Saturday, January 25, 2020

Cybersecurity: Advantages and Disadvantages

Cybersecurity: Advantages and Disadvantages Cybersecurity: Friend or Foe? From 2005 to 2020, the digital universe will grow by a factor of 300, from 130 exabytes to 40,000 exabytes, or 40 trillion gigabytes.[1]The Internet is growing at an outrageous rate, and with it so must security. Cyber Security is â€Å"measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack†(Webster). This word was first used around the year 1994. While the internet and cyber security are symbiotic, what happens if one grows faster than another? Will that set fire to the internet and topple it, or make it stronger? In recent years, cybersecurity has become a hot topic in many countries. In the U.S., cyber security is now a major issue and one that many people do not comprehend. Actually cyber security helps our everyday lives and keeps us safe from cyber attacks. These cyber attacks could steal important information like credit card numbers or addresses even age and any other information stored on a site with no cyber security measures. The US government and the private sector are utilizing numerous strategies to keep up with the rapid pace of increasingly sophisticated cyber security threats. However, U.S. citizens are beginning to question if the government’s and private sector’s attempts to effectively combat cyber security is now undermining civil liberties and exceeding limits of government secrecy. In the past, present and future, cyber security has been both an ally and enemy of the U.S. government and U.S. citizens. First we begin by rewinding to the past to see how Cyber Security has changed the Internet. The Internet originated in 1962, hatched from the brain of Paul Baran of RAND, who developed the idea of distributed, packet-switching networks. This was the first idea of its kind and would revolutionise the world in years to come. With the help of Paul Baran and DARPA an agency of the United States Department of Defense; In 1969 the Advanced Research Projects Agency Network aka (ARPANET) goes online and is the worlds first fully operational distributing, packet switching-network. Shortly after the rise of ARPANET, Bob Kahn and Vint Cerf both noticed the usefulness of the internet and began to draw out and develop the basic ideas of the Internet. Finally In 1974, the company BBN launched the first public packet-switched network called Telenet (X. Cringely). The civilian Internet was born in the mid-1990’s as an off shoot of ARPANet’s military network. The Internet is bringing a revolution across with it bringing global supply of endless vital information that brings new reformed conventions and destroys old world definitions. Much time goes by and we finally see the full rise of the World Wide Web. In 1992 the number of hosts, which means computers or servers supplying information, breaks 1,000,000. By its third year the World Wide Web has a growth rate of 341,634% in service traffic. And the Internet was baptized in 1996 by holding the â€Å"first World Exposition† ever shown on the Web. It has now become so embedded in our everyday lives that it has radically altered the way individuals and societies interact (Kaufman). From this point on we see the birth of a new force that will bloom into a beautiful flower in later generations, yet the question remains whether this flower be a sweet smelling rose or poisonous Lilie. With the advent of the Internet came the need to protect information from being taken; this came in the form of Cyber Security. In the beginning Cyber Security did not matter a great deal because there was no real confidential data being handled on the web. It was still a relatively new concept. Thus there was not much security other than the CIA or NSA would occasionally use the web to track down criminals individually by surveillance (McCracken). When the Internet began to intertwine with our daily lives, cyber security problems began to occur. Large amounts of confidential information began to be stored on the Internet, and hackers began to penetrate through simple defenses to steal this critical information. In response, the NSA and CIA implemented multiple layers of Cyber Security to their servers. Following numerous cyber attacks, private sector companies also began to tackle this issue by hiring Information Technology experts capable of protecting their information from hacker s. As companies everywhere were in need of Cyber Security to keep others’ vital information safe, they began their search for people with the skill set they needed. This new type of job pays a lot because of the high demand for this technical knowledge (Lawrence). At this point cyber security basically is only showing its friendly face. The industry was adequately protecting critical information without encroaching on peoples privacy. Lastly, the need to protect information became a global issue with countries committing warfare via digital frontiers and borders rather than physical ones. Cyber Security began to create divisions among countries such as China, Russia, U.S as these three countries became leaders in hacking, stealing information and digital espionage. A great example of this is in 2001 of the FB â€Å"hack which