Thursday, December 26, 2019

Social Engineering Is A Powerful Tool Used By Cyber Criminals

It is the manipulation of people through deception, lies, fabricated story and tricks. They influence and persuade people to obtain information with or without the use of technology. Social engineering is a powerful tool used by cyber criminals’ especially on seniors because of their level of trust. They aim at collecting your confidential information and later use it against you. Password, Account number – credit card, debit cards, employee ID, and full name, date of birth, email address, social insurance number, driver license number and telephone numbers are normally collected Knowing the person you are dealing with, and the tactics they use is important to overcome them, that is why user awareness and education is critical Common methods used †¢ Phishing: The practice of sending you emails with a link appearing to be from a reputable source. Be vigilant and do not to be deceived by the content. For example the content will read like â€Å"Visit the web site indicated in the email and verify your personal banking information†. They use this method to collect confidential information from you. Do not respond to emails unknown to you or you are not aware of especially unsolicited mails. Do not open an attachment unknown to you or click on a link when asked by an unknown person, always think twice and be diligent. Look at the email address, domain name, the salutation and the language used in the mail and the urgency required, before deciding to act as most of these are fromShow MoreRelatedSocial Engineering Is A Powerful Tool Used By Cyber Criminals1769 Words   |  8 PagesSocial Engineering It is the manipulation of people through deception, lies, fabricated story and tricks. They influence and persuade people to obtain information with or without the use of technology. Social engineering is a powerful tool used by cyber criminals’ especially on seniors because of their level of trust. They aim at collecting your confidential information and later use it against you. Password, Account number – credit card, debit cards, employee ID, and full name, date of birth,Read MoreComputer Security And Social Engineering3915 Words   |  16 PagesComputer Security and Social Engineering In terms of computer security, Social Engineering refers to the psychological manipulation of people in order to access confidential information. It is believed that it can be easier to trick people than to hack into their computing system by force. Social engineers gather personal information or gain access to computers by exploiting people’s natural tendency to want to trust others and be helpful. Some methods that are used by social engineers to gain informationRead MoreA Thesis On Computer Science Engineering9162 Words   |  37 PagesBOTNET FRAMEWORK A Thesis Submitted In Partial Fulfillment of the Requirements For the Degree Of MASTER OF TECHNOLOGY In Computer Science Engineering By CHANCHAL AHLAWAT (Enrollment no: 21341314013) Under the Supervision of Mr. ANCHIT BIJALWAN Uttaranchal University, Dehradun, Uttarakhand) To the Faculty of Computer Science Engineering UTTARANCHAL UNIVERSITY DEHRADUN May, 2015 CERTIFICATE Certified that Chanachal Ahlawat (21341314001), has carried out the research work presentedRead MoreThe Growing Problem of White Collar Crimes in India19963 Words   |  80 Pages people will lose faith in us†- Dr Radhakrishnan Methodology The research methodology used for the present research article is traditional Doctrinal research method. As most of the information can be sought form the available literature. So the researcher has chosen doctrinal method as method of research for the present article and has used books, journals, research articles for preparation of the same. Objectives of the study The main objectives of the researchRead MoreSocial Media6807 Words   |  28 PagesSocial Networks and their impact on Availability, Confidentiality and Integrity Musa Ramadhani Davenport University IAAS 667 - Legal and Ethical Security Topics Deanne Cranford-Wesley Table of Contents Abstract3 Introduction4 Problem Statement7 Literature Review8 Findings11 Military Families12 Identifying your social media users16 Common myths about Social Media17 Data leakage and non-disclosure17 Social Media Squatting18 A new generation of hackers18 The high cost of inaction19 Read MoreSocial Media And Its Effects On The Internet2870 Words   |  12 PagesAbstract Social networking websites are the most prominent websites on the Internet. Millions of people use them every day to interact and connect with family, friends, and loves who maybe far away or within big businesses organizations, and schools. Social networking websites like Twitter, Facebook, LinkedIn and Google Plus and Google Handouts seem to be the most popular websites on the Internet. Social networking privacy issues have ruled the headlines in the first half of 2011. With most social networksRead MoreCore Banking Solutions12901 Words   |  52 PagesOf Core Banking Solutions (CBS) Objectives of the Project Work: The major objectives of this project work are to: †¢ To evaluate the advantages and disadvantages of CBS over traditional banking system †¢ To explore the technology used in CBS with special reference to Shreyas Grameen Bank. †¢ To identify and discuss various issues related with the automization of Banks. †¢ To define various Core Banking Services provided by Indian Banks. †¢ To identify andRead MoreFactors Influencing Enhanced Data Security Essay9883 Words   |  40 Pagesgovernment body which regulates all operations of commercial banks, controls the monetary policies as well as revoking banking licenses. Cyber-crime- this refers to all attempts by hackers to access information, manipulate and transfer unauthorized data or information. Data breach- This is any access of information by unauthorized people ICT Department- this shall be used to describe the department within the corporate which deals with handling of data and managing MIS. Hacker- this is a person who knowinglyRead MoreA Study of How to Promote the Use of Mobile Payment4519 Words   |  19 Pages209KM Research Methods Project Proposal A study of how to promote the use of mobile payment This example is for discussion, not used as a model of good report Table of Contents 1 Title 1 2 Aim 1 3 Objectives 1 4 Background 2 5 Critical review of relevant literature 3 5.1. Basic Mobile Payment Types 3 5.1.1. Mobile Fees Account Payment 3 5.1.2. Bank Card Mobile Payment 3 5.1.3. Token based Mobile Payment 4 5.2. Mobile payment choice 5 5.3. Factors that influenceRead MoreThe Pros and Cons of Cloud Computing3785 Words   |  16 Pages(IS) to the client by slipping into the role of a CIO on the receiving side and a sales person on the giving side respectively. â€Å"Cloud† is more a term than a definition, much like â€Å"web 2.0†, which describes a conglomerate of modern, dynamic and social web services. CC refers to a concept where the user gets computing and storage capacity without owning it, everything happens beyond his senses, in the â€Å"cloud†. The concept dates back to the 60s where the ideas of global computing networks shed the

