Monday, March 16, 2020

Development of a Web Based Recruitment Process System for the Human Resource of an Organization Essays

Development of a Web Based Recruitment Process System for the Human Resource of an Organization Essays Development of a Web Based Recruitment Process System for the Human Resource of an Organization Paper Development of a Web Based Recruitment Process System for the Human Resource of an Organization Paper DEVELOPMENT OF A WEB BASED RECRUITMENT PROCESS SYSTEM FOR THE HUMAN RESOURCE OF AN ORGANIZATION CASE STUDY:UGANDA VIRUS RESEARCH INSTITUTE SUBMITED BY: NAMBALE JOHN BOSCO REG NO: 2007-03-IT-042 LECTURER: MR OTHIENO JOSEPH 1. 1. Introduction For an organization to run successfully and efficiently its very important that it has efficient workers and to use its resources very well especially human resources. So one of the important goals of an organization is to recruit right people for the right job. So there should be a proper recruiting process management system so that all the activities and selection procedure can be carried out effectively without losing its transparency. A web based recruitment system will be of great help in carrying out recruitment operations and with this very objective in mind this web based recruitment system will be made. In this web based recruitment system it will manage all such activities (like storing applicants data, scheduling interviews, retrieval of recorded data and easy application) and that will save time, manpower and the biggest advantage of being it web based. This web based system will provide better prospective for the enhancement of organization regarding to quality and transparency. 1. 2. Background of the case study The Uganda Virus Research Institute (UVRI), located in Entebbe, Uganda, was established in 1936 as the Yellow Fever Research Institute by the Rockefeller Foundation. In 1950, after gaining regional recognition it was renamed the East African Virus Research Institute (EAVRI). After the collapse of the East African Community in 1977, it became a Uganda government public health research institution and was renamed the Uganda Virus Research Institute. The government of Uganda now administers and funds the institute through the Uganda National Health Research Organization (UNHRO) which is an umbrella research body with in the Uganda Ministry of Health. The mission of the institute is to carry out scientific research concerning communicable diseases, especially viral diseases of public health importance and to advise the government on strategies for control and prevention. The institute also plays a large role in coordinating and administering virology related clinical trials within the county. Most recently the institute has been involved in human HIV vaccine clinical trials. The HIV/AIDS Reference and Quality Assurance Laboratory (HRL), which is part of the institute plays an important role in making public policy recommendations to the Uganda National Drug Authority on the access and usage of new drugs and medicaltechnologies. 1. 3. Problem Statement The current recruitment processes are primarily manual and paper based. These processes are labor intensive, costly and unfriendly from the applicant and managerial point of view. It is worth notifying that with the increasing number of applicants at the institute and with this current recruitment processes which are primarily manual and paper based are no longer efficient. It is the intention to replace these with a system that will allow direct job applications on-line and improve this situation. 1. 4. Objectives of the study This project is aimed at developing a web-based (on-line)recruitment system for Uganda Virus Research Institute which will store data, schedule interviews, allow easy retrieval of data and finally also allow easy application. However there are other specific objectives and these will include; To investigate the current system being used. To design a web based recruitment process system. To implement a web based recruitment process system. To test the web based recruitment process system. 2. Activities and Deliverables The following table describes the activities and deliverables comprising of the system development life cycle which involves planning stage, analysis stage, design stage, implementation stage and maintenance stage StagesActivitiesDeliverables PlanningDefine business problem and scope Produce detailed project schedule Confirm project feasibility Presentation of reasons why system should or should not be developed by the organizationInitiate Ensure feasibility Plan schedule AnalysisGather information to learn problem domain Determine system requirements Generate alternative designs Compare alternatives Recommend best alternativeRequirements specification Entity Relationship Diagram Performance expectations Description of work flows and manuals DesignDefine system architecture Produce logical and physical database design Design document Data Element Dictionary ImplementationVerify and test Convert data Train users and document the system Install the system Testing User training Installation of new system. MaintenanceMaintain system Enhance system Support usersSmall patches,repairs and updates Enhancements to expand system capabilities 2. 