Wednesday, October 30, 2019

Historical document analysis Essay Example | Topics and Well Written Essays - 750 words - 1

Historical document analysis - Essay Example At the close of the Second World War, America’s role in the world had changed drastically, from merely a great power to a superpower – one of the two in the world. It was also clear that there would be a long ideological, and possibly military, conflict with the other superpower. This, combined with the lessons learned from the Second World War, meant that America had to change its traditional military presence – it had to form a standing army and ensure that it was on the forefront of research and development for military techniques. The two responses for this week, one by Marshall and one by Eisenhower, show two sides of this coin. Marshall emphasizes the way warfare had fundamentally changed, essentially stating the need for a military-industrial complex. Eisenhower largely agreed with Marshall’s analysis of the lessons of the Second World War, but argued for a more cautious approach, and espoused serious concerns with the kind of social and governmenta l changes that could come with a large and growing military industrial complex. Marshall’s description of the lessons learned from the Second World War make it clear that he believes that the only way to possibly maintain peace in the world is to constantly be on alert for war. An unarmed peace is unlikely to persist, he argues, because it makes the violence such a tempting option. He equates it to a society that outlaws murder, but does not introduce any mechanism to enforce the laws that it has established (211). He says that America laying down its arms, as it always had after a war would â€Å"court disaster† (211). He does not, however, envision a large standing army per se, but rather would like to see the development of a military industrial complex – a group of researchers, producers and so on that keep America at the forefront of development. He noted that â€Å"98%† of America’s war effort had been technological – it

Monday, October 28, 2019

Cyber Crime Law Essay Example for Free

Cyber Crime Law Essay (a) Offenses against the confidentiality, integrity and availability of computer data and systems: (1) Illegal Access. – The access to the whole or any part of a computer system without right. (2) Illegal Interception. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data. (3) Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses. (4) System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses. (5) Misuse of Devices. (i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of: (aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or (bb) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act. (ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the purpose of committing any of the offenses under this section. (6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, if such a domain name is: (i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration: (ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and (iii) Acquired without right or with intellectual property interests in it. (b) Computer-related Offenses: (1) Computer-related Forgery. — (i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or (ii) The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design. (2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower. (3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower. (c) Content-related Offenses: (1) Cybersex. — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. (2) Child Pornography. — The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775. (3) Unsolicited Commercial Communications. — The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless: (i) There is prior affirmative consent from the recipient; or (ii) The primary intent of the communication is for service and/or administrative announcements from the sender to its existing users, subscribers or customers; or (iii) The following conditions are present: (aa) The commercial electronic communication contains a simple, valid, and reliable way for the recipient to reject. receipt of further commercial electronic messages (opt-out) from the same source; (bb) The commercial electronic communication does not purposely disguise the source of the electronic message; and (cc) The commercial electronic communication does not purposely include misleading information in any part of the message in order to induce the recipients to read the message. (4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. SEC. 5. Other Offenses. — The following acts shall also constitute an offense: (a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable. (b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to commit any of the offenses enumerated in this Act shall be held liable.

Saturday, October 26, 2019

20,000 Leagues Under The Sea :: essays research papers

20000 Leagues Under The Sea The year 1866 is an important time in nautical history. It is the year that the world was first terrified by an amazing ocean going monster, the Nautilus. During that year several ships had met with this "thing," a long slender object much bigger in size than any creature known to man. After tons of sightings and the pass of many months the "monster" began attacking any vessel that drew near. This alarmed all the world's nations and the United States decided that they would send out the Abraham Lincoln to defeat the "monster," and once again bring peace to all the seas. For the expedition the best ocean educated men were invited to join the crew for the the journey. Included in this group was Monsieur Aronnax of the Paris museum and Ned Land, a world known harpooner. Monsieur Aronnax had written a two-volume work called Mysteries of the Ocean Depths. His work was especially well received by scientists, making him a specialist in that field. With him he brought his trusted servant of ten years, Conseil. Besides being Monsieurs loyal servant Conseil was an extremely bright classifier. He took great joy in this and was sometimes a big help to his master when identifying different creatures. Ned had an excellent shot with his harpoon, one so good that fisherman around the world knew his name. The rough travels from one ocean to the next for months without a sign of the wretched creature. Then on the night of November 5 the Ned spotted a bright glow approaching from just below the waters surface. Reports stated that at times the monster tended to glow, so they took pursuit. For a day and two nights the Abraham Lincoln chased the monster through the waters of the Northern Pacific. As the creature let them draw near, the Abraham Lincoln began firing its cannons at the monster but the cannon fire would just bounce off what seemed to be a thick layer of armor. At last the monster began circling the frigate and suddenly began a rush at the side of the boat. The crash tossed some men to the decks and threw overboard Monsieur Aronnax and Ned Land. At the sight of his master plunging into the dark sea Conseil dove into the water to save the professor. The three men tread water for many hours until at last Ned came upon a large, hard object floating in the water.

Thursday, October 24, 2019

Chemistry Review Chapters 1 – 2

Chemistry Review sheet: Unit 1- Lesson 1, 2 *Key notes to keep in mind* u Metals have a high low ionization energy u Non-metals have a high electron affinity  · Atom: The basic unity of an element which still retains the elements properties  · Atomic number: the unique number of protons in the nucleus of a particular element  · Isotope: Atoms of the same element which contain a different number of neutrons  · Periodic law: The chemical and physical properties of the elements repeat in a regular, periodic pattern when they are arranged according to their atomic number. Periodic trend: a pattern that is evident when elements are organized by their atomic numbers o Trends for atomic size: As you go down a group the atoms get bigger. o As you go down a group, valence electrons occupy and energy level that is farther and farther from the nucleus. Therefore the rings of electrons underneath the valence atoms shield the valence electrons from the nucleus so that the atom isn’ t pulled in as tight as the one before it. o Trends for atomic size: As you go down a periodic table, atoms get smaller Because the protons increase as you go down a period, the positive charge on tighter to the nucleus rather looser. o Trends for ionization energy: Ionization energy tends to go down a group o As you go down a period the attraction between the nucleus and the electrons in the outer energy level decreases. o Ionization energy tends to increase across a period. o As you go across a period the attraction between the nucleus and the electrons in the outer energy level increases. Therefore, more energy is needed to pull an electron away from its atom. Lewis structure: a symbolic representation of the arrangement of the valence electrons of an element  · Octet: an arrangement of eight electrons in the valence shell of an atom  · Ionization energy: the energy that is needed to remove an electron from a neutral atom  · Atomic mass unit (u): a unit of mass that is 1/12 of the mass of a carbon-12  · Radioisotope: an unstable isotope of an element, which undergoes radioactive decay  · Mass number: The total number of protons and neutrons in the nucleus of one of its atoms. Each proton or neutron is counted as one unit of the mass number. Energy level: fixed, three-dimensional volume in which electrons travel around the nucleus.  · Valence electron: an electron that occupies the outermost energy level of an atom.  · Stable octet: an arrangement of eight electrons in the valence shell of an atom.  · Electron affinity: the change in energy that accompanies the addition of an electron to an atom in the gaseous state.  · Cation: a positively charged atom.  · Anion: a negatively charged atom. Theories: Law of Conservation of mass: During a chemical reaction, the total mass of the substances involved does not change.Law of Definite Proportions: Elements always combine to form compounds in fixed proportions by mass. (Eg. Water always contains the elements hydrogen and oxygen combined in the following proportions: 11% hydrogen, 89% oxygen) Lesson 3 Ionic and Covalent compounds  · Chemical Bonds: the forces that attract to each other in compounds. o BONDING INVOLVES THE INTERACTION BETWEEN THE VALENCE ELECTRONS OF ATOMS WHICH USUALLY CREATES A MORE STABLE BOND THAT AN ELEMENT ON ITS OWN.  · Ionic compound: between a non-metal and a metal where the metal loses an electron and the non-metal gains it Characteristics of an ionic bond consist of:  § Normally happens between a metal and a non-metal  · Metals tend to lose electrons, non-metals tend to gain them.  § Very high melting point  § Easily dissolved in water  § Good conductor of electricity, in water or on its own.  · Covalent compound: a bond between two non-metals (or a metal and a non-metal when the metal has a high electron affinity), where atoms share electrons o Characteristics of a covalent bond consist of:  § Low melting point  § When contain ed under high pressures or temperatures, becomes liquid  § Weak conductor of electricity Somewhat soluble o Polar covalent compound: a bond where the electronegativity is not great enough to completely bond to the other atom. Although, it does move closer to an atom, it never completely bonds. (between 0. 5 and 1. 7) This therefore means that when the electrons are partially exchanged, rather than having a + or – sign, they receive a ? + or ? – symbol  · Electronegativity: the measure of an atoms ability to attract electrons in a chemical bond. (EN) the opposite of atomic size which therefore means that as the atomic size increase, the electronegativity decreases If the electronegativity difference is 0. 00-1. 6 the bond is covalent. o If the electronegativity difference is over 1. 7 and up the bond is ionic.  · Octet rule: atoms bond in order to achieve an electron configuration that is the same as the electron configuration a noble gas. (8 valence electrons)  · Isoelectric: when two atoms or ions have the same electron configuration. (e. g. Cl and Ar)  · Molecular compounds: See covalent bonds  · Intramolecular forces: the forces that bond covalent bonds together  · Intermolecular forces: the forces that bond ionic bonds together Metallic bonding: in order to combine two metals both metals lose their valence electrons and combine them in a free flowing â€Å"sea† of electrons so that the electrons are shared equally by all atoms that join the bond.  · Alloy: a homogeneous mixture of two or more metals.  · Lone pairs: electron pairs that are not involved in bonding  · Bonding pairs: electron pair that are involved with bonding.  · Polar molecule: a molecule with a partial negative charge on one end and a partial positive charge on the other end.  · Non-polar molecule: a molecule that has neither a positive nor negative end.

