Monday, September 30, 2019

Chemistry of Anti-money Counterfeiting Technology Essay

I. Abstract Counterfeiting money is a big business for criminals. Nearly $70 million of fake currency gets used daily, costing consumers millions. In the present day, there are many new technologies that have been discovered and studied in order to help put counterfeiters out of business. Our currency is something that we must protect, which is why these technologies and discoveries are very important in the safety and development of our economy. The new generation of Philippine banknotes includes new and more advanced technology to ensure the safety of the genuine Philippine banknotes. This is to prevent money counterfeiting in our country. These new features include more advanced photo editing, which features micro printing on the different images and texts on the banknotes, a unique rough texture, a new system of serial numbering, advanced security fibers and security threads, watermark technology, and optically variable ink. These are the most advanced and efficient methods of preventing mon ey counterfeiting today. Provided in this paper is a detailed explanation and description of each security precaution and a detailed review of the methods used to execute them. II. Denominations of Currency The new generation Philippine banknotes composes of the denominations twenty, fifty, one hundred, two hundred, five hundred, and one thousand peso bills. The new twenty-piso bill honors President Manuel L. Quezon, the first President of the Republic of the Philippines on the front of the bill while the reverse shows the image of the breathtaking Banaue Rice Teraces and the Palm Civet from the Cordilleras. The fifty-piso bill commemorates President Sergio Osmeà ±a who led our country at the critical stage of World War II. The reverse shows an image of the Taal Lake, one of the world’s smallest active volcanoes and the Maliputo Fish. The one hundred-piso bill pays tribute to President Manuel Roxas who prioritized the crafting of the Central Bank charter then provided the leadership for the reconstruction of our country after the devastation of the Second World War. On the reverse, the near perfect cone-shaped Mayon Volcano and the Butanding or Whale Shark is also featured. The two hundred-piso bill features President Diosdado Macapagal who restored the celebration of Philippine independence on June 12. The reverse features the unique icon of Bohol, the Chocolate Hills and the Tarsier. The five hundred-piso bill is a salute to the champions of Philippine democracy, Senator Benigno Aquino Jr. and President Corazon Aquino. The reverse features the Puerto Princesa Subterranean River National Park. Finally, the one thousand-piso bill features three of our war heroes, Chief Justice Jose Abad Santos, Josefa Llanes Escoda, and General Vicente P. Lim. The reverse features the Tubbataha Reefs National Marine Park and the world famous South Sea Pearl. Figure 1 The money denominations come in specific color schemes of orange for the twenty-piso bill, red for the fifty-piso bill, violet for the one hundred-piso bill, green for the two hundred-piso bill, yellow for the five hundred-piso bill, and blue for the one thousand-piso bill. III. Security Features The Philippine Banknote or the Philippine Peso Bill finds the need to be current with the use of new technology to enhance the security of banknotes to remain impossible to replicate by criminals. The new generation Philippine banknotes incorporates the latest available technology in banknote security. This is the reason that they have developed new designs and upgraded the security features of all our banknotes. A. Photo Editing The Central bank of the Philippines uses a special photo editing software to ensure specific prints that are impossible to copy by criminals. Some of these specifications include nano prints on the images, lines, and words on the banknotes. B. Texture The note is not smooth to the touch, but a bit rough. This is because the bank notes are made of 80% cotton and 20% Philippine Abaca. Aside from that, the raised prints that are embossing from the Intaglio printing process give the bill a unique tactile feel. Intaglio printing is a printing technique in which the image is incised into a surface. Normally, copper (Cu) or zinc (Zn) are used, and the incisions are created by etching ot engraving the image. In printing, the surface is covered in ink and then rubbed vigourously with tartalan cloth or newspaper to remove ink from the surface, leaving it in theincisions. The very sharp printing obtained from the intaglio process is hard to imitate by other means. Intaglio also allows for the creation of latent images, which are only visible when the document is viewed at a very shallow angle. Figure 2 C. Serial Numbers The serial numbers are composed of one or two prefix letters and six to seven digits in asymmetric or increasing size. Serial numbers are not difficult to forge; yet they make banknotes easier to track and audit. Figure 3 D. Security Fibers The paper used to print our currency has tiny threads of fibers embedded into the paper. These red and blue fibers glow under ultraviolet light. If the bill has no red and blue fibers that glow, then it is probably a fake bill. Fluorescent marks are the invisible phosphor dyes on banknotes that glow under UV or blacklight. This glow will be visible under a money detector device. There are two kinds of security fibers. The first one is the visible security fibers. These are easily seen in current Philippine banknotes as the blue and red fibers that are randomly spread throughout the front and back of the paper. The other kind is the invisible security fiber. These glow a fluorescent yellow under ultraviolet light. Genuine security fibers in Philippine banknotes can be easily plucked out (yes, try it!) with the aid of a needle. Counterfeit money usually only prints the fibers on paper, thus they cannot be plucked out. Figure 4 E. Watermarks The watermark shows a shadowed image of the portrait and the banknotes’ denomination on the blank space when viewed against the light from either side of the bill. This is possible due to paper density variations. Figure 5 The word â€Å"Pilipino†, written in our ancient Filipino alphabet, Baybayin, can be seen in its complete form when the banknote is viewed against the light. F. Concealed Value When the banknote is rotated at a 45-degree angle and tilted downwards, we can see the concealed denominational value super imposed on the smaller version of the portrait. Figure 7 G. Security Threads Both the twenty-piso and the fifty-piso have a 2mm wide security thread that can be visible when viewed against the light. The one hundred, two hundred, five hundred, and one thousand-piso bills have a 4mm wide stich-like security thread embedded on the bill and when viewed from different angles, its color changes from red to green. The embedded security thread is a special thread vertically implanted off center of the note during the manufacture of the banknote paper. The front of the thread carries a clear text – the initials of the Bangko Sentral ng Pilipinas (BSP) and the numeric denomination of the bank note. The back of the thread is also printed with the initials BSP. There are two kinds of security threads. One is a thin aluminum (Al) coated and partly demutualized polyester film thread with microprinting, which is embedded in the security paper as banknote or passport paper. The other kind of security thread is the single or multicolor sewing thread made from cotton or synthetic fibers, mostly UV fluorescent, for the bookbinding of passport booklets. Figure 8 H. Optically Variable Device Patch The five hundred-piso bill and the one thousand-piso bill have the optically variable device patch, a reflective foil. For the five hundred-piso bill, it reveals the small BSP (Bangko Sentral ng Pilipinas) logo and the blue parrot, while the one thousand-piso bill reveals the small BSP logo and the South Sea Pearl inside a clam. The patches change color from red to green when the note is rotated 90-degrees. Figure 9 I. Optically Variable Ink A security feature exclusive to the one thousand-piso note is the optically variable ink for the embossed denomination value on the lower right corner on the face of the banknote, which changes color from green to blue when it is viewed in different angles. Color changing inks are inks containing pearlescent pigments that change color when viewed at a different angle. The color of the ink does not actually change, but the angle of the light to the viewer’s eye changes and thus creates the change in color. A number of types are available, including green to purple, gold to green and green to lilac. Optically variable inks (OVI) are very expensive inks applied on banknotes as a security feature. So far, only the 1000 peso bills have this. There are two versions of OVI printing on the 1000 peso banknotes. This is an excellent security feature because counterfeiters will need a lot of effort and money to replicate it. They are called optically variable inks because tiny flakes of color-shifting film are incorporated in the intaglio ink. Thus, prints of OVI change color when viewed from different angles.

Sunday, September 29, 2019

Assess Sociological Explanations of Changes in the Status of Childhood

Childhood is socially construted, this means it is only a human concept and the only reason that ‘childhood' exists is because society makes it that way. Over time childhood has changed as different norms and values over each century of life have been different and is still changing at present. Also in different places of the world there are different cultures and ethics so therefore their veiw of childhood will also be different. As Wagg (1992) states ‘Childhood is socially constructed.It is, in other words, what members of particular societies, at particular times, and in particular places, say it is. There is no single universal childhood, experienced by all. So, childhood isnt â€Å"natural† and should be distinguished from mere biological immaturity. ’ However childhood has not always been controlled like this as in pre-industrial times Aries (1960) argues that ‘the idea of childhood did not exist’ Soon after being weaned, the child entered wider society on much the same terms as an adult.However childhood has changed over time and as it says in Item A ‘The development of industrial society meant that children’s life’s were increasingly confined, disciplined, and regulated by adults’. In historical times law often made no distinction between children and adults and as Shorter (1975) argues that high death rates encouraged indifference and neglect, especially towards infants. Childhood is much different now as although neglect is still present, there are laws imposed to protect children, such as the 1989 Child Protection Act.The March Of Progress view would agree that childhood is better now than it was due to laws like this. According to sociologist Aries childhood gradually began to emerge from the 13th century onwards, as schools specialized more in teaching the young since the Compulsory Schooling Act 1880 was imposed leading children to become more educated as adults. This was thought to be the influence of the church as they started to see children as fragile ‘creatures of god’ in need of protection. Children’s clothing also began to change, as before there was no distinction between adults and children.However some sociologists have criticized Aries for arguing childhood did not exist in the past. Pollock (1983) for example argues that society in the middle ages simply had a different notion of childhood from todays. The ‘March Of Progress’ view argues that today children in western societies has been steadily improving and today it is better than it has ever been. Aries and Shorter both hold this view as they argue today’s children are more valued, better cared for, protected, educated, enjoy better health, and have more rights than those of previous generations.Due to this more ‘child centered’ society there are higher living standards and smaller family sizes which gives governments more money to offer free health care. However ‘The Conflict View’ with sociologists such as the Marxists and Feminists dispute this. They argue that society is based on a conflict between different social groups, such as social classes or genders. This view would see inequalities among children, as they still remain unprotected and badly cared for.Gender and ethnic differences may also occur as for example boys are generally allowed more freedom than girls, and also from Brannen’s (1994) study of 16-16 year olds found that Asian parents were more likely than other parents to be strict towards their daughters. There are also many class inequalities between children as according to Woodroffe (1993) children of unskilled manual workers are over three times more likely to suffer from hyperactivity and four times more likely to experience conduct disorders than the children of professionals.There are also major inequalities of power between children and adults. March of Progress writers argue that adults use this power for the benefit and protection of children, for example by passing laws against child labor. However, critics such as Firestone (1979) and Holt (1974) argue that this is an excuse for new forms of oppression and control. Neglect and abuse towards children still occurs in society today as it did in pre-industrial times. Adult control over children can take the extreme form of physical neglect, or physical, sexual, or emotional abuse.Some may say due to figures from charities such as Child Line rising there is a ‘dark side’ to family life, where children are victims. This shows in some cases the status of children hasn’t changed over time. Childhood has changed more in other ways such as parents have more control over children’s space as there is increasingly close surveillance over children in public spaces such as shopping centre’s, especially in times when they should be in school.However in contrast to this Katz (1993) describes how rural Sudanese children roam freely both within the village and several kilometers outside it. This shows that changes can still occur but not in some places of the world. Adults in today’s society also can control children’s daily routines, for example when they get up, go to bed, have breakfast, etc. Whereas in historical times this wouldn’t have been an issue. Adults exercise enormous control over children’s bodies including how they sit, walk, and run, what they wear, hairstyles etc. hereas in some non-industrial cultures this may not be an issue, and therefore giving children more freedom. Some sociologists such as Postman (1994) argue that childhood is ‘disappearing at a dazzling speed’ as he says by giving children the same rights as adults, the disappearance of children’s traditional unsupervised games, the growing similarity of adults and children’s clothing and even committing adult crimes lies in the ris e and fall of print culture and its replacement by television culture.This is evident as unlike the printed word, television does not require special skills to access it, and therefore make it available to everyone, including children and this also shows in Item A as it says ‘childhood and adulthood is once again becoming blurred’. Unlike Postman, Opie (1993) argues that childhood is not disappearing, based on a lifetime of research she argues there is strong evidence of the continued existence of a separate children’s culture over many years.Child liberationists argue that modern western childhood is oppressive and children today are subject to adult authority. Western notions are also being globalised, as international humanitarianism and welfare agencies have exported and imposed on the rest of the world. In this view childhood is not disappearing, but spreading throughout the world. Overall, there has been many changes in childhood and children’s statu s over the years, and is different in all parts of the world due to ethics and culture. Many sociologists have different viewpoints about childhood as a life stage.

