Wednesday, November 27, 2019

Module Review Questions free essay sample

Which features of organizations do managers need to know about to build and use information systems successfully? What is the impact of information systems on organizations? * Define an organization and compare the technical definition of organizations with the behavioral definition. The technical definition of an organization is a stable, formal social structure that takes resources from the environment and develops them to outputs. The definition of an organization also focuses on three elements: Capital, labor, and production and products for consumption. The technical definition also infers that organizations are more stable than an informal group, and are formal legal entities, and are social structures. On the other hand behavioral definition of an organization defines it as a collection of rights, privileges, obligations, and responsibilities that are carefully balanced over a period of time through conflict and conflict resolution. This definition highlights the people within the organization, their ways of working, and their relationships. We will write a custom essay sample on Module Review Questions or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The relationship between technical definition and behavioral definition shows us how a firm can combine capital, labor, and information technology which impacts the inner workings of the organization. * Identify and describe the features of organizations that help explain differences in organizations’ use of information systems. Features that are common among an organization include the following: * Routines and business processes: Standard operating procedures (SOP) have been developed to allow an organization to become productive and efficient thereby reducing costs over time. Organizational politics: Differing viewpoints about how resources, rewards, and punishments should be distributed bring about political resistance to organization change. * Organizational culture: Assumptions that define the organizational goals and products create limitation on change, especially technological change. * Organizational environments: A shared relationship exists between an organization and environments; information systems provide organizations a way to identify external changes that might require an organizational response. Organizational structure: Information systems reflect the type of organizational structure entrepreneurial, machine, divisional, and professional bureaucracy, or adhocracy. * Describe the major economic theories that help explain how information systems affect organizations. There are two economic theories discussed in the book: transaction cost theory and agency theory. Transaction cost theory is based on that a firm incurs transaction costs when it buys goods in the marketplace rather than making products for itself. For example, traditional firms seek out to reduce transaction costs by getting bigger, hiring more employees, vertical and horizontal integration, and small-company takeovers. Information technology can help a firm lower the cost of market participation (transaction costs) and help firms shrink in size while producing the same or greater amount of output. In contrast, an agency theory views the firm as an interconnection of contracts among interested individuals. The owner employs employees to perform work on his or her behalf and delegates some decision making authority to them. Therefore employees need constant supervision and management, which creates management costs. As management costs rise the introduction of information technology reduces costs by providing information more easily so that managers can supervise a larger number of people with fewer resources. * Describe the major behavioral theories that help explain how information systems affect organizations. Behavioral theories, ranging from sociology, psychology, and political science, are useful for describing the behavior of individual firms. Behavioral researchers theorize that information technology could change the decision-making hierarchy by lowering the costs of information acquisition and distribution. For instance, IT could eliminate middle managers and their clerical support by sending information from operating units directly to senior management enabling information to be sent directly to lower-level operating units. IT even allows organizations to act as a virtual organization since they are no longer limited by geographic locations. One behavioral approach views information systems as the outcome of political competition between organizational subgroups. IT has become very involved with competition because it controls who has access to what information, and can control who does what, when, where, and how. * Explain why there is considerable organizational resistance to the introduction of information systems. There is considerable organizational resistance to new information systems because they change many important organizational dimensions, such as culture, structure, politics, and work. The first model described by the book states that changes in technology are absorbed, deflected, and defeated by organizational task arrangements, structures, and people. In this model the only way to bring about change is to change the technology, tasks, structure, and people simultaneously. A second model, which requires the need to unfreeze organizations before introducing an innovation, quickly implementing the new system, and then refreezing or institutionalizing the change. * Describe the impact of the Internet and disruptive technologies on organizations. As the Internet increases the accessibility, storage, and distribution of information and knowledge for organizations; nearly any information can be available anywhere at any time. This Internet increases the scope, depth, and range of information and knowledge storage. It also lowers the cost and raises the quality of information and knowledge distribution. Furthermore, lowers transaction costs and information acquisition costs. By using the Internet, organizations may reduce several levels of management, enabling a closer and quicker communication between upper levels and the lower levels management. Disruptive technologies caused by technological changes can have an effects on different companies depending on how they handle the changes. For example, some companies create the disruptions and succeed very well whereas other companies learn about the disruption and successfully adopt it. Other companies are obliterated by the change that they were very efficient at doing what no longer needs to be done. Some disruptions mostly benefit the firm. Other disruptions mostly benefit consumers as well. 2. How does Porter’s competitive forces model help companies develop competitive strategies using information systems? * Define Porter’s competitive forces model and explain how it works. The Porter’s competitive forces model provides a general view of a firm, its competitors, and the firm’s general business environment. In this model, five competitive forces shape the fate of the firm: * traditional competitors * new market entrants * substitute products and services * customers * suppliers * Describe what the competitive forces model explains about competitive advantage. Some businesses do better than others because they have access to special resources that others do not, or they are able to use common available resources more efficiently. The reason for this could be because of greater knowledge and information of assets. Nonetheless, they excel in revenue growth, profitability, or productivity, ultimately increasing their stock market valuations compared to their competitors. * List and describe four competitive strategies enabled by information systems that firms can pursue. Their four generic strategies, each of which has allowed a firm to use of information technology as a strategy. They are: * Low-cost leadership: Lowest operational costs and the lowest prices. Product differentiation: Enable new products and services, or greatly change the customer convenience in using existing products and services. * Focus on market niche: Enable a specific market focus and serve this narrow target market well than its competitors. * Strengthen customer and suppliers: Tighten links with suppliers and develop closeness with customers. * Describe how information systems can support each of these competitive strategies and give examples. Low-cost leadership: Use information systems to improve inventory management, supply management, and create efficient customer response systems. Example: Sam’s Club, Costco Product differentiation: Use information systems to create products and services that are customized and personalized to fit the precise specifications of individual customers. Example: Apple, Starbucks. Focus on market niche: Use information systems to produce and analyze data for finely tuned sales and marketing techniques. Analyze customer buying patterns, tastes, and preferences closely in order to efficiently pitch advertising and marketing campaigns to smaller target markets. Example: Whole Foods. Strengthen customer and supplier intimacies: Use information systems to facilitate direct access from suppliers to information within the company. Increase switching costs and loyalty to the company. Example: Amazon. com * Explain why aligning IT with business objectives is essential for strategic use of systems. The basic principle of IT strategy for a business is to ensure the technology serves the business and not the other way around. The more successfully a firm can align its IT with its business goals, the more profitable it will be. Business people must take an active role in shaping IT to the enterprise. A business cannot ignore IT issues nor tolerate failure in this area or just see it as a nuisance to work around. Businesses must understand what IT can do, how it works, and measure its impact on revenues and profits. 3. How do the value chain and value web models help businesses identify opportunities for strategic information system applications? * Define and describe the value chain model. The value chain model highlights specific activities in the business. The model also identifies specific and critical leverage points where a firm can use information technology the most effectively to enhance its competitive position. The value chain model views the firm as a series of basic activities that add a margin of value to a firm’s products or services. These activities are categorized as either primary or support activities. Primary activities are most directly related to production and distribution of the firm’s products and services, which create value for the customer. Support activities make the delivery of primary activities possible and consist of organization infrastructure. A firm’s value chain can be linked to the value chains of its suppliers, distributors, and customers. * Explain how the value chain model can be used to identify opportunities for information systems. Information systems can be used at each stage of the value chain to improve operational efficiency, lower costs, improve profit margins, and forge a closer relationship with customers and suppliers. Organizations can use information systems to help examine how value-adding activities are performed at each stage of the value chain. Information systems can also improve the relationship with customers and with suppliers. Furthermore, information systems can help businesses track benchmarks in the organization and identify best practices of their particular industries. After analyzing various stages in the value chain, an organization can devise a list of candidate applications for information systems. * Define the value web and show how it is related to the value chain. A value web is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service. Customer driven value web operates in a less linear fashion than the traditional value chain. The value web is a networked system that can synchronize the business processes of customers, suppliers, and trading partners among different companies in an industry or in related industries. * Explain how the value web helps businesses identify opportunities for strategic information systems. Information systems enable value webs to be flexible and adaptive to changes in supply and demand. Relationships can be bundled or unbundled in response to changing market conditions. Firms can accelerate their time to market and to customers by optimizing their value web relationships by making quick decisions on who can deliver the required products or services at the right price and location. Information systems make it possible for companies to establish and operate value webs. * Describe how the Internet has changed competitive forces and competitive advantage The Internet has nearly destroyed some industries and severely threatened others. The Internet has also created entirely new markets and formed the basis of thousands of new businesses. The Internet has enabled new products and services, new business models, and new industries to rapidly develop. For this reason the Internet has created a competitive rivalry which has become much more intense over the last decade. Internet technology is based on universal standards that any company can use, making it easy for rivals to compete on price alone and for new competitors to enter the market. Because of this information is available to everyone, and the Internet raises the bargaining power of customers, who can quickly find the lowest cost provider on the Web.

