Thursday, October 31, 2019

Scientific Method Applied to Forensic Science Paper Essay

Scientific Method Applied to Forensic Science Paper - Essay Example The scientific method is applied to forensic science to help forensic scientists gather needed evidence to come to a conclusion about a criminal event. Though it follows the same basic ideas and techniques as the original tried and true scientific method, forensic science has their own tweaked version of the method, which is as follows: observation and description of a phenomenon, or a group of phenomenon; formulation of a hypothesis, or hypotheses, to explain the phenomenon; use of the hypothesis to predict the existence of other phenomenon, or to predict quantitatively the results of new observations; â€Å"performance of experimental tests of the predictions by several independent experiments (James, 2009)†. These methods aid forensic scientists in the solving and understanding of the events of criminal investigations. The first step in the forensic scientific method is to observe and describe phenomenon or a group of such. The forensic scientist needs to be able to understand what they are seeing when they are viewing the crime scene and the evidence that they inspect. â€Å"If they describe it wrong or relay the information incorrectly, they will botch the experiment, thus botching the investigation and lessening the chances of solving the crime accurately (Braswell, 2007)†. They have to focus on the entire crime scene, taking in every bit of information that they can and making note and taking pictures of the totality of the scene. The recording of what they find allows them to look back at everything later, giving them the chance to find new evidence that they overlooked during the initial inspection. They have to look at the scene as a whole, breaking the scene up into smaller sections to further their collection of evidence and comprehension of the crime scene. With closer inspection, they can begin to understand what did take place, so all

Tuesday, October 29, 2019

How the epic poem Iliad influenced Alexander the Great Research Paper

How the epic poem Iliad influenced Alexander the Great - Research Paper Example The paper "How the epic poem Iliad influenced Alexander the Great" states the influence of Iliad to Alexander the Great. To a great extent, Iliad’s world was a world of heroism for Alexander. Homer’s heroes -especially, Achilles- had influenced the young mind of Alexander in his youth. But this world also taught him morality and courage to a considerable extent. It was the courage of Achilles’ courage -to go against Agamemnon’s tyrannous, unreasonable and despotic behavior- that inspired Alexander to raise his voice often against his father’s royal policies. Though he inherited much of the war-tactics and the wisdom of fighting and winning a war from his father Philip of Macedon, textual evidences from the â€Å"Iliad† show that a significant part of Alexander’s war-tactics had been induced and modulated by the war-tactics of Homeric heroes. This paper will explore into how Alexander had been influenced by Homer’s epic poem â₠¬ËœIliad’. Alexander’s real-life activities will be compared with the textual evidences in the poem. During the formative years of his early life Alexander had been greatly influenced by the â€Å"Iliad†. Since his time, he has turned into a legendary personality. He appears to one of the most influential historical personalities who tamed the world by their courage. But this legendary personality himself has been inspired tremendously by the Greek mythologies and legends. During the early years of his life, Alexander studied the ‘Iliad’. The courage and heroism of the Greek heroes.... The courage and heroism of the Greek heroes in the story were greatly shaping the young mind of Alexander. Especially the Homeric hero Achilles attracted him so much that he decided to imitate him in his real life. Till his death, the Achillean motivation to fight in a war has haunted Alexander’s mind. This Achillean motivation is best described in the following speech of Achilles: â€Å"If I hold out here and I lay siege to Troy, / my journey home is gone, but my glory never dies. / If I voyage back to the fatherland I love, / my pride, my glory dies. . . .†1 The famous Historian Plutarch comments that being pleased by Alexander’s passion for Achilles, Aristotle himself prepared an annotated copy the ‘Iliad’ and gave it to the young boy. This annotated copy of the Iliad accompanied Alexander till the last day of his life. He even slept with it under his pillow, as Chris Whitten says in this regard: â€Å"Emulating the famous hero was apparently enc ouraged by his teacher, the great philosopher Aristotle†¦.Aristotle personally annotated a copy of the Iliad for Alexander. Alexander kept it with him throughout all his later travels, even sleeping with it under his pillow.†2 Another event in Alexander’s life inspired him to mould his life after Achilles. His mother, Olympias, had been able to convince young Alexander that he was the descendant of Achilles and Hercules. Though Olympias’s story seems to be a sheer fantasy, it shook Alexander’s young mind vehemently and prepared him mentally to keep the fantasized Achillean heroic family tradition intact. Iliad’s Role on Alexander’s Conflict with Philip II From the very beginning of his career in the Macedonian Army, Alexander began to react against