Saturday, September 28, 2019

Organizational Ethics Essay

There are at least four elements which exist in organizations that make ethical behavior conducive within an organization. The four elements necessary to quantify an organization’s ethics are: 1) Written code of ethics and standards 2) Ethics training to executives, managers, and employees 3) Availability for advice on ethical situations (i.e. advice lines or offices) 4) Systems for confidential reporting. Good leaders strive to create a better and more ethical organization. Restoring an ethical climate in organization is critical, as it is a key component in solving the many other organizational development and ethical behavior issues facing the organization. From debates over drug-testing to analyses of scandals on Wall Street, attention to ethics in business organizations has never been greater. Yet, much of the attention given to ethics in the workplace overlooks some critical aspects of organizational ethics. When talking about ethics in organizations, one has to be aware that there are two ways of approaching the subject–the â€Å"individualistic approach† and what might be called the â€Å"communal approach.† Each approach incorporates a different view of moral responsibility and a different view of the kinds of ethical principles that should be used to resolve ethical problems. More often than not, discussions about ethics in organizations reflect only the â€Å"individualistic approach† to moral responsibility. According to this approach, every person in an organization is morally responsible for his or her own behavior, and any efforts to change that behavior should focus on the individual. But there is another way of understanding responsibility, which is reflected in the â€Å"communal approach.† Here individuals are viewed not in isolation, but as members of communities that are partially responsible for the behavior of their members. So, to understand and change an individual’s behavior we need to understand and try to change the communities to which they belong. Any adequate understanding of, and effective solutions to, ethical problems  arising in organizations requires that we take both approaches into account. Recent changes in the way we approach the â€Å"problem of the alcoholic† serve as a good example of the interdependence of individual and communal approaches to problems. Not so long ago, many people viewed an alcoholic as an individual with problems. Treatment focused on helping the individual deal with his or her problem. Today, however, the alcoholic is often seen as part of a dysfunctional family system that reinforces alcoholic behavior. In many cases, the behavior of the alcoholic requires that we change the entire family situation. These two approaches also lead to different ways of evaluating moral behavior. Once again, most discussions of ethical issues in the workplace take an individualistic approach. They focus on promoting the good of the individual: individual rights, such as the right to freedom of expression or the right to privacy, are held paramount. The communal approach, on the other hand, would have us focus on the common good, enjoining us to consider ways in which actions or policies promote or prohibit social justice or ways in which they bring harm or benefits to the entire community. When we draw upon the insights of both approaches we increase our understanding of the ethical values at stake in moral issues and increase the options available to us for resolving these issues. The debate over drug-testing, for example, is often confined to an approach that focuses on individual rights. Advocates of drug-testing argue that every employer has a right to run the workplace as he or she so chooses, while opponents of drug-testing argue that drug-testing violates the employee’s right to privacy and due process. By ignoring the communal aspects of drug abuse, both sides neglect some possible solutions to the problem of drug use in the workplace. The communal approach would ask us to consider questions which look beyond the interests of the individual to the interests of the community: What kinds of drug policies will promote the good of the community, the good of both the employer and the employee? Using the two approaches to dealing with ethical problems in organizations will often result in a greater understanding of these problems. There are times, however, when our willingness to consider both the good of the individual and the good of the community leaves us in a dilemma, and we are forced to choose between competing moral claims. Affirmative Action Programs, for example, bring concerns over individual justice into conflict with concerns  over social justice. When women and minorities are given preferential treatment over white males, individuals are not treated equally, which is unjust. On the other hand, when we consider what these programs are trying to accomplish, a more just society, and also acknowledge that minorities and women continue to be shut out of positions, (especially in top management), then these programs are, in fact, indispensable for achieving social justice. Dropping preferential treatment programs might put an end to the injustice of treating individuals unequally, but to do so would maintain an unjust society. In this case, many argue that a communal approach, which stresses the common good, should take moral priority over the good of the individual. When facing such dilemmas, the weights we assign to certain values will sometimes lead us to choose those organizational policies or actions that will promote the common good. At other times, our values will lead us to choose those policies or actions that will protect the interests and rights of the individual. But perhaps the greatest challenge in discussions of ethics in organizations is to find ways in which organizations can be designed to promote the interests of both. Organizational ethics are the principals and standards by which businesses operate, according to Reference for Business. They are best demonstrated through acts of fairness, compassion, integrity, honor and responsibility. The key for business owners and executives is ensuring that all employees understand these ethics. One of the best ways to communicate organizational ethics is by training employees on company standards. Uniform Treatment One example of organizational ethics is the uniform treatment of all employees. Small business owners should treat all employees with the same respect, regardless of their race, religion, cultures or lifestyles. Everyone should also have equal chances for promotions. One way to promote uniform treatment in organizations is through sensitivity training. Some companies hold one-day seminars on various discrimination issues. They then invite outside experts in to discuss these topics. Similarly, small company managers must also avoid favoring one employee over others. This practice may also lead to lawsuits from disgruntled employees. It is also counterproductive. Social Responsibility Small companies also have an obligation to protect the community. For example, the owner of a small chemical company needs to communicate certain dangers to the community when explosions or other disasters occur. The owner must also maintain certain safety standards for protecting nearby residents from leaks that affect the water or air quality. There are state and federal laws that protect people from unethical environmental practices. Business owners who violate these laws may face stiff penalties. They may also be shut down. Financial Ethics Business owners must run clean operations with respect to finances, investing and expanding their companies. For example, organizations must not bribe state legislators for tax credits or special privileges. Insider trading is also prohibited. Insider trading is when managers or executives illegally apprise investors or outside parties of privileged information affecting publicly traded stocks, according to the Securities and Exchange Commission. The information helps some investors achieve greater returns on their investments at the expense of others. Executives in small companies must strive to help all shareholders earn better returns on their money. They must also avoid collusive arrangements with other companies to deliberately harm other competitors. Considerations A small company’s organizational ethics can also include taking care of employees with mental illnesses or substance abuse problems, such as drug and alcohol dependency. Ethical business owners help their employees overcome these types of problems when possible. They often put them through employee advisor programs, which involves getting them the treatment they need. Employees may have issues that lead to these types of problems. Therefore, they deserve a chance to explain their situations and get the help they need. Business Ethics Perhaps the most practical approach is to view ethics as a catalyst that causes managers to take socially responsible actions. The movement toward including ethics as a critical part of management education began in the 1970s, grew significantly in the 1980s, and is expected to continue growing.  Hence, business ethics is a critical component of business leadership. Ethics can be defined as our concern for good behavior. We feel an obligation to consider not only our own personal well-being but also that of other human beings. This is similar to the precept of the Golden Rule: Do unto others as you would have them do unto you. In business, ethics can be defined as the ability and willingness to reflect on values in the course of the organization’s decision-making process, to determine how values and decisions affect the various stakeholder groups, and to establish how managers can use these precepts in day-to-day company operations. Ethical business leaders strive for fairness and justice within the confines of sound management practices. Many people ask why ethics is such a vital component of management practice. It has been said that it makes good business sense for managers to be ethical. Without being ethical, companies cannot be competitive at either the national or international levels. While ethical management practices may not necessarily be linked to specific indicators of financial profitability, there is no inevitable conflict between ethical practices and a firm’s emphasis on making a profit; our system of competition presumes underlying values of truthfulness and fair dealing. The employment of ethical business practices can enhance overall corporate health in three important areas. The first area is productivity. Milton Friedman. The employees of a corporation are stakeholders who are affected by management practices. When management considers ethics in its actions toward stakeholders, employees can be positively affected. For example, a corporation may decide that business ethics requires a special effort to ensure the health and welfare of employees. Many corporations have established employee advisory programs (EAPs), to help employees with family, work, financial, or legal problems, or with mental illness or chemical dependency. These programs can be a source of enhanced productivity for a corporation. A second area in which ethical management practices can enhance corporate health is by positively affecting â€Å"outside† stakeholders, such as suppliers and customers. A positive public image can attract customers. For example, a manufacturer of baby products carefully guards its public image as a company that puts customer health and well-being ahead of  corporate profits, as exemplified in its code of ethics. The third area in which ethical management practices can enhance corporate health is in minimizing regulation from government agencies. Where companies are believed to be acting unethically, the public is more likely to put pressure on legislators and other government officials to regulate those businesses or to enforce existing regulations. For example, in 1990 hearings were held on the rise in gasoline and home heating oil prices following Iraq’s invasion of Kuwait, in part due to the public perception that oil companies were not behaving ethically. ACODE OF ETHICS A code of ethics is a formal statement that acts as a guide for how people within a particular organization should act and make decisions in an ethical fashion. Ninety percent of the Fortune 500 firms, and almost half of all other firms, have ethical codes. Codes of ethics commonly address issues such as conflict of interest, behavior toward competitors, privacy of information, gift giving, and making and receiving political contributions. According to a recent survey, the development and distribution of a code of ethics within an organization is perceived as an effective and efficient means of encouraging ethical practices within organizations. Business leaders cannot assume, however, that merely because they have developed and distributed a code of ethics an organization’s members have all the guidelines needed to determine what is ethical and will act accordingly. There is no way that all situations that involve decision making in an organization can be addressed in a code. Codes of ethics must be monitored continually to determine whether they are comprehensive and usable guidelines for making ethical business decisions. Managers should view codes of ethics as tools that must be evaluated and refined in order to more effectively encourage ethical practices. CREATING AN ETHICAL WORKPLACE Business managers in most organizations commonly strive to encourage ethical practices not only to ensure moral conduct, but also to gain whatever business advantage there may be in having potential consumers and employees regard the company as ethical. Creating, distributing, and continually improving a company’s code of ethics is one usual step managers can take to establish an ethical workplace. Another step managers can take is to create  a special office or department with the responsibility of ensuring ethical practices within the organization. For example, management at a major supplier of missile systems and aircraft components has established a corporate ethics office. This ethics office is a tangible sign to all employees that management is serious about encouraging ethical practices within the company. Another way to promote ethics in the workplace is to provide the work force with appropriate training. Several companies conduct training programs aimed at encourag ing ethical practices within their organizations. Such pro grams do not attempt to teach what is moral or ethical but, rather, to give business managers criteria they can use to help determine how ethical a certain action might be. Managers then can feel confident that a potential action will be considered ethical by the general public if it is consistent with one or more of the following standards: 1. The Golden Rule: Act in a way you would want others to act toward you. 2. The utilitarian principle: Act in a way that results in the greatest good for the greatest number. 3. Kant’s categorical imperative: Act in such a way that the action taken under the circumstances could be a universal law, or rule, of behavior. 4. The professional ethic: Take actions that would be viewed as proper by a disinterested panel of professional peers. 5. The TV test: Always ask, â€Å"Would I feel comfortable explaining to a national TV audience why I took this action?† 6. The legal test: Ask whether the proposed action or decision is legal. Established laws are generally considered minimum standards for ethics. 