Monday, December 23, 2019

The Women Of The Prostitution Business - 915 Words

Slut. whore. Skank. All words which are becoming less acceptable in society, yet more common in peoples vocabulary. It is almost like the origins of the words have either been forgotten or Britain has become more and more sexist. A girl wearing a short skirt does not make her a slut , nor is she â€Å"asking for it†. A girl who enjoys casual sex is not a whore. These words may be in the twenty first century vocabulary, but it is never okay to use them. Even when talking about modern day prostitutes, you are meant to call them escorts. This is because the profession is trying to get away from the dirty connotations which come with it and people need to realise that it is not all about sex anymore and that these are ordinary women who deserve to be treated with respect. What should be done to help protect the young women that are in the prostitution business in Britain? If escorts are disgusting people, then why do they still exist? One in then British men have visited a prostitutes, which shows that there is a high demand for them. As long as these men are not forcing the women to do something against their will, they are within the current UK law to do so. Even if there was made completely illegal to hire escorts then that would still not completely stop this issue from happening but make it easier for men to abuse the prostitutes.These men are in it for the sex, and many women in the profession are in it for the money and sometimes the sex. They also make a lot of money. YourShow MoreRelatedShould Prostitution Be An Illegal Business?1533 Words   |  7 PagesProstitution is a controversial topic with a faction of the society arguing that the ancient trade should be legalized whereas the opponents insist that prostitution should be an illegal business because it is unethical. The commercial sex effects and its nature elicit divided opinion becau se legalizing prostitution as a trade affects its characteristic as a gendered institution and social nature. A section of the society perceives prostitution as an unequivocal exercise of patriarchal control overRead MoreFinal Research Paper. Justin Jalea. Durham College. Human1144 Words   |  5 Pages PROSTITUTION: VIOLATION OF HUMAN RIGHTS AGAINST WOMEN Prostitution is considered as a control of taking part in sexual exercises with somebody for cash. In Canada, it is lawful to offer sexual administrations yet it is considered as a wrongdoing to purchase sexual administrations from others. When we talk about prostitution it is important to consider that which type of women is engaging in sexual activities for money. It is considered that the more than half of the women doing sexRead MoreThe World s Oldest Profession For Nothing1613 Words   |  7 Pagesâ€Å"Prostitution isn t inherently immoral, any more than running a company like Enron is inherently immoral. It s how you do it that counts. And the reality is that it will happen anyway. It s not called the world s oldest profession for nothing. Why not make it, at the least, safe and productive?† -JEANNETTE ANGELL of A Wellness Perspective on Prostitution, Freedom, Religion, and More, Seek Wellness, Apr. 30, 2005. Prostitution, known as the world s oldest professi on, and it exists everywhereRead MoreCauses and Effects of Prostitution757 Words   |  4 PagesA. Prostitution in the Philippines 1. Propagation of prostitution during the time of the Spanish Colonization in the Philippines ïÆ'Ëœ The rape of native women by the Spaniards created a reserve of â€Å"fallen† women who became available to service not only the homesick Spanish troops and dignities, but also the friars. ïÆ'Ëœ By the 19th century, prostitution was an occupation for women in Manila. 2. Prostitution during the time of the American Occupation in the Philippines ïÆ'Ëœ The outbreak of the Philippine-AmericanRead MoreProstitution As A Dominant Figure1374 Words   |  6 PagesRegardless of the viewpoint that prostitution is immoral, sexual rights are inherent to all people and they have the right to choose to be sexually active in consensual relationships or not. Admittedly, some clients buy the right to mistreat prostitutes and strip respect for human beings from a person in order to fulfill their desire to be a dominant figure (Doll). Many people use this belief as evidence that prostitutes are degraded and their profession should be illegal. However, Kelly J. BellRead MoreShould Prostitution Be Legal?1371 Words   |  6 PagesKayla Beaty College Success Professor Jernigan 02/04/2015 Prositution in the U.S For my paper I chose the topic â€Å"Prostitution In the U.S† I picked this topic because I feel as if there’s a lot to discuss about the subject itself. Prostitution in my eyes, should be illegal in all parts of America. I feel as if the crime itself is degrading not only to women, but the families of those involved that choose to commit these acts. My personal opinion, going more into detail is that I grew up viewingRead MoreThe introduction of new technological advanced innovations and methods during the Market Revolution1700 Words   |  7 Pagesabundance of people, especially women, are deceived and moved from their motherland to work in unfavorable industries with prostitution as the most common jobs for these women. With the incessant growth of the prostitution, the act of participating in promiscuous copulation especially for money, theres an outgoing debate on whether prostitution should be legalized or illegalized. However, people fail to focus on the increas ing amount of trafficking and child prostitution aroused by sex tourism. As theRead MoreShould Prostitution Be Legalized? Essay example858 Words   |  4 PagesLegalizing prostitution would be beneficial to the government and sex workers by creating tax revenue, bettering medical care, and protecting prostitutes against violence. Prostitution is viewed differently throughout society and holds a lot of negative opinions but no one really discuss’ the benefits of prostitution being legalized throughout America. Many people believe in legalizing Marijuana not knowing its positivity and negativity. When legalizing prostitution you should look at the overallRead MoreShould the United States Legalize Prostitution? Essay1148 Words   |  5 PagesProstitution in its legal sense is defined as sexual intercourse of some kind in exchange for some kind of payment, usually money (Adriaenssens and Hendrickx 665; Perer 826).As of 2013, there are an estimated 1 million to 2 million prostitutes active in the world wide sex work industry today (Adriaenssens and He ndrickx 666). Prostitution is illegal in the United States; however, many experts think that should change. Most European and Asian countries have legalized prostitution (Agustà ­n 74). SomeRead MoreShould Prostitution Be Legalized?1387 Words   |  6 Pages but it is becoming more prevalent and dominating as the years go by. This is not to say that prostitution, either forced or voluntary, did not exist long ago, just simply that it has become more of an issue as time has progressed. Perhaps this is due to the media, celebrities, social media, the now early on-set of puberty, and the wonderful use of technology and cell phones. Nevertheless, prostitution, sex tourism, and child exploitation tend to be a bigger deal in Latin American countries than

