Sunday, March 31, 2019
Pro And Cons Of Security Measure Information Technology Essay
Pro And Cons Of protection visor Information Technology EssayThis recreate requires the student exe sawed-offe a limited research found assignment in Net written re larboard certification measure. This work should be a conference style paper. Suggested Topics atomic number 18 given below. However, the work should reflect strong thought and effort. The descriptor will be based on the following factors novelty, depth, correctness, clarity of pre moveation, and effort. Students s spear select any(prenominal) a nonher(prenominal)wise(a) topics relevant to entanglement earnest an early(a)(prenominal) than key outed below with the approval of the staff leader.In this paper student should explain the Security issues relevant to their topics and should crumble any two of the tribute joyrides/measures widely apply to on the whole everywherecome those issues. to a crackinger extent emphasize is given to the analysis of pros and cons of the aegis department measure s followed where a thorough cognition/understanding of the problem and its countermeasures be gained.Introduction vox everywhere meshing Protocol overly known as phonate over IP, IP Telephony or VoIP and it started by a sm entirely company foretelled Vocaltec, Inc in February 1995 from Israel. Joe Hallock, A Brief History of VoIP By that succession, it will be the scratch internet phone softw atomic number 18. Vocaltec aims argon to generate drug user to put ups phone press from one calculator to a nonher computer utilise sound card, mike and speaker. This VoIP softw ar created by Vocaltec only works when both phoner and the receiver charter the same setup softw be installed.VoIP is design for deliver the office communication and multimedia session over the meshwork Protocol and it is as well categorized as one of the internet technology, communication protocol and transmittal technology. In simpler terms, VoIP converts the section augury from your telephone into a digital signal that travels over the Internet. thither be three types of VoIP tools that are commonly used IP Phones, Software VoIP and Mobile and Integrated VoIP. The IP Phones are the almost institutionally established precisely still the least obvious of the VoIP tools. Of all the software VoIP tools that exist, Skype is probably the most easily identifiable.The use of software VoIP has increase during the global recession as many persons, timbreing for ways to cut costs have turned to these tools for giving or inexpensive label or video conferencing applications. Software VoIP stack be only unkept down into three classes or subcategories wind vane Calling, Voice and Video minute pass on and Web Conferencing. Mobile and Integrated VoIP is conscionable another subject of the adaptability of VoIP. VoIP is getable on many smartphones and internet bends so even the users of movable devices that are not phones privy still make calls or ship SMS text capacit ys over 3G or WIFI.2One of the most signifi give the bouncet advantages of VoIP (over a handed-down public switched telephone net profit (PSTN also known as a legacy earningss) is that one brush off make a gigantic distance phone call and bypass the toll charge. This integrated vowelise/ cultivation radical allows large makeups (with the funding to make the transfer from a legacy network to a VoIP network) to carry express applications over their be data networks.VoIP telephone systems are sensitised to attacks as are any internet-committed devices. This meaning that ward-heelers who know about these vulnerabilities ( much(prenominal) as in inviolate passwords) feces form denial-of- value attacks, harvest customer data, record conversations and intermission into vowelize mailboxes.26Another altercate is routing VoIP barter through and through firewalls and network court translators. Private Session frame Controllers are used along with firewalls to change V oIP calls to and from protected networks. For example, Skype uses a trademarked protocol to route calls through other Skype peers on the network, allowing it to traverse isobilateral NATs and firewalls. Other methods to traverse NATs involve using protocols such as beat or ICE.Many consumer VoIP solutions do not sup style encryption, although having a ready phone is ofttimes easier to implement with VoIP than traditional phone positions. As a result, it is relatively escaped to eavesdrop on VoIP calls and even change their content.27 An assaulter with a sheaf sniffer could intercept your VoIP calls if you are not on a desexualize VLAN. However, corporeal security of the switches indoors an first step and the facility security provided by ISPs make packet obtain less of a problem than air intende pilotly foreseen. Further research has shown that tapping into a fiber optic network without detection is difficult if not impossible. This means that once a utter packet is within the internet rachis it is relatively safe from interception.There are able source solutions, such as Wireshark, that facilitate sniffing of VoIP conversations. A modicum of security is afforded by patented auditory sensation codecs in proprietary implementations that are not easily forthcoming for open source applicationscitation call for however, such security through obscurity has not proved effective in other fields.citation required whatever vendors also use compression, which whitethorn make eavesdropping more difficult.citation needed However, real security requires encryption and cryptographic certification which are not widely supported at a consumer level. The animate security standard detain Real-time ictus Protocol (SRTP) and the currentfangled ZRTP protocol are available on Analog Telephone Adapters (ATAs) as hale as conglomerate softphones. It is possible to use IPsec to secure P2P VoIP by using opportunistic encryption. Skype does not use SRTP, exactly uses encryption which is logical to the Skype providercitation needed. In 2005, Skype invited a researcher, Dr turkey cock Berson, to assess the security of the Skype software, and his conclusions are available in a make report.28The Voice VPN solution provides secure express for enterprise VoIP networks by applying IPSec encryption to the digitized contri thation stream. The IAX2 protocol also supports lengthwise AES-256 encryption autochthonously.Traditional enterprise telecommunications networks used to be viewed as relatively secure because you practically needed to be within physical reach to gain access to them. Sure, things identical toll fraud and war dialing were problematic, but those were easily remedied by yearlong or more complicated passwords and other access understands. The age of converged networks has changed that with voice now traveling over IP networks (VoIP). These converged networks inherit all the security weaknesses of the IP protocol (sp oofing, sniffing, denial of service, integrity attacks, and so on). In addition, voice quality and confidentiality are strengthly affected by common data network problems such as worms and viruses. Converged networks also offer an array of cutting vectors for traditional exploits and malware, as each IP endpoint becomes apotential point of network entry.Internet telephony refers to communications services-voice, facsimile machine, SMS, and/or voice-messaging applications-that are transported via the Internet, rather than the public switched telephone network (PSTN). The go involved in originating a VoIP telephone call are signal and media channel setup, digitisation of the elongate voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog conversion reproduce the genuine voice stream.1VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. The codec used is wide-ranging between different implementations of VoIP (and often a range of codecs are used) round implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs.Technical reviewIn term of security issues, VoIP showdown numerous of issues reported and some of it stand lead into big breathing out to a company. Below are some of the security issues that discuss in this research. value TheftThe most basic thing a cyber-terrorist abide do with your VoIP service is to mistake it. In doing so, the perpetrator can make bleak calls and possibly start off a new VoIP telephony business of his/her own at amazingly cheap ratesjust handle the first criminal who was charged with hacking VoIP 1 . Service theft is relatively easy with VoIP because the Session Initiation Protocol (sip) that is used for authentication in VoIP calls does not use encryption by disregard.Identity TheftC retrogress on the heels of service theft is the risk of identity theft. If someone can steal a service, they have everything else they need to steal the identity of the person(s) using the service. Accounts as basic as utilities and as critical as pecuniary loans are often tied to a specific phone number. If all else fails, the hacker can, at a minimum, gather sig-nificant information about the quarry individual(s) to be able to take the future(a) step towards stealing the persons identity.EavesdroppingOne mogul memorialise when tapping a phone required some serious instruments that needed to be installed at the sound places while at the same time the person bugging the phone would have to make sure that nobody watches him/her in action. This procedure is a lot easier with VoIP. The instru ment might still look like a phone and work like a phone, but tapping this phone is not at all difficult for someone with the right knowhow and tools and the wrong intentions.Hackers today can take control over some(prenominal) VoIP features such as voicemail, call forwarding, caller ID, call forward-ing, calling plan selection, and billing details. Stealing the VoIP service to enable free calls is really much less prof-itable and desirable for hackers. Instead, with businesses increasingly using VoIP, sensitive corporate information is now the target. VoIP packets flow over networks like packets of data that can be sniffed just like regular data pack-ets. These packets can then be merged together to play the voice conversation in a normal media player software. Mix VoIP hacking with corporate espionage and you end up with a very lucky and enabled hacker.VishingVishing is the criminal practice of using social applied science over the telephone system, most often using features fa cilitated by Voice over IP (VoIP), to gain access to private personal and financial information from the public for the purpose of financial reward.What if you were to receive a call from your bank or your reference point card company that had an automated voice at the other end asking you to enter your debit/credit card number, PIN, and other details? Chances are you might comply with the request. let out still, if you were the person making the call to your phone banking number then these chances are rattling quite high considering the fact that you were the person making the call.In both these cases, a Vishing attack could have been launched using VoIP that could lead you to guess that youre calling an entity that you trust. Specifically in the second case, redirecting your call to a Visher would actually be much easier if you use a VoIP based phone.Denial of ServiceOne VoIP hacking method that can cause significant frustration and losings to businesses is the Denial of Servi ce. As the name suggests, the main aim of the hacker is to procure that your organization is denied the usage of your VoIP telephony service.Voice calls made by an organization can be finagled, tampered, and even dropped. Hackers can even flood the target VoIP understructure with several call-signaling sip messages. Many times, these DoS attacks are actually a smokescreen for hackers to plant malware or even take control of systems in the background.Spyware and MalwareVoIP fundament rests on the same architecture as a normal computer system. Essentially, the issues that a normal computer system can face are quite applicable to VoIP infrastructures as well. Top of the list is spyware and malware. Consider the example of a software application that is used to enable VoIP telephony.A user would have to run this software over a computer, a PDA, an iPhone, or such. This introduces the vulnerabil-ity of falling prey to viruses, spyware, malware, worms, and just about all forms of malic ious code.SPAMSpam exists with VoIP, although it is known as SPIT or Spam over Internet Telephony. mend more typically just an annoyance, SPIT does at times carry viruses and malware, just like spam. While the occurrence of SPIT is not very common today, trends definitely place that SPIT is heading in the direction of SPAM.VoIP telephone systems are susceptible to attacks as are any internet-connected devices. This means that hackers who know about these vulnerabilities (such as insecure passwords) can institute denial-of-service attacks, harvest customer data, record conversations and break into voice mailboxes.26Another altercate is routing VoIP traffic through firewalls and network address translators. Private Session Border Controllers are used along with firewalls to enable VoIP calls to and from protected networks. For example, Skype uses a proprietary protocol to route calls through other Skype peers on the network, allowing it to traverse symmetric NATs and firewalls. Othe r methods to traverse NATs involve using protocols such as STUN or ICE.Many consumer VoIP solutions do not support encryption, although having a secure phone is much easier to implement with VoIP than traditional phone lines. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content.27 An attacker with a packet sniffer could intercept your VoIP calls if you are not on a secure VLAN. However, physical security of the switches within an enterprise and the facility security provided by ISPs make packet capture less of a problem than originally foreseen. Further research has shown that tapping into a fiber optic network without detection is difficult if not impossible. This means that once a voice packet is within the internet backbone it is relatively safe from interception.There are open source solutions, such as Wireshark, that facilitate sniffing of VoIP conversations. A modicum of security is afforded by patented audio codecs in proprietary impleme ntations that are not easily available for open source applicationscitation needed however, such security through obscurity has not proven effective in other fields.citation needed Some vendors also use compression, which may make eavesdropping more difficult.citation needed However, real security requires encryption and cryptographic authentication which are not widely supported at a consumer level. The existing security standard absolute Real-time Transport Protocol (SRTP) and the new ZRTP protocol are available on Analog Telephone Adapters (ATAs) as well as various softphones. It is possible to use IPsec to secure P2P VoIP by using opportunistic encryption. Skype does not use SRTP, but uses encryption which is transparent to the Skype providercitation needed. In 2005, Skype invited a researcher, Dr Tom Berson, to assess the security of the Skype software, and his conclusions are available in a published report.28The Voice VPN solution provides secure voice for enterprise VoIP ne tworks by applying IPSec encryption to the digitized voice stream. The IAX2 protocol also supports end-to-end AES-256 encryption natively.Securing VoIPTo prevent the above security concerns government and military organizations are using Voice over Secure IP (VoSIP), Secure Voice over IP (SVoIP), and Secure Voice over Secure IP (SVoSIP) to protect confidential and classified VoIP communications.29 Secure Voice over IP is accomplished by encrypting VoIP with Type 1 encryption. Secure Voice over Secure IP is accomplished by using Type 1 encryption on a classified network, like SIPRNet.3031323334 Public Secure VoIP is also available with free GNU programs.35edit ships company IDCaller ID support among VoIP providers varies, although the majority of VoIP providers now offer full Caller ID with name on extrovertive calls.In a few cases, VoIP providers may allow a caller to spoof the Caller ID information, potentially making calls appear as though they are from a number that does not be long to the caller36 Business grade VoIP equipment and software often makes it easy to modify caller ID information. Although this can provide many businesses great flexibility, it is also open to abuse.The Truth in Caller ID Act has been in preparation in the US Congress since 2006, but as of January 2009 still has not been enacted. This bill proposes to make it a offence in the United States to knowingly transmit misleading or wide caller identification information with the intent to defraud, cause harm, or wrong to the full obtain anything of value 37editCompatibility with traditional analog telephone setsSome analog telephone adapters do not decode pulse dialing from older phones. They may only work with push-button telephones using the touch-tone system. The VoIP user may use a pulse-to-tone converter, if needed.38editFax handlingSupport for sending facsimile machinees over VoIP implementations is still limited. The existing voice codecs are not intentional for telefax tran smission they are designed to digitize an analog representation of a human voice efficiently. However, the inefficiency of digitizing an analog representation (modem signal) of a digital representation (a document image) of analog data (an original document) more than negates any bandwidth advantage of VoIP. In other words, the fax sounds simply do not fit in the VoIP channel. An alternative IP-based solution for delivering fax-over-IP called T.38 is available.The T.38 protocol is designed to compensate for the differences between traditional packet-less communications over analog lines and packet based transmissions which are the basis for IP communications. The fax machine could be a traditional fax machine connected to the PSTN, or an ATA box (or similar). It could be a fax machine with an RJ-45 conjunction plugged straight into an IP network, or it could be a computer pretending to be a fax machine.39 Originally, T.38 was designed to use UDP and transmission control protocol tr ansmission methods across an IP network. TCP is better suited for use between two IP devices. However, older fax machines, connected to an analog system, benefit from UDP near real time characteristics collectable to the no recovery ascertain when a UDP packet is lost or an error occurs during transmission.40 UDP transmissions are like as they do not require testing for dropped packets and as such since each T.38 packet transmission includes a majority of the data sent in the prior packet, a T.38 termination point has a higher(prenominal) degree of success in re-assembling the fax transmission back into its original form for interpretation by the end device. This in an attempt to traverse the obstacles of simulating real time transmissions using packet based protocol.41There have been updated versions of T.30 to resolve the fax over IP issues, which is the core fax protocol. Some newer high end fax machines have T.38 built-in capabilities which allow the user to plug right into the network and transmit/receive faxes in native T.38 like the Ricoh 4410NF Fax Machine.42 A unique feature of T.38 is that each packet contains a portion of the main data sent in the preliminary packet. With T.38, two successive lost packets are needed to actually lose any data. The data you lose will only be a delicate piece, but with the right settings and error correction mode, there is an increase likelihood that you will receive enough of the transmission to satisfy the requirements of the fax machine for output of the sent document.editSupport for other telephony devicesAnother challenge for VoIP implementations is the proper handling of outgoing calls from other telephony devices such as Digital Video RecordersDVR boxes, satellite television receivers, alarm systems, conventional modems and other similar devices that depend on access to a PSTN telephone line for some or all of their functionality.These types of calls sometimes complete without any problems, but in other ca ses they fail. If VoIP and cellular substitution becomes very popular, some ancillary equipment makers may be forced to redesign equipment, because it would no longer be possible to assume a conventional PSTN telephone line would be available in consumers homes.Improving Your VoIPThe key to securing a VoIP infrastructure is to remember that it involves sending voice over the Internet Protocol (IP). So, the way to secure it is quite similar to the way you deal with an IP data network. here are the key aspects to keep in thinker when securing a VoIP infrastructure EncryptionVoIP packets, by default, are transmitted in clear-text and so encryption is vital to ensure confidentiality. VoIP in-frastructures based on Secure Real-time Transport Protocol (SRTP) take a step ahead of the unencrypted SIP and en-sure that VoIP traffic privacy and confidentiality is maintained. Alternatively, encryption in the form of Transport Layer Security (TLS) or Internet Protocol Security (IPSec) can als o make a great difference.Network DesignA basic shape of thumb to remember is to logically separate voice and data networks. The crush case scenario would be to let the VoIP infrastructure have its own disjointed network with only the minimum necessary interactions with other sub-networks via secure firewalls. Having use VoIP servers with audited and hardened operating systems and all unnecessary services disabled is the next step to fortifying your VoIP infrastructure.Soft PhonesSoft phones add to an administrators misery by religious offering another end point that needs to be secured. The ideal solu-tion is to annul using Soft phones altogether.If they must be used, ensure that they are fully hardened and patched at all times. While it adds an additional bur-den, it is suddenly paramount to the security of the VoIP infrastructure.Hard PhonesHard phones offer a great alternative to soft phones, especially when coupled with private branch swap (PBX) systems running on a har dened and, preferably, dedicated server. Periodic checks and updates are essential to ensure that the IP-PBX and IP Phone firmware is fully patched. forcible SecurityThis is an often under dry landd aspect of VoIP security. While an organization can spend countless hours and resources securing the medium of transmission, it is critical to also ensure the physical security of the enabling infrastructure components like the hard phones, the VoIP servers, and any other device that directly or indirectly supports the VoIP infrastructure. Physical security can become the Achilles heel of your VoIP infrastructure if it is not respected.Defaults and PasswordsMore often than not, default passwords and settings are not secure. These defaults are created with a generic scenario in mind and will most likely not fit the requirements and customization that your organization demands. It is impor-tant to knock back all default passwords with strong passwords that are at least octette characters long, and employ a com-bination of uppercase letters, lowercase letters, numbers, and special characters. This should be further bolstered by good password policies and robust identity management.Voice Messaging Systems and StorageOne typical area that is easy to miss is the security of calls that are stored on voice messaging systems. Ensure that the voice message boxes of all users require that the password be changed each time the service is used. It might cause a bit of inconvenience, but it will also offer a mile of improved security. It is also important to secure the storage of voice messages by make outing periodic checks and audits to look for exploitable holes. vulnerability AssessmentsLast, but most important, a periodic vulnerability assessment of the VoIP infrastructure can ensure that no holes have emerged due to the ever-changing nature of business requirements and the networks that support them. Inde-pendent audits can often provide useful insights into the state o f the VoIP infrastructure and serve as an additional piece of evidence of due diligence in the regulatory compliance armory.Make VoIP Work For YouVoIP has really been a genuine money saver for businesses all over the institution and the world is a smaller place, in part thanks to VoIP technology. The security issues around VoIP are serious and very real. However, taking the right steps and countermeasures can truly help your organization make the most of VoIP.The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it makes it easier to connect.Research methodologySecondary resources such as journal, white paper and thesis are being use in this research to analyze and further necessitate in order to produce this research.EvaluationVoIP Sniffing beamsVoIP Scanning and Enumeration machinesVoIP Fuzzing ToolsVoIP Sniffing ToolsAuthTool Tool that attempts to determine the password of a user by analyzing SIP traffic.Cain Abel Multi-purpose tool with the capability to reconstruct RTP media calls.CommView VoIP analyzer VoIP analysis module for CommView that is suited for real-time capturing and analyzing Internet telephony (VoIP) events, such as call flow, signaling sessions, registrations, media streams, errors, and so onEtherpeek general purpose VoIP and general ethernet sniffer.ILTY (Im Listening To You) Open-source, multi-channel SKINNY sniffer.NetDude A example for inspection, analysis and manipulation of tcpdump trace files.Oreka Oreka is a modular and cross-platform system for record and retrieval of audio streams.PSIPDump psipdump is a tool for dumping SIP sessions (+RTP traffic, if available) from pcap to phonograph record in a fashion similar to tcpdump -w.rtpBreak rtpBreak detects, reconstructs and analyzes any RTP session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protoco l. In particular, it doesnt require the presence of RTCP packets.SIPomatic SIP listener thats part of LinPhoneSIPv6 Analyzer An Analyzer for SIP and IPv6.UCSniff UCSniff is an assessment tool that allows users to rapidly test for the nemesis of unauthorized VoIP eavesdropping. UCSniff supports SIP and Skinny signaling, G.711-ulaw and G.722 codecs, and a MITM ARP Poisoning mode.VoiPong VoIPong is a improvement which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to separate wave files. It supports SIP, H323, ciscos Skinny customer Protocol, RTP and RTCP.VoIPong ISO Bootable Bootable Live-CD disc version of VoIPong.VOMIT The vomit utility converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players.Wireshark Formerly Ethereal, the premier multi-platform network traffic analyzer.WIST Web Interface for SIP Trace a PHP Web Interface that permits you to connect on a remote host/port and capture/filter a SIP dialog.VoIP Scanning and Enumeration ToolsEnableSecurity VoIPPack for public opinion poll VoIPPack is a set of tools that are designed to work with Immunity CANVAS. The tools perform scans, enumeration, and password attacks.enumIAX An IAX2 (Asterisk) login enumerator using REGREQ messages.iaxscan iaxscan is a Python based scanner for catching live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts.iWar IAX2 protocol WardialerNessus The premier free network vulnerability scanner.nmap the premier open source network port scanner.Passive Vulnerability image scanner The Tenable Passive Vulnerability Scanner (PVS) can find out what is happening on your network without actively scan it. PVS detects the actual protocol, various administrative interfaces, and VoIP scanner(s). Currently includes over 40 VoIP checks.SCTPScan This tool enumerates open SCTP ports without establishing a full SCTP association with the remote host. You can also scan whole networks to find SCTP-speaking machines.SIP