Saturday, October 5, 2019
PetMeds annotated outline Case Study Example | Topics and Well Written Essays - 500 words
PetMeds annotated outline - Case Study Example The products are also advertised on the internet platform through social media and video advertisements (PetMeds Express, Inc, 2012). Emails are used to persuade new customers. Old customers are reminded to make purchases through the emails, as well (PetMeds Express, Inc, 2012). The website of the company is also an effective means of marketing the products. The products sold by the company are purchased directly from four major manufacturers. However, these manufacturers offer a variety of resources that cater for the needs of all customers (PetMeds Express, Inc, 2012). Customers make orders directly from the companyââ¬â¢s website (PetMeds Website). Optionally, a customer can make a toll-free call to the companyââ¬â¢s customer representatives to place an order (PetMeds Express, Inc, 2012). The company has a program in which customer care representatives receive training, on a continuous basis, from training officers. These representatives take care of customer complaints and compliments hence evaluation of customer satisfaction is possible (PetMeds Express, Inc, 2012). After making the order, the companyââ¬â¢s supply-chain section, based Pompano Beach, processes the order and ships it to customers across the US. Customers can track the progress of their orders through the company website (PetMeds Express, Inc, 2012). This section analyses the market threats of the company and how it has achieved to counter them. The company has experienced stiff competition from veterinarians and other retailers, traditional and online based. In fact, the veterinarians have even engaged in a litigation battle with the company (Fiala, 2012). However, the company commands a greater market share due to the affordability of its products, promptness in delivery and convenience. The companyââ¬â¢s net profits have been relatively flat in the past years, and this is attributed to the increased administrative and general expenses. Nevertheless, this is set to improve in the
Friday, October 4, 2019
Short answers,Times New Roman,font size 10.5 Coursework
Short answers,Times New Roman,font size 10.5 - Coursework Example Moreover, there is an innovative aspect based on the process need that is otherwise deemed to be a weak link evidenced in every process. It is characterized by the fact that the majority intends to move around the problem instead of making an attempt towards the success of the success of an enterprise solution. Ultimately, Drucker also contributes to the development, demographics that constituted the population size structure and employment background and a new knowledge with advanced scientific assumptions thus creating new products and new market demands (Mitra 25) Mitra (25), points out at various attributes how technology has contributed towards the realization of entrepreneurial activities. The fundamental technological advancement is critical in the advancement of scientific understanding of entrepreneurial activities. Besides, it has contributed to the initiation of different kinds of industries that are either owned privately or by the state. Moreover, technology has also played a vital role in the conceptualization of feedbacks from the already existing enterprise while utilizing the results to enhance further technological advancements. On a number of occasions, government policies are seen as barriers to innovative aspects and entrepreneurial developments. In essence, a change in certain policies of the government often has devastating effects towards the success of entrepreneurial activities. According to Mitra (28), the government for setting up various policies and deployment of resources that are also characterized by incentive-oriented strategies thus most likely to affect the forces of the market demands. Mitra (33) explains that an economic equilibrium theory may not give a proper understanding of the entrepreneurial relationship because it mainly concentrates on the production function. Moreover, it concerns rationalization choice
Thursday, October 3, 2019
Virginia Woolf Essay Example for Free
Virginia Woolf Essay Virginia Woolf, and educated woman, described two luncheons at a male and female college. The intended audience of both passages is educated men who can make a change. Virginia Woolf demonstrates the differences in quality of education between men and women through narrative structure, selection of detail, and tone in order to garner support to change the quality of education for female students. The quality of food served at the menââ¬â¢s college reflects the quality of the education. For example, Woolf describes her experience of the luncheon at the menââ¬â¢s college through narrative structure, ââ¬Å"lunchâ⬠¦began with soles, sunk in a deep dishâ⬠(10-11). The moment the luncheon starts, Woolf is impressed with how much effort is put into the food. Describing how much effort people went through leaves the intended audience confident. Also the selection of detail in the passages supports the authors purpose by illustrating every food item, ââ¬Å"potatoes, thin as coinsâ⬠(18). The precision of the food item is mentioned through a simile to emphasize the importance of men in society. Enhancing the importance of men assists the author by proving how much people focus on what men want; putting all their energy to ensure that the education provided at the menââ¬â¢s college is exceptional quality. Woolfââ¬â¢s erudite tone towards the luncheon also reflects how impressed she was with the conversations surround her, ââ¬Å"brilliance, as it pops in and out upon our lipsâ⬠(29). The author supports her purpose through the erudite tone in order to present the intelligence surrounding her. The brilliant conversation Woolf hears at the luncheon is presented through personification, which represents the level of intelligence male students attending the college has from the quality of their education. Men will always have an advantage in society no matter if there is equality between men and women. Women earned equal rights as men, but there is a significant difference between the qualities of education, which Woolf explains through her experience at the womenââ¬â¢s college luncheon. Woolf describes her meal from the beginning as ââ¬Å"a plain gravy soupâ⬠(41-42) and ending with ââ¬Å"everybody scraped their chairs backâ⬠(62-63). Right from the start there is nothing special about the luncheon at the womenââ¬â¢s college. The whole lunch is characterized from the use of imagery to create the effect of the unmotivated students at the womenââ¬â¢s college, presenting to the audience that there is a clear difference in quality of education. The selection of detail adds emphasis on the simplicity of the meal, ââ¬Å"beef withâ⬠¦greens and potatoesâ⬠(45-46). There is nothing special about the meal, which also involves the length of the passage being concise, but still no one complains because it still is ââ¬Å"â⬠¦natureââ¬â¢s daily foodâ⬠¦Ã¢â¬ (50). This help the author to further prove people do not pay close attention to the quality of female education. In addition to selection of detail, the morose tone adds to the bland luncheon, that consisted of no conversation at all, ââ¬Å" That was all. The meal was overâ⬠(62-63). Woolf is simply pointing out the women who attend the college are not motivated. The quality of education the women are receiving may be adequate however; the education could become great if people paid more attention to it. Although women have equal rights as men, their quality in rights is not the same. Both the men and womenââ¬â¢s college provided an education, but there is a difference in the quality of education provided. The narrative style Woolf writes for the male college represents an elegant lifestyle, while the womenââ¬â¢s represents old fashion lifestyle, ââ¬Å"To call it puddingâ⬠¦would be an insultâ⬠(23-24), ââ¬Å"sproutsâ⬠¦ yellowed at the edgeâ⬠(47-48). The difference supports the authorââ¬â¢s purpose, emphasizing the contrast in foods as a metaphor for the difference in education. Men have always dominated society and sadly it is hard to have men and women become equal partners in society; leaving the intended audience aware of womenââ¬â¢s place in society through Woolfââ¬â¢s own awareness of the change. Describing the food in detail described the elaborate food provided for the men while the women had plain food ââ¬Å"the partridgesâ⬠¦came wit all their retinueâ⬠(16-17), ââ¬Å"prunes and custard followedâ⬠(52). The selection of detail indicates that people pay more attention to men than to women by giving men the best of the best and women what is considered as ordinary. The technique of personification describing the partridges creates a picture in the audienceââ¬â¢s mind on how grand the meal is by saying the food had an entourage. Lastly there is a shift in tone going from enlightening ââ¬Å"all are going to heavenâ⬠(33) to dreary ââ¬Å" soon the hall was emptiedâ⬠(63-64). The students at the male college are given plenty of support that they think they are the best; on the other hand the students at the womenââ¬â¢s college go on with their daily lives as individuals. After leaving the luncheon at the menââ¬â¢s college Woolf felt amazing which is the complete opposite of what she felt leaving the womenââ¬â¢s luncheon. Although the students at the womenââ¬â¢s college eat together, they eat and live as individuals rather than a community like the menââ¬â¢s c ollege. Although it may seem like men and women have equal rights, which is not the complete truth. Virginia Woolf uses her experience of two complete opposite luncheons at a male and female college to persuade the audience that there is no equality in the quality of education.
