armstrong and Baron (1998): Performance management, in a human resource management (HRM) sense, is the process of delivering sustained success to organizations by improving capabilities of individuals and teams. Armstrong and Baron define performance management as a process which contributes to the effective management of individuals and teams in order to achieve high levels of organisational performance. As such, it establishes shared understanding about what is to be achieved and an approach to leading and developing people which will ensure that it is achieved. They go on to stress that it is a strategy which relates to every activity of the organisation set in the context of its human resource policies, culture, style and communications systems. The nature of the strategy depends on the organisational context and can vary from organisation to organisation. In other words performance management should be: Strategic it is about broader issues and longer-term goals Integrated it should link various aspects of the business, people management, and individuals and teams. It should incorporate: Performance improvement throughout the organisation, for individual, team and organisational effectiveness Development unless there is continuous development of individuals and teams, performance will not improve Managing behaviour ensuring that individuals are encouraged to behave in a way that allows and fosters better working relationships. Armstrong and Baron  stress that at its best performance management is a tool to ensure that managers manage effectively; that they ensure the people or teams they manage: know and understand what is expected of them have the skills and ability to deliver on these expectations are supported by the organisation to develop the capacity to meet these expectations are given feedback on their performance have the opportunity to discuss and contribute to individual and team aims and objectives. It is also about ensuring that managers themselves are aware of the impact of their own behaviour on the people they manage and are encouraged to identify and exhibit positive behaviours. PERFORMANCE MANAGEMENT AS AN INTEGRATING PROCESS Performance management is concerned with the interrelated processes of work, management, development and reward. It can become a powerful integrating force, ensuring that these processes are linked together properly as a fundamental part of the human resource management approach which should be practised by every manager in the organisation. CHARACTERISTICS OF PMS Armstrong and Baron (1998) define performance management by eliciting the characteristics of a performance management system, which are as follows: It communicates a vision of its objectives to all its employees. It sets departmental, unit, team, and individual performance targets that are related to wider objectives. It conducts a formal review of progress towards these targets. It uses the review process to identify training, development and reward outcomes. It evaluates the whole process in order to improve effectiveness. It defines a managerial structure to look after all the characteristics above, so that individual staff and managers are assigned specific responsibilities to manage the Performance Management System. Furthermore, a performance management system should have SMART objectives namely; Specific, Measurable, Appropriate, Relevant and Timed. PURPOSES OF PMS Armstrong and Baron (1998, pp. 51-6), Williams (2002, pp. 219-24), Poister (2003, pp. 9-15) and others have noted that organisations introduce performance management and/or measurement for a variety of purposes which might include one or more of the following 17 (the list below is not intended to be exhaustive): (1) to provide information on organisational effectiveness; (2) to provide information on employees effectiveness; (3) to improve organisational effectiveness; (4) to improve employees effectiveness; (5) to provide information on organisational efficiency; (6) to provide information on employees efficiency; (7) to improve organisational efficiency; (8) to improve employees efficiency; (9) to focus employees attention on areas deemed to be of greatest priority; (10) to improve employees levels of motivation; (11) to link employees pay with perceptions of their performance; (12) to improve the quality of employees training and development; (13) to raise levels of employee accountability; (14) to align employees objectives with those of the organisation as a whole; (15) to improve customer service; (16) to facilitate the implementation of an organisations mission and/or strategy; and (17) to act as a lever of change in developing a more performance oriented culture.

