Saturday, December 28, 2019

The Last Pick By David Mcgillivray - 1315 Words

With any amount of success, one must face adversity. In order to progress in life, one must experience both failure and success, this is inevitable. It is what one does with the failures which they have endured, that matters. By turning a defeat into a favorable outcome, one cannot only learn from their past, but also, can use those lessons to better themselves for the next time. David McGillivray has become a master of this art, turning what are seemingly failures into successes by changing his point of view and mindset. Within his book, The Last Pick, one can read about his multiple failures that later lead to his successes. McGillivray s height was a personal factor that he struggled with throughout most of younger stages of life.†¦show more content†¦As tryouts proceeded, McGillivray made it to the last round, and then was cut. The coach justified this cut by saying that if he was a few inches taller, he would be starting. This could have been a devastating failure to Mc Gillivray, and at first, it must have been. Although, he did not let it end his high school athletic career. From there, he joined the soccer team, where could utilize his speed and agility. Then, in addition to soccer, he simultaneously become a part of the cross country team as well. Through his dedication and hard work in both these sports, he developed into an excellent player for both teams. In his last year of his high school career, McGillivray was granted the highest award an athlete could have received. The Phelan Award was presented to him as a representation of his hard work and athletic excellence in his area. From a boy who got cut from his high school basketball team, to the young man who was awarded the most prestige trophy possible to receive as an athlete, he had made a complete 360. McGillivray once again took what is seemingly a failure, to one of the greatest accomplishments in his high school career. Lastly, the final failure to success story that McGillivray co vers within my reading was his first attempt to complete the Boston Marathon of 1972. On April 17, 1972 McGillivray decided to run the Boston Marathon on the whim. The morning of the Marathon Monday, he woke up, borrowed a bib from a fellow runner, laced up hisShow MoreRelatedThe Cause of Globalization18688 Words   |  75 Pagesexplains the rapid pace of international market integration in recent decades? The first perspective claims that what we are witnessing today is, in fact, nothing new because current levels of market integration are only now returning to those in the last great era of economic internationalization at the turn of the 20th century. This view has been accepted as a statement of fact in numerous influential studies (Katzenstein, Keohane, Krasner, 1998, p. 669; Krasner, 1999, pp. 220-223; Rodrik, 1997;

Friday, December 20, 2019

Taking a Look at the American Revolution - 832 Words

The American Revolution Dubbed as the first modern revolution, the American Revolution (1775-1781) marked the first time in history when people started to fight for their own independence on the basis of universal principles, including the rule of law, popular sovereignty and constitutional rights. For a long time, the British had left the colony to run itself and given the freedom, the North American settlers turned to unique forms of government to match their developing new identity as Americans. They did this by establishing representative legislatures, observing the set rights and freedoms ad holding democratic meetings, all of which gave the settlers a sense of a new identity. When the British lost in the French and Indian war, they turned their attention to America and placed a huge tax burden and tightening their regulations over the colony. The Americans were not allowed to circulate their local currencies, made to abide by the restrictive shipping policies, forced to house British troops and to pay taxes. This led to developing of an urge to liberate themselves and they could do so by waging a rebellion. This led to the outbreak of the American Revolution in 1775 with the colonists demonstrating and fighting out rightly against the British Crown (Morton, 2003). In the revolution that ensued, the British lost because of several reasons. One of the reasons for the defeat is the French siding with the Americans. They did this by supplying more manpower,Show MoreRelatedLinda Kerber s Women Of The Republic1269 Words   |  6 PagesInformation): Date:â€Æ' The ideals by the Republicans which came into the limelight after the Revolutionary War would set into motion a revolution not just in the United States but in many countries across the world. Linda Kerber’s ‘Women of the Republic’ is a demonstration of the paradigm shift in relation to the US social and political structures after the American Revolution. Kerber observes that not only did the war provide more opportunities to women but also set a platform for women to chart the wayRead MoreThe Importance of Women Linda K. Kerbers Women of the Republic: Intellect and Ideology in Revolutionary America1006 Words   |  5 PagesWhen considering the American Revolution most histories fail to recognize both sides of the fight for liberty. Men were certainly the central figures; however could they have succeeded without the periphery support of women? In her book, Women of the Republic: Intellect and Ideology in Revolutionary America, Linda K. Kerber explores the contri bution of women to the war and demonstrates the rising of â€Å"Republican Motherhood† during and following the war. Through this ideology, women merged their traditionalRead MoreThe American Revolution Was A Political Disturbance That Happened Between 1765 And 1783893 Words   |  4 Pages The American Revolution was a political disturbance that happened between 1765 and 1783 during which colonists in the Thirteen American Colonies disallowed the British monarchy and aristocracy. Which they then overthrew the authority of Great Britain, and founded the United States of America. Beginning in 1765, members of the American colonial society prohibited the authority of the British to tax them without colonial representatives in the government. The Patriot leadership professed the politicalRead MoreIn Figure 3.6, â€Å"A Society Of Patriotic Ladies† (1774),1536 Words   |  7 Pages In Figure 3.6, â€Å"A Society of Patriotic Ladies† (1774), we can understand how women were viewed during the revolution. There are many things taking place in picture such as a child not being taken care of, a woman being stared at by a man, an African American servant in the back, and some unappealing women. This imagine is very bold, and blatantly shows that women didnâ€℠¢t have a right in government. The center of the portrait is a female being pursued by a man, which shows that females will alwaysRead MoreFrench Revolution754 Words   |  4 PagesFrench Revolution The French Revolution last from 1789 to 1799. This war had many causes that began the revolution. Its causes ranged from the American Revolution, the economic crisis in France, social injustices to the immediate causes like the fall of Bastille, the Convening of he Estate-General, and the Great Fear. As a result of this revolution there many effects , immediate and long term. The immediate effects were the declaration of rights of man, abolishing of olds reign, execution of kingRead MoreThe French Revolution Essay590 Words   |  3 PagesThe French Revolution The French Revolution last from 1789 to 1799. This war had many causes that began the revolution. Its causes ranged from the American Revolution, the economic crisis in France, social injustices to the immediate causes like the fall of Bastille, the Convening of he Estate-General, and the Great Fear. As a result of this revolution there many effects , immediate and long term. The immediate effects were the declaration of rights of man, abolishing of olds reign, executionRead MoreThe Age of Reason and Revolution Essay810 Words   |  4 PagesThe Age of Reason and Revolution Many individuals that lived in the period of time known as the Age of Reason, discovered many new inventions and advancements to improve the quality of life. Some of these advantages brought fourth new ideas to extraordinary people who forever changed the way we look at life. Although many people found these discoveries to bring great revival to mankind, others rejected these new improvements and felt as if they were defying god. TheseRead More Resopnse To Revolution Essay1155 Words   |  5 Pages Response to Revolution Response to Revolution, by Richard E. Welch Jr., is an honest and unbiased look at America’s policy towards Cuba during the Cuban Revolution. It covers the general history of and preconceived notions about the revolution in depth and gives ample attention to both sides of the relationship between the U.S. and Cuba. In addition to this Welch analyzes the reactions of America’s various factions during the early years of the revolution. Upon taking this into a changeRead MoreThe Fight Of The American Revolution For Independence1262 Words   |  6 Pagestake into account the stories of the wives of these men and other women who were caught up in the struggle for Americas sovereignty. Throughout the eighteen century, while the revolution war was taking place. These women had to play a vital role in order to be successful in captivating the fight of the American revolution for independence. Distanced from the role men were required to play. Women who were wives, mothers, and daughters. â€Å"Revolutionary Mothers† written by author Carol Berkin. CopyrightedRead MoreThe War Of The American Revolution1567 Words   |  7 PagesThe American Revolutionary War began in the middle1700s and ended with the Treaty of Paris signed in 1783. When looking at both sides of the argument I still believe the British were to blame for igniting the flames of revolution. A lot of people will argue that the British were fair in the treatment of the early American Colonists and provided for them as they did for their countrymen remaining in England. In my opinion the colonists were regarded as nothing more than a slave. By this, I mean that

