Thursday, October 31, 2019

Ethics as it pertains to Information Technology Essay

Ethics as it pertains to Information Technology - Essay Example The advantages outweigh the disadvantages; that is probably why individuals choose to overlook the problems associated with information technology (Henderson, 2005). This paper will examine one ethical issue that faces the information technology field, and if the problem can be rectified. All fields, in the world today, are faced with challenges that come with their territory. These problems arise as a result of negligence, or malpractice among members of the fields involved. Security among many computer-based information systems is questionable, but many individuals consider the field as the future of the modern world. The world cannot find a way to operate in modern time without these systems. If there is a failure in the controlling systems, the world might come to a standstill. However, the recent cases of insecurity that arise from information systems have had many folks question their role in the field of engineering (Henderson, 2005). People of certain ages, sex, race, or religion are being targeted, and it is causing unrest among individuals. The internet creates an avenue for various activities to take place. People responsible for monitoring the activities on the internet do not have control over what transpires over the internet. It is through this channel that many individuals take the time to find out about other individuals. Privacy contracts are being broken through professional hackers, and the information sold to the highest bidder. Online predators are among the most dangerous individuals of the technological era. They use this advancement in technology to ensure they find out about people they are targeting. The world has to face the fact that; everything is technological (Henderson, 2005). Everything is saved or computerised to save on time and manpower. The problem with this is the use of such information to satisfy the needs of predators. Predators come in many forms. Individuals are preying

Tuesday, October 29, 2019

Prewar Marxism in Japan Essay Example for Free

Prewar Marxism in Japan Essay Marxism was coined after its proponent, Karl Marx who believed that the abuses of capitalism would eventually lead to uprisings of the masses particularly of the working class. According to him, the aggrieved plight of the working class will become the key in unleashing the inevitable clashes between the classes. In his argument, Capitalism will be replaced by Communism, in which in his view, this set-up of free economy opens a gate to many inequalities in the society, making the weak and poor more vulnerable to the flaws of the system. As Uno Kozo observed in his work, The Essence of Capital, â€Å"The commodification of the labor force remains the crux of Capitalism† (SJT, pp.243). To Marx belief, Communism is the common ownership of the means of production. There would be public ownership of farms, factories, raw materials, and the like. To him, all means of production will be owned by the workers and all workers would eventually become workers.             In Japan, Marxism was first introduced in the late 1890’s but it was in the 1920’s that it started to catch attention and support from the people especially from the intellectuals (SJT, pp 239; Beckmann, pp. 139). The early Marxists belonged to two different groups, the reformers and the revolutionary. The reformers followed Tolstoian humanitarianism, advocated universal suffrage, and pursued reforms through parliamentary action. While the revolutionaries believed in the Materialist ideas from the German and French Marxist. They adhered to the idea of class struggle and direct revolutionary action by class-conscious workers. The revolutionaries were also attracted to the tactics of the anarcho-syndicalism (Beckmann pp. 140).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The various differences of principles of the Early Marxists in Japan had initially   signaled that a strong unified group would be quite a challenge to create a remarkable impact. In fact, at its onset Marxism was already noted with three general flaws such as its systematic character that degenerates into dogmatism; putative universality that recalls its foreign origin; and its critical modus operandi that provokes infighting and organizational fragmentation (SJT, pp241 ). But all these are generalized observations sums up probable enlightenment on why it seemed to appear that prewar Marxism was never a political success. However, it is pertinent to note that these observations envelopes one or more historical accounts and empirical evidences of the progresses and demise of prewar Marxism in Japan.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The idea of Marxism had its strong appeal in the university circle composed mainly of the professors and students. In fact, one of its early and notable supporters was Kawakami Hajime of the Kyoto Imperial University. He wrote may treatises on Marxism and provided valuable assistance to other advocates in the persons of Sakai Toshihiko, Arahata Kanson among others (Beckmann pp. 145). At that time, the battleground was published material like newspaper wherein people can be informed and get influenced at the same time. At some point, it created impact and stirred the discontentment of the people resulting to the clamor for reforms in Japanese society. This clamor was highlighted more by the onset of the Japan Modernization process in which new demands for the fundamental changes in the society is created (Beckamm pp146). To quote Beckamm, â€Å"Marxism was attractive to them because it provided the fullest explanation of the idea of progress that they had yet encountered. They were easily seduced by the Marxist proposition that through the dialectic progress was inevitable.   Dialectical materialism gave them (supporters) a scientific methodology for analyzing Japanese society, as well as general principles of strategy for effecting change†.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   But no matter how ardent the campaign was and how dynamic the intellectual debates were, history underscores that prewar Marxism fell short in achieving its much desired political change. The variables affecting this result are attributed to both external and internal difficulties encountered by the group. It is believed that too much emphasis on theoretical conceptualization has left the advocates confused on what is real and what is not. And what is real during that time, is the dominance of the conservative elite who managed to uphold Japanese value system. All important institutions of Japanese society inculcated obedience, loyalty, and status over freedom, individual rights, and equality. All these summed up to hostilities of the society to individuals who think otherwise. Thus, it resulted to numerable defection from Communism and Socialism parties. It may also be relevant to note that conservative value system of Japanese society and the so called patterns of behavior during the modernization period contributed to the prevention of basic antagonism from being open clashes. Many intellectuals may be vocal in their convictions but a greater number of them seemed anxious to join the mass â€Å"hurly burly maybe because of the behavioral patterns pervading in the society and of the enveloping obligation not to disgrace the family through deviation from the generally accepted behavior. Another pitfall of the prewar Marxism is the very nature that the ideology was alien and much worse, dependent on the support of a foreign state which is labeled as enemy and competitor of their own country. It could not simply break the much preferred paradigm of Japanese Nationalism and Confucianism. Furthermore, the movement cannot fight equally with the raw power of the state especially of its police and military predisposition. This is for the obvious reason that communists had no civil liberties to protect them. As a matter of fact, party organizations were dismantled through various man-arrest in 1923, 1928, 1929, and much frequently in the 1930s. These arrests made it difficult for the advocates to maintain a substantial number that could function effectively for its cause (Beckamm, pp 148-150)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Much had been said by the writings and works of the early believers but less had been done. In the labor movement itself, the support and participation was only a small percent of the whole sector. Many who joined the cause were in the small and medium enterprises and almost none from the large industries. A few participation reflected that many have gone disillusioned or remained uninspired by the movement due to many failures of negotiations and strikes. The same also goes for the peasants, the Japanese agricultural communities and families were unreceptive and to some measure were hostile to Communism and Socialism. This maybe because the peasant movement lacks single central leadership that could have had become an effective channel of influence (Beckamm, pp150).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Commintern Policy also posted a challenge to the thriving ideology of Marxism. It added certain degree of divisiveness among the people in the movement. Also, it provided a very good issue that kept the proponents busy in arguing as to which would be the good and effective direction to heed towards the desired impact on Japanese society. Is it the bourgeois-democratic or the proletarian revolution? Again, it brood disunity, conflict, and frustration among themselves.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The defection of Etsuzo, Sano, and Nabeyama also influenced fellow believers to defect and to condemn all together the principles and actions of the group they once pledge allegiance and commitment (Beckmann, pp160; 166).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In totality, prewar Marxism in Japan made numerous progresses and successes in bringing out brilliance among Japanese intellectuals. However, it was never translated into a political action that would have given life to the very essence of the teachings of Karl Marx. Though numerous reasons tried to explain this result, but maybe the only reason true enough to describe its failure is the one said by George Beckmann, â€Å"†¦the very nature of Japanese society made it extremely difficult, if not impossible, for a Communist movement to exist, let alone operate with any degree of effectiveness†¦to Marxist-Leninist terms, the objective conditions were not at all favorable. (Beckmann pp. 152)†

