.

Wednesday, July 31, 2019

Computer technology arises for better improvement Essay

Throughout the year of existence, the item has come for its enhancement because computer technology arises for better improvement especially in information technology, which focuses mainly on business sectors. The library is a place where books, journals, microfilms, multimedia, audio & visual materials and computer data & terminals are kept and organized to support the cultural, informational, recreational, and educational needs of the general public or specific groups of users. Recent advances in computer and communication technologies have transformed the contemporary library; it is not only a repository but now also an active member in a vast network of libraries and databanks through which users have access to a worldwide store of recorded knowledge. Since the 70s, the acquisition of library catalogs is done electronically. The development of computer technology in the last few years has provided the necessary preconditions to administrate an ever growing amount of information electronically. Prompted by the success of the World Wide Web, many providers are beginning to open their databases to external users. This gives users the possibility to search in a database and exchange data directly via the Internet. The world is experiencing an unprecedented advancement in technology this year. Everyone believes that the library needs an improvement; an improvement that would make it a high-security and an easy access of books that would help not only the librarian but also those who use the library for their research. Through this occurrence, the proponents decided to design a library system for San Roque Catholic School. With the help of data that has been gathered, they give emphasis to the benefits that the system can give and also gathered some ideas for the planned actions for the development of the system. This chapter will discuss the objective of the study, statement of the problem, significance of the study, scope & delimitation and the definition of terms. Objective of the Study This study aims to know the following: To know how often the students go to the library. To know the awareness of the students with regards to the manual library system of SRCS To know how attentive are the library personnel specially in rendering their service To know how many classifications of books they have in their library To know how visible these books to the users Statement of the Problem The general problem is to provide a computerized procedure of borrowing and returning of books. Specially, the study aims to answer the following questions: 1. How often do the students go the library? 2. Are the students aware of the manual system of transaction in the SRCS Library? 3. Are the shelves in the library open to everyone? 4. Does the students need to ask permission from the library management to acquire a book? 5. Are the library personnel always attentive to anyone who wants to use the library? 6. Does the students notice the that the books on the shelves are effectively arrange according to the ff: 6. 1 Classification (Ex. Filipiniana, Arts & Science, etc)? 6. 1. 1 Textbook 6. 1. 2 Workbook Assumption Specific Problem: How proficient are the process used by librarian? Implicit Assumption: There are certain procedures to make the transactions of borrowing or returning the books. Specific Problem: How sufficient are the information that a librarian should acquire prior to borrowing and returning of books? Implicit assumption: There are certain required informations that a librarian should acquire in the students. Hypothesis Question: Is there any significant difference between the effectiveness method in manual and computerized library system? Operational Hypothesis: There is a significant difference between the effectiveness method in manual and computerized library system, in terms of allotted time and accuracy throughout the process. Null Hypothesis: There is no significant difference between the effectiveness method in manual and computerized library system, in terms of procedures Significance of the Study In the age of advance technology, it is important for every business establishment, no matter how small, to acquire a system that would make its work faster and more efficient. This will save time and effort on the part of the beneficiary. Computer technology is quickly spreading due to the demands of the people. The significance of this study is to develop software that will make the library a high-security and easy access. This application system will improve and enhance the library that will attract the user to come more often to the library. Educational Significance The purpose of this study is to attract the students and other users to use the library more often for studying or learning due to the high-technological system the library had. Economic Significance The library will cost less for the expenses that are monthly paid to maintain the system. Some supplies will be added and some will be disregarded. Implementing the proposed system will depreciate the expenses, which is shown. Librarian and Staff. The significance of this study to the librarian an staff is that it will lessen their effort and conserve time in searching books and give an accurate report with regards to the books and borrowers information. Conceptual Framework In this study the proponents will follow all the basic steps in building a system using resourceful references such as books, related studies, browsing the internet, and other tools that are related to the study. They will gather data through interviews and questionnaire with regards to the existing system of San Roque Catholic School. INPUT PROCESS OUTPUT. Scope and Delimitation The proposed system is an application system using borrowers’ code. It will give more efficient way of finding references needed by the users. It includes the entire books in the library. The proposed system will show all needed information regarding the book and the borrower. It is not a LAN-based system. It will not detect if the book is damaged or if one page of it was torn. The proposed system will not show the autobiography of the author and the contents of the books thoroughly. Definition of Terms Acronyms CFD. Context Flow Diagram DFD. Data Flow Diagram JPEG. Joint Photographic Experts Group LAN. Local Area Network SDLC. System Development Life Cycle SRCS. San Roque Catholic School VB6. Visual Basic 6 Non-Technical Accession Number. It is a code that represents the number of books or materials in the connection within the library. Author. It is a person who brings something into existence; the written of the book, article, etc. Borrower’s Card. It is a card that is used in borrowing and returning of library materials. Call Number. It is composed of letters, figures and symbols separate or in combination assigned to a book to indicate its location on the shelves. It usually consists of class number and book number. It appears on the spine of a book and on the upper left corner of a catalog card. Lend. It is to place in the temporary possession of another (for his use, enjoyment, etc. ) with the expectation of resuming possession later. To loan, to let out (books or materials) for fee. Library. It is a room or building, housing a collection of books, usually arrange according to some plan. Librarian. It is a person in-charge of a library. Penalty. Amount given by the borrower if the book is overdue. Transaction. It is something transacted, a bus deal. Technical Terms Computer. Is a machine that can follow instructions to alter data in desirable way and to perform at least some operations without human intervention. Context Diagram. It shows the entire system as one general element. Data. Is factual information such as text, numbers, sound, and images, in a form that can be processed by a computer. Database. Is a collection of related information about a subject organized in a useful that provides a foundation for procedures such as retrieving information, drawing conclusions and making decisions. Data Flow Diagram. It is a graphic illustration that shows the flow of data and logic within a system. Data Processing. It means a rapid conversion of large quantities of information from the unorganized form in which it is collected into a form that can be stored on magnetic tapes or disks and analyzed by computers and other devices. Maintenance. Enhancing or upgrading your system. Password. A code for security of the database and files. Record. It contains all information that the database is tracking. Chapter II Review of Related Literatures and Studies. The proponents reviewed several related studies and literature. This was done to clarify different ideas from other studies and literature. Relevant ideas of some students who developed some software were also reviewed. Related Literature The proponents understand that the program to be made without intellectual development could crash and might not be attracted to the uses and beneficiaries. The communication between the target user and the programmer should be clear, and sharp. According to Lisa C. Stater and Steven E. Arnott stated on their â€Å"Using Visual Basic v6. 0: For Windows (1992)† noted that: â€Å"The traditional boundary between an end-user and a programmer became difficult to maintain, because beginners could generate useful applications without writing any lines of program code and experts became more productive by using same techniques to develop extensive systems†. (p2) Many business companies use computers in order to solve their problems, to lessen their tasks, and minimize the time involved. They also use computers to store a large amount or quantity of data to reach their target goal. This is what C. J. Date (1990) wrote in his book entitled â€Å"An Introduction to Database System,† stated that: â€Å"A database system is basically a computerized record keeping system. It is a computerized system whose overall purpose is to maintain information and make that information available on demand. † (p5) All business activities fall under the principle governing Database Management System (DBMS). But in order to make your work easier, you must know how to design a database. According to Gregg Perry (1991) in his book â€Å"Visual Basic 6. 0 Teach Yourself in 21 Days†: â€Å"Database design is the process of creating database structures from user requirements for data. The resulting design must satisfy the user requirements in terms of completeness, integrity, and performance, among other factors. Database design is a complex and demanding process that requires the commitment and participation of the entire organization. † (p54) But it is more complicated to study a programming language, especially when creating programs for database. That is why more programmers use Visual Basic, which is easier to learn and understand. Walnum Clayton in his book, â€Å"Visual Basic 6 Master Reference, 1999† stated that: â€Å"Visual Basic may be the most used programming language in the world. The reason for its success is obvious. Visual Basic makes Windows programming so easy that just about anyone can sit down and create a simple program within a few hours. † (Preface) N V Brahmaji Rao on his article â€Å"An Experimental Digital Library System for Electronic Thesis and Reports, Roll Number: 9411123, August, 1999† stated that: â€Å"Digital Library System is an information system in which all the information is stored in digital form. The artifacts in a Digital Library System are visualized as â€Å"Digital Objects† stored as electronic â€Å"files† in a Hard Disk, CD-ROM etc. Each one of these files may be in different format like plain text, HTML text, GIF Image, TIFF Image, JPEG, MPEG, PostScript, PDF and so on. The underlying Digital Library System provides users with interfaces to access information like a Research Paper, A Thesis, a book, a song, a picture available in the Digital Library. To facilitate efficient and effective use of Digital Library Resources, the System provides several â€Å"services† like `Search on bibliographic data or on Full- text’, `Show the information contained in a Paper’, `Submission of a Thesis in Electronic Form’, `Indexing service’, `Replication service’ and so on. Digital Library Systems are very much like Public Library Information Systems, in providing the services in an Open way to everyone except in the means and methods followed. The Digital Libraries have a global scope and the user can be anywhere in the world. Digital Library Systems are very complex and throws up many issues: Academic, Technical, Cultural, Legal and even political. † (url: http://www. cse. iitk. ac. in/research/mtech1994/9411123. html) Related Studies Foreign Study. In the study conducted by Ron entitled â€Å"A Computerized Cataloging System for an Outdoor Program Library or Resource Center,† this paper explores a computerized system of cataloging materials for small to medium sized outdoor recreation resource centers. Free to non-profit organizations, the software described in the paper is designed to create and manage a database of books, videos, impact statements and other resource materials. Among other functions, the software will produce files that can be used by a word processor to print cards for a card catalog; it can be used to make topic word searches to find needed materials. Based on the diploma thesis of Josef Willenborg, (Master of CS), of Berlin University of Technology entitled â€Å"A Distributed Library Information System on the Basis of the Z39. 50 Protocol, July 1999† stated that: â€Å"Since the 70s, the acquisition of library catalogs is done electronically. The development of computer technology in the last few years has provided the necessary preconditions to administrate an ever growing amount of information electronically. Prompted by the success of the World Wide Web, many providers are beginning to open their databases to external users. This gives users the possibility to search in a database and exchange data directly via the Internet. † Local Studies According to Hazeline F. Gadia, et al. (1998), on their thesis entitled, â€Å"Computerized Information System for College Libraries,† that their study aims to provide an on-line and cost-free searching capability through the campus network. This reduces the need for the user’s to run from one library to another only to find what they are looking for. Based on the unpublished thesis of Jonalee Domingo’s group entitled â€Å"West Bay Library System, October 2002,† stated that: â€Å"The proposed computerized Library System of West Bay College, a system that will computerize the process in West Bay College. It aims to help the users & librarian by having a search engine. Which will make searching of books faster. It will inform users about the availability & some information on their desired book. It is also aim to help librarian manage library records including its books & users. The proponents intend to develop the system using MS Visual Basic. † (p. vii) Based on the research done by the group of Modina on their thesis entitled â€Å"Computer-Based Library System of IETI College Alabang† stated that: â€Å"The Library is a place where books, journals, microfilms, multimedia, audio and visual materials and computer data and terminals are kept and organized to support the cultural, informational, recreational, and educational needs of the general public or specific groups of users. Recent advances in computer and communication technologies have transformed the contemporary library; it is not only a repository but now also an active member in a vast network of libraries and databanks through which users have access to a world wide store of recorded knowledge. Therefore, Library System is the process that keeps monitoring and classify each book. It also maintains an extensive network of local branches, the properties and the persons involved in it. Relevance to the Study Computer is the latest catalyst in the swirling reaction of human history its power delivers a chance for revolution. When they were rare and expensive they shaped the worlds above the ivory tower. As we move towards the moderation, many organizations must cope up with the latest challenges. Creating a system