Wednesday, December 11, 2019

Operations and Environmental Management †MyAssignmenthelp.com

Question: Discuss about the Operations and Environmental Management. Answer: Introduction Sustainable development refers to not to compromise environment so that its consequences cannot be obtained economic growth and globalization of an organization (Griggs et al., 2013). Sustainability can be of different types- environmental sustainability, social sustainability and economic sustainability. Holden et al. (2017) moreover depict that environmental sustainability illustrates not to use environment as an inexhaustible source; while social sustainability refers to the development of people and culture. Lastly, the economic sustainability is to generate wealth for community for generating equal economic growth without hampering the environment. In this business report, the concepts of sustainable development will be explained related with the current happenings in Malaysia. The organization considered is Mandarin Oriental Hotel and advantages and disadvantages of adopting sustainable development principles for this organization will also be explained. The key sustainability issues will also be identified based on which recommended action plans for the preservation of the environment to enhance sustainability, competitiveness, and profit. Discussion Pearce et al. (2013) defines sustainable development as fulfillment of present need of people or organization without compromising the resources and ability of the next generation to satisfy their needs. Sustainable development can be obtained through different ways- production of good on a regular basis in order to maintain or meet the government or external debt, avoiding over-exploitation of renewable resource and maintaining atmospheric stability, other ecosystem functionalities and biodiversity (Wheeler Beatley, 2014). Folke and Kautsky (2014) furthermore stated that though distributional equity, political accountability, providing health and education sustainable development and valuing gender equity can also bring sustainable development. There are some basic kirk principles of sustainable development:- Futurity- The Mandarin Oriental Hotel monitor water consumption and protect local resources by rationalize the uses. The hotel also reduces atmospheric pollution by controlling energy. Moreover, for maintaining the purchasing policy, the concerned hotel reduces the impact of consumption from the environment and promotes the development of local, social and ecological flows. The Mandarin Oriental Hotel has also take initiative for limiting noise pollution by establishing noise-free zone, improve air quality within the premises and reduce the impact on the local landscape. Inter-generational equity: Recycling the products used by customers to formulate new objects saves other resources for the future. There are gardens in the hotel premises that saves much raw resources taken from outside. Moreover, the hotel authorities are associated with government for protecting the ecology in Malaysia. Participation- The Mandarin Oriental Hotel follows all the government legislation. The hotel follows The National Plan of Action for Nutrition of Malaysia III 20162025 (NPANM III), Health Human Resource Master Plan, National Policy on Women 1989, National Renewable Energy Policy and Action Plan 2009, National Energy Efficiency Action Plan 2015, National Green Technology Policy 2009, Occupational Safety and Health Master Plan 20162020, National Action Plan for Persons with Disabilities 20162020, Minimum Wage Policy, National Urbanisation Policy 20062020 and National Policy for Biological Diversity 20162025 (Sustainabledevelopment.un.org, 2018). Thus, they collaborate with political and social groups for taking decisions for the hotel. Balancing of economic and environmental factors- The Mandarin Oriental Hotel obtained Economic sustainability through natural capital, human capital, produced capital, financial capital and social capital. In order to overcome the pollution, the hotel use green technology and renewable source of energy and by not dumping the waste in open water bodies and fields. Environmental capacities- In order to protect the environment and ecological balance, the Mandarin Oriental Hotel have implemented eco-friendly heating and energy technology through the energymanagement system that calculates total energy consumed throughout the premises. They have also invested financial resources on waste reduction technology and sustainable laundry system. Some of the waste reduction tools used in the hotel are- Close-Coupled Pulping Systems, Table Mounted Pulpers, Hydra-Extractor and Dehydrator System. Sustainable laundry system is obtained through the use of polymer laundry beads that not only keep linen looking new but also reduces the labor. Emphasis on quality- Mandarin Oriental Hotel has opted for the High Quality Environment certification (HQE) for developing their infrastructures to save 20 to 30% in energy consumption (Mandarinoriental.com, 2018). The hotel also develops environmentally friendly drip system through garden inside the hotel that has hundred different trees and shrubs (Mandarinoriental.com, 2018). Compatibility with local ecosystems- In Malaysia, the infrastructure is formulated in such a way so that no biodiversity gets hampered. The raw material for the food is supplied by the local farmer, who follows the National Agricultural Policy. The hotel is also associated with the protection of the breeding of improved varieties of rice and cereals. Moreover, they also have installed two rooftop beehives in cooperation with local organization for supporting pollination cycle and with the mission to develop a pesticide free-zone. Advantages and disadvantages of adopting sustainable development principles One of the advantageous aspects of adopting sustainable development principles is getting continuous support from government. Reid (2013) stated that when an organization follows sustainable principle, local governing bodies and government of nation supports the organizational operations. Following all principal also allow the company to gain a trust and effective partnership with government. Sachs (2015) depicted that this will help the organization to expand their operations and brand in future. Another advantage is obtaining satisfied customers and greater brand recognition. According to Warburton (2013), adopting sustainable development principles allow the company attracts more customers towards their brand. It is a general tendency of the human to obtain services that worth their money but they also prefer an organization that cares about community people and invests financial resources in philanthropic work. People will be happy to experience the service of an ethical organiza tion and may promote the brand through word-of-mouth approach (Ahmad Tahar, 2014). In this way, the concerned hospitality organization can obtain greater brand recognition. Moreover, Joseph (2013) stated that adopting suitability principle also allow the organization to drive the interest of those customers, who intends to invest in green technology and experience. Thus, the more people attracted towards the company, the greater will be the profitability. The disadvantage of adopting sustainable development principles is involvement of greater financial resources. Developing eco-friendly objects through the method of recycling and reusing need more time and monetary resources than developing new substances. Shaikh et al. (2017) stated that not all used materials are recyclable and omitting the non-recyclable materials also needs huge time investment. I addition to that, since green technology is a recent initiative, thus, it is difficult for a mid-income country like Malaysia to adopt all these technologies. Another drawback is the inability to follow all sustainable principle. The Mandarin Oriental Hotel suffers from two major environmental issues- waste management and water resources management. Samari et al. (2013) stated according to the definition of sustainability development, all the resource should be used in a way so that future generation do not have to make any compromise to fulfill their need. However, it is not possible t o satisfy every policy of the sustainability and some gaps should always be remained. Analysis and explanation of key sustainability issues The two issue that the Mandarin Oriental Hotel faces are managing waste and conserving water. The organization has also developed the plan for reducing carbon emissions by 50% by the year 2035 (Joseph, 2013). Mandarin Oriental Hotel offer shampoo bottle, soap, tooth brushes and other accessories to their customers. Sometimes, clothes and non-degradable waste are also gathered. These materials are rarely fully consumed by those consumers and often thrown in the open space. Moreover, the materials used for the packaging of these items are also not recyclable. In the year 1993, the Solid WasteManagement privatization bill was initiated but it was implemented from August, 2007 (Ho et al., 2013). Another statistics shows that