Sunday, October 27, 2019

Effect of Bring your own Device (BYOD) on Cybersecurity

Effect of Bring your own Device (BYOD) on Cybersecurity Effect of Bring your own Device (BYOD) on Cybersecurity at workplace Introduction Several new trends in information access are impacting organizations ability to control and secure sensitive corporate data. The increase in web applications, cloud computing and Software as a Service (SaaS) offerings, and the Bring Your Own Device (BYOD) phenomenon, means that employees, business partners and customers are increasingly accessing information using a web browser on a device not owned or managed by the organization (Morrow, 2012). Bring your own device (BYOD) is process whereby when individual/ employees can use personal devices for business purposes (Privacy Right, 2013). And the D in BYOD includes more than just smartphones. It also includes employees logging into web applications such as Outlook Web Access and SharePoint, SaaS applications such as CRM systems or healthcare billing applications hosted in cloud services, from home desktop or laptop computers (Morrow, 2012). The concept of bring your own device (BYOD) is a growing trend for business IT. There are a var iety of benefits to allowing users to supply their own PCs and mobile devices, but there are also some concerns (Bradley, 2011). Several studies have also shown that BOYD is one the three biggest cybersecurity threat of 2014 (Singh, 2012). In addition, it is suggested that BYOD, or bring your own device, can no longer be thought of as a fad; it is quickly becoming the new reality. In addition, as this trend grows, all businesses are potentially at risk which can stem from both internal and external threats, including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications (Singh, 2012). In this study, the effect of Bring your own Device (BYOD) on Cybersecurity at workplace will be investigated. Hypothesis It might be concluded that due to using of unauthorized devices such as personal electronic device also known as Bring Your Own Device (BYOD) at workplaces causes intrusion into the company network, thereby causing data loss, stolen intellectual property to mention but few. Arriving at this hypothesis: It was not an easy task, however, following the provided information made it easier. Coming up with the hypothesis, I had to brainstorm and do enough research to come up with a schematic sketch of the variables (independent and dependent) involved in this issue. To ensure the hypothesis is an empirical statement, general phenomenon, plausible, specific, consistent and testable. In this hypothesis, the identified independent variable is the personal electronic device (BYOD) while the dependable variable is the network intrusion, thereby causing data loss, stolen intellectual property. Figure 1: Schematic sketch of identified variables Independent Variable Dependent Variable Use of Personal Electronic Device à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ Network intrusion Figure 1: showing the dependable and independent variables of the hypothesis Findings Studies have shown that one of the biggest challenges for organizations when employees use their own device organizations is that corporate data is being delivered to devices that are not managed by the IT department (Morrow, 2012). This has security implications for data leakage, data theft and regulatory compliance (Morrow, 2012).in addition, the use of unmanaged devices such as BYOD causes enterprises to have less control and visibility, and fewer mitigation options than they do with managed devices (Morrow, 2012). In addition, Laptops, smartphones and tablets that connect to corporate networks significantly increase threats to sensitive data (Morrow, 2012). . Organizations should be concerned about the security state of endpoint devices and the risks to which they are exposed. Key loggers, malware and cyber-attacks have greatly increased the potential for unauthorized access to, and information theft from, endpoints. Potential unintended consequences such as data leakage and mal ware reinforce the need to enhance the security of corporate data. A malicious employee can easily steal company trade secrets, intellectual property or sensitive customer information by saving it locally or to a cloud service, sending it through accounts in Dropbox and you send it or emailing it via a personal webmail account. Organizations must control the data after its delivered to the device to prevent accidental or intentional loss by careless or malicious end users. Studies have also shown that to assess the risks of BYOD computing, everything from data contamination to user habits to the activities of criminal syndicates needs to be considered (Romer, 2014). Some of the security risks to be considered includes: Security as an afterthought: Shows that most mobile devices either lack advanced security features or have them disabled by default. Even basic features such as screen locks are turned off, and most users leave them that way (Romer, 2014). Data contamination: Shows the photos and other content share storage space along with confidential business data. This combining of data introduces new risks to the enterprise. Through carelessly configured back-ups or file copies, personal content might accidentally end up on corporate file servers. Worse, personal files that contain malware might spread to business files and from the mobile device to internal file servers and other enterprise assets (Romer, 2014). New Forms off malware: Shows that New forms of malware targeting mobile devices are on the rise. IBM predicts that mobile malware will grow 15% annually for the next few years (Romer, 2014). Hackers and criminal syndicates realize that most mobile devices are less secure than more traditional devices such as laptops (Romer, 2014). They have begun targeting mobile devices for attacks ranging from mischievous pranks to advanced persistent threats that stealthily copy internal data over many months, transmitting it to remote control centers around the world (Romer, 2014). Phishing attacks that slip past network defenses Shows that many employees routinely catch up on email and work during evenings and weekends, and when they do, they typically use smartphones or tablets (Romer, 2014). Realizing that most of these devices lack AV software and that most email and web traffic accessed remotely bypasses inspection by firewalls and gateways, attackers are now designing phishing attacks and other email exploits to be triggered during non-business hours (Romer, 2014). Lost Devices: Shows that on average, a cellphone is lost in the US every 3.5 seconds.1 Even if a lost smartphone or tablet does not contain confidential data, it still might include apps or cached credentials that make it easier for criminals to infiltrate an enterprise network (Romer, 2014). As workers begin carrying more devices, the likelihood of them losing devices only increases (Romer, 2014). Risky file sharing: shows that to ensure all their devices have the files they need, employees often try out one or more file-sharing services, including free but risky file-sharing apps that run on public clouds (Romer, 2014). Unfortunately, these services, though popular, are usually not secure enough to be trusted with enterprise data (Romer, 2014). Conclusions with recommendations Overall, this study shows that organizations should be concerned about the security state of endpoint devices and the risks to which they are exposed. In addition, key loggers, malware and cyber-attacks have greatly increased the potential for unauthorized access to, and information theft from, endpoints. Potential unintended consequences such as data leakage and malware reinforce the need to enhance the security of corporate data. In addition, to protect valuable information such as intellectual property, organizations need to make data security a top priority. To counter these sophisticated threats, organizations should employ a layered security strategy that provides necessary access to corporate information while minimizing risk and maintaining compliance (Privacy Right, 2013). When it comes to sensitive information, the focus must go beyond authorized and unauthorized users and extend data protection from storage through transport to delivery on the endpoint to prevent sensiti ve data loss (Privacy Right, 2013). Organizations also need to stop making a distinction between devices in the corporate network and devices outside of it, and focus instead on protecting their information (Privacy Right, 2013). They must compartmentalize access to sensitive information, employ better audit logging and log analysis, and deploy security solutions that are designed to support current BYOD strategies, such as those that can control the replication of data (Privacy Right, 2013). In conclusion, organizations must now readdress their corporate policies to ensure that their greatest asset information is being safeguarded on these mobile devices that are outside of their direct control (Gatewood, 2012). References Singh, Niharika. B.Y.O.D. Genie Is Out Of the Bottle Devil Or Angel Journal of Business Management Social Sciences Research (JBMSSR) ISSN No: 2319-5614 Volume 1, No.3, December 2012 Bradley, Tony. Pros and Cons of Bringing Your Own Device to Work. PCWorld. PCWorld, 21 Dec. 2011. Web. 17 Dec. 2016. Privacy Right. Bring Your Own Device (BYOD) . . . at Your Own Risk | Privacy Rights Clearinghouse. Privacy Rights Clearinghouse, 1 Sept. 2013. Web. 17 Dec. 2016. . Morrow, B.BYOD security challenges: Control and protect your most sensitive data(2012) Network Security, 2012 (12), pp. 5-8. Romer, Hormazd. Best Practices for BYOD Security. Computer Fraud Security 2014.1 (2014): 13-15. Web. 17 Dec. 2016. Gatewood, Brent. The nuts and bolts of making BYOD work. Information Management Journal, Nov.-Dec. 2012, p. 26+. Academic OneFile, Accessed 17 Dec. 2016.

Friday, October 25, 2019

Jebus, king of Jews :: essays research papers

that demands actions, therefore, they often establish guidelines on how to avoid and handle sexual harassment. However, some companies still do not appear to have sexual harassment regulations or at least not publicly accessible ones. One of these companies is Firestone. It seems as though information about the recent tire recall is the only topic that one can access on it’s website or through emails. Nevertheless, an examination of the sexual harassment policies of other companies provides a basis for recommendations. EDS, Electronic Data Systems, serves as a good model in considering which rules are worth implementation. Kevin McFarling, Client Delivery Executive, sums up his company’s attitude toward sexual harassment: â€Å"Sexual harassment is not to be ignored. It is very serious and needs to be treated that way by all employees. It is inexcusable in any environment, let alone a professional one† (McFarling) EDS’s policy on sexual harassment is as follows: EDS does not tolerate sexual harassment or other lawful harassment in the workplace, whether committed by a co-worker, leader, client, contractor, suppliers, or anyone else. Actions, words, jokes or comments that are derogatory and based on any persons gender, race, ethnicity, sexual orientation, age, religion or disability will not be tolerated at EDS (Ethics and Business Conduct). In order to create a safe and welcoming environment for everyone affiliated with EDS, tasks and responsibilities have been assigned to all employees, including leaders. These tasks and responsibilities include reporting incidents and adhering to the EDS sexual harassment policy. Leaders have the extra responsibility of educating employees about sexual harassment. EDS also makes sure that training and materials are easily accessible to all employees. These informative materials can be obtained through the EDS Employee Relations and the EDS Office of Ethics and Business Conduct. Other companies should follow the example of EDS in educating their employees so they know that sexual harassment of any kind is not tolerated. Employees should be aware of what exactly constitutes as sexual harassment and avoid any activity that could be considered sexually offensive.