was become more in demand and gaining an increasing rate of popularity in every industry. It was developed to provide timely, reliable and accurate information that is very helpful in decision making and problem solving. Based on the gathered related literatures and studies, proposing such system like the SRCS Library System would really help not only the librarian and the library personnel but also those who use the library facilities especially the researchers, that it would be more easier for them to know the availability of the book to be borrowed and the procedure of borrowing & returning of books will be more organize & systematize. Chapter III Methodology and Procedure. This chapter discusses the methods of research used by the proponents in conducting the study. Research instruments used, data gathering procedures and statistical treatment are also discussed. Research Design The software was developed using Visual Basic 6, in a module-by-module manner. Each module was designed and created as separate form. This form was compiled and run separately and revised before it linked to the actual programs. And their database holder, the proponents use MS Access. Methods of Research Use The proponents used descriptive and experimental methods in doing the study. Descriptive research method is the process of gathering, analyzing, classifying, tabulating and making interpretation with regards to the data collected. Using the descriptive method, the proponents conducted an interview with the librarian and some students & teachers according to their observation with regards to the library’s service, procedures and policies. In this method, surveying and content analysis techniques are used gather data. A survey is used to collect data about people’s beliefs, idea or opinions regarding a certain topic. Content analysis is used to gather data in any existing and available documentary materials such as articles that content the needed data of the research topic. By the use of this technique, the proponents gather data to related studies and opinions of other authors of any books and articles that useful in furnishing this study. Experimental research is a controlled process which manipulated treatments or actions from a factor, called independent variable, are applied upon another factor, called dependent variable, to determine their effect in the said process. The proponents used this method to find out the effectiveness of the propose library system in the service of the library. Research Instruments The research instruments to be use are questionnaires, interview, experimental and library method. The proponents will be using questionnaires to gather data faster in the persons involved. This is because the respondents were students, faculties and the library personnel and they are busy to take 20 minutes to be interviewed. So by the use of questionnaires, they can answer it for 3-5 minutes when they have available time. Interview is another technique of gathering data or information. The proponents will ask the library head and some of the students & faculties to gather idea with regards to the topic of the study Experimenting is the process of creating sample of the Library System and tests it by the personnel itself and by the users of the library. Giving pre and post test is needed to get the results. Another method is the library method. This is used in researching for some related studies and articles that is useful in this study. Data Gathering Procedures. Before starting this documentation, the proponents interviewed or asked some teachers and students about their idea to the topic. They were asked according to their knowledge. Also, the proponents do some research study to some libraries in order to gather enough data that will give them idea. After getting ideas, the proponents prepare questionnaires for the survey. Statistical Treatment Statistical methods will be helpful for the proponents in making this research design. This will help in determining the validity and reliability of the research. To show the result of the computation, the combination of tabular and graphical presentation is used. Purpose of Cost Benefit Analysis Cost benefit analysis is the process of comparing the anticipated costs of an information system to the anticipated benefits. Cost benefit analysis is performed throughout the SDLC to determine the economic feasibility of an information system project and to compare alternative solutions. Formula Used Proposed System Cost = Development Cost + Operating Cost Benefit = Existing Cost – Proposed Cost Present Value = Benefit / (1+i)n Where: i = interest rate  n = number of years Chapter IV Organizational and Management Aspect Form of Business Organization Company Profile Aimed as fostering spirituality among the youth of Alabang and neighboring town and providing a low-cost quality education to the residents in the area. SAN ROQUE CATHOLIC SCHOOL (SRCS) was established in 1981 by then, parish priest, MONSIGNOR TOMAS T. GONZALES. Since then, the school has taken the role as partner of the parish in the mission of evangelization and Christian education. One hundred forty-one students comprised the first batch of students who were grouped into three sections. Part of parish rectory was converted into classrooms for two classes while the third class was in the other side of the church. Through the initiative of Msgr. Gonzales, the construction of the three-storey building began in 1982 which was ready for use the following school year for 545 students in the first to third year levels. The first principal, Miss Lydia Santos was conferred the responsibility to manage the school. She worked hand in hand with a group of dedicated mentors. With Msgr. Tomas Gonzales setting the initial framework of SRCS, several directors succeeded him: Rev. Fr. Steve Villanueva and Rev. Fr. Romerico Prieto; Msgrs. Rolly dela Cruz and Celso Ditan were geared towards the development and improvement of the edifice, hence, the fruit of their untiring efforts, are the two three-storey buildings along the Mendiola Street. SRCS also gives due honors to Sister Minda Penaredondo. DC who heldthe school’s coffers and Mrs. Erlinda Esporlas who upheld quality Christian education of the students. 1989 was the year the Religious of the Virgin Mary (RVM) came at invitation of the Cardinal’s office to manage the school with Sis. Ma. Domitilla Enriquez, RVM as Principal. Their presence deepened the inculcation of Christian values and continuously enhanced and manifested in the Roquenian way of life. With Sis. Ma. Marina Insigne, RVM: Sis. Ma. Teresita Varon, RVM, Sis Ma. Celestine T. Viernes, RVM and our incumbent principal, Sis. Ma. Julia Advincula, RVM coddled and hurdled the tumultuous toil of running a school at this pace of time. Their natural affection has always been dovetailed with the philosophical views of the school’s past directors. Together with Bishop Jesse Mercado and Rev. Fr. Fidel Fabile, Sis. Ma. Julia Advincula, RVM are in constant reception of new ideas, innovations if only to touch and enhance the lives of the denizens of the community – the ROQUENIANS. Thru the initiative of Sr. Celestine, the Jubilee Building was built, a five storey building dedicated to the HOLY TRINITY as we celebrate the year of jubilation of our 2000th year of Christian Faith and opening its doors to the THIRD MILLENIUM. The building has an installed elevator for easy access and house the school auditorium which is named after Msgr. Tom Gonzales, at the ground floor of the building is the school computer laboratory, T. H. E. and the preschool rooms. The Fifth floor holds the social hall used for various activities and the gymnasium of St. Roch Building with newly installed two step bleachers for the spectators. SRCS is grateful for the continuous support of parents (and hopefully alumni, generous donors and benefactors) to assist in meeting the global needs of its students today. To become a genuine contributor – developing dynamic. Christian citizens of our country, SRCS will not stop growing reaching out especially to the less privileged. Vision-Mission. San Roque Catholic School of Alabang, Muntinlupa City is a Filipino, parochial, elementary and secondary educational institution which envisioned to be: Transformed agents/community that is maka-Diyos, maka-tao, makabayan, makbuhay and maka-kalikasan under the reign of God. SRCS commits itself to intensify its readiness to respond in Marian spirit to the gospel values by building a productive school family and parish community with loving service especially to the less privileged through academic competence and spiritual formation. Goals / Objectives. San Roque Catholic School was founded to serve the youth of Alabang and nearby communities, providing quality education by: Forming in the hearts and mind of all SRCS students the value of human dignity and total commitment to Christ by witnessing the love of God and service to his fellowmen. Providing Christian quality education and values integrated in Academic and Technology instructions that bring about intellectual and skilled oriented individual towards global competitiveness. Developing in the students the value of self-discipline and impressing upon them the high standard of decency, morality and good behavior. Integrating social responsibilities to advocate for justice, peace and order for the protection of the rights of the less privileged. Promoting and preserving the sanctity of life and the family towards nation building. Participating actively in the pursuit of ecological conservation and environmental awareness. Enriching the lives of all students through appreciation and awareness of the rich cultural heritage of his country. Establishing a harmonious relationship among students, parents, teachers, administrators and parishioners. Chapter V The System. This chapter discusses the context diagram and data flow diagram of the existing and proposed system. Existing System Based on the interview and data gathered by the proponents the existing library system of San Roque Catholic School is in manual manners in which the students ask the librarian for the availability of the book they are looking for and sometimes look in the card catalog if the book really exists in their library. Borrowing of books for overnight is allowed but limited; students can borrow with the maximum of two (2) books and four (4) books for Mind Movers Club member (Library Club). Reference books and serials are not allowed to be borrowed (strictly for library use only. The Fiction, Filipiniana, and Circulation books can be borrowed for three (3) days while the reserved books can be borrowed but only for overnight. Renewal of due dates can be allowed only for three (3) times. Personal reservation of book is allowed, which is effective for the whole day only. If not taken by the borrowers at the end of the day, it will be arranged back to its shelves. Existing System (Borrowing of Books) CONTEXT DIAGRAM Existing System (Returning of Books) CONTEXT DIAGRAM Data Flow Diagram of Borrowing of Books (Existing). Data Flow Diagram of Returning of Books (Existing) Proposed System (Borrowing of Books) CONTEXT DIAGRAM Proposed System (Returning of Books) CONTEXT DIAGRAM Data Flow Diagram of Borrowing of Books (Proposed) Data Flow Diagram of Returning of Books (Proposed) Costing Economic feasibility tests the ability of the system if the system is economically feasible. This includes the development cost, the return of investment and the payback analysis. Development Cost System Cost Systems Analyst Cost20,000 Database Designer’s Cost10,000 Programmers Cost20,000 Design Cost15,000 Subtotal65,000 Operational Cost Printer Ink (black) 800 Bond Paper (short). * 1 ream 200 Subtotal 1,000 Equipment Cost Computer Set27,000 Subtotal27,000 Software Cost Microsoft Windows 9810,000 Microsoft Office 5,000 Subtotal15,000 Overall Total Development Cost108,000 Annual Development Cost YEAR AMOUNT COST AMOUNT BENEFIT 0 108,000 1 123,100 150,000 2 138,200 169,430 3 153,300 188,860 4 168,400 210,290 5 183,500 235,720 TOTAL 766,500 954,300 Return of Investment ROI = Estimated Lifetime Benefit – Estimated Lifetime Cost Estimated Lifetime Cost = 954,300 – 766,500 766,500 = 187,800 766,500 = 0. 24500 or 24. 50% Payback Analysis YEAR COST BENEFIT NET BENEFIT PV OF BENEFIT DISCOUNT % 0 108,000 1 123,100 150,000. 26,900 24,452. 10 .909 2 138,200 169,430 31,230 25,795. 98 .826 3 153,300 188,860 35,560 26,990. 04 .759 4 168,400 210,290 41,890 28,610. 87 .683 5 183,500 235,720 52,220 32,428. 62 .621 TOTAL 766,500 954,300 187,800 138,277. 61 Chapter VI Presentation, Analysis and Interpretation Statistical Results of Data Gathering The proponents conducted survey to know the problems of the existing library system of SRCS. The questionnaires indicate comments and suggestions of the respondents for the further enhancement of their system. The results were been tabulate and the percentage will be used for computing the statistical measurement. Analysis of the Result Statistical Analysis Since the percentage method was used, the formula: No. of Respondents / Total No. of Respondents * 100 = Percentage (%) The results of survey are as follow: Does the students spent most of their free time at the library? Table 1 FREQUENCY PERCENTAGE CHOICES 12 12% ALWAYS 10 10% OFTEN 45 45% SOMETIMES 18 18% RARE 15 15% NEVER Based on the above table, out of 100 respondents only 12% always spent most of their free time at the library, 10% says often, 45% says sometimes, 18% says rare and 15% of them never spent their free time at the library. Are the books in the library well organized and arranged according to its classification? Table 2 FREQUENCY PERCENTAGE CHOICES 45 45% ALWAYS 27 27% OFTEN 15 15% SOMETIMES 13 13% RARE 0 0% NEVER Based on the above table, out of 100 respondents 45% of them said that the books in the library of SRCS are well organized and arranged according to its classification, 27% says often, 15% says sometimes, 13% says rare and no one says that the books in the library of SRCS are not well organized and arranged according to its classification. Are the library personnel aware with the needs of the borrowers? Table 3 FREQUENCY PERCENTAGE CHOICES 55 55% ALWAYS 37 37% OFTEN 5 5% SOMETIMES 3 3% RARE 0 0% NEVER According to the result above, out of 100 respondents 55% of them said that the library personnel is always are with the needs of the borrowers, 37% says often, 5% says sometimes, 3% says rare and 0% of the respondents say that the library personnel is never aware with the needs of the borrowers. Are they using card catalog for searching the books? Table 4 FREQUENCY PERCENTAGE CHOICES 10 10% ALWAYS 15 15% OFTEN 5 5% SOMETIMES 32 32% RARE 38 38% NEVER According to the above result, out of 100 respondents only 10% of them use card catalog in searching a certain book, 15% says often, 5% says sometimes, 32% says rare and 38% of the respondents say that they never able to use the card catalog in searching the books but instead ask the librarian for the book they are looking for. Is the present method of searching a book is accurate and fast? Table 5 FREQUENCY PERCENTAGE CHOICES 55 55% YES 45 45%. NO Based on the above result, out of 100 respondents 55% of them agreed that their present method in searching the book is accurate and fast while 45% of them disagreed. Is there any penalty for the overdue books? Table 6 FREQUENCY PERCENTAGE CHOICES 100 100% YES 0 0% NO Based on the result of the above table out of 100 respondents, all of them said that there is a penalty for every overdue book. Is there any sanction or penalty for those students or borrowers who accidentally damaged or lost the book? Table 7 FREQUENCY PERCENTAGE. CHOICES 100 100% YES 0 0% NO Based on the result of the above table out of 100 respondents, 100% of them said that there is a sanction for those students and borrowers who accidentally damaged or lost the book. Is it allowed to borrow the books for overnight? Table 8 FREQUENCY PERCENTAGE CHOICES 100 100% YES 0 0% NO According to the result above out of 100 respondents, 100% of them said that it is allowed to borrow the books for overnight. Is there a limit of number of books that can be borrowed for overnight? Table 9 FREQU.   

