Featured Post

Death Speech- a Streetcar Named Desire Essay Example

Demise Speech-a Streetcar Named Desire Paper Blanche’s demise discourse assumes an essential job in the improvement of the play â...

Tuesday, October 29, 2019

ZAPPOS the largest online shoe retailer Essay Example | Topics and Well Written Essays - 1500 words

ZAPPOS the largest online shoe retailer - Essay Example It achieves a competitive advantage over its rivals through the loyalty business strategy and the liaison marketing that is embraces. The key source that contributes to the growth and development of Zappos.com is the recurring customers and the oral recommendations from consumers that receive quality services. Over its course of operation, this company has over 75% of recurring consumers. The customer service has a better reputation that is augmented by the online trust drivers that the company utilizes in increasing its loyalty, credibility, and trust among others towards the buyers. Internet marketing has tremendous influenced the welfare of this organization. I used to navigate through the website aimlessly and after I was assigned the task of searching its validity, I had to evaluate its website in order to ensure that, it is a reliable website and one could place an order with ease. In my evaluation, I consulted various scholars, researchers, peer-reviewed sources, and so forth in order to determine the forces behind Zappos.com being the largest online shoe retailer. Online trust was the key aspect that enhanced the wellbeing of Zappos.com (Cheskin/Sapient Report, 1999). It is essential to adopt an acceptable definition of trust before commencing on this topic. According to† (Rousseau, Sitkin, Burt and Camerer, 1998, p. 395), â€Å"Trust is an emotional state that comprises the aim to accept the liability established on the positive anticipations of behaviors of another†. Trust entails the enthusiasm to agree to the susceptibility, but with hope that a person can depend on the other party (Lewicki et. al. 1998; Moorman, Zaltman & Deshpande, 1992; Morgan and Hunt, 1994). In internet marketing, trust is perceived in lieu of relationship marketing (Doney and Cannon 1997; Dwyer, Schurr and Oh 1987; Ganesan 1994; Ganesan and Hess 1997; Morgan and Hunt 1994). In addition, in studying the Buyer –seller interactions, trust between the two perso ns takes time and depends on the observations that the buyer makes on the seller’s, consistency, constancy and credibility (Anderson and Narus, 1990; Doney and Cannon, 1997; Gane san, 1994). This view is unswerving with the behavioral reliance proposed by Schlosser, White, and Lloyd, 2003). Online trust, or rather the trust on the internet, greatly differs from offline trust in significant ways. As opposed to the offline trust, the key thing in online trust in the website, application of internet in transactions and the technology used. The website used by a firm can make a good foundation in building the customers trust, and thus enhancing the reputation of the seller (Jarvenpaa et al. 2000). The manner in which a customer would relate to an offline seller is similar to his/her dealing with a website and customers develop views of trust in a website depending on their relationship with the website. To the degree that a customer develops some positive impact about a website a nd accept liability, he/she must develop some trust with the website. The customers view pertaining to the competence of a website to carry out its purpose, and its perception in offering quality services behind the online business is contributive to his/her insight of trust in the website. In this context, online trust comprises customer perceptions of the way the site would deliver based on the expectations of the customer, and the authenticity of the information and self-assurance of the site. There are various perceptions driven by numerous precursors. Effects of Drivers of Online Trust Even though, online trusts have numerous potential antecedents and impacts, as detailed by Shankar et al. (2002), based on

Sunday, October 27, 2019

Compare And Contrast Ipv4 And Ipv6

Compare And Contrast Ipv4 And Ipv6 Before we discuss about how the IP works at the network layer to provide connectionless, best effort service to the upper layers, we should understand what the role of IP is. To help us more understand about the question. Below are a few explanation of the important role in the question. The Internet Protocol (IP) IP is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP, while the connectionless service is provided by IP version 4. IP version 4 is just design with limited lower overhead to ensure it deliver speed. The Network Layer -It is the 3rd layer of the seven-layer OSI model of computer networking. The network layer responds to service requests from the transport layer and issues service requests to the data link layer. Upper layer The last 3 layers of the OSI model, Session, Presentation and Application layer are referred to the Upper layers. These layers are responsible for applications communicating between hosts. None of the upper layers know anything about networking or network addresses. Connectionless/Best effort Service communication between two network end-user in which a message can be sent from sender to receiver without knowing of the receiver. The Internetwork Protocol (IP) provides a best effort network layer service for connecting computers to form a computer network. Each computer is identified by one or more globally unique IP address. The network layer PDUs are known as either packets or datagram. Each packet carries the IP address of the sending computer and also the address of the intended recipient or recipients of the packet. Other management information is also carried. The IP network service transmits datagrams between intermediate nodes using IP routers. The routers themselves are simple; since no information is stored concerning the datagrams which are forwarded on a link. The most complex part of an IP router is concerned with determining the optimum link to use to reach each destination in a network. This process is known as routing. Although this process is computationally intensive, it is only performed at periodic intervals. An IP network normally uses a dynamic routing protocol to find alternate routes whenever a link becomes unavailable. This provides considerable robustness from the failure of either links or routers, but does not guarantee reliable delivery. Some applications are happy with this basic service and use a simple transport protocol known as the User Datagram Protocol (UDP) to access this best effort service. Internet Protocol provides in Version 4 (IPv4) is to ensure that the IP packet header is error-free through computation of a checksum at the routing nodes. This has the side-effect of discarding packets with bad headers on the spot, and cause the lost of data packet. The design of internet protocol is one of the reason cause connectionless services. It assumes that the network infrastructure is inherently unreliable at any single network element or transmission medium and that it is dynamic in terms of availability of links and nodes. Without any central monitoring or performance measurement facility exists that tracks or maintains the state of the network. So in order to easy the work, the intelligence in the network is purposely mostly located in the end nodes of each data transmission. Because of it, the network only can provide the best transmission and it was call the best-effort protocol. Advantages: They are stateless having no previously defined protocol. It is easily accessible. Fast deliver Speed Disadvantages: The lack of reliability allows any of the following fault events to occur: data corruption lost data packets duplicate arrival out-of-order packet delivery The primary goal of IP is to provide the basic algorithm for transfer of data to and from a network. In order to achieve this, it implements two functions: addressing and fragmentation. It provides a connectionless delivery service for the upper-layer protocols. This means that IP does not set up a session (a virtual link) between the transmitting station and the receiving station prior to submitting the data to the receiving station. It encapsulates the data handed to it and delivers it on a best-effort basis. IP does not inform the sender or receiver of the status of the packet; it merely attempts to deliver the packet and will not make up for the faults encountered in this attempt. This means that if the data link fails or incurs a recoverable error, the IP layer will not inform anyone. It tried to deliver (addressed) a message until failed. IP submits a properly formatted data packet to the destination station and does not expect a status response. Because IP is a connectionless protocol, IP may receive and deliver the data (data sent to the transport layer in the receiving station) in the wrong order from which it was sent, or it may duplicate the data. Again, it is up to the higher-layer protocols (layer 4 and above) to provide error recovery procedures. IP is part of the network delivery system. It accepts data and formats it for transmission to the data link layer. (Remember, the data link layer provides the access methods to transmit and receive data from the attached cable plant.) IP also retrieves data from the data link and presents it to the requesting upper layer (Naugle, 1999). Compare and contrast IPv4 and IPv6. Justify your answer. There are two version of the internet protocol are implemented in the network layer today, which is Internet Protocol version 4(IPv4) and Internet Protocol version 6(IPv6). Today, most the internet are still implement the IPv4 but some of the internet are already move to IPv6, which is the newest version of the internet protocol. He also said that the Internet Protocol version 5(IPv5) is for experimental purpose, not for deployment purpose (White, 2009, p.348). There are differences between the current of IPv4 and IPv6. The main difference between the IPv4 and IPv6 is the addressing of the IPv4 and IPv6 that provided. White (2009, p.348) elaborate that there have only 32-bit addresses that used by IPv4, which means only support until 32-bit of the IP address that provide by IPv4. Forouzan (2007, p.549) argues with White that the IPv4 is 32-bit address, which mean the IPv4 address are unique, means the address are only one and universally when the connection between the source and destination. Forouzan also stated that the two devices cannot have the same internet protocol (IP) addresses when the connections are established between the source and destination. For example, if the source or destination at the network layer has m connections to the Internet, it will require having m address. In IPv6, there have 128-bits long address that provided by IPv6 compare to IPv4, which consist of 32-bits address, means that the IPv6 address consist 4 times to IPv4 address! Another difference between the current of IPv4 and IPv6 is the notation of the address that shown by the IPv4 and IPv6. Currently, the IPv4 addresses are being show as 32 bits in binary notation, which is support 1 and 0 only. 1 is represent hostid and 0 is represent netid, and also computer only can understand the language which the human cannot understand. Each 8 bits are representing 1 octet, mean the 1 octet are consist of 1 byte. That why IPv4 are only support to 32-bit of address or 4-byte address. The following to show the example of the IPv4 address in binary notations: 01110101 10010101 00011101 00000010 In order to make the human can understand and read the binary notation, the internet are converted the binary-notation into decimal and separating the byte by using dot. The following to show the example of the IPv4 address in dotted-decimal notation: 117.149.29.2 Refer to the figure 1.0, it represent that both the binary notation and dotted-decimal notation of the IPv4 address. Because each octet are represent 8-bits, the range of each octet are 0 until 255(Forouzan, 2007, p.550). Figure 1.0 Dotted-decimal notation and binary notation for an IPv4 address (Source: http://www.comptechdoc.org/os/linux/manual4/ipdecimal.html). Similar to IPv6, the IP address in IPv6 also represent in binary notation. Only different is the IPv6 are using the hexadecimal colon notation to make the address understandable and readable. Refer to figure 1.1, 128-bit are being divided into 8 sections in the hexadecimal colon notation. Each section has 2 byte and each 2 byte is requiring 4 hexadecimal digits (Forouzan, 2007, p.567). Figure 1.1 IPv6 address in binary and hexadecimal colon notation (Source: http://www.slideshare.net/WayneJonesJnr/ch19-3361671) Another the different between the IPv4 and IPv6 is the IP datagram format that represent by the IPv4 and IPv6. In IPv4, there are 15 fields in the IPv4 packet header. Refer to the figure 1.3, it show that the number of the field, the format of the IPv4. The Version field contains the version of IP, which is version number of the IPv4 is number 4 and ensures the device send the packet through to the internet from source to destination implement the appropriate various field. The Intermediate Header Length (IHL) specifies the size of the packet header, which the multiples of 32-bit words. If the options require in the datagram, it will require filling the padding bytes with unusual multiple of 32 bit. The Type of Service (TOS) fields allow the process to determine the precedence, which is relative priority of the application data and preferred attributes associated the following path. The Total Length (TL) or Packet Length (PL) field will display the whole packet size, including byte of header and data (Halsall, 2005, p.322). The Flags field consist three control flags, which is reserved control flags, Dont Fragment control flags and More Fragment control flags. Two control frags, which are Dont Fragment control flags and More Fragment control flags, use to control the fragmentation (The TCP/IP Guide, 2005). The Time-to-Live (TTL) field is to indicate the maximum the packet can be transmitted through the Internet. When the packet passes through the router, the TTL will decrement the number of transit of the packet remaining by one hop. When the TTL become 0, the packet will be discarded by the router. The Protocol field is enables the Network layer to pass the data to the correct upper layer protocol. The Header Checksum field is to identify the error at packet header. It also applied to protect from packet corruption during the transmission of the network. The Source Address and Destination Address field is containing the address where the packets send or comes from (Halsall, 2005, p.324). There are 5 fields in the options fields, which is copied fields, option class fields, option number, option length and option data. An option field is make all fragments of fragmented packets will save into the option if the option is being set by 1. Option class is define as a common option category, which 0 is represent control option and 2 is represent debugging and measurement option. The 1 and 3 is for reservation(Wikipedia,2010). Figure 1.3 IPv4 datagram/packet format and header fields (TCP/IP Guide, 2005) In IPv6, there are only 9 fields in the IPv6 packet header, means that the IPv6 field has been simplified compare to the IPv4, contains 15 fields, as shown in figure 1.4. The Version field contains the version of IP, which is version number of the IPv6 is number 6 and ensures the device send the packet through to the internet from source to destination implement the appropriate various field (TCP/IP Guide, 2005). The Traffic Class field is similar function as TOS in IPv4, which is allow the process to determine the different priority of the application data and preferred attributes associated the following path (Akashah, 2006). The Flow Label field is provided the additional support datagram delivery and quality of service (QOS) features with creating a large field. The Payload Length field is does not like the TL field from the IPv4, which is display whole size of packet but only display the payload byte number. The length of the extension header would be counted if the extension header will be included, means including the Hop-by-Hop Option, Routing, Fragment, Encapsulating Security Payload (ESP), Authentication Header (AH) and Destination Option. The Next Header field is to determine the first extension header of the next header in the datagram if the datagram contain the extension header. If the datagram contain only the main header and does not contain the extension headers, it will function as the IPv4 Protocol field. It also contain the same value, which the IPv6 version of the common protocol use though the new number. The Hop Limit (HL) field is similar function as TTL from the IPv4 field, which is remaining life of packet travel through the internet before discarded by the router while become 0. The purpose of the HL is preventing the packet infinite loop at internetwork. Before the packet send to the destination, the sending host will set the HL value. When the packets pass through the router, the router will decrease the HL value by 1 and until become 0, the packet will be discarded. The Source Address and Destination Address is similar function as the Source Address and Destination Address from the IPv4 field, which Source Address is contain the address where the packet are comes from. The Destination Address is contain the address that where the packet send to. Figure 1.4 IPv6 datagram/packet format and header fields (TCP/IP Guide, 2005) Section 2 Introduction of the chosen game. The three games that we choose is Peter Packet. Peter Packet is the education game represents the how the packets deliver through the internet. These games also represent how the packet can avoid from attacking virus and hackers. This game also can learn the lesson while the players play this game. How to play the chosen game? You may print screen the layout to support your reports. Here we have the instruction how to play the Peter Packet this game. This is Peter Packet. He is responsible to deliver the life packet through the internet. Figure 2.0 The screenshot is represent which difficulties you want to choose. Before you want to play this game, first you want to choose the difficulties of the game as show in figure 2.0. Figure 2.1 The screenshot is show which destination you want to choose After we choose the difficulties, then we choose which destination we want to proceed as shown in figure 2.1. This bar is show that the health status of the character.After we choose our destination we want, then we will show you the instruction how to play this game. Click the skip button to skip this section. The bar is show you that how many mission remaining you want to complete. Click the character if you want learn more about it. Press the back button if you want proceed to next section. Press the back button if you want back to previous section. Press the help button if you want to learn the tutorial again. Press the mute button if you want to silent or you want the sound. Figure 2.2 Speed up the character by using mouse right or press the right arrow Figure 2.2 is show that if you want speed up the character you must press the right arrow or move the mouse to your right. Figure 2.3 Slow down the character by pressing left arrow or move the mouse left The figure 2.3 is show that if you want to slow down the character, you must press the left arrow or moves the mouse to left. Get the encryption shields to protect from being caught Figure 2.4 Get the encryption shields that protect from caught by Hackers. Figure 2.4 shows that if you want get rid from the Hackers; you must to get the encryption shields to protect the character. Otherwise you will jump up by using up arrow or move up mouse to avoid being caught. Same as the virus, if you want to kill the virus, you must get the antivirus spray Figure 2.5 double click or pressing the up arrow twice if you want the character adds a flip. Figure 2.5 shows that if you jump not enough high, you can apply the flip for the character by pressing the arrow twice or double click. What are the benefits of playing this game to each of your groups member? Share your experiences and justifications. Leong Yun Siong The Benefit that I gain from playing this game is know how the internet play role important are, how the packet pass through the internet and the world started to emphasis the education, especially the women and the children from hardcore poor family and the personal hygiene. I also know how the router chooses the faster path of the network and also know how the electromagnet interference will interrupt the packet will cause the network congestion. I also know how the packet segmenting and reassembling. Phang Won Meng The Peter Packet is a funny game which contains a lot of useful information. By playing this game, we can understand there are many obstructers like hacker, Viruses and Route disruptions may occur when the packet are under the deliver. The game also provides and friendly user interface design with meaningful explanations and introduction to let player can learn more efficiency when playing the game. Inside the story of Peter Packet, Users can also find a lot of extra information like can learn information about social and environmental challenges in 3 countries that are Zimbabwe, Haiti and India in the developing world. Inside the story of Peter Packet, Users can also find a lot of extra information like that many people have died of AIDS and been exposed to HIV in Zimbabwe. Peter has the mission of helping to spread the word about this disease and get international aid. Players learn about the problems of lack access to clean drinking water in Haiti caused by years of environmental degradation from the harmful practice of intensive clear-cutting of trees, resulting in pollution and saltwater contamination. This useful information will help increase users knowledge and improve his moral.