Wednesday, October 2, 2019
Sustainable information security policy in an organization
Sustainable information security policy in an organization Introduction The purpose of this research paper is to investigate how organizations design sustainable information security policies. Designing a sustainable information security policy is one of the most important issues facing organizations today. It should not only be the first step in an organizations information security policy program but a continuing process to ensure the policy should be maintained of high quality, it is clear, comprehensive and appropriate to the organizations specific business objectives, strategic goals and culture needs. This is a particularly salient issue in organizations that operate in numerous political, cultural, legal, geographic and economic environments and, by necessity, sometimes must have an information security policy that employees can follow and actually use. Information security represents a growing concern for organizations. As organizations are relying and becoming more dependent on information systems for staying competitive, gain strategic advantag e and operations, the issue of effective information security policy also becomes important and the necessary foundation for organizational information security. In an organization, some unique challenges can arise in designing an information security policy, such as policy differences arising through the various threats, risk acceptance and tolerance levels among business units; internal and external requirements at a country, local and national level; human factors; and cultural differences. In some cases, an organization may require a region-specific information security policy that may be more restrictive than a global information security policy. However, the reason why an information security policy has to be enforced on an organization is because the information security policy requires an effort from them. The literature review and an experimental study will be used to investigate, explore and understand different factors such as ease of use, designer perceptions of user shortcomings, attitude toward usage, peer influence, perceived behavioral control usage, perceived ease of use, quality of working life, work attitude and intentions as to how to design a sustainable information security policy in an organization. The research problem and goal. The research problem of this study is to investigate how to design a sustainable information security policy in an organization. Surprisingly, not too much is known about how to design security policies that pay attention to unique organizational security features, employees and business needs (Siponen and Iivari, 2006). In business, an information security policy is a document that states in writing how an organization should plan to protect its information systems and technology assets, provides guidance based on standards, regulations and rules of what to and what not to do. However the information security policy quality, flexibility and usability are limited. Therefore employees do not pay attention, understand, follow abide and break the information security policy. An information security policy that is viewed as design product and that is normative lists actions that the employees should follow or should not perform. The design of an information security policy does not necessarily make it possible to address all situations reasonably. However, to guide the design of the information security policy, the product and an application principle should state how it needs to be applied, and a design method should state how it needs to be crafted (Siponen and Iivari, 2006). Product design and development is a complex and lengthy process for organizations since it involves multiple participants from several organizational departments who are required to make decisions outside their area of expertise. To address the problem organizations often purchase ready made information security policies from various sources such as ISO, text books or adopt information security policies from government and other online sources. This leads to incomplete activities a nd flaws which lead to difficult to follow information security policy. Sound information security policy should protect the information and systems, as well as the individual employees and the organization as a whole from a wide variety of threats (Veiga, Martins and Eloff, 2007). It also should serve as a prominent statement to the outside world about the organizations commitment to information security. An information security policy is often considered to be a living document, meaning that the document is never finished but is continuously updated as technology, regulations and business requirements change. The information from systematic monitoring should serve as a critical input to evaluation, formulation, implementation and design of the information security policy. The information security policy should be seen not only as an artifact document of the organization to enforce best information security practices but also should identify details of what is acceptable or unacceptable and what is reasonable behavior from the employees in order to ensu re sound security of information. Information security policy should be sustainable. Information security covers people and process issues as well as technology. The design of information security policy in an organization should be integrated into a process that involves employee usability testing and input from various regions, regulations, industry standards and business units. An information security policy is the necessary foundation for a sound organizational information security. Information security policy should be able to enhance business operations by reducing risk, ensuring protection of organizational critical information assets and decreasing information systems security management costs as well as to improve information systems operations while also supporting the demands of internal and external compliance. Since many of these policies require human involvement, for example employee and customer actions, the goals should be measured and checked if they are met only if such human activities can be influenced and monitored and if positive outcomes have incentives while negative actions are sanctioned. The goal of this research study is to investigate how to design, create and maintain a sustainable information security policy using experimental methods and control focus groups in an organization. An effective information security policy should be based on a usability standard that can be achieved during the design techniques appropriate to implement sustainable information security policy. Importance of research problem The successful design of information security policy is critical in todays environment of rapid change and challenges in addressing information security policy compliance and effectiveness in organizations. The information security policy is the foundation on which a sound information security is built. As with any foundation, it must be well designed, and well constructed; it can then be trusted to support the organizations business objectives and goals effectively. It is essential that effective information security policy practices be in place in organizations to ensure the success of information security policy. Effective information security policy requires that users understand and follow the information security mission as described in the organizations