in Malaysia, municipal solid waste (MSW) has been increased by 95% over the past 10 years (Joseph, 2013). The contribution in waster generation is also done by urban population, who are liable for generating more than 70% of the total waste. However, the government off Malaysia formulated Solid Waste and Public Cleansing Management Corporation (PPSPPA) for public cleansing management (Tolba, 2013). It is found that in Malaysia, the water management system depend mostly on water supply management approach and fulfill the users demand (Wwf.org.my, 2018). Ahmad and bin Mat Tahar (2014) stated that this method is unsustainable as water demand will overtake water supply and people may suffer insufficient water. Samari et al. (2013) highlight another issue that Malaysia lacks a central agency to handle the water supply and its resources. Moreover, due to sectoral management in politics, there is no head agency to manage this aspect (Wwf.org.my, 2018). Thus, too many agencies have jurisdiction of water management which also results in conflicts. The Mandarin Oriental Hotel also faces the water management issue due to the high rates of water wastage in domestic, agricultural and industrial sector. However, the concerned hotel has to communicate with government for the water supply. In recent time, the government of Malaysia announced to privatize water supply for every states. The priv ate sector lacks transparency and accountability with the organization they are associated even though the privatization did not produce desirable results. In Malaysia, about 68% of total water is used in Agriculture; however, only 50% is best used and there is no recycling of irrigated water. Thus, sometimes, there is shortage of water resources in many places including Mandarin Oriental Hotel. The hotel thus, has the problem of water conservation and management related with their organization. Lastly, the carbon dioxide emission in Malaysia was 247.59M in 2015 and 263.85 M in the year 2016 and is increased from them in recent time (Sustainabledevelopment.un.org, 2018). The concerned hotel is also suffering from the same problem as more customers are visiting in the hotel due to their unique experience. It is also found that Malaysia was placed at top ninth global tourism destinations in the year 2017 and as a result more tourist use vehicles and transportation that results in high carbon emission, energy and water wastage. Recommendations In order to overcome the problem of waste management, two actions can be done- creating a waste audit team and give training to the staffs. The initiative for waste management requires auditing how much water the hotel is obtaining every day. Depending on the quantity of the waste and impact of the water obtained the audit team should suggest effective strategies. This creation of water audit team need 2 months of time and can be initiated after the formulation of team. The training to the staffs address the topic of disposal of different type of garbage, recording quantities of waste and reviewing invoices for the waste. This training to the staffs create awareness and management of waste from the initial phase. The residue of this waster management should be dumped in municipal garbage for ultimate waste management procedure. Moreover, for overcoming the problem of water supply management, developing supply and demand-side management for water supply handling, collaboration with government and less use of water and water purification is suggested to implement. In Malaysia, people need more water for their daily use and thus it has to be managed. The Mandarin Oriental Hotel has planned to utilize Water Demand Management (WDM) to produce additional quantities of water for fulfilling the current need of the people. This process also formulates virtual quantities of water by conserving some water by increasing industrial production per unit of water. This require 1 year of time to be accomplished. Moreover, collaboration with government for formulating the virtual water results in improvements in the conservation system through adequate government policies. This collaboration with government need less than a year time as Mandarin Oriental Hotel has a good reputation in Malaysia. Lastly, Malaysia has national average rates of Non-revenue Water (NRW) of 40% (Wwf.org.my, 2018). This is equal to loss of 40 liters of water for every 100 liters of treated water. Thus, taking initiative for purifying the waste water should be implemented. The purification system takes 6 months to be installed and executed. In addition to that the problem of carbon emission can be overcome by using recycles materials and developing electric vehicles. It is evident that the total carbon emission cannot be reduced completely. However, the use of the carbon materials can be reduced. This can be done by implementing the recycling plant to recycle all the plastic bottles and cotton fabrics that customers used and then throw. This implementation need 7-8 months time and need proper maintenance. Moreover, in order to lessen the impact of the carbon emission emitted from the vehicles used for transportation, electric vehicles should be initiated. Battery driven cars and vehicles can also be developed that is solely owned by the Mandarin Oriental Hotel. This steep needs 5-6 months of time to formulate electric vehicles for their customers. Conclusion Thus, it is concluded that, the Mandarin Oriental Hotel offer many facilities to their customers and also follow many sustainable approaches. These approaches can be witnessed from their initiatives of garden formulations, creation of bee hives and High Quality Environment certification (HQE). However, carbon emission, waste management and water supply management are some issue that can be implemented for attaining competitive advantage from other hotel in the market. Moreover, from the discussion it is also found that in order to overcome the problem of waste management, creating a team for waste audit and offering training to the staffs are two planned solution. Additionally, for overcoming the problem of water supply management, the solution of developing supply and demand-side management for water supply handling and less use of water and water purification is selected. Lastly, for overcoming the problem of carbon emission, use of recycles materials and development of electric ve hicles will be taken into consideration. References Ahmad, S., bin Mat Tahar, R. (2014). Using system dynamics to evaluate renewable electricity development in Malaysia.Kybernetes,43(1), 24-39. Ahmad, S., Tahar, R. M. (2014). Selection of renewable energy sources for sustainable development of electricity generation system using analytic hierarchy process: A case of Malaysia.Renewable energy,63, 458-466. Folke, C., Kautsky, N. (2014). The role of ecosystems for a sustainable development of aquaculture. Griggs, D., Stafford-Smith, M., Gaffney, O., Rockstrm, J., hman, M. C., Shyamsundar, P., ... Noble, I. (2013). Policy: Sustainable development goals for people and planet.Nature,495(7441), 305. Ho, C. S., Matsuoka, Y., Simson, J., Gomi, K. (2013). Low carbon urban development strategy in MalaysiaThe case of Iskandar Malaysia development corridor.Habitat International,37, 43-51. Holden, E., Linnerud, K., Banister, D. (2017). The imperatives of sustainable development.Sustainable Development,25(3), 213-226. Joseph, C. (2013). Understanding sustainable development concept in Malaysia.Social Responsibility Journal,9(3), 441-453. Mandarinoriental.com. (2018).Sustainability | Mandarin Oriental Hotel, Paris. [online] Available at: https://www.mandarinoriental.com/paris/place-vendome/luxury-hotel/sustainability [Accessed 11 Feb. 2018]. Pearce, D., Barbier, E., Markandya, A. (2013).Sustainable development: economics and environment in the Third World. Routledge. Reid, D. (2013).Sustainable development: an introductory guide. Routledge. Sachs, J. D. (2015).The age of sustainable development. Columbia University Press. Samari, M., Ghodrati, N., Esmaeilifar, R., Olfat, P., Shafiei, M. W. M. (2013). The investigation of the barriers in developing green building in Malaysia.Modern Applied Science,7(2), 1. Shaikh, P. H., Nor, N. B. M., Sahito, A. A., Nallagownden, P., Elamvazuthi, I., Shaikh, M. S. (2017). Building energy for sustainable development in Malaysia: A review.Renewable and Sustainable Energy Reviews,75, 1392-1403. Sustainabledevelopment.un.org. (2018).Sustainable Development of Malaysia. [online] Available at: https://sustainabledevelopment.un.org/content/documents/15881Malaysia [Accessed 11 Feb. 2018]. Tolba, M. K. (2013).Sustainable development: Constraints and opportunities. Elsevier. Warburton, D. (2013).Community and sustainable development: participation in the future. Routledge. Wheeler, S. M., Beatley, T. (Eds.). (2014).Sustainable urban development reader. Routledge. Wwf.org.my. (2018).Issues. [online] Available at: https://www.wwf.org.my/about_wwf/what_we_do/freshwater_main/freshwater_sustainable_water_use/projects_sustainability_of_malaysia_s_water_resources_utilisation/smwru_issues/ [Accessed 11 Feb. 2018].