1. Project schedule A project schedule for the development of a web based recruitment process system for the human resource of an organization showing an activity and its estimated time period. ActivityEstimated Time Planning4 weeks Analysis5 weeks Design7 weeks Implementation9 weeks Overall project25 weeks 2. 2. Gantt chart MONTHSEPTEMBEROCTTOBERNOVEMBERDECEMBERJANUARYFEBRUARY WEEKS1234512341234123412341234 ACTIVITIES PLANNING ANALYSIS DESIGN IMPLEMENTATION OVERALL PROJECT 3. METHODOLOGY This will include various methods of collecting data. It comprises of two parts thats the research methodology which includes primary sources and development methodology which includes the design tools. 3. 1. Research methodology This will involve various methods that will be used to collect data and these include primary sources and secondary sources. . 1. 1. Primary sources 3. 1. 2. Observation During the research, I will see exactly what happens at the institute and also interact with the staff members of human resource department at the institute. During that period I will be able to observe and analyze the conditions of the work at the institute. 3. 1. 3. Oral interviews There will be free interaction with the staff members of human resource department and I will ask them some questions pertaining to the topic under study. The interviews will be aimed at getting an understanding the current situation. . 1. 4. Questionnaires The use of pre-printed questionnaires will be of great use since confidentiality will have to be maintained especially among the human resource department. It will comprise of both open ended and closed questions, questionnaires which will be distributed to each member of the human resource department. From this procedure, I will be able to get their views about the recruitment process. They will be requested to give their views on how to solve the problems at hand. 3. 1. 5. Secondary sources 3. 1. 6. Library research I will also have a review of the secondary data to gather information about the research problems mostly in the required area of the study. For this method various texts on databases and database management system will be of great help during the research; these will include a number of textbooks, journals, articles and the world wide web, that is ; internet which will be also my secondary source of information. 3. 2. Development methodology This will involve various design tools that will be used to collect data. 3. 2. 1. Design tools For this project , I will use PHP and MySQL as the prime design tools because of the following reasons below; 3. 2. 2 PHP Hypertext Preprocessor (PHP) is an HTML embedded programming language which executes scripts on a server and allows web designers to create dynamic content that interacts with databases. It supports the use of database servers such as MySQL, Informix and Solid. 3. 2. 3. Advantages of PHP It is fast and easy because its embedded in HTML code, the response time is short and PHP contains many special features and functions needed to create dynamic web pages. Its cross platform. It runs on a variety of operating systems for example Windows, Linux. It accesses everything. Has a built in set of functions that make getting whatever you need very easy. It is constantly being improved. A variety of developers look to improve the product almost daily. It is free. You can get support from different people. That is technical support is widely available. A large base of users provides free support through e-mail discussions list. 3. 2. 4. MySQL MySQL is a relational database management system (RDBMS) that interacts with Sructured Query Language(SQL), a tool for editing, accessing and processing data within a database. . 2. 5. Advantages of MySQL Fast Stable Easy to learn Runs on popular OS (Windows, Linux, Mac OS X etc) Applications can be created in great variety of programming languages such as C, C++ ,Java etc Extensively documented on the internet and there many books on the subject available. Available for many applications free of charge (GPL License) Cheaper M ySQL is a relational database system Other tools to be used will include drawing tools such as gimp, adobe photo, computer aided software engineering tools, html, text editors such as notepad Table of contents Page Introduction.. 1 Background of the case study.. 1-2 Problem statement 2 Objectives of the study 2 Activities and deliverables 3-4 Project schedule. 4 Methodology. 5-7