Sunday, December 15, 2019

Life Span Perspective Paper Free Essays

Life Span Perspective Paper Life span is the time of conception till the day a person takes their last breathe. So many situations take place in a person’s life like reaching other developmental periods within life. A child grows from an infant and becomes of age to go to school for the first time or simply graduating from high school and entering the next phase of life when responsibility becomes everything. We will write a custom essay sample on Life Span Perspective Paper or any similar topic only for you Order Now Each phase of life means that a person is developing whether they are transitioning from a young adult to being a middle aged adult there are developmental stages that take place until the final transition which is death. In order to better understand human development the process of studying takes place which in turn means moving from one stage to the next within a lifespan. Through the years observation, predictions and evolving technologies have opened up doors to the way individuals develop and reach stages by pinpointing differences and predictions that prove to be inaccurate or simply that have not risen to the occasion over the years of change. There are considered to be five characteristics of development; multidirectional, multicontextual, multicultural, multidisciplinary and plasticity. Multidirectional is the study of change within human development. Multicontextual is dealing with contexts such as an individual’s surroundings or environment that can affect development. Multicultural is when individuals do not notice cultural differences because they have become so used to their own surroundings. Multidisciplinary which pertains to multiple academic fields which all deliver the same insight as to how data and insight are contributed. Plasticity is when change occurs sometime during the lifespan of an individual. A person could be fine and then experience the lost of a parent and become altered forever. These five characteristics all intertwine with one another in order to explain in detail how people transition and develop through multi stages within life. There are also three domains of human development; biosocial development, cognitive development and psychosocial development. (Boyd and Bee, 2006). Two theories of lifespan development are grand theories and emergent theories. Grand theories are a combination of behaviorism, cognitive theory and psychoanalytic theory which refer to child development through comprehensive theories of psychology in a detailed manner. Emergent theories are not as detailed but it does incorporate the interpretations of development but touches on preconceived comprehensive and systematic instances. Behaviorism studies observable behavior and is sometimes referred to as the learning theory because behavior is learned in a number of ways. Cognitive theory focuses on how the thought process develops and is ultimately configured. Psychoanalytic theory is when a child has inner drives and motives such as obtaining the cookie from the cookie jar after their parent has told them not until after dinner. Boyd and Bee, 2006). Heredity is when your skin tone or height is passed down through the generations within a family. Your genes and DNA that make you who you are as far as features and sometimes personality and reactions to a situation. Environment is where a person lives, is raised or chooses to reside. A person can come from a family that has never been to college but allows a positive environment to flourish newer ways of learning to achieve a major goal within their life. No one can change their DNA or even their genes but allowing positive versus negative environments to influence their future thought process can really provide a lot of good. On the other hand a person can have the makeup of having an addictive personality that can ultimately be very negative outcome as a person that has two alcoholic parents and paternal and maternal grandparents that have issues with drugs and alcohol. If the individual takes a drink of alcohol and the addictive traits get waken up then the individual could really cause harm to themselves by subduing to alcohol and drugs. An environment can truly have an effect on the development of an individual. A person can be raised in a tense environment and exude a negative temperament as a result of being in non nurturing situation. In conclusion everyone in the world has reached some stage within the lifespan developmental stage and in order for these stages to have been identified research, observation and scientific experiments have taken place. There is such a wide array of characteristics of development that pinpoint the differences that are faced within the entire life of an individual. Grand theories are three incorporated theories that are detailed and well observed in order to showcase development of the years as everyone is very different. Emergent theories are theories that are not detailed and can change at any given moment because they are predicted theories that might not be proven to be true. Heredity and environment play such pivotal roles in development because people mimic behaviors and influences that are around them whether negative or positive. ? Reference Boyd, D. , Bee, H. (2006). Lifespan Development (4th ed. ). Upper Saddle River, NJ: Pearson. How to cite Life Span Perspective Paper, Essays Life Span Perspective Paper Free Essays Life Span Perspective Paper Mihaela Ciobanu-Osborne PSY/375 12/09/11 Instructor: Dr. Lisa Holbert Life Span Perspective Paper In order to get a good perspective of the life span of a human being, a person first needs to understand changes that take place. The life span perspective is mostly about knowing the different stages in life and when they occur. We will write a custom essay sample on Life Span Perspective Paper or any similar topic only for you Order Now These changes should be viewed as the outcome of culture and the specific situations that are in play at the time of the change. There are several traits that describe what life span perspective is in the human development process. First, life span perspective is an ongoing process that is not controlled by any one age period. Second, the life span perspective consists of three different domains. The three domains are physical, cognitive, and social. The three domains illustrate smooth strokes not rigid edges of the life span perspective. The three domains are used to organize the research of human development. The physical domain of life span perspective looks at the psychological changes that take place over a lifetime. These changes include, but are not limited to, puberty, menopause, and bone loss. The cognitive domain of life span perspective is researched the mental changes that occur throughout an individual’s lifetime. These changes include thinking, problem solving, and memory. The cognitive domain has to do with many things starting with how children learn to read to memory loss that comes with old age. The social domain of life span perspective analyzes cultural and environmental development throughout an individual’s life. Third, some aspects of life span perspective increase while other aspects seem to decrease (Stantrock, 2003). This particular perspective is called plastic. Finally, life span perspective is contextual. This means that the person consistently responds to and acts on context that includes several different context. These contexts include an individual’s biological makeup, physical environments, and social, historical, and cultural contexts (Stantrock, 2003). There have been many theories that have generated over time on the life span development of a human. Some of these theories were just theories that were built on top of other theories. Charles Darwin brought about the theory of evolutionary stages. With that already in place, during the 19th century, G. Stanley Hall from Clark University was able to form his theory of norms. This theory hypothesizes that human development can be separated into specific phases. This theory led Arnold Gesell to his theory of maturation. This theory basically depended on genetic predisposition (Berger, 2008). Just as there are different domains in life span perspective, there are also different periods in life that people experience that are all their own. When people are talking about specific areas or times in their lives they generally refer to it as a stage. There are eight different developmental stages that are discussed in the life span perspective (Berger, 2008). The first stage is the trust vs. mistrust which is the birth to one year stage. The stage of trust vs. mistrust can be a very critical point in an individual’s life. This concept suggests that there could be specific periods in development where a person is especially sensitive to a kind of presence of an experience of a specific kind (Berger, 2008). The second stage is autonomy vs. shame and doubt for children one to three years of age (childhood). This is where the individual develops more physical skills and the ability to make more choices on their own. This growth will lead to giving the child a will of his/her own. The third stage is initiative vs. guilt stage for children that are age three to six (middle childhood). This stage teaches goal orientation through the putting together of activities. Stage four is industry vs. inferiority age six to 12 (late childhood). During this stage the individual is learning the normality’s in cultural differences. The fifth stage is identity vs. role confusion age 12 to 18 (adolescence). During this stage individuals begin to experience puberty changes, which generally lead to a more mature outlook on life. The sixth stage is intimacy verses isolation age 18 to 30 (early adulthood). During this stage the individual decides to marry and settle down or live on their own. The seventh stage is generatively versus stagnation age 30-55 or 65 (middle to late adulthood). This is the stage where individuals are more focused on caring for their children and loved ones than anything. The eighth stage is integrity verses despair age 50 or 60-death (late adulthood). This is the stage where individuals become accepting of them and are wise with experiences they have lived through. Change is a continuous process and a large part of everyday life changes. Comprehending the changes through interpretation of a person’s life and cultural background is getting a handle on life span perspective of human development. With everything that has been discussed, one can begin to understand human development. References: Berger, K. (2008). The Developing Person Through the Life Span (7th ed. ). New York: Worth Publishers. Stantrock, J. (2003). Life Span Psychology: Theory and Application to Intellectual Functioning. Annual Review of Psychology, 50(1), 471. How to cite Life Span Perspective Paper, Essay examples

Saturday, December 7, 2019

Annotated Bibliography Nursing Ethics

Question: Discuss about the Annotated Bibliography for Nursing Ethics. Answer: Introduction The current study analyses three articles related to the nursing advocacy. The first article describes The lived experience of nursing advocacy, which aims to improve the existing awareness of the nurses related to the right of the patients. On the other hand, the second article clearly describes the different types of Barriers to the nursing advocacy for meeting future strategic direction. Historical developments of the nursing advocacy, its gradual progression and allied barriers have been clearly demonstrated in the second article. Finally, the third article deals with Problematizing autonomy and advocacy in nursing, where special highlights have been made to assess the autonomy assumptions of the inherited nursing advocacy. Thesis statement: The thesis statement is to identify the nursing practices in the medical, surgical cases and the impact of the educational preparation on the nursing related practices. The current thesis statement would help to improve the existing knowledge related to the nursing advocacy practices by the nurses. Analysis: The Journal has identified the subsisted practice of the nursing advocacy, which can be considered as a vital component of the nursing practice. The three phenomenological qualitative pilot studies have been explored in this journal to register different types of experiences gathered in the nursing advocacy while treating the patients. The journal has analysed the three important aspects like how to register the nursing practice in the medical, specialist surgical area and the experience with nursing advocacy. Furthermore, the reflections on the educational preparation provided by the author have identified the best applications of the nursing advocacy with the patients. The study has robustly focused on the developing themes of speaking out and speaking to the patients. The study identifies that proper actions and the compelled behaviour with the patients is crucial to meet different needs of the critical care patients. In the addition, the American Nurse Association Code of Ethics demonstrates the assurance to advocate for the patients under all desired conditions. As per the opinion of the scholars, nursing advocacy is a comparatively new and overtly practice role for the nurse, entering newly in medical practice. It has been speculated that the trend of advocacy nursing has started in the USA in 1980s. The researchers and the other practitioners have discovered a better consideration of this phenomenon for engaging a benchmark practice of nursing advocacy. The exhaustive review of this article has revealed the basic descriptive research that focuses on creating a strong knowledge about the nursing advocacy that has to be dedicatedly carried out throughout the nursing practice. Thesis statement: The thesis statement is to critically analyse the barriers to the nursing advocacy for meeting future strategic direction Analysis: The current journal focuses on the concept of nursing advocacy and the prime act of advocating as part of nursing ethics with assisting the patient autonomy. The scholars in the existing journal attempted critically to evaluate the concept of barriers to the nursing advocacy. The primary purpose behind the initiatives is to provide clarity and directions to the health and care industry to find out the resolving solutions to the future inquiries. Moreover, the current source further examines on the barriers to the nursing advocacy that might result effectively in the education and intervention concept. The recognition of the nursing barriers has helped the future readers to get acquainted with the remedial actions to overcome the discrepancies in the nursing advocacy. The concept reflects the ethical norms for the nurses that involve the advocacy for clients. The scholars carried the perception that initially the nurses require recognising the advocacy of the clients, which will help the nurses to understand both the actual and potential requirements of nursing advocacy. The literature of the current study reproduces the historic development, entrenched progression and the emerging barriers in the nursing advocacy. In the current literature, the authors have successfully created an awareness regarding the present barriers to the nursing advocacy so that the future barriers can be mitigated in a potential manner. A concept analysis method has been considered by the current researchers while conducting the study. A special priority has been provided on gathering data utilising the journals of Cumulative Index of Nursing and Allied Health. The database is chosen with the associated keywords used in the literature, such as patient advocacy, subservience, barriers and nursing. The journal reflects the fact that the scholars have reviewed 55 abstracts and 36 articles regarding the subject matter of the barriers in the nursing advocacy. Each of the selected articles is examined with the concept of the literature review and the alignments of themes are done accordingly. Thesis statement: The thesis statement is to identify a few assumptions related to perceive the role of the nurse in the contemporary western health care system. The current statement would also highlight on evaluating the critical assumptions regarding the autonomy of the inherited nursing advocacy. Analysis: The customarily patient advocacy has been argued in the present journal. The scholars argue the essential parts of nursing and the measures that are reinforced in the contemporary nursing conduct. The scholars in the articles believe that the role of nursing as the advocacy is not understood by the health care industry, which increasing the barrier measures in the nursing services. Through the article, the author aims to highlight the problematize expectations and impacts that revolve around the apparent contribution of the nurses. It further determines on the Western Healthcare system and specifies the key assumptions that are the primary concern of the inherent autonomy role of the advocacy. The power distributions are unequal between the nurses, doctors and the other authorities of the institution, which increases the vulnerability state of the patients within the system. The major conflict lies in the Supreme attitudes of the nurses. In this scenario, the nurses feel capable of t aking the entire responsibilities of the patients. The extrovert attitude sometimes creates a clash between the perception of the patients and the nurses. The current article has also analysed the health care and autonomy system that usually drives the rules of surrounding informed consent. The scholars have elevated the necessary interpretation that requires providing the appropriate information that could make a voluntary decision for the effective nursing practice. The better understanding of the autonomy is purely focused on the legal protection of the healthcare profession. In this current article, the scholars have highlighted the organisational hierarchies that can effectively make a boundary limit the patients individual autonomy. On the other hand, it has been observed that a healthcare environment is controlled by the numerous factors which could adversely influence the autonomy. The scholars have provided the factors such as a capability to have the confidentiality, admittance to visitors and the right to originate for communicating individually to the patients. It is also the major responsibility of the health practitioners and the nurse to direct the patients about the meal timing, nature of meals and the individual preference on the choice of meal and nutrition. Conclusion The present project initiated to critical evaluated indifferent sources and identified the reasonable matters that tend to limit the growing prospect of the health and care sector. Determining on the study, an inference can be drawn from the 1st article, The lived experience of nursing advocacy that the scholar examined on the extracted experience from the nursing advocacy. The 2nd article is the Barriers to nursing advocacy, where the scholar identified the obstacles that prevent the nurses from initiating the effective advocacies. Perception can be drawn from the 3rd journal, Problematising autonomy and advocacy in nursing, that the scholars attempted to identify the autonomy problem in the nursing advocacy. References: Cole, C., Wellard, S., Mummery, J. (2014). Problematising autonomy and advocacy in nursing. Nursing Ethics, 21(5), 576582. Hanks, R. G. (2007). Barriers to nursing advocacy: A concept analysis. Nursing Forum, 42(4), 171177. Hanks, R. G. (2008). The lived experience of nursing advocacy. Nursing Ethics, 15(4), 468477.