raised concern all over the world of for security reasons. This hack happened when the FBI went on a sting operation to retrieve small part of information without being noticed from two Russian intelligence based computers. However layers are afraid that this act may bounce back to them as they have committed a cross-border hack many people believe that they have done this with poor judgement (Lemos). They obtained this information from these servers without the assistance of Russia. This could mean that the U.S. can widen its borders on where it can search and capture criminals. However thi s also bring the law up of Whatever we do to them, they can do to us, said Yarbrough, a former Department of Justice cyber crime prosecutor†(Lemos). Clearly this inter-country cybersecurity warfare marked the beginning of the negative results of cyber security and paved the way for increasingly complex issues in the present. Now we currently face a critical situation in which Cyber Security is becoming more of a foe than an ally. It has gotten out of control and is now forcing citizens to question whether the government and private sector are respecting their very civil liberties. With the advent of the cloud both the government and private sector store huge amounts of information outside of their physical offices, making it even more risky for cyber attacks. The enemies are able to attack just as easily from within the organization as from without. A well known example of internal hacking was Wikileaks, in which a U.S. soldier J. Kirk Wiebe downloaded confidential embassy communications from around the world and shared them with the press. Another U.S. government leak was perpetrated by Edward Snowden a famous whistleblower from within the NSA. He downloaded thousands of classified files, attacking from within the NSA , to show the world what he considered to be an overreaching of the U.S. government in citizens and other countries privacy (Riley). While the government and the private sector may be winning the battle of effectively keeping citizens and their data safe, they are sacrificing civil liberties and privacy that has been the hallmark of our country since its founding over two hundred years ago. Now Cyber Security threats are not only pertinent to government based servers but as to the private sector as well. Companies such as Target and Sony have been widely affected by these attacks. Target recently lost large amounts of market share due to the cyber security attack they suffered in which numerous amounts of confidential customer information was stolen. People are shying away from Target due to the general fear of having their information stolen. Sony has been attacked numerous times but has now learned from the past and is creating new security and encryption platforms to ensure customers it is safe. Every time a company is attacked, a beneficial outcome rises from the overall flaws that are exposed, allowing organizations to improve their Cyber Security. An example of this is a recent bug called Heartbleed. HeartBleed is a bug that breaks through OpenSSL to find passwords and other confidential information. It attacked what were previously considered impenetrable platfor ms including Yahoo, Instagram, and even Google. Weeks later all breaches were sealed and lessons were learned. Currently, the competition from both the government and private sector for the same scarce Cybersecurity professionals is resulting in a war for resources and talent, making it even more difficult for the friendlier side of cyber security to prevail. Now the government targets these cyberwarriors when they are still students and lures them in before they can go to a private company. How? They begin to pay scholarships, tuition, books, and a salary. â€Å"Unlike many government programs, Cyber Corps has seen its budget triple to $45 million a year in the past three fiscal years,† says Victor Piotrowski, lead program director for Cyber Corps at the National Science Foundation† . â€Å"Almost four in 10 IT security positions went unfilled in 2013, according to a survey of more than 500 organizations by the Ponemon Institute, which studies privacy, data protection, and information-security policy† (Lawrence). Frequently, government employees are lured away by substant ially higher salaries in the private sector. An increasingly important challenge for the government in retaining skilled cyber warriors is that many employees choose to leave government employment because because they say they do not want to spy on U.S citizens behind their backs (Lawrence). With these many challenges, cyber security currently appears to represent more of a foe than an ally. [1] New challenges will surface in the future in cyber security. Just as less than 70 years ago, the world had no idea that internet was about to revolution the way we look at the world and interact, it is difficult to speculate on the direction of cyber security. However it is possible to hypothesize on the near future and what is to come. Cyber security has already begun to be a problem for mobile telephony, and it is likely to increase exponentially. Mobile phones are an enticing target as they display important information such as location, credit card