Saturday, August 31, 2019

Organizing A Collection Of Cds And Dvds

The average CD and DVD collection grows continuously and hence it becomes an important and Herculean task to organize them in a proper manner. Such an arrangement should also result in easy retrieval of the CDs and DVDs when we need them. The first step to follow in organizing a large DVD and CD collection is to buy proper shelving. We need to buy CD notebooks or multiple CD racks and also shelves specifically for DVDs. Next is to decide on the criteria for categorizing the collection. The criteria options are alphabetical arrangement, arrangement based on genre, chronological arrangement etc.Next is to separate the CDs that are not of much concern. New CD cases are to be purchased for those CDs whose cases are damaged or missing. Using multiple levels of shelving can result in a much longer time for retrieval (Associated Content, 2005). Sort the CD and DVD collection according to the criteria chosen. If the collection is very large this sorting can be done in stages to avoid confusi on. We may also choose to sub-categorize the collection additionally. For example if we choose to categorize based on the artist then sub-categorizing may be based on the release date or alphabetically based on the title.If our taste in music and movies is very broad we can buy colored electrical tape and designate a particular color to each genre. We could also store all the CD’s in our computer before organizing them, if we have a large drive space and ensure we take regular backups (wikiHow, 2005). Plastic storage units with slots for individual CDs may be used but if we arrange them alphabetically then we need to move hundreds of CDs each time we need to insert a new CD into the collection. We May also choose to arrange less used CDs and DVDs in a notebook rather than putting them in display (eHow, 1999).This will save a considerable amount of storage space. Putting away previously used CDs and DVDs before taking a new one ensures that our collection remains organized. Th e following criteria could be used for organizing the CDs and DVDs. Alphabetically: We could arrange the CDs in the alphabetical order either by the artist’s name or the title. The movies could be arranged alphabetically based on the title, key actor or the director’s name. This is the most commonly used criteria for arranging the CDs. The downside of this option is the necessity to move all the CDs and DVDs when we buy an album or movie.This scheme can also be combined with other schemes of arrangement like alphabetical with genre etc. Chronologically: This arrangement is based on the order of release or purchase of the CDs and DVDs. We could choose chronological based on album release date, or chronologically by the purchase date or historical era or chronological based on the life stage that could be associated with each album or movie. The movies could be arranged based on the era the content of the movie is based on (Propeller, 2003). By Genre: This type of arrang ement is for who have a very large collection and a broad taste in music and movies.We could arrange folk followed by rock and then melody. Similarly in movies we could categorize the collection as horror, action, mystery, comedy, love or make it more specific like Documentary, Zombies etc. If the collection is very large an entire rack could be devoted to each genre (Expert Village, 2008). Most Frequently Used: The albums and movies which are played most are arranged at the front of the pile and those which are not frequently used are arranged behind them. This arrangement makes the most played ones very easier to find. This scheme is also self organizing. Randomly:This is the least used scheme where in the CDs and DVDs are arranged in a random manner (Brunchma, 1997). The other schemes of arrangement also include critical arrangement where the best ones are placed at the beginning and the worst at the end. Arrangements can also be done based on performer’s or composerâ€⠄¢s origin, album title, instrumentation, mood and the tempo of the CDs (Propeller, 2003). Bibliography: (2005) Associated Content Available: http://www. associatedcontent. com/article/272550/how_to_organize_a_large_dvd_ collection. html? page=2 Last Accessed: 28 May 2008 (1997) BrunchmaAvailable: http://www. brunchma. com/archives/Forum2/HTML/000270. html Last Accessed: 26 May 2008 (March 1999) eHow Available: http://www. ehow. com/how_2032270_organize-cd-collection. html Last Accessed: 26 May 2008 (2008) Expert Village Available: http://www. expertvillage. com/video/370_organize-cds. htm Last Accessed: 25 May 2008 (2003) Propeller Available: http://music. propeller. com/story/2006/11/09/17-ways-to-organize-your-cd-collection/ Last Accessed: 26 May 2008 (January 2005) wikiHow Available: http://www. wikihow. com/Organize-a-Large-CD-Collection Last Accessed: 25 May 2008

Dramatic Irony In J.B.Priestley’s Plays Essay

In this essay I am going to write about how J.B.Priestely used dramatic irony and entrances and exits to create dramatic tension. I will tell you what dramatic irony is and how it is used in the story ‘An Inspector Calls’. In addition how Priestley uses entrances and exits to create tension as well. The play is set in 1912 but actually written in 1945, which created more dramatic irony because the audience knew what had already happened in real life. Priestley uses stage directions to create tension in the play and suspense, this quote supports my point ‘we hear a sharp ring of the door bell. Birling stops to listen’. This creates tension because it show’s people thoughts and facial expressions are shown. The fact that it is staged in one room creates more tension and it also makes everything tight and tense. It is also really good that everyone comes and goes out at really tense points. Before the inspector arrives the family are celebrating the engagement of Shelia Birling to Gerald Croft. There is a happy and jolly mood in the house. Mr.Birling’s Speeches have a lot of irony in them. Dramatic Irony is when the audience know what is going on but the actors on stage don’t know. For example when Mr.Birling talks about the Titanic being unsinkable ‘New York in 5 days-and every luxury-and Unsinkable’ because Priestley wrote this in 1945 but set it in 1912 the audience already know that the titanic sunk’. When the door bell rang Mr. Birling stops to listen and then just carries on what he was talking about. The doorbell rings at a really calm moment not a lot has happened so far in the play. Birling has given some dramatic speeches talking about war and how it will never happen. The doorbell goes and the inspector doesn’t come straight in it takes a bit for him to come in; Priestley is creating more tension here by slowing things down. Priestley describes the Inspector; he builds the Inspector up and makes him sound really tough and hard to crack.

Friday, August 30, 2019

Effects of Eating Fast Food Essay

We are constantly looking for ways to make the daily obligations and our daily routine as fast as possible. It is common that people complain that they do not have enough time to prepare food at home; different solutions have emerged to make life easier, such as fast food. It has an affordable price, an attractive presentation, and we can find it everywhere. Also, has adapted to a new lifestyle and has achieved worldwide popularity. But fast food has some negative effects in people’s health causing illnesses such as diabetes, obesity and cardiovascular disease. Over time, the high levels of sugar and simple carbohydrates in fast food can lead to diabetes. Excess of sugar intake, obesity and metabolic syndrome related to insulin resistance, are all significant risk factors for developing diabetes. The number of people living with diabetes worldwide, has more than doubled since 1980, from 153 million then to nearly 350 million in 2011 1. Fast food does not contain the proteins that the body needs to maintain consistent blood sugar levels, so the blood sugar level will drop suddenly soon after eating. Eating too much fast food can make people feel really uncomfortable and in a short time people can become obese. Fast food contains large amounts of fat, and as fat accumulates in people’s body, they will gain weight and could become obese. Weight gain occurs when people consume more calories than what they burn in a day. The most value meals served with fries and soda provide well over 1,000 calories per meal, which is more than the half average of what a person needs 2. So if a person eats fast food 3 times a day, he will be eating 150 percent of calories, which is more than what he needs in a day. A disease associated with obesity is cardiovascular disease, which can also cause people’s death. Higher densities of fast food restaurants are linked to a greater risk of cardiovascular health problems. The high levels of fat and sodium in fast food can contribute to heart disease by raising blood pressure and cholesterol levels, and by contributing to arterial plaque build up 3. Fast food is often also packed with sources of excess added sugar and saturated fats such as mayonnaise, cheese and soda. While this translates into excess calories and weight gain, it can also become and independent risk factor for cardiovascular disease. Elevated triglyceride and cholesterol levels are indicators of cardiovascular disease and are associated with increased risk of heart attack and stroke, which it is why people should be careful. After all, fast food has been a creation for this modern time; facilitating and adjusting to new lifestyles. Fast food is available everywhere, and because of this it is recommended that people know about the ingredients of fast food. This delicious food has components that make people addicted; therefore, they are more frequently consumed. Also, eating this food makes people gain weight, ultimately affecting health. People should limit the consumption of these processed foods and create a new eating habit that includes fresh and home-made food.

Thursday, August 29, 2019

SERVICE ENCOUNTERS Essay Example | Topics and Well Written Essays - 750 words

SERVICE ENCOUNTERS - Essay Example Attendant: No, it’s okay. Customer: But honestly you look so great! Have a great day ahead! The first line â€Å"I received the exact amount, Sir. Here’s your change† is an uptake because it leads the customer to express the following statement in the second line, â€Å"Thank you! You look so great today†. This line leads the other person to engage in another statement in the conversation, which is found in the third line, â€Å"Thanks, but honestly I’m not feeling well†. This statement leads to another reaction of the other party as stated in the fourth line, â€Å"You look fine and I think you don’t have a fever either†. This statement leads the other party to throw another line, â€Å"Yes, but it’s something personal†. This line leads the customer to say, â€Å"O! I’m sorry to remind you of that†. The attendant responded in the next line, â€Å"No, it’s okay†. Then finally, the custom er closed the conversation with this line, â€Å"But honestly you look so great! Have a great day ahead!†. Clearly, there were effective lines that can be considered as uptakes because the two persons were able to involve themselves in the conversation way beyond the actual point they are supposed to perform in the scenario. Drug Store A young man, a Christian and in his late 20s after purchasing everything from a drug store started to initiate a conversation with the sales attendant who looks somewhere in her late 30s. This happened when there were only two customers left as the rest were just served and then they moved away. Customer: I haven’t seen you for a while. Did you take your vacation leave? Attendant: Yes. I just wanted to spend time with my kids. Customer: Wow. That’s great. How are they doing? Attendant: As usual, not doing great with their grades at school. They’re too preoccupied with computer games. Customer: O! I’m offering to you again my time. But this time I’ll employ some biblical principles when I’ll talk to them. Attendant: That’s a good offer, but I’ll see it first what else I can do. Customer: Just please inform me if you need some help. Attendant: Yes, I will. Thank you! The customer started in the first line, which is an uptake because it leads the attendant to respond to this statement, â€Å"I haven’t seen you for a while. Did you take your vacation leave?† This is a question statement that requires answer and so the attendant responded in this line, â€Å"Yes. I just wanted to spend time with my kids†. This statement is of interest to the customer, as depicted through this line as a response, â€Å"Wow. That’s great. How are they doing?† Here is another question that requires answer from the attendant as showcased in this line, â€Å"As usual, not doing great with their grades at school. They’re too preoccupied with computer g ames.† In this response, we can depict that there must be an existing conversation like this that had taken place before as observed from the response of the customer, â€Å"O! I’m offering to you again my time. But this time I’ll employ some biblical principles when I’ll talk to them†. This is another offer, as we can observe from the response of the attendant, â€Å"That’s a good offer, but I’ll see it first what else I can do.† In this response, the customer did not want to make a closure, and so leaving this line â€Å"Just please inform me if you need some help.† The attendant responded and ended the conversation with this line, â€Å"