Friday, October 25, 2019

Heinz Halms Shia Islam: from Religion to Revolution Essay -- essays

Heinz Halm’s â€Å"Shi’a Islam: From Religion to Revolution†   Ã‚  Ã‚  Ã‚  Ã‚   In his 176-page volume, the leading German Islamist, Heinz Halm is able to trace the roots of the Iranian Revolution back throughout the history of the Shi’ism. Contrary to many western thinkers and Iranian militants, Halm feels as though Shi’i Islam’s character was not inherently revolutionary, but that the transition to revolution marked a milestone and a watershed in the history of Shi’i thought and history. The title of his book, â€Å"Shi’a Islam: From Religion to Revolution† really synopsizes Halm’s point quite adequately. Heinz Halm is currently a professor of Islamic Studies at the University of Tubingen and is the author of numerous other works on Sunni Islam, Shi’ism and Isma’ilism. Some of his works include: â€Å"The Empire of the Mahdi†, â€Å"The Rise of the Fatimids†, and â€Å"Shi’ism†.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"Shi’a Islam: From Religion to Revolution† is broken up into three sections, which play their respective parts in relaying Halm’s message. Part 1 deals directly with the origins of Shi’ism and is labeled â€Å"The House of Sorrows: The Twelve Imams.† In this section Halm attributes Abu Miknaf’s report of the Campaign of the Penitents or tawwabun to be of the key documents that allows us to understand the emergence of early Shi’ism. Halm went as far as to say that Abu Miknaf’s text and, therefore what is related in it, â€Å"already demonstrated all the essential elements that characterize the Shi’i religion today.† He went on to say that the â€Å"self accusations of the partisans†¦peaked in acknowledgement of their own shame and their desire to atone for this (the massacre at Karbala) with death.† Halm’s thesis in this section is that self-sacrifice characteristic of the Shi’is was exemplified, and even developed in this march of the tawwabun. And, this particular characteristic was politically instrumentalized during the revolution of 1979 and during the war with Iraq. Further, Halm traces the non-political character of the following Imams, especially Ja’far Assadiq. Halm further delves into the roles that the Fourteen Infallible Ones played in Shi’i theology, and as well the significance of the Occultation of the Twelfth Imam. He expresses that with the absence of the Twelfth Imam there was a lapse in the duties of the Imam, which over time had to be taken over by ‘ulama. ... ...ut the monopolistic position of the mujtahids and their claim to be emulated by their followers. Eventually the Akbaris would fade out into the periphery and by the nineteenth century the Usulis managed to gain widespread acceptance throughout the Shi’i world, and Halm claims that it had a key impact in transforming the role of the ‘ulama. The transformation, however, that Halm refers to occurred in the hands of Khumayni and Ali Shari’ati who managed to develop a â€Å"modern revolutionary ideology wrapped in traditional Shi’i images and symbols.† Shari’ati and his fellow idealogues, Halm claims, were guilty of dismissing fourteen hundred years of history and their goals were inherently very ahistoric and utopian. The de-ritualization of the ‘Ashura customs and elimination of the eschatological expectations of the Mahdi were responsible in transforming the Shi’i doctrine into a revolutionary ideology. Halm concludes by saying that revolutions do not develop from religious causes, but have political, economic and social triggers. And, like all modern revolutionary movements, the Iranian Revolution played upon a manipulated re-writing of history to benefit the momentum of the movement.