Sunday, January 19, 2020

Fundamentals of Computer

entExamination Paper: Fundamentals of Computer IIBM Institute of Business Management Semester-I Examination Paper MM. 100 Fundamentals of Computer Section A: Objective Type (20 marks) ********************************************************** Multiple Choices: 1. b. 2 types 2. b. 1 or more input signals to produce output 3. d. Both (a) & (c) 4. b. Non-volatile 5. c. Direct-access storage device 6. c. Multiple object program files of any software 7. a. Are geographically distributed 8. b. Way in which the network’s nodes are linked together 9. a. World wide web 10. . General purpose electronic equipment for homes Fill in the Blanks: 1. Multimedia applications are multimedia presentation, foreign language learning, multimedia Kiosk and †¦multimedia books, e books, digital library, video games, animation films & virtual shops†¦ 2. Computer audio deals with synthesizing, recording and †¦Palying audio†¦Ã¢â‚¬ ¦ with a computer. 3. Collating sequence is ordering o f symbols in an †¦encoding†¦. standard. 4. Binary coded decimal is a †¦6-Bit†¦ Code. 5. The logic gates are interconnected to form gating or logic networks known as †¦combinational†¦.. ogic circuits. 6. †¦CPU†¦. is the brain of a computer system. 7. The term †¦software†¦. refers to a collection of programs. 8. Program errors are known as †¦bugs†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. Documentation†¦. is the process of collecting, organizing storing and maintaining a complete historical record of programs. 10. File organization†¦ deals with physical organization of records of a file for convenience of their storage and retrieval. Section B: Short Questions (20 marks) 1. What is data processing? Data processing is a series of actions on input that converts the input into useful output.In data processing, input is data and output is the useful information. In consists of three sub activities: Capturing input data, manipulating it and pro ducing output information. People, procedure and devices are required to produce the output from the input data. 2. What is a file management system? File management system is a set of programs which help the users to organize, create, delete, update and manipulate their files. Its common features are as described below. a. Transaction file: It stores the input data until the application uses it during next processing cycle. b.Master file: It contains all current data relevant to an application. c. Output file: some applications use multiple programs. One program takes the output of another program as input; hence the former program stores the output as an output file. d. Report file: It is a copy of report, generated by application in computer accessible form. e. Backup file: It is a copy of file crated by user or system to avoid loss of data due to corruption or deletion of original file. 3. What is a computer network? Computer network is a group of computers which are linked to e ach other via internet.The computers on network can communicate with each other and can share information. Four basic service provided by internet to its users are electronic mail, file transfer protocol, telnet and use net news. The common network types are personal area networks (PANs), local area networks (LANs), metropolitan area network (MANs), campus area networks (CANs) and wide area network (WANs). 4. What is a secondary storage? The additional memory needed in all computers to overcome the limitations of primary storage (Limited capacity and Volatile) is called secondary storage. t is nonvolatile and has lower cost per bit stored. It operates generally at slower speed than primary storage. Computer system uses it primarily to store large volume of data on permanent basis. Commonly used storage devices are hard disk, CD ROM, DVD, memory card and Pen drive. Section C: Long Questions (20 marks) 1. Explain the printing mechanism of laser printer. Mechanism of Laser Printers: Tr ansfer of Data The very first step in laser printing is the transfer of data from a computer to the memory of the image processor of a printer. Writing DataNow, once the data is transferred to the printer's memory, it is written to the printer's drum with the help of a laser. The drum will keep rotating and the moment it rotates past the laser, it sweeps off the printer's surface neutralizing some spots to about -100v. These spots are the areas where the toner remains stuck to the drum and further gets transferred to the paper. Inserting the Paper and Pickup Process of the Toner Once the writing process is over, you need to add papers to the printer. Keep the papers into the printer's paper tray.The feed rollers inside the printer pull the paper inside and the registration rollers hold it till its release. As the drum keeps on rotating, the toner settles down in an area which is at a charge of about -100v and remains attached to the drum till the paper comes in. Transfer of the Tone r to the Paper Now, the complete toned image is created on the drum. The moment you apply the paper to the printer, the toner transfer process starts. The transfer corona applies a charge of about +600v to the paper and when the paper passes through the drum, the toner which is at a charge of about -100v gets transferred to the paper.Further, the paper passes through a static charge eliminator that decreases the positive charge in the paper, with the help of its negative charge. Fusing The process of fusion takes place in order to secure the printout by melting the minute plastic fragments present on the toner's surface, so as to fix them to the paper fibers. Laser printers are handy when it comes to fast, bulk and quality printing. But high prices and some health risks such as respiratory disorders due to the release of some harmful sub-micrometer particles are some of the disadvantages associated with laser printing.However, this kind of printer still remains the first choice for most of the organizations when it comes to printing. 