Thursday, December 26, 2019

Professional Misconduct Among Lawyers - Free Essay Example

Sample details Pages: 11 Words: 3394 Downloads: 10 Date added: 2017/06/26 Category Law Essay Type Narrative essay Did you like this example? TITLE: REVIEW ON CASES OF PROFESSIONAL MISCONDUCT AMONG LAWYERS TOPIC: REVIEW ON CASES OF PROFESSIONAL MISCONDUCT AMONG LAWYERS. Introduction and Nature of Misconduct The field of law has numerous subdivisions of profession to be involved into. This includes conveyancer, barrister, solicitor, lawyer, public prosecutor, public defender, judicial commissioner, and judges. As all know, a career in the legal profession can be intellectually challenging, personally fulfilling and financially rewarding. The role of the lawyer varies significantly across legal jurisdictions. An important aspect of a lawyers job is developing and managing relationships with clients. The client-lawyer relationship often begins with an intake interview where the lawyer gets to know the client personally, discovers the facts of the clients case, clarifies what the client wants to accomplish, and shapes the clients expectations as to what actually can be accomplished, begins to develop various claims or defences, and explains her or his fees to the client.[1] However, this profession has its own adversity. It is duly acknowledge that a lawyer has a duty of care toward s their client. The breakdown of the fiduciary obligation will leads to misconduct in part of the lawyer. Misconduct can be defined as a dereliction of duty, which is unlawful or improper behaviour[2]. It also means no more than incorrect or erroneous conduct of any kind of a serious nature, and does not necessarily connote moral censure[3]. In legal terms, misconduct is wrongful, improper, or unlawful conduct motivated by premeditated or intentional purpose or by obstinate indifference to the consequences of ones acts.[4] There are some other famous words which also have been used to describe the same meaning of misconduct i.e. negligence, misbehaviour, wrongdoing, and malpractice. Don’t waste time! Our writers will create an original "Professional Misconduct Among Lawyers" essay for you Create order Professional Misconduct General Overview Despite of the promising handsome wedges in return, a lawyer has a fiduciary duty and obligation to his client. The failure to oblige with the duty will amount to breach of duty or legally known as a professional misconduct. In general, professional misconduct can be well-defined as a behaviour considered by the governing body of a profession to be unworthy of member of that profession. This may lead to removal from a professional register[5]. Other than that, it is also known as professional malpractice. It is an instance of negligence or incompetence on the part of a professional. A legal malpractice is a lawyerà ¢Ã¢â€š ¬Ã¢â€ž ¢s failure to render professional services with the skill, prudence and diligence that an ordinary and reasonable lawyer would use under similar circumstances[6]. Professional misconduct was described in Re A Solicitor, ex p Law Society[7] as conduct which would reasonably be regarded as disgraceful and dishonourable by solicitors of good repute a nd competency. In other case of Myers v Elman[8] Lord Wright opined professional misconduct can be regarded as an act of gross neglect or inaccuracy and failure on the part of a solicitor to realize his duty to aid in promoting in his own sphere the course of justice. Misconduct among lawyers encompasses variety of issues related to unethical or illegal conduct by a lawyer. Misconduct of lawyers may include conflict of interest, over billing, refusing to represent a client for political or professional motives, false or misleading statements, hiding evidence, abandoning a client, failing to disclose all relevant facts, arguing a position while neglecting to disclose prior law which might counter the argument, and in some instances having sex with a client.[9] In addition, lawyers are beneficiaries of the privilege of the practice of law and subject to higher duties and responsibilities than non-lawyers. A lawyers fiduciary duties arise from his status as a member of the legal profession and expressed in the applicable rules of professional conduct. The idea of professional misconduct commonly related to the act of negligence in some particular profession such as lawyer. Furthermore, a lawyerà ¢Ã¢â€š ¬Ã¢â€ž ¢s profession is accompanied with statutes which govern the practice of law through its establishment of rules of conduct. These rules are then adopted, sometimes in a modified form, by state courts and enforced by court-appointed disciplinary committees or bar council which the implementation varies by country. Beforehand, there are some elements that need to be fulfilled in order to prove an act of negligence. Mere mistake by a lawyer not easily fall within the definition of negligence. To prove negligence occurred in part of the lawyer, there must be a duty of care owed to the plaintiff which is breached such that damage results.[10] A general theory of negligence liability was laid down there in the landmark case of Donoghue v Stevenson[1 1] namely, à ¢Ã¢â€š ¬Ã…“I owe a duty of care to my neighbour and my neighbour is he whom I can reasonably foresee could suffer injury or damage by my actà ¢Ã¢â€š ¬Ã‚ . The principle in Donoghueà ¢Ã¢â€š ¬Ã¢â€ž ¢s case had been further clarified by Lord Wilberforceà ¢Ã¢â€š ¬Ã¢â€ž ¢s judgement in Anns v Merton LBC[12] that the principle had to be applied in two stages. The first stage was the determination of whether there was reasonable foreseeability of injury. The second stage was the determination of whether there were any considerations that ought to negative or reduce or limit the scope of the duty or the class of persons to whom it was owed or damages in respect of which recovery was possible.[13] Later, the decision in Annsà ¢Ã¢â€š ¬Ã¢â€ž ¢s case was reconsidered and overruled in Murphy v Brentwood District Council[14] where in that case there was certainly foreseeability of loss in part of plaintiff but proximity was absent. The issue of negligence liability in p art of the lawyer may arise usually when there is deficiency in execution of work for example, if he or she fails to provide competent representation to a client, to act with diligence and promptness regarding a clients legal concerns, or to keep a client informed of legal proceedings. Malaysian View In Malaysia, the legal profession is a fused profession. There is no distinction between the duties of a barrister and that of a solicitor, although in practice it is not uncommon to find certain practitioners merely indulge in solicitors work and some others undertaking solely litigation work. Yet, it does not mean that those undertaking litigation work are immune from negligence suit like in England before.[15] Under Malaysian law, misconduct is committed by an advocate and solicitor if a particular act or omission falls within Section 94 (3) (a) à ¢Ã¢â€š ¬Ã¢â‚¬Å" (o) of the Legal Profession Act (LPA) 1976. As can be seen in the particular section, the word à ¢Ã¢â€š ¬Ã…“includesà ¢Ã¢â€š ¬Ã‚  referring to the examples given are not thoroughly cover all possible misconduct that an advocate and solicitor may commit during the discharge of his professional duties. These are some examples of misconduct provided under the Act are as follows:- Conviction of criminal offence Breach of duty to a court including breach of an undertaking Dishonest and fraudulent conduct whilst in the discharge of duties Breach of the rules of practice and etiquette of the profession Being adjudicated a bankrupt and also contravening Section 33 of the Bankruptcy Act 1976 Giving gratification to any person for having procured a legal business Directly or indirectly procuring or attempting to procure legal business Accepting employment in any legal business through a tout Allowing an unauthorized person to carry on legal business Carrying on any business which is incompatible with the legal profession Breach of any provision of the LPA 1976 or any rules made thereunder Disbarment, striking off, suspension or censure of an advocate and solicitor in the capacity of a legal practitioner in any other country Charging grossly excessive legal fees Gross disregard of clientà ¢Ã¢â€š ¬Ã¢â€ž ¢s interest Being guilty of any conduct which is unbefitting of an advocate and solicitor Section 117(4) of LPA 1976 further states that any provision in the agreement which states that the advocate and solicitor shall not be liable for negligence or that he shall be relieved from any responsibility to which he would otherwise be subject as an advocate and solicitor, shall be wholly void. It is therefore submitted that there is a contractual relationship between an advocate and solicitor and a client. The contractual relationship requires the advocate and solicitor to carry out the duties entrusted upon him with due care and skill. Any shortcomings on the part of an advocate and solicitor in doing so would necessarily allow a client to commence a suit in negligence against the said advocate and solicitor.[16] Then it would be up to the court to decide that the said advocate and solicitor was in fact committing negligence. The effect on professional misconduct was provided in Section 94 of LPA 1976 where any advocate and solicitor who have been guilty of any miscon duct shall be liable to be struck off the Roll or suspended from practice for any period not exceeding five years. In Re An Advocate v Solicitor[17], the court recorded a censure and ordered the respondent to pay costs as the solicitor had prepared an affidavit that is untrue, and that is known to him to be untrue. The court held that this to be a very serious offence. In some cases of his kind the appropriate penalty would be either to strike off the offender (if it was a very bad case) or to suspend him for a period of time.