7. The four-way test: Ask whether you can answer â€Å"yes† to the following questions as they relate to the decision: Is the decision truthful? Is it fair to all concerned? Will it build goodwill and better friendships? Will it be beneficial to all concerned? Finally, managers can take responsibility for creating and sustaining conditions in which people are likely to behave ethically and for minimizing conditions in which people might be tempted to behave unethically. Two practices that commonly inspire unethical behavior in organizations are giving unusually high rewards for good performance and unusually severe punishments for poor performance. By eliminating such factors, managers can reduce much of the pressure that people feel to perform unethically. They can also promote the social responsibility of the organization. SOCIAL RESPONSIBILITY The term social responsibility means different things to different people. Generally, corporate social responsibility is the obligation to take action that protects and improves the welfare of society as a whole as well as organizational interests. According to the concept of corporate social responsibility, a manager must strive to achieve both organizational and societal goals. Current perspectives regarding the fundamentals of social responsibility of businesses are listed and discussed through (1) the Davis model of corporate social responsibility, (2) areas of corporate social responsibility, and (3) varying opinions on social responsibility. A model of corporate social responsibility that was developed by Keith Davis provides five propositions that describe why and how businesses should adhere to the obligation to take action that protects and improves the welfare of society and the organization: * Proposition 1: Social responsibility arises from social power. * Proposition 2: Business shall operate as an open system, with open receipt of inputs from society and open disclosure of its operation to the public. * Proposition 3: The social costs and benefits of an activity, product, or service shall be thoroughly calculated and considered in deciding whether to proceed with it. * Proposition 4: Social costs related to each activity, product, or service shall be passed on to the consumer. * Proposition 5: Business institutions, as citizens, have the responsibility to become involved in certain social problems that are outside their normal areas of operation. The areas in which business can become involved to protect and improve the welfare of society are numerous and diverse. Some of the most publicized of these areas are urban affairs, consumer affairs, environmental affairs, and employment practices. Although numerous businesses are involved in socially responsible activities, much controversy persists about whether such involvement is necessary or appropriate. There are several arguments for and against businesses performing socially responsible activities. The best-known argument supporti ng such activities by business is that because business is a subset of and exerts a significant impact on society, it has the responsibility to help improve society. Since society asks no more and no less of any of its members, why should business be exempt from such responsibility? Additionally, profitability and growth go hand in hand with  responsible treatment of employees. customers, and the community. However, studies have not indicated any clear relationship between corporate social responsibility and profitability. One of the better known arguments against such activities is advanced by the distinguished economist Milton Friedman. Friedman argues that making business managers simultaneously responsible to business owners for reaching profit objectives and to society for enhancing societal welfare represents a conflict of interest that has the potential to cause the demise of business. According to Friedman, this demise almost certainly will occur if business continually is forced to perform socially responsible behavior that is in direct conflict with private organizational objectives. He also argues that to require business managers to pursue socially responsible objectives may be unethical, since it requires managers to spend money that really belongs to other individuals. Regardless of which argument or combination of arguments particular managers might support, they generally should make a concerted effort to perform all legally required socially responsible activities, consider voluntarily performing socially responsible activities beyond those legally required, and inform all relevant individuals of the extent to which their organization will become involved in performing social responsibility activities. Federal law requires that businesses perform certain socially responsible activities. In fact, several government agencies have been established and are ma intained to develop such business-related legislation and to make sure the laws are followed. The Environmental Protection Agency does indeed have the authority to require businesses to adhere to certain socially responsible environmental standards. Adherence to legislated social responsibilities represents the minimum standard of social responsibility performance that business leaders must achieve. Managers must ask themselves, however, how far beyond the minimum they should attempt to go difficult and complicated question that entails assessing the positive and negative outcomes of performing socially responsible activities. Only those activities that contribute to the business’s success while contributing to the welfare of society should be undertaken. Social Responsiveness. Social responsiveness is the degree of effectiveness and efficiency an organization displays in pursuing its social responsibilities. The greater the degree of effectiveness and efficiency, the more socially responsive the organization  is said to be. The socially responsive organization that is both effective and efficient meets its social responsibilities without wasting organizational resources in the process. Determining exactly which social responsibilities an organization should pursue and then deciding how to pursue them are perhaps the two most critical decision-making aspects of maintaining a high level of social responsiveness within an organization. That is, managers must decide whether their organization should undertake the activities on its own or acquire the help of outsiders with more expertise in the area. In addition to decision making, various approaches to meeting social obligations are another determinant of an organization’s level of social responsiveness. A desirable and socially responsive approach to meeting social obligations involves the following: * Incorporating social goals into the annual planning process * Seeking comparative industry norms for social programs  * Presenting reports to organization members, the board of directors, and stockholders on progress in social responsibility * Experimenting with different approaches for measuring social performance * Attempting to measure the cost of social programs as well as the return on social program investments S. Prakash Sethi presents three management approaches to meeting social obligations: (1) the social obligation approach, (2) the social responsibility approach, and (3) the social responsiveness approach. Each of Sethi’s three approaches contains behavior that reflects a somewhat different attitude with regard to businesses performing social responsible activities. The social obligation approach, for example, considers business as having primarily economic purpos es and confines social responsibility activity mainly to conformance to existing laws. The socially responsible approach sees business as having both economic and societal goals. The social responsiveness approach considers business as having both societal and economic goals as well as the obligation to anticipate upcoming social problems and to work actively to prevent their appearance. Organizations characterized by attitudes and behaviors consistent with the social responsiveness approach generally are more socially responsive than organizations characterized by attitudes and behaviors consistent with either the social responsibility approach or the social obligation approach.  Also, organizations characterized by the social responsibility approach generally achieve higher levels of social responsiveness than organizations characterized by the social obligation approach. As one moves from the social obligation approach to the social responsiveness approach, management becomes more proactive. Proactive managers will do what is prudent from a business viewpoint to r educe liabilities whether an action is required by law or not. Areas of Measurement. To be consistent, measurements to gauge organizational progress in reaching socially responsible objectives can be performed. The specific areas in which individual companies actually take such measurements vary, of course, depending on the specific objectives of the companies. All companies, however, probably should take such measurements in at least the following four major areas: 1. Economic function: This measurement gives some indication of the economic contribution the organization is making to society. 2. Quality-of-life: The measurement of quality of life should focus on whether the organization is improving or degrading the general quality of life in society. 3. Social investment: The measurement of social investment deals with the degree to which the organization is investing both money and human resources to solve community social problems. 4. Problem-solving: The measurement of problem solving should focus on the degree to which the organization deals with social problems. The Social Audit: A Progress Report. A social audit is the process of taking measurements of social responsibility to assess organizational performance in this area. The basic steps in conducting a social audit are monitoring, measuring, and appraising all aspects of an organization’s socially responsible performance. Probably no two organizations conduct and present the results of a social audit in exactly the same way. The social audit is the process of measuring the socially responsible activities of an organization. It monitors, measures, and appraises socially responsible performance. Managers in today’s business world increasingly need to be aware of two separate but interrelated concernsusiness ethics and social responsibility. BACKGROUND & DEFINITIONS The past decade has seen an explosion of interest among college faculty in the teaching methods variously grouped under the terms ‘active learning’ and  Ã¢â‚¬Ëœcooperative learning’. However, even with this interest, there remains much misunderstanding of and mistrust of the pedagogical â€Å"movement† behind the words. The majority of all college faculty still teach their classes in the traditional lecture mode. Some of the criticism and hesitation seems to originate in the idea that techniques of active and cooperative learning are genuine alternatives to, rather than enhancements of, professors’ lectures. We provide below a survey of a wide variety of active learning techniques which can be used to supplement rather than replace lectures. We are not advocating complete abandonment of lecturing, as both of us still lecture about half of the class period. The lecture is a very efficient way to present information but use of the lecture as the only mode of instruction presents problems for both the instructor and the students. There is a large amount of research attesting to the benefits of active learning. â€Å"Active Learning† is, in short, anything that students do in a classroom other than merely passively listening to an instructor’s lecture. This includes everything from listening practices which help the students to absorb what they hear, to short writing exercises in which students react to lecture material, to complex group exercises in which students apply course material to â€Å"real life† situations and/or to new problems. The term â€Å"cooperative learning† covers the subset of active learning activities which students do as groups of three or more, rather than alone or in pairs; generally, cooperative learning techniques employ more formally structured groups of students assigned complex tasks, such as multiple-step exercises, research projects, or presentations. Cooperative learning is to be distinguished from another now well-defined term of art, â€Å"collaborative learning†, which refers to those classroom strategies which have the instructor and the students placed on an equal footing working together in, for example, designing assignments, choosing texts, and presenting material to the class. Clearly, collaborative learning is a more radical departure from tradition than merely utilizing techniques aimed at enhancing student retention of material presented by the instructor; we will limit our examples to the â€Å"less radical† active and cooperative learning techniques. â€Å"Techniques of active learning†, then, are those activities which an instructor incorporates into the classroom to foster active learning. TECHNIQUES OF ACTIVE LEARNING Exercises for Individual Students Because these techniques are aimed at individual students, they can very easily be used without interrupting the flow of the class. These exercises are particularly useful in providing the instructor with feedback concerning student understanding and retention of material. Some (numbers 3 and 4, in particular) are especially designed to encourage students’ exploration of their own attitudes and values. Many (especially numbers 4 – 6) are designed to increase retention of material presented in lectures and texts. 1. The â€Å"One Minute Paper† – This is a highly effective technique for checking student progress, both in understanding the material and in reacting to course material. Ask students to take out a blank sheet of paper, pose a question (either specific or open-ended), and give them one (or perhaps two – but not many more) minute(s) to respond. Some sample questions include: â€Å"How does John Hospers define â€Å"free will†?†, â€Å"What is â€Å"scientific realism†?†, â€Å"What is the activation energy for a chemical reaction?†, â€Å"What is the difference between replication and transcription?†, and so on. Another good use of the minute paper is to ask questions like â€Å"What was the main point of today’s class material?† This tells you whether or not the students are viewing the material in the way you envisioned. 2. Muddiest (or Clearest) Point – This is a variation on the one-minute paper, though you may wish to give students a slightly longer time period to answer the question. Here you ask (at the end of a class period, or at a natural break in the presentation), â€Å"What was the â€Å"muddiest point† in today’s lecture?† or, perhaps, you might be more specific, asking, for example: â€Å"What (if anything) do you find unclear about the concept of ‘personal identity’ (‘inertia’, ‘natural selection’, etc.)?†. Questions and Answers While most of us use questions as a way of prodding students and instantly testing comprehension, there are simple ways of tweaking our questioning techniques which increase student involvement and comprehension. Though some of the techniques listed here are â€Å"obvious†, we will proceed on the principle that the obvious sometimes bears repeating (a useful pedagogical  principle, to be sure!). Debates – Actually a variation of #27, formal debates provide an efficient structure for class presentations when the subject matter easily divides into opposing views or ‘Pro’/‘Con’ considerations. Students are assigned to debate teams, given a position to defend, and then asked to present arguments in support of their position on the presentation day. The opposing team should be given an opportunity to rebut the argument(s) and, time permitting, the original presenters asked to respond to the rebuttal. This format is particularly useful in developing argumentation skills (in addition to teaching content). ABOUT THIS DEBATE DNA carries a person’s identity. It also carries a vast amount of other information about that person’s biology, health and, increasingly, psychological predispositions. This information could have great medical value, en masse, but might be abused, ad hominem, by insurers, employers, politicians and civil servants. Some countries are building up DNA databases, initially using the excuse that these are for the identification and prosecution of criminals, but also including the unprosecuted and the acquitted. Should such databases be made universal? Is it ever right for the DNA of the innocent to be used for any purpose without the consent of the â€Å"owner†. If so, when? The Moderator-Mar 24th 2009 | Mr Geoff Carr Clarke’s Third Law (the Clarke in question being Sir Arthur C., a distinguished writer of science fiction) is that any sufficiently advanced technology is indistinguishable from magic. That law applies nicely to the modern science and technology of genetics. On the one hand, understanding and eventually manipulating genes may lead to the treatment and even abolition of many diseases by white-magical (or, at least, white-coated) sorcerer-priests. On the other, dark necromancers plot to use the knowledge that genetics brings to regulate and manipulate people on behalf of commercial and political princes. Magic, of course, depends on the audience not understanding what the conjurer is up to. That was Clarke’s point. In the case of a stage show, the deception is both deliberate on the part of the conjurer and self-inflicted on the part of the audience, who would enjoy  the show less if they know how the tricks were done. Which is fine for show business, but is no way to conduct public policy. Hence the need for a serious debate on the matter, to which The Economist is privileged to make this small contribution. For the truth, as both of our opening â€Å"speakers† eloquently illuminate, is that the potential of genetics for both good and ill is great. And the more profound truth is that decisions will have to be made soon about how much genetic privacy a person is entitled to, even before those two potentials are properly understood. The accurate interpretation of the human genome is only just beginning, and where it will lead, no one knows. It is only recently, for example, that whole new classes of gene whose products regulate the functions of other genes, rather than being used as templates for the manufacture of proteins, have been identified. Other surprises surely await. Art Caplan and Craig Venter are two of the most distinguished thinkers in their fields, but those fields are different and, in the end, it is probably the differences between their fields that lead to the distinction in their positions. Dr Venter is a geneticist with a background in the American navy’s medical corps (he served in Vietnam). He has always been a man in a hurry. His team was the first to obtain the complete genetic sequence of a bacterium (an organism called Haemophilus influenzae), and he led the privately financed version of the effort to sequence the human genome, a project that both succeeded in its own right and chivvied publicly financed scientists to redouble their own efforts. Now, he wants to hurry genetic knowledge into the public arena so that the wider pattern can be seen, understood and acted on for the greater good. His mission might be summarised by Hippocrates’s injunction: â€Å"I will prescribe regimens for the good of my patients according to my ability and my judgment.