2. Explain the importance of system software for a computer system. System Software is a set of programs that manage the resources of a compute system. System Software is a collection of system programs that perform a variety of functions. * File Editing * Resource Accounting * I/O Management * Storage, Memory Management access management. System Software can be broadly classified into three types as: System control programs: It Controls the execution of programs, anage the storage & processing resources of the computer & perform other management & monitoring function. The most important of these programs is the operating system. Other examples are database management systems (DBMS) & communication monitors. System support programs: It provide routine service functions to the other computer programs & computer users: E. g. Utilities, libraries, performance monitors & job accounting. System development programs assists in the creat ion of application programs. E. g. , language translators such as BASIC interpreter & application generators.Application Software: It performs specific tasks for the computer user. Application software is a program which program written for, or, by, a user to perform a particular job. Languages already available for microcomputers include Clout, Q & A and Savvy ret rival. The use of natural language touches on expert systems, computerized collections of the knowledge of many human experts in a given field, and artificial intelligence, independently smart computer systems – two topics that are receiving much attention and development and will continue to do so in the future. 1.Operating System Software Storage Manager Process Manager File – System Manager I/O Control System Communication Manager 2. Standard System Software Language Processor Loaders Software Tools 3. Application Software Sort/Merge Package Payroll/Accounting Package DBMS General-purpose application soft ware such as electronic spreadsheet has a wide variety of applications. Specific – purpose application s/w such as payroll & sales analysis is used for the application for which it is designed. Section D: Applied Theory (40 marks) 1. What is a computer virus? How does a typical virus works?When a computer system suffers from virus infection, how it is cured? Defenition: Computer virus is a small software programs that are designed by human to spread from one computer to another and to interfere with normal computer operations. Work of Typical virus: The A computer virus is most often defined as â€Å"a malicious code of computer programming†. What this means is that a computer virus is just another software, written with not so very noble intentions. A computer virus is designed to install, propagate and cause damage to computer files and data without the knowledge and/or express permission of the user.A computer virus can only survive, attack and propagate in computer memory. Computer memory is usually the RAM (and all different variations of it) and disk storage (hard, floppy and everything in between). Besides this you will not find computer viruses in your monitor, keyboard and certainly not in your own blood stream! The first step in any virus attack is always the invasion. This is when the virus actually enters the computer system from an outside source. Much of the effort in preventing a virus attack lies in understanding what these virus entry points are and how best to monitor and block out any possible intrusion.All viruses enter the computer system through two main entry points: the disk network adapter card is most likely your computer network and/or modem card connected to the local Intranet and/or the Internet. Virus enters through the network card most likely disguised in the form of attachments in e-mails. These attachments are often program files and office documents containing macros. Besides this, certain webpages that we visit on the Internet may also contain harmful programming codes that might transfer virus or virus-like codes into our system.To guard our systems against virus intrusion from these sources, many good anti-virus programs allows users to completely scan all files read form disk drives or downloaded from the Intranet/Internet. How do virus infections occur? The act of infection often begins with a harmless looking action such as opening a file (like a video game or a Word document) that one often gets in e-mail attachments or while accessing any disk in a disk drive. These actions inadvertently activate the virus lurking in these files and disks. The virus then installs itself into the computer’s memory. Computer system suffering from virus infection:After entering the computer memory, a virus often immediately sets out to multiply and spread duplicate copies of itself across the main data storage device (most often the hard disk drive). It does this by copying itself into as many files it can find on the disk drive. Later when users transfers or copies these files to their friends and colleagues, the virus gain entry into ever increasing number of systems. If the virus has found its way to this level of the user’s computer, the user runs a high risk of permanent damage to data and hardware. But such a level of infection only happens to two types of users.The first are those who do not employ any kind of anti-virus measures (or if they do, it obviously isn’t doing a good job). The second are those who do have good anti-virus programs installed and running but did not bother updating their software with the latest virus data files. As a result newer viruses can actually use the anti-virus programs to infect an even greater number of files. So we can see here that having good anti-virus software isn’t enough. One must constantly keep it updated (preferably on a monthly basis). If a