Friday, November 29, 2019

Problems on Campus Essay Example

Problems on Campus Essay Chelsia Bell Professor Arnold English 1301-005 September 25,2012 Better Food, Healthier People Campus advisors, with very simple solutions, can solve the common health problem of bad food choices on the TJC campus. Replacing non-healthy foods in vending machines, serving healthier food in the cafeteria, and offering smaller sizes of soft drinks are all good solutions to this common problem. Everybody loves picking up a quick snack in between classes; however, sometimes the taste can throw us off and make us forget about the real picture. Most of the snacks in the vending machine are very good, but are also very high in calories, carbs, and definitely sugars. While you are enjoying your snack you have no care in the world about what you are putting in your body. If we would all just take a quick second to think about what are eating, I’m sure the amount of obesity among people, not just on campus but everywhere, would drop considerably. Replacing snacks like Reese’s, Kit-Kat, and chocolate bars with healthy snacks like the 100 calorie snacks and crackers, would easily make a significant change. We will write a custom essay sample on Problems on Campus specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Problems on Campus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Problems on Campus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Cafeteria food can sometimes be good and sometimes not so good. Because of budgets, cafeteria food could be minimum quality. They may serve whatever is cheapest at the moment with any concern about providing healthy food. Putting options like salads, baked stuff instead of fried, and serving smaller portions will also cut down on all the health problems on campus. Sometimes even juice instead of a soda can help. If the people in the cafeteria and the people over the food on campus would be more concerned about everybody else’s health, I’m sure the food choices would be a lot better. Healthier food choices equal a healthy person. Small, Medium, or Large are words that we hear most of the time when we order a soft drink. Most of the time the mediums are big enough to share with 2 people. Drinks have just gotten bigger and bigger. Offering the mini sizes of soft drinks in the vending machines would be a very good idea. Sodas are already not good for you in many ways, so the serving that comes in the mini size is plenty for anybody. It is usually difficult for me to drink a whole regular sized soda by myself. Food is always tricky. You just have to make sure you are the eating the right thing at the right time. The bad food choices on the TJC campus can easily be solved with help from supervisors and maybe even some sponsors. Nobody should have to be constantly worried about their health. Putting these better food options on campus can easily ease everyone’s mind.

Monday, November 25, 2019

The Yavapai essays

The Yavapai essays Since ancient times, they called themselves the people of the red rock country. The region they roamed on their hunting and plant gathering forays remains among the most lush and magnificent in the Southwest. Before white contact, the Yavapai were a wealthy people in terms of their environment. Unfortunately, the land that sustained them for centuries would be coveted by a more powerful and war-like tribe from the East...the English-speaking Americans. But Americans were not the first white people the Yavapai encountered. Two hundred years before American contact, Spanish white men from Mexico entered the Verde Valley (the area located in the center of the state, Camp Verde) in search of fabled lakes of gold, and a route to the South Seas. The Spanish had no difficulty in recognizing the differences in language between the Yavapai and Western Apache, whom they also encountered. Following on the heels of the gold-hungry prospectors were the settlers. By 1864, the U.S. Army was building forts throughout Yavapai and Apache ancestral lands. In less than 10 years, white efforts to destroy the well-ordered lifeways of the Yavapai and the Apache, and exterminate them as a people, very nearly succeeded. Soldiers knew that fighting the fierce Apaches of Arizona and New Mexico, required particular skill and heroic fearlessness. For many, the challenge was irresistible. Unfortunately, the peace-seeking Yavapai of Arizona were mistaken for Apaches...or, as the Yavapai tell it...there was no mistake. On September 26, 1864, the First Territorial Legislature met in Prescott, Arizona. The most pressing concern before this legislative session was the need for troops to make war against the Apaches. At this point in time, both Yavapai and Apaches were considered (by the whites) one and the same. The months between 1869-70 finally reac ...

Friday, November 22, 2019

Political Science 1, w question paper on the president and congress of Essay

Political Science 1, w question paper on the president and congress of the US - Essay Example This brief, yet concise, essay now turns to an overview of the history of the Presidency of the United States. From George Washington to Barack Obama, the Presidency of the United States of America remains the highest office in the land. As head of state as well as head of government, the President of the United States of America leads the federal government as well as the Executive branch of government. Although the election of the President is indirect in the United States and is accomplished through the Electoral College, the democratic election of the President is a traditional which dates back to the establishment of a free republic on the shores of the Americas. The Second Continental Congress following the American Revolution established a confederation system of government in which the office of a President as well as the body of Congress were created. Following the Constitutional Convention in the wake of revolution, the executive branch as created and established a series of checks and balances on the authority of the executive. Accordingly, the American system of political governa nce is predicated on the belief that there is a balance of power between the three major branches of government. Thus, in an effort to ensure that each branch is counterbalanced by the others, the Executive, Congress and the Judiciary work to ensure the smooth functioning of the legislative process in the United States. The multitude of roles played by the President have evolved and developed in tandem with the history of the United States. As commander-in-chief of the Armed Forces, the President of the United States plays the important role commanding the most important army in the history of the world. As commander-in-chief, the President can direct the armed forces but cannot declare war without the authorization of Congress. This is an important

Wednesday, November 20, 2019

Bbusiness management Essay Example | Topics and Well Written Essays - 1500 words

Bbusiness management - Essay Example BMW focused on the market trends and strategies in order to get a hold on high share in the market. BMW Case Analysis What main trends are identifiable in the business environment in general and in the automobile market in particular in 2004 that might affect BMW’s strategy? The main trends that are identifiable in business environment mainly include the competition between the different brands of same product category. It is on the basis of the quality and differentiation that is created by every brand. In automobile market the most important trend that is identifiable is the uniqueness in terms of design, price, quality and convenience provided to every customer when it comes to use. Whether it’s for any segment, the prime objective of automobile industry is to provide the ease to use it. According to Porter’s Generic BMW is highly differentiated in the automobile market, and this differentiation was on the basis of brand itself that created different identity in consumers mind. BMW conveys a perception of prestige and dignity for the high-end users. Uniqueness in terms of design seems to be the most important weapon for any company to fight and to move in fast–paced automobile industry. But in 2004 the market for automobile industry became more concentrated and productive. ... ere was no issue of quality in this year because of rapid growth of automobile industry but consumers of North America and Western Europe started demanding cheaper cars due to economic instability which forced them to reduce the spending on non-essential goods, and this adversely impacted the matured car market. On the other hand the market of Asia especially in China the demand of high–end and expensive models increased. Henceforth, quality was not the issue in 2004 whereas every company was focusing on placing their brand on the top of automobile industry. The war was of branding not of quality because the quality was no longer an issue (Mathews, 2006). 1. Using Porter’s five-force framework, attempt an analysis of the competition in the automobile industry in 2004 (adopt the BMW perspective). Consider the time horizon of strategic planning and attempt to identify what future changes are likely for that period in the light of the factors at play in the macro-environme nt. Industrial Rivalry – The competition became so ferocious, there was no room for differentiation and growth was slow because industry was in the mature phase. So, the focus turned to price of the product in automobile industry. Those who set economical prices and uniqueness into their brands were ruling the market. Quality was the weapon and the design too but that no more be considered as factor for choice-making, it was necessary for car makers to look for quality of product. Profitability was affected badly due to various external factors as well as competition. Substitutes – In 2004 automobile industry was facing substitute like motor bike, boats and leisure cruises were immensely used. Potential Entrants – Deluxe cars like Ford entered the market with Jaguar and Volvo models and