Thursday, October 24, 2019

Advancements of Tourniquets in the Iraqi War Essay

Background of the War The name of the Second Gulf War has often been referred with the Iraq War, which has begun from March 20, 2003 and is still deteriorating lives of millions of people in the Iraqi region of the world. In the year 2003, invasion of Iraq was led by the United States of America, and this war is still ongoing, which has affected the world adversely. Development of weapons of mass destruction was one of the main rationales that were presented by the government of the George W. Bush, as well as, his supporters in the form of different Democratic and Republican parties. (Danchev, pg. 62-65) According to the Bush government, allies and interests of the United States posed a threat from the development of abovementioned weapons by the Iraq. In the year 2003, it was claimed during the State of the Union Address by the President George W. Bush that there was no time to wait for the imminence of the threat from the Iraqi leader Saddam Hussein. However, such weapons were not found by the United States after the invasion of the Iraq. In order to support the decision of the Bush’s government, connection was made between the al-Qaeda and Saddam Hussein by the citing of their claims. (Murray, pg. 71-73)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Another reason for the invasion of Iraq   Ã‚  given by the George W. Bush was the democracy in the Iraq, which was necessary for the development, as well as, stability of the country due to the abuse that was being done by the government of the Saddam Hussein in the Iraq in terms of human rights before the invasion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Many forms have been observed in the casualties of the war in Iraq since March 2003 until present. In addition, great variation has been noted in the available information, as well as, its accuracy and validity regarding the occurrence of different types of incidents that have resulted in different types of casualties in the Iraq.   Even in the great variation, it is confirmed that the Iraq War has deteriorated and terminated thousands of lives and damaged houses and habitats of many lives in the region. One of the reasons of this deterioration was the opposition and criticism of the war by a number of experts, professionals, critics, and even the Americans. A range of serious health issues, as well as, mental disorders has been reported by many veterans of the Iraq War in the United States forces. Tumors, migraines, blood in urine, muscle pains, dysfunction of the sex, and a number of issues have been reported by the coalition forces in the Iraq. In this regard, utilization of radioactive depleted uranium has been found to be causing the abovementioned health issues and disorders in the coalition forces, which cannot be stopped during the war. Thus, the Iraq War has provided a number of serious losses to the United States government. (Murray, pg. 99-100) (Abrams, pg. 101-111) Over nineteen thousand casualties have been suffered by the military of the United States, as the fourth year started on March 19, 2006 during the war in Iraq. All these casualties included a broken leg, or a broken arm, which created a sense of fear and opposition in the Iraqi, as well as, American civilians. A number of American soldiers were sent to their homes with one leg, or one hand that changed their lives from their scratch. A soldier, who used to protect the country, now can look in the sky and dream of doing the same, while sitting on his wheel chair. This was the condition of many soldiers in the United States. (Danchev, pg. 50-52) This resulted in the hatred towards the Bush government, and towards the decision of sending American soldiers in the Iraq. (Abrams, pg. 91-101)   To help this kind of dreadful situation, the US Army started to provide their troops with a special kind of tool, a Tourniquet, which was designed to help the soldiers to save a limb thus saving their lives. What are tourniquets? To explain in simple words, a tourniquet is a piece of cloth and a stick, which is used to stop the flow of blood if a person faces emergency. These simple types of tourniquets were used in the 18th century. The exact and modern definition of a tourniquet is a device that works on the principle of compression and uses pressure to be applied on the wounded limb that blocks the circulation of blood in the specific area and prevents the flow of blood for a certain period. (Klenerman, pp. 33-36) With the advancement of technology and research, various types of tourniquets were introduced. Modern surgical types of tourniquets are being very popular because of their convenient mode of operation and availability. There are two types of tourniquets being used, one of the types uses a cloth or a piece or rubber and the other make use of gas to apply pressure. The number of limb-deprived soldiers was increasing day by day; to help solve this problem the US Army widened the use of tourniquets. (Abrams, pp. 40-44) Before the discovery of the highly effective tourniquet, the soldiers were using the basic field expedient tourniquet, which uses a cloth and stick to help control the flow of blood.   The Pentagon made every possible effort to provide every soldier present in Iraq with a standard tourniquet. The tourniquets were saving lives and the lives were stopped from being wasted unnecessarily. Data indicated that the soldiers that were not using the tourniquets and were not equipped with the tourniquets died, in a way, unnecessarily. In the year 2005, a newly designed tourniquet named as â€Å"The special operations Forces Tactical Tourniquet† (SOFTT) was issued to the soldiers in Iraq. This type of tourniquet was designed to be used using a single hand so that the soldier is able to apply the tourniquet all by him without needing any help. The SOFTT replaced the field expedient method. The field expedient method was also proving itself beneficial but SOFTT was even better. The number of casualties was also decreasing because SOFTT was also helping to save time. The SOFTT was reported to be very effective and useful in injuries that were hard to reach. The strap of SOFFT can be released completely and can be rethreaded; this allows it to be applied on limbs that are trapped. The SOFFT makes use of two latches, one is needed to provide effective use for the tourniquet while the other provides ability for securing the limb after the tightening..In order to use the SOFFT it is needed to be slide up on the limb and the pulling of the tail right after application. In order to be secure the screws must be tightened. The device remains in use until the bleeding is stopped. During these times another invention by US Army institute of surgical research came forth, which was the â€Å"Combat Application tourniquet† .This type uses a system of windlass with an internal band that provides pressure to the wounded limb. After tightening, the windlass is to be locked when the blood flow is stopped. A strap made of Velcro is then used to keep the windlass in place. The Combat Application Tourniquet (CAT) was tested in 2004 at the US Army institute of surgical research with the other eight tourniquets available in the â€Å"Tourniquet off† .It was marked as the most effective tourniquet and it topped the list . It was easy to use hence it was recommended for use in the army. CAT was placed on the top of the â€Å"TOP 10 GREATEST INVENTIONS THIS YEAR† by the Army in 2005. Before SOFFT and CAT were introduced, the tourniquets were being used but they included the conventional cravat and stick types’ .The soldiers during their training periods were taught to use the conventional types that belong to the American civil war period. An unfortunate incident, proving the significance of tourniquets occurred with an Army medic who was climbing to reach the helicopter in Baqoubah in Iraq when suddenly bullets seared through his left thigh. As he lay beside his helicopter, he took hold of a tourniquet inside his pocket and immediately slide it on to his wounded thigh and the tourniquet worked efficiently in stopping the bleeding. Hence, the device, which was once considered extremely low tech, ended up saving yet another life in this high tech world. (Klenerman, pp. 65-66) If USAISR had not created such an invention, there would have been no effective tourniquet. Tourniquets are still being used widely and they are proving to be functional when it comes to saving lives, since there is no useful device available on the battlefield to save lives. There is a great deal of increase in the use of tourniquets during the Iraq war. The tourniquet, which has gained immense popularity, is the CAT and is still in use by the soldiers until date. The CAT was also made available for use for the civilians. In case of extreme traumas, CAT can be used as a lifesaver. (Taliaferro, pp. 22-25) Now, the Army doctors state that the use of tourniquets in the battlefield cannot be dispensed and they are striving to design even better and modern tourniquets to facilitate self first aid on the battlefield. Conclusively, we have discussed that a device that works on the principle of compression and uses pressure to be applied on the wounded limb that blocks the circulation of blood in the specific area and prevents the flow of blood for a certain period has been referred as a tourniquet. It is a hope that this paper will help the students, professionals, and experts in the better understanding of the tourniquet, as well as, its significance in the Iraqi war. References Alex Danchev. (2005). the Iraq War and Democratic Politics. Routledge (UK). Irwin Abrams. (2003). the Iraq’s War and its Consequences. World Scientific. Leslie Klenerman. (2004). the Tourniquet Manual. Springer. William Hay Taliaferro. (1972). Medicine and the War. Ayer Publishing. Williamson Murray. (2003). the Iraq War. Harvard University Press.

