Friday, November 29, 2019
Computers Have Changed The World. Along With The Internet, Advanced Te
Computers have changed the world. Along with the Internet, advanced telecommunications easier travel. A global community has been created in the past 50 years. Using satellite technology and fiber-optics it is possible to communicate instantaneously anywhere in the world, using the Internet it is possible to use visual-telephones with almost no lag and this technology is available to almost everyone. If there is one field of social change that is on the fast track, then it is the field of technology, specifically computers, telecommunications and the Internet. Computers There are five recognized generations of the modern computer. The first is from 1945-1956, World War II lead governments to research the potential of computers in strategic combat. A computer development spurred by the war was the Electronic Numerical Integrator and Computer (ENIAC), produced by a partnership between the U.S. government and the University of Pennsylvania. Consisting of 18,000 vacuum tubes, 70,000 resistors and 5 million soldered joints, the computer was such a massive piece of machinery that it consumed 160 kilowatts of electrical power, enough energy to dim the lights in an entire section of Philadelphia. Developed by John Presper Eckert (1919-1995) and John W. Mauchly (1907-1980), ENIAC, unlike the Colossus and Mark I, was a general-purpose computer that computed at speeds 1,000 times faster than Mark I. First generation computers were characterized by the fact that operating instructions were made-to-order for the specific task for which the computer was to be used. Second Generation was from 1956-1963, By 1948, the invention of the transistor greatly changed the computer's development. The transistor replaced the large, cumbersome vacuum tube in televisions, radios and computers. As a result, the size of electronic machinery has been shrinking ever since. The transistor was at work in the computer by 1956. Coupled with early advances in magnetic-core memory, transistors led to second generation computers that were smaller, faster, more reliable and more energy-efficient than their predecessors. The third generation 1964-1971 saw creation of the quartz rock. This eliminated the problem of transistors overheating and destroying a computer from the inside out. Jack Kilby, an engineer with Texas Instruments,developed the integrated circuit (IC) in 1958. The IC combined three electronic components onto a small silicon disc, which was made from quartz. Scientists later managed to fit even more components on a single chip, called a semiconductor. As a result, computers became ever smaller as more components were squeezed onto the chip. Another third-generation development included the use of an operating system that allowed machines to run many different programs at once with a central program that monitored and coordinated the computer's memory. The fourth generation is 1971-present, after the integrated circuits, the only place to go was down - in size, that is. Large scale integration (LSI) could fit hundreds of components onto one chip. By the 1980's, very large scale integration (VLSI) squeezed hundreds of thousands of components onto a chip. Ultra-large scale integration (ULSI) increased that number into the millions. The ability to fit so much onto an area about half the size of a U.S. dime helped diminish the size and price of computers. It also increased their power, efficiency and reliability. The Intel 4004 chip, developed in 1971, took the integrated circuit one step further by locating all the components of a computer (central processing unit, memory, and input and output controls) on a minuscule chip. We are currently living the fifth generation, many advances in the science of computer design and technology are coming together to enable the creation of fifth-generation computers. Two such engineering advances are parallel processing, which replaces von Neumann's single central processing unit design with a system harnessing the power of many CPUs to work as one. Another advance is superconductor technology, which allows the flow of electricity with little or no resistance, greatly improving the speed of information flow. Computers today have some attributes of fifth generation computers. For example, expert systems assist doctors in making diagnoses by applying the problem-solving steps a doctor might use in assessing a patient's needs. It will take several more years of development before expert systems are in widespread use. Telecommunications Webster's Dictionary defines Telecommunications as "the transmission of words, sounds, images, or data in the form of electronic or electromagnetic
Monday, November 25, 2019
John Jacob Astor - Biography of Richest American
John Jacob Astor - Biography of Richest American John Jacob Astor was the wealthiest man in America in the early 19th century, and when he died in 1848 his fortune was estimated to be at least $20 million, an astounding sum for the time. Astor had arrived in America as a poor German immigrant, and his determination and business sense led him to eventually create a monopoly in the fur trade. He diversified into real estate in New York City, and his fortune increased as the city grew. Early Life John Jacob Astor was born on July 17, 1763 in the village of Waldorf, in Germany. His father was a butcher, and as a boy John Jacob would accompany him to jobs butchering cattle. While a teenager, Astor earned enough money at various jobs in Germany to enable him to relocate to London, where an older brother was living. He spent three years in England, learning the language and picking up any information he could about his ultimate destination, the North American colonies which were rebelling against Britain. In 1783, after the Treaty of Paris formally ended the Revolutionary War, Astor decided to sail to the young nation of the United States. Astor left England in November 1783, having bought musical instruments, seven flutes, which he intended to sell in America. His ship reached the mouth of the Chesapeake Bay in January 1784, but the ship became stuck in ice and it would be two months before it was safe for the passengers to land. Chance Encounter Led to Learning About the Fur Trade While languishing aboard ship, Astor met a fellow passenger who had traded for furs with the Indians in North America. Legend has it that Astor quizzed the man extensively on the details of fur trading, and by the time he set foot on American soil Astor had resolved to enter the fur business. John Jacob Astor eventually reached New York City, where another brother was living, in March 1784. By some accounts, he did enter the fur trade almost immediately and soon returned to London to sell a shipment of furs. By 1786 Astor had opened a small shop on Water Street in lower Manhattan, and throughout the 1790s he kept expanding his fur business. He was soon exporting furs to London and to China, which was emerging as a huge market for the pelts of American beavers. By 1800 it was estimated that Astor had amassed nearly a quarter of a million dollars, a considerable fortune for the time. Astors Business Continued to Grow After the Lewis and Clark Expedition returned from the Northwest in 1806 Astor realized he could expand into the vast territories of the Louisiana Purchase. And, it should be noted, the official reason for Lewis and Clarks voyage was to help the American fur trade expand. In 1808 Astor combined a number of his business interests into the American Fur Company. Astors company, with trading posts throughout the Midwest and Northwest, would monopolize the fur business for decades, at a time when beaver hats were considered the height of fashion in America and Europe. In 1811 Astor financed an expedition to the coast of Oregon, where his employees founded Fort Astoria, an outpost at the mouth of the Columbia River. It was the first permanent American settlement on the Pacific Coast, but it was destined to fail due to various hardships and the War of 1812. Fort Astoria eventually passed into British hands. While the war doomed Fort Astoria, Astor made money in the final year of the war by helping the United States government finance its operations. Later critics, including the legendary editor Horace Greeley, accused him of having profiteered in war bonds. Astor Accumulated Vast Real Estate Holdings In the first decade of the 19th century Astor had realized that New York City would continue to grow, and he began buying up real estate in Manhattan. He amassed vast property holdings in New York and the surrounding area. Astor would eventually be called the citys landlord. Having grown tired of the fur trade, and realizing it was too vulnerable to changes in fashion, Astor sold all his interests in the fur business in June 1834. He then concentrated on real estate, while also dabbling in philanthropy. Legacy of John Jacob Astor John Jacob Astor died, at the age of 84, in his house in New York City on March 29, 1848. He was by far the richest man in America. It was estimated that Astor had a fortune of at least $20 million, and he is generally considered the first American multimillionaire. Most of his fortune was left to his son William Backhouse Astor, who continued to administer the family business and philanthropic endeavors. John Jacob Astors will also included a bequest for a public library. The Astor Library was for many years an institution in New York City, and its collection became the foundation for the New York Public Library. A number of American towns were named for John Jacob Astor, including Astoria, Oregon, the site of Fort Astoria. New Yorkers know the Astor Place subway stop in lower Manhattan, and there is a neighborhood in the borough of Queens called Astoria. Perhaps the most famous instance of the Astor name is the Waldorf-Astoria Hotel. John Jacob Astors grandsons, who were feuding in the 1890s, opened two lavish hotels in New York City, the Astoria, named for the family, and the Waldorf, named for John Jacob Astors native village in Germany. The hotels, which were located at the present site of the Empire State Building, were later combined into the Waldorf-Astoria. The name lives on with the current Waldorf-Astoria on Park Avenue in New York City. Gratitude is expressed to the New York Public Library Digital Collections for the illustration of John Jacob Astor.