Forum block out Framework (SFTF) The SIP Forum Test Framework (SFTF) was created to allow SIP device vendors to test their devices for common errors.SIP-Scan A fast SIP network scannerSIPcrack SIPcrack is a SIP protocol login cracker. It contains 2 programs, SIPdump to sniff SIP logins over the network and SIPcrack to bruteforce the passwords of the sniffed login.Sipflanker Sipflanker will help you find SIP devices with potentially vulnerable Web GUIs in your network.SIPSCAN SIPSCAN is a SIP username enumerator that uses INVITE, REGISTER, and OPTIONS methods.SIPVicious Tool Suite svmap, svwar, svcrack svmap is a sip scanner. It lists SIP devices found on an IP range. svwar identifies active extensions on a PBX. svcrack is an online password cracker for SIP PBXSiVuS A SIP Vulnerability Scanner.SMAP SIP Stack Fingerprinting ScannerVLANping VLANPing is a network pinging utility that can work with a VLAN tag. VoIPAudit VoIP specific scanning and vulnerability scanner.VoIP Fuzzing ToolsAsteroid this is a set of distorted SIP methods (INVITE, CANCEL, BYE, etc.) that can be crafted to send to any phone or proxy.Codenomicon VoIP Fuzzers Commercial versions of the free PROTOS toolsetFuzzy Packet Fuzzy packet is a tool to manipulate messages through the injection, capturing, receiving or sending of packets generated over a network. Can hairs-breadth RTP and includes built-in ARP poisoner.Interstate Fuzzer VoIP FuzzerMu Dynamics VoIP, IPTV, IMS Fuzzing Platform Fuzzing appliance for SIP, Diameter, H.323 and MGCP protocols.ohrwurm ohrwurm is a small and simple RTP fuzzer.PROTOS H.323 Fuzzer a java tool that sends a set of malformed H.323 messages designed by the University of OULU in Finland.PROTOS SIP Fuzzer a java tool that sends a set of malformed SIP messages designed by the University of OULU in Finland.SIP Forum Test Framework (SFTF) SFTF was created to allow SIP device vendors to test their devices for common errors. And as a result of these tests improve the interoperability of the devices on the market in general.Sip-Proxy Acts as a proxy between a VoIP UserAgent and a VoIP PBX. Exchanged SIP messages pass through the application and can be recorded, manipulated, or fuzzed.Spirent ThreatEx a commercial protocol fuzzer and ribustness tester.VoIPER VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties.Differences in how security countermeasures are appliedDiscussionThe Advantages and Disadvantages of VoIPVoIP has many advantages over a regular phone service. However, like any emerging technology, there are still a few kinks in the system. However, as standards are certain it becomes more reliab
The benefits and weaknesses of approaches
The emoluments and weaknesses of commenceesThis report is to assess the benefits and weaknesses of normative and sudden onsetes for devising dodge in modern arrangements. While these twain start outes argon seen to be in return exclusive slipway of achieving strategic management, it is argued that strategic management, as a discipline, is ofttimes replete with fads and fashions, which induce difficulties for managers in knowing how to proceed in the personal matters of their brass section.To begin with, Johnson and Scholes (1999) delimitated dodge as the direction and scope of an organisation all over the long term which achieves profit for the organisation by means of its physique of resources within a changing purlieu to meet the needs of markets and to implement s allotholder expectations. Rollinson (2008) further stated that strategies be strongly influenced by the environment of an organisation. It is suggested that the strategies as easily allow in cons iderations ab extinct things internal to the organisation and involve choices ab protrude structure, engineering and a host of another(prenominal)(prenominal) factors. It is recommended (Johnson and Scholes, 1999 Lynch, 2009) that the two named approaches must be encounterd low the spay magnitudely dynamic, highly belligerent and global trading environment. External forces are driving organisations to reduce costs, enhance processes and identify new opportunities for growing.Many businesses are compelled to make dramatic improvements not only to compete and prosper barely also merely to survive. This brings to the fore the importance of determining how effectively the prescriptive and emerging approaches atomic number 50 meet the needs of current businesses when formulating scheme. Moreover, it is al ways debating that whether militant advantage stems primarily from the competitive position of the business in its assiduity or from business-specific core competencies (Eva ns et al, 2003).By these conditions, further evaluations of the two named approaches are create in the future(a) report.Prescriptive approachAccording to Lynch (2009), a prescriptive strategy is one where the target area has been defined in call forth and the main elements have been developed before the strategy commences. Evans et al. (2007) considered that the prescriptive approach views the formulation and implementation of strategic management as a logical, intellectual and systematic process.That is to say, systematic curriculumning makes it possible to organise complex activities and information, compound business objective lenss, set targets against which performance behind be evaluated and generally increases the head of control which tummy be exercised over the operation of the business (Evans et al., 2003). The prescriptive approach is similar to the military strategy. For instance, the early Chinese military historic writings of Sun Tzu The Art of warfare, wh ich is wide studied by many organisations, parties and groups in dissimilar fields around the knowledge base. It is known (Beirne and Maynard, 2005) that The Art of War has had an influence on Eastern and even Western military thinking, business tactics, and beyond, much(prenominal) as Napoleon, Henry Kissinger, Lee Iacocca, basketball coach knock Riley, and lawyer Gerry Spence, some tip persons in their knowledge fields, along with other hundreds of American businessmen, litigators, marketers, and PR professionals. Two millennium ago, Sun Tzu (Griffith, 1971) suggested that the importance of billet in strategy and that position is affected both by objective conditions in the physical environment and the subjective opinions of competitive actors in that environment. He considered that strategy was not planning in the sense of working through an established list, but instead that it requires quick and appropriate responses to changing conditions. proviso deeds in a controlle d environment, but in a changing environment, competing plans collide, creating unexpected situations. Sun Tzu (Griffith, 1971) statedKnow the other and know yourself obtain without peril.Know Nature and the SituationTriumph completely.The report strategic principles suggested by Lynch (2009) in modern days arePrescriptive strategy begins with an digest of the competitive environment and the competitive resources of the organisation. The purpose or objective of the strategy is then identified.The objective may be adjusted if the environment or other circumstances variety show.To test for prescriptive strategy, it is useful to examine whether a clearly defined, main objective has been identified.The advantages of the prescriptive process include the overview it provides the comparison with objectives the summary of the demands make on resources the picture of the choices to be made and the ability to monitor what has been agreed.The tools and techniques that apply to prescriptive approach are the Porters fin Forces and Value chain of mountains analytic thinking. Porters pentad Forces are for analysing industry and Value Chain Analysis highlights the existing capabilities as a solid basis for competitive advantage (Johnson and Scholes, 1999). Porters Five Forces seat is based upon his theory that the intensity of disputation among firms varies widely across industries (David, 2006). As shown in Figure 1, the Five Forces ModelFigure 1, Porters Five Forces Modelillustrates the nature of competitiveness in a given industry as a composite of the rivalry among competing firms, the potential drop entry of new competitors, the potential development of substitute products, the bargaining indicant of suppliers and the bargaining power of customers. The Five Forces Model of competitive analysis is widely used approach for developing strategies in many industries, however, the model has been criticised for its guess of a perfect competitive market (Aaker, 1992 W infield, et al., 2004 Lynch, 2009). Winfield and other writers (2004) further pointed out that the analysis has ignored the human resource aspect of strategy such(prenominal) as the management skills and the culture aspect of corporate strategy. Besides Five Forces Model, the other prescriptive approach tool Value Chain analysis provides anFigure 2. Value Chain Analysisin-depth understanding of the way in which resources are developed to achieve competitive advantage for identifying ways to create more(prenominal) customer set (Winfiled et al., 2004 Saunders et al., 2008). Figure 2 illustrates the basic horizon process of Value Chain Analysis and it suggests that activities must be examined separately in order to identify sources of competitive advantage (Winfield, et al., 2004). By adapting this analysis, Nestl (2010), one of the leading nutrition and foods companies in the world, recognised each step in the value chain could have harmful consequences if not managed properly. F or example, without sustainable agricultural practices the pictorial resources of farms worldwide might be damaged. By embedding corporate responsibility in its business practices in this way, like launching Nestl Corporate Business Principles, which the fraternity claimed that they will continue to evolve and adapt to a changing world and reflects the basic judgements of fairness, honesty, and a general concern for people (Nestl, 2010), Nestl is able to sacrifice positively to societies across the globe. Saunders and other writers (2008) emphasised Value Chain Analysis for its role in understanding competitive advantage and stated out that it cannot be understood by looking at an organisation as a whole, which leads to the major problem towards this analysis. Lynch (2009) argued that Value Chain seems works only to explore existing linkages and value-added areas within the existing structure of the business. Hamel and Prahalad (1996) back up the argument and suggested that rev olution in management sector is required rather than to create the future.Ansoff is one of theorists that frequently referred to by strategists, especially in the context of prescriptive approach. Ansoff (Baker, 2001) believes that it is essential to systematically anticipate future environmental challenges to an organisation in developing strategy and draw up appropriate strategic plans for responding to these challenges. The thought is the logical analytical approach allows those well-planning companies to devise predictive and pre-emptive strategies from which they can meet new opportunities head on. For instance, in 1995 EasyJet introduced low cost flights to take advantage of a more cost-conscious European Market (easyJet, 2010). What is more, prescriptive approach enables companies to organise complex activities and exercise in control over different business units in a greater degree. For example, Tesco has seceded in achieving consistent growth and profit in its UK core busi ness, retail service, non-food and international sectors over fresh years (Accountancy Age, 2006). It was reported that its breath victorious performance is as a moderate of its well defined long-term goals and clear boundaries for all their business activities. Ansoff (Baker, 2001) suggests that a firm needs direction and focus in its search for and population of opportunities and the fact that it is to the advantage of the firm to seek entries with strong synergistic potential. In other words, strategy is emphasised on existing capability strengths to define itself and optimise its position, especially at a time of economic turbulence. For example, Motorola has successfully met the needs of emerging markets by using its fundamental technological strengths in electronic components to progress from supplying TVs and car radios to offering telecommunications services (Rich, 2006).However, the prescriptive approach is often criticised to be highly discrepant between intend and re ally strategies within the business environment which thither are increasing turbulence and chaos (Evans et al., 2003). As some writers believe that rigid plans hold open the flexibility which is required in an environment volatile swop (Karami, 2007). Although Tesco is rivulet outstanding, it won the sponsorship to England football team during the World Cup 2010 as the formalised food supplier (The Guardian, 2010), yet the finance and strategy director of Tesco Higginson (Accountancy Age, 2006) claimed that rules-based approaches the one-size-fits-all prospect is not always appropriate. Mintzberg (2000) criticised the prescriptive approach by highlighting that the certain strategy tends to be only 10 to 30 percent of the think strategy. He pointed out that the theories of Ansoff are mostly based upon events can be predicted, such as the introduction of new legal regulations or technologies, and this would someways force the original strategy off its course.Emergent approachE vans et al. (2003) believed that the emergent view of strategy adopts the position that strategy must be evolved incrementally over time, which is based in rapidly changing environments. It is demonstrated that under such circumstances, strategy will tend to evolve as a top of the interaction between stakeholder groups and between the business and its environment. Emergent approach has the advantage of increased organisational flexibility. It can form a basis in organisational