Wednesday, December 25, 2019

Essay about Case Analysis Sub-Continental...

Case Analysis: Sub-Continental Telecommunications Solution Problem Identification World Wide Telecommunications (WWT) attempted a joint venture with an Indian firm, a Subcontinental Software Solutions (SSS). This joint venture (JV) caused several symptoms; equipment difficulties, a sexual harassment, revised budget, and an intellectual property stealing. The problem was the failure of risk management and it resulted in the delays in finishing the software. The initial symptom of the delays in finishing software was equipment difficulties. First of all, the JV had no relationships with international banks. It caused to delay to order the equipment. The problem was a failure of risk management that unprepared unprecedented levels of†¦show more content†¦WWT can save budget and time to set up the distribution channel. Also, the main customer, The International Corporate Communication (ICC), has positive reaction toward the software developed. Internally, the research is well studied such as regulatory, cultural differences, and market demand. However, from business perspectives, a JV failed in an operational risk management. The failure of an operational risk management is classified as weakness. Externally, the authority of decision-making was unbalanced. For example, Dev made a decision alone with purchasing equipment and it drove others symptoms. The board composition did not take responsibilities. Also, a JV required a better understanding of the Indian market. For instance, WWT sent a female employee herself, and it caused the conflict called a sexual harassment. Sending a female employee alone to India should be reconsidered. Or at least the employee should be trained in that possible situation. She was neither trained nor prepared. Internally, the failure of recruitment occurred a lawsuit regarding a sexual harassment claim. WWT was neither culturally, nor technically prepared to training department of the Indian market. It should have been set up prior to doing a JV. Additionally, the failure of an operational risk management was shown by equipment difficulties. The lack of supply chain systems also caused of delaying in finishing software. A hazard risk was classified asShow MoreRelatedImport And Local Production Of Cement Importation9782 Words   |  40 Pagesits high population and the level of the country development is a large market of which the demand for cement has huge growth potential, suggesting that the Nigeria absorptive capacity is high with the right economic environment. This had been the case in the last few years as high demand in cement consumerization which constitutes and enhanced the rapid domestic growth of Alpha. The profitable and large home market, the strong domestic economy as well as rapid urbanisation also contributed to Alpha’sRead MoreEconomic Analysis of the Hotel Industry2929 Words   |  12 PagesEconomic Analysis of the United States Hotel Industry Background Information Our team chose the hotel industry in the United States for our economic analysis. The hotel business has existed since the earliest times, and has influenced the development of the economy since the founding of this country. According to the American Hotel and Lodging Association, in the year 1900, there were fewer than 10,000 hotels in the US which provided 750,000 to 850,000 rooms. The 2004 figures show thatRead MoreManaging Information Technology (7th Edition)239873 Words   |  960 Pages CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Read MoreElectric Power Transmission7736 Words   |  31 Pagesequipment can shut down which, in the worst cases, can lead to a major regional blackout, such as occurred in the US Northeast blackouts of 1965, 1977, 1996, 2003, and the Great Blackout of 2011. To reduce the risk of such failures, electric transmission networks are interconnected into regional, national or continental wide networks thereby providing multiple redundant alternate routes for power to flow should (weather or equipment) failures occur. Much analysis is done by transmission companies to determineRead MoreIct and Ebusiness Retail Industry88499 Words   |  354 PagesICT for conducting business, and, above all, assesses implications thereof for firms and for the industry as a whole. The elaborations are based on an international survey of enterprises on their ICT use, econometric analyses, expert interviews and case studies. Disclaimer Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of the following information. The views expressed in this report are those of the authors and doRead MoreThe Role of Ict in Banking Operations13419 Words   |  54 Pagesthat it adds economic value to a firm (Mata, et al, 1995). It is a term that generally covers the harnessing of electronic technology for meeting the information needs of a business at all levels. It utilizes computer based system as well as telecommunication technologies for storage, processing and communication (Adetayo, et al, 2004). Iromantu (2004), states that Information Technology refers to a host of system, equipment and materials essentially computer based which are used to achieve the setRead MoreInternational Management67196 Words   |  269 PagesHodgetts, Fred Luthans, Jonathan Doh. 6th ed. 2006. Includes bibliographical references and index. ISBN-13: 978-0-07-811257-7 ISBN-10: 0-07-811257-5 1. International business enterprises—Management. 2. International business enterprises—Management—Case studies. I. Doh, Jonathan P. II. Hodgetts, Richard M. International management. III. Title. HD62.4.H63 2012 658 .049—dc22 2011002070 www.mhhe.com Dedicated in Memory of Richard M. Hodgetts A Pioneer in International Management Education Read MoreCase Studies67624 Words   |  271 PagesCase Studies C-1 INTRODUCTION Preparing an effective case analysis C-3 CASE 1 CASE 2 CASE 3 CASE 4 CASE 5 CASE 6 CASE 7 ABB in China, 1998 C-16 Ansett Airlines and Air New Zealand: A flight to oblivion? C-31 BP–Mobil and the restructuring of the oil refining industry C-44 Compaq in crisis C-67 Gillette and the men’s wet-shaving market C-76 Incat Tasmania’s race for international success: Blue Riband strategies C-95 Kiwi Travel International Airlines Ltd C-105 CASE 8 Beefing up the beeflessRead MorePerformance Management Effectiveness: Lessons from Worldleading Firms9948 Words   |  40 PagesARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and-conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracyRead MoreMerger and Acquisition: Current Issues115629 Words   |  463 PagesIntroduction 3.2 Factors influencing the form of consideration in acquisitions 3.3 A price too far? The acquisition of Howard Smith Ltd by Wesfarmers Ltd 3.4 Financial analysis 27 27 31 33 35 vii viii CONTENTS 3.5 3.6 Assessment of the transaction Conclusion 38 40 4 An Essay on the History of a Merger: The Case of the National Bank of Canada Raymond Thà ©oret and Franà §ois-Éric Racicot 4.1 4.2 4.3 4.4 4.5 Introduction The structures of the two merged banks The new merged bank

Tuesday, December 17, 2019

Cyber-Bullying and Teen Suicide - 2391 Words

Since Teen Suicide is the second leading cause of teenage death in the United States, there is a need for legislation that promotes awareness and education about Cyber-Bullying. by R. Hassan February 8, 2011 Fourth Period Mr. Cicala Robinson Secondary School Since Teen suicide is the second leading cause of teenage death in the United States, there is a need for legislation that promotes awareness and education about Cyber-Bullying. Due to the growth of technology in the American society, the younger generations of adolescents are adapting to the excessive use of computers, cell phones, and social-networking sites. According to a study done by Amanda Lenhart, 87% of adolescents who are†¦show more content†¦The most common is â€Å"Mean Girls† cyber bullying which has been seen in the case of Tina Meir who committed suicide at age 13 (Billitteri 385). â€Å"Mean Girls† refers to the type of cyber bullying in which is usually performed by a group of young girls looking to have fun in the act. The group girls most often want others to know who they are and what they are doing in order to feel powerful. Research has shown that females are almost twice as likely to be involved in cyber bullying either being a victim o r perpetrator. The second category would be â€Å"Inadvertent† cyber bullying which consists of role-playing. The perpetrator may not realize they are cyber bullying, yet they interpret their offensive and cruel remarks through a joking manner. The next category is somewhat similar in the sense that the bully may not realize that they are virtually cyber bullying. â€Å"Vengeful Angel† refers to an individual who is defending themselves or others from an attack, which ultimately leads them to becoming a cyber bullying as well. The last category can be similar to the â€Å"school-yard† bully, which is the â€Å"Power-Hungry† bully. This category refers to those who may be victims of bullying themselves. A â€Å"Power-Hungry† bully wants to feel powerful and control others through their cyber bullying. Overall experts say that it is most common for the perpetrators to be classified as â€Å"popular† student with self-esteem who are trying to b ring others down by placingShow MoreRelatedCyber Bullying : A Deep Seated Psychological Problem1359 Words   |  6 Pages Cyber Bullying Introduction Cyber bullying among teen occur when the teenagers harms or harass their peers over the information technology network. Cyber refers to any form of information technology and is not limited to social networks such as Facebook, blogs, twitter, SMS. It is important to note that an action can only be considered as bullying if it is repeated and conducted deliberatelyRead MoreThe Problem of Cyber Bullying1323 Words   |  6 Pages(â€Å"An Old Problem with a New Face†). Since the rapid growth of technology, cyber bullying has become life-threatening for too many teenagers. Now that teenagers have phones and technology almost twenty-four hours a day, they are putting themselves at a greater risk of being cyber bullied. Cyber bullying is different from regular, old-school bullying; cyber bullying is using the internet to ruin the life of other teenagers. â€Å"Cyber bulling is when a teenager is tormented, threatened, harassed, humiliatedRead MoreFactors that Leads Teens to Commit Suicide741 Words   |  3 Pagesemotional and physical, can contribute to a teen’s decision to take his or her own life. Adolescent suicide rates have no doubt risen over the past 50 years, but the question is, why? As our world continues to advance decade by decade, modern-day teenagers experience problems that are quite different than those faced by teens from previous generations. One distinct, modern influence of teenage suicide is social media. Naturally, most teenagers today own or have access to a smart phone, computer, orRead MoreCyber Bullying Essay663 Words   |  3 PagesAdam Grabenhorst Mrs. Dressler English 2 15 January 2012 Cyber Bullying Peer to peer bulling is nothing new. It has been going on for generation after generation. However the times have now changed since new technology has made it possible for peers to bully one another without even having to be face to face. This form of bullying is called â€Å"Cyber Bullying†. Teens turn fun, needed devices into â€Å"weapons† through the use of social networking websites, chat rooms and text messaging andRead MoreThe Internet and Cyberbullying Essay576 Words   |  3 PagesCyber Bullying Nowadays, the Internet is regarded as the most widely used source of social media and the fastest way to exchange knowledge and information all over the world, playing a vital role in everyone’s daily life. The internet has countless functions, useful for everyday work and entertainment, but it is being abused by people nowadays. One of the ways it is being abused is by cyber bullying. Cyber bullying is when people use the internet to make fun of others, belittle them, andRead MoreCyber Bullying And Its Effects On Children And Adults Across The Globe1693 Words   |  7 PagesIntroduction Bullying doesn’t just happen on the playground or in the workplace; it has now taken over the Internet and popular social media platforms such as Facebook, Twitter and Instagram. The term for online bullying is referred to as â€Å"cyber-bullying†. â€Å"Cyber-bullying is defined as the use of email, cell phones, text messages, and Internet sites to threaten, harass, embarrass, or socially exclude† (Patchin, 2015). Much like the face-to-face bullying some may encounter in school can cause physicalRead MoreIs Bullying A Serious Problem?1176 Words   |  5 PagesHundreds of years bullying has been going on, how long will it finally stop? In the United States Suicide is the third leading cause of death among young people, resulting in about 4,400 deaths per year, according to the CDC. For every suicide among young people, there are at least 100 suicide attempts. Over 14 percent of high school students have considered suicide, and almost 7 percent have attempted it. Bullying is a Very serious social matter that needs to stop, Bullying related suicideRead MoreCyber-Bullying Today999 Words   |  4 Pagesâ€Å"Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying† (Cyberbullying Research Center, 2010). The World Wide Web and social media have opens up a black hole to psychological and emotional stress for some young adults. Cyber bullying is defined as a form of teen violence, torment and harassing via the use of technology to bully another person. One out of five young adults has experienced cyber bullying to th e extremeRead MoreCyber Bullying And Its Effect On Society1536 Words   |  7 PagesBullying has been an extreme issue all around the world for hundreds of years, and since modern technology has advanced, so has cyber bullying. â€Å"‘Gimme’ your lunch money† has turned into texting and posting gruesome threats and embarrassing material all over social media. Millions of kids all over the world have taken their own lives due to the harmful effects of cyber bullying. Problems that cannot be resolved independently are brought to court, and the government has become increasingly involvedRead MoreWhy Do Cyber Bullying Laws Need to Be Enforced?841 Words   |  4 PagesWhy do Cyber Bullying Laws Need to be Enforced? Several middle school students in western New York created a Facebook event invitation Oct. 21, and they invited 60 of their friends to participate in a plan to torment the sixth-grader the next day. As the result, 10 accepted the invitation and some of the students posted offensive comments; one even proposed to kill the boy. When the mother of the proposed victim found out about that, she contacted to school officials. This is common news for many