Wednesday, August 28, 2019

Banking Essay Example | Topics and Well Written Essays - 4000 words

Banking - Essay Example Depository insurance can be obtained instantly and they are not traded debts since bank incentive take risks and they have no discipline from market prices. Depository insurance have a role of disciplining the management and reduction moral hazard that is, infinite maturity infers that deposits can rapidly disappear; leading to moral hazard; sequential examination also gives a benefit to monitor such services(Pastre?, 2007). Depository insurance helps in ensuring less costly and unnecessary liquidations, duplication of deposits are avoided through monitoring and less probability of runs on solvent thus reducing shock to supply of money at macro level. Depository insurance relates to bank runs in that without monitoring of projects may be vulnerable resulting into socially uneconomical of projects. Allman (2006) describes the lender of the last resort as that institution which is willing to give loans as a last option to banks or other financial institutions that are undergoing financ ial problem that is considered highly risky. Such a firm is usually the country’s central bank. The lender of the last resort produces currency at its discretion to support institutions facing financial problems. ... Since they provide liquidity assistance they help curb the insolvency problem. The lender of the last resort therefore, eases smooth bank runs through recapitalizing the insolvent banks. This helps the financial institutions to enhance their consumer protection. In conclusion, both depository insurance and lender of the last resort have the one thing in common in that they tend to protect various financial institutions from insolvency challenges leading to efficient and effective bank runs. Essay Two An economic theory is a concept or an idea put forward to explain various economic aspects that exist in the world economy. Economic theories are those specifically, these theories explain the aspects in line with monetary effects and financial aspects related to the management and utilization of scarce resources exhaustively (Allman, 2006). The major theories that illustrate the existence of bank include: Economies of scale theory Here, transaction prices at core tend to increase this i s due to fixed cost of evaluating assets thus reducing average costs of trading. This shows that individual cannot at any time diversify perfectly since, bank pool risk and diversify portfolio are cheaper and that the payment services are also cheaper (Pastre?, 2007). A special situation is where liquidity insurance and economies of scale in risk pulling is experienced. Liquidity focuses on the banks cashable deposits as assets are long term and illiquid. Therefore, banks as pools of liquidity gives people with insurance in opposition to idiosyncratic shocks that they can only observe. Banks also protect borrowers from early encashment of loans. Asymmetrical information theory This involves screening to overcome adverse selection whereby intermediaries screen the quality

Tuesday, August 27, 2019

The Exdous from Egypt Essay Example | Topics and Well Written Essays - 2250 words

The Exdous from Egypt - Essay Example Its final edition was written about 700 years after its actual occurrence, which is a major flaw in historiography 2. According to Egyptian history written by Manetho during the Hellenistic era, Jerusalem was built by Hyksos, who were expelled in Egypt and accordingly, Moses was a leader of lepers who rebelled against Egyptian who got help from Hyksos. In another historical account by Hecateus of Abdera, Jerusalem was built by people who were driven out of Egypt, whose leader is Moses. 3.Some biblical accounts can be corroborated by external evidence. The plagues narrated in chapters 7-12 could be paralleled to the epidemic in mid 4th century, commonly referred to as the Asiatic illness. 4.Some archaeologist believed that Exodus did took place but in a much smaller scale. The accounts of 600,000 who marched on to Read Sea is probably hyperbolic. 5.The story of Exodus reflects ancient metaphors, folklores myth and philosophy. The crossing of the sea is a metaphor to the defeat of the Pharaoh and his army and was probably composed in celebration of the Israelites liberation from the Egyptian slavery, rather than the actual drowning of the pharaoh and his armies. In Hebrew poetry, the imagery of sinking into water is used several times as a metaphor for distress, such as when Jonah is seemingly inside the belly of a whale and in the song of David when he called for divine intervention in Psalm 69. Therefore the sinking of the Pharaoh and his army is a metaphor to the defeat of the pharaoh and their army! Moroever, some Biblical scholars believed that the theophanies in Mt.Sinai, are not originally part of Exodus and that God’s? revelation through the phrase â€Å"I am who I am† is believed to have an undercurrent of the Greek philosophy’s? Absolute being. 6.YHWH is a warrior God that side with the weak which continue to inspire liberation movement of current history. 7.The sources of Exodus is a combination of several traditions namely Yahwist (J),Elohist(E),Deutoronomy (D) and Priestly (P). Exodus 4 which Collins believed to be taken largely from Priestly tradition describes vividly Moses stretching of his hand over the sea and causes the division of water. This should not be taken as a historical account but an attempt to provide concrete expression of YHWH powerful hand in rescuing the Israelites. On the other hand, the presentation of YHWH as a warrior God in Exodus 15 is a clear influence of E tradition in Exodus. My Personal Position in Relation to Arguments Presented Firstly,I fully agree with Mr. Collin’s main contention that it is difficult to establish the historical basis of the whole Exodus. The fact that the Book of Exodus was written about 700 years after its actual occurrence already presents a major flaw in historiography. Moreover, the very limited available non biblical evidence of Jewish history prior to the reign of King David which started around 1,000 BCE is a major challenge .Moreover, the B iblical accounts took place 2 to 3 thousand years before the science of archaeology came into our midst (Miller). But I also agree with him, that Exodus is a literature that speaks of bits and pieces of historical accounts. Previous and recent archaeological findings would attest to it. A.Chariots Found in Gulf of Aqaba in 1978 and 1988 In 1978,Ron Wyatt found numerous chariot wheels with some with axles still on, covered by corals in the Gulf of Aqaba. He also

Monday, August 26, 2019

The fire of Jubilee by Stephen Oates Essay Example | Topics and Well Written Essays - 1000 words

The fire of Jubilee by Stephen Oates - Essay Example Unlike other slaves living in Virginia during 1820s, Turner was permitted to move among the county plantation and farms and to preach to his fellow slaves during Sundays. This kind of freedom and movement gave him a chance to study his fellow slaves and identify those who suited his plans. Further, it gave him an opportunity to learn the County’s geography and to note the brutal and cruel masters in the County farms. The author states that Turner’s reading of the bible made him realize that white people were wrong in justifying and quantifying slavery and that the bible contained amazing stories of the liberation of captives and exiles. The knowledge he gained from the Bible, his life experience and interpretation of mysterious signs forced Turner to believe that God had chosen him to stage a rebellion that would end up liberating the slaves in Virginia just as Moses liberated the Israelites from captivity in Egypt (Oates 31). An eclipse that occurred in Virginia in 183 1 encouraged Turner that God wanted him to start the uprising and his followers or fellow slaves began the revolt without hesitation since they knew it was for their liberation. When rebellion began, Turner followers traveled across Virginia executing white people in every farm. It is significant to note that the book provides chronological happening of the rebellion in Virginia and its inhuman suppression. as amazing as the story of the Virginia rebellion is, Oates narration of the aftermath of the 1831 events is saddening. For instance, the author states that at the beginning, it is not recognized that the number of black casualties murdered in white retaliation was more than Turner’s victims were. In addition, the author explains the fear and anxiety among white people in Virginia and other States that practiced slavery. White people feared that the uprising or rebellion was a small part of a bigger and much more organized uprising planned by William Lloyd from the North. William Lloyd Garrison advocated for abolitionism movement.

Sunday, August 25, 2019

Hermes financial analysis Essay Example | Topics and Well Written Essays - 1750 words

Hermes financial analysis - Essay Example Gucci and Louis Vuitton are seen to embrace modern fashion more than traditional garment and accessory designs. This creates a distinctive advantage for Hermes. The current paper focuses upon analysing the financial ratios. The ratios have been constructed on the basis of the information procured from the company’s financial statements. The analysis reveals whether the company is in a suitable financial position to expand and enhance their activities (Hermes annual report, 2013). The share price of Hermes has been depicting an upward rising trend. Share price can be considered to be an essential indicator of the financial health of a company, the same reason due to which share prices of Hermes has been included in the current study. The company has been seen to invest in profitable expansion and growth projects since the last five years. This has facilitated Hermes to maintain a significantly high share prices, as compared with other close competitors of the firm, especially during the crisis period. During the crisis period many retail firms were seen to face issues with asset management and maintaining adequate cash reserves, as support from external financial institutions was limited. However, the strong operating policies and the adequate financial stability of Hermes had facilitated the company to maintain continuity of operations without being dependent on external finance. The sales volume of Hermes had also not been affected majorly. All such factors facilitated maintaining adequate returns to shareholders and maintain rising share prices. In the following sections of the current paper, in depth analysis has been conducted in respect of the financial condition of the firm, considering the financial years 2012 and 2013. This is expected to give more insight regarding the reasons behind the company’s ability to maintain high share prices. Gross profit ratio measures the amount of profits earned by the company

Saturday, August 24, 2019

Research Methods for Business Assignment Example | Topics and Well Written Essays - 2250 words - 1

Research Methods for Business - Assignment Example Apart from this based on the study, it has been recognized that during the global trade, companies are facing several kind of risks from the global market place, which may be in terms of political aspects, economical aspects and commercial aspects. USASuperCars has been selling luxury sports cars. The company has developed a contractual agreement for selling cars to customers on a global context. In this respect, the intention of the article is to highlight information relating to foreign exchange along with the concept of global trade. Moreover, the study identifies the role of the bank in the sphere of exchange rate policy. At the same time, the involvement of risks in the foreign trade has been also discussed. In this assignment, selling prices of the USASuperCars has been given below along with the name of the countries. Thus, the aim of this assignment is to identify the consequences according to the situation given in the case. At the same time, involvement and occurrences of bank in case of foreign trade has been demonstrated through the study. In order to identify the probability of exceeding the revenue $ 2,200,000, it can be ascertained that if the company USASuperCars will incur loss approximately around (17%) due to foreign exchange and for other reasons such as distribution purpose, even then the company will definitely be able to ensure a revenue approximately $2,200,000 or more. Rationally, the cost of cars is found to be recorded as $2207607.45, which signifies that during the global trade if the company will perform their trade operation with a loss of 17%, instead of that the company will able to earn a revenue around at least $ 2,200,000. Thus, it can be claimed that the probability is high of exceeding the revenue level $2,200,000 (Niepmann & Schmidt-Eisenlohr, 2014; Economy watch, 2010). In order to identify the probability of exceeding the revenue $2,225,000, it can be claimed that

Friday, August 23, 2019

Included in attachments Assignment Example | Topics and Well Written Essays - 500 words

Included in attachments - Assignment Example The process occurs in a cycle that recurs. Chet Richards suggests that a decision maker who has the knowledge and ability to process the OODA cycle quickly while identifying and reacting to the issues that arise, is likely to circumvent his or her opponent’s decision cycle; hence, give him or her an advantage over his/her rivals (27). The OODA Loop is instrumental in the conversion of records into information and subsequently into knowledge. Decision makers need to have a good understanding of what data represents if they are to be able to transform it into useful information; this information can then be used to impact knowledge into individuals. This can be done by analysing data, and information using the OODA Loop. The person studying the data analyzes it, orients it to filter information, makes a decision, and then acts based on the decision he/she makes. System analysts ought to have a good understanding of how workstations, networks, operating systems, databases and software operate. This should include knowing their operation potential s and limits; it is easier for a person to analyse what he knows than that which he has no idea about. Technical skills are, therefore, of great importance to any system analyst. In commercial enterprises, system analysts are most likely to work in information technology departments that are tasked with the duty of developing and maintaining systems for the enterprises. They could be could be employed as system developers, designers, or system administrators. Those of them with appropriate technical knowledge could also undertake system maintenance. d. Charge Nurse: Charge nurses are individuals with a lot of experience in nursing; hence acquiring a lot of acquaintance in the process. They can, therefore, be grouped under the category of knowledge employees. e. Software Engineer: This position can be placed under knowledge