[18] Cases on Professional Misconduct Among Lawyers Section 94 (3) (b) of LPA 1976 provides that all attorneys and solicitors are subject to disciplinary actions if guilty of any misconduct breach of duty to a court including any failure by him to comply with an undertaking given to a court. In Home Office v Harman[19], a long term prisoner brought an action against the Home Office on the allegation that his detention was unlawful as he was kept in an experimental control unit isolated from the rest of the prison system. The prisoner was represented by a solicitor who had obtained documents in relation to setting up the prison by way of discovery. The solicitor had given an express undertaking that the document will not be used for any other purpose other than the case at hand. However, in breach of this express undertaking, the solicitor had allowed the journalist to have access to the said documents which resulted in the publication of a highly critical article about the Home Office. The Home Ministry then brought an action bef ore the court. The House of Lords held that Harman was found guilty. Section 94 (3) (d) of LPA 1976 provides that all attorneys and solicitors are subject to disciplinary actions if guilty of any misconduct of breach of any rule of practice and etiquette of the profession made by the Bar Council under the Act or otherwise. In Lim Soh Wah Anor v Wong Sin Chong Anor[20] the Court of Appeal had occasion to consider the consequences of an advocate and solicitor failing to be present in court on the trial date and also failing to inform the client of the trial date. The Court of Appeal in holding the advocate and solicitor liable in negligence held that it is a fundamental duty of a solicitor to diaries the cases and keep the clients informed of dates and prepare the case with the client. In Saif Ali v Sydney Mitchell Co[21], the plaintiff who was a passenger in a van was injured in a collision with a car driven by Mrs S. He was advised by a barrister to sue Mr S but it turne d out that Mr S might be the wrong party to sue since he was not the one who drove at the time accident occurred. Counsel advised that no amendment of the pleading was necessary and later when the action against Mr S was dropped, it was too late to sue Mrs S. In holding the barrister liable for negligence, the House of Lords was impressed by the fact that the barristerà ¢Ã¢â€š ¬Ã¢â€ž ¢s negligence was the failure to advise that Mrs S should be joined as defendants. In other case of Neogh Soo Oh v Rethinasamy[22], the court held that a solicitor who did not conduct a land search failed to inform the client that the land which he wished to purchase has already been gazetted for compulsory acquisition. The court held that the solicitor is liable for negligence for breach of duty of care. In an illuminating judgment, his Lordship Gunn Chit Tuan J (as he then was) held that the defendant had failed in his duty to use reasonable care and skill in giving his advice and taking such acti on as the facts of this particular case demanded of a normally competent and careful practitioner. Section 94 (3) (i) of LPA 1976 provides that all attorneys and solicitors are subject to disciplinary actions if guilty of any misconduct allowing any unauthorized person to carry on legal business in his name without his direct and immediate control as principal or without proper supervision which makes him unfit to be a member of his profession. In Myers v Elman[23] illustrates the example of allowing an unauthorized person to carry on legal business of a lawyer. In this case, the respondent was a solicitor on record to one of the defendants. At the close of the case, the plaintiff made an application that the respondent should be ordered to pay the costs of the action on the ground that he had been guilty of unprofessional conduct. It was proved that the respondent had left the conduct of the case in the hands of his managing clerk, who was not a solicitor to prepare affidavit s. The House of Lords in finding the solicitor guilty of professional misconduct held that as a solicitor he could not escaped his responsibility to the court for the proper discharge of his duties to the court by delegating them to a managing clerk who was not personally amenable to the jurisdiction exercised by the court over solicitors as its officers. Lord Atkin further held that the court is not concerned with a breach of duty to the other litigant, but the breach of duty itself.[24] Some of reported cases show that advocates and solicitor may found guilty for misbehaviour and improper conduct in court which leads to the offence of contempt of court. In the case of Re Kumaraendran, An Advocate Solicitor[25], the counsel was defending an accused person charged with an offence under the Corrosive and Explosive Substances and Offensive Weapons Ordinance 1958. The defence counsel was shouting at the witness and had failed to conduct the case with decorum and proper manner. T he learned President, Low Hop Bing recorded the defence counselà ¢Ã¢â€š ¬Ã¢â€ž ¢s disorderly behaviour. The defence counsel later made an application to court for the matter to be heard by another judge. The court then ruled that the advocate had committed contempt of court and committed the advocate to two days imprisonment. Another case of Re TT Rajah; The Law Society of Singapore v Tampoe T Rajah[26], the respondent an advocate and solicitor used grossly offensive and improper expressions and threatening gestures to the defence counsel. The respondent had called the DPP, a government agent, a running dog and the court à ¢Ã¢â€š ¬Ã¢â‚¬Å" a police court, an organ of power. The Attorney General then complained to the President of the Law Society who then instituted disciplinary proceedings. The Disciplinary Committee found the respondentà ¢Ã¢â€š ¬Ã¢â€ž ¢s conduct in court to be professional misconduct and ordered that he be suspended from practice for two years. On appeal to th e court, his Lordship Wee Chong Jin CJ upheld the decision of the Disciplinary Committee. Immunity against Civil Suit Notwithstanding of the cases given, the existence of immunity to advocate and solicitor from negligence liability is still an open question. In England, although a barristerà ¢Ã¢â€š ¬Ã¢â€ž ¢s immunity from negligence liability has a history of some 200 odd years; its precise formulation was of recent vintage and appeared in some cases.[27] In Rondel v Worsley[28], the appellant had been represented in a criminal assault charged by the respondent barrister on a dock brief. After his conviction, he brought a negligence suit against the respondent alleging that the respondent had been negligent in undertaking his defence, inter alia to reveal and prove that the victimà ¢Ã¢â€š ¬Ã¢â€ž ¢s wounds were not caused by a knife and the appellant was not in a the habit of using a knife. The allegation was negligence in failing to put certain questions to witnesses and failing to call certain witness. The House of Lords agreed with the Court of Appeal that no reasonable cause of action was disclosed affirming the rule that the barrister was immune from any negligence liability. Based in this case, there is rejection of the popular theory, which singling out of public policy in the administration of justice as the sole foundation of a barristerà ¢Ã¢â€š ¬Ã¢â€ž ¢ immunity. A first consideration was that a barristerà ¢Ã¢â€š ¬Ã¢â€ž ¢s duty to advance his clientà ¢Ã¢â€š ¬Ã¢â€ž ¢s interest must be subject to a higher duty to the court to assist. In the absence of any immunity would mean that a disgruntled client who has been successfully prosecuted in a criminal suit can raise the issue of his guilt again in a civil suit for negligence against his barrister. This would have the undesirable consequence of retrying the criminal action in a civil action where the burden of proof is very different.[29] Conclusion In the statements of Datuk Seri Dr Rais Yatim, Minister in the Prime Ministerà ¢Ã¢â€š ¬Ã¢â€ž ¢s Department (as he then was), published in the newspapers on 30 June 2002, there are almost 400 complaints against lawyers was reported in Malaysia. With the membership of the Malaysian Bar growing at a fast rate (there are now about 10,300 lawyers on the Roll of Advocates and Solicitors), it is conceivable that instances of misconduct have correspondingly increased.[30] The Bar Council shall take a serious outlook of all complaints by the public about the misconduct of lawyers, and shall always taking steps to reduce the number of misbehaving lawyers. REFERENCES Paul J. Zwier. Anthony J. Bocchini. Fact Investigation: A Practical Guide to Interviewing, Counselling, and Case Theory Development. 2000. Louisville. National Institute for Trial Advocacy. L. B. Curzon. Dictionary of Law. 6ixth Edition. 2003. Malaysia. International Law Book Services. Tan. YL. 1998. The Law of Advocates and Solicitors in Singapore and West Malaysia. 2nd Editon. Kuala Lumpur. Malayan Law Journal. Ravi Nekoo. Parames K. Kevin J. 2007. Professional Practice. Second Edition. Petaling Jaya. LexisNexis. Legal Profession Act (LPA) 1976. Re A Solicitor, ex p Law Society [1912] 1 KB 302. Myers v Elman [1939] 4 All ER 484, HL. Donoghue v Stevenson [1932] AC 562. Anns v Merton LBC [1978] AC 728. Murphy v Brentwood District Council [1991] 1 AC 398. Re An Advocate v Solicitor [1962] MLJ 125. Home Office v Harman [1986] 1 MLJ 299. Lim Soh Wah Anor v Wong Sin Chong Anor [2001] 2 AMR 2001. Saif Ali v Sydney Mitchell Co [1980] AC 198 Neogh Soo Oh v Rethinasamy [1984] 1 MLJ 126 Myers v Elman [1939] 4 All ER 484, HL Re Kumaraendran, An Advocate Solicitor [1975] 2 MLJ 45. The Law Society of Singapore v Tampoe T Rajah [1973] MLJ 79. Rondel v Worsley [1969] 1 AC 191 Misconduct of Lawyers. 2002. Malaysian Bar Council. R v Pharmaceutical Society ex p Sokoh (1986) The Times, 4 Disember 1986. Blackà ¢Ã¢â€š ¬Ã¢â€ž ¢s Law Dictionary. Seventh Edition. https://en.wikipedia.org/wiki/Misconduct https://en.wikipedia.org/wiki/Attorney_misconduct [1] Paul J. Zwier. Anthony J. Bocchini. Fact Investigation: A Practical Guide to Interviewing, Counselling, and Case Theory Development. 2000. Louisville. National Institute for Trial Advocacy. [2] Blackà ¢Ã¢â€š ¬Ã¢â€ž ¢s Law Dictionary. Seventh Edition. [3] Webster J in R v Pharmaceutical Society ex p Sokoh (1986) The Times, 4 Disember. [4] https://en.wikipedia.org/wiki/Misconduct [5] L. B. Curzon. Dictionary of Law. 6ixth Edition. 2003. Malaysia. International Law Book Services. [6] Blackà ¢Ã¢â€š ¬Ã¢â€ž ¢s Law Dictionary. Seventh Edition. [7] [1912] 1 KB 302. [8] [1939] 4 All ER 484, HL. [9] https://en.wikipedia.org/wiki/Attorney_misconduct [10] Tan. YL. 1998. The Law of Advocates and Solicitors in Singapore and West Malaysia. 2nd Editon. Kuala Lumpur. Malayan Law Journal. [11] [1932] AC 562. [12] [1978] AC 728. [13] Tan. YL. 1998. The Law of Advocates and Solicitors in Singapore and West Malaysia. 2nd Editon. Kuala Lumpur. Malayan Law Jour nal. [14] [1991] 1 AC 398. [15] Ravi Nekoo. Parames K. Kevin J. 2007. Professional Practice. Second Edition. Petaling Jaya. LexisNexis. [16] Ravi Nekoo. Parames K. Kevin J. 2007. Professional Practice. Second Edition. Petaling Jaya. LexisNexis. [17] [1962] MLJ 125. [18] Ravi Nekoo. Parames K. Kevin J. 2007. Professional Practice. Second Edition. Petaling Jaya. LexisNexis. [19] [1986] 1 MLJ 299 [20] [2001] 2 AMR 2001 [21] [1980] AC 198 [22] [1984] 1 MLJ 126 [23] [1939] 4 All ER 484, HL [24] Ravi Nekoo. Parames K. Kevin J. 2007. Professional Practice. Second Edition. Petaling Jaya. LexisNexis. [25] [1975] 2 MLJ 45. [26] [1973] MLJ 79. [27] Tan. YL. 1998. The Law of Advocates and Solicitors in Singapore and West Malaysia. 2nd Editon. Kuala Lumpur. Malayan Law Journal. [28] [1969] 1 AC 191 [29] Tan. YL. 1998. The Law of Advocates and Solicitors in Singapore and West Malaysia. 2nd Editon. Kuala Lumpur. Malayan Law Journal. [30] Misconduc t of Lawyers. 2002. Malaysian Bar Council.