Monday, December 9, 2019

Sustainable Leadership and Organization

Question: Discuss about theSustainable Leadership and Organization. Answer: Introduction: The organizations need better leadership to ensure they achieve their set objectives in the future. In addition to that, the sustainable leadership is vital as it ensures various changes are made and good management so as to provide quality services to the clients. The leaders should be responsible in all the activities and use their powers to manage the organization as required. The success of the institution highly depends on the leaders who have the mandate to make decisions that will help the organization succeed. The critical decisions they make for the progress of the institution should be respected and adhered to, to ensure the smooth running. Moreover, there should be good flow of communication form the managers to the subordinates. It ensures that the instructions given reach the juniors as intended. The distortion of the information leads to conflicts at the workplace and the employees end up blaming the supervisors for their misconduct. However, the proper communication at the organization ensures that the grievances of the workers are known by the management and taken into consideration. The discussion outlines about the sustainable leadership model that is suitable for healthcare. Sustainable Leadership Model for Healthcare The healthcare institution is highly depended on by the public to cater for their health conditions and ensure that there is continuity of life. The physicians and other specialized professional in the healthcare tasks do a great job in ensuring that the sick individuals are attended. The patients have various illnesses and it is the duty of the doctors to ascertain the type and the required medical treatment. The hospital management ensures that there is an available drug to treat the sick and also admission for the critical conditions that needs from time to time checkup. The leadership at the healthcare organizations determines the type of care the people will get. There are various organizations that leaders are not concerned on the progress of the institution and neglect their duties. The subordinates also view them as their role models and how they carry out their responsibilities. It makes the junior staff members also not perform their assigned tasks in the right manner. They neglect their duties and the sick individuals lack the appropriate medical care they require. It often leads to many peoples health deteriorating and hence many losing their lives in the process. The government of the state has ensured that it budgets the medical funds in the annual country budget for various ministries. The ministry of health is often given the priority as the country cares for the citizens. The better healthcare ensures that the economy of the state is stable as many persons will be healthy and able to perform their tasks. The productivity of the citizens highly depends on the health conditions (Carter et al, 2005). The sustainability of the leadership ensures that there is continuous improvement of the way things are carried out in the healthcare departments. There should be value of the human life and the good conduct of the persons handling the sick. The leaders should handle the duties and responsibilities assigned for the smooth running of the organization. The people are defined by their principles and the commitment they have in carrying out their tasks. A good leader is supposed to be a role model to the subordinates to ensure they also attend their duties as assigned. The behavior of the managers is acquired by the junior staff and at long last the whole institution carries out the tasks in the same way. The good deeds of the management will also reflect to the services being given to the clients. It is highly recommended for the individuals upholding leadership to act responsibly for the smooth running of the organization. It is important to ensure that the corporation does not collaps e and it continues to deliver the quality services to the people. The healthcare institution should be handled well by the responsible leaders who are willing to transform it to the next level. There should be improvement of the services being rendered to the public and how they are carried out. The doctors should also be responsible in treating the sick to ensure they do not diagnose the patients wrongly (Ulrich Smallwood, 2013). The leaders should bring change in the healthcare organization by implementing various changes. On the other hand, there should be strategies set to help the institution achieve its goals and objectives in the future. The success of the organization highly depends on the leadership that is implemented. First of all, the leader should take responsibility of all the activities taking place in the organization. They should all be monitored from time to time to ensure that all the employees handle their tasks properly. The leader should be answerable to anything that takes place. The conduct of the physicians under the leader is highly determined by the rules and regulations set. The good leadership should not entertain the misconduct of the workers as they will lead to the collapse of the organization or tarnishing its name. It is the duty of the leader to warn the individuals or else fire them if they do not change. On the other hand, lateness at work should not be condoned as it leads to delays in delivering the healthcare services to the people. The doctors should be active and respond immediately to the cases arising regarding the sick persons. It ensures the prevention of death or any adverse condition on the individual. All the persons working in the healthcare corporation should handle the tasks assigned as required to ensure the smooth running of the organization. The laxity in the various departments should not be tolerated as it will delay various processes (Hargreaves Fink, 2006). Secondly, they should involve the other staff members and employees in the decision making. It will ensure that the people air what they think about the issue at hand and give varying ways to handle it. The involvement of the other persons makes them feel as part of the organization and not neglected. As a good leader and for good sustainability the administration of the institution should involve the other parties. The many individuals together often come up with a great decision other than an individual making the decisions on his own. It also motivates the subordinates as they feel recognized and appreciated by the management. Through this, important decisions will be made that will ensure the success of the organization. On the other hand, the employees will work diligently to meet their targets and ensure the goals and objectives of the organization are met. The management of a particular corporation is not an easy task as everyone looks up to you for the progress of it. The fai lure of the institution is always blamed on the managing directors as they govern the corporation. It requires commitment and being able to deal with the arising challenges that crop up from time to time. The healthcare is often faced by various challenges such as lack of drugs and special equipment to diagnose diseases. The management should come up with strategies that will ensure they acquire the drugs and ensure that there is no shortage at all times. It will help treat the sick and also deliver quality services to the public (Hutcheson, 2007). Thirdly, the programs to help the sick in the society should be implemented so as to treat them as a sign of appreciation for the continued support. It will be a good move to help the community as many people are unable to access to the modern treatment due to the lack of funds. Most of them continue to rely on the traditional methods of curing diseases that are not effective. In addition to that, there are no protective measures undertaken by the persons administering the cure in the traditional way. It often leads to the contracting of the illnesses if it is contagious and that should be prevented. Moreover, while handling the wounds they do not ensure they disinfect it to kill the germs. It leads to the wound to increase adversely and hence causing more pain and damage to the body of the sick individual. To help transform this situation, the programs to help the sick in the society should be implemented. It will be a good sign of the sustainable leadership that will bring a great change to the way of carrying out things. The healthcare will be appreciated by the society as it will heal the sick and ensure the continuity of life. The traditional methods are sometimes risky if not handled well and many persons end up losing their life. The healthcare institution will be of great importance by saving the peoples lives and the community will highly appreciate. It will highly reduce the dependence on the traditional methods of curing the sick and help the people focus on the modern treatment that it is helpful and reliable (Soyka, 2012). Fourthly, the leader should ensure that the physicians that are employed in the healthcare organization are qualified and meet the required requirements. Moreover, they should prior experience in handling the sick or depending on their specializations. It will ensure that the sick are handled in the right way and the prescriptions administered as per the illness. There are doctors who are not highly qualified and they end up diagnosing the patients wrongly. It leads to various complications in the body of the individual as one takes the drugs that are not intended for the illness that one is suffering from. The cases have been experienced in various organizations and without the immediate attention the persons lose their lives. The institution ends up in danger of facing penalties for the mistake done by the doctor. Moreover, the surgeons should also meet the qualifications to help them perform surgery on the individuals using the correct procedure. It is a risky act and should be pe rformed with various safety measures to help preserve the life of the patient. There have been cases of the surgeons forgetting to pick up their tools on the body of the sick and that poses a great danger to the life of the person. To avoid any complications in the future the management should hire the highly qualified and experienced persons to handle the patients at the healthcare organization. Their work will be appreciated by the sick and also the management at large (Weiss Legrand, 2011). The fifth, there should be ways to motivate the physicians and other employees for their good work. It will increase their morale to continue to handle their tasks as required and also create a good picture of the organization. The leaders should introduce the monthly or salary increment to help the workers feel appreciated. Moreover, there should be gifts from time to time as a sign of appreciation for their good work. The measures will increase the productivity at the workplace and the workers will enjoy to work and meet their goals and those of the corporation. It will help transform the way things were being carried out previously. In addition to that, the management should plan the team building occasion to help the people come together and feel as one. It will help in the interaction of the employees and the managers. The workers will also feel recognized and not neglected by the management of the organization. It makes them feel worthy and continue to perform the tasks assigne d diligently. The leaders should make the employees feel free to interact with them and it will make them air the challenges they face. The motivation is highly important at the workplace as there will be no laxity and all the processes will run smoothly. It will be a great move to ensure that the employees perform their duties and also attend to the patients accordingly. The people require a favorable working place to undertake their duties as required with minimal interferences (Hargreaves et al, 2014). In addition to that, the sustainability leader should ensure that they improve the infrastructure at the healthcare organization. It will ensure that the appropriate facilities to cater for various illnesses and also the admission of the critically ill patients. There should be wards and various rooms to help cater for the sick through administering medication and admitting the sick. On the other hand, there should be modern equipment to help in the diagnosing the patients. It will help improve the accuracy of the results and help the physicians administer the right medication for a particular illness. The organization should budget for the funds that will help in the improving the infrastructure and also opening other branches for easy accessibility of the healthcare by the people from various locations. The branches will be of great help to the sick patients who live away from the main hospital. The easy access of the medical care will ensure the improvement of the health of the pe ople that is vital for the day to day basis. The good health ensures good productivity of the citizens and hence the stability in the economy of the state. Moreover, various individuals should be assigned the responsibilities of managing the opened branches to make the administration work easier. It will ensure that they operate smoothly and the management will have an easy way to handle all the operations. The involvement of other individuals in the process of governing the healthcare departments and branches will make things easier (Jones et al, 2015). Lastly, the sustainable leader should make sure that there is a good flow of communication in the organization. It is highly important to ensure that the information communicated from the management to the subordinates is not distorted. There are many persons who have a tendency of delivering the wrong information to the employees and hence leading to unwanted conflicts. The managers end up being blamed whereas it is not their mistake. To avoid these issues, there should be a forum to communicate the intended information such as the notice board, emails or meetings. The face to face meetings with the workers are the best as they get the first hand information from their leaders. Moreover, it ensures that the employees air their grievances and the management handles them. It makes the situation easy for the workers as they do not have to report to the supervisors who sometimes are reluctant to air their issues. The open meeting with the staff members and the employees ensures that all the persons in the organization are addressed on the progress of the institution. The managers give the directions on what to be done and the areas to be rectified to ensure a smooth running of the organization. The clear communication in a corporation is the best to be able to address all the issues that arise. Through this, the health care will be delivered to the patients appropriately. The employees will also feel comfortable to present their grievances to the management as there will be no dictatorship authority (Ehnert et al, 2014). The safety measures should also be implemented in the organization to ensure that there is minimum damage in case of fire outbreak or natural calamities. The fire alarms should be installed to help in communicating to the people when there is fire. Moreover, the smoke detectors should also be installed to help release the water to prevent the fire spread to other locations. This move will ensure the lives of the patients and that of the physicians is protected as there will be minimal damage. On the other hand, the buildings and other equipment will not face any fire harm and it will be easy to curb the fire. However, the cameras should be placed on various locations to help monitor the occurrences at the organization. It will help raise alarm in case there is any theft or any other urgent issue arising. They will also aid in gathering any evidence that may be required as all the activities taking place are recorded. The specialists in the technology will help in the installation of the equipment and carry out maintenance from time to time. The corporation should ensure that the working place is favorable and safe to work in so as to yield better outcomes. The leaders should put the safety of the employees and the patients the priority to prevent any fatal accidents (Mobley, 2010). Conclusion In conclusion, the sustainability leaders ensure the transformation of various changes and implementing others that will help bring impact to the organization and public. The healthcare institution needs various changes and strategies to help it deliver quality medical care and services to the sick patients. It is the duty of the managers to govern the organization and handle their responsibilities accordingly for the success of the institution. References Carter, L., Ulrich, D., Goldsmith, M. (2005).Best practices in leadership development and organization change: How the best companies ensure meaningful change and sustainable leadership. San Francisco: Pfeiffer. Ulrich, D., Smallwood, W. N. (2013).Leadership sustainability: Seven disciplines to achieve the changes great leaders know they must make. New York: McGraw-Hill Education. Kurucz, E. C., Colbert, B. A., Wheeler, D. (2013).Reconstructing value: Leadership skills for a sustainable world. Toronto : University of Toronto Press Hargreaves, A., Fink, D. (2006).Sustainable leadership. San Francisco: Jossey-Bass. Hutcheson, G. (2007).Sustainable leadership at Canadian Business for Social Responsibility. Ottawa: Library and Archives Canada = BibliotheÃÅ'â‚ ¬que et Archives Canada. Soyka, P. A. (2012).Creating a sustainable organization: Approaches for enhancing corporate value through sustainability. Upper Saddle River, N.J: FT Press. Mobley, W. (2010).Advances in global leadership. Bingley: Emerald Group Publishing Limited. Weiss, D. S., Legrand, C. P. (2011).Innovative intelligence: The art and practice of leading sustainable innovation in your organization. Mississauga, Ont: John Wiley Sons Canada. Hargreaves, A., Boyle, A., Harris, A. (2014).Uplifting leadership: How organizations, teams, and communities raise performance.San Francisco : Jossey-Bass In Jones, S., In Graham, S., IGI Global,. (2015).Cases on sustainable human resources management in the Middle East and Asia. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global In Ehnert, I., In Harry, W., In Zink, K. J. (2014).Sustainability and human resource management: Developing sustainable business organizations. Berlin ; New York : Springer