Monday, November 18, 2019

Practical Guide to Effective Leadership for School Managers Essay

Practical Guide to Effective Leadership for School Managers - Essay Example One of the benefits that such a practical guide has is with relation to its ability to highlight key issues and problem areas that will likely remain for the duration of time in which the practical guide itself will be utilized. In such a way, a level of self analysis is needed to be performed that that once a task or approach has been completed, a level of inference can be drawn with regards to those areas that could be improved upon as well as noting and further improving those areas that proved to be key successes within the process (Avant, 2010). As a means of this, the following analysis will seek to provide a level of discussion onto the key areas in which the skills that will be noted developed as a function of individual growth as well as teamwork. Furthermore, the mistakes and difficulties that are doubtless to be experienced will also be discussed as a means of seeking to find ways in which personal and professional development can be promoted to a higher degree within the individual school of the current time as well as the future. Although an exhaustive study of these personal and professional factors would require a dissertation length response, this brief analysis will seek to hone in on three unique skills which can be developed through the course of everyday activities and seek to utilize these as a starting point for related difficulties and weaknesses that proved to be key roadblocks, although not insurmountable, in the process (Wilson, 1992). A primary skill that must be developed and leveraged at each and every stage is with regards to ensuring that lines of communication remain upon and healthy. Without this fundamental aspect, it is impossible for the flow of information to allow for a type of self-correcting entity to form that is capable of responding to threats and opportunities (Beccera & Gupta, 2003). Like any other institution/organization, it is the requirement of the educational organization to ensure that effective forms of commun ication be maintained and leveraged at each and every stage so that the entity can continue to express a degree of growth and development that is befitting of the times and demands upon which the environment consists (Elida-Tomita, 2010). Similarly, another key strength that must be sought to be engaged in order for effective communication to take place on any level is the ability of leadership to be able to interact with and gauge the needs that the organization puts forward; almost invariably accomplished via the process of self analysis and introspective means of measurement.

Saturday, November 16, 2019

Alternatives to Proprietary Digital Forensics for SMEs

Alternatives to Proprietary Digital Forensics for SMEs Realistic alternative to expensive  Proprietary Digital Forensics  and Security products for SMEs. Alan David Blais Abstract Organisations have recently developed an awareness about the necessity of having their systems secure and protected from external as well as internal threats. This sudden awareness is believed to be due to recent major events about breaches and security issues faced by many organisations. The consequences of these breaches and security issues had so many negative impacts that it has created a real awareness. Although the UK is among the leading countries in this regard Europe, it still has a long way to go, according to training director for the Sans Securing The Human Program, Lance Spitzner. (Cybersecurity Awareness SANS 2015) Many organisations have already invested very considerable amount of money into making their systems securer while other are still thinking whether investing money in security has a return on investment (ROI) or not. On the other hand, for small and medium enterprises (SME), it is an entirely different story, with the world financial crisis, it is already particularly difficult for SME to survive, and some of them are struggling to keep their companies running and many of them cannot afford the cost for improving the security of their system as it should be. Most of them, try to use short-term fix like cheap firewall and anti-virus, free patches and updates despite knowing that having a single/some layer/s of security is not enough. Some of the SMEs also uses free available tools and applications but most of these tools are specialised in only one aspect of security, thus several different applications are needed to provide better security. It is difficult to manage several different tools and applications at the same time. This projects aims at finding a solution to solve the above mentioned problem by designing a software/platform for managing different tools and applications remotely using the designed software/platform. 1. Background – 2 Pages 1.1 Introduction According to a new study on the main causes of European privacy, breaches come from organisations own errors, insider abuse and other internal mismanagement issues. The director of the study, P. Howard believe that only 41% of the incidents reported are external attacks by hackers and that 57% of the incidents which were caused by administrative error, exposed online, insiders or caused by missing hardware configuration. (Most European Breaches Caused by Organizational Error, Insider Attacks 2015) Based on the above study findings, we can therefore assume that having proper internal security mechanism within an organisation can significantly reduce the number of incidents. Despite knowing that, some organisations are still not improving their security as it should be. The main reason is the cost associated to security; some people at management level still think that investing on security has no direct impact on the main objective of business which is to make profit. It is true that many organisations awareness about security have recently changed due to the consequences of breaches on other organisations but Cyber Security awareness is still in its infancy in most organisations and not all organisations can afford the cost associated to security, Small and medium enterprises are generally not able to afford it. Moreover, much of the software available on the market focus on one particular aspect of security rather than having a single platform that caters for different aspect of security at an affordable price for SMEs. It seems that a growing trend is growing within SMEs, which is the use of open source software (An evaluation of open source software adoption by UK SMEs in the IT industry.) such as Volatility. But even that, it is not an efficient way to manage several applications all at the same time. A possible solution would be to use an application as a platform for using other open source software with the capability of managing all these remotely. This project is about designing that platform to provide incident response, digital forensics, host and network security as well as malware analysis capability. The platform will provide all the above mentioned capability remotely and having a server-client architecture. 1.2 Relevant past and current work Alien Vault has a software which provides a platform to manage different aspect of security all on one platform called Unified Security Management (USM). The software is a commercial one and provides the management of tools which themselves are commercial software whereas this project aims at using available free software and in-house built features to provide a platform for managing different aspects of security at an affordable price. Below is the management features available in Alien Vault USM and other traditional SIEM. As we can see from both screen capture, many traditional SIEM require 3rd party product to provide some features. Below are the security features provided by alien vault. The USM provides a single platform for managing and monitoring different aspect of security. 2. Project Description – 1 Page 2.1 Project Overview This project aims at designing a platform for managing open source and free applications/tools as well as providing in-house built features. The platform will be dealing with different aspect of security such as incident response, digital forensics, host and network security and malware analysis. The digital forensics capability will be the central part of the project from which incident response and malware analysis will be derived from. The host and network security will be on top of the base structure which comprises the three other aspects. The digital forensics and malware analysis can be split further at a high level view as we can see from the diagram to the left side. Live and static forensics for digital forensics on the other hand Static and dynamic analysis for malware analysis. 2.2 Importance of this project Security should be the concern of everybody, SMEs should be given alternative option to expensive security products to enable them to provide more secure services to clients, which in-directly or directly can affects anybody. This project aims at providing a cost effective solution by providing a platform to manage open source tools and application. The main assumption will be, despite knowing that free applications and tools have limitations, it is a better option than having no security at all or limited one due to having a limited budget for security. 2.3 Aims and Objectives It is important in a project to properly design the aims and objectives since it allows the setting up of the directionthe direction in which the project must go through. Objectives allow us to measure and assess the outcome of the project. Please refer to Appendix A for the aims and objectives. 3. Programme and methodology – 3 Pages 3.1 Spiral Methodology The spiral methodology seems to be the best option to suit the project. The spiral methodology as compared to waterfall methodology has the advantage of demonstrating that development projects work best when they are both incremental and iterative, where the development is able to start small and benefit from enlightened trial and error along the way. The spiral methodology reflects the relationship of tasks with rapid prototyping, increased parallelism, and concurrency in designing and building activities. The spiral method should still be planned methodically, with tasks and deliverables identified for each step in the spiral. Throughout the entire project we are going to use the spiral methodology for the design and development of the software/platform. The next part of this section will be the planning of tasks and deliverables as well as expected Milestone. Why do you think the spiral best suits your project? Not the other methodology give concrete examples. 3.2 Project Management 3.2.1 Budget Planning 3.2.1.1 Milestone The table below is just an estimation of how much time each task will take and gives us enough information to plan the project in a more realistic way. Generally tasks will be performed in parallel rather than in a linear way which has its advantages and disadvantage such as time saving and whereby some tasks must be completed prior to some other tasks. 3.2.1.2 Gantt Chart Please find below a Gantt chart representing the planned tasks over the budget allocated to us. 3.3 Project Approach The first part of the project will focus on the literature review where we are going to analyse tools, applications and process/features which are relevant to the project. The next part, we will be talking about why the features/applications/tools might be important for SMEs and their security from a technical and non-technical perspective. The third step will be to developed the features and integrate the tools/applications within the designed platform. The final step will be the testing and documenting of the results obtained and makes sure that the aims and objectives are satisfied. 4. Ethical and Legal Consideration – 1 page Before starting a project, it is crucial to properly understand the internal policies of the organisation you are developing something for and any local laws that might apply to the project. Some features of the project might invade the privacy of the users which in our case will be employees. It is a good practise to have policies about the possibility of company’s resources being monitored and might be investigated without prior notice or user permission but this might not be enough in a trial. One alternative would be to make sure the company where we are going to implement this project displays a well-defined warning banner. Without a banner, the right to investigate or monitor a system used by employees might conflict with user’s expectation of privacy. The EU and its member nations which include UK impose a strict fine for information that crosses national boundaries without the person’s consent. 4.1 Law in UK According to the UK Government’s website (https://www.gov.uk/data-protection-your-business/monitoring-staff-at-work), it is possible for employer to monitor employees at workplace if the below conditions are met: Be clear about the reasons for monitoring staff and the benefits that this will bring. Identify any negative effects the monitoring may have on staff. This is called an impact assessment. Consider whether there are any, less intrusive, alternatives to monitoring. Work out whether the monitoring is justified, taking into account all of the above. Monitoring employees’ activities on a computer system is cover by the data protection act. Data protection law doesnt prevent monitoring in the workplace. However, it does set down rules about the circumstances and the way in which monitoring should be carried out. Based on UK law, it is also for employers to monitor their employees without their consent for specific reasons. (Please refer to Appendix B for the reasons) 4.2 Ethics The question about whether it is ethical to monitor or investigate on employees can be debate on different point of view which can include the privacy of users, the need to protect client’s data, to provide reliable and trustful services to client by minimising the risks of external as well as internal threats such as insiders. But at the end of the day, the majority always win over the minority, what would be more ethical? Monitoring hundreds of employees or having more than one million client’s credit card details unprotected from insiders? 5. Impact 0.5 – 0.75 page 5.1 National Importance Services provided by SMEs such as data storage, client’s data management, POS information management, companies’ secret industrial process and many others will be more secure since the SMEs will improve on their security using a cost saving solution and providing several layers of security. Risks associated to insiders will be minimised. 5.2 Commercial Impact The platform could be sold at an affordable price or via a donation mechanism. The money can then be used for developing new features, improves existing features and provide upgrades. 5.3 Academic Impact This project can provide a platform for further research opportunity such as: Research can be done about why despite knowing that security is crucial still SMEs are not improving their security? Cost associated with security products? The assessment of the impacts on security in general if security products were cheaper and easily available for on SMEs. Does security improved if managed and monitored using a single platform rather than using several different security products (Efficiency and conflict arise when using several security products). References Cyber security awareness still in its infancy, says Sans Institute. 2015.Cyber security awareness still in its infancy, says Sans Institute. [ONLINE] Available at:http://www.computerweekly.com/news/2240234932/Cyber-security-awareness-still-in-its-infancy-says-SANS-Institute. [Accessed 18 May 2015]. Information Security Awareness Training | Cybersecurity Awareness | SANS. 2015.Information Security Awareness Training | Cybersecurity Awareness | SANS. [ONLINE] Available at:http://www.securingthehuman.org/. [Accessed 18 May 2015]. Study Finds Most European Breaches Caused by Organizational Error, Insider Attacks | The State of Security. 2015.Study Finds Most European Breaches Caused by Organizational Error, Insider Attacks | The State of Security. [ONLINE] Available at:http://www.tripwire.com/state-of-security/latest-security-news/study-finds-most-european-breaches-caused-by-organizational-error-insider-attacks/. [Accessed 18 May 2015]. Brunel University Research Archive: An evaluation of open source software adoption by UK SMEs in the IT industry. 2015.Brunel University Research Archive: An evaluation of open source software adoption by UK SMEs in the IT industry. [ONLINE] Available at:http://bura.brunel.ac.uk/handle/2438/4509. [Accessed 18 May 2015]. Brian Buffett, UNESCO Institute for Statistics (2014)Factors influencing open source software adoption in public sector national and international statistical organisations, [ONLINE] Available at: http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.50/2014/Topic_1_UNESCO.pdf [Accessed: 18 May 2015]. SME’s help Governments make huge IT savings. — PretaGov. 2015.SME’s help Governments make huge IT savings. — PretaGov. [ONLINE] Available at:https://www.pretagov.co.uk/news/sme2019s-help-governments-make-huge-it-savings. [Accessed 18 May 2015]. How SMEs can drive growth through new technologies. 2015.How SMEs can drive growth through new technologies. [ONLINE] Available at:http://yourbetterbusiness.co.uk/how-smes-can-drive-growth-through-new-technologies/. [Accessed 18 May 2015]. Unified Security Management (USM) Platform. 2015.Unified Security Management (USM) Platform. [ONLINE] Available at: https://www.alienvault.com/products. [Accessed 19 May 2015]. James R. Chapman 1997, Software Development Methodology, Project Management Training. [ONLINE] Available: http://www.hyperthot.com/pm_sdm.htm [Accessed 19 May 2015] NELSON, B., PHILLIPS, A. ET STEUART, C , 2010. Guide to Computer Forensics and Investigations. 4th Edition. Course Technology Data protection and your business GOV.UK. 2015.Data protection and your business GOV.UK. [ONLINE] Available at:https://www.gov.uk/data-protection-your-business/monitoring-staff-at-work. [Accessed 20 May 2015]. Monitoring at work Citizens Advice . 2015.Monitoring at work Citizens Advice. [ONLINE] Available at:https://www.citizensadvice.org.uk/work/rights-at-work/monitoring-at-work/. [Accessed 21 May 2015]. Appendix – A A1 Aims of the project Please find below the aims of the project: Provide a cost effective IT Security solution. Provide security in its different aspects all under one platform. Provide remote management capability. A2 Objectives of the project Please find below the objectives of the project: Secure communication between server and clients. Ability to monitor and detect suspected behaviour/activities. Ability to remotely manage clients from server (Platform). Ability to capture relevant information from clients to server for investigation. Ability to provide Confidentiality and integrity on clients. More detailed and technical objectives are to be derived at a later stage of the project, which will in-turn be translated into features that will be provided by the platform. Appendix – B B1 – Reasons for monitoring employees To establish facts which are relevant to the business, to check that procedures are being followed, or to check standards, for example, listening in to phone-calls to assess the quality of your work To prevent or detect crime. To check for unauthorised use of telecommunications systems, such as whether you are using the internet or email for personal use. To make sure electronic systems are operating effectively, for example, to prevent computer viruses entering the system. To check whether a communication you have received, such as an email or phone-call is relevant to the business. In this case, your employer can open up your emails or listen to voice-mails but is not allowed to record your calls. To check calls to confidential help lines. In this case, your employer can listen in, but is not allowed to record these calls in the interests of national security.