Saturday, November 23, 2019

Building Blocks Lesson

Building Blocks Lesson I have a story to tell, and I want to do it in one-liner bullets. The lesson is clear. See if you note the trend: My lesson = Began writing mysteries. = Finally published a mystery. = Joined Sisters in Crime (SinC) to be with other lady mystery writers. = Became a moderator for SinC to be seen and remembered as a lady mystery writer. = Was invited to help start a local South Carolina chapter of Sisters in Crime. = A year into the local chapter, the president said libraries were seeking authors to speak. = I immediately applied, spending much time on the application. = The library had a grant to hire writing teachers. I knew grants and volunteered time to get it off the ground. = I was selected = The SC State Library asked me to do videos for a website for those who could not attend for payment. = Another county library heard of me and asked me to teach their group, expanding the grant for payment. = One of the librarians suggested I apply for the SC Humanities Speakers Bureau for when the grant was over. = I applied and was accepted for the Speakers Bureau . . . because of my new library reputation. = A library in the next state heard of the library program and invited me for four (paid) appearances. = Another library not on the grant asked me to appear, at the recommendation of the State Library, and applied to the Speakers Bureau to pay for it. . . . and that was just up to this week. Im sure the momentum is still in play.   All too often we become one of two types of writers when it comes to our platforms and self-promotion: 1) The control freak who thinks theyll keep a grip on every turn in the road and determine all outcomes, or 2) The uncertain soul who lets their journey flap in the wind, headed in whatever direction someone else steers them. The best situation falls someplace in between. Keep your options open, but when you see an opportunity, snap it up. Every person in my SinC group had the opportunity I did. None capitalized on it. I saw an opportunity to spread my name in South Carolina in an attempt to saturate local notoriety, instead of thinking I have to become known nationally first. I didnt wait for them to tell me what to do as a speaker. Instead I suggested topics, aiding with promotion, and becoming friends with the librarians who are always seeking opportunities for their members. That friendship resulted in joining the SC Humanities Bureau. And the ball keeps rolling. Do not think you know everything about your writing career. And dont be afraid to try something new to aid your cause. Opportunity is everywhere . . . just everywhere. The art is seeing it, and courting it, and putting it in your pocket instead of wondering for days and weeks if you ought to do something you never have before. Trust yourself. Be excited about stepping out. Watch your confidence soar, and amazingly, those around you will want to soak up that confidence and invite you into their world.

Thursday, November 21, 2019

Networking Coursework Example | Topics and Well Written Essays - 750 words

Networking - Coursework Example This project is vital to outlining a new network configuration that improves the current network system. The project will promote the achievement of the end users requirements by ensuring a consistent and reliable network that is accessible at any given time. Also, ensuring consistent data encryption is vital for the network system security.  The current network structure has undergone multiple changes since its instigation aimed at improving it over time. The prior network was not up to the standards that could support the expectations of the network system end user. The preceding network design was considered unstable and slower in communication response time. This is because the prior network configuration was not centralized to a single network administrator that would manage the access grants for the end user accessing the internet (McNab, 2008).  The main factors to be considered in the design and development of this network include elements like the budget costing which wi ll be allocated for ensuring data security through encryption and data back center. The cost will include the manpower for installing a new server to facilitate data backup and storage services. The compatibility of the proposed network components with other sections of the network arrangement is viable since adding a server for data storage and security plus configuring the router. The external backup server will ensure the availability of resources which subsequently maintains consistent system usability.

Wednesday, November 20, 2019

Economic Impact of Online Identity Theft Assignment

Economic Impact of Online Identity Theft - Assignment Example Indeed, apprehension of cyber-identity criminals, and especially multi-national organized crime rings, poses a serious challenge to law enforcement specialists deployed to tackle transnational jurisdictional measures. Cyber-theft knows no boundaries, and the tendency for such crimes to be commissioned through a network of communications is extensive. With exception of high wealth transfer operations, and those transactions connected to official terrorist organizations, cooperation between governments is far beyond normal extradition order. As a result, facilitation of consumer protections is allocated primarily to watch groups and the efforts of independent counsel hired to address client complaints. At the Sixteenth Session of the United Nations Economic and Social Council (UNESC) Commission on Crime Prevention and Criminal Justice in 2007, the Results of the study on fraud and the criminal misuse and falsification of identity in a Report of the UN Secretary General toward 'international cooperation in the prevention, investigation, prosecution and punishment of fraud, the criminal misuse and falsification of identity and related crimes' set the international platform toward legislative policies pertaining to cyber identity theft, and the economic impact of transnational fraud. Responsive to the intensifying multi-jurisdictional complications of global cyber fraud and its attendant economic impacts in the realm of cyber-terrorism, the Commission outlined priority targets within international legislation intended to stem the rapid expansion of predatory privacy invasion and usurpation of finance through identity theft toward support of organized criminal activity. Amidst the proliferation of personal data collected by internet service providers and commercial and government businesses online, the quantification of fraud has become a massive undertaking. The recent disclosure of previously undetected, large-scale securities based Ponzi schemes, informs us that significant losses of wealth can be lost over long periods of time when they involve a large portfolio of parties subject to varied national rules on securities trading. Counting the cost of identity theft is, then, one of scale. As the UNSEC Report indicates, "mass-fraud schemes tend to produce large numbers of cases if occurrences are based on counting numbers of victims or complaints but lower rates if numbers of offenders fraud schemes or prosecutions are counted." Statistical accountability of identity theft related fraud by UN member states is spotty, with underreporting of the prevalence of the different methods of commissioning those crimes has shifted rapidly as technologies induce related regulatory restrictions that push criminal activity into a vague area whereby "fraud imitates legitimate commerce, making variations of commercial practice likely to produce parallel variations in fraud over time, between countries or regions, and with respect to specific areas of commerce." Mitigating factors such as privatization of previously State-owned operations in contexts where the system of justice is weak due to parallel post-conflict or reconstruction efforts, leaves infrastructural oversight open to fraud in general. The Fair Credit Reporting Act (FCRA) was written into legislation in 1970 and has been amended almost