Wednesday, December 18, 2019

Evidence Based Management Hr - 776 Words

Evidence-based management (EBMgt or EBM) is an emerging movement to explicitly use the current, best evidence in management decision-making. Its roots are in evidence-based medicine, a quality movement to apply the scientific method to medical practice. Evidence-based management entails managerial decisions and organizational practices informed by the best available scientific evidence. Like its counterparts in medicine (e.g., Sackett, et al., 2000) and education (e.g., Thomas amp; Pring, 2004), the judgments EBMgt entails also consider the circumstances and ethical concerns managerial decisions involve. In contrast to medicine and education, however, EBMgt today is only hypothetical. Contemporary managers and management educators make†¦show more content†¦Working with the Society for Industrial/Organizational Psychology, The EBMgt Collaborative commissions practitioner-focused summaries of best evidence for the SIOP publication Science You Can Use. Critical theorists have raised objections to the movement (Learmonth amp; Harding, 2006; Learmonth, 2006). In particular, it has been criticised for treating evidence and scientific method as if they were neutral tools. From this perspective, management is not necessarily an automatic good thing - it often involves the exercise of power and the exploitation of others. Efforts have been made, however, to include a balanced treatment of such issues in reviewing and interpreting the research literature for practice (Rousseau, Manning amp; Denyer, 2008). ------------------------------------------------- Research in management science Some of the publications in this area are Evidence-Based Management (Pfeffer amp; Sutton, 2006), Harvard Business Review (Pfeffer amp; Sutton, 2006), and Hard Facts, Dangerous Half-Truths and Total Nonsense: Profiting From Evidence-Based Management (Pfeffer amp; Sutton, 2006). Some of the people conducting research on the effects of evidence-based management are Jeffrey Pfeffer, Robert I. Sutton, and Tracy Allison Altman. Pfeffer and Sutton have recently opened a web siteShow MoreRelatedHuman Resource Management Essay1735 Words   |  7 Pages60-61, question 4: What is â€Å"evidence based HR†? Why might an HR department resist becoming evidenced based? The concept of evidence based HR is using specific tools (key performance indicators) to help clarify course of action, identify errors or omissions, and align HR to corporate strategy. It is a decision-making process combining critical thinking with use of the best available scientific evidence and business information (Rousseau Barends 2011). It forces HR professionals to measure theirRead MoreStrategic Planning : Mission And Strategic Objectives1543 Words   |  7 PagesStrategic planning is one of the most critical human resource management challenges facing both the private and public health sectors in today’s market. Strategic planning can equip University Hospital with the methodology to go from a decentralized platform to a centralized platform. Effective strategic planning requires a strong Human Resources department and also strong executive leadership as well. This will help show a clearly articulated vision, mission and strategic objectives. StrategicRead Mor eThe Impact Of Hr And Hrm On An Organization Essay1032 Words   |  5 PagesResearch Provided by Scholars Based on the research done by scholars, HR and HRM are associated with organisational activities such as recruitment, development and management of its employees and how they contribute to the skill, knowledge and motivation of the employee. As a result of these HR practices and their management, employees are seen as a source of sustainable competitive advantage. But is it fair to assume the effect of HR and HRM on an organisation based on the research done by scholarsRead MoreHrm Hr Sub-System1303 Words   |  6 PagesThe Major HR Management