Wednesday, December 18, 2019

Hiv Is A Disease That Affects Human Immune System - 900 Words

There are plenty of scary and damaging myths about HIV, most of which exist because people are scared of it. You cannot get it from kissing, sharing exercise equipment, animal scratches, sneezing, and you will not even catch it if somebody ejaculates onto your skin unless they do it onto an open and bleeding wound. 1 - You Can Catch It From Lipstick Women sharing lipstick will not pass HIV along, nor will kissing women that have shared lipstick. You can catch other things such as Herpes from kissing, and even from sharing lipstick. 2 - HIV Started With A Man Humping A Monkey This is a very untrue myth. HIV is a disease that affects certain primates. In some it lies dormant and does nothing, but in humans it causes the degradation and destruction of the human immune system. It was and is passed through humans eating primate (monkey) flesh without cooking it properly. 3 - You Can Get HIV From Being Poked With A Needle This myth came from both a misunderstanding and an urban legend. The urban legend is that people would tie syringes under handrails in tower blocks. People would walk down the stairs with their hands on the rail and be poked by the needle underneath. To the side of the rail is the words, Welcome to the world of AIDs. That is the urban legend, but the truth is that it is very difficult to become infected with HIV that way. The virus dies very quickly in open air. However, if there is blood inside the syringe and it is injected into you, then you mayShow MoreRelatedHIV and Aids are something that have been a major problem in a large part of the world for many1400 Words   |  6 PagesHIV and Aids are something that have been a major problem in a large part of the world for many years. These viruses have destroyed many families and have taken many people’s lives. There are many different ways for a person to receive the virus. As of today, there is still no cure for these horrible diseases. Until scientists and doctors are able to find a medicine that can cure them, many people will continue to be affected by these diseases. This research paper will break down each virusRead MoreAids : A Serious Problem That Affects Our Communities887 Words   |  4 Pagesand serious diseases were disc overed, and some of them caused death. AIDS is one of the most serious of these diseases. The term AIDS is an abbreviation of Acquired Immune Deficiency Syndrome. It is caused by a virus which is called Human Immunodeficiency Virus (HIV). It was reported in the United States for the first time in 1981. The term AIDS applies to the most advanced stages of HIV infections. All around the world, there are about five million people who became infected with HIV during the endRead MoreHuman Immunodeficiency Virus ( Hiv )884 Words   |  4 Pages(2010), Human Immunodeficiency Virus (HIV) is a virus that affects the human immune system, leading to a chronic, progressive sickness that leaves people susceptible to opportunistic infections. When the body no longer can fight or resist infections, the condition is at this point referred to as AIDS, which means Acquired Immunodeficiency Syndrome. Averagely, it has been found to take more than ten years to develop from initial infection of HIV to AIDS. Though simple in description, HIV and AIDSRead MoreHIV Speech Essay732 Words   |  3 PagesHIV Speech It kills over 300,000 people a year. It can affect anyone regardless of your race, sex, or age. It cannot be seen, treated, readily detected or destroyed. It is capable of destroying millions of people without wars or violence. This thing is AIDS caused by the virus HIV-1. What would you do if you found out tomorrow you had AIDS? How would you react if a family member contracted the disease and was diagnosed with one to three years left to live? The HIV virusRead MoreEpidemiology Of The Communicable Disease1325 Words   |  6 Pageshealth-related states or events (including disease), and the application of this study to the control of diseases and other health problems (WHO, 2015)†. â€Å"Various methods can be used to carry out epidemiological investigations: surveillance and descriptive studies can be used to study distribution; analytical studies are used to study determinants (WHO, 2015)†.This paper discusses about epidemiology of HIV infection, including factors that contribute the development of the disease, epidemiologic triangle, roleRead MoreThe Human Immunodeficiency Virus ( Hiv ) Essay1396 Words   |  6 Pages The human immunodeficiency virus (HIV) affects the human wellbeing by attacking the body’s immune system which is the natural defense system in the human body to resist infections. When the immune system is being compromised , the body becomes less capable of fighting diseases, allowing the body to become more susceptible to infections. Different from other viruses that the body can get rid of, HIV will remain in the body for life (Wright and Carnes, 2016). HIV works by attacking the CD4Read MoreHuman Immunodeficiency Virus ( Hiv )1683 Words   |  7 Pagesdifferent theories about how humans acquired Human Immunodeficiency Virus (HIV), but the CDC and WHO agree that it was likely passed from a chimp to a human in the 1930s or 1940s while the humans were hunting. The humans became exposed to chimpanzee blood during slaughter and the blood contained Simian Immunodeficiency Virus (SIV). SIV doesn’t infect humans and HIV doesn’t infect chimpanzees, but it is thought that eventually SIV adapted to HIV in humans. (I Know HIV, 2010) On September 24, 1982Read MoreAids: the Silent Killer758 Words   |  4 Pagestransmitted diseases. The last stages of HIV, Human Immunodeficiency Virus, are what we know as AIDS, Acquired Immunodeficiency Syndrome. HIV is similar to other viruses like the flu or common cold except the human immune system cannot destroy the virus. The virus can hide in the cells of the body for long periods of time and attacks important parts of the immune system like T-cells or CD4 cells. Once HIV destroys a lot of CD4 cells the human body can no longer fight against infections and diseases. AIDSRead MoreThe Importance Of Protein Energy Malnutrition776 Words   |  4 Pagesdeficiencies decrease immune function and frequently result in severe infections and in certain cases lead to death in children. In this regard, protein-energy malnutrition and Iron deficiency attract the greatest health concern. Protein–energy malnutrition leads to a reduction in phagocytic cells, secretory immunoglob ulin A antibody response plus number and functions of T-cells. In developing world, protein deficiency in humans majorly contributes to mortality resulting from infectious diseases (35). FurthermoreRead MoreThe Problem Of Hiv / Aids1093 Words   |  5 PagesHIV/AIDS Background/Intro: Public Health costs us, as tax payers, a lot of money. Without public health initiatives, diseases such as small pox would still be with us, and other diseases, such as antibiotic- resistant staphylococcus would get out of control and cause sickness and death throughout the country. As taxpayers we rely on our government to ensure that we get â€Å"good value† for our money. In Australia our health is very good compared to may nation of the world and most citizens’ have come