Thursday, November 21, 2019
Structured Equity Derivatives Essay Example | Topics and Well Written Essays - 4000 words
Structured Equity Derivatives - Essay Example Leverage on equity returns over predetermined ranges. Limit or reduce downside exposure to the underlying equities. Even out, compensate or reduce transaction costs as part of multiple option sophisticated investing strategies. The term equity derivative essentially means a class of financial instruments whose value is at least partly derived from one or more underlying equity securities. Market participant's trade structured equity derivatives in order to transfer or transform certain risks associated the underlying. Options are by far the most common equity derivative; however there are many other types of equity derivatives that are actively traded. Ramaswami et al(2001) have lucidly described the concept of structured equity linked derivatives through the concept of Equity Linked Notes(ELNs).They state as follows, "An Equity-Linked Note (ELN) is an instrument that provides investors fixed income like principal protection together with equity market upside exposure. An ELN is stru ctured by combining the economics of a long call option on equity with a long discount bond position. The investment structure generally provides 100% principal protection. The coupon or final payment at maturity is determined by the appreciation of the underlying equity. The instrument is appropriate for conservative equity investors or fixed income investors who desire equity exposure with controlled risk". The figure below explains the profits at the expiration of a fully protected ELN . Current Industry Scenario Since their launch on the London Stock Exchange in 2005, Listed Structured Products have become popular and flexible investment tools for UK wealth managers and brokers. In there simplest form, they offer ETF like access to underlying that may be otherwise difficult or expensive to trade, such as commodities, emerging markets or property indices. The more structured products, such as Accelerators, provide enhanced upside participation with no worse than market risk. In addition they can reduce other risks, such as eliminating currency risk for non UK investments, or provide an element of capital protection in case of market falls. Another range of products are designed for Income seeking investors. These can offer high annual (or semi-annual or quarterly) coupon payments in return for giving away upside market participation. All Listed Structured Products enjoy the benefits of being traded directly on the London Stock Exchange. These include: Transparency:Live, two-way prices are maintained throughout the trading day Ease of trade:Products trade and settle via CREST as with UK equity Liquidity: Trades of 5m+ can be executed at prevailing market prices Flexibility: Min trade size of 1,000 makes products highly accessible Key Terminology:1 Trackers: Tracks an underlying asset (commodity, Halifax house price index, equity indices etc) Cost efficient means to trade an asset Diversify exposure across an index Stamp duty free Typically long-dated or indeed undated with an indefinite lifespan Reverse Trackers: An inverse relationship with the underlying asset Profit from downwards price movements in the underlying Stamp duty free Capital Protected: Exposure to underlying asset at fixed percentage Capital invested is protected at specified level Stamp duty free Yield Enhancement: Track underlying instrument without leveraged downside Can incorporate many different features which affect
Wednesday, November 20, 2019
History Essay Example | Topics and Well Written Essays - 750 words - 26
History - Essay Example After this war Britain came up victorious and this also eradicated fear of French attack on the colonies. Colonies did not have to worry about their own defense (from French) and therefore their reliance on British decreased significantly. British also were heavily indebted due to the expenses on the war so they increased taxes of the colonies. It was a tradition at that time to impose taxes on colonies in order to earn more revenue. This was also a reason for the disgruntlement of the people of colonies. They felt that they were under slavery and this played a major role in the revolution. British Empire had colonies all over the world and they wanted to extend their power. For this reason they forced all their colonies to trade with themselves only. Through Navigation Act British Empire forced the American colonies to trade with British only and restricted trade with France and Spain. This was economically crushing American colonies and they had their reservation on the act. Sugar Act was another piece of legislation that increased the problems of the American Colonies. The act increased duties on imported sugar and this forced American colonies to stop using British goods. The timing of this act was a problem. It came at a time when people were already suffering from depression and this Act angered people more. They thought that they were being exploited. Currency Act was also a controversial act that restricted the colonies from printing money. British Empire thought that the devalued currency of colonies was hurting their economy therefore they forbade colonist from paying British traders in the colonist currency. This really made life difficult for the American colonies. People had to pay higher and this deprived them from their hard earned money. Currency Act can be regarded as a derogatory piece of legislation that was aimed at hurting the colonies of America. This was a major cause of the American Revolution. The tipping point
Monday, November 18, 2019
Challenges and Opportunities in Strategy Implementation Essay - 2
Challenges and Opportunities in Strategy Implementation - Essay Example According to the paper the set plans need to well communicated throughout the organisation to enable all the staff to work together to achieve the companyââ¬â¢s expected future results. Both new and existing organizations strive to get the biggest share of customers in the market. To acquire a big market share, organisation conduct different practices and activities to be more appealing and better placed in the market. There needs to be set procedures by the organizations that cover the whole field. An organisation that operates without set plans and procedures stand a chance to overlook other crucial areas needed to be better placed in the market. From this paper it is clear that organizations that set strategies and work towards implementing them are the ones that enjoy a greater market share. Putting set plans to action is one of the most important parts of achieving expected results. The small actions carried out in an organisation on a day to day basis need to be well linked to each other so as to contribute to the expected organizational results. Small daily targets need to be structured to contribute to the strategy of the organisation. Organizations need to be well structured so that all the staff can respect the expected results of the organisation. Communicating the strategies to the staff is crucial to ensure all staff works with a uniform purpose, which is to achieve the expected results of their organisation. For customer retention, organizations need to learn from the market reaction to various processes. Organizations with good strategy implementation plans are better placed to ensure that successful processes are continuously carried out and the non-effective processes are replaced with more productive processes.
Saturday, November 16, 2019
Components Of Disaster Management Management Essay
Components Of Disaster Management Management Essay The occurrence of such disasters has continued to increase in a rapid succession. More than three million lives were lost due to disasters in the last quarter of a century itself. This number does not stop as billions have been affected in some way or the other. The cost of rehabilitation from these disasters has run into thousands of billions alone. The increase in the population of the world only enhances the chance of disaster risk which could cause massive casualties and harm to the human life in large numbers. The six billion mark in world population was reached on the 16th of November in 1999. The annual growth rate was estimated at nearly 1.33 %( seventy eight million every year). There is a greater risk on account of the industrialization and vast urbanization since a lot of people are moving to urban areas which do not have sufficient health care and infrastructure in place. Energy is released after accumulation in the volcanic activity or geological faults which cause seismic waves to bring about movement of the crust which is known as an earthquake. Humans are able to only detect three thousand earthquakes from the total of five hundred thousand earthquakes that occur every year. 7 to 11 out of these 3000 earthquakes cause significant damage to property and human life though this figure has increased the past few years. The toll of death due to an earthquake can range from as less as five to higher than two hundred and forty thousand. One out of two cities in a developed country is susceptible to a natural hazard like earthquake. Seventeen of the twenty largest cities are situated in countries with low resources. Eighty percent of the population of the world will reside in developing countries by the year 2025 according to an estimate. The research on natural disasters is of a lot of significance in case of developing countries. What is a Disaster? Many definitions have been put forward regarding disaster. Samuel Henry Prince started the study related to disasters in 1971 in Canada during the worst disaster witnessed in Canada. The disaster in point is the ship explosion occurred in 1917 in the harbour of Halifax, Nova Scotia. His research and social exploration of the implications of the disaster paved way for further theoretical and empirical research that lasted through the 1930s, 1940s and 1950s. This saw a change in the way disasters were perceived. The focus shifted from the primary physical agent to the description and definition of disasters related to the social impact caused by it. Various academic disciplines were dedicated to the study of nature and disasters during the 1960s and 1970s. The definition of a disaster can be classified between the national and international level. The working definition of a disaster is designed in way to suit the professional background of the place where it is defined and is closely associated to the studies, work and research that is carried out. The World Health Organization has defined disaster on the base of the resultant health implications post the disaster. They have made use of the terminology called as Health Action in Crises. The International Red Cross has taken into account the factors that cause interference in human life. IN simple words, floods, earthquakes and hurricanes only acquire the status of a disaster when they leave behind a negative and disruptive impact on the living force. Al-Madhari et al in 1997 studied if a universal definition for the term disaster is possible and came up with a definition that takes into account both the factors of economic and health implications. The definition was as follows- an event localized in time and space with one or more of the following consequences occur: 1) Ten or more fatalities, 2) Damage exceeds $1 million, 3) 50 or more people evacuated. This is the basic essence that is found in most definitions of disaster which may carry different views. All the definitions accept disaster as a situation that is beyond the cope of control of the local community which warrants the need of external help. The disasters maybe a result of naturally occurring phenomena like extreme changes in climate or weather, technological and man made threats. Psychological stages of disaster Heroic stage The heroic stage is shown by the community and the individuals within that direct the various levels of energy in the tasks of help, rescue, shelter, clean up and repair. This behaviour is carried out in the span of a few hours to even days if required. Honeymoon stage The optimism characterized by the people in the community is the showcase of this stage in spite of the losses that occur due to the disaster. There is a wide media attention and, flow of resources inwards, and reassurances by personal visits by high profile personalities that look towards the rehabilitation process of the community. They provide the hope and belief that life will return to normalcy and no traces of the disaster will be seen. These resources though tend to exhaust by the third week of the aftermath of the crisis, there is reduced media attention and the real problems in the rehabilitation program start to develop. The energy shown by the survivors in the community gradually starts to fade away and gives way to the next stage of disillusionment. Disillusionment The hard experiences, the lack of necessities and the work needed to be done to restore normalcy creeps up on the person which leads to disillusionment among the survivors. Survivors find that the various types of financial help being offered are in the form of loans instead of grant, home insurance was not the best available option and that politics played a bigger role in the decision making. Signs of disgruntlement is how by means of complaints related to abandonment, betrayal and injustice, incompetency and bureaucracy. Stress is a negative aspect that troubles the survivors which slowly disintegrates any hope that may be left. Recovery All the