Thursday, August 22, 2019

Coaching youth sports Research Paper Example | Topics and Well Written Essays - 1500 words

Coaching youth sports - Research Paper Example Most developed economies spend millions of dollars in promoting sports, training the new comers to it and making people aware of the importance as well as over all benefits of sports activities. This piece of research paper addresses basic techniques in teaching of softball to young players and positive ways of identifying appropriate skills in individual players and explains how sports can develop physical skills as well as self esteem in young people. Coaching Techniques for Softball As Softball is a team sport, it requires using of specific evaluation tools and techniques that can also be used to assess the developments of the individual parts to make up the whole of the team (American Sport Education Program, p. 9). Improving basic physical skill is key element to success of any sport, and therefore, it is highly important that all the techniques and tactics that are planned to coach softball players must be useful to improve the physical skills of the players. Similarly, there a re some non-physical skills like remembrance, mental capacity, communication skill, character training etc that are also important for effective performance in any sport and these are also to be considered while coaching is given to softball players. Evaluating the effective techniques for coaching softball requires understanding what are the essential physical skills required for softball. They are strength, speed, agility, flexibility and power (American Sport Education Program, p. 9). Techniques and tactics can be different from team to tem, from coach to coach, but all these techniques must be able to boost the above mentioned essential physical skills. Prior to starting physical training and coaching of physical skills, the trainers or coachers must convey messages regarding the importance of the coaching, motivate the athletes to improve in their present skills, try to make all the coaching techniques to be given to athletes are unbiased and constant and convey the feedback of the coaching to the, etc. In softball techniques, Hitting coaching is perhaps most important one. It involves quickness, strength and hand-eye coordination etc. While coaching to help players better hit, it must be carefully considered to make them comfortable in proper grip and stance as well (American Sport Education Program, p. 22- 24). Another important technique of coaching is stride, which is a controlled forward move in the direction of the pitcher in order to help the hitter transfer her weight while she swings. Coachers should also train how the players can effectively position their bat and how can they be angled well. Teaching the proper hand-position in bat is also highly important. In each and every step, through out every different move forward and along with different types of hitting, the coacher should teach different stance, hand position and better grip tactics to the players so that they can have gradual improvements in overall moving and other important parts o f the softball game. A well structures and effective coaching of softball with different techniques must be well-planned, considering various programs like a) monitoring academic progress, b) arranging team program, c) creating goal chart, d) administering coaching, e) cooperating with team-players etc (Veroni and Brazier, p. 36). Ways to identify skills appropriate to individuals Players are individually different in terms of their age, gender and physical strength and therefore certain skills are more appropriate to some

Spiritual Diversity Essay Example for Free

Spiritual Diversity Essay Abstract ]When meeting individuals and their families with various religious and spiritual backgrounds, it is important for nurses and health care providers to be comfortable and competent in providing religious and spiritual based care. To provide holistic care, understanding the religion or spiritual background of the patient and how it impacts their health care is an important factor for their health care planning. Three religions are studied within this paper; The Baha’i Faith, Buddhism, and Jehovahs Witness, and are compared with the Christian Faith. Key points were researched, which include getting a more in-depth understanding on the various perspectives on healing, the critical components of healing, and grasping a concept of the relationship between their beliefs and that of their health care provider. The Baha’i Faith includes prayer and meditation with the combination of modern medicine, in which can be lead to healing. A peaceful environment should be provided for patients and their families to promote prayer. Buddhism individuals also practice prayer and meditation, and follow a more restrictive diet. Keeping these key points in mind when caring for a patient of the Buddhist religion can ensure a more holistic approach. Jehovahs Witness can be known to refuse specific treatments. Offering alternatives can be possible. Jehovahs Witness patients wish to have a high level of respect, without being judged of their decisions. When comparing the four religions, it is found they all have the commonality of prayer, having a peaceful healing environment, and to be respected by their caregivers. Diversity in Health Care Health care providers meet and interact with many people of different ages, race, and religious and spiritual backgrounds. Being a provider to someone with a different background than his or her own can often be a difficult task. It is often thought that caring for an individual is solely based on the physical aspect, but to provide true, holistic care to an individual, all needs must be taken into consideration. Health care is typically defined as being multidimensional, and requires a degree of depth and balance between the elements of physical, emotional, intellectual, social, and spiritual health, and the dynamics between each and all of these influence that of another (Black, Furney, Graf, Nolte, 2010, p. 244). Spirituality plays a large role on the road of healing, and a health care provider must be able to understand and incorporate their individualized needs into their care. The religious and spiritual components of three different religions will be further discussed within this paper; grasping a more in-depth understanding of the spiritual perspective on healing, critical components on healing, and the relationship between their beliefs and that of their health care provider. The Baha’i Faith, Buddhism, and Jehovah’s Witness will be studied, and compared to the Christian Faith. Education and competence is a necessity when it comes to cultural and religious aspects in the health care field. To fully grasp and understand patients’ needs while they are in a hospital setting, can be challenging. Asking open-ended questions to an individual and their family can help the physicians and nurses further individualize patient centered care. For many cultures, religion plays a large role in their day-to-day lives, and when faced with illness, continuation of their practices needs to be incorporated to assist with the healing process. Another important aspect of spiritual diversity is to fully understand and be conscious of one’s own spiritual and cultural beliefs. This can allow for a lack of bias in the care that is provided, and to assure care is truly patient centered. For members of the Baha’i faith, there is only one God, and He is believed to be the Creator of the universe. The soul of human beings is essentially the identity of each individual, and the relationship between God grows and develops through prayer, moral self-discipline, and gives a meaning to life (The Baha’i Faith, 2012). Like many religions, life is seen as a joyous, eternal process that involves the discovery and growth of spirituality. Prayer and meditation are practiced to progress spiritually, and combined with medicine; it is believed that sickness can be healed. In the health care setting, prayer and meditation is a large part in the Baha’i faith, as well as symbols or pictures of the son of the Prophet Fou nder of the Baha’i Faith, ‘Abdu I-Baha’, which should all be treated with respect. No special prayer room is needed for an individual of this religion, but assisting in giving a peaceful environment will provide a suitable environment for the patient and their family. There are no dietary restrictions for a patient of the Baha’i faith, with an exception of the Fasting period, which is March 20-21st, when members aged 15-70 do not eat or drink between dawn and sunset (The Baha’i Faith, 2012). This fasting period can have an exception to those who are ill, but that is dependent on the individual. When providing care to an individual of the Baha’i faith, it is essential to understand and respect the views of the patient, and to allow time for prayer and meditation. Being the fourth largest religion in the world, Buddhism is a religion that many nurses and health care providers may come across more often. Like Christianity, Buddhism follows the principle of reciprocity, or the â€Å"‘Golden Rule’: To do onto others as you would wish them to do onto you† (Robinson, 2009). In the Buddhist religion, Buddha offered advice to members of the religion to assist them in healing quickly and thoroughly. His recommendatio ns consisted of eating selective foods, to consume foods at the proper intervals, keep an optimistic outlook, be kind, considerate, and cooperative to those who are taking care of them, and stay in touch with the physicians and nurses. Beliefs are, following these recommendations will yield the best results from treatments (â€Å"Buddhism, Medicine, and Health† n.d). Respect between the health care providers and the patient and their family is held very high with the Buddhist religion. Treatments recommended by the physician typically have no restrictions, including blood transfusions. Most Buddhists are vegetarian or vegan, so incorporating a special diet into their care will help build a level of confidence between the patient and the health care team. Prayer and meditation also is a part of the Buddhist practice, and Buddha figurines or pictures may be brought in by family members to help look over the patient. A Christian-based religious denomination that consists of approximately 6.9 million people makes up the religious movement, Jehovah’s Witness. Members of this religious group differ from the Christian religion in many ways, such as with the refusal of many health treatments or procedures such as blood transfusions (â€Å"Jehovah’s Witness†, 2009). When taking care of a patient who is a Jehovah’s Witness, the nurse needs to keep in mind the restrictions the patient may have regarding any blood transfusions or blood products. Having knowledge of and providing options for alternatives instead of a blood product will be necessary and useful for the patient when it comes to making decisions related to this issue. Jehovah’s Witnesses do not believe in faith healing, but will pray and reach out to their faith beliefs to guide them in the healing process. As a health care worker, having the Chaplain visit the patient and their family can help the patient feel more comfortable and gives them an additional outlet to pray and reconcile their religious beliefs during difficult times. When taking care of a patient who is a Jehovah’s Witness, the most important concept is respect and trust. Patients are trusting in modern medicine, the physicians, and nurses to help them heal, and deserve the right to refuse treatment without judgment of their decision. Receiving care from an individual who is of different religious or cultural background does not make a difference in the response of treatment, and a tr usting relationship should not be difficult to build as long as the caregiver acknowledges, respects, and does all they can to provide appropriate religious care to the patient. People who are of the Christian religion are acceptable to most medical treatments, and while there are typically no restrictions per their religion, refusal of a treatment or procedure is most often due to personal preference. While in a hospital setting, offering to have a Chaplain visit the patient on a weekly or as needed basis can create a sense of connection with the Lord, and grant some ease and comfort to the patient. Christianity places a lot of their healing in the hands of God, and believes in the power of prayer. When comparing Buddhism, Jehovah’s Witness, and the Baha’i Faith to Christianity, there are some evident similarities between them all. Each share the appreciation for the health care provider to respect and incorporate their needs and beliefs, even when their provider has a different belief or background than the patients. All four of these religions share a commonality of a higher being in which they worship and put their faith in, and who they send their prayers in times of illness or hardship. Respect is the most prevalent common factor of these religions that individuals wish from their health care providers, and is also one of the simplest ways the provider can give back to their patient. If a health care provider is unfamiliar with a religion or the way they practice, a great way to show the patient you are truly interested in the patient centered care is to actively learn their rituals or beliefs, and accommodate it into their care. Taking care of patients of a different culture or religion can often create a feeling of distress between the nurse and patient, and â€Å"misunderstandings occur because of the difference in backgrounds, experiences, mannerisms, assumptions, and expectations† (McNutt, n.d, para. 2). It is important for the health care provider to ask questions to the patient or family members in regards to diet, spiritual needs, and any special accommodations that could be incorporated into patient care. Doing so can help the patient heal in a more comfortable environment, gain trust and respect of their providers, and yield better patient outcomes and compliance. References Black, J., Furney, S., Graf, H., Nolte, A. (2010). Philosophical foundations of health education. Retrieved from Google ebookstore http://books.google.com/books?hl=enlr=id=KL_pBVZftwICoi=fndpg=PA243dq=spiritual+and+holistic+careots=sIGdQb4TzTsig=fa0-Z1gaIuc1camBWlGw3UmRobQ#v=onepageq=spiritual%20and%20holistic%20caref=false â€Å"Buddhism, Medicine, and Health†. (n.d). Retrieved from http://www.blia.org/english/publications/booklet/pages/37.htm Jehovah’s Witness at a glance. (2009). Retrieved from http://www.bbc.co.uk/religion/religions/witnesses/ataglance/glance.shtml McNutt, B. (n.d). Patients from different cultures. Retrieved from http://www.streetdirectory.com/etoday/patients-from-different-cultures-pplejf.html Robinson, B. (2009). Buddhism’s core beliefs. Retrieved from http://www.religioustolerance.org/buddhism1.htm â€Å"The Baha’i Faith†. Prayer, Meditation, and Fasting. (2012). Retrieved from http://info.bahai.org/article-1-4-0-7.html