Sunday, October 27, 2019

Management of Contractual Risks

Management of Contractual Risks 1 Introduction Managing risk should be a fundamental part of bidding for Building or Highways work. Risk is described by Atkinson (2001) as the probability of an occurrence of a hazard and the magnitude of the consequences. Consequently risk may also be considered as the possibility of an experience happening and the resultant effect of the experience if it ere to take place. As defined by RICS (2010) risk management is a means of processes where risks are recognised, examined and then of course controlled. It is a constant cycle that begins at the pretender stage; this means that risks of events are put into a bid from the start and also at the end of construction. During the different phases of a project, many new even previously un-thought of risks materialise throughout. Recognising them quickly allows faster mitigation; in order to reduce impact risk has on the project. This study has examined the inaccuracy of pretender process of managing risk with the use of both pretender and contract registers. There were also opportunities, they were recognised. The subject area of risk was selected following discussions with managers and work colleagues, during my 2010 placement year with Sir Robert McAlpine (SRM). This topic was considered as an ideal subject area for a research project because SRM were improving the system they currently incorporate. So the plan of the study was to advise any conclusions made on the research, so as to further enhance the pretender practice within SRM. My colleagues gave me some risk data sheets for a few projects. The emphasis being on highway construction, as this information was available from my placement and SRM. 1.2 Rationale The subject of what to research developed from consultations with colleagues and the line manager at SRM. My colleagues were interested in the managing of risk and were working to improve SRMs pretender risk process to ensure it replicated the contract phase a bit more. This therefore illustrated a requirement in the business and indeed construction for research in to this topic area. The main reason for eventually electing the subject area of risk was the open access of information provided by SRM and the contact with knowledgeable personnel in my placement. This gave a better understanding of the procedures, allowing greater understanding in subject area of risk. In addition access was gained during placement to potential data in the form of contract and pretender risk registers from various Highway works undertaken by SRM. The aim of the research as came about by undertaking literary research, up to that point none of the data was collected, or plan formulated of how to use the data. The aim was to understand how pretender recognition of risks may be inaccurate. After that considering how it could be improved and whether it was possible to do so. Subsequently, recording any conclusions of pretender process in order to develop and better it. 1.3 Hypothesis, Aims and main Objectives 1.3.1 Aims Were to see if management of the contractual risks identifies significant additional risks that the pretender risk process failed to recognise and thus determine how inaccurate the pretender risk process is. 1.3.2 Objectives Find the processes presently employed to deal with risk, in both contractual and pretender phases and in recognising and measuring them. Investigate if important additional contractual risks recognised were within the pretender phase register. Compare SRMs risk management processes with other contractors and analyse to find the best solution. If possible, note any resulting conclusions and input results within the pretender register then produce a new and accurate one. 1.3.3 Hypothesis The management of contractual risks in Highway construction successfully identifies additional risks, consequently pretender appraisal has become inaccurate. 1.4 Overview of work done / Methodology 1.4.1 SRM schemes/jobs The SRM jobs used on the research comprised of, M1 J25-28, and A19 upgrade (both Highways Agency jobs) and M74 Glasgow council, all Highway projects. A19 was Term Maintenance Contract (TMC) whereas M1 J25-28 and M74 upgrade were (MAC) contracts. When examining the A19 upgrade the contractual records were acquired but the pretender risk records were not. However the contractual records were compared to a risk bid from a different project. Not ideal but the only solution at the time. The majority of the items were related, so comparable/related items were drawn from the pretender items, then included in the A19 contract register. An evaluation was done involving the contract and pretender risks. To do this the max, min, probable costs in addition to the likelihood of a risk event were incorporated from contract and pretender appraisals. A total assessment of the risks was calculated via averaging the max, min as well as probable costs which are multiplied against the likelihood of the risk event. All risks types were identified, in order to distinguish trends in risks recognised at the pretender and found in contract phase or were not found at all. The A19 contract risk register was distinctive to M1 J25-28 and M74 upgrade registers as it didnt contain costs. Every risk was divided by its probability and impact, whether that was high, medium or low appraisal. The pretender register, risk items were fitted against the occurring contractual register items. To see if every item in the registers were done, costs and probabilities were assigned to the A19 contractual risk method of appraisal. In getting a total assessment, both probability and risk price were multiplied. These costs were then evaluated against the overall pretender costs. 1.4.2 Highway contractor Interviews Interviews via telephone were conducted with a few companies to really see what processes are used at post contract and pretender. Also to find out how precise these methods are. Companies interviewed were: Morgan EST. Vinci Balfour Beatty May Guerney 1.4.3 Literature Review In order to understand the risk management procedures in construction and more specifically in Highways work a literary review was embarked on. This meant the research would gain an appreciation of the perception of risk by construction, prior to any literary review, my personal experience had only come from SRMs perspective and the processes they use. In order to gain real understanding and to funnel clearly on what my hypothesis stated, it was decided to split the literature review into two sections. One section, comprising of processes used by industry, taken from an assortment of books. The second section being that of SRMs highways process and accompanying documents. This makes it possible for an assessment to be conducted between SRM and the other contractors, like how different stages of a contract work in Highway works. 1.5 Overview of conclusions Both the information gained and analysis undertaken, imply the data could sustain the theory and main aims. Due to a large risk amount being found in contractual phase that was not previously seen at pretender. Even though assessments for any one risk were fairly inexact, overall assessment of pretender and contractual seemed strong. Showing pretender registers was inaccurate and needed to be better if assessments and risk management has to become more reliable. 1.6 Report Guide 1 Introduction An opening on the managing of risk in the dissertation while validating the basis in selecting the subject area. The introduction states the aims, objectives and hypothesis that the researched was established upon, as well as outlining the work done and an overview of the Conclusions. 2 Methodology Explains the methods used to investigate my hypothesis, from Literature review, approaches used in analysis and review of information and any outcomes. This expresses the reasons for utilising the techniques chosen also any research restrictions. Its meant to be a methodical, simple approach to how things were done. 3 Literature Review This chapter contains my understanding and Knowledge of the subject area. Done by means of, studying the risk process used in management through books, journals and the internet. Allowing a greater comprehension of risk in Highways work, and how its viewed and used. 4 Results and Analysis Confirms the outcome in the investigation and subsequent breakdown of SRMs jobs as well as the Highway contractors interviews. It outlines the judgments made concerning the pretender and contractual assessments. The Hypothesis was then tested against the information found, to see if its statement is true or false. 6 Conclusions- This analyses all the results in relation to the hypothesis and if theres is any basis that it will hold up. Detailing limitations affecting the research, while also imparting proposals for both industry and any future dissertations. 2 Methodology 2.1 Introduction Methodologies are vital to the accomplishments of research and must be dealt with care in order for the most appropriate research methods to be chosen (Fellows and Liu, 2008). The methodology outcome depended on the subject area, research aims and amount of literature review obtained. For data collection and analysis, the methods employed ought to be realising the aims and objectives so as to continually test the hypothesis and validate the research. The information that was obtainable and available played a huge role, as work on the dissertation could not be done if the information wasnt relevant. The information therefore can be decided by the hypothesis, as if the information was not on hand then one cant trial the hypothesis. Due to these factors, risk management was identified as an appropriate topic from the beginning, but it wasnt until the research was started that defining the hypothesis was possible, yet having an impression of the aims and objectives that were to be accomplished. From the off, the aim was to gauge how precise pretender risk management was, even if unsure of the data and information existing prior to consulting SRM team. Ultimately this section highlights the research methods utilised in the research, and the close association that has been made when doing so between the methods and Aim, hypothesis and objectives. 2.2 Aim Employed to help concentrate the methodology in choosing the right methods, also to clarify to the person who reads the dissertation what precisely was being investigated. So this shall be done by recalling the Aim set out: To see whether the post contract risk process identifies key additional risks that the pretender risk process failed to recognise and thus determine how inaccurate pretender risk process is. 2.3 Quantitative and Qualitative methods In Data collection there are two key styles; quantitative and qualitative forms of research. Quantitative method, being a grouping of information done using figures, which is then evaluated by arithmetical trials to trial an assumption or theory (Creswell, 1994). While the Qualitative method was quite different, instead using connotations, previous incidents and words (Naoum, 2007). Quantitative Methods can be less difficult in examining; it creates measurable outcomes that create analytical arithmetical results. They tend to be better for others to read and understand. While, qualitative information from research has a tendency to be complicated as it often requires researcher input and manipulation to ensure its appropriate for investigative procedures (Fellows and Liu, 2008). The methods adopted depend upon data obtainable as well as the research itself. By executing good research, its generally required and essential to use both quantitative and qualitative. Therefore a mixture o f the two was brought to play, for a more correct and more reliable conclusion; more is detailed further in this section. 2.4 Literature Review As mentioned previously literary appraisal was undertaken; providing a core subject knowledge in risk management of Highway construction. The idea in doing this was grasping how risk was analysed in Highway construction sector, and the procedures used in controlling it. Next research was done to discover how risk was managed, by using literature in form of books and journals. Then see SRMs risk management process from their risk management documentation. Dividing the literature review in two sections meant that one of the objectives could be fulfilled by comparing SRMs risk management approach with other construction companies. By doing the literary appraisal it imparted a better comprehension of the chosen topic of risk, and illustrated the problems and successes in risk management. While also showing the diverse and numerous ways in managing risk, and how the approach identified and selected can depend on many issues like project type, contract used or even size of companies and jobs themselves. The list literature sources below were used in delivering the dissertation:   Textbooks -were very useful in gaining the relevant knowledge of risk management, and procedures used. Books located in the library were discovered using the computer search engines. using. Chapters needed or thought appropriate were studied, and compared against searches that had been made on the internet. A check system, which assessed the validity of both sources of information against each other. With much of the research it became apparent that information in books available werent current especially in the older series of books. Despite this it wasnt a predicament for Risk management as texts of up to ten years old were and are significant and applicable now, with some techniques having improved. The books allowed for great comparison for up to date information on the internet. Journals were again located on the Loughborough University library database, which with the relevant buzz words located material of use. Finding journals proved difficult in comparison to textbook numbers, yet the sources were helpful.   Internet supplied a platform for research of literature. Being easy to use and handy, collating information could be done at speed and with relative ease. It allowed greater understanding of what type of book would be needed from the library. Information from the internet was important but it had its limits and it was vital to know that it can be inaccurate and cause misguidance, research can be more guaranteed with text and journals. This way of thinking about limitations in using the internet was in mind when searching websites on risk in the construction. Finding various helpful websites any information was compared other websites in order to increase reliability, but most importantly against book and journals. As with all research appropriate sources of reliability were identified and used like the RICS website. Two editorials from RICS site provided constructive, and were used in the literature review. In finding books the internet was most useful as many articles on websit es highlighted book of particular relevance and use.   SRMs Risk Management Procedures document SRMs risk management procedure document was used as section two of the literature review. Reading through the document and important information was used in the literature review, particularly, on the processes used by SRM in risk management. A comparison was made between SRMs procedures and with those found in the first half of the literature review. 