Wednesday, October 23, 2019

Sample of Document

Entity:| Vietcombank| | Period ended:| 31/12/2012| Significant class of transactions/significant disclosure process name:| Credit origination – Transaction processing| | Significant class of transactions/ significant disclosure process owner:| Credit Policty at HODebt management division Client Division | |We obtain an understanding of the significant classes of transactions (SCOTs) and significant disclosure processes to identify and understand the risks of material misstatement at the assertion level (i. e. , what can go wrongs (WCGWs)) and, when applicable, to identify and understand the controls over the WCGWs. This template assists with completing S03 Understand significant classes of transactions and significant disclosure processes. Significant accounts affected and key business and financial statement risks related to these accounts: * Loan Acc * Interest Acc * Provision Acc * Expense Acc * Receivable Acc| Relevant assertions: * Valuation * Completeness * Right and Obl igation * Presentation and Disclosure * Existence | Nature of the SCOT (routine, non-routine, estimation): * Routine| Starting point (initiation) and timing of initiation and recording of the SCOT or significant disclosure process: * Customer’s application| Specific circumstances affecting the form and extent of the documentation: * None| Name of the IT application that supports the SCOT * | Inputs/outputs of the critical path of significant class of transactions/significant disclosure process| Inputs/outputs of the supporting IT application| Inputs: * | Inputs: * | Outputs: * | Outputs: * |Critical path (initiating, recording, processing, reporting, correcting incorrect information) We obtain an understanding of the SCOTs and the significant disclosure processes by obtaining an understanding of their critical path. The critical path includes: * Initiation: the point where the transaction first enters the entity’s process and is prepared and submitted for recording * R ecording: the point where the transaction is first recorded in the books and records of the entity * Processing: any changes, manipulation or transfers of the data in the books and records of the entity * Reporting: the point where the transaction is reported (i. e. posted) in the general ledger. When we obtain an understanding of the critical path, we obtain an understanding of how incorrectly processed information is detected and corrected on a timely basis. We also obtain an understanding of how transactions are accumulated and posted from the sub ledger to the general ledger, including controls over associated journal entries. We obtain an understanding of the policies and procedures in place that management uses to determine that directives are carried out and applied, including: * Authorization * Segregation of incompatible duties * Safeguarding of assets * Information processing * Performance reviewsWe use our understanding of the critical path and the policies and procedures to identify WCGWs and, when applicable, relevant controls. In the course of acquiring an understanding of the processing procedures, we frequently learn of many of the controls in use. Thus, while the emphasis at this point is not to identify the presence or absence of controls, we are alert to the possible absence of controls, and to the points at which errors could occur and controls are needed. We consider the effect IT has on the SCOTs and the significant disclosure processes. The manner in which we document our understanding of the SCOT or significant disclosure process is left to professional judgment of the engagement executives.However, for critical paths related to routine transactions, a graphical depiction of the flow (e. g. , flowchart), supported with narrative notes (e. g. , use of this template) normally provides for easier identification of the types of errors that can occur. No. | Describe the critical path for the significant class of transactions/significant disc losure process| Describe the automated aspects of the significant class of transactions/significant disclosure process, including: * Manual aspects that depend upon computer functionality or computer generated data * IT applications/infrastructure| 1 | Credit appraisal and granting proposal 1. 1. Loan application:For both HO and Branches, Credit Dept. s organised into 3 divisions:- Client and Project Investment (optional): responsible for receiving and appraising loan request, monitoring and finalizing/ liquidating the loan. – Debt Management: mainly responsible for storing credit contract and other supporting documents as well as updating required information into system; work with Client Division in monitoring the loan. And two Risk Management division : involved in credit approving process in terms of risk assessment. One is under HO and one is based on Ho Chi Minh CityFirstly, Client/ Project Investment officer receives client’s Loan Application and supporting docu ments – which are clearly stated in Article 14 – Decision 228/NHNT. HTQT: Lending Regulations1. 2.Loan appraisal: * Secondly, Based on documents obtained and the present credit regulations, Client/ Project Investment officer appraises client’s application under the following aspects: * Suitability (in relation to approved Credit limit, related regulations and current risk management policies of the bank) * Feasibility, efficiency and level of risk (if exist) related to client’s business plan * Solvency * Collaterals: Client officer who receives and appraises loan request also responsible for monitoring and appraising collateral. Deliverable of the officer at this stage is Collateral Appraisal Report (Form BD 1. 1. v002), including signature of client officer-in-charge and Head of Client Division.Regarding valuation, branches except for compulsory circumstances, are encouraged to cooperate with Independent Appraisal Firms (selected within the list of allow able firms, attached with Document 946/VCB. CSTD – Appendix 01). In case collateral is valued by VCB, Valuation Memo (Form 2. 2: Bien Ban Dinh Gia) must be prepared with signature of client and bank representative, under Decision 30/ VCB. CSTD. For collateral of over 20 billion VND, branch must send to HO the appraisal documents by Appraisal firm and Appraisal/ Periodic Revelation Report (Form BD 1. 2. v002), within 2 days since the reports are given their approving authority. | Manual | | * Next, Client/ Project Investment officer prepares and signs Report of Credit appraisal and granting proposal (Bao cao th? m d? h va D? xu? t c? p TD), following Form 1. 4A, 1. 4B and 1. 5. * The Report is then submitted to Head of Client/ Project Investment Division (TP KH) for revising and signing in case the deliverables of Client/ Project Investment officer are accepted. Otherwise, he/she needs to document reasons as well as additional opinions * Credit/ Project Investment officer then prepares submission documents. a) For clients granted Credit limit, Client officer submits to Branch’s Director/ Vice Director or Client Director (GD KH) for HO clients. b) For clients granted Credit limit but required by Credit limit approving authority (C? p th? m quy? n phe duy? ) to seek for higher authority’s approval when granting the loan, Client officer submits to both Branch’s Director/ Vice Director and the authority which is stated in Announcement of Credit limit Approval (Thong bao phe duy? t GHTD). If the higher authority is Local Credit Committee (HDTD co s? ), there is no need to submit to Branch’s Director/ Vice Director. c) For clients not yet granted or beyond Credit limit, Project Investment loan is issued. – Branch-based client: Client/ Project Investment officer submits to Local Credit Committee’s Director to organise meeting based on its Regulation on Operations. – HO-based client: Client/ Project Investment off icer submits to authorised Client Director. For the credit limits beyond authority of Client Director, submission is sent directly to HO’s Credit Risk Management Division for subsequent steps. Submission documents include: * Client’s Loan Request (original) * Report on Credit/ Project investment appraisal and granting proposal (original) * Credit Scoring and Rating Table (original) * Legal documents for new customers * Financial statements * Other relevant documents (if available)| | 2. | Loan approvalBased on Report of Credit appraisal and granting proposal, signed by Client officer and Head of Client Division together with supporting documents, the following parties in accordance with their specific authority will start the approving process:2. 1. Branch’s Director/ Vice Director * In case credit granted within Credit limit, Branch’s Director/ Vice Director approves the credit grant based on Report of Credit appraisal and granting proposal signed by Cli ent/ Project Investment officer and Branch’s Director/ Vice Director, as well as accompanying submission documents. In case credit is granted within Credit limit but required by Credit limit approving authority to seek for higher authority’s approval when granting the loan, Client officer submits to both Branch’s Director/ Vice Director and the required authority (If the higher authority is Local Credit Committee (HDTD co s? ), there is no need to submit to Branch’s Director/ Vice Director). 2. 2. Local Credit Committee * Following its Regulations on Organisation and Operations, Local Credit Committee’s Director organises meeting based on submission documents prepared by Client/ Project investment officer. This Committee includes Branch’s director, Vice director and head of Client, Investment project and Debt management division. Local Credit Committee approves credit grants which fall within its authority. Otherwise, based on acceptance opi nion of Local Credit Committee, submission documents are then sent to Risk Management Division by client officer for subsequent steps. * For branches under the processing range of HCM-based Risk Management Division, Client officer submits set of Loan Proposal documents directly to HO’s Risk Management Division and 1 copy of Loan Proposal Form (Form 3. 2) to HCM-based Division in case of beyond its authority. * Branch’s set of documents include: * The original Request for Loan approval Form 3. 2 (T? trinh d? ngh? phe duy? t tin d? ng/DTDA) signed by Local Credit Committee’s Director. A copy of Local Credit Committee’s Meeting minutes * Submission documents to Local Credit Committee| Manual| | 2. 3. Risk Management Division * Based on set of Loan Proposal documents from the Branch, Risk officer evaluates credit risks and prepare Credit Risk Assessment Report (Bao cao ra soat r? i ro c? p tin d? ng) using Form 2. 3A/2. 3B/2. 4 * The report is then signed by Risk officer before being submitted to at least 2 controllers of Risk Management Division, who later provides their approval plus signature. * Afterwards, Risk officer prepares and signs off every page of Announcement of Credit/ Project Investment Approval( Thong bao phe duy? t c? p tin d? ng/DTDA) Form 4. , before: * submitting to Head of Risk Management Division and Risk Management Director for signature; * sending an original to the proposing Branch; a copy to General Director as well as relevant Branches. 