Sunday, November 17, 2019

The High Tide †Second Day’s Battle at Gettysburg Essay Example for Free

The High Tide – Second Day’s Battle at Gettysburg Essay The first day at Gettysburg had seen the two great armies – the Confederate Army of Northern Virginia led by General Robert E. Lee and the Union Army of the Potomac, led by newly appointed Major General George Gordon Meade – come together. The fighting had ended with the southern army in control of the town and Seminary Ridge, while the northern army possessed the high ground along Cemetery Ridge, a very formidable position dominated by two large hills – Round Top and Little Round Top on the southern end of the line; it will be around those two hills that the Confederacy’s effort of independence from the United States will reach its high tide; it will break upon, and around those heights and it will ebb and flow there. It will be on the Union left that Longstreet’s Corps will be broken, and it will likewise be there that the soldiers of the Army of the Potomac will see the south’s hopes break and recede and from whence it will gain renewed strength from having been the instrument upon which those hopes are dashed. The night between the beginning of the battle and its fiercest fighting found Lieutenant General James Longstreet’s I Corps hurrying toward the field. It had been delayed during the morning, left waiting as of part of Lieutenant General Richard Ewell’s corps passed by near the town of Greenwood; the I Corps had been moving throughout the day and evening reaching the main army about midnight. On the morning of the second day, Lee, Longstreet, A.P. Hill, Harry Heth, and John Bell Hood sat beneath a tree on Seminary Ridge and discussed plans for the day’s attack.[i] Longstreet had tried to convince his leader that the Army of Northern Virginia should move around the Union forces flank and position itself between Meade and Washington, and he had believed he and Lee had agreed upon this strategy, and he tried to get Lee to follow through on that strategy, â€Å"We could not call the enemy to position better suited to our plans,† he observed. â€Å"All that we have to do is to file around his left and secure good ground between him and his capital.†[ii] After the first day’s fighting, Lee had decided if Meade’s army was still found along Cemetery Ridge in the morning he would attack him and he told Longstreet so, â€Å"If the enemy is there tomorrow, we must attack him.†[iii] Longstreet had disagreed, â€Å"If he is there, it will be because he is anxious that we should attack him – a good reason in my judgment, for not doing so.†[iv] But the bit was between Lee’s teeth now and he would not, and could not, let go of the Army of the Potomac and move around it. There was too much at stake, and his army would never be able to survive for long as a group, and could not afford to spread out now in order to live off the land around them. Meade could wait them out and Lee knew this. This may not be the ground of his choosing, but here was where the enemy had gathered, and it was now here where he would have to fight him. Lee had been observing the enemy’s position and he believed its left flank was in the air and unsecured, but he had no cavalry to confirm this. Major General J.E.B. Stuart had been assigned the mission to screen the Confederate army’s move northward, but had become distracted with the idea of riding around the Union army, and had hence left Lee with no screen and with no reconnaissance capability, and he now had to use the tools he had at hand. To determine if Meade’s flank was indeed unsecured Lee had sent a small reconnaissance party to the right to verify Meade’s position. He had sent Captain Samuel R. Johnston, one of his staff, to scout out the enemy’s flank. Johnston led his party to the top of Little Round Top, and found no one there. He could see, looking through the trees below him, no Union troops. The flank appeared to be unsecured! He returned to the commanding general and confirmed Lee’s suspicion that Meade’s left was exp osed and opened to attack. But the empty flank Johnston had seen was only momentarily so, â€Å"†¦the reconnaissance party had taken a quick look at the enemy lines during the time when the Federals were in the process of shifting troops. In fact, the Union lines did extend south along Cemetery Ridge. Lee therefore had a complete misunderstanding of Meade’s position.†[v] With his suspicions confirmed, Lee was determined to attack, and he turned to his most trusted Lieutenant – to his â€Å"Old War Horse† – Longstreet. But the I Corps commander did not share Lee’s confidence; he too had been studying the Union defenses and he had â€Å"concluded that this line was too strong for an attack to succeed. He urged Lee to turn its south flank and get between the Union army and Washington. This would compel Meade to attack the Army of Northern Virginia in its chosen position.†[vi] Lee would not be swayed however, and ordered Longstreet to prepare for the attack; the attack that if it succeeded could drive the Union army from the field and win the war. But Lee’s battle plan â€Å"rested on two givens – first, that scout Samuel Johnston had spied not a single Yankee soldier from his vantage point on Little Round Top that morning; and second, that therefore General Meade lacked either the troops or the intellect to anchor his left flank properly.†[vii] The Union line had been established as the Army of the Potomac was driven from Gettysburg during the first day’s battle after Meade sent Major General Winfield Scott Hancock forward to take charge of the army on learning of I Corps Commander Major General John F. Reynolds death. Hancock had quickly determined the high ground south of Gettysburg running from Culp’s Hill on the north past Cemetery Hill and down the long stretch of Cemetery Ridge south to the Round Tops – could and should be held. He rallied the units on hand and established the defense, sending word to Meade of his disposition, who swiftly ordered the remainder of the army to converge on Gettysburg, and hurried to the site arriving around midnight. Hancock will be dubbed â€Å"Hancock the Superb,† by northern newspaper writers for his roll in the Union victory.[viii] As Longstreet’s corps made its way south it would soon discover that not only was the Union left soon to be occupied, but that â€Å"Meade finally had most of his 85,000 men present. Lee with approximately 75,000 soldiers, was facing a formidable line that stretched from Culp’s Hill, around Cemetery Hill, southward along Cemetery Ridge, and finally to the Round Tops.†[ix] Lee’s plan of attack called for Longstreets corps to position itself to attack the Union left flank, facing northeast astraddle the Emmitsburg Road, and to roll up the Federal line. The attack was to move en echelon from the right beginning with Hood’s and Major General Lafayette McLaws’s divisions, followed by Major General Richard H. Andersons division of Hills III Corps. The progressive sequence of the attack was supposed to thwart Meade from shifting troops from his center to bolster his left. At the same time, Major Generals Edward Johnsons and Jubal Earlys II Corps divisions were to make a demonstration against Culps and Cemetery Hills (again, to prevent the shifting of Federal troops), and to turn those demonstrations into full-scale attacks if a favorable opportunity presented itself. What Lee’s plan had not taken into account was the possibility of Union generals doing the unexpected, and as Longstreet’s corps moved into position its leaders were surprised to find Major General Daniel Sickles III Corps sitting right in their path well out in front of the entire Union line. It was both an opportunity and problem. An opportunity because in moving forward Sickles had left the Union left truly unsecured, and most especially he had left the Round Tops void of any Union forces; it was a problem because Sickles corps, blocking the expected path of advance would slow down the rebel assault. As Sickles had moved his corps into position on Cemetery Ridge, he looked toward the Confederate lines and decided – on his own that his corps was not in the best location. â€Å"Trees and boulders covered both the ground that he was to occupy and the area to his front seemed slightly higher. From there, Confederate artillery might be able to command his lines.†[x] As the afternoon wore on, and shadows began moving through the woods nearby, Sickles, sensing a crisis was approaching, sent skirmishers into the woods to find out what the Confederates were doing. Twenty minutes later, his men reported enemy movement toward the south. â€Å"Thinking he had to act promptly to prevent the high ground from falling into enemy hands, Sickles moved his corps forward. Back on Cemetery Ridge, Hancock, whose corps was on Sickles’ right, was astounded by the move. One of his division commanders suggested that perhaps Meade had ordered a general advance and that Hancock’s corps missed the order.†[xi] By moving his corps so far ahead of the Cemetery Ridge line Sickles not only forced Longstreet to modify Lee’s battle plan at the last moment, but he also greatly altered the strategic landscape. â€Å"Lee’s prospective battlefield was extended southward some three-quarters of a mile. Hood deployed his four brigades, newly designated as the outflanking division, along Seminary Ridge facing due east, toward Round Top and Little Round Top. The half mile or so of terrain between Hood and the two heights contained what military cartographers euphemistically termed ‘broken ground.’†[xii] As he moved forward, to occupy the high ground, Sickles had placed his III Corps into a salient extending his line to a length far greater than could be adequately defended by the number of men he had in his command, and the shape of his line exposed it to both Confederate fire and attacks from three directions. To make matters worse, â€Å"not only had Sickles disobeyed his orders to occupy Cemetery Ridge, but he had also left Little Round Top undefended.