work for which the base has been setup starts to show results. The applications are passed, loans are approved, and reconstruction is started. The individuals start to work at their normal capacities. People start regaining the state of normalcy with a period of six months after the disaster. Some individuals might take up to thirty six months. There is an overall sense of appreciation to aspects like life, relationship and morale towards tackling problems all owed to the lessons learnt post the disaster. Stages of Disaster Response Preparation stage The main objective of this stage is to improve the healthcare system and the general system that can be improved to the extent that future disasters can be tackled with ease and efficiency. Quick Reponses Stage The main objective of this stage is to make sure that there is a prober health response in case of a disaster strike that may create some needs. Counselling is provided during this stage which is present in the current health system. There should be help sought from external sources to boost the resources that are available in case they are not sufficient to fulfil all the necessary needs. In many cases the local supplies may not be enough to meet the requirement of the community which is why the stock has to be filled with the help of some additional commodities obtained from other external sources. Recovery Stage This stage has to be worked upon continuously and lasts more than a month after the disaster takes place. This stage could go on for years depending on the resources that are available for rehabilitation and the impact and type of the disaster. The needs of the survivors are taken care of by the local providers in this stage. Federal funds may flow in case the disaster is declared as a Presidential Declared Disaster. The funding is given to those in need of individual help. Disaster Management Definition of disaster management A lot of definitions have been put forward by authors on the topic of disaster management. A lot of these definitions merely explain the meaning of the term rather than completely stating the terms of preparation for a disaster. Christopolis, Mitchell and Liljelund regarded efficient and effective abilities and result of disaster response as the main themes of preparation for a disaster (2001). Creating a local response system and providing early warnings is also a big part of preparation (Integrated Regional information Networks, 2005). The definitions by United Nations Development program, McEntire and Twigg have definitions similar in theme with their own take on the preparation for a disaster. The program by United Nations holds hazard easing as the central source for disaster preparation along with the inclusion of planning in the description (2004). Similarly, McEntire and Twigg also consider hazard easing as a crucial aspect in disaster preparation saying that it should be a p art of it (McEntire, 2003 and Twigg, 2002). McEntire talks about different factors relevant for disaster preparation as a local government function that includes vulnerability and hazard evaluation. The lesser highlighted aspects of disaster preparation are also very important. Izadkhak and Hosseni point out education to be the foremost media in the preparation of a community for disasters (2005). The emergency plans, storage of food, securing furniture to walls and creating inventories of storage commodities are a part of this level (Paton, Smith, Johnston, 2003 and Siembieda, 2001). Review of preparation literature The disaster preparedness aspect is basically dynamic in nature which keeps changing constantly. The researches find out new facts with the occurring of new disaster even with respect to the community. The disasters and crisis are consistent but the practises applied in its management still lack the capacity to provide necessary results. McEntire has worked towards some crucial points in disaster preparedness and emergency management in his study. McEntire, Fuller and Johnston and Weber (2002) published an article reviewing the emergency management and the methods related to it. The main concern in the 2002 research was vulnerability while McEntire also finished his research related to disaster preparedness. Dynes also provide his view on emergency planning. His views were based on research instead of military models. The problem solving methods of Dynes emphasizes cooperation and coordination as the key aspects. (1994). This concept has been used in developing many other models as opposed to the earlier practice of using military models and instead switching to a research based and discipline specific model. The best methods of disaster preparedness incline towards discipline specific objectives as in the case of emergency management. A valuable amount of work has been spent for the identification and evaluation of the concepts and principles that are used in disaster preparedness. Some contributions have been made to development of disaster preparedness with the aim of creating a theory based practise and practise based theory (Gillespie and Streeter, 1987). The contributions from most individuals are not aimed at the creation of a complete disaster preparedness technique but individual research has helped immensely in making contributions towards building a complete disaster preparedness plan. A case in point is the research by Kirschenbaum (2002) article based on disaster preparedness from the point of view of Israel. The inferences drawn from his study were found to be applicable in a general environment. Perry and Lindell (2003) based their study on disaster management on the principles of perspective and planning and were able to identify 10 guidelines that should be used in the process of planning. Lindell was more focused on the planning while Kirschenbaum gave more importance to localized applications and principles. Each on his own was able to contribute an important aspect that led to the creation of a comprehensive disaster preparedness plan although none of the studies focused on all the aspects on the whole. Components of disaster management Earthquake Risk The risk of earthquake is a seismic risk to the environment and its habitats. The earthquake risk is inversely proportional to the capacity of resisting it. Research based on social learning by May (1994) shows that the more knowledge that is available, the less is the worry and lesser in the rationale for prevention. Knowledge and the use of the knowledge in the best way are required to improve the safety measures today. There is a process known as Earthquake Risk Management that works towards the prevention of threat or danger from an earthquake, reducing risk or consequences of an earthquake. It also deals on topics like preparation for dealing with a disaster, responding to a threat due to natural disaster, capacity building and knowing the effects of the natural disasters. There are the basic points of evacuation, rescuing, relief, rehabilitate and reconstruct that are covered. The population in India was marked at over a billion in 2001 and is estimated to be doubled by the yea r 2050. This calculates to a population growth of 1.61% per annum. The risk of earthquake increases by leaps and bounds in such a scenario. The urban areas are been populated to the extent of being overcrowded and figure in the highest density in the world of 237 people per square kilometre. This only worsens the situation. People in thickly dense areas have no alternative but to live in conditions like low lying areas situated closely near the rivers. This makes it mandatory to keep a full time alert and be ready with a disaster preparedness plan. Gillespie and Banerjee (1993, pp.242) have proposed there is a 5 stage plan which spirals upward with more refined levels including avenues, assessment, knowledge, preparedness and practise. The central point in these levels is considered to be knowledge. As pointed by Srivastava et al (2007), the reduction in disaster risks can be brought about by the proper use of information. Disaster management planning for earthquake In the past few decades, a high level of importance has been attached to the effective and efficient management of information and its use as a key component of disaster management in the regions of Asia especially Pacific Asia. Disaster management information systems have been setup by a number of countries according to their own calculations and needs. The applications include early warnings, reduction of disaster risks and emergency planning. The information plays an important part in disaster management and it should be used wisely. The needs of the information related to disaster management can be classified in two activity categories Pre disaster activities like research and analysis, prevention, risk assessment and preparedness. Post disaster activities like rehabilitation, response and reconstruction. The data related to disaster can also be classified into two categories- Pre disaster data consisting of the risks and the country Post disaster data showing the impact of the disaster and the resources available to counter the effects. National Disaster Management Information System The main aspects of a disaster management information system is a database containing the following- Mapping of hazard assessment Vulnerability Assessment Distribution by Demography Lifelines, Infrastructure and Critical Facilities Transportation Routes and Logistics Material and Human Response Resource Communication Facility The use of Disaster Management Information System is based on three aspects- Preparedness planning Response and mitigation Recovery Earthquake activities Preparation and Planning Identifying areas prone to earthquake Identifying problems Identifying and using Resources Control and command Advance Preparatory Action Post earthquake activities The relief activities needed to be performed by the government are- Maintaining uninterrupted communication Endorsing disaster preparedness and relief measures through media like newspaper and AIR. Evacuating and movement of commodities of essence such as petroleum should be facilitated in transport. Making sure that essential commodities are available at a reasonable rate. Providing adequate supply of drugs, vaccine and medicine. Restoration and preservation of physical communication links. Providing infrastructure such as latrines, shelter, electricity, road etc. On a temporary basis by making the necessary investment. Mobilising financial resources. In addition to these aspects, there are certain secondary functions that are needed by the relief efforts of the State such as Military aid should provide relief, restoration and rehabilitation services to the civil authority. Backup plans for cattle preservation, crops and health measures should be put in place. Technological and technical inputs for providing drinking water. Providing technical assistance for water management, water budgeting and several other uses. Coordinating activities of the voluntary and state agencies. Knowledge Management The knowledge related activities are dealt taken care of by the knowledge management procedure (Wiig, 1997: Civi, 2000). These activities include organizations and creation of knowledge along with share and use of the knowledge. Knowledge management can be more appropriately defined as the strategies and processes of identifying, capturing and leveraging knowledge. This definition was provided by the American Productivity and Quality Centre. Knowledge management is a field on the rise which has been able to collect considerable attention especially from the industrial community. A large number of industrial organizations have taken to knowledge management programs which serve as proof of its widespread use. These programs are helpful in making the industries more competent and improving their organizational performance. It is only a matter of time when all the companies will adopt such a program and the only factor to be accounted for is the way in which it has to be implemented to m ake optimum use of knowledge management and managing it properly at the same time. Implementation of Knowledge Management The Knowledge Management concept has caught a lot of attention due to its importance but there are only a few industries that have been able to make optimum use of the knowledge management techniques by managing the knowledge in their respective organizations. Stoney and Barnett (2000) suggest that a major number of Knowledge Management steps are bound to fail. This is due to the fact that the implementation of Knowledge Management is not an easy task that can be carried out by an organization. Technological infrastructure needs to be in place for the implementation of Knowledge Management along with change in the culture of the organization and managing knowledge of different types. Organizations that have made use of the Knowledge Management without making certain of the necessary resources at their disposal have mainly failed due to improper infrastructure and implementation. Implementation of the Knowledge Management is a tough task for any organization as pointed out by Drucker (1993) who is known as the father of modern management theory. He stressed on the fact the biggest challenge faced by an organization is the building of a systematic framework for the management of knowledge. Hence, it is imperative to build a perfect prototype or framework which helps the organizations before the implementation of Knowledge Management. Framework definition According o the Oxford English Dictionary, (2003), the framework is defined as a structure composing