Wednesday, December 4, 2019

Highlighted the Ethical Issue at KPMGâ€Free Samples for Students

Question: Discuss About the Highlight the Ethical Issue at KPMG? Answer: Introducation The ethical issue refers to the case published in the Wall Street Journal that highlighted the ethical issue at KPMG. The case features the ethical breach that occurred at KPMG office that led to the firing of 6 officials at the firm due to access to audit warning from a third party on audit information. KPMG accounting firm has its six employees fired after accessing improper warning ahead of planned audit inspection by the regulatory body, Public Company Accounting Oversight Board. In the case, an individual who had joined the firm in the recent times from the oversight company received information from a former colleague at the firm on the planned audit sections and disclosed the information to the rest of the team at KPMG. Consequently, the information undermined the integrity of the oversight body and its process of auditing accounting firms. The individuals involved in the access of information within the KPMG firm were guilty of gaining access o an audit plan which would prevent full disclosure of information essential to the oversight body. On the other hand, the employee in the monitoring firm involved himself in an unethical act of disclosing confidential information to an individual who had left the firm to work for another accounting company. The action amounts to an ethical dilemma as it jeopardizes the ability of the oversight firm to perform optimum in the intended audit activity. On the other hand, the new employee at KPMG acted unethically by receiving such information most probably due to the relationship he had with the previous company and thus breached the ethical conduct regarding employees to treat information with confidentiality. In the first case, he was not supposed to disclose the information to the rest of the team as it would limit the potential of the firm to remain accountable to the team. In this respect, exposing the information led to a breach of the ethical conducts in accounting where information from one firm is not supposed to be carried by a third party whatsoever. Despite the opportunity the firm had to utilize the information, it was unethical to gain financial information up for an audit before the actual exercise as it creates a disparity in providing a clear training by the oversight firm. The firm stood faced the threat of tainted image due to the ethical issues raised that could lead to mistrust and close of business with prominent partners. The act would limit the profitability of the company since most businesses would disassociate themselves from doing business with the firm thus leading to financial losses. Therefore, it is unethical to disclose information or receive information on an audit before the actual exercise as it prevents a free and fair audit which results in a false report. In providing solutions to the firm and clearing the bad name created by the employees, the firm could suspend the mentioned individuals and set them on a due legal process. The legal step would cater for the breach of the ethical codes in accounting concerning secrecy of information and gaining of financial information on audit before an actual audit. Moreover, it should have taken a step to seek for possible reputation damage to the company occasioned by the access to information by its members from the oversight audit firm. The act is dangerous to the operations of the firm as it lowers the trust level and the fairground under which accounting firms are supposed to operate. Afterward, it would be fair enough to lay off the individuals involved in the unethical practice and hand them over to the legal processes that might be done thereafter and as well disassociate itself from the activity and the perpetrators to the act. In recommending, the act by the employees could have positive effects on the firm but then place the company in danger should the information be disclosed to the oversight body. Therefore, it was essential for action on firing to take place on both ends beginning with the employees from the Oversight body that disclosed to the former colleague with the full knowledge of the effect it might have to the firm of present employment. Fair practice is essential in accounting where people have to act ethically at personal levels. The firm can improve its performance and image by airing the issue and retracting from the expected audit. By so doing, the firm ought to inform the oversight audit firm of the breach on the audit information to have them prepare a separate audit procedure that would be different from the existing one. Redeeming of the image is essential for KMPG as a known and trusted firm globally. Therefore, it would be fair enough to treat the matter with the urgency it deserved to quickly disassociate itself from the act and brand the persons involved as the sole perpetrators of the act that contravenes the organizations ethical codes. Indeed, the case presents several lessons on the dangers of having employees that fail to consider the secrecy standards expected in a financial institution. Leaking and receiving leaked information whose access gives one an upper hand in a certain matter is detrimental to the overall performance of business. In this case, it is important for firms to establish critical steps that allow information secrecy. At the same time, it is essential to gauge the ethical standards of individuals to avoid damages on the image of a company. Also, it is wise for a company to come clean and reject such unethical information despite the benefits it may deliver to a firm during an audit evaluation. Damage to a company image can bring dire consequences to the market performance due to reduced trust and image distortion. The present firm needs to engage in serious ethical training on its employees to highlight the dangers involved in involving oneself in such acts. Besides, employees must understand the dangers it poses to a firm and the consequences of the same towards a sustainable career. For instance, persons reported in the case lose their personal reputation and might not be absorbed easily by other firms thus a career distortion. The boards of directors need to recheck its ethical guidelines and ensure all aspects adhere to the international code of ethics to make the firm relevant and updated on the lines that lead to success and brand image promotion. Reference List Blake J, C. Gowthorpe editors. Ethical issues in accounting. Routledge; 2005 . Henderson S, G. Peirson, K. Herbohn, B. Howieson. Issues in financial accounting. Pearson Higher Education AU; 2015 Zadek S, R. Evans, P. Pruzan. Building corporate accountability: Emerging practice in social and ethical accounting and auditing. Routledge; 2013 Hartman LP, JR, DesJardins, C, MacDonald, LP, Hartman. Business ethics: Decision making for personal integrity and social responsibility. New York: McGraw-Hill; 2014. Collier PM. Accounting for managers: Interpreting accounting information for decision making. John Wiley Sons; 2015 Gao X, W Zhong, S Mei. Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers. 2015 Maroun W, J. Atkins. Section 45 of the Auditing Profession Act: Blowing the whistle for audit quality?. The British Accounting Review. 2014. Chad, B. KPMG Fires 6 Over Ethics Breach on Audit Warnings.2017. Retrieved from https://www.nytimes.com/2017/04/12/business/dealbook/kpmg-public-company-accounting-oversight-board.html?ref=topics_r=