†[xiii] Reporting to Meade’s headquarters for a meeting of corps commanders as he was dismounting, heavy artillery fire could be heard in the direction of his corps on the Union left. Sickles quickly remounted and rode swiftly back to his men. Just as quickly, Meade mounted his horse, and he and his chief of engineers, Major General Gouverneur K. Warren rode to ascertain the situation on the III Corps’ front. When they reached Cemetery Ridge, Warren said, â€Å"‘Here is where our line should be.’ Hearing the Confederate cannon fire to the front, Meade replied, ‘It is too late now,’ and rode in the direction of the fire. Warren, wanting to get a better view of the terrain, rode to the crest of Little Round Top.†[xiv] While the fire was spreading and intensifying, Warren and his aides raced up the rocky slopes of Little Round Top, and once there were stunned to find there were no Federal soldiers, except for a handful of signal-men on the heights, and it was further apparent, â€Å"from what the signal-men had seen and from Warren’s own observations, that Confederate attackers were less than a mile away and moving toward the heights even as they watched. That discovery, Warren later wrote, ‘was intensely thrilling to my feelings and almost appalling.’ Earlier in the day he had written his wife, ‘we are now all in line of battle before the enemy in a position where we cannot be beaten but fear being turned.’ Now that fear was upon him. To General Warren it was instantly clear that if Rebel infantry and artillery seized Little Round Top, they would utterly dominate the Potomac army’s position on Cemetery Ridge.†[xv] Understanding what would happen if someone didn’t occupy the heights and do so quickly, Warren sent one of his aides to Meade calling for troops to meet the emergency. He also dispatched another aide, Lieutenant Ranald Mackenzie, to Sickles and to have him order one of his brigades to the crest. By the time Mackenzie found Sickles, his corps was already heavily engaged and the General was beginning to realize the scope of his recklessness, and told Mackenzie he could not spare any of his men. Mackenzie rode back to Cemetery Ridge in search of other troops, and soon found Major General George Sykes, moving forward with his V Corps. â€Å"Without hesitation, without clearing the matter with headquarters, Sykes sent a courier to the commander of his lead division, James Barnes, with orders to answer Warren’s call. â€Å"Sykes’s courier, in his search for Barnes, encountered Colonel Strong Vincent, commanding the V Corps’ lead brigade. ‘Captain, what are your orders?’ Vincent demanded of the courier. He needed to find General Barnes, said the courier. ‘What are your orders?’ Vincent repeated. ‘Give me your orders.’ The captain answered, ‘General Sykes told me to direct General Barnes to send one of his brigades to occupy that hill yonder,’ pointing to Little Round Top. ‘I will take the responsibility of taking my brigade there,’ said Vincent. As the corps’ lead brigade, Vincent’s was the logical choice for this task, but in sensing the crisis and bypassing the chain of command, Strong Vincent, too rose to the occasion. His variegated brigade – Twentieth Maine, Eighty-third Pennsylvania, Forty-fourth New York, Sixteenth Michigan – was soon scrambling up the rocky face of Little Round Top.à ¢â‚¬ [xvi] Warren did not sit idly by while his aides were looking for troops; Warren also moved off searching for men to place on the exposed left. Noticing infantry moving up, he moved to the unit discovering it was none other than a regiment from the brigade he had earlier commanded. â€Å"As he started to explain the army’s plight to the regimental commander, Warren saw his younger brother, Edgar, approaching. Edgar Warren was an aide to Brigadier General Stephen H. Wood, commander of a brigade in the V Corps. The army’s chief engineer received promises that the entire brigade would send help. Next, Warren directed an artillery battery and the brigade’s lead regiment to move to the top of the hill. He then rode to see the V Corps commander and secure additional reinforcements. The ensuing fight for Little Round Top was a close contest. Federals ran up one side of the hill as Confederates ran up the other. The fight ended with the Army of the Potomac holding the positio n. Warren had taken action in time.†[xvii] Longstreet had repeatedly argued to have the army move around Meade’s flank, but he had been overridden by Lee. He was not happy about the planned attack, but he was a career soldier and he would obey orders. But after being rebuffed, he was determined to follow the letter of Lee’s instructions and it made him extremely inflexible. His division commander on the far right, Hood, recommended that the right wing of the attack should be extended around the Round Tops and into flanks of the Union army. â€Å"Longstreet replied that Lee’s orders were to attack up the Emmitsburg Road, and that everyone would obey the orders of the commanding general. Nevertheless, Hood extended his lines to the right to include Little Round Top, and his near success against Warren on that hill was proof that the Federal line of battle was vulnerable.†[xviii] Longstreet’s artillery fired a cannonade for more than an hour, and then his divisions charged forward, slamming into Sickles’s front and flanks. Sickles’s decision to move forward was a bad one, but his men fought bravely and made the Confederate I Corps pay dearly for each yard it advanced, and Sickles defended it well. â€Å"†¦the fight for the Peach Orchard and the Wheatfield lasted almost four hours. Before being seriously wounded, Sickles skillfully plugged the holes in his lines almost as quickly as they developed.†[xix] As the I Corps continued its assault on the Union left it began to flow up and around the Round Tops, as it moved to the left and right enveloping Sickles’s Corps it began the long hard fight into and through the forbidding Devil’s Den. This area of the Union line was being defended by the One Hundred Twenty-fourth New York Infantry known as the â€Å"Orange Blossoms†. The fighting soon became some of the hardest of the war, and presently became desperate. â€Å"Some of the Texans later claimed that the muzzle flash of their rifles had singed the New Yorker’s uniforms. At the start of the fight, the regiment’s Colonel A. Van Horne Ellis and Major James Cromwell had been on foot. It was safer that way.† As the fight worsened, â€Å"Ellis had their horses brought forward, and he and Cromwell mounted up. To a captain who remonstrated at what good targets the colonel and major would make on horseback, Ellis replied, ‘The men must see us to day.’†[xx] The fighting became hotter, and as moment of immediate â€Å"crisis seemed to approach, Ellis gave the signal. He and Cromwell led their men down the slope in a counterattack. For a few moments all was glorious victory for the Orange Blossoms as the First Texas broke and fled before them. Then, near the foot of the slope, the Texans turned and blasted a volley into the faces of their pursuers. Cromwell, a magnificent figure on his iron-gray horse, crumpled to the ground. The Orange Blossoms surged forward to recover his body, and the rocky hillside became a fiery cauldron of battle. One participant recalled that all was ‘roaring cannon, crashing rifles, screeching shots, bursting shells, hissing bullets, cheers, shouts, shrieks and groans.’†[xxi] The Texas line receded and it looked as though the Orange Blossoms may have won a startling victory, but suddenly, â€Å"†¦emerging from the thick smoke and passing through the Texas’ line, strode a solid gray-glad line of battle, fresh and unbloodied, two ranks deep, shoulder-to-shoulder and stretching out of sight in the battle smoke in either direction. Brigadier General Henry Benning’s Georgia brigade had moved up from its reserve position and was going into action to renew the momentum of the Confederate assault. The Georgia line swept the scattered Orange Blossoms before it like the first chill blast of a violent spring storm. Colonel Ellis fell dead with a bullet in his brain, and the survivors of the 124th, now scarcely one hundred strong, fell back to the crest of Houck Ridge, struggling to delay the Confederate advance.†[xxii] As the Confederate assault began to flow over the top of the ridge it soon collided with the Fourth Maine Regiment. Its commander, Colonel Elijah Walker, realized very quickly that the Rebels would soon be able to turn his flank and continue to plunge through the Union line. â€Å"Walker responded with the sublime audacity that seemed almost commonplace on both sides this afternoon. He ordered his regiment to wheel to the right, fix bayonets, and charge. ‘I shall never forget the â€Å"click† that was made by the fixing of bayonets,’ the colonel wrote years later. ‘It was as one.’ â€Å"The Fourth Maine surged to the top of the ridge, but there it, too, met the onrushing wave of Benning’s Georgia brigade. The fighting became hand-to-hand on the ridge top and in Devil’s Den. The Maine men were soon joined by reinforcements of their own, one regiment from the other end of Ward’s line and another from de Trobriand. The oversized Fortieth New York took up the position the Fourth Maine had just left, covering the Slaughter Pen and Plum Rum gorge. The Ninety-ninth Pennsylvania, led by Major John W. Moore with the shout of ‘Pennsylvania and our homes!’ charged into Devil’s Den alongside the Fourth Maine and drove the Georgians and Alabamians out of the boulders and off the ridge. Meanwhile, the Fortieth New York charged the Confederates who were trying to press through the gorge and drove them back but could not dislodge them. One Confederate counted seven separate charges by the Fortieth. The two sides blazed away at each ot her there until the Slaughter Pen was more thickly strewn with bodies than with boulder.†[xxiii] Sickles’s salient had caused Hood’s division to move to the right of the assault, and it began to flow over and about the Round Tops, and the two right-hand regiments, the Fifteenth and Forty-seventh Alabama, under the Fifteenth’s Colonel William C. Oates, climbed up – and over the steep, heavily wooded slopes of Round Top, and then plunged down into the saddle separating it from Little Round Top to its north. â€Å"Oates’s instructions were to locate ‘the left of the Union line, to turn it and do all the damage I could†¦.’†[xxiv]