Tuesday, July 30, 2019

Argumentative Reflection War Essay

Nobody likes war; it is so costly in so many ways. Lives are lost, property is destroyed, people are injured and some are disabled mentally and physically. Because of this many people think war must be avoided at all costs. All these facts regarding the high cost of war on a country are true. On the other hand there are situations in which a nation has an obligation to go to war. Their were many times in the United States history when the decision to enter a war was in question. World War II was a time when people were arguing about whether or not the United States should enter a war against Germany, Japan and their allies. When this war started WWI was still fresh in people’s memories. The citizens knew how bad war could be. Many people felt that these new problems were not the United States problems and war should be avoided. Author Jon Bridgman tells us in an article in the Seattle Post- Intelligencer â€Å"The nation was deeply and bitterly divided on the question of our participation in the war. American isolationists felt that the war in Europe and Asia was not our problem and that we should stay out of it†. Of course other people knew that war was going to come, because Germany and Japan were proving they wanted to take over the world. The argument was settled by Japan. There sneak attack on Pearl Harbor solved the argument. They forced us into the war. The attack they made in Pearl Harbor was a direct attack on the United States military and a direct attack on United States land. Now US citizens knew it was all out war for the countries survival. On September 11, 2001 the US was again attacked. This time it wasn’t by another country but by terrorists. It was similar to the Pearl Harbor attack because Americans were surprised and thousands of people lost their lives. The big difference was that the attack was not done by a country but by terrorists from many different countries. The citizens of the United States pretty much agreed that this was an evil act and that the terrorists needed to be stopped so that they could not attack again. The problem was that it was not a country that attacked but a terrorist group hiding and spread out across several countries. Who could the United States blame and hold responsible for the attacks? President George Bush immediately blamed Afghanistan and later Iraq for letting terrorists use their countries to train and operate. He felt these countries should be attacked so terrorists could be stopped. The President sent our troops to Afghanistan and the troops were successful in that area and then President Bush decided the US needed to invade Iraq. This is when the argument about going to war in another country was the United States concern. A lot of people had heard that, Saddam Hussein, the leader of Iraq was a supporter of terrorists and also a threat to the world. The argument about attacking Iraq was big. If you look b ack to 2003 when people were arguing this you can see that their was enough people who wanted to go to war. Nicholas Lemann wrote in an article in the New Yorker magazine that â€Å"Everyone agrees that Saddam Hussein is truly evil, everyone agrees he has weapons of mass destruction†. On the other side of the argument many countries and people disagreed with attacking Iraq. Many inspections done by the United Nations could not find weapons of mass destruction. President Bush eventually convinced the United States Congress that Iraq was dangerous and the US army attacked Iraq. It turned out after a tough fight, the United States military could not find any weapons of mass destruction. A report in the Washington Post said â€Å"The new report from the Iraq Survey Group has confirmed beyond any reasonable doubt what most people have assumed for the past year: At the time of the 2003 U.S. invasion, Iraq did not possess weapons of mass destruction, and most of its programs to produce them were dormant.† The United States was wrong about the weapons. Even though the pro- war people were wrong about the weapons of mass destruction they felt that they were stopping a horrible dictator who could have been a big threat in the future. At least the army fought terrorists because as the war dragged on the United States did eventually find itself fighting terrorists because many terrorists came to Iraq to face the United States army. Lionel Beehner reported in the Backgrounder magazine that â€Å"Large-scale suicide attacks in Iraq are up in recent months, demonstrating that al-Qaeda in Iraq and its homegrown affiliates remain a potent force.† In both of these cases the United States went to war to provide safety for United States citizens. In both these cases the United States was attacked. In both these case people debated and argued about going to war .Yes many people were killed and injured but these examples show that there is definitely situations when a country is obligated to go to war. Works Cited John Bridgman â€Å"Lessons learned from two days of infamy† Seattle Post -Intelligencer Sunday December 2, 2001 Nicholas Lemann â€Å" How It Came To War† The New Yorker March 31, 2003 Editorial â€Å"Weapons That Weren’t There† The Washington Post October 7,2004 Lionel Beehner â€Å"Al-Qaeda in Iraq: Resurging or Splintering? Backgrounder