Tuesday, October 22, 2019

A reflection report and why it is an important task

If your motive to be a good pupil you need acquire usage to proper manner to extenuate your defects for that you should hold good perceptual experience of your acquisition. In this instance we are utilizing different sort of tools and engineerings to measure pupil ‘s acquisition. Belbin, SWOT, Skills Audit, Study Skills questionnaire are few illustrations for acquisition tools and engineerings. In this study I am traveling to show my experience with these acquisition tools and engineerings. It will be included my strength, failing, chances I have obtained to increase my surveies every bit good as what are the schemes I am traveling to utilize success my acquisition, what are the breaks for my development, how can I reassign my accomplishments for future calling. On the other manus I am traveling to happen how I can utilize these experiences with other faculty.What are my Strengths?Bing Prepared for Study Study accomplishments questionnaire show I have good betterments in prepared for survey. I have identified my personal resources. I am ever garnering thought from coachs and aged pupils. I have clearly identified what sort of resources do I need to success my academic surveies. Therefore I am reading books and newspapers, I am utilizing cyberspace every bit good as library for maintains this quality to send on. I have good thoughts who are the people and topographic points that I can utilize for better my surveies. It seems indecorous survey more helpful to being prepared for survey. Harmonizing Cottrell.S ( 2008, p12 ) Independent survey is â€Å" feature all university programmes. The sum and the sort varies from one programme to another † . Study skills questionnaire describe I have good understand about independent survey therefore I can file away my ain success by pull offing my surveies good. Information Technology Study Audit suggests I am good in information engineering. When I was following DNIIT ( sheepskin in national institute of information Technology ) I have used Microsoft office related assignments every bit good as I have good experience with other assortment of package. Today I am utilizing my old experience when I am making my academic acquisition in Northumbria University. So it helps me to make my assignments and everything much easy. Referencing Study accomplishments questionnaire describe I have good thought when I am making referencing for my academic authorship. That mean I have understood avoiding plagiarism. In this instance I am following â€Å" Cite them right † written by Richard Pears and Graham. It is positively impacting me to when I am making my assignment in my plan faculty. I know how to bring forth list of mention, understanding about mention beginning. I have got positive feedback from coach about my referencing for formative assignment in undertaking direction faculty. Team Worker Belbin trial consequence shows I am a good squad worker when I am working in a group. By and large most schools and universities depend on persons but late they more sing bettering pupils accomplishments when they are work as a group. It is call as ‘people accomplishments ‘ or ‘interpersonal accomplishments ‘ . Cottrell.S ( 2008, p93 ) . As a squad worker I have had good experience in my school life. It could assist me to pass on with each other ‘s and take others ideas into my group every bit good as I can promote members in my group. I can portion my cognition, thoughts among the group members besides I can promote them, I can listen them eventually I can pull off my group into success.What are my Failings?Organization of larning Kennedy. J ( 2005, p6 ) pointed out â€Å" planning and forming your clip expeditiously enables you to interrupt up long periods of academic survey into realistic and accomplishable aims † . Skill Audit finds I am hebdomad with organisation of larning. I have n't program for my surveies ; I have n't good organized my talk notes. In some instance it severely effectual when I am subjecting my assignments, when I am traveling for my talks and when I am confronting to exam. Time Management Study accomplishments questionnaire find I have less ability to pull off my clip. It seems I am off from commanding my ain clip, much clip take to finish undertakings, no clip to liberate. I am non utilizing clip tabular array for my twenty-four hours to twenty-four hours works that makes me problem with my assignments deadline. I m non schedule my academic undertakings. Study kills questionnaire and SWOT shows I did non understand demand of clip direction. Revision and test techniques Skills Audit suggests I want acquire more experience about alteration and test techniques. Revision we need for to recover of import information, theory and techniques that can utilize for our surveies ( University of Worcester, 2007 ) . This happened I have non utilize any past test documents. It seems I have n't good schemes for face scrutiny. For an instant I am weak planning clip and get bying with anxiousness in the test room.OpportunitiesIn my applied calculating plan I have to more chance to follow several sort of faculty it is conveying me more chances. Academic communicating This faculty is conveying me grade chances of better my academic authorship accomplishments. It is giving quit different experience with new written academic undertakings. Particularly it guides us to how to utilize English grammar and vocabulary suitably and avoiding plagiarism. Academic communicating faculty is giving right counsel for study authorship. It makes us much easy when we are making our surveies in other faculties. Undertaking direction Project direction is giving experience cognition to pull off single undertakings. It is give more chances project direction techniques and professional issues in industry. Planning, programming, estimating, hazard directions are most of import in this faculty. Therefore we are utilizing Microsoft Project as a personal computer based undertaking direction tool. It is more utile for my other faculty for mange the faculty undertaking by utilizing this faculty experience. Object-Oriented Modeling and Design In this faculty we are acquiring more experience about Object-oriented constructs and an object-oriented development procedure. To make this we are utilizing Unified Modeling Language as a methodological analysis. In this faculty we are larning to plan the structural and dynamic facets of information systems utilizing UML. Entrepreneurship and Small Business These faculties helpful to get down our ain concern without any others help. In this faculty we learn demands for startup little concern. It guides to how to construct up compressive concern program to success. We have another chance to acquire concern thoughts to success from top concern work forces because each and every hebdomad different concern work forces carry on our seminars.My schemes to get the better of failingI have already identified what are my strengths and what are my failings. If I need a success in my survey I have to keep my strength continuously I should hold good program to from my failings. aˆ? Schemes for organisation of larning I have identified I have n't good schemes to be after my surveies. Therefore I need to well program my surveies in each and every faculty we are acquiring coach notes so I need to set up so in to rectify order so it. My following suggestion is I want to give pull off my clip to make my assignments before to deadline. Some clip it will hard me to acquire utilize it because I am ever busy with my work. Schemes for Time Management In this instance I want to be cognizant of my clip in how is wanted to utilize that in proper manner. I suggest I want to do clip tabular array for my surveies. So that I want to be after and form my surveies for an illustration I can be after my academic semester or academic twelvemonth. After that I can look into out my program is working or non decently. It is more of import when I am working with deadlines. I think it is assist me to subject my assignments on clip. Schemes for Time Revision and test techniques To get the better of with this failing I need to read more books and I want more pattern to memorise everything I have studied. I suggest I can utilize my free clip to recover my surveies. I want to take drumhead and need to carefully travel through my talk note after my finish my talks to acquire rid of this failing. I hope to happen out base on balls test documents and travel through that before I face to exam. Some clip it is hard to me happen out exam base on balls documents related to my faculty. Otherwise it will easy for me.Events or people might suppress your developmentMy determination shows many events and people inhibit my development. Facebook is universe celebrated societal networking web site. I think I am exhausted my valuable clip with Facebook. In Facebook I am chew the fating with my friends, I am watching their updates every clip and watching others exposures. So it takes more than two hours per twenty-four hours. It is severely affect me to when I am traveling to my clip for surveies. Normally it takes two or more hours to fix our repasts that besides clip blowing and it cut down our survey clip. In my free clip and weekends I am watching athleticss events or a film or musical plans on Television. These events besides baldly affect to my development.Transportation accomplishments to for future calling aspirationsWe have two types of abilities that are learned abilities and natural abilities. Learned abilities are our accomplishments and natural abilities are our endowments. Transfer accomplishments are the accomplishments and abilities we have archived during any activity in our life ( occupation, categories, undertakings, avocations, athleticss ) . These abilities are more of import for your future calling. Learned abilities are skill you throughout in your life ( Leading Org Solutions, 2009 ) Therefore I am traveling to happen out few accomplishments that I can utilize for success my future calling aspirations. Each and every accomplishmen t we have that are really of import for our hereafter in here I traveling to discourse few of them. Forming work It is more helpful for your future calling. So I can work harmonizing to plane. I can utilize my experience to choose suited undertakings. I will be awareness about my work. It will helpful to complete my undertaking without any problem. Time Management Each and every undertaking we need to be a proper clip direction. In my future calling I hope to utilize my experiences for manage my well. Therefore I will be able to work with deadlines without holding any problems. Working with others In this accomplishment it helps me to work as a group. I can portion my cognition with them for archive marks. I can pull off group, I can promote them, I solve jobs, I can work with several people from a assortment of background.DecisionEach and every pupil ‘s aspiration is to be success in their instruction. Therefore self rating is most of import step pupil ‘s accomplishments. I think it is utile tools and engineering like Belbin, SOWT, Skills Audit, Study Skills questionnaire for step pupil ‘s accomplishments. These tools demonstrate you are in positive, what are the failings you should hold overcome. On other manus you have to be cognizant with your surveies that will assist you to understand what the chances you have got. Should hold right identified who are the people and what are the events suppress your development. It will assist you make your larning without blowing your clip. Finally it is truly of import you must hold right thought about reassigning you r accomplishments to you future calling. If you follow these stairss accuracy you will decidedly success in your acquisition.

How to Easily Get Iron Out of Your Breakfast Cereal

How to Easily Get Iron Out of Your Breakfast Cereal ​Cold breakfast cereals are usually fortified with iron. What does the iron look like? Use this easy experiment to find out. It only takes about 15 minutes! What You Need 2-3 cups fortified cerealMagnetBowlSpoon or another utensilWaterBlender (optional)Napkin How to Get Iron from Breakfast Cereal Pour the cereal into the bowl or blender.Add sufficient water to completely cover the cereal (its not an exact measurement - you can add as much as you like as iron doesnt dissolve in water)Mash the cereal with a spoon or mix it with the water using a blender. The more finely ground the cereal is, the easier it will be to get the iron.Stir the magnet through the crushed cereal. Iron is heavy and will sink, so be sure to pay attention to the bottom of the bowl. If you used a blender, make sure you can get to the particles at the bottom of the jar.Look for the black fuzz or iron on the magnet. Its easiest to see the iron if you wipe the iron on a white napkin or paper towel. Mmmm Mmm Good!

Sunday, October 20, 2019

California has one of the most diverse societies of the world Essays

California has one of the most diverse societies of the world Essays California has one of the most diverse societies of the world Essay California has one of the most diverse societies of the world Essay Essay Topic: Back in the World Stories Chinatown A great number of ethically different groups are united in its diverse society which is still becoming even more diverse. It is even possible that in future the state wont have a majority ethnic group. For centuries people were arriving here from all over the world: European settlers, Gold Rush, Chinese immigrants in the nineteenth century. Japanese, Mexican, and Asian American groups enriched the states heritage after the immigration law was reformed in 1965. Nowadays Los Angeles and San Francisco metropolitan areas are the primary centres of new immigration.And all these people, people with different backgrounds, different motherlands, different religions, beliefs, moralities and traditions created a great country we call America, and a unique state in it California. Through the years people like me, people who came here from other world countries were actually creating a new culture, a mix of cultures of the whole earth. People define themselves through the culture associated wit h their country. A culture is an important piece of identity for each person of the world. With diverse cultures throughout the world, peoples lifestyles vary greatly. America is a unique combination of people because it has a mixture of everyones culture joined as the American culture.Families like mine who came to America in the beginning of the twentieth century did so not because they didnt love their motherland or didnt want to live there. The reason was different: they knew their future in influenced by communistic ideas China would not be so free and bright. From my parents and relatives I have heard stories about the past and the present of China, about its good and bad sides. Sometimes its difficult to understand why they left their homes, their friends and everything they had. At some moments I feel I belong there, to the country where my ancestors lived, to China which we simply left instead of living, working and fighting for its prosperity and well-being. Sometimes I fe el we are traitors who just let it go and ran away to look for a place where it is easier to survive and live. But having thought more about it I realized that America was a dream. I understood that It wasnt an easy step, however, to leave China. People clearly understood that life in America was going to be a battle for survival. America didnt want our immigrant ancestors. They had to live in cellars and shanties because of poverty and because for some reason they were considered bad for the neighbourhood. These living conditions bred sickness and early death. Their brogue and dress provoked ridicule; their poverty and illiteracy provoked scorn.Actually the Chinese people came when California needed people to work. The country was growing and it needed men able to do all the heavy work of building bridges, canals, and railroads. It was hard and dangerous work but desperation drove foreigners to these jobs.Not only men worked, but women too. They worked as chamber maids, cooks, and children caretakers. Early Americans disdained this type of work, fit only for servants.But not only the Chinese were coming to California. Many people in California came from Mexico or other parts of Latin America, some are from Asian nations. For example, there was time when Mexican workers passed freely over the border each season to work in the Southwest of the state.Today illegal Mexican workers live in a fear being deported and dont seek social services (the only exceptions are emergency medical care and primary education). Its no coincidence that California recently passed a law requiring medical care providers and schools to deny services to illegal immigrants those are the only two social services they use (in spite of the contributions they make to the economy), because those 2 are the only ones theyre willing to risk deportation to use. Justice prevailed a federal court declared the law unconstitutional. (Vernellia R.)Surely, it is sad and you may form a negative opinio n about the state, but do not be too quick, for there is an enormous number of wonderful things, places and opportunities the state may offer to everyone. Californias attraction to immigrants is nothing new. Indeed, the first settlers to join the American Indians in California came not from Western Europe or the United States but from Mexico and Russia. The legacy of these and later immigrants is reflected in the Spanish missions and place names that abound throughout the state, in the Chinatowns and Little Tokyos that have long existed in the states major cities, in the origins of the wineries that spawned one of the states major industries, and in a tradition of farm labourers who have harvested the states abundant agricultural products. Indeed, if the United States can be described as a nation of immigrants, this statement is even more descriptive of California. (McCarthy ; Vernez)Nowadays our state is a mix of many cultures and each of us has some impact on the states developmen t. Personally I am thankful to this majestic land for everything it gave to me, for its freedoms, for our rights and opportunities. I have a great number of them to choose from: I can study at good colleges, I can get a good work, I have freedoms which the country and the state are presenting to me. And I am thankful even for an opportunity to live here and be a part of this nation.Sometimes I remember and think about all those people who many years or even centuries ago came to this land and created California as a state. They have done a great job. Today the state is one of the American cultural, economic, sports, business and political centres. Besides, I admire its rich and varied geography from Central Valley to Sierra Nevada, from Cascade Range to Tehachapi Mountains.In our state one can freely choose the religion he prefers to follow and have a plenty of opportunities to show ones talents working at Hollywood, for example. It is actually one of the many places of interest Ca lifornia may offer to visit to curious tourists. And not only to tourists: I also with pleasure visit the beautiful cities. Los Angeles, San Francisco, Long Beach They all are different and unique, each has its character, each attracts differently, but there would be no California without such places and, of course, without people living here.The states economy is one of the seven largest economies in the USA and it still continues to benefit from immigration. However, the magnitude of current flows and the disproportionate share of poorly educated immigrants combined with ongoing changes in the states economy have increased the costs of immigration to the states public sector and to some native-born workers. The state faces a growing challenge as it attempts to integrate these new immigrants while also trying to promote the welfare of the state and all its residents.Surely, California had many problems connected with new people coming to the state, but this has many good sides as well. People like me, people from all over the world came here, created and shaped the state and its culture, became Americans. We all are of different origins; we used to speak different languages. Each of us has own unique and complicated story and reasons which lead us here. What is in my opinion great about this state is that here we are not Chinese or Russian, Mexican or Iris, here we are Americans. And we should always remember that all of us are very different, but we should respect and understand it, for today we are a one united nation.