2. 5. HO-based clients/ projects within Client Director’s approving authorityCredit proposals under this case are only considered ‘approved’ when the Report of Credit appraisal and granting proposal is signed and given acceptance opinion by Client Director. Accordingly, Client/ Project investment officer prepares (Thong bao tac nghi? p) and transfers documents to HO Debt Management Division for storage, system entering and other subsequent steps. 2. 6.Risk M anagement Director and Client DirectorUnder this circumstance, Risk officer duplicates the steps within the approving authority of Risk Management Director as stated above. The proposal is only considered ‘approved’ when obtaining signature of both, except for either of them is absent. | | | 2. 7. Central Credit Committee * Central Credit Committee bases on Credit Risk Assessment Report (signed by at least 2 controllers of Risk Management Division) and Branch’s document set (original) prepared by Risk officer to call a meeting. * According to Meeting minutes, Risk Management Division prepares and signs off every page of Announcement of Credit/ Project Investment Approval (Form 4. 2) before submitting Director Central Credit Committee for signature. Then submit to: * Client Division at HO an original for subsequent steps * relevant Branches 01 copy * HCM-based Division a copy in case of approving the proposal of branches under its authority. 2. 8. Board of Directo rs * Under this circumstance, after being approved by Central Credit Committee, Risk Management Division prepares submission documents in accordance with Regulation of Loan grants under approving authority of BOD. * Risk Management Division then prepares Approval Announcement and sends documents in such a way as cases under Central Credit Committee’s authority; in which, documents to Debt Management Division must include Loan Approval Form by BOD. | | 3. | Making loan contract and collateral contractBased on approving results, Client officer continues to seek signature for loan and collateral contract. 3. 1.Loan contract/Collateral contract * Client/ Project Investment Division signs off (ky t? t) every page of loan contract/collateral contract and send to client for confirmation. After signing off by Client and Bank ‘s representer, Loan contract was sent to Accounting division and Debt management Division. collateral contract was sent to Storage division * If any disag reement arises, Client/ Project Investment officer must report to Head of Division. If necessary to amend content or approval conditions, Client/ Project Investment Division issues Form 1. 6: Report on Appraising and Proposing Credit Adjustment, submit to authorised bank representatives for approval. After obtaining client’s signature and original of collateral contracts, Client/ Project Investment Division register collateral transactions. * Client/ Project Investment officer prepares 02 (Thong bao tac nghi? p m? HDTD), sign off and submit to Head of Division for signature, before sending to Debt Management Division (relevant documents included) for storage and entering into system. * In case clients do not have CIF yet, Client Division prepares Thong bao tac nghiep mo so CIF (Form 5. 8) then sends to Transaction Accounting dept. to open new CIF. | Manual| 4. | Putting data into system and managing credit file * After signing loan contract, Client officer prepare and sign on â€Å"Thong bao tac nghiep m? h? p d? ng tin d? g† containing all information needed to put into system, conditions to disburse, a list of documents needed to store and special conditions needed to manage the loan. After that, debt management officer recheck and sign on â€Å"Thong bao tac nghiep†. * Basing on â€Å"Thong bao tac nghiep†, Debt Management officer is responsible for putting data into system. However, only when it is approved online by head/vice of debt management Division, will client data be disclosed on system. Debt Management officer stores all the documents listed on â€Å"thong bao tac nghiep†| IT Dependent| 5. | Disbursement of loanThe disbursement of loan involves the following steps which depend on the appointed approving authority.However, all of the appointed divisions are held responsible for checking the conformity of client’s withdrawal documents with credit contract. 5. 1. Client/ Project Investment DivisionIf withdraw al request is valid, Client officer prepares â€Å"Thong bao tac nghiep du dieu kien rut von† (Form 5. 4), signs off and submits to Division Head for signature before transferring documents to Debt Management officer for disbursement. 5. 2. Debt Management DivisionThe division directly receives withdrawal request from client and perform checking procedures. Client is required to amend information if found unsuitable. Otherwise, Debt Management officer starts disbursing the loan. 5. 3.Client/ Project Investment Division receiving request, Debt Management Division performing checking proceduresWithdrawal documents after being received and checked by Client officer, Debt Management officer takes over for disbursement, based on Credit Approval Announcement and Credit contract. If documents are found invalid, they are sent back to Client Division for completion. 5. 4. Higher authorityClient officer prepares â€Å"Thong bao tac nghiep du dieu kien rut von† (signed by him/her and Head of division). Afterwards, based on credit approval results, Client officer submits the above document and other supporting ones to higher authority. If approved, the documents are transferred to Debt Management for disbursement.The details of disbursement process are briefed as follows: * Debt Management officer opens loan account, fills in CIF, signs off Loan Receipt Note before updating into system for online approval of Division’s Head. * Next, the officer sends: * 01 Loan Receipt Note to client * 01 Loan Receipt Note and supporting documents to relevant departments for disbursement * The last Loan Receipt Note stored in the division. | IT Dependent| 6. | Post-disbursement Monitoring of Loan * At least every 6 months, Client/ Project Investment Division must recheck the loan usage status (usage purpose, collateral status, the balance between assets resulting from the loan and the outstanding balance).This is implemented in accordance with the predetermined plan ( monitoring schedule and methodology), which is proposed by Client officer when preparing Report of Credit appraisal and granting proposal or when â€Å"Thong bao tac nghiep† at the latest. * For collateral monitoring, the following aspects must be assured: * Status compared to previous visit * Forecasted revaluations * Client’s conformity in preserving collateral * Proposal to modify collateral management methods (optional) * Proposal to add/ replace collateral (optional) * Debt Management Division is held responsible for reminding Client/ Project Investment Division about loan monitoring schedule. The result must be documented on Loan Monitoring Records (Bien b? n Ki? m tra), which is signed by Borrower’s representative and submitted to Head of Client/ Project Investment Division for revision and comment. * In case Client/ Project Investment Division detects any signals of risk, officer takes the initiative to propose the corresponding solution (included in Loa n Monitoring Records) before submitting to Head of Division, Director of Client Division (for HO-based clients) or Branch’s Director/ Deputy Director. * After finalizing the Record, officer sends 01 original to Debt Management, 01 copy to Risk Management Division for co-monitoring. | Manual | 7. Credit Adjustment * Depending on the real situation and client’s demand after credit approval, credit adjustment can be made correspondingly. * Procedures of Credit Adjustment are conducted in the same manner as that of Credit Proposal and Approval (only those who are authorised to approve credit are able to approve credit adjustment). Client / investment project officer prepares Report of credit appraisal and credit adjustment- bao cao th? m d? nh va d? xu? t di? u ch? nh tin d? ng. At risk management division prepares Credit risk assessment for adjustment report – Bao cao ra soat r? i ro di? u ch? nh c? p tin d? ng. * Client/ Project Investment Division prepare Thong b ao tac nghi? p di? ch? nh HDTD. | Manual| 8. | Loan and interest collection * At least 10 days before due date, Debt Management officer prints out the list of loans and transfer to Client/ Project Investment Division whose officer prepares a document to inform clients and in charge of pushing clients to pay principal and interest * System automatic calculate interest income for loan group 1 * At the due date of loan, Debt Management officer prints out the report of principle and interest up to due date and checking. Then this report is submitted to Head of Debt management for approving. This report is then transferred to Accounting Division for collecting. If collected in cash, Client has to pay at first at Cash Division. ; after collecting enough and checking, Cash Division. will sign on â€Å"Deposit slip† (Cash receipt) then transfers Cash Receipt Note to Accounting Division for booking entry. * Accountant makes the following entries: * With principal collection:Dr. : Cash / BankCr. : Loan to Customer * With interest collection:Dr. : Cash/ BankCr. : Interest Income * Accounting voucher printed out and signed by controller and chief accountant. | Application A*N*t Interest = ————- 360*100 A: Outstanding balance N:Days (From the last payment day to the next payment day). t:interest rate | 9. Overdue Debt Management * When the loan turns into overdue, debt management officer sends a Reminding Letter to the customer (at least once a month), approved by the Head/Vice of Debt Management Division. This letter is transferred to clients and a copy is also to deliver to the credit officer. * If the customers still don’t make payment after more than 3 times received the Reminding Letter, credit officer proposes to the Head of Client/ Project Investment Division to work directly with the customer’s representative to cover the debt. * Client/ Project Investment Division combines with Risk Management Division and Legal Divi sion if necessary to protect all the interests of VCB. | 10. | Contract liquidation and Collateral Release Collateral * After the client pays all principle and interest, Debt Management officer prepares and signs on Loan Closing Announcement (Thong bao dong h? so vay). * Client officer informs client of Loan Contract Liquidation (Form 7. 2). * Debt Management officer hands over all relevant documents to Client/ Project Investment Division before the former Division transfers to clients and sends the original of Handover Record (signed by both handover and takeover) to Debt Management for storage purpose. * Finally, Client/ Project Investment Division cancel Collateral Transaction Registry. | |