accounts, secret work files and photos. More and more hackers are begging to target this growing platform. Between April and December 2012, the types of threats detected on the Google Android platform increased by more than 30 times from 11,000 to 350,000, and are expected to reach one million in 2003. (Center for European Policy Studies, CEPS)*insert end connecting some what to thesis and future*[2] What began as small cyber battles between countries has now given rise to a full scale â€Å"Digital World War†. Now a days we see countries aggressively hack each other. The U.S. is deeply worried about China, as it has attacked its intelligence agencies multiple times. The U.S. government has prohibited â€Å"Chinese hardware in US institutions such as NASA, the Department of Justice and the Department of Commerce, unless a thorough assessment of â€Å"cyber-espionage or sabotage† (CEPS) risk by specialised federal officials has been carried out.† Furthermore, the U.S. government recently accused 5 high ranking chinese officials of cyber espionage. This unprecedented accusation has led to increased tension between the two governments with both accusing each other of espionage. Is this the end of the internet and where will we go from here? The Internet just keeps expanding and expanding and so does cyber security and its accompanying abuse of privacy and civil liberties. The NSA could eventually cause the downfall of the internet because they have fatally altered the perfect balance of self-expression, internet cyber security, and governance. In a recent speech that Snowden gave with techies, he stated that â€Å" the NSA is setting fire to the internet, and that you are the firemen† (McCracken). An additional issue that is just as important to the future of the internet and cyber security is the recent FCC decision regarding â€Å"fastlane†, which allows internet service providers to charge a premium for faster service for websites. A likely scenario is that large corporations with large budgets will have greater access to sharing files than small corporations or nonprofits. Some experts fear that this intrusion on free and equal access to s haring information over the internet sets a dangerous precedent that could allow organizations a great power in manipulating what information is available to world wide web users. This U.S. government policy could be the greatest enemy to the civilian internet and civil liberties than any cyber security initiative. While the internet and cyber security have existed for a relatively short period of time in human history, it has radically changed the way governments, corporations and individuals interact. In its inception, cyber security played a friendly role in protecting the limited information available on the world wide web. Currently, a darker side of cyber security, developed in the name of protecting U.S. citizens, has radically changed the U.S. government’s approach to cyber protection. U.S. citizens and other governments have been shocked to learn that their phone calls and their data is all open to scrutiny by the U.S. government. People and organizations, such as Snowden and Wikileaks, have begun to fight back to reestablish the balance of civil liberties and cyber security. The future of this critical issue is yet to be written, but it is clear that cyber security hackers will become increasingly sophisticated, requiring additional intervention to ensure citizen safety. Indust rialization of new viruses and digital weapons could truly change the balance of power between countries and threaten our way of life as we know. In the past, mercantilism allowed countries with the most land to maintain the greatest power, yet now this reality has taken a paradigm shift. The country with the most readily available digital warriors and resources will triumph in this new world order. Cyber security was developed to help protect law abiding citizens, but the balance has begun to dangerously tip. Many Americans believe that the civil rights, upon which our country was founded, are now severely threatened in the name of digital protection. Cyber security issues will most likely bring about a retrenching of how we share information. The global openness of the world wide web as we now know it will likely become a thing of the past as organizations react to the cyber security enemy and build dedicated communications platforms that deny access to the world. What the world h ad built as an open platform is now destroying itself from the inside out. Citations: Kaufman, Micha. The Internet Revolution is the New Industrial Revolution. Forbes. Forbes Magazine, 5 Oct. 2012. Web. 30 Apr. 2014. Klimas , Liz . Connecting the Dots: A Timeline of the NSA. The Blaze 3 June 2013, Technology ed.: n. pag. Print. Lawrence , Dune . The U.S Government Wants 6,000 New Cyberwarriors by 2016.Bloomberg Businessweek Technology 15 Apr. 2014, Technology ed.: n. pag. Print. McCracken, Harry . SXSW: Edward Snowden Has No Regrets About NSA Leaks. TIME 10 Mar. 2014: n. pag. Print. Riley , Michael. Snowdens Access to NSAs Deepest Secrets Disputed. Bloomberg Businessweek Technology 18 July 2013, Politics Policy ed.: n. pag. Print. X. Cringely , Robert . A History of the Computer. PBS. PBS, 1 Jan. 1996. Web. 30 Apr. 2014. [1] http://idcdocserv.com/1414 [1]better closing present and tying it to the thesis and main idea of paraagraph [2]j

