Tuesday, December 24, 2019

The Relationship Between Flexibility Benefits Used And...

The article by Cicei (2015) discusses one of the greatest challenges to families in today’s society, which is work family conflict. In the workforce today, and in numerous households people struggle with being able to balance family time and the responsibilities of their chosen career without creating disturbance within their home. As a way to lessen these disputes corporations have begun to provide certain benefits, organizations, and flexible work arrangements to their employees. However, in recent studies that examine the use of flexible work arrangements and reduced levels of work-family conflict no significant results of reduced disturbance has been reported (Cicei, 2015). Since there have been no significant results Cicei (2015) conducted a study in this article to examine the relationship between the flexibility benefits used and work-family conflict, focusing especially on the role flextime and telecommuting (Cicei, 2015). To validate whether flexible work arrangements have a negative effect on work and family conflict, the conducted study examined the relationship between the use of flexible work arrangements and three forms of work family conflict. The flexible work arrangements utilized in the study included flextime, compressed workweek, telecommuting, and part-time work (Cicei, 2015). The three forms of work conflict were time-based, strain-based, and behavior based (Cicei, 2015). The participants consisted of 102 individuals who worked in IT, education, andShow MoreRelatedSynthesis Of Text 12 And 31605 Words   |  7 Pagesparental leave policy: a change in impact factors across three articles from 2008-2014. Introduction Traditional family model changed a lot these years, women have their own jobs and cannot pay all their attention to their families as they used to. Therefore, parental leave policy is put forward for to decrease work-family conflict for both men and women. Parental leave is an employee benefit available in almost all countries, including maternity, paternity, and adoption leave. During this period, theRead MoreBalancing Work and Life1280 Words   |  5 Pages Work-life balance is a state of well being that allows a person to manage effectively multiple responsibilities at work, at home, and in their community. It is about living a fulfilled life inside and outside paid work, and having control over your time so one can achieve that (HR Magazine, 2001). This balance is achieved when an individuals right to a fulfilled life inside and outside paid work is accepted and respected as the norm, to the mutual benefit of the individual, business and societyRead MoreEducational Pension Benefits and Conflict Management Essay1380 Words   |  6 PagesEducational Pension Benefits Although there is a plethora of possible sources of conflict in any workplace, the ones in this case are rather explicit. These include personal differences, Informal deficiencies’, role incompatibility, environment stress, perceptions, and expectations. Personal differences could be related to personal values, physiognomies, family bonds or ties, and material belongings. Moreover, job performance, education, knowledge, and training tend to mold each individualRead MoreThe Benefits and Challenges of Developing Play/Leisure Activities 997 Words   |  4 Pagesthat work with children experience the skilfulness to prompt or even contribute to a child’s play, which is a principle constituent to therapeutic alliance. However, for those children mentioned above, what happens when play becomes nonexistent or deprived, then how do these children engage in play? This has been a continuous argument among commenter’s, practitioners as well as researchers in the field of child development, and for that reason this essay will â€Å"evaluate some of the benefits and challengesRead MoreCritical Review of James Scotts Patron Clients and Political Change in Southeast Asia961 Words   |  4 Pagestwo most used models employed by western political scientists in analyzing the Third World. The first is a horizontal, class model of conflict (Scott 1972:9 1) whose value, he claims, is dubious in the typical nonindustrial situation where most political groupings cut vertically across class lines. The second, which Scott claims comes closer to matching reality, places emphasis on primordial ties like ethnicity, language, or religion. However, he dismisses both as being conflict models andRead MoreFamily Relations : Family Relationships Essay1539 Words   |  7 PagesIntroduction Family relationships are complicated, even more if it is regarding family business. Negotiations between family members are different from negotiations between non-family members. The relationships between brothers lead them to stronger sensitivity and loyalty. Family relationships have developed over years of interacting. Sometimes family members struggle over the appropriate role to play in this negotiation process. There is increased opportunity for misunderstanding and conflict if negotiationRead MoreEssay about Intercultural Communication1561 Words   |  7 PagesIn the process of globalization, the intimate relationship between people from different racial, ethnic, national and regional groups becomes such a normative thing and is seen as good sign of integration process and social diversity. According to Ho (1990), the definition of â€Å"intercultural marriage† is explained as the marriage between partners from different racial, ethnic, national or religious backgrou nds. Now intercultural marriage becomes a trend and receives a massive notice, which explainsRead MoreNegotiation Report Med Lee1070 Words   |  5 PagesPursuit of a joint venture negotiation exercise refers to a joint venture between a US Company and a Family Thai Business Company. I had the role of Pat Armstrong (Med Device Representative: Director of International Strategic Market Research) the issues I had to negotiate were: decision making/control, staffing, profit distribution and conflict resolution mechanism. The goal of the negotiation was to keep a long-term relationship and set an agreement with Lee Medical Supply on different issues of theRead MoreDispute Resolution : A Conflict Diagnosis Approach1690 Words   |  7 PagesDispute Resolution: A Conflict Diagnosis Approach† is a great book that defines and explains the different types of dispute resolutions that can be used to settle a conflict. Some of the dispute resolutions discussed in the book are suitable f or specific disputes. And the different type of dispute resolutions has different advantages and disadvantages for disputants. It is important to understand the different types of dispute resolutions, and their processes for resolving conflict in order to selectRead MoreApplying Bowenian and Structural Theories Essay1708 Words   |  7 Pagesï » ¿ Applying Bowenian and Structural Theories Applying Bowenian Structural Theories For this assignment, two different theoretical approaches will be discussed, Bowenian family therapy and structural family therapy, and they will be used individually to construct a treatment plan to help clients reach their goals. Within each treatment plan discussed, short-term and long-term goals of therapy will be established and the family’s presenting problems will be defined. Two techniques