Thursday, November 28, 2019

Information Security Privacy in Healthcare Discussing the HIPAA Standards Requirements

Introduction Today, more than ever before, it has become increasingly apparent that the daily functioning of a healthcare institution fundamentally depends on the integrity, availability and dependability of its information systems. Patient health information, research, operations, and finance all depend on highly accessible, reliable, and robust software applications, data, and information technology infrastructure (Glaser Aske, 2010).Advertising We will write a custom essay sample on Information Security Privacy in Healthcare: Discussing the HIPAA Standards Requirements specifically for you for only $16.05 $11/page Learn More Consequently, healthcare providers are required by law to strictly observe a complexity of standards as outlined in the privacy provisions of the Health Insurance Portability and Accountability Act (HIPAA). This paper reviews some underlying issues related to organizational policies, procedures and documentation requirements go verning health entities for HIPAA compliance. Issues in Information Technology Reporting Data One of the underlying issues covered in the document is the need for covered entities to tighten internal and external compliance procedures by ensuring that their business associates subscribes to a set of standards and requirements aimed at ensuring the integrity and reliability of the electronic protected health information (EPHI). This objective is achieved by ensuring that the covered entity obtains signed privacy agreements with the business associates, particularly on the use and disclosure of EPHI (HIPAA, 2007). The second issue concerns the need for the covered entity and its associates to conduct regular audits on EPHI not only to ensure compliance with the requirements and standards outlined in the Act, but also to guarantee that EPHI is used for the intended purposes. Business associates, such as software developers, must therefore develop and implement record-level security ai med at restricting access to EPHI sorely to those who are allowed by the Act (Sarrico Hauenstein, 2011). The variables of EPHI that requires safeguarding as outlined in rules and regulations of HIPAA also comes out strongly in this document. Indeed, the Act requires all stakeholders – covered entities, sponsors, business associates, and subcontractors – to always ensure the confidentiality, integrity, and availability of EPHI (HIPAA, 2007). For example, a sub-agent contracted by a business associate of a covered entity to create a component of the electronic health register (EHR) must not only ensure the confidentiality, integrity and availability of EPHI under its possession, but must agree to sign compliance agreements that appropriate the task of implementing reasonable and appropriate safeguards to the subcontractor (HIPAA, 2007; Cannoy Salam, 2010).Advertising Looking for essay on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More Fourth, the article has comprehensively discussed how breaches to the security of patient health information should be addressed either by the covered entity or by the business associates, sponsors, or subcontractors. Lastly, the document has outlined how policies and procedures required by the Security Rule should be incorporated with the organization’s mission and culture to enable effective implementation. Here, the covered entities are given a leeway to modify the rules and procedures of the Security Rule to fit their current business practices for policy development and implementation, as long as the modifications are documented and implemented in accordance with the requirements of the Act (HIPAA, 2007). Security Breaches The Health Information Technology for Economic and Clinical Health (HITECH) defines a breach as the â€Å"†¦acquisition, access, use, or disclosure of protected health information in a manner not permitted under [the HIPA A privacy rule] which compromises the security or privacy of the protected health information† (Brown, 2009, p. 27). As such, any use, disclosure of, or access to, electronic patient health information that is not expressly permitted by the HIPAA privacy rule constitutes a security breach. For example, improperly disclosing patient health information that contains the name of the patient and dates of his/her appointments to a third party who is not allowed by the HIPAA security rule to have access to such information constitutes a violation of the privacy rule but not a substantial risk; however, the improper use or disclosure of sensitive patient information, such as the type of services received by the patient, constitutes a breach since such disclosure could result in harm to the patient (Brown, 2009) Technologists working in the covered entity should report the breaches to the individuals who could be harmed as a direct consequence of the breach. Serious breaches, such as those involving more than 500 patients in a given state or jurisdiction, must be reported to the media and the Secretary to the Department of Health and Human Services (HHS). For breaches involving less than 500 patients, however, the technologists need to report to the administration of the covered entity, who then maintain a log of the reported breaches with the aim to notify the HHS not late than 60 days after the expiry of the calendar year (Brown, 2009).Advertising We will write a custom essay sample on Information Security Privacy in Healthcare: Discussing the HIPAA Standards Requirements specifically for you for only $16.05 $11/page Learn More Requirements The requirements noted in the document include: organizational requirements; requirements for group health plans, and; policies, procedures and documentation requirements. Under the organizational requirements, the covered entity is required to enter into binding contracts or other arrangemen ts with business associates who will have direct access to the covered entity’s EPHI with a view to ensure the effective implementation of administrative, physical, and technical safeguards that realistically and correctly protect the confidentiality, integrity, and availability of EPHI. This requirement also outlines ways through which the business associates should report breaches to the security and privacy of patient data, and the consequences for non-compliance (HIPAA, 2007). The standard on the requirements for group health plans obliges the â€Å"†¦group health plan to ensure that its plan documents require the plan sponsor to reasonably and appropriately safeguard EPHI that it creates, receives, maintains or transmits on behalf of the group health plan† (HIPAA, 2007, p. 5). This implies that the plan sponsor of the group health plan who has access to sensitive electronic patient health data is required by the Security Rule to plan documents using a languag e which is similar to that already required by the Privacy Rule. Consequently, the sponsor must not only ensure reasonable and appropriate safeguards to the confidentiality, integrity, and availability of EPHI under its disposal, but must also ensure that any agent, including a subcontractor, to whom it avails this data is obliged to implement rational and appropriate security directives to safeguard the information (HIPAA, 2007). Lastly, the requirements deal with issues of how a covered entity may modify its policies and procedures to fit its mission and organizational culture, provided that the modifications are documented and implemented in accordance with the Security Rule (HIPAA, 2007).Advertising Looking for essay on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Withrow (2010), these requirements provide the covered entities with the flexibility they need to implement the policies and procedures of the Security Rule according to their standard business practices, but they must take caution not to circumvent the requirements as enshrined in the Security Rule. In documentation standard, covered entities are not only required to retain documentation for a specified number of years (6 years) from the date of its creation or up to the date when the document was last in effect, but they are also supposed to make the documentation available to the individuals responsible for implementing the procedures to which the documentation pertains (HIPAA, 2007). Reviewing and updating the documentation as needed is also a requirement. IT Workers To ensure adherence to the requirements discussed above, the covered entities must embrace extensive and regular training of all employees, but with particular emphasis to employees in their information technology departments (Sarrico Hauenstein, 2011). The rules, standards, and requirements contained in the HIPAA are complex, thus the need for IT workers to undertake comprehensive training aimed at enlightening them on scenarios that may compromise the security and privacy of EPHI to a level that may make the entities non-compliant. Indeed, the extensive training and education should be extended to the employees of the business associates. Non-Compliance of the Requirements Organizations are often found to be non-compliant to the standards and requirements discussed in this paper due to a number of reasons, with the major one being the lack of proper understanding of what may be considered as a breach to the security and privacy of EPHI (Withrow, 2010). For example, healthcare organizations may not know that some simple acts such as a nurse giving a hospital discharge sheet to the wrong patient may constitute a breach if the health information (e.g., treatment for drug abuse) of the rightful owner is included in the discharge sheet. Varied interpretations of the standards have also been cited as a major cause of non-compliance (Sarrico Hauenstein, 2011). Lastly, failure on the part of the covered entity to implement policies and strategies that lead to reasonable and appropriate protection of the confidentiality, integrity, and availability of EPHI occasions non-compliance. Conclusion The legal liability for non-compliance of HIPAA may be a turning point for any healthcare organization – from a profit-making entity to sudden demise (Sarrico Hauenstein, 2011). Equally, EPHI is sensitive in nature and all efforts should be made to protect and safeguard this information with a wider scope of safeguarding the character and reputation of individuals. It is therefore imperative for health institutions to follow the standards and requirements contained in HIPAA to the latter if they are to kill the two birds with one stone. Reference List Brown, B. (2009 ). Notification requirements for breaches of protected health information. Journal of Health Care Compliance, 11(6), 27-30. Cannoy, S.D., Salam, A.F. (2010). A framework for healthcare information assurance policy and compliance. Communications of the ACM, 53(3), 126-131. Glaser, J., Ake, J. (2010). Healthcare IT trends raise bar for information security. Healthcare Financial Management, 64(7), 40-44. HIPAA. (2007). Security standards: Organizational, policies and procedures and documentation requirements. Web. Sarrico, C., Hauenstein, J. (2011). Can EHRs and HIEs get along with HIPAA security requirements? Healthcare Financial Management, 65(2), 86-90. Withrow, S.C. (2010). How to avoid a HIPAA horror story. Healthcare Financial Management, 64(8), 82-88. This essay on Information Security Privacy in Healthcare: Discussing the HIPAA Standards Requirements was written and submitted by user Happy Hogan to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Pamela Colman Smith Biography