Friday, January 17, 2020

Bim Revolutionise Qs Profession

1) Introduction 2) Building Information Modelling (BIM), how it may revolutionise the QS profession 3) The Differences Between CAD and BIM 4) Highlight and discuss the future strategic skills of QS due to the advent of BIM and such like 5) References Introduction Nowadays, the advent of information technology era has ushered in Building Information Modelling (BIM). ? It is an innovative new approach to building design, construction and management which has been introduced by AUTODESK (2002). ? BIM have an impact on most areas of business management and operation. It changed the way industry professionals worldwide think about how technology can be applied to building design, construction and management. ? It will revolutionise methods of working and redefine the relationships between construction professionals. ? It will challenge current thinking on contracts and most importantly, it will support the integration of the design and construction teams. ? BIM supports the continuous and immediate availability of project design scope, schedule and cost information that is high quality, reliable, integrated and fully coordinated. BIM provide a visual aspect of the design, hence simplifying the work on the construction site. Thus, Building Information Modelling (BIM) may be considered as the current state of art in CAD developments. ? Advances in drawing technology which is Computer Aided Drawing (CAD) make the researchers and practitioners working hard to exploit CAD data in order to generate Bills of Quantities. ? Currently it is being implemented by a significant number of architectural and engineering practices, and has the potential to revolutionise the quantity surveying profession. An effective definition of BIM is provided by Schwegler, he process of creating an information database for a project in which lifecycle information is expressed in an interoperable manner to create, engineer, estimate, illustrate and construct a construction project. †¢ In this system, the design data will be kept in digital form which will make it easier to update-better coordination and it will be more valuable to the industry professionals. †¢ Apart from that, creating real-time, consistent relationship between digital design data with innovative parametric building modelling technology Can save significant amount of time, money and increase the project productivity and quality The Differences between CAD and BIM Building Information Modelling (BIM), how it may revolutionise the QS profession Due to the auto-measurement created by BIM we are able to inform the design as it develops with the knowledge of quantity and cost, not just measure and cost the design, which is often too late. Apart from that it will also facilitate the preparation of accurate estimates. |The process of taking the existing design information at design development stages and modelling it in 3D are used in terms of the | |identification and as an aid to eliminate clashes and co-ordination errors. |Once we developed the 3D modelling and process it to dynamically populate Bills of Quantities and specification from models. | |The BIM services became in demand by being able to compete on cost with traditional methods but able to respond faster and benefits of | |the core process of modelling to provide a visual record of what has been measured where. | Therefore the quantity surveyor does not have to do estimates and measurement for the project. Thus, the quantity surveyor does not have to do Bills of Quantities and specification for the project. Using BIM is like we use the best available technology to do things faster and better, and eliminate waste and repeated work. In order to avoid the inefficiencies we need to normalise data, enter information once and reuse it many times, turning data into an asset in which it could be as simple as entering the name and address of a supplier once at the inception stage of a project. When we enter the supplier’s information, automatically current price of the item will be inserted in the digital data information. The core process of 3D modelling for measurement produces model that can be divided for many other purposes at marginal cost. For instance ? clash detection, ? construction sequences ? printing physical models ? presentation and visualisation, ? speeding up the process of understanding information about the project ? communicating it to those who are not so adept at reading drawings Apart from that, the mode of communication between the construction professionals also changed due to introduction of BIM in the construction industry. This is because, the building product model is used as a tool to communicate with other professionals about costing where this situation will reduced the QS time spend in communicating with architects, engineers, contractors and client. By using this building product model, people will get a clearer view in what the QS explained about. Next, with the introduction of BIM, the progress of works in all stages will be reduced. This is due to the