Saturday, October 19, 2019

Student Protest at Gigantic State University Essay

Student Protest at Gigantic State University - Essay Example Lastly, the whole demonstration by the students was a criminal act since it was not sanctioned by the university. Furthermore, the incident also had some elements of negligence since in the first instance, there were no security officers outside the offices of the president. The university is bound by law to protect its employees against any acts that may cause bodily and psychological harm or endanger their lives. As such, by not providing security to these offices, the university failed to protect Prudence and the president of the university. Additionally, the university security took a total of ten minutes before responding to Prudence’s call during which she underwent a horrifying experience. These instances show that the university was negligent in ensuring security for its employees, within its compound. Furthermore, Mr. Chandler could be held accountable for negligence seeing as he was asleep during the entire incident, whereby had he been awake at the time, then the ev ents herein would not have escalated the way they did. From the beginning the students abused their right to freedom of expression by engaging in violent conduct during the protests. Moreover, they did not use the legal channels in which to air their grievances. The students also broke the law through forced entry as well as trespassing in the offices of the president of the university. The students also violated the rights of Prudence and the university president by unlawfully detaining them in the offices. Furthermore, the university also broke the law in that it failed to protect Prudence; hence, it was in breach of their contract agreement. In terms of liability for the damages caused during the protest, the university should be held responsible for the mental damage on Prudence since the University, according to the law of liability, is responsible for any torts committed by its students in case of student protests which in this incident are classified under intentional torts a nd unintentional torts, in reference to negligence by the university. The university may also hold the student body liable for all the physical damages that resulted from their actions on that day. This incidence incurs several counts of both intentional torts and unintentional torts. The university is tortuously liable in the category of intentional torts, specifically assault and battery where the student leader knocks the phone and threatens to shoot her head off. Additionally, the university is also liable under the intentional torts for infliction of emotional distress which resulted in Prudence being unable to return to work for a week and is now dependent on tranquilizers. The president of the university could also sue the institution and the students for unlawful imprisonment. In the category of unintentional torts, the university is liable for negligence since it failed to provide security for both Prudence and the university president while the security officers did not re spond on time after Prudence’s distress call. Moreover, both Mr. Chandler and the University are liable under the unintentional torts with reference to negligence arising out of the fact that Mr. Chandler was asleep during the entire incident. Court Brief Facts Students held an illegal demonstration in President Chandler’

Friday, October 18, 2019

LED-Based Stage Light Capable of Control via DMX512 Dissertation

LED-Based Stage Light Capable of Control via DMX512 - Dissertation Example DMX is an acronym of "Digital Multiplexing†. The DMX founded lighting control is premeditated to create, organize and dispense information to DMX-well-suited lighting fixtures. DMX512 is a regular reference for digital communication arrangements that are usually utilized to direct stage illumination and special effects. It was initially proposed as a standardized plot for scheming light dimmers, which, earlier to DMX512, had used assorted unsuited, proprietary procedures. Conversely, it later became the chief technique for connecting not only controllers and dimmers, but also supplementary sophisticated fixtures and special effects strategies for example fog machines and automated lights and has also extended to implications in non-theatrical architectural illumination; DMX512 has been utilized starting from the beauty of Christmas lightening to billboards which are electronically operated through LEDs. Microcontrollers are utilized in routinely manipulated products and applian ces, for example vehicle engine management systems, operational medical appliances, distant controls, office equipment etc. By minimizing the dimension and expenditure evaluated against a design that utilized a detached memory chip, memory, and input/output accessories, microcontrollers formulate it reasonable to electronically organize extra appliances and processes. In this project, the intended objective is to design a system of illuminating stage LEDs controlled by DMX 512. The same protocols as defined by DMX 51 are employed in this project. TABLE OF CONTENTS Number Topic Pages 1 Introduction 1 2 Project Aim 2 3 Project Approach 2-3 4 Operating Components 4 i. Serial UART 4-5 ii. USART Registers 5-11 iii. HyperTerminal 11-12 iv. USB-RS485 Board 13-16 v. RS485-ATMEGA8 Board 17-19 vi. LEDs 19-21 5 Software Implementation 22-23 6 Conclusion 24 Bibliography 25 1. Introduction DMX in general is a mechanism of scheming "smart" lighting fixtures and dimmers. Technically, DMX is a furt her contraction for DMX512-A, updated by Entertainment Services Technology Association abbreviated as the ESTA. DMX512-A is the Standard for controlling illumination equipment and connected appliances.1 In current years, the DMX customary is being utilized more commonly in Architectural illumination projects, as well as lightening of building outer walls, inflection lighting, wide-ranging usage building organization and housing lighting. This is appropriate chiefly to the elevated fame of LED founded on lighting fixtures, which are commonly manipulated through DMX electronic pointers. An extensive diversity of illumination control consoles, manipulators and additional appliances that produce DMX signals can be utilized to attach to an even better diversity of illumination fixtures and appliances that can be manipulated by DMX. DMX manipulated lighting schemes are utilized in many specialized events, for example concert illumination, stage automated lighting, studio lights, and theme park illumination etc. In this project, three colors i.e. RGB-Red, Green, and Blue LEDs are utilized where each region is applicable to all three colors. The DMX manipulator regulates the strength i.e. in intensity of each of these colors so that any required color can be formed. One or more LED drivers are concentrated on to exclusive DMX channel, and those drivers, against the DMX channel instructs, put the intensity value of the LEDs they control. 2. Project Aim The project aims to devise a stage-style light which utilized LEDs as the light resource and is alterable by means of the standard DMX512 protocol, and is competent of producing a variety of output colors. The major endeavor of this project is to organize the color of LED radiance through a DMX controller. The DMX controller discussed in this project is entirely automated through a computer. A simple logic of a program is also founded during the project. 3. Project Approach DMX is separated into four sectors or zones in which every sector comprises of

International Ethics Essay Example | Topics and Well Written Essays - 3750 words

International Ethics - Essay Example military found themselves in a similar position, and Somalia became, quite explicitly, a guinea pig for 'humanitarian intervention' in the 'new world order.' Even though the military-humanitarian intervention failed, the precedents in international practice that it set still stand, and there are many who now seek to return to the ideas of a more aggressive international policing role for the United Nations." Here it is the case of not only unequal distribution of wealth but also the lack of necessities that initiated the disturbance and finally conspiracy theory made a situation that is ripe for international intervention putting the face of 'relevance in democracy and self determination'. The self determination is a mockery in this intervention as the intervention was a result of lack of unity and intactness in the society. When these are absent one cannot think of irrelevance of democracy and self-determination as these two are the inherent qualities of a democratic and self-determined state. The NATO air strikes against Yugoslavia beginning on March 24, 1999 did not occur in a vacuum but rather followed ten years of regional conflict and aggression inspired and orchestrated by Yugoslav President Slobodan Milosevic. Until 1991, Yugoslavia was one nation comprised of six republics: Slovenia, Croatia, Bosnia Herzegovina, Serbia, Montenegro, and Macedonia. Serbia was further divided into two autonomous regions; Kosovo and Vojvodina. Each republic and both autonomous provinces in Serbia had a seat on the federal presidency and had a considerable amount of autonomy in local affairs. With one notable exception--Bosnia--each of the republics roughly represents a distinct ethnic group. This situation itself presents a picture of fractured society where the relevance of democracy and self-determination cannot be discussed. Slobodan Milosevic came to power in 1987 with the rise of Serbian nationalism following the fall of the Berlin Wall and Soviet communism. He became a hero overnight in Serbia when in 1987 he went to Kosovo to qualm the fears of local Serbs amid a strike by Kosovo Albanian miners that were paralyzing the province. In a famous speech televised throughout Serbia, by telling the angry crowd of waiting Serbs that they will not be beaten again in response of the situation in which few Serbs were beaten in Kosovo. This speech engineered the splits in the society and shattered the norms of the democratic state. Instead of re-coursing to discussion which is the essence of the democracy the tactics of Milosevic made the people of his own country fight with each other and resulted in a battle that led to the attempts of ethnical cleansing. Here the conspiracy theory works as the dominating attitude prevails in the people dividing them ethnically and an intention to make other ethnic groups as s ubjects to them or eliminate them. This when assisted by the government support to one of the cabal (Serbians) resulted in civil war. The structure and essence of democracy itself was made a scapegoat in the quest for supremacy over the others. The theory of the leaders like Milosevic worked due to the mal-intentions of the people of his type. When people believe in the words of the leaders that try to divide the nation the intention of being intact as a nation was being absent and that affects international policy of the nation and on the nation. This makes a Country to disintegrate, which was the inherent intention