Monday, December 16, 2019

The Tax Research Process Free Essays

The Tax Research Process The overriding purpose of tax research is to find solutions to the tax problems of one’s clients or employer. The process is similar to that of traditional legal research. The researcher must find authority, evaluate the usefulness of that authority, and apply the results of the research to a specific situation. We will write a custom essay sample on The Tax Research Process or any similar topic only for you Order Now One can identify two essential tax research skills: * The first is using certain mechanical techniques to identify and locate the tax authorities that relate to solving a problem. * The second entails a combination of reasoning and creativity and is more difficult to learn. A researcher must begin with native intelligence and imagination and add training and experience properly to apply the information found. Creativity is necessary to explore the relevant relationships among the circumstances and problems at hand to find a satisfying (and defensible) solution. In many cases, no legal authority exists that is directly on point for the problem. If such a situation comes up, the researcher must combine seemingly unrelated facts, ideas (including those that he or she has derived from previous research work), and legal authority to arrive at a truly novel conclusion. This creative ability of the researcher often spells the difference between success and failure in the research process. Outline of Tax Research Process As the tax problems of the client become more significant, the related tax research can become time-consuming and, thus, expensive to the client. A moderate tax research problem often takes up to eight or ten hours of research time, and the bill for these services may approach or even exceed $2,000. Because of the costs that are involved, the tax researcher must work as efficiently as possible to obtain the solution to the client’s problem. The researcher needs a framework for the research process, so that he or she does not waste time and effort in arriving at a solution to the problem. The tax research process can be broken down into six major steps. Tax researchers (especially those without a great amount of experience at the task) must approach the resolution of a tax problem in a structured manner, so that the analysis of the problem will be thorough and the solution complete. Step 1: Establish the Facts Before a researcher can analyze the tax consequences of a transaction, he or she must understand the transaction itself. Specifically, the researcher should discuss the details of the transaction with the client to ascertain the client’s motivation. What are the client’s business or financial objectives in undertaking the transaction? What does the client foresee as the desired outcome? What risks has the client identified? By asking these types of questions, the researcher gets to be more acquainted with the non-tax features of the transactions. Discover All the Facts The researcher must discover all the facts concerning the client’s transaction. Like a newspaper reporter, the researcher should question the client about the precise â€Å"who, when, where, why, and how† of the transaction. The researcher should not assume that the client’s initial summary of the transaction is factually accurate and complete. Perhaps the client hasn’ t determined all the facts that the researcher needs. Or the client may have discounted the significance of certain facts and omitted them from the initial summary. The researcher should encourage the client to be objective in stating the facts. Often, a client unwittingly presents the researcher with the client’s subjective conclusions about the facts rather than with the facts themselves. Impact of Client’s Tax Knowledge When a researcher is working with a client to uncover the relevant facts, the researcher must take into account the level of the client’s tax knowledge. If the client has some knowledge of the tax law, the researcher can ask questions that presume such knowledge. On the other hand, if the client is unsophisticated in tax matters, the researcher should ask only questions that the client can answer without reference to the tax law. Step 2: Identify the Issues After the researcher is satisfied that he or she understands the client’s transaction and knows all the relevant facts, the researcher can proceed to the second step in the research process. In this step, the researcher identifies the tax issue or issues suggested by the transaction. The ability to recognize tax issues is the product of technical education and professional experience. Consequently, this step is usually the most challenging for new tax researchers. The identification of issues leads to the formation of tax research questions. The tax researcher should be as precise as possible in formulating questions. A precise question is narrowly stated ands provides clear parameters for the remaining steps in the research process. An imprecise question that is vague or overly broad in scope may provide insufficient parameters and result in wasted time and effort. Multiple Research Questions If the tax issue suggested by a transaction lead to multiple research questions, the researcher must determine the order in which the questions should be answered. In our complex tax system, the answer to a question often depends on the answer to one or more preliminary questions. Tax researchers who understand the hierarchy of their research questions can address each question in the right order and conduct their research with maximum efficiency. A combination of education, training, and experience is necessary to enable the researcher to identify all of the issues with respect to a tax problem successfully. In some situations, this step can be the most difficult element of a tax research problem to carry out. Issues in a closed-fact tax research problem often arise from a conflict with the IRS. In such a case, one can ascertain the issue(s) easily. Research of this nature usually consists of finding support for an action that the client has already taken. Types of Issues In most research projects, however, the researcher must develop a list of issues. Research issues can be divided into two major categories: * Fact issues are concerned with information having an objective reality, such as the dates of transactions, the amounts involved in an exchange, reasonableness, intent, and purpose. Law issues arise when the facts are well established, but it is not clear which portion of the tax law applies to the issue. Step 3: Locate Authority As the third step in the research process, the researcher heads for a tax library. A researcher’s mission is to locate the authority that provides answers to the research question. Traditional libraries consist of shelves filled with books, loose-leaf binders, magazines, and other published materials containing all the technical minutiae of the tax law. Today, traditional libraries are disappearing as professional tax advisors gain access to the electronic libraries available on the Internet. Once obvious advantage of electronic libraries is the speed at which researchers can access sources of authority and move among the sources. A second advantage is the ease with which electronic sources can be updated to include current developments. A third advantage is that an electronic library is portable. A tax researcher with a laptop computer can access the library at any time and from any location. Regardless of whether a tax researcher is working in a traditional or electronic library, a researcher must be knowledgeable about the content and organization of the reference pertaining to the problem at hand. The researcher also must be able to distinguish between the two main categories of reference materials: sources of authority and sources of information. Primary Authority Primary authority is an element of the Federal tax laws that was issued by Congress, the Treasury Department, or Internal Revenue Service. Primary authority carries greater precedential weight than secondary authority. Each primary authority also has a relative weight to other primary authorities. Weight is best described as an assessment of relative importance compared to other authority. Statutory sources include the Constitution, tax treaties, and tax laws passed by Congress. Statutory authority is the basis for all tax provisions. The Constitution grants Congress the power to impose and collect taxes and also authorizes the creation of treaties with other countries. The power of Congress to implement and collect taxes is summarized in the Internal Revenue Code, the official title of U. S. tax law. The Internal Revenue Code constitutes the basis for all tax law, and, therefore, the basis for arriving at solutions to all tax questions. The other primary sources of the tax law, administrative and judicial authority, function primarily to interpret and explain the application of the provisions of the Internal Revenue Code and the intent of Congress. Administrative sources include the various rulings of the Treasury Department and the IRS. These are issued in the form of Regulations, Revenue Rulings, and other pronouncements. Judicial sources consist of collected rulings of the various courts on federal tax matters. Secondary Authority Secondary Authority Sources consist of unofficial sources of tax information, such as: * tax services * journals * textbooks * treatises * newsletters. Secondary authority is an element of the tax law that was issued by a professional or scholarly writer. It is an interpretation of the tax law issued by primary sources. Many secondary sources exist. Some of the most useful are the editorial analysis and explanation contained in many of the major tax services, articles published in the numerous professional journals and newsletters, treatises, and textbooks. Secondary authority carries less precedential weight than primary authority. Secondary authorities are useful in finding, analyzing, and evaluating primary authorities. The distinction between primary and secondary (or editorial) sources of authority is more important because of IRC  § 6662, which imposes a penalty on substantial understatements of tax, except where the taxpayer has â€Å"substantial authority† for the position taken on the return. Substantial Authority The Regulation under  § 6662 specifies the sources of â€Å"substantial authority† to include: * provisions of the Internal Revenue Code temporary and final Regulations * court cases * administrative pronouncements * tax treaties * Congressional intent as reflected on Committee Reports. This list was expanded by the Committee Report for the Revenue Reconciliation Act of 1989 to include: * Proposed Regulations * Private Letter Rulings * Technical Advice Memoranda, * Information or Press Releases * Not ices * Any other similar documents published by the IRS in the Internal Revenue Bulletin. Treatises and articles in legal periodicals, however, are not considered substantial authority under this statute. Conflicting Authority Secondary authority is useful when conflicting primary authority exists, when there appears to be no extant primary authority, or when the researcher needs an explanation or clarification of the primary authority. Over the past 15 years, as the support staffs of government agencies and (especially) Federal courts have been decreased in number or otherwise become inadequate, more dependence has been placed upon the secondary authorities of the tax law, even by the IRS, the Treasury Department, and the court system. Tax researchers must be careful, though, not to rely too heavily upon secondary authority and always to read any pertinent primary authority that is referred to in the secondary sources. Commercial Tax Services Because of the vast amount of tax authority that is available, the tax researcher would have a tremendous problem in undertaking a tax research problem for a client if it were not for commercial tax services and treatises. Several publishers have produced coordinated sets of reference materials, such as RIA’s Checkpoint, that organize the tax authority into a usable format, making the Internal Revenue Code and other primary authorities much more accessible. Checkpoint ® Commercial tax services, such as RIA’s Checkpoint, are useful in that they provide simplified explanations with footnote citations, as well as examples illustrating the application of the law. Checkpoint leads the tax researcher, via the footnote references, to the primary source that is pertinent to the question at hand. A tax service can be classified as chiefly an annotated service or as a topical service. Annotated services are organized in Internal Revenue Code section order, such as RIA’s United States Tax Reporter. A topical service, such as RIA’s Federal Tax Coordinator, is organized by topical areas determined by the editors. Step 4: Evaluate Authority Regardless of whether a researcher is reading from a printed page or a computer screen, the researcher must have the skill to interpret and evaluate the authority at hand. In some cases, the authority may provide an unambiguous answer to the researcher’s question. In other cases, the answer may be equivocal because the authority is inconclusive or subject to interpretation. Or perhaps different sources of authority provide conflicting answers. In these cases, the researcher must bring his or her own judgment to bear in analyzing the authority and answering the question. Weighting Authorities All tax authority does not carry the same precedential value. For example, the tax court could hold that an item should be excluded from gross income at the same time that an outstanding IRS Revenue Ruling asserts the item is taxable. The tax researcher must evaluate the two authorities and decide whether to recommend that his or her client report the disputed item. How Research Can Loop In the process of evaluating the authority for the issue(s) under research, new issues previously not considered by the researcher may come to light. If this is the case, the researcher may be required to gather additional facts, find additional pertinent authority, and evaluate the new issues. All of these research activities must be related to the client’s research problem. The researcher uses professional judgment in selecting issues and determining the effort to expend on the issues. This loop is illustrated below: Step 5: Develop Conclusions As part of the analytic process, the researcher should decide if the authority requires him or her to make a factual judgment or an evaluative judgment. Factual Judgment In making a factual judgment, the researcher compares the authority to a set of facts. Assuming that the facts are complete and accurate, the researcher can provide a definitive answer to the research question. Evaluative Judgment Researchers are required to make evaluative judgments when the relevant authority relates to a conclusion inferred from a set of facts, rather than to the facts themselves. By definition, conclusions are subjective; different observers may draw different conclusions from the same facts. A researcher who must draw a conclusion to complete a research project can never be sure that such conclusion will go unchallenged by the IRS. Therefore, the researcher should never give an unqualified answer to a research question requiring an evaluative judgment. Getting All the Facts At some point in the research process, even an expert may discover that he or she does not have all the facts necessary to complete the analysis of the client’s transaction. In such case, the researcher must repeat Step 1 by obtaining additional information from the client. Oftentimes the additional information suggests additional tax issues and research questions that the researcher must address. A researcher may have to repeat Steps 1 through 4 several times before he or she is satisfied with the analysis. Handling Unresolved Issues Where unresolved issues exist, the researcher might inform the client about alternative possible outcomes of each disputed transaction, and give the best recommendation for each. If the research involved an open fact situation, the recommendation might detail several alternative course of future action, (for example, whether to complete the deal, or how to document the intended effects of the transaction). In many cases, the researcher may find it appropriate to present his or her recommendation of the â€Å"best† solution from a tax perspective, as well as one or more alternative recommendations that may be much more workable solutions. In any case, the researcher will want to discuss with the client the pros and cons of all reasonable recommendations and the risks associated with each course of action. Step 6: Communicate The final step in the research process is to communicate the results and recommendations of the research. The results of the research effort usually are summarized in a memorandum to the client file and a letter to the client. Both of these items usually contain a restatement of the pertinent facts as the researcher understands them, any assumptions the researcher made, issues addressed, the applicable authority, and the tax researcher’s recommendations. The memorandum to the file usually contains more detail than does the letter to the client. Client’s Tax Knowledge In any event, the researcher must temper his or her communication of the research results so that it is understandable by the intended reader. For instance, the researcher should use vastly different jargon and citation techniques in preparing an article for the Journal of Taxation than in preparing a client memo for a businessperson or layperson who is not sophisticated in tax matters. How to cite The Tax Research Process, Essays