information security policy. Flexibility and usability are essential elements of an information security policy life cycle, particularly of the design process of information security policy formulation and implementation. An information security policy needs to be sustainable and not rigid. While the importance of the information security policy in ensuring the security of information is acknowledged widely, to date, there has been little empirical analysis of its design, impact or effectiveness in this role. Designing sustainable information security policy is critical to protecting the organizations information systems and assets. The consequences of violating such as information security policy might be extensive and expensive. The organizations information security policy should be written with a clear understanding of the expected outcome and the need to be flexible and usable. The information security policy should incorporate clear definitions and user responsibilities (Gaunt 1998). It should also aim to influence behavior and turn employees into participants in the organizations efforts to secure its information assets. Information security policy plays an important role in preventing, detecting and responding to security threats and breaches. Organizations should have security controls to protect their information. One of the most important controls, according to Hone and Eloff (2002), is the information security policy. The information security policy is likely to be ineffective if it is not written well, understood, followed and accepted by all employees. The results of this study will help practitioners understand how an organization can design sustainable information security policy to achieve effective information security. Research argument The information security of an organization might be left in a less effective state in situations where information security policy is not followed by employees. Employee perception, in some instances, is that following the rules in information security policy interferes and gets in the way of doing their day-to-day work and their ability to accomplish their job tasks. This is because they feel as though this approach is cumbersome and a waste of time. An employees failure to comply with the information security policy is a key concern of information security practitioners and organizations. According to Desman (2002) information security is not a technical issue, but rather a human issue, therefore the most significant threat to the security of information in an organization is its employees (Gaunt 1998). Information security policy should be fair, reasonable, understandable, flexible and usable. If an information security policy is not flexible and usable, employees will not follow it and it will break. According to Besnard and Arief (2004), the design of security products and information security policy should rely more on the rules of human-computer interaction. The employees, independent of their knowledge and intellect, should be able to read an organizations information security policy understand, follow, comply and adhere to it. One of the ways to implement good information security practices in an organization is to ensure that a detailed information security policy is in place. The content of the information security policy is particularly significant, as it should be monitored for any changes after it is adopted to attain relevance and an understanding of whether there were changes due to the policy or program. According to Gaunt (2000) user participation in the development of an organization information security is necessary if it is to achieve wide acceptance. Problem Relevance According to Hone and Eloff (2002) one of the most important information security controls in an organization is the information security policy. However, this important document it is not always easy to put together and develop. Some organizations derive their information policy from business goals, service level agreements, industry best practices, and International Standard Organization standards such as ISO 27000, or copy paste from other ready made policy templates found or procured from textbooks or online resources. Content in information security policies differ according to the type of organization: for example, corporations, academic institutions, government, and within departments such as information technology, human resources, legal, and finance to name a few. The degree of guidance varies from very specific references of what to do or not to do and sanctions of not following the rules. Sanctions affect employees actual compliance with information security policy. According to Bia and Kalika (2007), the decision to formulate an information security policy, for example, a policy of acceptable use, occurs when the organization has experienced problems, conflict, damage, or business loss because of improper use of information security rules. The application of a security policy is considered essential for managing the security of information systems. Implementing a successful information security policy in an organization, however, is not a straightforward task and depends on many factors (Karyda, Kiountouzis and Kokolakis, 2004). Sometimes, employees view the information security policy as an obstacle and a barrier to progress and, in an effort, to do their job more efficiently, employees might not follow the rules set in the information security policy document. Despite the fact that organizations have information security policy in place, more often than not, the application of information security policy fails to attain its goals. To ensure that information security policy is effective, information security professionals must first understand the social elements, including cultural and generational variances that affect employee behavior and perceptions about information security policy (Cisco, 2008). According to Baskerville and Siponen (2002), strict access controls imposed during fast growing organizational changes can become an obstacle by limiting access to information thereby threatening the organizations survival. This problem is one of limiting organizational emergence because of limited information access and presents conflicting and stringent demands for security policy making. Unexpected business opportunities may require actions that conflict with their information security policy. Some of the problems facing organizations are of employees not following the information security policy, which reflects the social nature of human beings. According to Kabay (2002), an information security policy challenges employees to change the way they think about their own responsibility for protecting the organizations valuable information. Attempting to impose information security policy on unwilling employees results in resistance both because stricter information security procedures make jobs more difficult and because people do not like to be told what to do. The process of design and development of information security policy plays an important role in the life cycle of an information security policy and affects how people feel about the information security policy and whether they see rules as a needless imposition of power or an expression of their own values. Unfortunately, an information security policy conflicts with most peoples view of reality: for example, an empl oyee showing sensitive information to someone who does not have the appropriate level of authorization to view such information because they both work on the same project team. However, if users fail to comply with the rules, an information security policy can help deter abuse (Straub and Nance 1990). Although having an information security policy in an organization is essential, it is not enough to ensure an employees compliance with it. Therefore, the aim of this paper is to understand what factors should be considered in the design of a sustainable information security policy in order to motivate employees to comply with the information security policy and understand how important it is. Definitions of Terms For the purposes of this paper: Information security policy: by definition, an information security policy refers to a clear, understandable comprehensive and well-defined plan, rules, and practices that regulate access to an organizations system and the information included in it. It is defined as the security policy in a document that states in writing how an organization plans to protect the companys physical and information technology assets. Information policy: is defined as the combination of laws, regulations, rules, and guidelines that steer the