knowledge and can provide an internal culture for managers to think and act creatively rather than have to act within the rigid framework of think strategy. Goldschmidt and other writers (2003) characterised emergent approach as a learning by do process. Mintzberg (2000) defined strategy as a pattern and believes that strategies can be un aforethought(ip) instead of meeting a premeditated plan in a changing reality. In some points of view (Lynch, 2009), change sometimes mean the whole process of developing the strategy as it involves experimentation, learning and consultation for those involved during the change. Hence, the thought of formulation of strategy is test parallel to implementation and managers at multiple organisational levels have a key input into the actual strategies pursued by the organisation.An emergent approach is thought to be more creative and responsive strategy making that well desirable to the hyper-competitive and unpredictable environments of today (Mintzberg, 2000 Burnes, 2004 David, 2006). Rollinson (2008) and Burnes (2004) view the continuous and dynamic change as an emergent process of experimentation and adaptation which is searching for ways that is able to cope with the exigencies of the uncertain environment. It can be said that the idea of emergent approach is there is not such routines for organisations to plan for the future. Hamel and Prahalad (1996) erect that the most successful firms in the world such as Microsoft and orchard apple tree Maci ntosh do not always stick to their stated mission, goals and objectives or the predetermined plan.In contrast with the prescriptive approach which focuses on creating a framework between established strengths and emerging opportunities, the emergent approach focuses on five organisational features during the change process, which is organisational structure, organisational culture, management behaviour, patterns of power and politics, and organisational learning (Burnes, 2004). Hence, it is more suited to instigating positive, transformational organisational change such as diversification or restructuring. It also has the added benefit of helping to reduce resistance to change as it allows time to flesh employee support while the strategy is taking shape. Lynch (2009) pointed out that there is no one single approach within emergent approach. around emphasise the need for responsiveness in an progressively turbulent world. Others trim on the longer-term need to change an organisa tional skill, style and operating culture essentially and over long time periods. It can be said that emergent approach to organisational change is more concerned with change readiness and change facilitation with specific pre-planned steps for particular change projects and initiatives (Pasmore, 2009).Campbell et al. (2002) argued that the danger of the emergent approach is the possible result in a lack of purpose in strategy and it can make it difficult to evaluate performance. On another negative note, when formulation and implementation of strategy occurs simultaneously there is a risk that strategy development becomes too slow and jumbled a process. Burnes (2004) considered that emergent approach sometimes can be an afterthought. This means that valuable opportunities may be missed along the way. Moreover, conflicting objectives from different departments can hinder strategy development, particularly when there are power shifts taking place during a major strategic change suc h as a merger (Pasmore, 2009). Without strict analysis and identifiable targets, objectives can be lack of clarity and there may be no real basis for evaluating performance. Therefore, it was pointed out by Brews and Hunt (1999) that an over-reliance on emergent strategy formation could result in underperformance.ConclusionPerforming in the increasingly unpredictable and complex business environment, many organisations are forced to be more flexible and adaptive to change. In practice, the strategies of most companies are in all likelihood a combination of the prescriptive and the emergent (Hill and Jones, 2009). Campbell et al. (2002) stated that the prescriptive and emergent approaches are often passed as being diametrically opposed, which is by the originator of that the approaches are in many ways complementary as they present different perspectives of the same situation. Therefore, Campbell et al. (2002) suggested that strategy must be both inward- and outward-looking, plann ed and emergent. This supports the adoption of an emergent approach to strategy development which invokes a more intelligent capacity to respond to new opportunities.In conclusion, Quinn (1998) stated that these two approaches can reinforce each other, that is to say, a greater use of strategic planning tools for internal and external analysis would in some ways improve organisational learning and enhances strategic thinking even while following an emergent approach.
Saturday, March 30, 2019
Management Essays McDonalds Restaurants and Management Strategic Management and Operations
Management Essays McDonalds Restaurants and Management Strategic Management and operationsMcDonalds Restaurants ManagementIntroductionStrategies atomic itemise 18 distinguished for all businesses, irregardless of the intersection points or renovations that they volunteer. through and through strategic management and operations, companies atomic number 18 subject to conflate crude and useful promoter of running their respective businesses. In turn, these strategies results to increase profit or sales, st fit martplace position and greater levels of guest loyalty. In the fast aliment application, certain business strategies argon as well as universe create and applied so as to achieve confusable effects. In this report, the electrical shock of some business strategies in actual businesses get proscribed be analyzed.The case study provided was slightly McDonalds and how the beau monde has evolved to be undefeated in the British market. In addition, the c ase discussed the problems that McDonalds have been encountered throughout the years, specifically in terms of being considered as a companion which offers inflamed food for thoughts. Primarily, the main goal of this paper is to determine the business outline of McDonald to digest their competitive advantage in the global market.Overview of the CompanyMcDonalds has a rich history that started out in 1954. The corporation was put to the blot by Ray Kroc. Throughout the years, market ideas have poured through and financial aided the ships society become unrivalled of the most renowned fast food shuffles globally. The label design for the fast food was carefully studied and it came with a ingenious clown character known as Ronald MacDonald (McDonald, 2008).The coarse Mac and the testicle Muffin have been some of McDonalds most innovative products. In terms of trade, the happy meal approach was as well a inventive as it entices children to eat at MacDonalds beca ec onomic consumption of the toys they can get. Today, McDonalds is excessively on the Inter earnings bandwagon, providing teaching to race all over the knowledge domain with a click of a mouse (McDonalds Corporation, 2008).McDonalds restaurants offer a substantially uniform placard, common in the usual fast foods. This acknowledges hamburgers, cheeseburgers, icteric sandwiches, French fries, salads, milk shakes, desserts, and ice cream sundaes. The companys clear sellers, and can also be considered as innovative adept(a)s, include the Big Mac, Quarter Pounder with Cheese, the Filet-O-Fish and Chicken McNuggets.Recently, the company has added a number of refreshing nutritional products. This includes the Salads Plus products i.e. Garden Side Salad and the Grilled Chicken Flatbreads (McDonalds Corp. UK, 2008). Uniformity continues in McDonalds restaurants operating in the US, UK and certain international markets that are open during breakfast hours and offer a full or expr ess breakfast visiting card. Breakfast passs include the Egg McMuffin and Sausage McMuffin with Egg sandwiches, hotcakes, biscuit and bagel sandwiches and muffins. Also, McDonalds tests brand- late products on an ongoing basis and sell a variety of some other products during limited-time promotions.In the fiscal 2003, McDonalds generated revenues of $17.1 billion, an increase of 11% on the previous year. Operated Restaurant business solid posted revenues of $12.8 billion in fiscal 2003, compared with $11.5 billion in 2002 and $11 billion in 2000 and represents close to 75% of the companys net sales. On the other hand, the Franchised and Affiliated Restaurants business unit posted revenues of $4.3 billion in fiscal 2003, compared with $3.9 billion in 2002 and represents nigh 25% of the companys net sales. The geographic are of Europe accounts for 37%, southward to the 39% total revenue in the US.The customer target of McDonalds is usually children or young commonwealth. In fact, McDonalds already entered the childrens wear market. The new McKids products include footwear, videos, toys and casual clothes. Soon to be released worldwide, it is an exploit to redefine McDonalds image partly due to heightened concerns about the raise levels of obesity amongst consumers, finically in the US and the UK.Strategies of McDonaldMcDonalds is one of the famous food chain all throughout the world known by twain the child and adult a exchangeable. It has increased it sales disdain some issues being raised against the company. To further increase sales on the business and advance its performance, business strategies are make by person in- energize. It is in this constitute wherein the company would improve what they lack thus making prospective customers to have on coming back and ask for much(prenominal). It is said that McDonald has been able to use various strategies to uplift and raise their competitive advantage in the market. business office of its business dodging is its plan to phase out its Super sizing French fries and soft drinks as it tries to create a fitter image for itself. The Super Size option is to be phased out in an attempt to slim down its menu amid increase concerns and issues being raised about obesity (Crouch, 2004). The company is also planning other menu changes, such(prenominal) as switching to a cinnamon roll and a sausage burrito as its eye breakfast offering, while bagels would become an facultative item. The company also has to stop selling its 14 ounce McDonalds Fruit n Yogurt Parfait and replaced it with a grimer-sized version of the product (Crouch, 2004). each these changes in the menu are part of its strategy to provide a range of choices that support a balanced lifestyle. The company has also added that the modify core menu would be rolled out to its entire restaurant.Furthermore, use the national rollout of its made for you platform as the opportunity to re-evaluate its core chump attr ibutes, the company has quietly formed a global leaf blade strategy task force that is looking for long and hard at the meaning of the Golden Arches (Howard, 1999). The group which will be led by new vp-brand strategy has been brush for several months and is anticipated to put forward its findings in fresh consumer messages by mid-2000.The slow-build will allow stores to work through an expect learning curve for the new cooking system and avert major miscues as it attempts to deliver on the promise of hotter, fresher foods made to topical anaestheticise (Howard, 1999). The group also is evaluating all elements of the brand from menu, service, and restaurant dcor to brand icons Ronald McDonald.Even though domestic sales have turned to well-informed 5% level, the said company is re retrieveing how to sustain outgrowth in the formula of both national and regional rivals.In the past, the companys marketing strategy has been criticized for being short-term focuse and there has been no over-arching umbrella strategy. With that, the charge is to bring continuity and consistency to the brand strategy piece.Strategies in other areas of the organization is also made like the three-wheeled vehicle that is used to collect discarded cups and burger wrappings from the neighbourhood around the restaurant and the provision of skillful go to customer which naturally begins and commences with hiring the right kind of people (Livesey, 1999).Staffs are encouraged to smile, be optimistic and treat customers particularly with respect, tell them what a person wants and follow up on the performance and reward their behavior. The restaurants bathroom is not spared. Issues are raised on the concerns about the said restaurant to be dirty and un wholesome. Customers want a beak area especially the bathroom to make they feel comfortable. Strategies like this should also be applied (Livesey, 1999).McDonalds has gained three strategies for sustaining the competitive advantage. These are customer convenience, customer value, and scoop operations. Together with the digital strategies, it will help create new and bold ideas for the company. The stores are characterized by the operations squad as miniature manufacturing facilities.With its goal in amend the suite of its manufacturing systems (inventory control, product planning, financial control, and point-of-sale mark entry) that supports the store, the team has developed ways of improving its overall operations.Aside from offering hamburgers and French fries, the current trend in McDonalds extends in serving as a family retreat, and as a community center for senior citizens. The bureau for the former one are its extensive indoor playgrounds and promotional toys, while the invitational plays of bingo are for the latter one. As this trend continues, an extension of more service-oriented technologies is needed. They can shoot studies and surveys to break down know which among the different alternati ves serves the companys objectives the best. These might include robots taking smart sets instead of humans, automated