Monday, July 29, 2019

Has the growth of the internet created more risk in terms of criminal Essay

Has the growth of the internet created more risk in terms of criminal activities - Essay Example Having these much people in the internet is a major factor that offers a platform for criminal activities taking place in the internet. It is important to analyze whether the growth of the internet has brought in more risks with regard to activities deemed criminal over the internet. Cybercrime is a concept that has grown vastly over time. A major way to determine this is the number of pending court cases with issues revolving around cybercrime. Many young children have an internet connection in their homes. This is what has led to increased cybercrime. Over time, people have always shown interest in young innocent kids. This had led them to preying on them where they attempt to extort the children the least said. Many sexual predators pose as innocent and probably age appropriate people on the internet nowadays. However, these people are very old and are out there to commit several crimes on these children. Some of these people operate to an extent of setting up meetings with these children pretending to be age-mates. When they meet with these children, they have the audacity to kidnap them. Many are the times that they get to inflict physical harm on these innocent kids. There are many variables that are applied in this case. One of the variables that are employed in this case involves the approach that involves uses and gratifications. The uses and gratifications approach defines the topic of study and relates personality to internet choice and usage very elaborately. It clearly states that the day to day requirements of an average human being are usually able to relate with the individual or communal characteristics. Another factor that can be found to explain the question is by the use of the five-factor personality model. It is known that character is a factor that can be used to portray certain hidden or undiscovered needs in a person. The model is used as a means of breaking down and understanding human characteristics in relation to

Sunday, July 28, 2019

Critically evaluate the tests for certainty of objects in the law of Essay

Critically evaluate the tests for certainty of objects in the law of trusts and assess whether developments in the last half century have had a positive or negative impact on the law - Essay Example The assessment of certainty of objects is complex because the test varies between mere powers, fixed trusts and discretionary trusts. The reason for identifying the objects of trust is to ensure that there is a person who can enforce trust against the trustee. Additionally, there must be someone who can bring an action in court in case the responsibilities of the trustee are not achieved. The trust must also have the ability of being executed in that when there is no human persons to benefit from the trust then the concept of trust becomes pointless2. Therefore, when a beneficiary is explicitly named in the trust deed there is no confusion when it comes to the certainty of objects. In cases where a person is not explicitly named in the trust deed, but the trust document provides a description of an individual that should profit from the trust property. Additionally, in case the description is clear and precise that it is a particular person then this prerequisite is satisfied. In a certainty of objects where the trust is made for a set of people for example, ‘my children’ this clause will succeed where it has been established that there is adequate certainty to identify each member of the group/class of people3. When a group of people are not clearly described, defined, or stated in vague terms their meaning can be interpreted using the conceptual uncertainty. Two tests that have been created to establish whether all persons within the group can be clearly recognized. They include the class ascertainability test, which comes into play where trustees make a complete list of each individual that comes within the class of people to benefit from trust. Although the courts do not need to know the entire class in order to decide whether the trustees are selecting within the group, in case the trustees do not do so then it must be said that the trustees are not exercising their duties in case they have

Saturday, July 27, 2019

Actors in Long Life Learning Essay Example | Topics and Well Written Essays - 2250 words

Actors in Long Life Learning - Essay Example The global economy is highly influenced by transitions and adjustments challenges at the social, business and cultural levels. Knowledge is not just the power, but a property to highly be marketed and commercialized. Lifelong learning is considered to be a vehicle that can enable immigrant community to adapt the challenges of new global economy. Human brain is perceived to represent a new ‘grey capital’ as it is set alongside the familiar economic resources such as land, labor and finance (Field, 2006, p. 9). This piece of research work presents the concept of lifelong learning and analyzes how this can help immigrants improve their personal and professional development and as a result improve the economic prosperity of country they migrated to. This paper investigates the role of lifelong learning in contributing to the economic and social prosperity and reflects on the personal experiences of lifelong learning in terms of personal and professional development. Lifelong Learning and implication on immigrant community In today’s competitive knowledge economy, lifelong learning has become a critically important strategy to make people highly competitive and productive. (World Bank, 2003). Lifelong learning is a human process and a metaphor to describe societies, regions and organizations. Lifelong learning is described as an ideal goal for better education (Parson, 1990), as a human process (Parson, 1990), as a product (Hatton, 1997) and moral duty of people (Wain, 1991). Learning is a human process and it requires consciousness and the capacity to utilize their knowledge. Lifelong learning is a continuous learning throughout one’s life directed by the individual needs and intentionality mediated by the capacities and interests (Billett, 2010, P. 402). World Bank (2003) explained that lifelong learning refers to learning throughout the lifetime including formal, non-formal and informal education and training. Formal education and training are structured programs recognized by formal education system. Non-formal education is structured education system but not recognized by national systems. Informal education and training are fully unstructured education or training systems that can take place anywhere such as home, organizations, workplace etc. Lifelong learning aims at positively influencing the inexperienced people in changing their career targets and making them highly demanded individuals by taking the self-responsibility of their learning and education. It thus assists them in developing their own learning skills (Uzunboylu and Ursen, 2011, p. 450). Technology in modern society plays significant role in lifelong learning. Distance or online-education facilitated by colleges and universities can be considered as examples for how modern technology assist lifelong learning.

Friday, July 26, 2019

Identity Theft Essay Example | Topics and Well Written Essays - 2500 words - 3

Identity Theft - Essay Example Identity theft victimizes nearly 10 million Americans each year and costs businesses and individuals an estimated $53 billion (Crosby, 2005). A person’s identity can be stolen either in the real world or in the digital world (online). Although many would believe the digital world is the most common place that a person’s identity is stolen this is not true. The most common place that a person’s identity is stolen is in the real world when their wallet, checkbook or credit card is lost or stolen. The internet always grabs the headlines, but it is individuals who are close to the victims, such as family and friends, that are doing most of the crimes (Lai, 2006). Social Security numbers are at the heart of the issue because it is our sole code for identity. It’s very easy to obtain Social Security numbers. Non-Social Security Administration uses of Social Security numbers have not been prohibited, so Social Security numbers are used as identification and account numbers by many entities (Walsh, 2004). Counterfeit Social Security numbers are on the rise because the Social Security number is the national identifier and it gives individuals a reason to use it for illegal purposes. Stolen Social Security numbers have been used to establish credit, gain employment, hide identity to commit crimes obtain benefits and services. Thieves will attempt to get information on their potential victims in many different ways. They may steal your bank statements or pre-approved credit card applications out of your mailbox or they may do what is known as dumpster diving which is when the thief will go throw your garbage to look for potential information with your identification on it. The most difficult type of identity theft is fraudulent accounts being opened in a person’s name. It takes an average of 152 days for victims to find out

Inherited and Environmental Influences on Development Essay

Inherited and Environmental Influences on Development - Essay Example According to the findings, Bronfenbrenner's Ecological Model (1979) explains that the behavior and development of an individual is an interplay of the individual’s biological and personality factors, his environment and the society and culture he was born into. Bronfenbrenner also claims that effects of interactions between the individual and his environment are two-directional or characterized by reciprocity. This means that while a child’s development is influenced and molded by his family, school and peers, he likewise influences and molds the behavior of others. The growing child moves through five systems that inter-relate and affect his development. The most basic of which is the microsystem, where direct contacts between the child and his immediate surroundings result in behaviors such as dependence or independence and cooperation or competition. An example of this is the home base of the child and his relationship with his family. The pure culture of the society this family lives in greatly influences how this family lives and how the child imbibes the culture as he expresses it in his developing personality. The mesosystem comprises the linkages and processes that take place between two or more settings with the child in common. A perfect example is how learning in school is supported by follow up lessons in the home. The third level comprising linkages and processes taking place between two or more settings is the exosystem. This includes at least one setting that does not directly involve the child but still influences the processes within the immediate setting of the child. An example is the parent’s occupation. The workplace of this parent does not contain the child, but processes at work may affect his development such as the hours spent there by the parent may affect the parent-child bond. The fourth system is the macrosystem which includes the customs, values, and laws considered important in the child’s culture and u pbringing. A child from another culture may celebrate special customs and traditions from his culture apart from the special occasions celebrated in his host country. Lastly, the chronosystem in Bronfenbrenner's Ecological model refers to the time that transpires as the child relates in his various environments. An example is a change that happens to the child while he grows up moving from one system to another, like the westernization of the values of a child originally from an Asian culture. This ecological model implies that the interplay and quality of the various systems and environments of the child will play different roles in influencing his development. Likewise, whatever comes out of that development will affect the various environments the child belongs to. For instance, the free expression of his culture may lead to environments being more accepting of it.

Thursday, July 25, 2019

Training Schedule For Employees Of Mach Speed Couriers Essay

Training Schedule For Employees Of Mach Speed Couriers - Essay Example The return on investment for example, given the professionals and companies that Mach Speed Couriers deal with, let for instance the cost of the training program to be $ 300,000 for three years. This delivers an additional profit of $ 500,000 for the business period of the three years. The information is used to calculate the value of ROI as shown below;ROI = profit gains fewer Investment costs (training cost) divided by investment costs. ROI= ($ 500,000-- $ 300, 000) / 300,000 = 66.67 %The designed training program caters for individual differences because the employees come from different backgrounds and initial exposure to varying experiences (Carnes, 2010). For meaningful transfer of training, there are specific materials very suitable to the trainee. The charts and marker pens for the trainers must be available. The charts are useful in demonstrating the whole concepts on the board or the wall. However, computer use and the projector are more useful in the exercise. This can be used for easier simulation. The trainees are provided with writing materials to note down key concerns in the courier industry. The design must have the clear and realistic objective that can be accomplished. The information relayed must be applicable and related to job specifications and how to improve on them. The real reflection on the working environment is captured by the trainer.Transfer of training is possible through sub-division of trainees into small manageable groups.