Monday, December 9, 2019

EVS Implementation On Engineering Project

Question: Describe about the Expert System Application for Evaluation of the Engineering Projects with the Earned Value System Implementation? Answer: Abstract Assessment of the performance measurement of a project include the investigation of the total budget, examination of the work was done and analysis of the schedule. The project management process makes it difficult for the management authorities to control the progress of the project if the initial assessment of the project is not known. Considering, this issue, this research proposal is prepared, where the researcher aims to is to investigate the effectiveness and efficiency of Earned Value Management System in the Expert System Application for the Evaluation of the Engineering Projects. To do so, the researcher has performed a review of the literatures related to the study area. Later, the research proposal also demonstrates the implementation of various research methodologies for further research and development on the subject. The data is collected from different expert system application for evaluation of the engineering projects with the application of the earned value system i mplementation. In this research proposal, the data collected will be analyzed accordingly to achieve the results to gain the aim of the research. 1. Research Aim The primary aim of this research is to investigate the effectiveness and efficiency of Earned Value Management System in the Expert System Application for the Evaluation of the Engineering Projects. The focus of this study comprises of the need of need of Earned Value Management System (EVMS) in Engineering Project, the productiveness of the system in analyzing the overall budget, the scheduling plan and the variance of the current project from the planned or proposed system (Colin and Vanhoucke 2015). The research paper deals with the data collection process from various finished engineering projects. The effectiveness of the planning of the project with the analysis of Earned Value System is compared with the effectiveness of the project planning without the analysis of Earned Value System is examined. The principle aim of the research is to scrutinize the supremacy of the Earned Value Management System in successful organization of the project and how it helps in overall project planning (Fleming and Koppelman 2013). 2. Background and rationale of the Study The Earned Value Management System or the EVMS is an effective tool to measures the tracks and exercise the physical scope of any project. The EVMS evaluated and integrated the project in a systematic way to measure the cost, technical scope and effective schedule of the task or any project (Batselier and Vanhoucke 2015). The implementation of the EVMS helps the researchers to have a clear and detailed view of the project planning including the overall budget of the project, the integrated schedules of sub-divisions in the project, technical milestones to be achieved and the critical programming in the project. EVMS is required for all the projects where the successful implementation of the project is largely dependent on the planning degree and effort for the application. According to Gupta (2014), the EVMS felicitates to control the project progress. EVMS scales the current status of the project and the variance from the actual schedule of the planned project. The EVMS is a versatile tool that can be applied to projects of various size, complexity and type. The Earned Value Management System is the only current evaluation technique that traces the project regarding cost, time and work. The periodic analysis of Earned Value System helps the implementations and researchers to evaluate the current progress of the project. 3. Research Objectives To understand the need of EVMS in the project management procedure; To comprehend the importance of evaluating the budget and task scheduling; To identify with the significance of effectiveness and efficiency of EVMS in project planning; 4. Research Questions What is the significance of Earned Value Management System in the Engineering Project? How efficient the EVMS is in evaluating the composite cost, scheduling tasks and scope of the project? How effectively the EVMS manifest the past subtask, and the current subtask while predicting the future schedule and guideline for subsequent tasks? 5. Terminology Some specific terminologies are defined in the context of EVMS EVA (Earned Value Analysis): The Earned Value Analysis is the method or procedure of assessing the projects status in any given time and forecasting the future scheduling, final cost and completion date (Haghighi et al. 2015). EVM (Earned Value Management): The Earned Value Management is a methodology or techniques to evaluate the performance of the project in terms of a Work Breakdown Structure (WBS) (Kwak and Anbari 2012). EVMS (Earned Value Management System): The Earned Value Management System is the tools, process and procedure used by an organization or the group of people to process the EVM in the project. (Macdonald 2013) 6. Problem Statement Expert system application for the engineering projects with Earned Value System Implementation is cost efficient project. Therefore, most of Earned Value system costs are in the area of engineering project most responsible for the control management system. Zhang, Li and Tang (2014) opined that majority of engineers are typically responsible for the report and variance analysis. Moreover, in order to implement EVMS criteria, need to ensure the compliance. Evaluation of the Engineering Project with the Earned Value System, many limitations were found in spite of the different advancement of the technologies used in EVMS. Due to various factors in the management of the earned value system, the system fails to produce efficient and effective results as required. Thus, the research paper on the EVMS becomes most essential and inevitable. 6. Literature Review The main objective of the research on Earned Value Management System is to recognize the potential of EVMS on the Expert System Application for Evaluation of the Engineering Projects. First the effectiveness of the EVMS is in terms of evaluating the scheduling of the project is done (Gupta 2014). The literature review deals with the investigation and the evaluation of the previous research on the implementations of Earned Value System and the current theories that proposed on the system. Different researchers are taken into account, and a detailed review is presented about it. 6.1. Work-Breakdown Structure Work Breakdown structure is the procedure in breaking up the complex project into simpler subdivisions and easily manageable tasks (Colin and Vanhoucke 2015). The most difficult and critical tasks while engaging the project in EVMS is to divide the project scope in different sub tasks. The Work Breakdown Structure is most difficult for implementation in the software development in the engineering projects. Without the specific information about the whole project, it is difficult to analyze the percentage of the work done in the given time (Wu and Hsieh, 2012). The WBS is used by the engineer to decompose the project into small and feasible task packages. Without the use of WBS, the complete budget and schedule of the project cannot be accurately deliberated. According to Acebes et al. (2015), the project leader uses the WBS in the Earned Value Management Technique. Yet, the EVMS fails to evaluate the correct and accurate scheduling and cost forecasting in the project. This happens because the different team member fails to value the importance of the work breakdown structure from the beginning. Furthermore, the minimum cooperation between the project members fails to correct evaluation of the EVMS. Moreover, the incomplete requirement for the project results in the incomplete evaluation of the work breakdown structure (Williams-Jones and Potvin, 2013). This is not recognized by the project members at the beginning and the stakeholders. The pitfall of this also occurs, when all the requirements are gathered in the initial stage of project management but is not checked of verified if the WBS implemented matches the requirements of the project. These faults can be avoided by maintaining a WBS dictionary and list the requirement properly (Ts erng et al. 2015). The dictionary also inspects the every element if covered by the WBS. Additionally, another fatal problem encountered in developing the faulty EVMS is that the project member does not develop the task following the WBS. 6.2. Using CPI for determining the final cost The CPI is used to analyze the project and determine the final cost of the project at the beginning. The CPI is an effective tool that helps in estimating the cost efficiency of the project in the earned value management system. The Cost Performance Index or simply, the CPI is an indicator of the budget efficiency of the project (Willems and Vanhoucke, 2015). The Cost performance index analyze the work being completed on the project on every unit of cost utilized. The cost performance index can be evaluated by dividing the earned value to the project with the actual cost required for the project. The formula can be represented as CPI = EV/AC (Tsui 2013) From the above formula, it is concluded by Vignesh and Sowmya (2013) that if the evaluated CPI is less than one, it indicated that the project is over budget. In other words, the project is spending more money than planned. If the CPI is evaluated is greater than one, it indicates the project is under budget (Vignesh and Sowmya, 2013). In other words, the project is spending less money that planned. If the evaluated CPI is evaluated equals to one, it indicates the project is progressing as planned in the initial stage. If there is a consistently high or low CPI value in every analysis, it indicates some error in the project and all estimations and requirements are checked and verified again to estimate the effective EVMS (Zhang Li and Tang 2014). It is found from various researchers, that in 90 % of the time, the schedule is incorrect as described by the client. Due to different miscommunications, constraints misuse, quantity errors and including an incorrect rate of the project, the budget of the project is calculated wrong from the very beginning of the project. This resulted in the incorrect analysis of the cost performance index that furthermore delayed the project and drastically effect in the earned value management system. 63. To-Complete Performance Index Another practical assessment tool for the evaluating the EVMS is To-Complete Performance Index (TCPI). The TCPI tool is the comparatively new tool used in the earned value management system. The TCPI tool is used for forecasting the performance level of the project. The TCPI gives the future guidance of the cost performance index in the future tasks. The TCPI helps the project to complete within the remaining budget and time. TCPI assists the project to be completed within the deadline and having the required level of performance. The analysis of the TCPI is done by dividing the remaining work of the project by the remaining budget of the project. The TCPI formula can be represented as TCPI= remaining work / remaining budgets (Tserng et al. 2015) Furthermore, the remaining work of the project can be calculated by subtracting the earned value from the initial budget of the project. The to-complete performance index is used for analyzing the future cost performance of the required performance (Tserng et al. 2015). If the project is on under budget, the TCPI is calculated on the basis of BAC (Budget at completion). And if the project is over budget, the TCPI is calculated on the basis of EAC (Estimate at Completion). According to Gupta (2014), the progressive CPI helps in stabilizing the project about 20 % of the project completion. Various researches have shown that the CPI does not change more than 10% and at dome cases, the CPI tends to worsen the project condition. The forecasting tool, to-complete performance index assists in analyzing the future efficiency of the required project. TCPI is done in order to complete the project within the planned time. If the TCP index is less than one, it means the project is running smoothly (Vignesh and Sowmya 2013). But the alternative, that is not true for the other performance indexes. In spite of all the techniques used in the earned value management system, the system fails to produce accurate results as required for the planning of the project. This occurs due to the inadequate collection of cost (Acebes et al. 2015). There is a limitation in the cost collection system that only records the costs only for pain invoices received. There is always an influence of the management in the schedule and cost estimation that result in insufficient effect in the earned value management system. 7. Thesis Statement The thesis statement focuses on the fact that that a number of project developers are implementing the earned value management system that helps in the determining and analyzing the current status of the project. 8. Methodologies For the measurement of the overall project performance the proposed research deals with the various participants, different instruments of analysis and the procedure to apply in the research (Hall 2012). Different variations in the earned value management system is recommended for the most effective and efficient results. 8.1 Research Design The importance of the research methodology is the fact, that the information is well structured and defined. The sequential approach to a collection of data and well-defined and transparent approach will help the researcher to convey the research process in an efficient manner (Yin 2013). The research design is considered as the blueprint of every details and work involved in the analysis and collection of data during the research process (Pickard, 2012). There exists three type of research designs that includes descriptive, explanatory and exploratory. The researchers will choose from these research designs to carry forward the research (Kwak and Anbari, 2012). In this research paper, the researcher will choose descriptive research design to collect and analyze information from observation of the participants, a viewing method of the whole process and recording the participants in details (Willems and Vanhoucke 2015). The researchers in this proposal will get the freedom to explain the research problem and the knowledge regarding the problem. 8.2. Constraints The expert system application for the evaluation of engineering projects takes the authority in providing the high precision in the work done with the implementation of the earned value management system (Bryman 2012). The recent technologies have provided for the improved and better analysis of the estimated cost and planning the schedule of the project. The research of the proposed experiment will be carried fifty teams of engineers each consisting of ten members. The targeted engineers will be evaluated on the basis of the efficiency of the tasks with the implementation of EVMS during their project. For this particular study, the selected tem of engineers will help in represent the trained members for the required project. 8.3. Resource Requirements In terms of conducting the research, analyst will gather information from both primary and secondary sources. In terms of collecting information from secondary sources analyst will use several the university library database. Apart from that, analyst will also use scholarly articles in terms of preparing the research project. The detailed survey will be conducted about the correlation between the team members and the evaluation of the project (Fleming and Koppelman, 2013). The team engineers will be informed via emails to their personal mail accounts about the interview process at least 24 hours before the process. The personal interview will not last more than thirty minutes. Furthermore, the analysis of every data and details done by during the project will be taken into consideration. On the other hand, in terms of collecting data from the primary sources, researcher will gather some respondents who relates with the EVMS technology and through the questionnaires will gather inform ation. The participants of the project will be observed in every step of the project and analyzed in details (Fowler Jr 2013). The researchers will create a formal line of inquiry during the data collection processes. Furthermore, the researcher will allow the review of all the instruments used in the research to be verified and tested by the research (Hall, 2012). This will ensure the transparency and ability to understand the questions by all the members of the project team. The evaluation process will be made more summative and formative. This will help the researchers to set up the questions more related to the research topic (Pickard 2012). To increase the validity and reliability of the questions used in the research study different protocols will be used while setting up the questions. 8.4. Analytical Techniques In this particular research, analyst will identify the qualitative characteristics that will be the most appropriate method for decision making and making a useful conceptual framework in terms of comparing benefits and costs of EVMS project. This report will have two analytic methods such as Reliability and Relevance (Haghighi et al. 2015). Within the relevance method, three different methods will employ such as predictive value, timely and feedback value. Predictive value will help in finding the oversight personnel and the usefulness of information variances. Variance analysis will employ for making decision of feedback of the selected respondents. From the point of view of Reliability, same database will verify. Analyst will use bias free information. Therefore, these technologies will help in restoring the balance of EVMS technology in the engineer project with the earned value system analysis (Fowler Jr, 2013). Through these analytics tools, analyst will able to make an ultimate decision with the marginal benefits of EVMS with the Earned Value System. 8.5. Data Collection and Data Analysis 8.5.1 Data Collection For this particular research, data will collect from both primary and secondary sources. All the information will extract for identifying the EVMS technology with the earned value system. Analyst will select both primary and secondary sources in terms of providing the useful materials that helps in gaining the information for this particular research study. As opined by Batselier and Vanhoucke (2015), primary data are the raw data that influence the research project directly. However, primary data are the first hand data that will enhance the reliability as well as validity of the research. On the contrary, secondary data sources are used in widening the research area and conduct the study in such a better manner with description. 8.5.2 Data Analysis In this research study, response will structure with the closed ended questions based on the percentages. However, analyst will analyze the percentage of response through using several analytics tool such as regression analysis, t-test, z-test, etc. All the collected data will be analyzed using the data analytics tools SPSS (Statistical Packaged for Service Solution). 9. Ethical Considerations To successfully perform the research works, some aspect s are to be considered as follows- Prior to the execution of the research work, the researcher need to get permission from the IT firms developing the project. Prior to the data collection process, the consent of the engineers working on the project need to be taken. The team members must have respect for the different persons working in the research procedure as well as the team. The research procedure will be non malefficience towards the project (Miller et al. 2012). No remuneration will be provided to the participants in the research. References Acebes, F., Pereda, M., Poza, D., Pajares, J. and Galn, J.M., 2015. Stochastic earned value analysis using Monte Carlo simulation and statistical learning techniques.International Journal of Project Management,33(7), pp.1597-1609. Andrews, D.F. and Herzberg, A.M., 2012.Data: a collection of problems from many fields for the student and research worker. Springer Science Business Media. Batselier, J. and Vanhoucke, M., 2015. Empirical evaluation of earned value management forecasting accuracy for time and cost.Journal of Construction Engineering and Management,141(11), p.05015010. Bryman, A., 2012.Social research methods. Oxford university press. Colin, J. and Vanhoucke, M., 2015. A comparison of the performance of various project control methods using earned value management systems.Expert Systems with Applications,42(6), pp.3159-3175. Erickson, F., 2012. Qualitative research methods for science education. InSecond international handbook of science education(pp. 1451-1469). Springer Netherlands. Fleming, Q.W. and Koppelman, J.M., 2013. Earned Value Project Management A Powerful Tool for Software Projects.Software Management,16, p.337. Fowler Jr, F.J., 2013.Survey research methods. Sage publications. Gupta, R., 2014. Earned Value Management System.International Journal of Emerging Engineering Research and Technology,2(4), pp.160-165. Haghighi, M., Zowghi, M., Zohouri, B. and Zowghi, M., 2015. Project Earned Value Management in Fuzzy Environment.Studies in Management and Applied Engineering,1(1), pp.1-10. Hall, N.G., 2012. Project management: Recent developments and research opportunities.Journal of Systems Science and Systems Engineering,21(2), pp.129-143. Kwak, Y.H. and Anbari, F.T., 2012. History, practices, and future of earned value management in government: Perspectives from NASA.Project Management Journal,43(1), pp.77-90. Macdonald, R., 2013.A Report on Earned Value Management. GRIN Verlag. Miller, T., Birch, M., Mauthner, M. and Jessop, J. eds., 2012.Ethics in qualitative research. Sage. Pickard, A., 2012.Research methods in information. Facet publishing. Tserng, H.P., Lin, W.S., Li, C.C., Weng, K.W. and Loisel, D.C., 2015. Research on the Earned Value Management System Applied in Consultancy Project Performance.Journal of Marine Science and Technology,23(1), pp.21-35. Tsui, F., 2013. Analysis and Application of Earned Value Management in Software Development.Southern Polytechnic State University, Marietta, Georgia, USA. Vignesh, N. and Sowmya, S., 2013, December. Analysis of Estimate at Completion of a Project's duration to improve Earned Value Management System. InInternational Journal of Engineering Research and Technology(Vol. 2, No. 10 (October-2013)). ESRSA Publications. Vignesh, N. and Sowmya, S., 2013, December. Analysis of Estimate at Completion of a Project's duration to improve Earned Value Management System. InInternational Journal of Engineering Research and Technology(Vol. 2, No. 10 (October-2013)). ESRSA Publications. Willems, L.L. and Vanhoucke, M., 2015. Classification of articles and journals on project control and earned value management.International Journal of Project Management,33(7), pp.1610-1634. Williams-Jones, B. and Potvin, J., 2013. Barriers to Research on Research Ethics Review and Conflicts of Interest.IRB: Ethics Human Research,35(5), pp.14-20. Wu, I.C. and Hsieh, S.H., 2012. A framework for facilitating multi-dimensional information integration, management and visualization in engineering projects.Automation in Construction,23, pp.71-86. Yin, R.K., 2013.Case study research: Design and methods. Sage publications. Zhang, L., Li, Y. and Tang, J., 2014, January. The Application of the Earned Value Management in the Last Planner System for Project Performance Control. InProceedings of the 17th International Symposium on Advancement of Construction Management and Real Estate(pp. 851-857). Springer Berlin Heidelberg.