creation, management, and use of information that greatly shapes the roles of information in society. Information policy includes a range of issues related to freedom of information, privacy, secrecy, security, intellectual property, and information and communication technologies among other policy areas. Information system security: is defined as the state of being free from unacceptable risk. Thus, information security focuses on reducing the risk of computing and communication systems, especially in regard to the misuse, destruction, modification or inappropriate disclosure of information either by intent or accident. Product design and development: in this paper refers primarily to the design and development of new information security policy. Research questions and Hypothesis. The main research question for this study is formulated as: How to design sustainable information security policy in an organization? Hypothesis: H1: Is there a significant difference between flexibility and usability? H2: Is there a significant relationship between flexibility and usability? H3: If an information security policy is usable then is there a need for sanctions? H4: If an information security policy is flexible then is there a need for rewards? Reference Agarwal, R and Sambamurthy, V. (2002). Principles and models for organizing the IT function. MIS Quarterly Executive, 1(1), 1-16. Baskerville, R., and Siponen, M. (2002). An information security meta-policy for emergent organizations. Logistics Information Management, 15(5/6), 337-346. Besnard, D. and Arief, B. (2004). Computer security impaired by legal users. Computers Security, 23(3), 253-26. Bia, M., and Kalika, M. (2007). Adopting an ICT code of conduct: An empirical study of organizational factors. Journal of Enterprise Information Management, 20(4), 432-446. CISCO. Data leakage worldwide: The effectiveness of security policies, 2008, Retrieved March 29 2010 http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-503131.pdf Da Veiga, A., Martins, N., and Eloff, JHP. (2007). Information security culture validation of an assessment instrument. Southern African Business Review, 11(1), 147-166. Desman, M.B. (2002). Building an information security awareness program. Boca Raton, FL, Auerbach Publications. Doherty, NF., and Fulford, H. (2006). Aligning the information security policy with the strategic information systems plan. Computers Security, 25(1), 55-63. Eloff, JHP., Labuschagne L, and Badenhorst KP. (1993) A comparative framework for risk analysis methods. Computers and Security, 12(6), 597-603. Gaunt, N. (1998). Installing an appropriate IS security policy in hospitals. International Journal of Medical Informatics, 49(1), 131-134. Gaunt N. (2000). Practical approaches to creating a security culture. International Journal of Medical Informatics, 60(2), 151-157. Hone, K., and Eloff, JHP. (2002). Information security policy what do international security standards say? Computers and Security, 21(5), 402-9. Kabay, M. (1994). Psychological factors in the implementation of information security policy. EDPACS, The EDP Audit, Control, and Security Newsletter, 11(10), 1-10. Karyda, M., Kiountouzis, E., Kokolakis, S. (2005). Information systems security policies: a contextual perspective, Computers and Security, 24(3), 246-260. Lapke M., and Dhillon, G. (2008). Power relationships in information systems security policy formulation and implementation. European Conference on Information Systems, 16, 1358-1369. Siponen, M., and Iivari, J. (2006). Six design theories for IS security policies and guidelines. Journal of the Association for Information System,s 7(7), 445-472. Thomson, K. L., von Solms, R., and Louw, L. (2006). Cultivating an organizational information security culture. Computer Fraud and Security, 10, 7-11. Straub, D.W., and Nance, W.D. (1990). Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly, 14(1), 45-60. Warman, AR. (1992). Organizational computer security policy: the reality. European Journal of Information Systems, 1(5), 305-10. Zhang, Y., Liu, X., and Wang, W. (2005). Policy lifecycle model for systems management. IT Professional, 7(2), 50-54.
Gender Equity :: Economics
Gender Equity Gender equity is a very important subject matter that teachers must deal with in the classroom. As I taught at RAA middle school some differences begin to stand out between the genders. One thing that popped out at me the most was the maturity level of the two. In saying that I mean the sexual desires of the students at their age. That is important for teachers to see for when we begin to group students together for activity. One instance is that of boxing out in basketball. The skill calls for the one boxing out to push out with their butts against the other player. This at the middle school level is not appropriate for the girls and boys to interact in. Their hormones just a little too much. Another difference I noticed was the desire of guys to be with guys and girls to be with girls. This had nothing to do with attraction but dealt with the misunderstanding of skill level. The men perceive the women to be inferior in sports skills so in their group they want guys. The men seem to rather have the least skilled guy over the best skilled girl. I feel they do this because it would be embarrassing for them to be shown up by a girl. So it is our job, as teachers, to do away with this stereotype, and make both genders understand they can benefit skill wise from mix gender activities. In the elementary level the major difference was the age-old argument that girls nasty and guys nasty. The girls definitely do not want to be paired with guys and vice versa. In elementary it had nothing to do with skill level but everything to do with just the gender. I remember putting a boy with a girl at Buck Lake and it was like I had made a kid eat peas for the first time. So the difference in elementary and middle school is just the reason why the boys don't want to be paired with girls. So in noticing that I feel that yes I was biased at the elementary level and I figure I did that because I really wanted to keep the interest up. I noticed that the one time I paired different genders the productivity of the boy went down. I guess that scared me so I shied away from it, but now looking back maybe I should have paired them up. The students will have to learn one day that the two genders can work together to accomplish a goal and what better time than in elementary.
Tuesday, October 1, 2019
Reading The Light :: essays research papers
Reading The Light à à à à à The story that is most significant to me is “Reading the Light'; by Roger Pfingston. This story felt like it was written from the heart. It is filled with emotions, ones that the author caught in his story very well. Even though I could not empathize with Brian, I did feel sympathetic towards him. When David said to Brian, “Is it really such a surprise? I’m sure you know that your mother and I haven’t been the best of friends lately.'; (6), that was a shock to me. David did not seem to be sympathetic towards his son; instead he made it sound like it had happened and that there was nothing that could be done about it. At the end of the story, David, Maria and Brian went to the park where the author stated “The three of them stood huddled in the glare of ice and sun.'; (7) My heart sank. They just stood there accepting that their family was breaking up. I thought that Roger Pfingston wrote this story from his heart. I was able to put my self in Brian’s place and actually feel how I thought he would feel. à à à à à The story that stretched my imagination the most was “Charles'; by Shirley Jackson. Even though children have wild imaginations, it did not occur to me that a child in kindergarten would tell such an elaborate lie. When I looked back in the story, I found the spot where I think that Laurie first started to tell his lie. “The teacher spanked a boy, though, ... For being fresh'; was Laurie’s replay to his mother asking him what happened in school. “Laurie thought. “It was Charles';'; (14) When I reread this I thought that this was where Laurie decided to put on his act. I know that young children are capable of a lot of things, and some times they go unnoticed, like Laurie’s charade. This story seemed to be more like a fairy tale. à à à à à The Story that I think I will remember the longest is “Another April'; by Jesse Stuart. This story found a soft spot in my heart. I thought it was indescribable how much Grandpa enjoyed life. Grandpa was acting like an anxious little kid “Don’t get ’em, I won’t ketch cold.'; (37) Grandpa seemed to be filled with life. He waited every year to go out and be among the world.