Sunday, December 1, 2019

Why Humanities Are As Important As Technology Science

Why Humanities Are As Important As Technology Science What is a STEM? It is an abbreviation for such disciplines as science, technology, engineering and mathematics. Throughout the course of the history, many politicians were trying to put the main focus onto the STEM. Usually, this had to be done at the expense of the humanities. Is this a correct policy and what are the consequences of applying it to the education system? Shifting of the educational priorities to the favor of STEM At some point, Kentucky governor Matt Bevin wanted to provide a financial support to those students who are majoring in electrical engineering while cutting funds for those who study literature. Senator Marco Rubio of Florida (and a former presidential candidate), stated that the nation needs to have more welders and fewer philosophers. Obviously, their decisions were dictated with the best intentions in mind. However, could they be right? Is the emphasis on the STEM is all that is needed for the technological progress of the humankind? Are humanities a number of subjects which do not influence in any way on the development of the economy? Can we afford ourselves to ignore them? Famous tech people and humanities A tech professional Steve Jobs once said, â€Å"Its in Apples DNA that technology alone is not enough that its technology married with liberal arts, married with the humanities, that yields us the result that makes our hearts sing†. Mark Zuckerberg, a co-founder of Facebook, excelled in studying Greek and Latin along with learning programming. Fareed Zakaria, an author of the book â€Å"In Defense of a Liberal Education† wrote in his Washington Post column, â€Å"Consider Americas vast entertainment industry, built around stories, songs, design and creativity. All of this requires skills far beyond the offerings of a narrow STEM curriculum.† Also, the above mentioned Kentucky governor Matt Bevin graduated from college with a bachelors degree in East Asian studies. Can we prosper if the main attention is on the STEM only? Our political leaders strive for the better economic future of the humankind. However, they mainly put an emphasis on the exact sciences and ignore the massive impact of humanities on the technological development. Many academics fear that the avid support of science and technology will cause the neglect of the humanistic disciplines, which, in its turn, will bring the negative results in the general development of the technological world. Arts and humanities are vital for the critical thinking, problem-solving and a rational decision making. Being able to ignore traditional boundaries and knowing how to express and defend opinions will only pave the way for new innovations. In 2013 a survey was held by the Association of American Colleges Universities. 318 employers with more than 25 employees took part in the study. The results were the following almost all of the tested people were convinced that the ability to think critically, communicate clearly, and solve complex problems quickly are much more important than the particular job specifications. That is to say, the skill of thinking creatively and critically – and that is a skill which can be learned mainly by studying humanities – is crucial for reaching individual and global success. Obviously, the technical progress is vitally important for the humankind, and funding of the exact sciences must be more than sufficient. However, it should not be done at the expense of the humanities. Taking a proper care of the humanistic disciplines is not just important. It will enhance the impact of the STEM significantly and we all will benefit from this.

Tuesday, November 26, 2019

Tess of the DUrbervilles essays

Tess of the DUrbervilles essays Thomas Hardys Tess of the DUrbervilles portrays the struggles of Tess Durbeyfield with the fateful incidents and misfortunes that mark the course of a tragic life. Tess, a beautiful peasant, struggles with many hardships throughout her life. She struggles with social class, the men in her life, Alec DUrberville and Angel Claire, and the notion of being a pure woman. Fate plays an important role in creating almost inescapable circumstances in Tess Durbeyfields life. For the first 16 years of her life, Tess and her family live in a middle class state of affairs in the town of Marlott. Her father John Durbeyfield is not in good health. He has little interest in working, and spends most of his time drinking. Upon returning to his home one evening, Durbeyfield meets a man named Parson Tringham who informs him that the Durbeyfield family is the lineal representative of the ancient and knightly family of the DUrbervilles, who... came from Normandy with William the Conqueror. This news suddenly changes Durbeyfields view on his familys lifestyle and he immediately decides that his family should be living as his knightly and noble ancestors once did. The family sends their eldest daughter, Tess, to see if the Durberville family would assist them financially. They also have additional hopes of Tess marrying a gentleman and restoring their family status. This single decision of insisting she leave her sheltered life in the town of Marlott, the only existence she has ever known, will be the change in her life that will begin a series of events that eventually lead to tragedy. Alec (Stock) DUrberville meets Tess. Her parents fantasize of Tess coming home with a commitment of marriage from Alec, the man they assume to be a gentleman, and instead he rapes her of her dignity. Alec seduces Tess in the forest of Chase, He knelt and bent lower, till her br...

Saturday, November 23, 2019

Speaking of the French Calendar

Speaking of the French Calendar A most basic topic of conversation, apart from the weather, is the time we live in- the day, the month, the season, the year. We mark time, literally, by the words for these signposts. So anyone seeking to speak French, or any other language, will want to know how to speak of such basic demarcations. Days of the Week Lets begin with the days of the week,  les  jours de la semaine.  The French week begins on Monday  so thats where well start. Note that the names of the days are not capitalized unless they start a sentence. lundi   Mondaymardi   Tuesdaymercredi Wednesdayjeudi Thursdayvendredi Fridaysamedi Saturdaydimanche Sunday The Definite Article Le When you are discussing days of the week, use the definite article le before each name, when you are talking about something that happens repeatedly on a certain day. To make each day plural, add an s. Je vois Pierre le lundi.   I see Pierre on Mondays.Nous travaillions le samedi.   We used to work on Saturdays.On y va tous les mercredis matin / soir. (NB: Matin  and soir here are adverbs and so dont agree.) We go there every Wednesday morning / evening. If youre talking about the day of a unique event, do not use an article, nor should you use a preposition equivalent to on.   Je lai vu dimanche. (I saw him on Sunday)  Il va arriver mercredi. (Hell arrive on Wednesday). Origins of Day Names Most names for days derive from Latin names for heavenly bodies (planets, moon and sun), which in turn were based on gods names. Lundi is based on Luna, the ancient Roman moon goddess; mardi is the day of Mars, ancient Roman god of war; mercredi is named after Mercury, winged messenger of the ancient Roman gods; jeudi is devoted to Jupiter, monarch of the ancient Roman gods; vendredi is the day of Venus, ancient Roman goddess of love; samedi derives from the Latin for Sabbath; and  the last day, though named in Latin for Sol, the ancient Roman sun god, became dimanche in French based on the Latin for Lords day. Months of the Year The French names for months of the year, les mois de lannà ©e,  are based on Latin  names and ancient Roman life.  Note that months are not  capitalized  either. janvier  Ã‚  Januaryfà ©vrier  Ã‚  Februarymars  Ã‚  Marchavril  Ã‚  Aprilmai  Ã‚  Mayjuin  Ã‚  Junejuillet  Ã‚  Julyaoà »t  Ã‚  Augustseptembre  Ã‚  Septemberoctobre  Ã‚  Octobernovembre  Ã‚  Novemberdà ©cembre  Ã‚  December The Four Seasons The passing of the four seasons, les quatre saisons, has inspired many an artist. Antonio Vivaldis famed  concerto grosso may be the benchmark. These are the evocative names the French bestowed on the seasons:   le  printemps   springlà ©tà ©Ã‚   summerlautomne   autumn/falllhiver   winter Expressions related to the seasons: Attacher lundi avec mardiCe nest pas mardi gras aujourdhui.Le chassà ©-croisà © des juillettistes et des aoà »tiensEn avril, ne te dà ©couvre pas dun fil.Une hirondelle ne fait pas le printemps.Passer lheure dà ©tà ©Passer lheure dhiver Talking About Specific Dates Questions:   Whats the date? Quelle est la date  ?Quelle est la date aujourdhui?Quelle est la date de (la fà ªte, ton anniversaire...)?What date is (the party, your birthday...)?(You cannot say quest-ce que la date or quest-ce qui est la date, because quelle is the only to way to say what here.) Statements:In French (and in most languages),  the number must precede the month, like this: Cest  Ã‚  le  (definite article)   cardinal number  Ã‚  month   Ã‚  Ã‚  Cest le 30 octobre.  Ã‚  Ã‚  Cest le 8 avril.  Ã‚  Ã‚  Cest le 2 janvier. Exceptionally, the first day of the month requires an  ordinal number:  1er  or  premier for 1st or first:   Ã‚  Ã‚  Cest le premier avril.  Cest le 1er  avril.   Its the first (1st) of April.  Ã‚  Ã‚  Cest le premier juillet.  Cest le 1er  juillet.   Its the first (1st) of July. For all of the above statements, you can replace Cest  with  On est  or  Nous sommes.  The meaning is essentially the same in each case and all can be translated with It is.....   Ã‚  Ã‚  On est le 30 octobre.Nous sommes le premier juillet. To include the year, add it at the end of the date:   Ã‚  Ã‚  Cest le 8 avril 2013.On est le 1er  juillet 2014.Nous sommes le 18 octobre 2012. Idiomatic calendar expression:  Tous les 36 du mois   Once in a blue moon