virus were to just spread itself, users might not have much to worry about.But the worst is yet to come. Many viruses contain what is called a payload. This is the destructive sequence that is activated on a certain trigger. The trigger may be the arrival of a particular date or an action done by the user. The effect of the payload can be anything as benign as some harmless message appearing on screen to as frightening as the destruction of the disk drive’s boot record – making it completely unusable and in most cases completely irreparable. Indeed it is the later that causes permanent lose of data and hardware and which is responsible for the virus’ notorious reputation.If a virus is capable of unleashing its payload on the user’s system, this indicates a serious breach of security on part of the user. It’s time for the user to learn from the experience and never let computer virus have a second chance. How do I know if my computer has been infected? After you open and run an infected program or attachmen t on your computer, you might not realize that you've introduced a virus until you notice something isn't quite right. Here are a few indicators that your computer  might  be infected: * Your computer runs more slowly than normal * Your computer stops responding or freezes often Your computer crashes and restarts every few minutes * Your computer restarts on its own and then fails to run normally * Applications on your computer don't work correctly * Disks or disk drives are inaccessible * You can't print correctly * You see unusual error messages * You see distorted menus and dialog boxes How to Cure: Remove a virus manually: Sometimes a virus must be removed manually. This can become a technical process that you should only undertake if you have experience with the  Windows  registry and know how to view and delete system and program files in  Windows.First, identify the virus by name by running your antivirus program. If you don't have an antivirus program or if your pr ogram doesn't detect the virus, you might still be able to identify it by looking for clues about how it behaves. Write down the words in any messages it displays or, if you received the virus in email, write down the subject line or name of the file attached to the message. Then search an antivirus vendor's website for references to what you wrote down to try to find the name of the virus and instructions for how to remove it. Recovery and prevention:After the virus is removed, you might need to reinstall some software or restore lost information. Doing regular backups on your files can help you avoid data loss if your computer becomes infected again. If you haven't kept backups in the past, we recommend that you start now. 3. Write short notes on: (a) The OSI model (b) Internetworking tools (c) Distributed computing systems (a) The OSI model The Open System Interconnection, model defines a networking framework to implement protocols in seven layers. This article explains the 7 Lay ers of the OSI Model.The  OSI, or  Open  System  Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. a. Application Layer This layer supports  application  and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data  syntax  are identified.Everything at this layer is application-specific. This layer provides application services for  file transfers,  e-mail, and other  network  software  services. Telnet  and  FTP  are applications that exist entirely in the application level. Tiered application architectures are part of this layer. b. Presentation Layer This layer provides independence from differences in data representation (e. g. ,  encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept.This layer formats and encrypts data to be sent across a  network, providing freedom from compatibility problems. It is sometimes called the syntax layer. c. Session Layer This layer establishes, manages and terminates connections between  applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. d. Transport Layer This layer provides transparent transfer of data between end systems, or  hosts, and is responsible for end-to-end error recovery and  flow control.It ensures complete data transfer. e. Network Layer This layer provides  switching  and  routing  technologies, creating logical paths, known as  virtual circuits, for transmitting data from  node  to node. Routing and forwarding are functions of this layer, as well as  addressing,  internetworking, error handling, congestion  control and packet sequencing. f. Data Link Layer At this layer, data packets are  encoded  and decoded into bits. It furnishes  transmission protocol  knowledge and management and handles errors in the physical layer, flow control and frame synchronization.The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the  Logical Link Control  (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. g. Physical Layer 1 This layer conveys the bit stream – electrical impulse, light or radio signal through the  network  at the electrical and mechanical level. It provides the  hardware  means of sending and rece iving data on a carrier, including defining cables, cards and physical aspects. b) Internetworking tools The art and science of connecting individual  local-area networks (LANs)  to create  wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely complex because it generally involves connecting networks that use different  protocols. Internetworking is accomplished ith  routers,  bridges, and  gateways. Routers: It is a  device  that forwards data  packets  along  networks. A router is connected to at least two networks, commonly two  LANs  or  WANs  or a LAN and its  ISP  network. Routers are located at  gateways, the places where two or more networks connect.Routers use  headers  and forwarding tables to determine the best path for forwarding the packets, and they use  protocols  such as  ICMP  