Wednesday, August 21, 2019

Good Managers Are Born Not Made Management Essay

Good Managers Are Born Not Made Management Essay The key to a successful organization is said to lie within a good manager. It is in fact the effectiveness of this manager and the qualities that they possess that are vital to the development and preservation of an efficient management system within a corporation. The question remains however, as to whether or not these good managers are born, if they possess qualities that will mould them into fantastic leaders of the future. Or are they made? Is it possible to develop and acquire the necessary skills to become the good manager a successful organization needs? It should first be acknowledged that leaders and managers are often referred to assuming they are the exact same thing however, there are some differences that need to be clarified. There is often some confusion due to the fact that it is particularly difficult to define a manager because a universally accepted definition does not exist. According to Tripathi, (2008, p.2) a manager is one who contributes to the organisations goals indirectly by directing the efforts of others-not by performing the task himself. Leadership and management are closely interrelated because if you are a manager of an organization, you are in essence the most important leader (Kouzes Posner 2010, p.338). The most obvious distinction between a leader and a manager lies within what leadership refers to. Leadership does not refer to a position at the top of an organization and just because a manager holds that specific position, it does not mean they are leading. Leaders have willing followers where their right to lead is earned from those followers through their influence. They intend to make change using their personal power and cannot use coercion but instead inspire with their vision (Huth 2001). A manager on the other hand, must hold the authority to achieve results through other people whereby their right to manage is granted by ownership. Managers must be in a position of power where they can use coercion and coordinate activities (Huth 2001). However, nobody can deny that one compliments the other. It could appear that based on the above one could quite possible be born a leader but not a manager, although this can also be disputed. Kouzes and Posner (2010, p.339) consider it a myth that the noti on of leadership is reserved for those lucky enough to be born with it. Leadership is, an observable set of skills and abilities (Kouzes Posner 2010, p.338). Therefore the query still remains as to whether a good manager can be made; it may just be that a good manager must also be required to possess good leadership skills. There are surely many corporations that still value the theory that: Good managers are born not made, however the common organizational failures that can be detected within many individual companies suggest that this theory is in fact flawed. Werner and DeSimone (2006, p.441) suggest that management development is a huge way to increase the effectiveness of managers within an organization. Werner and DeSimone (2006, p.441) make a strong point emphasizing that even though according to popular belief the ability to manage is an inborn capability, there is a contemporary view that the KSAOs (knowledge, skills, abilities and other characteristics) which all work to develop an effective manager can be learned or acquired. Nonetheless, before touching on how companies can establish a new found understanding on developing effective management within an organization, the notion of management development must firstly be explained. Werner and DeSimone (2006, p.441) defined management developme nt as: An organizations conscious effort to provide its managers (and potential managers) with opportunities to learn, grow, and change, in hopes of producing over the long term a cadre of managers with the skills necessary to function effectively in that organization. The definition above supports the notion that management development should be seen specific to a particular organization. This is due to the fact that each organization is unique and should aim to develop individuals into effective managers within the context of the particular organization. In addition, the entire idea behind management development is the fact that employees are granted the opportunity to learn, grow and improve. Therefore when you refer this back to the ability to further develop ones skills, according to Werner and DeSimone (2006, p.441) it assists managers in learning how to learn. The authors also indicate that management development is made up of three components: (1) management education, (2) management training, and (3) on-the-job experiences (Werner DeSimone 2006, p.442). It is these very components that Werner and DeSimone believe strongly contribute to the development of an effective manager. Williamson (2006) concurs that on the job experience is one of the most significant learning curves. According to Williamson (2006) an effective manager is made up of a range of skills that go beyond the misconception that the sole role of a manager is to tell people what to do. Williamson (2006) made a list of characteristics and skills that are necessary for a manager to possess to therefore be effective. Some of these skills and characteristics include; being knowledgeable by understanding the goals and objectives of the company. Understanding the expectations you must meet along with the goals and objectives. Appreciating and understand the value of their team, being empathetic and knowing how to manage their time and use their time efficiently, passing those skills onto their team. All of the above are examples of skills that are gained through training and through experience, in conjunction with the components of Werner and DeSimone. A good manager is required to work hard and pour a lot of effort into his job experience to extract the necessary lessons from each experience, learning and growing. There is disagreement amongst management writers about the classification of managerial functions however Tripathi (2008, p.3) classifies the functions into six types; Planning, Organising, Directing, Controlling, Innovation and Representation. Planning is the function that determines what should be done, preparing for the future. Organising refers to providing the business with everything useful to its functioning including, personnel, raw materials, tools, capital. Furthermore Tripathi (2008, p.3) includes staffing as a function within Organising whereby the manager attempts to find the right person for each job. Just by taking these two functions as an example it can be noted that life and work experience play a huge part in the development of an effective manager. One cannot be born with the knowledge to understand the needs of an organisation nor can they have the experience to judge a persons capabilities and allocate them the appropriate job. These capabilities are acquired and developed over time. There will always be the belief that good managers are born and in fact not made, because they hold the ability to manage which is something innate and cannot be imparted by training.