Thursday, November 21, 2019

Analysis of Articles about Political Geography Issues Essay

Analysis of Articles about Political Geography Issues - Essay Example Vaclav Klaus was an economist, so he felt that the very best thing that could be done for the new country was economic reforms that would ease the transition from a Communist economy that was centrally planned to a free market economy. He felt that getting this transition underway quickly and with as little pain as possible would be the best way to create a stable, democratic nation. Vaclav Havel believed that creating a civil society was the most important task. He believed that just opening p the economy as a free market would not be a wise thing to do because he argued that free markets require people to act in a moral manner or corruption will drag the economy down. Vaclav Havel believed that democratic institutions should first be developed through decentralization of political power. He said that the best place to learn about democracy was at the local level. This went against Klaus because giving power to local governments could disrupt his economic reforms. The article goes o n to expand on Havel’s ideas about civil society and how they will eventually result in a global culture that embraces differences without conflict. Many of his ideas have helped make the Czech Republic a successful post-Communist state. Anderson, Jon Lee. "The Implosion." New Yorker 88.2 (2012): 58-67. Military & Government Collection. Web. 19 Mar. 2012. This article is about the reign of Bashar al-Assad and his ruling party that is made up of supporters in the minority Christian and Alawite Muslims. The current situation in Syria can be traced to events that have occurred over the past 50 years in Syria. The current destruction evidenced in Homs is nothing new for the political dictatorship headed by the al-Assad family for generations. Bashar al-Assad was not the son that was to take over the rule of Syria from his father, Hafez. This was to have been done by an older brother that was killed in a car accident. The younger Assad was studious and quiet. He studied abroad and attended medical school, training as an ophthalmologist.

Tuesday, November 19, 2019

Compare and contrast two business case studies Essay

Compare and contrast two business case studies - Essay Example Tesco’s great number of manpower and its powerful marketing strategy are the underlying strengths that make it dominant in its specified area of business. (ivythesis.typepad.com, 2011) Eden project aim is to promote the understanding and responsible management of vital relationship between plants and resources. The site covers 50 hectares and could hold 35 football pitches. The biomes are not covered y glass but in EFTE, a transparent high tech foil, contain more than 100000 plants from 5000 species. ? 86 million has been spent to autumn 2002. Staff almost doubled by 2002 to 650. The site has attracted over two million visitors in less than two years a benefit of ? billion to the Cornish economy is predicted for the period 2001-2011.The project was a brain child of a former record producer Tim Smith who started to formulate the idea when driving around the abandoned china clay pit just outside St Austell has become home to the largest conservatories (‘Biomes ‘Peter Long, 2004 p 824). The iconic build began in Cornwall in 1998 and was officially opened in March 2001; they had planned for 750000 visitors in the first 12 months instead 1.9 Million people made their way to former china clay Pit in England most Westerly County. Eden Project has given a huge boost to Cornwall’s economy creating more than 400 Jobs. ... One out of every three pounds spent in a supermarket goes to Tesco. It is the Britain’s biggest private employer with a workforce of 260,000 employees. (Poulter S 2005) In order to achieve steering- wheel -targets, Tesco’s HR strategy revolves around work simplification, performance management, challenging unwritten rules and rolling out core skills to all head office employees. This clearly highlights how business measures at Tesco are closely linked to performance management. Although the frontline employees are considered to be Tesco’s reflection to its customers, all employees have vital roles to play in achieving the organizations goals. This is done through an innovative induction programme that caters for styles of learning, different cultures and varying work commitments which ensures that every employee clearly understands his or her individual role in contributing to Tesco’s core values and purposes. Tesco ensures that employees understand how th eir actions affects the big ‘picture’ of the overall business by providing continuous training that creates a graphical journey through Tesco’s history, its values, core purpose, business goals, financial aims, commitment to customers and the marketing strategy. In order to keep lead over its rivals in the fiercely-competitive UK supermarket sector, Tesco has adopted a human-resource-led business strategy. The strategic policy started in the company’s supermarkets with an aim of improving customers’ service by freeing up stores employees. Tesco concentrates on clear definition of employees’ roles, activities and responsibilities to ensure that employees are accountable, responsible, consulted and informed. 13 key management techniques are

Sunday, November 17, 2019

Cognition domains Essay Example for Free

Cognition domains Essay Events that happen in an adolescent’s life can affect one of three domains; these three domains are known as ‘psychosocial’ ‘cognitive’ and ‘biophysical’. This essay will focus on the area of the cognition domain now this domain will be discussed in relation to an event that has affected my perception of the world around me, the way I feel in relation to blame and judgment and lastly the ability to learn how to be more reflective. My perception on life changed rapidly when I was informed of a tragic accident concerning the suicide of a family friend. This caused a rapid change in the way I thought about death, grief and sadness. â€Å"David Elkind proposed that formal operational thought also leads to adolescent egocentrism (difficulty differentiating one’s own thoughts and feelings)† (Sigelman, Rider, De George-Walker, Pg 173, 2013) This has impacted the way that I look at the world having gone through this experience I now see that people’s perception can change no matter what. I guess what’s trying to be said is that everyone’s perception is different and it is changing due to the experiences that we all encountering in our everyday lives. The judgment that came after the tragedy was phenomenal. Greg Newham will always be loved and greatly missed but never will he be forgotten. Was it my fault that he died? Greg Newham was a teacher. If I had visited him when the bell rang after school would he still be here today? I did not understand his wife’s decision to not let me go to the funeral. And because of this, because I never got to say my final goodbye it is hard to let go. Hard to move on. A book written by Temple University in the USA about seeking closure states â€Å"closure typically implies that something is finished, ended, closed. Finally you can move on† (2014). Without closure I feel that I am always judging myself. Always questioning my motives, wondering if I could have done more. The last aspect of cognitive development that was affected by this experience was learning. It is hard to live with the knowledge that someone’s death was your fault, even if rationally you know it wasn’t. Those left behind never usually learn the reasons as to why they harm themselves and those around them. Bronfenbrenner’s view of a developing person, with his or her  biological and psychological characteristics are embedded in a series of environmental systems which interact with each other and with the individual over time to influenced development. (Sigelman, Et.al, 2013), with all the developmental events that we all go through it is fair to say that the learning side of our cognitive development is always changing. This essay was written to explain the affects of our everyday lives and how it affects our cognitive domain. With what was said from Bronfenbrenner and David Elkind it is clear to say that the choices we make today do mostly change our lives in some way/s. I never completely understood the affects from my life could change the way I see and think about everything that I do today. References; Sigelman, Rider and De George-Walker, 2013, Life Span Human Development. Temple University, USA, 2014, http://www.temple.edu/tempress/chapters_1800/2136_ch1.pdf

Thursday, November 14, 2019

Materialism in Pauls Case by Willa Cather Essay -- essays research pa

In "Paul's Case," Willa Cather manages to apply the emotions, feelings, troubles, and thoughts of modern society, allowing the reader to relate to the story. By incorporating the same heavy burdens that bother and aggravate people in their daily lives, Willa explores the pain and treatment unwanted people experience. Obviously, nobody wants to feel rejection or alienation from the world, but instead they desire to encounter acceptance and agreement with the world's standards. In the story, the main character, Paul goes through excruciating transformations and lengths to try and impress the people around him. Attempting to belong in a superficial society, Paul loses a part of his identity without acknowledging it and therefore he strays from his own personality. Blinding himself from reality, Paul succumbs to the materialistic requirements of society, which contributes largely to his peculiar behavior. The style of Paul?s wardrobe determines the attitude of Paul?s personality. During the meeting with the faculty of his school, Paul displays himself as a motionless, dead character. ?His clothes were a trifle outgrown, and the tan velvet on the collar of his open overcoat was frayed and worn, but for all that there was something of a dandy about him, and he wore an opal pin in his neatly knotted black four-in-hand, and a red carnation in his buttonhole.? Paul feels that the clothes he wears symbolizes his status in life and only the nice, fancy clothes seem to please him. When he reachers the theater at Carnegie Hall, the glow and warmth returns to Paul?s face and attitude. ?...Paul th[inks] it very becoming though he kn[ows] the tight, straight coat accentuate[s] his narrow chest, about which he was exceedingly sensitive... ...e[s]. Then, because the picture-making mechanism [is] crush[ing], the disturbing visions flash[ing] into black, and Paul drop[s] back into the immense design of things.? When Paul jumps in front of the train, he thinks it will take away his problems and help him escape the horrendous world forever. In Willa Cather's story "Paul's Case", the character Paul embodies how the desire of materialism can affect the mind and soul of human being. Paul, a very self-oriented and introverted boy designs and calculates his every move to prevent people from discovering the real him. Despising his life at Cordelia Street, Paul throws himself into the plot of obtaining money, wealth, and power. This ruins Paul?s life and distracts him from truly enjoying his youth and independence. The story presents that even riches, wealth, power cannot buy one?s happiness or sanity.