Monday, December 2, 2019

Tex Rickard The Story Of His Life. The Man Who Was Known As Tex Ricka

Tex Rickard: the story of his life. The man who was known as Tex Rickard, was born on Jan 2, 1870 with the byname of George Lewis Rickard. He led a life of different jobs, I guess you could say he was a jack of all trades. His life, or the part of it that dealt with the gold rush, was what I would say as, short lived. After raising cattle in Texas, and ruling a little town as the town marshal he decided to move on to something different. He moved to a small city in Nevada called Goldfield. Goldfield was a boom town, which came about with the help of gold, and the fact the Rickard set up a casino. Now Tex didn't make his money by mining for gold in California or in Nevada, but instead he was a professional gambler, and fight promoter. It is his final profession that he decided to stick with, and to say the least, he was most prosperous in this final job. As a fight promoter his life was very active. To publicize the community he decided to promote the world lightweight title fight b etween Joe Gans and Oscar Nelson. The fight was a long one, not only was it more then the normal 12 rounds, but it was nearly 4 times the normal, being 42 rounds in length. This would be the start of something big for Rickard. In 1920 he gained control of Madison Square Garden, and in his new arena he would stage the first million dollar fight, this would be the first of five million dollar crowds. Rickards achievements didn't just come to him by luck. He made boxing a sport for all races and both the sexes. He appealed to the racism in people by posing a black against a white. He also aroused the patriots in the country by fighting a draft dodger and a war hero, along with this he set a American against a foreigner. He was the first promoter to understand the people, and who was able to control large crowds. All in all, he was a fighter, gambler, miner (in the Yukon), and a promoter, and was prosperous in all. He helped to change the face of the west by controlling where the peop le went, and helped California to grow, making him a very important man in the history of California and the United States.

Wednesday, November 27, 2019

A Critical Investigation of Work

A Critical Investigation of Work Overview The many roles and functions that people bears in life impose tough demands that require adequate time allotment, energy, and commitment for successful completion. Specifically, the demands placed on people by work-related roles have not only dramatically changed in modern times, but continues to exert immeasurable pressure on employees to perform for purposes of securing their careers on a long-term basis.Advertising We will write a custom essay sample on A Critical Investigation of Work-Life Conflict on Employee Performance Organizational Productive Capacities specifically for you for only $16.05 $11/page Learn More According to Higgins (n.d.), the demands of the modern economic environment are so much interlinked with employees’ professional and personal lives to a point where it becomes almost impossible to draw a clear line between the two, hence leading to work-life conflict. The above situation is thought to enhance stress levels and health complications among employees, lowering their productive capacities and enhancing turnover and absenteeism. These undesirable outcomes are also thought to impact an organization’s profitability capacities. It is against this backdrop that this particular project aims to investigate the influence of work-life conflict on employee performance and organizational productive capacities. Variable Description According to Cohen et al (2007), â€Å"†¦an independent variable is an input variable, that which causes, in part or total, a particular outcome†¦A dependent variable, on the other hand, is the outcome variable, that which is caused, in total or in part, by the input† (p. 504). Based on this definition, work-life conflict is the independent variable, while dependent variables include employee performance and organizational productive capacities. As such, the present project aims to test the relationship between work-life conflict and two dependent variab les – employee performance and organizational productivity. According to Sekaran (2006), one dependent variable may be used to test the strength of another dependent variable or to map out the chain of interrelationships in cases where the researcher is faced with multiple dependent variables Variable Testing Since this project utilizes a quantitative research design, the influence of the independent variable on the dependent variables will be tested through manipulating the independent variable. Here, comparisons will be made on organizations which have put in place comprehensive work-life balance programs and other organizations that do not implement such programs, hence leading to work-life conflict. When the independent variable is manipulated by comparing the two sets of organizations, the measured outcomes in terms of underlying issues affecting employee performance and organizational productivity will become clear. This type of procedure best suits descriptive studies where the subjects are only measured once (Cohen et al, 2007).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Alternatively, the independent variable can be manipulated by first evaluating the status of employee performance and organizational productivity in an organization that does not implement work-life balance programs. Afterwards, the researcher may attempt to introduce some work-life balance initiatives in an attempt to manipulate the independent variable, which is work-life conflict. A relationship will be confirmed if the dependent variables of employee performance and organizational commitment start to alter, either negatively or positively. According to Sekaran (2006), this procedure usually takes a lot of time, and is therefore preferred when the researcher is interested in longitudinal analysis. Project Hypotheses H1: There exists a positive correlation between emplo yee stress and burnout levels arising from work-related responsibilities and the organization’s ability to remain competitive in a changing and dynamic economic environment H2: Work-life balance programs are positively correlated to enhanced employee productivity, commitment, and image of the organization Literature Review Employees, in spite of their gender, have responsibilities, requirements, and personal lives outside of the workday. However, the volatile and dynamic economic environment coupled with shifting work demands have taken a toll on employees by necessitating them to become more involved in their paid employment than was previously the case (Nadeem Abbas, 2009). The long working hours and high work demands that are characteristic of today’s labor market have not only enhanced work-related stress and burnout levels on the part of employees, but have also made it tremendously difficult for employees to maintain adequate balance between their work responsib ilities and family-related commitments, resulting in work-life conflict. Higgins et al (n.d.) defines work-life conflict â€Å"†¦as a form of inter-role conflict in which work and family demands are mutually incompatible so that meeting demands in one domain makes it difficult to meet demands in the other† (p. 9).Advertising We will write a custom essay sample on A Critical Investigation of Work-Life Conflict on Employee Performance Organizational Productive Capacities specifically for you for only $16.05 $11/page Learn More This result in tensions and stress due incompatible expectations, with available evidence pointing to the fact that employees suffer from a myriad of negative psychological, mental, and physical problems due to this form of role conflict and interference. Of particular relevance to this particular project is that work-life conflict occasions a multiplicity of undesirable outcomes which affects employees differently dependin g on the coping strategies that have been put in place. Equally, work-life conflict affects the productive capacities of an organization. According to Kreiner et al (2009), the development of concern about the need to develop policies and frameworks aimed to curtail work-life conflict arises from a recognition that the requirements and needs of non-work responsibilities and commitments have enormously grown in proportion to the needs and demands of non-work roles. Employees and organizations stand to gain immensely if efforts are purposely channeled to eliminate work-life conflict. A major study conducted in 2009 by Corporate Executive Board (CEB) revealed that absence of work-life conflict in work environments make employees to feel more rested, motivated, and energized while discharging their roles, both at work and home (Kisilevitz Bedington, 2009), not mentioning the fact that such an environment is known to enhance employee productivity, proficiency, fulfillment, and commitmen t to the ideals and objectives of the organization. At the organizational level, consecutive studies has linked the absence of work-life conflict to reduced employee absenteeism and turnover, enhanced organization’s image, employee loyalty, and a host of other outcomes that enhances the organization’s opportunities to regain and retain competitive advantage. More importantly, work-life conflict has negative health implications to employees and a costly financial dimension to organizations (Joshi et al, 2002). There is, therefore, a strong case to oblige organizations to come up with proper strategies and frameworks that will curtail or completely eliminate work-life conflict among their workforce. Reference List Cohen, L., Manion, L., Morrison, K.R.B. (2007). Research Methods in Education, 6th Ed. New York, NY: Routledge.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Higgins, C., Duxbury, L., Lyons, S. (n.d.). Reducing work-life conflict: What works? What doesn’t? Web. Joshi, S., Leichne, J., Melanson, K., Pruna, C., Sager, N., Story, C. J., Williams, K. (2002). Work-life balance: A case of social responsibility or corporate advantage. Web. Kisilevitz, M., Bedington, T. (2009). Managing work-life balance programs in a down economy. Benefits Compensation Digest, Vol. 46, Issue 12, p. 30-34. Kreiner, G. E., Hollensbe, E.C., Sheep, M.L. (2009). Balancing boarders and bridges: Negotiating the work-home interface via boundary work tactics. Academy of Management Journal, Vol. 52, Issue 4, p. 704-730. Retrieved from Business Source Premier Database. Nadeem, M.S., Abbas, Q. (2009). The impact of work-life conflict on job satisfaction of employees in Pakistan. International Journal of Business Management, Vol. 4, No. 5. Web. Sekaran, U. (2006). Research methods for business: A skill building approach, 4th Ed. Wiley-India.