Saturday, February 29, 2020

Barbauld

# 8217 ; s Prophecy And Blake # 8217 ; s Imagination Essay, Research Paper Barbauld # 8217 ; s Prophecy and Blake # 8217 ; s Imagination The Romantic Era was a clip of widespread cultural, societal, and political reform. Industrialization was taking the topographic point of the agricultural life style, which introduced jobs such as higher poorness, a larger segregation of category, and overworking of both grownups and kids. The wars in America and France paved the manner for political turbulence by presenting new ways of thought and groups who wanted alteration. With all of this convulsion and pandemonium many authors turned to escape, which involved both imaginativeness, and prognostication. Imagination and prognostication are simply two ways the authors of this clip thought, hence, being deemed the Romantic Era. Anna Laetitia Barbauld # 8217 ; s # 8220 ; Eighteen Hundred and Eleven # 8221 ; displayed a great trade of prognostication while William Blake # 8217 ; s usage of imaginativeness and opposing antonyms is clearly apparent in # 8220 ; The Marriage of Heaven and Hell. # 8221 ; The component of prognostication was common in the verse forms and prose of the Romantic period. Prophecy didn # 8217 ; t needfully intend that the events were really traveling to go on. When meeting the word # 8220 ; prophecy or prophetic # 8221 ; we tend to believe about those visionaries as Moses and Nostradamus, but their usage of prognostication was different. Writers such as Anna Barbauld wrote in conformity with what was traveling on at that clip ( American and Gallic Revolutions ) . It wasn # 8217 ; t as though she was stating that the death of Britain was traveling to go on, but that it could if things didn # 8217 ; t alteration. # 8220 ; ? The revelatory vision of England in decay? # 8221 ; ( Damrosch, 29 ) , that is how Barbauld # 8217 ; s # 8220 ; Eighteen Hundred and Eleven # 8221 ; is described. Although the bulk of this piece is synonymous with the above quotation mark, there are a few cases when Barbauld indicates that no affair what happens, England will bo om and will neer be left in the shadows. Thine are the Torahs environing the provinces revere, Thine the full crop of the mental twelvemonth, Thine the bright stars in Glory # 8217 ; s flip that radiance, And humanistic disciplines that make it life to populate are thine. If westbound streams the visible radiation that leaves thy shores, Still from thy lamp the cyclosis glow pours, Wide spreads thy race from Ganges to the pole, O # 8217 ; er half the Western universe thy speech patterns roll # 8230 ; Barbauld conveys that even though England is losing her appreciation on America, # 8220 ; ? If westbound streams the visible radiation that leaves thy shores? , # 8221 ; She will still predominate and stand strong, # 8220 ; ? Still from thy lamp the cyclosis glow pours. # 8221 ; Barbauld # 8217 ; s manner of composing seems to saccharify surface the message she is directing by her usage of rime and beat ; yet, it is apparent that this verse form is prophetic. Her prognostication, nevertheless, is filled with contradictions. # 8220 ; ? That clip may rupture the Garland from her brow/ And Europe sit in dust, as Asia now. # 8221 ; ( Barbauld, 38 ) insinuates that one twenty-four hours, America will thrive as England had, and that Europe will be left in the dark as Asia is. Ultimately I believe that the prognostication of Britain # 8217 ; s death is her purpose, as by the terminal of the verse form she writes, # 8220 ; But fairest flowers expand but to disintegrate? thy glorific ations pass off? # 8221 ; The imaginativeness was a utile and necessary tool for the authors and poets of the Romantic Era. There was frequently debate about utilizing 1s imaginativeness instead than confronting what was true and existent. Poets found imaginativeness peculiarly of import and instead than specifying what it was, their definitions would explicate what it wasn’t. â€Å" ? Thus, imaginativeness vs. world ; imaginativeness vs. ground ; vs. scientific discipline ; vs. the apprehension ; vs. mere ‘fancy’ ; even vs. spiritual truth.† ( Damrosch, 4 ) In other words, the imaginativeness had nil to make with the material universe. William Blake’s â€Å"The Marriage of Heaven and Hell† is a merchandise of the dark side of imaginativeness and faith. He taps into the dark side of his readers’ heads by stating the narrative of the autumn of adult male from the Devil’s position ( the evil side of the narrative ) . It’s far more exciting to read something that society may see to be morally â€Å"bad† than to read a narrative through the eyes of the good cat. Damrosch wrote, â€Å"Blake nowadayss Satans who are a batch more merriment than his angels.† We are so used to reading the Bible and related narratives from the position of God and Heaven that Blake’s position, while being loaded with sarcasm, still shocks us. He seems to be dallying with the heads of his readers by narrating it from a more negative point of position ; it’s about as if he knew that â€Å"The Marriage between Heaven and Hell† could be controversial. He besides uses the binary device, which is opposites working against each other, such as Love and Hate, Good and Evil, and Passive and Active. Ultimately they all tie in, love peers good and inactive piece hatred is tantamount to evil and active. The â€Å"Proverbs of Hell, † while obviously satirical, catches the reader’s oculus, and even though it is the â€Å"evil† point of position there are many Proverbss that are humourous. The Proverbs, entirely, must hold taken a great trade of imaginativeness to contrive. â€Å"The rat, the mouse, the fox, the rebate ; watch t he roots/ the king of beasts the tyger, the Equus caballus, the elephant, watch/ the fruits.† That is such an inane line, I truly have no thought what to believe of it, and I believe that might be his point. There are besides many Proverbss that are serious and â€Å"good.† â€Å"Improvent makes strait roads, but the crooked roads/ without Improvement. are roads of Genius.† This merely means that frequently times the consecutive and narrow isn’t ever the smartest way to take. It besides implies that the true mastermind may lie within the head of the individual who is bizarre, the non-conformist. Blake was a non-conformist in his authorship and today is a portion of the canon. He refers to his lighted verse forms as â€Å"The Bible of Hell.† In Plate 4 he claims that imaginativeness is the lone life. I think that is stated in the first reverse, # 8220 ; Man has no Body distinct from his Soul/ for that calld Body is a part of Soul discernd/ by the five Senses, the main recesss of Soul in this age. # 8221 ; ( Blake, 128 ) Of class, the full Plate exemplifies it better, but I understood it more when reading the first reverse. The Romantic Era produced a great many authors and poets. Escape was besides a merchandise, which included the usage of imaginativeness and prognostication. Through the convulsion of what was taking topographic point in world, the authors of this clip such as Blake and Barbauld, saw the importance in the strength of the head and subjective authorship. Blake # 8217 ; s usage of imaginativeness in # 8220 ; The Marriage of Heaven and Hell # 8221 ; was both of import and exciting. Barbauld # 8217 ; s prophetic # 8220 ; Eighteen Hundred and Eleven # 8221 ; was insightful and enabled us to see the pandemonium of that clip. Damrosch, David, erectile dysfunction. The Longman Anthology of British Literature. New York: Longman, 1999.