Thursday, October 24, 2019

Perception Toward Commit Suicide Among Utar Students Essay

Abstract This research is about the â€Å"Perception toward commit suicide among UTAR students†. We want to understand how the UTAR students think about suicide with carry different opinion from different races and gender. We will distribute 100 sheets of the questionnaire to UTAR students based on their races and gender. In this assignment, we will distribute 50 sheets of survey question to male students and 50 sheets for female students. In this questionnaire we also ask about UTAR student’s opinion which is â€Å"does suicide makes soreness disappear†? Most of the students answer no, because they think commit suicide cannot help them solve the problem, it just a way to deny from the problem. So they should think positively and find the solution because all problem have their own solution, just see how we view the issues. If we try to commit suicide it just make some trouble to our family because they will to face the society, maybe your neighbor will talk bad word abou t your family. Chapter 1: Introduction 1.1 Literature Review After our searching for whole week, we had found at least 5 academic journals with online source from not only Malaysia, but in other country in Asia too. From these journals and report, we able to have more understanding on suicide rate among several countries in Asia and Malaysia, the pattern, or the frequently used method, and even some of the reason for suicide. Two of the journals published by same organization, which is National Suicide Registry Malaysia, are about the research on Malaysia. One of them is explaining objective and the data collection method for research in NSRM, while another journal explain about what they found, example like stated out the high risk group, and the factor cause suicide, based on the data they collect so far. Another journal we found is not provided by NSRM, but also related to Malaysia. In this research, they concentrate about the race suicide method, and age group of suicide victim, this provide us helpful information that able us to see a mor e clear picture about suicide in Malaysia. Other two journals is talking about the research in other countries of Asia, one of them is a research conducted by World health Organization in 2008 regarding the suicide case among countries, while another is a old research that had conduct a similar research, which also the 48 countries, published by University of North Carolina Press in 1965. According to one of the journal we found (Quinney, 1965) even though there was no research conducted in Malaysia that time, but still, it enables us to know that a country economic development level will also affect the suicide rate. The other journals, which we found, had found a similar age group that has high frequency to suicide compared to other age group. The high risk group of suicide is 20-30, which is young adult stage (Hayati & Khairul, 2008; Nadesan, 1999; Hendin et al., 2008). These were also two journals, which is research on Malaysia, found out that the most common method people use to suicide is hanging, poisoning and jumping from height (Hayati & Khairul, 2008, Nadesan, 1999). The method of jumping off from height and by poisoning themselves cases had been increased, meanwhile hanging themselves has been decreased compared to two decade ago (Hayati & Khairul, 2008). In order to know more about suicide case in Malaysia, it was necessary to do more research within Malaysia for the factor of suicide, since we cannot deny the fact that media influence nowadays has slowly become one of the most influencing factor that increased suicide, example poisoning case had increased since Indian movie had introduced the way of suicide by consuming seed kernel of yellow oleander plant (Nadesan, 1999). 1.2 Research Question Our purpose of conducting this research is have a better understanding in study 2 main category group of UTAR students towards suicide cases. We decided to focus in both gender and 3 main races and others. We would like to look into Gender differences as our first research question by setting the question â€Å"What are the perceptions in gender differences towards suicide cases in Malaysia?† due to the reason that different gender will have different perception on that particular cases and will able to get more opinion and feedback. Besides, we also choose to concentrate in Races which including Chinese, Malay, Indians and others. â€Å"What are the opinions of difference races towards suicide cases in Malaysia?† will be our second research question. In this question we would like to find out all the different perception from different races due to culture issue or family background issue to view on suicide cases. Chapter 2: Method 2.1 Respondent In this research, our population is on UTAR student’s and we will choose 100 student’s as our sample. From the 100 student’s we will divide into 2 part which are the gender and the races because we are using the stratified sampling method. The definition of stratified samping method is we will dividing the population into groups according to some characteristic (Allan,2009,p.12), for example we will distribute the questionnaire equally to the student’s which is 50 male student’s and 50 female student’s, from the gender we will divide it into difference races. We plan to distribute 50 questionnaire to Chinese student’s, 30 questionnaire to Indian student’s, 10 questionnaire to Malay student’s and other races student’s. After that from the races we will divide it into 2 part which is the gender. 2.2 Apparatus We will use survey question to collect our data because it is the simple instrument to help us gain some data, we create the question by ourselves which is after having group discussion. In this questionnaire, it contain 10 question which incude 9 opended question and 1 closed ended question. We forming the question based on the 4 type of measurement which are norminal, ordinal, interval and ratio(Allan, 2009, p. 7-8). In this survey question it contain 1 ratio question, 4 norminal questions, 3 interval questions and 2 ordinal questions. 2.3 Procedure Activities| Week (duration)| The tutor briefly discuss about how to do the assignment and APA format.| Week 1| We start to form a group which is 5 people in the group. We discuss a topic which we interested in and finally we plan to do a topic which is â€Å"The Perception among UTAR Student’s toward Suicide†. We also distribute some task among the group members and find some journals that are related with the topic.| Week 2| In week 3, we discuss again among the group members and start to create a questionnaire that is related with our topic. After discussing, we plan to create 10 questions which include open ended and closed ended question.| Week 3| After that, we type the questionnaire and consult with the tutor and let her checks whether the questions are reliable to use or not. At the same time, we also give her check the journal whether it can be used or not. On the consultation time, she guides and teaches us how to complete this assignment.| Week 4| In week 5, after the tutor agrees with our questionnaire, then we start to print 100 sheet of survey question and distribute it to the UTAR students based on our sample.| Week 5| This week is our critical period which we have to collect all the data and interpret it. We also have to summarize all the data and create a graph to show that we done the entire task.| Week 6| Finally, this week is coming and we should hang in our assignment. Luckily we can do it on time. Chapter 3: Results Question 1: Which gender is the highest possibility to commit suicide? Most of the male respondents think that man is common in commit suicide, while most of the female respondents think that woman is common in commit suicide. According to the bar graph, the Chinese and Malay respondents think that woman has the highest tendency to commit suicide; while vice versa for the Indian and other races respondents who think that man has the higher tendency to commit suicide. Question 2: Which is the majority races involve in suicide? The pie charts above show that for male respondents, Chinese has the highest chance to involve in suicide and is followed by Indian. The UTAR male students think that just 10% of Malay will commit suicide and 0% for other races. However, in female respondents’ opinion, they think that 52% of Chinese will involve in suicide cases and is followed by Indian which is 40%. Lastly, only 8% of female students think that Malay will involve in commit suicide and 0% for other races. From this 2 pie chart we can conclude that most of the students think that Chinese is the highest chances to involve in this case. The bar graph above shows that most of the UTAR students think that Chinese is the majority race that involved in suicide. Indian is the second highest chance to involve in suicide cases and is followed by the Malay. No students choose for the others races because there is only a small population of other races compared to the three major races in Malaysia, so they are not easily involved in suicide cases. Majority of the UTAR Chinese student’s think that Chinese are easily to involve in suicide because they think that Chinese are afraid to lose, so they scared to share their problem with their family members or their friends even though when they faced any problem. Question 3: Which shows the most common range of age in commit suicide in Malaysia? Both male and female respondents think that age range between 17 and 21 has the highest tendency to commit suicide, followed by 22-26, 27-31, and then other age range which will be above 31. Age range between 12 and 16 has the lowest vote from male respondents but none from female respondents. Age range between 17 and 21 has the highest vote from the Chinese and Indian respondents, followed by the age range of 22-26 and 27-31. Age ranges of 17-21, 22-26 and 27-31 get the equal votes from other races. The age range between 27-31 get the highest votes while 22-26 get the lowest votes among the Malay respondents. Others age ranges which are above 31 got the same votes from Chinese and Indian respondents only, but no vote for the age range between 12-16. Question 4: In which condition will caused people have the intension to commit suicide in Malaysia? Based on the pie charts above, we can conclude that most of the UTAR students will give their idea on people who tend to suicide are due to the relationship issue with a percentage of 34% of male student and 42% of the female student. Besides, it can also clearly show that people do not put the blame on the mass media factor. According to the report of Hayati and Kamarul from National Suicide Registry Malaysia (NSRM) (2008), they stated all the young male adults will tend to commit suicide due to the reason of being stressed up with the transition to adult roles and relationship issues. It is also the timing in a higher risk of getting mental disorder, or easily access to alcohol and drugs to overcome their current issue. As the lowest possibility to the influences toward commit suicide is mass media where may be down to the reason that people may tend to learn from the drama or movie with related to suicide cases. The bar graph above shows that, all the races do agree with the point of view that most of the people who commit suicide are because of relationship issue. Current flow that showing a very obvious example of committing suicide caused by relationship issue which is the case of Alviss Kong. Before he commits suicide, he leaved the last message stated that his failure in love relationship with his girlfriend. He felt that he had nothing else to give him motivation to continue to stay alive. Most of the suicidal that because of relationship issue will tend to look in their relationship as a very important factor to stay alive. In another point of view for all the suicide among seniors in suggested risk factors such as including unemployment, isolation, poor health, pain, depression, alcoholism, low self-esteem, feeling rejected a history of mental illness, and previous suicide attempts (NSRM, 2008). As a result, most of the late middle-age people will face the financial problem due to unemployment and lack of self confidence. Question 5: Generally how Malaysian commits suicide? In this question, we ask the participants to rank the method of commit suicide from the most frequently used to the most rarely used based on their opinions.   First, we will look for the data by different opinion between both genders. According to the data we collect, both genders, which are male and female, got the same opinion that the Malaysians will always use jumping from height to suicide, then followed by wrist cutting. The participants from both genders also ranked that self-immolation is the most rarely method use in suicide in Malaysia. Then we collect the data and divide it based on the races. We found out that, in most participants, no matter what race they are, also think that jumping from height is the most frequently used method to suicide in Malaysia. Many of Chinese participants chose to believe that the second frequently used method to suicide is by overdose on medicine, which is a totally different from other race, which they think this method is rare method among Malaysian. Except for Indian participant, other race think that the self immolation method still is the rarest method that used in Malaysia. Most of the participant, regarding of their race and gender, also think that jumping from height is the most common used method to suicide in Malaysia. From our searching, we found out that the jumping from height method is the second frequently used method besides hanging (National Suicide Registry Malaysia, 2007). This maybe is because the media influence, which the newspaper always got report or news that people suicide and died, for example Alviss Kong case which the method he used is exactly jumping from height, this somehow influence participant got deep impression in it. Chinese participants mostly chose the taking of overdose on medicine is the second frequently used method for suicide in Malaysia, which we interpret that is because the Chinese normally will try the most relaxing or less painful way to suicide when compared to other races. Question 6: How to prevent people from commit suicide in Malaysia? Based on the chart, the highest respond comes towards the best way to prevent from commit suicide is share a problem with friends. 42 people support towards share a problem with a friend as the best way to prevent from commit suicide. It includes 15 males and 27 females. The second highest way rank to 40 people who sound off that meet a counselor is the best way. 23 males and 17 females give a respond towards it. The least response agreed with mass media is 7 people which are 5 males and 2 females. Based from the graph, we can conclude that, the races that support the most towards the way by meeting a counselor as the best way to prevent from commit suicide is Chinese and Indians. Both showing 15 peoples and followed by Malay and others with the same value or amount of people that is 5 people. Most of the Chinese support towards share a problem with a friends as the best way to prevents from commit suicide and followed by Indian who more to meet a counselor as the best way. It show 50% of them support towards it. Less people supported that mass media is the best way to prevent commit suicide. It shows the range of 4 Chinese, 2 Indians, 4 Malays and 1 from other races. Question 7: Do you think euthanasia is considered as commit suicide? The pie chart above show that, 40% of the male students and 24% of female students think that euthanasia is considered as commit suicide. However, 60% of male students and 76% of female students think that euthanasia is not considered as commit suicide. From this pie chart, we can say that most of the students do not agree that euthanasia is considered as commit suicide. It is because they think euthanasia is ways to help those patients that are suffer from the pain to feel relief. The graph shows that most of the UTAR students from different races think that euthanasia is not considered as commit suicide. The graph also shows that just few of the students think that euthanasia is considered as commit suicide. There have 16 Chinese students, 9 Indian students, 4 Malay students and 7 other races students think that euthanasia is considered as commit suicide. Chapter 4: Discussion The findings on this topic are based on the genders and the races among adolescents and adults in Malaysia. The surveys done among UTAR students show that woman has the highest probability among gender while Chinese has the highest risks among races in exposure to commit suicide, while age range between 17-26 has higher rate compared to others. The conditions that caused people have the intensity to commit suicide are mostly related to the relationship issue and financial problem and the common ways used to commit suicide are jumping from the height and wrist cutting. The ways that suggested by the respondents are to share their problems with friends or family, and refer to psychiatrist or counselor. Most of the participants do not think that euthanasia is considered as commit suicide. They also agreed that people who commit suicide have low Emotional Quotient (EQ) and agreed that most of the suicidal who want to commit suicide are because of feeling helpless or hopeless. Most of the results show similarities to our research except for the gender, races and age in which we found out that most of the research showed that man (gender) and Indian (races) have the highest tendency to commit suicide. And some research also showed that middle-aged and elderly persons have the high suicide rate. (Hayati & Kamarul, 2008) The problems that we faced during the research are mostly due to the time and cost. The time for us to do the research is too short because of the holidays, and some of the group members who came from STPM background have not expose to the introduction to psychology, the style of APA citation and the method to do an assignment. Hence, a lot of effort and time are used by the group members to understand the APA style and the way of doing assignment. Besides, we also faced the problems on transportation and the places of each members currently staying as some of the members stayed at different areas. The printing of the survey forms and the assignment cost a lot for students as they are not working and might be causing a burden for them especially for those that are from poor family. The other problem that we faced during the research is some of the participants may not serious when they were filling the survey form, fear to tell the truth, or do not have enough information about the t opic caused us could not get accurate results. One of the suggestion from the group members is the time to hand up the assignment can be delay until the end of the week (Friday) so that the members have enough time to gather around to discuss and make a summary together as the members can only meet at the campus to make discussion. Another suggestion is students should be exposed to the introduction to psychology and APA format for the Year One Semester One students as they are still new and do not have much information to this field. Besides that, two sets of questionnaire can be printed into one piece of A4 paper and cut into half. This method is not can save the cost, but also can reduce the number of paper used. Lastly, the students should be informed and advised to take the survey seriously as their opinions are very important and can affect the results of the survey. References Allan, G. (2009). Elementary statistics. McGraw-Hill Higher Education Chris, G. (n.d). Age, gender, and suicide: A cross-national analysis, 553-574. Retrieved February 12, 2011, from JSTOR online database Hayati and Aziz, (2008). National Suicide Registry Malaysia: preliminary report July-December 2007, 1-27. Retrieved February 7, 2011, from National Suicide Registry Malaysia (NSRM) Hayati and Kamarul, (2008). National Suicide Registry Malaysia, 50-54. Retrieved February 7, 2011, from National Suicide Registry Malaysia (NSRM) Murad, M. (2005). Suicide prevention and developing countries, 459-463. Retrieved February 8, 2011, from Journal of the royal society of medicine Quinney, (1963). Suicide, Homicide and economic development, 401-406. Retrieved February 12, 2011, from JSTOR online database