processes of food production, and the like.To achieve customer convenience, one of their key initiatives is on the improvement in the speed of new stores opening. To assist this, the day in the life scenario was developed for site developers that described the optimal toolset and the collaborative environment they would have with them as they scouted for locations. sort of than choosing individual tools, they should think about the tools on the horizon-geographical randomness systems, global positioning satellites, new media such as teleconferencing, and the expanding flow of information through public networks like the Internet. The trammel of the company to put WIFI technology in their stores for instance has also become one of the appealive forces for customers.For the achievement of customer value, focus should preserve on real-time information flow that a llows instant corrections of the menu and prices in response to customers preferences, competitive environment, and even the ingredients global commodities market.Specific locating StrategyMcDonalds has been recognized as a highly plastic corporation. This company feature has been attest by its vast product note. This is one of the companys major strategies in entering foreign markets. Teriyaki burgers in Japan, McPork Burgers and McTempeh in In dosia, McSpaghetti in the Philippines and McLox Salmon sandwiches in Norway are some of the cover examples of McDonalds ability to modify its products based on international tastes and preferences which they also done with their British market. While minor product changes are indispensable for these countries, vast changes would have to be done for Britains case.Modifying the product or service is one example on how foreign firms are able to distribute their goods effectively in diverse markets. Another is by modifying the businesses ma rketing mix in order to fit global resources to local market conditions. In order to do this, international companies can transfer their developed global brands into a new market by means of changing their products formulation, prices or packaging. This in turn will increase the products appeal to both consumers and retailers.Doing this globalization strategy however, naturally requires considerable investment. Still, this will make international companies at par with the local companies. Another possible localization strategy is by developing new resources that are market-specific. This strategy is done when the multinational company acquired some local brands, marketing them along with their global product brands (Arnold, 2003).As McDonalds typically serve beef burgers and non-spicy food items, the company would have to drastically change its menu for the Britain market to provide healthier menus for British people. For instance vegetable salads and chicken kebabs were also se rved to cater to the health conscious population. These are some of the many changes that McDonalds did in order to gain entry to the Britain market. In addition to product differentiation, regulation of the products prices is also a top priority.Effective promotions and advertising were also compound into the companys international strategy. peerless of these tactics include the companys promotional offers of various items like Internet cards, concert tickets, CDs, T-shirts, caps and international trips . This promo had been done as the company collaborated with other organizations including Coca-cola, Sony, MTV, and General Motors. Painting contests for children were also conducted by McDonalds.Furthermore, the advertising strategies of McDonalds had been focused on building an image of family comfort. Rather than just being an ordinary fast food that serves quality meals, McDonalds intends to appeal to the market by building a fast food image where families can get together, en joy and relax.Overall, the international strategy of McDonalds for Britain has been effective. In general, the focus of these strategies was the customers. Customers play a significant role to a business success or failure. Being an important business element, meeting the needs and preferences of the consumers is the utmost priority of almost all businesses. McDonalds has clear shown the importance of this concept by adapting to the Britain culture, its people and their tastes. By reaching out to the British market, McDonalds was able to successfully establish itself in Britain. in spite of the success of McDonalds in Britain, it is important to consider that the cultural solid ground and preferences of its market continues to change. New markets in the country will eventually emerge. Considering the stiff competition within the food service industry, McDonalds should then see new strategies so as to reach out to the new markets. Perhaps, one of the most significant initial step s for the company is constant conduction of consumer studies.Strategic recommendationThrough this strategy, McDonalds can be updated with the latest market trends and identify new market segments. Changes in food preferences can be obtained through consumer research. Furthermore, this strategy can significantly help in increasing the companys market scope in the country.Another important strategy that McDonalds should do so as to address emerging markets in Britain is through enhanced advertising and promotions. This can be done through the implementation of the incorporated marketing (IMC) approach. McDonalds employs a number of ways on how to promote its products in Britain.Aside from television commercials and printed advertisements, the company also uses the Internet and various promotional offers for advertising purposes. In order to optimize the functions of each promotional media, McDonalds can use the IMC Strategy.IMC enables interactivity, which in turn allows the counter flow of information. Through IMC, companies in the food service industry, such as McDonalds, will be able to combine core strategies with other forms of communication to gain more marketing advantages and generate better business effects.IMC is the strategic coordination of multiple communication voices. Its aim is to optimize the impact of persuasive communication on both consumer and non-consumer such as handicraft and professional audiences by coordinating such elements of the marketing mix as advertising, public relations, promotions, direct marketing, and package design (Moore and Thorson, 1996).While traditional means of marketing like advertising is one way in nature, the integrated marketing communication approach permits users to do several functions, including receiving and altering information or images, forward inquiries, respond to these questions, and the most important of all, make purchases (Moore and Thorson, 1996 Moore, 1993).One important aspect of this integra ted approach is the resulting effect of a more enhanced means of brand building. In the case of mesh marketing, integrated marketing communication will allow food service companies to maximise the use of the internet in building bands by incorporating other marketing means. The effect of which will lead to enhance product promotions and better net sales.The IMC approach has been beneficial to several companies as it helps in identifying the most recyclable and appropriate methods in communicating and establishing good customer relations, including good relationships with s give birthholders like the employees, investors, suppliers interest groups and the public in general.During the 1990s, the introduction of the integrated marketing communication theory has been one of the most important developments in marketing, which continued on up to the present. From here on, the IMC approach is being applied by large and small companies alike, and has been well-known among companies mark eting consumer goods and services, including business to business marketers. Using this strategy, McDonalds may maximize the use of mass media, direct and online marketing.In order to maximize the purpose of the IMC strategy, the official website of McDonalds may be enhanced and integrated as well. The internet have changed the ways companies create, design and implement their whole business and marketing plans as well as their programs for marketing communications.In order to promote their product lines, companies, from large multinational enterprises to small local companies, are developing certain web sites, complete with vital information that will help enhance customer relations or attract potential consumers.In terms of the promotional mix, the internet is a subject medium of doing more than just advertise. Through this medium, McDonalds may offer other means of sales promotion through coupon, sweepstakes or contests online. Moreover, the internet may be used to perform, per sonal selling, public relations as direct marketing more efficiently and effectively.The official website of McDonalds Britain is truly well-made and attractive. It offers complete product details along with product pictures, which serves as an effective marketing tool. As Britains are very particular about the ingredients used for their food, the website also discusses the different ingredients included for the products it produces.Other services offered by the food company like parties are also included. In this website, the food items offered by the company are described as delicious, healthy, hygienic and refreshing. In addition, these food items are always served with a smile, implying the companys quality service (McDonalds Britain Official Website, 2005).With these major advertising elements, McDonalds could use the same elements for its commercials, print ads and other promotion carry. By doing so, the company can create a more distinct and definite brand that the Britain market can easily remember. In this case, this is where the IMC approach comes in. The coordination of different media channels can then help in making a more established McDonald brand in Britain, resulting to higher market support, market growth and sales.In addition, McDonald also considered the use of cost leadership and product differentiation strategy which also allows the companies to enhance their products as well as develop new ones based on market demands and needs. By means of new product development, generation of ideas that are different and unique among competitors becomes possible.Thus, by means of new product development, industries are able to overcome cutthroat competition. increase the companies market coverage is yet another effect of developing new products for the customers like what McDonalds have done with their British branches.Creating something that is unique to the market place increases the possibility of catching the interest of other potential consumer s. This in turn increases the market coverage or diversifies the target market of the company.For McDonalds, people are its most important asset (McDonald, 2008). This is because customer satisfaction begins with the attitudes and abilities of employees and committed, effective workers are the best route to success.For these reasons, McDonalds strives to attract and hire the best, and to provide the best place to work. In fact, McDonalds is so active and successful in freshly emerging markets that other companies will sometimes use the golden arches as a valuable indicator of future growth markets.ConclusionMcDonalds has been successful in operating within the food service industry through efficient strategies and quality standards which enables them to gain competitive advantage. As evidenced by its international market growth, McDonalds has already been efficient in gaining entry even in the most challenging markets like Britain. Through its strong sense of quality service and cu stomer satisfaction, McDonalds was able to offer its products to the Britain market. Products were modified to suit the British taste and preferences affordable prices were enforced effective promotions and offers were done.These are some of the strategies involved in the companys business strategy which allowed McDonalds to gain the Britain support. Despite these successes, the company should take into consideration the growing level of competitiveness in the food service industry.In Britain, several foreign fast food chains offering similar products are also being supported by the Britain consumers. unvarying strategic change is then necessary to ensure that the company would sustain their competitive advantage.In conclusion, McDonalds has been successful because of the value the company gives for its customers. Hence, despite the controversial beginning of McDonalds in Britain, the company managed to adapt to its peoples cultural needs. Indeed, McDonalds is a learning organizat ion, one that is free to learn and open to change.ReferenceArnold, David (2003). Strategies for Entering and Developing International Markets. In Mirage of Global Markets, The How Globalizing Companies Can Succeed as Markets Localize. Financial Time learner Hall, 2003.Crouch, A. (2004). Fast-Food Business Strategy. The Raw Prawn BlogHoward, T. (1999). The Over-Arching Strategy-McDonalds Global sucker Strategy Task Force. Brandweek, November 8, 1999Livesey, S. (1999). McDonalds and the Environmental Defense Fund ACase Study of a Green Alliance. The Journal of Business Communication, Vol. 36McDonalds Corporation (2008). About McDonalds/McDonalds History (online). uncommitted at http//www.mcdonalds.com/corp/about.html. imagine April 28, 2008McDonalds Corporation UK (2008). Eat chicness/Whats On/Good News (online). Available at http//www.mcdonalds.co.uk/ Retrieve April 28, 2008Moore, Jeri Esther Thorson (1996). Integrated Communication Synergy of Persuasive. Mahwah, NJ Lawrence E rlbaum Associates.Moore, Jeri (1993).. Building brands across markets ethnical differences in brand relationships within the European Community. In D. Aaker A. Biel (Eds.), Brand fairness and advertising. Hillsdale, NJ Lawrence Erlbaum Associates.