Sunday, December 8, 2019

Market Research and Consumer Behavior Understanding

Question: Create an article summary based on business and/or news article taken from a scholarly marketing research publication pertaining to a consumer based marketing research topic. The idea is to see how the concepts I am learning in class apply to the real world. I am learning about the marketing research process and proposals, such as qualitative and quantitative research methods. Answer: The considered article has been established for the purpose to gain an in-depth understanding of the experience, behavior, and journey of the customers of Apple. The conducted research presented through the article indicative of the fact that in the current scenario consumers prefers to make communication with the business enterprises through multiple touch points (Lemon Verhoef, 2016). The article says that such recent trend in customer behavior determines that this is probably a high time when business firms should start integrating their external stakeholders with the internal business function to gain positive customer responses and stable relationship with them. Following the major aim of the concerned article which is to have a clear understanding of the complex attitude of the customers, the author has given stress upon qualitative research. The article establishes its core aspects by evaluating several historical resources in the context of customer experience (Lemon Verhoef, 2016). Alongside, the article has made a serious attempt to showcase the way in which customer journeys and experiences are related can be handled with customer management. The research article is relevant enough for understanding that instead of having a handful of statistic tools for quantitative research; qualitative thematic analysis method is significant sufficiently to get to the root of critical matters like the considered one. The outcome could not have been obtained without pertaining the existing concepts and literature. As opined by Creswell (2013), thematic research style in qualitative analysis is used less though it is powerful enough to establish a new hypothesis. The article finally showcased some significant points through which future researcher can undertake research studies on the same subject matter. In the current scenario, enterprises like Apple prefer to take market research to gain customer opinions through conducting surveys on buyers. Therefore it seems understandable that primarily quantitative research process is the first preferences for most of the business organization. On the other side, a question may arise about the importance of doing thematic qualitative research to understand customer behavior (Lehnert et al., 2016). Quantitative market research may provide a handful of numerical data which could not be understood without the help of qualitative thematic research. As opined by Duggleby Williams (2016), the thematic analysis in qualitative method paves the way for gaining better perception regarding the on field data acquired through the random survey. The concerned article could not have been prepared if there have not been supporting for quantitative data. Most importantly, the purpose of the article is found to be established on particular numerical data regarding the complex behavior of consumers. Therefore, it can be deducted that in market research, qualitative and quantitative thematic research methods are correlated with each other. Therefore, alongside presenting historical perspective regarding customer experience, the article proves another major fact that is the thematic analysis of qualitative method is equally important for market research in comparison with quantitative studies. It is, therefore, understandable that market research which is an essential tool for communication with the customer and gaining the response from them executes fruitfully with the help of both qualitative and quantitative research methods. References Creswell, J. W. (2013).Research design: Qualitative, quantitative, and mixed methods approach. Sage publications. Duggleby, W., Williams, A. (2016). Methodological and Epistemological Considerations in Utilizing Qualitative Inquiry to Develop Interventions.Qualitative health research,26(2), 147-153. Lehnert, K., Craft, J., Singh, N., Park, Y. H. (2016). The human experience of ethics: a review of a decade of qualitative ethical decision making research.Business Ethics: A European Review,25(4), 498-537. Lemon, K. N., Verhoef, P. C. (2016). Understanding Customer Experience Throughout the Customer Journey 1.Journal of Marketing.

Saturday, November 30, 2019

The Bay Of Pigs Essays - CubaUnited States Relations, Fidel Castro

The Bay Of Pigs The Bay of Pigs Invasion. The story of the failed invasion of Cuba at the Bay of Pigs is one of mismanagement, overconfidence, and lack of security. The blame for the failure of the operation falls directly in the lap of the Central Intelligence Agency and a young president and his advisors. The fall out from the invasion caused a rise in tension between the two great superpowers and ironically 34 years after the event, the person that the invasion meant to topple, Fidel Castro, is still in power. To understand the origins of the invasion and its ramifications for the future it is first necessary to look at the invasion and its origins. Part I: The Invasion and its Origins. The Bay of Pigs invasion of April 1961, started a few days before on April 15th with the bombing of Cuba by what appeared to be defecting Cuban air force pilots. At 6 a.m. in the morning of that Saturday, three Cuban military bases were bombed by B-26 bombers. The airfields at Camp Libertad, San Antonio de los Baos and Antonio Maceo airport at Santiago de Cuba were fired upon. Seven people were killed at Libertad and forty-seven people were killed at other sites on the island. Two of the B-26s left Cuba and flew to Miami, apparently to defect to the United States. The Cuban Revolutionary Council, the government in exile, in New York City released a statement saying that the bombings in Cuba were . . . carried out by 'Cubans inside Cuba' who were 'in contact with' the top command of the Revolutionary Council . . . . The New York Times reporter covering the story alluded to something being wrong with the whole situation when he wondered how the council knew the pilots were coming if the pilots had only decided to leave Cuba on Thursday after . . . a suspected betrayal by a fellow pilot had precipitated a plot to strike . . . . Whatever the case, the planes came down in Miami later that morning, one landed at Key West Naval Air Station at 7:00 a.m. and the other at Miami International Airport at 8:20 a.m. Both planes were badly damaged and their tanks were nearly empty. On the front page of The New York Times the next day, a picture of one of the B-26s was shown along with a picture of one of the pilots cloaked in a baseball hat and hiding behind dark sunglasses, his name was withheld. A sense of conspiracy was even at this early stage beginning to envelope the events of that week. In the early hours of April 17th the assault on the Bay of Pigs began. In the true cloak and dagger spirit of a movie, the assault began at 2 a.m. with a team of frogmen going ashore with orders to set up landing lights to indicate to the main assault force the precise location of their objectives, as well as to clear the area of anything that may impede the main landing teams when they arrived. At 2:30 a.m. and at 3:00 a.m. two battalions came ashore at Playa Gir?n and one battalion at Playa Larga beaches. The troops at Playa Gir?n had orders to move west, northwest, up the coast and meet with the troops at Playa Larga in the middle of the bay. A small group of men were then to be sent north to the town of Jaguey Grande to secure it as well. When looking at a modern map of Cuba it is obvious that the troops would have problems in the area that was chosen for them to land at. The area around the Bay of Pigs is a swampy marsh land area which would be hard on the troops. The Cuban forces were quick to react and Castro ordered his T-33 trainer jets, two Sea Furies, and two B-26s into the air to stop the invading forces. Off the coast was the command and control ship and another vessel carrying supplies for the invading forces. The Cuban air force made quick work of the supply ships, sinking the command vessel the Marsopa and the supply ship the Houston, blasting them to pieces with five-inch rockets. In the end the 5th battalion was lost, which was on the Houston, as well as the supplies for the landing teams and eight other smaller vessels. With some of the invading forces' ships destroyed, and no command and control ship, the logistics of the operation