Tuesday, November 12, 2019

Natives and the Europeans. Essay

In the book Heart of Darkness, Conrad gives us a negative impression of human nature. Conrad’s views of human nature are very pessimistic and he gives us the feeling that humans are in fact inhuman and as we read on these terrible images of the evil deeds of humans keeps reoccurring. In reality many of human characteristics we possess resemble those given in the book. However, we also catch glimpses of the caring and helpful side of man shown through Marlow and the Russian. The author uses different characters to explore different aspects of human nature. Each character has his own distinctive identity and through his individuality we are able to identify with many of the views and ideas Conrad is trying to communicate. In order to fully understand the concepts of human nature, we have to classify the characters in the novel into three different categories. The first category is comprised of the Europeans, but excludes Kurtz and Marlow. The reason Marlow doesn’t fit with the Europeans is because he refuses to follow their example and act as they do. Kurtz meanwhile has drifted into his own little world. The second category is made up of the natives, while Kurtz and Marlow together form the third category. We can see a clear contrast between the Europeans and the natives. They are different in everyway, especially the way they interact with each other. The Europeans in general who live in Africa form the first category. The manager, his nephew and the pilgrims are the main characters representing the European category. The way the Europeans force the natives to work in such appalling conditions; the men walking chained and the man being beaten unmercifully (p. 39) are all good examples of the brutality the Europeans brought to Africa. The pilgrims, meanwhile, are shown as the typical colonizers. The pilgrims have no value for the life of another person, they show this when they shoot the natives for fun. They kill the people just because they are alive. Killing people just for the fun of it takes human cruelty past the limit. â€Å"†¦. save the ivory you mean†¦. † (p. 100) Greed is another horrid but powerful characteristic of man. Greed motivates people to the extent that they the Europeans have come to Africa in the name of greed, sacrificing life in their own countries and time with their own families. They have come for the wealth that Africa will give them. The manager is probably the best example; he is a person whose sole objective is to acquire and keep ivory. Then we come to the second category which consists of natives. Throughout the book Conrad refers to them as â€Å"savages† and in this context the word implies that the natives are wild, uncivilized, and uneducated people. We know that, compared to the Europeans, the natives are in fact more civilized and educated in the way they act. â€Å"They are simple people†¦ † (p. 102) as the Russian puts it. â€Å"Simple people† meaning that they were not as sophisticated and didn’t have big ambitions like the Europeans. The cannibals, the fireman, the helmsman and the rest of the Africans we meet in this novel are the representatives from this category. The cannibals are shown as the typical Africans in contrast to the pilgrims, the typical Europeans. The cannibals are actually hard working, well behaved people and according to Marlow â€Å"†¦ fine fellows†¦ they were men one could work with, and I was grateful for them†¦ † (p. 61). Their behaviour on the boat, their will to work even though they are paid nothing and how they eat practically nothing are demonstrations of a great character strength, which Marlow envies.

Sunday, November 10, 2019

Choices based on appearances of their options Essay

Often times people make choices based on appearances of their options- the result of the choice tends to be strongly negative and it is hard to admit a mistake has been done. Often times things are not what they seem, when we trust this illusion the choice made is hard to accept and it is hard for others to reason how we came to that decision. This is the theme that we see in the dialogue between Hamlet and his mother Gertrude in the III, iv, ll. 63-117. This theme is shown through the use of diction, imagery, repetition, and characterization. In this dialogue it is both Gertrude and Hamlet that speak to each other. At this point hamlet criticizes her strongly about Claudius and her sense of judgment. The event that has just occurred preceding this dialogue is the murder of Polonius by Hamlet- as he mistook him for Claudius. At this point in the play Hamlet knows that Claudius has killed his father and is now sure he wants to avenge him. What happens after this dialogue is that the ghost of Hamlet’s father appears to remind him of his mission, Gertrude is unable to see the ghost but Hamlet goes on to explain to her everything after the ghost goes away. The first techniques to be discussed are imagery and diction and their role in portraying the first part of the theme, that being â€Å"often times things are not what they seem†. The first line of the passage says: â€Å"the counterfeit presentment of two brothers† in reference to Hamlet’s father and Claudius. From the very beginning of the passage the sub-theme of deception of perception is brought about. Hamlet goes on to degrade Claudius by use of insults (made up of images, in turn made up of diction). â€Å"A murderer and a villain; A slave that is not twentieth part of the tithe Of your precedent lord; a vice of kings; A cutpurse of the empire and the rule, That from a shelf the precious diadem stole, And put it in his pocket! † In this quote Hamlet is unveiling the true nature of Claudius, especially by treating him of a murderer and a cutpurse (pickpocket). These two insults are references to the murder of Hamlet’s father and the thievery of the crown; two crimes that prove to be very deceiving of a king. Once Hamlet had explained this to Gertrude she realized her wrong choice. At this point we can characterize Gertrude as being repressive and denying. This is shown through her diction and imagery; â€Å"O Hamlet, speak no more:Thou turn’st mine eyes into my very soul; And there I see such black and grained spots As will not leave their tinct. † Her demand of Hamlet to cease his attacks show that she is unable to face the truth, she goes on to say â€Å"these words, like daggers, enter in mine ears† which proves further that the truth about her choice is too painful for her to admit. The image of the daggers in conjunction with her â€Å"black and grained spots† bring about the omnipresent theme of order versus disorder- which can apply in this situation as Gertrude is in a disorderly situation, where she cannot accept the truth. Another technique that shows her fear of the truth is repetition. â€Å"No more† is repeated three times as she begs hamlet to stop his attacks, showing an increasingly greater desire to avoid the truth. This fits in to the main theme as she clearly shows that it is hard to accept the wrong choice that she has made. Finally the last aspect of the main theme of the passage- how it is difficult to reason a bad choice- is brought up by hamlet more so than by his mother. In the beginning of the passage he goes on to question her choice of lower quality of man, comparing his father to god’s and later referring to Claudius as a criminal. â€Å"See, what a grace was seated on his brow; Hyperion’s curls; the front of Jove himself; An eye like Mars, to threaten and command; A station like the herald Mercury† All the references are to male gods of great importance and strength such as Mars that is god of war, Hyperion that is god of the sun (as is Jove) and finally Mercury the messenger god, and god of commerce. He goes to say that this husband was great but now she is married to a â€Å"mildew’d ear†- an image that is degrading to Claudius. â€Å"†¦ have you eyes? †¦ Nor sense to ecstasy was ne’er so thrall’d† In this long quote Hamlet goes to question what could’ve possibly given his mother to marry this man. Without giving his mother the opportunity to explain herself, he cancels out the possibility of love, as she is too old to feel the excitation and passion of love. This fits in the theme as Hamlet shows that he is unable to understand Gertrude’s decision, as for him it lacks reasoning and doesn’t offer her a chance to explain herself. Through this text analysis we can see how the theme of how often times things are not what they seem, when we trust this illusion the choice made is hard to accept and it is hard for others to reason how we came to that decision. This theme represents the situation that Hamlet was in as he was by himself in having to find out if the ghost was real or unreal, and if it was evil or good- it is the situation he was in when he had to act so strangely to the whole exterior world, when inside he knew he was sane. At this point in the play hamlet is wrong to attack his mother in such a way that is why the ghost of Hamlet’s father comes at the end of the scene to remind him of the real mission. He let his private griefs get to him. After his father’s visit Hamlet makes his mother a confident and becomes more trusting towards her. She on the other hand thinks her son is delusional. In conclusion everyone has their reason to make choices which cannot be comprehended by others, and they may have negative ramifications.

Thursday, November 7, 2019

The World Distribution of Population Essays

The World Distribution of Population Essays The World Distribution of Population Essay The World Distribution of Population Essay The world distribution of population is as important as the world distribution of areas of tectonic activity in predicting the hazards of volcanic activity. Discuss this statement (40 marks) A hazard is a danger or risk and a natural disaster deals out a great number. It can be hypothesised that the greatest hazards posed by natural disasters are upon humans, so in knowing where populations are located we can predict the risks of volcanic activity. Hence, it appears common sense would dictate the statement to be entirely true, however, with the addition of a distinction between two arguments it is not always the case.The first states that in a dense area the main hazard is high death tolls, infrastructure loss, famine and epidemics, so distribution of population is vitally important, but the second identifies how in areas of sparse population, other severe effects will occur so population distribution is limited in its predictive advantage; additional effects being those on an international scale, environmental and supply side shocks. Population distribution refers to the patterns of people spread across a given area, often associated with population density (the average number of people per square kilometre).The map below shows how populations are mostly concentrated near coastlines and in habitable environments (i.e. Europe rather than the Arctic Circle), overall. Further to this, 50.5% live in urban areas and world population is highly concentrated in areas rich in resources (coal, oil, minerals, fishing) and temperate in climate. The reason being that people need a source of income,provided by natural resources to some extent, whilst temperate climates provide rain and heat for growing crops, essential for emerging developing economies and previously vital for the developed economies whose focuses now lie in secondary, tertiary or quaternary sectors.Tectonic activity distribution refers to how the movements in the Earths plates lead to distinctive areas and patterns where seismic activity occurs, leading to events such as tsunamis, volcanoes and earthquakes. In the map below, it is evident that these features of tectonic activity, occur along plate boundaries as these are the causation for seismic activity. A particularly area of distribution is the Ring of Fire because it exemplifies the connection between the risks associated with high density areas of population and seismic activity combined.In laying home to over 800 million people, 90% of world earthquake activity and 50% of the worlds active volcanoes; the links between the two variables needed to calculate risk are impossible to ignore. From the detailed comparison of the maps above, the West coasts of South America and North America and the Ring of Fire region have both density of volcanoes and people; strong positive correlation between the two variables implicit of how both are necessary in hazard prediction. However, the volcanoes will always stay in situe so the dynamic changes of population density do appear more dominant in terms of volcanic hazards.In using the population trends stated previously there are a great many factors drawing people into areas of seismic activity so population distribution is only going to increa se in density within seismic prone areas, so human dispersion is vital in recognising both future and current hazards. All preceding knowledge is summed up in Kofi Annans assessment:At no time in human history have so many people lived in cities clustered around seismically active areasPoor land-use planning; environmental mismanagement; and a lack of regulatory mechanisms both increase the risk and exacerbate the effects of disasters, which clearly illustrates the relationship between volcanic disasters, populations, planning and development; demonstrating the vital influence of population change in risk reduction.Furthermore, humans being the victims of the greatest hazard is emphatic given half a billion people live in spitting distance of active volcanoes. Therefore, all such theory leads me to exemplify the two arguments stated previously: In light of the first argument, the main hazard to any natural disaster is humans, so in densely populated areas their location must be take n into account. In the case of the Mount Nyiragongo eruption (Congo), its proximity to the dense population of the city of Goma, 16km south-west of the volcano, increased hazards. With a population of 500,000 people, 147 were killed because the 40mph lava flows reached the densely populated area quickly.1/3 of Goma was destroyed along with 14 villages along the path to Goma, from the Volcano and through the valley. Therefore, such an eruption would have benefited from focus on the population dispersion analysis rather than just when the volcano would erupt because evacuations needed to have been put in place. The pseudo-mathematical equation for risk Risk = Hazard x Value x Vulnerability / Capacity (Value indicating the elements at risk (number of human lives, economic value of property, etc., while vulnerability refers to factors which increase the susceptibility to he impact of hazards) highlights how the number of human lives and property at risk and the susceptibility of these i ndividuals is a bigger factor than the simplicity of seismic activity distribution because the environment can recoup and the volcano is the effector not the effected. More importantly, the density of Value and Vulnerability