† Dr Caplan’s background, by contrast, is in the history and philosophy of science. The history of genetics is well known as one in which both ignorance and deliberate distortion of the trut h have led to evil consequences—not just in essentially wicked regimes such as that of Nazi Germany, but even in apparently benign places like Sweden and also in the United States. The eugenics that led to the castration of the â€Å"feebleminded† and the death camps for those deemed to belong to â€Å"inferior races† were the descendants of well-meaning, liberal-minded policies intended to improve the condition of humanity. Dr Caplan therefore draws a different lesson from  Hippocrates: â€Å"Never do harm to anyone†, and argues that it is the individual who is best placed to judge what will harm him. At bottom, the two speakers’ arguments come down to the oldest political argument of all—how do you balance private and public interests?—with the added twist of ignorance about how the science will eventually play out. It should be a fascinating debate. The Proposers-Mar 24th 2009 | Professor Arthur Caplan There are, it is increasingly said, plenty of reasons why people you know and many you don’t ought to have access to your DNA or data that are derived from it. Have you ever had sexual relations outside a single, monogamous relationship? Well then, any children who resulted from your hanky-panky might legitimately want access to your DNA to establish paternity or maternity. If various serious diseases run in your family then shouldn’t your loved ones expect you to provide a sample of your DNA so that the family can establish who is and is not at risk of inheriting a disposition to the disease with greater accuracy. If you are young and eligible for military service the desk-jockeys of the military bureaucracy will want to keep a sample of your DNA handy in frozen storage should you encounter misfortune resulting in only tiny smidgens of yourself being all that is left. DNA banks prevent memorials to unknown soldiers. If you are a baby or a child, your parents rightly wa nt to have a DNA sample on file so they can either identify you should you go missing or to help profile your behavioural and disease genetic risk factors so that they can take steps to improve your lot in life. The police might well want to have a sample of your and everyone else’s DNA to make their lives easier as they try to sort through evidence at crime scenes. So might your boss, doctor, hospital, local university, pharmaceutical company, insurance company and national immigration service. Lots of reasons can be given about why genetic privacy ought to be abandoned for the greater good. But none of these is persuasive. No one should be peeking at your genes without your prior knowledge and consent. The main reason why your DNA and any data derived from it should be yours to control is that they are intimately linked to your personal identity. And your identity is an asset that should not be taken from you or accessed without your express permission. Those who wish to have your DNA, including the military, police, government, medical system, researchers and  prosecutors all realise this. They know that they can track you, control you and even profit from you if they do not have to go through the nicety of asking for your permission to obtain or examine your DNA. But you should have the right to decide for what purpose someone can access any identifying information about you. This is especially true for genetic information that can reveal sensitive things about your health, history and behaviour, past, present and future. You may well decide to donate your DNA in a familial study of disease risk, or to donate your DNA to a foundation or university for research; or to have your DNA stored so that you can be readily identified if something untoward were to happen to you; or you may decide to sell your DNA; or you may well decide to make your DNA available for a variety of purposes, but only if you receive convincing assurances that your personal identity will not be revealed to others; or you may not make it available unless you are paid. In any event, it must, if personal privacy and thus your autonomy and dignity are to have any meaning at all, be your choice. In modern society control over one’s own identity is crucial. People can steal your identity and pass themselves off as you, or they may simply use your identity to gain access to your person al information, records and data. Your sense of self, of your security, of even your ability to maintain relationships and intimacies by controlling who can know about you, depends on control of your identity. Retaining control over your identity is something you need to be able to do and the government needs to be able to ensure that you can do. There are those who will say that the whole notion of genetic privacy is absurd. After all, your DNA can be pulled off a glass from which you have sipped, a cigarette you smoked, hair in a shower or anywhere else you might leave behind your sweat, spit, semen or dead skin. But the ready availability of your DNA does not mean that it is sound public policy to simply make access to it a freefire zone for which there are no penalties for those who peek without permission. The law can and should still seek to ensure privacy and make it clear what the penalties will be for non-consensual DNA sampling or use. Now it is true that some research with DNA can be done without identifyi ng the source. Even in these instances you should still have an absolute assurance that no one will reconnect your identity to such data without your assent. In addition to protecting your identity, it is important that you control your DNA in a world in which you  might well suffer adverse consequences were others able to access and analyse your genome at their leisure or pleasure. Your prospective boss could decide that you are not the best person for a job, basing his decision on your genetic risk of suffering a mental illness or debilitating disease three or four decades hence. Your health or life insurer might be jacking up your rates or simply drop you out of a plan because of your risk profile. And admission to college or even to a national security position might well be compromised by an unfavourable risk profile. Remember we are talking risk as the basis of penalties and discrimination, not actual events. Until societies legislate for adequate protections against risk discrimination, you are your own best guardian of your DNA. There are plenty of reasons for others to want to access your genes. Some of these are lofty, useful and admirable. Others are not. Unless something can be done to minimise the latter, the case for genetic privacy is quite strong. The Opposition-Professor J. Craig Venter As we progress from the first human genome to sequence hundreds, then thousands and then millions of individual genomes, the value for medicine and humanity will only come from the availability and analysis of comprehensive, public databases containing all these genome sequences along with as complete as possible phenotype descriptions of the individuals. All of us will benefit the most by sharing our information with the rest of humanity. In this world of instant internet, Facebook and Twitter, access to information about seemingly everything and everyone, the idea that we can keep anything completely confidential is becoming as antiquated as the typewriter. Today, in addition to my complete human genome, that of Jim Watson and some others, medical and genetic information is also readily shared between people on genetic social networking companies who provide gene scans for paying customers. It was my decision to disclose my genome and all that it holds, as it was Jim Watson’ s and presumably all those others who chat online about their disease risks and ethno-geographic heritage. So while we all have a right to disclose or not to disclose, we have to move on from the equally antiquated notion that genetic information is somehow sacred, to be hidden and protected at all costs. If we ever hope to gain medical value from human genetic information for preventing and  treating disease, we have to understand what it can tell us and what it cannot. And most of all we have to stop fearing our DNA. When we look at our not so distant past it is easy to understand how the idea of the anonymity and protection of research subjects came to pass. The supposed science-based eugenics movement, the human experiment atrocities of the Nazis and the Tuskegee syphilis research debacle are just a few examples that prove that we as a society do not have a very good track record on the research front. So naturally when the idea first arose of decoding our human genome, the complete set of genetic material from which all human life springs, it was met largely with fear, including co ncern of how to adequately protect those involved as DNA donors. Notions about genetics at the time were based on myth, superstition, misunderstanding, misinformation, misuse, fear, over-interpretation, abuse and overall ignorance propagated by the public, the press and—most surprisingly—even some in the scientific community. In the 1980s the state of genetic science was not very advanced and the limited tools available led to a very narrow view of human genetics. The only disease-gene associations made then were the rare cases in which changes in single genes in the genetic code could be linked to a disease. Examples include sickle cell anemia, Huntington’s disease and cystic fibrosis. As a result, most began to think that there would be one gene for each human trait and disease, and that we were largely subject to genetic determinism (you are what your genes say you are). An unfortunate slang developed in which people were described as having the â€Å"breast cancer gene† or the â€Å"cystic fibrosis gene† (ins tead of the precise way of describing that a mutation in the chloride ion channel associated with cystic fibrosis). In short, people learned that genetics could all be compared with a high-stakes lottery where you either drew the terrible gene that gave you the horrible disease or you got lucky and did not. The notion of applying probability statistics to human genetic outcomes did reach the public. Today, the science has come a long way since those early days and we now know that there are many genetic changes in many genes associated with genetically inherited diseases like cancer. We also know that genetics is about probabilities and not yes or no answers. However, the public is, for the most part, still back on what they learned from scientists early on: genes determine life outcomes and so you had better not let anyone know the dirty  secrets in your genome. So talk of sequencing the entire human genome created a sort of â€Å"perfect storm† of the colliding research ideals of human subject protection and anonymity. The publicly funded, government version of the human genome project went to extremes to use anonymous DNA donors for sequencing, even throwing out millions of dollars of work and data after at least one donor self-identified his contribution to the research. In contrast to the public human genome project, my team at Celera allowed DNA donors to self-identify but Celera itself was bound by confidentiality. Since I was a donor to the Celera project, I thought that one of the best ways to help dissipate the fears of genetic information being misused, or used against me, was to self-disclose my participation as a DNA donor, thereby showing the world that I was not concerned about having my genome on the internet. My colleague at Celera, a Nobel laureate Hamilton Smith, later disclosed that he too was a DNA donor to the Celera genome sequence. My act of self-disclosure and using my own DNA for the first human genome sequence was extensively discussed and criticised by some at the time, including one of the Celera advisory board members, Art Caplan, who likened the genome sequence to the tomb of the Unknown Soldier and wanted it to remain anonymous. It might all now seem like a quaint historical discussion because of the onslaught of genome announcements and genome companies aiding thousands to share their genetic information with friends, family and the public at large. In 2007 my team and I published my complete diploid genome sequence. This was followed a year later by Jim Watson disclosing his genome identity and releasing his DNA sequence to the internet. Several others have now followed from various parts of the globe. My institute wrestled with the IRB (Institutional review board) issues of sequencing the genome of a known donor as a break from the anonymous past. Following our effort, George Church, a researcher at Harvard, convinced the IRB there to allow full disclosure of multiple individual genomes as part of his project. He and his team have gone even further by including clinical and phenotype information on the internet along with his partial genome sequences. As we progress to sequence the huge number of human genomes, the value for medicine and humanity will only come from the availability of comprehensive, public databases with all these genome sequences, along with as complete as possible phenotype descriptions of the individuals. Our human genomes are of  sufficient complexity and variability that we need these genomes, with the corresponding phenotype data, to accurately move into the predictive and preventive medicine phase of human existence. The possible irony is that, other than as examples and testimonials of well-known individuals, the actual identity of donors is generally of little value to science. I had the right and the privilege to disclose my genetic code to all and I had the right not to do so. I feel that all humans should have the same right to choose. So while we actually don’t need people to step forward and identify themselves as donors and subjects in this research, there is no real need for them to remain anonymous, because there is little to fear and only much to be gained by information sharing. In the United States the Genetic Information Nondiscrimination Act (GINA) was signed into law in May 2008 after more than a decade of trying to get it through congress. GINA is designed to prohibit health insurers and employers from discriminating against someone on the basis of their genetic information. In order that this protection should be global, other countries should do the same. We are learning more and more all the time about what our genes can tell us about our health and what they still cannot and probably will never tell us. We have been beginning to see the fruits of our sequencing labours over the last decade but we still have so far to go in understanding our biology. Each and every one of us has a unique genetic code. Understanding our code can have a major impact on our life and health management, particularly in early disease detection and prevention. These advances will only happen with large comprehensive databases of shared information. Your genetic code is important to you, your family members and to the other 6.6 billion of us who are only 1-3% different from you. We will only gain that understanding by sharing our information with the rest of humanity.