Tuesday, October 22, 2019

Educational Planning Essays

Educational Planning Essays Educational Planning Essay Educational Planning Essay teachers etc. As far as functioning of the system is concerned the elements to be taken into account include administration of education at the system level, managing the educational process at the institutional and classroom level. For analyzing the quality and outcomes of the education system the efficiency of education and the pass percentage and graduation rate etc. are important. Target Setting Targets are translation of objectives in clearly defined quantitative terms. What the plan intends to achieve during the plan period when specified in quantitative terms is known as target. Targets are statements which state clearly and unambiguously what is to be achieved and are in measurable terms and have definite time frame. In order to develop education plan the targets may be set for access, enrolment, retention and achievement level of children. However it is desirable to undertake the target setting exercise in a disaggregated manner. Secondly in a medium and long term plan the targets should be set in a phased manner which means that targets should not only be set for the total plan period but should also be set for all intervening years. This may not only help to see the progress of implementation of the plan on year to year basis but may also facilitate in reviewing the implementation strategies and perhaps revising the targets for the coming years. The gender and social disparities in the field of education are common features in developing countries. These disparities may be in enrolment, retention or even in achievement also. One of the important objectives in the education plan will be to reduce these disparities. It is therefore important to set the targets on enrolment and retention separately for boys and girls as well as for different ethnic groups that are educationally backward. Over a period of time the gap between boys and girls and between various ethnic groups and others may be reduced. The target of reducing this gap may depend upon the gaps between these categories in the base year of the plan. Several demographic and enrolment indicators can be used in setting enrolment targets. These are growth rate of population; growth rate of school age population or share of school age population to total population; share of girls in total child population; share of under age and over age children in total enrolment at a given level of education; Net Enrolment Ratio; growth rate of enrolment in the preceding year; and Net Intake Rate (NIR). It is important to note that plan targets for all major interventions need to beset at the lower level administrative unit. For example, in the national plan state (i. e. province) wise targets may be set or while planning at the state level district wise targets need to be set. Further the plan targets should be expressed both in terms of absolute figures as well as in terms of performance indicators, where ever applicable. Intervention Strategies and Activities After setting the targets the next step in planning is to evolve strategies to achieve the targets and therefore evolving intervention strategies to achieve the targets is another important aspect of plan formulation. The effort may be to highlight the interventions that will help to overcome the problems and constraints identified in the plan so as to ensure that the targets set are achieved. However, it is to be noted that the strategies evolved will have to address the identified problems and issues. While evolving the strategies important points to keep in view are: (i) in a decentralized planning any single strategy may not be uniformly operational or applicable indifferent areas and that is why probably for addressing a single problem one may have to envisage a set of strategies for a given context. ii) Many a times a single strategy may not be enough to address an issue or a problem and there will be a need to work out multiple strategies for addressing a single problem. (iii) All the problems and issues identified during the planning exercise must be tackled and intervention strategies should be worked out accordingly and there should thus be a linkage between the problems/issues identifie d and the intervention strategies developed for addressing them. Translating the strategies into programs and activities is the next step in the plan formulation. It is to be kept in view that a specific intervention strategy may require a number of programs to make it operational and effective. However a program may be an aggregation of various activities. It is therefore necessary to translate each and every strategy into activities and tasks. For example for improving access the strategy can be ‘opening of new schools’. However one of the activities under the strategy of opening new school may be ‘construction of school building’. But the activity of construction of school building has many tasks that are to be undertaken. These tasks may be (i) identification of school-less habitations; (ii)identification of habitations qualifying for opening schools; (iii) listing and prioritization of habitations; (iv) deciding about the number of schools to be opened;(v) identification of habitations where schools are to be opened; (vi) deciding the location/site of the school; (vii) acquiring site/transfer of land; (viii) identification of agency for construction and supervision; (ix) actual construction work; (x) monitoring and supervision of construction work and (xi) finishing and furnishing of school building. Next step in plan formulation is the sequencing and phasing of these activities and the tasks. It may be noted that some activities / tasks can be undertaken only in a sequential manner whereas some activities/tasks can be started simultaneously. For example, construction of school building and recruitment of teachers are the activities which can be undertaken simultaneously while actual construction of school building can not be done before deciding the site of the school, acquiring site, transfer of land and identification of agency for construction and supervision. Costing and Budget Preparation An important step in the plan formulation exercise is the costing and estimation of financial requirements to implement the plan. Translating the physical inputs into financial requirements is essential for funding purpose. All the activities and tasks identified, which have financial implication, are to be cost properly and budgeted adequately. Various steps that are involved in estimation of financial requirements are: (i) listing of all the activities to be undertaken (ii) classifying all these activities into two categories i. . activities having cost implications and activities which do not have cost implications; (iii) classifying the activities which have cost implications into recurring and non-recurring heads; (iv) working our the is another important aspect of plan formulation. The effort may be to highlight the interventions that will help to overcome the problems and constraints identified in the plan so as to ensure that the targets set are achieved. However, it is to be noted that the strategies evolved will have to address the identified problems and issues. While evolving the strategies important points to keep in view are: (i) in a decentralized planning any single strategy may not be uniformly operational or applicable indifferent areas and that is why probably for addressing a single problem one may have to envisage a set of strategies for a given context. (ii) Many a times a single strategy may not be enough to address an issue or a problem and there will be a need to work out multiple strategies for addressing a single problem. iii) All the problems and issues identified during the planning exercise must be tackled and intervention strategies should be worked out accordingly and there should thus be a linkage between the problems/issues identified and the intervention strategies developed for addressing them. Translating the strategies into programs and activities is the next step in the plan formulation. It is to be kept in view that a specific intervention strategy may require a number of programs to make it operational and effec tive. However a program may be an aggregation of various activities. It is therefore necessary to translate each and every strategy into activities and tasks. For example for improving access the strategy can be ‘opening of new schools’. However one of the activities under the strategy of opening new school may be ‘construction of school building’. But the activity of construction of school building has many tasks that are to be undertaken. These tasks may be (i) identification of school-less habitations; (ii)identification of habitations qualifying for opening schools; (iii) listing and prioritization of habitations; (iv) deciding about the number of schools to be opened;(v) identification of habitations where schools are to be opened; (vi) deciding the location/site of the school; (vii) acquiring site/transfer of land; (viii) identification of agency for construction and supervision; (ix) actual construction work; (x) monitoring and supervision of construction work and (xi) finishing and furnishing of school building. Next step in plan formulation is the sequencing and phasing of these activities and the tasks. It may be noted that some activities / tasks can be undertaken only in a sequential manner whereas some activities/tasks can be started simultaneously. For example, construction of school building and recruitment of teachers are the activities which can be undertaken simultaneously while actual construction of school building can not be done before deciding the site of the school, acquiring site, transfer of land and identification of agency for construction and supervision. Implementation Schedule and Monitoring Mechanism One of the important stages in planning exercise is detailing out the implementation plan. When planning at the lower levels, e. g. district level planning, implementation is part and parcel of planning activities. A plan document is incomplete if it does not contain detailed plan for implementation of the programs and projects that the plan contains. It thereby means that planning for implementation should be inbuilt in the plan document. A failure in the achievement of plan targets in the education sector is generally attributed to the lack of detailed planning for implementation. Planning for implementation facilitates the process of implementation of programs and projects by providing a sound mechanism of monitoring in the form of implementation schedule and it also increases the efficiency of the system by minimizing the costs of implementation of a given program or project. Planning for implementation makes it possible to critically analyze the activities of a given educational program and to develop an implementation schedule which can be used for monitoring the progress of implementation. There are certain steps that are necessary in planning for implementation of educational programs or projects. These are; listing of activities that make up the program; thinking through each of these activities; establishing inter-relationships between these activities; establishing a network; setting activity duration; determining material, equipment and human resource needs; deciding about time duration for the program implementation of each activity; identifying identical activities of the program which can not be overlooked without affecting the duration of the average cost of recurring activities and unit cost for non-recurring activities (v)estimation of costs separately under the recurring and non-recurring heads. While estimating the financial requirements for the Education Plan the recurring costs estimation may be on items such as salaries, training, maintenance of building, equipment, furniture, infrastructure, travel costs; stationary and consumables, contingencies, rents etc. Similarly the non-recurring cost estimation may be on items such as: construction of school building, additional classrooms, toilets, compound wall, equipments, furniture; infrastructure; vehicle etc. The aggregation of costs of all the activities and tasks under various strategies will give the total financial requirements of the plan. Allocation of resources to education is based on the budgets. Budgets are prepared annually to facilitate the resource allocation process. This implies that these activities are to be classified according to the year of beginning and completion of the activities. This may help in preparing the annual budgets. The budget should correspond to the activities indicated to be completed in that particular year. While estimating the cost requirements for the plan it is of utmost importance to keep in view the financial parameters fixed by the higher level decision making bodies with regard to Education Plans to be formulated at the lower levels. The costing of the plan must adhere to the ceilings on various items and other financial parameters prescribed by the approving body which may be the national (i. e. central) government and/or the provincial government. Negotiations, Appraisal and Approval The plans developed are draft plans till they are discussed and finally approved by the approving authorities. Since resources are to be allocated for implementation of plan, the negotiation process is very important. Many proposals in the plan may require financial allocation from the higher authorities. Hence the plan may become final only when they are discussed and finally approved by the authorities by approving budget and allocating funds as per requirements. The approving authorities look into the desirability of proposals and the feasibility of implementation of the plan. This is the process of negotiation between those who formulate the plan and those who have to finally approve the plan and budget. It is generally found that some cut in the proposed resource requirement is done by the authorities and in such case the plan need to be revised in the light of discussion. Based on the resources assured by the approving authorities, plan proposals are to be prioritized. After such re-prioritization so as to establish a link between what is proposed and the extent of resources available, the plan is finalized. In order to approve the plan the authorities, who have to approve the plan and budget, do generally like to do comprehensive review of the various aspects and components of program proposals. It is therefore seen whether the plan is technically sound, financially viable and justified and administratively feasible. This is done with the help of a team of experts who discuss the plan proposals at length with the planning team. This process is known as the appraisal of plan. Thus an important aspect of plan negotiation is appraisal through which the opinion of the experts is sought about the soundness and feasibility of plan proposals before it is finally approved for implementation. Negotiation is a process by which one can bargain for more resources. If the proposals made in the plan document are justified and the planning team is able to convince the authorities it is very likely that they may get more resources. However, if the plan proposals are weak and unconvincing the chances are that they may get less amount of resources. The soundness of the proposals which constitute a plan is an important consideration influencing the amount of resources allocated