Mister
Of Bunt is practiced and why it is of benefit to the community. You may also mention the challenges to Bunt in this modern era. ââ¬ËBunt is an African word for a universal concept. Bunt is the potential for being human, to value the good of the community above self interest. Bunt is to strive to help people in the spirit of service, to show respect to others and to be honest and trustworthy, are the words of Kevin Chaplin.Moreover, Bunt is second nature to us Africans, hence the fact that a number of us have not heard of it but practice it. In addition, the Mama community found in Iambi can be thought of as a perfect example of Bunt practitioners. Firstly, when looking at a typical settlement inhibited by the Mama people it would come across to you that they are one big family but most of them are not related through blood ties, which contradicts the observation of how they live together.In continuance, adults consider the children of their neighbors as their own as they let them eat and drink in the same plates and ups with their children and this simple and kind gesture teaches all the children the value of sharing which is one of the fundamental outlined in the concept of Bunt. Furthermore, these children grow up to be positive additions to the community and the nation.Dry Johann Broody at a conference saidâ⬠My neighbor's sorrow Is my sorrow' (2006), which is another key concept when dealing with Bunt, as sorrow Is an obstacle which everyone has to go through and It usually comes In the form of death, Illness or other hurtful events. And when neighbors are struck by sorrow, the members of the community would never live those Individuals to mourn In solitude, they would mourn and weep with them as they are also touched by what has effected their neighbor. Moreover, this act signifies unity and the bond among the community members solidifies.On the other hand, Joy Is also shared because happiness Is only true once It Is shared with others and smiling a nd laughing about certain matters Is also another mall point of Bunt and that decreases tension teen Individuals which In turn means that there will be less violence. ââ¬Å"To be Inhumane Is to be Like an animalâ⬠(Broody, 2006), humanness Is the very essence of Bunt and the manner In which one greets another Is a very delicate matter when It comes to the Mama people as one should greet others heartily and enquire In depth and the greatest detail about the other person's well being before anything else Is said or done.In addition, It Is also a sign of respect which Is very Important In a immunity and the Interest shown In the others life also strengthens the bond the community members have. Lastly, the thought of being helped out by another person In the light of today Is frowned upon because It Is considered as If you one Is lazy or parasitic. Moreover, the world thrives more on competition among people more than It did 20 years ago and sharing Ideas and resources does not ex ist anymore. Virtually, Bunt Is a beautiful concept of lifestyle, so much so that businesses have adopted It but In the modern era It Is considered more of a cliche than It Is a Mister The origin of the expression ââ¬Å"Ladles Firstâ⬠has a very strange story, that as most people says. The story states that In eighteenth century In Italy, there was a son of a king falling in love with a very poor girl from the people of the kingdom. He faced a huge rejection from his kingdom family. The worst thing he ever faced Is the true love they had between. For the love they shared the son of the king and the poor girl they TLD want anything to destroy their love except death, so they decided to die gather.For that they decided to Jump over the edge from a very high climb. They went to the climb, the poor girl wanted to Jump first, but the son of the king can't handle to see her Jump from there. So he decided to Jump first, after he Jumped the poor girl couldn't handle the scene, so she changed her mind and decided not to lump. The poor girl came back to the village and married a poor guy same as her. This story shows that the women betrayal can't be compared to anythin g else. The girl betrayal her love for not dying; since that time the expression used as extend omen for making sure the woman will never betrayal the rest.After a while different meaning came upon ââ¬Å"Ladies Firstâ⬠expression. Later on the expression had been used as a manner of a gentleman to show the morality of humanity from gentleman to ladies. This manner had been used as making the lady at first because as it known ladies are the spirit of this life, or as I can say it. In my opinion this expression are being used a lot when love is there, also when there is a specific business between a business man and a businesswoman as respect.The manners of immunity shows to us how we are human, it is always came by the heart with the use of mind. We respect each other for the difference in age, gender, cleverness, and a lot. The point of the use of ââ¬Å"Ladies Firstâ⬠expression in respect is to make ladies ahead of us all the time recognition of her gender. Women are mo re sensitive and they always full of emotions. Men can't control her emotions and feelings, so we always prefer to make her the best out of the emotions and feelings she has that men doesn't have. The reality of emotion is controlled by the heart, not the mind.Most of the people can use a very small percentage of their mind to show their feelings and emotions; but at the end what controls the emotions Is the heart. Let's start over and let us see why we are discussing about the emotion while our mall point Is the expression ââ¬Å"Ladles Firstâ⬠The reason behind that man has emotions over women, and that emotion goes to show our respect and our feeling upon that women. When men want to show that, they use the expression Ladles First to hide their Maximum. [emailà protected] Com happiness of their real emotion from the woman. Mister Brazil It is almost impossible to consider any part of the Brazilian culture without considering Christianity. It Is the dominant religion of Brazil and reflects every aspect of Brazilian way of life: Beliefs, Politics, Economy, National Holidays, Medal reports, festive and community In general. In this essay I will try to focus on the lesser-known aspects and facts of Christianity embedded In the Brazilian culture. Brazil has a population of over 200 million habitants and one of the largest numbers of Catholics in the world .In 1970, 90% of Brazilian consider themselves Catholic but in 2010 his number has reduced to 65%2. The decreased of members of the Roman Catholic Church has been caused by the increase of Neo-Pentecostal churches and Afro- Brazilian religions. The greatest shift has been to evangelical Protestantism which now represents over 22% of the population. Brazil has many versions of Protestantism, most common are: the Fundamentalists, Baptists, Presbyterian and Methodis ts.Marx ââ¬â Beliefs ââ¬â Politics ââ¬â Economics If we compare the decline of Catholicism and economic transformation of Brazilian society, we could reaffirm the work of Max Weeper's In the book ââ¬Å"The Protestant Work Ethic and the Split of Capitalism. In the sass's the vast majority of Brazilian where Catholic, the economy was weak and the working class population were mainly agrarian. With the evolution of society into industrialized, second millennium, the number of protestant have increased, the economy improved a level that has become a world leader.According to Weber, it is much more than just a change of production processes, but also, a change in mentality. This change from Catholicism to Protestantism is ââ¬Å"expressed socially with civic model and self-governanceâ⬠4, taken lace with economic stability; people take their lives into their