Friday, November 15, 2019

The Importance Of Bioequivalence

The Importance Of Bioequivalence Bioequivalence is defined as the absence of a significant difference in the rate extent to which the active ingredient or active moiety in pharmaceutical equivalent or pharmaceutical alternative become available at the site of drug action when administered at the same molar dose under similar conditions in an appropriately designed study (Huixiao et al., 2009). The importance of bioequivalence studies is increasing due to the large growth of the production and consumption of generic product (Vetchà ½ et al., 2007). Bioequivalence also assess the relative bioavailability of two drug products thus focuses on comparative drug product performance (Mei-Ling et al., 2001). The rationale of bioequivalence study is the monitoring of pharmacokinetic and pharmacodynamic parameters after the administration of tested drugs (Vetchà ½ et al., 2007). A standard pharmacokinetic study is the conventional method for evaluating the pharmacokinetics of a drug in human subjects. Deferiprone (DFP, Ferriproxà ¢Ã¢â‚¬Å¾Ã‚ ¢, Kelferà ¢Ã¢â‚¬Å¾Ã‚ ¢, L1, CP20) was synthetic hydroxypyridinone iron chelator isolated from legume Mimosa paduca (Clarke and Martell 1992) to be taken orally, and bind iron in conditions of iron overload (Kontoghiorghes, G.J, 1985). Iron was essential to all species and there was no physiologic excretory pathway for this essential element (Andrews, 1999). In conditions of primary iron overload (eg, hemochromatosis) or secondary iron overload (eg, transfusion-dependant thalassemia), accumulation of this potentially toxic element results in massive iron accumulation and lead to generation of toxic free radical damage (Rund and Rachmilewitz 2005). DFP was used in the treatment of Thalassemia Major and was also used worldwide to treat cancer, leukemia, hemodialysis and other diseases like detoxification metals, such as aluminum in hemodialysis patients (Paschalidis et al., 1999; Di-Ji et al., 2004). Deferiprone was the worlds first and only or ally active iron chelating drug, which was effective and inexpensive to synthesize thus increasing the prospects of making it available to most thalassemia patients in third world countries who are not currently receiving any form of chelation therapy (Kontoghiorghes et al., 2004). DFP is a bidentate chelator and has a two pka of 3.6 and 9.9 (Hider and Liu 2003) with strong iron binding properties of pFe3+ 19.6 and pFe2+ 5.6 thus binding it in 3:1 complex indicating a high degree of relative specificity for trivalent iron (Clarke and Martell 1992; Tam et al 2003). It was a water soluble compound with partition coefficient of 0.11 and has a molecular weight of 139 Da which made them move freely through cell membranes of the body. DFP absorbed rapidly and completely after oral administration. . Deferiprone appears in plasma within 5 to 10 minutes of ingestion and Peak plasma levels achieved within 1 hour after administration. Food reduces the rate of absorption but not the extent of absorption thus reducing the peak concentration with Cmax of about 100 µmol/L in fasting state and about 85 µmol/L (Matsui et al 1991; Al-Refaie et al 1995a). Deferiprone is metabolized to the inactive glucuronide that is the predominant form recovered in the urine (James et al., 2001). The drug was eliminated rapidly with a half-life of about 2 hours due to hepatic biotransformation. It was metabolized by glucuronidation and about 90% of the drug excreted in urine as glucuronide. Half-life was shorter in healthy subjects of about 1.3 hours than that of thalassemia subjects having 2.3 hours (Stobie et al 1993). Most frequently occurring side effects are transient gastrointestinal symptoms (GI) such as nausea, vomiting, and abdominal pain (Cohen et al 2003). OBJECTIVE The purpose of this study was to evaluate bioequivalence of new tablet formulation of Deferiprone with Ferriprox ® (Apotex, Canada). MATERIALS AND METHODS Materials Two drug products of deferiprone 500 mg tablet were used for invivo bioequivalence study. One was the test product (Test) manufactured locally and another was the Reference or innovators products. Deferiprone standard was supplied by Assistant Drug Controller, Ministry of Health, Islamabad. Acetonitrile and methanol HPLC grade were purchased from MERCK. Study products The test formulations were Ferrinil 500 mg tablet Batch Noà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. , expiry à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦, and the reference product Ferriprox ® 500 mg tablet Batch Noà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ expiryà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ (Apotex INC., Canada). Human subjects The study was approved by the Ethics Committee of BeSt Center, Faculty of Biosciences, University of Veterinary and Animal Sciences, Lahore. Twelve healthy Pakistani male volunteers aged between 18-55 years were included in the study. All volunteers were in good health confirmed by physical and clinical laboratory examination including serology, hematology and biochemical test. All volunteers were abstained from other drug intake and alcoholic preparations three weeks prior to and throughout the study. Those volunteers who had chronic smoking history, alcoholic intake and caffeine intake were excluded. Study design The study carried out was randomized, two-treatment, two-period, two-sequence, single dose crossover study with two weeks wash-out period. Each volunteer was in fasted state approximately 10 hours prior to the study. Each volunteer received a single dose of 1000 mg deferiprone with 240 ml of water. Blood samples were collected immediately before and 0.25, 0.5, 0.75, 1, 1.5, 2, 2.5, 3, 4, 6, 8 and 12 hours after drug intake. A standardized lunch is consumed after blood sampling at 4 hours. The plasma were separated by centrifugation and stored at -80 °C. ANALYTICAL METHOD The analytical method was modified by the method of Goddard et al.1990 using validated HPL method DATA ANALYSIS The pharmacokinetic parameters of both test and reference drug were compared and was determined by taking Cmax and Tmax directly from the individual concentration versus time data. Elimination rate constant was determined from log-linear least squared regression of the terminal part of the plasma concentration versus time curve. Half-life was estimated from equation 0.693/Kel. The area under the concentration versus time curve was calculated by linear trapezoidal rule. The comparison of generic product of deferiprone 500 mg with innovators product was assessed using relevant pharmacokinetic parameters, Cmax, Tmax, AUC (0-t) and AUC (0-à ¢Ã‹â€ Ã… ¾) and was transformed to logarithmic scale before statistical analysis. The difference of the mean corresponding log Cmax, log AUC(0-t) and log AUC(0-à ¢Ã‹â€ Ã… ¾) between the two products will be determined by 2-way analysis of variance (ANOVA) for a crossover design at the significant level of ÃŽÂ ± = 0.05. The 90% confidence interval (CI) (two-one sided test) for the differences of the mean log Cmax, log AUC(0-t) and log AUC(0-à ¢Ã‹â€ Ã… ¾) between the two products were calculated. The two products are considered to be bioequivalent when 90% CI of the differences of all parameters were within WHO accepted range of 80%-125%.