Tuesday, November 26, 2019

Jonas Salk Essays - Poliomyelitis, Jonas Salk, Albert Sabin

Jonas Salk Essays - Poliomyelitis, Jonas Salk, Albert Sabin Jonas Salk Jonas Salk (1914-1995) Jonas Salk was the first born of Daniel B. Salk and Dora Press. He was born in New York, New York on October 28, 1914. He died in La Jolla, California on June 23, 1995. Salk attended Townsend Harris High School for the gifted and received his B.A. from College of the City of New York in 1934. He received his M.D. from New York University in 1930 and interned at Mount Sinai Hospital, where he studied immunology. He was recognized as an able scientist by his teachers. Also, during World War 2, he was a participant in the armys effort to develop an effective vaccine for influenza. Salk was restless and wanted freedom from the projects of his senior colleagues so he could try out his own ideas. He accepted a position at the University of Pittsburgh Medical School. And at that time, had no record of a basic search in medicine. Salk got the space he needed and quickly put together a team of laboratory workers to help him study infectious diseases. Salks success in developing a vaccine for polio depended on discoveries of many other researchers in immunology and virology. Originally polio could only be grown in live monkeys. Attempts in the 1930s to use a vaccine prepared from the killed extracts of infected monkey brains resulted in deaths of several children. It was also thought that polio only grew in nerve tissues but infected humans produced large amounts of viruses in their feces, suggesting it also grew in intestines. IT was later found that polio consists of at least 3 different types of viruses. By 1954, all the difficulties were resolved. Salk then began the crucial human experiments to confirm the results taken on monkeys. He and his workers immunized themselves and their families and began field testing the vaccine. The first 7 million doses of the vaccine were given in 1955. Salk then gave a nationwide program from 1956 through 1958. Almost immediately after this program of immunization then United States was polio-free. Salks killed virus vaccine required 4 injections, one for each type plus a booster. Although the live vaccine, made by Albert Sabin, took fewer doses, it was used more frequently in the following years. Polio had already been defeated and in the publics mind, Salk had become a national hero. Although nominated, he was never named a Nobel laureate, but among his honors were Presidential Citation in 1955, a Congressional Gold Medal in 1955, the Albert Lasker Award in 1956, the Mellon Institute Award in 1969, and the Presidential Medal of Freedom in 1977. He received the Robert Koch Medal from Germany, while France named him Chevalier de la Legion dHonneur. His greatest reward was the knowledge of being instrumental in the eradication of a terrible disease. And as Salk once said, Nothing happens quite by chance. Its a question of accretion of information and experience.

Friday, November 22, 2019

The Earths Core - Its Structure and Possible Composition

The Earth's Core - Its Structure and Possible Composition A century ago, science barely knew that the Earth even had a core. Today we are tantalized by the core and its connections with the rest of the planet. Indeed, were at the start of a golden age of core studies. The Cores Gross Shape We knew by the 1890s, from the way Earth responds to the gravity of the Sun and Moon, that the planet has a dense core, probably iron. In 1906 Richard Dixon Oldham found that earthquake waves move through the Earths center much slower than they do through the mantle around it- because the center is liquid. In 1936 Inge Lehmann reported that something reflects seismic waves from within the core. It became clear that the core consists of a thick shell of liquid iron- the outer core- with a smaller, solid inner core at its center. Its solid because at that depth the high pressure overcomes the effect of high temperature. In 2002 Miaki Ishii and Adam Dziewonski of Harvard University published evidence of an innermost inner core some 600 kilometers across. In 2008 Xiadong Song and Xinlei Sun proposed a different inner inner core about 1200 km across. Not much can be made of these ideas until others confirm the work. Whatever we learn raises new questions. The liquid iron must be the source of Earths geomagnetic field-   the geodynamo- but how does it work? Why does the geodynamo flip, switching magnetic north and south, over geologic time? What happens at the top of the core, where molten metal meets the rocky mantle? Answers began to emerge during the 1990s. Studying the Core Our main tool for core research has been earthquake waves, especially those from large events like the 2004 Sumatra quake. The ringing normal modes, which make the planet pulsate with the sort of motions you see in a large soap bubble, are useful for examining large-scale deep structure. But a big problem is nonuniqueness- any given piece of seismic evidence can be interpreted more than one way. A wave that penetrates the core also traverses the crust at least once and the mantle at least twice, so a feature in a seismogram may originate in several possible places. Many different pieces of data must be cross-checked. The barrier of nonuniqueness faded somewhat as we began to simulate the deep Earth in computers with realistic numbers, and as we reproduced high temperatures and pressures in the laboratory with the diamond-anvil cell. These tools (and length-of-day studies) have let us peer through the layers of the Earth until at last we can contemplate the core. What the Core Is Made Of Considering that the whole Earth on average consists of the same mixture of stuff we see elsewhere in the solar system, the core has to be iron metal along with some nickel. But its less dense than pure iron, so about 10 percent of the core must be something lighter. Ideas about what that light ingredient is have been evolving. Sulfur and oxygen have been candidates for a long time, and even hydrogen has been considered. Lately, there has been a rise of interest in silicon, as high-pressure experiments and simulations suggest that it may dissolve in molten iron better than we thought. Maybe more than one of these is down there. It takes a lot of ingenious reasoning and uncertain assumptions to propose any particular recipe- but the subject is not beyond all conjecture. Seismologists continue to probe the inner core. The cores eastern hemisphere appears to differ from the western hemisphere in the way the iron crystals are aligned. The problem is hard to attack because seismic waves have to go pretty much straight from an earthquake, right through the Earths center, to a seismograph. Events and machines that happen to be lined up just right are rare. And the effects are subtle. Core Dynamics In 1996, Xiadong Song and Paul Richards confirmed a prediction that the inner core rotates slightly faster than the rest of the Earth. The magnetic forces of the geodynamo seem to be responsible. Over geologic time, the inner core grows as the whole Earth cools. At the top of the outer core, iron crystals freeze out and rain into the inner core. At the base of the outer core, the iron freezes under pressure taking much of the nickel with it. The remaining liquid iron is lighter and rises. These rising and falling motions, interacting with geomagnetic forces, stir the whole outer core at a speed of 20 kilometers a year or so. The planet Mercury also has a large iron core and a magnetic field, though much weaker than Earths. Recent research hints that Mercurys core is rich in sulfur and that a similar freezing process stirs it, with iron snow falling and sulfur-enriched liquid rising. Core studies surged in 1996 when computer models by Gary Glatzmaier and Paul Roberts first reproduced the behavior of the geodynamo, including spontaneous reversals. Hollywood gave Glatzmaier an unexpected audience when it used his animations in the action movie The Core. Recent high-pressure lab work by Raymond Jeanloz, Ho-Kwang (David) Mao and others has given us hints about the core-mantle boundary, where liquid iron interacts with silicate rock. The experiments show that core and mantle materials undergo strong chemical reactions. This is the region where many think mantle plumes originate, rising to form places like the Hawaiian Islands chain, Yellowstone, Iceland, and other surface features. The more we learn about the core, the closer it becomes. PS: The small, close-knit group of core specialists all belong to the SEDI (Study of the Earths Deep Interior) group and read its Deep Earth Dialog newsletter. And they use the Special Bureau for the Cores website  as a central repository for geophysical and bibliographic data.

Thursday, November 21, 2019

A book that you did not like at first then appreciate Essay

A book that you did not like at first then appreciate - Essay Example As part of British Literature class, all students had to read Wilde’s book during the summer session. I had essentially developed a negative attitude towards the book after reading the preface, which criticizes the book as being immoral. The preface also concisely sets forth the beliefs of Wilde’s philosophy of art, which is devoted to the aestheticism school of thought. However, I had to read the book because it as recommended by the school for the summer holiday. The book was meant to make use learn a life lesson; it was also an assignment from school because despite bringing out the character of Dorian the book was meant to help use in English learning as it portrayed, different themes and styles of writing. The book is based on Dorian Gray, who, is the subject of a lengthy portrait by Basil Hallward. Basil Hallward is impressed and infatuated with the beauty of Dorian that he thinks that he is accountable for the new mode in his art as a painter. After meeting Lord Henry Wotton, Dorian is enthralled by the noble debauched worldview, where he thinks that sensual fulfillment and beauty are the only things that a person should pursue in life. Because Dorian knows, that beauty will fade with time he resolves to sell his soul to ensure that only his picture will age and not him. Basil grants Dorian his wish, and he pursues all the worldly pleasure by doing different immoral things. He does not age even a single day, but his portrait records all his soul-corrupting sin. In the first instance, when he decides to go and view his picture he finds that the picture bears a subtle smirk of cruelty. The smirk of cruelty appears in the picture after his heartbreaks Sibyl a girl she falls in love with after she sees her perform in the theatre. Dorian pursues his worldly pleasures, but realizes that they are not doing him any good and goes to reconcile

Tuesday, November 19, 2019

International human resource management Essay Example | Topics and Well Written Essays - 2000 words