own hands and to an extent free themselves from the central government economy and society. Geographic similaritie s with Weeper's European analysis where it is true to say, the major concentration of Catholics are in the poorest are warmest-sunnier part while the Protestant are established In the Southern (cooler-climate) part of the country.The Power of the Catholic Church remain very strong Into Brazilian legislation. Examples can be seen in issues regarding abortion: Weeper's religion-shift is affirmed by the Brazilian political scenario. From 1964 to 1 985 (perhaps when the Catholicism was at its peak), the Brazilian government was ruled by an authoritarian military dictatorships. Political parties such as The Christian Democratic Party (PDP) were banned by the military regime and it was re-created shortly after the fall of the military regimen. In Weeper's view; people want to be involved in politics.Coincidently, today with larger number of Protestants, Brazilian political system is done via a rather democratic voting system; with elections held every 4 years and vote is impulsion for all citizens between 18 and 70 years old. Heroes' plays Important parts of Brazilian Christianity with 57% followers believing In saints. The most popular Include pilgrimages to the National Shrine of Our Lady of Senora Appareled where 26% among Catholics pray for the Intercession. According to the legend, In 1717, three fishermen were having bad luck in catching fish for an important festival lots of fish.Because of that and many other miracles attributed to the image, in 1737 a chapel was built and in 1745 public visits began. In 1930 the statue was proclaimed o be the principal patroness of Brazil. Over the years, the number of worshippers to Lady of Senora Apartheid increased and the chapel received two main enlargements, the latest in 1980 when it was considered the largest Marina temple and the second largest Basilica in the worlds. In addition to that, in the same year the Brazilian Federal Statute declared a National holiday named as the ââ¬Å"Feast Day of Our Lady Apartheidâ ⬠to be held in each year in October 12.Another traditional pilgrimage date that attracts about 8 million pilgrims a year to the Chapel is the Brazilian Independence Day, September 7. Others popular Saints are: Saint Anthony, Saint Expedites, Saint George, Saint Jude, Saint Francis of Chassis and Saint Josephus. Rituals = The Catholicism practiced in Brazil is full of popular festivities rooted in centuries-old Portuguese traditions. Popular traditions include Christmas, Easter Sunday, Good Friday and ââ¬Å"Fests Jungianâ⬠Noun Festival). ââ¬Å"Fests Jungianâ⬠is a Catholic feast celebrated in the name of Saint Anthony, Saint John the Baptist, and Saint Peter.The festivities are extremely popular in all urban areas and among all social classes ND lasts around two weeks in Jejunely. In many parts of the country, they are as popular as Carnival; and like Carnival, these festivities involve costume-wearing, dancing, drinking, and visual spectacles. June festival is an i mportant Brazilian festival because the retail, commerce and non-governmental (Nags) industry; shops, bars, restaurants, churches and charities develop marketing plans promoting their parties and events. Churches and No's proceeds are usually redirected to local, most-needed members of community.Values = In business, Brazilian tend to ââ¬Ëdeal' tit individuals, not companies. Brazilian businessmen will usually get to know one another before committing to long-term business dealings. Therefore, you will need to establish a trusting relationship with them if you wish to gain their business. It is important that you do not try to rush them into making decisions or forming relationships 2. Manicures for women and formal dress for both sexes are expected within corporate situations Socially, Brazilian are usually rather affectionate, tactile people. Men shake hands with one another, while women will kiss each other's' weeks in greeting.One of the Catholic-Christian-based and culture- representative- values is repeatedly yearly during the world largest and most famous Brazilian Carnival. The annual festive is held officially over four-day period prior to ââ¬Å"Ash Wednesday' marking the forty-day erred before Easter. Carnival themes range from religious, political and economic commentaries. Carnival can be consider a way that the mass-population can express (demonstrate their views) in a sarcastic, without fear of political fear of retaliation. In a party mood, meaning and double-meaning assuages is passed ââ¬Å"without noticeâ⬠of ruling power of politics and church.Wear crucifixes, to have a Christmas tree and Virgin Mary and Christ statues are key symbols that represent the Brazilian dept into Christianity. Christianity has such great impact in the Brazilian values that is the ââ¬Å"Christ of Redeemâ⬠in ROI De Jeanine was voted as ââ¬Å"One the Seven Wonders of the Worldâ⬠. The Christ of Redeem is probably one of the most popular symbols ac ross the country. In most cities, the main church (Cathedrals) holds that symbol. For example, the city where I am from, America, with a total height of 23. 80 meters 3. Mister It was marred by several challenges, such as; weak human resource, reports of alleged anti-competitive behavior in form of abuse of the dominant position and poor infrastructure among others thus creating the need for liberation's. The vaporization of this industry broadly aimed at improving the spread and affordability of modern and quality telecommunication services and this was to be achieved by encouraging participation of private investors in the development of the industry, expanding the variety of communication services available in Uganda among others.Currently, liberalizing as led to the establishment of a well-managed industry with new operators. From around 2002, the CIT developments in the country began to improve rapidly, marked by some regulations. There has been increased competition among players which has positively affected the quality of services provided and increased coverage nationwide among others. This has also resulted in reduction in service prices though th ey still among the highest in the whole Africa. Therefore this evaluation will focus on assessing the impact of liberation of the telecommunication industry.For the purpose of this evaluation, the following definitions used; 1. 1 Description of the telecommunications Industry in Uganda A telecommunications service is taken to be the relaying of messages of any form (voice or data) over communication infrastructure between a sender and a receiver. (Uganda Communications Uganda can be categorized into the following; Voice telephony: This comprises local, national (long-distance), and international calls. The two technologies employed in Uganda for providing these services are fixed-line (landlines and fixed-wireless) and mobile cellular (wireless) among others.Fixed-Line; this is further subdivided into two categories as; Landlines services: A landlines network ââ¬â also referred to as a Public Switched Telephone Network (EST.) ââ¬â connects all customers through a series of t ransmission and distribution lines. Telephone exchanges move calls throughout the network. Fixed wireless, fixed wireless technologies provide telecommunications service without the use of wires or cable. This includes payphone booths, the predominant fixed wireless service in Uganda.While other versions of this technology including very high frequency Wireless Local Loop and point-to-point microwave arrives, have been successfully deployed in rural areas in several developing countries, they are only recently being adopted in Uganda. Mobile Cellular; this is a combination of wireless voice telephony with mobility. All mobile cellular service in Uganda is based on the Global System for Mobile Communications (GSM) technology. GSM has become the dominant technology worldwide for digital wireless telecommunications. Con One Research, Inc. N association with SEG 51 Data; data Services in Uganda generally refer to fax, Internet Access and virtual private networks (VPN). More enhanced and data-intensive services such as video- nonfreezing are not commonly available. Fixed line landlines services; consumers with access to landlines voice telephony have narrowed (beginning at speeds of 9. 