Tuesday, November 12, 2019

Globalization, Nation-States and Transnational Entities Essay

The historical study of the main characteristics and normative legacy of a nation-state has proved complicated for the social sciences as a whole. During the past few centuries, the nation-state has been deified and demonised equally; it has been regarded as modern as well as ancient form of social and political community; it has been seen as an imagined or imaginary society; rational structure of the community; it has created as much happiness as well as misery; it has been a source for political democracy, cosmopolitanism and ethnic cleansing. It has also coexisted with empires colonies, blocks, protectorates, city-states among other forms of political organisations. It has gone through and experienced the unification, occupation, totalitarian terror, divisions and then unification. It has won legitimacy around ethnic or racial, republican, liberal, democratic class principle and federal (Chernilo, 2007). In spite of all these, a nation-state succeeded to present itself as a solid, stable and as the necessary form of social and political organisation in the contemporary world. The nation-state is a territorial organisation that self-recognizes and deriving its political authenticity from the people and serving as a supreme body for a country as a sovereign territorial entity (Chernilo, 2007). Most people view a nation as a political thing that is self evident, a kind of natural culmination of all societies. It is high time people realised that the idea of a nation that Europe gave to the world was perhaps short-lived political form, a European exception, a precarious transition between ages of kings and the â€Å"neo-imperial† age (Guehenno & Elliott, 2000). 1). Modern nation-states have diverse feelings to their territory, compared to the dynastic monarchies; it is semi-sanctified, and non-exchangeable. No nation would swap territory with other states simply, for instance, because the king’s daughter got married. They have a discrete type of boundary, in principle defined only by the area of settlement of the national group, although most nation-states also sought natural borders like rivers, lakes, mountain ranges among others. The most outstanding characteristic is the degree to which nation-states use the state as an instrument of national unity, in economic, social and cultural dimensions. This is done by promoting economic unity, first by abolishing internal customs and taxes. Nation-states normally have a guideline to form and sustain a national shipping infrastructure, facilitating business and movement (DiVanna, 2003). Nation-states usually have more centralised and identical public government than its colonial predecessors; they are smaller, and the population less diverse. In several instances, the regional administration is also subordinated to central or national government. They also have an identical nationwide customs, through state’s guiding principle. The model of the nation-state suggests that its populace constitutes a nation, fused by a widespread descent, a common language and various forms of shared culture. When the unity is absent, the nation-state frequently tries to craft it; by promoting a homogeneous national language, through language guiding principle. The nation-states create a common curriculum for both primary and secondary education as a way of fostering a common language. In addition, to create a common identity, history of a nation-state is enshrined in their curricula and taught usually in a propagandistic and mythologized edition, and especially during wars some nation-states still teach this kind of history. Language and cultural policy was sometimes negative, aimed at the suppression of non-national elements. Language prohibitions were sometimes used to accelerate the adoption of national languages, and the decline of minority languages. A nation-state has a constitution that is a set of rules that governs its operations and is official. A state is as well recognised but other countries as independent and with the United Nations by her being a member of the UN. Besides, the state also acts on behalf of the people that are residing in that territory and nation-state is continuous; in the sense that a set of leaders come and go but the nation-state remains, thus its continuity. Nationalism being a product of modernity, reflecting on people’s need to belong to a social group to have a feeling of security in an environment where a people live. Nationalism has been seen as an intense force that has resulted into socio-political conflicts all over the world, besides, it has been an instrument for bigotry and social unrests. The key to lasting business viability in a connected world is that each firm is part of one or more networks of value. Thus collaboration is the pillar to adding value as a network member. More often, people and corporations collaborate because of the profit that may accrue due to such collaboration (DiVanna, 2003) A nation defines itself by not only what it is, but as well as what it is not. It is not a social group, neither is it a religious group, nor a racial group; a nation is what binds together the citizens of a nation is a amalgamation of historical factors that can not be reduced to a single dimension as social, religious, or racial (Guehenno & Elliott, 2000) an example of a nation is Germany. A state such as Georgia is described as a definite territory in which a legitimate government has the ability to control its own activities without intrusion from other system of governments (Europa, 2010). It depicts more of a political and geographical area associated with a kind of political body; a nation, on the other hand, describes more of a cultural and/or ethnic entity. The term nation-state implies that the two geographically concur, and this distinguishes the nation-state from the other types of state, which historically come first, an example of a state is Georgia. In addition, a nation-state is understood as a political expression of a single or a central and relatively homogenous ethnic group. It groups very heterogeneous societies, communities loosely under the guidance of a common religious, and/or dynastic tradition. The basis of segmentation that characterise such communities can be geographical, religious, political, social, economical, ethnical, race and even class or caste (European Parliament, 2008), an example of a state is Algeria. 2). The US has territorial boundaries which are not easily swopped. Besides, US is a symbolic community with her people voluntarily dedicate their most important political loyalties in spite of the many meticulous loyalties; economic, spiritual, racial, ethnic, political, social; that otherwise divide them. This gives the people of united state to identify with a common culture as a people of a modern nation-state. In addition, the U. S has an impersonal power structure which bears it legitimacy from a people. A country’s foreign policy, which at time is called the international relations policy, consists of approaches preferred by the state to safeguard its national interests and to achieve its goals in international relations. The plans are intentionally employed to interact with other nation-states. Contemporarily, due to transnational and globalization activities, the nation-states will also have to interact with non-state actors like terrorists. A nation-state’s interests are paramount; foreign policies are premeditated by the government through high-level decision making progressions. More often than not, creating foreign policy is the job of the head of government and the foreign minister. In some countries the legislature is also involved in the process. 2 b). An example of foreign policy of US is Security from attack is the most paramount foreign policy of any nation. That is a nation should endeavour to have foreign policies that do not make her vulnerable from physical external attack, either by other countries or by individual actors like terrorists. The focus of US foreign policy is thus, geared towards building a power to defend herself from against attack from other nation-states and these individual actors like international terrorists. Security from attack should go beyond the physical attack to include the domestic wellbeing of the American citizens and protect them against some psychological troubles like the loss of their jobs to foreigners, because of perhaps, poor foreign policy on immigration issues, and trade among others. Foreign policy of the US is national interest or international justice; which focuses on the role of the US when other nations go against human rights like right to life, by some regimes which go to war and engage in massacre, genocide among others. Others argue that US should develop a foreign policy that protects human right when abused not only in American soil but also in other parts of the word. This may take a more noble form as diplomacy and may go to the extreme as military intervention if necessary, and then help with the reconstruction of the nation-state in question, like in the case of Iraq (Page & Bouton, 2006). The aftermath of World War II saw the creation of European Union which was seen by many as an escape from the extreme forms of nationalism which had destroyed the continent. This followed the formation of the European Coal and Steel Community which, while having the modest aim of consolidated control of the previously national coal and steel industries of its member states, is seen to be the first step which culminated in the formation of the European Union. The founding members of the Community were Belgium, France, Italy, Luxembourg, the Netherlands, and West Germany. It progressed to form a peaceful Europe through cooperation in the 1940s. Due to the war between the east and the west in the 1950s there was need for peace in Europe. Therefore the soviet tanks put down protests against the communist regime in Hungary. In 1957, the launch of the first man-made space satellite by the Soviet Union acted as a pioneer in the space race in addition to the European Economic Community or Common Market that was created by the Rome treaty. The emergence of youth cultures took place in the 1960s bringing with it economic growth. In return, the EU countries stopped charging duty on custom in the course of their trade with each other. During this period, they agreed on joint food production control so that everyone had enough to eat which resulted in excess agricultural produce. In 1973 resulted in a growing community when Denmark, Ireland and the United Kingdom joined the European Union, and raised the number of members to nine. This period experienced the last right wing dictatorship in Europe due to Salazar regime being overthrown in Portugal and the General Franco of Spain’s death. The influence in EU affairs by the European Parliament increased and hence all citizens could elect their members directly for the first time. In addition jobs and infrastructure in poorer areas were created when the EU regional policy started to transfer huge sums of money. The changing face of Europe was introduced by the fall of the Berlin wall in the 1980s. Greece additionally joined the European Union followed by Spain and Portugal five years later. The single European Act which is the foundation for a six year program that resolves problems with the free flow of trade across EU borders and creates the Single market was then signed in 1987. In 1989, the Berlin wall was pulled down and for the first time, the border between East and West Germany was opened and led to the reunification of Germany when these two united in 1990. In the 1990s the European Union developed a Europe without frontiers which resulted in Europeans being closer to each other when in central and Eastern Europe there was a collapse of communism. This was when the single market was completed and the four freedoms of movement of goods, services, people and money was developed in addition to the Maastricht Treaty on European Union in 1993 and the Treaty of Amsterdam in 1999. Austria, Finland and Sweden join the other member states in 1995, people are allowed to travel without border checks of passports when as, all village in Luxembourg gave its name to the â€Å"Schengen† agreements, numerous young people were able to study in other countries with the support of EU and with the use of mobile phones and the internet, communication was made easier. From 2000 to present, the European Union experienced further expansion due to the introduction of a new currency for many Europeans. The member states began to work jointly to fight crime and introduced the war on terror after hijacked planes were flown in New York and Washington buildings. More than 10 countries joined EU and between east and west Europe there was a healing of political divisions (Europa, 2010). b). These major institutions of the European Union are the European Parliament or EP which is elected directly by EU’s citizens to act as their representative, the Council of the European Union which is a representative of individual member states and the European Commission which endeavours to sustain the union’s interest as a whole. The three form an institutional triangle which makes policies and laws applied throughout the EU. The new laws are proposed by the commission but then they are adopted by the parliament and council. In addition, the Court of Justice which maintains the European law and the Court of Auditors which checks the union activities finances are other institutions that play important roles (Europa, 2010). Moreover, there are also the European Investment Bank, Economic and Social Committee, Committee of the Regions, European Ombudsman, and the European Monetary Institute (ILO, 2010) The countries that make up the European Union are otherwise known as its member states. Though they maintain their independence, they put their power together in order to achieve strength and influence which they could not as individual nations. This means that they give some decision making powers to created institutions which they share so that issues related to a common interest are decided on with democracy at European level. In total, they are27 are Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, and the United Kingdom (Europa, 2010) c). The European Union enables closer relationships between its member states in order to maximize on their collective potential. This applies to economic and political activities such as free trade, freedom of movement, and choice of job. In addition it serves to unify the actions of its member countries in terms of security, foreign policy, and cooperation in matters related to police and justice. A lot of beaucracy that was involved with these issues has since been dissolved. In addition it has achieved its principle aim of ensuring Europe’s stability after the Second World War (ILO, 2010) d). Foreign policy objectives for the European Union include peace building and peace making. This involves prevention and control of war or conflict between member states and other nations. It works to eliminate suffering of related citizens The rule of law and respect for human rights and basic freedom should also be strengthened by pursuing ambitious human rights policy that is based on agreement with the respective clause that is concerned with human rights and democracy. An agreement based upon structured and deep political dialogue should also be established in addition to the implementation of the introduced parliamentary dimension (European Parliament, 2008) 4a). The nation-states and transnational entities pursued by the use of foreign policy tools such as diplomatic negotiations, economic aid, and sanctions, trade restrictions, military interventions, unilateral, or cooperative. These options are evaluated and monitored in attempts to maximize benefits of multilateral international cooperation. A nation-state can use them singly or a combination. b). The consequences of this interaction for international politics are numerous. Some of them include the subordination of national interests of a country to uphold the collective interests of the nation-states, like the United States, or the transnational entities like the European Union. The economic interdependence is likely to either make war between trading partners less likely or, as realists claim, that economic interdependence increases the likelihood of conflict. Such countries that engage in international may be prone to terrorist’s attacks besides, the nation-state can be less popular in other countries when the use military interventions like the case or US intervention in Iraq. References Busby,W. J. , 2010. Who Cares about the Weather? Climate Change and U. S. National Security. Retrieved from < http://www. gechs. org/downloads/holmen/Busby. pdf> on 12th July, 2010. Chernilo, D. , 2007. A Social Theory of the Nation-State: The Political Forms of Modernity beyond Methodological Nationalism. New York: Routledge. Desmoyers-Davis T. , 2001. Citizenship in Modern Britain. New York, USA: Routledge. DiVanna J. , 2003. Synconomy: Adding Value in a World of Continuously Connected Business. USA: Macmillan. Europa, 2010. Europen Union. Retrieved from on 12th July, 2010. European Parliament, 2008. EU strategy for reform in the Arab world. Retrieved from on 12th July, 2010. Guehenno, J. M. & Elliott, V. , 2000. The end of the Nation-State. Minnesota: U of Minnesota Press. International Labour Office (ILO), 2010. European Union (EU). Retrieved from < http://actrav. itcilo. org/actrav-english/telearn/global/ilo/blokit/eu. htm. > on 12th July, 2010. Page, B. I. & Bouton, M. M. ,2006. The Foreign Policy Disconnect: What Americans Want From Our Leaders But Don’t Get. Chicago: University of Chicago Press Rosenberg, M. , 2010. Defining an Independent Country. Retrieved from < http ://geography. about. com/cs/politicalgeog/a/statenation. htm