Friday, September 27, 2019

Character Above All Essay Example | Topics and Well Written Essays - 250 words

Character Above All - Essay Example Character tends to encompass three important traits, namely; duty, honor and country. With the development of character, there comes the realization of one’s duty towards others and the whole community. I believe that every individual bears a duty to take care of his family and the under-privileged people in his country; for example doing community service or helping out financially challenged family members. Another duty that bears great relevance in my eyes is the duty towards one’s country and to give honor to the things around us. Every individual on the planet is associated with one country that provides him an identity upon his birth; duty and honor towards such a country is no less than a spiritual conduct for one if his character traits and values are in accordance with purity and honesty. If there ever exists a threat against my country, I will consider it as my duty and honor to protect it against all possible evil intentions and respect the individuals who sp end their whole lives in doing the same. Character remains as the foremost essence of one’s reality that results in the extent of realization of one’s duty and honor to his country and other worthy things around him. An individual who does not extend his character traits to include these three aspects cannot be termed to have a worthy

Thursday, September 26, 2019

Religion and theology Essay Example | Topics and Well Written Essays - 2000 words

Religion and theology - Essay Example In â€Å"Sustaining preachers and preaching† Lovell & Richardson depict to us the practice of evangelization in our churches by elucidating on the importance of renewal of preaching style. Lovell & Richardson advocate an evangelization style that will endorse dialogical, and one that will hinder authoritarian and stentorian monolog. Thus, Lovell & Richardson coax ministers to inculcate the preaching elegance that is grounded in prayers and scriptures and one that is inspired by the Holy Spirit hence increasing the faith, love that will renew the hope and replenishes of those who hear it. It is central for us to comprehend that preaching must be based on scriptures that are inspired by Holy Spirit that is necessary for increasing our faith and that of the congregation hence rekindling our hope in Jesus Christ. What’s more, they help us understand that preaching is â€Å"truth through personality† and they emphasize this by portraying preaching as a unique form of communication whose sources is God. The authors help us to comprehend that, the perseverance of evangelization is not real to revolutionize the congregation’s awareness about the certain controversial issue but to bring the congregation into the presence of God. Lovell & Richardson see the need for preaching to be renewed hence assisting it to serve the right purpose envisioned by God. The authors also help us apprehend that preachers must take into consideration the existences of diversity in the congregation.

Contemporary Middle East Discussion Questions (1 source each, approx Essay

Contemporary Middle East Discussion Questions (1 source each, approx 125 words) - Essay Example This is well seen in the case of Egypt and Persia in which case the effects of these forces continue to play. Many people were always skeptical to the idea of giving away their resources as a way of creating much interconnection with the state (Finkel, 2006). 2) The Wahhabi Muslim fundamentalists believed that Muslims should return to the very fundamental Islamic ways as outlined in the Quran and the Hadith. Much of their beliefs were informed by the teachings of medieval theologians like Taymiyyah. They believed in the Islamic doctrine of Tawhid in which the unity and uniqueness of God were greatly revered (Philby, 2004). More importantly, these Muslim fundamentals believed that philosophical interpretations of the Quran and the Hadith could mislead the people. As such they totally opposed such interpretations. On the other hand, Muslim modernists like Malkom Khan were pushing for the reconciliation of the Islamic faith with such modern values like democracy, nationalism, equality a nd progress. In this case, the critical evaluation of issues in the context of jurisprudence was greatly cherished. Indeed, these beliefs have considerable impact in the Middle East to this day. 3) The Osmanlilik reform movement was developed during the first constitutional era in the Ottoman Empire. ... In this regard, aspects of head tax, conscription, and military service were applied to everyone in equal measure. Citizenship of the empire was therefore a common affair irrespective of any orientation or affiliation. It should however be realized that Osmanlilik was greatly rejected by many Muslims and non-Muslims alike. Many of the adherents of Osmanlilik were lost during the first Balkan War and this led to its eventual failure. 4) The Young Turks Revolution of 1908 was driven by a group of likeminded Turkish nationalists, pluralists and a group of other secularists who totally blamed the Sultan for the harried state of the Empire at the time. The Sultan had suspended the parliament and this was restored effectively by the revolution. It was however realized that the process of replacing monarchic institutions with constitutional ones was not easy as had been initially presumed. The unity of the young Turks and the wide support they enjoyed across the land and beyond was indeed i nstrumental in their successful deposition of the Sultan in 1909. In a way, the Young Turks basically stood for change as opposed to the state of affairs realized at the time. Their goals were therefore different from those of the Osmanlilik (Ruggiero, 2003). 5) The general area of the Middle East greatly attracted much of Europe leading to the European domination of the region and the subsequent influence. Politically, the United Kingdom began this influence by taking over the government of Cyprus which was a protectorate of the Ottoman Empire. This was basically as a result of the Cyprus Convention. In this regard, the British greatly influenced the political, social and economic life of this region. In the same way as Syria became part of the French protectorate, it was

Wednesday, September 25, 2019

Dyadic partner Essay Example | Topics and Well Written Essays - 250 words

Dyadic partner - Essay Example When he is confused, he would also tug at his hair. He wears bright colored shirts like red, blue or green, when he is happy. But when he is excited about something and wants to share it with others, he sits upright and looks at other person’s eye. The body language of my partner is therefore vital means of communicating his mood. Whenever he comes in bright tee-shirt, I am much relaxed because I know that when he is happy, he works better with higher productive outcome! When I see him sitting upright on his chair, I know that he has some good news. But my worries are heightened when I see him tugging at his hair or find him looking away rather than talking to me. As I know that these behavior indicate his discomfort with the issue or his doubts which he is wary of sharing. At these times, I pick up the topic or issue that he is passionate about. When he gets involved and comfortable, I broach the subject of which he is wary about. This way, I am able to know his problem and resolve it so that he can focus on his