Wednesday, July 24, 2019

Formal memo(globalization) Essay Example | Topics and Well Written Essays - 500 words

Formal memo(globalization) - Essay Example The concept also relies of consensus and cooperation among nations (Boudreaux 2007) The world globalization was already used in the 1960s, but its true meaning was not sought until the 1990s, and especially after 9/11. Its meaning is not altogether clear to everyone. Perhaps the best definition was found by the Carnegie Endowment website: ‘Globalization is a process of interaction and integration among the people, companies and governments of different nations, a process driven by international trade and investment, and aided by information technology’ (Boudreaux 2007). Most of the world’s cooperation is unintentional and unstructured, and comes in the form of trade, and perhaps the cooperation of providing aid to poor countries, or that following some catastrophic disaster. Many think of globalization as something that causes competition among the world’s countries and their commerce, trade and exchanges. What many hope that globalization will bring is a beneficial coordination of the plans and actions of millions of people around the wo rld, as a system of global cooperation. Healthy competition combined with a model of cooperation when it comes to resources, the environment, pooling of services, and provision of goods, seems like a great combination. A vast web (Boudreaux 2007) of cooperation seems plausible when we consider the speed of modern transportation and communication. It is necessary, to minimize ecological impact. The readings I plan to make have a potential of several deductions and conclusions, which will be of great interest to companies, trade groups, environmental movements, industry leaders, social forums, commercial syndicates and lobby groups. My proposal can reach a number of these, of which I shall make a list. To have the greatest reach, a website with relevant information would be a good goal. 3. Globalization, a book by Donald Boudreaux, which provides some relevant information about its

Tuesday, July 23, 2019

Children can lead successful lives enough though they experience birth Essay

Children can lead successful lives enough though they experience birth complicatins - Essay Example The complications can be due to preterm birth, low birth weight, and intrauterine growth restriction. Particularly the complications develop because of the environment that a mother faces before or after the birth. These can lead to physical or psychological impairments among the children. There are multiple factors that can lead to these complications like smoking, drinking, maternal depression, poverty, family quarrels, parent’s mental illness or lack of formal education. The child who encounters these types of problems at home develops serious learning and behavior problems, mental illness or has a stressful future life (Werner, 1989). Nonetheless, the children who have experienced birth complications can lead a successful live. It all depends on the type of environment in which they are brought up. A stable environment facilitates a child in dealing with the stress he faces, and develops skills equally like all other children. In a research conducted by Emmy Werner in 1989, one third out of the total number of impaired children grow into a competent adult. After further study and observation, Werner found the factors that assist these stressed children in dealing with their stress and other risks of life. The main factor that contributes to these children to bear stress was their strong bond with the caretaker, which could be any member of the family or any appointed baby sitter. Establishing this bond makes it easier for the children to share their thoughts and daily life problems with the caretaker, resulting in taking decisions on their own and making life easy for them. Grandparents can play a pivotal role in the upbringing of a child. The protective aspect in the families, whether out of family circle, or within the children themselves who face complications, enables them to resist stress. The other factor included is that these children have taken

Monday, July 22, 2019

Electronic Medical Records Essay Example for Free

Electronic Medical Records Essay Electronic Medical Records (EMR) are becoming more widely used across the healthcare spectrum. One of the reasons for their popularity is the potential that is presented for increasing the quality of care delivered to patients by decreasing handwriting interpretation errors, reducing medication administration errors and eliminating lost charts. Time management is a crucial skill to have as a nurse. It allows for a smooth workflow which translates into quality patient care. Much time can be wasted not only by the nurse signing off illegible handwritten orders, but also by the other nurses that have to help interpret the handwriting. The EMR requires the physician to enter orders electronically, thereby eliminating handwritten orders. Electronic orders are more precise and more accurately followed (Sokol, 2006). Fewer errors make it to the patient, reducing unnecessary tests and increasing the quality of care that patients are receiving. Electronic medication administration records (MAR) are useful in displaying medications due at specific times. Not only is it possible to sort the medications due at one time, the MAR will also alert the nurse to potential drug interactions. Late medications will be displayed in red to be easily seen. If bar coding is implemented, medication errors can be reduced by a range of 60%-97% (Hunter, 2011). A lost chart can be very frustrating while trying to deliver seamless care to a patient. Paper charts are easily misplaced. Since there is only one, if a single provider is using it, no one else of the medical team can view the chart. The EMR can be viewed from any computer with secure internet access or on a handheld device. When the internet is down, a downtime view only access is available. Nursing Involvement Nurses are known as patient advocates. In advocating for their patients, nurses strive for what is best in their patient’s care. Since nurses will be using the EMR most frequently, it is imperative that they are part of the selection and implementation on an EMR. A nurse, on the EMR team, will represent all nursing. Nurses will be accessing the EMR through their shift several times and will become familiar with the layout and workflow and will be able to provide insight into what would work best to ensure quality of care. There is a saying that you don’t know what you don’t know. A nurse knows what she will need and is the best to supply this information. While researching which EMR would be the best for a facility, a nurse can provide information on time saving workflows between systems. Nurses must also be trained as super users to provide a seamless change from paper charting to electronic charting and provide support to fellow nursing staff. A nurse on the EMR team will be able to deliver new information in a way that other nurses are more receptive to. Handheld Devices If nurses were to use handheld devices in delivery of patient care, there would be a noticeable savings of time as well as more accurate charting. Nursing personnel carrying a handheld device would have immediate access to their patients chart to notice new orders, lab results, or medication admission records. The need to review the paper chart repeatedly throughout the day would be eliminated along with the long search that commences every time you have to look for the paper chart. This could add several minutes to a nurse’s time at the bedside, improving patient satisfaction. When vital signs are taken, written on a slip of paper and then transcribed into the paper chart, there are many opportunities for error and delay. Numbers can be transposed, written incorrectly or the wrong patient’s information could go into a chart. With the immediate availability of a handheld device, the information from the vital signs monitor would have the ability to interface into the patient’s chart virtually eliminating late charting and errors. Security Standards The Health Insurance Portability and Accountability Act (HIPAA) was initiated in 1996 as a standard for protecting individually identifiable health information (U. S. Department of Health and Human Services). HIPAA requires that all information, either written or electronically, that falls under the criteria is protected from unauthorized viewers. An EMR carries more stringent HIPAA guidelines than a paper chart due to the risks associated with computer based files and there are a few key steps that must be taken to ensure compliance with this act. Access control: each user will have a unique user name and password that must not be shared. Firewall protection must be used on the internet server the hospital utilizes to prevent hackers from obtaining access to protected information. If users are authorized to access patient information from home, there must be a secure server used (Arevalo, 2007). Storage: Data must be encrypted to enhance the security while information is being stored and while it is transferred. Encryption entails protection of files and data that is only viewable to authorized users. Compliance of these regulations should be audited on a regular basis with any violation being swiftly remedied (Medical Records, 2013). Healthcare Costs Purchasing an EMR can cost hundreds of thousands of dollars. In order to justify such a large purchase, one must examine the potential ways that money can be saved while using an EMR. After spending hours training users and with a little practice, nurse’s workflows will improve and less time will be wasted. A chart will not have to be searched for, double or triple charting is eliminated by using handheld devices for immediate charting. The quality assurance team will be able to run reports on compliance of core measures and be able to recommend changes to nursing personnel to implement. Fewer medication errors will be made by using the electronic MAR. Most importantly, these time and money saving factors will enhance patient safety. With fewer paper charts to store, valuable space can be remodeled into patient care areas that offer services not previously offered due to space issues (Power, 2013). This will increase revenue for the facility. Comparison Epic offers a computerized management system that is utilized by everyone in the healthcare setting including, nurses, nurse aids, physicians, dietary, radiology, emergency department and the business office. Each department will have a unique look and functionality to their program. There is no need to use multiple systems to gather information on a patient. It can be used in medium size ambulatory settings such as a clinic as well as in a hospital setting for either inpatients or outpatients. With all departments having access to the same information on a patient, errors will be reduced in delivery of patient care. The chance for entering erroneous lab results or miss- documentation will also be reduced with department specific workflows. Not only will this result in better patient care, but also in a nurse’s ability to delivery effective, efficient, quality care without delay. In addition, all physician order entry is electronic, every time. Order sets can be customized for each prescriber, saving time and hassle while maintaining meaningful use and following core measures. For added security, the system can be set to automatically sign a user out after a specified length of time of non-use. And while all of the patient’s information is available to each user, audit trails are left enhancing patient security. Epic has pre-loaded patient teaching materials available as well as the option to custom make information. After visit summaries are easily printed upon discharge and an electronic copy is permanently attached to the chart. Patient would benefit from a facility the uses the Epic system by having access to MyChart. MyChart is a portal of access between a patient and their provider for communication as well as a portable computerized health record. IF a patient were to access care from a facility that does not utilize the Epic system, that patient would have access to MyChart and would then be able to provide critical information that would enhance their care. Another computerized management system available is one from Cerner. This system can be used in all settings in a hospital including nursing. For medication administration, Cerner has available barcode identification of medication to help nursing staff complete their five rights verification prior to administration. It also allows charting at the bedside to enhance accuracy either through a handheld device or a stationary computer. All order entry by physicians is done on the computer allowing the providers to follow built in prompts for allergy information and adverse drug interactions as well as prompts that will aid in the order of care protocols to enhance patient care. Cerner also has a portal designed for patient to have access to their records no matter where they are as well as tracking information for health goals a patient and their provider have established. The portal allows progress tracking and provides information on steps that can be used to help the patient reach their goals. This gives patients more responsibility for their health while providing the incentive needed. Nursing care will be escalated similarly to the way it would be in Epic. Patient information is easily accessible through intuitive workflows allowing nursing staff to make responsible decisions regarding patient care. My recommendation for a computerized management system would be the one available from Cerner. It is the most user friendly for staff including nursing and offers intensive training and yearly upgrades. The different departments systems appear to work together seamlessly resulting in increased savings of time and money (Cerner, 2013).