Subsystems in Organizations Today There are several ways to conceptualize the structure and means for organizing the  HR system  in an organization. The first, and perhaps most familiar, is the  functional method  (Rothwell,  Prescott, amp; Taylor, 1998). In this approach, HR management is organized into units such as employee relations, training, compensation and benefits, and payroll. Each is considered a function because it bears specific responsibilities for the organizationRead MoreLearning Experience in Hr1510 Words   |  7 PagesLearning Experience Journal Entry #1 Ileana Salcedo Walden University Human Resource Management 6220-10 Dr. Robin Kirschner February 29, 2012 Learning Experience Journal Entry #1 A learning experience is a process of understanding through direct experience. This process helps future leader learn from experts, and what is learned can then be adapted to your own style. The purpose of the learning experience is to gain knowledge in the role of the Director of Human Resource and the relationRead MoreThe Role of the International HR Manager Essay1347 Words   |  6 PagesThe Role of the International HR Manager For many people international HR management (IHRM) is synonymous with expatriate management. IHRM, however, covers a far broader spectrum than just the management of expatriates. It involves the worldwide management of people. Although International HR (IHR) managers undertake the same activities as their domestically-based colleagues, the scope and complexity of these tasks will depend on the extent of internationalisation of the organisation. In thisRead MoreRelevance of Fit Between Hr Strategy and Business Strategy1426 Words   |  6 Pagesrelevance of fit between HR strategy and Business strategy. Concept of ‘fit’ in strategic HRM Nadler and Tushman (1980) defined congruence or fit as the degree to which the needs demands, goals, objectives and/or structure of one component are consistent with the needs, demands, goals, objectives, and/or structure of another component† (as cited in Boon, 2008). Fit between  HR Strategy and business strategy According to U.S. Office of Personnel Management (1999), fit between HR strategy and businessRead MoreHuman Resource Management Practice Strategies1770 Words   |  7 PagesHuman Resource Management Practice Certain combinations of human resource management practices lead to superior outcomes for organizations. The HR combination department is at the heart of organizational performance, productivity, turnover, profits, and market value outcomes. Employees are considered a source of non-duplicable and sustainable competitive advantage. By using the combinations in capabilities, resources, relationships and decisions presented by employees, organizations strategicallyRead MoreHuman Resource Structure807 Words   |  3 Pagescommon to all organizations, especially to the big company like Tianyang Food, a food production company in China. HR department act as the support for the organization in the likes of law, compensation, benefit, safety and health of the employees and the organization. However, the improper management from the HR structure can put the organization in a very difficult situation. Based on the case study, an employee named Lu Yueting had poisoned the dumpling in the company by using a piston becauseRead MoreDesign and Implementation of Sets of Strategic Human Resource Management Practices 1694 Words   |  7 Pageslack coherence and consistency, primarily because the concept of fit is still so little understood. Strategic human resource management refers to managing people in organizations proactively, such that it helps a business gain competitive edge. It is directed by the organizational strategy, as opposed to human resource management which aims to on better management of people only. SHRM is gaining widespread popularity due to the inducement that it provides of supporting the organizational strategy