Pamela Colman Smith Biography Pamela Colman Smith is perhaps best known for her design of the iconic Rider Waite Tarot cards, the deck that many  new Tarot readers choose to learn the ropes on. Smith was an unconventional, bohemian artist who traveled the world and rubbed elbows with people like Bram Stoker and William Butler Yeats. Fast Facts: Pamela Colman Smith Full Name: Pamela Colman SmithParents: Charles Edward Smith and Corinne ColmanBorn: February 16, 1878 in Pimlico, London, EnglandDied: September 18, 1951 in Bude, Cornwall, EnglandKnown For: Designed artwork for Rider Waite Smith cards, illustrated works by Stoker and Yeats, wrote and illustrated her own books. Early Years Pamela Colman Smith (1878-1951) was born in London, but she spent her childhood in Manchester and Jamaica with her parents. Smith was biracial; her mother was Jamaican and her father was a white American. As a teenager, Smith- nicknamed Pixie- attended art school in New York City, at  the Pratt Institute. After her mother passed away in 1896, Smith left Pratt without graduating to join a traveling theater group and lead the nomadic life of a troubadour. In addition to working onstage, Smith developed a reputation as a skilled costume and set designer. During the early part of the twentieth century, this was an unusual occupation for a young, single woman. She was also active in the women’s suffrage movement around the turn of the century. Pamela Colman Smith, the creator of the RWS Tarot deck, around 1912. Public domain / Wikimedia Commons Little is known about her romantic life, although Smith never married or had children. It’s certainly possible that she preferred women; scholars have speculated about her relationships with housemate Nora Lake, as well as Smith’s close friend, actress Edith Craig, who was definitely a lesbian. Smith surrounded herself with creative, intelligent people who valued her passion for art and her exotic appearance as well as her free spirit. Artistic Career Smith developed a stylized look that soon put her in high demand as an illustrator, and some of her most popular drawings were utilized in works by  Bram Stoker  and  William Butler Yeats. In addition, she wrote and illustrated her own books, including a collection of Jamaican folktales called Annancy Stories. According to Dianca London Potts, Smith became known for her miniature theatrical pieces inspired by Jamaican folklore and her illustrations, which helped her create a name for herself within artist circles in New York and abroad. She became a sought after illustrator and buzzworthy figure within her community. In 1907, photographer and art promoter Alfred Stieglitz gave Smith exhibition space for a collection of her paintings. She was the first painter to have her work exhibited in his gallery, as he primarily focused on the new art form of photography. Artwork by Pamela Colman Smith, 1913. Russian Ballet,  Bobbs-Merrill Co, New York, via Wikimedia Commons Her early work with William Butler Yeats- she illustrated a book of his verses- would prove to be the catalyst for some changes in Smith’s life. In 1901, he introduced her to his friends in the  Hermetic Order of the Golden Dawn. At some point in her Golden Dawn experience, she met the poet and mystic Edward Waite. Around 1909, Waite commissioned Smith to do the artwork for a new Tarot deck he was interested in creating. Waite wanted to see a Tarot deck in which every card was illustrated- which was something completely new. Up until this point,  throughout the history of Tarot, decks primarily had illustrations only on  the Major Arcana, and sometimes the court cards. The only known example of a fully illustrated deck up until this point was the  Sola Busca  deck, commissioned by a wealthy Milanese family in the 1490s. Waite suggested Smith use  Sola Busca  for her inspiration, and there are many similarities in the symbolism between the two decks. Smith was the first artist to use characters as representative images in the lower cards. Rather than just showing a group of cups, coins, wands or swords, Smith worked human beings into the mix and created a rich tapestry of occult symbolism that set the gold standard for modern Tarot decks. Her original images were created using Smiths preferred medium of gouache, a type of opaque watercolor mixed with natural pigments and a binding agent, and often found in advertising illustrations. The resulting collection of 78 cards was published by Rider and Sons, and sold for a whopping six shillings as the first mass market Tarot deck. Thanks to the publisher and Edward Waite, the deck became known commercially as the Rider Waite deck, although in some circles it is now referred to as the Waite Smith deck, or even Rider Waite Smith, as credit to the artist. Two years after creating her iconic Tarot images, Smith converted to Catholicism, and a decade or so later, she used money from an inheritance to open a home for priests in Cornwall, England. Although she continued to produce illustrations, including several for the war effort during World War II, Smith didnt make much money from her work, and never earned royalties from her Tarot images. Although her artwork was popular, she never gained mass commercial success, and she died penniless in Cornwall in September 1951. Afterwards, her personal effects- including unsold artwork- were auctioned off to settle outstanding debt. Sources Alfred Stieglitz and Pamela Colman Smith, pcs2051.tripod.com/stieglitz_archive.htm.Kaplan, Stuart R., et al.  Pamela Colman Smith: the Untold Story. U.S. Games Systems, Inc., 2018.Potts, Dianca L. â€Å"Who Was Pamela Colman Smith? The Mystic Woman behind the Rider-Waite Tarot Deck - The Lily.†Ã‚  Https://Www.thelily.com, The Lily, 26 July 2018, www.thelily.com/who-was-pamela-colman-smith-the-mystic-woman-behind-the-rider-waite-tarot-deck/.Ramgopal, Lakshmi. â€Å"Demystifying Pamela Colman Smith.†Ã‚  Shondaland, Shondaland, 6 July 2018, www.shondaland.com/inspire/books/a21940524/demystifying-pamela-colman-smith/.