2.5 Data Collection When actually collecting the data for the research the collection was again split into two parts. The initial data collection was from SRM projects, other data collection was associated to other contractors. The intention was to compare the risk procedures, and attempt at analysing which was the superior one. The next section shows how all the data collection was collected and prepared. 2.5.1 SRM Projects The information on the SRM jobs were formed while in placement during 2010, while working on the M1, involved in subcontractor packages and various Quantity surveying related work. Prior to any data collection, discussions with colleagues and senior managers took place in order to help formulate and aid the research as what would be required in terms of data. At this stage no hypothesis had been decided, the idea was to assess the accuracy of risks in the pretender assessments. Therefore colleagues stated and recommended the use of valid information in the form pretender and contractual risk registers could be provided. The contracts that would be made available were the M1 J25-28 scheme, A19 upgrade and M74 Glasgow project. Three similar Motorway/road maintenance projects that differ from each other contractually. A19 upgrade was a TMC to maintain, operate a network of strategic roads in the North East. M1 J25-28 and M74 are both MAC contracts for similar maintenance one in the midlands and the latter in Glasgow. A19 upgrade and M1 J25-28 are HA run, while M74 was for the Glasgow city council. The HA run their contracts by splitting their contracts into 13 sections in the UK, and in these projects cases offer for the extension and maintenance of the roads within these sections. The reason that A19 upgrade was a TMC but M1 J25-28 and M74, MAC based contracts were that previous to the MAC HA projects were also run with the TMC contract, but now all is done under MAC style. The contracts run for 5 years with optional extensions. Different sections of maintenance start and end at different areas on the motorway in question over a 5 year cycle, meaning that when MAC contracts were first used, some sections werent using them and using TMC etc A19 upgrade was a TMC completed in 2009, whereas M1 J25-28 scheme was a modern MAC contract just saw completion in late 2010. The difference in MACs and TMC are TMC two separate companies, one as managing agent the other as main contractor. MAC consists of the 1 contractor, running both as an agent to the client and as main contractor on site. Using the three contracts as the basis for the research the risk manager on the placement at SRM provided a pretender register for the M1 J25-28 risk management and A19 contractual phase, both of which he had involvement on. Trying to get pretender ones for M74 was problematic but couldnt find any. In order to have a full complete analysis, it was decided that for M74 to use another MAC pretender risk register. Pretty much similar to M74 except the location geographically. For sure this would create limitations but it could possible in using another risk register as SRM do when starting on a new comparable bids. So similarities would be high and that as long as it was noted in the dissertation as to its use and reasons why. Due to the generic nature of the risks they were deemed suitable as with what SRM do in practice. While on placement working on the M1 J25-28 contract meant developing contacts with colleagues who work day in day out on the subject are. Therefore requesting registers on M1 job was easier than the other jobs. The A19 contractual register came to me inn the same way. Getting the M74 contractual register, as the risk team on my placement had contact details for which to enquire with and the registers were duly emailed. 2.5.2 Rival Highway Contractors Obtaining information via rivals in the sector of road maintenance was much more difficult than from SRM sources, as they were very protective of information they gave out. The SRM jobs were Highways related, so the focus was getting some from Highway firms. By doing additional data collection it allowed for an honest comparison between SRM and other contractors. The methods were expected to have been alike if not the same, involving different construction projects; the data was likely to be different. The plan was to send questionnaires to the chosen contractors, but after unsuccessful returns it became apparent that another route would be needed, so interviews via telephone were deemed suitable. It seemed with written survey, contractors were inclined to take no notice of it or put a more generic thoughtless answer, While via a telephone interview response to the questions asked would be immediate and better, with no real confusion of what the question was asking as myself in person could explain. The Highway contractors contacted were: Morgan est. Vinci Balfour Beatty May Guerney A semi-structured set of questions was planned in order to gain the information required but also allowed telephone participant to elaborate and discuss the subject in a friendly professional manner. Contractors in Highways works were contacted, the dissertation of Risk Management was explained with the aims and objectives that needed to be achieved and asked the below queries: Does your company possess a methodology for the management of pretender risks? How does your company detect risks in the pretender phase? How does your company calculate final risk totals? Does your company undertake risk management after the contractual phase? ould I obtain a pretender and or contractual risk register to use in my research (for the Highways project you are on)? Each Contractor interviewed was told research being undertaking intended in contrasting data in pretender phase against the contractual as well as any assessments made. The questions were supposed to see what processes companies used in managing risks. Overall the different companies were helpful in answering these questions. The Fifth and final question was done to get registers like that gained from SRM. It was the only difficult part as many refused to hand registers over from live projects due to the sensitivity of their data and company policies. However some registers were received but didnt really contain the crucial information required just a formatted company risk register. Throughout the interviews, notes were made on the first four questions and the results put into a table at the time of the interview showing the company and their response to each question. Thus, making analysis easier when looking at the responses later in the dissertation. 2.6 Analysis of data Prior to analysis, the research had assessed how SRM price risks. It was crucial in knowing this before as it established the type of analysis would that be approved, and is detailed below. Upon formulating the risks that have been identified each risk will be categorised with maximum, most likely, minimum values and probability. The data was put through a programme @ RISK formulates hundreds of simulations, creating a graph showing the data. The 75th percentile is put in the final pretender as the final risk total. SRM do this for all of their projects. For this dissertation we were concerned in the risks recognised and individual costing risks as shown in paragraph above with min, max and probable etc. The focal point being what was keyed in to @ RISK as opposed to what it produces. For the Data analysis the SRM contracts have been split into their individual projects and the Other Highway contractors. The reason for splitting the SRMs projects was that the analysis varied in parts by way it had been collected as mentioned earlier (some with full risk registers some in part). 2.6.1 M1 J25-28s scheme and M74 Glasgow Analysis for M1 and M74 projects were pretty much the same. The M1 contract and pretender risk register could be matched up to the pretender and contractual registers for the M74 contract risks, due to them being MACs. In evaluating the accurateness of the risk registers and appraisals made, comparable risks to contractual register were then removed from the pretender. When comparing values in matching risks, it was vital to have a total value for both pretender and contractual registers. The best and most impartial methods for pretender register were to average the minimum, maximum, probable figures then multiplying by likelihood of the event. These were a range of potential expenses which could be incurred by the risk, and any total cost was decided to be an average of these, as all projects had them. As its unknown as to its actually occurrence the average should be multiplied by the probability, which gives a total potential cost to the risk. While the contract risk registers should be considered by severity and possibility by scale of 1-5, and then an assessment of the risk was undertaken, figuring out the most likely value as well as minimum and maximum. Mitigation measures are identified for each risk, and then assessment was done again as before the mitigation. The M74 didnt have min prices in its contractual register, therefore all risks were assumed to be zero. Without any minimum values any overall assessments of the risk would not have been made. The reason for not using the likely value instead was so the data would use a range of values. It was decided greater accuracy would be found in setting the minimum as zero and range of values than the most likely. By setting all its risks as zero means they are an unimportant minimum value or a risk/event that doesnt happen. The M1 contract register had all the necessary values so no intervention was needed. Both contract risk registers failed to show any probability, just a likelihood scale from 1-5. Therefore it was assumed, giving the scale a percentage instead, 10%, 20%, 30%, 50%, 70% and 90%. Then the total appraisals of the contractual registers were done through an identical method. Where similar contractual risks could be distributable to a few pretender risks in a register or vice versa, the total appraisal amounts were split by the quantity of risk items, in preventing them being counted twice. This was tabulated under the headings; the contract risks, pretender risks, information put into the registers, and total assessment. The contract risks were then categorised: Unrecognised however is protected (No value). Unrecognised but not protected ought to have been recognised. Unrecognised unable to recognise. Recognised while also protected. Identified yet unprotected. Each risk was grouped by colour to state which category from above it fell in. 2.6.2 A19 upgrade The breakdown of the A19 job was began in a similar way to the M1 J25-28 and M74 contracts. The measurement total cost for pretender register was done the same as in the other projects by averaging and the different range of values and dividing by probability of them occurring. When totalling the contract risks differences became apparent as the register calculated risks another way, as there were no costs. So Instead they were measured under the probability and impact style grid, using severity status as guides, whether that be low, medium or high. So in order to measure the total value of risks would mean assigning each risk a value and probability based on the risk severity system used, then times the two numbers to get the total assessment for that given risk This therefore required the assignment of cost and probabilities to be accurate. So by using the Risk severity matrix as used by SRM, a cost could be associated to a certain risk level. With use of the grid SRM review probability/likelihood with a scale from 1-5 and assign costs in numerical order of the probability scale for impact: Below  £1,000 Between  £1,000  £10,000 Between  £10,000  £100,000 Between  £100,000  £1,000,000 Above  £1,000,000 The figures above seemed a very useful guide and perfect to use, create a good range that could be easily used in analysis. The likelihoods for the risks events were given percentages instead of low, medium, high, so as to fit in to correspond and be like the information found in M1 and M74 projects, so: Low being 10%, Medium at 50% High 90%. These numbers were chosen as the provided not too certain outcomes for low and high at 10 and 90 percent, while the medium suited to being the mid point between the two figures. So in getting the total risk value, costs times probability. Then the rest of the analysis followed the same steps taken by M1 and M74 data analysis. 2.6.3 Analysis summary The tables of data for all three projects showing the comparisons made are in the appendices. These tables were only a start in analysing data as they on their own only show limited information that cannot fully test the hypothesis. So Risk recognition was key objective and so a list was formulated of any risks recognised, not recognised and not assessed, were omitted. From this list, risks could be categorised and therefore see which type of items could or could not be seen in pretender by the bid team. Now having had risks recognised and risks unrecognised as threats in pretender meant potentially testing a hypothesis as to whether pretender stage is inaccurate. From this new data 2 graphs were made highlighting and representing more clearly the type of items in registers that was recognised in pretender and those that werent. A review table was then drawn to finally account for the contract risks and categorised as below: Unrecognised however is protected (No value). Unrecognised but not protected ought to have been recognised. Unrecognised unable to recognise. Recognised while also protected. Identified yet unprotected. This table only really accounted for risks in pretender register which corresponded with contract risk, but not the other way round. So it didnt account for all risks found in pretender bid or how many werent in the contract register. So a total evaluation of risks featured in the pretender bid but not in the contract register, so as to fully see the accuracy or inaccuracy of it. As a result a Pretender table of risks recognised at contractual phase was made and the total appraisals done at both pretender bid and contractual phase were compared and contrasted. Last part glimpsed through inaccuracies of pretender register. Done by removing risks identified in pretender and contractual documents, the disparities then tabulated. The variations were categorised, and detailed in a Histogram. 2.6.4 Rival Highway Contractors The ways in which the other Highway teams identified assessed risks at pretender stage, were investigated. This was done by referring back to the table formulated at the time of the interviews. Proceeding with recognition and classification methods, digging out the methods used, what company used what method type. The same was done for the appraisals of risk, so formed 2 pie charts showing the recognition and appraisal of the rival companies risk management processes. It illustrates the most popular methods used by the Highway Contractors interviewed. These methods were compared against the methods SRM use. Many of the companies did turn down the opportunity in handing over information, citied by them as the company policies not to do so and the information is delicate. However some registers were received but didnt really contain the crucial information required just a formatted company risk. Also it proved difficult to obtain pretender and contractual registers, instead receiving o ne without having the other to compare against. Need to fill in contractors interviewed etc!!!!! It was very helpful to look at the various formats of different registers that companys used, and the informatio