Wednesday, October 23, 2019

Madoff Case Study

Introduction Honesty is one of the basic principles for ethical business conduct. Gaining the trust of customers and investors is paramount in ensuring continued long term success and profits. For over ten years, Bernard Madoff created and grew one of the world’s largest Ponzi schemes known to date. He gained the trust of wealthy friends and prominent charity organizations, served on the chair of NASDAQ, and lived a lavish lifestyle all while keeping a dark secret from those who were the closest to him. Madoff’s deceit was worldwide.Being a man of power, Madoff lured in Ponzi scheme investors all over the globe with the guise and promise of being part of an exclusive club. Regulators are now increasing testing of and instructions to financial intuitions in an effort to protect consumers from another billion dollar scheme. Issues Raised As our test book states, â€Å"When an individual engages in deceptive practices to advance his or her own interests over those of his or her organization or some other group, he is committing fraud†¦ Fraud is any purposeful communication that deceives, manipulates, or conceals facts in order to create a false impression. (Ferrell pg. 78) There is no doubt that Madoff actively breached the trust of the companies involved in the Ponzi scheme. After his family gained awareness of his actions, Madoff admitted to his dealings and was tried and sentenced to 150 years in jail. One of the questions raised by his scheme, is did he work alone? There is proof that an accountant friend assisted, but who else looked the other way while he was pulling the wool over the eyes of millions? Who knew something was wrong, but still participated thinking they too could gain from being at the top of the scheme?This is the promise of such schemes; those at the top get all the benefits. The estimate of losses totals over $50 billion. In order to manage that large of a sum, there would need to be a lot of paperwork somewhere, let alo ne, accountants and workers to control it. He couldn't have done it without the cooperation and assistance of someone well informed who could process trades, report them and create monthly statements. Others had to help him falsify all those reports, conduct mail fraud and create multiple sets of books, while he was at country clubs attracting more investors to be at the bottom of the ladder.However, he still claims to be the only perpetrator. Even with regulators and the SEC on the case, no one will ever know with for sure how many people actually worked for Madoff or how many investors he had or how much money he actually managed. Analysis of Regulation Since the Madoff case came into public view, a spotlight is now shining on the governing bodies of regulation. The investment world is painfully aware of what is possible when auditing regulations are negligent. Shortly after Madoff’s arrest and trial, the SEC took quick measures to ensure the safety and confidence of financ ial investing.Many of the new SEC’s regulation guidelines include: Revitalizing it’s Enforcement Division, Revamping the handling of complaints and tips, Encouraging greater cooperation by ‘insiders', Enhancing safeguards for investors' assets, Improving risk assessment capabilities, Conducting risk-based examinations of financial firms, Improving fraud detection procedures for examiners, Recruiting staff with specialized experience, Expanding and targeting training, Improving internal controls, Advocating for a whistleblower program, Integrating broker-dealer and investment adviser examinations, Enhancing the licensing, education and oversight regime for ‘back-office' personnel. I think one of the best things the regulating bodies can do is provide education to investors and encourage both investors and financial intuitions to demand higher standards of ethics. The SEC, and other regulators, need to stop the wait and see technique and become more proactive in their regulation tactics. I like the idea of having a better whistleblower program for anonymous complaints as well as sporadic audits and training.Bottom line, the more people talk to and about financial practices the better. Conclusion Fraud is the opposite of being honest. As the world adapts to technology and people build relationships with their money and financial institutions, ethical problems are sure to erupt. Fraud was easy during the birth and growth period of technology and the internet, since it’s full capabilities where unknown. Bernard Madoff is not the first to use his position of power to gain the trust of the wealthy or hard working. Many still believe business is a game or war and they think each man is for himself, or no rules apply in the quest for profits and a lavish lifestyle.Because of Madoff and his far reaching, billion dollar scheme, the times have changed and the SEC and regulating bodies are more aware than ever, of how people with knowledge can take advantage and lie to those who don’t have it. The mystery of who knew about and participated in Madoff’s scheme may never be solved, but one thing is for certain, the doors of communication must stay open between business, regulators, and consumers everywhere so we can look out for each other and hold each other accountable for unethical actions. Reference †¢Ferrell, O. C. , J. Fraedrich, and L. Ferrell. Business Ethics: Ethical Decision Making and Cases. 9th. ed. Mason, OH: South-Western Cengage Learning, 2011. Print.

Tuesday, October 22, 2019

Calydonian Boar Hunt

Calydonian Boar Hunt What Is the Calydonian Boar Hunt The Calydonian Boar Hunt is a story from Greek mythology chronologically following the voyage the Argonaut heroes took to capture the Golden Fleece for Jason. A group of heroic hunters chased after a boar sent by the irate goddess Artemis to ravage the Calydonian countryside. This is the most famous of the Greek hunts in art and literature. Representations of the Calydonian Boar Hunt The earliest literary representation of the Calydonian boar hunt comes from Book IX (9.529-99) of the Iliad. This version doesnt mention Atalanta. The boar hunt is clearly shown in art work, architecture, and sarcophagi. Artistic depictions run from the 6th century B.C. through the Roman period. Principal Characters in the Calydonian Boar Hunt Meleager - Hunt organizer and killer of the boarOineus (Oeneus) - King of Calydon, in Aetolia, who failed to sacrifice to Artemis (hubris)Calydonian Boar - the fierce animal who ravaged the countryside as Artemis sent him to do.Artemis - virgin goddess of the hunt who sent the boar and may have trained Atalanta.Atalanta - Female, Amazon-type, a  devotee of Artemis, who draws first blood.Althaea (Althaia) - daughter of Thestius, wife of Oineus and mother of Meleager who causes her sons death when he kills her brothers.Uncles - Meleager kills at least one of his uncles and is then killed himself. Apollodorus 1.8 on Heroes of the Calydonian Boar Hunt Meleager, son of Oeneus, from CalydonDryas, son of Ares, from CalydonIdas and Lynceus, sons of Aphareus, from MesseneCastor and Pollux, sons of Zeus and Leda, from Lacedaemon Theseus, son of Aegeus, from AthensAdmetus, son of Pheres, from PheraeAncaeus and Cepheus, sons of Lycurgus, from ArcadiaJason, son of Aeson, from IolcusIphicles, son of Amphitryon, from Thebes [Sometimes the name Iphicles is given an uncle of Meleager]Pirithous, son of Ixion, from LarissaPeleus, son of Aeacus, from PhthiaTelamon, son of Aeacus, from SalamisEurytion, son of Actor, from PhthiaAtalanta, daughter of Schoeneus, from ArcadiaAmphiaraus, son of Oicles, from Argossons of Thestius. Basic Story of the Calydonian Boar Hunt King Oineus neglects to sacrifice annual first fruits to Artemis (only). To punish his hubris she sends a boar to ravage Calydon. Oineus son Meleager organizes a band of heroes to hunt the boar. Included in the band are his uncles and, in some versions, Atalanta. When the boar is killed, Meleager and his uncles fight over the trophy. Meleager wants it to go to Atalanta for drawing first blood. Meleager kills his uncle(s). Either a fight ensues between Meleagers fathers people and his mothers, or his mother knowingly and deliberately burns a firebrand that magically ends Meleagers life. Homer and Meleager In the ninth book of the Iliad, Phoenix tries to persuade Achilles to fight. In the process, he tells the story of Meleager in a version sans Atalanta. In the Odyssey, Odysseus is recognized by an odd scar caused by a boar tusk. In Judith M. Barringer ties the two hunts together. She says they are both rites of passage with maternal uncles serving as witnesses. Odysseus, of course, survives his hunt, but Meleager isnt so fortunate, although he survives the boar. Death of Meleager Although Atalanta draws first blood, Meleager kills the boar. The hide, head, and tusks should be his, but he is enamored of Atalanta and offers her the prize on the controversial claim of first blood. A hunt is a heroic event reserved for the aristocrats. It was hard enough to get them to participate in Atalantas company, let alone give her the principle honor, and so the uncles grow angry. Even if Meleager doesnt want the prize, it is his familys to have. His uncles will take it. Meleager, young leader of the group, has made up his mind. He slays an uncle or two. Back at the palace, Althaea hears of the death of her brother(s) at the hands of her son. In revenge, she takes out a brand the Moirae (fates) had told her would mark the death of Meleager when it was burned completely. She sticks the wood in the hearth fire until it is consumed. Her son Meleager dies simultaneously. Thats one version full of magic and a very non-maternal mother. There is another that is easier to stomach. Apollodorus on Version 2 of the Death of Meleager But some say that Meleager did not die in that way, but that when the sons of Thestius claimed the skin on the ground that Iphiclus had been the first to hit the boar, war broke out between the Curetes and the Calydonians; and when Meleager had sallied out134 and slain some of the sons of Thestius, Althaea cursed him, and he in a rage remained at home; however, when the enemy approached the walls, and the citizens supplicated him to come to the rescue, he yielded reluctantly to his wife and sallied forth, and having killed the rest of the sons of Thestius, he himself fell fighting. See #1 on Thursdays -cide words to learn