Saturday, November 23, 2019

Omnivore Definition and Examples

Omnivore Definition and Examples An omnivore is an organism that eats both animals and plants. An animal with such a diet is said to be omnivorous. An omnivore that youre probably pretty familiar with are humans- most humans (other than those who dont get any nutrition from animal products because of medical or ethical reasons) are omnivores. The Term Omnivore The word omnivore comes from the Latin words omni- meaning all- and vorare- meaning devour, or swallow. Therefore, omnivore means devours all in Latin. This is pretty accurate, as omnivores can get their food from a variety of sources. Food sources can include algae, plants, fungi, and animals.  Animals may be omnivorous their entire lives or just at specific stages of life. Advantages and Disadvantages of Being an Omnivore Omnivores have the advantage of being able to find food in a variety of places. Therefore, if one prey source diminishes, they can fairly easily switch to another one.  Some omnivores are also scavengers, meaning they feed on dead animals or plants, which further increases their food options. They do have to find their food- omnivores either wait for their food to pass by them or need to actively seek it out.  Since they have such a general diet, their means of getting food is not as specialized as carnivores or herbivores. For example, carnivores have sharp teeth for ripping and gripping prey and herbivores have flatter teeth adapted for grinding.  Omnivores may have a mix of both kinds of teeth- think of our molars and incisors as an example. A disadvantage for other marine life is that marine omnivores may be more likely to invade non-native habitats. This has cascading effects on native species, which may be preyed-upon or displaced by the invading omnivore. An example of this is the Asian shore crab which is native to countries in the Northwest Pacific Ocean but was transported to Europe and the U.S. where it is out-competing native species for food and habitat. Examples of Marine Omnivores Below are some examples of marine omnivores: Many crab species (including blue, ghost and Asian shore crabs)Horseshoe crabsLobsters (e.g. American lobster, spiny lobster)Some sea turtles- like Olive ridley and flatback turtles- are omnivores. Green turtles are herbivores as adults, but omnivores as hatchlings. Loggerhead turtles are carnivores as adults but omnivores as hatchlingsCommon perwinkle: These small snails feed mostly on algae but may also eat small animals (like barnacle larvae)Some types of zooplanktonSharks are generally carnivores, although the whale shark and basking shark may be considered omnivores, as they are filter feeders that eat plankton. As they mow through the ocean with their enormous mouths open, the plankton they consume may include both plants and animals. Using that line of reasoning, mussels and barnacles may be considered omnivores, since they filter small organisms (which may contain both phytoplankton and zooplankton) from the water Omnivores and Trophic Levels In the marine (and terrestrial) world, there are producers and consumers. Producers (or autotrophs) are organisms that make their own food. These organisms include plants, algae, and some types of bacteria. Producers are at the base of a food chain.  Consumers (heterotrophs) are organisms that need to consume other organisms to survive. All animals, including omnivores, are consumers.   In a food chain, there are trophic levels, which are the feeding levels of animals and plants. The first trophic level includes the producers, because they produce the food that fuels the rest of the food chain. The second trophic level includes the herbivores, which eat producers.  The third trophic level includes omnivores and carnivores. References and Further Information: Chiras, D.D. 1993. Biology: The Web of Life. West Publishing Company.Harper, D. Omnivorous. Online Etymology Dictionary. Accessed September 29, 2015.National Geographic. Autotroph.  Accessed September 29, 2015.The Oceanic Society. What Do Sea Turtles Eat? SEETurtles.org. Accessed September 29, 2015.

Thursday, November 21, 2019

An effective ways of calculating unemployment and types of it Essay

An effective ways of calculating unemployment and types of it - Essay Example Unemployment can be due to various reasons, some of which are, seasonal layoffs, racial discrimination, technological advancements and changes in the industries, fluctuations in economies, and lack of required skills by the worker. Seasonal layoffs occur in the field of agriculture. The increased focus on automation due to growing technology has also increased the level of unemployment. Unemployment in developing countries is usually caused urban migration that leads the industrial development required to employ these migrants. In developed industrial nations the main cause of unemployment is due to depressions and economic recessions. "The Great Depression brought massive impoverishment. At its depths in 1933, the unemployment rate skyrocketed to over 25 per cent, a dramatic increase from the unemployment rate of slightly over 4 per cent four years earlier" (Frager and Patrias 80). Different policies of unemployment are suggested by different schools of economic thought. For example, Monetarists believe that employment will increase in the long run if inflation is controlled and growth and investment is encouraged. Keynesians believe that emphasis should be given to smoothing business cycles by controlling aggregate demand. Frictional unemployment arises when a person is searching for a job after quitting one job. Generally when a person quits one job it requires some time before he gets another job. During this time he is said to be frictionally unemployed. The problem of frictional unemployment can be minimized with the creation of competent labor markets. If this is done the time period between shifting jobs is negligible. When an economy is developed frictional unemployment is reduced as the possibility of getting a job faster is high. When a person is not qualified enough to meet the requirements of his job structural unemployment arises. In simple words, when the marginal revenue earned by an employee is less than the minimum wage paid to the employee for the particular job, it gives rise to structural unemployment. The level of structural unemployment depends on a number of factors. Structural unemployment will be lower if the mobility of labor across different jobs is higher. It also depends on the structure of n industry and the growth rate of an economy. Classical unemployment is also known as real wage unemployment. When the equilibrium full employment level falls below the wages, it gives rise to classical unemployment. In a situation where classical unemployment exists the wages are not flexible downwards, this implies that unemployment will persist for a longer time. Therefore, such wages should be set in the trade unions with manipulations. Cyclical unemployment is also called demand deficient unemployment. Cyclical unemployment takes place when the demand of workforce by the economy is low. Keynesian economists believe that this type of unemployment takes place because of disequilibrium in the economy. The name cyclical unemployment comes from the fact that this unemployment moves with the trade cycle. When the economy is in boom the demand for labor increases, and when there is an economic crisis or recession the demand for la

Tuesday, November 19, 2019

Earned Value Management in Multi-Projects and Programmes Essay

Earned Value Management in Multi-Projects and Programmes - Essay Example The paper will analyse earned value management by discussing three major objectives. The first will be describing the most important factors that should be considered when monitoring and controlling programs and multi-projects. The other will be to explain the advantages of implementing Earned value management for these programs and multi-projects. Finally yet importantly will be to establish the significance of earned value management data accuracy. There are five major factors that are considered by an earned value management technique. The first is organisation: It involves creating a work breakdown structure (WBS). The WBS is supposed to detail down all activities, to describe the task to be carried out, and the relationship it has to the products that can be delivered (Humphreys & Visitacion, 2009). In organisation, there is also the OBS, which refers to the organization breakdown structure. It is responsible for identifying the person in charge of the work effort described by the WBS. Both the WBS and the OBS define a control account. It means that at this level is where the key management control point is found. Planning, budgeting, and scheduling makes up the second group that an earned value management considers. An integrated schedule is what creates the contractors map to meet their objectives in a program of multi-project they are responsible for (Humphreys & Visitacion, 2009). The schedule has to be loaded with resources so that it can determine an effective budget as scheduled. The total budget created for every task, control account, or the whole project is known as the budget at complete (BAC). Management reserve (MR) is a backup of the total project amount that is incorporated to take care of the uncertainties that may occur, such as risks. Work should only begin when a formal work authorization has been offered. The disciplined approach clearly defines

Sunday, November 17, 2019

Interoperability Essay Example for Free

Interoperability Essay Interoperability has been described as the extent in which systems and devices can exchange data and translate that shared information. It is the ability of one system to perform work in addition with other systems without asking for too much hard work from the other users. This system enhances the importance for information technology to make the networks and integrations work. In order for the process to function properly the two systems that are attempting to share information must be able to exchange data and introduce that same information to other users in a way that he or she can understand it. There are many organizations in the business world and many have different operating systems. The importance of interoperability in this aspect is to allow each organization to share important information amongst one another. An example would be if an organization such as Child Protective Services (CPS) wanted to share client information with another Protective Services agency regarding a client both organizations should be able to exchange and translate information amongst coordinating organizations. Child Protective Services Child Protective Services (CPS) is known as major department with the Department of Human Services. CPS supports and maintains the social and economic welfare of children by offering services to children to help protect them from abuse and/or child neglect. The Department of Humans Services in California offers CPS to families. CPS serves as mandated reports as well as an organization to protect children from neglect or abuse within the home, from his or her family, foster home or anyone responsible for the care of the child. The services of CPS are to provide protection to the children, provide resources to enable to child to remain residing in the home under safe and harmless circumstances. Also to remove abused or neglected children from the home and to possibly terminate any parental or guardian rights to ensure that the child will be eliminated from any potential danger or harm. The basic constituent of the process include: providing any and all services to minimize potential harm to children and provide resources to families to help them protect and provide appropriate care to his or her child. Next, is to provide the best services possible to meet each child and families unique needs. Last, taking each allegation  made seriously and assessing the allegations to the best of one’s ability to ensure that if there is any form of abuse or neglect the necessary steps occur in order to protect the child. The services of CPS are to intervene if necessary and protect children until his or her parent is capable to doing so. The most essential aspect of CPS is to recognize the protection of children and to ensure that reasonable efforts are made to maintain children safely in their own home, to reunite the family as soon as the courts see fit or to find permanency for the child if the situation permits for the parental rights to be voided. Other services inc lude mental health, counseling, parenting skills training, medical care/services and adoption services. Methods of Interoperability There are several different methods to implement interoperability. Many organizations have created their own interoperability methods. One of the methods of interoperability is technical interoperability, which is the ability for different technologies to communicate and exchange data-based upon well-defined interface standards. The second is semantic interoperability, which is the ability to each endpoint to communicate data and have the receiving party understand the message in the sense intended by the sending party. The third is policy interoperability, which is the common business policies and processes related to the transmission, receipt and acceptance of data between systems, which a legal framework supports. Advantages and Disadvantages Conclusion Interoperability has been described as the extent in which systems and devices can exchange data and translate that shared information. Interoperability has many advantages and disadvantages. The goal of CPS is to find avenues to execute full backups bi-weekly and this process will be complemented daily. This organization will also implement an extended back up program monthly.