Tuesday, August 20, 2019

Oil Platforms Case Study

Oil Platforms Case Study The Oil Platforms Case The Rule of Force in International Law I. Introduction This paper relates to the Case Concerning Oil Platforms (Islamic Republic of Iran v. United States) of the International Court of Justice and its decision on the same delivered on November 6th, 2003. The dispute is related to a series of events that occurred during the Iran-Iraq war 1980-1988. During the war, due to attacks on merchant shipping vessels in the Persian Gulf, the US and other states engaged in â€Å"counter-attack† by targeting two Iranian oil platforms and severely damaging them in separate incidents. The US argued that it was only responding to a perceived threat and the attacks were only in the interest of security in the region. Tehran, not buying this theory of self-defence put forth by the US, cited several violations of bi-lateral International treaties crying foul over such use force. The prohibition of the usage of force by states in engrafted in customary international law as well as in Article 2 (4) of the UN Charter. But both fall short of containing force that is used in the States exercise of the right of self-defence. The ICJ in this particular case had to assert whether the force used by the US was really pre-emptive in nature; if it was, was it proportionate. The court whilst delivering its judgment developed an interesting new theory on such use of force by a state, a theory which has only been received critically. This paper shall seek to explore this particular theory in light of the aforementioned case. It must also be noted that this being a recent judgment holds immense practical significance with regard to the US operations in Afghanistan, Iraq and the troubled Baluchistan and NWFP provinces of Pakistan. To facilitate easy study, this paper has been divided into three parts; the first shall be an appraisal of the facts of the case itself, the second shall be a study of Article 2(4) and the final part will be a review judgment. II. The Facts of the Case and its Backdrop The case arose out of certain incidents during the Iran-Iraq war from 1980 to 1988. The case before the international Court of Justice revolved around the legality of the use of force with relation to two specific attacks against Iranian interests by US forces during the course of the war. The first instance was on October 19th, 1987. The US navy launched armed attacks against Irans Reshadat and Resalat oil complexes, both located in the Persian Gulf. This resulted in the complete annihilation of one of the oil platforms, whereas the other was severely damaged. As justification, the US claimed it was acting in ‘self-defence and the attack was in response to a missile strike three days prior on the Sea Isle City, a Kuwaiti tanker rebadged as a US flag-carrier in order to better ensure its safety. The second attack occurred a year later on April 18th, 1988 when US naval strikes severely damaged the Iranian Nasr and Salman complexes, nearly destroying the former. This time the US resorted to its prior justification of â€Å"acting in self-defence† again by stating that the attacks were in response to an American frigate, the USS Samuel B. Roberts, having been struck by a mine whilst sailing in international waters near Bahrain. On both instances the US notified the United Nations Security Council of its course of action in accordance with Article 51 of the UN Charter. The Iranian Government in its Application to the court based its claims on the 1955Treaty of Amity, Economic Relations and Consular Rights between the US and Iran (the Treaty), not sparing basic principles of international law. The Courts (the International Court of Justice) jurisdiction was founded on Article XXI (2) of the Treaty. Article I of the Treaty provided that â€Å"there shall be firm and enduring peace and sincere friendship between the United States of America and Iran†. Article X(1) of the Treaty provided that there should be freedom of commerce and navigation between the parties territories: â€Å"Between the territories of the two High Contracting Parties there shall be freedom of commerce and navigation.† Based on Articles I and X(1) of the Treaty of Amity, Iran accused the United States of having breached the Treaty by attacking and destroying the oil platforms. It also submitted that United States â€Å"patently hostile and threatening attitude towards the Islamic Republic of Iran† was a breach of the very purpose and object of the Treaty of amity including Articles I and X(1), and principles of international law, and that the US was under an obligation to make reparations to Iran for the violation of such legal obligations. The US denied any breach of obligation with Iran under Article X(1) and replied that the attacks were necessary to protect its national security. This, according to the US, was covered by Article XX(1)(d) of the Treaty and read: â€Å"The present Treaty shall not preclude the application of measures: (d) necessary to fulfill the obligations of a High Contracting Party for the maintenance or restoration of international peace and security, or necessary to protect its essential security interests.† Also, the US, in another counter-claim pleaded unsuccessfully, claimed that Iran had violated Article X of the Treaty by attacking its vessels and laying mines in the Persian Gulf and â€Å"engaging in activities from 1987 to 1988 that were dangerous and detrimental to maritime commerce and navigation†. The US claims of military attack on merchant vessels and warships were not completely unfounded. During the from 1984 to 1988, known as the Tanker War, numerous vessels were attacked in the Persian Gulf and such attacks were perceived to be purported by the Iranian military by means of aerial attacks and the use of mines. The Llyods Maritime Information Service list noted more 546 incidents, 200 of which were directly attributed to Iran. Iran, however, directed such accusations to Iraq and claimed responsibility for none. It must be noted here that the Treaty of Amity was signed between the US and Iran back in 1955. After the Islamic Revolution of 1979 in Iran and the installation of the Khomeini as the head-of-state in all practical aspects, relations between the two states soured and was particularly before the start of the Iran-Iraq war. During the revolution, the US expressed its dissatisfaction with affairs in Iran by severing all diplomatic ties with the Islamic state. The American embassy at Tehran was seiged by supporters of the Khomeini and Americans were taken hostage for a considerable period of time. Irans previous democratically regime headed by the Shah had been seen by the US as an ally; this did not go down too well with its new Government which accused the US of â€Å"over-involvement† with its internal affairs during the past regime. Further, the new government of Iran saw the inability of the Security Council to prevent and contain Iraqs invasion of Iran in September, 1980 as the result of an anti-Iran bias in the Council and even in the UN as a whole. Under such circumstances, the Iranian regime saw the increasing presence of American forces in the Persian Gulf as a perceived threat to its interests resulting in the attacks. Ergo, this conflict was not completely unpredictable; nor was it unavoidable as it had been on the offing for a while. In this respect, the Security Council had failed to check the rising tension between the two states. As a body whose primary task is maintaining world peace and stability it had failed to contain such a conflict which could have been resolved had it played a more active role in mediation between the states. III. Article 2(4) The Blind-spot Article 2(4) of the UN Charter reads: This provision of the Charter however, finds itself lacking and is ill-equipped to handle a rather important aspect international armed conflict. Its blind-spot it has no provisions for prohibition of military threats or the threat of use of force. The ambit of article 2(4) is limited to actual use of military force and â€Å"threats† to impose economic or political sanctions are beyond it. According to the general scheme of the UN charter, a violation of Ar. 2(4) may be justified only on two grounds recourse to self defence and authorisation by the UNSC. This brings us to the moot question Are states free to reciprocate to threats when no armed attack has actually occurred? This question has been left unanswered and its outcome the many wars fought even after the UN Charter was adopted. Two perfect examples of such a situation arose in Europe in August, 1914, the beginning of the First World War and again during the Second World War. The question before a nation is whether to ignore the military threat or to issue a counter-threat. In such a situation when one party is advantaged by overwhelming military threat, the threat involved will become lopsided and there will not be any real escalation or build-up of bilateral tension. Any country will always place self-defence on a higher footing as compared to a policy of self-restraint considering the demands of national security. The prohibition on the use of force is found both in customary international law and, as stated above, in Article 2(4) of the UN Charter. According to the UN Charter a state is not allowed to use force as a response to any intervention that falls short of an armed attack. The criterions established for the exercise of such retaliatory force include requirements that the force used must be necessary to repel the armed attack; it must be absolutely unavoidable and the force used must be proportionate. The Nicaragua decision [Case Concerning Paramilitary Activities in and against Nicaragua (Nicaragua v. USA)] echoed this principle. Article 51 carrying forward from Article 2(4) too recognizes states right to act in individual and collective self-defence if an armed attack is suffered by any member-state of the UN. Under Chapter VII of the UN Charter, force may also be used to preserve or restore international peace and security in accordance with decisions of the UN Security Council. In the Nicaragua case, the Court rejected US arguments that US support for military and paramilitary activities in and against Nicaragua could be justified on a basis of collective self-defence. These activities included certain activity of the contras in Nicaragua, including specified attacks, secret mine-laying, and a trade embargo imposed by the US against Nicaragua. The Court found the United States was in breach inter-alia of its obligations under customary international law not to intervene in the affairs of another State, not to violate the sovereignty of another State, not to interrupt peaceful maritime commerce and not to use force against another State. The US had also violated bilateral obligations to Nicaragua under a 1956 Treaty of Friendship, Commerce and Navigation between the United States of America and the Republic of Nicaragua. In the Nicaragua case the US chose not to appear before the Court during proceedings on the merits of the case. The Courts jurisdiction was founded on the United States 1946 declaration of acceptance of the Courts jurisdiction under Article 36(2) of the Statute of the Court, as well as on the bilateral 1956 Treaty. IV. The Judgement The approach taken by the International Court of Justice in the Oil Platforms case was controversial. In respect of Irans claim, the Court decided to address the question of whether the US attacks on Iranian oil platforms fell within Article XX(1)(d), before moving on to considerwhether there had been a breach of Article X(1) as requestedby Iran. In examining the application of Article XX(1)(d) the Courtdecided to focus on whether US recourse to force had been consistentwith international law on self-defence. The Court reasoned that evena provision protecting national security interests could not have beenintended to sanction the use of force inconsistently with relevant internationallaw. The Court proceeded to find that the US had exceededthe boundaries of international law on the use of force, and this disposedof the US claim that it was protected by Article XX(1)(d). In this way, the case centred on the illegality of the usage of force by the US. Recalling the discussion Article 2(4), the Court found that the US had failed to produce enough evidence to prove an Iranian â€Å"armed attack† in the case of the Sea Isle City and the Samuel B. Roberts. The evidence furnished by the US was so inconclusive that the Court did not discount the possibility of the attacks being carried out by Iraq. The Court noted that the Sea Isle City, at the time of the attack, was in Kuwaiti waters and the missile was launched on to it from a distance of over a hundred kilometres. The target of the missile, considering the great distance, could not have been pre-determined and it could have been intended to strike just about any target in Kuwaiti waters. With regard to the impugned mine-laying activities of Iran, the Court was again discontent with the evidence provided. There was no conclusive evidence to prove that the mine struck by the USS Samuel B. Roberts was indeed an Iranian one. The region at that time was in a state of turmoil. Both parties were engaged in mining the conflict zone and merely because the impugned mines bore numbers matching an Iranian series, Iran can not be held guilty. Whilst leaving room for speculation with the issue of the origin of the mines, the Court felt that even if they had actually been of Iranian origin, the US attacks on the Salman and Nasr complexes were unjustified. Recalling the Nicaragua decision, the Court opined that the Iranian attacks, if at all they were Iranian, did not qualify as â€Å"the ‘most grave form of the use of force† and the US can not claim the defence of â€Å"inherent right of self-defence†. The US contended that the oil platforms were being used as military bases by Iran and were being used for the collection and reporting of intelligence on passing vessels. In this regard too, the Court found the American evidence lacking. Even if the accusations against Iran had been true, the Court opined that the attacks made on the platforms could not have been justified as acts of self-defence. The criteria for claiming the defence of ‘self-defence had been established by the Court while acting in its advisory role in the case of Legality of the Threat or Use of Nuclear Weapons; they were â€Å"necessity† and â€Å"proportionality†. The US had failed to make out a sufficient cause on both grounds. The Court noted that the attacks on the platforms were not ‘necessary as a response to the attacks on the American vessels and the US admitted to have attacked them as a â€Å"target of opportunity† and not as pre-determined military targets. While the US attack on the Reshadat and Resalat complexes might have been considered proportionate if it had been found to be necessary, the Court made clear its view that the US attack on the Salman and Nasr platforms could not be regarded as meeting the criterion of proportionality. Although the Samuel B. Roberts had been severely damaged it had not been sunk and there had been no loss of life. The Court concluded that as the US attacks on the Iranian oil platform were not consistent with these requirements of international law on self-defence they could not be found to fall within the protection of Article XX(1)(d) of the Treaty of Amity. Only at this point did the US get some reprieve when the Court turned to the Iranian accusation of the US having breached Article X(1) of the Treaty of Amity by interfering with the freedom of commerce and navigation between the territories of the two parties. The Court found that Iran had failed to establish that the US had breached Article X(1) on the occasion of either of the attacks at issue. In respect of the first US attack, on the Reshadat and Resalat platforms, the Court reached this conclusion primarily on the basis that these platforms had been put out of commission by earlier Iraqi attacks and were not producing oil at the time. Therefore there was no interference with commerce in oil. In respect of the second US attack, on the Salman and Nasr platforms, the Courts reasoning was that the US had already stopped all direct oil imports from Iran under an embargo imposed by Executive Order. Therefore, no interference with commerce in oil had resulted from this second attack. T he Court emphasised that Article X(1) applied only to protect freedom of commerce and navigation between the territories of the two parties, and its protection did not extend to indirect commerce in oil that continued despite the embargo via the territories of third parties. Accordingly, neither of the US attacks on the Iranian Oil Platforms was found to have interfered with freedom of commerce in oil. The US counterclaim against Iran likewise failed because none of the affected vessels was engaged in commerce or navigation between the territories of the two parties. Summing the case, in its dispositif at the end of its judgment, the Court stated that, by fourteen votes to two, it: Finds the actions of the United States of America against Iranian oil platforms on 19 October 1987 and 18 April 1988 cannot be justified as measures necessary to protect the essential security interests of the United States of America under Article XX, paragraph 1(d), of the 1955 Treaty of Amity, Economic Relations and Consular Rights between the United States of America and Iran, as interpreted in the light of international law on the use of force; finds further that the Court cannot however uphold the submission of the Islamic Republic of Iran that those actions constitute a breach of the obligations of the United States of America under Article X, paragraph 1, of that Treaty, regarding freedom of commerce between the territories of the parties, and that, accordingly, the claim of the Islamic Republic of Iran for reparation also cannot be upheld. V. Comments The Oil Platforms case is of immense significance in present times in light of the growing military activities of the US in the Middle East, especially in Iraq and Afghanistan. However, its detractors criticise the judgment by stating that it laid too little importance on the aspect of trade and commerce and the role it plays in armed conflict. This can not be ignored completely; after all, most battles are fought with a hidden economic interest for atleast one of the parties. The dissenting judges opined that the Court let pass an opportunity for more lengthy engagement with significant questions associated with the effects of armed conflict on trade and commercial activity. But, this cases primary focus was the use of force and in the opinion of the researcher it has done absolute justice in establishing its principle. The conditions of â€Å"necessity† and â€Å"proportionality† have not only been reinforced by the Court but also been developed to address the growing concerns of armed conflicts between states. As the future of Afghanistan and Iraq unfold before us and American interest in Irans affairs rises, the contribution of the judgment in the Oil Platforms case can not be ignored. It shall be the judge in assessing US activities in the region and will assist in developing the yard-stick of the usage of force. In a way future military activities of the US and other NATO allies will be moulded by it, ensuring a more secure world. Bibliography Harris D.J., Cases and Materials on International Law, Sweet Maxwell, London, 6th edition. Goodrich Leland, Hanbro Eward, Simmons Anne, Charter of the UN: Commentary Documents, Oxford University Press, 3rd edition. Sturchler Nikolas, The Threat of force in International Law, Cambridge University Press, Cambridge, 2007. General List No 90, I.C.J. Reports 2003 Sturchler Nikolas, The Threat of force in International Law, Cambridge University Press, Cambridge, 2007. See the Courts Order dated 12th December, 1996. Judgment of the Court, para 23. Counter-Memorial of the United States, Exhibit 9, referred to in the Separate Opinion of Judge Kooijmans, para 11. See the Courts Judgment of 24 May 1980 in the Case Concerning United States Diplomatic and Consular Staff in Tehran. Judgment of the Court, para 23ff; Separate Opinion of Judge Kooijmans, para 5ff. Goodrich Leland, Hanbro Eward, Simmons Anne, Charter of the UN: Commentary Documents, Oxford University Press, 3rd edition, p. 49. Supra n.2 Sturchler Nikolas, The Threat of force in International Law, Cambridge University Press, Cambridge, 2007. General List no.70, Judgment of the Court of 27th June, 1986. Ibid. Judgment of the Court, para 61. Ibid., para 72. Ibid., para 64. Judgment of the Court, para. 71. Judgment of the Court, para. 64. Judgment of the Court, para. 74. ICJ Reports 1996 (I), p. 245, para.41. Judgment of the Court, para. 76. Judgment of the Court, para. 77. Judgment of the Court, para. 92ff. Judgment of the Court, para. 94ff. Separate Opinion of Judge Higgins para 51.