Monday, October 21, 2019

Understanding Traits and How They Are Determined

Understanding Traits and How They Are Determined Have you ever wondered why your eyes are just like your mothers? Or why your hair color is similar to your grandfathers? Or why you and your siblings share features? These physical characteristics are known as traits; they are inherited from parents and expressed externally. Key Takeaways: Traits Traits are inherited characteristics from our parents that are expressed externally in our phenotype.For any given trait, one gene variation (allele) is received from the father and one from the mother.The expression of these alleles determines the phenotype, whether dominant or recessive. In biology and genetics, this external expression (or physical characteristics) is called a phenotype. The phenotype is what is visible, while the genotype is the underlying gene combination in our DNA that actually determines what is expressed physically in the phenotype. How Are Traits Determined? Traits are determined by an individuals genotype, the summation of the genes in our DNA. A gene is a portion of a chromosome. A chromosome is composed of DNA and contains the genetic material for an organism. Humans have twenty-three pairs of chromosomes. Twenty-two of the pairs are called autosomes. Autosomes are typically very similar in males and females. The last pair, the twenty-third pair, is the sex chromosome set. Those are very different in males and females. A female has two X chromosomes, while a male has one X and one Y chromosome. How Are Traits Inherited? How are traits passed from one generation to the next? This happens when gametes unite. When an egg is fertilized by a sperm, for each chromosome pair, we receive one chromosome from our father and one from our mother. For a particular trait, we receive what is known as an allele from our father and one allele from our mother. An allele is a different form of a gene. When a given gene controls a characteristic that is expressed in the phenotype, the different forms of a gene show as the different characteristics that are observed in the phenotype. In simple genetics, alleles can be homozygous or heterozygous. Homozygous refers to having two copies of the same allele, while heterozygous refers to having different alleles. Dominant Traits vs. Recessive Traits When alleles are expressed via simple dominant versus recessive traits, the specific alleles inherited determine how the phenotype is expressed. When an individual has two dominant alleles, the phenotype is the dominant trait. Likewise, when an individual has one dominant allele and one recessive allele, the phenotype is still the dominant trait. While dominant and recessive traits may seem straightforward, note that not all traits have this simple inheritance pattern. Other types of genetic inheritance patterns include incomplete dominance, co-dominance, and polygenic inheritance. Due to the complexity of how genes are inherited, specific patterns can be somewhat unpredictable. How Do Recessive Traits Occur? When an individual has two recessive alleles, the phenotype is the recessive trait. For example, lets suppose that there are two versions of a gene, or alleles, that determine whether or not a person can roll their tongue. One allele, the dominant one, is symbolized by a big T. The other allele, the recessive one, is symbolized by a little t. Lets suppose two tongue rollers get married, each of whom is heterozygous (has two different alleles)for the trait. This would be represented as (Tt) for each.   Traits are inherited characteristics that are expressed externally in our phenotype. Copyright Evelyn Bailey When a person inherits one (t) from the father and then one (t) from the mother, the recessive alleles (tt) are inherited and the person can not roll their tongue. As can be seen in the Punnett square above, this would happen approximately twenty-five percent of the time. (Note that this tongue rolling is just for the sake of providing an example of recessive inheritance. Current thinking around tongue rolling indicates the involvement of more than just a single gene, and is not as simple as was once thought). Other Examples of Weird Inherited Traits A longer second toe and attached earlobes are often cited as examples of a weird trait that follows the two dominant/recessive alleles forms of one gene inheritance. Again, however, evidence suggests that both attached earlobe and longer second toe inheritance are quite complex. Sources â€Å"Attached Earlobe: The Myth.†Ã‚  Myths of Human Genetics, udel.edu/~mcdonald/mythearlobe.html.â€Å"Observable Human Characteristics.†Ã‚  Nutrition the Epigenome, learn.genetics.utah.edu/content/basics/observable/.

Sunday, October 20, 2019

Top Five Hardwood Killing Insects

Top Five Hardwood Killing Insects There are many insects that attack hardwood trees which ultimately cause death or devalue a tree in the urban landscape and rural forest to the point where they need to be cut. Here are five of the most costly and aggressive insects have been most troublesome to foresters and landowners.  We have ranked these insects according to their potential ability to cause both commercial wood product damage and aesthetic landscape degradation. The Top Hardwood Tree Killing Insects Gypsy Moth: The exotic gypsy moth is one of the most notorious pests of hardwood trees in the Eastern United States. Since 1980, the gypsy moth larvae have defoliated close to a million or more forested acres each year. The moth was introduced into the United States in 1862.The insect lays visible buff-colored egg masses as leaves emerge in the spring. These masses hatch into hungry larvae that quickly defoliate hardwoods. Several defoliations can frequently kill trees under stress.Emerald Ash Borer: The emerald ash borer (EAB ) is an exotic, wood-boring beetle discovered in Michigan in 2002. EAB is blamed for killing millions of ash trees annually and forcing regional quarantines on exporting  firewood and tree nursery stock in several states. This ash borer could potentially decimate arboricultural ash plantings and natural ash stands in the eastern United States.The EAB larvae feed on the cambial bark. These S-shaped feeding galleries will kill limbs and can ultimately girdle th e tree.  Infested ash trees exhibited a top-down crown dieback, dense sprouting from trunks (epicormic shoots), and other signs of tree stress including the yellowing of foliage called the ash yellows. Asian Longhorn Beetles/Borers: This group of insects includes the exotic Asian longhorned beetle (ALB). The ALB was first found in Brooklyn, New York in 1996 but has now been reported in 14 states and threatening more.The adult insects lay eggs in an opening in the bark. The larvae then bore large galleries deep into the wood. These feeding galleries disrupt the vascular functioning of the tree and eventually weaken the tree to the point that the tree literally falls apart and dies.Elm Bark Beetle: The native elm bark beetle and/or the European elm bark beetle is critical for the overland spread of Dutch elm disease (DED) and is worthy of being included in this worst list. The beetle does not critically harm a tree by its boring but  by transporting a deadly tree disease.The DED fungus is transmitted to healthy trees in two ways:  1) this bark beetle  transmits spores from diseased to healthy trees and 2) root grafting can also spread the disease when elms are tightly spaced. N one of the native North American  elms are immune to DED but the American elm is especially susceptible. Tent Caterpillars: The eastern tent caterpillar  (ETC) and forest tent caterpillars (FTC) are first seen in the spring in eastern U.S. deciduous forests. The ETC makes its nest in the fork of branches. The FTC actually builds no tent but is by far the most destructive of the two.The favorite food of tent caterpillars is wild cherry but oaks, maples, and many other shade and forest trees are attacked. The FTC can strip extensive stands of trees of all leaves. The attacked trees growth is affected.

Saturday, October 19, 2019

Creating collaborative e-learning environments Essay

Creating collaborative e-learning environments - Essay Example This distance is covered or bridged with the help of technology such as the internet. E- Learning may or may not be real time. A more formal definition of e-learning is as follows: It is the â€Å"the delivery of a learning, training or education program by electronic means. E-learning involves the use of a computer or electronic device (e.g. a mobile phone) in some way to provide training, educational or learning material† (Maneschijn, 2005). There are basically two types of e-learning. One is through an instructor and is called synchronous. The other is through oneself without the instructor called asynchronous. Another definition of e-learning covering it in a broader perspective is as follows: Two forms of web-based training is found with synchronous (instructor-facilitated) and asynchronous (self-directed, self-paced). In both cases the instructions are given through static means like power point lectures, text web pages, video lessons and streaming etc. and through interactive methods like portal chats, discussions, conferencing etc.) â€Å"What makes e-learning effective is, of course, typically in the eye of the beholder. One persons toast and jam may be another persons steak and kidney pie. This is what makes the drafting of a set of guidelines for effective e-learning so difficult†. (Downes, 2005) The main principle of e-learning is flexibility. E-learning is a very flexible method of learning. It can be done at any time and any place that suits the user especially those living at distances and cramped up schedules but want expert opinion or knowledge. INTERACTION: E-learning is a process of creating a learning environment and hence in this environment it enables interaction with peers interested in the same topic or the instructor who is teaching or imparting knowledge on a particular topic. USABILITY: This enables the user or the student to effectively use the entire system or concept of e-learning. E-learning

Friday, October 18, 2019

Analysis of Brutish You Have to Hand it to the Neanderthals after All Research Paper

Analysis of Brutish You Have to Hand it to the Neanderthals after All - Research Paper Example On the contrary, the findings make it more probable that the Neanderthals made the paintings. The article also posits that the wrong dating resulted because scientists dated the paintings using the calcium carbonate layer, which is now believed to have accumulated on the artistic paintings years after the paintings had been made. This paper is an analysis of the article â€Å"Brutish? You have to hand it to the Neanderthals after all† authored by David Keys and featured in The Independent. The paper will also scrutinize additional research related to the articles content as well as dating of Palaeolithic cave painting in Europe. The paper will also try to establish the credibility of Keys' article and application of the research findings. Making use of a process referred to as uranium-series disequilibrium, the group that was led by Pike measured the radioactive decomposition of uranium and dated hand stencils and disks in El Castillo cave in Northern Spain. The paintings had been made by using the mouth to blow paint on the wall. The artistic paintings were found to be least 40,800 years old making them the oldest form of art in Europe. These results have ignited the debate on who is responsible for the cave paintings found in Spain and France. Previously, the paintings were attributed to modern humans but research acknowledges that modern man had not invaded Europe 41,000 years ago. At this period, Neanderthals inhabited Europe, which suggests that they could be responsible for these artistic paintings (Keys, 2012). Chauvet Cave paintings in central France were previously recognized as the world's oldest cave art paintings. The Chauvet cave paintings were dated 39,000 years old. However, the Chauvet cave dating is still controversial since it relies on radiocarbon dating making use of charcoal pigments. Archaeologists have put forward that dating based on charcoal pigments is unreliable since the pigments are susceptible to contamination by other forms of carbon, which would affect dating results. Additionally, using charcoal pigments could be erroneous in that the period when the fire was lit might not coincide with the time the painting was made (Keys, 2012; Pettitt and Pike, 2007). I selected this article due to its relevance to our understanding of the past and  human history particularly the interactions between the Neanderthals and Homo sapiens. Primordial cave paintings lend a hand in connecting the modern man to the past species. Understanding the activities of the Neanderthal is crucial since he was the immediate ancestor of Homo sapiens, the modern man. Understanding Neanderthal would thus enhance a better understanding of the development of the art of painting. Additionally the findings suggest that the Neanderthals could have been the inventors of cave painting but passed the art to Homo sapiens. Evidence shows that modern humans first appeared in Northern Spain about 41,500 years ago, as successors of the Neanderth als. These findings are contrary to current perceptions that the Homo sapiens instigated artistic painting and that Neanderthals did not practice cave painting (Zilh?ao, 2007; Keys, 2012). Another important aspect roused by these findings is that the interaction between Homo sapiens and Neanderthals coul