Tuesday, September 24, 2019

The Power of Habit Essay Example | Topics and Well Written Essays - 1000 words

The Power of Habit - Essay Example Anything less than perfect is horrible and I can not bear the feeling of being so incompetent for not being able to meet my standards. Committing a mistake is not an option for me. Aiming for perfection is not a bad thing but making a mistake is not the worse either. Perfectionism and Me Setting higher standards is one of the most common things for perfectionists like me. Those who value perfectionism think that having high standards is a good thing. Excellence means strength and failure is something unacceptable. Most of the common thinkings of perfectionism include the "black & white" or sometimes called as "all or nothing" thinking in which "almost" perfect is considered a failure (Scott, "Perfectionist Traits"). There is no space for mistakes ad whenever standards are not met, more often, people like me end up with self pity and will stress ourselves for being weak and stupid. Another kind of thinking perfectionists exhibit is catastrophe thinking which means mistakes create humi liation and disappointment from other people ("How to Overcome Perfectionism, 2). Also known to be common to perfectionism is the "should" statements. For them, everything is a responsibility and must be done respectively. I cannot remember well when exactly did I become a perfectionist. I can only remember that I always strive to be on top and the best among the rest. Striving hard does not necessarily mean only in academic standing. Instead, being perfectionist includes my daily routine and my long term goals. Being a perfectionist, I cannot help but plan my day and my meal. I cannot bear to waste time wondering what to do or what to eat. Thus everyday, I prepare a "to do" list for me to ensure things I should do will be done the way I want it to be. I am not ashamed of being a perfectionist. What makes me hate this part of being me is the fact that I always end up too disappointed whenever I fail to do something in my list and this seem to amuse my family and friends. My family a nd friends always tell me that I overanalyze everything that I forgot to enjoy my life anymore. I hate it when my friends can just make fun and laugh about the some things they messed up while I can't. Making a mistake me feel so stupid and I can't help but blame myself even when replying to emails and text messages. It's harder to stop at this point because I've already got used to it. But my family and friends always encourage me to be light, take things slow and enjoy every moment. As they say, life will never be perfect and being imperfect is what makes us human. Mistakes make a person stronger and better. The Power of Habit and The Habit Loop According to Duhigg (2012), individuals and habits are all different. If we are looking for the correct formula to change habits, then we will never get it because it does not exist. In Duhigg's book entitled The Power of Habit (2012), he identified the habit loop and the framework to identify our habit as well as the formula that out brai n follows why we have habits. The habit loop is constituted by a routine, reward and cue. People can only understand their habit once they know the components of this habit. Routine is the behavior a person want to change. Being a perfectionist by going through planning everything, reviewing and analyzing again and again to avoid mistakes is the routine I want to try to get rid of. Rewards as identified by Duhigg (2012) is the satisfying cravings driving a

Monday, September 23, 2019

Finance Essay Example | Topics and Well Written Essays - 1250 words - 9

Finance - Essay Example Unlike security bonds that have fixed flow of cash, stock is an equity security that guarantees individual shareholders a proportionate ownership in a business. Some of the corporate values that shareholder gets including right to vote and periodic payments from the investment returns called dividends (Ferraro 2009, pg. 10). Like financial assets, the value of the invested stock will be the discounted value of prospective cash flow in the future. Stock fundamental value is reflective of any dividends and the sale price of the stock in the future (Arnold 2007 p.225). One of the cornerstone elements of stock valuation is the Price-to-Earn-Ratio (P/E) it links stock prices changes to the valuation of stock. In the financial market, P/E dictates the prices of stock and the subsequent effect on overall organization stock value. Besides, this ratio shows how long wills a particular stock take to pay back the investor capital if there is stagnation of the business. For instance, a stock trading at $20 with a return of $2 per individual share has a P/E of 10. Essentially, this means that an investor will get the capital invested back (Arnold 2007, p.225). Arnold (2007 p.225) notes that the stock pricing is a cornerstone in valuation of stock. Entrepreneurs values the stock in terms of their ability to return the money invested. Besides, an important financial ratio is Dividend Yield (DY), this identifies return from the investment. The higher the DY, the higher the value of the stock in the market. The critical determinants of DY are purchasing prices and selling prices of a particular stock. Inconsistent and lower dividends reflect low valued stock and thus, poor stock prices in the stock markets. Valuing a stock uses numerous market indexes such as Nasdaq and OTC methods. In each of them, the fundamental value of stock rests on the existing market prices and future prospects.

Sunday, September 22, 2019

Crime and Punishment Essay Example for Free

Crime and Punishment Essay The themes of sacrifices and egoism are usual in his works. He believes that egoism became that reason that destroyed earlier civilizations and made a threat to contemporary societies. Despite the fact that he saw nothing wrong in the wish to self-perfection, he blamed those, who tried to oppose their â€Å"I† to the rest of the world and considered only their own needs and desires. Raskolnikov, the protagonist of Crime and Punishment is severely punished for his extreme egoism and daring to take the decision about human lives. For example in The Brothers Karamazov Zosima worries about moral responsibility for all actions, committed by the person. Ivan doubts his views and states that responsibility is nothing but abstract notion and without God it becomes impossible to talk about any limits to the behavior of an individual. In the poem Ivan declaims to his brother in the cafe he expresses his view on the free will. The Inquisitor blames Jesus for giving people free will, which has become a hard burden and the reason of misery. The feeling of guilt becomes Ivan’s price for an attempt to express his free will. Dostoevsky does not agree or disagree with any opinion discussed but he constructs the plot of the story in such a way that the readers get an opportunity to get the proofs of ideas, expressed by Zosima. (Dostoevsky) The characters of Dostoesky are haunted by their past. In many his stories people cross the limit and take excessive responsibility to make the decision for other people and get severe punishment for it. In contrast to Borges, whose characters exist in present, and to Tolstoy, who regarded human history as a reason for all the events, which happen to us, Dostoevsky made the past the reason of suffering and misery. His characters are haunted by the ghosts from the past and can not find their place in present. For Dostoevsky the conflicts between free will and determination, and between egoism and responsibility become driving force and a source for creativity. All three authors use literature not only as means to bring their messages for the readers, but also as a way to resolve their inner conflicts. Art is always a personal experience for both – creator and those, who perceive it, and Dostoevsky, Tolstoy and Borges make their art serve one ultimate purpose a quest for the meaning of life. Sources Dostoevsky, Feodor (1992). Crime and Punishment. Pevear, R. and Volokhonsky, L. transl. New York: Alfred Knopf. Dostoevsky, Feodor (1992). The Brothers Karamazov. , Pevear, R. and Volokhonsky, L. transl. New York: Alfred Knopf. Dostoevsky, Fyodor translation by Pevear, Richard and Volokhonsky, Larissa (1990). The Brothers Karamazov. New York: Farrar, Straus, and Giroux. Tolstoy, Leo (1969). War and Peace , transl. Rosemary Edmonds, Penguin. Borges, Jorge Luis (1998). Collected Fictions(translated by Andrew Hurley), Viking Penguin