Thursday, November 14, 2019

The Delusional Governess in Henry James The Turn of the Screw Essays

The existence of the ghosts in The Turn of the Screw has always been in debate. Instead of directly discussing whether the ghosts are real or not, this essay will focus on the reliability of the governess, the narrator of the story. After making a close examination of her state of mind while she is at Bly, readers of The Turn of the Screw will have many more clues to ponder again and to decide to what extent the governess can be believed. While critics like Heilman argue that there are problems with the interpretation that the governess was psychopathic, textual evidence incorporated with scientific research show that the governess did go through a period of psychical disorder that caused her insomnia, out of which she created hallucinations. In the prologue, Douglas gave a detailed account of the master from the governess ¡Ã‚ ¦s point of view. She regarded him as  ¡Ã‚ §handsome and bold and pleasant, off-hand and gay and kind; he struck her ¡Ã‚ ¨ (James 4). Later on we learn from Douglas that the governess accepted the job at Bly for the master ¡Ã‚ ¦s sake, and of course the generous salary offered by the master. Without any experience, the governess ¡Ã‚ ¦s passions for the master supported her to accept the job and confirmed her decision to take the challenge even though she feared not having the ability to accomplish the job.  ¡Ã‚ §The moral of which was of course the seduction exercised by the splendid young man. She succumbed to it ¡Ã‚ ¨ (James 5). With the love for the master, the governess had the courage to visit the master again and eventually took the job.  ¡Ã‚ §He held her hand, thanking her for the sacrifice, she already felt rewarded ¡Ã‚ ¨ (James 6). Her obsession with the master was somehow repressed owing to the absence of the master and the condi... ...ose cannot be the proof of the reliability of the governess. The issue whether the governess was insane or not may never be solved. Not only because critics seem to be able to find as much evidence as possible to prove their arguments but also, the reliability of the account of the governess colors the whole story with great ambiguity. We are not certain of the state of mind of the governess when she wrote down the story and when she related the story to Douglas. However, as we closely examine the state of mind of the governess, her reliability does appear to be in question. Beidler provided two readings of The Turn of the Screw and in the second one he declared:  ¡Ã‚ §the governess saw only what she wanted to see ¡Ã‚ ¨ (Beidler 9). She was so exhausted from her prolonged insomnia that she envisioned a story with ghosts for herself to fulfill her growth as a governess. The Delusional Governess in Henry James' The Turn of the Screw Essays The existence of the ghosts in The Turn of the Screw has always been in debate. Instead of directly discussing whether the ghosts are real or not, this essay will focus on the reliability of the governess, the narrator of the story. After making a close examination of her state of mind while she is at Bly, readers of The Turn of the Screw will have many more clues to ponder again and to decide to what extent the governess can be believed. While critics like Heilman argue that there are problems with the interpretation that the governess was psychopathic, textual evidence incorporated with scientific research show that the governess did go through a period of psychical disorder that caused her insomnia, out of which she created hallucinations. In the prologue, Douglas gave a detailed account of the master from the governess ¡Ã‚ ¦s point of view. She regarded him as  ¡Ã‚ §handsome and bold and pleasant, off-hand and gay and kind; he struck her ¡Ã‚ ¨ (James 4). Later on we learn from Douglas that the governess accepted the job at Bly for the master ¡Ã‚ ¦s sake, and of course the generous salary offered by the master. Without any experience, the governess ¡Ã‚ ¦s passions for the master supported her to accept the job and confirmed her decision to take the challenge even though she feared not having the ability to accomplish the job.  ¡Ã‚ §The moral of which was of course the seduction exercised by the splendid young man. She succumbed to it ¡Ã‚ ¨ (James 5). With the love for the master, the governess had the courage to visit the master again and eventually took the job.  ¡Ã‚ §He held her hand, thanking her for the sacrifice, she already felt rewarded ¡Ã‚ ¨ (James 6). Her obsession with the master was somehow repressed owing to the absence of the master and the condi... ...ose cannot be the proof of the reliability of the governess. The issue whether the governess was insane or not may never be solved. Not only because critics seem to be able to find as much evidence as possible to prove their arguments but also, the reliability of the account of the governess colors the whole story with great ambiguity. We are not certain of the state of mind of the governess when she wrote down the story and when she related the story to Douglas. However, as we closely examine the state of mind of the governess, her reliability does appear to be in question. Beidler provided two readings of The Turn of the Screw and in the second one he declared:  ¡Ã‚ §the governess saw only what she wanted to see ¡Ã‚ ¨ (Beidler 9). She was so exhausted from her prolonged insomnia that she envisioned a story with ghosts for herself to fulfill her growth as a governess.