Tuesday, November 5, 2019

The History of Root Beer and Inventor Charles Hires

The History of Root Beer and Inventor Charles Hires According to his biography, Philadelphia pharmacist Charles Elmer Hires discovered a recipe for a delicious tisane- a form of herbal tea- while on his honeymoon in New Jersey. Not long after, he began selling a dry version of the tea blend but it had to be mixed with water, sugar, and yeast and left to ferment for the carbonation process to take place. On the suggestion of his friend Russell Conwell (founder of Temple University), Hires began working on a liquid formulation for a carbonated root beer beverage that would be more appealing to the masses. The result was a combination of more than 25 herbs, berries, and roots that Hires used to flavor carbonated soda water. At Conwells urging, Hires introduced his version of root beer to the public at the 1876 Philadelphia Centennial exhibition. Hires Root Beer was a hit. In 1893, the Hires family first sold and distributed bottled root beer. The History of Root Beer While Charles Hires and his family contributed greatly to the popularity of modern root beer, its origins can be traced to pre-colonial times during which indigenous tribes commonly created beverages and medicinal remedies from sassafras roots. Root beer as we know it today is descended from small beers, a collection of beverages (some alcoholic, some not) concocted by American colonists using what they had at hand. The brews varied by region and were flavored by locally grown herbs, barks, and roots. Traditional small beers included birch beer, sarsaparilla, ginger beer, and root beer. Root beer recipes of the era contained different combinations of ingredients such as allspice, birch bark, coriander, juniper, ginger, wintergreen, hops, burdock root, dandelion root, spikenard, pipsissewa, guaiacum chips, sarsaparilla, spicewood, wild cherry bark, yellow dock, prickly ash bark, sassafras root, vanilla beans, hops, dog grass, molasses, and licorice. Many of these ingredients are still used in root beer today, along with added carbonation. There is no single recipe for root beer. Fast Facts: Top Root Beer Brands If imitation is the sincerest form of flattery, then Charles Hires would have a lot to feel flattered about. The success of his commercial root beer sales soon inspired competition. Here are some of the most notable root beer brands.A W: In 1919, Roy Allen bought a root beer recipe and began marketing his beverage in Lodi, California. A year later, Allen partnered with Frank Wright to form AW Root Beer. In 1924, Allen bought his partner out and obtained a trademark for the brand that is now the top-selling root beer in the world.Barqs: Barqs Root Beer debuted in 1898. It was the creation of Edward Barq, who along with his brother Gaston were the principals of the  Barqs Brothers Bottling Company founded in the New Orleans French Quarter in 1890. The brand is still owned by the Barqs family but is currently manufactured and distributed by the Coca-Cola Company.Dads: The recipe for Dads Root Beer was created by Ely Klapman and Barney Berns in the basement of Klapmans Chicago-area ho me in the late 1930s. It was the first product to make use of the six-pack packaging  format invented by the Atlanta Paper Company in the 1940s.Mug Root Beer: Mug Root Beer was originally marketed as â€Å"Belfast Root Beer† during the 1940s by the Belfast Beverage Company. The product name was later changed to Mug Old Fashioned Root Beer, which was then shortened to Mug Root Beer. Currently manufactured and distributed by PepsiCo, Mugs brand mascot is a bulldog named â€Å"Dog.† Root Beer and Health Concerns In 1960, the U.S. Food and Drug Administration banned the use of sassafras as a potential carcinogen. Sassafras is one of the main flavoring ingredients in root beer. However, it was determined that the potentially dangerous element of the plant was found only in the oil. Once a method to extract the harmful oil from the sassafras was found, sassafras could continue to be used without harmful repercussions. As with other soft drinks, classic root beer is classified by the scientific community as a sugar-sweetened beverage or SSB. Studies have linked SSBs to a number of health concerns including obesity, hypertension, Type 2 diabetes, and tooth decay. Even non-sweetened beverages, if consumed in too great a quantity, have the potential for negatively impacting health.

Sunday, November 3, 2019

What does the future hold for stem cells in relation to tissue Essay

What does the future hold for stem cells in relation to tissue engineering - Essay Example Stem cell researchers have in the recent past been involved in elucidating the effects of mechanical factors in tissue generation and engineering with regards to stem cell biology, especially as this field is still poorly understood (Pavlovic & BaÃŒ lint, 2013: p7). Stem cells possess immense potential in the field of tissue engineering. Potential hopes for future regeneration of damaged or diseased tissue are partially dependent on the use of various intricate combinations of stem cells with growth factors and scaffolds (Pavlovic & BaÃŒ lint, 2013: p61). In order to mimic the natural development of tissue in the lab, researchers require appropriate topographical and biochemical cues in a manner that is spatially controlled. Therefore, the future of stem cells in tissue engineering is dependent on the use of nano-technology, in this case nano-topography, in order to influence the behavior of cells. This includes various behaviors like proliferation, attachment, and differentiation that play vital roles in engineering of tissues. Majority of the research into stem cells and tissue engineering is currently focused on biochemical and biomechanical signals and cell adhesion and how these cooperate to enable tissues, cells, and organisms to adapt t o changes within the environment. In the future, it is possible that mechanical forces like mechano-sensing, cell matrix adhesions, cell-cell adhesions, and cell proliferation can be controlled using nano and micro-fabrication tools (Pavlovic & BaÃŒ lint, 2013: p62). This will allow researchers to understand the manner in which these processes enable cells to respond to their environment. Stem cells also have the potential to allow cellular nucleus control, which will be essential in tissue engineering. The size and morphology of the cell nucleus has emerged as a potential genome function mechanistic regulator, which means that it is a crucial

Thursday, October 31, 2019

Christian Louboutin (shoe designer) Essay Example | Topics and Well Written Essays - 2000 words

Christian Louboutin (shoe designer) - Essay Example Christian Louboutin is a prominent French designer whose footwear has entailed shiny, red-lacquered soles, which have grown to become his signature. Christian Louboutin can be regarded as one of the most creative and prominent designers working today. Initially, his unique red-soled shoes were seen as a top secret treasure of an elite circle of Louboutin enthusiasts; nevertheless, sustained media attention has introduced Louboutin to the world and heralded unparalleled levels of popularity. As a result, Louboutin is worn by both fashion insiders and fashion-mindful celebrities and stylish women. The research of Christian Louboutin (shoe designer) is critical and should be understood by designer practitioners who strive to create unbeatable, unique brands. The essay seeks to engage students within a search for and analysis of contemporary design research. Background Louboutin started sketching shoes in his early teen years at the detriment of his academic endeavours. Louboutin had minimal formal training comprising of drawing and decorative arts at the Academie d’Art Roederer. For more than two decades, Louboutin’s designs including boot made from various animal hairs and a towering ten-inch slipper has been a market leader of luxury shoe design. The multiplicity of detail, form, and style are embodied in Louboutin’s shoes and designs can be regarded as reinforcing the allure of his one-of-a-kind creations (Welters and Lillethun 2011, p.511). Louboutin’s success can be partly linked to his love of travel, entertainment, and architecture, which guarantees that no two pairs of shoes are analogous (Craik 2009, p.29). Louboutin entered into the fashion industry in 1982 when he started as an intern at Charles Jourdan. For the subsequent decade, Louboutin learned his craft as he freelanced for high-profile fashion houses such as Yves Saint Laurent and Chanel. It was in 1992 that he launched his first shoe boutique in Paris, a number that has risen to over twenty five boutiques across the globe. Louboutin’s sought to avail his clients with an unbeatable experience, given that for each collection that he produced he would select artisans with certain skills, maintaining that it was essential to have his shoes crafted by skilled craftspeople rather than modern, mass-production machines (Welters and Lillethun 2011, p.512). Louboutin’s unique designs can be regarded as mainly influenced by fantasy, sex, and playfulness (Vartanian 2012, p.8). Discussion Louboutin’s distinct designs and signature features red-sole, high-heeled shoes are highly popular, especially among celebrities. Lo uboutin applies individualized approach when designing his collections to guarantee that he generates consistently innovative and desirable collections. His designs can be regarded to be in different, but highly appropriate design. This reinforces the notion that Louboutin’s shoes are not simple pieces of clothing, but also pieces of art (Renfrew and Renfrew 2009, p.117). Louboutin managed to develop an unmistakable signature by ensuring that all of his shoes featured bright red soles. A characteristic pair of his luxury shoes might also feature a stiletto heel and upper parts of coloured leather or exotic reptile skins. The price of the shoes normally ranges around $800 a pair. Louboutin’s shoes are renowned globally for their remarkably innovative design and distinctive glossy red sole. Louboutin’s lacquered red sole trademark is perceived as a â€Å"subtle status symbol† and can be regarded as highly alluring relative to the overt branding of the big-n ame luxury brands (Rauf and Vescia 2007, p.16). Louboutin contended that his utilization of the red colour mirror his conviction that red colour is a symbol of passion, blood,