Monday, August 19, 2019

Business Communications Essay -- essays research papers

THE IMPORTANCE OF WRITING SKILLS IN BUSINESS COMMUNICATIONS: HOW AND WHY TO IMPROVE EMPLOYEES’ WRITING Abstract This essay describes how poorly written communication can lead to misunderstanding and a possible loss of business. Through this paper the author wants to persuade the employer to sponsor a workshop for all employees to improve their writing skills, to increase business communications and to avoid arguments through poor communication. This paper demonstrates the effectiveness of writing skills and why business communication is important in any kind of business. What can your business achieve with good writing skills and what it the impact of good writing skills on business. THE IMPORTANCE OF WRITING SKILLS IN BUSINESS COMMUNICATIONS: HOW AND WHY TO IMPROVE EMPLOYEES’ WRITING These last few weeks have been hard for some people in the office. Many arguments erupted and people started to blame each other for the fact that this particular business deal might be lost. All this arguing amongst the employees does not improve the work environment, and it is apparent to clients that the atmosphere in the office is not professional. The reason for the dispute is clearly due to misunderstanding through poor written communication. This had a negative effect on some people’s feelings, which in turn lead to low morale and higher risk of losing business which can be directly attributed to poor writing skills. It is important for our company to look at a way to improve employees’ writing skills to avoid similar incidents in the future. One probably has received advertisement mail from various companies and, after reading the first paragraph, the paper ends in the waste paper basket because you did not like what you read in the first sentence. The way the writer started to communicate did not make you read the rest of the document. The same happened in this last business deal; that message was not understood because it was poorly written. Clearly this is something that should not happen in business writing, especially when writing a letter or a memo, either internal or external. When your employee is not a good business writer, it can affect your business in such a way that you will loose customers. Even inside the office amongst the employees, poor communication can arouse conflict due to misunderstanding. Poor business writing can cost the co... ... environment amongst the employees. I want to finish with a quote from Barret J. Mandel & Philip Vassallo (1999) to convince you that good writing is also good management: â€Å"A person who learns to control the use of language in the writing of effective business documents is often the same person who learns to use language creatively and flexibly in order to lead others to work productively and harmoniously. In our experience, many of the most effective managers are also adept business speakers and writer.† (p338). References Drozdowski, Mark J. (2003) â€Å"The Write Stuff.†, Chronicle of Higher Education, 50 (5), 5. Abstract retrieved June 4, 2004, from UOP Library, EBSCOhost. Lauer, Charles S. (2002) â€Å"Short and Sweet†, Modern Healthcare, 32 (15), 28. Abstract retrieved June 4, 2004, from UOP Library, EBSCOhost. Mandel & Vassallo. (1999) â€Å"From ‘Me’ to ‘Us’: Crossing the Bridge from Academic to Business Writing.†, ETC: A Review of General Semantics, 56 (3), 338. Abstract retrieved June 4, 2004, from UOP Library, EBSCOhost. Mims, Julian L. (1995) â€Å"Writing for results.†, Records Management Quarterly, 29 (1), 27. Abstract retrieved June 4, 2004 from UOP Library, EBSCOhost.

Sunday, August 18, 2019

Computerised accounting system. :: Computer Science

Computerised accounting system. Please Specify which product you need when ordering. Sage Line 50 training software is available both with and with out a comprehensive assessment system.. The sage line 50 product contains Basic and Advanced tasks for operation of the Sage accounting software. Sage Line 50 uses a powerful "show and tell, then have a go" style training. This makes it easy for users to understand new concepts and provides then with a chance to "have a go in a safe training environment". Use of multimedia simulation aids retention of learning and ease of use. Learn To Use Sage is ideal for both novice and experienced users. The software provides a great foundation in basic tasks, Intermediate and Advanced tasks are also taught. Many advanced users keep the software by their PC, its great reference, have a problem? simply pop the disk in, run the topic that covers your need, its that simple. Learn To Use Sage Task List Basic: * Add a new customer * Open an existing customer record * Add a new supplier * Open an existing supplier record * Add a new nominal account * Open a blank record * Add a new product code and save * Open a product record * Add a sales invoice * Add a credit note * Enter purchase invoice / Credit note * Allocate customer receipts * Allocate supplier payments * Add a nominal payment / receipt * Preview / Print aged debtors report * Enter sales invoices * Enter sales credit notes Advanced: * Transfer funds * Add a nominal journal * Create a skeleton journal * Blank reconciliation * Display VAT return * Analyse VAT totals * Print VAT return * Add a fixed asset * Posting depreciation * Add a prepayment * Posting prepayments and accruals * Write off, Refund, Return * Set access rights * Contra entries * Add receding entry * Correcting errors * Check and print Computerised Accounting System ============================== How does a computer works? Data Input Process Data Output Type of data processing: 1. Batch processing Transaction data are accumulated until a large volume can be processed at one time. Eg. Payroll, customer account and general ledger 2. On - line processing Processing transaction as they occur so that a user can obtain current information at any time. Eg. Accounts receivable, accounts payable and inventories. Manual vs. Computerised systems =============================== Manual accounting systems consists of source of documents, journals, ledgers and reports. In a computerised accounting system basically the same source of documents can be used but must be converted into a machine - readable format to be accepted as an input to the computer. Eg. Computerised receivables system Input : accounts receivable master file at the beginning of the period and the aacounts receivables transactions files required to update the beginning balances. Computerised accounting system. :: Computer Science Computerised accounting system. Please Specify which product you need when ordering. Sage Line 50 training software is available both with and with out a comprehensive assessment system.. The sage line 50 product contains Basic and Advanced tasks for operation of the Sage accounting software. Sage Line 50 uses a powerful "show and tell, then have a go" style training. This makes it easy for users to understand new concepts and provides then with a chance to "have a go in a safe training environment". Use of multimedia simulation aids retention of learning and ease of use. Learn To Use Sage is ideal for both novice and experienced users. The software provides a great foundation in basic tasks, Intermediate and Advanced tasks are also taught. Many advanced users keep the software by their PC, its great reference, have a problem? simply pop the disk in, run the topic that covers your need, its that simple. Learn To Use Sage Task List Basic: * Add a new customer * Open an existing customer record * Add a new supplier * Open an existing supplier record * Add a new nominal account * Open a blank record * Add a new product code and save * Open a product record * Add a sales invoice * Add a credit note * Enter purchase invoice / Credit note * Allocate customer receipts * Allocate supplier payments * Add a nominal payment / receipt * Preview / Print aged debtors report * Enter sales invoices * Enter sales credit notes Advanced: * Transfer funds * Add a nominal journal * Create a skeleton journal * Blank reconciliation * Display VAT return * Analyse VAT totals * Print VAT return * Add a fixed asset * Posting depreciation * Add a prepayment * Posting prepayments and accruals * Write off, Refund, Return * Set access rights * Contra entries * Add receding entry * Correcting errors * Check and print Computerised Accounting System ============================== How does a computer works? Data Input Process Data Output Type of data processing: 1. Batch processing Transaction data are accumulated until a large volume can be processed at one time. Eg. Payroll, customer account and general ledger 2. On - line processing Processing transaction as they occur so that a user can obtain current information at any time. Eg. Accounts receivable, accounts payable and inventories. Manual vs. Computerised systems =============================== Manual accounting systems consists of source of documents, journals, ledgers and reports. In a computerised accounting system basically the same source of documents can be used but must be converted into a machine - readable format to be accepted as an input to the computer. Eg. Computerised receivables system Input : accounts receivable master file at the beginning of the period and the aacounts receivables transactions files required to update the beginning balances.

Saturday, August 17, 2019

Intercultural Communications Essay

* This chapter offers six reasons or imperatives for studying intercultural communications * Economics * The workplace * Businesses must be more attentive to diversity issues * As the workforce becomes more diverse, their will be more problems * Benefits * Speaking different languages * Seeing new business markets * Marketing products to different cultures * Learn about different cultures * Global economy * Globalization * Bring money to the poor areas by opening up businesses * Wal-mart, they open one in china, but takes away jobs from Americans * Mom and pop stores out of business * Pollution in other countries because they don’t have regulations * To bridge the cultural gap, many companies employ cross-cultural trainers who assist people abroad by giving them information and strategies from dealing with cultural differences * American’s tend to say that they are the best and won’t open up * Technology * GLOBAL VILLAGE to discribe a world in which communication technology (tv, radeo, news services) brings new and information to the most remote parts of the world * Today people are connected via e-mail, instant message, bulletin boards, and the internet to people they have never met face-to-face. * Complex relationships can develop through technology * Technology and Human Communication * Kenneth gergen describes the changes that occur as technology alters patterns of communication * Relationships were described on how far a person could walk * What does it have to do with intercultural communication * Easier to talk to people * Faster * Convenient * Too reliable, forget your phone at home and you get anxiety * Effects face-to-face communication * Limits what you are trying to say * Miscommunication, taking a text the wrong way * DIGITAL DIVIDE exists between those who have access to technologies like the internet and those who do not * Older Americans, those with low incomes and less education, and people with physical disabilities lag behind. * 22% of Americans have never been online and are categories as the â€Å"truly disconnected† * Demographics * Changes come from two sources, either changing demographics within the United States or changing immigration patterns * Changing us demographics * DEMOGRAPHICS refers to the general characteristics of a given population * Population will change drastically by 2050 * Changing immigration patterns * There is a contradiction when discussing immigration in the United States * â€Å"nation of immigrants† * patters of immigration are having a significant effect on the social landscape of the United States * these demographic changes present many opportunities and challenges for students of intercultural communication and for society * Learn about other cultures * Meet men and women from around the world * Tolerance of other cultures * Miscommunication * Different work habits * Intercultural conflict is not necessarily a consequence of diversity * Expands our linguistics, politics, etc. * Historical overview: we have to look at the history of immigrants in the u.s. to get a better sense of the sociocultureal situation * MELTING POT- the cultures all get together and melt together and make one cultur e * College classroom * SALAD BOWL- when cultures are distinctly different * My big fat Greek wedding * Economic conditions affect attitudes toward foreign workers and immigration policies * They sent all of the Americans back to free up jobs for White Americans * 10 years later they told them all to come back for cheap labor and they can be in the country * The current situation * Always going to have conflict and diversities * â€Å"Crash† the movie shows all the diversities between cultures in LA * Class structure * Usually the one they are born into * Economic disparity among these groups * Peace * The key issue is whether or not individuals of different sexes, ages, ethnicities, races, languages, and cultural backgrounds coexist on the planet * Not realistic because we are not all on the same page * Contact among different cultural groups often leads to disharmony * Conflict is also tied to economic disparities and economic colonialism * Some are extremely poor, and don’t have natural resources * Going somewhere and nobody likes American’s * Media influences us a lot and they don’t like that * It will be naà ¯ve to assume that knowing intercultural communications would end the wars * Self-awareness * One of the most important (but less obvious) reasons for studying intercultural communication is to gain an awareness of one’s own cultural identity and background * Peter Adler observes that the study of intercultural communication begins as a journey into another * If you are white and middle class, intercultural learning may mean an enhancing awareness of your privilege * Ethics * Ethics are the principles of conduct which help to govern the behavior of individuals and groups * Ethical judgments and cultural values: * Ethical judgments focus more on the degrees of rightness and wrongness in human behavior than do cultural values * Cultural values tell us what is â€Å"good† and what â€Å"ought† to be. * â€Å"killing for the name of god† * Universally ethical * This book stresses the relativity of cultural * According to the UNIVERSALIST position, we need to identify those rules that apply across cultures * By contrast, the RELATIVIST position holds that any cultural behavior can be judged only within the cultural context in which it occurs. This means that only community can truly judge the ethics of its member