Saturday, September 21, 2019

The Sodor Oil Terminal

The Sodor Oil Terminal Introduction The Sodor Oil Terminal project was undertaken by a team of students as a case study in project management. The purpose of the exercise was to organize and plan the project as part of a project team, and deal with events arising during the project life, utilizing techniques and tools learned during the study of project management. Management of the Project Team Team Selection The team selection for the project was left to individuals, who had to form themselves into teams based on personal choice and internal acceptance. In an educational setting random group selection is very common but not realistic as it does not consider the diversity of skills among the students (Blowers 2003). In terms of skill sets the team forming in this project was random in that there was no comparison before a team was selected, merely a choice of friends or acquaintances. This would seem to be negative and, as Blowers (2003) pointed out, totally unrealistic in the business world, where teams of high skill-set individuals would be chosen to give a project the highest possible chance of success. However, the team selection was not as random as it first seemed, as four members of the team had worked together before, and although it was not acknowledged formally, were aware of each individuals skills and working methods. This proved to be a positive feature in the project development. There were an additional two members of the group who were known only to one of the core four, and this also proved to be significant during the course of the project. Team Development Tabaka (2006) paraphrasing Tuckman and Jensen (1977) stated that in the forming stage the team members must acquaint themselves with each other and judge their own and others role in the team. This stage was already accomplished in the team which formed for the Sodor project. Four out of six members had already worked with each other in previous projects and knew each others capabilities. The two extra members were unknown, did not turn up initially, and showed no enthusiasm for participating in the project tasks. They were therefore largely ignored in terms of expectations of the other team members. The second stage according to Tuckman and Jensen is storming where team members try to exert power over one another, and jockey for position within the group. This stage was also already completed within the core team at the start of the project, and the team had already surpassed Tuckman and Jensens norming stage, with the trust having been built up in previous team encounters, and the ability to work together successfully having already been achieved. The team was therefore ready for Tuckman and Jensenss performing stage. Unfortunately the two outsiders to the team never achieved a real measure of trust within the team, so they remained outsiders for the rest of the project, but were allowed to contribute in a small way whenever they expressed a desire. Team Project Management In the initial stages of the Sodor project tasks, most of the project team was missing for the meetings. This would seem to be a very unfortunate and negative feature for the progression of the project. Ericksen and Dyer (2004) maintained that most of the successful project teams they had studied had had a very decisive launch, with solid project management, direction and clarification right at the beginning, as opposed to the teams who had procrastinated and lacked direction. As there was no-one else to take the position, the one team member present in the initial stages of the Sodor project took on the responsibility of project manager, at least for that stage of the project. The team member had to act alone at the start of the project and was able to be decisive and act with direction precisely because there was no-one else to interfere, and no negotiations to be performed, and the project was able to progress. As the team was already normed it was able to move into the performing stage. The reaction of the other team members was approval that the team member had shown the responsibility to take on the task. There was also an underlying understanding that the other team members would accept future responsibilities. This understanding was formulated into an informal contract of work within the team, more out of conformance to the project guidelines than from the need within the team. Throughout the course of the rest of the project the other team members fulfilled their roles as had been agreed in the contract of works. It was decided that the areas of relevance within the project would each have an individual largely responsible for that particular area. The areas of relevance chosen were planning, costing, procurements, and configuration or change management. The four core members of the group accepted responsibility for an area each with little consultation between members, with the two outside members agreeing to assist whenever needed. This seemingly discrete allocation of tasks would have been a negative feature in some teams but was suitable for the character of the team members, all being highly motivated and goal oriented individuals, but also having a high level of trust in their other team members to deliver. There was an element of informal skills measurement in the allocation of the tasks, done on a purely experiential basis rather than empirical evi dence. Tenenberg (2008) questioned whether people who are highly individual can be encouraged into more collaborative behaviour in order to make teamwork more effective. He quoted Cain et al. (1996) and stated that software development should be regarded as essentially social and that the social side of the activity needs to be addressed the same principle could be applied to any projects which are team-based. Tenenberg (2008) stated that teams have in common a set of collective action problems which require teamwork to be solved. One of those problems mentioned is that of dealing with people who do not contribute to the teams efforts. The Sodor project team did not address this problem at all, largely because the team worked as co-operative individuals rather than a team, and those who did not co-operate were simply ignored and their potential workload absorbed by the co-operating members. Akgun et al. (2007) also postulated team processes as a way to improve the chances of a projects success, and put forward the idea of group potency a belief held by team members that they can be effective. Although the Sodor team worked largely as individuals there was a genuine trust among the main members and a genuine belief in the potency factor which may have been mistaken. Summary The team did not behave as a traditional team with a high level of interaction and decision making but rather as a set of co-operating individuals. It did, however, go through the traditional Tuckman and Jensen (1977) stages of development, albeit before the Sodor project began, and also displayed some of the characteristics of a team as defined by Katzenbach and Smith (1993) complementary team members with common goals and approaches who were willing to be held accountable to the other team members. Evaluation of the Project General frameworks of project management can be found from many sources. Gannon (1994) suggested that project management should consist of six functions planning, organizing, executing, monitoring, reporting and controlling. Prodomos and Macaulay (1996) proposed four main activities planning, monitoring, co-ordinating, and reviewing. The Sodor project will be evaluated using the categories of planning, and monitoring and control. The Gantt charts and cost schedules from this section can be found in the Appendix attached. Planning the Project Prodomos and Macaulay (1996) cited Jordan and Machesky (1990) and proposed that the planning stage was the foundation for the other project activities. Dvir et al. (2003) reported that a belief amongst project management professionals (supported by the Project Management Institutes Guide to the Project Management Body of Knowledge hereinafter referred to as the PMBOK) is that planning is an essential activity which cannot guarantee success, but without which a project will most certainly fail. This belief was reflected in the Sodor case study where half of the activities were on planning the project. Activity Planning Initially, the Sodor project was presented as a textual case study, providing information to construct a work breakdown structure. Andersen (1996) argued that in a real situation activity planning cannot be completed when it is most useful, i.e. at the start of the project, because all of the activities cannot be known then. The Sodor projects activities were identified and provided, so a work breakdown structure could be constructed by the project leader. Other categorizations of the work and different breakdowns were possible but the project team was happy with the project managers decisions. Project Planning Hughes (1995) suggested a Step Wise guide for software projects with details of the stages a project planning team must complete to achieve an effective project plan. PRINCE2 a methodology advocated and required by the UK government also prescribes stages of project development including planning, which reflects the PMBOK areas of Scope, Time and Cost Management. (Siegelaub 2004). Scope management was outside the brief of the Sodor project team as it was provided in the project information. Clear objectives and methods were also provided and no feasibility study was necessary. Therefore the first main planning activity of the Sodor team was in time and cost management to produce a Gantt chart and estimated costs schedule based on the work breakdown structure and provided task precedences to calculate an estimated project end date and project cost. The next stage in planning was to choose vendors.The vendor selection process was carried out by one member of the team acting as project manager. This was where the rest of the team should have had more input, as two important issues in project management would arise which had implications later risk management and quality management. Risk Management The PMBOK devotes a whole knowledge area to risk management and PRINCE2 identifies risk as one of its components. The PMBOK suggests four phases of risk management identification, quantification, response and ultimately control. The Sodor project was totally dependent on third party vendors for both the supply of materials and construction. The biggest identifiable risk for the project would be the failure of a supplier or contractor to deliver on time. This would be particularly relevant to the tasks within the project which were on the critical path in the original estimated plan. Therefore the vendor selection for these tasks should have been carefully considered. Risk is usually quantified as a function of the risks occurrence probability and occurrence impact. (Williams 1996). The probability is a difficult judgement to make but the team was supplied with ratings which were based on how reliable the vendor was. The impact was the penalty cost for late project delivery. The contractors for the two critical tasks of jetty design and construction, and the installation of piping equipment were only rated 2. This proved to cause problems later. Methods of risk management include trying to reduce the risk (Gannon 1994). Of course, reducing the risk by choosing higher rated vendors would have had a cost and would have to have been judged to be cost effective. This was partly taken into account in the vendor selection policy, but should have warranted more attention from the project team. Another way of dealing with the risk in a real situation would have been to deflect it (Gannon 1994) by transferring it to the vendors. Penalty clauses could have been inserted into their contracts for overrunning the quoted task durations. The Sodor project team were not able to do this, so reduction of the risk was the only option available. Quality Management The PMBOK also devotes a whole knowledge area to quality management, so it is obviously an important area for project managers to consider. In the Sodor project the quality of the vendors was the greatest area for consideration. The only indicator of this was the rating provided, which was used in the vendor selection. In a real world situation vendors could have been required to conform to International Organization for Standardization quality standards such as ISO 9001:2008 dealing with Quality Management Systems Requirements, but this was not an option for the project team. After the completion of the planning phase with vendor selection, a final baseline plan and costings were produced. In order to adjust the project end date to conform to the required schedule it was decided to pay overtime to the painting contractor. At this point cash flow should also have been considered by delaying the times for the purchase of materials until necessary but it was not, a potentially huge mistake in the commercial world. Monitoring and Control Gannon (1994) stated that project performance can be measured by the comparison of actual progress to the original planned progress at any stage in the project. The slippages in the Sodor project at 25 weeks were entered into the project Gantt chart and it was found that as a result of slippage in critical path activities the project would overrun by 4 weeks compared to the baseline, and penalties would apply. The project team had 3 choices accept the penalties, reduce the length of an activity on the critical path by paying overtime (known as the time-cost tradeoff problem, (Liberatore and Pollack-Johnson 2006)), or reconsider the precedence requirements (Liberatore and Pollack-Johnson 2006). It was found that paying overtime to the painting contractor to reduce the project duration by 4 weeks was less than the potential penalties and less complicated than reconsidering the precedence requirements. Further problems at the 25 April 2001 stage were caused by the vendor selection for the jetty erection. For the same reasons as above it was decided to pay for overtime on the jetty erection thereby reducing the critical path back in line with the required completion date. By the project closeout it was found that as a result of a reduction in a critical path activity the project completed 2 weeks early and earned bonuses. Summary The project was a success if the criteria was to complete the project in time. But more careful selection of vendors could have also cut the costs of the project the choice of the pipe installation vendor in particular could have produced substantial bonuses. The complete exclusion of any consideration for cash flow was also a major mistake. In the real commercial world, projects can fail because of cash flow problems, so this should have been recognized. Conclusion The Sodor Oil Terminal project was a success in terms of completion of the project within the required time. Pinto and Slevin (1988) measure success simply by achieving the projects time and costs schedule, accompanied by an adequate performance. This approach, however, ignores the factors of commercial success in the marketplace, and how the future of the organization as a whole has been affected by the project, factors recognized by Shenhar et al. (1997). The Sodor project could have been completed within a smaller budget, with greater commercial success and larger profits for future investment in the organization if greater attention had been paid in the areas of vendor selection in terms of risk management. The financial pressure of the large project on the organization could have been offset by greater attention to costings in terms of cash flow optimization. These negative conclusions can be directly attributed to the project teams lack of real teamwork in not questioning each others actions enough or discussing relevant issues.