Wednesday, February 12, 2020

Understanding conflict management in the workplace Essay

Understanding conflict management in the workplace - Essay Example Understanding conflict management in the workplace Causes of conflicts at work Conflicts in the work places arise from various factors. First are the personality clashes. Based on the fact that each of the employees has his or her own personality, their ideas may differ thus resulting to a crash. Secondly is the dominance issue. During their daily duties, employees are engaged with their managers while in a meeting or other social activities. In the process some employees tend to be authoritative to their colleagues while actually they are not in a management level as a result other employees feel discriminated resulting to a conflict. One of the issues that caused a conflict at Peytons General Supplies, my place of work was the failure to communicate openly and honestly. One of our sales executive took a client who belonged to another sales representative without communicating it and started selling our brands to him. After the two learnt they are dealing with the same client a conflict emerged that called for the intervention of th e director. Another cause of conflict in my organization is stressful situations. Based on our busy schedule, I have noticed that some of my colleagues have been engaged in conflicts and when we intervene in our efforts to solve the issue, we realize that they are mostly stressed. Climate of mistrust and competition among the employees is another cause of conflicts in both at small and large firms.... Within an organization, it is vital for individual to identify the basis stages of conflict in order to handle it effectively. Conflicts happen in eight stages. The first one is the situation where there is no conflict. During this stage, employees are working normally. Secondly is the latent conflict. This implies that there is small but hidden conflict among the individuals or teams. The third stage is the emergence. During this stage, the actual conflicts occur. However, only the subjects involved in the conflicts are aware of it. During escalation which is the fourth stage, the conflicts grow and it is possible for any one around to see that there is a conflict between the parties. The fifth stage is the stalemate. During this stage, each of the parties involved blames the other and becomes hard for anyone to settle the conflict. Stalemate may stay for a long time thus individuals intervening to solve the conflict must use effective tactics to bring together the parties involved in the conflict. The sixth stage is the De-escalation. This means that the conflicts starts to decrease and the parties involved can now meet and try to settle their differences. The seventh stage is settlement or resolution. This entails coming up with the solution to the cause of the conflict. The last stage is peace building and reconciliation. After the conflict, it is fundamental that the parties engage in regular meetings and discuss issue that affects them as a way of creating peace. Effects of conflict on individual and team performance at work Conflict is one of the key issues that can cause reduction in the productivity of the employees as well as the profitability of a firm. At the