Tuesday, December 10, 2019

Area of Law Anti-Money Laundering Laws

Question: Discuss about united kingdom laws regarding money laundering and terrorist funding- is it adequate? Answer: Introduction: Money Laundering is a system of transfer and utilization of money which conceals the original illegitimate source of that money. In general terms, it can be identified as the transferring the money to any foreign bank or use the money in any legitimate business. The terrorist funding is also associated crime with money laundering process. Terrorist funding is a process of providing finance to the terrorist by way or donation or profit from the legitimate business. Money laundering is a part of it. In this paper, the researcher attempts to the actual picture of the United Kingdom and its legislative structure about the money laundering and terrorist funding. The research will find out the extent of effectiveness of those laws to act on the money laundering and terrorist funding. Statement of problem: The topic is very relevant in the contemporary world. The main focus of the researcher is to give emphasis to the legal framework of England in regards to money laundering and terrorist funding. The researcher will mainly focus on the adequacy of those legislations. Aim and objective: The main of the researcher is to: To establish a connection between the money laundering and terrorist funding. To analysis different anti-money laundering and associated laws. To analysis the effectiveness of those laws. Research question: Whether the terrorist funding is associated with money laundering in the United Kingdom? Whether the laws are adequate to eradicate these issues? What are those prominent steps taken by the government to eradicate the issue? Literature Review: The money laundering is a very common phenomenon the United Kingdom. Many people and business organizations used to generate black money and transferred those to business or foreign banks. Concentrating to monetary services specialists, bankers, advocates, authoritarian agencies, inspectors, and investigators, gives the historical backdrop and argues the basis of dirty money which create a problem for financial institutions. The United Kingdom faces big money laundering cases like the Pizza Connection and the Brinks Mat gold laundering etc. In the United Kingdom, there are several laws to combat with the money laundering and terrorist funding. Mainly, the Money Laundering Regulations 2007, Proceeds of Crime Act 2002, Terrorism Act 2000, Anti-terrorism, Crime, and Security Act 2001 are the laws that govern the process of money laundering and terrorist funding. United Kingdom legislators structured the Anti-money laundering laws in such a way that can provide protection to the financial institution. Research methodology: The research is resolute to complete by the qualitative method. The research would rely on the analytical and doctrinaire process of research. It would be carried out by primary and secondary resources. The primary sources would include the legislations, cases and government reports, and policies. The secondary sources include articles, books, and journals. As per the research, the information will be collected from different case studies regarding the money laundering and terrorist funding. Bibliography: Books: 1. Bennett T,A Practitioner's Guide To Money Laundering Compliance(LexisNexis UK 2004) 2. Bosworth-Davies R and Saltmarsh G,Money Laundering(Chapman Hall 1994) Articles: 1. Chizu Nakajima D, 'Intensified Efforts To Fight Money Laundering And Terrorist Financing More Changes For The UK Financial Services Industry?' (2006) 9 J of Money Laundering Control 2. Simser J, 'Terrorism Financing And The Threat To Financial Institutions' (2011) 14 J of Money Laundering Control 3. Rowan Bosworth-Davies and Graham Saltmarsh,Money Laundering(Chapman Hall 1994) 4. Dr Chizu Nakajima, 'Intensified Efforts To Fight Money Laundering And Terrorist Financing More Changes For The UK Financial Services Industry?' (2006) 9 J of Money Laundering Control 5. Rowan Bosworth-Davies and Graham Saltmarsh,Money Laundering(Chapman Hall 1994) 6. Tim Bennett,A Practitioner's Guide To Money Laundering Compliance(LexisNexis UK 2004). 7. Jeffrey Simser, 'Terrorism Financing And The Threat To Financial Institutions' (2011) 14 J of Money Laundering Control 8. Dr Chizu Nakajima, 'Intensified Efforts To Fight Money Laundering And Terrorist Financing More Changes For The UK Financial Services Industry?' (2006) 9 J of Money Laundering Control.