International human resource management - Essay Example At the same time the HRM should be flexible enough such that the differences in the HRM policies and practices can accommodate the different cultural and business settings (Sims, 2007). Marginson and Sisson (1994) have argued that industrial relations are deep rooted in the national system, which obstructs the penetration of transnational practices by Multi National Enterprises (MNEs). The increased pressure of globalization has made the MNEs to standardize their HRM procedures internationally such that the internal consistency is maintained and ‘best practices’ are percolated to the subsidiaries. This has raised the question of whether the standardized approach for labor relation framed by the MNEs actually caters to the type of employment. In this context the case study has examined the various workforce characteristics of McDonald’s operating in United Kingdom (UK) and Germany. An in detailed analysis about their appraisal, recruitment and characteristics of wo rkforce has been studied. McDonald’s Corporation is one of the most renowned companies in the world. It is the fast food chain, symbolized by a golden arch and has spread its business all over the world. It is recognized as a foremost franchising company, with 80% of its restaurant operating and owned by the franchisees (McDonald's, 2013; Briscoe, Schuler and Tarique, 2012). Interbrand has positioned McDonald’s at the seventh place among the top 100 brands in the world. McDonald’s is operating in different countries, which signifies that it has to adopt its product and services in such a way that it matches not only the cultural, political and economical factors of the country but also the HR practices adapted by them. The HR professional at McDonald’s, before opening their operation in any country conduct an extensive research in order to understand and determine the ways in which the HR activities may be adjusted (Aswathappa and Dash, 2007). As pointed by Love (1995) McDonald’s is well known across the globe for its standardized level of image and product. McDonald’s tends to impose the practices followed in the home country in relation to the trade unions, employee participation and control over the operations of the franchisee. In this context two aspects are studied to analyze the extent to which the standardized approach of labor relation designed by McDonald’s caters to the type of people employed and accommodation of different type of workers by McDonald’s, available in the different labor markets. Recruitment and Appraisal Studies suggest that the business organizations in Germany have a lower level of staffing as compared to the organization in UK. The reason was that the restaurant in Germany has more number of full time workers as compared to that of UK. This was due to the introduction of the German collective agreement that was introduced in the year 1989 for the employees of McDonaldâ€℠¢s. Recruitment for McDonald’s was done through the process of application. Then the applicants had to undergo lie detection process. But it was abolished after there were changes in the labor laws of US. McDonald’s was also in headlines due to the charges bought by a investigative journalist that if during the interview process the interviewing manager finds that the applicant has any

Saturday, November 16, 2019

Historical look at corrections systems Essay Example for Free

Historical look at corrections systems Essay Criminal justice refers to the system used by a government to maintain social control, prevent crime, enforce laws and administer justice. Law enforcement (police), the courts and corrections (prisons) are the primary agencies charged with these responsibilities. The discussion contained in this paper is on the corrections as a division in the criminal justice system. World over, the police are invloved in law enforcement. Those who break the law, regarded as offenders, are charged in a court of law and if found guilty are passed over to the corrections. Corrections, according to (The Wikipedia encyclopedia, n. d. ) Rretrieved March 14, 2007, from http://en. wikipedia. org/wiki/Prison database, refer to one of the components of the criminal justice system that serves to punish and in many instances rehabilitate criminal offenders. Sentences given to offenders range from probation to serving time in prison, or community corrections program, home confinement, and electronic monitoring. Financial penalties may include fines, forfeiture, and restitution. World over, prisons remain the primary type of institution for housing offenders. Prison, penitentiary, or correctional facility, Wakipedia encyclopedia says, is a place in which individuals are physically confined or interned, and usually deprived of a range of personal freedoms. The prison, says (The Howard League for Penal Reform n. d. ) History of Prison: Retrieved March 14, 2007, from http://www. howardleague. org/ database, is â€Å"just one of a number of sanctions available to the courts to deal with those who commit criminal offences. † A historical look at corrections systems: In the 16th and 17 century, according to The Howard League for Penal Reform, sanctions for criminal behaviour tended to be public events which were designed to shame the person and deter others; these included the ducking stool, the pillory, whipping, branding and the stocks. At the time the sentence for many other offences was death. Prison tended to be a place where people were held before their trial or while awaiting punishment. Men and women, boys and girls, debtors and murderers were all held together in local prisons. It was very rarely used as a punishment in its own right. The correction system, by all standards was quite brutal as after one being convicted, he or she was either subjected to instant punishment such as whipping or even death. Howard League of Penal Reform says that â€Å"Evidence suggests that the prisons of this period were badly maintained and often controlled by negligent prison warders. Many people died of diseases like gaol fever, which was a form of typhus. † Houses of correction were originally part of the machinery of the Poor Law, intended to instil habits of industry through prison labour. Most of those held in them were petty offenders, vagrants and the disorderly local poor. By the end of the 17th century they were absorbed into the prison system under the control of the local Justices of the Peace. The league points out that although the 18th century has been characterised as the era of the Bloody Code there was growing opposition to the death penalty for all but the most serious crimes. Such severe punishment was counter-productive, as jurors were refusing to find thieves guilty of offences, which would lead to their execution. At this time many jailers were unpaid and they earned extra money by charging prisoners for food, drink, fuel, beds and blankets. Some jailers would put shackles and manacles on prisoners and would charge fees for them to be removed. Many prisoners were bullied by jailers and other prisoners, and would often have to pay a form of protection money. By the mid-18th century imprisonment, with hard labour, was beginning to be seen as a suitable sanction for petty offenders. â€Å"Transportation was a much-used method for disposing of convicted people. Convicts were shipped to the British colonies like America (until the end of the American War of Independence in 1776), Australia, and Van Diemen’s Land (Tasmania),† writes the league. But transportation was curtailed at the end of the 18th century. Other sanctions therefore had to be found. The two prominent alternatives were hard labour or incarceration. In 1777, there were condemnations of the prison system as disorganised, barbaric and filthy with calls for reforms including the installation of paid staff, outside inspection, a proper diet and other necessities for prisoners. Penal reformers also ensured the separation of men and women and that sanitation was improved. Various Acts were also put in place that gave specifications of the measurements for prison cells. In the 19th centruary capital punishment begun being regarded as an inappropriate sanction for many crimes. The shaming sanctions, like the stocks, were regarded as outdated. The 1800s saw the introduction of new systems and a tightening of the prison regime. The Silent and Separate Systems were used either to keep a regime of silence or to keep prisoners in solitary confinement. The idea being prisoners could not infect each other with criminal ways. These methods were soon criticised with people citing the high incidences of insanity amongst prisoners. Improvements were made in 1815 when an Act was passed to prevent jailers from charging prisoners. The state now paid jailers, while magistrates were given the responsibility of inspecting the jails. By mid-century, imprisonment had replaced capital punishment for most serious offences except for that of murder. Ideas relating to penal reform with the rehabilitation of offenders were becoming increasingly popular. The 19th century saw the birth of the state prison. † This is the period, which also saw prisons being controlled centrally. At this time prison was seen primarily as a means to deter offending. This was a movement away form the reforming ideals of the past. By 1877 all prison staff were salaried and commissioners stressed that staff would be selected on merit alone. In late 1890s, many governments put in place Acts that saw the abolition of hard labour, and established the idea that prison labour should be productive, not least for the prisoners, who should be able to earn their livelihood on release. In the 20th centruary, the development of the prison system gained momentum. In 1919 prison warders were renamed prison officers. Separate confinement of prisoners was abolished in 1922 and soon over 400 voluntary teachers started work in prisons. Pollock M. Joyceline (Google Book) Prisons Today and Tommorrow , Jones and Bartlett Publishers, (pg 318) says that beginning in the 1960s, mere confinement in prison was no longer viewed as sufficient to correct deviant behavior. Rehabilitation programes (vocational training, education, counceling, and psychotherapy, work release, furloughs and self improvement activities) were introduced inot prisons that had previously custody as the sole organizational goal. Fundamental to this emphasis on rehabilitation was an expectation that correctional officers should move beyond the comfortable, clearly defined security role and function in the more ambigious role of the highly qualified human service-oriented professional capable of assisting in rehabilitation of the offender, (Pollock M). Howard League of Penal Reform says that the 1990s have also seen the introduction of prisons which are designed, financed, built and run by private companies. Supporters of privatization argue that it will lead to cheaper, more innovative prisons, with critics arguing that private prisons are flawed both in principle and in practice. Today, correction systems, in many nations, adhere to the fundamental human rights. Prisons today are more civilised in regime and conditions. Prison officers are involved in administering rewards to prisoners for good behaviour as well as overseeing better prison facilities such as gymnasiums, prison shops, health care and training. In England and Wales running water and toilets are now installed in 98 percent of prison cells. Education, work and programmes to tackle drug addiction, offending behaviour and bullying are now commonplace. Certainly conditions have changed for the better, but these changes should not be confused or considered to be making prisons easy, more tolerable perhaps. Prison is about taking a persons liberty away, doing so is the real punishment.