of parts that are framed together especially designed for enclosing or supporting anything like a skeleton or a frame. Popper (1994) has defined framework as a set of assumptions or fundamental principles of intellectual origin that form the basis for action. In accordance with these definitions, framework can be said to be a framework or a structure formed using a set of specific instructions or principles that is required to provide a base for carrying out necessary activities and actions. Knowledge Management Frameworks According to Rubenstein-Montano et al. (2001b), Knowledge Management frameworks are categorized as a mode of providing guidance in a specific discipline. This means that it shows the way towards the building of Knowledge Management in a specific discipline completely. Dale (1999) defines framework as a tool used for the development and laying out of plans, a guide that helps an organization to carry out a certain action that works best for their business needs at their own pace. The framework most importantly acts as a link between the practical and theoretical aspects of the Knowledge Management and eases its implementation during an emergency or disaster. Various Knowledge Management frameworks The frameworks that have been described in theory are made to focus on different parts of Knowledge management and achieving its various purposes. The most popularly known framework is the framework for knowledge creation created by Nonaka (1991, 1994) that explains the evolution and conversion seen between tacit knowledge (not easy to articulate) and explicit knowledge (can be easily put into words). This is not the perfect form of a framework since it is only concerned with the creation of knowledge which is nothing more than a part of the Knowledge Management. Another type of framework that is described in theory is the one that provides information on cyclic processes of the Knowledge Management. From the studies of Rubenstein-Montano et al. (2001a), it is evident that many of these frameworks only provide activities that stress on the knowledge cycle activities. They lay importance on phases of knowledge without providing supervision in the implementation of Knowledge Management. The examples of such frameworks are plenty including the framework by Bose and Sugumaran (2003) and many of the frameworks that were studied by Rubenstein-Montano et al. (2001a). A third type of framework is the one developed by researchers that is used to explain the performance of Knowledge Management in an organization. The framework provides reference to shoe the analysis, structure and evaluation of the Knowledge Management in various organizations belonging to different fields. They were developed by Apostolou and Mentzas (1998). Framework requirements The framework helps in understanding, improving awareness and gives the conceptual definition of the Knowledge management that informs the people about the processes involved in it. Al the components can be understood with the help of a framework and puts the Knowledge Management in perspective by providing the people with a clear and concise vision which helps in its implementation. Managers find framework as a beneficial and important tool since it helps to decide whether all the aspects related to the Knowledge management have been covered that may be easily overlooked without the framework. It also helps in enabling the implementation process and helps coordinate the efforts put in by the organization in a controlled and systematic way. System Approach Framework Holsapple and Joshi (2002) laid out a three layer framework which consists of three major building blocks known as knowledge resources, activities and influences. The resources pat highlighted the pool of the knowledge of the organization that can be classified into six main forms of resources namely participants knowledge, infrastructure, culture, knowledge artefact, strategy and purpose. The activities block represents the processes to be used by the organization for manipulating the knowledge resources. Holsapple and Joshi (2002) were able to identify 4 activities related to this aspect namely acquiring, selecting, internalizing and using the knowledge which means the generation and externalization of knowledge. The manners in which these activities are performed tend to be influence by a number of factors that can be seen in the next block called as knowledge influences. The implementation is greatly influenced by this block and is classified into three categories namely resource (human, financial, material and knowledge), managerial (coordination, leadership and measurement) and environmental (customers, competitors, suppliers, markets and other conditions). The three aspects when viewed collectively act as the main components in the operation of Knowledge Management. A framework was created with the idea of four stages namely review, concept, reflect and act by Wiig et al. (1997) in order to explain a number of Knowledge Management techniques and methods. Review is the first step and relates to evaluating and monitoring the performance of the organization to find out whether the desired results have been obtained. Conceptualize has two parts namely analysis of knowledge and inventory knowledge. The former is used to identify and assess the problems, weakness, strengths threats and opportunities related to knowledge. The latter is used to find out the state of knowledge in the organization by finding out the knowledge assets. TH reflect part is used for the following- Create teams for assessing. Find out the Knowledge management requirements. Collect knowledge by identifying. Design structure to knowledge in warehouse. Maintain technology. Test the technology again. Train the knowledge workers. Show the use of Knowledge management practises. Track the usage. Get the system to start. Measure the productivity and quality, measure Knowledge Management practices. Conduct assessment review of the processes. Hygoyo Protocol Framework of Hyogo The priorities, mission and vision of the National Framework were created in synchronisation with the Hyogo Framework of Action (HFA) 1005-2015 that was agreed upon by all the nations in January 2005 in the city of Kobe, Japan during the UN-World conference held for Disaster Reduction. The expected result of the HFA after ten years is significant reduction in the lives and economic, social and environmental assets of the countries and communities. The following objectives have been adopted by HFA to attain the desired results- Better integration of disaster risk considerations and accordingly makes development policies. Planning at all the levels with focus on disaster prevention, preparedness, reduction and vulnerability reduction. The strengthening and development of institutes, capacities and mechanisms at all the levels especially at the community level that can help in building resistance to hazards. Incorporation risk mitigation approaches in the implementation of recovery programs, response and emergency preparedness that is used in rehabilitation of the affected communities. Scope This particular framework relates to provision of guidelines and direction to the national, local and provincial institutions. Aspects such as capacity building and vulnerability reduction are the crucial factors that help the communities and institutions to counter disaster risks. The strategies, policy implementation are taken care by this phase and programs for the parts of disaster are provided for. There are certain challenges that are recognized in the five major areas as follows- Governance- legal, organizational and policy frameworks. Risk identification. Monitoring, assessment and early warnings. Knowledge education and management. Reduction of risk factors. Preparedness to improve response and recovery. The Yokohama strategy concludes in its review the discussions in the World Conference on Disaster Reduction and the desired result that was decided can be described into five priorities of action as follows- Make sure disaster risk is a local and national priority with a very strong institutional base for execution. Identify, monitor and assess the disaster risks and identify early warnings. Use innovation, knowledge to build a safety culture which is strong at all the levels. Reduce the risk factors Make the disaster preparedness strong for better response. Case study of earthquake in Pakistan with respect to Knowledge Management The earthquake in Kashmir in 2005 was a massive earthquake with its epicentre in Pakistan controlled Kashmir close to the city of Muzaffarabad that affected the Khyber Pakhtunkhwa and Gilbit Baltistan province of Pakistan. It took place at 8:52:37 PST on the 8th of October. It was similar in size to the 1906 San Francisco earthquake and 2001 earthquake in Gujarat with magnitude of 7.6. Tremors of this earthquake were felt in surrounding nations like western China and Tajikistan. Four people died in Afghanistan while close to fourteen hundred people died in India controlled Kashmir according to reports. The damage caused was blamed on poor construction and major up thrust. Infrastructure Network usage- the network usage was high throughout the phases of recovery. Data and voice communication was very good in Islamabad. The landline network was brought on track within a coupe of days in town hit by the earthquake and the cell network was extended post the earthquake. The areas that were hit the worst had no assistance and relief and were left with no communication. Some parts were wiped out entirely. The skills to manage the technology were available in Pakistan but the management was not properly planned. Network Availability- At first the network was very low during recovery and later was raised to a medium level. The inconsistency of connection was the main factor rather than low bandwidth. The connection would break consistently which proved to be disruptive. The limitations were known fully in the remote areas but the staff did not pay heed to the cell coverage problem. Cell phones are not adequate in such circumstances. Interoperability- This aspect worked at all times during recovery and it worked in the favour of national staff success. Communications technology staff had prior experience working for NGO and used their contacts in organizations to full effect. Data Information The information was inaccurate throughout the recovery. The situation reports were not reliable. The data was circulated internally and contained insufficient information related to needs such as fundraising, donors and advocacy. This resulted in various queries sought from the headquarters to the staff for more information. Another shortcoming was the information distribution. There was lack of communication with the UN that put the NGOs at a los since they did not know the plans put in place by UN and the problems they faced. The cluster approach by the UN shoed positive results in the initial four weeks for common approaches, joint analysis and programming. Some participants did not take part in the cluster group (Food, Water, Sanitation, Education and Health). The coordination was improved with the establishment of the District Relief and Recovery Committee with
Wednesday, November 13, 2019
Free College Essays - When Honor is Gone in Shakespeares Othello :: GCSE Coursework Shakespeare Othello
Othello: When Honor is Gone, What is Left?à This is the question we ask ourselves while reading Shakespeareââ¬â¢s Othello.à Throughout the play Iagoââ¬â¢s mission is revealed as trying to strip Othello of all honor, and reduce him to his bestial state.à Iago sees Othello as a beat from the beginning of the play and is determined to expose him to everyone. In order for the world to see what Iago already views Othello as, Iago intends to persuade Othello to violate his code of honor; the honor which is the only thing that separates the beasts from the men. Ironically, as Iago tries to coax the beat out of Othello by making him violate his code of justice, we see that Othelloââ¬â¢s bestiality was there all along. From the beginning of the play, Iagoââ¬â¢s view of Othello as a beast is obvious. Iago repeatedly describe Othello in terms of animals.à When Iago tries to anger Brabantio when news of his daughter marrying the Moor erupts, Iago describe his new son-in-law in vulgar, bestial terms.à Iago says ââ¬Å"Even now, now, very now, an old black ram... is tuping your white ewe.â⬠(I.1 lines 89-90) He also states ââ¬Å"youââ¬â¢ll have your daughter coverââ¬â¢d with a Barbary horse; .youââ¬â¢ll have your nephews neigh to you; youââ¬â¢ll have coursers for cousins and gennets for germans.â⬠(I.1 lines 110-114)à à à à à à à à à à à à Iago truly thinks Othello a beast, as he even refers to Othello in animal terms when he is by himself.à In Iagoââ¬â¢s soliloquy at the end of Act 1, Iago says that Othello ââ¬Å"will as tenderly be led by thââ¬â¢nose; as asses are.â⬠(I.3 lines 395-396) Everyone else sees Othello a man of justiceà who is spoken of by the Duke as he says, ââ¬Å"If virtue no delighted beauty lack, Your son-in-law is far more fair than blackâ⬠(I.3 lines 330-331) Iago is determined to bring out the beast in Othello, as he sees it is more just for everyone to know Othello for what he truly s, a beast. ââ¬Å"Make the Moor thank me, love me, and reward me; for making him egregiously an ass.â⬠(II.2 lines 302-303) Just as everyone views Iago as ââ¬Å"honest Iagoâ⬠everyone holds Othello in high regards.à We see how wrong the characters can be as they do not see the true evil inside Iago, we are implored to think that Othello truly is evil as well.