Monday, October 21, 2019

Beware of Whom

Beware of Whom Beware of Whom Beware of Whom By Maeve Maddox I just read a mystery by Sue Grafton in which her character Kinsey Millhone mentally corrects a maid who responds to her phone call by asking Who may I say is calling? The Millhone character thinks Whom, sweetheart, Whom shall I say is calling This passage illustrates the fact that even an excellent writer can have trouble with when to use who and when to use whom. In this case, the maid was right and the detective was wrong. If you want to know why, read on. Like most pronouns, who has two forms: a subject form, who, and an object form, whom. To understand the use of pronoun pairs such as who/whom, he/him, she/her, I/me, they/them, and we/us when used with a verb, one must recognize whether the word is being used as the subject of the verb or as its object. Every verb has a subject. The subject is the doer of an action: I sing. We shop in town. Who knows the secret? Some verbs have objects. The object receives the action: The ball hit me. Dont forget us. Whom do you like best? Most of the time we have little trouble recognizing subject and verb because the subject usually comes before the verb and the object comes after it. The difficulty with who/whom arises from the fact that in a question, word order is reversed. We say Where are you going? and not You are going where?, Whom do you like best? and not You do like whom best? Things get really sticky when a sentence contains more than one clause (i.e., more than one set of subject and verb). The maids response is made up of two clauses. That is, it has two verbs: shall say and is calling. The subject of shall say is I. The subject of is calling is who. The clauses can be constructed in various ways: Who is calling, shall I say? Shall I say who is calling? Who shall I say is calling? The irony of Graftons criticism of the maids use of who is that elsewhere in the novel, Millhone doesnt always use whom when it would be appropriate. Conclusion The use of whom as the object form of who is on its way out of the language. More and more educated speakers and writers use who as both subject and object. There doesnt seem to be any reason not to. Who do you want? has become acceptable. Indeed, to the American ear, Whom do you want? sounds excessively proper. Personally, I like to observe the difference between who and whom in my writing, but I rarely do in speaking. Whatever you do, dont use whom as a subject! Ive seen it done, further proof that this particular point of grammar has lost its significance. If you arent sure whether to use who or whom, go with who. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:When to Capitalize Animal and Plant NamesAt Your Disposal

Sunday, October 20, 2019

Apostrophe with Plural Possessive Nouns

Apostrophe with Plural Possessive Nouns Apostrophe with Plural Possessive Nouns Apostrophe with Plural Possessive Nouns By Maeve Maddox Most English speakers know that the usual way to make a noun plural is to add -s to the singular: boy/boys, knight/knights, house/houses. They are also aware that the plural of few nouns, like child and ox, is formed with the quaint ending -en: children, oxen. The modern convention of forming a noun plural by adding -s was not a foregone conclusion. Old English formed noun plurals with five or six endings, depending upon which declension the noun belonged to and how the noun was used in the sentence. By the Early Middle English period (1100-1300), most of the OE inflectional endings had dropped away, but the plural ending -en was still in the running with -s and -es: for a time, at least in southern England, it would have been difficult to predict that the s would become the almost universal sign of the plural that it has become. Until the 13th century in the south the -en plural enjoyed great favor, being often added to nouns which had not belonged to the weak declension in Old English. –Alfred Baugh, A History of the English Language p. 191. We’ve seen how the apostrophe was added as the mark of the singular possessive because of a mistaken notion that a letter was missing before the -s. Once the ’s became established as the possessive ending of a singular noun, it was inevitable that the apostrophe would also be used in the formation of plural possessives. Although many writers misuse the apostrophe in the plural possessive, the rule is quite simple, in both American and British usage: If the plural ends with -s, add an apostrophe: the boys’ kites, the knights’ chargers, General Motors’ mission statement. If the plural doesn’t end with -s, add ’s: the children’s teacher, the oxen’s yoke. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:Yours faithfully or Yours sincerely?The Six Spellings of "Long E"3 Types of Essays Are Models for Professional Writing Forms

Saturday, October 19, 2019

Determinants of demand for airline tickets Term Paper

Determinants of demand for airline tickets - Term Paper Example Large carriers in the industry have quite dominated the market, but the tactics of small carriers have been expressed to develop, and be able to penetrate the difficult large carrier zones, by providing frequent services through low cost carrier. It also elaborates the yield management pricing strategy of airline industries to maximize their profits by providing similar services to their customers at different prices. Finally, other concerns that the customers and airlines should consider before respectively buying and selling their tickets, which may affect their satisfaction and benefits are discussed. Keywords: Airline Industry, Customers, Large Carriers, Small Carriers, Low Cost Carriers Pricing Strategy, Demand, Demand Elasticity, Tickets, Profits ,In Flight Amenities Air transportation is one of the fastest modes of travelling in the modern society that has embraced technology and is very concerned with time management. It is very flexible and timely, but not everyone has had t he opportunity to use it. The airfares are quite expensive and some societies may view air travelling as a luxury. However, airline customers are offered a variety of airline tickets to purchase according to their suitability. ... They include income, ticket price, competitor’s ticket price, economy state, customer’s income, availability of substitute mode of transport and substitute price, customer loyalty, fright frequency, and preference among other minor factors (2008). Airline Industry Oligopoly and Ticket Price Taking an example of U.S. market share of the airline industry, in the third quarter of 2009, the four largest carriers, Delta & North, American, United and Continental airlines held 21.8, 15.2, 13.0 and 10.1percents respectively, totaling up to 60.1 % while the others held the 39.9 %, which best refer to an oligopoly situation(â€Å"Airline competition,† 2011). In general Enz states that â€Å"air line in United States, European union and Asia are dominated by a few large carriers† (2010, 65). The Airline industry consists of numerous firms global wise, and at an individual nation level, that merge up at times to create competition in service production. An action by a ny firm carrier in the industry has an impact on the general market since they are interdependent on each other. An entry in the airline industry is often difficult, and the collusion of the few existing companies in the industry gives the merging group superior marketplace control. While providing similar products that at times may be having no variation, it is often associated with insignificant competition if not none preferring product differentiation for a firm uniqueness. If one firm decides to change the ticket price for its customers, then this action would adversely affect the demand of tickets and flow of customers in other firms. Stability of an airline firm in the industry becomes deeply connected to the action and reactions of every single airline firm. If one company

Friday, October 18, 2019

The Law of One Price - Purchasing Power Parity Assignment

The Law of One Price - Purchasing Power Parity - Assignment Example Multinational companies operating in countries such as those may be faced by risk emanating from their trade especially when there is a drawdown as well as repayment of Import/ Export Forex Loans in addition to disbursements of import/Export Bills denominated mostly in foreign currencies. Such companies will also be faced with risk emanating from Inward/Outward Remittances which are also denominated in currencies from other countries. There is also risk coming from overseas dividends that are arising from repatriating profit from overseas back home as well as operating expenses of overseas such as paying employees working in overseas. Lastly, foreign exchange risk may emanate from assets held in overseas countries such as excess cash balances of subsidiaries operating in overseas together with overseas liabilities that may result from the borrowing of foreign currency (Sharan, 2012). These fluctuations in foreign exchange rates may trigger changes in the value of the cash flows, liabilities and assets, particularly when they are denominated in foreign currencies. This means, therefore, such fluctuations may adversely affect a company’s outgoing import disbursements and incoming export funds. This is why management of foreign exchange risk is very important since it can help in minimising the risk or maximising the firm’s profit (Berg, 2010). A managed floating exchange rate is crucial for not only economic restructuring but also optimization of allocation of resources. This is because an exchange rate symbolizes price relations that exist between non-tradable and tradable goods and services. A regime of managed floating exchange rate improves the effectiveness of resource allocation, direct resources to the economic sectors that are mainly fuelled by domestic demand, for instance, the services sector, promotion of industrial upgrading, transformation of the economic pattern development, reduction of trade imbalances together with over-reliance on exports, all these stimulate economic demand to have an influential role in economic development and hence leads to promotion of balanced and sustained economic growth.