to communicate with each other and configure the best route between any two hosts. Bridges : It is a  device  that connects two  local-area networks (LANs), or two segments of the same LAN that use the same  protocol, such as  Ethernet  or  Token-Ring. Gateways: It is a  node  on a  network  that serves as an entrance to another network. In enterprises, the gateway is the computer that  routes  the traffic from a workstation  to the outside network that is serving the Web pages.In homes, the gateway is the  ISP  that connects the user to the internet. In enterprises, the gateway node often acts as a  proxy server  and a  firewall. The gateway is also associated with both a  router, which use  headers  and forwarding tables to determine where  packets  are sent, and a  switch, which provides the actual path for the packet in and out of the gateway. A computer system located on earth that switches data signals and voice signals between satellites and  terrestrial  networks. An earlier term for  router, though now obsol ete in this sense as  router  is commonly used. c) Distributed computing systems A distributed computer system consists of multiple software components that are on multiple computers, but run as a single system. The computers that are in a distributed system can be physically close together and connected by a local network, or they can be geographically distant and connected by a wide area network. A distributed system can consist of any number of possible configurations, such as mainframes, personal computers, workstations, minicomputers, and so on. The goal of distributed computing is to make such a network work as a single computer.Distributed systems offer many benefits over centralized systems, including the following: Scalability The system can easily be expanded by adding more machines as needed. Redundancy Several machines can provide the same services, so if one is unavailable, work does not stop. Additionally, because many smaller machines can be used, this redundancy does not need to be prohibitively expensive. Distributed computing systems can run on hardware that is provided by many vendors, and can use a variety of standards-based software components. Such systems are independent of the underlying software.They can run on various operating systems, and can use various communications protocols. Some hardware might use UNIX(R)  as the operating system, while other hardware might use Windows operating systems. For inter machine communications, this hardware can use SNA or TCP/IP on Ethernet or Token Ring. This system contains two local area networks (LANs) that are connected to each other. One LAN consists of UNIX workstations from several different manufacturers; the other LAN consists primarily of PCs that are running several different PC operating systems.One of the LANs is also connected to a mainframe by way of an SNA connection. The client/server model A common way of organizing software to run on distributed systems is to separate funct ions into two parts: clients and servers. A  client  is a program that uses services that other programs provide. The programs that provide the services are called  servers. The client makes a request for a service, and a server performs that service. Server functions often require some resource management, in which a server synchronizes and manages access to the resource, and responds to client requests with either data or status information.Client programs typically handle user interactions and often request data or initiate some data modification on behalf of a user. For example, a client can provide a form onto which a user (a person working at a data entry terminal, for example) can enter orders for a product. The client sends this order information to the server, which checks the product database and performs tasks that are needed for billing and shipping. Typically, multiple clients use a single server. For example, dozens or hundreds of clients can interact with a few servers that control database access.The client is isolated from the need to know anything about the actual resource manager. If you change the database that you are using, the server possibly needs to be modified, but the client does not need to be modified. Because usually fewer copies exist of the server than of the client, and because the servers are often in locations that are easier to update (for example, on central machines instead of on PCs that are running on users' desks), the update procedure is also simplified. Also, this approach provides additional security. Only the servers, not the clients, need access to the data that the resource manager controls.Clients can also access several different servers, and the servers themselves can act as clients to other servers. Exactly how the functions are distributed across servers is an application design decision. For example, a single server could provide all the services that a client needs, or the client could access multiple servers to perform different requests. The application designer must consider items such as scalability, location, and security. For example, are the clients and servers local or is the application distributed over a wide geographic area? Do the servers need to be on machines that are physically secure?Such design decisions are outside the scope of this introduction. Some servers are part of an application and are referred to as  application servers. Other servers are not part of a specific application. Instead, any application can use them. For example, the CICS Structured File Server (SFS) provides record-oriented file access for applications. Three-tiered client/server architecture A common design of client/server systems uses three tiers: 1. A client that interacts with the user 2. An application server that contains the business logic of the application 3. A resource manager that stores data.