Starbucks †Going Global Fast Essay Example for Free

Starbucks – Going Global Fast Essay Controllable: 1) Promotion. I think that spending only 1% of revenue on advertisement is a bit too little and Starbucks should definitely spend more. 2) Product. In Italy for instance food is popular in cafes. To open shops and be successful in Italy Starbucks should have more differentiated products. 3) Price. Again in Italy price for coffee is a bit less than Starbucks proposes. The only way is to make the price less. Uncontrollable: 1) Starbucks tries to control competition for instance paying for rent twice as much, so competitors cannot get a place or renting empty space. Even though it seems to be controllable, customers can be unsatisfied because of that and also businesses can practice same strategy. It also can lead to bad reputation (it is not nice to do so) 2) Starbucks wants to enter French market. The main problem is strict regulations and labor benefits. Considering some problems with working hours and salary that Starbucks had it would be hard to work in France. 3) Italians know which coffee to drink. Considering this Italian coffee culture and the amount of competitors in Italy it will be very difficult for Starbucks to be famous there. 4) Cultural challenge is the main problem for Starbucks to be global. Every country needs to be treated differently. If in US people got used to very sweet coffee, in Japan they did not. Question 2: Potential risks: 1) In my opinion potential risk is connected with dissatisfaction of employees. If Starbucks will not change its policies, salaries, working hours it will have problems with personnel. Potential solution could be identifying gaps connected with employees and try to make everyone happy. Increase the salary if needed, make the environment for employees friendlier, so they will stay and enjoy their work. 2) Another risk is attracting next generation customers. Younger customers feel uncomfortable already, because almost all stuff is same age as they are. Some do not like the terminology. Starbucks can for instance change the terminology once in a while. Make it in different language every time. It also can hire more diverse workforce, young and not so young, different nationalities, so people will feel more comfortable. 3) Because of complains of employees Starbucks can loose its reputation, which can decrease sales. Its good that Starbucks wants to increase its market share and income, but it would be bad if it will loose its reputation because of that. So it is better to focus on both things together. 4) In international environment Starbucks faces a lot of risks. Cultural risks are the most important ones. For instance language differences, tastes and others. Managers of Starbucks should examine foreign cultures better to understand them and provide them with products they want. 5) Competition is a big risk also. To be more competitive Starbucks should not loose its image and make the products more differentiated. As it says in the case study in Japan Starbucks lost 70% of its profits because of competitors. It’s a huge loss and Starbucks should think and fight with competitors. Question 3: Reading the case I noticed that Starbucks uses unethical strategy. Paying for empty space so competitors cannot make business there is unethical I think and it can damage the image of Starbucks. A lot of customers of Starbucks think of ethical part of the business and this strategy will probably make them think to go to Starbucks or other place. Another issue is that Starbucks experiences decrease in sales and tries to improve this aspect. But all efforts (Starbucks express, cards etc.) do not give the desired outcome. There must be something wrong with their strategy. Low salary to employees is an issue too. Starbucks still does not have stores in 8 states in US. It is controllable. Starbucks can open its stores and make them successful there. Question 4: Starbucks can improve the taste of coffee and make it like Japanese people want. Examine culture better and understand what people want and need. Starbucks also can improve service or make better atmosphere. It also can renovate coffee houses. Develop new menu that will fit tastes of Japanese customers. Also Starbucks should always work and improve to keep customers interested and fight with competition. Japanese people are busy, so maybe it would be convenient for them to buy coffee online.

Sunday, July 21, 2019

A Laparoscopic Cholecystectomy Was Indicated Nursing Essay

A Laparoscopic Cholecystectomy Was Indicated Nursing Essay Cholecystitis is defined as an inflammation of the gallbladder caused most commonly by the obstruction of the cystic duct Bloom et al., 2012. The gallbladder is a small organ located under the liver that plays a major role in the digestion of fat (Balentine, 2012). Normally bile and digestive enzymes pass out of the gallbladder on their way to the small intestine. If this flow becomes blocked, it will build up inside the gallbladder, causing swelling, upper abdominal pain, and gallstones resulting in liver dysfunction (Bloom et al, 2012; Mackillop Williamson, 2010). Gallstones are solid particles that are formed from bile (Balentine, 2012). Common risk factors in the formation of gallstones include being female of childbearing age, overweight, certain medications such as birth control pills or statins, rapid weight loss, poor dietary habits and pregnancy (Ali, Cahill, Watson, 2004; Balentine, 2012; Mackillop Williamson, 2010). Gallstones can block the outflow of bile and digestive enzymes from the pancreas. If this blockage persists, the gallbladder can become inflamed causing cholecystitis (Balentine, 2012). The initial treatment of cholecystitis includes bowel rest, intravenous hydration, analgesia and antibiotics (Bloom et al., 2012). Outpatient management may be suitable however if surgical treatment is indicated, laparoscopic cholecystectomy represents the gold standard of care (Bignell et al., 2011; Chowbey et al., 2010; Farkas et al, 2012; Tsimoyiannis et al., 2009). In the diagnostic process for surgical interventions an ultrasound scan may be performed however magnetic resonance cholangio-pancreatography (MRCP) is the diagnostic preference for gallstones (Mackillop Williamson, 2010). MRCP is a non-invasive technique used for viewing the bile and pancreatic ducts and gallbladder using magnetic resonance imaging (MRI) (Mackillop Williamson, 2010). Laparoscopic cholecystectomy requires gas to be administered into the peritoneal cavity and thus routinely requires general anaesthesia with intubation (Sherwinter, 2011). The advantage of laparoscopic cholecystectomy results from preserving the integrity of the abdominal wall which reduces operative trauma and complications. It also has been shown to have a greater recovery time decreases postoperative pain and the need for postoperative analgesia, shortens hospital stay and returns the patient to full activity within 1 week (Sherwinter, 2011; Tsimoyiannis et al., 2009). For the operation anaesthesia was induced with fentanyl, midazolam, propfol and rocuronium. Tracheal intubation was facilitated with suxamethonium. Anaesthesia was maintained with a propofol infusion accompanied with a nitrous oxide and oxygen ventilation. Mrs Smith was also given 4mg of ondansetron before the end of surgery for the prevention of post-operative nausea and vomiting and was administered bupivacaine into all trocar wound sites. At the conclusion of the surgery Mrs Smith was administered glycopyrrolate and neostigmine to antagonize the residual neuromuscular blockage and pain relief was given via fentanyl pain protocol. After induction of anaesthesia Mrs Smith was positioned in the reverse Trendelenberg with the right side of the table elevated. Abdominal insufflation was achieved with CO2 and intra-abdominal pressure was maintained at approximately 13 mm Hg (Gupta et al., 2007; Shora et al., 2008; Tsimoyiannis et al., 2009). Intra operative monitoring included electroencephalogram (EEG), pulse oximetry, blood pressure and heart rate via arterial line, and temperature (MacKay, Sleigh, Voss Barnard, 2010; Shora et al., 2008) One clinical issue related to Mrs Smiths perioperative care is strategies to avoid wrong-site surgery. Safe surgery is a world-wide recognised issue (WHO, 2009). Healthcare and surgical care provision encompass such a degree of variation and complexity that it involves an increased risk of errors (Weiser et al., 2010). These increased risks are due to multifaceted issues of human error where there is a breakdown in communication or processes (Brady, 2009). The WHO Surgical Safety Checklist is designed to enhance both communication and teamwork and to safeguard that healthcare professionals deliver evidence based patient care (Anderson 2009). The surgical safety checklist identifies three phases of an operation; the sign in time out and sign out. Each point corresponds to a specific period in the normal flow of work. A checklist coordinator, usually the circulating nurse, ensures that the surgical team has completed the listed tasks before continuing onto the next phase (WHO, 2008) The sign in period is before the induction of anaesthesia (WHO, 2008). This is where the patient confirms to operating room staff, their identity, type and site of operation (in their own words), and confirms their approval for the procedure by acknowledging their signature on the consent form. The anaesthesia safety check is also completed within this phase. This check asks questions relating to allergies, make-up or nail polish, dentures or prosthesis, time bladder last emptied and the time that the last food and fluid where consumed. It likewise checks identification band, and whether the operative site has been marked by doctor (Queensland Health, 2011). The sign in phase allows for the checklist to not merely be a to do list. It ensures that important safety identifiers have been checked and collated correctly (Karl, 2009). It permits a logical and systematic approach aligning with the organizations values, highlighting patient safety and recognising individual roles in ensuring patient safety within the multidisciplinary partnership. This phase also emphasises an institutions regulatory requirements that essentially improves patient care (Conley et al, 2011). The second phase is the time out. This occurs before skin incision (WHO, 2008). Operating staff actively confirm differing team members roles. The surgeon, anaesthesia professional and nurse verbally confirm the patient, type and site of the operation to be performed and visually check for a valid consent. For the nursing team it is also a time to review sterility and equipment (WHO, 2008). Brady (2009) reports that wrong site surgery is the second highest among all sentinel events recorded. He attributes faulty communication and organizational culture as factors contributing to sentinel events and endorses strategies such as surgical safety checklists, that increase the effectiveness of team functioning. The third phase of sign out is initiated before the patient leaves the operating room (WHO, 2008). The checklist coordinator confirms with the team the name of the procedure recorded, that the surgical count is correct, the specimen is labelled accurately and if there were any equipment problems needing to be addressed (WHO, 2008). This period again emphasises improved communication among surgical team members and thus quality of care (WHO, 2012). According to Kao and Thomas (2008, as cited in Jones, 2011) surgical errors such as wrong site surgery can be attributed to individuals as opposed to one individual. By this constant communication and clarification at certain time periods throughout an operation demonstrates improved communication where potential risks where minimised (Jones, 2011). Jones (2011) also claims that with the WHO checklist, interaction between team members have improved and potential risks minimised. Surgical safety checklists not only improve communication and teamwork, but also improve understanding of each others roles (Bell, 2010). This strategy can achieve massive reductions in complications and studies indicate that a checklist works because it is more than just a tick sheet. With the effective adoption it generally requires local system changes and a commitment to teamwork for safety (WHO, 2012). Checklists are acknowledged as an organised system for a safe ending to a task. Research has suggested that at least half of all surgical errors are avoidable (Weiser et al (2010). If used properly the WHO Surgical Safety Checklist, through effective teamwork and communication will result in the right patient, having the right procedure, at the right time in the right area (Donaldson 2008). Sherwinter, D. A. (2011). Laparoscopic Cholecystectomy. Retrieved from http://emedicine.medscape.com/article/1582292-overview Queensland Health (2011). Perioperative Patient Record. Retrieved from http://www.health.qld.gov.au/psq/pathways/docs/pre-op-check-a3-11.pdf