6 Kbps or 14. 4 Kbps and upwards to 33. 6) data services through dial-up. Fixed wireless; this service requires a stationary terminal at the customer premise connecting to the service provider through airwaves (point-to-point microwave or spread spectrum).Mobile operators in Uganda are using their GSM networks to provide fixed wireless data services in some areas. Narrowed (generally not exceeding 9. 6 Kbps) data services are available in this way. High speed fixed wireless services (64 Kbps and 128 Kbps) are available in Kampala using frequency hopping spread spectrum technologies. This service is being used by operators and their customers to create VPN for large businesses with several offices in Kampala. Mobile Cellular; mobile cellular offerings in data currently include 9. 6 Kb ps or 14. 4 Kbps transmission, mainly for SMS (short messaging service).There has been some Internet access, but speeds are slow. Higher generation mobile cellular data services such as GAPS, EDGE, and G services are not available. Very small aperture terminal (VAST); VAST service sends ND receives data (and voice) transmission to and from satellite earth stations. The satellites are incorporated into global telecommunications networks and provide satellite-based communications to geographically dispersed locations in Uganda and throughout the world. Customers pay for VAST equipment located at their premises and also pay service provider fees. 3. Value Added Services Payphones; these are fixed-line, UN-staffed stations available to the public. They accept either coins or phone cards as payment. In rural areas, they normally appear in trading centers. Phone sharing; this is the service of providing an owned (most often mobile cellular) phone to customers for a fee. It's essentially a very short-term rental service. Because it is often not economical. Particularly in rural areas, for residential users to own phones, this has become a very popular service in Uganda, and has taken on a wide variety of forms.Computer sharing; this is the service of providing computer terminals with access to the Internet. The most popular form is the cyber cafeà ©, which often provides not only computers and Internet access, but also additional products and services such as food, fax, entertainment and even computer training. Many cyber cafeà ©s have recently emerged in Uganda, mostly in Kampala. FM Radio; this is a form of non-interactive CIT that is particularly important for reaching out to rural residents, particularly those unable to access other services. More than 100 stations have become established in Uganda.Many of these are local language stations based in small urban centers, but with primarily rural coverage, providing a range of information important to the poor suc h as health education, family planning, commodity prices in local markets, civic education, etc. They incorporate an interesting mix of private, immunity, Non-Government Organization and donor sponsors. Television; this is also a form of non-interactive CIT that is used to transmit moving visual media. Televisions are used to view various subscriptions and non- subscription based programming, movies (via an additional media player).Television stations have increased from the one TV- CITY to over ten stations though most of them are operated in urban areas rural areas get good transmission of some them. Solutions and add-ones; this is the service of improving the functionality of core services by assistance, training, problem solving and the layering of additional features onto a ore service (e. G. , dial-up connectivity to an ISP, network security, web and mail hosting, etc. ). This is not yet a big market in Uganda, it is predominantly in urban centers.However; with the liberation' s in Uganda, an operator of such telecommunications services must obtain either one or all of the following service licenses; Public Service Provider (SSP) License, Public Voice and Data License, Capacity Resale License, Public Infrastructure Provider License (PIP) and a General License. And these are provided by the Uganda Communications Commission 1. 2 The Objectives of Impact Evaluation Development Assessment Committee (DACCA-COED, 2001) defines impact evaluation as the positive and negative primary and secondary, long term effects produced by a development intervention.This may be direct or indirect as well as intended or unintended. This should be informed by clear and realistic objectives. Therefore, the objectives of the impact evaluation of the liberation's of the telecommunications industry in Uganda shall be informed by the following objectives. 1. 2. 1 Overall objective of Impact Evaluation The overall objective of the Impact Evaluation (E) of the liberation's of electrif ication industry in Uganda is ââ¬Å"To establish the impact of liberalizing following specific objectives. 1. 2. 2 The Specific Objectives 1 .To assess the impact of liberalizing of the telecommunication sector in Uganda on the expansion of national coverage of communication services and products 2. To establish the impact of liberalizing of the telecommunication industry on the pricing and quality of services provided by the industry in Uganda 3. To establish the effect of liberalizing of the telecommunication industry on direct and indirect funding by government to the sector 4. To assess the effect of liberation of the telecommunication industry on the level of innovation in the industry. . 3 The Hypothesis The following assumptions have been advanced to determine the above objectives. These include; 1 . Liberation of the telecommunication industry has greatly impacted on the expansion of national coverage of communication services and products 2. Liberation of the telecommunica tion industry has had a positive impact on pricing and quality of services provided by the industry in Uganda? 3. Liberation of the telecommunication industry has positively affected direct and indirect budgetary allocation by government to the sector 4.Liberation of the telecommunication industry has to a great extent affected the level of innovation in the industry. 1. 4 The Theory of Change The achievement of the programmer impact will be based on the following theory of change as illustrated in the diagram below. 1. 5 Evaluation Questions: 1 . How has the liberation of the telecommunication sector impacted on the expansion of national coverage of communication services and products? 2. What impact has the liberation of the telecommunication industry had on the pricing ND quality of services provided by the industry in Uganda? . What effect has the liberalizing of the telecommunication industry had on direct and indirect funding by government to the sector? 4. To what extent has liberation of the telecommunication industry affected the level of innovation in the industry? The Logic Model 1 . Percentage coverage of telecommunication infrastructure nationwide 2. Proportion of households with access to telecommunication services 3. Proportion of households with access to uninterrupted connection time and service 4. Proportion of budgetary allocation to the telecommunication industry 5.Percentage of increase in innovation in the telecommunication industry 1. 