Physical and Mental Effects of Down Syndrome Research Paper

Physical and Mental Effects of Down Syndrome - Research Paper Example According to the National Institute of Child Health and Human Development, Down syndrome can be found in approximately 1 child in every 800-1,000 births and is a life-long condition. Seeking to explain the aspects of Down syndrome to the lay reader, the following will discuss Down syndrome in a thorough and comprehensive attempt to understand this disorder. The following research paper will commence with an overview of the condition, the factors which may lead to the occurrence of Down syndrome and discuss the ramifications of this condition on the life of an affected child as well as on later life. This research paper will begin with a concise introduction to Down syndrome as an inherited condition and will explore the health ramifications found among people with this condition. Following this, an exploration of the physical and mental effects of Down syndrome will provide much insight into the ramifications of this condition on the lives of the people it affects. After a concise an alysis of the multitude of health ramifications of this disorder, an overview of the relationship between dementia and Down syndrome will focus on the correlation between these two important health issues. This will be followed by a thorough overview of the ethical issues surrounding Down syndrome and the increased likelihood of elective abortion when this condition is present. Seeking to provide a thorough introduction to guide this analysis, this research paper now turns to an introduction to Down syndrome (National Institute of Child Health and Human Development, 2009; Selikowitz 2007). Down syndrome is caused by a random event which occurs during the formation of reproductive cells during the early stages of a pregnancy. It has traditionally been believed that there is a link between maternal age at the time of conception and the incidence of Down syndrome among newborn babies.

Domestic Violence Outline Questions Essay Example | Topics and Well Written Essays - 500 words

Domestic Violence Outline Questions - Essay Example There is also a notion that men are aggressive and combative in nature hence likely to batter their wives. Generally, domestic violence is viewed as women problem hence the picture created is that of a battered woman physically assaulted thus ignoring emotional abuse. It is therefore imperative to ask why women are the most victims as shown by the figures and women advocates’ grievances. Culture is considered a great contributor to domestic violence. Most traditional societies advocated for wife beating as a sign of love and to gain respect (Jaffe, 2006). Culture also determines gender roles in society where a man is supposed to be a provider to the family and the place of a woman is in the kitchen. Women are supposed to be submissive to their husbands and not to question his decisions. Women in some societies do not own property and neither engage in paid jobs hence rely on the husband for survival. Even if engaged in employment they are lowly paid as they take up simple tasks due to their feminism. They are thus prone to abuse by their spouses for example by refusal of financial needs and emotional and physical abuse. Some men who depend on wives for survival are also prone to violence. Boys and girls are socialized into different roles as they grow up and this affects their future. Those who grow up in an abusive family are likely to end up being violent adults (Davis, 1998). On the other hand, not all children exhibit or take up the behavior as adults. Some learn its consequences and would not like to end up as their parents. Some develop fear which makes them prone to abuse. Nowadays people are educated and no longer practice those traditions of wife beating but gender equity has not been achieved and will take long to achieve (Davis, 1998). Feminists should therefore establish new ways of curbing domestic violence. All this debate about

Thursday, October 17, 2019

Chipotle Franchise Research Paper Example | Topics and Well Written Essays - 500 words

Chipotle Franchise - Research Paper Example These factors include the direct and indirect competitors, suppliers and the customers. Since its foundation in 1993, Mexican Chipotle Grill has focused on providing restaurant services centered on a marketing position writ in a unique emphasis on natural ingredients. The chain of restaurants specializes in Mexican delicacies, which have gained popularity in the United States over the recent years. Currently, Chipotle has more than one thousand restaurant sites all over the United States. With the introduction of competing products in American restaurants such as smoked foods, Chipotle needed to implement a new marketing position. The new marketing position is be focused on value analysis in order to improve the restaurants returns and earn more customers through its products pricing. The restaurant uses the four utilities of the product: functional, time, place and possession. The product is mainly sold in the United States by Chipotle’s restaurant chains. Over the past decade, Mexican spices, rice and beans are some of the most consumed foods in the country. Through in-depth analysis of the factors of location and strategic selling position, the restaurant identified favorable market sites outside the US creating business for the products. Internationally, the franchise sells its products in Canada and England. As at 2011, the organization commanded an income in the tune of over two hundred Million dollars. This change in fortunes can be attributed to the re staurant’s marketing strategy in the past three years or so. The main positioning step that earned the franchise a major benefit is the conversion of two hundred of Chipotle restaurants into company ownership rather than corporate ownership. This enables the franchise to convert its revenue into direct investments. Chipotle prices its products based on a framework of value chain writ in a transition that benefits both the customer and the organization. The restaurant is renowned

European Union Law Essay Example | Topics and Well Written Essays - 1500 words

European Union Law - Essay Example In its logical form, the treaty seeks to promote free movement of goods to bridge the cross-border gap that exists between different European Union countries. Even regardless of such laws and treaty, some countries have been found to be putting undue restrictions on fellow European Union countries so that there would be a concentration of market in those countries. The strategy used by those who put the restrictions has been to place huge charges on cross border goods to discourage free movement. In response, Articles 23(1) and 25 (9(1) and 12) ECT of the treaty touches on prohibition of charges having an effect equivalent to that of customs duties, which discourages all such charges to the exclusion of a similar domestic product (European Parliament Fact Sheets, 2012). Relevant primary and secondary legislation From CJ Case 8/74, 11 July 1974, it could be seen that with reference to Olio Nuovo, Article 28(30), ECT of the Treaty on the Functioning on the functioning of the European U nion (TFEU) can be applied to its logical conclusion to give him a lot of legal redress to the current situation in which he finds himself. In the first play, there is a primary legislature on the free movement of goods and services within the European Union region (Kuyper, 1993). As a marketer from Greece to Italy, Olio Nuevo is covered by this primary legislation because both countries are within the European Union zone. This is a very strong basis for Nuevo to begin any legal process with an ambition of putting forth legal damages for any losses that he might have recorded. This is because according to the case in which Nuevo finds himself, there is being an unconstitutional attempt of hindering, directly or indirectly, actually or potentially, intra-Community trade, which the European Parliament Fact Sheets (2012), states that â€Å"are to be considered as measures having an effect equivalent to quantitative restrictions.† What is more, there are secondary laws such as th ose that specify the kind of products and materials that could cross European Union neighbouring borders. Examples of such European Union laws are those on the forbidding of arms and drugs trade. Since Nuevo did not attempt to trade any of such illegal products, there also is a very strong legal case to be heard should Nuevo decide to pursue the case to its legal conclusion. Exceptions to the Rule As it is literary said, to every rule there are exceptions. The Treaty on the Functioning on the functioning of the European Union (TFEU), which makes previsions for free movement of trade across European Union members States borders also have its own legal limitation or exceptions as far as the application of the rules are concerned. Under Article 30 (36) of ECT of the treaty, factors such as protection of public health, public morality and public security are all captured as exemptions under which Member States may take personal measures on having effect equivalent to quantitative (Europ ean Parliament Fact Sheets, 2012). This means is that the interest of the consumer always comes first when dealing with the movement of good (Eeckhout and Govaere, 1992). The legal implication here is that the host country where Nuevo wants to start

Wednesday, October 16, 2019

Chipotle Franchise Research Paper Example | Topics and Well Written Essays - 500 words

Chipotle Franchise - Research Paper Example These factors include the direct and indirect competitors, suppliers and the customers. Since its foundation in 1993, Mexican Chipotle Grill has focused on providing restaurant services centered on a marketing position writ in a unique emphasis on natural ingredients. The chain of restaurants specializes in Mexican delicacies, which have gained popularity in the United States over the recent years. Currently, Chipotle has more than one thousand restaurant sites all over the United States. With the introduction of competing products in American restaurants such as smoked foods, Chipotle needed to implement a new marketing position. The new marketing position is be focused on value analysis in order to improve the restaurants returns and earn more customers through its products pricing. The restaurant uses the four utilities of the product: functional, time, place and possession. The product is mainly sold in the United States by Chipotle’s restaurant chains. Over the past decade, Mexican spices, rice and beans are some of the most consumed foods in the country. Through in-depth analysis of the factors of location and strategic selling position, the restaurant identified favorable market sites outside the US creating business for the products. Internationally, the franchise sells its products in Canada and England. As at 2011, the organization commanded an income in the tune of over two hundred Million dollars. This change in fortunes can be attributed to the re staurant’s marketing strategy in the past three years or so. The main positioning step that earned the franchise a major benefit is the conversion of two hundred of Chipotle restaurants into company ownership rather than corporate ownership. This enables the franchise to convert its revenue into direct investments. Chipotle prices its products based on a framework of value chain writ in a transition that benefits both the customer and the organization. The restaurant is renowned

Tuesday, October 15, 2019

Shark tank review Essay Example | Topics and Well Written Essays - 750 words

Shark tank review - Essay Example The second entrepreneur is Dave Greco who was asking for 90,000 for a 40% stake in his company. He claims he is a successful sales man and he claims he has a solution for companies through boosting their sales through packaging the sales strategies in a mobile application. The sharks quit on the deal after finding his pitch to have many inconsistent. Mark was the only shark that had made an offer but later withdrew his offer therefore Dave was not successful. The third entrepreneur in this episode was rick smith who was offering his Vegas magic show to the sharks at 1.5m for a 20% of the company. Rick was offering a family friendly magic field show in Las Vegas. The sharks did not get convinced as they claimed his business was not unique and its market is very competitive. Based on the reasons all the sharks quit on the deal and rick walks away without a deal. The final entrepreneur is Donny McCall whose business, known as invest a rack, involved the transformation of a pickup truck in about 30 minutes to a larger cargo carrying vehicle. He was asking for $100,000 for a 10% stake in his company. Sharks claim that he should get into distribution and go oversees to cut cost therefore all sharks quit on the deal. On season 3 episode 3 the first entrepreneur is Travis Perry business was a two month program that allowed people to learn how to play the guitar through the a chord cuddy. The sharks are very impressed with idea. Travis asking price was 10% stake for a $125k in the company.