Saturday, July 20, 2019

Prejudice :: essays research papers

Prejudice, the act of judging someone based on outward appearance or social standing. In the 1960’s Harper Lee wrote a book called To Kill a Mockingbird, about prejudice and how hard the times were. In To Kill a Mockingbird, there are many examples of prejudice showing how morally wrong it was. There are several examples of prejudice in the book: Tom Robinson because he is African American, Boo Radley because of his standing in their society, and the Cunningham Family because of how poor they were. The following paragraphs will discuss these examples.   Ã‚  Ã‚  Ã‚  Ã‚  Tom Robinson was one example of prejudice because he was African American. â€Å"‘You felt sorry for her? You felt sorry for her?’ Mr. Gilmer was ready to rise to the ceiling† (Lee, 197). This is when Tom Robinson is on trial for being falsely accused of raping Mayella Ewell. The people thought it was not right for Tom Robinson to feel sorry for Mayella because he was black and she was white. â€Å"Tom, did you rape Mayella Ewell?† (Lee, 196) The fact that Tom was even brought on trial was an act of prejudice. In courts today the case wouldn’t even had made it to court and here they are accusing him anyways. Tom Robinson being convicted was the biggest act of prejudice in his case. There was no evidence against him to convict him with. The only reason he was convicted was because it was a white jury and he was African American. These were examples of racial prejudice which was very prevalent in those times; also common was social prejudice, as in the Cunningham’s case.   Ã‚  Ã‚  Ã‚  Ã‚  The Cunningham family was an example of social prejudice because they were poor. â€Å"Miss Caroline, he’s a Cunningham† (Lee, 20). This is when they are in class and Miss Caroline is trying to give him lunch money. Scout tells her he is poor and won’t be able to pay her back and is too proud to take it. â€Å"He ain’t company, Cal, he’s just a Cunningham† (Lee, 25). They invited Walter back to the house for lunch and he poured syrup all over his food and Scout gets on his case about it. Cal tells her she shouldn’t do that and she implies that it doesn’t matter what they say to him he is just a Cunningham, she is being prejudiced because she knows he is poor. Another reason people are prejudiced to the Cunninghams is because they have to pay with crops.

Friday, July 19, 2019

I Was Not a Feminist :: Reflective Writing Education Essays

I Was Not a Feminist I am not a feminist.I do not go to feminist rallies, burn my bra (although I donà ­t always wear one), feel hatred towards men, nor do I spend countless hours with my sisters figuring out ways to tear gas abortion protestors or concocting tortuous plots to abolish the radical right.I am a libertarian who exercises her right to vote and always does her taxes.I read Adrienne Rich and Allen Ginsberg and Ayn Rand and James Joyce with equal fervor.I listen to Tori Amos and Dar Williams and Rush and Metallica.I do not listen to Ani DiFranco; I find her music à ¬too feminist.à ®I believe John Milton, a dead white male, changed the way western literature relates to philosophy and religion.Stupid male humor amuses me, and I am happy to cook and clean for my boyfriend because I know if I donà ­t, he will eat Wendyà ­s and his house will smell bad.I am a baseball fanatic, and love hockey and college basketball.Softball bores me, and womenà ­s basketball is not nearly as exciting as menà ­s.I enjoyed being the only woman at fraternity Super Bowl parties.I could never not eat red meat because I love the taste of a well-cooked cow.All of these things, I have been taught, do not qualify me as a feminist. So why do I feel now that these categorizations should not matter?Is it because now I sense all things I am, not the categorizations, are feminist methods of thinking and acting?Before I realized it, I was not only a feminist, but also exercising a feminist pedagogy when teaching writing.Teaching writing is a chance to help students recognize that they, too, can write intellectually about a topic they are interested in and be excited about it.As a social-expressivist tutor, I try to work in a non-directive way, engaging my students in open-ended conversations that lead them to answering their own questions and clarifying their own ideas.When I teach writing, Ià ­ve had students do everything from peer critique to creating movement from sentences to show them that everything is open to interpretation.I use Matisse to explain thesis.These practices in themselves are not necessarily feminist, but the theories behind them, for me, always have been. Bell hooks writes in Talking Back that à ¬feminist education ? the feminist classroom ? is and should be a place where there is a sense of

Short History of Gangs :: essays research papers

Since the beginning of time, youth groups or gangs have been in existence. These groups have had many negative effects on society for many years. These youth groups or gangs, as they are commonly called, have participated in many criminal and illegal acts that have plagued society. They have been stereotyped with such negative names as rowdies, bad kids, troublemakers, and many other mischievous names. Some of the earliest records of gangs date back to the fourteenth and fifteenth century in Europe. Some of the activities that these youths had been recorded as partaking in have been theft, robbery, extortion, and rape. At the same time in London, some of the names these gangs had were the Mims, Hectors, Bugle, and Dead Boys. These gangs did many types of vandalism to the city. Some of the recorded vandalism that had taken place was various buildings with broken windows, taverns that had been destroyed by the gangs, and assaulting the watch. And if the violence on the public was not enough, these deviant groups also had fights with themselves. When there would be a fight, the separate groups or factions would dress up with different colored ribbons so that they could tell who was with what faction or group. There were also other places where gang violence had been recorded. During the middle ages in France, there were factions that started fights with other factions that were from other places. In Germany during the seventeenth and eighteenth centuries, gangs were a part of the society. Gangs did not appear to have spread to the United States until the early 1800’s. Many Europeans migrated to the United States, mainly the east coast; in seek of a better way of life. After coming to the United States, the money that many of the Europeans had quickly became depleted. Many of these people had to take out loans to survive with local merchants. Seeing how many of the others had little to no money at all, they also had very little chance for any health care whatsoever. People were dying due to poverty and disease all over. Many people could not take care of there children. It was very common to see children wandering the streets in search of food, shelter, and clothing. These youths that roamed the streets were mainly in the New England areas like New York, Boston, and Philadelphia.

Thursday, July 18, 2019

Winn Dixie

William Milton Davis and his four sons founded Winn-Dixie in 1925 in Miami, Florida. On February 18, 1952, Winn Dixie became the first Florida-based industrial corporation listed on the NYSE. In 2005, the company filed for Chapter 11 bankruptcy protection in â€Å"an effort to address financial and operational challenges that had hampered its performance. † (NYTimes. com) Winn Dixie was having a difficult time trying to overcome competitors, such as Wal-mart, that had blanketed crucial markets, such as Florida. In March 2012, Winn Dixie became a wholly owned subsidiary of BI-LO, another Southeastern supermarket chain, who took over Winn Dixie’s headquarters in Jacksonville, Florida. Currently, Winn Dixie operates more than 480 stores and 380 in-store pharmacies in Alabama, Florida, Georgia, Louisiana, and Mississippi, employing approximately 63,000 individuals. Management Style Winn Dixie stores operate individually in that they all have their own general manager who is in charge of that store. This person is â€Å"responsible for deciding how to create a competitive advantage and achieve high profitability with the resources and capital they have at their disposal. † (pg. 9) The general manager hires functional managers who are responsible for the various departments (ie deli, pharmacy, dry goods, bakery, etc). Functional managers are responsible for â€Å"the specific business functions or operations that constitute a company or one of its divisions. (pg. 11) Therefore, the general manager looks at how the store as a whole is doing and pinpoints areas that need improvement. The GM then tells the functional managers what goals they need to achieve for their specific departments. The functional managers then need to develop a strategic plan in order to get their team to achieve those goals. An example: The GM is alerted to the fact that the customer service is not up to par. They would inform the customer service manager of this fact, and the customer service manager would decide how to get the team to improve customer service. Perhaps an incentive plan that rewards positive customer feedback or better training may be necessary. After a set period, customer service will be re-evaluated to determine if the changes were positive or negative and what can be done to continue improvement.