Friday, October 25, 2019

Privatization Essay -- Government Businesses Papers

Privatization Privatizing services is a more attractive option for most local governments and is widely practiced around the state. There are certain government services in which it is impractical to create a free competitive market. For others, it is almost impossible to predict the potential success or failure of privatization. These unclear predictions make privatization a very complicated issue for local governments. The combination of rapidly rising service costs and slowly increasing revenues has led officials in some cities and counties to use non-traditional income services to fund government options. Throughout the mid 1980's state and local governments continue to be in trouble because of the rapid increase in the demand for services they provide along with an increasing resistance on the part of their citizens to raising taxes in order to provide those services. Privitization is an outsourcing of functions to private companies that the financial burdern of providing these services shifts from the taxpayers at large to the individual consumers. Doing away with government services at the local level is almost impossible. Elected officials are often resistant to vote to cut services. The elected officials are usually familiar with the people who might be negatively impacted by such an action. Citizens usually do not want to do away with local government services because they view services such as water/sewer, fire , police and recreation as being life sustaining. Citizens feel that services can't be provided adequately by state or federal governments, and would like to keep services at the local level. A factor to keep in mind when looking at the potentials and downfalls of privatization is the private... ...ion/BURZASH.htm. Privatization on the Roll, says RPPI http://www.reason.org/apr98central.html The Opportunities and Challenges of Privatization http://www.doe.gov/privatization/report/chapt-3.htm The Opportunities and Challenges of Privatization http://www.doe.gov/privatization/report/chapt-4.htm The Legal and Political Enviornment of Privatization http://www.eia.doe.gov/emeu/pgem/ch1c.html ASCH, Peter, and Sececa, Rosalind S. Government and the Marketplace 2nd Edition. The Dryden Press, a division of Holt, Rinehart and Winston, Inc., 1989 Weicher, John Private Innovations In Public Transit. Washington, D.C.: American Enterprise Institute for Public policy Research, 1988 Krikorian, Greg and Riccardi, Nicholas Board Votes to Test Privatizing Child Support System. Los Angeles Times, November 11, 1988.

Thursday, October 24, 2019

How Technology Advancement has influenced Computer Ethics Essay

The 21st century has been dubbed †the digital age† because of the monumental achievements witnessed in the Information, Communication and Technology (ICT) fields, which have impacted every aspect of human life. The internet has become one of the most lucrative Information Technology (IT) tool which has made communication and exchange of information faster and efficient. Consequently, it has transformed how people consume information. In spite of its benefits, the internet has led to a severe decline in ethics among internet users (Salman, Saad & Ali, 2013). The widespread use of internet has led to increased and sophisticated crimes, terrorism and wars (May, 2004). This essay will be based on a case involving hackers who hold Personal Computers (PC) hostage. It will outline the potential computer ethics issues associated with holding computers hostage. It will also highlight methods that computer users could use to prevent this type of attack. Moreover, it will highlight governmental legislations that could be enacted against this type of attack. Ethics is defined as the principles governing both right and wrong among free humans (free moral agents), whose actions are influenced by their freedom of choice (Soskolne, n.d). Advancement of technology presents both positive and negative impacts to a society. Technological advancements have led to a rapid decline in social and ethical issues regarding to security and privacy of personal information (Shieh & Tanthuwanit, 2004). One of the major forms of social ethic violation includes hackers holding personal computers hostage, and hence infringing on both privacy and security of targeted computer users. This in turn compromises information security concerned with the protection of information confidentiality, availability  and integrity (Gordon & Loeb, 2002) According to Perlroth (2014), cyber criminals have devised a new mechanism of freezing computers through malwares, and then demanding a steep ransom pay before unlocking them. Perlroth (2014) adds that computer owners throughout the world have fallen victims of this malicious attack, which denies them access to their personal computers and files stored on them. The hackers instead serve them with a â€Å"pop up† message demanding some ransom payment before their computers could be unlocked. Hackers holding computers hostage infringe on personal privacy, and gain access to sensitive information regarding online bank accounts, security passwords and other highly private information (Perlroth, 2014). Security systems and other general-purpose computers are also vulnerable to this kind of attack because, if these hackers can break into users’ accounts even from [GoDaddy] domains to create malicious subdomains through which they send mails to target clients (Perlroth, 2014), then every computer system is vulnerable to such attacks. This means that not only is the privacy of the computer users compromised, but also the security of their data and the general security of their computer systems (The Canadian Press, 2014). In order to prevent hackers from holding computers hostage, computers users should double check their domain names, user accounts or web addresses before responding to any email clicks. In line to this, Perlroth (2014) observes that: Hackers were breaking into GoDaddy users’ accounts with stolen passwords and setting up what is known as a subdomain †¦ hackers would set up the Web address†¦ then send emails to customers †¦ because it appeared to come from a trusted source – was more likely to lure clicks. Likewise also, users should either contact an IT professional to help them remove the ransomware incase infected, or they can wipe their computers clean through formatting them and reinstalling new Operating system as well (Perlroth, 2014). In addition, professional network security personnel should be consulted in order to ensure that passwords, firewalls, authentications and proxy servers among other security utilities are properly set and enhanced to fortify system security (French, 2012) Although the hunting, catching and eventual convicting of these hackers has not yet achieved substantial success (Perlroth, 2014), the government should enact privacy laws that pronounce higher penalty for perpetrators of personal privacy and security infringement so that their benefit is less in value when compared to pending punishment. Some of the active laws that have been enacted to curb this tragedy include the Computer Fraud and Abuse Acts which cover the use of malicious codes including worms, viruses, and other malicious programs intended to alter or damage data in a user’s computer (Title 18 U.S.C Section 1030). Another legislation that could counter this attack is the National Information Infrastructure Protection Act (NIIPA) which criminalizes the transmission of a command, program, or code with malicious intentions [like holding a compute hostage] (Colombell, 2002). In conclusion, when hackers hold computers hostage, they infringe on the personal privacy and security of personal information. During the period when the computers are held hostage, computer users not only risk having their sensitive information accessed and sometimes damaged, but they are also financially exploited in order to have their computers unlocked. Some of the feasible strategies of avoiding this attack include exercising a lot of care regarding the types of sites visited and clicked, and avoiding sending payments to hackers whenever a computer is hacked. Instead seek immediate assistance from a professional who will help you to manually get rid of the ransomware without paying the hackers off. References Colombell, M., R. (2002). The Legislative Response to the Evolution of Computer Viruses. 8 RICH. J.L. & TECH. 18. Retrieved from < http://jolt.richmond.edu/v8i3/article18.html> French, A., M. (2012). A Case Study on E-Banking Security – When Security Becomes Too Sophisticated for the User to Access Their Information. Journal of Internet Banking and Commerce, 17(2). Gordon, L., & Loeb, M. (2002). The Economics of Information Security Investment. ACM Transactions on Information and System Security, 5 (4), 438–457. May, M. (2004). Federal Computer Crime Laws. SANS Institute. Retrieved from < http://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446? Show=federal-computer-crime-laws-1446&cat=legal > Perlroth, N. (2014, April 22). Hackers holding your PC to ransom. Deccan Herald. Retrieved from < http://www.deccanherald.com/content/297460/hackers-holding-your-pc-ransom.html.> Salman, A., Saad, S., & Ali, M., N. (2013). Dealing with Ethical Issues among Internet Users: Do We Need Legal Enforcement? Asian Social Science, 9(8): 3-8. Shieh, M., & Tanthuwanit, K. (2004). Privacy and Security: Internet Hacking and Surveillance. Retrieved from < http://www.ethicapublishing.com/CH16.pdf> Title 18 U.S.C Section 1030, internet, http://www4.law.cornell.edu/uscode/18/1030.html Soskolne, C., L. (n.d). Workplace Health and Safety Information: Ethical Issues. Retrieved from < http://ilocis.org/documents/chpt19e.htm> The Canadian Press (2014, April 14). Computer hacking expert says more bad news to come from Heartbleed. Edmonton Journal. Retrieved from