See instructions Essay Example | Topics and Well Written Essays - 250 words - 2

See instructions - Essay Example This mostly occurs to most electronic products such as DVD players, refrigerators and LCDs. Again, the new product should have better attributes than the previous one for it to sell. In triability, we include products such as shampoo and lotion while with observation are products like clothes and shoes. The product life cycle in marketing is used in order to determine changes in marketing solutions. In the maturity stage, sales are normally reduced due to competition of the same products. This is the second last stage in the product life cycle. The following three categories of product should therefore be reinvented: Product pricing, product distribution and promotions. Effective marketing emphasizes on these categories due to reasons such as; customer satisfaction when it comes low prices of purchasing these products ( pride & feral 2008). Prices set for these products should not be too high such that the customers can not afford or even too low. Besides, distribution of the products ensures that they reach the target customers in a timely manner. Product promotion is also essential in marketing because this strategy promotes more sales and encourages more customers in to the purchasing

Thursday, October 17, 2019

International finance Essay Example | Topics and Well Written Essays - 4000 words

International finance - Essay Example Key estimating is focused around a recorded relationship and different financial variables and later focused on swapping scale, utilising relapse dissection, a settled measurable technique. many course readings portray the utilisation of the business sector based estimates inside the connection of efficient markets approach in which either present spot or future rates are the best indicators of tomorrows conversion standard (for an incredible examination see Eun and Resnick, pp. 149-150). This paper proposes undertaking obliging understudies to gauge the future estimation of an outside coin utilizing a central forecasting model. By the by, a standout amongst the most-disputable issues in the global money making concerns writing concerns the part and helpfulness of conventional financial essentials in clarifying conversion scale conduct. Meese and Rogoff (1983) inferred that monetary models could not beat a proficient markets theory. Goodman (1979) addressed the estimation of financial turned outside swapping scale-determining administrations. Levich (1982) assessed the exhibitions of 13 gagging administrations utilising the forward swapping scale as a benchmark. In a later study, Eun and Safherwal (2002) assessed the estimating exhibitions of 10 real business banks utilizing the spot conversion standard as a benchmark. In both studies, anticipating administrations overall neglected to beat business sector based rates. Albeit some of these administrations might not ha ve been giving estimates built singularly with respect to financial basics, this is a striking conclusion. Business area based standards are adequately accessible and cost less while anticipating administrations charge an expense. Major models, on the other hand, do have their supporters particularly as the gauge skyline stretches. It is contended that these estimates may be valuable under specific conditions and for particular corporate purposes. Gordon

No child left behind Act Essay Example | Topics and Well Written Essays - 500 words

No child left behind Act - Essay Example The also mean to servechildren with disabilities, those who originate from low revenue families, and even those entrenched with ethnic and racial propagations. The NCLB act was put into legislation on January 8, 2008 and signed by President George Bush. The sole aim of NCLB is to increase the reach of the national government into the management of both international and local schools and as well raise the stakes for states, districts, and schools. The increases funding for the specific schools that serve poor students, decrees ‘highly qualified’ teachers for every classroom, and consequently holds all schools that receivenational funds answerable to raising the success of all students (Hackett 2011). Education is the proficiency and capability of developing children’s reasoning ability and how they adapt to the curriculumthey are subjected to. This is what the federal government has tried to achieve in the No Child Left Behind act where the main objective was to change the nature of curricula public schools use. In essence, the latter compelled former President Lyndon B. Johnson, on April 11, 1965 to signing the Elementary and Secondary Education Act. The then united President, Lyndon B. Johnson declared, â€Å"I believe deeply no law I have signed or will ever sign means more to the future of America† (Cunningham & Redmond 2009). In any case, the act signaled the start of more policies that would effectively identify the role of the Federal government in impacting child growth and education. However, this still leaves the question of â€Å"is the NCLD act improving the quality of teaching?† Well, the act deludes off the blame of poor child performance on teachers but only requires â€Å"highly qualified† teachers in every classroom by the academic year 2005/2006. For this case, â€Å"highly qualified† teachers are defined as those who hold a bachelor’s degree, are certified or licensed by

Wednesday, October 16, 2019

See instructions Essay Example | Topics and Well Written Essays - 250 words - 2

See instructions - Essay Example This mostly occurs to most electronic products such as DVD players, refrigerators and LCDs. Again, the new product should have better attributes than the previous one for it to sell. In triability, we include products such as shampoo and lotion while with observation are products like clothes and shoes. The product life cycle in marketing is used in order to determine changes in marketing solutions. In the maturity stage, sales are normally reduced due to competition of the same products. This is the second last stage in the product life cycle. The following three categories of product should therefore be reinvented: Product pricing, product distribution and promotions. Effective marketing emphasizes on these categories due to reasons such as; customer satisfaction when it comes low prices of purchasing these products ( pride & feral 2008). Prices set for these products should not be too high such that the customers can not afford or even too low. Besides, distribution of the products ensures that they reach the target customers in a timely manner. Product promotion is also essential in marketing because this strategy promotes more sales and encourages more customers in to the purchasing

Tuesday, October 15, 2019

No child left behind Act Essay Example | Topics and Well Written Essays - 500 words

No child left behind Act - Essay Example The also mean to servechildren with disabilities, those who originate from low revenue families, and even those entrenched with ethnic and racial propagations. The NCLB act was put into legislation on January 8, 2008 and signed by President George Bush. The sole aim of NCLB is to increase the reach of the national government into the management of both international and local schools and as well raise the stakes for states, districts, and schools. The increases funding for the specific schools that serve poor students, decrees ‘highly qualified’ teachers for every classroom, and consequently holds all schools that receivenational funds answerable to raising the success of all students (Hackett 2011). Education is the proficiency and capability of developing children’s reasoning ability and how they adapt to the curriculumthey are subjected to. This is what the federal government has tried to achieve in the No Child Left Behind act where the main objective was to change the nature of curricula public schools use. In essence, the latter compelled former President Lyndon B. Johnson, on April 11, 1965 to signing the Elementary and Secondary Education Act. The then united President, Lyndon B. Johnson declared, â€Å"I believe deeply no law I have signed or will ever sign means more to the future of America† (Cunningham & Redmond 2009). In any case, the act signaled the start of more policies that would effectively identify the role of the Federal government in impacting child growth and education. However, this still leaves the question of â€Å"is the NCLD act improving the quality of teaching?† Well, the act deludes off the blame of poor child performance on teachers but only requires â€Å"highly qualified† teachers in every classroom by the academic year 2005/2006. For this case, â€Å"highly qualified† teachers are defined as those who hold a bachelor’s degree, are certified or licensed by

Criminal Justice Process Essay Example for Free

Criminal Justice Process Essay Juveniles are not extended the right to a jury of their peers. What is the most significant reason why this right is not extended to juveniles? Please explain in detail why you chose that particular reason. I do not think that there is only one significant reason as to why juveniles are not extended the right to a jury of their peers. I think that one of the multiple reasons for this right not being extended is because a jury has to be able to be responsible enough to actually show up, they have to be able to convict or not convict based on evidence beyond a reasonable doubt and be able to disregard any evidence or statements when a judge asks them to. I do not think that most juveniles are mentally, nor emotionally equipped to do deal with the responsibilities of being a part of a jury. Most juveniles are still immature and when someone’s life is at stake and their freedom can be taken away I do not think that having a â€Å"child† decide their fate is appropriate. Why do you believe that there are differences between the adult justice system and the juvenile justice system? Please explain in detail why you believe as you do? I believe there are differences between the adult justice system and the juvenile justice system because of the differences in age, experiences, knowledge, and maturity. The juvenile justice system focuses on the rehabilitation of the juvenile, whereas the adult justice system’s goal is to punish and obtain retribution for the crime(s) committed. Juvenile offenders are given sentences that seek to rehabilitate rather than punish. Some of the treatment options offered could include counseling and placement in juvenile institutions that were also created to help restore them. Adult offenders are given harsh sentences. The sentences given can include a fine and or incarceration in jail or prison. All of the sentences given are solely based on punishing the offender. The adult court system is primarily concerned with the offender paying for the damage that they have done to society and the courts isn’t interested in rehabilitating or trying to change the behavior of the offender. After reviewing this entire building in CJ Interactive, describe ways that you can use this interactive tool to improve your learning of criminal justice concepts. Describe in detail the ways you can use this tool to further your criminal justice education, identifying at least three specific ways you would use this tool. After reviewing the entire building in CJ Interactive, I was able to see how this tool will help my learning of criminal justice concepts. I am a visual and auditory learner and both of my learning styles are incorporated in the CJ Interactive tool. I was able to get a better understanding of many of the topics that we have discussed in class thus far. For example through this too I was able to get a better understanding of the differences between the adult and juvenile court systems as well as how crime is defined and measured. I will be able to use this tool as another way of learning and understanding the criminal justice system by using the glossary to learn the terms used to explain the criminal justice system and its process. I will also be able to use this tool to learn and understand the criminal justice system by utilizing the different ways information is given is given in CJ Interactive for example there are 14 buildings located in this learning tool and each building represents a different topic in criminal justice and gives us students access to different learning modules, myths and issues, simulation activities, homework and review, and glossary terms associated with each particular topic. I can see myself utilizing all of these resources as a way to better understand the criminal justice system, my assignments that I have to complete in class, and for me to just use to gain as much knowledge as I can about the different topics in criminal justice throughout my college career at Colorado Technical University.