Personal Statement for a Business and Finance Final year student

For a Business and Finance Final year student - Personal Statement Example and I believe in life that the best educational institutes brings out the best in any scholar , this is why I have chosen to further my education at Hult International Business School. I realized early in life that we are put on this earth to build important things. Businesses are the drivers of our economy and the building blocks of society. Over the next five years, I hope that the things I learn at Hult will put me on a path to both professional and personal development. My short term goal is to start a small business. My long-term goal is to turn that business into a multinational company. My desire to study business stems from a willingness to make money and help others. I think that a job is the best form of social assistance. From the beginning, I have been interested in this field of study. I completed a Bachelors degree in Business and Finance, earning very good marks along the way. I learned that it’s businesspeople who create jobs. Studying business will ultimately be a highly rewarding experience. Therefore I am motivated in completing the business program successfully. I possess the intellectual commitment and compassionate interest to make this a satisfying and successful vocation. I truly want to leave my mark on the world by helping others. I realize this will not be an easy task, but I am motivated and determined. My perseverance and diligence will help me to reach my ultimate objective of completing the program successfully. Having a Masters from your institution will open up many doors for me. Please consider me for Hult International Business

Thursday, October 17, 2019

Civil Engineering Essay Example | Topics and Well Written Essays - 750 words

Civil Engineering - Essay Example pulated language and hence ease of interpretation and application, non-legalistic language, minimal use of such broad terms as â€Å"reasonable† and â€Å"fair† that induce subjectivity in interpretation and comprehension, clear demarcation and identification of roles and responsibilities of individual parties that form part of the project, simple structure and decisions supported with rational reasoning. It is a contract between a Contractor and an Employer. The employer is entitled to hire a Project Manager (PM) in order to get his work administered and his objectives safeguarded. As evident from the organizational chart below, NEC (ECC) contract is developed only between the Employer and Contractor. However, various other forms of NEC contracts have been published to organize the work and enhance coordination between various parties that are involved in the project. The Employer forms NEC PSC contracts with the PM, Designer and Supervisor. The Adjudicator is linked with both the Employer and the Contractor. The Contractor in turn, may hire Subcontractors for assistance and time saving. The Employer gets the work administered by PM. An NEC3 (ECC) encourages a PM to be proactive and work contrary to the general trend among PMs of reacting on what comes next. Being the administrator of Employer and working on his behalf, any decision that the PM takes has the same worth and applicability as that coming directly from the Employer. As per the ECC contract, PM is required to notify the Contractor about compensation events as they occur unlike most other forms of contract, in which it is for the Contractor to realize that he should be compensated for the change in nature or scope of work. Many times, the Contractor has to indulge in lengthy arguments with the owners in order to make them realize. This, in turn, ruins their inter-relationships, and the project suffers. Hence, in an NEC3 (ECC), a PM is more dutiful and watchful in the best interest of the overall project

Change inovation, exsperimintation and risk Essay

Change inovation, exsperimintation and risk - Essay Example The experts believe that innovation is especially important in today’s globalized world. However, the ability to create, conceive of, and bring to market new innovations is problematic if there is no effective leadership in the organization (Leaders are the major influencers of innovation and change for every organization (Sinar, Wellins, Pacione n.d.). According to Kouzes & Posner (2012), great leaders should be committed to both experiments and risk taking as these activities lead to small wins and enable to gain valuable experience for learning. In this case, small wins are â€Å"concrete, complete, implemented outcomes of moderate importance† (Kouzes & Posner 2012, 190). While taking risks and experimenting people, involved in highly intensive psychological environment, experience a high degree of stress and this experience enables them to cope with stressful and challenging situations in a positive manner. Such a behavior is definitely one of the important qualitie s of effective leader (Kouzes & Posner 2012). Sinar E, Wellins R, Pacione C., (n.d.). Creating the conditions for sustainable innovation. The leadership imperative. The Talent Management Expert. Retrieved from

Wednesday, October 16, 2019

Civil Engineering Essay Example | Topics and Well Written Essays - 750 words

Civil Engineering - Essay Example pulated language and hence ease of interpretation and application, non-legalistic language, minimal use of such broad terms as â€Å"reasonable† and â€Å"fair† that induce subjectivity in interpretation and comprehension, clear demarcation and identification of roles and responsibilities of individual parties that form part of the project, simple structure and decisions supported with rational reasoning. It is a contract between a Contractor and an Employer. The employer is entitled to hire a Project Manager (PM) in order to get his work administered and his objectives safeguarded. As evident from the organizational chart below, NEC (ECC) contract is developed only between the Employer and Contractor. However, various other forms of NEC contracts have been published to organize the work and enhance coordination between various parties that are involved in the project. The Employer forms NEC PSC contracts with the PM, Designer and Supervisor. The Adjudicator is linked with both the Employer and the Contractor. The Contractor in turn, may hire Subcontractors for assistance and time saving. The Employer gets the work administered by PM. An NEC3 (ECC) encourages a PM to be proactive and work contrary to the general trend among PMs of reacting on what comes next. Being the administrator of Employer and working on his behalf, any decision that the PM takes has the same worth and applicability as that coming directly from the Employer. As per the ECC contract, PM is required to notify the Contractor about compensation events as they occur unlike most other forms of contract, in which it is for the Contractor to realize that he should be compensated for the change in nature or scope of work. Many times, the Contractor has to indulge in lengthy arguments with the owners in order to make them realize. This, in turn, ruins their inter-relationships, and the project suffers. Hence, in an NEC3 (ECC), a PM is more dutiful and watchful in the best interest of the overall project

Tuesday, October 15, 2019

SLP - RECRUITMENT 401HRM Essay Example | Topics and Well Written Essays - 750 words

SLP - RECRUITMENT 401HRM - Essay Example CCGB is accountable for promoting and evolving original and prevailing trademarks. Reputable in West London and hiring 130 people, it manages over 20 brands in the Great Britain. On the other hand, CCE produces and dispenses soft drinks for The Coca-Cola Corporation and other additional brand owners. It hires approximately 4,500 people in the Great Britain and has a total of six industrial locations across the republic. The Coca-Cola Corporation employs the use of the following administration style: consultative democratic. This is a management style where the executives permit the workers to create ideas that are then sent to the directors who then consult their team to make the ultimate resolution. This corporation prefers to use this style since the resultant decision is from all the employees and management team. Consequently, the outcome is that it assists in motivating employees as they are conscious that they have a say in the corporation to some degree. The shortcomings of this style, is that the procedure is very time consuming and power will be necessary during the whole process. Management at Coca-Cola Company emphasizes on the procurement and preservation of exceedingly skilful and well-informed workers so that it can uphold its top place in the marketplace. It provides such environments of service and measures that permit all workers to progress a logic of harmony with the corporation and to carry out their responsibilities in the most enthusiastic and operative methods. It also provides for the sanctuary of service to the employees so that they may not be preoccupied by the reservations of their prospect. These goals, policies, guidelines, and curriculums are pre- specified by the firm, which leads the administration and unions in taking decisions. Also, they are in harmony with the administration’s aims, goals, policies, guidelines and its and internal and exterior settings. Job analysis is the process for