Tuesday, October 29, 2019

Discuss the evolution and problems of post colonial african Essay

Discuss the evolution and problems of post colonial african governments. What trends can we dicern What theories have been offered to explain these development - Essay Example Encouraged by the findings of European explorers Livingstone, Pinto, Burton, and Grant in the early 19th century, hordes of Europeans backed by their armies sailed south of Europe and began the work of colonization. It was to avoid the infighting and conflict that the Berlin Conference was organized. The colonization efforts were ruthless and resulted in the near-total destruction of African culture. Africa at the time was a land of more than a thousand tribal kingdoms, each with its specific culture and forms of government, and as is common with peoples the world over, likewise engaged in their own intergenerational and inter-tribal wars involving territory and natural resources. Ravaged by diseases and harsh living conditions, the populations of these African kingdoms were expanding slowly, limited only by their ability to tame nature. This was the continent which the Europeans invaded with "guns, germs, and steel" (Diamond 4) and set quickly to work in ravishing. Another strong influence of the colonists was their belief that Afric... Thus, aside from ambitious explorers, businessmen, and soldiers, the European nations sent Christian missionaries to teach Africans the European ways that the latter deemed more superior. How the combined efforts of material and spiritual colonization affected African culture explains much of what happened after their colonial masters left by the end of the 20th century. The decision that probably caused the most damage was the territorial boundaries established by the European powers in complete disregard for natural boundaries formed by the language, religion, or ethnicity of the Africans. Almost overnight, tribes were split, dividing families and societies. Until 1914, the Europeans divided Africa into fifty states, putting together warring tribes and dividing friendly tribes. This explains the incidents of ethnic violence that continue to explode in recent times in countries like Nigeria, Rwanda, Sudan, and Somalia. In each of these countries, different warring tribes were forcibly put together, continuing the tribal conflicts whenever people from each tribe assumed political power (Shillington 115; Pakenham 174). It is this tribal conflict that is also a prime cause of so much government corruption, because the tribal links are stronger than the artificial sense of nation that decades of colonization failed to achieve. Aside from the forced union of tribes, colonization had as a major objective that of spreading cultural influence through the language, religion, and customs. This is what the French did, and explains why former French colonies like Algeria have better infrastructure such as a functioning education system, government bureaucracy, and are better assimilated with European culture. It also had better telecommunications and transport