Sunday, November 10, 2019

Bodybuilding

This article is with Hugh Jackson on how he has transformed so much form the first X-Men movie to the recent one X-Men Wolverine 2. He was intended to become a MAMA fighter but he chose to become an actor. In the first X-Men he was in shape but not a muscular. When Hugh Jackson knew he was going to be in more of the X-Men series he thought to himself that a Wolverine should be a beast and strong. So that's what he intended to do he started to work out a lot.Jackson started to eat a lot healthier and watched what he ate so he can be in the best shape for the next movie. He tells you how he works out on some days he would go for repetition on the weight from 8-10 reps and others he would go heavy 1-5 reps. He also told the author how he has so less body fat, he did this phase called cutting. Analysis I do agree on how Hugh Jackson work out because I do the exact same thing. The first thing is that he would bulk up which means put on some weight before the season begins.After you are do ne bulking you go into a cutting phase which means that you will lose a lot of that fat and turn it into a muscular fit look. Hugh Jackson and I have a lot of things In common such as eating working out and Just watching our figure. He would work really hard to get that great body that everyone wants and even more Impressive he Is at the age of 44 and he Is still pushing up as much weights as the teenagers. That's really Impressive for his age.

Friday, November 8, 2019

Feasibility Assessment of the Pearl River Tower The WritePass Journal

Feasibility Assessment of the Pearl River Tower References Feasibility Assessment of the Pearl River Tower 1.Introduction:1.1 Background to the Problem:1.2. Substitute Technology:1.2.1. Description of Pearl River Tower:1.1.2. Purpose of the report:2. Method2.1. Criteria2.2. Procedure3. Results3.1. Sustainability and Energy Generation Techniques3.1.1. Sustainability Approach: â€Å"Zero Net Energy†3.1.2 The Active Faà §ade3.1.3 Radiant Ceiling and Below Floor Ventilation3.1.4. Building Integrated Photovoltaics3.1.5 Wind Turbines3.2. Safety:4. RecommendationReferencesRelated This research report provides a feasibility assessment of the Pearl River Tower. The Pearl River Tower upon completion plans to be the most energy efficient and sustainable of all mega structures in the world till present day. Conventional building is preferred due to its economic benefits and amount of time needed for completion of a project, but it is one of the biggest contributors to global warming. Green building, which is perfectly portrayed in the Pearl River Tower, serves as a good solution for the ongoing environmental problem. This report defines the Pearl River Tower and explains the way it functions as well as its numerous benefits. The Pearl River Town is more efficient than and other super tall structures, is economically feasibly, can generate its own energy as well as an additional amount of energy that can be supplied to exterior sources. After a full analysis of each criterion, a recommendation will be reached concerning the implementation of the Pearl River Tower a nd similar green structures. 1.Introduction: 1.1 Background to the Problem: One of the greatest hurdles of the 21st century is the excessive emission of CO2. The environmental conditions are regressing annually and have reached a point where it has become a strain on human and animal life. Buildings and other mega structures are primary contributors to global warming. Classical building’s main concern was purely based on economy, durability, and comfort. However nowadays people have become more aware of the environment, and are therefore taking drastic measures to improve this situation. Some of these measures include green building, which refers to building using energy efficient methods, and shifting from fossil fuels to renewable energy. Buildings are responsible for a minimum of 40% of energy consumption and carbon emissions in most countries (4, para.1). The per capita carbon emission in china was almost five tons in 2008 (average is 4.18 tons per capita), which is about 18% of world emissions (3, para.7). The Chinese government aims to reduce 40-45% of emissions by 2020(6, para.1). International companies are taking on new sustainable and renewable projects, many of which are based in China. Energy-saving technologies in buildings can drastically reduce carbon emissions. The main problem with traditional towers is the consumption of fossil fuels, which results in numerous types of wastes. The methods applied within the structures to generate and consume energy are polluting and hazardous to the environment. They use artificial lighting, cooling, and heating systems that demand a great deal of electricity, which in turn is a result of burning fossil fuels. The glass that these buildings are composed of is another example of the inconvenient methods applied. This glass is called architectural glass that allows the transfer of heat and energy, which leads to the squandering of heat. All these negatives have lead to the development of various renewable energy techniques. Solar energy, wind power, hydropower, biomass, biofuel, and geothermal energy are all types of renewable energy that could be used in green buildings. 1.2. Substitute Technology: The Pearl River Tower was recognized as a major substitute for traditional buildings. It is a structure that is non-hazardous to the environment and that can generate and supply energy. 1.2.1. Description of Pearl River Tower: The Pearl River Tower is a 309.6-meter tower, consisting of 71 floors, and extending over 214,100 square meters of land (5, project facts). This tower, upon completion, is expected to be the most efficient of all the super tall structures in the world. It is located in Guangzhou, China. The Pearl River Tower is designed to generate its own energy using sustainable methods, which decreases its dependency on the electrical network, therefore reducing consumption of fossil fuels required to power it. The design took many aspects into consideration, which included the integrated system’s interdependence and the building site. To achieve the optimum design many factors were studied such as the site, wind direction and speed, material, sun path, energy sources and building alignment. After these numerous studies, the team of engineers and architects where able to combine a number of different systems which include wind turbines, photo-voltaic, active faà §ade, and double wall systems (7, para 7) Although the structure was originally designed to be â€Å"net zero energy†, such that the building is self-sustaining, and any extra power would be sold and sent back to the grid; however, there were modifications to the plan. The tower was optimized in a way to consume 60% less energy than any other conventional building of its size (1, para 1). 1.1.2. Purpose of the report: Constructing â€Å"carbon- neutral† structures has become of major interest to engineers recently. Therefore, the Pearl River Tower would serve as a stepping stone for future designs of green skyscrapers. This report will study the feasibility of the Pearl River Tower through evaluating certain criteria. The closing of the report will include a recommendation of whether to construct green buildings such as the Pearl River Tower. 2. Method 2.1. Criteria We will study the feasibility of the Pearl River Tower by studying various criteria: Sustainability and Energy Generation Techniques: We will study and discuss the methods used to produce energy within the tower, in addition to the structures sustainability. Safety: We will study the effect the tower has on its occupants and its surroundings. Construction process: We will explore the techniques used while constructing the tower and the time needed for completion. Economy: We will consider the cost of the tower and whether the project is economically feasible. Efficiency: We will discuss whether the structure is efficient on the long run. 2.2. Procedure In order to assess the mentioned criteria we gathered information from plenty of sources including a published report released by the Pearl River Tower’s construction company called SOM, numerous online articles, and interviews conducted with university professors. 3. Results 3.1. Sustainability and Energy Generation Techniques 3.1.1. Sustainability Approach: â€Å"Zero Net Energy† The initial approach for the Pearl River Tower was one that would provide â€Å"Zero Net Energy† generated. This approach would require the implementation of four interdependent steps: Reduction: This first step is defined by identifying the possibilities of energy reduction, then proceeding in reducing the amount of energy consumed by the building as much as possible. The focus is on systems with high power consumption such as HVAC (Heating ,Ventilation and Air Conditioning) as well as lighting systems. Absorption: The second step is to include absorption strategies, defined by taking advantage of natural and passive energy sources, such as the sun and the wind. Reclamation: This step in a high performance design aims to recollect all the energy that is already stored within the building. Once energy is added to the building, it could be reused. An example used in the Pearl River Tower is the recirculation of chilled air from AC systems to precool the outside air before it enters the building so that less energy is required to cool it down to required levels. Figure 1 Micro Turbine Installation Generation: this final step aims at generating clean power in an efficient and environmentally friendly manner. The Pearl River Tower implements micro –turbines which are able to generate energy cleaner and more efficiently than what the grid is capable of. It is worthwhile to mention that these turbines can be operated using different typed of fuel such as kerosene, diesel, propane and methane gas. (7,p4) Figure 2 A double walled high performance facade 3.1.2 The Active Faà §ade Nowadays, employment of reflective, fully glazed facades is becoming increasingly common. Their popularity started in Europe and is now spreading across the United States and China. By including a second layer of glass behind the exterior one, the room for increased venting, shading and control application would be increased. The active faà §ade is an application for the reduction strategy mentioned earlier since a dehumidification system could be applied by harnessing the heat collected in the double wall faà §ade. The design of the double walled faà §ade provides benefits such as increased thermal comfort , an improved air quality due to recirculation as well as better lighting due to a transparent nature of the walls. They also provide noise insulation from outside conditions, and that is especially needed if the tower is high enough, since wind speeds at high altitudes would create vortices that produce a lot of noise, as well as the street level floors that have the problem of noise from traffic. Furthermore, the increased penetration of light from the exterior would require less artificial lighting and therefore would lead to saving energy. The cavity also acts as a natural chimney using the cooler air from the occupied office areas to enter the cavity via a gap at floor level to allow fresher air to enter the occupied areas. The trapped hot air in the cavity is extracted through the ceiling void and is used either as a pre-heat or pre-cool depending upon outside air temperatures. The faà §ade then acts as an integral part in our reclamation as well as reduction strategy. 3.1.3 Radiant Ceiling and Below Floor Ventilation As mentioned previously, HVAC operation is one of the more costly operations in a building when it comes to energy. The Pearl River Tower designers therefore implemented new techniques that help cut down on costs. The traditional approach is to dump cold or warm air into the occupational space for it to mix with the ambient air in order to balance out at a comfortable temperature. This approach requires constant energy input for the HVAC system. The designers chose to implement a radiant ceiling and below floor ventilation system in order to provide that comfort from different methods, not just dumping air into a room. The room temperature would be conditioned from above and below simultaneously through a radiative system in the ceiling and a floor air delivery system. This system is effective in cutting down maintenance and operation costs compared to traditional HVAC 3.1.4. Building Integrated Photovoltaics Building integrated photovoltaics as opposed to normal photovoltaics would make up the building exterior instead of being added as an extra feature. In the Pearl River Tower application, the photovoltaics serve a dual purpose: they provide the buildings outer envelope as well as generating electricity gathered from solar radiation. We thus save money and energy by not paying for wall mounting panels, and adding the cost of the photovoltaics as an extension. The system not only provides electricity generation, but it also shades the parts of the tower that are most susceptible to sunlight. 3.1.5 Wind Turbines Figure 3 Building integrated Photovoltaics Wind energy is the fastest growing renewable energy source in the world; so naturally, the Pearl River Tower will have wind turbines installed in an effort to harness the wind’s power, especially at high altitudes, where the wind speeds are highest. Wind turbine performance is also significantly increased in the tower due to their integration with the tower’s architecture. â€Å"The Pearl River tower will implement vertical axis wind turbines, as they are capable of harnessing winds from both prevailing wind directions with minor efficiency loss.†(7 p8) Figure 5 Wind portal opening The tower will have 4 large openings that are designed to decrease wind drag forces and optimize wind velocity. It is in those openings that the wind turbines will be installed. A model of the building with the openings was studied in a wind turbine and results showed â€Å"If the wind strikes the building perpendicular to the opening, there is a drop in portal velocity. However, from almost all other angles, the wind velocity increase exceeds the ‘ambient’ wind speeds.† (7 p 9). Therefore by placing vertical axis wind turbines, one in each of those 4 openings, a sustainabl e and renewable energy source would be provided year round. It is noteworthy to mention that those turbines are low maintenance, low noise and low vibration devices that will not prove to be a nuisance to people in the building. Figure 4 Vertical axis wind turbine 3.2. Safety: The tower is beneficial for both lives inside and outside of it. Because it emits less greenhouse gasses it is prone to be less hazardous to the surrounding environment. The systems used within the tower have proved to provide a health and safe environment for its occupants. The double wall system provides a big amount of natural light into the building therefore lessening the necessity for artificial light (7, para6). This in turn affects the comfort of the human eye. The photovoltaic panels are located on the roof level of the tower therefore protecting the roof occupants from the direct and harmful effect of UV-rays. (7, para8)The absence of electric fans and air conditioners in the building in addition to the ventilation system installed, has improved indoor air quality and reduced the humidity. All these factors improve inhabitant’s comfort and productivity, and maintain a health environment. 4. Recommendation The sum of all the sustainable and renewable methods employed in the Pearl River Tower led to a significant reduction in energy consumption. Although initial design was for the building to rely solely on those methods, the project cannot be considered as a failure, only as an achievement and stepping stone for future green buildings. The implementation of all those systems and ideas prove that the concept of a â€Å"zero energy† superstructure is within our reach in the near future and is not as crazy an idea as initially conceived. It is important to note that the micro turbines were dropped from the project since the power company in Guangzhou would not allow resale of electricity, and therefore the use of micro turbines, although beneficial, would not justify their cost of installation and operation and in an economically wise decision, they were removed from the design. Their addition would have further increased efficiency to a great extent. After the results achieved, it is only logical to expect a rise in green buildings around the world, especially with the rapid progress of new technology in sustainable energy, and ultimately a â€Å"zero energy† superstructure will be constructed. Till then, the investors in such buildings would need government cooperation in order to continue their pioneering efforts in creating a more sustainable and healthier mode of living. References Frechette III, R. E. (2009). Seeking Zero Energy. Retrieved on march 14th, 2011 from: http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?hid=113sid=decf7698-dfb6-44e8-bd01-69ee6db3a178%40sessionmgr115vid=2 Fortmeyer, R. (2011). SOM’s Pearl River Tower. Architectural Records (archive). Retrieved on march 14th, 2011 from: http://archrecord.construction.com/features/archives/0612casestudy-1.asp Go, K. (2010 , 02 , 01). World’s most energy efficient building to rise in China. Shanghai News. Retrieved on march 14th, 2011 from: ecoseed.org/en/energy-efficiency/green-buildings/article/79-green-buildings/6053-world%E2%80%99s-most-energy-efficient-building-to-rise-in-china- Richerzhagen, C. (2008). Energy efficiency in buildings: a contribution of China to mitigate climate change. Retrieved on march 14th, 2011 som.com/content.cfm/pearl_river_tower evonik.cn/region/greater_china/en/company/news/low-carbon-economy/Pages/default.aspx Frechette, R. , Gilchrist, R.(2008) ‘Towards Zero Energy’ A Case Study of the Pearl River Tower, Guangzhou, China. CTBUH 8th World Congress 2008.