Saturday, January 11, 2020

Eastern Foods Essay

Introduction Eastern Foods has a lot of restaurants and fast food outlets in some countries, and as for its expansion, the company is mapping out to build its outlets in the United Kingdom. Building work is planned to be finished by first of July, so directory boards have given the task to start up business development planning procedure from first of May. The board has also required that all major issues in terms of HRM, Accounting, Marketing, and Operations Management should be found and addressed accordingly. Part (A) In some core areas of the Eastern Foods, there is going to be discussion upon overview of the challenges in HRM, Accounting, Marketing, Operations Management, and after getting familiarized with these issues, solutions will be suggested as required. Human Resource Management First issue: HRM is going to face challenges in the sphere of recruitment as there is no employment contract signed. Absence of this documentation can wake legislative sanctions against the Eastern Foods. In addition to that, hired employees after taking their money beforehand will have an opportunity to leave the work in any time without employment contract. Second issue: obviously the company will be in tough moments at the starting stage as for deficiency skills in newly employed staff. Managers intensively seek to good employees but they do not easily find them as there are very few people with good skills and experience left unemployed in current job markets. Third issue: over exploitation of employees will drastically minimize job satisfaction degree of employees which also in turn, will make them very tired. This has always been considered as one of the major issues of any organizations. Accounting First issue: accounting machines and computers will not always operate as proper as intended. So, account department will be more worrying on this potential issue. Second issue: First and foremost problem for the Eastern Foods is undoubtedly keeping correct transactions. When every outlet depends on the main financial branch, it will not always be easy to cope with various and massive numbers of financial statements. For instance, gross sales of one outlet might be 20, 500 Euro, but other outlets may be presenting less than that amount such as 13, 874, or 12,743 Euro respectively. In this case accountants will probably make mistakes in writing them. This usually happens when accountants are not well-qualified or tired of fixed working hours. Marketing First issue: Marketing department will be facing several challenges in terms of promotions and building relationships with customers as marketing system will have to first see the outcomes and statistics of other restaurants’ trends and then decide to which target segment promote. Second issue: Provided that the Eastern Foods sets up strategies such as discounts, free drinks, and so on, it will be adversely affecting the income level, and will lead to the failure of strategic plan, thus demolishing profits gained. Second issue: External and internal designs of outlets can be unattractive to the customers. As well as ingredients and types of meals may not be liked very much. For example, clocks on the walls, color, posters, and such attractive items might not be suitable to preferences of the customers. Operations Management First issue: Operations managers will have been undergoing challenges with regard to controlling and relationship with staff at the outset. Second issue: Sudden technical problems and damages are inevitable which can put the organization in urgent case Third issue: As there is a considerable discrepancy between jobs and tasks as well as in qualifications of the whole working unit, there will appear some misunderstandings when jointly decision making activities are needed. Part (B) The two most problematic areas and their solutions First area: Human Resource Management Absence of employment contract will not only cause internal issues, but it will get down reputation of the Eastern Foods in the eyes of customers. For example, there are lots of news agencies that are ready to publish and show any such issues that occur in famous areas such as restaurants, and at the same time, governmental courts will be thinking of cessation of the Eastern Foods’ operation. Furthermore, it will be easy for employees to make frauds inside the outlets because they feel confident of slipping away in any time they wish if they have not been hired based on legal contract. Moreover, if there will be no procedural justice system in the organization such as not conveying information to the employees, then, definitely communication gap will appear. Unfortunately, job advertisements newspaper is not as effective as it was before, so the managers will have been experiencing difficulties in finding proper employees. Whoever feels over exploited, no matter, whatever is p rice or reward, they will start to show their disagreement to HRM departments. This can be explained when managers neglect to employees’ personal or health related issues, that time, they need some time but, they do not want to lose their jobs as well. Late working hours can be one of the crucial reasons for the job dissatisfaction. Solutions Solution to the first stated issue is quite simple, that is setting up legal employment contract, and other legislative documents. By doing so, the Eastern Foods will raise their satisfaction degree. In a rule, employees should feel that their rights will not be violated by the organization as well as they need to make sure if they can be one of the important parts of the organization. This means when they have power in decision making process and when they are allowed to put their candidate in leadership positions,  and when they actively take in part in elections held inside the organization. Likewise, journalists from mass media such as TV channels, and Radio can take interviews from employees about their jobs and other related themes which will increase employees’ interest toward their jobs, feeling important is great indeed. Solution to the second mentioned issues is not easy, or impossible to take into control all the time because nobody will confess their inner crimin al desire, therefore, Human Resource Management must fix security cameras in each area of operations so that it will be able to observe any deeds executed inside the organization. In addition to that it