Wednesday, October 23, 2019

Equality and Diversity Essay

I am writing a reflective account on how my personal beliefs and experience’s influenced my professional interaction with various groups and individuals. For example my first job in the care industry was working at a nursing home for residents with all forms of Alzheimer’s. I had never done this type of work before, so my first day for me was both a new experience and environment. I had never dealt with people who have a communication barrier, where they could not express their emotions. see more:champion equality diversity and inclusion Before having worked in the care home, and not having any knowledge on Alzheimer’s, I would have categorised them all in the same box, i. . all being the same as opposed to possibly having different stages and levels of Alzheimer’s. I also found it hard to grasp and understand how you could forget the basic aspects of what we do in everyday life i. e. eating, drinking and remembering your own name. I therefor found it hard to communicate and engage with them, as I did not understand their condition. Prior to working with Alzheimer’s patients I had never come across somebody who, not only had Alzheimer’s, but in addition was hard of hearing and/or partially sighted. I found this difficult at first because I didn’t know how to interact with them. I overcame this by learning to understand each one of their characteristics, by the way they spoke, mannerisms, their body language and by getting to know them as an individual. I learnt how I could interact with them on a one to one level and ascertain their needs and requirements. Alzheimer’s patients need a certain level of care, therefore I undertook training that was offered by my place of employment. This included a person first and dementia second course which explained how the resident should always come before the dementia and how their best interests should always be taken into account as a first priority. In addition I undertook a course on palliative care. This taught me how to care for somebody who was in their finally stages of dementia ,in terms of assisting them, improving their quality of life and by providing increased comfort by promoting their dignity towards the end of their life. I also took a course in movement and handling where I learnt how to manoeuvre my residents in a safe manner by either using sliding sheets or hoisting equipment, these techniques helped me to assist them with as little discomfort as possible. Some of our residents are unable o communicate with us and are unable to express feelings of discomfort or pain, so this course was beneficial to me because it provided a safe way for me to move my residents with ease. If i was to continue exclusively in this line of nursing, I could do NVQ courses in health and social care with my place or of work, and attend courses they provide for me. If I wanted to further my career I could potentially go onto university and train to be a mental health nurse. This will enable me to be more aware of how this disease can start and what’s involved in the long term. Following Gibbs framework on reflection (1998) stage 5; I conclude from this experience that I have gained more patience with others by understanding their different needs. I have learnt how to communicate on different levels, with residents, family members, colleagues and senior professionals i. e. doctors and nurses which I struggled with initially. I have become more compassionate as a result of dealing with the end of life process, so my personal beliefs or thought process will not influence my professional interaction with dementia patience because I have gained a better understanding of their condition.

Tuesday, October 22, 2019

Tic tac toe Essay Example

Tic tac toe Essay Example Tic tac toe Paper Tic tac toe Paper Tln01nga goal weak methods: depth-first search (DFS), breadth-first search (BFS), constraint satisfaction (CSP) strong methods: use heuristics, A* search s goal nodes Tic Tac Toe Playing Strategies Two players human computer. The objective is to write a computer program in such a way that computer wins most of the time. Three approaches are presented to play this game which increase in Complexity Use of generalization Clarity of their knowledge Extensibility of their approach These approaches will move towards being representations of what we will call A1 techniques. Tic Tac Toe Board- (or Noughts and crosses, Xs and Os) It is two players, X and O, game who take turns marking the spaces in a 33 grid. The player who succeeds in placing three respective marks in a horizontal, vertical, or diagonal row wins the game. 2 4 5 6 8 9 7 positions Zero-Sum Games Focus primarily on adversarial games Two-player, zero-sum games As Player 1 gains strength Player 2 loses strength and vice versa The sum of the two strengths is always O. Search Applied to Adversarial Games Initial state Current board position (description of current game state) Operators Legal moves a player can make Terminal nodes Leaf nodes in the tree Indicate the game is over Utility function Payoff function Value of the outcome of a game Example: tic tac toe, utility is -1, O, or 1 Game Trees Tic tac toe Two players, MAX and MIN Moves (ana levels) alternate Detween two players Minimax Algorithm Search the tree to the end Assign utility values to terminal nodes Find the best move for MAX (on MAXS turn), assuming: MAX will make the move that maximizes MAXS utility MIN will make the move that minimizes MAXs utility Here, MAX should make the leftmost move Minimax applet Minimax Properties Complete if tree is finite Optimal if play against opponent with same strategy (utility function) Time complexity is O(bm) Space complexity is O(bm) (depth-first exploration) If we have 100 seconds to make a move Can explore 104 nodes/seco nd Can consider 106 nodes / move Standard approach is Apply a cutoff test (depth limit, quiescence) Evaluate nodes at cutoff (evaluation function estimates desirability of position) Alpha-Beta Pruning Typically can only look 3-4 ply in allowable chess time Alpha-beta pruning simplifies search space without eliminating optimality By applying common sense If one route allows queen to be captured and a better move is available Then dont search further down bad path If one route would be bad for opponent, ignore that route also Max 71 No need to look here! Maintain [alpha, beta] window at each node during depth-first search alpha bound, change at max levels beta = upper bound, change at min levels = lower Alpha Beta Properties Pruning does not affect final result Good move ordering improves effectiveness of pruning With perfect ordering, time complexity is Goals To reduce the space complexity Game can be played one or two players Builds High-Level Game Contain Levels

Monday, October 21, 2019

Free Essays on Cockpit Design

Stanley N. Roscoe wrote â€Å"Ergavionics: Designing the Job of Flying an Airplane,† which is a study of the ergonomic principles that govern the design and operation of an airplane cockpit. Ergavionic principles deal with control location and operation, display integration and pictorial realism, and control/display direction-of-motion relationships (Roscoe, 2002). The goal of Ergavionics is to decrease the role human error plays in aircraft crashes; human error is the leading cause of all aircraft accidents. Fuel mismanagement is a large factor in human error, aircraft crashes. Beech aircraft are problematic because there are two tanks in the aircraft, so the fuel indicator always reads full, if the fuel tanks are not switched then the aircraft engine can be starved of fuel. â€Å"The National Transportation Safety Board has found â€Å"fuel mismanagement† to be the probable cause of a highly disproportionate number of CFIT accidents involving fuel starvation in Beech airplanes† (Roscoe, 2002). In fact, this university experienced an accident of this sort in the spring of 2004, when an aviation student crashed landed as a result of fuel starvation. Roscoe believes there should be a new, safer, design. This design finally came after litigation became so costly that management finally decided to introduce a safer design in their new planes (Roscoe, 2002). There is a controversy regarded whether or not the â€Å"little plane† or the artificial horizon should move on an attitude indicator. In response to the controversy, regarding the attitude indicator, Roscoe proposes a solution. A flight path predictor can be added to the conventional moving horizontal display by allowing the airplane symbol to move in immediate response to control inputs and in the same, expected direction. When tested the flight path predictor resulted in immediate improvement in landing approaches (Roscoe, 2002). Other improvements, which technology is currently ... Free Essays on Cockpit Design Free Essays on Cockpit Design Stanley N. Roscoe wrote â€Å"Ergavionics: Designing the Job of Flying an Airplane,† which is a study of the ergonomic principles that govern the design and operation of an airplane cockpit. Ergavionic principles deal with control location and operation, display integration and pictorial realism, and control/display direction-of-motion relationships (Roscoe, 2002). The goal of Ergavionics is to decrease the role human error plays in aircraft crashes; human error is the leading cause of all aircraft accidents. Fuel mismanagement is a large factor in human error, aircraft crashes. Beech aircraft are problematic because there are two tanks in the aircraft, so the fuel indicator always reads full, if the fuel tanks are not switched then the aircraft engine can be starved of fuel. â€Å"The National Transportation Safety Board has found â€Å"fuel mismanagement† to be the probable cause of a highly disproportionate number of CFIT accidents involving fuel starvation in Beech airplanes† (Roscoe, 2002). In fact, this university experienced an accident of this sort in the spring of 2004, when an aviation student crashed landed as a result of fuel starvation. Roscoe believes there should be a new, safer, design. This design finally came after litigation became so costly that management finally decided to introduce a safer design in their new planes (Roscoe, 2002). There is a controversy regarded whether or not the â€Å"little plane† or the artificial horizon should move on an attitude indicator. In response to the controversy, regarding the attitude indicator, Roscoe proposes a solution. A flight path predictor can be added to the conventional moving horizontal display by allowing the airplane symbol to move in immediate response to control inputs and in the same, expected direction. When tested the flight path predictor resulted in immediate improvement in landing approaches (Roscoe, 2002). Other improvements, which technology is currently ...

Sunday, October 20, 2019

Observations on What Is Language

Observations on What Is Language Language- more specifically human language- refers to the grammar and other rules and norms that allow humans to make utterances and sounds in a way that others can understand, notes linguist  John McWhorter, an associate professor of English and comparative literature at Columbia University. Or as Guy Deutscher said in his seminal work, The Unfolding of Language:  An Evolutionary Tour of Mankinds Greatest Invention, language is what makes us human. Discovering what is language, then, requires a brief look at its origins, its evolution through the centuries, and its central role in human existence and evolution. Greatest Invention If language is mankinds greatest invention, it is supremely ironic that it was actually never invented. Indeed, both Deutscher  and McWhorter, two of the worlds most renowned linguists, say the origin of language remains as much as mystery today as it was in biblical times. No one, says Deutscher, has come up with a better explanation than the tale of the  Tower of Babel,  one of the saddest and most significant stories in the Bible. In the biblical fable, God- seeing that people of the earth had become skilled in construction and had decided to build an  idolatrous tower, indeed an entire city, in ancient  Mesopotamia  that stretched to the heavens- infused the human race with a myriad of tongues so that they could no longer communicate, and could no longer build a massive edifice that would replace the almighty. If the tale is apocryphal, its meaning is not, as Deutscher notes: Language often seems so skilfully drafted that one can hardly imagine it as anything other than the perfected handiwork of a master craftsman. How else could this instrument make so much out of three dozen measly morsels of sound? In themselves, these configurations of the mouth- But, if you run these sounds through the cogs and wheels of the language machine, says Deutscher, arrange them in some special way and define how they are be ordered by rules of  grammar, you suddenly have language, something that an entire group of people can understand and use to communicate- and indeed to function and a viable society. Chomskyan Linguistics If languages mysterious origin sheds little light on its meaning, it can be helpful to turn to Western societys most renowned- and even controversial- linguist: Noam Chomsky. Chomsky is so famous that an entire subfield of linguistics (the study of language) has been named after him. Chomskyian linguistics is a  broad term for the principles of  language  and the methods of language study introduced and/or popularized by Chomsky  in such groundbreaking works as Syntactic Structures  (1957) and Aspects of the Theory of Syntax (1965). But, perhaps Chomskys most relevant work for a discussion on language is his 1976 paper, On the Nature of Language. In it, Chomsky directly addressed the meaning of language in a way that foreshadowed the later assertions of  Deutscher  and McWhorter. The nature of language is considered as a function of knowledge attained...[T]he language faculty may be regarded as a fixed function, characteristic of the species, one component of the human mind, a function which maps experience into grammar. In other words, language is all at once a tool and the mechanism that determines how we relate to the world, to each other, and, even to ourselves. Language, as noted, is what makes us human. Expressions of Humanity Famed American poet and existentialist, Walt Whitman, said that language is the sum total of all that humans experience as a species: Language is not an abstract construction of the learned, or of dictionary makers, but is something arising out of the work, needs, ties, joys, affections, tastes, of long generations of humanity, and has its bases broad and low, close to the ground. Language, then, is the sum of all human experience since the beginning of humankind. Without language, humans would be unable to express their feelings, thoughts, emotions, desires, and beliefs. Without language, there could be no society and possibly no religion. Even if Gods wrath at the building of the Tower of Babel led to a plethora of tongues throughout the world, the fact is that they are still tongues, languages that can be deciphered, studied, translated, written, and communicated. Computer Language As computers communicate with humans- and with each other- the meaning of language may soon change. Computers talk through the use of  programming language. Like human language, computer language is a system of grammar, syntax, and other rules that allow humans to communicate with their PCs, tablets, and smartphones, but also allows computers to communicate with other computers. As  artificial intelligence  continues to advance to a point where computers can communicate with each other without the intervention of humans, the very definition of language may need to evolve also. Language will still always be what makes us human, but it may also become the tool that allows machines to communicate, express needs and wants, issue directives, create, and produce through their own tongue. Language, would then, become something that was initially produced by humans but then evolves to a new system of communication- one that has little or no connection to human beings.