Monday, November 11, 2019
Research and Background on Research Methodology
Methodology can be defined as the analysis of rules of methods, techniques and regulations. The methodological analysis involves the systematic survey of methods. Which are applied to analyse the survey or a specific undertaking. To make the survey planned and increase the trusty in the survey, the different of the methodological analysis can be accepted in the planned of the survey or frame of the survey. The research methodological analysis affecting the aggregation of theory, thought or construct of the survey, comparison of the survey that have different of the attack and single methods that have different of the attack and single methods that are conduced when the research is being performed. These mean that research methodological analysis was the bosom of the survey. It is a peculiar or set of processs. Research methodological analysis besides can be defined as the system of roll uping informations for surveies project. There are two manner of roll uping the information, either theoretical or practical research. Theoretical research is a procedure of placing a attention set of connections within a subject and the demoing how they fit together or related to the topic. For the practical research is, associating to, governed by or acquired through pattern or action, instead than theory, guess, or thoughts, by free lexicon ( hypertext transfer protocol: //www.thefreedictionary.com/practical ) . Harmonizing to M S Sridhar, ( October 17, 2010 ) says that research methodological analysis is a scientific discipline of analyzing how research is done scientifically. A manner to consistently work out the research job by logically following assorted stairss. Methodology aid to understand non merely the merchandises of scientific enquiry but the procedure itself. Harmonizing to S M Sindhar ( October 17, 2010 ) besides tell about the benefits of making the methodological analysis of research. The benefits are: Promotion of wealth of human cognition. Tool to the trade to transport out research ; provide tools to look at things in life objectively. Develop a critical and scientific height, disciplined thought or a ââ¬Ëbent of head ââ¬Ë to detect objectively. Enriches practician and his pattern ; provide chance to analyze a topic in deepness ; enable the research workers to do intelligent determinations ; understand the stuffs which no other lend of work can fit. As consumers of research end product helps to instill the ability to measure and utilize consequences of earlier research with sensible assurance and take rational determinations. Making research is the best manner to larn to read and believe critically. For the societal scientific disciplines are methodologically diverse utilizing qualitative, quantitative and assorted method attacks. Qualitative information is highly varied in nature. It includes virtually any information that can be captured that is non numerical in nature. There is the type of qualitative informations: In-depth interviews Direct observation Written paperss Quantitative information is the term that used to depict a type of information that can be countered or expressed numerically. This type of informations collected in experiments, manipulated and statistically analyzed. To stand for the quantitative information is in graphs, histograms, charts and tabular arraies. Assorted method in research is the combine of quantitative and qualitative informations. In the survey consequences subsequently, there will be the combine of the two informations, the information from the qualitative informations and informations from the quantitative information. It besides can supply more comprehensive replies to research inquiries. In the instance of research ââ¬ËReading wonts among pupil in Faculty of Information Management ââ¬Ë , some method is used consistently to do the consequences of the hypothesis can be more clarify. In this survey, a batch of information was gathered from two types of beginnings which are printed and electronic beginnings. The printed stuffs can be easy found in Perpustakaan Tun Abdul Razak PTAR, Puncak Perdana Library, and electronic beginnings can be easy happen utilizing internet or any database. From these beginnings, a batch of information about this article ââ¬ËReading ââ¬Ë easy to be found but it difficult to happen when the rubric focused to the specific range, which is ââ¬ËReading wonts ââ¬Ë , or ââ¬ËReading wonts among University pupils ââ¬Ë and ââ¬Ëreading wonts among pupils ââ¬Ë . So, I forced to broad range to finish this survey. 3.1 TYPE OF RESEARCH AND RESEARCH DESIGN In this range will stating about the type of the research and the research design that will be use in this survey. Here will be the particular of the type of the research and the research design to do others easy to cognize about this survey. 3.1.1 TYPE OF RESEARCH Harmonizing to Department of Health and Human Service ( DHHS ) , ( February, 2009 ) says that research wasaÃâ à ¦ . ââ¬Å" a systematic probe, including research development, proving and rating, designed to develop or lend to generalise cognition. Activities which meet this definition constitute research for intent of this policy whether or non they are conducted or supported under a plan which is considered research for other a plan which is considered research for other intents. For illustration, some presentation and service plan may include research activities ; hypertext transfer protocol: //www.hhs.gov/ohrp/humansubject/guidance/45cfr46.htm # 46.102. â⬠However, harmonizing to University Research Council, Nipissing University, ( January 29, 2008 ) says that research is any original and systematic probe undertaken in order to increase cognition and apprehension and to set up facts and rules. It comprises the creative activity of thoughts and coevals of cognition that lead to new and significant improved penetrations and/or development of new stuffs, devices, merchandises, and processes. It should hold the potencies to bring forth consequences that are sufficiently relevant to increase cognition. Good brooding enquiry produces theories and hypothesis and benefits ay rational effort to analyse facts and phenomena. This hunt for single facts or informations requires an open-ended inquiry for which is there no ready reply. Datas are gathered through experiments, studies or other methodological analysiss. So, the research significance is the original plants and systematic probe on cognition by person who have the involvement to make the research. It is besides to increase cognition and understanding on a topic. There are two type of research. However, research can be classified by intent or by method. If the research by intent, it have two classs, basic research and applied research. If the research by method, there are besides have two classs, deductive research and inductive research. In this survey of ââ¬Ëreading wonts among pupil in Faculty of Information Management ââ¬Ë can be classs as applied research because this survey utilizing the basic research to increase the past theories, cognition and methods to work outing this survey. 3.1.2 RESEARCH DESIGN Research design is a model or design for carry oning the research undertaking. Harmonizing to the instruction lexicon, ( Jan 14, 2009 ) , research design is a program sketching how information is to be gathered for an appraisal or rating that includes placing the informations assemblage methods, the instruments to be used or created, how to instrument will be administrated, and how the information will be organized and analyze. There are few constituents of research design. It is: Specify the information needed. Design the exploratory, descriptive, and caused stages of the research. Stipulate the measuring and grading processs. Construct the pretest a questionnaire or appropriate signifier for informations aggregation. Stipulate the sampling procedure Develop a program of informations analysis There are two type of research design. It is quantitative research design and qualitative research design. In the quantitative research design, there are three constituent of quantitative research design. It is descriptive research, experimental research, and Quasi-experimental research. For the qualitative research design besides have three constituents in it. It is historical research, ethnographic research and instance surveies research. So, the research design is the general program on how research goes about replying research inquiry. This research on ââ¬Ëreading wonts among pupil in Faculty of information direction ââ¬Ë will utilize on descriptive research because this type of research can accurately portrays the state of affairs of pupil perceptual experience on reading wonts among pupil in Faculty of Information Management. Descriptive research phenomena as they exist and it will analyze by and large take natural informations and sum up it in a functional signifier. This type of research design that involve doing careful description of the state of affairs of the reading wonts. It is necessary to hold clear image of the state of affairs how the information should be collected and sum up. The study design conducted indiscriminately to the pupils in Faculty of Information Management semester five and six merely. However, there are four classs in module of Information Management. It is IM221 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) for semester five and six. These types of pupil normally know about reading and reading wonts mean in finishing the surveies. The suggestion from them can better reading wonts among pupil and besides can better the stuffs in library that can increase reading wonts among pupil in Faculty of Information Management. The study on pupils will assist the lector, pupil and librarian in Faculty of Information Management to increase the reading wonts and besides foster the spirit of reading among pupils. The research will utilize questionnaire to acquire back the feedback from the pupil. The questionnaire is a research tool that consists of a series of inquiries defined by the research workers. From the questionnaire, the research workers can cognize and the research besides can make the summarize on the research. The questionnaire will be distributed among pupil in Faculty of Information Management, UITM Puncak Perdana. In module of Information Management, there are four classs, which are IM220 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) . From 100 sets of questionnaire, 25 sets will be distributed for each class. The distribution of the questionnaire will take the topographic point in the country of Faculty of Information Management, UITM campus Puncak Perdana, Shah Alam. The questionnaire will be collected by custodies of me as a research worker. 