Monday, October 14, 2019

Post Bureaucracy And Decentralisation In Intensive Competition Management Essay

Post Bureaucracy And Decentralisation In Intensive Competition Management Essay Organisational structure is critical to a companys effectiveness of performance, and organisational structure varies according to companies unique contexts. Since 1980s, a growing literature has argued that the age of bureaucracy has ended or is ending, and there is a fundamental move beyond bureaucracy (Heckscher, 1998, p.2). We are moving from bureaucracy to post-bureaucracy. Generally speaking, post-bureaucracy includes subcontracting, decentralisation, flexible organisational boundaries, the boundaryless corporation and networking (Ackroyd, 1991). Since decentralisation is a very important part of post-bureaucracy, I will explain it separately. There are many factors that drive organisational structure from bureaucracy to post-bureaucracy, such as fast technological change, intensive competition, rapidly changing product markets and customer demands, and the requirement of flexibility. Cost reduction is also an important factor to trigger this trend. However, this trend also generates some concerns and criticism. For subcontracting, there may be insufficient supply of suitable workers; inconsistency of workflow may lead to inflexible which is against the flexible feature of post-bureaucracy; it will also enlarge the pay difference between core workers and periphery workers; there may be also lower level of products or services provided; and it can resul t in inefficiency of teamwork. Temporary workers tend to move between companies according to the pay and benefit levels. Because of this high flow of workforce, companies may resist to train employees. It will also be more difficult for unions and government to regulate such decentralised forms. In this paper, I will first talk about the definition of post-bureaucracy and decentralisation; then I will explain the reasons why companies are fascinated about post-bureaucracy and decentralisation; and finally, I will discuss and evaluate concerns and criticism of such trend and their validity. Main Body What is Post-Bureaucracy and Decentralisation? Generally speaking, post-bureaucratic organisational structure is about moving away from bureaucratic organisational structure and it is about decentralisation, corporation and networking. Post-bureaucracy blurs the boundaries between companies and countries, and post-bureaucracy encourage interorganisational relationships which include strategic alliance, joint venture, outsourcing/ subcontracting, unilateral agreement and network organisation (Buchanan and Huczynski, 2004, p. 557-560). Post-bureaucratic organisational structure stresses spontaneity, empowerment, participation, decentralisation, flexibility, downsized and delayered, and team work between the organisation and its environment (Ackroyd, 2002; Maravelias, 2003). The autonomy existing in post-bureaucratic structure is much more than it is in bureaucratic structure. According to Heckscher and Donnellon (1994), in order to successfully build post-bureaucratic structure, there must be some trust because through this structu re, there will be many knowledge and information sharing, interaction and corporation. Unlike bureaucratic model which is about directing participants, post-bureaucratic structure requires persuading participants (Heckscher and Donnellon, 1994). One of the most obvious features of post-bureaucracy is subcontracting which means using agent temporary workers to complete specific tasks that used to be conducted by companies direct workers (Rees and Fielder, 1992). Post-bureaucracy means decentralised on many aspects of organisation; however, it does not mean that there is no domination at all (Josserand et al, 2006). No matter how decentralised an organisation is, it still requires some degree of control and hierarchies to make sure the company is on the right direction. Decentralisation means that companies give the power of decision-making to lower levels of groups (Schermerhorn et al, 1994). The lower levels of groups do not necessarily mean management groups; it can be any sub-units within the company. With the delegation, such groups can enjoy a degree of autonomy or independence (Mullins, 2005, p.1053). Decentralisation usually associated with fewer hierarchies, wider span of control and free flow of ideas (Mullins, 2005). Mullins also mentioned that there are many advantages of decentralisation, such as increased employees motivation, quick responsiveness to local changes and improved support services. Why are Post-Bureaucracy and Decentralisation fascinated? Companies are fascinated and apply more about post-bureaucracy and decentralisation because they have many advantages which contribute to the effectiveness of companies performance. There are many factors encourage companies to move from bureaucracy to post-bureaucracy. First, the fast change of technology requires companies to corporate and works together (Mayle, 2006). This is especially important for high-technology, innovation industries and telecommunication companies because technological change is more obvious in those industries. No matter how many highly skilled expertises a company has, there are always some technologies it cannot develop by itself or get access to. However, through corporation and networking, companies can share the latest information and technology-based knowledge. The wide variety of information allows people to conduct their jobs more effectively (Guetzkow, 1965). This is similar with DeGeuss idea of organizational learning which means organizations learn from each other and improve during the process of corporation (see Schneier, 1994). DeGeus argued that through organizational learning, it helps companies to better adopt and facilitate to dynamic change and then make improvement. Corporation and networking can also h elp companies to gain competitive advantages (Porter, 1996). This is true because each company has its own technological strength. If companies can share their own strength with others, there will be mutual benefits. If companies cannot follow the new technological change, they may either produce with higher cost or have lower productivity. Second, global and intensive competition requires companies to move towards post-bureaucracy, such as subcontracting and outsourcing. Because of the intensive competition, companies need to reduce production costs or improve productivity in order to stay in business and gain competitive advantages. The main reason that companies are using agencies is the requirement of reducing labour cost (Ward et al, 2001). There are a wide variety of outsourcing, such as technology services outsourcing (software, telecommunications et al) and business process outsourcing (accounting, logistics et al) (Offshoring Times, 2009). Companies can also outsource HR functions to reduce labour cost. For example, BP Amoco outsourced its human resource function to a US-based company-Exult; and Exult helped BP with almost all HR functions, such as training, employee relations and recruitment; and for the first year of their contracting, BP successfully cut its cost from US$350 million to $250 million (Pickard, 2000). The third reason is the rapidly changing product market and customer demands force companies to corporate with each other. Because of the rapid changing environment, companies need to adjust their production quickly and effectively. For example, Apple shares some internal information with its partners, such as software developers, sub-system supplies and dealers, and they work together to help Apple predict sales and adjust its production according to the prediction (Bahrami, 1992). Because of globalisation, business can be operated all over the world instead of limiting within a single country or a local area. It is costly and hard to start a new business in another area because regulation may be not the same as it is in home country, and customer preference may be different as well. However, if companies can adopt the strategy of joint venture, boundaries will not be a problem. Companies can also make good use of each others resources. For example, there was a joint venture between West European companies and companies in the ex-Soviet block. One party provided investment and experts, and the other provided labour and entry to the markets (Buchanan and Huczynski, 2004, p558). In this way, they shared their production factors as well as getting access to markets. For network and partnerships, such as strategic alliance, there are many advantages, such as more access to resources and diversity of perspectives (Sturtevant and Lange, 1996). Strategic alliance can help companies to share resources and work efficiently. For example, in 1991, IBM, Apple and Motorola conducted a project (PowerPC) together; during the project, IBM provided their RISC microprocessor technology to Motorola; and then Motorola produced high-speed PowerPC chips for both Apple and IBM (Bertrand, 1992 as cited in Sengupta et al, 1998, p27). Greater flexibility, risks-sharing and options-generating can be achieved through partnerships (Evans, 1982). Partnerships can also help companies to respond quickly to unexpected change and adjust to it more efficiently (Hart, 1937). Some argued that companies use subcontracting and outsourcing in order to weaken trade unions bargaining power (as cited in Wallis, 2000, p730). Trade unions generally focus their attention on a unionised direct workforce. Therefore, companies can take advantage of this feature and undermine trade unions bargaining power. According to Prowse and Turner (1996), during the 1984-5 strike on coal industry, NCB introduced subcontracting on some coal-site tasks in order to fragment workforce and undermine organised labour force power in coal industry. Through subcontracting and outsourcing, pressure from hard, dangerous or boring tasks can be decreased. For some highly repeated low-skilled tasks, such as switching buttons, the turnover rate is high; because this kind of tasks requires almost no knowledge about the company, so it is a good idea to use agency workers to reduce employees pressure. This is also the case for some dangerous and unhealthy jobs. For example, for some strong-noisy jobs, no matter how good the protection device is, it is still bad for workers hearing if it lasts for a long time. It is humanity to use different people for short times. This is even the case in hospitals. In the accident and emergency department, staffs pressure is high because working in this department requires speed, efficiency and it often associated with some bloody occasion (Purcell et al, 2004). If hospitals can outsource some jobs to professional agencies, jobs can be completed as well as reducing employees pressure. There are other reasons that attract companies to use subcontracting and outsourcing. Subcontracting give employers chances to get access to specialist skills unavailable within the company (Holmes, 1986). For example, according to RJB Mining representatives, through subcontractors, they can get workers with specialist skills to undertake discontinuous tasks (Wallis et al, 2000, p.729). For hi-tech industries, it is sometimes hard to find highly-skilled workers within local areas. For example, ICTUK, a company which provided computer service to client companies, found that it was hard to find employees with skills they needed; so, ICTUK used Indian agency that provided required employees from India to UK (Purcell et al, 2004, p712). Because tasks are different at different time, if the company keeps all skilled workers as direct workers, it will be costly. By using subcontractors, company can get needed workers as well as saving money. Another reason companies prefer to subcontractor s is that it will be cheaper through outsourcing. Since they are temporary workers, the rate of pay is usually lower than direct workers; and companies do not need to provide some benefits to workers from contracting companies, such as holiday pay (Rees and Fielder, 1992). By using subcontracting, companies can also avoid investment in the latest machines and tools, which can save companies lot money (Lorenz, 1998). In addition to that, workers from contracting companies can conduct tasks more quickly than companies direct workers because they tend to focus on specific areas and require little or no training on needed skills (Wallis et al, 2000). It is also believed that using subcontracting can help companies to avoid morale problems on laying off regular employees (Kalleberg, 2003). Problems and Concerns about Decentralisation and Post-Bureaucracy Although there are