Thursday, November 14, 2019

Modern Music :: essays research papers

In an age of error the most influential thing in a child and or a teenagers life is music. Whether it be Reggae, Hip Hop, Gangster Rap, R&B, Oldies Rock, Latin, or Heavy Metal it still has a way to overpower a persons mind no matter how old they are. Right now pretty much everybody that I talk to when I am on the Internet like Rap. I don’t understand how people could listen to non-stop cursing and fast-paced lyrics. Even though my opinion of the music isn’t so great the singers have to get some credit for being able to recite poetry in such a manner. I prefer the heavier stuff like Slipknot, KoRn, or Kittie because I enjoy talented people who play their own instruments, and personally I like very loud music. Reggae is well known because of one group and that group is Bob Marley and The Wailers. I happen to like them because they pretty much set the standards for a band that are known to people as Sublime. They are sort of a rock "n" roll/reggae band with hit songs like "What I Got" and "Santeria". My friends and I sometimes refer to Bob Marley as the "God" of music. Another popular style of music is the Pop music category. I think it features a bunch of no talent boy groups like N’Sync* and the Backstreet Boys. It is artists like this who are ruining our countries youth. These bands are corrupting the minds of our teen and pre-teen girls, and I don’t believe its right that they are doing this because very rarely do girls like the same music as my friends and I. Finally we get to the music that gets more interesting the heavy metal/rock music. I happen to like this style of music the best because the music means something. I don’t think that it is right for the tabloids to go out every time something happens with shootings at schools and blame it on the rock music. Rap is the music that gives the message of killing and shooting people. I don’t think it is right that they can go blame artists like Marilyn Manson and Ozzy Osbourne for children with weak minds when it comes to music that deals with death. Finally, my last point is that the tabloids judge a musician by the way that they look and from what they heard about them.

Monday, November 11, 2019

An Analysis of How Mass Media Affects the Youth

AN ANALYSIS OF HOW MASS MEDIA AFFECTS THE YOUTH Imagine a world without media. Can limiting the amount of media in today's society, decrease the affects it has on the young minds of today or not? Can their minds develop an intellectual way of thinking and behaving under a restricted amount of media? Being so, media everywhere has both negative and positive influence on the youth. This essay will discuss such influences of the media on the youth as well as how they can be addressed. First, the mass media affect young people’s fashion sense.Simply take a glance at the way young people around you dress nowadays, it is probably something they have picked up over the internet or magazines. What they are wearing may look similar to what famous actors or singers have worn recently. When choosing what to wear, most of young people have a tendency to choose what is said or shown to be fashionable by famous people. We cannot deny that the mass media have a great contribution to shaping the young people’s way of thinking. What they watch on TV, radio and what they read in newspaper and magazines affect, without their awareness, a great deal to their thinking.Does what His Majesty the king or the honorable prime minister say on TV mean anything to you? Does what your music idols wear affect your taste of fashion? I definitely believe the answer will be â€Å"yes†. (Berger, Gilda. Violence and the Media. United States of America: Moffa Press, 1989) Although most of our media appears to be superficial and meaningless fluff, violence and chit chat, it is also a source of education, wit and non-violent entertainment. Both salesmen and individuals wishing to promote various things have at some point made use of the different forms of the media.They have used the media to promote what people should wear, eat, do and even value. The effects of media will vary with a child’s age and stage of development. (McQuail, D. , 2008. McQuail’s Mass Commun ication Theory. 5th ed. London: SAGE Publications Ltd) Another positive side of mass media is that it keep the people updated with the happenings in the world, the internet brings so much knowledge at our disposal, television entertains us, there are so many informative channels like discovery, national geographic, the history channel to name but a few.In brief, it can be said that if the media plays negatively, it can be disastrous, but when it plays positively, it can bring satisfaction, happiness and a feeling of awakening among the masses and the youth in particular as it informs the society about what is occurring around the world and even acts as the surveillance part of the society by giving advices, how-to’s, warning the people about oncoming natural disasters like storms, earthquakes to name but a few. (http://www. cps. ca/english/statements/PP/pp03-01. df) Although it is good that young people have such a variety of choices, some of the ideals in our culture are pre ssed upon them so heavily and are sometimes even demanded of them that they could leave them with no choice at all but to turn to the media. Magazines, television programs, movies and advertising are very well known forms of media and are used constantly in our society to influence young people’s lives. Some people complained that the youth nowadays tends to be lazier and more violent and want to come in for a share of social's product as much as possible.This is simply the result of bad programs shown on the media, incontrollable websites and even the carelessness of parents. To be free from their children, some people allow the children to surf the webs, without noticing that there are plenty of disasters on Internet which the young have little experience to deal with. People, especially teenagers, always have an idol and they tend to follow what their idols do and say no matter these things are good or bad. (Ruddock, A. , 2001.Understanding Audiences: Theory and Method. Lo ndon: Sage Publications Ltd. ) Media is a large part of the lifestyle of young people. The negative effects of the media in television, internet and magazines are problems that need to be dealt with promptly. The only solutions that can be given to minimize these problems are parental and school involvement. To address these problems, schools have programs that promote media awareness. These programs would allow teenagers to understand how media has an impact on them socially.Parents also have the ability to enforce media awareness on their children. It is their duty to control and monitor their child's viewing habits. If parents do not influence their children, the media will do it for them. If these problems are not dealt with, young people are going to be less confident, more violent and possible drug abusers. In conclusion, we have absolutely no control over the media. However, we do have the final decision on the path we choose to take. The extent of the power mass media s able to influence us only reaches this far; the rest is really still within our control. As individuals, young people also must control their actions and learn to grow safely and healthy in the changing environment. REFERENCES 1. Berger, Gilda. Violence and the Media. United States of America: Moffa Press, 1989 2. http://www. cps. ca/english/statements/PP/pp03-01. pdf 3. McQuail, D. , McQuail’s Mass Communication Theory. 5th ed. London: SAGE Publications Ltd,2008 4. Ruddock, A. , Understanding Audiences: Theory and Method. London: Sage Publications Ltd,2001

Saturday, November 9, 2019

Stalin and the Five Year Plans

Stalin's technique to take Germany forward was using five year plans. Stalin believed there was need for these five- year plans as : First of all many of the regions were behind other countries in growth and that the USSR were backward Stalin believed that to be be backward you are defeated and enslaved but if you are powerful people must beware of you. Stalin also believed (with Lenin) the USSR should overtake and out strip the capitalist countries He believed Socialism in one country and the USSR would be powerful enough to survive then would take over the rest of the world.Another reason for the 5 year plans was because he believed that Germany would invade and in one of his speechs he said â€Å"If we make a good difference in 10 years or so they will crush us. Lastly the 5 year plans included a lot of useful propaganda which helped protray Stalin as a very pleasant and powerful man. In the first five year plan Stalin focused on radip industrialisation. He demanded a 200% increa se in iron production and a 335% in electrical power. To do this Stalin used alot of prisoners as they were cheap and in a large supply.If a worker was found guilty of treason for any reason they would either be shot or sent to forced labor on the Baltic Sea Canal or the Siberian railway. In Soviet Union workers constructed damns,roads,railways and canals which all helped to expand the industry and manufacturing. Although factory output soared as a result of the first Five year plan the agricultural production was damaged. In 1932, grain production was 32 % below average whic resulted in a widespread famine. Second plan For the Second FIve Year Plan, Stalin expanded the goals of his previous plan and continued to emphasise on heavy industry.This plan's aim was to advance the Soviet Unions communication systems especially railways which improved in speed and reliability. The Second Five Year Plan didnt reach the level of success that the First Five Year plan did with the production l evels in coal and oil industries. The First Five year plan encouraged a high status family life and In the Second Five Year Plan initiated a lower standard of living as consumer preferences were disregarded and focus shifted toward military goods and heavy industry Third PlanThe Third Five year plan lasted for only three year, as it was interrupted by Germany's declaration of war on the Soviet Union During world war II. Stalin continued to implement additional Five Yer Plans in the Years following WWII. By 1952 the industrial production was nearly double 1941 level. Stalin's Five Year Plans helped transform the Soviet Union from an untrained Society of Peasent to an advanced industrial economy.