Monday, October 14, 2019

Franklin D. Roosevelt and the New Deal Essay Example for Free

Franklin D. Roosevelt and the New Deal Essay In solving the problems of the Great Depression, the New Deal had clear successes but also major failures. Although there were clear failures in relief and reform, the success of unemployment relief and the reform of banking, labor laws, and the standard of living partially solved problems of the Great Depression. The failures that occurred within the New Deal were early policies that attempted to relieve unemployment and reform labor laws. One of the policies enacted by the Emergency Congress in order to relieve unemployment and foreclosures of farms was the Agricultural Adjustment Act (AAA). This agency was to establish parity prices for basic commodities. The AAA planned to eliminate price-depressing surpluses of farm goods by paying farmers to reduce what they grew. These payments would come from raised taxes. However, this agency got off to a terrible start and never really recovered. Farmers, food processors, consumers, and tax-payers were all extremely unhappy. The AAA actually increased unemployment while other agencies of the New Deal were striving to decrease it. The failed agency of the AAA was finally killed by the Supreme Court in 1936 by declaring its taxation provisions unconstitutional. In addition to the failure of the AAA, the National Recovery Administration also failed. This agency was extremely complex and strived to assist industry, labor, and the unemployed. It attempted to both relieve and reform the problems of the Great Depression. Individual industries were to reduce hours of labor in order to allow employment to be spread to more people. A limit was put on the maximum hours of labor and a minimum was placed on wages. Workers were guaranteed the right to organize, the yellow-dog contracts were forbidden, and restrictions were placed on child labor. Although this agency had early success, it quickly collapsed in 1935. The agency gained many critics and business people publicly displayed the blue bird, which symbolized the NRA, but secretly violated the codes. The Supreme Court then unanimously held that Congress could not delegate legislative powers to the executive and declared that congressional control of interstate commerce could not apply to a local business. This finally  shot down the dying eagle. Although the intentions were to solve the problems of the Great Depression, the AAA made unemployment worse and the NRA flat out f ailed. In contrast to the failures of early New Deal policies, there was some success in unemployment relief. The same action of Congress that created the NRA also created the Public Works Administration which was also intended for industrial recovery and unemployment relief. Under this agency, $4 billion was spent on thirty-four thousand projects in infrastructure. It resulted in the spectacular achievement of the Grand Coulee Dam which provided irrigation for millions of acres of new farmland. It also created a surplus of electrical power, something that would be beneficial during World War II. The thousands of projects created by this agency and the creation of the Grand Coulee Dam show the success of this agency to employ numerous workers for the benefit of the country. The New Deal also had success in unemployment insurance through enactment of the Social Security Act in 1935. The measure provided for federal-state unemployment insurance and specified categories of retired workers were to receive regular payments from Washington. Provisions were also created for the blind, handicapped, delinquent children, and other dependents. Although many were excluded from Social Security, it showed the governments’ recognition that it has a responsibility for the welfare and relief of its citizens. The New Deal additionally had success in reform, specifically banking reform. President Roosevelt’s first action to attack the problems of the Great Depression was to restore confidence in the nation’s banks. The creation of the Emergency Banking Relief Bill placed poorly managed banks under the control of the Treasury Department and granted government licenses to those who were successful. The following week, millions of Americans re-deposited their savings, allowing banks to contribute to the country’s economic recovery. The government then later passed the Banking Act of 1933 which created the Federal Deposit Insurance Corporation to guarantee bank deposits. Roosevelt also instituted a number of inflationary measures in order to raise prices. Roosevelt’s immediate actions to reform the banking system of the United States were extremely successful and restored American  confidence in the banks. Confidence in the banks was the first step that allowed ev en more problems of the Great Depression to be solved. Not only was there successful reform in banking, but there was eventually successful labor reform. After the failure of the NRA to reform labor laws, Congress created the Wagner Act in 1935. This act reasserted the right of labor to organize and bargain through representatives of its own choice. In response to this act, a number of unskilled workers began to organize themselves into unions, such as the Committee for Industrial Organization. After a successful sit-in strike, the CIO was recognized by General Motors as the bargaining agency for its employees. The ability for unions to organize and successfully strike showed the success of this labor reform. Another successful reform under the New Deal was the reform of housing. To create a quick recovery and to increase the standard of living, Roosevelt set up the Federal Housing Administration in 1934. The building industry that was in charge of housing construction was to be stimulated by small loans to householders. The goal was to improve homes and to complete new ones. This New Deal reform was so successful that Congress bolstered the program in 1937 by creating the United States Housing Authority. Although there were some conflicts in completely reaching the goals of the USHA, slums in America shrank for the first time in a century, showing the success of this program. It is true that not every problem of the Great Depression was solved through the New Deal. There were definitely setbacks in the process of reforming and relieving the country, but many of the successful agencies New Deal were able to at least ease many of the problems of the Great Depression. The New Deal, although not completely, provided a step in the right direction for healing the United States.