Wednesday, July 17, 2019

My worse day ever

My spank twenty-four hour period invariably was the solar day my br early(a) cut out allow on the window, and some died. My br otherwises name is either. He was innate(p) on January 9, 2004 and Is the fourth nestling in our family. He was eight and a fractional years of old. It all told happened on Tuesday family 11, 2012. My day began Like any other day non knowing what was private for me, I thought that this was going to be a great day. I had no Idea that my brother was going to take back from the second floor window and almost die. In this essay I get out be informing you about how my day began, to how he fell and what happened at the end. I went to school like always and came home.When I arrived home we were told that guests might get a bulky over, so I cleaned the house and got dressed. After we finish cleaning we had our dinner. During the meal the children had made quite an a mess under the postp unmatchable so I went up the stairs to impound the empti ness. My get on was next to the room where all the boys slept. There were cardinal boys that slept in that room since we lived with our first cousins. It was impossible to have merchant ships so they had five mattresses on the floor simply because we had to mindlessness we put three against whizz contend and parallel to that wall and put the other two under the window.As passed through the cortege I noniced my brother all and cousin Mustang were throwing themselves and Jumping on the mattress from one wall to the other. As I grabbed the vacuum and left my room in the receding of my eye I axiom my cousin Mustangs face. His face was red and he hold back like he was scared. Ive never in my life seen a young child scared in that way. I comprehend something wrong so, I began to look for all but, there was no sight of him. all(prenominal) I byword was the open window and oddly, the screen was half ripped off. I let go of the vacuum and ran to the window.I barely saw any thing, al I saw was his arm, I entangle my heart drop. If someone to relieve oneself me at that milliampereent there would non have been even a star drop of blood thats how ice stone-cold and shocked I was. As I ran coldcock the stairs I was at a loss for words. Without thinking I swallowed and yelledAll Fell out The Window Yummy . My sister summer and I verbalise It at the akin time because she was down stairs and saw him from the downstairs window. My mother was In the kitchen doing the dishes, when she comprehend her face changed In color and she fell to the ground In tears not knowing what to do.My Aunt quickly ran stairs to tell my uncle who has just entered the shower afterward a long hot day at work. Everyone in the house was scream as if he had died. All was in the backyard laying face down on the concrete floor. No one precious to go outside and see him for the dread of him being dead. I couldnt Just discontinue him out there so I ran out. I opened the back yard door and went next to him. I began to out war whoop as looked at him laying there. I felt as if the world had end. I remember relation my self Hess alive. I felt him quick but he was unconscious.Suddenly he woke up and began to try to get p so I picked him up in my fortification and opened the door. SSL entered the house his forehead and his prise began to bleed. I went towards the living room and sit on the table with All In my lap and soon he began to cry because he saw everyone egregious. My mother was neurotic so I yelled at her, and told her to get a towel and get over the blood of his face. She did that while my uncle called the ambulance and my father. Hurt? . All replied in tears and a adynamic voice l dont want shots I dont want shots .Through all that pain his exclusively fear was to get shot. The police arrived and, a few seconds later the ambulance did too. They came in and wrap up All in a bed and took him. My mother went with, I wanted to go with her bu t the police kept ask me questions. They assumed that this had been purposely done and they wanted to keep us under surveillance. I had to tell the police everything and show them everything boulder clay they understood what happened and left. I was alone at home with all the kids, who were up stairs hiding in my room and crying from fear that All could have been dead.I went upstairs to comfort them and to tell them that All was Okay ND to Just falsify dud for him to fall home soon. After a long time of waiting impatiently my mom finally called my aunt and told her everything. My aunt looked divergent and her face became pale but she try to act normal. When she ended the call I asked her what happened. She told me that All broke his back, neck and, human face bone and that he might not be ever able to locomote again. I began to cry accordingly she asked me not to tell the kids or anyone. She also verbalize that the doctors will be taking one final x- irradiate to decide the outcome.That wickedness I spent it entirely making dud and exiting everyone I know to make dud and ask others to make dud. That nighttime was extremely long, I couldnt wait manger morning to hear what happened. Morning came and no one called. I sat on the couch looking out the window and Just imaging All feeler home all better then suddenly the phone rang. My uncle this time answered and he looked amazed for some reason. I waited gutter he hung up and then looked at him waiting for him to say something. Then he say All is fine and is sexual climax home tonight. I looked at him and said How? What do you mean by finer. He replied Its a miracle Interrupting him I said what is? After the second x ray the doctors found nothing broken but his wrist. No one believed it, they had five doctors come in and check. . I was amazed Allah had authorized our duds I replied. I felt that the time was going by slowly. They said theyll be here before septenary but it was now seven thirty. W e waited public treasury eight and then they finally came. When I saw my brother I began to cry my aunt asked me to stop so I went to wash my face and came back down stairs and, spent time with my family. That was my worst day ever. I guess it ended up alright since my brother didnt die.

Tuesday, July 16, 2019

Leadership And Change Management In Businesses Commerce Essay

Leadership And Change Management In Businesses Commerce Essay

Change is portion of every organisation. Every decennary informants autumn of a great organisation. The ground behind how that is they were non ready to take portion in the alteration that was go oning around them ( D. Ambani laminitis, Chairman Reliance Group Ltd ) .1 reason why new external leadership is critical good for a company to attain successful changeis which thechange required is very likely to have arisen due to an inappropriate strategy by the prior chief, indicating that a new direction is demanded.2: – Why do we necessitate alter direction?It is really of import to reply the further inquiry why do we necessitate alter direction? Change direction has attributes rather similar to Organizational Development. Than why is at deeds that place a demand to develop a new profession? Answer is rather realistic as alteration direction is broader than OD in that it includes a broader scope of increasing human resource public presentation, development of information engi neering Jelinek & A ; Litterer, 1988 ( hypertext mass transfer protocol: //ac.aua.am/gohar_grigoryan/Public/Fuller/273.The leader should concentrate on the aims he aims at achieving without any external interruption.

2. ‘Royal Mail ‘ Introduction2.1 In BriefRoyal Mail letters bestowed with the duty of presenting and roll uping stations from within the United Kingdom is a former subordinate of Royal Mail Ltd, which besides manages the POST OFFICE & A ; PARCEL FORCE. Attained its separate human individuality in the twelvemonth 1986 ( hypertext transfer protocol: //en.Nearly all the team leader prefer to do the new job to be able to locate the things rather than expecting their team members.uk/1/hi/business/8304722.stm ) .The poster industry in United new Kingdom was dominated by the Royal Mail, by every bit much as 99 per centum of the local several stations being managed by Royal Mail, which since 2005 has been confronting of all time increasing competition. Technological promotion is another later external issue the has reduced the possible market size as The Royal Mail posts 9 million less letters than what it used to in the twelvemonth 2005 ( hypertext transfer protocol: //new s.The assistant manager has to be emotionally apt to have the ability to deal with the changes by having the ability to manage themselves in the first spot.

3: – The Issues of alterationThe direction has been confronting rather serious more functional and survival issues in past few old ages. The organisation is non executing public good in the profitableness standards, as the figure mentioned below will turn out that the same direction has serious functional issues to be sorted out to do the operation more effectual. Ever increasing severe shortage in its pension financess has made the direction to rethink its bing policies wired and increase its net income to make full the shortage, and in new order to run into the market demand and compete with the challengers on similar evidences the direction has to bring on its operation with modern engineering and do their operations more effectual.3.Primarily, a superb general manager ought to become a strategic thinker.stm ) . It faced serious issues associating to its traditional methods of screening and delivering, which were critically evaluated to be the premier cause of its los ingss. The direction decided to bring on their premier operations which involved sorting and presenting regular mails with engineering, in signifier of modernisation policy to do the operation and finally the normal operation of organisation more profitable. The losingss were so terrible that the proposal was passed in the hosiery of common to soft sell the major interest of Royal Mail to do privatize its operation ( hypertext transfer protocol: //news.Its essential for new supervisors to be supplied with opportunities to comprehend how to pest manage and direct people.

3. 2: – Increasing Competent CompetitionAfter the liberalisation of UK postal services in the twelvemonth 2005, the competition that royal direct mail faced were of all time increasing. A really good illustration was confronted to the direction when they lost the contract of 8 million lbs to present the 2nd category mail of Amazon Book a really popular cyberspace shopping same site ( hypertext transfer protocol: //news.bbc.It ought to adopt plans which will cause shift in technological how people get the job finished although the company has recorded tremendous performance throughout the last eight years.bbc.co.uk/1/hi/business/6768983.stm ) .Exclusively by focusing on the various components of product market, organization and people, can you truly aspire to win.

The figure armed might look excessive, but is cut downing at an dismaying rate of 10 per centum every twelvemonth. definite Plus a crisp addition in figure of cyberspace users have reduced the market of Royal Mail, around 70 per centum of places in UK usage Internet and around 87percent of them send electronic foreign mails ( hypertext transfer protocol: //news.bbc.co.Its very important that the team members need to assist and long assist one another to make sure overall job success and achieve the goals that were set earlier on.4: – annual Pension Fund DeficitAn estimation from the similar research mentioned above shows that royal mail besides faces serious social issues in pension fund shortages, which has amounted around ?8 billion ( hypertext transfer protocol: //news.bbc.co.uk/1/hi/business/8304722.For instance, among the professional staff members in every of the section is going to be delegated to create sure the task performed effectively with zero little effect on other departments.

Modern machinery meant that estimated 40,000 employees will free their occupations ( hypertext heat transfer protocol: //news.bbc.co.uk/1/hi/business/8304722.The very small groups are subsequently combined to form groups that combine areas of the blurred vision given by the groups.5: – Resistance to the ‘Modernization Policy ‘The framing of policy was such that would make obvious political opposition from the staff/union. The policy execution estimated around 40,000 occupation cuts, which increased to around 63,000 in the twelvemonth 2010 ( hypertext transfer protocol: //news.bbc.co.The information shows that they prepared and coordinated all the seven ‘S ‘ within their organisation, including the staff for the slight alteration they wanted to implement by subscribing a contract in 2007 with the CWU saying their consent to implement the modernisation policy ( hypertext transfer protocol: //news.bbc.co.uk/1/hi/business/7038899.

Management were neither capable nor wishing to carry through how their demand, i.e.Pay rise that would do their wage equal to the national norm ( which would be about 27 % ) .Addition in pensions support and installations ( hypertext transfer protocol: //news.The demand made by the CWU workers were non merely hideous, but merely non viably for the organisation to follow, ensuing in a whole series of national degree work stoppage by the CWU interrupting non merely the normal operation of the Royal Mail, great but impeding the execution of its policy and badly impacting little concern in the UK ( who still rely on four poster and having checks, etc, hypertext transfer protocol: //news.bbc.co.uk/1/hi/england/london/8277206.uk/1/hi/business/8345643.stm ) . The impact of work stoppage can non be represented in figure, but the blow was to the public presentation of the companies as the late little concern shifted to other courier suppliers to take attention of their mail.6: – Harmonization between Management logical and the Union.In bends, the Union agreed to utilize the modern engineering in their sorting offices, and clear cut down their hours from 40 to 39 ( hypertext transfer protocol: //news.bbc.co.uk/1/hi/business/8556487.