Saturday, February 1, 2020

A review of Risk Assessment Methodologies Essay

A review of Risk Assessment Methodologies - Essay Example Furthermore, a risk-management process will help you prioritize these issues should you lack the resources necessary to address them all immediately. 1. Establish the risk assessment team. The team is formed to collect, analyze and report the assessments to the management. It is important that all aspects of the activity work flow be represented on the team, including human resources, administrative processes, automated systems, and physical security. The reason is to plan things before hand so that it becomes easy to go by. The team members on the other hand will have to attend and participate in the meetings, they will have to take the responsibility of achieving goals and objectives. The team members will also have to work hard for effective teamwork and communications, share responsibility for all team decisions and share knowledge and expertise with the team. The team members would themselves have to provide leadership where appropriate and last but not the least, will have to participate in training sessions where required. 2. Set the scope of the project. ... should identify at the outset the objective of the assessment project, department, or functional area to be assessed, the responsibilities of the members of the team, the personnel to be interviewed, the standards to be used, documentation to be reviewed, and operations to be observed. When the scope of a project is discussed, the output is in terms of time and cost. Scope is important because experience team members would know how changes in scope cause an issue. As the things proceed scopes do change, as the team members are not aware of the actual outcomes of things. 3. Identify assets covered by the assessment. Assets may include, but are not limited to, personnel, hardware, software, data (including classification of sensitivity and criticality), facilities, and current controls that safeguard those assets. It is key to identify all assets associated with the assessment project determined in the scope. 4. Categorize potential losses. Identify the losses that could result from any type of damage to an asset. Losses may result from physical damage, denial of service, modification, unauthorized access, or disclosure. Losses may be intangible, such as the loss of the organizations' credibility. It is only after knowing these losses can the team think of threats that may occur. More than one individual gathers the potential loss or anything concerning this. Everyone can give his or her own comments. The more different possibilities are taken out, the more prepared a team becomes incase of an event. 5. Identify threats and vulnerabilities. A threat is an event, process, activity, or action that exploits a vulnerability to attack an asset. Include natural threats, accidental threats, human accidental threats, and human malicious threats. These could include power

Thursday, January 23, 2020

COLD MOUNTAIN Essays -- Essays Papers

COLD MOUNTAIN Since Cold Mountain does not heavily rely on dialogue to tell the story, the point of view Frazier uses to narrate the story is important: He must create the effect of being enveloped in two separate worlds, and give insight into characters who have no one to discuss their thoughts with. The only way to accomplish this is by using the omniscient point of view, which is when the author has unlimited knowledge about the characters and their thoughts. A romantic story is especially suited for this type of narration, because romances revolve not around events, but emotions, which are difficult to describe objectively. To fully appreciate the depth of the love between Ada and Inman, the reader must be able to peer into the deepest thoughts of the characters. Isolation, however, prevents Ada and Inman from revealing these thoughts to each other or to another character. We instead must learn from introspections like the one on pg. 393, when Inman reflects, â€Å"†¦he intended to eat nothing until he found Ada. If she would not have him he would go on to the heights and see if the portals on Shining Rocks would open to him†¦He doubted there was a man in the world more empty than he at the moment.† Intimate insights such as this one are frequent in the novel, and reveal the most information about Ada and Inman’s feelings for each other. This unlimited power to inform is used also to directly characterize Inman and especially Ada; due to the relative calm of her ...