Sunday, October 27, 2019

Online Course Registration And Management System

Online Course Registration And Management System Currently the Microsoft IT Academy in Multimedia University Melaka using the website that hosted in MMU server to provide information regarding the course offered as well as the registration method to enroll on the specific course. As the course registration is still done manually, below is the summary of the problem on the manual method: User : It consumes time as user is not enabling to book the seat if they have not submitted the form manually together with official receipt to the instructor. The user can pay the registration trough many ways, such as Online Banking, but they still have to submit the official receipt taken from Multimedia University finance division. Administrator/Instructor : Administrators have to wait until the number of registrant fulfills the minimum requirement of the course to open class. All registration related must be done manually, as no online system available yet. Financial report must be also done manually in order to keep track of the financial progress of the courses. Project Objective The project objective will be focused on developing an online course registration to ensure the effectiveness of the flow of registration. Moreover the system will offer a complete management system that integrated with the online course registration to help the stakeholder for maintaining the flow process of the course. The registration process can be done online without the need of paperwork anymore. It is also help the student to get more information about the course process while they enrolled. The administrator will get easier way to determine the seat of the courses, keep track of the registration module, and generate report for the year to help them determine the development of the courses. The cores of objectives of the project are followings: To study existing course registration system in Microsoft IT academy of Multimedia University. Analyzing current course registration system, by interviewing the stakeholder of the system. To propose an online course registration and management system. To identify the user requirement for online course registration and management system. To develop an online course registration and management system. To evaluate the online course registration system that been develop. Project Scope The studies will develop an Online Course Registration, specifically for the Microsoft IT Academy in Multimedia University. With this system, it will affect the stakeholder of the Microsoft IT Academy Multimedia University Melaka Campus such as: Administrator /Instructor The Administrator for the system will be divided to several privileges on how they can use the system. Administrator for example, have all the privileges such as adding instructor, adding courses, update information, adding downloadable material, registration module, etc., but Instructor only have several privileges on what they can do and not do in the Online course registration and management system. Student/User Student will get a more accessible way in order to register and booked the seat for the courses. They also can get updates from administrator keep track on the progress of the course. Significance of Project This final year project for intelligence online course registration will not only provide basic feature to the user as well as administrator, but will be also completed with these features: Online Chat Helpdesk Support System The Helpdesk Support System will allow the user to interact with the administrator in case if they have certain question to be asked regarding the course or the registration flow. Security Security of the website is one of the main concerns to be improved as the registration is moving from traditional to online based. The reason is because user will send their confidential data to the system. Some user might use the same login ID or password, and without proper security, the data might be accessed by third party, or the user session is hijacked while sending the data. The security improvement will also provide log to the administrator in case there are some abnormality in the system after some user log in. As the security improved, we are giving the user a better understanding why they should trust our system. Limitation of Project In this project there are 2 objectives to achieve which are developing online course registration and management system for the Microsoft IT Academy Multimedia University Melaka. This project will focused on how to make the registration flow as simple as possible and also automated in the flow process. However there are limitations which is not be covered in this project. Even though the registration for the user will be done online, some flow of the process will be still done manually, such as submitting the official receipt of MMU to instructor. This is because of Multimedia University policy that not allows administrator to access the student financial report. Yet the system itself will allow user to upload the proof of payment trough online registration. Structure of Report This report consists of 5 main chapters. The first chapter, Chapter 1 which is Introduction presents overview of the project, the problem statement of the study state the problem occur on the current system, the project scope, objectives of the study that explain about the project main goals that need to be achieved, and structure of the report as well as the limitations of the project. Chapter 2 which is Literature Review state explains about materials used to study for the proposed system later, literature review also briefly explain some previously system that use same the technology in registration system. Chapter 3 is Methodology; and this chapter explains about the methods and tools that will be used to develop the system. It also gives some explanations why the methods and tools are chosen in the project. Chapter 4 which is the Proposed Solution and Implementation Plan or Design, this chapter presents the plans on how the system developed as well as the design of the system. This chapter mainly consists of diagrams to describe the design of the proposed system and some little explanation about the proposed system. Chapter 5 is conclusion; this chapter will summarize the conclusion of the objective stated. Chapter Summary In this Final year project the main objective is to propose and develop an online registration and management system that will facilitate the user as well as the administrator in order to keep the flow of registration more compact and efficient. This chapter explains the scope of the project which will affect the Microsoft IT Academy in Multimedia University Melaka stakeholder. Moreover in this chapter also describes about the problem that the current system where most of the flows still done manually. Chapter 2 Literature Review Online course registration and management system has become a necessity in order to create simple and accessible way to support today system. The internet has dramatically changed the role of Internet today (Cassidy 2002:1). Internet is the tool or vehicle for many applications, as well as to maintain registration for government, companies, and many events. This is happen as result of the simplicity of internet access in many part of the world. 2.1. Online Course Registration Johnson and Manning (2010) stated that the two biggest differences between registering online and mailing in your paperwork are time and technology. It can take time when users have to fill in the form, and then submit it in some other places. Instead of taking time, technology has helped us to make the registration procedure into the next level. You can find more information about the courses you want to take and in the same time fill up the form, pay the fees, etc. The staff that receives registration information most probably will process the information in same system, so by using online course registration and management system, we can save time. 2.1.1. Online Course Registration and Management System An Online course registration and Management System is systems that maintained the registration flow for the user and provide extensive capability for the administrator to maintain the content, report, and ability to add, update, or delete the content of a system. Currently there are many applications that have the ability to manage registration online. Some of them are very simple, and more complicated that use current technology. Almost all web based programming language support the capability to make online registration, such as PHP or .NET provide many option to build intelligence course registration and management system. A good system must be able to provide sufficient information and services needed by user as well as delivering extensive report to the administrator (Anggarwal.2003:233). 2.1.2. Existing Online Course Registration and Management System Most of the Online Course Registration and Management System are mostly used in educational institution and professional courses. This is to avoid time consuming of managing numerous users and prevent error from manual method. Based on that, people tend to use Online Course Registration and Management System. There is some Online Course Registration and management System that researched and improves, such as: Wylie Course Registration The C-Registration System will replace the existing mainframe course registration system at Wylie College. The new system will interface with the existing Billing System and Course Catalog Database System as shown in the context diagram below (see Figure 2.1). The C-Registration System will consist of a client component and server component as illustrated in Figure 2.2. The server component resides on the Wylie College UNIX Server. The server component must interface with the Billing and Course Catalog Database Systems on the College DEC VAX Main Frame. This interface is supported by an existing Open SQL Interface. The client component resides on a personal computer. The College PCs will be setup with the client component installed. Any non-college PCs must download the client software from the UNIX Server via the Internet. Once the client component is installed on the PC, the user may access the C-Registration System from the PC through the College LAN or Internet. A valid ID number and password must be entered in order for access to be granted. Figure 2.1 C-registration System Context Diagram Figure 2.2 C-Registration system overview The C-Registration system has many capabilities which will be explained the following table: Table 2.1 C-Registration capabilities Costumer benefit Supporting features Up-to-date course information The system accesses the Course Catalog Database for up-to-date information on all courses offered at Wylie College. For each course, the Students and Professors may review the course description, Prerequisites, assigned teachers, class locations, and class times. Up-to-date registration information All course registrations are immediately logged in the Registration Database to provide up-to-date information on full or cancelled courses. Easy and timely access to course grades Students can view their grades in any course simply by providing their user ID and password. Students may access the registration system from any College PC or from their home PC via the internet. Professors enter all student marks directly into the Registration Database from their PCs. Access from any College PC Students may access the registration system from any College PC or from their home PC via the internet. Installation of the client component of the C- Registration System on a PC is an easy to follow process using the internet Easy and convenient access from your PC at home Students may access the registration system from any College PC or from their home PC via the internet. Secure and confidential A valid user ID and password is required to gain access to the C-Registration System. Student report card information is protected from unauthorized access. Instant feedback on full or cancelled courses All course registrations are immediately logged in the Registration Database to provide up-to-date information on full or cancelled courses. Online Course Registration System for the Faculty of Engineering in University of Peradeniya In the system developed by the University of Peradeniva, there are some necessity in online registration course that should be included in the system, such as: Authentications and Authorizations of users; Administrators should be able to decide time period for the registration (before the start of the semester) and time period for the add/drop period (at the beginning of the semester); Administrators should be able to enter required data into the system such as courses, students, advisers and examination results; Advisers are allowed to view filled registration form of each student and accept/ reject the registration; Students should be able to view current courses and previous results, to register or add/drop new semester courses; Users should be able to change their passwords and personal information; and In the absence of a relevant adviser, the head of the department should be able to accept the online registration forms. All users have their own usernames and passwords to access the system and they have the ability to change their passwords. They will be given separate entry levels to access the system. Figure 2.2 depicts the use-case diagram of the system. Administrators are the staff officer at the Office who is responsible for course registration. They have the authority on deciding time durations, entering required details and finalizing registrations. Figure 2.3 use case of the online Registration in University peradeniya Advisors are all the department heads and lecturers who are assigned as advisers for students. They are capable of viewing courses, student details and results and accepting or rejecting registration forms. Student category contains everyone who has registered for a degree programme in the faculty. They are allowed to view available courses, their details and results, and to complete their registration forms and add/drop forms. The system that being used will be detailed explained in the table below: Table 2.2 system used in Online Course Registration of university peradinya Technology Usage Dream Weaver GUI Design CSS Additional Features in GUI Design ASP.net Programming Design Ajax Client Script Development SQL Server 2000 Database Design IIS Web Server to host the system Crystal Report 9.0 Generate reports. As the system works, it has not only reduced the burden of all parties involved in the course registration process, but also improved the process by reducing errors. Secure Online Application The real test of a secure Web Application occurs when it comes time for users to log in and access your site (Burnett,Mark.2004). Login screen is look simple. User just provide the username and password, the system will authenticate it to access the system. Authentication establishes a users identity. Once this identity is proved valid, the user is authorized (or nor authorized) to access various features of the Web application. 2.2.1 User authentication Threats The primary threats with user authentication are: Account hijacking This involves taking over the account of a legitimate user, sometimes denying the rightful user access to his or her account. Man-in-the-middle Intercepting Web traffic in such a way that the attacker is able to read and modify data in transit between two systems. Phishing A type of man-in-the-middle attack in which the attacker lures a legitimate user to enter a password through a fake e-mail or Web form designed to look like that of a legitimate Web site. Unauthorized access Gaining access to restricted content or data without the consent of the content owner. Information leakage Revealing or failing to protect information that an attacker can use to compromise a system. Privilege escalation Allowing an attacker to gain the access privileges of a higher-level account. Sniffing Using a network-monitoring utility to intercept passwords or other sensitive information that traverses a network. Because the login form plays such an important role in authenticating users, it is important to protect the form itself from flaws. A poorly written login form is vulnerable to password sniffing, information leakage, and phishing. Furthermore, the form itself may be vulnerable to flaws such as SQL injection and cross-site scripting. 2.2.2. Secure Authentication In ASP.NET the IIS provides four standard methods for authentication: Basic authentication Digest authentication Integrated Windows authentication Client certificate mapping Basic Authentication Basic authentication works by prompting a Web site visitor for a username and password. This method is widely used because most browsers and Web servers support it. The benefits are: It works through proxy servers. It is compatible with nearly every Internet browser. It allows users to access resources that are not located on the IIS server. Basic authentication also has some drawbacks: Information is sent over the network as cleartext. The information is encoded with base64 encoding, but it is sent in an unencrypted format. Any password sent using basic authentication can easily be decoded. By default, users must have the Log On Locally right to use basic authentication. Basic authentication is vulnerable to replay attacks. Because basic authentication does not encrypt user credentials, it is important that traffic always be sent over an encrypted SSL session. A user authenticating with basic authentication must provide a valid username and password. The user account can be a local account or a domain account. By default, the IIS server will look locally or in Active Directory for the user account. If the user account is in a domain other than the local domain, the user must specify the domain name during logon. The syntax for this process is domain nameusername, where domain name is the name of the users domain. Basic authentication can also be configured to use user principal names (UPNs) when you use accounts stored in Active Directory. To prevent exposing user credentials to others on the network, it is essential that you always use SSL with basic authentication. Note that basic authentication causes the browser to send user credentials to every page on the same site or within the same realm, not just the login page. If you dont use SSL on every page, user credentials will be visible on the network. One way to prevent these credentials from being sent on unprotected content is to use a unique realm for protected and unprotected content. Digest Authentication Digest authentication has many similarities to basic authentication, but it overcomes some of the problems. Digest authentication does not send usernames or passwords over the network. It is more secure than basic authentication, but it requires more planning to make it work. Some of the similarities with basic authentication are: Users must have the Log On Locally right. Both methods work through firewalls. Like all authentication methods, digest authentication does have some drawbacks: Users can only access resources on the IIS server. Their credentials cant be passed to another computer. The IIS server must be a member of a domain. All user accounts must store passwords using reversible encryption. The method works only with Internet Explorer 5.0 or higher. Digest authentication is vulnerable to replay attacks, to a limited extent. Digest authentication is secure due to the way it passes authentication information over the network. Usernames and passwords are never sent. Instead, IIS uses a message digest (or hash) to verify the users credentials. In order for digest authentication to work, all user accounts must be stored using reversible encryption in Active Directory, which may be a potential risk. After this setting is enabled for a user account, the users password must be changed to create the plaintext copy. Digest authentication does provide more security, but for most Web sites, the limitations of this method outweigh the benefits. One interesting peculiarity with IIS is that when you send authentication headers to a client, it will send the basic authentication header before the digest one. Many Internet browsers use the first header they encounter and therefore opt for the weaker basic authentication. Integrated Windows Authentication Integrated Windows authentication is also a secure solution because usernames and passwords arent transmitted across the network. This method is convenient because, if a user is already logged on to the domain and if the user has the correct permissions for the site, the user isnt prompted for his or her username and password. Instead, IIS attempts to use the users cached credentials for authentication. The cached credentials are hashed and sent to the IIS server for authentication. If the cached credentials do not have the correct permissions, the user is prompted to enter a different username and password. Depending on the client and server configuration, integrated Windows authentication uses either the Windows NT LAN Manager (NTLM) or Kerberos for authentication. You cannot directly choose which one is used; IIS will automatically choose a method based on the server and client configuration. The Web browser and the IIS server negotiate which one to use through the negotiate authentication header. Both Kerberos and NTLM have their own advantages and disadvantages. Kerberos is faster and more secure than NTLM. Unlike NTLM, which authenticates only the client, Kerberos authenticates both the client and the server. This helps prevent spoofing. Kerberos also allows users to access remote network resources not located on the IIS server. NTLM restricts users to the information located on the IIS server only. Kerberos is the preferred authentication method for an intranet Web server. However, the following requirements must be met for Kerberos to be used instead of NTLM: Both the client and server must be running Windows 2000 or later. The client must be using Internet Explorer 5 or later. The client and server must be in either the same domain as the IIS server or in a trusted domain. Integrated Windows authentication has a few limitations: It works only with Internet Explorer 3.01 or later. It does not work through a firewall. The client will use the firewalls IP address in the Integrated Windows hash, which will cause the authentication request to fail. Client Certificate Mapping Client certificate mapping is the process of mapping a certificate to a user account. Certificates can be mapped by Active Directory or by IIS. Both of these methods require Secure Sockets Layer (SSL). There are three types of certificate mappings: One-to-one mapping Many-to-one mapping UPN mapping Certificate mapping is the process of linking a certificate to a specific user account. Normally, if we wanted to give a user authenticated access to the intranet; we would either create a user account or allow the user to log in using his domain account. Creating duplicate accounts is time-consuming, yet if users use their domain accounts, there is the concern that their domain passwords could become compromised. To provide better security and reduce the administrative workload, we could choose to issue each user a certificate. Certificates can be used to verify a users integrity. It is actually more efficient to use a certificate than a user account because certificates can be examined without having to connect to a database. It is generally safer to distribute certificates than user accounts. Furthermore, it is much easier to guess or crack someones password than it is to forge a certificate. Chapter Summary This chapter discusses the material research as well as basic understanding of the online course registration and management system. The material provided is to help and understand the project, and how the system can improves the registration and management system. Chapter 3 Methodology 3.1. System Methodology It is important to understand that an information system has a life cycle, just as living system or a new product has. System analysis and design constitute the key stage of system development life cycle (ISRD Group, 2007). System Development Life Cycle has several phases which are planning, analysis, design, implementation, and maintenance. Figure 3.1 System Development Life Cycle 3.1.1. Planning Planning is the first phase in the System Development Life Cycle, in this phase the necessity of the system has to be identified (Hoffer, et al., 2005). The objective, scope and the main reason to develop the system has been explained in previous chapter. 3.1.2. Analysis The second phase is the analysis phase, which during this phase an analysis on the system requirement is being held (Hoffer, et al., 2005). The output of this phase is a description of the recommended solution by determining the problems and requirements. In this phase information regarding of the project is gathered, the information gathered then can be studied to help the understanding about the project. In this project analysis phase determine what method used to build the system later on. In this phase, we interview the stakeholder of Microsoft IT Academy Multimedia University (see appendix for detail) In analysis phase, we determine: Detailed evaluation of current system Data Collection User Requirement 3.1.2.1 Current System Evaluation Figure 3.2 System flow of the system Figure 3.2 show the current system flow of the MSITA. The flow show that some part still done manually, such as filling form and registration (student have to download form from website, pay the course fees to MMU finance, and submit the official receipt to the instructor). The website that being used now is using ASP.NET as programming language, but there is no online registration capabilities. The website is used for content management system only. All the registrant will be input manually by the instructor. 3.1.2.2. Data Collection To ensure that we understand the flow of the current system, we need to identify the stakeholder of the system, such as: Table 3.1 Stakeholder No Stakeholder Name Stakeholder type Roles 1 Instructor Instructor of Courses Provide Course material, provide place/lab for the course exercises , manage registration for user 2 MMU Finance division Registration Payment Submission Receive Payment from Costumer, Issue Official Receipt for registration 3 Student User/Costumer Register for the course, submit receipt for registration, participate in course as scheduled, take certification exam From the stakeholder above, we already identify that the most influence entity are the User and Instructor of the course. We will then identify the problem on the current website. Function of Microsoft IT Academy Website As main website for student for : Check latest/available course offered by MSITA team. Check schedule for the course Check registration procedure (Download Registration Form) Download notes/material for the course (only for registered user) Technical Detail of Microsoft IT Academy Website Technology Used : ASP.NET Other Items considered Course material is given trough the class Registration of the course still done manually (student have to download form from website, pay the course fees to MMU finance, and submit the official receipt to the instructor). The reason why the registration still done manually : Sometimes there are changes in registration procedure (e.g. minimum requirement for the number of the student to open the courses, some courses is added/removed). Need the proof of payment to confirm student registration. Figure 3.3 MSITA website details 3.1.2.3 User Requirement As the main concern of the development in MSITA website, we need to make the registration process and also maintenance of the website online; these are the requirement of the proposed solution: Table 3.2 User requirement User Side Administrator Side User can register in the MSITA website as website member as option before they register to the course Administrator panel Student registered as website member need to fill course to take in future/next trimester in order to keep track the estimated number of course offered. Add/Remove course Student can fill the registration form trough MSITA website. Automatic Email to all student registered Student can upload scanned proof of payment trough registration form Registration module for administrator Student can fill option to take exam after course registration in order to get exam voucher Financial Report of the year 3.1.3 Design Design Phase required us to determine the logical and physical design of the system. We need to determine the system features and all other necessary requirement for the system. Later on in the next phase of the project we will transform the logical design into fully working system. 3.1.4 Implementation The fourth phase is implementation. In this phase the physical design of the system will be programmed into a working system (Hoffer, et al., 2005). In implementation coding, testing, and installation will be included. In coding, the system will be programmed to a working system. After it programmed the system will be tested to find errors and bugs in the system. Lastly, during installation the system will be installed and ready to use. In the phase 1 of the project implementation of the system is not going to be built. The implementation phase will be held during the second phase of the p