3.1.3 THEORETICAL PERSPECTIVE Figure1: Theoretical position: reading wonts, reading stuffs, frequence of reading, sum of stuffs in reading, and reading stuffs types harmonizing to gender. Independent Variable: Dependent Variable: Reading stuffs Reading Habits Frequency of reading Sum of stuffs in reading Factor influence reading wonts 3.2 VARIABLE In the research works, there are two type of variable that a normally usage. It is dependent variable and independent variable. Dependent variable is the use or introduces the independent variable. This sort of variable is depending on itself. The independent variable is the variable that needs the dependant variable to stand. Independent variable can non stand itself. This conceptual model indicates the relationship which consists of the dependent and independent variables. This model denotes the four variables which causes to individual variable which were affected by the independent variable. Reading wonts is dependent variable, the discrepancy in which to be explained by the four independent variables which are reading stuffs, frequence of reading, sum of stuff in reading, and reading stuffs types harmonizing to gender. The independent variables in this instance are reading stuffs, frequence of reading, sum of stuff in reading, and reading stuffs types harmonizing to gender. Therefore, it is really of import of reading wonts for pupils. On the other manus, the dependent variable is the reading wonts. It can be seen clearly that the independent variables have influenced the dependant variable. This research indicate and lucubrate clearly that the reading stuffs, frequence of reading, sum of stuffs in reading, and reading stuffs types harmonizing to gender among pupil as an independent variables that will hold an consequence and supported to reading wonts among pupil as a dependent variables. Reading wonts Reading wonts is the behaviour of the pupil in their reading. It is about the continued and regularly reading the stuff they like to read. Example, the pupil read the newspaper on a regular basis. Reading stuffs Reading stuff is the stuff that the pupil return and like to read, but the stuffs they read for reading wonts is the stuffs that they read on a regular basis. Example, newspapers, magazines, cartoon strips, and novels. However, they must depict what name or types of newspapers, magazines, cartoon strips, and novels they frequently to read. Frequency of reading Frequency of reading is how frequent the pupil read the stuffs. How much clip they spend in their reading every twenty-four hours. Sum of stuff in reading Sum of stuffs in reading is the Numberss of stuffs they take to read in a twenty-four hours. Means that do the pupil refer to take more than one stuffs in a twenty-four hours for their reading wonts. Factor influence reading wonts In the reading wonts there must be the factors that influence people or pupil to read. Usually pupil reading because they want to complete their assignment and plants and they besides influence by their household and friends. There are ever holding influence why people or pupil read and why they take the stuffs as their reading wonts. 3.3 RESEARCH METHODOLOGY Research methodological analysis is the manner that shows the aggregation of informations for the research undertaking. In this subdivision would state about the type of informations and aggregation methods, the population for this survey, and the sampling design for this survey. 3.3.1 PURPOSE OF RESEARCH To make or to get down the research, the research workers need to cognize what capable that have meet his or her involvement to pull him or her to make the research. Then, there besides must hold the intent of making the research. This is the first measure to make a research, must cognize the ground why the research workers do the research. There is few intent of the research workers do the research. First intent is account. Every research workers need to cognize the intent of the research that he or she making. The research workers do the research because they want to increase the cognition and develop the new cognition that already has done by the past research workers. So, to make the research is like to explicate on the topic that has being chosen to make. The research workers must explicate why the research must be conducted and explicate his or her involvement on the topic that they have chosen to be their research. The 2nd intent is anticipation. Doing research is for the research workers make the anticipation. Research is assisting the research workers to measure the state of affairs and give the prognosis what will go on in the hereafter. Type of the information that has high demand in the market now is the anticipation of new merchandise. These besides use to do anticipation that what will go on in the hereafter. This will do the research more interested by the research workers in the hereafter. The 3rd intent of making research is discovery. Making research like the research workers found something that truly of import and this information will be so valuable in the hereafter. That why research making the research. It is to detect new thought, new cognition, and besides increase the cognition that has being done by the past research workers. The last intent of making the research is hypothesis. Making the research, the research workers must cognize and make the hypothesis of their research. The research workers should cognize the hypothesis of the research that he or she conducted. For this survey ââ¬Ëreading wonts among pupil in Faculty of Information Management ââ¬Ë is utilizing the applied research. So, here the intent of the applied research, proving theories, generates the survey, use the survey in the existent universes, and address more than merely the abstract rules. The hypothesis of this survey is promoting pupils to read and do reading as their wonts. After administering the questionnaire and do the analysis of the questionnaire, this survey can be applied by the existent universes as the mention. 3.3.2 TYPE OF DATA AND DATA COLLECTION METHOD There are two types of informations that normally use in research plant. It is quantitative informations and qualitative informations. Quantitative information is in the numerical information. The information can be countered and showed in the numerical information. Normally this sort of informations collected in experiments, statistical analyzes and manipulated. For the qualitative information is sort of informations that non in numerical informations. It is much more than words and text. Normally, it showed the exposure, picture, sound recordings and so on. This sort of informations can be collected by making interview, direct observation, and written papers. The survey ââ¬Ëreading wonts among pupil in Faculty of Information Management ââ¬Ë utilizing the quantitative information. The information for this survey will be collected by distribute the questionnaire. In this questionnaire there must be the inquiry inquiring the respondent about the survey. From the informations that collected by questionnaire, I can acquire the reply about the survey I am making. 3.3.3 Population Population in research plant is stating about the group of people that where the topic that the research workers taking. The group besides will stand for the plants of the research workers. Before the research workers set the population for his or her research, the research workers must cognize about the community that he or she wants to go his or her population. The characters of the community besides must be known. The community that will became the population in the research works besides must hold experience and cognition about the research that the research workers conduct. The population besides is a group of the possible participants that will go the researcher population so that the research workers can generalise the consequences for his or her survey. The population of the research for the survey ââ¬Ëreading wonts among pupil in Faculty of Information Management ââ¬Ë is the pupil from semester five and six in the Faculty if Information Management. But, the pupils as the population in this survey come from the 4 classs in the Faculty of Information Management. The four classs is IM220 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) . The selected inquiry will be give one questionnaire and they have to finish the questionnaire. The pupils that will be selected are indiscriminately in the country of pupil semester five and six from the four classs. The feedback that given by the respondent will give the consequence to the survey that conducted. 3.3.4 SAMPLING DESIGN Sampling design of the research works is one of the procedure, action or technique in the choosing of the sample that the researcher demand to make to acquire the information from the population that he or her mark as the respondent of his or her survey. These samplings besides refer to the communities that represent the information for the survey from the hall community. This mean that there will be some of the community will be taking to be the respondent of the research. The research workers need to make the sampling design to do the decision from the sample that on the population or from the questionnaire that have been distribute. From the trying design besides the research workers would acquire the reply for his or her research. Sampling design is of import because the sampling can demo the mark of the research workers on the survey. In this research, the simple random sampling has been used. Selected a group of the topic ( a sample ) and for the survey from the larger group ( a population ) is one of the simple random trying design in the basic technique. Each individual in the population will be selected as the mark respondent. In the conceptual, simple random sampling was the simplest of the sampling technique. It is non necessitate a big population. In the simple random sample, the research workers must take one of the people in the population and from that, there must non hold any order to take a specific person. Here mean that, there no specific person but choose the individual in the population indiscriminately. Exploitation and make the sampling design have the advantage. The advantage of making the trying design is it is easy, simple and can be apply in the little population. However, there are disadvantages making this trying design. It is the research worker demand to name the point and individual in a population before making the distribution of questionnaire so the research workers need to make the distribution work in the big population harmonizing to what he or she listed in the sampling design. In this survey of ââ¬Ëreading wonts among pupil in Faculty of Information Management ââ¬Ë , the questionnaire will be distributed indiscriminately to the pupil on Faculty of Information Management, UITM Puncak Perdana, for the four classs which is IM220 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) . There are 80 questionnaire will be distributed indiscriminately to the pupil in Faculty of Information Management and the pupil that have been choose was pupil from semester five and six merely. 