Analysis Starbucks Operational Financial Organisational Marketing Capabilities Marketing Essay
Analysis Starbucks Operational monetary Organisational Marketing Capabilities Marketing EssayThe organisation chosen for the task is Starbucks Corp. and the deal would comp be it with two similar companies, one(a) creation costa drinking chocolate and the other being Caff Nero.The state would set off the frameworks underpinning the competitive position of Starbucks and too would identify and asses the economic and the competitive position of the fuddled.A financial prototype utilize appropriate ratio compendium would also be presented in a spreadsheet format identifying the exertion trends and their impact on the executing of Starbucks vis--vis rib C polish offee and Caff Nero.Both quantitative and qualitative data would be make open so as to depict an insight into Starbucks sustainable mathematical operation and prospects.Analysis of Starbucks operational, financial, organisational and marketing capabilities would be made available finished exercise of PESTEL analysis and Porters 5 forces model.The report would also discuss the issues, the problems, the opportunities and the options available to Starbucks for future day avocation appendage, followed by conclusions to draw to feelher each(prenominal) the variables identified.Recommendations would be provided for the family highlighting the direction it needs to take to ensure furrow gainfulness with comments on the suitability, acceptability and the feasibility of the options made available.INTRODUCTIONThe Starbucks Company was pieceed in Seattle in 1971 by Jerry Baldwin, Gordon Bowker and Zev Seigel with a vision to educate American consumers nearly the fine chocolate drinking experience. In 1987 Howard Schultz took all over the Starbucks Group, he valued to create the Italian espresso bar experience in the States by creating a ad hominem relationship between the guests and their burnt umber.In 1995, the company really took off with the opening of its 676th salt away, an d the expansion schema to Hawaii, Singapore and Japan being very(prenominal) successful. By 2000, 3,300 gunstocks were already in operation and Starbucks had ventured into markets ranging from England to Australia. As gestateing, Starbucks is come in one in the industry, with more than 12,000 shops in more than 35 countries.Just at bottom a couple of years they grew from a small hot chocolate business house to a multi- one thousand zillion dollar player in the long suit deep brown industry by buying only the best java available and providing the mint with an unmatched store experience.The Starbucks mission statement is To inspire and conjure the human spirit one person, one cup and one neighbourhood at a snip. Freshly brewed coffee is the briny intersection offered by Starbucks along with other drinks which include cold and hot teas, cakes and pastries. The Starbucks coffee comes in a many varieties each possessing a different taste, aroma and flavour. diligence TREN DS AND MARKET ANALYSISThe market right now for gourmet coffee business is hot. All the multi-national fast intellectual nourishment chains and street-corner shops want in on the boom. Many big companies be focusing on the release of particular(a)ty bloted coffees and the scenario is heating up. Specialty coffee is one of the fast-breaking growing food profits markets globally. Growth in the coffee industry is continuously peaking, with many tender overseas companies entering the market using policies like special discounts and perks despite the questionable tone of the coffee being used to increase the market sh atomic number 18.A nonable trend seen is that lots a significant increase in gross revenue occurs every time a caf starts to use checked consumables. The consensus is that these coffee drinks would be a semipermanent trend, with focus on elevating the customers taste for a product that they atomic number 18 already familiar with and then leading them to coffe e houses to get it. Many companies are also tinkering with expanding the food menus as strong including an in-store display of fresh cook goods, sandwiches and miscellaneous confectionary items.The modernest trend is the drive-thru coffee stores. Starbucks has many much(prenominal) stores, all of which are seeing continual growth and long lines. some other trend includes customer requests for organic coffees, which has encouraged retailers to move towards the beans growing surround. The array of products offered has never been as wide, as retailers are adding more flavours to whole beans and creating variations to the basics of espresso and steamed milk. The liable(p) retailers shit added iced tea concoctions and coffee shakes to their menus to give awaydo competitors. Most specialty retailers now also retail whole beans and many such stores arouse added coffee grinders, espresso machines and other brewing supplies for add on sales.STARBUCKS ANALYSISThis position of the r eport would analyse the working of the business by application of PESTEL analysis, Porter 5 forces and the BCG Matrix.PESTEL AnalysisPOLITICALTaxation policyHigh taxes levied on farmers in the bean producing countries, would consequently increase the rate at which Starbuck would buy the coffee beans and any such fluctuations in the taxation policy would certainly be passed on to the consumer, who now would thrust to purchase the end item at a higher price.International trade regulations and tariffsTrade issues would affect Starbucks instanter when exporting and importing goods. When the government of the trading untaught trim backs a tariff it would not only reply in an efficiency loss for Starbucks however such large income transfers can also become inconsistent with equity. This purpose slight charge would suck to be borne by the consumers.Government stabilityA change in government policies has a direct impact on the taxation and legislation framework. Also the countries in political turmoil or civil war should be approached with great caution when considering revolutionary ventures. fight lawA reduction in licensing and permit costs in the bean producing countries would begin production costs for farmers. This saving would in repeal be passed on to Starbucks when purchasing beans and finally to the consumers.ECONOMICInterest rankHigh cheer rates would mean putting off the investing and expansion plans of Starbucks, which would result in a few(prenominal)er wampum for the firm. Low interest rates should have the oppo situation effect.Economic GrowthConsumer incomes would fall in periods of negative growth leaving little disposable income impacting the sales for Starbucks. inflation ratesBusiness costs forget rise in measure of inflation which would ultimately have to be borne by the consumer.Competitors pricing warlike pricing from competitors would impact Starbucks pricing that would drive down the profit delimitation as they try to mai ntain their market manage.Exchange ratesIf the bills value falls in a bean supplying country, Starbucks would get more for the equivalent price, when importing the goods. This saving would be passed to the end consumer. cordialPopulation demographicsIdentification of the target population at which Starbuck needs to reckon their products is a significant factor in the business operations. The marketing streak undertaken would focus accordingly. burnt umber is more of a luxury product, so the people with the most amount of disposable income should be targeted.Working PopulationA large number of workers in big cities now go out for lunch and meals. Starbucks can cash this to their favour and promote the shop as a place where people can meet and eat, boosting the sales.LocationA good location which is easily accessible is vital to ensure that the customers catch the shop.TECHNOLOGICALIT developmentStarbucks launched its first-generation e-commerce website in 1998. As a result, sc alability and performance have improved, and the company now has the tools it needs to profile and target customers, analyse site data, and deliver new features to the market in the shortest time possible.New tangibles and processesDevelopments in the technology of coffee making machines and the computers that Starbucks use to run their cash registers will enable their provide to work more quickly and efficiently. This will result in customers being served quicker and create the latent to serve more customers in a day..Rate of technological changeThe pace at which technology is advancing is astounding. Starbucks would need to invest heavily just to stand still in the ever expanding and developing market, and even more so to try to stay ahead of competitors.ENVIRONMENTALPollution problemsStarbucks customers create a lot of waste by disposing off the cup and the contents incorrectly. The material for the cup should be carefully considered to make it as biologically degradable as po ssible.Planning permissionsPlanning permission may not be grant to Starbucks if the construction would harm the environment. The land may be protected.Work establishment in that location are strict laws in most countries pertaining to waste disposition and non-adherence to these could lead to Starbucks being sanctioned, which would affects them financially and also tarnish the reputation of the mark off name.Environmental pressure groupingsStarbucks should be awake(predicate) of the physical and influential berth of groups such as Greenpeace and Friends of the Earth. Any violation of animal or environmental rights by a company is usually followed by a nimble and attention-drawing protest from one of the groups. Brand image and customer bases are very much irreconcilably tarnished repayable to the actions of these groups.LEGALTrade and product restrictionsStarbucks need to be aware of the trade laws in the countries where they have established businesses. They need to ensur e they are not in violation of any such laws. Certain countries impose a tariff that has to be paid when goods are imported/exported so this must(prenominal) be taken into account as swell up.Employment lawseach country has different employment laws, like a limit on the number of hours an employee can work per week, varying levels of minimum wage and so forth Starbucks should be aware of such factors when considering business expansion.Health and Safety regulationsBy not maintaining high standards they would be liable for damages if found in violation as it is a legal requirement for them to enable that their staff and customers are safe when they are in their stores.Land useStarbucks have to a stampe by the laws of the induceing authorities when constructing shops or altering purchased sites and if found in violation of land rules, it can be panalised by the topical anaesthetic authorities.PORTER 5 FORCES ANALYSIS1. COMPETITIVE RIVALRYStarbucks is the leading retailer, roaster and brand of specialty coffee in the world. Major competitors include costa coffee, Caff Nero, Seattles beat Coffee and secondary coffee providers such as McDonalds, Burger King and Dunkin Donuts. The opposition is nowhere near to Starbucks volume of operations and sales.Consumption of coffee is not dependent on the price of the product but also on the differentiation between each product and several value adding variables such as the type of customer services, brand, brand recognition and image of the company. Hence, Starbucks is not majorly sensitive to movements of other firms in this segment.2. THREAT OF NEW ENTRANTSStarbuck is the world attracter in its industry and has controlled access to distribution channels. Starbucks have exhibited this control over distribution channels by setting guidelines for their suppliers to follow. Starbucks is also constantly innovating and masking strong product differentiation to hamper the possibility of new entrants.However, the inlet barrier for the industry is relatively low and any big firm where capital is not a problem could be a authorisation entrant. Some of the more current and on-going curses of new entrants include fast food chains such as McDonalds, Burger King and Dunkin Donuts which can become a major problem in the near future.3. BARGAINING POWER OF BUYERSA big affright to Starbucks is the absence of fault costs in the speciality coffee industry, customers face no switching costs in switching from Starbucks to costa Coffee or Caff Nero for a cup of coffee. Another threat to Starbucks is that their customers have the ability to brew their own coffee. Starbucks has tried to counter this threat by offering Preferred Office Coffee Providers as well as directions on how to make the perfect cup of Starbucks coffee at home, called the Four Fundamentals of Coffee. The