Wednesday, November 6, 2019

Biography of Lucky Luciano, American Gangster

Biography of Lucky Luciano, American Gangster Charles Lucky Luciano (born Salvatore Lucania; November 24, 1897–January 26, 1962) was instrumental in creating the American Mafia as we know it today. After graduating from the gritty street gangs of New York, Luciano went on to become a henchman for the American branch of the infamous Cosa Nostra. A criminal mastermind, it was Luciano who orchestrated the unification of warring mob factions, creating the first Organized Crime Commission. In addition to taking on the mantle of the first kingpin of the modern Genovese crime family, he and his mob associates launched the highly successful and lucrative National Crime Syndicate. Lucky Luciano Known For: Charles â€Å"Lucky† Luciano was the criminal mastermind whose influence in shaping the mafia earned him the title of â€Å"father of modern organized crime.†Born: November 24, 1897 in Lercara Friddi,  Sicily, ItalyParents: Rosalia Capporelli and Antonio LucaniaDied: January 26, 1962 in Naples,  Campania, ItalySpouse:  Igea LissoniCriminal Convictions: Pandering, drug traffickingPublished Work: The Last Testament of Lucky Luciano: The Mafia Story in His Own Words (as told to Martin A. Gosch  and  Richard Hammer)Notable Quote: â€Å"There’s no such thing as good money or bad money. There’s just money. Early Years Lucianos family immigrated to the United States in 1906. His criminal career began not long after. At the age of 10, he was charged with his first crime (shoplifting). Luciano launched his first racket in 1907, charging Jewish and Italian kids in his Lower East Side neighborhood anything from one or two pennies to as much as a dime for his protection to and from school. If they refused to pay, Luciano beat them up rather than protect them. One of the kids, Meyer Lansky, refused to ante up. After Luciano failed to pound Lansky to a pulp, the two became friends and joined forces in the protection scheme. They remained friends and close associates throughout most of their lives. At the age of 14, Luciano dropped out of school and started a $7 per week delivery job, but after winning more than $200 in a craps game, he realized there were faster and easier ways of earning money. His parents sent him to The Brooklyn Truant School in hopes of straightening him out but in 1916 after his release, Luciano took over as leader of the notorious Five Points Gang, where he became acquainted with future Mafia leaders Vito Genovese and Frank Costello. In the years leading up to World War I, Luciano expanded his criminal enterprises to include pimping and drug trafficking, and while the police named him as a suspect in several local murders, he was never indicted. The 1920s By 1920, Luciano had branched out into bootlegging and illegal gambling. With financing and an education in social skills from his mentor Arnold the Brain Rothstein, Luciano and his partners were grossing over $12 million a year from the sale of illicit alcohol by 1925. Luciano, Costello, and Genovese had the largest bootlegging operation in New York with a territory that extended as far as Philadephia. By the late 1920s, Luciano had become a chief aide in the largest crime family in the country, led by Giuseppe Joe the Boss Masseria. Initially recruited as a gunman, as time went on, Luciano came to despise the old Mafia (Cosa Nostra) traditions- and especially Masserias belief that non-Sicilians could not be trusted (which ironically, turned out to be true in Lucianos case). After being kidnapped and mugged, Luciano discovered Joe the Boss was behind the attack. A few months later, he decided to betray Masseria by covertly joining forces with the second largest mafia clan led by Salvatore Maranzano. The Castellammarese War began in 1928 and, over the next two years, several gangsters connected to Masseria and Maranzana were killed. Luciano, who was still working for both camps, led four men- including Bugsy Siegel- to a meeting he had arranged with Masseria. The four men sprayed his former boss with bullets, killing him. After the death of Masseria, Maranzano became the Boss of Bosses in New York but his ultimate goal was to become the leading boss in the United States. Maranzano appointed Lucky Luciano as his No. 2 man. The working relationship was short-lived, however. After learning of a plan by Maranzano to double-cross him and wipe out Al Capone in the bargain, Luciano decided to strike first, organizing a meeting at which Maranzano was killed. Lucky Luciano became The Boss of New York and, almost overnight, he began moving into more rackets and expanding their power. The 1930s The 1930s were prosperous times for Luciano, who was now able to break ethnic barriers formerly laid out by the old Mafia. He strengthened his outreach in areas of bootlegging, prostitution, gambling, loan-sharking, narcotics, and labor rackets. In 1936, Luciano was convicted on charges of compulsory prostitution (pandering) and drug trafficking. He was sentenced to 30-50 years but maintained control of the syndicate while behind bars. The 1940s In the early 1940s at the onset of Americas involvement in World War II, Luciano struck a deal with U.S. Office of Naval Intelligence. He offered to supply information to help protect the mob-run New York docks from Nazi saboteurs  in exchange for a move to a better prison and the possibility of early parole. Luciano was transferred to Great Meadow Correctional Facility from the Clinton Correctional Facility in Dannemora in upstate New York. He continued his collaboration, known as Operation Underworld, for the remaining years of the war. In 1946, Governor Thomas E. Dewey (who while serving as Special Prosecutor was responsible for Lucianos conviction) granted the mobster a commutation of sentence and had him deported to Italy, where he was able to resume control over the American syndicate. Luciano snuck into Cuba in October 1946, where he attended The Havana Conference, a meeting of the five major crime families hosted by Lansky who already had an established presence in Cuba. The cover for the meeting was an appearance by Frank Sinatra. During the week-long conference that focused on the heroin trade and gambling activities in Cuba, and also to decide the fate of Bugsy Siegel and his Las Vegas money pit, the Flamingo Hotel, Luciano met privately with Genovese, who suggested that Luciano take on a figurehead role as Boss of Bosses while allowing Genovese to control the day-to-day activities of the syndicate. Luciano declined, saying: There is no Boss of Bosses. I turned it down in front of everybody. If I ever change my mind, I will take the title. But it wont be up to you. Right now you work for me and I aint in the mood to retire. Dont you ever let me hear this again, or Ill lose my temper. When the U.S. government got wind of Lucianos presence in Cuba, it quickly moved to have him repatriated to Italy, where he remained for the rest of his life. While he continued to profit from mob-related activities, his power and influence waned. Death and Legacy As Luciano grew older, his long-time relationship with Lansky began to falter. Luciano felt he wasnt getting his fair share from the mob. Disgruntled, he arranged to have his memoirs written- not to bare his soul so much as to set the record straight as he saw it. He outlined his exploits to writer Richard Hammer and had also arranged to meet with producer Martin Gosch about a possible film version of the project. Word of his confessional (The Last Testament of Lucky Luciano: The Mafia Story in His Own Words, published posthumously) did not sit well with Lucianos former mob associates. In 1962, Luciano suffered a fatal heart attack in the Naples airport, where he talked about the movie with Gosch. There is some conjecture that Luciano did not die of natural causes and that his death may have been a hit in retribution for his turning canary. Lucianos body was sent back to the United States and buried at St. Johns Cemetery in New York City. It is believed that Luciano was one of the most powerful men in organized crime and to this day, his influence over the gangster activity can be felt in this country. He was the first person to challenge the old Mafia by breaking through ethnic barriers and creating a network of gangs that comprised the first national crime syndicate and continued to exert control organized crime long after his death. Sources Donati, William. Lucky Luciano: The Rise and Fall of a Mob Boss. Jefferson, North Carolina: McFarland Company, 2010.  Gosch, Martin A.; Hammer, Richard. 1974.  The Last Testament of Lucky Luciano: The Mafia Story in His Own Words. Little Brown and Company.Newark, Tim. Boardwalk Gangster: The Real Lucky Luciano. New York: Thomas Dunne Books, 2011.

Sunday, November 3, 2019

Business project Essay Example | Topics and Well Written Essays - 2500 words

Business project - Essay Example The objective of my research is to investigate, and highlight recruitment and retention problems for canvassing staff that the company is currently experiencing. A  literature review  is a critical and in depth evaluation of previous research in a particular area. It allows anyone reading the paper to establish why you are pursuing this particular research program. The role of a literature review is to discover answers to a research problem. Machi & Mc Evoy (2008) explain an advance literature review as the foundation for identifying a problem that demands original research, and is the basis for the study of a research problem. Both authors even explain further that a literature review critically proposes further research which guides the problem into identifying research objective that then leads to findings and conclusion from the whole research. Therefore the literature review covers areas such as Job satisfaction and turnover Intention, organisational culture and behaviour towards work life balance. Researchers have developed a variety of conceptual frameworks to model the turnover process. As noted by Lambert et al. (2001), scholars speculate that employee turnover can be predicted using comprehensive measures of job satisfaction; otherwise stated, high job satisfaction is associated with low employee turnover. Moreover, research shows that the relationship between job satisfaction and actual employee turnover is moderated by intentions. Schwepker (2001) noted that positive and statistically significant relationships have been reported in dozens of studies exploring leaving intentions and actual leaving behavior. In other words, intention to leave a job is an immediate precursor to actually leaving. For this reason, positive relationship between professionalism in the workplace and job satisfaction. In his research, Schwepker (2001) also noted that statistically significant,

Friday, November 1, 2019

Government action invariably means a loss of individual liberty Essay

Government action invariably means a loss of individual liberty - Essay Example Before the War on Terror caused by the September 11 attacks, there was the War on Poverty by Lyndon B. Johnson which justified Federal government action. But a minority view is that government action does not invariably lead to a loss of personal liberties as government actions are mostly on matters of national concern such as a faltering economy and the countrys physical security against terrorism. People living in a modern and civilized society do so under the social contract which calls for the setting up of government system to maintain order and security for its citizens. In return for this, all people agree to surrender some of their rights implicitly in which originally free individuals give up some of their natural rights in favor of the social system or a political organization and be bound by the common laws and conventions being adopted. It is the very essence of a democracy in which people allow themselves to be governed to some extent but this does not necessarily equate into a loss of individual liberties. On the contrary, people living in democratic societies enjoy more freedoms than they would otherwise experience in other forms of government. Only people with evil intentions such as terrorists and economic saboteurs have reason to fear government intervention in their lives because that is precisely why government was set up in the first place and its functions include the assurance to citizens of their safety and general economic well being. What most of the critics against increasing Federal government authority cite most often are the threats to personal freedoms in which government intrudes into personal lives. People who abide by the laws impliedly contained in the social contract therefore have nothing to fear. In other words, people can go on with their lives with remarkably little governmental