many advantages of post-bureaucracy and decentralisation, there are still concerns and problems; they are inefficiency of the supply of skilled workers, hard for contractors to recruit and keep employees, imbalanced treatment between core workers and periphery workers, less control of temporary workers and their work, hard for government and unions to regulate, not good for teamwork within companies, and training programs constraint. Criticism of post-bureaucracy happened mostly in subcontracting. For subcontracting, concerns and problems mainly come from three aspects-the supply of labour (contractors), the demand of labour (client companies) and the government and unions. It is argued that the contractor sometimes experience insufficient supply of skilled/suitable labour which can cause problems (MacKenzie, 2000). Mackenzie mentioned that the insufficient supply of skilled/suitable labour cause problems to both contractors and client companies. For contractors, if they do not have the skilled workers to satisfy other companies need, they will have bad reputation, and their business will endanger and encounter close down. For companies which want to use agencies, if they cannot find the suitable workers they want, and hard to recruit direct workers, they will either complete these tasks with bad quality or not complete these tasks at all. The other problem faced by contractors is that it is hard for them to retain employees from different levels. Temporary workers are quite fluid, and sometimes contractors are not able to provide people required by client companies; people who work as temporary workers tend to move to contractors who provide the best p ay rates (MacKenzie, 2000, p.715). It is not possible for contractors to offer the highest pay rate all the time, so it is difficult for them to keep skilled workers at different times. This is especially true when the product market is competitive. Purcell argued that within competitive market, specialist skilled workers are usually in high demand; and they often chose to work for contractors who offer the highest bidder or achieve employment flexibility that fits in with their preferences rather than the employers (Purcell, et al, 2004, p.713). Because of the feature of highly fluid labour force, contractors tend to restraint and avoid training programs (MacKenzie, 2000, p.718). Through BTs case, he argued that BTs loss of qualified workers discourage BT to train its employees because BT was afraid that workers might leave the company after training. BTs reaction is reasonable. Just imagine, if BT keeps training all its employees with whatever the latest market requires, BT will o f course get qualified skilled workers. But, because workers tend to move towards best pay and benefits provision, finally, BT may end up with loss of qualified workers, and at the same time, it may increase its competitors competitive advantage because competitors get the qualified workers that BT have trained. It is believed that the client companies also take risks during subcontracting. The most obvious one is that they cannot always get the employees they want. If companies rely on subcontractors as traditions, once there is insufficient supply of skilled workers, companies may feel hard to recruit qualified workers (MacKenzie, 2000, p.716). For employees who get the required skills do not mean that they will complete the tasks correctly and effectively. Therefore, even if companies get skilled workers, there is also the possibility that they may interrupt the workflow or project (Roque, 2009). Based on Roques own experience, subcontract workers sometimes make decisions without asking client companies which may cause problems because they do not know the companies very well; subcontractors may also miss their deadlines or break their contracts. If the outsourced tasks are part of the whole project, ineffectively completing of those tasks can affect the project as a whole. Whats more, if managers in client companies do not know how to effectively use subcontract workers, there will be also risks of completing tasks ineffectively (Lyytinen and Ropponen, 2000). It is also complained that using temporary workers can lead to less effective teamwork (Purcell et al, 2004, p.715). They argued that since temporary workers are from outside of the company, they know little about the companys culture and doing things differently from direct workers. Because there is no direct control or less control from client companies, the quality of products and services provided by subcontract workers is not guaranteed. During research conducted in hospitals, Purcell et al found that temporary agency staff can cause problems on quality control and continuity of patient care which add more pressure on regular staff in hospitals (2004, p. 718). If a company does not have any experience on decentralisation, decentralisation may not be helpful. For example, after applying decentralisation, t here will be small groups of workers; and those small groups may feel aimless or they may work towards wrong directions (Bahrami, 1992, p. 37). For government and unions, it is hard to regulate and intervene. According to Lorenz (1998), the agreements between contractors and client companies are never in written form except for the order form. Lorenz also argued that because of these incomplete contracts, they cannot use courts to resolve disputes; they can only solve disputes, misunderstandings and ambiguities through discussion until they agree with each other. Then, it will be harder for government to intervene in disputes happened between those two parties. The triangular relationships in employment are especially hard to handle (Deakin, 2001). Governments are trying to regulate subcontracts, and there is extra subcontract administration cost added to governments ordinary costs (Howell, n.d.). In addition, it is argued that through decentralization, some macroeconomic policies are harder to implement and finally decrease stability (Prudhomme, 1994). For unions, it is easier for them to organise stable direct workers; and the emergence of temporary work agencies give unions new challenges to organise and regulate this kind of labour force because most of those temporary worker are not stable, and they move between companies, even between industries (Heery, 2004). In addition to that, many skilled workers have left unions and become self-employed open shop workers or employees of specialty subcontractors (as cited in Perng et al, 2005, p.1). In this way, union membership will decline, and unions bargaining powers will be weakened. It is possible that decentralisation costs companies more. Because of the centralised structure, companies can allocate and distribute resources more centralised and effectively. According to Lyons and Bailey (1993), through decentralisation, cost advantages, such as economies of scale, may be diminished. One advantage of subcontracting is that it can foster work flexibility. However, this is not always the case. Based on MacKenzies study about telecommunication industry, because workloads were different at different times, number of temporary workers required was different as well (2000). Using subcontractors supposed to be flexible, but contractors were not satisfied by the inconsistency of workflows. Therefore, in order to achieve agreements, client companies tried to make forecasts about workloads and tried to stay with that. According to Atkinson and Meager (as cited in MacKenzie, 2000), the effort of trying to manipulate workloads was contravene the flexible feature of contracting. It is argued that pay and benefits for core workers within companies and periphery workers in contractor firms are not equal. According to Atkinson and Gregory (as cited in Wallis et al, 2000), Workers who stay in the company permanently are core workers, and they enjoy great pay and benefit packages, and they usually do not need to worry about unemployment; however, for the periphery workers (subcontracting workers, temporary workers, part-time workers and self-employed workers), their jobs are insecure. It is also argued that the pay rate on the same kind of job is different for core workers and periphery workers (Mangum et al, 1985; Kalleberg, 2003). It is unfair treatment. According to Callaghan and Hartmann, because of subcontracting, there is a two-tiered system of employment, which means that core workers have good pay, benefits, opportunities for training and job security; while peripheral workers have lower wages, no benefits, worked in low-skilled jobs with few training opp ortunities, and face significant job instability and insecurity (see Smith, 1997, p. 328). However, temporary workers are not always in worse conditions compare with core workers. Purcell et al (2004) stated that for some professional agencies, such as nurses, the hourly pay rate for temporary nurses was even higher than the NHS-employed average nurses. No matter whose pay rate is higher, generally speaking, there are imbalanced treatment on pay and benefits between core workers and peripheral workers. Conclusion Post-bureaucracy encourages subcontracting, decentralisation, corporation and network. Companies with post-bureaucratic structure usually have loose management style, wider span of control and fewer hierarchies. Therefore, there will be greater autonomy within company which motivate employees to take responsibilities and contribute more to the company. Decentralisation is part of post-bureaucracy, and it is about giving more power to lower levels of work units. Small units can thus respond quickly to instant changes. Post-bureaucracy and decentralisation attract organisations because of both outside and inside incentives. It is generally about either reducing production costs, improving productivity or get resources, knowledge, information and technologies that are not available within one company. Through subcontracting, companies can get different levels of skilled employees that are not available within companies. In this way, companies can adjust number of workers used according to market change and periodical workload. Companies can also avoid bad reputation of dismissing employees all the time. Through subcontracting, labour cost can also be decreased because temporary workers pay rate tends to be lower than direct workers. Contract workers usually complete tasks quickly because they are focus on specific areas and require little or no training. Through network and partnership, companies can get wider range of resources and information. Companies can also contribute its own strength to the same project in order to get the best result. Through partnership, companies can share risks on unknown or new areas and get a wide range of perspectives from experts. By learning from each other, companies can always follow the fast changing technology, product market and customer demand. Although there are so many fantastic advantages that attract organisations to move to post-bureaucracy, there are also concerns and problem associated with it, and most of the problems focus on subcontracting. The insufficient supply of skilled/suitable workers from contractors is a big problem for both contractors and client companies. Because of the insufficient supply, contractors may lose clients and get bad reputation; while for client companies, without these required workers, tasks cannot be completed. This insufficient supply mainly due to that temporary workers tend to move towards best pay and benefit provision. This phenomenon may also lead to companies restrain training programs. Through subcontracting, there is a danger that products/services may be provided in poor quality because of the limited control by client companies. In addition, many people complained about the imbalanced treatment between core workers and periphery workers. Generally speaking, on the aspects of pay rate, benefit package, training provision and job security, periphery workers are in worse condition compared with situation for core workers. Whats more, segmentation of workforce is also hard for government and unions to organise and regulate. According to the concerns and problems mentioned above, post-bureaucracy still has a long way to improve. Solutions can be provided based on the problems. Government and unions can make special rules for those labour; companies can keep several contractors instead of one in order to get needed workers all the time; client companies and contractors can try to balance core workers and temporary workers pay and benefit package together; and client companies can assign certain people from own companies to supervise subcontracting workers work, and make sure they are in good quality.