will help HRM managers to sort out efficient employees, and accordingly, those employees will be rewarded in a faith way. Moreover, when work units feel that they are under observation, then, they will not likely be spending their time out of their work place and offices, and will be doing their works respectively. The third issue can be addressed by not only publishing job advertisement on newspaper but, also, by building a good rapport with fresh graduates of universities, especially, who study in tourism faculties as they are taught well on how to communicate with customers. Also, it will be easier way to involve them in free job places as they are full of energy, and do not usually, require high level of wages, and compensation. They may not have practical skills, but they can br ing in a new atmosphere, and a new look inside the organization. Usually, customers do not like being waited, so, when the staff is younger, then, they will probably take and bring the orders faster. However, these graduates involvement should not include discrimination and unethical payment rate which can also lead to legal challenges. Second area: Marketing department Marketing department can be put into difficulties if it cannot renovate and execute its role as required. When marketing, especially, promotion strategies do not work; the Eastern Foods will not be visited by high number of customers. In this globally competitive world, all restaurant businesses are striving to offer their special promotions in various forms, for example, some of them offer cheaper prices for more order while others offer high quality and service. Accordingly, it will not be easy for the Eastern Foods to create special ways to draw customers’ attention. One mistakenly  launched promotional program can be costly for the organization that in turn, may lead to imprint not interesting view on potential customers’ minds. What is more, the organization may not be able to persuade the main finance department to budget some money for launching promotional programs. For instance, if some discounts offered at the outset will not prove it unless the intended amo unt of profits comes. As a result, damage cannot be covered, and marketing department will have to ask another amount to launch a second program, in this case, directors of the Eastern Foods will not be very happy, and can put pressure onto the marketing department. Design of the outlets might not be suitable to tradition, culture and religion of the country. If so, disagreements from the local people will ruin authority of the whole organization, no matter how well it is cooking, and how health and cheap prices are, simply one mistakenly chosen design, and pictures on the wall can decrease potential clients’ anticipation. More than that, differences on the course of meals and drinks may be absent, so, customers will probably be demanding new types and new tastes, and if their demand cannot be met as early as possible, then, they will likely prefer to change their regular restaurants. This issue might happen starting from the third month of operation when people start too fed up with unchangeable dishes. Solutions The first problem can be solved by using various types of promotions. For instance, the company can choose direct advertising in which the Eastern Foods will send messages and letters directly to the potential customers. However, direct advertisement is getting more unfavorable, so, the company can address another type that is â€Å"public relations† in which the owner of the company will talk about his incipient activities, and what he has experienced, in short, life story of the company. It will increase awareness of the customers about the company which means success. Moreover, taking in part in business conferences and events can help the organization to be known in the regions, and here the store managers must get valuable advices from marketing department on what kind of preparations should they do beforehand they participate in business events. As for mass media, the Eastern Foods should hold some charity, and celebration events, and should invite radio and the TV corre spondents. Additionally, famous actors,  actress, and singers should be invited once in a week to each outlet, as we know, youngsters are keen to meet with their favorites, so they will automatically become regular clients of the Eastern Foods if they are given such kind of chance. Also, famous show programs should also be invited to lead their programs in one of the outlets once in a month. Another noticeable target area is football fans, if facilities such as television sets, special cozy cabins, and discounts are provided in every football match of the region, and then the company will undoubtedly succeed with only this market segmentation. Part (C) In general, the Eastern Foods’ primary focus should be pointed to the marketing areas and HRM because once the staffs employed are well qualified, have satisfactory skills, and do their jobs very well, then, the company will not have to be concerned on this issue in the future. Likewise, if marketing can find out how to attract customers, and deal with design, taste issue, then, customers’ number will be relatively high. Accounting personnel should not neglect to any tiny number and details in the calculation process, and all operations managers should be responsible for providing needed help, advice, and supply always on time. Moreover, technical advancements such as security cameras can lessen the number of crimes and frauds inside the company. Conclusion It can be concluded that HRM and Marketing are the two key issue areas, and the other areas such as accounting should be interminably checked, and operations managers should evaluate, observe, and control all works accordingly. Legal aspects have been discussed as well, and the roles of mass media in the success of the Eastern Foods have been found to be significantly important. References: 1. Lynch, Frances (1984) ‘Resolving the Paradox of the Monnet Plan: National and International Planning in French Reconstruction’ Economic History Review xxxvii(2): 229-43. Lynch, Frances (1997) 2. Mackinnon, Danny, Andrew Cumbers and Keith Chapman (2002) ‘Learning, Innovation and Regional Development: A Critical Appraisal of Recent Debates’ Progress in Human Geography 26: 293-311. 3. Global Internet Statistics (by Language) (2004), http://www.glreach.com/globstats/index.php3