Monday, October 14, 2019

Strategy And Structure in Organizations

Strategy And Structure in Organizations Strategy is an integrated and coordinated set of commitments actions designed to exploit core competencies gain a competitive advantage. Organization structure Organisation structure specifies the firms formal reporting relationships, procedures, controls and authority, decision making process. So organisation structure includes three components: Administrative structure: This structure signifies division of labour in the organization. This includes dividing work into tasks or roles such as operations, logistics and transportation, and training, and recombining them into administrative units, e.g., branches, departments or divisions according to mission, function, and/or region. The structure depicted in organization charts, including tables of organization and equipment is the administrative structure. Responsibility structure: This includes division of responsibility authority to individuals within the organisation. Control structure: This includes organisations system of measuring and evaluating performance on the basis of administrative structure responsibility structure. Relationship between Strategy and Structure There are two main views on the relationship between strategy and structure. According to Alfred Chandler structure follows strategy. Recent research has questioned the view that structure always follows strategy, and argued instead that strategy often follows structure. This second view, that strategy follows structure, is based on the idea that managers already working within a particular organisational structure will take the structure for granted and only consider strategies that will fit with the existing structure. Combining these two arguments we can say that Strategy structure have a reciprocal relationship. Organization structure is a critical component of effective strategy implementation process. Success of a firm depends on how well a firms business strategy is matched to its organizational structure. Developing an organization structure that effectively supports the firms strategy is difficult. For successful implementation of organization strategy, an organisation structure should have following characteristics: Structural stability This provides the firm a capacity to effectively manage its daily work routines. Structural flexibility This provides the firm an opportunity to explore competitive possibilities then allocate resources to activities that will shape the competitive advantages the firm will need to be successful in future. However strategy has a much more important influence on structure than reverse. But at the end organisation structure should provide adequate stability flexibility that is necessary for successful implementation of strategy. Strategy that a firm decides to follow will govern the decision about the organisation structure that will be suitable for the firm but once in place organization structure influences the choice about future strategies because of organizational inertia derived from organization structure that inhibits efforts to change. Evolutionary pattern of organizational structure strategy Pre-bureaucratic structures This is the simplest form of structure is usually based on traditional or charismatic dominance. Structure is totally centralised lacks standardisation of tasks. This is useful in managing simple tasks. Bureaucratic structures It has certain degree of standardisation is useful in managing slightly more complex large scale organizations. Functional structures Structure is more standardised centralised. Organisation is divided into separate functional divisions employees within a particular division perform specific functions. This type of structure is useful in firms that provide standardised goods services at low cost in high volume. Divisional structure This is also called as product structure. Organisation is divided into divisions each division has its own resources functions. Divisions can be based on geographies or products/services. Matrix structure This structure combines the features of both functional divisional structure. Defining the strategy strategy implementation process Strategy formulation As discussed earlier strategy has more important influence on structure than reverse. So whenever a firm starts a business it decides about what strategy it wants to follow. Broadly there are four different business strategies that firms follow: Prospector- The primary challenge that these firms face is to identify exploit new opportunities of industry their primary capability is innovation. Analyser- Analysers are fast followers. They closely monitor customer reactions competitor activities either improve upon successful competitor product offerings or offer comparable products at reduced cost. Low cost defenders- These firms usually target stable segments of market. Their main emphasis is on efficiency through standardised practices providing low cost products rather than innovation. Differentiated defenders- These firms also target stable segments of market but their emphasis is on high quality differentiated products rather than low cost. Strategy implementation Organization structure forms a critical implementation dimension. Three important features upon which organization structure is based are formalisation, centralisation, standardisation. Formalization- This is the degree to which decisions working relations are governed by formal rules. Formal rules lower the administrative cost increase efficiency. Firms that have greater number of formal rules regulations are called mechanistic firms with fewer formal rules are called organic. Centralization- This defines the degree to which decision making authority is held by top management. In centralised organizations lines of communication responsibility are clear defined. Decisions are usually made by top management implementation path is clearly defined. This type of structure is followed in relatively stable, non-complex environments. In decentralised organizations views ideas may originate from different groups. Decision making power is dispersed in the organisation. This type of structure is effective in complex environments. Specialization- This defines degree to which tasks and activities are divided in the organization. Specialist firms direct their efforts to a well defined set of activities. Generalist firms on the other hand are more diverse in their activities. Firms following different business strategies usually differ on degree of formalization, centralization specialization of organizational structure. Relationship between Environment, Resources, Strategy and Structure Strategy and structure are dynamically related according to classical model. E= Environment, R=Resource(capabilities) S=Strategy St=Sttructure Ti= Time The nature of the environment (Et1) and the Resources (Rt1) of the organization influence the strategy (St1) chosen at time t1, and in this turn determines the organizational structure (St1). Then the evolution of the environment and/or of the organization brings about a new strategy and a new structure. The dotted lines indicate that very often firms try to meet the environmental and structural demands without realizing that they have implicitly adopted a new strategy. Strategy grows out of structure and in turn may lead to its modification. Source:http___www.emeraldinsight.com_Insight_ViewContentServlet_contentType=ArticleFilename=_published_emeraldfulltextarticle_pdf_0860100201 Burns and Stalker (1961) view structure as a process in itself a means of holding together an organization so that it is able to determine its own destiny. Organizations that operate in dynamically changing and uncertain environments tend to need organic/flexible structures and processes while more stable environments lend themselves to more familiar mechanistic bureaucratic structures. Eccles et al. (1997) list some of the main functions of organizational structure which provide: a formal allocation of work rules; channels for collaborative working; boundaries of authority and lines of communication; a means of allocating power and responsibility; prescriptive levels of formality and complexity. Strategy and Structure Alignment Source: Emerald database Strategy-Structure Alignment An important management responsibility is to design and implement the strategic organizational form best suited to the demands of its marketplace, customers, and business model. Since your competitors essentially have access to the same information and may have developed similar strategies, it is important to consider organizational design as one of your most powerful strategic weapons. Strategy-Structure Alignment follows four phases: Assessment: Data is gathered on strategy, organization and the business environment using interviews, archival research (of planning documents, performance studies, etc), and observations. Data is organized into issue categories and fed back to management in a way that supports validation and learning. Management reaches an agreement on key issues and problems, causal factors and organizational requirements. Design: The design process goes through a series of design steps including scale and leverage assessment, the design of vertical alternatives and lateral processes and structures, impact analysis, etc. Each step is geared to execute strategy and address organization and cultural issues. Alternatives Choice: Changes in organization are based on a selection from among a set of alternatives. Because any organizational structure calls for trade-offs, the alternatives are worked through discussions that focus on the advantages and disadvantages of each, their fit with requirements, and the impact of implementation, etc. Frequently the organizational design that is. The types of problems that can be addressed include: à ¢Ã¢â€š ¬Ã‚ ¢ Changes in strategy causing poor alignment with the original organization design à ¢Ã¢â€š ¬Ã‚ ¢ Needing to restructure parts of organization due to competitive pressures, introduction of new technology, etc. à ¢Ã¢â€š ¬Ã‚ ¢ Organizational growth is causing a reexamination of the organization design à ¢Ã¢â€š ¬Ã‚ ¢ Poor execution and organizational effectiveness The primary objective in Strategy-Structure Alignment is for management to design and decide upon an organizational structure that best supports its strategy and to develop a preliminary transition plan for next steps. The concept of co-alignment If strategy is about realizing a plan, then in implementing it, a suitable means of structuring resources and activities must be found and maintained. Olsen (1993) uses the term co- alignment to describe the best fit relationship between strategy and organizational structure. He observes that without co-alignment between structure, strategy and the environment, organizations may experience difficulty in achieving long-term success. The concept of co-alignment is depicted in Figure. Alignment is a systematic methodology for designing these capabilities in a fully rational and informed way. Strategy-Structure Alignment is strategy-driven and performance-oriented. It begins with a reaffirmation (and sometimes recalibration) of business strategy, explores the implications of that strategy for organizational structure, considers changing conditions in the environment, and through diagnosis identifies organizational problems and performance gaps. A sequential design process generates alternatives for organization design. A preliminary transition plan of a preferred alternative and its alignment then follow. Relationship between Organizational Control, Structure and Strategy There is a close relationship between organizational control, structure and strategy. The organizational control is one of the prime drivers for the organizational change whenever the organization changes its structure. As explained earlier; as organization grows the control of the organization becomes more complex and hence the structure of the organization is changed to cope with the changed environment. Organization structure itself is used as a control mechanism in implementing strategy. For e.g. large diversified firms using cost leadership strategy emphasize financial controls and usually will have some centralized financial reporting mechanism or financial department to exert more control over the cost Single business companies and business units using a differentiation strategy will be emphasizing on strategic control and the mechanisms will be developed accordingly Corporate Level Strategy and Structure Depending on the type of corporate level strategy the organization is following the link between structure and strategy can be compiled as following. Strategy Structure Major features Related Constrained Strategy Co operative structure (M-form) Structural integration, centralized strategic planning, human resource and marketing,RD etc. Cultural emphasis on corporate sharing. Rewards are subjective , tend to follow overall corporate performance and divisional performance Related Linked Strategy Strategic Business Unit (M-form) Structural integration, centralized strategic planning, human resource and marketing, RD etc. Cultural emphasis on corporate sharing. Rewards are subjective , tend to follow overall corporate performance and divisional performance Unrelated Diversification Competitive form (M-form) Small corporate head quarters with Finance and auditing as the most prominent functions. headquarters to manage cash flow and ensure the accuracy of performance data coming from divisions The legal affairs function becomes important when the firm acquires or divests assets Divisions are independent and separate for financial evaluation purposes Divisions retain strategic control, but cash is managed by the corporate office Divisions compete for corporate resources Latest Empirical Studies Strategy and Structure in Context: Universalism versus Institutional Effects Jose I. Galan and Maria J. Sanchez-Bueno Tried to study the Chandlers proposition that large organization evolve in to multi divisional forms as they grow in case of Spain. Spain being a newly developing market and with slowly integrating with EU and world market was studied to test whether the cultural factors has impact on the emergence of structure as organizations globalise and evolve. Their studies corroborated that as organizations evolve its complexity rather than culture that drives the emergence of the structure. Spanish organizations too followed the global trend of emergence of multi divisional structure. The same has been corroborated in case of other countries by Researcher Country Dyas Thanheiser France Whittington Mayer U.K Whittington Mayer Germany Institutional Forms and Organizational Structures: Homology, Trust and Reputational Capital in Professional Service Firms Gerard Hanlon Explores how professional service organizations has used a set of clan and bureaucratic controls to manage the organizational changes; both set of