Friday, September 20, 2019

Electric Commuter Train Or Commuter Rail Tourism Essay

Electric Commuter Train Or Commuter Rail Tourism Essay Electric commuter train or commuter rail is a passenger rail transport service between a city center and commuter towns that draw large numbers of people who travel on a daily basis. Commuter trains are usually optimized for maximum passenger volume, in most cases without sacrificing too much comfort and luggage space, though they seldom have all the amenities of long-distance trains. This service provided by the government in order to give more convenience towards people for urban and rural areas to move (White, 2002). The service is able to meets the requirement and desire through the perception of Malaysian citizen towards the service quality of commuter train by Keretapi Tanah Melayu Berhad (KTMB). The service quality in the commuter train can be measured by SERVQUAL dimension which is focuses in term of tangibles, reliability and responsiveness (Parasuraman et. al., 1985). According to Wiki, SERVQUAL was originally measured on 10 aspects of  service quality: reliability, respo nsiveness, competence, access, courtesy, communication, credibility, security, understanding the  customer  and tangibles. It measures the gap between customer expectations and experience. The service quality of the commuter train becomes important issue in order to have better and comfortable environment. The service quality of the public transport in that area seems unsatisfied and average level, which are physical facilities in term of cleanliness and comfortableness, punctuality, frequencies and responsiveness of the driver and conductor of the public transports. Is it the services quality of the commuter train is really implemented well in this country whether in urban or rural areas? This is because more allocation provided to reconstruct the quality of public transport. Therefore these researches try to investigate the perception of the Malaysian citizen towards the service qualities of the Keretapi Tanah Melayu Berhad (KTMB). Background of the study In Malaysia, KTM commuter is the one of the electrified commuter train service that operated by Keretapi Tanah Melayu Berhad (KTMB). It was first introduced in 1995 to cater people especially in Kuala Lumpur and the surrounding suburban areas and it is a popular mode of transport for people who are working in Kuala Lumpur as they can travel to the city without being caught in traffic congestion. KTM commuter is currently the most profitable passenger service offered by KTMB, contributing RM84.63 million to group revenue in 2006, higher than KTM Intercitys profit of RM70.94 million in the same year (Nathan and Darshini, 2007). KTM commuter has attracted a significant number of passengers in the transportation market. According to the Ministry of Transport Malaysia 2008 Statistics; the annual ridership for KTM commuter was 36,557 millions of passengers (MOT, 2008). This study is important for KTMB generally and KTM commuter specifically to improve their services especially trains services. Having the information gathered from this study, they can look for effective ways in overcoming these problems and be more competitive in their services since the respondents for this study are KTM commuter customers themselves. From the findings of this study, the management can be made aware of the problems that they are facing everyday and the come up with proactive actions to provide better services to the customers. In return, the customers will enjoy a better quality of services in the future. Research objectives The objectives of the study are: To assess the service quality perceived by passengers of Malaysian citizen who ride the KTM commuter To examine factors influencing the good services provided by KTM commuter. Problem statement The current issues and problems regards in the Keretapi Tanah Melayu Berhad (KTMB) public transports is the time arrival and time travel delaying. Many customers or passengers when went and used that service they was not satisfied with the service quality provided by this KTM B after used the KTM commuter service in term of punctuality and frequencies of train arrive. This issue showed even the public transportation is modernized and in the urban areas but service quality is still lacking and not well implemented. This will lead to negative perception and not satisfy the consumer using the public transports (Karen Thompson, Peter Schofield 2002). The problem of time arrival delaying was related with the other problem which is the space in the KTM commuter. This is because insufficient space to carry more passengers and others whereby the congestion occurred. Nowadays people out there mostly using a public transport like commuter as their transport so, the chance of increase passenger s are higher than before. So when the space of KTM commuter limited and crowded it will become worse to passengers to use and went it. Significant of the study Today the need for an efficient and effective public transportation service like KTM commuter is becoming more importance in order to overcome these problems especially in the Klang Valley. Besides that, many transportation companies are competing with each other to attract as many customers and gain more profit. It is imperative that KTM commuter needs to become more progressive and aggressive to compete with the competitors because nowadays, customers are becoming more demanding with the quality of the service. The want value for money that is they expect the service quality that they received from the service providers equals or exceeds what they had paid for (Mitra Lagerstrom, 2002). Reliability is focusing on frequencies and punctuality of the public transport arrives on time and able to meet the perception expectation of the user. Reliability means the ability to perform the promised service dependably and accurately (Parasuraman, et. al., 1988). The measuring arrival of the pu blic transport at the destination on time is of limited usefulness and will give positive impact towards the public expectation and perceptions. The punctuality measured in term of time arrival and departure is important elements in reliability service quality of dimension. Theoretical framework Speed Punctuality Service quality Space Frequency Safety Reliability Train operationDEPENDENT VARIABLES Comfort INDEPENDENT VARIABLES Research hypothesis There are three hypothesis developed in this study: Hypothesis 1 : There is a significant difference between dimension of tangible and service quality of the Keretapi Tanah Melayu Berhad (KTMB) Hypothesis 2 : There is a significant difference between dimension of reliability and service quality of the Keretapi Tanah Melayu Berhad (KTMB) Hypothesis 3 : There is a significant difference between dimension of responsiveness and service quality of the Keretapi Tanah Melayu Berhad (KTMB) Task 2 (LOC 3 : AC 3) Introduction Literature review is a documentation of a comprehensive review of the published and unpublished work from secondary sources of data in the areas of specific interest to the researcher. Past research on the phenomenon under investigation must play key role in the process of problem formulation. Literature review Customer satisfaction According to our team survey , most of the people satisfied with KTMB services meanwhile there are some services that KTMB are not doing well in their job customer satisfaction are important because customer are judging by services based on pricing that KTMB create. KTMB also have to improve their services based on doing a survey, give a recommendation to customer itself, on other hand the customer also have to give their opinion on what there want or like. Customer loyalty Customer loyalty always follows satisfaction, which is determined from the service quality offered by the KTMB. It is also one of the most frequently used indicators to measure the success of a marketing strategy. Research methodology Introduction The word methodology is the method that any researcher used with appropriate steps, method, technique and tools together with the approaches taken in the research process. Data collection Primary data Primary data is used for this research and the data is obtained using self-administered questionnaires. The questionnaire comprised of two sections. The first section is designed to capture the respondents demographic. The questions asked in this section are related to the respondents gender, nationality, ethnicity, age, marital status, and occupation. The second section is designed to measure the customers perceptions towards various dimensions of services performance in KTM commuter service. The questionnaires are distributed among customers on board the train and those waiting for trains in the stations between 8 October to 10 October 2010. The sample for this study consists of 50 respondent in Batang Benar station. Secondary data According Kotler and Armstrong, secondary data can be defined as information that already exists somewhere, having been collected for another purpose. It may be available from internal sources, or may have been collected and published by another organization. Secondary data usually can be obtained more quickly and at lower price than primary data as researchers can gain the needed data in form of government reports and statistics, company reports and accounts, articles or journals in internet and reports in newspapers. Besides, the data that has been collected can be used to get a new perspective on the current study, to compare the work from previous findings or to use as a reference for future study. The table below shows the secondary sources that will be used in carrying out the research. Sources Explanation Books Literary work by professionals that relates to the food and beverage industry, guides on conducting research projects, as well as information on data of previously conducted research. Internet The internet offers unlimited sources of information that caters to all topic areas. Journals Journals are a good source of secondary data, as they may contain vital information of a certain period of time. Past Research Data from previous research can be used to compare the statistics and other information Task 3 (LOC 3 : AC 4 and LOC 4 : AC 1 and AC 2) Here are more ideas as to how to solve the problem on transportation. This research can understand for simplicity why KTMB designate their routes Seremban-Rawang and Sentul-Port Klang. But being so rigid about it can lead to adverse effects. Most people who take the KTM commuter are doing it to get in and out of the city (e.g. Subang Jaya-Sentral). Or users who just want to travel down the line (e.g. Seremban-Kajang). Although there must be people who use it to cross the Klang Valley (e.g. Seremban-Rawang), they are not in the majority. The way the service routes are designed, it seems silly why these trains have to make one full journey back and forth each branch for every run. Actual fact, delays at one part of the system can lead to other trains being delayed elsewhere, further down the line. For example, a Rawang-Seremban service might be delayed simply because somewhere in Kajang, there is a delay. In other words, researcher suggesting that the operations of these services should be made somewhat a bit more independent to each other. KTMB should consider introducing a variety of routes. Other than that, at not so busy hours, they should maintain their current service routes, as usual. But at peak hours: Seremban-Tasik Selatan Passengers take the Sri Petaling LRT or KLIA Transit to continue their journeys. Rawang-Bank Negara Passengers take the Sri Petaling and Ampang LRT to continue their southward journeys. Reduce service on the Sentul KTM branch passengers can hope off at Bank Negara to continue on the Sri Petaling and Ampang LRT. Introduce express services that bypass not-so busy stations. Introduce services that start and terminate at busy stations like Subang Jaya, Serdang etc. Construct a Komuter station at Abdullah Hukum to allow westerly passengers to bypass Sentral (and finally putting Abdullah Hukum to good use). Continue serving the usual full Rawang-Seremban and Sentul-Port Klang routes but at low frequencies. With the savings of rolling stock, couple those together to serve busy routes. The delays experienced by KTM commuter users seem to be with regards to clashing intercity and freight trains, and usually this is most severe in KL, from the Jalan Bangsar Junction to Jalan Kuching. Naturally the most sensible thing would be to schedule all trains, and make sure they follow their schedules. But they dont, for reasons sometimes beyond KTMs control. There is the issue of different grades of service on different lines. KLIA Transit, being the most posh, followed by the LRTs and Monorail and the KTM commuter at the bottom. And with this, also have different fares for similar journeys. For example, for the journey Bandar Tasik Selatan to KL Sentral Komuter RM1.00 KLIA Transit RM4.20 Sentul to Bandaraya/Bank Negara (although Sentul KTM and LRT are at different places) Komuter RM1.00 LRT RM1.40 It is also inevitable that KTM has to Improve on its scheduling and also further computerization with traffic control. Increase in capacity by acquiring more rolling stock to articulate the current trains and to have more train sets in service. Improve its station quality as well as integration with other rail lines. C:UsersANNA HBCRDesktopKlktm.gif Finding To find effectiveness of KTMB as a public transportation KTMB was an effective way to travel as a public transportation. KTMB was the respondents choice as a public transportation to travel around Rawang-Seremban, Sentul-Port Klang. Alternative public transportation that the respondents choose was bus. To identify the areas covered by KTMB KTMB covers the area that the respondents were going therefore it showed that the respondent were happy and satisfied with the areas covered by KTMB. The areas that had been covered by KTMB was close to the respondent workplace and to Mid Valley which one of a top spot for tourist and people to shop and hang out. To compare the fare of KTMB with other public transportation The researcher found out that the respondent were satisfied with the ticket price of KTMB compared with the price of other public transportation. The factor that many respondents were satisfied was the fare price is cheaper than taking other public transportation. KTMB was close to the place that many respondents were going therefore KTMB was the majority respondents choice of transportation. To analyze the frequency of travelers using KTMB transportation The researcher found out that the travelling frequency for KTMB was adequate for respondents as many of the respondents used this service to travel around Rawang-Seremban, Sentul-Port Klang. Important factor would be that the respondents used this service because their workplace is situated in KL Central, Mid Valley and etc also to avoid traffic jams. Gantt Chart for Research Project Proposal Activity Start Date Duration (days) End Date Proposal 14/9/2011 3 17/9/2011 Survey Methodology 14/9/2011 1 15/9/2011 Literature Review: 18/9/2011 12 10/9/2011 Authors 18/9/2011 7 25/9/2011 Government Publications 27/9/2011 7 4/10/2011 Questionnaire Preparation 5/10/2011 1 6/10/2011 Interview and Survey 6/10/2011 2 8/10/2011 Tally and Analyze Survey Questionnaire 8/10/2011 1 9/10/2011 End Discussion and Conclusion 9/10/2011 1 10/10/2011 14/9/2011 8/10/2011 25/10/2011 6/10/2011 Proposal Survey Methodology Literature Review: Authors Government Publications Questionnaire Preparation Interview and Survey Tally and Analyze Survey à ¢Ã¢â€š ¬Ã‚ ¦ End Discussion and Conclusion Start Date Duration (days) Task 4 (LOC 4 : AC 3) Conclusion and recommendation Findings of this study have important practical to management of quality of the Malaysian rail services. This study demonstrates the usefulness as a measure of service quality. The measurement scale also serves to identify symptoms and the underlying problems that inhibit the effective provision of quality services in rail transport. Once the attributes of rail services from the customers perspective are more clearly known and understood, its service providers will be in a better position to anticipate consumer requirements rather than to react to consumer dissatisfaction. The attributes of reliability and tangibles have been identified by respondents to be the most important dimensions of service quality. These two dimensions were also found to have the highest gap (perception minus expectation), implying that customers expectation of reliability and tangibles dimensions of the railway services are not met by KTMB. Although these findings cannot be generalized to the overall passenger profile, KTMB should use it as an impetus to assess their services, particularly to study ways of improving on their reliability and tangibles dimensions. KTMB management could start by improving on staff training, especially to train their staff to be more professional and courteous when dealing with customers. The public confidence of KTMB has to be gained and the best way is for the management to look at improving on aspects such as reliability of services, improving physical facilities, training of staff and communicating precise information on train schedules. In view of the intense competition in the transport sector with the opening of the North-South Highway, it is imperative that the management of KTMB carry out more research to discover any shortfalls in service quality and to take necessary corrective measures in case of a shortfall. This could ensure that the service quality of KTMB provides the best to its consumers in order to compete effectively with other modes of transport. As the consumer plays a key role in the definition and evaluation of the quality of rail services offered, managers of KTMB should incorporate consumer expectations and perceptions in the formulation of effective long-term marketing strategy. KTM should improved the train service in terms of the punctuality and provide a suitable frequency (for example: every 10 minutes) to reduce congestion at the stations especially during peak hours. This study also recommends that future researchers should come out with the focus groups to compare the opinion between KTMB users with other transportation mode users.