Thursday, November 21, 2019

Business 101 - Assignment Questions Research Paper

Business 101 - Assignment Questions - Research Paper Example In the capitalism context, making profits is the key motive of operation. Under capitalism, resources are privately owned, and so are the implications of the underlying activities (Rae & Hill, 2010). To the businesses, these rights and freedoms come at price. Capitalism makes business owners accountable to the society and to the market economy in which they conduct their business. Pollution, taxation, and social responsibility are other key aspects that make business owners hate capitalism. Most importantly, capitalism encompasses business competition, a critical factor that determines the success or failure of a business. Demand line shows the quantity of a product that would be bought at a given price level. In this respect, changes in market demand will affect quantity of a product demanded in that market. Desirable products correspond to high quantities of demand, and vice versa (McEachern, 2012). on the same note, changes in price affect the quantity demanded of a product. The same principle applies as far as paper and related products are concerned. A demand line shift to the left for paper follows the above-discussed principle. This move represents a scenario where paper would become a less desirable product. The less desirable a product becomes, the lower the quantity demanded and subsequently bought of that product. The demand line, therefore, would shift to the left to represent a decline in the quantity demanded of paper at a given price level. A left shift in demand line, therefore, is negative. It is attributed to reduced paper demand and a subsequent decline in the price level. Business entities are required to comply with relevant rules, regulations, or laws. In particular, taxation is a fundamental practice in the economic setting. Federal taxes apply to incorporated business entities, which are treated as separate taxable business entities. In other words,

Wednesday, November 20, 2019

To what extent is the global financial crisis related to greater Essay

To what extent is the global financial crisis related to greater volatility in the prices of oil and gas To what extent does it facilitate the contagion of price movements from one commodity to another - Essay Example This paper shall determine the extent to which the global financial crisis is related to greater volatility in the prices of oil and gas. It shall determine to what extent it facilitates the contagion of price movements from one commodity to another. Crude oil prices increased to as much as US$ 147 for each barrel in July of 2008 after a major commodity boom cycle caused by increased demands from developing states (UN Regional Commissions, 2009). However, by August of the same year, oil prices plunged due to the reduced demand from the member countries of the Organization for Economic Cooperation and Development (OECD). The threat of recession loomed with the financial crisis severely impacting on the worldwide economy (Institute of Development Studies, 2008). In order to end price falls, the Organization of Petroleum Exporting Countries (OPEC) announced various cuts in their output. Oil prices have since reached more stable levels with prices in the mid US$40 per barrel range. Based on the Economist Intelligence Unit (EIU), the demand for world oil fell by at least 0.2 % in 2008 and 0.4% in 2009 (UN Regional Commissions, 2009). The lower global demand was mostly caused by the lower consumption of oil and gas from developing states with initial 2008 estimates noting 2.9% decrease in oil and gas among OECD member states. The decreased demand is mostly attributed to declined demand among OECD members is primarily attributed to decreasing North America demands which declined to 2% in 2009 and 1.7% in Europe (UN Regional Commissions, 2009). Among the non-OECD countries, their demand for oil and gas increased by 1.4% in 2009 and 2.3% by 2010. Underpinning these figures was the rise of demand among developing states. However, even where such demands continued to rise, it was not insulated from the effects of the global economic crisis, especially as the economy grew at a much slower pace within the short-to-medium term (UN Regional Commissions,

Sunday, November 17, 2019

Marketing research proposal Essay Example | Topics and Well Written Essays - 2000 words - 1