controls being present throughout the life span of an organizations but with varying levels of importance. Previous studies by Ouchi et. al says about the clan structure of professional services ,legal practices and accounting where there is high centrality of decision making and you belonging to that particular group or profession bringing you some privileges. Socialization aspect of clan structure was central to the success of organizations in that particular setup. Clan structure induces homology and trust based partner autonomy. Reputational capital is essential in making large and complex deals . But as the services expanded the need for institutional forms also emerged and institutional controls started taking place. This need for formal interactions and following of norms undermined the clan nature of the services. There is a constant power struggle between the bureaucratic controls and clan /social and informal norms of control in professional organizations. Exploring Strategy and Board Structure in Non-profit Organizations William A Brown Joel O Inverson Applying Miles and Snow typology of strategy Brown and Inverson tries to understand the structure of the organizations of the various non-profit organizations in U.S. Their key findings are Prospectors : have broader inclusive structure Defenders : have tighter more focused structure Environmental Turbulence, Organizational Stability, and Public Service Performance George A Boyne Kenneth J Meier A turbulent external environment is widely believed to have damaging effects on public service performance. Much less consensus has been reached on whether the best response to turbulence is to retain or alter existing organizational structures. They analysed these issues by testing the links between turbulence, structural stability, and performance in a large sample of public organizations. Results show that turbulence has a negative effect on performance, and that this is compounded by internal organizational change. Thus public managers can mitigate the harmful effects of volatility in the external environment by maintaining structural stability. Emerging trends in organisation structure By the end of 20th centaury trend of large organizations was over. The environment in which firms were operating changed to great extent. The factors that are responsible in todays environment are entirely different from traditional factors. Due to change in factors responsible for success of organizations, organizations are changing their structure. Major factors that have contributed to this change are: Globalisation Due to changes in technology changes in international trade laws, more more companies are competing in more more number of markets. This has increased both the opportunities threats present in external environment. Change in Technology Technology is evolving at a very fast rate organizations have to constantly adapt to this change. Technological change has the biggest impact on organizations among all the factors. Internet as a technology has provided a new distribution marketing channel which has led to a change in the way organizations compete. Information technology has also changed the internal working process of organizations. Technologies like ERP, SAP Oracle have facilitated the information flow in the organizations which in turn has changed the way organizations work. Einsteins famous formula has been modified in modern days of technological advancement. E = MC2 M is the Mastery of each individual (human capital). C are the Connections that join individuals into a community (social capital). C is the Communication that flows through those Connections. E is the resulting Effectiveness of the team or organization According to a paper Do Org Charts Still Matter? by Thornton A May organizations are a combination of responsibilities, accountabilities, knowledge, process, interactions future. Organization charts depict only first element of organization i.e. responsibilities accountabilities. All other elements of organization are missing from the organization charts. Informal organizations that are existing because of web based interactions are not shown in these charts. Constant change As competition is increasing day by day so organisations cant depend on what they do today to be successful tomorrow. Environment in which industries are competing is also very uncertain dynamic. This uncertainty demands structural flexibility. Technological change is one of the factors that are leading to environment change. As no company is confined to geographic boundaries so this has increased exposure to different emerging markets side by side it has also increased the competition from different players entering into the market. So companies have to adapt themselves to ever changing demands of consumer markets. Mergers acquisitions In recent years many mergers acquisitions happened in global economy. When two organisations combine it is mandatory that organisation structure provided by the management should be conducive to culture of both the organizations. Most of the failures in case of mergers acquisitions are due to cultural clash. Diversity in the workforce People from diverse backgrounds in terms of geographies cultures are working in organizations. So organization structure should be such that it increases the productivity, improve morale, heighten creativity and enhance decision-making power among the employees. Emerging organisation structure trends Because of above mentioned factors the structure of many companies has become flatter, less hierarchical, more fluid and even virtual. Increasing use of IT enabled conventional organization structures to transform into more fluid form. Few of the emerging trends in organisation structure are: Teams This is the new trend of organization structure. Entire organization may work as a team or it may be a combination of few teams which coordinate with each other. Xerox, Motorola are among the few companies that follow team organization structure. Network Network structure is also an emerging trend in organization structure. The main reason for using this type of organization structure is that firms outsource the tasks activities to other firms that can perform those tasks in a better cost effective way. Success of this type of structure depends upon the coordination control of external relations. Structural flexibility is one of the major success criteria for this type of organization structure. Partnership alliances As competition is increasing in the economy so firms realise that it is very difficult to survive in this highly competitive environment alone. So firms go for partnership alliances with other firms to diversify the risk. Virtual organizations This is the most radical form of organization structure. It is also called as boundary-less organization. This means while the core of the organization can be small but still the company can operate globally be a market leader in its niche. Because of the unlimited shelf space of the Web, the cost of reaching niche goods is falling dramatically. The success of this type of structure depends on information technology. Self organised communities The structure followed by latest web 2.0 technologies is self organised communities. In this case the job of top management is just to maintain the motivation level of employees to participate in the community. The TATA Group Introduction: Activities of the Organization The Tata Group is a multinational company with its head-quarter located in Mumbai, India. The Tata Group is one of the largest private employers in India employing more than 350000 employees. Tata companies operate in seven business sectors: communications and information technology, engineering, materials, services, energy, consumer products and chemicals. Every Tata company or enterprise operates independently. Each of these companies has its own board of directors and shareholders, to whom it is answerable. There are 28 publicly listed Tata enterprises and they have a combined market capitalization of some $60 billion, and a shareholder base of 3.5 million. The major Tata companies are Tata Steel, Tata Motors, Tata Consultancy Services (TCS), Tata Power, Tata Chemicals, Tata Tea, Indian Hotels and Tata Communications. Tata Steel became the sixth largest steel maker in the world after it acquired Corus. Tata Motors is among the top five commercial vehicle manufacturers in the world and has recently acquired Jaguar and Land Rover. TCS is a leading global software company, with delivery centers in the US, UK, Hungary, Brazil, Uruguay and China, besides India. Tata Tea is the second largest branded tea company in the world, through its UK-based subsidiary Tetley. Tata Chemicals is the worlds second largest manufacturer of soda ash and Tata Communications is one of the worlds largest wholesale voice carriers. Rationale for selection Tata, with its long history, is synonymous with the Indian economy. Its growth has been a prime index to be watched for gauging Indias growth. With a history of over 100 years, Tata has grown leaps and bounds by diversifying into different businesses. These businesses are so diversified and different that it presents us an opportunity to draw contrast between the different kinds of structures adopted in these businesses. Tatas solid presence in major industries like Automobiles (Tata Motors), Steel Industry (Tata Steel), IT Industry (TCS), Hospitality Industry (Taj Hotels) and many others is evident of their successful strategy formulation and implementation. All these businesses are driven by a single level corporate level strategy. Also with the increasing globalisation there is an increased pressure on the Tata group companies to expand their operations beyond the nations boundaries. There has been the realization for the same and the Tatas have been proactive in sensing and capturing the internationalization opportunities. The widely known Corus acquisition by Tata Steel, the TCS foray into international markets, Tata Teas acquisition of U.K based Tetley tea have helped Tata to establish the brand Tata in the international arena. This has not been an independent event. In fact these steps have had serious implications to the structure of the organization. The study of Tata aims at obtaining insights into the impact of strategy change (diversification, internationalization) on the structure of the organization as a whole (reconstructionist approach). Also the impact of structural change on the firms strategy (structuralist approach) could effectively be studied with respect to Tata given its long history. So the Tata group presented an exciting opportunity to draw the relationship between strategy and structure of an organization. TAJ Hotels Resorts and Palaces The Indian Hotels Company (IHCL) and its subsidiaries are collectively known as Taj Hotels Resorts and Palaces, which is recognized as one of Asias largest and finest hotel companies. Incorporated by the founder of the Tata group, Jamsetji Tata, the company opened its first property, the Taj Mahal Palace hotel, Bombay in 1903. Taj Hotels Resorts and Palaces comprises 64 hotels in 45 locations across India with an additional 15 international hotels. Areas of Business Luxury Premium Mid-Market Value Vivanta Ginger Gateway Taj IHCL operates in the luxury, premium, mid-market and value segments of the market In addition, IHCL has Taj Exotica (resort and spa brand found in the most exotic and relaxing locales of the world ) and Taj Safari (wildlife lodges that allow travelers to experience the unparalleled beauty of the Indian jungle amidst luxurious surroundings) which provide services to different segments of the market. With its diversification strategy revolving both around products and markets, the Taj Group of Hotels follow Cooperative Form of Multidivisional Structure to implement its Related Constrained Strategy of diversification. In this Cooperative Form of Multidivisional Structure, IHCL uses Structural Integration devices to create tight links among all divisions. The Corporate Office located in Mumbai emphasizes centralized strategic planning, human resources, and marketing to foster cooperation between divisions. IHCL has a well laid out procedures for working and conduct of business. These governance mechanisms are clear and unambiguous. Everyone in the company is expected to follow the procedures followed in the company and anyone found violating them is questioned for the breach and suitable action is taken. The TATA Code of Conduct governs all the policies, procedures and behaviors desired from its associates across all its Hotels. There is more of formalization as most of these policies and norms are written down. The customer also feels at home when he is familiar with the brand and its level of commitment and service, making it the customers first choice at any location where its available. It also helps the company control the costs as there is a high degree of standardization of products and services. The transaction costs are also lower since most of the duties are well defined and less reason for conflict within organization. The culture of the IHCL emphasizes cooperative sharing. All the divisions and subsidiaries of IHCL share the corporate strengths of IHCL. The TATA/Taj Brand provides the trust from its customers to all its subsidiary units. Also, sharing divisional competencies facilitates the IHCLs effort to develop economies of scope which is very well achieved by its multidivisional structure. Sometimes temporary teams or task forces are formed around certain projects/events which is facilitated by sharing competencies that are embedded within several divisions. So, to align its structure with its Related Linked Strategy of Diversification, the IHCL has developed a matrix kind of organization from the multidivisional structure. Here, as can be seen in the figure below there is a dual structure combining both functional specialization and business product specialization. So, measuring the organizational structure of IHCL on the dimensions of Formalization, Centralization, and Specialization we have: Tata Steel The Tata Steel division is the oldest business unit under the Tata group. Established in 1907, Tata Steel has evolved over the years to become an extremely competitive steel manufacturer. Evolution of the Strategy and Structure During the pre liberalization period (before 1991), Tata Steel faced a low levels of competition. SAIL was the only major competitor. The period was also reflective of the following: quantitative restrictions (license raj) on the levels of production, the control over the price and the selection of customers. The tight regulatory nature of the government bodies over the manufacturing units had implications over the strategy of the firm. The main aim of the unit was to meet the levels of production as set by the government and there was no motive to increase productivity/efficiency or reduce the cost. Thus the firm had a centralized structure. The various functions