In his book, The Effective Executive, Peter Drucker pointed out that the effective executive is the person who focuses on making a contribution. This focus on the making of contribution is the key. And the key to effectiveness comes in three areas:
1. in a person's work, its content, its level, its standards, and its impacts;2. in his relationships with others, his superiors, his associates, and his subordinates; and3. in his use of the tools of the executive, such as meetings and reports.The executive who focuses on efforts and who stresses his authority downwards is a subordinate no matter how exalted his title and rank might be. But the executive who focuses on contribution and who takes responsibility for results, no matter how junior he is, is, in the most literal sense of the term, "top management".And what applies to the good executive applies to the good parent, or the good teacher, or the good spouse, or any person of great responsibility.People who do not ask themselves, "What can I contribute?" are not only likely to aim too low; they are likely to aim at the wrong things as well.Above all, they may define their responsibilities too narrowly, like the person who sees something wrong that he can easily and quickly set right, but who says, "That ain't my job, man!"Remember: When you maximize your potential, everyone wins. When you don't, we all lose.
PERMISSION TO REPUBLISH: Although this article may be republished in newsletters and on web sites provided attribution is provided to the author, and it appears with the included copyright, resource box and live web site link, email notice of intent to publish is required. Email him at: execandgroup-consulting@yahoo.com.
Living in the Age of the Internet Gangster, Part Three of Three: Sleeping with the Phishes . . .
One of the newest phishing trends to emerge has almost everybody in the security industry concerned: Trojan phishing. So-called Trojan programs, named after the horse of mythology that put the Greeks inside Troy's city walls, disguise themselves as beneficial files, but actually enable hackers to gain access to computers from remote locations to steal account information directly from a computer.Living in the Age of the Internet Gangster, Part Two of Three: An Evolution of Professional-class ..
Members of the hacker community throughout that region now are adapting to take advantage of the latest phishing scams. As a natural transition is taking place, "phishing" is the term applied to online schemes that attempt to lure people into giving up sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy sources.Your Child's First Year at College: Prime Target for Identity Theft?
If your son or daughter is a recent high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is easy and highly profitable.