Monday, December 2, 2019

Steve Jobs Leadership Traits free essay sample

In 1976, Jobs and Wozniak founded Apple Computer (Wikipedia, 2008). By 1980, Apple had already released three improved versions of the personal computer and successfully became an important player in the nascent personal computer industry. In December 1980, Apple Computer went public, making Jobs a multimillionaire (Chandy, 2005). In 1983, Jobs lured John Sculley away from Pepsi-Cola to serve as Apple’s CEO to manage Apple’s expansion. However, as the Macintosh took off in sales in the following year, Sculley felt Jobs was hurting the company and persuaded the board to strip him of power. Therefore, in May 1985, the board dismissed Jobs from the post of the head of Macintosh division (ICMR, 2002). Determined to create great new hardware products, Jobs leaved Apple and founded NeXT. After years of sluggish sales, Jobs shut down its hardware division in 1993 and repositioned it as a software company (Angelelli, 1994). It was the nadir of Jobs’ career. Nevertheless, Jobs also acquired LucasFilm, a movie studio, and incorporated Pixar Animation Studios. We will write a custom essay sample on Steve Jobs Leadership Traits or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The first film produced by the partnership with Disney, Toy Story, brought critical acclaim to the studio when it was released in 1995 (Wikipedia, 2008). In 1996, Apple bought the NeXT to welcome Jobs back to the company. He soon became Apple’s interim CEO after the directors lost confidence in CEO Gil Amelio. Jobs purged the board and started to take drastic measures to save the company. He cancelled dozens of research projects and cut spending wherever he could. Besides, the introduction of iMac was also a stunning success and made Apple to become the industry’s most innovative company. As Jobs’ leadership of Apple had proven efficient, he took over as Apple’s permanent CEO in 2000 (All about Steve, n. d. ). As of today, Jobs has managed his way back to the top. Throughout his career, he has been humiliated and experienced business failure. Yet he is now regarded as one of the most prominent figures in both computer and entertainment industries and the visionary leader of iconic Apple. In 2007, he was even named the most powerful businessman by Fortune Magazine (Reuters, 2007). 3. 0 Overview of Leadership Trait Theory – Big Five Model of Personality According to Lussier and Achua (2007), traits can be defined as distinguishing personal characteristics, and personality is a combination of traits that classifies an individual’s behavior. Therefore, leadership trait theories were developed to identify the personal traits that clearly differentiate leaders from followers (Northouse, 2007). One of the most widely recognized personality models is the Big Five Model of Personality, which can be used to describe the most salient aspects of personality traits. The dimensions comprising the Big Five model are surgency (or extraversion), agreeableness, adjustment (or neuroticisim), conscientiousness and openness to experience (Goldberg, 1990). Surgency represents the tendency to be sociable, assertive, active, and to have positive energy (Barrick and Mount, 1991). It includes leadership and extraversion traits. People strong in surgency like to lead and want to be in charge (Lussier and Achua, 2007). Agreeableness consists of tendency to be kind, gentle, trusting and trustworthy, and warm (Judge and Bono, 2000). It includes traits related to getting along with people. People strong in this area are typically characterized as easygoing, compassionate, friendly and sociable (Lussier and Achua, 2007). Adjustment, is often labeled by its opposite, neuroticism, which is the tendency to be depressed, anxious, fearful, vulnerable and hostile (Judge and Bono, 2000). It covers the traits related to emotional stability. People strong in adjustment are always characterized as being good under pressure, having self control, being calm, secure and positive (Lussier and Achua, 2007). Conscientiousness is comprised of two related facets: achievement and dependability. Conscientious individuals tend to have a strong sense of direction and work hard to achieve goals. Therefore, they are hard working, go beyond the call of duty and have a strong desire to achieve success (Bono and Judge, 2004). Finally, openness to experience represents the tendency to be creative, imaginative, perceptive and thoughtful (Judge and Bono, 2000). It contains traits related to being willing to change and try new things. These individuals are risk takers, free thinkers and creative (Lussier and Achua, 2007). . 4. 