Sunday, October 13, 2019

The Behavioral And Technical Approach Information Technology Essay

The Behavioral And Technical Approach Information Technology Essay Several viewpoints on information systems illustrate that the study of information systems is a field with multiple disciplines and therefore, no single theory or perspective governs. Generally speaking, the field can be separated into behavioral and technical approaches. The behavioral approach can be broken down even further into sub-categories to include economics, psychology, and sociology. The technical approach can also be broken down into sub-categories to include management science, computer science, and operations research. A very important element of the information systems field is involved with behavioral issues that surface in the development and preservation of information systems. Problems like strategic business design, implementation and utilization, and management cannot be fully explored with the models using a technical approach. Behavioral disciplines such as economics, psychology, and sociology can also contribute vital concepts and processes. For example, economists study information systems mainly interested in what impact systems have on cost structures within the business and within its particular market. On the other hand, Psychologists are interested in how human decision makers comprehend and use information. Finally, sociologists study information systems looking for how groups and organizations form the development of systems and also how these different systems affect individuals, groups, and organizations (Information Management, 2010).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The behavioral approach does not completely ignore technology. In fact, information systems technology is frequently the reason for a specific behavioral problem or issue. But usually the heart of this approach is not normally geared toward technical solutions. Instead it centers on modification in attitudes, management and organizational policy, and behavior. Technical Approach The technical approach to information systems puts emphasis on mathematically based models to study information systems, in addition to the physical knowledge and abilities of these systems. The disciplines that play a role in the technical approach are computer science, management science, and operations research. Computer science has to do with creating theories of computability, means of computation, and approaches to effective access and storage of data. Management science highlights the growth of models for decision-making and management procedures. Lastly, operations research deals with mathematical methods for optimizing business issues such as inventory control, transportation, and transaction costs (Information Management, 2010). Key Management Challenges Building, operating, and maintaining information systems in todays fast-paced business world can be very challenging. These key management challenges are based on a multitude of problems such as information system investments, strategic business decisions, globalization, information technology infrastructure, and ethics and security. Information System Investment Challenge If managed intelligently, investments in information systems can improve employees lives and a businesss overall performance. For instance, over the past twenty years the Internet has developed form a technical innovation to a personal and business necessity. Some businesss have recognized considerable improvements in processing information by changing from mainframe computing to personal computers connected by local area networks (LAN). The ability of software applications to identify and correlate pertinent data in a data warehouse allows businesses to uncover unidentified financial or physical resource relationships and therefore make available suitable assistance where there had been none. However, along with the ability to enhance lives and organizations, some information system investments can become risky, costly, wasteful mistakes. To overcome these challenges, senior management personnel need to be able to successfully evaluate these investments to ensure the correct return on investment (ROI) (Laudon Laudon, 2006). Strategic Business Challenge You can pick up any management book and you can read about the significance of developing a strategic plan, and ideas about how to both develop and implement your plan. On the other hand, you will also find articles that you imply that strategic planning does not work because it is impossible to develop a long term plan in this ever changing business environment. In my opinion, the truth lies somewhere in between. Strategic planning can definitely help you get prepared on what you need to accomplish over the next years, what things you will need to accomplish those goals, and exactly how to go about accomplishing your goals. The trouble is that the benefits of strategic planning can be easily lost. These plans fail primarily because of what happens after the process of strategic planning. In general, a great effort goes into creating and developing a strategic plan, which is then quickly put away and forgotten, even by the people that created it. The goal of strategic planning lies not only in the development of the plan, but also in its implementation. Implementing the strategic plan will only work if you are clear about what this plan can bring to you and the organization. The strategic plan needs to have value, not only to the organization, but also to the employees. The bottom line is that the plan needs to be used by everybody. A strategic plan needs to be used as a decision-making tool from the top of the organization all the way to the bottom. Chief Executive Officers ought to be able to use it to make decisions on the direction of their business, mergers, or staffing. Managers should also be able to use it to make decisions for the priorities of their departments goals and objectives, and to align the work of their department with the overall goals of organization. Lastly, every employee must be able to use the plan to recognize his or her own goals, and where they fit in big scheme of things. When implemented correctly, a strategic plan helps to add meaning and focus to not only every individual, but the organization as a whole (Information Systems, 2010). Globalization Challenge The globalization of information technology warrants special attention by business executives, government officials and scholastic researchers for a multitude of reasons. First, is that information technology and systems are high-technology industries of considerable size and with significant potential for stimulating economic growth and jobs. The immediate growth in global trade and the surfacing of an international economy require information systems that can sustain both the production and selling of goods and services in many different countries. Second, access to the most up-to-date computer and telecommunications technology is central to competitive success in nearly all industries. Government policies which deliberately or inadvertently retard technological progress in the production and use of computers, information systems and telecommunications have important economic effects. Third, given language barriers, cultural, and political differences among dissimilar countries, th is focus often resulted in confusion and the breakdown of central management controls (Laudon Laudon, 2006). To overcome these challenges, it is imperative for organization to develop global hardware, software, and information systems standards. Additionally, organizations must be able to create global accounting and reporting methods and design worldwide business processes. Information Technology Infrastructure Challenge This particular challenge for businesses deals with how organizations can develop information technology infrastructures that can sustain their goals when business situations are changing at a rapid pace. Aging infrastructure is obviously a huge issue in many industries that only gets bigger as time goes on. Some equipment may have had external upgrades or facelifts, but in most cases, it is over 70 years old. Many organizations are left with expensive and unmanageable IT platforms that cannot readily adapt to innovation and change. Additionally, a competitive business environment and the pressures of the global financial situation weigh increasingly on companies minds (Information Systems, 2010). To battle this challenge, some organizations may be required to redesign its organization and develop a new information technology infrastructure to survive in this competitive business world. Ethics and Security Challenge Organizations must always be cognizant that their information systems are used in both an ethically and socially responsible manner. Although information systems have provided many benefits, they have also created new ethical and security issues that must be addressed. Every improvement in information technology can be tied in with at least one ethical dilemma. From Facebook to ordering merchandise online, computer users are ignorant of the delicate balance between ethical behavior and profits. Businesses, software and hardware developers, and individuals must think about what is ethically correct when using information technology on a daily basis. The primary issues essential to the world of information technology are the individuals expectation of privacy and the providers ethical duty to use its applications responsibly (Information Systems, 2010). The challenges organizations will face will be how to apply high-quality assurance standards to their information systems, as well as to their products and services. Additionally, they will have to develop information systems that are not only secure but that are still easy to use by most individuals. Digital Firms A digital firm can be described as, One in which nearly all of the organizations significant business relationships with customers, suppliers, and employees are digitally enabled and mediate (Laudon Laudon, 2006, p. 11-12). The firms primary business processes are performed through digital networks encompassing the whole organization or connecting several different organizations. A core or primary business process can be defined as the minimum single tasks to be completed to provide a certain level of reliability in output, without any thought to hardware, software, or performance. When a core process is put into practice, anything can be added to make the process more efficient, but nothing can be removed. On the other hand, a business process can be defined as, The set of logically related tasks and behaviors that organizations develop over time to produce specific business results and the unique manner in which these activities are organized and coordinated (Laudon Laudon, 2006, p. 12). Digital firms are extremely powerful because they can sense and react to their ever changing surroundings much faster those traditions organizations. Because of their quick reaction and the fact that they are more adaptable than the traditional firm, digital firms are much more able to endure in unstable times. Because these new firms are completely digital, there exist much more opportunities for them in the global business word. The Internet is quickly becoming the information system infrastructure of preference for electronic commerce. It offers organizations an easy way to connect with other business and individual at an unbelievably low cost. Additionally, it offers a complete and uncomplicated set of technologies and technology standards that can be implemented by any organization. Organizations can use Internet technology to drastically cut their transaction costs, time searching for buyers and sellers, and gathering information on products or services. This information is at the fingertips of anyone with a computer and access to the Internet. One example of a powerful digital firm has to be EBay. Following 2001, there were a high number of dotcom businesses that failed, but there were a few that held their ground, like eBay. The success of eBay is based on its capacity to transform many splintered, predominantly local markets into global ones at a comparatively low cost to its users (Simonsohn, 2010). People have always had a basic need and an appeal in buying and selling used objects and collectibles items. Prior to eBay, people would have tried to sell their unwanted items through family garage sales, classified ads, and flea markets. Nevertheless, the amount of people accessible to sell these items to was limited due to the fact that face-to-face transactions were almost always required. Another great example of a powerful digital firm would be Google. Google isnt just legendary for producing and providing useful services, but it has also acquired a few innovative businesses and integrated them. These include YouTube, Blogger, Picasa and Jaiku. Google used its digital background to take advantage of opportunities in the global business world, making them one of the most powerful businesses to date (Google, 2010). Types of Information Systems For most organizations, there are many different requirements for data or information. Senior managers continually need up-to-date information to help aide in their business decisions. Mid-level managers may need a bit more detailed information to assist them in monitoring and managing a multitude of different business dealings. Lastly, supervisors and employees with operational roles need information in order for them to perform their everyday jobs. Consequently, organizations tend to have a number of information systems operating at the same time. The three I will be discussing are the management information system (MIS), decision-support systems (DSS), and the transaction processing system (TPS). Management Information System A management information system (MIS) management information system (MIS)System used to extract data from a database and compile reports that help managers make routine decisions. obtains data from a database to compose reports, such as detail reports, summary reports, exception reports, and financial statements to assist managers in making better decisions. The different types of reports depend on the specific information a particular manager may require. A MIS is largely involved with internal sources of information. MIS generally receive data from the transaction processing systems (TPS) and reduce it into a sequence of management reports. MIS reports generally are used by mid-level managers and operational supervisors (Laudon Laudon, 2006). Decision-Support Systems A decision support system (DSS)decision support system (DSS)Interactive system that extracts, integrates, and displays data from multiple sources to help managers make nonroutine decisions. is an interactive system that gathers, displays, and combines information from various sources to help managers make non-routine decisions. DSS are explicitly designed to help management make decisions in circumstances where there is doubt about the potential results of those decisions. DSS are made up of tools and procedures to help gather pertinent information and analyze decisions and alternatives. DSS often requires the use of complex spreadsheets and databases to produce what-if models (Laudon Laudon, 2006). Transaction Processing Systems The majority of organizations day-to-day activities are documented and processed by its transaction processing system (TPS)transaction processing system (TPS)Information system used to record and process an organizations daily activities or transactions., which collect input data and changes them into output information meant for a variety of users. Input data are called transactions which are transactionsFinancial and nonfinancial events that affect a businessevents that affect a business. Transaction Processing Systems (TPS) are intended to process everyday transactions accurately and efficiently. A business may have several transaction processing systems to include; billing systems, payroll and tax payments systems, production and purchasing systems, or stock control systems to handle all movements into and out of the organization (Laudon Laudon, 2006). Challenges Posed by Information Systems Although the many different types of information systems are available to an organization and can be extremely beneficial to its growth, there are some management challenges. Some of these challenges include the tension related to designing and building the information systems, the need for training for both management and employees, and the need to establish which information systems is the most critical, therefore which system receives the majority of the funding. For an organization to overcome these challenges they need establish exactly what is needed in terms of information systems. Next, they need to schedule and provide proper training to all company personnel, so they are familiar with the systems. Finally, they need to develop a method of accounting for the cost of the systems and their priority. Key Enterprise Applications Most organizations compete in an rapidly changing, aggressive, global environment. Operating in a global environment forces an organization to concentrate on the most cost-effective implementation of its processes, customer service, and speed at which their products or services are brought to market. To achieve these lofty goals, it is essential that the organization freely exchange useful information across different functions, levels, and business departments. By incorporating all its processes, the organization can more effectively exchange information between departments, customers, and suppliers. The four key enterprise applications are enterprise systems, supply chain management systems, customer relationship management systems, and knowledge management systems. Enterprise Systems Enterprise systems incorporate the vital business processes of an organization into a separate software system. Data from a variety of functional areas are centrally housed and maintained where they can be retrieved and utilized by other functional processes. This alters an organizations work flow. Now information can effortlessly run throughout the organization, increasing synchronization, efficiency, and decision making. Enterprise systems are extremely tricky to employ successfully and once employed, are especially hard to change. Enterprise systems, also known as enterprise resource planning (ERP) systems solve problems by providing a single information system for organization-wide coordination and integration of key business processes (Laudon Laudon, 2006, p. 56). Supply Chain Management Systems Supply chain management (SCM) can be described as an overseeing of resources, information, and finances as they move form supplier to manufacturer to wholesaler to retailer and finally to the consumer. Supply chain management requires managing and integrating the information, goods, and services flow together within and amongst organizations. Supply Chain Management Systems (SCMS) are used to help an organization manage its relationship with suppliers to optimize the planning, sourcing, manufacturing, and delivery of goods and services. SCMS supply information to aide suppliers, purchasing organizations, wholesale distributors, and logistic companies coordinate, schedule, and control business processes for their products and services (Su Yang, 2010). Customer Relationship Management Systems Many businesses make more profit from ongoing relationships with their customers than from the original sale. Customer relationship management (CRM) is a term applied to processes implemented by an organization to handle its contact with its customers. Customer relationship management systems (CRMS) concentrates on the coordination all of the business processes encompassing the organizations with its customers in sales, marketing, customer satisfaction, revenue optimizing services, and customer retention (Laudon Laudon, 2006). In todays highly-competitive business surroundings, the success of an organization relies greatly upon maintaining and exceeding customer expectations for both service and value. Knowledge Management Systems Knowledge management is the specific management of essential knowledge and information acquired by individuals so that it can be is effectively shared and made use of by other personnel in the organization. Through the successful sharing of corporate intellectual assets, Organizational Knowledge must be efficiently changed into business intellect. Personal knowledge concerning a business process must be converted into corporate knowledge ensuring it applied throughout consistently, ensuring maximum benefit to the organization. The main function of a Knowledge Management System (KMS) must be to make information obtainable to all authorized users (Laudon Laudon, 2006). However, implementing a straightforward information management system, file indexing and retrieval system is only the start. Securing corporate knowledge requires more than software and technology, it requires solid document management software and cultural alteration of how information is produced, handled, stored, and distributed.