Thursday, November 7, 2019

Definition Essay Sample on Information Security A Problem for Large Corporations

Definition Essay Sample on Information Security A Problem for Large Corporations This essay is based on the security of data and how it can be a problem for large corporations, and what can companies do to manage their data and resources properly. Information today has become one of business worlds and societys most important resources, and managing this information has become a major challenge. It is for this reason that the security of data is very important to corporations. The strong desire to protect and control information is rooted in the notion that information has value. The value of quality in information will enable the business to make sound decisions and conversely the presence of errors will undermine the credibility and therefore the value of the information (Marschak 1968). This means corporations must be able to handle and administer information safely and securely. The security of data and information should be very important to large corporations and if it is undermined then they are more likely to be vulnerable to threats, which could result in big problems for companies. To put this into perspective, a survey taken from Bocij et al (1999), was carried out about the extent of these threats with regards to the loss of information in a 1996 Business Technology Survey by Ernst Young. This survey found that 59 % of companies surveyed had experienced a security breach. (Bocij et al, 1999: p538). It may be thought that our society in general is becoming increasingly data-unsafe! However, this is not to imply that we are all exceedingly vulnerable as considerable efforts have indeed been made in this field, and more attention is being focused here. Nevertheless, it must be bared in mind that this does not mean that the situation is in full control. As the dependence of businesses on IS increases, so does the range and severity of the threats which can arise. This can happen for a number of reasons. The first being the scale at which the business is dependent on IS, as systems increasingly operate on a national or international scale. For example, a failure in a banks computer centre can put all its automated teller machines offline. A second reason is the speed of IS in an advanced technological environment. For instance previously, before computer-based information system, it may take for fire, flood or malicious damage to destroy records. Large computer files, on the other hand, can de deleted or corrupted electronically in matter of seconds. Similarly, unauthorised transmission or copying of data can be carried out almost instantaneously. Another reason is technical innovation. New technology changes all the ground-rules, and many employees may not understand them well. Previously, it was reasonable to rely, to a large extent on employeesÐ ±Ã ¿ good sense (for example, in not leaving filing cabinets unlocked). With IT-based systems, they may not even realise that they are taking unacceptable risks. On the other hand, at the opposite end of the skills spectrum, there are highly talented technicians who regard it as a challenge to invade and disrupt systems. They can conduct their attacks from the other parts of a network-without needing to go anywhere near the premises they are attacking. The fourth reason that may increase the range and severity of threats on IS could be hidden causes. For example, sometimes it is difficult to trace back to cause of a problem in complex systems. For example, on 1 Jan 1985, customers trying to use the cash machines of two major clearing banks, which normally accepted each othersÐ ±Ã ¿ cards, found themselves getting unpredictable results. The problem was eventually traced to erroneous updating of the magnetic strips on the cards by one of the banks. It seems that some of the bankÐ ±Ã ¿s software had failed to recognise that 1984 was a leap year, and entered date information on the cards, which then confused other parts of the system. (Hawker, 2000: p18). The security of data can be a big problem for large corporation as, defining the contents of an international information security policy as an associated set of security controls is one problem, however to enforce them may be an even bigger one (Solms,1999). Also another problem that large corporations may face is remaining competitive and having a long-term future ahead with a lack of security of data. Solms states that if an organisation is found secure enough by others, it will be welcomed to join, if not it may be excluded and left in the cold. This discussion proves that in the era of electronic commerce, proper information protection and proof of it may be demanded among business partners. Data and information security can result in a big problem for large corporations if security policies are not implemented in the correct manner. It is very important that firms recognise this, as it may well prove far more expensive not to invest in security measures than the measures themselves would have cost. Increased security means increased possibilities of safe guarding a companys assets, through reducing or eliminating the danger of financial loss. As a result of this companies need to manage their data and resources properly. Information technology does not only bring the benefits of better ways of storage and accessibility of data but with it comes the managerial responsibility, which is control of files and resources. There two major management responsibilities that companies need to manoeuvre in order to control their information so that their data is secure and they can make the most out of the resources they have invested in. These measures and responsibilities are physical and procedural. Under each of these, there are several components that make up these controls. Firstly, physical protection is an important control. Physical barriers are aimed at protecting equipment, accessories against theft and unauthorised access, and so that sources of possible damage are eliminated. If access to rooms with equipment were restricted, the risk of theft and vandalism may be reduced. A second control that could be used by some firms is biometric controls. These controls make use of the unique characteristics of individuals in order to restrict access to sensitive information or equipment. The technique has scanners that check on fingerprints, voiceprints and retinal patterns. Until recently this technique was not accessible to many organisations, partly because of the cost involved and secondly because companies used to have doubts about the accuracy of the technique. Both of these concerns have been addressed and been solved by technological advances in software and hardware. An example of companies that could use this type of control to increase security and manage their resources properly is banks and more specifically their ATMs where customers are able identify customers by fingerprints or retinal patterns. Thirdly procedure controls are also very important to take into consideration. Procedural controls include controls such as data security controls, failure controls, and auditing and security policy. Data security controls help to identify and verify the users. For instance system software can be used so that passwords are assigned to only authorised individuals. No one can log on to the system without a valid password, furthermore additional sets of passwords and security restrictions can be developed for specific systems and applications. Laudon Laudon (2001) give an example, that data security software can limit access to specific files, such as the files for the accounts receivable system. It can restrict the type of access so that only individuals authorized to update these specific files will have the ability to do so. All others will only be able to read the files or will be denied access altogether. Another procedural control is failure controls. These controls are necessary especially in large corporations, to avoid damage caused by failure of an information system. The techniques of failure control are regular back-ups of data and recovery procedure. For example, everyday transactions in a bank such as deposit, and withdrawals are stored on a daily basis as backup. Another recovery procedure which is important to companies is having a disaster recovery or contingency plan which is a strategy concerned with ensuring that a disaster of a information system is restored as quickly as possible, with little disruption to the organisation as possible. Auditing could be another way in which companies may protect information systems against security breaches. Auditing involves making physical checks of hardware, software and data at regular intervals. Audits can be carried out automatically for software and data with an appropriate program. Auditing software works by scanning the hard disk drives of any computers, terminals and servers attached to a network system. As each hard disk is scanned, the names of any programs found are added to a log. This log is then compared to a list of the programs that are owned by the company. The log gives information as to where to find the program. It is then simple to determine the location of any unauthorised programs. In many organisations auditing programs are also used to keep track of software licences, which allow companies to ensure that they are operating within the terms of their licence agreement. Other types of controls that may help companies to manage their resources properly are legal controls. Legal controls exist to prevent security breaches. Computer Misuse Act (1990), covers unauthorised access to information systems. Unauthorised access to information systems is referred to as hacking, and any breach of security by a third party invokes this Act for which the culprit may be prosecuted. Another legal protection, which companies need to comply with, is the Data Protection (1984). This Act is mainly intended to cover the individuals rights to view the information the company holds about them. For companies this is a strong message that only factual information should be held and the information should be relevant. In addition and also very important the Act restricts disclosure of information about the files a company holds about individuals to third parties. Special rules apply to this clause and it is the companyÐ ±Ã ¿s responsibility to ensure that these are followed. For example a finance company may request the account holder to set up a passed for a spouse to discuss general information but the liability lies with the company should the information get into the wrong hands resulting in fraud. Formal Security Policy is another way in which companies can protect their data. Companies are now required by law to make existing and new employees sign a security policy. This is a benefit to both the company and the employee if the policy is explained. The security policy document would include things such as what the company considers to be acceptable use of the information system, what is considered unacceptable use, disciplinary action for non-compliance and details of the controls in place. However it important that management support is essentially there to ensure that employees follow the guidelines contained in this policy. An article from the Financial Times (1998) in Bocij et al, hinted that many fraudsters rely on human behaviour rather than technology. A senior manager of a UK based company; Forensic Investigations stresses the importance of the IT department in keeping abreast with the latest developments and maintaining regular security revisions across the organisation. Another example is an UK based company, Priority Data Group (PDG), whose clients include Citibank, computer services company EDS and General Motors has developed a system that automatically blanks a PC screen when the user is away from it and then is reactivated by a password. Also, US based company Finjan has developed a program called Surflinshield Corporate, to protect computers against rogue programs attached to Active X or Java created programs. Surfinshield monitors the behaviour of the downloaded program and if attempts to breach computer security system are found, the program is eliminated. These are all examples of how companies manage their data and resources properly. Increased security means increased possibilities of safeguarding a companys assets, through reducing or indeed eliminating the danger of financial loss. Investment in relevant and suitable security measures can prevent damage to EDP equipment, technical installations and premises, reduce the chances of information being tampered with and fraud being attempted, ensures reliable data processing by seeing to it that errors, inaccuracies, mishaps and omissions are deleted more easily or prevented, and ensure that the situation is revised as soon as possible, should anything happen. All this means that it may well prove far more expensive not to invest in security measures than the measures themselves would have cost. In fact investing in data security should be considered a form of insurance. On the other hand, in themselves security measures can never be a foolproof guarantee against damage and accidents. They will have to harmonize with the companyÐ ±Ã ¿s overall profile and atmosphere. Both staff and management must have an active, positive attitude towards the security aspect. Such an attitude will in itself have a preventive effect. In working to improve security, it is important to realize that even the most comprehensive measures can never manage to remove each and every possible risk involved in using new technology. Moreover, maintaining a very high level of security is a costly affair. In conclusion, then, a certain degree of risk will have to be accepted, and not every irregularity should be seen as a major problem. Here is a list of possible essay topics on information: The Impact of Information Systems Management for Organisation Operation Freedom of Information Does Information Want To Be Free? Information Literacy Advancements in Information Technology The Impact of IT on Information Services, with special reference to India Data and Information Security Use of Information Technology in Business Information is power Piaget vs. Information Processing Information Warfare The Role of Information Systems in Business Value Chains