0 Steve Jobs’ Leadership Traits Self-confidence indicates whether an individual is self-assured in his judgments, decision making, ideas and capabilities (Lussier and Achua, 2007). It includes a sense of self-esteem and self-assurance and the belief that one can make a difference. Jobs has a strong self-confidence in his ability to solve problems and make decisions. He has commented that â€Å"you have to trust in something – your gut, destiny, life, whatever. This approach has never let me down, and it has made all the difference in my life. † (Stanford News Service, 2005) Thus, he states that it is essential to believe that what we do is great; otherwise our activity is doomed to failure. Another example of Jobs communicating his self-confidence comes rom the very fact that of introducing the innovative idea of iPod. When he first spoke about the idea of iPod to his employees, they questioned the success of the idea and were reluctant to work on it. However, Jobs were confident in his idea and he motivated and inspired them to work on it. As a result, this not only changed the fortunes of Apple but also instilled respect for Jobs in the minds of his employees as one of the best leaders of his era (Steve’s Comeback Jobs, n. d. ). Most studies on leader self-confidence found that it is strongly related to effectiveness. In the study of critical incidents by Boyatzis (1982), he suggested that self-confidence differentiates between effective and ineffective managers (Yukl, 2006). Kirkpatrick and Locke (1991) also postulated that self-confidence is one of the â€Å"right stuffs† for effective leaders. It is an ingredient that separated the leaders from the followers, and is essential for commanding respect and arousing followers (Hang, 2006). Self-confidence is best categorised as the conscientiousness Big Five dimension because people who are dependable often have high self-confidence and high energy (Lussier and Achua, 2007). In addition, Jobs is an extravert. Extraverts are outgoing, like to meet new people, and are willing to confront others (Lussier and Achua, 2007). They tend to enjoy human interactions and spend more time in social situations (Judge, Heller and Mount, 2002). This trait is demonstrated by Jobs in his behaviour that when Apple decided to advertise during the beginning, the agency wanted to use Jobs talking about his creation. A move he gladly agreed to. He was also game for the many interviews and the many front cover photographs. Jobs was obviously comfortable with his relationship with the world media (Steve’s Comeback Jobs, n. . ). Extraversion has been recognised for its contribution to leadership effectiveness. Many studies suggest that extraverts should be more likely to emerge as leaders in groups. Extraversion is strongly related to social leadership (Costa and McCrae, 1988; Judge et al. , 2002) and also leader emergence in groups (Watson and Clark, 1997; Judge et al. , 2002). R. Hogan et al. (1994) also noted that extraversion is related to being perceived as leaderlike (Judge et al. , 2002). Besides, Watson and Clark (1997) suggested that the experience and expression of positive emotions is at the core of extraversion. Therefore, it is likely that extravert will tend to exhibit inspirational leadership (Bono and Judge, 2004). A great example of inspiration is when Jobs lured Sculley from Pepsi by asking him, â€Å"Do you want to spend the rest of your life selling sugared water, or do you want a chance to change the world? †(Elkind, 2008). Since he is positive, ambitious and influential, he is likely to generate confidence and enthusiasm among followers (Bono and Judge, 2004). As surgency is characterized by two distinct clusters of traits – sociability (extraversion) and dominance (Peterson et al. 2003), extraversion can be categorized as the Big Five dimension of surgency. Jobs has also high level of energy. He always demonstrates great ambition to build a global media empire and has high drive and work hard to achieve his goal. This is shown from his â€Å"80 hours a week and loving it† work ethics. In an interview he said, â€Å"I worked really, really hard in my 20s †“ seven days a week, lots of hours every day†¦Ã¢â‚¬  (Krantz, 1999) He has high levels of enthusiasm and energy for his work. Besides, high energy leaders always have stamina and tolerate stress well. They deal with and do not accept setbacks (Lussier and Achua, 2007). For Jobs, after being thrown out from Apple, he tried to do it all over again with a new company called NeXT and planned to build the next generation of personal computers that are superior than Apple. However, he failed to do so. He never gave up and dealt with his failure. He closed down his hardware division and turned his attention to the software development (Angelelli, 1994). This trait appears to be the personal characteristic consistently linked with leader emergence and effectiveness. In his 1974 review of 163 leadership studies and his first survey, Stogdill identified that effective leaders have vigour and persistence in pursuit of goals and willingness to tolerate frustration. Kirkpatrick and Locke (1991) also postulated, â€Å"Leaders are more likely than nonleaders to have a high level of energy and stamina and to be generally active, and often restless. † (Judge et al. , 2002) High energy is best categorized as the conscientiousness dimension of the Big Five because people with conscientiousness are characterized as achievement oriented, and they are hardworking and persistence to accomplish their goals (Judge et al. 1999). Leaders generally have above-average intelligence as Jobs does. Intelligence refers to cognitive ability to think critically, to solve problems, and to make decisions (Lussier and Achua, 2007). When Jobs returned to Apple in 1997, Apple was bleeding money. Within a year of Jobs as interim CEO, he reduced the product lines and cut t he wholesale cost, and Apple was back to creating profit (Steve’s Comeback Jobs, n. d. ). This example clearly shows that Jobs is intelligent because he is able to solve problems in a short period of time.