Saturday, October 19, 2019

The Death Penalty Research Paper Example | Topics and Well Written Essays - 1250 words

The Death Penalty - Research Paper Example Summary of the major issues, concepts and distinctionsThe death penalty is not a new phenomenon in the society, and it has been in existence over the last decades. Even today, many nations still practice death penalty including the US, who believes to be the human rights advocates. This was witnessed when it hanged the Iranian president, Saddam Hussein. There are still lingering and unanswered question regarding the death penalty. Many people believe that the continuous existence of death penalty in the 21st century compromises the role of the justice system. For instance, the justice system was established with the desire for rehabilitation but not retribution (Norman, 1995). Therefore, it is unconvincing to kill a convict because the justice system has made a judgment. To many people, the death penalty is immoral and unethical. Life is un-alienated right that everyone should enjoy. Hence, human rights activists believe that taking ones right more so natural right is immoral and une thical.The justice system of any nation has a role of rehabilitating the offenders so that they don't repeat the same crime. Because of this, the convicts are given another new chance to re-evaluate themselves and start a new life. Imposing death penalty on criminals is an indication of failed justice system as it is an unethical practice. As much as a person who commits capital offenses deserves capital punishment, the death penalty is harsh and compromises the role of humanity as well as natural rights (Norman, 1995).

Friday, October 18, 2019

B2B and B2C Marketing Assignment Example | Topics and Well Written Essays - 1000 words

B2B and B2C Marketing - Assignment Example Thus, business buyer demand is derived demand. It means that there is an impact of all the determinants of individual demand on the derived demand of the business consumers. Moreover, it also means that it may be possible in the consumer market to mold the demand but it is rarely possible to mold the demand of business consumers. The demand in the business market is more inelastic than the consumer market. It means that the demand of the consumer market is not affected by short-run market price fluctuations. The business market contains fewer but larger customers but in the individual consumer market, the number of buyers is large but average quantity they purchase is small. Moreover, the business market is geographically more concentrated as compared to individual customers. The promotional techniques used in marketing for business are different from that for individual customers. For B2B marketing, usual techniques are direct sales, trade discounts, personal networking etc. However, for B2C marketing, the promotional techniques are advertising and other above the line (ATL) marketing techniques. Since the buying decision is very crucial and any error in that decision may cause a great loss, the buyers of the B2B are more rational, whereas, many consumer buying decision is derived by emotional appeals. The example we have chosen to demonstrate the difference between B2B and B2C is the automotive industry. The automotive industry may serve both the purposes, B2B and B2C. If an automotive industry is manufacturing cars to be sold to the individual consumers, it is B2C market operation, and however, if ACE Car Rental, a car rental service provider, purchases a car from the same vendor (Toyota Motor Corporation Australia). In that case, it would be the B2B market.  

Consumption Patterns Research Paper Example | Topics and Well Written Essays - 1000 words

Consumption Patterns - Research Paper Example The consumers market is made of product, price, place and promotion all surrounded by economic, political, cultural, demographic and technological factors. The buyer may be influenced by knowledge, lifestyle patterns, perspectives, taste, character and motivational factors in buying the product. Prior to buying the same product, one may decide to search information about it from various sources, one may look for an alternative product, recognize a problem with the product or decide to buy it later. Purchasing the product can depend on one’s individual taste, brand recognition, dealer, amount of the product, or the time the product is being sold (Boone & Kurtz 287). In the United States, various types of consumer behavior exist among different parts of the country. America has been inhabited by many types of cultures over the years. This immigration has not only formed an outstanding culture but also created various subcultures or ethnic groups within the whole of America. Thes e groups have the same religion, beliefs, heritage and experiences that distinguish them from other members of the society. African Americans and Asian Americans are an example of such groups and compose of around a third of the US population. Hence, their similarities contribute to possession of the same consumption patterns (Hoyer & Falcnnis 323). A minority of the ethnic groups exhibit different behavioral patterns with each group having specific preferences in food, clothing, music, and cosmetics such as skin and hair care products among others. American consumers for instance demonstrate a desire to embrace new fashions as well as frequent shopping compared to others. Media also affects consumption patterns. Some media exist for a specific ethnic group or many subgroups. Hence, it may decide to use the ethnic language to conduct its advertising and promotional campaigns to reach the target audience. Religion brings with it values, and beliefs about various issues such as unders tanding of sex, family life customs, norms and morality. What is consumed is guided by religion, a key concern that should guide marketers in product distribution. Consumers shopping behavior is largely influenced by their different needs and preferences (Meisis & Tait, 123). African Americans African Americans display a large and widespread group that is composed of many subgroups with regard to regions, academic and profession. According to reports, almost 30% of the population possesses 50,000 dollars and above GDP while 46% stays at home majority of whom are single parent families where women are the main breadwinners. On the level of education, almost 15% are college graduates out of the 24% of the whole us population. In terms of consumer behavior, African Americans believe in freedom of life, dressing and presentation. They are very independent and value their culture, which they struggle to maintain as they are mostly less concerned with other groups way of life and do not e asily imitate. Their consumption patterns are grounded on the principles of individual presentation, importance of style and beauty. In relation to the above is the search for recognition and status revelation. In the attempt of describing their fashion statement, African Americans mostly buy the ‘boy’s clothing’. This has made them become targets for commercial advertisers due

Investment appraisal as a form of management control Essay

Investment appraisal as a form of management control - Essay Example This is then followed by the various investment methods in practice. The traditional and discounted cash flow methods are then discussed in detail. It is essential for the management to choose the appropriate investment appraisal technique to be followed and hence the next section focuses on the selection approach. This section throws light on the merits and demerits of the various investment appraisal techniques as well. In order to understand the importance of security projects (non-financially justifiable), a case study is then taken, where a security team makes a proposal to the management to invest on a security project. It is evident that, in the corporate world, the management takes decision based on financial benefits and hence the security team has to justify the investment. The case study uses two methods, NPV and IRR, to arrive at the benefits from the investment. Based on the results, one of these methods is finalized and presented to the management. In order to understand the need for investment appraisal to management control, it is essential to discuss about the various types of investments and the degree of impact they have on a company’s growth. Any growing company continuously invests on new projects to increase its net worth or value. There are various types of investments made by companies every year. These investments can be as large as setting up an entire unit or as small as buying stationery for the company. The management needs to ensure that all the investments made by the company are justified and are necessary for the business. This is very essential as these decisions directly affect the value of the company and in turn, the shareholders. Management generally classifies all investments into financially justifiable investments and non – financially justifiable investments (Weston and

Thursday, October 17, 2019

The Meaning of Family Research Paper Example | Topics and Well Written Essays - 250 words

The Meaning of Family - Research Paper Example One can choose company, not family. Although in the most liberalist view, people cohabiting say that they form a family, yet it is nothing more than a group of people living together. Thus, company is often confused with family, though the two are quite different fundamentally. This can be attributed to the fact that people in company often take one another’s care, care being one of the essentials of the family. â€Å"Family, is essentially, made of those people who look after, who play a crucial role in our upbringing and who teach us those lessons in life, which can never be learned through any school or text book† (Gaikwad). Different people interpret the meaning of family differently, thus limiting it or not to blood relations (â€Å"Meaning of family†). People in one family share common values, norms and culture. Younger ones gain inspiration from the elderly, be they parents or older siblings. Members of a family share good and bad times with one another. F amily is the source of moral and emotional support for individuals in times of distress. Works Cited: Gaikwad, Mukta. â€Å"Meaning of Family.† 2011. Web. 19 July 2011. . Kimani, Anthony K. â€Å"Influence of Family Structure on Juvenile Deliquency.† University of Nairobi. 2010. Web. 19 July 2011.

Wednesday, October 16, 2019

Should China's neighbours be concerned that 21st century China will Essay

Should China's neighbours be concerned that 21st century China will revert to Middle Kingdom dominance over them based on Chin - Essay Example It is a country with a great vision and focus and while its neighbors term it as a small a nation, its upcoming dominance might shake the world. The world has been under the influence of the current super powers who reign on the basis of their world war two military prowess. Their dominance is based on past events and the mindset that other small countries are inferior in their cultures and forms of governance. But according Martin Jacques believe Europe and the United States will eventually watch as China rises to power while their dominance and influence declines (Martin, 2009, Pg. 99). China has set its eyes to greater achievements by mobilizing the entire nation to move as one family towards a common goal. With great development policies the economy of China has been on the record in the past decades for its significant growth. It employs different mechanisms that are very outstanding and free from Western influence. Though the Western countries still relate the country to its pa st failures in terms of lack of their style of democracy, poor standards of environment conservation and tribal affiliations, China has picked herself from its past inequities to a more transformed nation. But their attitudes have diverted the Western nations understanding of China in its real present terms. Most of these powerful countries don’t believe that China will economic growth would last at all. The history of its past regimes failing to sustain the country is their point of judging the current regime. But over the past thirty years they Chinas leaders have all a common objective of steering the country to greater economical heights (Wang, 2003, Pg.122). Political regimes in these years have without been the most successful in the history of china. Therefore China now boasts of the greatest achievements in the recent times. The diversity and racial distribution in this populous nation is quite big and more unified than any other powerful nation. China looks at itself as a civilized nation other than influenced nation state. There is a closely knit tie that makes the society and the state a due to their attachment in their worship of ancestral ways (Brodsgaard, 1998 Pg. 88). Their traditions, Chinese foods and their unifying language give every citizen a sense of belonging in this country. This cohesion has been its source of development force over the years. China strives to empower every citizen despite of their race, culture or even religious affiliation. The country’s identity has been modeled by its history as a civilized state in terms of their way of thinking, identity and culture. Other powerful countries on the contrary have based their national identity on the past eras. This is evident in their ways of leadership and governance systems which have at most times divided their citizens in terms of inferiority. Such governance experiences a lot of opposition from their citizens. The luck of a united stand of these superpowers will be the source of their downfall in the near future as China braces itself to take over the world (Martin, 2009, Pg. 120). The United States and Europe have never given China a thought of taking over the world since they rule under the mediocrity of past WWII ideologies. But to their surprise the economic and technological advance of China will be the start of their downfall. China has for years improved its ties with other countries through trade and continued mutual

The Meaning of Family Research Paper Example | Topics and Well Written Essays - 250 words

The Meaning of Family - Research Paper Example One can choose company, not family. Although in the most liberalist view, people cohabiting say that they form a family, yet it is nothing more than a group of people living together. Thus, company is often confused with family, though the two are quite different fundamentally. This can be attributed to the fact that people in company often take one another’s care, care being one of the essentials of the family. â€Å"Family, is essentially, made of those people who look after, who play a crucial role in our upbringing and who teach us those lessons in life, which can never be learned through any school or text book† (Gaikwad). Different people interpret the meaning of family differently, thus limiting it or not to blood relations (â€Å"Meaning of family†). People in one family share common values, norms and culture. Younger ones gain inspiration from the elderly, be they parents or older siblings. Members of a family share good and bad times with one another. F amily is the source of moral and emotional support for individuals in times of distress. Works Cited: Gaikwad, Mukta. â€Å"Meaning of Family.† 2011. Web. 19 July 2011. . Kimani, Anthony K. â€Å"Influence of Family Structure on Juvenile Deliquency.† University of Nairobi. 2010. Web. 19 July 2011.