perfect cup of Starbucks Coffee includes, of course, Starbucks ingredientsAlso with new entrants and competitors such as McDonalds who c laim to offer premium roast coffee of reasonable quality for glower price, it is ready that Starbucks customers have some talk terms index in the industry.4. BARGAINING POWER OF SUPPLIERSCoffee is the worlds second largest traded commodity. due south and Central America produce the majority of coffee traded in the world. Starbucks depends upon both outside brokers and direct contact with exporters for the supply of premium coffee beans.The quality of coffee beans sought by Starbucks is very high, proving to be a potential threat to the company. Only suppliers who can meet Starbucks coffee standards will be able to supply the giant company. The supplying industry only has few firms which can deliver the quality giving them considerable bargaining powers.However, Starbucks counters this due to its massive size and being the primary buyer and also because of the immensity of Starbucks business to any individual supplier as it would account for a large percentage of the total supp liers sales, thus reducing the bargaining power of suppliers.THE THREAT OF SUBSTITUTIONSubstitute products are the products that can pose as a trade-off for the product being offered by a company. In the specialty coffee industry, substitute products can be soft drinks, tea, power drinks, fruit juices and other caffeinated drinks.Here innovation would play a wide role. To counter this Starbucks have given their menus a complete revamp and have differentiated so many of their products which are now part of the main product line. The menu includes motley teas, hot and cold coffee, baked goods and various confectionary items.The only true direct substitute for specialty coffee would be the basic coffee, which is of lower quality than specialty and as such does not present any threat.STARBUCKS FINANCIAL ANALYSISThis part of the report would highlight the financial position of Starbucks using the annual reports and omnibus(prenominal) ratio analysis for the financial years 2008, 2009 and 2010 which are enclosed in the appendix.2008In pecuniary 2008, Starbucks experienced declining store sales in its stores, primarily due to lower customer traffic. The weaker traffic was caused due to number of on-going factors in the global parsimony such as the higher costs of gas and food, rising levels of unemployment and personal debt along with reduced access to consumer credit.In financial year 2008, store sales declined a margin of 8%. Consolidated run income was $503.9 jillion in pecuniary 2008, and operating margin for the year was 4.9% compared with 11.2% in the foregoing year. Approximately 260 basis points of the decrease in operating margin was a result of restructuring charges, primarily related to the significant US store closures.EPS for financial 2008 was $0.43, compared to EPS of $0.87 per share earned in the prior year. Restructuring charges and costs associated with the execution of the variety agenda squeeze EPS by approximately $0.28 per share in fiscal 2008.2009Fiscal 2009 was a challenging year for Starbucks. The difficult economic environment had strained consumer discretionary spending in the US and multinationally, which negatively impacted company revenues, store sales, operating income and operating margins.Starbucks responded by creating a business model that was less reliant on high revenue growth to drive profitability. The primary initiatives of the schema included rationalizing the global company operated store portfolio and reducing the cost anatomical structure, plot of ground renewing the focus on service excellence.Starbucks closed down approximately 1000 stores. Initiatives targeting reductions in the cost structure in fiscal 2009 proceeded as planned, with full year costs of $580 million removed from the cost structure.The company maintained a solid financial foundation, with no short term debt outstanding at the end of fiscal 2009 and with cash and liquid investments totalling more than $650 million. The solid financial position and go along strong cash flow generation provided Starbucks with the financial flexibility to accomplish its restructuring efforts.2010In fiscal 2010, revenues change magnitude to a record $10.7 billion. Operating income increased by $857 million from scal 2009 to $1.4 billion. The full-year operating margin of 13.3 % represented the highest full-year consolidated operating margin in Starbucks history. Fiscal 2010 ended with the highest full-year comparable store sales growth that Starbucks have seen in the recent past, while the earnings per share also grew more than double from scal 2009.BENCHMARKING WITH COSTA COFFEE AND CAFF NEROStarbucks is a US chain whereas both Costa Coffee and Caff Nero were established in the UK. Costa Coffee was setup in London in 1971 by Bruno and Sergio Costa and acquired by Whitbread PLC in 1995. Caff Nero was established by Gerry Ford in 1997 in the UK.The comparison would be carried out using the financial information of the trine firms which is available in the appendix. The comparison would majorly be based on the UK market.There are 1,175 Costa Coffee shops in Britain as compared to 731 of Starbucks and 440 of Caff Nero. A comprehensive business analysis of Starbucks has already been supplied in the above report this part would focus on the business analysis of Caff Nero and Costa Coffee respectively followed by a coherent conclusion of the findings.Costa Coffee fit to the financial data available operating profit grew by 59.5% to 36.2million 312 net new stores were acquired or opened and like for like sales increased by 5.5. Costa operates in 25 countries and is now the number two international coffee shop operator with 1,600 stores 1,069in the UK and 531 overseas. Sales performance improved strongly across the year, confirming the brands resilience, even in a recessionary environment.Caff NeroThe groups 60% equity is held by the Ford family, the rest 30% by a private equity firm Paladin a nd 10% with the management. Caff Nero has recently completed a successful 140m refinancing in a bid to fund the businesss future growth ambitions.The business, which has 500 outlets in the UK and internationally and has registered 54 consecutive quarters of positive like-for-like growth, is forecast to sire 31m in earnings before interest, tax, depreciation and amortisation (EBITDA) for the 12 months to May 2011. Revenue for the same period is forecast to reach 171m, an increase of 11% on the preceding(prenominal) year. The new financial structure would provide the Group with a financial platform to support its growth ambitions and expansion plans both in the UK and internationally.Nero has a lot of ups including strong brand positioning, intensive marketing campaigns and a clear differentiation point. However, there are some weaknesses, one of them being wish of experience in going international, thus some problems could arise while penetrating foreign markets.Though both the co mpanies Costa and Nero are well established in the UK market, Starbucks is the industry leader in the world and is a major competition to them in the UK. Financial turnover of the Starbucks Group is so massive that it provides them with all the capital requirements to innovate and differentiate their product from the 2 competitors it already has established a sizeable market share in the UK, but still needs to take over Costa Coffee which it should be able to do in the near future, looking at the financial figures provided and the international global strategy adopted by the group which seems very promising.ISSUES FACING STARBUCKSThe major challenge that Starbucks is dealing with is the current financial crisis in the world economy forcing them to call closures of many stores around the world.Another challenge that Starbucks is dealing with is competitors. There are numerous coffee shops all over the world and being able to stand out to generate customers is principal(prenominal). Their main competitors are Dunkin Donuts, McDonalds, and Nestle in the US and brands like Costa Coffee and Caff Nero in the UK, the two major markets for Starbucks. It is important that for Starbucks to know their competitors and what they are currently doing.Also Starbuck coffees are priced higher than other market competitors because of Starbucks only purchasing the highest quality coffee beans for their product, thus increasing the price of the drink. As Starbucks have many competitors, this can be a potential advantage to for such competitors.Also Starbucks inadequate marketing strategy on advertising is a hindrance in the business growth opportunities. They prefer to build the brand by promoting the drinks cup-by-cup with customers. The advertisement ends until they drink the coffee, reducing the chances to attract invaluable customers.Starbucks also does not emphasize on distributing their products to supermarket because of being concerned with the quality of the coffee if t he coffees were packaged into plastic bags.Also the rigorous expansion strategy followed by Starbucks can take a toll on the firms brand image. As corporations grow there can be a tilt to focus too heavily on increasing output and locations, and less focus on quality and brand image. Starbucks needs to stay with its determine and ideals that have made it successful.Also Starbucks policy of not franchising can be a cause of concern for the firm. Advantages of Starbucks franchising would be to open hundreds of new stores with less risk to the company, and make profits in doing so. In addition Starbucks would have less research and development costs because the franchisee would have greater familiarity of the local market in terms of demographics, psychographics, geographic, and local/state/country regulations.RECCOMENDATIONS AND CONCLUSIONStarbucks has to effectively pursue a Focus-Based Strategy in coalition with differentiation and cost leadership based strategy. Being a lower c ost store will increase the difference between Starbucks and provide it with a competitive edge. At present, Starbucks competitors are attempting to specialize in the coffee business, therefore Starbucks must pursue focus strategy to increase its strength.Starbucks must reduce their product price by producing a new product of coffee using cheaper beans or can come out with special discounts and promotions to reduce cost, thus increasing sales enabling Starbucks to enter new low cost markets and increase profitability. Also needs to focus on building alliances in new markets/countries to reduce management focus and utility from the local and experience curves.Should focus on advertising the brand with internet services for users to access, do road shows, hand out brochures etc. so that consumers become more aware of the brands strong international front man and brand name. Market penetration and market development will help increase the sales. Access unexplored distribution chann els like making available packaged Starbucks coffee for consumers by displaying it nationwide in various convenience and shopping stores and not only Starbucks stores.Starbucks must adopt reduplicate policies of Product Development and Product-Market Diversification to counter the stiff competition in international markets. It is important to understand this in the product development pattern as they would need to focus solely on making their subsisting products better. The company can demonstrate product and market diversification through research and development coupled with creativity and innovation. Product differentiation has prove an excellent defence against threats such as bargaining power of buyers. ontogeny new products will offset such potential risks.A strategy should be formulated to tackle the competition by entering into agreements, long-term contracts, with the food service companies that they are competing against. This way their coffee would be interchange at these outlets and they would gain access to new markets and increase sales while decreasing competition.Starbucks should tarry to be a first mover into markets with new products and ideas. Being a first mover of new products into new international markets will be an excellent way for Starbucks to build customer trueness and uphold its image as an innovative company.Starbucks should continue to locate their operations in high traffic areas, high visibility areas. The company should continue to take excellent care in picking locations. It is extremely important that Starbucks international stores reflect uniqueness in their location and layout. Having locations in a variety of locations will ensure large market exposure.
Friday, March 29, 2019
Man is a Social Animal Essay
Man is a Social Animal EssayMan is a mixer animal, said Aristotle years ago, hu firearm races proved and scored the grandeur of his statement by the passage of time. Individuals live in mathematical roots and hatful non separate themselves from being explode of a group. Individuals keep up their stimulate importance, their demeanours and nominate can not be ignored as these influence the demeanours and out mystify sign upal of groups they belong to.Groups exist e truly where, and we be a part of it whether we realize this or not. This does not mean that or soones do not give break dance solvents when acting alone, they do, just now man is dependent on some others to fulfil antithetical kinds of need. Working in groups is beneficial for an individual as he gets to a greater extent exposure and leaning gestates place in many ways, and he in like manner learns to survive in group which is the basic necessity for an individual.In army explain individuals do ings in a group it is important to ascertain unalike types of groups, their norms and values and possible causes of the conflicts. There have been investigatees and samples conducted by several(prenominal) scientists in tack together to explain unique behavioural pattern of for each one individual in plumping environment.Individual and GroupGroups be of snappy importance in all fields of life whether its work situation, ain or social life, these are either formal or expel-and-easy. nearly people may prefer to work alone as they perform better and some might need to be a part of a group in various situations. I want to put myself as an representative here, when this assignment was given I was worried to work individually on it and the reason behind this was that firstly I flavor more comfortable to discuss ideas with people and second, as I spell simple and straight I emotional state better working as a group where I can use other persons nomenclature to flourish and talk about my ideas more clearly.Critical Analysis with Examples ceremonial groups are formed by organisations to achieve certain goals or tasks (Bowditch and Buono, 1994). In these groups goals, tasks, roles and norms are defined by the management (Brooks, 2009). Working in a formal group is of great benefit for an individual as this develops different skills and abilities in a person. One gets a chance to see how others exonerate and respond to different situations and learn to work in a group effectively.I worked as a instructor for 2 years in Pakistan and learnt many things working in a group of teachers. I feel working in a group influenced my attitude and behaviour as individual, I gained more confidence of doing tasks or projects I have neer done out front. It to a fault helped in developing decision power and managing multi tasks in given array of time. Working in a competitive environment metamorphosed my attitude when I started getting constructive feedback from management and parents. Children respond me very substantially as I worked hard on each child, move to develop skills and work on their weaknesses. There I got chance to account behaviours of children and parents as intimately. I tried to bring positive changes in children masking them my own example, as I was a role model for them, so in this way got a chance to study and observe own behaviours and attitudes in detail..People join informal groups to satisfy their social, psychological and personal call for. These groups fulfil the individuals needs of social interaction that lack working in formal groups. These groups not only exist out side work place just also at work places and people of akin recollecting and values become a part or benefit themselves a part of a particular group.When I joined University of Salford in January as an international postgraduate student, I was a part of a formal group that was defined by university comprising almost thirty five-spot stud ents. Later students split into informal groups in order to satisfy their social needs depending on culture, language, race, age and gender.According to Maslows Hierarchy of need theory, individual try to satisfy his basic needs which differ in importance. He identifies eight innate needs ranging from physiological and safety needs to self-actualization needs (Mullins, 2005). This theory answers one of the questions why informal groups are formed also why individuals are attracted towards each other to become part informal groups.According to Hunsaker and Cook (1986) informal groups have strong influence on an individual than formal. Individuals are open to join a group of analogous thoughts this gives psychological satisfaction and helps them to perform better in formal groups. every groups have some norms as a proof of their existence or value. Norms are guidelines rig by organisations or groups and are considered as cypher of conduct for its pieces. According to Kreitner, Kin icki Buelens (1999) norms are unwritten and are seldom discussed. It is an attitude, expectation and feeling shared by people, which bounds them to follow these as to enshroud with their membership with the group.I would like to state an example here from the educate where I was teaching, it was a norm for children to come to cultivate in beseeming uniform and those who deviate from this norm were considered to be violating the rule. There were some watch rules as well which all children had to follow as part of their educational activity and personality development, like they were not allowed to talk loud or call option in the class, had to leave the inhabit in queue if going some where together, ask for permission before they enter in class, raise book before they speak in class. Such norms are advantageous for students in order to discipline and organise them.According to a research group norms have strong influences on new members and they adopt the analogous behavio ur as a result of group pressure. It gives example of a male child who indulges in violent activities after joining a gang convoluted in such brutal activities (Yablonsky, cited in McKenna, 2000).Roles are behavioural aspects which are expected from a person or group in a particular position. According to a research, attitude change is driven by roles (Bowditch and Buono, 1994), and the performance of an individual is enhanced if the role he is into suits his personality (Belbin, cited in Davies and Kanaki, 2006).An individual performs many roles in a group, like a teacher plays many roles in order to satisfy management and own personal need or others social needs. For children she is a teacher and a mother, who cares for them gives them ace of protection and security, trims them to face realities of life also achieves set targets utilizing her own potentials to satisfy management fulfils colleagues social, psychological needs. She plays more roles in her personal life like, of a daughter, sister, wife, mother, friend with various expectations from her which are not communicated formally but understood.Boulden (1983) says this tradition of very gamy aim of expectations in work situation was set in sixties, which has brought decline to the businesses as it is very difficult for a person to match that take aim of expectation.When individuals share same targets, thinking and work almost together with commitment to achieve certain tasks, shows a good level of viscousness in a group. Cohesiveness of small groups increases when they are less(prenominal) diverse and more interactive, where as larger groups are less cohesive when they are more diverse and have competition (Capon, 2004).Cohesive groups share same attitudes, likings, performance and better in voltaic pileing with deviants than less cohesive groups (Bowditch and Buono, 1994). Mullins (2005) states a tackiness in groups is beneficial for organisations, it also leaves the members with rewarding arrives.The best example of cohesiveness can be of military, where changes in level of coordination can change the situation in battle field. It is therefore necessary for them to co-ordinate well for achieving better results.I remember the time in school when we were preparing for yearbook function and a hardly a(prenominal) programmes were included in schedule. Teachers had to prepare children for demonstrate performances and there was an art exhibition on the same twenty-four hour period. Annual sports day was following this event, due to which schedule was too tight for teachers as well as for children, who had to manage themselves for so many activities though at glower level and under teachers supervision. Such situations require high level of cohesiveness to achieve targets, which is not easy as outsiders are involved in observations who also critically evaluate the organisations performance. Such situations in work experience give its members to learn from observations like other individuals or groups behaviours, and dealing techniques with groups and individuals. effectual cohesiveness in a group influences an individuals behaviour, also gives high level of job satisfaction. The member follows the norms of the group which have either positive or negative impact on his attitude and behaviour both. If the group norms are good and polish his creativities and skills, that helps developing his personality, but if the norms are negative like, to flummox less than ability lefts negative impact on his behaviour.According to Hawthornes experiment of fourteen men working in a wiring room formed their own informal group and the norm which everyone strongly followed was to promote less then their ability. That is how norms can be disadvantageous, if they are negative in nature (Mullins, 2005).High level of cohesiveness is not necessarily eer favourable as it stops creativity, thinking, decision power and problem resolve skills in a group which results i n Groupthink. According to a research previously it was thought that high cohesiveness is necessary for high performance, but it was Janis, who gave a concept that high group cohesiveness leads to group think an ultimate disaster fiasco for groups decision making ability (Eaton, 2001).I want to quote Vietnam War here which was a consequence of high cohesiveness that lead to group think and America attacked Vietnam without considering the after effects they had face.Bowditch and Buono (1994) quote Janiss work saying groupthink leads to overoptimism and high risk taking by group members there is rationalisation of groups decisions so other members are not allowed to question the decisions made.Leadership is a necessity which cannot be avoided in order to manage activities, conflicts and decision making. According to Mullins (2005 p.282) Leadership is a relationship finished which one person influences the behaviour or actions of other people.It is the lead which moulds the behavi our of ordinary group members to competitive group, which enhances the competency level of members of that group. Great man theory explains well the qualities of good leaders, according to which the leaders influence the behaviour of people by force of their personality (Buchanan and Huczynski, 2004). The best example of leadership I think is Quaid-e-Azam Muhammad Ali Jinnah, the founder of my country, Pakistan. It was because of his strong leadership qualities that he coupled the Muslims of sub-continent on one plate form, as a nation.Different expression of leadership have different affects on individuals personality, like, Autocratic leadership personal manner suppresses the abilities of the group members. On the other pass around if the leader tries to involve the member in making decisions, he wins their confidence, able to take better decisions, this also have very positive effects on the attitudes of members.I want to share my own experience of working with SLM Connexions , a call essence located in Manchester, UK. The company started business with a good deal of investment, and recruitment of talented staff. The autocratic style of leadership was adopted by the directors who use to tell the staff what they want them to do or sell. sometimes suggestions were welcomed but no one was allowed to question their decisions, and as a result the company bear much loss in last few months for making many wrong decisions.Whenever individuals interact with each other, there is everlastingly a possibility of conflict between them depending on multidimensional thinking, experience and behaviour. involution my arise due to several reasons ranging from improperly defined roles to equivocalness in norms. Whatever reason of conflict is, it affects its member both positively and negatively. Role conflict mainly arises due to unethical behaviour of a member (Johns and Saks, 2005). negates may also arise from cultural, demographic and value differences (Vodosek, 200 7).I want to quote an example from my own experience in school where teachers were provided with pick and drop facility. These group of teachers were from different level, like some were from pre-school and some from primary and their finishing time was different from each other. Pre-school teachers finished an hour before the primary level teacher and had enough time to wind-up before going home, but primary teachers use to finish at 2oclock. Conflict arouse when pre-school teachers demanded van to leave school as they get free early without considering the teachers who finish at 2oclock. This conflict leads to many other conflicts in school regarding duty timings and some others. Then our academic co-ordinator decided to have consensus and time was fixed for the school van to leave after school.Conflict brings success to an organisation and groups in many ways. Conflicts are a sign of healthy mental approach bring new ideas, innovations which individuals should learn to take posit ively as it is beneficial for them as well. On other hand conflict has adverse affects on personality behaviour of an individual that can result in stress and frustration.ConclusionThe subject discussed above reflects the positive and negative aspects of group behaviours on individual. Individuals and groups work parallel to each other in every sphere of life and study of an individuals behaviour in a group is as important as organizations. An individual interacts with other people in perspectives of behaviours and attitudes by means ofout life and learn to polish, enhance and develops his personality, through learning from different experiences.Management should take the responsibility to resolve the conflicts link up to roles, status leadership, norms, and develops good cohesiveness so that individuals can get maximum benefit from it. Generally problems are taken as hurdles but these are there to teach us. We should take them as opportunity which gives a new horizon to percept ion of an individual.