Football rules, Laws and Regulations Essay

Introduction In football there are rules and regulations. There are rules which are just basically things that footballers will have to follow as well as rules that the referee will also have to follow. All rules are all made by the FA. Regulations are similar to the rules because it is a rule which controls the game and has instructions on how the football match works. Example of regulations would be that the game is 90 minutes, with 45 minutes each half and then 15 minutes break in between half time. It is then up to the assistant referee and the referee himself to decide on how many minutes they should offer hence some timewasting during time play. There are many reasons to why there are rules and regulations put in place by the FA and the most important ones are that it provides a safe environment for both football teams and also the supporters at a football match or stadium. Roles such as having general assistance for the crowd at a football stadium is one of the important parts of keeping the environment safe and this is controlled by people who work in the stadium and are called stewards. What stewards do is, they control the crowd as well as keep the angry supporters /fan away from the entering the pitch as they can do some damage to the players as well as waste time from both teams. What these rules and regulations do in a football match is that it prevents supporters, fans, people at home who are watching the game not enjoy watching football anymore as it can reduce the number of fans coming to the stadium and watching the match. In football there are different sizes of the football pitches because every team has their own type of tactic of playing their football games. This does not mean the size of the pitch can be whatever size they want it because there are rules to a minimum size and a maximum size of the pitch being in length and width. The minimum size a football pitch at length can be from 90metres to 120 metres maximum and the width of the football pitch has to be a minimum of 45metres to 90 metres maximum. Teams who play more of a long ball passing will usually have a narrow sized pitch because they don’t use side of the pitch and therefore it’s not required. However teams such as Barcelona who like to play a lot of possession football also use a narrow sized pitch because they are not afraid to keep the ball in between the side lines and it also improves their passing rate. When it comes to football size in football, the size of the ball is always size 5 because a bigger or smaller ball can lead to health and safety issues. There isn’t just any ball in a football match which is played with. FIFA always approves of the balls that get used in elite football games by having a logo by FIFA approved on it, FIFA inspected logo, or a IMS logo which is the International match ball standard. The ball is made out of leather or material which is suitable because of it isn’t, it can lead to injuries on the foot or a player’s body of it kicked on him. The ball in the beginning of a football match has to also be a specific weight and that is no more than 450 grams and no less than 410 grams. The ball size has a circumference of no more than 70cms which is 28 inches and not less than 69cm which is 27 inches. The shape of a football is spherical. In a professional football match, there are 11 players including a goalkeeper on a pitch. A football coach will also have substitutes in case of a player with an injury. In an official football FIFA competition, a football coach has only 3 chances of using his substitutes whereas in other matches he would be given a maximum of 7 subs. If a coach will use his subs in a football game, the referee must have all names of the subs in order for them to gain a position in playing at the football game. If a football player who is sub and his name is not given to the referee then he will not take part in the match. In order for a coach to swap a player with a sub, he must inform the assistant referee and then the assistant referee must inform the referee himself so that when ball is out of play, the team can make the change of player. In a friendly football match a team can have as many subs on depending the agreement by the two teams. A match is played for 90 minutes with 45 minutes each half and 15 minutes break at half time. The referee will make the decision of how many extra minutes the teams both get depending on how many minutes has been wasted during the game. Football teams are given the break at the first half in order for the team coach and the team itself to discuss what they need to change, new tactics they should apply in the next half and also so they can rest and have enough energy for the second half. At a league where a team has to win, and both of teams are drawing, the extra time is given after the 90 minutes with two sets of 15 minutes. If teams are still drawing then it is penalty kicks for both teams, and that will be given as much time until someone wins. Before a team can kick off, someone has to make the decision of who kicks off and that’s the referee’s decision. The way a referee would make the decision bringing both of the captains of the two teams and by tossing a coin and the captain that wins the toss will kick off. When a football team scores a goal, the other will get the advantage by placing the ball back to the centre and kick off. For the game to start with the ball in the middle, your team must be in their own half and the other team should also be in their half, the match should not continue from centre mark until given signal by the referee. The game can be restarted by the referee after a temp0orary stoppage that is necessary. The way this happens is by having the referee dropping the ball at the place where it was located when the play was stopped and have two players from both teams. In football, the ball can stay in play or leave the football ground which is out of play. As you can see in the example on the right hand side, if the ball is on the line, it is in play however to be out of play the whole ball needs cross the white line. Even if most of the ball is outside the white line, if a bit of the ball is still touching the white marker line then it’s still in play. If a football was rebound from the corner flag post or a goal post, the ball is considered inside therefor allowing the teams to play on. Another way is restart of play and that is when the referee decided to stop play. It is also in play when it rebound of a referee or a lines man who is on the field. There are offside in a football game which is a little confusing to understand. The diagram on the right hand side is showing an offside. The number 11 in the red team passing to his team player who is number 10 is an offside because number 10 in red is closer and in front of blue team’s goal and the defensive players. This leaves only the goalkeeper back which isn’t enough players to play him onside. This position could be forced by the defenders moving forward and it’s called the offside trap. Diagram 1 However in diagram 2 you can see that number 3 from the blue team is very far from reaching number 9 but since he is in line with number 9 in the red team, he has led it to be onside and therefor the game can continue playing with number 9 in red creating a chance. The offside rule is put in place because it stops players from goal hanging, where a player stands next to the opposing team’s goal keeper in the hope that someone can get the ball to him where he can receive a long ball, so he can get it past the goal keeper. This has also been put in place by the governing body because it makes the games more boring. Diagram 2 There are fouls and misconduct happen during and sometimes after the match in football. When a player kicks or attempts to kick another opponent is one of the offences, however there are other ways of make an offence and that’s by tripping an opponent which can be used by using your hands to throw them down, using the legs which is a common one, however, it is also an offence to just stand in front of them or behind them. There are more offences and they are jumping at an opponent, charging them in a violent or in dangerous way, charging them from behind using boot feet, attempting or striking to strike at the opponent, holding and pushing an opponent and finally it is also an offence to handle the ball for example carrying it, striking it or using their hand or arm which is then followed up by giving the other team an indirect free kick. When a player has the ball and he makes a back pass to his goalkeeper directly, and the goalkeeper holds the ball with his hands or has any contact with his hand then the other team will be rewarded with an indirect free kick. This rule was put it in place recently in 1992 which was done because it stopped the goalkeeper from wasting time and holding the ball from opportunities to the other team and by also taking possession of the ball with the hands. This also stopped the goalkeeper from having more than 6 seconds limit of goalkeeper possession. Another reason for this rule to be put in place was because it made the games more interesting and less boring. In order for a team to score a goal, the whole ball passes over the goal line, in between the goalposts and under the crossbar. As you can see in the picture to the right, it shows that the whole ball has to pass otherwise even if it’s touching the line a little bit; it’s considered as play on with no goal. There have been some recent changes in football because a lot of times the referee is blamed for not making the right decision about the ball going in or not so therefore FA has introduced a new referee which is called an assistant referee and his job is to stand on the goal line to make sure and have a better view of the ball going in or not. They have done this because it ruins the fair play between the teams especially when the games are very important. In order for a team to win a match, the team has to have more goals than the other team and if it ends up being equal, then the game ends as a draw which means neither of the teams won. In some games there might be extra time provided because one team has to win so therefore they play with extra time. A goal can be scored from anywhere on the play, from anyone who is playing and that included the goalkeeper too. Goals are also scored from penalties and free kicks. However a goal cannot be scored directly from a throw in so therefore it has to be touched by someone else after the throw in order to score a goal. A goal cannot be counted if the referee has not blown his whistle for the game to restart. Another way a goal cannot be scored is if you are taking an indirect free kick because it’s indirect so therefore the ball has to be passed to someone in your team and then you can score.