Tuesday, October 15, 2019

Hewlett Packard Swot Analysis Essay Example for Free

Hewlett Packard Swot Analysis Essay The Hewlett-Packard and Compaq merger decision case study provided many points necessary in the understanding of why these two companies would undergo a risky business venture. Compaq was a company that began successfully with record setting financial statements, but in an attempt to expand its market, threatened company stability. With the acquisition of Tandem Computer and Digital Equipment Corporation, Compaq experienced decreased revenues resulting in their inability to fully recover. In a competitive information technology market, HP was one of the industry leaders. Due to a failure to be proactive to market changes, HP grew stagnant and looked to reinvent company strategies through newly appointed President/CEO Carly Fiorina. Competitive advantages for both HP and Compaq included imaging and printing segment and high performance PC technology respectively. Management’s reasons for the merger included their assumption that together, HP and Compaq would be able to replicate and overtake competitors. Oppositions to the merger included a decrease in shareholder interests, a reduction of focus for company core competencies, and an unprofitable future. Several financial advisors and industry analysts were in agreement that the proposed merger would not be in the best interests of either company. Despite the uncertainties, information gathered and forecasts projected were in favor of the merger, which resulted in shareholder approval and the merger of Hewlett-Packard and Compaq Computer. SWOT Analysis In researching Hewlett-Packard’s present-day company position, a strengths, weaknesses, opportunities, and threats (SWOT) analysis was conducted. Strengths found include HP’s strong market position internationally and on the domestic end, a successful growth throughout large acquisitions, and a considerable brand value. HP currently has a 28.6% market share in the United States of America while internationally they stand at 17.7%. As the current number one leader in PC sales, HP has a solid market position. Although the strengths are allowing HP to maintain market position, there are also weaknesses present in all companies. Compared to other companies in the same industry, Hewlett-Packard lacks significant software product and management consulting services. As a result, Hewlett-Packard’s weakness is its weak market segment integration. HP is able to answer consumer demand when it comes to PC technology and imaging and printing software, but they fall short in t he software product creation and consulting services to combine with their successful departments of PC technology and imaging and printing services. As Hewlett-Packard continues to grow and seek an increase in market position, opportunities surface. A spin-off of the PC technology business, entering the cloud computing market, and expanding imaging and printing solutions portfolio are opportunities HP has going forward. In placing more emphasis on the PC technology aspect of the company, HP may find that this venture will become as profitable as the imaging and printing department in the long-run. With the announcement of this spin-off, their share of US PC shipment increased from 25.4% to 28.9%. This positive reaction from consumers is an early indicator of possible success as a result of placing resources to build up the PC technology department. Cloud computing is a fairly new concept in which resources and software are delivered through a network, mainly over the Internet. As this is market quickly growing in demand, HP’s introduction of HP Cloud Assure is a great opportunity for future prosperity. With success comes o pportunities of threats, and Hewlett-Packard is no exception. With projected decrease in information technology (IT) in the near future, an increase in demand for non PC devices, and competitors with more diversified portfolios, HP’s threats are numerous. Industry analysts have projected a decrease of IT in upcoming quarters which will decrease HP’s profitability. HP has already witnessed a decrease in consumer spending during last quarter’s back-to-school spending. If analyst projections prove to be true, changes will quickly need to be made. As more and more consumers are entering the non PC device era, HP is losing a segment of the market with their inability to provide products for this demand. HP’s more diversified competitors such as Dell and Samsung are able to easily capture the demand for these tablets. Future of the Company Through the case study, present-day SWOT analysis, and outside research conducted on Hewlett-Packard, the group has concluded that the company will remain constant, but unless strategies are implemented to answer more consumer demands, they may lose market share. New CEO Meg Whitman has a technology visionary that will shift HP’s focus to answering consumer demands. Her leadership capabilities and projections for company future are a desirable mix for a company to achieve sustainable future relevance. With the implementation of HP Cloud Assure, a new venture capitalizing on the growing consumer interest of cloud computing, HP is already adapting to answering the demands of consumers. As long as the company continues to anticipate and provide the products and services desired, sustainability will be maintained. Questions 1. What are the strategic challenges that HP is facing? Strategic challenges: Cost- reduction initiatives that included â€Å"difficult but necessary voluntary- severance programs† and manufacturing consolidations. â€Å"Unacceptably high expense growth† contributed to a decline in earnings from operations and net earnings. HP had a weak macroeconomic environment and competitive price pressures that led to slumping sales. Management was unable to keep pace of the changing market conditions which were a key contributor. HP management failed to follow Dell’s lead in adopting a low- cost, Internet based direct sales channel to offset its reliance on the retail channel. * Accelerating growth in existing businesses * Streamlining the existing decentralized operating model to fuel growth opportunities * Implementing a â€Å"total customer experience† approach * Taking advantage of HP’s strong balance sheet and cash generation capability to fund new growth initiatives * Leveraging HP’s market position * Creating e- services ecosystems and placing HP at the center 2. Is the proposed merger likely to address these challenges? Benefits from the merger included personal systems, improved economics, and innovation. HP management believed that the combined company would have a lower cost structure due to economies of scale. HP would also be able to leverage Compaq’s progress in developing a direct sales channel, yielding a more flexible distribution model. Complementary leadership in key markets: Compaq’s strength in industry standard servers, coupled with HP’s Linus and UNIX offerings, would result in an industry- leading product line spanning the entire server category. By adding HP’s strength in high- end storage, the combined company would be the industry leader in both the enterprise storage segment and the fastest growing sub-segment storage area networks. Doubling HP’s sales force, the merger would allow HP to increase account coverage and better compete for important customer engagements around the world. IT Services: Strengthened Business Provides Critical Mass in Key Growth Market- Management believed the merger would significantly strengthen HP and Compaq’s combined services business for several reasons. Financial Benefits- As predicted the merger would yield $2.5 billion in annual cost saving by mid-2004. Yes, we do believe the proposed merger is likely to address the challenges HP faces. 3. How do you interpret the market’s reaction to the proposal deal? We interpret the market’s reaction to the proposed deal to be negative. Just two months of the Merger announcement, HP’s share price trailed the preannouncement level by 27%, representing a loss of $12.3 billion of market share value at the same time comparable companies increased 9.9%. 4. If you were a shareholder of HP, how would you vote on the deal? If we were shareholders of HP, we would vote against the deal. It is obvious the company is losing a great deal of money at the same time other companies in the same industry are making money. The merger is not looking out for the best interest of the shareholders so we would not vote for the merger. Sources Bloomberg Businessweek http://www.businessweek.com/news/2011-10-12/hewlett-packard-gains-pc-market-share-after-mulling-spinoff.html CNN Money http://money.cnn.com/magazines/fortune/fortune_archive/2005/02/07/8250437/index.htm http://money.cnn.com/2011/09/22/technology/hp_ceo_fired/index.htm Hewlett-Packard Website http://www.hp.com/hpinfo/newsroom/press/2009/090331xa.html Hewlett-Packard Case Study â€Å"Hewlett-Packard – Compaq: The Merger Decision† Marketing Research http://www.marketingresearch.com/marketing/swot-analysis-hewlett-packard Jennifer Brown Synopsis The process of completing this assignment has helped me discover how to view business decisions in a more analytical way. When approaching this one it seemed overwhelming at first. I began pulling outside sources and background information that helped me gain a better understanding of the project at hand. That extra research was very useful in explaining what the companies were going through and giving different perspectives as to why. I was able to apply what I have learned in my accounting classes when the case study and articles referred to financial ratios and provided financial reports. That was helpful when trying to answer the questions assigned. Working with a group was also beneficial because there were several times my group members made great points that I may have missed working alone. Our group has met several times since the project has been assigned. I have been present at each meeting. Before we met the first time we decided we would read the case study in full to have an understanding of what we would need to do. Our first meeting we discussed the case study and our stance on what HP should do. We also discussed the questions within the case study and started our outline for our power point. Outside of the meeting I researched articles to gain background information. Our group had several more meetings at which we outlined our strategy report and assigned each person a portion of the report. When we were finished with our portion we would submit it to the rest of the group for proofreading. Everybody completed their task as set and we came together as a group and finalized the report. I, as well as the other members of the group, contributed to the makeup and layout of both the strategy report and the power point. Charnele Hodge Synopsis Being that this has been my first time in a group doing a strategy report on a company, I took away a few key elements. I have learned, understood, and properly used the purpose of a SWOT Analysis. I know this form of analysis will be used in my future endeavors, so I know it will be very beneficial to me. Also, I learned while in a group setting how to effectively achieve a SWOT Analysis to inform and persuade others to understand and see our point-of-view on our particular position. As a Business Management major, this group project has helped me realize that in not every group setting, that there needs to be a set leader. In my group, I felt that everyone meshed well with each other and there was not a constant need for someone to be in charge. Every group member knew what was at stake and that being at meetings and pulling her part in the group was essential. My individual contribution to the group was making sure that I gave my opinion on the different positions that we would be taking on the SWOT Analysis. I made it my individual objective to make sure that I pulled my part in completing each and every task that I volunteered to work on, that it was done properly, as well as completed on time. Being a Business Management major, I believe I helped bring balance among my other peers that are majoring in different genres in the college of business. I took a more realistic, rational approach to the group, in who would be better fit for particular objectives. Sakina Middleton Synopsis Conducting a strategy report required using resources from all aspects of my undergraduate studies. I was able to read the Hewlett-Packard and Compaq merger decision and understand the different aspects used to compile the information. In utilizing marketing concepts, I was able to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of Hewlett-Packard’s present company structure. My management background allowed for an understanding of company decisions made, such as whether to undergo a merger. Finally, the accounting knowledge I have acquired thus far has enabled me to read and comprehend the many financial statements used to decide which options should be made based on the factual numbers provided. Overall, my primary takeaway was my ability to read, comprehend, and analyze a case study regarding two merging companies with the knowledge and education provided by Savannah State University’s College of Business Administration. Throughout this project I was able to increase my ability to problem solve in a group of my colleagues. No one group is perfect, but the communication skills I have acquired allowed me to handle all situations appropriately and in a timely fashion. For this strategy report, I was responsible for arranging all group meetings regarding the collection and accumulation of information for the paper. I was the initiator of correspondence and also the channel of delivery for every member’s designated portion of the paper. My personal contribution includes the compilation on the strengths, weaknesses, opportunities, and threats of the present-day company Hewlett-Packard. I was also responsible for the editing of the final paper. Summer Wilcox Synopsis In March 2002, Hewlett- Packard’s current CEO and president, Carleton Firiona announced the acquiring of HP’s rival company, Compaq Computer. The merging of the two companies was designed to put Hewlett- Packard/Compaq in a position to challenge one of its top leaders in the industry, IBM. The merger was also designed to create a global technology powerhouse that would provide consumers with products and services demanded by profitable enterprise customers. After reading over the case, I started to feel like the merger was not going to be a success. The merger presented itself to be too risky. Although Hewlett Packard was aiming to become the industry’s leader by expanding into new markets, the idea of the merger just didn’t seem to look out for the best interest of the company. Management felt that HP and Compaq needed to improve their whole business structure to effectively compete with Dell which was the industry’s leader. They also felt that HP and Compaq’s leadership would complement each other in key markets such as the enterprise storage segment and storage area networks, and by having a broader portfolio of products and services. Management believed that HP and Compaq had a weak combination of products and services, and merging would strengthen that area. While some thought that the merger would be a success to Hewlett- Packard, there were some who were against it. Among those few were the director and son of HP cofounder William Hewlett, Walter Hewlett. Walter Hewlett was HP’s second largest shareholder and had a very powerful, important voting privilege of HP. Walter was against the merger for 4 main reasons. He felt the proposed merger would be worse, the integration risk of the proposed merger would be substantial, the financial impact on HP’s stockholders would remain negative, and the position of the company would not improve. I agree with opposing the merger of HP and Compaq. They knew from the beginning stages that the merger was going to be risky. Shareholders would lose and ample amount of value on their shares. Stockholders would get a very small amount of the combined company’s contribution to earnings. The merger would drown the stockholder’s interest in the imaging and printing business which is the most profitable of HP already. The merger would not improve the position of the company. Furthermore, HP had no experience with handling a merger of that size. All HP had to do was invest and focus more on the printing and imaging part of the company. The printing and imaging varied in low-end printers and supplies to commercial printing solutions. Instead of taking such a risky acquisition, they could have focused on something that proved already successful for the business. My contribution to the overall strategy report was to research where HP stands now. I also found official documents filed by both HP and Compaq to the SEC about the planned merger. The documents further explained forward- looking statements, assumptions, uncertainties, and risk of the planned merger between the two companies.