3.4 INSTRUMENT DEVELOPMENT The instrument is used to mensurating some of the quality or the ability of the topic or the research works. The intent of the instrument is to assist the research workers to do the sampling of the survey to acquire the information for the survey. An instrument can be a trial, signifier, interview, checklist, and a set of classs. Normally in research plants they use two of this instrument, questionnaire or interview. Questionnaire is the inquiry that have stated by the research workers in the documents and this inquiry must be fill wholly by the respondent. The questionnaire is the open-ended inquiries. Interview is when the research workers go run into person that a professional in the topic that research workers do and making the interview by face-to-face. The questionnaire is the simple manner to administer the study to the population that has been chooses by the research workers. The questionnaire will be giving and collected by manus by the research workers itself. It is different in making interview study. The research workers need to travel personally making the interview and normally the individual that being interviewed must be professional in the field that the research workers research. The format questionnaire can act upon the quality of informations collected, but the order of the points in the questionnaire can act upon the reply from the response given. The questionnaire must be stick to the intent of the topic, the topic that have been taking, and the aim of the research. The questionnaire strategically composed utilizing assorted inquiries formats, it is unfastened inquiry and close inquiry. Giving the questionnaire to the respondent is the appropriate for this sort of research which is needed the sentiment and perceptual experience from the respondents on the research subject which is ââ¬Ëreading wonts among pupil in Faculty of Information Management ââ¬Ë . The questionnaire content three ( 3 ) parts focused on specific countries. The countries of the probe focal point on: answering involvement in reading, respondent reading behaviours, and answering sentiment. Each of the subdivision will be described below: Part A: Demographic This subdivision will state about the characters of the respondents that have being chosen. Part B: Answering Interest IN READING In this subdivision consist of inquiry on the questionnaire is about the involvement of the pupil in the stuffs the ever read, the stuff that the pupil choose to read as their reading wonts, and why they choose the stuffs as their wonts in reading. Part C: RESPONDENT READING BEHAVIORS Answering reading behaviours tell about the times the pupil refer to do the reading, where the topographic point the pupil want to read normally, type of the stuff the pupil refer to read, the type of the entree stuff the pupil choose to read, and how many stuffs the pupil read in a hebdomad. Part D: Answering Opinion This subdivision ask the sentiment of the pupil on the bash they agree or disagree with the stuffs they choose can assist them in survey, do the reading spring or increase their cognition and experience, and what the pupil sentiment about the reading wonts and do the reading wonts can assist to determining the personalities of the pupil. 3.5 DATA COLLECTION Data aggregation is the procedure where the research workers roll uping the information from the respondent that being take either the research workers distribute the questionnaire or interview. Data aggregation besides the manner of colleting the information for the usage in the assorted of survey or doing determination in some state of affairs. Data aggregation is the of import component in the research survey. Data aggregation can be made in several ways, either the research workers choose to utilize the distribution of questionnaire, interview, or direct observation. To be after the informations aggregation the research workers must carefully believe on the inquiry that he or she will set in the questionnaire or in the interview because the reply or the consequence from the questionnaire and the interview will give impact to the information analysis and the research the terminal of it. The research workers besides must believe how to form the information, the inquiry and information subsequently and before the distribution of questionnaire and interview. The research workers should believe in this information aggregation, what inquiry or information should he or she put and how much the information the research workers should roll up. In the informations aggregation the research workers should set the information about the sum of the participant that will be in the research, feature of the research, type of the participants, demographic informations and what the research privation to make. All the informations aggregation must associate to the research. To roll up the information for the research, the research workers must utilize this type of informations aggregation method. It is sentiment study, questionnaire, single interview and group interview, simulation, and direct observation. But, normally the celebrated method in the information aggregation is utilizing the questionnaire and interviews. It is easy to utilize and faster to acquire the informations feedback. To take the method for the informations aggregation, the research workers must cognize the handiness, dependability and cogency. Availability is about the inquiry that the research workers want to utilize in the questionnaire or in the interview, is it the inquiry is available and is it the information from the consequence subsequently is available to the research. Making the research works, the research must hold the dependability and the cogency. If non there must be job in the research works. In this survey ââ¬Ëreading wonts among pupil of Faculty of Information Management ââ¬Ë the research workers use the questionnaire in the information aggregation. For the informations aggregation, in the questionnaire, the research workers divide inquiry into four subdivisions harmonizing to the of import of the surveies. The four subdivisions is demographic, answering involvement in reading, answering behaviours and the last subdivision is answering sentiment. In the questionnaire, there are parts that I do the inquiry utilizing the likert grading. Likert grading is the popular format in the research questionnaire. For this survey, I ââ¬Ëm utilizing the disposal likert grading, it is each respondent is asked to rate the inquiry have been inquiring in the questionnaire harmonizing the sentiment of the respondent. Example of the disposal likert grading is figure 1 until 5, figure 1 refer to the strongly disagree and figure 5 refer to the strongly agree. In this survey besides have the inquiry inquiring about the sentiment of the respondent on the topic that I take to be his or her surveies. Besides, in the questionnaire, I ââ¬Ëm inquiring on the behaviour of the respondent about the survey that I conduct. Using the questionnaire in these surveies has the advantages and disadvantages. The advantage is utilizing the questionnaire, the collected informations faster because I can give to the respondent by manus and acquire feedback besides by manus. But, the disadvantage is some of the respondent will make non desire to reply the questionnaire and if they want to reply, sometimes they do non reply the inquiry. 3.6 DATA ANALYSIS After the research workers collect the information, the research workers must making the informations analyze to analysis the information that have been get by the research workers. The information analysis is the procedure on to measure the informations that have been collected. There are three plants have to be considered in the information analysis, it is data readying, descriptive statistics, and illative statistics. Datas that have been get from the respondent must be prepare to analyse it. In this readying of the informations, the respondent must make the checking works, reexamine the information for the truth of the informations, altering the information, and develop the informations and certification the construction of the informations utilizing the assorted actions, either utilizing the computing machines or manual. Descriptive statistic is used to give the basic visual on the information in the survey. In this descriptive statistic, the action that been taken is making the simple analysis and simple sample of the steps. In this action, there must already hold the simple graph that shows the analysis from the information that have been collected. The last of the plants in the information analysis that research workers should see is the illative statistic. In this works the research workers do the decision of the informations that the research workers have been prepare, and analyse it in the descriptive statistic. In this subdivision besides the research worker do the hypothesis works. However, the research workers must cognize about the informations methods of the information analysis that the research workers will used. Is it the informations that the research workers collected is more on the qualitative informations or in quantitative informations. In this survey ââ¬Ëreading wonts among pupil in Faculty of Information Management ââ¬Ë , I am utilizing the SPSS ( Statistical Package for the Social Sciences ) . SPSS is the characteristic that are truly of import to analyse the statistic for the societal research. 3.7 Decision For the decision, the research methodological analysis is stating about the method that being used in the research works by the research workers to complete the thesis. In this chapter, there must be about the type of research that research workers used, research design for this surveies, the variable of the surveies, research method have to used to finish this research works, the informations aggregation, and the information analysis that must make in this research. In this chapter will state briefly about the research method that must be used before continue to another chapter that more profoundly about this surveies.