Monday, November 11, 2019

Common Intention Essay

Section 149 deals with the 5 or more people as that would account for unlawful assembly here section 34 is not applicable. Section 34 talks about common intention whereas section 149 talks about common object such as the common object have a wider scope. Common intention is if two or more person commits any crime with the same intention and under a prearranged plan, but in common object  it is not necessary that there should be a prior concert in the sense of a meeting of the members of the unlawful assembly, the common object may form on spur of the moment; it is enough if it is adopted by all the members and is shared by all of them. In section 34 Participation of the people in crime is an important aspect, even standing people who indirectly help in commissioning of crime are also prosecuted. But in Section 149 mere membership of the group of an unlawful assembly is sufficient enough for prosecution. Section 34 is substantive evidence and other sections like 302 murder has to be clubbed with it. Section 149 is a constructive crime in itself. Section 34: Acts Done by Several Persons in Furtherance of Common Intention-  According to Section 34, when a criminal act is done by several persons in furtherance of common intention of all, each of such persons is liable for that act in the same manner as if it were done by him alone. Object of Section 34:-  Section 34 lays down only a rule of evidence and does not create a substantive offence. This section is intended to meet cases in which it may be difficult to distinguish between the acts of the individual embers of a party or to prove exactly what part was taken by each of them in furtherance of the common intention of all. This section really means that if two or more persons intentionally do a thing jointly, it is just the same as if each of them has done it individually. The reason why all are deemed guilty in such cases is that the presence of accomplices gives encouragement, support and protection to the person actually committing an act. Elements of Section 34:  T o attract the application of Section 34, the following conditions must be satisfied:- 1. Some Criminal Act: –  Ã¢â‚¬ËœCriminal act’ used in section 34 does not refer to individual acts where a crime is committed by a group of persons. Where a crime is committed by several persons in furtherance of common intention of all of them, each of them doing some act, similar or diverse, big or small shall be liable for that act. ‘That act’ refers to the ‘criminal act’ used in section 34 which means the unity of criminal behaviour which results in something for which an individual would be punishable if it were all done by himself alone in an offence. . Criminal Act Done By Several Persons: –  The criminal act in question must have been done by several persons i. e. by more than one person. The number of wrong doers should be at least two. Most importantly, if the criminal act was fresh and independent act springing wholly from the mind of the doer, the others are not liable merely because when it was done they were intending to b e partakers with the doer in a different criminal act. 3.