Wednesday, January 15, 2020

Computer Memory Hacking Essay

Hacking of memory or hacking of RAM describes when a person or person(s) gains unauthorized access to the RAM (random access memory) of a computer system. There a couple of reasons that one might participate in hacking the memory of a computer system. One reason that a person may attempt to gain unauthorized access to a computer is simply to demonstrate   that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining unauthorized access) has shown that the security of the computer system can be penetrated. This is often useful when the owner of the computer system wants to ensure its security is optimal. Another reason a person or person(s) would want to access a computer systems RAM without the owners permission would be to gain information from that computer system. That information may or may not include personal data such as names, addresses, telephone numbers, email addresses, credit card information, account numbers, and other pertinent information that thieves could use to gain financially. Hackers use many tools and techniques to penetrate the security of the computer system that they choose to attack. Some techniques can include dns spoofing, packet sniffers, social engineering, and trojan horses. DNS spoofing occurs when the hacker changes the DNS entry on a server and redirects the browser to an alternate site. This method is often used to steal usernames, passwords, or other personal information. Packet sniffers were originally designed for administrators to debug their systems. They are devices that intercept and interpret packets of information crossing a network. Social engineering is the method of obtaining personal information and network information through deception or manipulation. For example, pretending to be an employee who forgot their username/password. Trojan horse programs are often referred to as the â€Å"back door† to computer systems.

Tuesday, January 7, 2020

Analysis Of Jamaica Kincaid s The Autobiography Of My...

Prompt #3: Discuss how the motif of garments in Jamaica Kincaid’s The Autobiography of My Mother supports Xuela’s self-discovery through boundary crossing. From the point of view of Xuela Claudette Desvarieux, Jamaica Kincaid presents a powerful account of how race, gender, class, and the power of the individual intermingle and clash in colonial society. This paper will examine the role of garments in the novel and how they contribute to Xuela’s view of society. Although I can easily expand the motif of garments to include all means of self-expression, such as styling hair et cetera, this paper will be a focused analysis of only material-clothing garments. This will lead to a more in-depth analysis of the motif. Throughout her life,†¦show more content†¦These observations show that Alfred’s uniform becomes his identity, but he really doesn’t realize his new dual identity: the way he perceives himself and the way others perceive him. Alfred believes that he is a man full of virtue, while society views him as â€Å"properly cruel and unkind to people who did not deserve it.† (200). While the uni form morphs Alfred’s personal identity, society still perceives him the same as before. Alfred believes that his uniform brings virtue, but â€Å"†¦when people saw him wearing it coming toward them, made them afraid†¦Ã¢â‚¬  (25). The virtue that Alfred believes the uniform brings does not fool society. Society sees Alfred as having been â€Å"properly cruel and unkind to people who did not deserve it.† (200). In addition to Alfred’s police uniform bringing him artificial social power, his uniform also changes Alfred’s view of himself. This is important to Xuela because it alienates her from her father. Even early in Xuela’s life, on page 25, Xuela wishes that Alfred would not wear his uniform. A second example of a morphing of identity comes up in Madame LaBatte giving Xuela her dress the first time. The dress still fits Madam, or Lise, but Lise gives it to Xuela to â€Å"†¦make a gift of me [Xuela] to her [Lise’s] h usband†¦Ã¢â‚¬  (68). Lise is trying to make Xuela into herself by giving her the dress. Later, Lise gives Xuela another dress, which fits Xuela perfectly, but