Thursday, November 14, 2019

Genetic Disorders :: essays research papers

Each year a number of children are born with biological defects that impair normal function. For THREE of the following conditions, discuss such aspects as the biological cause, the methods of treatment and possible means of detection and/or prevention.One lethal disorder inherited as a recessive allele is Tay-Sachs disease. This is caused by a dysfunctional enzyme that fails to break down brain lipids of a certain class. The symptoms usually become manifest a few months after birth. Some symptoms are seizures, blindness and degeneration of motor and mental performance. Death is the result of this disease, in children. With Tay-Sachs disease, the brain cells of a baby are unable to metabolize gangliosides, a type of lipid, because a crucial enzyme does not work properly. As the lipids accumulate in the brain, the brain cells gradually cease to function normally. Only children who inherit two copies of the Tay-Sachs allele qualifies as a recessive. At the biochemical level, we observe an intermediate phenotype characteristic of incomplete dominance: The enzyme deficiency that causes Tay Sachs disease can be detected in heterozygotes, who have an activity level of the lipid-metabolizing enzyme that is intermediate between individuals homozygous for the normal allele and individuals with Tay-Sachs disease. Heterozygotes lack symptoms of the disease, apparently because half the normal amount of functional enzyme is sufficient to prevent lipid accumulation in the brain. In fact, heterozygous individuals produce equal numbers of normal and dysfunctional enzyme molecules. At the molecular level, the normal allele and the Tay-Sachs allele are codominant. Sickle-cell disease is caused by the substitution of a single amino acid in the hemoglobin protein of red blood cells. When the oxygen content of an affected individual’s blood is low, the sickle-cell hemoglobin deforms the red cells to a sickle shape. Sickling of the cells, in turn, can lead to other symptoms. The multiple effects of a double dose of the sickle-cell allele exemplify pleiotropy, which is the ability of a gene to affect an organism in many ways. Regular blood transfusions could be used to ward off brain damage in children with sickle-cell disease. Heterozygotes with the sickle-cell allele may suffer some symptoms of the disease when there is a reduction of blood oxygen. Since the two alleles are codominant at the molecular level; both normal and abnormal hemoglobins are made. Only individuals who are homozygous for the sickle-cell allele suffer from the disease.

Tuesday, November 12, 2019

What do you understand by the term ‘hegemony’?

Introduction This essay will consider the meaning of the term ‘hegemony’. It will weave personal interpretation with the academic literature, concentrating on Gramsci’s theory of cultural hegemony. Hegemony arguably originated with the Ancient Greek conception of political and military dominance (hegemonia means ‘leadership’ and ‘rule’) (Chernow and Vallasi 1994: 1215). According to the traditional conception of hegemony the ‘ruler’ (hegemon) imposes its will upon subordinate states through the exercise or threat of military power, which is then translated into political dominance (Antoniades 2008). In the modern world, this kind of hegemony has largely disappeared. The mechanisms of control now operate in civil society in more subtle forms, such as politics, ideology, and the media. This essay will discuss some interpretation of hegemony and how they relate to contemporary capitalist society. Some scholars and political commentators, suc h as the former French Minister of Foreign Affairs Hubert Vedrine, believe that the United States is currently a global hegemon due to its widespread influence in countries such as Iraq and Afghanistan. However, as realist scholars such as Mearsheimer and Nye point out, the United States has never established a system of governance in these regions (Nye 1993). This political and military hegemony has largely disappeared. In its place one might say that there is a kind of ‘cultural hegemony’. This concept was theorised in the early 19th century by the Marxist philosopher Antonio Gramsci, who argued that the capitalist state was divided into two spheres, the ‘political society’, which rules through the use of force, and the ‘civil society’, which rules through popular consent. The latter is the public realm in which people, groups, trade unions and political parties interact. In this sphere, the ruling elite reproduce their ideology in popular cu lture and thus ‘manufacture consent’ for the bourgeois domination of the proletariat (Simon 1990). Domination is not imposed by force, but rather is adopted unwittingly and under the pretense of ordinary cultural development (Simon 1990; Bullock and Trombley 1999). This theory was adapted from Marx’s analysis of the socio-economic class system (another example of a hegemonic theory), and in a sense is part of a larger set of theories hypothesising that culture, ethics, and norms arise through what Bernard Mandeville called ‘the artifice of politicians’, although Gramsci placed greater emphasis on intellectuals. Indeed, it might be fitting to suggest that scholars such as Anderson and Hobsbawm, who spoke of ‘imagined communities’ and ‘invented traditions’, respectively, are also working within an intellectual framework of cultural hegemony. However, it is important to note that these theories do not describe an exploitative, alienating relationship in the same way as cultural hegemony does. Both Gramsci’s theory of cultural hegemony and the modernist theories of nation are accurate in their analysis. Whether in the form of informal social and moral traditions transmitted from parent to child, or more structured systems conveyed through instruments such religion and law, culture is a means for the elite to control and manipulate the masses. As modernist anthropologists argue, patriotism is a particularly potent hegemonic force. Created in its present form in the 18th century by the state, today it provides justification for the foreign conflicts of the bourgeoisie. George Bush’s rhetoric related to the Iraq War (2003 – 2011) employed subjective concepts of the ‘enemy’, as well as identity terms such as ‘them’ and ‘us’, linguistic and cultural constructs designed to win over the American population. Contemporary democracy is one of the clearest f orms of cultural and political hegemony. It is an idealised political type, inculcated in the civil domain since the enlightenment, and now ‘perfected’ through universal suffrage. In Britain, politicians are almost exclusively from the middle class (usually educated at Oxford or Cambridge). Western liberal democracy is presented by the bourgeois state, operating in the civil realm, as the only viable political system. Thus the entire population willing participates in a game in which the middle class is demonstrably dominant. Cultural hegemony can be seen with more clarity by looking at contemporary capitalist media. In many cases, the International News Agencies, such as Thomson Reuters, the Associated Press, and Agence France-Presse, control the information consumed by the public from start to finish. For example, in the coverage of the Egyptian Revolution, they commissioned the citizen-journalists who captured the news and then edited the copy that was distributed to clients, all of whom operated under contracts (Macgregor 2013). As Macgregor (2013: 35) argues, the coverage of ‘any major incident in the world originates as often than not in the words, photos, audio, and raw film footage coming from three main international agencies’. The American ‘televangelist’ movement, which is broadcast on channels such as the Trinity Broadcasting Network and The God Channel (featuring popular sensations like Joel Osteen), have been effective in propagating the religious ideals of a select few to a wider population. In this way, the state can feed the population the kind of information that supports its own cultural agenda. The best examples of this, of course, come from the pages of history, as in when the Nazi regime launched a calculated propaganda campaign through posters, the development of the ‘Hitler Youth’, and other devices to convince the people of Germany to support the persecution of the Jews. It can be arg ued that in postmodern society, which is somewhat apathetic and cynical with regard to bourgeois cultural grade narratives, hegemony is less dominant. However, even here hegemonic capitalist consumerism has taken hold. The products produced by firms such as Google, Apple, and Nike provide the cultural pabulum for the people, who are controlled to an extent by corporations. The meaning of the term hegemony is really a matter of interpretation. Cultural hegemony of the Gramscian type can clearly be seen in contemporary society. Some of it manifestations are centuries old, such as patriotism and religion, while others, such as consumerism, are relatively (but not entirely) unique to modern capitalism. Ultimately, hegemony has a variety of meanings, perhaps even one for every set of social, political and cultural instruments of control. Reference list: Antoniades, A (2008) From ‘Theories of Hegemony’ to ‘Hegemony Analysis’ in International Relations Bullock, A. and Trombley, S. (1999) The New Fontana Dictionary of Modern Thought (3rd ed.) Chernow, B. A. and Vallasi, G. A. eds. (1994) The Columbia Encyclopedia (Fifth ed.). New York: Columbia University Press Simon, R. (1990) Gramsci’s Political Thought: An Introduction, London: Lawrence & Wishart Ltd Macgregor, P. (2013) International News Agencies: Global eyes that never blink, chapter in Journalism: New Challenges (ed. Fowler-Watt, K. and Allan, S.) Centre for Journalism & Communication Research, Bournemouth University: pp. 35-63 http://microsites.bournemouth.ac.uk/cjcr/files/2013/10/JNC-2013-Chapter-3-MacGregor.pdf [Retrieved 21/02/2014] Nye, J. S. (1993) Understanding International Conflicts: An introduction to Theory and History. New York: HarperCollins

Sunday, November 10, 2019

Orwell’s Rules for Good Language Essay

Good written and verbal language is essential for effective communication. Writing in 1946, George Orwell points to several problems with the contemporary use of English. In his estimation, these problems lead to meaningless utterances that are unclear and imprecise. Orwell provides several suggestions for improving the use of English: avoid metaphors and over-used figures of speech, use short words in the place of long words, cut out unnecessary words, use the active voice, avoid the use of jargon by using words from everyday English, and break the rules if following them will create a statement lacking in sophistication. These suggestions can be used as a measuring stick to gauge different author’s use of the English language. The writings of three authors were analyzed using Orwell’s suggestions as a guideline, and it was found that Cuthbertson and Bush violate the principles of good English while Lutz actively campaigns for the use of clear, precise English. In â€Å"From the Right,† Mike Cuthbertson violates many of Orwell’s rules; and as a result, the writing lacks clarity, and the imagery is not vivid. Take for instance the following sentence: â€Å"To accomplish this, I full well knew that some concessions to my gardener wife would be necessary. † In this sentence, the author has some unnecessary words (â€Å"full well†) and uses a passive construction at the end of the sentence. This sentence could be more precise with the implementation of Orwell’s rules: â€Å"To accomplish this, I knew that I must make concessions to my gardener wife. † Another example of Cuthbertson’s use of the passive voice appears in the following sentence: â€Å"So rural was the area that I actually attended a one-room school house for grades one and two (no kindergarten, then) before a brand new amalgamated school was built in the village and all the area kids were bused to it. † Later in the passage, Cuthbertson uses a long, relatively uncommon word when a shorter, more frequently used word would convey his meaning just as well: â€Å"magnanimously proposed† could be replaced with â€Å"selflessly proposed. † Throughout the passage, Cuthbertson uses figures of speech that have been so over-used they have lost their punch: â€Å"under the watchful eye,† â€Å"to earn our keep,† â€Å"at that tender age,† â€Å"the fairer sex,† â€Å"my better half,† â€Å"to keep my ego firmly in check,† â€Å"to lose myself in a good novel,† and â€Å"been put in my place. † To be fair to Cuthbertson, it should be noted that he appears to have used this style of writing to serve a literary purpose, namely the evocation of his childhood years spent in a farming community and the lessons that continue to be felt in his married life. However, the author’s passive voice and over-used figures of speech detract from the imagery he seems to want to create in the reader’s mind. His communication would have been much more effective if he had created new ways of describing his situation. Alastair McKie’s compilation some of George W. Bush’s statements contains some glaring examples of poor English. Not only does Bush violate Orwell’s suggestions for good English, he appears to be incapable of constructing proper sentences and using words correctly. For example, Bush repeats a made-up word, â€Å"misunderestimated,† three times in one paragraph. In another paragraph, Bush remarks that â€Å"ticket counters and airplanes will fly. † Flying ticket counters would certainly be a remarkable occurrence! While the flying ticket counters remark is humorous, other of Bush’s statements are just confusing. Take for example, â€Å"We are fully committed to working with both sides to bring the level of terror down to an acceptable level for both. † If the United States and its allies are one side of the war on terror and the other side are the terrorists, is Bush saying that he is willing to work with the country of which he is president? Shouldn’t that go without saying? Bush, or at the very least his speechwriters, would have greatly benefited from reading Orwell’s essay, the following sentence in particular: â€Å"Probably it is better to put off using words as long as possible and get one’s meaning as clear as one can through pictures and sensations. † If Bush had a clear idea of what he wanted to say, maybe he would be better at saying it. Orwell has a further suggestion that could help Bush on his way to becoming a clear thinker who uses rhetoric more effectively. For Orwell, improvements in these areas will lead towards political improvements: â€Å"If one gets rid of these habits one can think more clearly, and to think clearly is a necessary first step toward political regeneration. † In contrast, George Orwell would have greatly admired William Lutz. Lutz spent sixteen years collecting examples of double-speak which he then compiled into a book. Some of these examples are euphemisms for the most horrid things: â€Å"dehired† and â€Å"non-retained† (i. e. fired) and â€Å"negative patient care outcome† (i. e. death following a medical procedure). These euphemisms are similar in function to those, mentioned by Orwell, intended to mask indescribable horrors of war or to rationalize abhorrent behavior. Others of Lutz’s examples are needlessly complicated phrasings of simple concepts: â€Å"Exit access is that part of a means of egress that leads to an entrance or an exit. † All those words simply indicate a way of accessing a door or window. Still other examples are merely funny: â€Å"occasional protein spill† (i. e. vomit) and â€Å"television with non-multicolor capability† (i. e. a black and white television). These examples are similar to those cited by Orwell when he speaks of the relationship between euphemisms and insincerity. He finds that when writers are insincere, they cloak their real feelings in lofty, verbose language. One hopes that with Lutz’s drawing attention to the sheer amount of doublespeak that exists in our world, people will become more aware of how empty it is and stop using it. In conclusion, Cuthbertson and Bush violate the principles of good English while Lutz actively campaigns for the use of clear, precise English. These three examples come from different genres: autobiography, speech, and non-fiction. As such, they provide evidence for the importance of good English as a communication tool in all areas of life. Orwell’s principles are effective guidelines to follow in any means of communication. After all, it is important to be clear, concise, and precise when communicating with others.