Tuesday, November 5, 2019

Star-Spangled Banner in Spanish Translation

'Star-Spangled Banner' in Spanish Translation Works of literature can be especially hard to translate well, as the majesty of the language and connotations of certain words can be lost. That is especially true of songs, where the rhythm and poetry of the original language can be lost as well. But that doesnt keep translators from trying. No fewer than four translators have made serious, recognized attempts to translate The Star-Spangled Banner, although not all have tried to make the words singable. How well did they do? Judge for yourself: Traducido por Francis Haffkine Snow, 1919 Amanece:  ¿no veis, a la luz de la aurora,Lo que tanto aclamamos la noche al caer?Sus estrellas, sus barras flotaban ayerEn el fiero combate en seà ±al de victoria,Fulgor de cohetes, de bombas estruendo,Por la noche decà ­an: !Se va defendiendo! Coro:!Oh, decid!  ¿Despliega aà ºn su hermosura estrellada,Sobre tierra de libres, la bandera sagrada? En la costa lejana que apenas blanquea,Donde yace nublada la hueste ferozSobre aquel precipicio que elà ©vase atroz ¡Oh, decidme!  ¿Quà © es eso que en la brisa ondea?Se oculta y flamea, en el alba luciendo,Reflejada en la mar, donde va resplandeciendo Coro:!Aà ºn allà ­ desplegà ³ su hermosura estrellada,Sobre tierra de libres, la bandera sagrada!  ¡Oh asà ­ sea siempre, en lealtad defendamosNuestra tierra natal contra el torpe invasor!A Dios quien nos dio paz, libertad y honor,Nos mantuvo nacià ³n, con fervor bendigamos.Nuestra causa es el bien, y por eso triunfamos.Siempre fue nuestro lema  ¡En Dios confiamos! Coro:!Y desplegar su hermosura estrellada,Sobre tierra de libres, la bandera sagrada! Traductor desconocido Oh, decidme,  ¿veis a la primera luz de la auroraLa que izamos con orgullo al à ºltimo rayo del crepà ºsculo,Cuyas anchas bandas y brillantes estrellas, en la fiera luchaContemplamos ondeando gallardas sobre las murallas? El resplandor rojizo de los cohetes y el fragor de las bombasProbaban que por la noche nuestra bandera aà ºn estaba allà ­.Oh, decidme,  ¿flota todavà ­a la enseà ±a estrellada y listadaSobre la tierra de los libres y la patria de los valientes? En la costa apenas perceptible entre las nieblas del marDonde la altiva hueste enemiga reposa en temeroso silencio, ¿Quà © es lo que la brisa al soplar oculta en parteY en parte descubre su elevado pedestal? Ahora recibe el destello del primer rayo matutinoReflejado en todo su esplendor, y ahora se destaca en el aire ¡Es la enseà ±a estrellada y listada! Que ondee largos aà ±osSobre la tierra de los libres y la patria de los valientes.  ¿Y dà ³nde est aquella banda que engreà ­da jurabaQue el torbellino de la guerra y la confusià ³n del combateNos privarà ­a para siempre de patria y hogar?La sangre ha lavado la mancha de sus pasos desleales. Ningà ºn refugio pudo salvar al mercenario y al esclavoDel terror de la fuga o de la lobreguez del sepulcro.Y la enseà ±a estrellada y listada ondea triunfanteSobre la tierra de los libres y la patria de los valientes. Asà ­ sea siempre, cuando los hombres libres se interponganEntre sus amados hogares y la desolacià ³n de la guerra:En la victoria y la paz, este paà ­s, socorrido por el cielo,Alabe al Poder que nos creà ³ y conservà ³ como Nacià ³n. Hemos de triunfar, pues nuestra causa es tan justa,Y sea nuestra divisa:  ¡En Dios est nuestra confianza!Y la bandera estrellada y listada flotar triunfanteSobre la tierra de los libres y la patria de los valientes. Traducido por Manuel Fernndez Juncos El dà ­a renace y alegra la auroraTransmite al oriente su vivo color, ¿No ves la bandera que ayer saludamosAl à ºltimo tenue reflejo del sol?Ondeaba en el muro durante la luchaDe franjas y estrellas luciendo el matiz. Y al fuego rojizo de bombas marcialesLa vimos de noche tremolando allà ­.  ¿Quà © es eso que al aire se agita y flamea,Allà ­ sobre el monte cercano al marCual signo que anuncia cordial despedidaAl fuerte enemigo que triste se va? ¡Es nuestra bandera!El sol de la gloria la envuelve y la baà ±a en và ­vida luz. Mirad como ahora se extiende arroganteMostrando su blanco, su rojo y su azul. La turba enemiga que en local jactanciaJurà ³ despojarnos de patria y hogar ¿A dà ³nde se ha ido?Ya cruza las olas;Se siente pequeà ±a donde hay libertad. ¡Que asà ­ siempre sea; cuando un pueblo dignoEl yugo sacude de fiera opresià ³n!  ¡El cielo liberte los pueblos que luchanSi es justa su causa y esperan en Dios! La paz y el trabajo propicios nos haganLlegar a la meta de nuestro deber..Llevando por guà ­as la ciencia y la gloriaLlevando por lema virtud y poder.De estrellas y franjas la noble banderaMantà ©ngase libre de mancha y baldà ³n. Y alcemos al cielo, por nuestra victoriaDe pueblos honrados la grata oracià ³n. Traducido por Guillermo F. Hall Oh, decid:  ¿podeis ver, al rayar de la aurora loQue vimos anoche orgullosos flotar?La estrellada bandera, tremolando altanera, encumbrada enLa torre y excitando luchar!Y a la luz de la roja, fulgurante centella, laBandera ondeaba, ondeaba ms bella;Y a travà ©s de la densa humareda inflamada,Con quà © orgullo miramos la bandera ondear!  ¡El pendà ³n de la Patria, la bandera estrellada,Encumbrada en la almena convidando a luchar! Oh! decid,  ¿todavà ­a contemplais la bandera,La estrellada bandera,Sobre suelo de libres que defienden su hogar? A travà ©s de la niebla, de la mar a la orillaIracundo enemigo nos atisba a marchar. ¿Quà © es aquello que ondula, que flamea y simulaUn enjambre de estrellas refulgiendo en el mar?Ya del alba recoge la primer llamarada;Ya se oculta en la niebla, ya aparece inflamada;Ya ostentando sus glorias se refleja en el rà ­o;Ya sus franjas y estrellas nos deslumbran al par.  ¡El pendà ³n de la Patria, tremolando bravioY flamenado en la almena nos incita a luchar!  ¡El pendà ³n de la Patria, la estrellada bandera,Tremolando altaneraSobre suelo de libres que defienden su hogar!  ¿Dà ³nde est la falange enemiga y aleveQue con vana porfà ­a se atreviera a jurarQue al fragor de la guerra, en la lucha que aterra,Perderà ­amos patria y familia y hogar? ¡Con su sangre lavara la verguenza inferidaDe su paso a la hulla por la tierra querida!Encontrar no podrà ­a un refugio el taimado,Que en su fuga oprobiosa la pudiera salvarDel terror de esa fuga, del morir angustiadoCon el ansia del triunfo que no pudo alcanzar.Mientras tanto tremola la estrellada banderaY triunfante, altanera,Sobre suelo de libres nos custodia el hogarSiempre asà ­, cuando altivo se levante el patriotaDefendiendo su suelo, su familia y su hogar. La radiante victoria lo circunde de gloria, ¡Y bendiga al Eterno que lo hiciera triunfar!Y pues Dios nos asiste y la lucha es tan santa,Y el pendà ³n de la Patria nos alienta y levanta,Conservemos la Patria, el hogar que adoramos,Y adoptamos por lema, sacrosanto y sin par: ¡Sea Dios nuestro guà ­a; en su apoyo confiamos!  ¡Justiciera es la causa que nos manda a luchar,Y el pendà ³n de la Patria, la estrellada bandera,Tremolando altanera,Sobre suelo de libres nos conserve el hogar!

Saturday, November 2, 2019

Resource Management Research Paper Example | Topics and Well Written Essays - 250 words

Resource Management - Research Paper Example for various stages of the project; allocating resources efficiently for current and projected schedules; and creating resource pool where information can be shared across the project management and team members to monitor its progress and get feedback on factors that could adversely impact progress or slow it down. The interdependency of resources in the project is very essential ingredient that necessitates efficient allocation of the resources that must be monitored constantly for timely delivery of goals. Indeed, lack of efficiency in any resources could delay the project, leading not only financial loss but also have adverse impact on the market credibility of the firm. The regular evaluation of resources also helps to apply contingencies and helps to reschedule tasks so that the project is finished on time. Most importantly, resourceful team work is key factor because the team members share various tasks allotted within schedules that need to be completed timely. Strong team work helps to complement each other’s work and enhances performance of the individuals and team for improved productivity. Thus, team members must promote cross cultural understanding and inculcate mutual respect so that conflicts could be resolved early and progress of the tasks is not impeded. (words: