Thursday, October 31, 2019

What changes would you make to Proposition 13 Essay

What changes would you make to Proposition 13 - Essay Example eal estate property value for tax purposes to 1975 to 1976 market value; reduced tax increases to 2 percent annually especially for continuing property owners; and provided a reassessed value base for new property owners. It also reduced real estate taxes to 1 percent, and required two-thirds votes for legislative revenue or tax increases among others. Proposition 13 significantly reduced property taxes for both homestead and commercial properties. The major driving factor behind the enactment of the proposition 13 was the notion that Californians should not be priced out of their homes through high taxes. This initiative has been termed the third rail of California politics because politically, it is very difficult for policymakers to alter it. This paper provides a very thoughtful discussion on proposition 13, its meaning, what happened, some of the proposed amendments to this proposition, its impacts. It will also cover what is different prior to and after the enactment of this in itiative. Proposition 13 has remained a law in California for a long period since its inception and its supporting vote was perceived as a tax revolt against California government (Ferreira 662). This initiative affected property taxes, individuals’ lives as well as businesses. This proposition dramatically changed California constitution and it helped taxpayers to address the rising property taxes and increasing state revenue. This proportion altered the structure of the property taxation and how taxes are distributed in California. There are many things that took place and various aspects or practices changed upon the formulation of this proposition. Firstly, this law removed much of the fluctuation of property tax revenue that resulted to a more stable revenue source for local government. Secondly, proposition 13 decreased the rates of property tax to 1 per cent. In 1977, the average property tax rate in California was 2.67 percent but proposition 13 reduced the rate to 1 percent

Tuesday, October 29, 2019

Alternative energy source Research Paper Example | Topics and Well Written Essays - 1250 words

Alternative energy source - Research Paper Example Hydroelectric power technology is currently the least expensive source of electrical power. Moreover, it is much cleaner as opposed to the power that is generated using fossil fuels. Water that is flowing, and falling has potential energy whereby hydropower is generated by converting energy into the flowing water using a waterwheel or via a turbine into practicable mechanical energy (International Renewable Energy Agency, 7). Water potential energy could be used directly without converting it because of the different in elevation-diverted water through pipelines to supply the water in the day-to-day usage. The research paper is focused on first examining a brief background overview of hydropower technology in the world and how the technology has evolved over time. Then it will be followed by discussing the history overview of the technology. The description of the technology will briefly be discussed while examining the current state of the technology. Hydropower technology is the most flexible and coherent renewable energy resource, which is capable of meeting primary load electricity necessities. In addition, with pumped storage technology, it is capable of meeting peak and unexpected demand because of the shortage or the use of sporadic power sources. According to Gatte and Kadhim, researchers have conservatively estimated that only one-third of the total world’s capacity of the hydroelectricity power has been developed, with most of this growth and development been seen occurring in Europe (96). Hydropower is produced from water that is moving in the hydrological cycle that is driven by solar radiation. The potential energy embedded in this cycle is thus enormous; however, only a very limited amount can be technically developed. It is the water flow in rivers, which can be used in generating hydropower, or more specific, the energy of water, which is moving from

Sunday, October 27, 2019

Psychoanalysis Of Gordon Gekko Psychology Essay

Psychoanalysis Of Gordon Gekko Psychology Essay The paper will describe a character, Gordon Gekko from Wall Street (Edwin Stone, 1987) from a psychoanalytic perspective of Dr. Sigmund Freud. This paper will pair several quotes of Gordon Gekko with the appropriate perceived diagnosed disorder. In particular, this will illustrate Gekkos two personality disorders: Antisocial Personality Disorder and the Narcissistic Personality Disorder. The paper will conclude by summarizing these faults and then present an opinion of how well these theories describe the person in question. Bud Fox, a stockbroker has been relentless in arranging a meeting with his hero Gordon Gekko. He has called his office, every day, for over a month, but his attempts have failed miserably. He notices that it is Gordons birthday and as a final effort to get to the man he admires he pays a visit to Gordons offices in Manhattan. Armed with a box of the finest and most expensive Cuban cigars Bud makes his way to the receptionist. She returns after delivering the cigars and has Bud take a seat. After an hour has passed, she tells Bud he has five minutes with Mr. Gekko. His persistence and desperation to get to the top and work with the person he admires has now come down to this moment. As Bud walks into the office, he notices it is everything he could have imagined. The furniture, latest computer systems and view of downtown Manhattan give him a taste of the life he so desperately wants. Gordon positioned behind his desk is talking on the phone as Bud is admiring his surroundings. Gordon finally acknowledges Bud and asks him his intentions. Bud is there to pitch stocks to Gordon in hopes of landing him as a client, but quickly realizes he is not prepared as Gordon constantly calls his recommendations crap and is unimpressed. He finally tells Bud to give him something or get out. Knowing that he is losing his opportunity, Bud gives Gordon insider information on a stock that he received from his father the day before on an airline business his father works for. Gordon has Bud leave with the understanding he will think about it. Later that day Gordon calls Bud and places an order for the stock. After doing research on Bud, Gordon understands how Bud became aware of the insider information. He is impressed with the move and takes Bud under his wing, but challenges him to find new information at all costs on future stock deals and hostile takeovers. He tells Bud his five hundred dollar suits are not up to par and to invest in new ones. As more inside deals go through, Gordon takes Bud further into his world. The relationship deepens as Bud enjoys the perks and lifestyle he is creating by working for Gordon. Bud becomes wealthy, moves into an apartment, nicer office and gets the woman of his dreams. All of this was obtained through dealings with Gordon, and Mr. Gekko reminds him who the superior man is every step of the way. The relationship takes a turn for the worse when Bud finds out that Gordon is now using the same unethical business practices with his fathers airline company. Bud decides to manipulate the stock in order to push Gordon to sell instead of buy. Even though he knows that by doing this, he will lose everything. After realizing he was played, Gordon confronts Bud in Central Park, and both physically and verbally assaults him. Gordon lets Bud know that he is still the most powerful man on Wall Street, and he is now relegated to nothing. Using Freuds psychoanalytical approach and the incorporation of which therapeutic approach should be employed in concern to the psychoanalysis of Gordon Gekko from the film Wall Street (Edwin Stone, 1987) will be twofold: 1) diagnosis, and 2) practical therapy. First, point out the evident faults; next, create a conscious awareness of these faults and determine a means by which to work around these obstacles. Dr. Sigmund Freuds psychoanalytical approach is fundamentally set around human behaviors and the unconscious. He believes humans are somehow driven by instincts and these all originate in the unconscious (Ridgeway, 2007). Based upon that, from A Glossary of Psychoanalytic Terms and Concepts (Moore, 1967), here are the three applications of Psychoanalysis: a method of investigation of the mind and the way one thinks; a systematized set of theories about human behavior; method of treatment of psychological or emotional illness. With this in mind, Gordon Gekko is now set to experience Dr. Sigmund Freuds psychoanalytical approach. From the following quote within the film a duality of psychoanalytical constituents becomes evident: In the last seven deals that Ive been involved with, there were 2.5 million stockholders who have made a pretax profit of 12 billion dollars. Thank you. I am not a destroyer of companies. I am a liberator of them! The point is, ladies and gentleman, that greed, for lack of a better word, is good. Greed is right, greed works. Greed clarifies, cuts through, and captures the essence of the evolutionary spirit. Greed, in all of its forms: greed for life, for money, for love, knowledge, has marked the upward surge of mankind Gordon Gekko, (Edwin Stone, 1987) From the view of the capitalistic mindset, this quote brings two rather evident perspectives together: it takes that perspective of the individual, the independent laborer who must make the utmost priority in watching out for the I, and then straddles that thin line between the better benefit of the group. Humans are social; we only benefit optimally by working together; humans benefit only through interactions with other humans; humans need humans to build such fortresses and provide for those 2.5 million corporate stockholders, right along with all companies and businesses in general. However, Gekko solely advocates the view of the individual while complete disregard to that of any collaborative effort. This is a red-flag to signal psychological disorders. A corporation is a legal entity separate from the persons that form it. It is a legal entity owned by individual stockholders -Gordon Gekko, (Edwin Stone, 1987). Lets start with the most apparent, Antisocial Sociopath Disorder. This illustrates certainly no regard for the concerns of others; people with this affliction will do anything to acquire self-satisfaction and feelings of self-entitlement with no respect for how their actions affect any other person. An antisocial sociopath is utterly indifferent to others around him or her. This person operates under a regime totally unfamiliar to social behaviors, including lying, cheating, and stealing. The conduct of these people goes well beyond any social norm of acceptable behavior, and purely in order to get ahead. Personality disorders typically begin in childhood, and then progress over time into rigid personality traits, obstructing social abilities and acceptable functioning when relating to other people. However, everyone can un derstand and recognize selfish behaviors, even selfish behavioral patterns, but this does not indicate that a person is becoming, has become, or may become an antisocial sociopath; one with this disorder can identify symptoms from childhood. Surely Gordon Gekko carried this affliction from an extremely early age, too. Greed is good -Gordon Gekko, (Edwin Stone, 1987). Like a puppet, greed in this situation pulls the strings motivating Gordon Gekko to operate by this tunnel focus. Yes, this personality disorder is prevalent in what we commonly perceive as spiteful, calculative, and manipulative materialists. Another feature shared by Gekko, particularly the greedy antisocial sociopathic feature of this character, rests in his complete lack of self-identification; antisocial sociopaths bring a sense of self-denial of any of this self-absorption. As much a paradox that this seems, due to the self-sacrifice he perceives because of self-denial, Gekko is so consumed in the self that he executes all his decisions with a complete lack of self-identification. Again, the antisocial sociopath disorder is the most apparent disorder of this character. In detailing how Gordon Gekko portrays the Antisocial Sociopathic qualities, Dr. Robbins conveys these characteristics: Antisocial Personality Disorder: These people generally have no regard for the rights of others; they are exploitative, they see themselves as better or superior, and are very opportunistic. They are deceitful, steal from people around them, and often have trouble with the law. They frequently engage in fraudulent activities, make very good scam artists, and tend to be irritable and impulsive. They often come in as a savior for a church, for example, and end up stealing everything. They have no remorse. Conduct disorder as a child often morphs into antisocial personality disorder. Examples include the Mafia Dapper Don John Gotti, or Tony Soprano in The Sopranos. TV shows such as Dateline or 20/20 are replete with stories revolving around antisocial personality disorders (Robbins, 2005). Gekko also displays features of the Narcissistic Personality Disorder. Understood and commonly underplayed as vanity or conceit, this personality disorder, dictates that the narcissist is right, while everyone else is wrong. If an object, ideal, occasion, etc., do not benefit the narcissist, then it is of no worth. We can all think of people who fit this ideal. We all bring these traits to the table, but the difference between a person with either of these clinical disorders and the rest of the normal crowd is that we identify these traits; any person with this clinical disorder cannot. In a nutshell, let us allow Dr. Lawrence Robbins to provide another bit of enlightenment: Narcissistic Personality Disorder: This is less common, and the people see themselves as being above others, they are grandiose, have a lack of empathy, and they feel self-important. There is a true sense of entitlement. They may be extremely vain and constantly require admiration. They are envious, arrogant, exp loitative, and can be very angry. Examples include General George Patton, Nicole Kidmans character in the movie To Die For, Michael Douglas character, Gordon Gekko, in the movie Wall Street, Kelsey Grammers character in Frazier, and the Chief of Medicine, Dr. Robert Romano on the TV show ER (Robbins, 2005). The applicable approach of Psychoanalytic therapy is to allow access to the unconscious. The treatment process can, at times, become blocked by the clients resistance (their unwillingness to provide information). Transference is a condition in which the client begins to consider their therapist in the same emotional way they would consider a person in their lives, such as a parent or sibling. Working with interpretation, resistance, and transference is sometimes called working through, a therapeutic technique in which the therapist helps the client better understand their conflicts and how to resolve them (Depression Guide, 2005). If Gordon Gekko had become a patient of Dr. Freuds I can only guess there would have been a considerable amount of time spent with free association in order to discuss child hood events, dreams or trauma that were repressed in the unconscious. Freud believed being greedy was natural, that we are born with it. He believed the unconscious was a place that consisted of unthinkable wishes and drives that needed to be socialized. Dr. Freud believed that we progressed through psychosexual stages as we grew from child to adult, and greed could be expressed in each of the stages. If you look at these stages it is easy to see where we could associate greed with each one. Oral greed could be in the form of a biting hunger-perhaps the kind that Gekko, who built his companys strategy around chewing up other companies, displayed. Gordon could have expressed anal greed either by keeping all of his money which he did in offshore bank accounts or by spending all of it on the finer things in life. Fi nally, Gordons business greed came from the ambition that characterizes phallic greed and was displayed by his desire to become the most powerful and wealthiest man on Wall Street.

Friday, October 25, 2019

Free from Humans :: English Literature Essays

Free from Humans I did not witness the construction of the nest which had the size of a man’s fist. It would be a great experience since my university course in animal architecture was a source of marvel at how different birds collect different materials to weave, in different fashions, out different forms of nests. I noticed it when one day, as I walked along the straight corridor towards my apartment, something softly fluttering sped across my view. He or she was a little bird rushing into the open air away from this corridor ten-storey above the ground. I turned to where he or she should have come from. Hanging from a thin branch of a tall potted plant scattered with some leaves was this egg-shaped nest with a hole. Tiny twigs and some feathers were used to weave this simple but adequate home. Probably, he or she had plucked some of his or her feathers. That could be painful, I thought. I wondered why this bird had chosen this unattractive thin plant which belonged to a withdrawn neighbor t hree doors away from my apartment. More importantly, staying on a plant that was incapable of concealing it and staying at a height easily reachable by humans was unwise at all. â€Å"Did the footsteps from my hard executive shoes frighten it?† From then on, everyday, I walked past the plant with the slightest sound. At night, as I came back home and passed the plant, I would, taking care not to startle the faint animal, steal a glance at the hole where his or her beak rested. My respect for animals is as natural as animals are beautiful. I can’t comprehend how any human with all its gift in reasoning could inflict pain upon or even kill other animals when it knows well that it doesn’t like pain. An ex-colleague, Diane, which was then a fresh Biology graduate, ate the same rice and meat everyday like a one-dimensionally programmed machine without being equipped with sophisticated taste buds to receive tastes and feel textures, not to say being installed with the brain to unify them all as an experience. Its indifference towards good or bad food mirrors its attitude towards animal rights. â€Å"Why should I care? When a cat or dog passes by, I just kick it. They should be sent to laboratories for testing,† Diane’s one-dimensionally programmed brain sent the data to the lifeless tongue which then rattled to output the sound wave.

Thursday, October 24, 2019

Impact of It on Process Improvement

VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. org Impact of IT on Process Improvement 1 1 Lotfollah najjar, 2 Ziaul huq, 3 Seyed-mahmoud aghazadeh, 4 Saeedreza hafeznezamiCollege of Information Science & Technology, University of Nebraska at Omaha, USA, Fax: 402-554-3284, 2 College of Business Administration, University of Nebraska at Omaha, USA, Fax: 402-554-268, 3 Department of Business Administration, School of Business, State University of New York at Fredonia, Fredonia, Ny 14063, USA, Fax: 716-673-3332, 4 Civil and Environmental Engineering UCLA, 5731 Boelter Hall, box 951593 Los Angeles, CA 90095-1593 1 [email  protected] unomaha. edu, [email  protected], [email  protected] edu, [email  protected] com. ABSTRACTThere has been a lack of empirical research related to the role of IT in process improvement in a multidimensional way. The purpos e of this paper is to investigate the extent that IT could be used (from low tech to high tech and constraint to proactive), type of process reengineering projects employed (compromise to radical) and their effect on firm performance. The firm performance was defined as market share, customer relationships Management, IT impact, and efficiency (as multifaceted such as lowering the cost, lowering the process variability, and lead time).Data from 108 small-to-medium sized organizations both in service and in manufacturing were collected for this study. Both Factor Analysis and MANOVA Analysis were employed to analyze these relationships and to find out the optimum points (interaction among the types of IT and types of BPR) and their effect on firm performance. ). The result showed that organizations that adapt high technology alone or BPR alone cannot achieve the same result and business performance as the organization that benefits from interdependency between IT and BPR.Keywords: BP R, IT, Organizational Performance, Process Improvement, CRM, Efficiency, Factor Analysis, MANOVA. 1. INTRODUCTION The modern business organization is a complex collection of business processes, which cross multiple business units and handle everything from the mundane daily operations to core business processes. Many of these business processes have changed very little since their original implementation, thus failing to take advantage of new best practices or technological advancements.Over time, businesses realized that their current processes were no longer providing a competitive advantage, and that changes to processes were necessary in order to improve performance. In order to change the processes or to build completely new ones, process redesign or improvement must take place. Whether the method is Total Quality Management (TQM), Six Sigma, Business Process Reengineering (BPR), or one of the many others, the core concepts are the same: streamline the process, reduce costs, an d remove waste.Process improvements can be incremental and continuous, or they can be giant leaps that fundamentally change the way organizations do business. One thing in common with all process improvement initiatives is that information technology is a major component, regardless of the method. Hammer and Champy (1993) state IT is an enabler of BPR, and while this is still true information technology has become more than just an enabler. Just as throwing money at a problem will not make it go away, a business problem can’t be reengineered simply by hrowing new information systems at it (Hammer & Champy, 1993). 1. 1 Business Process Improvement The drive for process improvement is not new. Process improvement methodologies have been developed and used for over 30 years. Six Sigma was developed in the mid 1980s as a way to improve manufacturing processes (Drake, Sutterfield, & Ngassam, 2008). Business process reengineering pushed to the forefront of process improvement in th e early 1990s when some felt larger leaps in process performance were needed.Both of these methods are still among the most widely used today, and have been adjusted to meet modern business needs. There are three main types of process improvement: continuous, benchmarking, and reengineering. Continuous is more â€Å"systematic† than simply solving problems as they occur, and can be easily integrated into an organization. Improvements to processes using this methodology are typically small, but if they are ongoing will add up to larger gains in improvement over time (Tenner & DeToro, 1997).Continuous improvement is a plan-do-study-act method that uses the following six step model: understand the customer, assess efficiency, analyze the process, improve the process, implement changes, and standardize and monitor. Before an organization can accomplish higher levels of process improvement, it must first successfully 67 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emergin g Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. org implement continuous improvement (Tenner & DeToro, 1997).Six Sigma, a continuous improvement methodology, was originally created by Motorola to help reduce manufacturing defects, with a five year goal of no more than 3. 4 defects per million. Analyzing the variation in defects was the key to Six Sigma, which required very accurate data (Drake et al, 2008). This method was designed as a quality improvement initiative, but its later implementation in other industries and services allowed for broader application. Bringing an organization in line with the best practices of their industry makes use of the benchmarking methodology.Benchmarking creates greater single improvements than the continuous method, but is more resource intensive and occurs less often (Tenner & DeToro, 1997). Benchmarking is essentially reverse engineering of a process: by taking apart a compet itor’s processes (or products) if can be seen how they work and what makes them good. Proper benchmarking requires a four phase, tenstep model. The planning phase includes identifying the benchmark subject, indentifying benchmark partners, and collecting data (Tenner & DeToro, 1997).The analysis phase includes determining the performance gap and projecting future performance. The integration phase includes communicating results and establishing goals. The action phase includes developing action plans, implementing the plans and monitoring results, and finally recalibrating the benchmarks (Tenner & DeToro, 1997). Reengineering is the highest level of process improvement. Reengineering creates radical improvements to processes, often resulting in high performance gains. Reengineering requires a highly skilled organization willing to accept high levels of risk (Tenner & DeToro, 1997).Like the continuous and benchmarking improvement methods, a step-by-step model is needed. The si x step model for reengineering includes the following: organizing the reengineering project, launching the reengineering project, inventing a new process, integrating, acting, and evaluating (Tenner & DeToro, 1997). The origins of business process reengineering began in the late 1980s, but truly started with an article in the Harvard Business Review which called for the total redesign of business processes.Michael Hammer (1990) felt it was not enough to simply renovate existing processes, but instead the processes should be removed altogether and replaced with new and improved processes started from a clean slate (El Sawy, 2001). Unlike other methodologies such as Six Sigma, information technology was seen as from the beginning to be a necessity when trying to achieve BPR (Hammer & Champy, 1993). 1. 2 Information Technology’s role in Business Process Reengineering For many BPR authors (Hammer & Champy, 1993; Davenport & Short, 1990; Irani, Hlupic, & Giaglis, 2002), informatio n technology is a crucial component of BPR.It is becoming clearer that investments only in new IT or BPR projects cannot stand by themselves (Kohli & Hoadley, 2006). Increasing market pressure, as well as an organization’s need to innovate, will lead to new IT adoption (Lee, Chu, & Tseng, 2009), but simply implementing new IT will not make BPR work. Hammer and Champy (1993) say it best: â€Å"A company that cannot change the way it thinks about information technology cannot reengineer. A company that equates technology with automation cannot reengineer. A company that looks for problems first and then seeks technology solutions for them cannot reengineer† (p. 3). How an organization uses IT will largely determine how well and to what degree they will be able to implement BPR. IT was originally considered simply as an enabler for BPR (Hammer & Champy, 1993), and while it is still true that IT can enable BPR initiatives, IT’s role in process improvement has become much greater and more varied. IT can be the initiator that drives process improvement, or the tool which makes process improvement possible. Eardley, Shah, and Radman (2008) define six roles that IT can play in BPR.These roles are: constraint, catalyst, neutral, driver, enabler, and proactive. These roles vary in impact from being constraining at the negative end to being proactive at the positive end. Legacy IT systems are the most common source of IT constraints. They are considered a constraint because process improvement is held back by old, inflexible IT systems (Eardley, Shah & Radman, 2008). Organizations have switched to client-server systems over time because of cost, but legacy mainframe systems still exist and the benefits of replacing them are debatable (Akhavan, Jafari & Ali-Ahmadi, 2006).The next step towards a positive IT role is that of catalyst. When new information technology is brought into a business and causes changes to business processes, IT becomes a catalys t. While the role of catalyst can be positive, if new information technology is not right for the organization the impact will likely be negative (Eardley et al, 2008). 68 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. orgSometimes, IT is nothing more than a support tool rather than a key component for process improvement. In these cases, IT is considered neutral. It will typically be seen in various software tools for process design and implementation (Eardley et al, 2008). Moving further toward a positive impact role is that of driver. Information technology’s role as driver is the result of a technology push from forced implementation of new information systems that then require process improvement to take advantage of the new capabilities (Eardley et al, 2008).Purely IT driven BPR without defined business needs are not desirable and could ne gatively impact business strategy (Eardley et al, 2008). The role of enabler is generally the most common role associated with BPR and process improvement. Enabler is also a business â€Å"pull† role as opposed to a technology â€Å"push†, meaning that IT and the business units are aligned from a strategic standpoint, thus leaving no technology gap (Eardley et al, 2008).The enabler role may be broken down into specific impacts as defined by Thomas Davenport (1993): automational (removing human interaction), informational, sequential (reorganizing process sequence), tracking, analytical, geographical (processes from different locations are coordinated), integrative (tasks and processes are coordinated), intellectual (intellectual assets are distributed) and disintermediating (process intermediaries are removed). Each of these impacts affects the BPR process differently and to different degrees.The final role for IT in BPR is proactive. Eardley et al. (2008) state that a proactive role is â€Å"the ‘ideal’ role of IT in BPR† (p. 639). This IT role ideally helps create major change as well as supporting BPR. When the organization standardizes BPR within the business and ties it closely with IT and the impact can be tremendous by allowing the ability to transform processes faster and on the fly (Eardley et al, 2008). The impact each of these roles has is dependent on the type of BPR projects that each role is coupled with. The types defined by Eardley et al. 2008) are: failure, compromise, one-step, evolutionary, and radical. A â€Å"failure† project type can theoretically be matched with the more desirable â€Å"proactive† IT role, but advanced IT would be hindered by a poor business plan. Conversely, a â€Å"radical† project type matched with a â€Å"constraint† IT role would result in a progressive business plan being wasted by old technology or simply a poor IT infrastructure (Eardley et al, 2008). The ideal coupling of IT roles and BPR types is for â€Å"evolutionary† and â€Å"radical† BPR projects to be joined with â€Å"proactive† and â€Å"enabler† IT oles to achieve the greatest positive impact on the BPR effort and on the business as a whole (Eardley et al, 2008). 1. 3 Performance and value impact on organizations The primary goal of any process improvement project, regardless of method, is to reduce waste, improve efficiency, and ultimately reduce costs. Information technology plays a key role in reaching process improvement goals, but it does not guarantee success. More than 70 percent of early BPR projects have ended in failure (Ramirez, Melville & Lawler, 2010).Choosing the proper method of process improvement or reengineering with a complementing information technology system will determine the impact on combined effectiveness. A study done by Ramirez et al. (2010) discusses the impact of IT on business process reengineering with a focus on cost rationalization BPR (doing more with less) and work restructure BPR (implementing new business processes). Ramirez et al (2010) found in their study that generally, the relationship of IT and BPR had a positive relationship on not only the production efficiency of a company, but also the market value.It was found that production output was increased by roughly one percent among surveyed businesses resulting from IT and BPR interaction, thus having a positive association towards operational efficiency (Ramirez et al, 2010). This result holds true for both cost rationalization and work restructure. However, for an organization’s BPR investment to get positive returns, the BPR project must be â€Å"IT centric† (Ramirez et al, 2010). This means that BPR projects that are not focused entirely around IT will see much lower returns, if any, from the project.While increased performance of production processes and value they add to an organization is simpler to documen t, performance improvements that affect an organization’s market value are more difficult to discern. To find the impact of IT and BPR on the organization’s market value, one must look at all BPR efforts which an organization has attempted, and their cumulative effect on that individual organization (Ramirez et al, 2010). Unlike the impact on production performance, cost rationalization BPR and work restructure BPR interactions with IT are not positively associated in the long term.There is evidence that over an extended period of time that the impact of either type of BPR can be negative in market value. This may be due to the number of BPR failures, especially earlier BPR efforts, in an organization (Ramirez et al, 2010). The one factor that may determine the degree of positive BPR impact on an 69 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisj ournal. org organization is the appropriate selection of information technology to complement the selection of the right BPR method (Ramirez el al, 2010).While IT and process improvement methodologies such as BPR can stand alone, their impact on each other is significant in improving performance. Research done by Albadvi, Keramati, and Razmi (2007) shows that BPR has a mediating effect on the impact of information technology on an organization’s performance. For IT to positively impact the performance of an organization and thus create a return on IT investment, BPR is needed for IT to reach its full potential (Albadvi et al, 2007). The risks involved with an organization’s decisions must always be accounted for.The impacts of IT and BPR are no different and must be considered along with performance goals. BPR itself requires an organization to measured take risks (Misra, Kumar & Kumar, 2008). Information technology can impact an organization’s risk due to BPR i n two ways. IT can help mitigate risk by aiding risk management with high quality risk models and process simulation. However IT can also be a source of risk, as BPR will inherently implement new IT systems and IT processes (Misra et al, 2008). Thus organizations must account for all risks involved with IT and BPR implementations.When all aspects, including risk, are considered it is clear that IT and BPR are necessary partners for improving organizational performance and productivity. These improvements will have an impact on a company’s overall market value but they can only be maintained long term with careful selection of projects (Ramirez et al, 2010). Beyond their partnership, IT and BPR must also complement each other to reach performance increase goals of an organization. The impacts that IT and BPR have on each other reinforce their recursive relationship. 2.PURPOSE This paper focuses on investigating the role and impact that information technology has had on process improvement. The combination of information technology with process improvement and how this combination impacts performance and sometimes the value of the business, as well as examples of IT, will also be discussed. This paper investigates the extent that IT could be used (from low tech to high tech and constrained to proactive), type of process reengineering projects employed (compromise to radical) and their effect on firm performance.The firm performance has been defined as market share, customer relationships Management, IT impact, and efficiency (as multifaceted such as lowering the cost, lowering the process variability, and lead time). 2. 1 The Roles of IT in BPR To determine the role of IT in BPR, existing work in the area (Chan, 2000; Gunasekaran and Nath, 1997; AlMashari and Zairi, 20006, Eardley, 2008) was also examined to determine whether parallels could be established for small-to-medium sized organizations both in service and in manufacturing.Their research found th at IT could have six possible roles: a constraint, a driver, a neutral, a catalyst, an enabler, or be proactive. The six different roles of IT in BPR are shown in Table 1based on Eardley’s model (Eardley, et al, 2008). Table 1: Characteristics of the role of IT in BPR Role of IT Characteristics of the Role Legacy IT systems dominate main business processes. In ? exible IT infrastructures. Lack of skill and/or investment in new IT. Business processes embedded in existing IT systems. Lack of potential for investment in IT due to budgetary factors. Lack of perception of the potential of IT by management.Strategic alignment is low. New IT has been acquired. Changes in the business have been made that favor the use of IT. New management that sees the potential of IT in business change. New relationship developed with IT vendor, consultant, or service provider. Strategic alignment at crucial stage. Constraint Catalyst 70 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emergin g Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. org Neutral Lack of IS applications and IT infrastructure in the organization. No IS or IT strategy in place.Business change targets are not well de? ned. The business is in an industry with low information intensity or little competition through IT. Strategies and infrastructures are in alignment. The business has technological capability and seeks to exploit it through business opportunities. Possibly a new business or a technological innovation. Sufficient investment is available and IT development is not a limiting factor. Strategic alignment process is proceeding rapidly. IT is a key performance factor and a â€Å"competitive arena† in the industry. Management has a clear business vision and a future change plan.Business change targets are well de? ned. Sufficient investment is available and IT development not a limiting factor. Strategic alignment in pr ocess. Management has a clear business vision and future change plan. The IS and IT infrastructure is well developed. There are few constraints on IT development. Management sees the potential of IT. Strategies and infrastructure are in alignment. Driver Enabler Proactive Alan Eardley et al, 2008 described the roles of IT as visualized above, as being on a continuum with the constraining role at the â€Å"negative† extreme and the proactive role at the â€Å"positive† extreme, as shown in Figure 1.Roles of IT in BPR More ‘negative’ roles More ‘positive’ roles Constraint Catalyst Neutral Driver Enabler Proactive Figure 1: A continuum of the possible roles of IT in BPR 2. 2 Types of BPR project in the organizations The literature search identi ? ed a number of â€Å"types† of BPR projects in the organizations that were examined, which may be placed on a continuum from â€Å"failure† to â€Å"radical† in terms of their effect iveness in achieving the objectives of major business change (Figure 2). A brief summary of the characteristics of each type of BPR project is given below. Alan Eardley et al, 2008): †¢ Failure – IT does not have a planned role in the BPR project, or the project has to be abandoned, or it is completed but fails to provide the expected business improvements. †¢ †¢ Compromise – The existing IT infrastructure cannot be changed within the given time scale. The BPR project has to take this into account and although it may be a success, will be limited or unambitious in terms of its reach and range. Such BPR projects typically produce â€Å"islands of automation† as they are applied to limited business processes or functions.One-step – The reach and range (and therefore the scope and scale) of a â€Å"one-step† BPR project are greater than for Compromise, but the lack of IT support limits the potential of newly designed processes for achie ving â€Å"higher level† transformations. In this case IT is not seen by an organization as being truly strategic. 71 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. org †¢ Evolutionary – The rate of business change will be incremental through targeted process redesign.The infrastructure will be sufficiently ? exible to cope with progressive change, and the IT strategy will be capable of maintaining alignment with the business strategy over time, although periodic adjustments will be required. †¢ Radical – This type of BPR project achieves major business change with a high degree of reach and range within an acceptably short time scale. The IT infrastructure is very? exible and copes well with the major â€Å"step change† and the IT and business strategies are completely interdependent, being continuously in alignme nt. Types of BPR project Less effective types More effective types FailureCompromise One-step Evolutionary Radical Figure 2. A continuum of the possible types of BPR project The proposed framework by Alan Eardley et al, represents the roles of IT in BPR, the types of BPR projects, and includes the concepts of â€Å"business pull† and â€Å"technology push† (Figure 3) by superimposing upon the diagram four quadrants (Q1-Q4), which are interpreted as follows (Alan Eardley et al, 2008): Q1. Low â€Å"technology push† and low â€Å"business pull† – the â€Å"lower† roles of IT when applied to the â€Å"lower† types of BPR (i. e. to the left of the continuum) are associated with a generally low profile of IT in the organization.Similarly the commitment to radical change within the organization may be poor. These factors will interfere with the organization’s ability to implement BPR successfully. For instance, IT is likely to be a à ¢â‚¬Å"constraint† in an organization that is aiming to achieve at best a â€Å"compromise† approach to organizational change in a forthcoming BPR program. Q2. Low â€Å"technology push† and high â€Å"business pull – the â€Å"lower† roles of IT when applied to the â€Å"higher† types of BPR are associated with an organization that has poor strategic alignment (Avison et al. , 2004).It may possess corporate ambition in planning a radical BPR program, but its IT strategy is weak (indeed, the whole IT function may be under-represented organizationally) and its IT infrastructure lacks flexibility and â€Å"openness. † IT therefore has a constraining role in an organization that occupies this quadrant (e. g. typical symptoms include â€Å"legacy systems† and â€Å"islands of automation†) and prevents the effective implementation of programs of business change. This occurs irrespective of the organization’s ambition or competence in carrying out evolutionary or radical BPR. Q3.High â€Å"technology push† and low â€Å"business pull† – the organization that occupies this quadrant has a keen awareness of technological trends and standards, but a relatively poor business model. Its IT infrastructure is probably very advanced, and technology has a high profile although the business model or strategy may be relatively weak or undefined. Such an organization exhibits poor strategic alignment (Avison et al. , 2004) (in common with the example in the previous quadrant), and may not progress beyond a â€Å"compromise† or â€Å"one step† type of BPR, irrespective of its technical competence or resources.The potential of IT to be proactive or enabling in support of business change in this type of organization is wasted. The literature contains many examples (Davenport, 1995) of high technology companies that failed to change as a result of poor business processes and plans . Q4. High â€Å"technology push† and high â€Å"business pull† – an organization in this quadrant combines a high profile for IT (e. g. well integrated â€Å"IT governance† and a flexible and open IT infrastructure) with a well-developed business plan and well-designed processes.It is able to achieve a high degree of success in carrying out evolutionary or radical BPR, fully enabled by a proactive IT strategy. However, success is not likely to come about by being competent in isolated functions of IT and business. In order to occupy this quadrant, an organization needs to achieve a high level of strategic alignment (Avison et al. , 2004). Note: Description of Q1-Q4 is from â€Å"Alan Eardley et al, 2008)† 72 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. ttp://www. cisjournal. org Figure 3: A Proposed framework for evaluating the role of IT in BPR projects. 3. METHODOLOGY A total of 150 small-to-medium sized companies in both manufacturing and service sectors were contacted through the Midwest, and 108 valid questionnaires were returned with an effective rate of 72%. The returned valid questionnaires were adequate regarding the sample size and statistical assumptions to conduct MANOVA. The survey questionnaire was based on four constructs or dimensions and each construct had multiple items or questions for consistency of the measurement.The respondents were required to respond to four questions for each of the four constructs. For each of the questions the respondents had to indicate their agreement Q1: HH, high technology push with high business pull. or disagreement on a 11-point Likert-type scale with the end points being 0 for â€Å"less likely† and 10 for â€Å"more likely†. The four constructs determined the four dependent variables for conducting t MANOV . The four response variables were: market share, customer relationship management, IT impact on organization, and efficiency (multifaceted, such as lowering cost, lowering process variability, and lead time).Four quadrants of figure 3(Q1Q4) were chosen as four levels of treatment of one factor, which is the quadrant (One way MANOVA) as follows: Q1: LL, low technology push with low business pull. Q2: LH, low technology push with high business pull. Q3: HL, high technology push with low business pull. 73 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. org The following MANOVA linear model was used to see which quadrant was the optimum point for business performance.The pairwise comparison test was conducted to compare all four quadrants regarding the four dependent variables as representative of business performance. Y1,Y2,Y3,Y4 = B0 + B1X1 + B2 X2 + B3 X3 + B4 X4 + e Before conducting MANOVA, th e factor analysis was performed. Table 2 shows the result of factor analysis and factor loading. SPSS was used to analyze the data. Table 2: Scale Reliability: Cumulative variance explained and Cronbach’s alpha for four factors 16 questions Questions Impact of IT on Organization 0. 988 0. 750 0. 690 0. 790 0. 789 0. 789 0. 689 0. 87 0. 897 0. 745 0. 897 0. 798 0. 698 0. 987 0. 687 0. 786 100. 00 0. 754 Market Share CRM Efficiency Question 1 Question 2 Question 3 Question 4 Question 5 Question 6 Question 7 Question 8 Question 9 Question 10 Question 11 Question 12 Question 13 Question 14 Question 15 Question 16 Cumulative variance Cronbach’s alpha 28. 588 0. 788 56. 595 0. 881 70. 413 0. 974 The following tables shows the distribution of 108 organizations on 4 different quadrants. Table 3: Organization distribution on 4 quadrants Q1 LL 23 Q2 LH 28 Q3 HL 32 Q4 HH 25 4. DISCUSSION AND RESULTSTable 4 shows the result of MANOVA that all respondents’ means are signific antly different for all four quadrants, and different combinations of technology push and business pull achieved different levels of strategic alignment. 74 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. org Table 4. Tests of Between-Subjects Effects Dependent Source Quadrants nt IT. Impact M. Share CRM Efficency df 3 3 3 3 F 333. 960 236. 449 45. 051 79. 995 Sig. .000 . 000 . 000 . 00 The pairwise comparison shows the result of business performance for each quadrant as follows: Fig. 4: IT Impact 4. 1 Impact of IT on Organization This variable was the highest both for HH and LH respectively and again it proved that the organization with high technology alone cannot achieve the same result as the organization either with both high technology push and high business pull (BPR) or only high business pull (BPR). 75 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. ttp://www. cisjournal. org Fig. 5: Market Share 4. 2 Market Share This variable was the highest both for HH and LH respectively and again, it proved that the organization with high technology alone cannot achieve the same result as the organization either with both high technology push and high business pull (BPR) or only high business pull (BPR). Fig. 6: Customer Relationship Management 76 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal. All rights reserved. http://www. cisjournal. org 4. Customer Relationship Management This variable was the highest both for HH and LH respectively and again, it proved that the organization with high technology alone cannot achieve the same result as the organization either with both high technology push and high business pull (BPR) or only high busine ss pull (BPR). Fig. 7: Efficiency 4. 4 Efficiency: This variable was the highest both for HH and LH respectively and again it proved that the organization with high technology alone cannot achieve the same result as the organization either with both high technology push and high business pull (BPR) or only high business pull (BPR). ecurrent theme† (Markus and Robey, 1995, p. 592). The framework demonstrates that no serious BPR effort can afford to ignore the role of IT, and if it does so then the risk of failure is high. It appears that the role of IT in BPR is undervalued at present, especially in terms of its wider and more longterm implications. These implications are as follows. First, IT strategy and business strategy need to be aligned for maximum benefits to be realized. Second, IT strategy dictates the type of IT infrastructure within a company. Third, the IT strategy and infrastructure should both support the business strategy and even influence it.Most importantly, a s change is endemic to corporate life, the IT infrastructure also needs to be flexible in order to cope with changes in the environment and the business strategy (Alan Eardley et al, 2008). 5. IMPLICATIONS OF THE WORK The proposed framework is needed because some organizations attempt to undertake BPR or strategic alignment without giving due consideration to the role of IT in BPR. Indeed, it has been observed that the â€Å"exclusion and expulsion of IS specialists from BPR programs is a 77 VOL. 3, NO. 1, January 2012 ISSN 2079-8407 Journal of Emerging Trends in Computing and Information Sciences  ©2009-2012 CIS Journal.All rights reserved. http://www. cisjournal. org A flexible IT infrastructure appears to be an increasingly desirable objective for companies in a rapidly changing environment (Avison et al. , 1997). By enabling an organization to exploit potential business opportunities quickly, such flexibility helps give an organization competitive advantage (Duncan, 1995). A key issue for an organization is the configuration of its IT platforms, network, and telecommunications, and this in turn raises questions concerning configuration, compatibility and integration rules, access standards, connectivity of systems, and excess apacity over the current requirements (Duncan, 1995, p. 42). These needs have led to a move towards distributed computing and standardization (or â€Å"open systems†) that give a high level of connectivity. One example of a company that has implemented such an infrastructure for purposes of improving BPR success is Sweden Post (Moreton and Chester, 1997). any process improvement, no matter whether IT is present or not. Therefore, future research should integrate some dimensions of organizational structure and leadership, mission, and vision as mediating factors. REFERENCES [1] Akhavan, P. , Jafari, M. & Ali-Ahmadi, A. R. (2006). Exploring the interdependency between reengineering and information technology by developing a co nceptual model. Business Process Management Journal, 12(4), 517. Retrieved December 12, 2010, from ABI/INFORM Global. [2] Albadvi, A. , Keramati, A. , & Razmi, J. (2007). Assessing the impact of information technology on firm performance considering the role of intervening variables: organizational infrastructures and business processes reengineering. International Journal of Production Research, 45(12), 2697-2734. Retrieved December 9, 2010 from Business Source Premier database. 3] Al-Mashari, M. and Zairi, M. (2000b). Creating a fit between BPR and IT infrastructure: a [4] proposed framework for effective implementation. International Journal of Flexible [5] Manufacturing Systems. 12 (4). 253-74. [6] Avison, D. E. , Jones, J. , Powell, P. and Wilson, D. (2004). Using and validating the strategic [7] alignment model. Journal of Strategic Information Systems. 13. 223-46. [8] Avison, D. E. , Eardley, W. A. and Powell, P. (1997) â€Å"Developing information systems to support [9] fle xible strategy†, Organisational Computing. 7 (1). 57-77. [10] Chan, S. L. (2000).Information technology on business processes, Business Process Management Journal. 6 (3). 224-37. [11] Davenport, T. (1995). The fad that forgot people. Fast Company. available at: www. fastcompany. com/online/01/reengin. html (accessed July 2006). [12] Davenport, T. (1993). Process innovation: Reengineering work through information technology. Boston: Ernst & Young. [13] Davenport, T. , & Short, J. (1990). The New Industrial Engineering: Information Technology and Business Process Redesign. Sloan Management Review. 31(4), 11-27. Retrieved December 10, 2010, from ABI/INFORM Global. [14] Dedhia, N. (2005). Six sigma basics.Total Quality Management & Business Excellence, 6. CONCLUSIONS This paper demonstrates the significance of IT in BPR and their interdependency that then impact business performance that is defined in four important dimensions: market share, customer relationship management, IT im pact, and efficiency (as multifaceted such as lowering the cost, lowering the process variability, and lead time). This study expanded and further explored the frame work developed by Alan Eardley et al,( 2008) by collecting data from 150 small-to-medium sized companies in both manufacturing and service sectors through the Midwest.They showed the different roles of IT in providing effective support for different types of BPR, and indicated that aiming for a type of BPR that is not compatible with the present role of an IT infrastructure will reduce the probability of success for a BPR project. If this is ignored, a BPR effort will either fail or will not produce the level of results that are often expected from BPR projects ( Alan Eardley et al, 2008). Organizations adapting high technology alone or BPR alone cannot achieve the same result and business performance as the organization that benefits from interdependency between IT and BPR.

Wednesday, October 23, 2019

The Red Cross

Kevin Smith The Red Cross is an International organization that thrives on donations and the kindness of others to succeed. This Red Cross supports military families, disaster relief, health and safety training along with education, and blood drives that save thousands of lives yearly. The Red Cross started In the year 1881 and was mainly used to help wounded soldiers from the battlefield. â€Å"The global Red Cross has evolved into the world's largest humanitarian network- the only non-governmental organization with specific irresponsibleness outlined In the Geneva conventions†(RedCross, 2013). The Red Cross has established itself in the cyber community to succeed. With online donations exceeding 36 million dollars the Red Cross has been able to far exceed anything It did In the years prior to the Internet. The Red cross relies on its volunteers as its strength to work donation sites for all actions the organization participates in. The challenges the Red Cross faces today is the ability to keep enough volunteers on hand to run the organization. While the Red cross has full time members like any business this organizations success comes from those willing to help. The challenges the Red Cross faces In the media environment include many things. System hacking can be seen as hackers will set up take websites that look like the Red Cross web page. This in turn turns out to be a scam and people will give donations to a hacker Instead of the Red Cross. There can be other challenges out there for this organization that would include government policy. Foreign policy. ND legislative issues that can be strain the mission of the Red Cross. The Instant access the Red Cross has to the world has helped this organization in ways that are unimaginable. The Instant media environment has created an unlimited amount of people it can reach throughout the world. The money raised on dally donations Is lox the amount today ads It was In the uses. This is due to the instant access the world has to the Red Cross. The Red Cross uses the social media during disasters because this is the fastest and most effective way to reach a large number of Individuals.The Instant media environment has done nothing but help the Red Cross succeed. I mentioned earlier that volunteer are a challenge for the Red Cross, but with social media and instant media the Red Cross as been able alleviate some of the stress as they can collect for volunteers over the internet The Red Cross will use multiple tactics to get its message out to the community. The Red Cross will gain its target audience by associating someone within the organization to speak or Interact with the community that Is In question.This tactic is used by military recruiters and it tends to work well with inner city communities as well as communities with language barriers. The Red Cross has volunteers trot all walks tot elite so it would only be natural to use those people trot that community to spread the Red C ross message too particular group of immunity. The internal messaging of the employees Is that of care for the community and to give security to those in need The mission stays the same in the Red Cross and that is to provide care to all walks of life that may need it.The message stays the same internally throughout the world for the Red Cross as well. The Red Cross is not the largest humanitarian organization by doing things the wrong way. The internal structure is sound and solid and provides excellent support to all communities throughout the world. This is done with compassion, time, and hard work on behalf of the employees and the thousands of volunteers within the organization. I researched the Red Cross for numerous hours and found that it takes compassion and dedication too cause to make this organization successful.The Red Cross can be unified with many different events and by anybody willing to put in the time and energy to do so. I recently was a part of the Golf for Life rally which was to raise money and blood donations for the Red Cross. There are other events that happen all over the United States on a daily basis in which blood and money is raised for this organization. This is not only going on in the United States, but all over the world. If a person was to look up how to do an event on the Red Cross website it would show them exactly not only to go about doing it, but also show them ways it can be successful.

Tuesday, October 22, 2019

Reflections of Fitzgeralds †Literature Essay

Reflections of Fitzgeralds – Literature Essay Free Online Research Papers Reflections of Fitzgeralds Literature Essay F. Scott Fitzgerald was one of the greatest American writers of all time. He best represented the â€Å"roaring twenties.† Upon dropping out of college, he told his best friend Edmund Wilson â€Å"I want to be one of the greatest writers, who have ever lived, don’t you?† Today, most of high school and college-level American literature courses require at least one of his works (F(rancis)). During his time period, he was portrayed as flaming youth of the Jazz Age, but not as one of the America’s most important writers (F(rancis)). The Great Gatsby is considered as one of his greatest literary works. It is a story of Jay Gatsby, a wealthy and well-to-do businessman, who lives in disillusion of recreating the past by means of money and wealth. He tries in vain to make Daisy Buchanan to fall in love with him once again. He is very unsuccessful in doing so and it ultimately brings his own death. Jay Gatsby is very similar to F. Scott himself. He is wealthy, always wanted to be at top of the social ladder, and wanted a girl who he knew he could not have. Daisy Buchanan is very much like F. Scott’s own life, Zelda Sayre Fitzgerald. They were both materialistic and only sought weal th in men. They were both very flirtatious with men. F. Scott Fitzgerald portrayed lives of himself and his wife Zelda, in one of his greatest work, The Great Gatsby. Jay Gatsby was born in a poor family in The Great Gatsby. He couldn’t pay his way through the college and had to take degrading janitorial job in order to get college education. Being a headstrong and proud person he was, he refused to do so and ultimately dropped out of the college (Fitzgerald 105). F. Scott Fitzgerald himself did not complete his college education. He was admitted to Princeton, one of the most prestigious universities in the world. Being too zealous about his passion for writing, Fitzgerald neglected his studies. He was placed on academic probation in 1917. He dropped out of Princeton, finally realizing that he will not be able to graduate (F. Scott Fitzgerald). After dropping out of college, Jay Gatsby joined the army during the World War I. He started as first lieutenant, but because of his bravery in Argonne Forest battle, he was advanced major and received decorations from every allied nation (Fitzgerald 70). He was awarded with a medal from Mo ntenegro, which was â€Å"For Valour Extraordinary† (Fitzgerald 71). Upon dropping out of Princeton, Fitzgerald sought other chances in his life by applying for a U.S. Army commission. In October 1917, he was appointed second lieutenant (Gale, â€Å"F. Scott†). But unlike Jay Gatsby, he never really saw much action in the army and stayed in America until the war was over (Gale, â€Å"F. Scott†). They both fell in love with girls who were â€Å"out of their league.† Jay Gatsby fell in love with Daisy when he had nothing. â€Å"†¦ he was at present a penniless young man without a past, and at any moment the invisible cloak of his uniform might slip from his shoulder† (Fitzgerald 156). In a similar way, F. Scoot Fitzgerald fell in love with Ginerva King. He was flatly rejected because he was poor and had nothing to support her extravagant life style. â€Å"I can’t be shut away from the trees and the flowers, cooped up in a little flat, waiting for you. I don’t want to think about pots and kitchens and brooms. I want to worry whether my legs will get slick and brown when I swim in the summer† (Concise Dictionary, â€Å"F. Scoot†). Jay Gatsby, the main character of The Great Gatsby was a self-portrait of F. Scott Fitzgerald. Zelda Sayre Fitzgerald was a wild figure, who symbolized the new â€Å"flappers,† or very liberal women of the â€Å"roaring twenties.† She was very much like Daisy Buchanan of The Great Gatsby.† They were both very liberal and sought many men for their entertainment. Both of them were not very loyal to their men. â€Å"Through this twilight universe Daisy began to move again with season; suddenly she was again keeping half a dozen dates a day with half a dozen men and drowsing asleep at dawn with the beads and chiffon of an evening dress†¦Ã¢â‚¬  (Fitzgerald 158). They were also very superficial and materialistic. While Jay Gatsby was away in Europe, Daisy broke away from him and married Tom Buchanan who was very wealthy while Gatsby was penniless in the army. â€Å"There was a wholesome bulkiness about his person and his position and Daisy was flattered† (Fitzgerald 159). Zelda was also very materialistic and believed that she can only marry a wealthy man in order to keep herself happy. When F. Scott’s first novel was rejected by Scribner’s, Zelda broke off their engagement (St. James, â€Å"F. Scott†). She believed that F. Scott will never be able to support her and satisfy with wealth. She only decided to marry him after he becomes famous and a big public figure. After This Side of Paradise was published and became immediate hit, Fitzgerald became famous as the voice of his generation almost instantaneously. A week later the book was published, Zelda and F. Scott got married (St. James, â€Å"F. Scott†). F. Scott Fitzgerald was the voice of his generation. During his lifetime, he was noticed by people through his publicity and popularity. But now, he is regarded as one of the most influential American writer in history. The Great Gatsby, which is usually regarded as one of his greatest works, incorporates life of his own and his wife Zelda in to the plot. Jay Gatsby was very similar to F. Scott Fitzgerald because they both dropped out of college and took their chances in the army. They also became wealthy in order to marry girls they loved, who were both very materialistic and superficial. Zelda Sayre was very similar to Daisy Buchanan because they were both very liberal and flirtatious. Also, they were only looking for wealth in men to satisfy them. F. Scott Fitzgerald was very successful in incorporating the true stories of himself and his wife into The Great Gatsby. Research Papers on Reflections of Fitzgeralds - Literature EssayHip-Hop is ArtHonest Iagos Truth through DeceptionThe Relationship Between Delinquency and Drug UsePersonal Experience with Teen PregnancyCapital Punishment19 Century Society: A Deeply Divided EraQuebec and CanadaThe Effects of Illegal ImmigrationMind TravelAssess the importance of Nationalism 1815-1850 Europe

Monday, October 21, 2019

Roots of Individualism in Europe essays

Roots of Individualism in Europe essays During the Middle Ages, independent thought was viewed disdainfully. Almost any idea deviating from the status quo, largely determined by the Roman Catholic Church, was condemned as heresy. One convicted of such a grievous offense was often excommunicated or killed, either by means of a proper execution or by a hostile mob. However, with the decline of the Middle Ages, the conditions arose for the birth of individualism-the development of which can be traced through the Renaissance, the Reformation, and the rise of capitalism. Individualism was a radical ideological revolution that forever altered the face of Europe and the rest of the world. The beginning of individualisms gradual evolution was first manifested in the Renaissance Era. The Renaissance was a ripe time ready for change. The weakening role of the Catholic Church led to an increase in power for the masses. Corruption plagued Church officials and many sought theological respite elsewhere. The reemphasis of ancient Greek and Roman texts proffered alternatives for many to satisfy their religious needs. This helped contribute to the abolishment of the Churchs imposition of its absolute truth and its claim to ultimate authority. As the church lost power, so did the political units. The bonds between church and state began to erode. Feudalism declined, hence giving rise to new political opportunity. The noble class no longer held a monopoly on the valued positions in society. Rather, one was able to pursue wealth and fame through various endeavors ranging from artist to soldier. The most empowering change of this era was the dominance of a secular attitude and the decline of church absolutism. This secular viewpoint altered mans reason for existence from an otherworldly quest to an intimate, immediate appreciation for that which exists on earth. Humanism is a primary source of individualism. Pico della Mirandolas Oration ...

Sunday, October 20, 2019

Learn the Building Blocks of Chinese Characters

Learn the Building Blocks of Chinese Characters While learning to speak Chinese at a basic level isnt that much harder than learning other languages (its even easier in some areas), learning to write is definitely and without a doubt much more demanding. Learning to Read and Write Chinese Is Not Easy There are many reasons for this. First, its because the link between the written and spoken language is very weak. While in Spanish you can mostly read what you can understand when spoken and you can write what you can say (bar some minor spelling problems), in Chinese the two are more or less separate. Second, the way Chinese characters represent sounds is complicated and requires much more than learning an alphabet. If you know how to say something, writing is not just a matter of checking how its spelled, you have to learn the individual characters, how they are written and how they are combined to form words. To become literate, you need between 2500 and 4500 characters (depending on what you mean by the term literate). You need many times more characters than the number of words. However, the process of learning to read and write can be made a lot simpler than it first seems. Learning 3500 characters is not impossible and with proper reviewing and active usage, you can also avoid mixing them up (this is actually the main challenge for non-beginners). Still, 3500 is a massive number. It would mean almost 10 characters per day for a year. Added to that, you would also need to learn words, which are combinations of characters that sometimes have non-obvious meanings. ...But It Neednt Be Impossible Either Looks difficult, right? Yes, but if you break these 3500 characters down into smaller components, you will find that the number of parts you need to learn is very far from 3500. In fact, with just a few hundred components, you can build most of those 3500 characters. Before we move on, its perhaps worth noting here that we are using the word component very deliberately instead of using the word radical, which is a small subset of components that are used to classify words in dictionaries. The Building Blocks of Chinese Characters So, by learning the components of characters, you create a repository of building blocks that you can then use to understand, learn and remember characters. This is not very efficient in the short term because each time you learn a character, you need to learn not only that character but also the smaller components its made of. However, this investment will be repaid handsomely later. It might not be a good idea to learn all components of all characters directly but focus on the most important ones first. I will introduce some resources to help you both with breaking characters down into their component parts and where you can find more information about which components to learn first. Functional Components Its important to understand that each component has a function in the character; its not there by chance. Sometimes the real reason the character looks like it does is lost in the mists of time, but often its known or even directly apparent from studying the character. At other times, an explanation might present itself that is very convincing, and even though it might not be etymologically correct, it can still help you to learn and remember that character. In general, components are included in characters for two reasons: first because of the way they sound, and second because of what they mean. We call these phonetic or sound components and semantic or meaning components. This is a very useful way of looking at characters that often yields much more interesting and useful results than looking at the traditional explanation of how characters are formed. Its still worthwhile to have that in the back of your mind when learning, but you dont really need to study it in detail. A Writing Example Lets look at a character most students learn early on: Ã¥ ¦Ë†/Ã¥ ª ½ (simplified/traditional), which is pronounced  mÄ  (first tone) and means mother. The left part Ã¥ ¥ ³ means woman and is clearly related to the meaning of the whole character (your mother is presumably a woman). The right part é © ¬/é ¦ ¬ means horse and is clearly not related to the meaning. However, it is pronounced  mÇŽ (third tone), which is very close to the pronunciation of the whole character (only the tone is different).  This is the way most Chinese characters work, albeit not all. The Art of Combining Characters   All this leaves us with hundreds (rather than thousands) of characters to remember. Apart from that, we also have the additional task of combining the components we have learned into compound characters. This is what were going to look at now. Combining characters is actually not that hard, at least not if you use the right method This is because if you know what the components mean, the character composition itself means something to you and that makes it a lot easier to remember. There is a huge difference between learning a random jumble of strokes (very hard) and combining known components (relatively easy). Improve Your Memory Combining things is one of the main areas of memory training and something that people have had the ability to do for thousands of years. There are many, many methods out there that work really well and that teach you how to remember that A, B, and C belong to each other (and in that order, if you like, although this is often not necessary when it comes to Chinese characters, because you quickly get a feel for that and only a very small number of characters can be mixed up by accidentally moving character components around). The main takeaway is that memory is a skill and its something you can train. That naturally includes your ability to learn and remember Chinese characters. Remembering Chinese Characters The best way of combining components is to create a picture or scene that includes all the components in a memorable way. This should be absurd, funny or exaggerated in some way. Exactly what makes you remember something is something you need to figure out by trial and error, but going for the absurd and exaggerated often works well for most people. You can, of course, draw or use real pictures rather than just imaginary ones, but if you do, you need to be really careful that you dont break the structure of the character. Simply put, the pictures you use to learn Chinese characters should preserve the building blocks that that character consists of. The reason for this should be apparent at this point. If you just use a picture that is suitable for that character, but which doesnt preserve the structure of the character, it will only be useful for learning that very character. If you follow the structure of the character, you can use the pictures for the individual components to learn tens or hundreds of other characters. In short, if you use bad pictures, you lose the benefit of those all-important building blocks. Helpful Resources for Learning Chinese Characters Now, lets look at a few resources for learning the building blocks of Chinese characters: Hacking Chinese: Here youll find a list of the 100 most common radicals. We are mostly concerned with components here, not radicals, but it so happens that radicals are often semantic components, so this list is still useful.Hanzicraft: This is an excellent website that allows you to break down Chinese characters into their component parts. Note that the breakdown is purely visual, so it doesnt really care if its historically correct. You can also find phonetic information here, which is again based only on mechanical comparison of the pronunciation of the components and the full character (its not historically correct either, in other words). Also on the plus side, this site is fast and easy to use.Zdic.net: This is an online, free dictionary that offers decent information about the structure of a character that is also more in line with what we know about the development of a specific character (its manual, not automatic).ArchChinese: This is another online dictionary that gives yo u the ability to both breakdown characters and see the components in context (with frequency information, which is quite rare in other dictionaries). Semantic component posters from Outlier Linguistics: These posters show 100 semantic components and apart from being very informative, they also look great on your wall. They come with information on how to utilize them and accurate descriptions (manually made by people who know a lot about Chinese characters). That should be enough to get you started. There will still be cases you cant find or that dont make sense to you. if you encounter these, you can try a number of different methods, such as creating a picture specifically for that character or making up the meaning on your own - this is easier than trying to remember meaningless strokes.

Saturday, October 19, 2019

The current state of the economy of the United States Essay

The current state of the economy of the United States - Essay Example It is calculated by adding up annual expenditure on goods and services in 4 sectors. The first sector is ‘Personal Consumption Spending,’ involving expenditure on durable goods (like cars and televisions), non-durable goods (like food and clothes), and personal services (like manicures and haircuts). The second sector is ‘Private Investment Spending,’ including expenditure like purchases of real estate, plant and machinery by corporations. The third sector is ‘Government Spending,’ featuring expenditure on goods like armaments and services like wages of public school teachers. The fourth sector is ‘Net Exports,’ which is the value of goods and services exported abroad, minus the value of goods and services imported from other countries (The World Book Encyclopedia). GDP is the most widely used measure to analyze the prosperity of the nation. The U.S is considered the world’s most prosperous economy as it possesses the highest GDP in the world. In 2000 its GDP purchasing power parity which was $ 9.82 trillion, rose to $ 10.13 trillion in 2001, $ 10.47 trillion in 2002, $ 10.96 trillion in 2003, $ 11.71 trillion in 2004, $ 12.46 trillion in 2005 and $ 12.98 trillion in 2006. U.S GDP figures have shown a healthy, continuously rising trend, rising by 3.16 % between 2001 and 2001, 3.36% between 2001 and 2002, 4.68% between 2002 and 2003, 6.84% between 2003 and 2004, 6.40% between 2004 and 2005 and 4.17% between 2005 and 2006 (Cia.gov). As compared to the U.S, other world countries lagged far behind. In 2004, as against the U.S GDP purchasing power parity of 11.71 trillion, China ranked a distant second at 7.272 trillion, followed by an even most distant group of countries led by Japan at 3.745 trillion, India at 3.319 trillion, Germany at 2.3 62 trillion, the U.K at 1.782 trillion, France at 1.737 trillion and Italy at 1.609 trillion

Friday, October 18, 2019

International Policy Essay Example | Topics and Well Written Essays - 1750 words

International Policy - Essay Example Poverty and how to reduce it has been a concern from the time of Adam Smith until today. My view is that poverty can not be eradicated; it can only be reduced to certain levels. To ensure that all countries globally are developed is ideal. The plan of the Canadian government, being one of the developed countries, is to aid the developing countries to eradicate poverty. There has been great improvement in human development through the implementations of the MDGs. A significant number of people are living on more than a dollar a day for example, the number of people who lived below a dollar a day decreased by 50% in East Asia and reduced by 7% in South Asia ( Canada International Development Agency). Prevalence of hunger has reduced by half in 57 countries in the last three decades. I believe that if MDGs are followed, the world will have fewer people suffering due to poverty and diseases like HIV/AIDS, TB, and malaria. Canada, joining other developed countries in fighting poverty, is a way of enhancing decency and fairness all over the world. With the MDGs implementations, literacy levels have been seen to increase. A majority of the women and young girls have attained basic education. Women play a vital role in developing a nation. Thus the high literacy levels show that developing countries will start experience high Gross National Product or Gross Domestic Product (GNP/GDP) as long as the women and girls are gaining from the education. Criticisms Regarding the International Policy Statement Trying to eradicate poverty globally has many obstacles. From the time of Adam Smith, economic, social and political policies have been a major source of concern. First of all, giving donor aid to the developing countries has been nothing but a failure since it started. There is no single developing country that has come up by being given grants and loans. The developing countries have had a challenge of repaying the money given to them by the International Monetary Fund and the World Bank due to increasing interest rates and low or negative GDP levels. They are unable to pay the money because: The money is never used for its aimed purpose. The money usually lands in the hands of politicians who use the money for their own self interests and most countries cannot account for it. There is so much corruption in the leadership of the countries. Money does not trickle down to those who truly need it because the leaders take it and use it for their own personal needs. The money is given with strict conditions. The country in need ends up spending money to improve what the donors think they should improve and not what the people really need. For instance, a country will be told to prepare roads to enhance its transport system but what it really needs are boreholes to get water for its citizen's daily use. The money never trickles down to the citizens of the particular country. This is so because the donor country comes in with its machinery and workers leaving citizens of that particular country unemployed. The donor country ends up paying its own citizens instead of using workers and machinery in the developing country. Aid heightens the levels of dependency. The developing c

Emerging Technologies Trends Essay Example | Topics and Well Written Essays - 1000 words

Emerging Technologies Trends - Essay Example The fundamental task of this technology is to provide the users with numerous computers at any locations to execute their respective tasks (Mark Weiser, 1993). It is basically a technology that defines anywhere everywhere computing for the users of diverse necessities. This particular feature has been invented so as to enhance the communication features between the users present at various locations (Steglich.S, 2005). The Internet had grown manifolds over the past decade, which indeed had been a driving force for the research, over the improvisation of the availability of computing technology. This technology is not a simple implementation over the desktop computers. It involves all the diverse gizmos that can enable the user to communicate with various others users within a short period of time (Fujitsu.com, 2003). This is considered to be the future of the world where tasks are executed in the split of a second. The executable tasks comprise of online conferences, adding on new de als, decision that demand stern actions and many more which play a vital role in embedding a set of new tasks in a man's daily life. Thus turning into one of the favorite technologies it draws huge amount f attention from the users. WiMAX is an abbreviation for Worldwide Interoperability for Microwave Access. It is a technology that enhances the features of the Wireless MAN. WiMAX is also considered to be the technology that provides last mile wireless connectivity (PaloWireless.com, 2006). This concept of wireless technology is considered to wipe out the limitations of existing technologies by providing wireless connectivity to numerous computing systems spread over a large volume of area. Thus it is considered as the "last mile" connectivity which will also be available at affordable prices (RNCOS.com, 2006). WiMAX technology enables the users to communicate with each other over a wide spread area without facing any problems due to varied networks. This technology also provides the broadband connectivity at faster access rates with affordable price tags. Such a technology forms the backbone of Ubiquitous Computing so as to be implemented with ease. This technology not only supports Internet connectivity to th e computing devices present anywhere but also is being framed as a backbone for the mobile applications in near future (Intel.com, 2007). This will result in a wireless world turning into reality which indeed drives technology to higher standards. Service Oriented Architecture Service Oriented Architecture (SOA) is the latest buzzword that possesses all that is needed to provide a springboard to any organization that aims at utilizing IT services to the most optimum extent possible. It induces agility and competitiveness in commercial organizations. It transforms the IT assets of a company directly into bottom-line goals and objectives. While SOA requires some upfront strategy and investment, its benefits are numerous. "Just as the Databases were at the center of design of applications of the 70s and 80s, Components are at the center of design of the applications of the 90s and the next century" - David Vaskevitch, VP, Microsoft. The researchers at Gartner have stated that studies show that by the year 2008, SOA will become the dominant framework for creating and

Thursday, October 17, 2019

Philosophy - Feminism, Moralism, and pornography Essay

Philosophy - Feminism, Moralism, and pornography - Essay Example It is this attitude along with a lack of understanding about human sexuality (admittedly women’s too) that give birth to the new definition of pornography. Had she gained some knowledge about activities like tit torture as depicted in Kama Sutra, she would have thought twice before reaching such a new definition. While stressing on the sadistic attitude of the male-dominated society, it is painful to note the total ignorance the scholar shows towards the element of masochism inherent in women. The scholar is against pornography because of three major reasons. Firstly, it promotes violence against women. Secondly, it provides a totally wrong picture about female sexuality, and thirdly, it promotes male-centeredness (234). It seems that the work goes seriously defective in the fact that it does not give any attention to the impact of explicit sexual content on children. In other words, the scholar is of the opinion that as far as females are not tortured in the portrayal, the material does not have to be considered pornography. Here, she fails to acknowledge the fact that in order to arouse sexual feeling in people including the immature ones, it is not necessary to include bondage or torture. Thus by defining only sexual content with violence as pornography, Longino has provided a totally defective view of pornography. Also, the scholar is alarmed by the fact that pornography has secured its own place in the mainstream media. In the opinion of Longino, this overwhelming acceptance of pornography by the mainstream society and media shows the desire of the male-dominated society to subject females to such activities like rape, bondage, and torture for its own sexual gratification. That means the creation of a society where psychological and physical violence against women is accepted as part of the social culture (234). Admittedly, the scholar is rather unaware about the content of sadism in males as propounded by various thinkers including Freud and

How can a healthy balance of occupations be defined Dissertation

How can a healthy balance of occupations be defined - Dissertation Example The following proposal will provide a background and rationale for the intended research. The problem will be discussed so that the intended research can be understood for its purpose. The second section of the proposal will provide aims and objectives for the intended research Finally, the third part of the proposal will provide an intended methodology from which the study will be conducted in order to provide some resolutions for the objectives. The overall proposal is intended to provide a framework for the intended dissertation on the topic of defining balance through healthy occupations. Background Occupational choices are defined by Turner, Foster, and Johnson as either a â€Å"deliberate commitment to enter an occupational role, acquire a new habit, or undertake a personal project† (27). They further the discussion about the definition of an occupational role through disclosure that these roles are not always defined by an active choice, but are sometimes imposed upon a n individual. An example of this can be the role of head of the family. Occupations are most often seen as long term endeavors which are separate from the concept of an activity which is more often seen in a short term devotion to a task or purpose (Sumsion). Occupations are concerned with long term concepts that require diligence and effort towards goals which may be finite, but are more often sets of goals that continue forward through the occupational effort (Edmons). Creating a healthy balance of occupations concerns balancing the different elements of the roles that a person undertakes in order to assure that in pursuing these roles, a balance is essential in sustaining health and preventing illness. The World Health Organization or WHO suggests that in order to define well being one must look at â€Å"the total universe of human life domains including physical, mental, and social aspects† (Wilcock 310). In order to achieve harmony and balance, all aspects of human exper ience must be examined and assessed in order to provide the clarity that supports well-being (Lundy and Janes 546). A very important distinction that must be made during the study of balance of occupations is that between health and wellness. Health is defined by activities that lead toward well-being. While the terms can be overlapped, more often health is considered a state of physical being that is a part of the balance of a â€Å"dynamic integration of mind, body, spirit, emotions, and environment† (Velde and Wittman 69). Therefore in studying the balance of healthy occupations, the state of well-being must be taken into consideration. How roles are chosen and how they affect the aspects of the five aspects of wellness are relevant to the overall balance of those roles of occupation. The following factors should be taken into consideration when discussing balancing occupations: a concern with a person as a physical, thinking, emotional, spiritual, and social being who has a past, present and future, and who functions within physical and social environments; a belief in intrinsic motivation - an innate predisposition to explore and act on the environment and to use one’s capacities; a recognition of each person’

Wednesday, October 16, 2019

Israeli Sovereignty Essay Example | Topics and Well Written Essays - 1500 words

Israeli Sovereignty - Essay Example in Palestine was estimated to be around 590,000 as compared to approximately 1,320,000 Palestinians, making the Jews equal approximately 31 percent of the total population (Kjeilen, 2006). The Arab nations voiced immediate opposition to the UN’s 1947 plan, joined soon after Israel’s foundation by Egypt, Transjordan, Syria, Lebanon and Iraq, in a struggle that continues to this day. At the opening ceremony of the Syrian-Israeli peace talks on December 11, 2000, Syrian Foreign Minister Farouk al-Shara stated, â€Å"It goes without saying that peace for Syria means the return of all its occupied land. Those who reject to return the occupied territories to their original owners in the framework of international legitimacy send a message to the Arabs that the conflict between Israel and Arabs is a conflict of existence in which bloodshed can never stop.† The Crown Prince of Saudi Arabia, Abdullah bin Abdul Aziz, at the 2002 Arab League summit in Beirut, said, â€Å"I propose that the Arab summit put forward a clear and unanimous initiative addressed to the United Nations Security Council based on two basic issues: normal relations and security for Israel in exchange for full withdrawal from all occupied Arab territories.† Irans Foreign Minister Kamal Kharrazi, in a September 21, 2002 Washington Post interview entitled â€Å"The War and Iran,† stated â€Å"We do not recognize Israel as a government. We believe that eventually Palestinian refugees have to return to their homeland† (Israeli-Palestinian Pro-Con 2004). Since the state was founded, much of the world’s population, including opinion in the Israel-friendly United States, has become opposed the existence of Israel as an independent state. In the U.S., from Boston to San Francisco, people openly espouse this belief. â€Å"No country has a right to exist, certainly not one that was founded through the destruction of another country. Was Palestine ever afforded a right to exist?† claims a San Franciscan

How can a healthy balance of occupations be defined Dissertation

How can a healthy balance of occupations be defined - Dissertation Example The following proposal will provide a background and rationale for the intended research. The problem will be discussed so that the intended research can be understood for its purpose. The second section of the proposal will provide aims and objectives for the intended research Finally, the third part of the proposal will provide an intended methodology from which the study will be conducted in order to provide some resolutions for the objectives. The overall proposal is intended to provide a framework for the intended dissertation on the topic of defining balance through healthy occupations. Background Occupational choices are defined by Turner, Foster, and Johnson as either a â€Å"deliberate commitment to enter an occupational role, acquire a new habit, or undertake a personal project† (27). They further the discussion about the definition of an occupational role through disclosure that these roles are not always defined by an active choice, but are sometimes imposed upon a n individual. An example of this can be the role of head of the family. Occupations are most often seen as long term endeavors which are separate from the concept of an activity which is more often seen in a short term devotion to a task or purpose (Sumsion). Occupations are concerned with long term concepts that require diligence and effort towards goals which may be finite, but are more often sets of goals that continue forward through the occupational effort (Edmons). Creating a healthy balance of occupations concerns balancing the different elements of the roles that a person undertakes in order to assure that in pursuing these roles, a balance is essential in sustaining health and preventing illness. The World Health Organization or WHO suggests that in order to define well being one must look at â€Å"the total universe of human life domains including physical, mental, and social aspects† (Wilcock 310). In order to achieve harmony and balance, all aspects of human exper ience must be examined and assessed in order to provide the clarity that supports well-being (Lundy and Janes 546). A very important distinction that must be made during the study of balance of occupations is that between health and wellness. Health is defined by activities that lead toward well-being. While the terms can be overlapped, more often health is considered a state of physical being that is a part of the balance of a â€Å"dynamic integration of mind, body, spirit, emotions, and environment† (Velde and Wittman 69). Therefore in studying the balance of healthy occupations, the state of well-being must be taken into consideration. How roles are chosen and how they affect the aspects of the five aspects of wellness are relevant to the overall balance of those roles of occupation. The following factors should be taken into consideration when discussing balancing occupations: a concern with a person as a physical, thinking, emotional, spiritual, and social being who has a past, present and future, and who functions within physical and social environments; a belief in intrinsic motivation - an innate predisposition to explore and act on the environment and to use one’s capacities; a recognition of each person’

Tuesday, October 15, 2019

Wildlife & conservation statistics Essay Example for Free

Wildlife conservation statistics Essay Extinction of Species †¢ Every 20 minutes, the world adds another 3,500 human lives but loses one or more entire species of animal or plant life at least 27,000 species per year. (Source: PBS) †¢ At the present rates of extinction, as many as 20% of the worlds 7-15 million species could be gone in the next 30 years. This rate of extinction has been unprecedented since the disappearance of dinosaurs 65 million years ago (Source: WWF). Habitat Destruction (Source: Animal Alliance, unless stated otherwise) †¢ Human population reached 1 billion by 1800. Over 6 billion by 2000. Conservative estimates predict that our population will reach 9 billion people by 2050 (Source: Population Reference Bureau). †¢ The hourly destruction of an estimated 240 acres of natural habitat is directly attributable to the growth in human populations. †¢ 80% of the decline in biological diversity is caused by habitat destruction. Plight of Rhinos (Source: International Rhino Foundation) †¢ Of the dozens of species of rhino that once roamed the earth, only 5 now exist. †¢ Where there were once over 100,000 black rhinos on the plains of Africa, there are now only 2,707 on the entire continent. †¢ The staggering decimation of the rhino population is due to poaching, to satisfy the demand for the horn for use in Eastern traditional medicines and as dagger handles. †¢ Prices up to US$40,000 a kilo have been recorded for the much prized rhino horn more than 5 times the price of gold. The African Elephant (Source: CITES) †¢ 5 -10 million African elephants existed in 1930. Less than 1% of that number (approximately 600,000) remained when they were added to the international list of the most endangered species in 1989. †¢ Demand for ivory combined with loss of habitat from human settlement led to these huge declines in population. African Wild Dog (Source: American Museum of Natural History) †¢ Listed as one of the worlds most endangered canids, and the most endangered predator in Africa, there are now only between 4,000-5,000 African wild dogs in the wild. †¢ A century ago, African wild dog packs numbering a hundred or more animals could be seen roaming the Serengeti Plains. Today, pack size averages about 10, and the total population on the Serengeti is probably less than 60 dogs. †¢ Due to their large home ranges, African wild dogs are particularly vulnerable to habitat destruction. †¢ They are widely regarded as pests, and poisoned, shot, trapped and snared in many areas. †¢ Their most serious threat, though, is introduced diseases. Burgeoning human populations have brought the African wild dogs into frequent contact with domestic dogs, many of which carry canine distemper and rabies. The African Lion (Source: Enkosini Wildlife Sanctuary) †¢ The African lions numbers are diminishing rapidly due to habitat destruction, persecution by livestock farmers outside of protected areas, and human greed. 10,000-15,000 free-roaming African lions remain, down from 50,000 a decade ago. †¢ The willingness of Asians and Westerners to pay handsomely for lion head trophies combined with the urgent need for revenue among African locals means that these great predators are increasingly hunted for sport. †¢ Trophy hunting not only depletes the population of the African lion, but threatens its gene pool as well. Killing the dominant male of a pride (normally the target of a trophy hunt) sets off a chain of instinctive behavior in which the subsequent dominant male kills all the young of the previous male (6-8 estimated deaths result from each male shot). Cheetahs (Source: The Cheetah Spot) †¢ In 1900 there were about 100,000 cheetah worldwide present estimates place their number at 10,000 -15,000 with about one tenth of those living in captivity. †¢ Throughout recorded history a cheetah pelt was a badge of wealth for its human owner. The animal was killed for its skin by some and captured for its hunting skills by others. More recently, increasing human populations have squeezed cheetahs and their prey from their natural habitats. Definitions †¢ Poaching is the illegal hunting, capture, or collecting of wildlife. Snaring is a common form of subsistence poaching and can lead to the maiming of many animals not intended for consumption. (Source: Bagheera: Glossary of terms ) †¢ Canned hunts are commercial hunts, which take place on private land under circumstances that virtually assure the hunter of success. The animal is often fenced in, or has been habituated to eating at a feeding station at the same time every day. Canned hunts are prevalent in the United States and South Africa. (Source: Animalunderworld. com).