sophisticated software where any correction on the drawing will be automatically updated on the building model and there is no need for other profession to revise their works. If any disputes occur, they can just refer to building model to justify or make any amendments. Highlight and discuss the future strategic skills of QS due to the advent of BIM and such like At the end of twentieth century, many challenges had been faced by the profession. With the increased activities associated with the information technology in which removed some of the repetitive tasks related to their work make the profession to develop and utilise their skills more fully. For instance, from solely considering initial costs of construction emphasis which then shifted to identifying and adding value to the development processes. ? The quantity surveyor need to expand their skills, expertise and client based in order to survive. The 21st century quantity surveyor should be a resource primed to add value to the entire development process by the unique menu of skills and competencies. ? The knowledge driven services provide competencies that should encourage â€Å"service mix†. It is like retooling the traditional skills and require expansive of new streams of knowledge to face the challenges. Thus, a quantity surveyor firm should specialize in a selection of the se services which has been organized in cognate clusters. Therefore, they have to differentiate its services portfolio. 1. Financial advisory services | |Investment appraisal | |Financial analysis | |Life cycle costing | |Expenditure statements for taxation and account purposes | |Capital allowance management | 2. Management Advisory Services | |Feasibility studies | |Cost planning / management | |Property management | |Facility management | |Asset management | |Risk management | |Conditions survey | |Value management and analysis | |Replacement cost for insurance purposes | 3. Procurement Management | |Preliminary cost advice | |Estimating, measurement and quantification with the help of BIM | |Advising on contractual methods | |Advising on the contractor’s selection | |Preparing tender documents | |Obtaining or negotiating tender bids | |Valuing construction work | |Preparing and agreeing accounts with contractors | |Cost control and post contract management | |Project management and coordination | |Scheduling and planning | 4. Legal advisory services | |Expert testimony / litigation support | |Arbitration | |Dispute and conflict management (ADR) | |Advice on claims preparation and claim defense | |Contract auditting | The general orientation is that the QS profession has shifted from a mere technical function to a more managerial function within the context of the market place It is rather a deepening of expertise in the core traditional function while adding on other competencies as dictated by the market place. Apart from that, a quantity surveyor should develop inter-personal skills in order to survive in this competitive environment. The traditional professional service posture is sales oriented rather than marketing oriented. We should know that the era when clients consulted the consultants has long disappeared. Nowadays, the consultants are compelled by the market to ‘consult’ potential clients it is like ‘reverse consulting’. Therefore whilst ‘sales orientation’ focuses on ‘selling the professionals’ services to the customer/client, ‘marketing orientation’ develops new services to suit the client’s changing needs. |Selling |Marketing | |a |Emphasis on product |Emphasis on customer/clients wants | |b |Company first makes the product and figures out how |Company first determines what customer/clients wants and make | | |to sell it |product/services to satisfy those wants | |c |Planning is short-run oriented in terms of today’s |Planning is long-run oriented in terms of new products, tomorrows| | |products and markets |market and future growth | The quantity surveyor must now provide clients with strategic advice at a much higher level than previously actions. We must place ourselves higher up in the agenda by providing strategic advice at entire group of people, advising on how best to manage the entire cost and property portfolio. Quantity surveyor is a professional who is able to analyse construction into its cost significant elements and functions, able to translate and extract the key quantity and cost elements of drawings and specifications into contract documents that then enable the delivery of best value for money through an understanding of construction, economics and management’, as opine by Westcott and Burnside (2003). Apart from that, quantity surveyor should set good benchmarks for its current cost levels, set up a source of cost information which keeps pace with the growing industry needs and critically analysis project costs. The quantity surveyor should have communication skills in order to adapt with the fast changing of construction industry. We should be an effective communicator and to get our point across without misunderstanding and confusion. The content of our message should be clear enough for them to understand, concise, accurate, and well-planned communications. Apart from that, the quantity surveyor needs to enhance themselves in information technologies where it is also known as computer skills. It is because BIM only relies on those skills. They should master the basic computer skill as well as the complex computer skills in case they have problem with the software. In this era, those who do not know how to operate the computer device will be left far way behind the successful people. Thus, it is necessary for the quantity surveyor to master the computer skills and vast knowledge in information technologies. REFERENCES †¢ BUILDING INFORMATION MODELLING – REPORT MARCH 2011www. thenbs. com/bim TOTAL COST MANAGEMENT AT THE DESIGN STAGE USING A BUILDING PRODUCT MODEL by Wilfred Masuwa Matipa [BSc (Hons), MSc, PGCertTT, MAACE, MCIOB] †¢ BUILDING INFORMATIUON MODELLING AND QUANTITY SURVEYING PRACTICE by O. A. Olatunji, W. Sher and N. Gu Emirates Journal for Engineering Research, 15(1), 67-70(2010) †¢ http://m. building. co. uk/qs/rise-of-the-machines-bim-and-qss/5019945. mobile †¢ http://m. building. co. uk/buildings/project-stage/the-use-of-force-building-information-modelling/5007579. mobile ———————– Construction Industry Professionals Computer Aided Design (CAD) Auto CAD Design Tools Facilitate speed Enhance quality of design Traditional approach To plan manually To design manually To take off manually Building Information Modelling (BIM) Transform 2-dimensional CAD designs Virtual 3-dimensional building model Transform construction industry To computer-based working environment Satisfy client’s requirement 2-dimensional CAD tools Used by designers to Plan Sketch Design The buildings Plan Section Elevation Perspective views of the building Mistakes and discrepancies found If architect want to change the front and back design of the building Need to edit elevation sections of the drawing Need to inform the structural engineer, QS, for amendments BIM Complete virtual building model Formulated by input all design construction information into BIM software Encompass all information of the project Design data Performance data Quantities of material Specification of material Appropriate construction sequence External environment constraints Best construction approach Time line of the project Assist construction professionals from Preliminary stage Operational period of building after completion A change in building model will automatically amend all other related information By entering the command of deleting a section of wall, the design data of wall, windows, and doors will be omitted instantly Change in cost and performance and other aspects of the building will be adjusted accordingly

Thursday, January 9, 2020

Southwest Airlines Organizational Behavior Culture

SWA Organizational Behavior Culture Southwest Airlines’ Success through Organization Culture Kristin Philip Abstract This paper, Southwest Airlines’ Success through Organization Culture gives an account of the development of the organizational culture of Southwest Airlines. The paper starts with the background of Southwest and its development over the years. The paper explains the unique culture of Southwest, and how it has helped Southwest Airlines to face challenges. The paper also describes how Southwest Airlines responded to the situation arising out of the September 11 terrorist attacks which dealt a severe blow to the airline industry. Southwest Airlines’ response to the crisis was shaped by its organizational culture, which†¦show more content†¦Southwests success is not due to one particular organization theory or another, but rather to the overwhelming consistency among them, a configuration of mutually consistent practices rather than a single key practice. With a mixture of the human relations movement and the total quality management, Southwest made a place for its elf in the airline industry. Southwest management saw that McGregor’s Theory Y explained by Kinicki Kreitner would be a practice that would help productivity and employee well-being. McGregor’s theory Y proposed that managers could accomplish more through others by viewing them as self-energized, committed, responsible and creative beings. Southwest recognized that if an organization can provide job satisfaction to their employees, the satisfaction will trickle down to the customers that they serve. The satisfaction has a domino effect with the customers that the employees come in contact with. Customer satisfaction leads to customer loyalty, contributing to the profit of Southwest. Along with human relations, Southwest has a total quality protocol in when they hire their employees. Southwest places a great deal of importance on hiring people with the right attitude--people with relational competence--you cant be an elitist.Show MoreRelatedOrganizational Behavior Com munication Paper1190 Words   |  5 PagesSouthwest Airlines Organizational Behavior amp; Communication Paper Erica Sepulveda Communications for Accountants/Com 530 January 30, 2012 Southwest Airlines Organizational Behavior amp; Communication Paper Airlines, such as Southwest Airlines, strive to provide the best customer service that they can offer to keep their customers happy. A prospective Southwest passenger may probably make their reservation by calling the customer service number, logging onRead