Saturday, November 9, 2019
Women and Crime by Frances Heidensohn Essay Example
Women and Crime by Frances Heidensohn Essay Example Women and Crime by Frances Heidensohn Paper Women and Crime by Frances Heidensohn Paper Women and Crime is written by Frances Heidensohn. The book was published by Macmillan Press LTD and it is the second edition. The main themes in the book are about how women are treated when they commit crime. The book looks at what crimes women commit and how they feel. It studies how the criminal justice and the penal system treat women offenders. It also analyses the deviant image of women and their experiences. The book examines social theories and traditional criminology. As well as exploring modern theories and feminist criminology. The criminal justice chapter tells us that very few women commit crime and there are small numbers who go to prison. Women commit petty crime such as shoplifting and do not really get caught, if they do it is a small number. This is because the role of a woman in society today does not come under committing crime so people pay less attention to women then men when crime is involved. The chapter about images of deviant women is very interesting, this is because it does not look at petty crime which, the reader would expect it to. Instead looks at more serious crime that are committed by women. It looks at crime such as murder like Lizzie Borden who was tried and acquitted of hacking to death her father and her step mother in 1893. Also Mary Ann Cotton convicted of murdering her step son in March 1873. Also moors murders, Myra Hindley who gained a lot publicity from the media because she was a woman who committed murders of young children. This is not expected of a woman because women are protectors of young children. So for example a mother who should look after young children and tell them what is right and wrong and guides them through out life. Not someone who should take life. Feminist criminology says that women crimes were invisible because there was such a small number. Women are also placed in a big stereotype of being in the home and bring up the children. The book also mentions moral panics about women crimes, a good example of this is witchcraft that was amplified because it was women who were doing it and in our society that is not the acceptable role of women. When looking at womens crime prostitution is a big category because it is not morally accepted in society so it is wrong even though people do not look at the economical side of prostitution for most women. In general most women are convicted for prostitution. Another aspect of the book is that of social control and the structure of society. Womens role in society, which has already been mentioned, is to look after the children and take care of the home. There has always been restriction on women because of men making the rules. If children are deviant the mothers always get the blame. Also women carry a double burden of two roles and they gain very little or no help form their husbands or partners. For children women play a significant part in social order in society. The book examines all the stereotypes about women, which are made by society that we live in with regard to crime. The book is everything you need to know about women and crime. It tells you every thing about the law to women experiences. The second chapter of the book is very interesting and has used research of other people very well. It also has extracts from letters about womens experiences that makes it interesting to read, so it uses real life examples. The book also had subheadings within chapters so it is easy to refer to a particular part of the book. The book is for academic readers and not for general reading so it is perfect for a student who is studying women and crime. The layout of the book is excellent because it is easy to refer to some thing like a quote in the book. The book has quotes from other people works and it explains them very well and you know which criminologist said what and what they meant by it. The language of the book is a bit complex and boring. . The language is appropriate to the audience. It uses Standard English so that everyone can understand it. The reader has to read some part of the book again in order to understand it. So it is a heavy book to understand overall. The book has 11 chapters and it has a look of evidence and quotes from other sociologist and criminologist which the author refers to when making a point about women and crime. A disadvantage of the book is that there is too much information in each chapter and it is hard to understand everything that is written. The text size is 12 this is what most people use and is comfortable with. If the writing was bigger then people may think it does not cover the relevant points or if the writing was too small it may put some people off from reading it because it would not be user friendly. However the way the book is set out it is user friendly. The authors extract and quotes are very useful because they demonstrate the points that are made which, also keep you interested in reading it. The text of the book flows well and makes sense. So it is in a logical order. The author look at prostitution a lot and serious crime it does not have much about petty crime which most women are convicted for. This is another disadvantage. The book also is well set out and you know who said what and where the quotes have came from. It also use statistic to illustrate point which are being made and it make it easy to compare men and women in crime they commit. The book also looks at the history of women and crime and how things have changed which makes it easier for the reader to understand what has changed and what is the same. However the book does not compare womens and mens crime so you can not really see how the two genders are treated for the same crimes. Although the book does mention women as victims of crimes but need to go in to depth more. The book does meet it aims which are set so it fulfils the purpose of the book. The book has two additions, the first edition has 10 chapters in it and the second edition has 11. This is because the book has been updated. The second edition also women as victims and what have changed and what has not. The first edition does not look at women as victims so again this is another advantage for the second edition. The book Women and Crime does not actually bring anything new about women committing crime because we already know that women commit less offence then men and most of the offence committed by women are invisible because there is such a small number. However the book does state that a lot more research needs to be done in this area, which is said by feminist criminology. Although the book does consolidate all the information we already know, so it is easier to access, which is helpful. The author does achieve it aims because it tells you all the information about women and crime and the book is good for students studying women and crime. The book is very detailed and there is a lot of information with evidence about women and crime. It is also very slow. At the beginning of the book there are a list of aims which the book meet through out. Each aim that is made in the introduction has been give a lot of detail about it and is usually give a whole chapter on it. In the conclusion the author again tells us what the aims were and how they were meet. The conclusion in the book is well written and summarises what was in the book. So the conclusion is very convincing about the themes which are in the text. The author also hits its target audience which are student and academics who are studying women and crime and has all the relevant information in one book which is very useful to student because it save them time find information from other books. Most students like to use only one book so it is a perfect student text to have. Also the book points out that there is no book called men and crime because all the book about crime have a lot of information about men committing crime and do not really mention women and crime. The book also raises a lot of question that most people would not ask and answers them well. So in conclusion the book overall is a very good student hand book for anyone studying women and crime. It has all the information and more. It contains all the evidence that you need to look for and the work of other criminologist. However the book is a heavy read and you need to concentrate when reading it. So you may need to read it again in order to gain all the information that you need.
Wednesday, November 6, 2019
English 101 for Your Future Impossible is Nothing When You Ace Writing
English 101 for Your Future Impossible is Nothing When You Ace Writing English 101 course is inevitable, and it is better to get the most out of it, then to try ignoring its value and procrastinating with writing tasks. Ability to write concise, interesting and adequate regarding the audience papers is priceless in the modern world, and English 101 is a great place to start. Course Mission English 101 aims to make student understand all basics related to writing in English: content, grammar, research, references and even making reviews and adopting texts to the specific audiences. Curriculum Fundamentals English 101 syllabus might vary from college to college, but the basics stay the same. Reading and Researching Books. There will be several literary works during the course, which you will be obligated to read and analyze. The selection of books is mostly based on the combination of classic and literature close to the major field of study. Thus, if your major is history, the book choice for the course will reflect it. Online databases. Though the course covers writing, one of the basic principles of it is to teach students to express their thoughts based on the related materials. To write a strong and interesting paper and to give your story a solid basis, you will have to dig into the various online data storages. Specialized sources. Newspapers, magazines, Facebook pages anything related to your major field of study will come in handy. Some professors give even give a list of public figures, bloggers, groups and pages you have to subscribe to and follow. It will both give you new, up-to-date information and an insight on how successful people and projects express themselves. Analysis It may be hard to believe, but making an analysis and putting the outcomes into writing is the valuable part of the English 101 curriculum. If you pay attention to the assessment rubric for this course, you will find out that it is almost impossible to score more than C without backing up your essay with an in-depth analysis of some data or your personal experience. English 101 teaches you not just to express thoughts and describe facts or events, but to make the most out of them and dig deep. Writing The last but not the least on this list is the writing itself. You will have to produce more than 20 pages of material as the result of the semester and it will take the following forms: Reflective essays. The most famous task of the English 101 course. To score in it, donââ¬â¢t just describe your experience but show how it affected you. In-class writing exercises. Pay extra attention to them, as the final test or final writing task is often based on the. Blog entries. Even if you a techie, an ability to write simple, correct and engaging wonââ¬â¢t harm your future, so donââ¬â¢t pull a lazy-bone with this task. Peer reviews. You will have to learn how to assess your classmatesââ¬â¢ writings. You will make comments on grammar, style, conclusions and outcomes, the strength of topics, etc. Stay positive and polite, be constructive and never forget to mention what you liked about the paper. 5 Rules for Dealing with English 101 Course without a Flinch Even if you misstep some basic principles when writing one or two papers, it wonââ¬â¢t be a big deal. But you should follow these rules to complete your English 101 course without getting into trouble. 1. Practice Makes Perfect If you were not an avid reader in high school, now it is time to immerse yourself in reading some of the classical literature you have always shunned. Also, create English essay 101 outlines and proceed to draft English 101 sample essays based on your experience that mirror the tone of the books you have read. This practice will serve you well for the tasks ahead. 2. Immerse Yourself into English Culture Attend college plays and programs developed by the creative art department. It is free and gives you an opportunity to make fun and useful connections, not only ace your perception of English classics. 3. Use Online Resources Intensely The world is a global village and this means your professor, as well as other reputable educationists, have online materials that extensively cover English 101. Many of these materials include English 101 essay samples and English 101 essay topics which can serve as directions or guidelines for your work. 4. Avoid Plagiarism like the Plague In literary circles, plagiarism is viewed as intellectual theft and should be avoided at all costs. This does not mean you shouldnââ¬â¢t be inspired by the essays or literary works of others. Therefore if you see a story that you like and would want your English 101 final exam essay to be as good as, note and follow the structure used and dont forget about such fine touches as idioms, metaphors and robust data background. 5. Always Ask Questions Generally, educators view students who ask questions as serious individuals who are dedicated to learning more about a subject matter. Well-crafted questions will endear you to your teacher. On the other hand, you can clarify any confusions you may have by simply lifting a finger. Consider English 101 course as a course for which many people would pay significant sums of money nowadays, but they donââ¬â¢t go to college already or yet. People pay hundreds if not thousands of dollars for writing courses which might help them to develop their blogs, write books or just find a better job. Invest yourself, and spoon off cream onwards. Additionally, you can get professional help with writing an essay from English 101 experts at our website.
Monday, November 4, 2019
Final Case Study Example | Topics and Well Written Essays - 250 words
Final - Case Study Example Such situation may arise in the transient cardiac arrest that can be managed with resuscitation and the cardio-respiratory systems kicks back to function. In addition, a patient should be confirmed dead when an extensive attempt of cardio-respiratory arrest reversal has been attempted for more than five minutesà hasà failed.à In addition,à there is no central pulse on palpation, heart sounds on auscultation as well as lack of blood pressure. It can be concluded that Ms. Robaczynski did not follow all these criteria; therefore, she did active killing. If at all, Mr. Gessner had asked to be disconnected from his respirator then Ms. Robaczynski could not have committed a crime. This is because the patients have a right to refuse treatment and would wish to have a peaceful death rather than battle with the disease. In such cases, the patient sign a legal document of ââ¬Å"Do not resuscitateâ⬠in which a patient states that in case their heart stop, then they should not be resuscitated. Even though, DNR has several ethical debates but it is legally accepted and no healthcare provider can be convicted of a crime in following the patient instruction (Sanders, Schepp, & Baird,
Subscribe to:
Posts (Atom)