Saturday, November 9, 2019

Business Decision Making

The methodology for this report will focus upon both primary and secondary research methods which will be used to obtain the opinions of the asked passer. Needled et-al (2003) states that primary research mainly consists of data collected by an organization, or individual, for their own purposes and are generally collated first hand from ‘the horses mouth'. Needled (2003) offers the opinion that the main methods of collating primary research are through conducting face to face Interviews, telephone interview, questionnaires and through direct observations.Primary data can be either qualitative or quantitative. Qualitative research data tend to be more explanatory whereas quantitative is generally more descriptive. The main part of the research for this project will consist of one primary method, survey. The survey questioned passers within Princess to determine what they think about the Princess. This method has been chosen as it is easy method to collate considerable data and it is a relatively cheap method of collating the data.To ensure response rates were high, the passers were asked face to face. I have chosen to opt against a paper based System as Needled et-al (2003) offers the argument that response rates to costal systems are often as low as 30% and I feel this method may introduce bias to the overall conclusion. There the alternative option of personally distributing and collecting the surveys for which Sweeten (2002) claims can increase the response rate to almost 70%.However given the short timescales for the project I only intend to sample the views of 20 people. Questionnaires are quite popular when collecting data, but are difficult to design and often need many drafts before having a final questionnaire. These drafts are called pilot questionnaires. Again because of the given short time call I was only able design one pilot. It emerged that the questionnaire was too long. The final questionnaire was then amended by the KISS theory'- keep i t short and simple.Random sampling was used as non random sampling is impracticable and often very costly in terms of time. After collecting the primary data, the data was then exported into Microsoft Excel to provide a more professional presentation for this document in providing professional graphs and findings. Secondary research All methods of data collection supply quantitative data (numbers, statistics) or qualitative data (usually words or text).Secondary data is data that has already been collected by someone else for a different purpose as the investigator. Main methods that is used to for the collection Of secondary data: Data supplied by a marketing organization Annual company reports Government statistics / surveys Academic surveys Company data (payroll details, minutes of meetings, accounts of sales of goods or services) Whilst theory is a crucial factor in academic learning and organizational success leading academics offer different views on it effectiveness.Saunders et-al (2003) explains that secondary research, especially academic journals, re the most important source for any research because they are evaluated by academic peers prior to publication therefore generally of good quality. Gharry (1995) offers the opinion that secondary research is has there are major advantages of secondary research mainly through savings in time, money and resources as academic literature from various sources is widely available and easily obtainable.However Needled et-al (2003) warns that the information may not always be of good quality, may not represent the whole picture and the research could be out of date. These opinions were considered whilst conducting the literature review. After having contacted the Princess press department the result was that due to the fact that the Princess is a new development, secondary data was not available. Rest Its The layout of the questionnaire was divided in three parts – introductory questions, main questions and final questions.Topic: What do you think of the Princess development? Number of questioned people: 20 Introductory questions The introductory questions are of assistance to find out general information about the questioned person. 1. Gender 2. Age group 3. Employment status 4. Marital status Main questions Main questions are in place in order to gather information about the topic of the question naira. 5. Purpose of the visit 6. Preferred time to visit 7. Does it meet expectations? 8. What were the expectations? 9. Affect on Setter's other high street retailers and restaurants 10.Overall affect of the Princess Shopping Centre to Exeter Final questions The final questions help to calm down and relax from the main part. It can also seen as fun part. 11. Favorite new shop 12. Favorite new restaurant/cafe The Upper Crust Memo To: Quality Control Manager From: Tugboat Vic Sicken c: Date: January 31, 2015 Re: Result of samples 65 loaves of bread with a weight range of 780-830 g Average w eight (mean) of loaves 804. 74 g The middle loaf (median) weighs 804. 9 g The most common (mode) loaf weight is 804. 9 g The Standard deviation of each loaf is 9. G The weight of the lower quartile is (IQ) is 798. 48 g Q = Median = 804. 9 g The weight of the upper quartile is (Q) is 811. 1 g The intrauterine range is 12. 62 g Box + Whisker plot Due to wastage we lost 805 loaves Task 5 Correlation The correlation is one of the most common and most useful statistics. A correlation is a single number that describes the degree of relationship between two variables. If points in scatter diagram cluster close to the line then there is a strong correlation in place and if points are more widely scattered the correlation is weak.Positive correlation If an increase in one variable tends to be associated with an increase in the other then this is known as a positive correlation. An example would be height and weight. Taller people tend to be heavier. Negative correlation If an increase in one variable tends to be associated with a decrease in the other then this is known as a negative correlation. An example would be height above sea level and temperature. As you climb the mountain (increase n height) it gets colder (decrease in temperature).No correlation A zero correlation occurs when there is no relationship between variables. The picture below shows a guide to the strength of correlation Strengths of correlations 1 . Correlation enables the researcher to examine naturally occurring variables that perhaps unethical or impractical to test experimentally. For instance, it would be unethical to carry out an experiment on whether smoking causes lung cancer. 2. Correlation enables the researcher to clearly and easily see if there is a relationship between variables. This Can then be displayed in a replica form.Limitations of correlations 1 . Correlation is not and cannot be taken to imply causation. Even if there is a very strong relationship between two variables we cann ot assume that one causes the other. For example suppose we found a positive correlation between watching violence on T. V. And violent behavior in teenage years. It could be that the cause of both these is a third (irrelevant) variable – say for example, growing up in a violent home – and that both the watching of T. V. And the violent behavior are the outcome of this. . Correlation does not allow us to go beyond the data that is given. For example suppose it was found that there was a relationship between time spent on homework (112 hour to 3 hours) and number of G. C. S. E. Passes (1 to 6). It would not be correct to conclude from this that spending 6 hours on homework would be likely to generate 12 G. C. S. E. Passes 5 A + B. Rest It: The older the car gets (increase) the less is it worth (decrease). The scatter diagram above shows that the correlation is stronger after the first two years.There is no straight line relationship. The points on the graph with couple of exceptions form a curve which suggests it is not a linear relationship. The explanation of partial in the correlation result means that it is not 100% correlated because of other factors that influenced it. Coefficient of determination: 65. 61 % of the behavior of y is determined by x + 34. 39 % by other factors. The aim of regression analysis is to find out the values of parameters for a function that cause the function to best fit a set of data observations that it's provided.In linear regression, the function is a linear (straight-line) equation. The equation and the table above show that the value of the car decreases by a constant amount each year after its purchase. The following linear function loud predict its value Value = price + departed*age Value, the dependent variable, is the value of the car, age is the age of the car. The regression analysis will determine the best values of the two parameters, price, the estimated value when age is O (I. E. , when the car was new ), departed, the depreciation that takes place each year.The value of departed will be negative because the car loses value as age increases. However as we can see in the table after 12 years the equation gives a negative value. This would be not possible in reality. A car cannot be worth E-340. 06. The problem with the equitation is that it is not realistic. The equation is only correct in terms Of figures. E. The equation does not include the factors that can influence the price of a used car. It only considers the age of the car. However there can be several other factors that can influence the price of a used car.Mileage Color- In other words, some colors, like â€Å"ROI Yellow Pearl†, appeal only to a small segment of the population and brings down the car's worth in many eyes Fuel type Engine size Transmission Number of doors Private or trade seller – Trade seller are always more expensive as trader adds profit on the actual value of the car. Previous owner †“ For example if a elderly person was the previous owner it is very likely that the car was only used for short distances (shopping, doctor consultations) On the other hand if the car was used at a driving school then it is very likely that the car was not treated well from the learners. F. Business decision makers need to find out very often the casual relationship between two variables. For instance, the relationship between interest rates and consumer expenditure. Furthermore a financial analyst may use regression and correlation to help understand the relationship of a financial ratio to a set of other variables in business. Correlations can be helpful in business. Once a correlation is identified, organizations can determine if the correlation indicates causation. With this information, the company can develop methods to influence the correlation to the organization's benefit.Task AAA. Total float The longest the start of an activity can be delayed from its earliest start tim e (EST) without delaying the project. Free float The longest an activity can be delayed from its EST without delaying the EST of any immediately following activities. By looking at the table, those tasks without a total float' (I . E. Zero) are considered ‘critical' and coincidentally are mound on the critical path. It is therefore important that these tasks are not delayed in order to complete the project on time as planned.Recognizing and integrating float is very important. For example, those tasks that do carry float may have resources (labor, capital, equipment, etc) that could be used elsewhere to complete other tasks quicker. Also, for those tasks that do carry float, any delays can be accepted. As the resource diagram below shows, 6 assistants are required for the job. Furthermore the whole procedure will take 25 days. After rescheduling the activities only 4 assistants are required. Apart from this the whole procedure will take 21 days. 70.Critical Path Analysis (CPA) is a planning and project management tool. It can help make sure a project is completed as quickly as possible, and resources used as efficiently as possible. The business is able to give the customer exact information such as finish date, required assistants. Furthermore, most projects come across with delays or something unexpected, so managers need to use tool such as CPA to monitor the project and take quick action to resolve any problems. This enables the business to avoid any delays and the consequential customer complaints. Business Decision Making Leadership in today's organizations is a tough business. Organizational leaders face a number of significant challenges as their jobs, and the world around them, become increasingly complex (Zaccaro & Klimoski, 2001). Trends such as organizational â€Å"delayering, † rapid technological advances, the proliferation of teambased organizations, and increased employee empowerment require that leaders adapt their techniques and styles of leadership to meet these new challenges.In the face of all these changes, researchers and management education specialists are working to find methods to develop more effective leaders. Old techniques of development are criticized and questioned, and new techniques are created—often before they are adequately tested and thoroughly understood. New techniques can become instant â€Å"fads. † In recent years, there has been an explosion of interest in leadership.The bulk of research efforts has gone into trying to understand leadershipâ €”how it operates— and into identifying the characteristics of effective leaders. Although interpersonal relationships have always held importance within the organizational literature (Blau, 1964), a focus on relational perspectives is recently experiencing renewed interest in organizational behavior and leadership research (Day, 2000). According to Hunt and Dodge (2001), relational perspectives are at the forefront of emerging leadership thrusts.A relational focus is one that â€Å"moves beyond unidirectional or even reciprocal leader–follower relationships to one that recognizes leadership wherever it occurs, is not restricted to a single or even small set of formal or informal leaders, and in its strongest form, functions as a dynamic system embedding leadership, environmental, and organizational aspects† (Hunt & Dodge, 2001, p. 448). An area of research that speaks directly to leadership development, as defined by Day (2000), is Leader–Member Exch ange (LMX) theory.Researchers working with this leadership model have been investigating the value of developing effective work relationships between managers and subordinates for the past 30. During this time, LMX has shown the value of high-quality relationships and the problems associated with lower quality relationships. The purpose of this work is to discuss LMX theory, research, and practice on leadership development. The paper begins by briefly reviewing the value of relationships from a social capital perspective and then defines leadership relative to relationships.Leadership is engaging in behaviors that create change, and creating change requires influence. To be leaders, therefore, individuals need to have and effectively use influence. Influence is the power to affect others: the ability to produce outcomes due to some personal characteristic that gets others to follow. By definition, influence is inherently interpersonal. Influence takes place within the context of int erpersonal relationships. According to relational leadership theories, influence comes from relationships.Relational perspectives in leadership view leadership as generated through mutual influence that results from the development of trust, respect, and obligation among dyad members. LMX theory describes this influence as being created through stages of relationship building. Individuals begin at a â€Å"stranger† stage, get to know one another through testing processes, and as a result of the testing process, either progress to an advanced stage of leadership development (e. g., partnership) or remain at lower levels of relationship development (e. g. , acquaintance or stranger). Those who attain more advanced stages of relationship building—and thus develop more effective relationships with interdependent others (e. g. , managers and other higher-ups, subordinates, peers, clients, external constituents)—are able to more effectively perform their roles. More e ffective, or high-quality, leader– member exchanges are described as leadership rather than as supervisory relationships.High-quality relationships are considered mature partnerships based on respect, trust, and mutual obligation for one another (Graen& Uhl-Bien, 1995). These relationships go beyond the formal contract and generate personal power (i. e. , influence given by the other), rather than position power or authority. They are also characterized by willing followership, meaning employees are driven by intrinsic as opposed to extrinsic motivation. As a result, dyad partners (i. e., individuals engaged in an exchange) act because they want to, not because they have to. Research on