7 The Evaluation Design and Method The evaluation will adopt both quantitative and qualitative approaches. However, more emphasis will be put on the qualitative approach which provides in-depth and reliable information that will be used to explain quantitative findings. Nevertheless, it has its own shortcomings for example generalization cannot be done using qualitative data. This limitation will be catered for by the quantitative method.With regards to the evaluation design, the evaluation will adopt the n on-experimental sign taking on the longitudinal design in particular which will be carried out after every three years. The non-experimental design also known as descriptive designs was selected because it provides an extensive description of the relationship between an intervention and its effects which will greatly suit the evaluation to be undertaken. In particular, the propensity score matching evaluation method will also be used adopted.This will involve the creation of the best possible artificial comparison groups by matching large data sets and heavy statistical techniques. With this, for each unit in the treatment group and in the pool of non-enrolled units, the probability that a unit will enroll in a program based on observed values will be computed. Once the propensity score is computed then the units in the treatment group will be matched with units in the pool of non-enrollees that have the closest propensity score. The difference in outcome between the treatment or en rolled units and their matched comparison units will produce the estimated impact of the program.The Sampling method/technique With regards to the sampling technique, the evaluation will use both probability and UT the study population and these include; (I) Purposive sampling; this will be used by the evaluator to identify key respondents that have information on the topic being evaluated and this information will be used to enrich the evaluation. Also, Purposive sampling will be used to select 2 districts from each clustered region using population density as the basis where we will select one district from each region with a high population density and one with a low population density.Cluster sampling; using cluster sampling, the evaluator will be able to cluster the area under valuation which is the whole country into 7 regions which are; the central, western, southwestern, Eastern, North Eastern, West Nile, and Northern region. The same sampling method will also be used to clu ster the selected districts into 5 supervision areas. (iii) Lot quality sampling (LOS); the sampling method will be used to cluster the selected districts into 5 supervision areas as recommended by the LOS method where, a sample of 19 households as recommended by LOS will be selected from each of the purposively selected districts.This according to the LOS method gives the highest confidence level. ââ¬Ëv) Simple random and systematic random sampling; simple random sampling will be used to randomly select the first interview location, thereafter; systematic sampling will be adopted to sample subsequent households that will participate in the survey from the random number table. Sampling procedure Since the study is covering the whole country, the evaluator will cluster the districts into 7 regions. These include the Central, Western, Southwestern, Eastern, North Eastern, West Nile, and Northern region.Multi-stage cluster approach will be adopted and two districts purposively selec ted from each region. In particular, two districts will be selected from each region basing on the population density where districts with the highest and lowest population densities will be purposively selected to determine the level coverage in the two scenarios. Five supervision areas will be identified from each district. This will involve combining parishes to form five supervision areas in case of districts with less or more sub-counties.A total 19 samples will be drawn from each supervision area and samples drawn at parish level. The cumulative population of the district will be divided by the sample number f households (19) as recommended by the LOS method which will give the sample interval. When this is obtained, the obtained sample interval will be used to identify the first household from the random table where a value will be read and used to compare to the listed household list. To then get the subsequent interview or household the evaluator will add the sample interva l to the first identified listed household.The Sample Size For the survey technique, the sample population which are the households will be selected from the 7 regions mentioned above where from each district a total of 95 should will be sampled that is 19 households from each of the 5 clustered supervision areas. In all, a total of 1,330 households will be sampled to participate in the evaluation. 1. 8 Evaluation data collection Methods The evaluation will use both primary and secondary sources. The primary sources will mainly involve field data collection whereas secondary data will be obtained from review of published documents.In particular, the following methods will be used; administered to households that will be systematically selected to participate in the evaluation. Development of the questionnaire will involve all the relevant parties who ill identify important issues to be covered in the evaluation. Key Informant Interviews; this will be done face to face with purposive ly selected respondents that are knowledgeable about the liberalizing of the telecommunication industry. It will provide sufficient descriptive information and will be carried out using a short interview guide.Recording: this will be used to record responses provided by the purposively selected key informants. The recordings will then be transcribed into notes which will be used in the analysis process. Documentation; the evaluator will include data from various published sources or documents. In doing this, the evaluator will first try to verify to ensure that data to be used in the evaluation was properly collected with accuracy Observation; there will be observation made with regards to confirming whether cables have been laid to confirm responses provided like infrastructure in form of for example optic cables, network availability and so on. . 9 Data Processing, Analysis and Reporting For the quantitative approach, this process will involve; organizing data, calculating and int erpreting the data obtained. The evaluator will begin by organizing all questionnaires to check for completeness, accuracy and assign a unique identifier to each questionnaire. The evaluator will then go on to define the correct responses and then code them accordingly.Once this is done, data will be entered in to computer; analyses using the SPAS package and calculations will be made to describe the raw data where measures of central tendency will mainly be used to determine performance of each indicator. The information will then be interpreted and presented using tabulations, maps, pie- charts and so on. For qualitative approach, analysis of evaluation data will begin from the field where arioso observation and analytical insights will be noted and unclear responses clarified.This data will then be safely stored. Once the evaluator leaves the field, the collected data will be read and themes, categories identified and coding done. From this, data will then present in an evaluatio n report which will be disseminated to various stakeholders. 1. 10 Ethical Considerations The process of impact evaluation requires guidance and adherence to ethical standards of the utmost importance. The evaluation team will ensure strict adherence to these standards including. In particular, the following will be observed;
Subscribe to:
Posts (Atom)