MoreControl Mechanism1416 Words   |  6 PagesSouthwest Airlines: Control Mechanisms Southwest Airlines is a dynamic organization that is researched and studied by many. One reason for this attention is the positive corporate culture. This culture attracts dynamic people to the organization who are encouraged to be innovative and grow as leaders while supporting and promoting the mission of the airline. This culture was established through effective planning, organizing and leadership. To maintain this culture and the success of the airlineRead MoreIntroduction for a Successful Company Essay762 Words   |  4 PagesSuccessful Company: Southwest Airlines Eileen Bertera Southern New Hampshire University Executive Summary Upon review on a profile of a successful company we see Southwest Airlines as a prime example. Their ability to recognize weakness in their management system and adjust strategies has allowed them to emerge as a leader in the US airline industry. Southwest is the largest US low fare carrier with low fare rates, no additional fees and excellent customer service. Southwest Airlines currently hasRead MoreSouthwest Airlines: Organizational Commitment and Communication Paper1231 Words   |  5 PagesSouthwest Airlines: Organizational Commitment and Communication Paper Communications for Accountants COM/530 Southwest Airlines: Organizational Commitment and Communication Paper    Southwest Airlines’ strong organizational culture is reflected in its mission as shown in its website: â€Å"dedication to the highest quality of Customer Service delivered with a sense of warmth, friendliness, individual pride, and Company Spirit.† Southwest is a company that not only excels in customer serviceRead MoreOrganizational Culture and Change in Southwest Airlines1426 Words   |  6 PagesOrganizational culture and change in Southwest Airlines Organizational Culture and Change Introduction Organizations like the Southwest Airlines all have a culture, which demonstrates how the organization works and usually acts as its motivational tool. An organizational culture is important to the organization, as it is the major element in helping attain the organizations goals and objectives. Cultures in organizations are vast, with different organizations adopting their own type of cultureRead MoreHow Communication Affects Organizational Leadership1328 Words   |  6 PagesHow Communication Affects Organizational Leadership, Motivation, and Commitment Within any organization the elements of leadership, motivation, and workforce commitment are inextricably meshed with the effectiveness of communication. Organizations develop their respective cultures through communication among leadership and with all employees, regarding their mission, values, and goals (Robbins Judge, 2007). Formal and informal leaders within organizations use communication to motivate othersRead MoreSouthwest s The Dominant Airline Beloved By Shareholders, Customers, And Employees1145 Words   |  5 Pagesand pleasure, Southwest quickly became my favorite airline. At that time with a young son and parent in New Hampshire, they had a non-stop flight from Kansas City to Manchester. I recall on one flight the flight attendant while descending over the PA sang the following: â€Å"I love you, you love us we’re much faster than a bus.† This song embodies the spirit of Southwest and why I mention this story from over a decade ago. I want to ascerta in what make Southwest the dominant airline beloved by shareholdersRead MoreCulture Is The Shared Values And Beliefs That Shapes An Organization1117 Words   |  5 PagesOrganizational culture is the shared values and beliefs that shapes an organization (Bethel, 2016). Further, organizational culture defines how the employees and leadership treat each other and others (Parnell, 2014). Honestly, it appears Southwest has captured pieces of both an adaptive and inert culture. Why? Adaptive culture exhibits trust, employee involvement, positive change, and a willingness to embrace change relevant to their core values (Parnell, 2014). Check, Southwest meets the criteriaRead MoreSouthwest Airlines1012 Words   |  5 PagesCase 10.3 – Servant Leadership Takes Flight Southwest Airlines is well known that they have the best customer services. Their Golden Rule is â€Å"treat people the way you want to be treated.† The airline’s mission statement is posted every 3 feet at all Southwest locations. For example, one time the weather was bad, so passengers had to be on the plane for a long time. A frantic mother asked the flight attendant to get off the plane just a moment in order to buy food for her hungry toddler. The attendantRead MoreSouthwest Airlines : The Highest Levels Of Emotional Intelligence1076 Words   |  5 Pages Southwest Airlines is known as one of the most caring and considerate companies. Since 1971, Southwest Airlines has prided itself in their exemplary customer satisfaction and family like approach to customers. American Airlines excels in many areas, but the ones that will be discussed are emotional intelligence, and cultural organization. More often than not, developing these areas are easier said than done. Emotional Intelligence is defined as the â€Å"ability to understand emotions and manage relationships