LMX shows that more effectively developed relationships have significant and positive associations with performance, organizational commitment, employee citizenship behavior (i. e. , extra-role behavior), job satisfaction, delegation and participation in decision making, and enhanced career de velopment opportunities. These relationships are negatively related to turnover, job problems, and role conflict and ambiguity.The benefits of high-quality relationships come from relational resources they create. Such resources include durable obligations (e. g. , arising from feelings of gratitude, respect, and friendship), network contacts and connections (including privileged access to information and opportunities, social status, and reputation of influential others), and the ability to have open information exchanges with those around them (Nahapiet & Ghoshal, 1998). Relationships that do not develop so well are considered lower quality.These relationships are not as beneficial for the individuals involved or for the organization as a whole. Lower quality relationships are described as contractually defined, formal exchanges based on limited trust and in-role interactions (Uhl-Bien et al. , 2000). These types of relationships generate management rather than leadership. They ar e characterized by lack of mutual respect, formal downward communications, little mutual understanding, limited support and commitment for one another, and no mutual obligation (i. e. , a â€Å"stranger† relationship).Findings have shown that lower quality relationships are negatively related to satisfaction, organizational citizenship behaviors, and commitment, and are positively related to turnover. Thus, based on relational leadership theory, effective relationships may generate mutual influence and understanding that allow leaders to more effectively perform their roles. In contrast to hierarchical and leader-dominated perspectives on relational differentiation, the goal and responsibility of leadership should be to work to develop effective relationships more broadly with interdependent others, rather than with only a group of â€Å"trusted assistants†.Drawing from the foundations established by Day (2000), leadership development needs to be considered (a) beyond hierarchical notions of manager–subordinate relationships, (b) as the responsibility of both members of the dyad (rather than leader-controlled), and (c) with allowance for more variability in what is considered a high-quality, or effective, relationship.A high-quality exchange is characterized by positive leadership processes that are indicative of a social exchange, such as increased subordinate job latitude and influence in decision making, more open and honest subordinate communication with the supervisor, and greater trust and loyalty among dyad members (Cogliser & Schriesheim, 2000). Low-quality LMX relationships are more economic or transactional in nature, and dyadic behaviors rarely progress beyond what is specified in the employment contract.With regard to leadership development, those subordinates interested in leadership development receive it as part of the relationship contract. Those that are not interested in becoming leaders do not receive leadership developm ent as part of their psychological contract and receive a different allocation of on-the-job training. Effective organizations have units that are tied together, through â€Å"linking-pin† positions, where members in these organizations become more aware of problems at lower levels in the system and coordinate activities efficiently through accurate flows of information, influence, and resources among the units involved.The persons occupying these linking-pin positions are integrated members in two or more groups and play the role of both supervisor and subordinate. Graen and his colleagues explored the effectiveness of the LMX relationship between incumbents of linking-pin positions and their supervisors and the behavior, attitudes, and treatment of lower level members (Graen, Cashman, Ginsburgh, & Schiemann, 1977). They found that the quality of LMX of the linking-pin incumbent was related to the quality of working life of the followers who reported to the linking pin.When subordinates develop high-quality exchanges with their bosses, they receive greater influence, latitude, support, and attention from their bosses, and they experience a more desirable situation overall. These researchers continued by pointing out that the quality of members in a higher dyad (hierarchically) contributed to the quality of life of members in hierarchically lower dyads. The LMX model clearly has utility for its application to leadership development.Empirical studies have supported the relationship of high-quality exchanges with positive organizational outcomes, and the broader leadership literature supports the cascading or waterfall effect of the supervisor's leadership behavior impacting the subordinates. There is a clear need for methods that more effectively socialize junior managers for executive positions. Dyad-level coaching may be one of the most effective means for transmitting organizational culture, thereby promoting the organization's core values.Dyad manage ment development has not been utilized to the full extent possible to leverage the potential of the pool of executive talent. The LMX literature says that LMX differentiation, in which leaders have higher quality relationships with some subordinates and lower quality relationships with others, occurs because leaders do not have time (or the need) to generate highquality relationships with everyone. Therefore, they develop a group of trusted assistants to help them perform the work of the unit.These trusted assistants would supposedly be the best or most reliable employees in the unit. Twenty years after the inception of the theory, Graen and Uhl-Bien (1995) argued that the creation of â€Å"in-groups† and â€Å"out-groups† within work units is not beneficial, and that instead leaders should strive to develop high-quality relationships with all subordinates. They do this by â€Å"making the offer† of high-quality relationships to all and then through testing proc esses, different quality relationships result (Uhl-Bien et al., 2000). This perspective allows for the fact that all relationships may not (and likely will not) reach high quality, but at least the dyad members both take part in how the relationship develops (rather than the leader determining who will be the trusted assistants) and have the opportunity to create a high-quality relationship. This perspective also recognizes that a focus on differentiation rather than on high-quality relationships offered to all creates tremendous opportunity for lost potential in organizations.When individuals are not fully committed (or are dissatisfied), they will withdraw discretionary behaviors that benefit others or the organization (e. g. , helping, altruism, civic behaviors). These discretionary behaviors are beneficial to the organization, and as a result, much attention has been given in the literature to determining when and how individuals engage in these behaviors. Instead of LMX differe ntiation, therefore, goal should be for individuals to strive to have influence with one another (and with higher-ups).With the support of a relationship, individuals are freer to open up and provide one another with more accurate and complete information (Avolio, 1999) so they can provide the â€Å"real† information (the â€Å"real† story). This goes both ways: with a good relationship comes reduced filtering (holding back) of information, both up and down the hierarchy. It allows individuals to share with one another the hard truth. Too many leaders do not have good information, and too many hold back in being truthful with their subordinates.If to extend this beyond managers to leaders more broadly, then organizational members need to be comfortable with providing information to one another, and this comes with having effective work relationships. Remembering that effective leaders are defined as those who use influence to create change, individuals' abilities to be effective leaders are directly related to their ability to have influence in the organization. Since effective work relationships can extend individuals' influence networks, those who have more effective relationships with others will likely have more opportunity to gain and use influence.Therefore, leadership effectiveness is likely enhanced by the ability to build effective work relationships with a broader range of interdependent others. In a study of communications within Leader-Member Exchanges, Schiemann ( 1977) found that those members with relatively higher quality LMXs communicated more frequently with their managers about administrative and technical matters than did members with relatively lower quality LMXs. These results were cross-validated on a holdout sample of managers.Apparently, there is much more communication in higher quality LMXs than in the lower quality LMXs. Thus, effective communications are an important aspect of the development of high-quality LMXs. Fla uto’s (1999) study is in response to the global question, â€Å"How are communication and leadership linked? † This study drew subjects from a variety of organizations in Ohio, eastern Indiana, northern Kentucky, and western West Virginia. Twenty to fifty subjects were drawn from each of nine organizations.Organizations participating in the study were two financial service organizations, a retail sales organization, a military unit, a subsurface coal mining organization, a suburban police department, a rural bank branch, a local post office, and a food service organization. Transactional and transformational leadership were measured using subscales of the Multifactor Leadership Questionnaire (MLQ). A six-item, three-factor subscale was created for the transformational leadership dimension and a four-item, two-factor subscale was created for the transactional leadership dimension.Subjects responded to each of the behavioral anchored items by selecting one of five respon ses that applied to their leader. The leader-member exchange dimension was measured by a subscale consisting of the six items of the LMX-6 scale. The LMX-6 scale contains items that measure the three factors of leader-member exchange. Responses are on a five-point Likert-type scale. The relationship is the highest among all of the variables in the study. This finding supports the conclusions of Day (2000) that communication attributes can distinguish between levels of leader-member exchange quality.The finding also fits into the theoretical framework of the leader-member approach to leadership that requires successful communication exchange in order to form the â€Å"in-group† relationship that characterizes high quality leader-member exchange. The communicative competence of the leader, and its affect on communication effectiveness as evidenced by member perception of leader-member agreement, appears to be a necessary precondition for a high quality leader-member exchange re lationship. At the lower levels of communication competence, high quality leader-member relationships do not exist.The leader displays charisma by communicating enthusiasm and providing a model, shows individual consideration by direct interaction and providing tailored assistance, and stimulates intellect by communicating ideas. Day (2000) defines transformational leaders as leaders who use rhetorical skills to establish a common vision. Not surprisingly, members report a high relationship between transformational leadership and communication competence. In the least squares hierarchical multiple regression analyses, transformational leadership is the best single predictor of communication competence.Transformational leadership is of high quality when the leader exhibits high communication competency. Dyads with high communication competence and low transformational leadership and dyads with low communication competence and high transformational leadership do not exist. Leadership, however it is theoretically or operationally defined, is a social process and involves a relationship between individuals. This social process and this relationship are enacted through communication. These sessions were conducted with all participants in the treatment group.Before and after results, in terms of performance, were compared for this group and for other groups from the department, which were not exposed to the LMX treatment. Productivity increases measured in terms of the quantity of cases handled showed a significant advantage in favor of the group that was trained in LMX. Furthermore, this gain was primarily a function of effects that occurred in a high–growth need group of subjects. This latter index was included in the study because a job enrichment treatment based on job characteristics theory was introduced, along with the LMX treatment.Any job enrichment effects per se, however, were negated by certain policy changes that were introduced by the organizati on unknown to the experimenters; thus job characteristics theory was not, in fact, tested. A subsequent publication, based on data from the same context, was aimed at determining whether low or high initial LMX subjects were most responsive to the treatment effects. The results clearly indicated that the low LMX subjects responded most positively to the treatment in terms of both the quality of their leader–member exchanges and the quantity of their productivity.Another report on this project substantiates the moderator effects of growth need strength, but makes no mention of the finding that low– quality leader–member exchange translates into greater productivity with the appropriate training. This latter result is most consistent with theory in that it means that dyadic partnership building applied across the board should result in both low– and high–quality dyads initially moving with training to high–quality relationships. However, if gr owth need strength is a moderator of the training effect, one would anticipate that it would also moderate the initial dyadic choices as well.In such an event low–quality dyads would not contain many high– managed strength people and thus would offer little potential for upward movement. This seeming contradiction is neither explained nor even confronted. Growth need strength is not a component of the theory as stated in comprehensive forms. Research on LMXs illustrates the importance of leader-follower relationships. The point here is simply that 30 years of research on LMXs has conclusively demonstrated the effect of exchange quality on a number of important organizational outcomes.Specifically, in a meta-analysis of this area of leadership research, Gerstner and Day (1997) found that the quality of the LMX was significantly related to job performance, satisfaction with supervision, overall satisfaction, commitment, role conflict (negative relation), role clarity, me mber competence, and turnover intentions (negative relation). After reviewing the extensive LMX literature, Gerstner and Day's conclusion was â€Å"we view the relationship with one's supervisor as a lense through which the entire work experience is viewed† (p. 840).However, although LMX offers evidence to support the value of relational approaches to leadership, many questions still remain about key issues related to leadership development. In particular, a question that needs to be addressed in LMX research is: what leads to development of higher and lower quality work relationships (e. g. , antecedents to LMX)? Although past research has investigated antecedents to LMX, a clear picture of what these are and how they operate still has not emerged. References Avolio, B. J. (1999). Full leadership development: Building the vital forces in organizations.Thousand Oaks, CA: Sage. Blau, P. (1964). Exchange and power in social life. New York: Wiley. Cogliser, C. C. , & Schriesheim , C. A. (2000). ‘Explori ngworkun itcontex tand leader-membe rexchange: A multi-level perspective. ’ Journal of Organizational Behavior, 21 (5). Day, D. V. (2000). ‘Leadership development: A review in context. ’ Leadership Quarterly, 11. Flauto, Frank J. (1999). ‘Walking the Talk: The Relationship between Leadership and Communication Competence’. Journal of Leadership Studies. Graen, G. B. , & Uhl-Bien, M. (1995).‘Relationship–based approach to leadership: Development of leader-member exchange (LMX) theory of leadership over 25 years: Applying a multi-level multidomain perspective. ’ The Leadership Quarterly, 6. Hunt, J. G. , & Dodge, G. E. (2001). ‘Leadership d? eja vu all over again. ’ Leadership Quarterly, 11 (4). Nahapiet, J. , & Ghoshal, S. (1998). ‘Social capital, intellectual capital, and the organizational advantage. ’ Academy of Management Review, 23 (2). Zaccaro, S. J. , & Klimoski, R. J. (2001). The nature of organizational leadership: Understanding the performance imperatives confronting today's leaders. San Francisco: Jossey-Bass.