Friday, August 16, 2019

Software and Hardware System Requirements for a Project

Chapter 5Requirement AnalysisThe chapter describe security model demand and which is categorised on the footing of user interaction and specification of package and hardware demand. Besides its overview regulations assign to the assorted user. 5.1 Software RequirementNameDetailssOperating SystemWindows XP and UpperDatabase ServerMySql, XMLFront EndNetbeans 7.2, JSP, Java SDK 6.0Application ServerTomcat 6.0BrowserIE 5.0 and Upper or Mozilla, Google ChromeTable No 4.1 Software Requirement 5.2Hardware RequirementNameDetailssProcessorPentium IV and supra.Random-access memory256MB and aboveHard Drive40 GBNetworkLocal area networkTable No 4.2 Software Requirement 5.3High Level Process Diagrams A high degree description of the demands of the undertaking is to manage specific defined maps utilizing a common platform, whilst other maps for content, enrollment, individuality direction, and increasing security to single applications will be outside the range of the undertaking and this range is detailed in the diagram below: Figure 5.1: Scope of the Undertaking This stage of the undertaking will cover individual factor hallmark and will merely capture username and watchword to authenticate a website user. The demands are split into four subdivisions:Generic demandsSelf disposal functionalityDelegated disposal functionalityHelp Desk disposal.The generic demands will embrace certain facets that are generic across the ego disposal and delegated disposal functionality. The undertaking will present the following generic demands for self disposal and delegated disposal: Figure 5.2: Generic demands for self disposal and delegated disposal The undertaking will present the following self disposal functionality: Figure 5.3: Self disposal functionality The undertaking will besides present the followers delegated disposal functionality: Figure 5.4: Delegated disposal functionality There will besides be the undermentioned Help Desk disposal functionality that will be delivered by the undertaking: Figure 5.5: Aid Desk disposal functionality5.4 User groupsUser groupDescriptionExternal web site userAn external web site visitant to any web site or applicationAdministratorAn internal decision maker who will hold the capableness to supply entree direction to application specific external web site usersHelp Desk AdministratorAn internal decision maker who will hold the capableness to back up the security model and users of the modelTable No 5.3: User Groups5.5 Requirements5.5.1 Generic demandsGEN-0011-Rule-2For Self disposal and decision maker for delegated disposal enrollment signifiers, the information Fieldss must be blank on first burden of the signifier.GEN-0011-Rule-3The system will non auto-generate usernames for decision makers for delegated disposal. The usernames will be entered manually.GEN-0011-Rule-4When the web site user receives the invitation electronic mail and clicks the URL to lade the enrollment signifier, the username on the signifier will be pre-populated and n ot-editable.GEN-0011-Rule-5Auto-complete must be set to murder.GEN-0011-Rule-6Password and replies to security inquiries must be obscured.GEN-0011-Rule-7The username can non be an email reference.GEN-0011-Rule-8The website user must put up 4 security inquiries, of which 2 will be indiscriminately shown during future hallmark procedures.GEN-0011-Rule-9Security replies must non:Be cleanRepeat replies across the inquiriesBe individual figure or character repliesGEN-0011-Rule-10The replies to the security inquiries will be a minimal 3 alphameric characters, with a maximal 20 alphameric characters and must non incorporate the undermentioned particular characters:â€Å" ! ? $ % ? / or @GEN-0011-Rule-11Website users will merely be registered for applications/websites within a pre-defined group, i.e. for either BHW applications or international applicationsGEN-0011-Rule-12The format of the username will be a minimal 6 alphameric characters, with a upper limit of 20 alphameric characters an d must non incorporate the undermentioned particular characters:â€Å" ! ? $ % ? / or @The username will be instance sensitive.GEN-0011-Rule-13The format of the watchword will be a minimal 8 alphameric characters, with a upper limit of 20 alphameric characters and must be instance sensitive.GEN-0011-Note-1:The application specific demands for informations gaining control are non documented in this DBRS and will be documented at the application specific degree.GEN-0011-Note-2:The signifier will non capture opt-in /opt-out for selling intents. This will be done at application degree and non at the security degree.GEN-0011-Note-3:Website users will be able to register for specific merchandises at an application degree.GEN-0011-Note-4:The website user will merely be able to take a security inquiry one time from the list, i.e. the inquiry selected in ‘Security inquiry 1’ will non look in the dropdown for ‘Security inquiry 2’ and so on.GEN-0011-Note-5:Any indivi duality inside informations, i.e. name and reference, will be captured at an application degree.GEN-0012Send electronic mail verification on successful enrollment to the web site userGEN-0012-Note-1:A concern determination has been made to go on with the preferable option that does non necessitate email confirmation and therefore to merely hold one measure enrollment. The website users will have an electronic mail corroborating that they have registered successfully.GEN-0012-Note-2: Without capturing more informations on the enrollment signifier, any electronic mails that are sent will non be customised to the website user and the salute will be ‘Dear User.’GEN-0013Post log-in, all designated assets ( pages ) will be protected by the Security Platform.GEN-0020The watchword strength must be either medium or strong and must be displayed on the undermentioned signifiers:RegistrationChange watchwordSecurity inside informationsGEN-0020-Rule-1Mandatory ( 1 point each and a en tire 2 points in the marking mechanism )Minimum of8 characters in lengthMaximum of 20 characters in lengthA combination of letters and at least 1 figureOptional ( 1 point each )At least one particular character from this list @ , # , $ , ^ , & A ; , _ , ~ , –A mixture of upper and lower instance lettersPoints scoredDisplay& lt ; = 2Weak ( Red saloon )3Medium ( Amber saloon )4Strong ( Green saloon )GEN-0020-Rule-2The watchword strength saloon will expose the coloring material and besides the diction to follow with the Accessibility criterionsGEN-0020-Rule-3On page burden the watchword strength index will be clean.GEN-0030The enrollment signifier must incorporate Captcha functionalityGEN-0030-Rule-1The Captcha functionality must follow with the Accessibility criterionsGEN-0030-Rule-2The Captcha functionality must be instance sensitive.GEN-0040Provide registered website users with the ability to login to an application or merchandise on any web site that has migrated to the Secu rity FrameworkGEN-0040-Note-1:While the website user will be able to login to any web site or application, they may be required to register for each merchandise at an application degree.GEN-0050Website users must be able to reset their watchword through disregarded watchword functionalityGEN-0050-Rule-1The website users must reply 2 security inquiry ( s ) right to reset their watchword.GEN-0050-Rule-2The 2 inquiries will be displayed indiscriminately for the set of 4 inquiries answered on initial enrollment.GEN-0060Website users must be able to recover their username through disregarded username functionality to reconstruct their ability to log in.GEN-0060-Rule-1An electronic mail will be generated incorporating the website user’s username.GEN-0070A website users account will be locked if the website user exceeds the maximal figure of login efforts or fails to reply their security inquiries rightGEN-0070-Rule-1There should be 2 error messages:For inputting incorrect inside in formations, e.g. username and watchwordFor history lockupGEN-0070-Note-1:The figure of login efforts and replying of security inquiries should be set to 3 efforts, so the history is locked and an enlightening mistake message is displayed.GEN-0070-Note-2:For the history unlock procedure, web site users will be advised to reach the Help Desk in order to unlock their history.GEN-0070-Note-2:There will be three history lock out periods. The first two lockouts will be impermanent and last for 20 proceedingss. The concluding lockout will be lasting and necessitate Helpdesk to unlock the history.GEN-0080The system must be able to run out a web site users password at a specified interval, e.g. monthlyPremise:The watchword termination will be set at a generic degree and if an application requires an alternate watchword termination policy, this must be applied at the application specific degreeGEN-0090The system must be able to stop a user session after a specified period of inaction on the w eb site.GEN-0090-Rule-1The in agreement length of clip for the period of inaction must be set across the platform and non at application degree.GEN-0090-Rule-2The inaction timeout will be configured to 20 proceedingss.GEN-0100Functionality must be provided to let the website user to log out of the Security Framework.GEN-0100-Note-1:The logout user journey will be an application degree specific user journey.GEN-0100-Note-2:This will be locally configurable for each concern unit.GEN-0110Provide individual sign-on capableness such that when a website user registries for one web site or application, they are able to login to another web site or application.GEN-0110-Note-1:While the website user will be able to login to any web site or application, they may be required to register for each merchandise at an application degree.GEN-0120The system should supply scrutinizing and describing functionality of both self disposal web site users and delegated disposal web site users.GEN-0120-Note- 1: This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.GEN-0120-Note-2:Any web analytical coverage will be provided through the Omniture toolGEN-0130The system should supply scrutinizing and describing functionality of the decision makers using the delegated disposal toolsGEN-0130-Note-1: This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.GEN-0130-Note-2:Any web analytical coverage will be provided through the Omniture toolGEN-0140The concern units should supply an attack and procedure for managing website users concerned with possible history via media, whether this be via electronic mail or via a Call CentreGEN-0150The system must dispute an terminal user when they:Attempt to entree unauthorized contentAttempt to entree via a bookmark when already logged outGEN-0160The system shall be capable of observing that a user is logging in a 2nd clip from a different topographic point, in which instance the installation should be configurable to reject the 2nd session, end the bing session, or permit coincident Sessionss.Table No.5.4: Generic demands5.5.2 Self disposal demandsRqt No.DescriptionSource/OwnerPrecedenceSA-0020Provide registered and logged in website users with self disposal capablenesss to alter their generic security inside informationsSA-0020-Rule-1A website user must be able to amend the undermentioned security inside informations:Email referencePasswordSecurity inquiries and repliesSA-0020-Rule-1A website user will non be able to amend the username.SA-0020-Note-1:Any application or merchandise specific informations will be amended at application or merchandise degree and as such will non be documented in this DBRS and will be documented at the application specific degree.SA-0021The system must direct an electronic mail to the registered web site user when an amendment has been made to their inside informationsSA-0021-Rule-1The electronic mail must province which inside informations have been amended, butnonwhat the inside informations have been changed from or to.SA-0021-Rule-2If the web site user has amended their electronic mail reference, the system must direct an electronic mail to the old and new electronic mail references advising of the amendment.SA-0021-Note-1:This electronic mail will besides incorporate instructional text for the web site users in instance they are concerned that their history has been compromised.Table No. 5.5: Self disposal demands5.5.3Delegated disposal demandsRqt No.DescriptionSource/OwnerPrecedenceDA-0010Provide decision makers with delegated disposal capablenesss to make an history for external web site usersDA-0010-Rule-1decision makers will merely be able to register Website users for applications/websites within a pre-defined group, i.e. for either BHW applications or international applications.DA-0010-Rule-1decision makers will non be able to utilize the same username across pre-defined groups as the username must be alone.DA-0011Provide decision makers with the ability to advise website users of their enrollment inside informations via an invitation electronic mailDA-0011-Rule-1The point at which the invitation electronic mail is sent to the website user will be configurable for each application, i.e. the electronic mail may be sent when the user has been created by the decision maker or at a ulterior phase following updating of application specific history inside informations.DA-0012Provide decision makers with delegated disposal capablenesss to modify an bing history electronic mail referenceDA-0012-Rule-1The system must direct an electronic mail to the registered web site user when an amendment has been made to their inside informations by the decision maker.DA-0012-Note-1:The decision maker will merely be able to modify the electronic mail reference for an history.DA-0013Provide decision makers with the ability to seek for an bing web site user by username and/or electronic mail.DA-0013-Rule-1The hunt capableness will be application degree particular and will non return users non registered for that application.DA-0014Provide decision makers with delegated disposal capablenesss to disenable and enable an bing history from the applicationDA-0014-Rule-1The decision maker will merely be able to disenable an bing history from the specific application the decision maker is logged into. The decision maker will merely be able to enable an history if it has antecedently been disabled from the application.DA-0014-Rule-2Presentment must be sent to the Help Desk decision makers when a user has been disabled for a specific application.DA-0014-Rule-3Presentment must be sent to the bing user when their application particular history has been enabled.DA-0015Provide decision makers with the ability to re-send an invitation electronic mail to a website user during the URL expiry period and post the URL expiry period.DA-0015-Rule-1This functionality will merely be available if the web site user has non logged in and completed their profile for the first clip.DA-0015-Rule-2If the invitation is re-sent during the expiry period, so the URL from the initial electronic mail will be invalid and the expiry period will be resetDA-0020Invitation electronic mails from the delegated decision maker must incorporate the undermentioned information for the website user:User nameEncrypted URL to automatically log the user into their historyDA-0020-Rule-1The URL will run out on first successful usage and the website user must alter the watchword, enter their personal inside informations, select the security inquiries and input their replies to their chosen security inquiries on loginDA-0020-Rule-2The fresh URL should be expired after a configurable clip period and the recommendation is that this is less than 2 hebdomads.DA-0020-Rule-3As a lower limit the watchword must be encrypted.DA-0030Hard transcript invitations could be sent from the delegated decision maker and must incorporate the undermentioned information for the website user:User nameImpermanent watchwordFriendly URLDA-0030-Rule-1The impermanent watchword will run out on first usage and the website user must alter the watchword, enter their personal inside informations, select the security inquiries and input their replies to their chosen security inquiries on loginDA-0030-Note-1:The ability to capture reference inside informations for poster of the difficult transcript invitations has non been captured in this DBRS and will be documented at the application specific degree.DA-0030-Note-2:The concern procedure for the despatching of the difficult transcript invitation is out of range of the Security Platform and must be put in topographic point by the concern unitsDA-0040Provide decision makers with the screens and functionality for the delegated disposal which will be deployed at an application specific degree.DA-0060Provide decision makers with the ability to re-enable a user that has antecedently been disabled from the applicationDA-0070Provide decision makers with the ability to seek for handicapped users by username or electronic mail.Table No 5.6: Delegated disposal demands5.5.4Help desk disposal demandsRqt No.DescriptionSYS-0010Provide Help Desk decision makers with the ability to:Search for an historyModify an historyDisable an historyEnable an historyDe-register an history from the security modelRe-register an history on the security modelDe-register an history from an applicationRe-register an history to an applicationUnlock an historyReset watchwordUpload users in majoritySYS-0010-Rule-1The Help Desk decision makers will be able to de-register an history at the security model degree. This will forestall the website user from logging into any application and sites.SYS-0010-Rule-2Presentment must be sent to each of the decision makers when a user has been de-registered at the security model degreeSYS-0010-Rule-3Presentment must be sent to the bing user when their history has been de-registered from the Security FrameworkSYS-0010-Rule-4Presentment must be sent to the bing user when their history has been modified in any manner on the Security Framework.SYS-0010-Note-1: This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.SYS-0010-Note-1:An electronic mail will be sent to the termin al user for the alteration of each property.Table No. 5.7: Aid desk disposal demands