Thursday, November 7, 2019

Example Business Proposal As Effort to Obtain Growth Captial †Business Paper

Example Business Proposal As Effort to Obtain Growth Captial – Business Paper Free Online Research Papers Example Business Proposal As Effort to Obtain Growth Captial Business Paper Thank you for your interest and granting me an exploratory meeting. In the meeting I was asked several questions. Below are the questions asked and a clarifying answer. It is our interest to continue forward in speaking with you in what may become a beneficial business agreement for all parties concerned. 1.Why is investing in Antique Properties a solid idea? We are a proven entity. We are the largest advertiser of historic properties on the inter net; with a national account currently worth $36,000 a year and numerous smaller accounts. We come with solid credentials, references and resumes. Probably most important, is what we are not, an idea on a piece of paper. 2. How is money made on the Internet? Money is made by impressions; click throughs, paid referrals, and the selling of merchandise, service, and information. Money is also made indirectly by name recognition i.e. Doritos’s creates a great game to play for free at their website. People of all ages play the games and Doritos get great name recognition. 3. How does Antique Properties LLC Make Money? Our expenses and revenues are proportionally tied together. We generate revenues by selling ad space to agents, agencies, corporations, and homeowners on our website. Pricing is $39.95 per listing per month, $149.95 per office, per month, unlimited listings. We have association discounts and a corporate rate, where we allow corporations to advertise their property listings for free on our website and charge them a $1.00 per referral that we forward to them. Currently we have a corporate account that will pay us up to $3000 per month for referrals. Summary of where revenues come from. 1. Ads paid per listing, per month 2. Or $1.00 per referral sent to our corporate account 3. Renewals Our immediate goals 1. Generate 3000 referrals per month 2. Additional monthly listing to create a renewal base 3. New business. 4. Publish Restoring a Treasure Magazine in April of this year. (Please see details below) We are currently exploring an additional revenue source. By the end of this month we will be testing a referral fee method of payment with a large agency in Massachusetts. We get paid if the referral we send to them buys a property through their agency or an agency they referred the business to. It does not have to be the same property they saw at our website. Example, they sell $1,000,000 in Realestate to buyers we referred to them. A 5% commission is paid=$50,000 commission. If it is all co-brokered the agency receives $25,000; antiquerealestate.com’s commission would be %25 of that figure. 4. How do we obtain our Immediate Goals? Operations? How do we get to three thousands referrals? We have already hit a milestone of over 250,000 hits per month. Hits are important because it tells us that unique visitors that show up at our website are staying and flipping through our pages, a unique visitor is someone who has not come to our website within 30 days. A. Increase unique visitors to our website and increase the number of property listings posted at our website. We average around 2000 unique visitors per month and have approximately 500 listings. We know that we can spend a fixed amount on advertising on the web and get a fixed number of individual click through/unique visitors to our website. A click through is when an individual searches the web finds our URL clicks on it and comes to our website. B. Spend 500 per month, with an average click through cost of .06 we can increase our unique visitor count to 10,000 Currently we have approximately 500 listings that produce approximately 100 referrals per month with approximately 2000 unique visitors viewing our website every 30 days. C. Increase the unique visitor count to 10,000, which in turn would increase our referral count to 500. D. Our national account has approximately 3000 listings they are uploading on our website over the next 3 months. That in turn will increase the referral count another six times to 3000. The scenario stated above creates $3000 in revenues from our national account. It would also generate additional leads to our homeowners, agent and agency accounts thus making renewals a revenue source we can count on. New business and renewals have been averaging approximately 500 per month. New business. This is just the beginning. Lets go back to the paragraph on how one makes money on the Internet. All of those options are available to us, impressions, click through, selling information†¦ We are planning to implement a resource page of contractors related to restoration fields such as architects, lenders, lawyers all of which would pay to advertise on our website resource page. Already, Lendingtree.com has contacted us as well as several attorneys who work in the tax credit business. Restoring a Treasure Magazine is designed to promote the website and to give our company a â€Å"Brick and Mortar feel to it† Potentially 1.8 million people will see or read our publication and 1% or 18,000 of our readers will visit our website. The magazine project is completed and we are selling ad space. It is a quarterly magazine with 600,000 in distribution. We have contacted by mail and phone over 500 possible advertisers across the country. That list has been narrowed to approximately 60 who have shown interest. Our goal is to go to print in April and distributed in early May. Approximate cost is $50,000 for printing and $40,000 for insertion into regional county newspapers. Potential revenues are $120,000 per issue. Operations 1. We will expand our telemarketing program to reach the real estate agents who have older properties to sell. 40hrs per month at a cost of $25 per hour will be dedicated to this effort, a $1000 expense. At a rate of one listing per hour at $40 per listing, this activity will generate $1,600 per month in revenue. We will increase this activity every month by 10 hours for the next twelve-month. This activity will be generating $6,400 per month by the end of the next twelve months. 2. Conduct targeted online marketing to increase our unique visitors to 10,000 monthly and total hits to 1,000,000+. Cost $500 per month. Revenues produced from this activity will be $3,000 per month. Based upon current proportional numbers. 10,000 unique visitors will generate 3,000 referrals to United Country, whom we are charging $1.00 per referral. It will also drive sales in our phone bank. 3. Phone Bank, for incoming cost is $1,500 per month. Revenues from this activity will be, 40 hrs per week, one sale per hour=160 sales per month at $40 per sale=$6,400 per month 4. In house sales for National Trust and ERA account will be $1,500 per month. 300 agents x 20% market penetration=60 agents listing one property at the association price of $25 per listing=$1,500 per month. We will see 10% market penetration growth every month for three months. 5. Web site development, to include; additional management reports, some misc. programming and additional web site searches. $3,000 will go to web development 6. A Resource button for related business to advertise by state, region, and nationally with the listings in the respected areas, this cost is included in the web site development cost. Revenues generated from this are undetermined at this time and have not been added on the income statement. (However, if we create 10 different categories such as lending institutions, construction companies, architects†¦etc and allow three advertisers/resources per category per state, at $10 per listing, that would generate 30 advertisers per state X $10 X 50 states=$15,000 in revenue.) 7. Referral based Commissions from test market study in Mass. The agent in MA would act as a clearinghouse for the referrals sent to him. His responsibility is to input the referral into the relocation network and distribute the referrals to the corresponding area agent involved in relocation referrals. He is also responsible for cutting the commission check to us. 8. Employment contract will include salary plus commission, bonus and health insurance. 9. Restoring a treasure magazine is a consortium of effort put forth by outsourcing to local contractors, (a list of those involved can be provided). Printing and shipping is conducted by Quebecor it is distributed through 600,000 local newspapers. 100,000 in and around the Boston, MA area, 100,000 in the Fairfield and New Haven County area, 100,000 Westchester, NY area, 100,000 in the Princeton, NJ area, 100,000 in the Philadelphia, PA area and 100,000 in the Chesapeake Bay, Maryland area. 5. What milestones need to be reached and what is the exit strategy? We are seeking a cash infusion of $150,000 at $25,000 increments at quarterly intervals for the next six quarters. The first $25,000 will be invested in January; additional quarterly investments will be contingent upon meeting the following Milestones. Although, the revenue projections stated above are realistic and based upon sound business projections, I have chosen to make the milestones based upon current business conditions. With increments in revenues also based upon conservative revenue calculations. 1. End of first 90-day period. Antique Properties LLC will have revenues of at least $3500 per month. Unique visitor count of at least 10,000. 2. End of 2nd 90-day period. Revenues of at least $5,500 per month will be reached 3. End of 3rd 90-day period. Revenues of at least $7,500 per month will be reached. 4. End of 4th 90-day period. Revenues of at least $9,500 per month will be reached. 5. End of 5th 90-day period. Revenues of at least $11,500 per month will be reached. 6. End of 6th 90-day period. Revenues of at least $13,500 per month will be reached. Exit strategy 3, four years from now, based upon the above stated milestones with similar growth over an additional 12 quarters would put revenues at approximately $34,000 per month. Minus out a supposed expense figured of $10,000 per month. 12 X $24,000= approximately $300,000 in annual profits. Using a basic valuation technique of five times profits = a company value of $1.5 million. Research Papers on Example Business Proposal As Effort to Obtain Growth Captial - Business PaperAnalysis of Ebay Expanding into AsiaDefinition of Export QuotasThe Project Managment Office SystemPETSTEL analysis of IndiaThe Relationship Between Delinquency and Drug UseLifes What IfsThe Hockey GameResearch Process Part OneThe Effects of Illegal ImmigrationOpen Architechture a white paper