Monday, October 14, 2019

Recruitment The Process Of Searching The Candidates Commerce Essay

Recruitment The Process Of Searching The Candidates Commerce Essay According to Edwin B. Flippo, Recruitment is the process of searching the candidates for employment and stimulating them to apply for jobs in the organization. Recruitment is the activity that links the employers and the job seekers. A few definitions of recruitment are: A process of finding and attracting capable applicants for employment. The process begins when new recruits are sought and ends when their applications are submitted. The result is a pool of applications from which new employees are selected. It is the process to discover sources of manpower to meet the requirement of staffing schedule and to employ effective measures for attracting that manpower in adequate numbers to facilitate effective selection of an efficient working force. Recruitment of candidates is the function preceding the selection, which helps create a pool of prospective employees for the organization so that the management can select the right candidate for the right job from this pool. The main objective of the recruitment process is to expedite the selection process. Recruitment is a continuous process whereby the firm attempts to develop a pool of qualified applicants for the future human resources needs even though specific vacancies do not exist. Usually, the recruitment process starts when a manger initiates an employee requisition for a specific vacancy or an anticipated vacancy. Objectives of the study The purpose of this paper is to examine the employed jobseekers perceptions and behaviors of third-party online recruitment technology adoption in Bangladesh. There are two objective of this study: General Objective: To analyze the present online/web based recruitment selection of Bangladesh. Specific Objectives: To determine the steps involved with online recruitment selection process processes. To offer a guide to find out online recruitment selection process to job searcher companies job seekers. Show how this activities relate with the organization overall strategy and objective. To determine the organizational convenience regarding the online recruitment practices. To identify the candidates perception about online recruitment practices. Methodology Theoretically speaking, online Recruitment and Selection are two separated functions. Recruitment deals with the forming a pool of applicants for a particular job, whereas Selection deals with finding the best one of the lot. There are two methods: Primary Data: In the primary source, data are being collected directly from some multinational company like; AKTEL Mobile Company, GP (Grameen Phone) Mobile Company, British American Tobacco Bangladesh and much more. Secondary Data: In the secondary source, different textbooks and journals relating to the theoretical frame work of the project was accessed to define and to determine Online Recruitment Selection Process. Moreover, annual reports, company projects profile, related preserved data, catalogs and also from the Internet. Limitations No proper information about organization recruitment selection interview. The Multinational Company has many secrete policies for the organization which is very much related with recruitment selection process they were not interested to prove that information. Some information presented in this report may be biased, as people tend to avoid their own limitation regarding their job and to hold other departments responsible for drawbacks of their own. Moreover, some information was withheld to preserve privacy of the company. So, they cant give the exact information always. This report is prepared totally based on secondary information so it cannot represent itself as a actual practices of online recruitment practices for the organization. Objectives of Recruitment Selection To attract people with multi-dimensional skills and experience that suits the present and future organizational strategies. To induct outsiders with a new perspective to lead the company. To infuse fresh blood at all levels of the organization. To develop an organizational culture that attracts competent people to the company. To search or head hunt people whose skills fit the companys values. To devise methodologies for assessing psychological traits To seek non-conventional development grounds for talent. To search for talent globally and not just within the company. To design entry pay that competes on quality but not on quantum. To anticipate and find people for positions that does not exist yet. Online Recruitment Selection Organizations first started using computers as a recruiting tool by advertising jobs on a bulletin board service from which prospective applicants would contact the company. Then some companies began to take e-mail applications. Now some employers are not only posting jobs and accepting resumes and cover letters on-line but also are conducting employment interviews on-line. Advantages for such Internet recruiting by employers include: Reaching more applicants. Having lower costs and faster response time frames. Tapping an applicant pool conversant with the Net. Employers often begin the Internet search process by establishing an organization website and listing jobs on it. Alternatively, companies with a web page that specializes in posting job listings (an Internet job service)-much like the electronic bulletin board of days gone by-can be used by job seekers. Finally, online employment agencies can be used to post jobs and find applicants on the Net. One advantage of Internet recruiting is that it may improve the chances of contacting passive job seekers-those people who are not actively seeking work. Listing at popular job-search Internet sites is a good way to attract such browsing high-tech workers.27 Indeed, recent surveys show that about 37% of companies now use the Net for recruiting, and the rate is increasing rapidly. Alongside the long-term growth in both temporary and permanent recruitment, there has been an explosion in online advertising. A generation ago the print medias dominance in advertising looked unchallengeable but the emergence of the internet, the rise of job sites, the low cost and speed of advertising online, and companies use of their own websites has challenged that position. In 2006 recruitment advertising in print generated a total of  £1.168 billion in revenues (down 13 per cent for the year) with online advertising worth  £200.5 million (up 27 per cent).14 In a world in which 62 per cent of all UK adults are online, 50 per cent of internet users go online each day and there are 12 million online job seekers in UK, the web is an increasingly important way of connecting with potential employees. As a result of this: 65 per cent of FTSE 100 companies use the internet to recruit candidates. 78 per cent of recruitment companies advertise job vacancies online. UK job sites currently receive around 40 million visits per month. Monster.co.uk alone has over two million CVs on its website. Developing country like Bangladesh, also use online recruitment. About 77 per cent multinational company use the online recruitment now. Bangladeshi website like job1, jobbd, and many other website is popular for jobseeker. The internet is also blurring the old, neat divisions between advertisers and recruiters. Websites are taking on some traditional recruitment functions, particularly where employers are looking to fill low-skilled jobs at minimum cost, while both employers and recruitment companies are investing in their online capability as a way of connecting directly with potential applicants. Purpose of Online recruitment and selection The buzzword and the latest trends in recruitment is the E Recruitment. Also known as Online recruitment, it is the use of technology or the web based tools to assist the recruitment process. The tool can be a job website like naukri.com, joba1.com the organizations corporate web site or its own intranet. Many big and small organizations are using Internet as a source of recruitment. They advertise job vacancies through worldwide web. The job seekers send their applications or curriculum vitae (CV) through an e-mail using the Internet. Alternatively job seekers place their CVs in worldwide web, which can be drawn by prospective employees depending upon their requirements. Process of bringing the prospective employee employer to stimulate / encourage the employee to apply for the job. Determine the present and future online requirements of organization in conjunction with its personal- planning and job analysis activities. Increase organizational individual effectiveness. Increases the pool of job candidates at minimum cost. To search for talents globally not within the organization. The necessities of online recruitment are Low cost. No intermediaries. Reduction in time for recruitment. Recruitment of right type of people. Efficiency of recruitment process. Efficiency gains for the HR dept Drastic reduction in overall cycle time for recruitment from inviting applications to recruitment. Reduction in the time for data entry and processing the raw data. Reduction in time from the traditional manual communication modes to the web based automation. Economies of scale in advertising spend Reduced advertising spend from fewer and smaller adverts. Reduced need for advertising in the local dailies. Saving in storage space for receiving applications and scrutiny. HR staff carrying out higher value activities, for example workforce planning. Less HR staff time spent on basic recruitment tasks. Completely transparent and fool proof system with minimal manual intervention Easy handling of huge volume of data maintenance of confidentiality. Final master database handed over along with an archival of the images for future reference. Online recruitment is not expensive. By saving on time, design and print costs and targeting precisely the best sites for the best candidates, online recruitment is a very cost-effective option. Advertising online opens up a much wider candidate pool than advertising in print. This gives you a much better chance of finding the right candidate for the job Improved ability to target specific audience. Huge saving in printing and postage costs. Cost of placing the job postings. Distribution of postings. Absence of middleman. Resume management. Quality of candidates. Quality of service. Less paperwork. Convenience. Speed. Benefits to the applicant 24/7 access via the Internet with support available through local libraries at no cost to the applicant Online status update in the website. Online redress of queries No need to contact departments in person/phone. Application packs and job details are available online and job applications can be submitted online, thereby enabling a process that is not dependent on postal systems. Functions regarding online Recruitment Selection It is extremely important that HR managers find employees quickly to fill vacancies because otherwise the companies that they represent risk losing a lot of money. So what should HR managers do to find employees quickly and effectively? The answer to this question is easy for the companies that have embraced Internet job sites. Job ads can be posted on the Internet literally within 5 10 minutes: The Internet has increased the speed by which job ads can be posted for job seekers. It is now possible to post a job ad which can be displayed to thousands of job seekers within minutes. Looking through ads is facilitated by key word searches that enable job seekers to find the job ads that are of interest to them, rather than having to wade through pages of job ads in the newspaper. Traditional methods have required for a job ad to be carefully prepared and formatted, keeping in mind that it should be short and to the point because of cost considerations. This has required for companies to prepare job descriptions that are described in brief. The result of short job descriptions can be catastrophic for HR Managers, because such ads often attract the wrong type of candidates. An inappropriate job ad can result either in a flood of resumes from unqualified candidates or in a complete lack of CVs. Either outcome requires additional work from the HR Manager. Internet job ads do not have the space limitations of print job ads. The benefit for HR Managers is that they can now use longer job description that fully describe the company, company location, the job requirements and the working conditions offered. Some Internet job sites can even prepare company presentations in order for job seekers to get a better taste for the company and its culture. This has changed the traditional approach of HR Managers in preparing job ads. In effect HR Managers pass on some of the prescreening to the candidates themselves who are better able to decide whether they meet the job requirements and equally important, candidates can better decide whether they wish to work for the company in question as described in the company presentation. The result is a higher response rate to Internet job offers in comparison to candidates who respond to print advertisements by candidates who fully meet job requirements. This is a win situation for the HR Manager and the job seeker. The Internet enables HR Managers to instantly locate the employees that it seeks: Many Internet job sites also have candidate databases that companies can use to fill vacancies instantly. These databases can usually be searched through by key word searches and sorted by industry, location and other criteria. Such searches are facilitated by the fact that most candidates publish their minimal salary expectations which is very helpful for employers in determining candidate suitability for an opening. There are even some firms that enable employers to use their database free of charge, charging employers a percentage of each hires salary. Potential candidates can submit their job details to the CV database instantly using online forms that they fill out and send to the web sites database. Internet job sites ensure that their database is current by deleting submissions older than three months. Candidates that want their job details to be posted for longer periods must update their CV periodically. Job seekers all over the world have the same instant access to all data: The Internet enables for job advertisements to be accessed instantly by job seekers all over the world. This information is accessible to all job seekers regardless whether they live in Chicago or Jakarta. This has revolutionized recruitment, because for the first time it is possible to find candidates anywhere in the world without paying any extra charges. The only possible additional charge for companies is for relocation for hired candidates who live in other locations. Filling certain positions increasingly requires for HR Managers to search outside the company location. The revolutionary transformations taking place due to changing technology requires for companies to hire employees with knowledge of technology that did not even exist several years ago. Finding the ideal candidate for such difficult positions to fill makes it more than worth it to pay for relocation charges. The savings accrued through the use of Internet job sites will more than make up for additional costs suc h as moving expenses. In addition, attracting skilled and experienced employees from outside the firm will allow the employer to save considerable sums that would otherwise have been required for training. Moreover, the company would not be wasting these training funds on potentially unproductive employees, because they would have already been weeded out by the former employer. The advent of Internet jobs sites has made recruitment an increasingly faster, more effective and efficient process. These new digital corporations make it possible for traditionally expensive newspaper advertisements to be replaced by digital ads that are many times less expensive than their printed counterparts. The popularity of this medium is on the rise, because access to this information is free of charge to job seekers who can efficiently and conveniently browse through job ads any time of day they desire. Employers are no longer limited by space considerations and can include much more about the job offered in their ads than could be done in the newspaper model. All this can be done instantly with just a click of the mouse. How the Online Recruitment Selection Work Online recruitment and selection, e-recruitment and selection, or web based recruitment and selection is the use of online technology to attract candidates and aid the recruitment process. What this usually means is the use of a companys own website, a third-party job site or job board, a CV database or search engine marketing to fill vacancies. Careers websites Or Companys own website: Research suggests that the careers area of a company website is the second most visited area after the home page. People are always looking for careers opportunities so the use of a companys own website as an online recruitment resource is now common practice for many. Indeed, some companies integrate their careers sites to manage the entire recruitment process. Candidates not only apply for jobs via the website but these job applications are pushed through an online HR back-end where HR can monitor, rate and track applications, conduct psychometric tests, screen out unsuitable candidates and, in some cases, even set up interviews. Job sites and job boards: Most employers who have invested in any form of online recruitment will, at some time or another, use third-party job sites and job boards as part of their online recruitment strategy. Job sites and job boards are websites that advertise large numbers of job vacancies from many different recruitment agencies and employers. CV Databases: A CV database is another important product in online recruitment. Candidates can upload their CVs to the CV database and these CVs are then released to recruitment agencies and employers to view and purchase. There are a number of dedicated stand-alone CV database providers, but many job sites and job boards offer access to CV databases as an additional service to basic vacancy advertising. Search Engine Marketing: Search Engine Marketing is slowly becoming another element of online recruitment for employers. Search engine marketing for online recruitment advertising generally involves utilizing Per-Per-Click advertising on search engines such as Google, Yahoo and MSN to drive potential candidates to careers websites. However, search engine marketing for recruitment does require some specialist knowledge and largely remains the preserve of larger companies and recruitment consultancies. Smaller employers will generally only come into contact with search engine marketing when they engage an online recruiter. Online recruiters: Online recruiters are much like other recruitment agencies: they work with you to create a job specification, look after the advertising, screen applicants and provide you with a shortlist of the best. Unlike recruitment agencies, however, their sourcing techniques are all online. They advertise jobs on job boards, scour CV databases for candidates, and utilize social networks and search engines as recruitment tools. And, typically, they charge a flat fee for their service rather than a percentage of salary. Social Networking: Social networks like Facebook, MySpace, Bebo and professional networks like Linkedin offer employers another way of reaching potential employees. For many employers, their pages on social networks are often simply duplications of their careers websites. However, some companies are using recommend a friend and referral programs to encourage their current employees to promote vacancies to their friends on social networks. Again, however, using social networks to recruit can be resource-heavy and in the current candidate-rich market, it may be more work that it is worth. As you can see, online recruitment covers a wide range of activities in the digital media space. Obviously, success rests with choosing the most effective channel. In an ideal world you could use all of these channels. Realistically, there is seldom enough time for that. With this in mind, we would encourage smaller employers to use job sites and job boards as a starting point in online recruitment. Job boards offer the most cost effective and, perhaps more importantly for small and medium-sized companies, the most time-effective method of recruiting online. There is lots of online jobs website in Bangladesh. Like bdjobs, jobsa1, prothom-alojobs, jobsbangladesh, deshijob, apnarjob, jobsbd and much more. HR department of any company or job seeker search employee or job resume in this site. There are some steps we can follow for online search. They areà ¢Ã¢â€š ¬Ã‚ ¦.. Online Jobs Website C.V Sorting Written Test Interview Other Test Final Selection C.V of new jobseeker: What the HR department of any company do: Every company has a different set of criteria and HR Portal tailors its services and products to meet individual needs. 7.4.3.1 First and foremost, you need to establish what you want. There are three main points of entry into the market: 7.4.3.1.1 Media Buying: This is where you simply seek someone to place your adverts on the right job sites and negotiate the media rates. Sounds easy but in fact it can be a hit and miss affair if your adviser doesnt know the market particularly well. 7.4.3.1.2 Beware: There is a right and wrong way to buy online media advertising. Theres a world of difference between posting your ads to the sites you think are right (because youve heard of them or their name sounds OK) and posting to sites you know are right (because hard quantitative data has proven they yield the best candidates for given jobs). HR Portal has been gathering this hard data for years and updates it daily. It is based on how many candidates respond to each vacancy from each job site. They are now also measuring candidate quality by job site. After all, its better to target a smaller site that will yield a handful of suitable candidates than a bigger player that throws you hundreds of unsuitable people. 7.4.3.1.3 And theres more As a major player in media buying in its own right, HR Portal enjoys economies of scale with the job sites. These cost savings are handed on to its clients, enabling them to buy online media at a far reduced rate than they could achieve alone. 7.4.3.2 Media Buying with Pre-Selection/Sorting: It is advisable to supplement your intelligent media buying with a quick, effective candidate handling process. This way, the true benefits of online recruitment will be realized. A good Application Service Provider will develop and tailor such a programmed to your business: dont just accept the cheapest programmed it is unlikely to be flexible. Make sure it meets your needs. Insist it is tailored to your business and check there will be strong support to get it up and running and maintained. HR Portal is very service and support orientated: experience has shown that partnerships with its clients are far more fruitful than just selling and leaving. Furthermore, HR Portal finds that over time its clients needs change: it is far easier to accommodate any updates and upgrades within an on-going relationship. 7.4.3.3 The Full Monty: Well not literally as in the film, but an impressive display of skills and expertise nevertheless. HR Portal can take a job on from scratch: build the website, develop the candidate assessment and management software, identify the best job sites and post ads to them. By now you should feel more confident about venturing online to recruit staff. Once youve tried it out, youll be unlikely to revert to print-only advertising. Online recruitment can offer so much more in terms of value, efficiency and effectiveness. It is the ultimate in flexible and responsive job advertising. But remember, if a jobs worth advertising, its worth advertising properly. Take time to research your options. Talk to some professionals in the marketplace and go for someone who can prove they have the right combination of media knowledge, buying power and software skills. Finally, make sure they will take time to understand your needs so you can invest in a partnership rather than a simple buyer/seller agreement. 7.4.4 Tips for applying for a position online: Fully research the companys website. Test out the consumer experience on the website, to find out how that works. Dont be rushed to complete the application online in one go. Print out pages if you need more time to complete them. Take time to understand the approach. If possible, complete the form in an environment where you can concentrate. Answer all answers as honestly as possible. You will be asked about the answers you put in the online application in a later interview. Do searches for the company on the web. Get as much independent background information about the company as possible. Having completed the application once, dont fill it out again. This will produce duplicate applications, and will cause embarrassment for you. Make sure the email address you supply is one you check regularly, as employers will want to get back to you and will want a quick response. Write down user name and passwords for graduate websites for future identification. Make sure you have your CV in electronic format. This will save time, as most websites will ask you to upload your CV, and you can cut and paste it into the application form. Before submitting your form, double check you have answered all the questions you intended to, and have not left any gaps. Problems of online recruitment and selection While you may wonder how too many candidates applying for your job could ever count as a disadvantage, it is a fact that dealing with inappropriate, irrelevant and bad candidates is the bugbear of many a HR manager. Candidate spam can waste a lot of time. However, with a bit of thought about what job site you use, how you write your job description and using candidate screening and filtering tools on job boards, it is possible to reduce the number irrelevant applicants. Thats right. Online recruitment wont always work. Not every job vacancy you post can or will be filled online. There will always be difficult-to-fill jobs that can only be filled by recruitment consultants, headhunters or in other ways. However, most companies tend to hire for pretty standard job roles so this is seldom an issue. And with more and more job seekers choosing the internet to look for jobs, and more and more job sites and job boards specializing in ever more diverse areas, those difficult-to-fill jobs are becoming fewer and fewer. Limit the applicant audience as the Internet is not the first choice for all job seekers. Cause applications overload or unsuitable applications if care isnt taken drafting the job profile/specification. Exclude those who do not want to search for a new job online. Limit the attraction of those unable to fully utilize technology certain disabled groups. Give rise to allegations of discrimination, in particular the use of limited keywords in CV search tools. Make the process impersonal, which may be off-putting for some candidates. Impact on the cultural fit dimension of recruitment. Turn-off candidates, particularly if the website is badly designed or technical difficulties are encountered. Lose out on candidates, especially if your own website is below the search engine ranking of your competitors. Base recruitment decisions on subjective information found after trawling the Internet for personal information on candidates. Present problem of recruitment and selection practice in Bangladesh: Bribe in the name of donation Biased recruitment Unfair selection Quota based recruitment Unwillingness to recruit female candidates Political recruitment Recruitment biased by religion, groups and Recruitment biased by religion, groups and ethnic priority ethnic priority Not following a standard system Prospects of online recruitment and selection With more and more Bangladeshi businesses, including small and medium businesses, adopting information and communication technologies, HR managers in Bangladesh are increasingly resorting to online hiring. The benefits of online recruitment are many although there are a few problem areas as well. I am forecast at the costs and benefits of online recruitment. The first and most important forecast of online recruitment is, of course, cost savings. Employing headhunters or advertising in the print media involves high costs. While print media advertising costs are in theory position-neutral you pay the same column-centimeter rate whether you are advertising for top positions or for lower and middle level positions in practice, recruiters tend to spend somewhat more on higher level recruitments and relatively less on lower and middle level positions mainly because they opt for better display ads for higher positions compared to lower and middle level positions On the other hand, costs of hiring headhunters is directly related to the position you are advertising as headhunters charge on a commission-on-salary basis so that the higher the position and salary the higher the costs. In contrast, online recruitment usually almost costs nothing compared to either print media advertising or hiring of headhunters and employers can achieve savings of up to 80% by recruiting through online methods. For example, small Technologies Company in Bangladesh needs argent employees. They needed a chief operating office and he needed him fast. But simply didnt have the kind of money needed to either go for print media advertising or hiring a headhunter. He chose to advertise in his preferred business networking site joba1 or jobbd at a cost of only $1000. And, bingo! They got his man in almost no time. Second, online recruitment facilitates just-in-time hiring. When an organization needs a candidate it can access the database of job portals, screen resumes and send a mass mail. It can also shortlist people based on skills, location, salary and availability and move on to the interview stage. Third, online recruitment offers candidates the advantage of knowing the job profile, responsibilities expected and the nature of the organization, which are well defined at the outset. Regular c