Marketing research proposal - Essay Example It appears that this group is consuming other soft drinks in large quantities and is attracted to buying drinks for reasons other than quenching thirst. This report will outline how Pepsi-cola should conduct their research using qualitative and quantitative techniques in order to understand the current market trends. This will enable the brand to capture a larger share of the market. In Australia Pepsi competes with its main rival Coca Cola for a share of approximately $3.8Billion. It is estimated that market will continue to compound annually until 2016 by 2.5 percent. More recently market dynamics has changed with the introduction of a number of new healthier and trendy beverages. People are shifting to water and fruit drinks since these are perceived as healthier drinks. Energy drinks on the other hand are gaining popularity due to increase in their advertisement as alternative drinks. These lifestyle and behavioral changes where people are gradually shifting to taking drinks that they perceive to be healthier and trendy have adversely affected the overall sales of the Pepsi cola soft drink product line as illustrated in figure 1. As illustrated in figure 2, the largest consumer group for Pepsi is the 35-50 year old segment, however over the last ten years this group has declined, while the 50-60 year old group is showing increases. On the other hand the 18-35 year old segment has steadily declined. In other words Pepsi’s customer base is declining because of poor adoption rates in the youngest group and changes in the older group’s consumption behaviour. The question that Pepsi’s management faces is on how to reverse the decline in sales. Is it to change the advertising/communication strategy or to develop a new product that will capture the market change, that is, to produce a drink that people will perceive as healthy and

Friday, November 15, 2019

Emergence of Ubiquitous Computing in Advertising

Emergence of Ubiquitous Computing in Advertising Everyday Interactions with Advertising Entertainment in the Emergence of Ubiquitous Computing Abstract Technology has been advancing rapidly and although the advances of the past fifty years have not benefited everyone equally, the manner in which humans live out their lives and the functioning of societies has been immensely changed as a result of these advances. Ubiquitous or pervasive computing refers to the new wave of technology which is the result of advances in information and communications technologies which have made it possible to seamless embed powerful computing devices into objects, locations and even people. Embedded devices now shift human attention from systems to their contents as they work tirelessly to reduce the cognitive load and perceive how humans can be assisted in performing tasks associated with all aspects of their existence. The physical and the digital worlds are now intimately related and every object in the real world can now have a representation in the digital world. The capacity of ubiquitous devices to be context – sensitive and situation awa re has changed the manner in which humans interact with such devices, offering rich new possibilities for applications to advertising and entertainment, which are amongst the oldest of human endeavours. This essay presents a discussion about advertising and entertainment in the ubiquitous age and examines what changes are likely to emerge in the future. Contents (Jump to) Introduction The Ubiquitous Environment Advertising in the Ubiquitous Age Entertainment in the Ubiquitous Age Conclusion Bibliography/References   Introduction Ubiquitous computing, which is also referred to as pervasive computing, is about the notion that as a result of continuous advances in engineering, information technology, communications, integrated circuit chip technologies and sensors etc computer technology devices will become smaller, cheaper, more capable and better able to weave themselves into the fabric of everyday life until they become indistinguishable from it (Schuster, 2007, Pp. 9 – 11). It was Mark Weiser, chief scientist of Xerox’s Palo Alto Research Centre, who first presented the concept of ubiquitous computing, the third wave in computing and predicted that technology will recede into the background of our lives as computers evolve into quite, invisible servants that will help people to calmly do all kinds of tasks in a manner that will prevent them from becoming overloaded by interactions with computing (Wikipedia, 2007, â€Å"Mark Weiser†). Thus, computers will extend the human unconscious and enhance their ability to productively control, interact and sense their environment. Unlike the traditional computing concepts, which regard computers as devices that run programs in a virtual environment to accomplish a task, ubiquitous or pervasive computing philosophy considers computers as being devices that provide a capacity for interaction with a potential portal into an application – data space that assists users to perform tasks in an information – enhanced physical space, rather then as devices that execute software whose execution must be controlled by a user. Obviously, the capacity of computing devices to act as portals into an application – data space is only rendered possible if the fabrication cost, performance capabilities and reliability of computing devices is enhanced as a result of advances in technology over a broad front (Hennessy, 2007, Chapter 1). Today, data processing, collecting and emitting devices are to be found all around humans in all settings related to their existence, at home, office, in shopping malls or hospitals as well as in transportation vehicles etc (Stakutis, 2005, Chapter 1). These computing devices have been vastly miniaturised as compared to what was available in the past and they are now very much more energy efficient, with enhanced capablities in terms of performance and connectivity with other devices as well as having a superior capacity for interfacing well with smarter sensors. To a casual observer, the wide array of computing devices that are to be found all around us are barely detectable and they are there to serve reliably, without imposing a cognitive load on humans, so that the quality of human existence in all environments can be enhanced. Discrete radio tags, mobile phones that have a capacity for acting as gateways for the World Wide Web and for connecting to many other intelligent devices , intelligent displays and maps that can be presented with information needs, chemical sensors, discrete radio sensors, video cameras, intelligent assistive devices and gaming devices that provide entertainment or information are all testimony to the dawning of the new age of ubiquitous computing. Artificial intelligence is now widely involved with all types of computing to enhance the quality of interactions between human users and a network of intelligent computing devices, which collect and process data on a massive scale. Context, which refers to information that is assistive in gauging, or making judgements about an entity, which may be a person, place or object which is relevant for interaction between a user and an application is now able to be fed into a ubiquitous device which can then react intelligently to fulfil the requirements of its human users without placing any burdens on those that it has been designed to assist (Loke, 2007, Chapter 1). Location of people or objec ts, time, execution state of applications, user emotions, user intentions, the state of brain activity of users, computational resources that are available, the state of software applications and available network bandwidth are examples of contexts that can be of use to ubiquitous devices in interacting with users in a superior manner. Device designers can now be highly creative about using context information and also in regard to what can be feasibly sensed, the optimal manner in which information can be sensed and how sensor information may be used to judge context to optimise device interactions and utility. A number of contextual cues that have been inferred by a ubiquitous device can be combined to form an idea about a situation and the device can then be made to react in accordance with the requirements for a situation. The notion of situation makes it possible for the ubiquitous system designers to carve the world into manageable pieces that can be sensed by sensors, with a separation of reaction rules for each manageable piece providing an adequate response for different situations. Thus, a context aware ubiquitous system should be able to sense, think and act in a manner that is as assistive to humans as possible (Loke, 2007, Chapter 2). If a sense of context and situation can be programmed into the capacity for intelligence of a ubiquitous device, then it should also be appropriate to expect that norms or expectations of appropriate behaviour from device under given situations involving external contexts can also be incorporated into the programming for the device (Ibrahim, 2007, Pp. 54 – 58). Thus, ubiquitous devices should be able to sense a situation or a set of context in order to try and interact in the most appropriate manner with human users. As an example, location and time context can be utilised to present the most appropriate advertising messages to shoppers on a supermarket advertising board and it may also be possible to incorporate an ability to determine what items ought to be highlighted more, depending on the inventory stock situation for a store, or the rate at which sales are being made. Advertising companies are constantly seeking better ways to promote their goods and services to selected consumers who are likely to be most receptive to such messages and ubiquitous, or pervasive environments will permit delivery of the most relevant advertising messages, which have been selected from a large number of possible messages to consumers in a far more personal, intimate and appropriate manner then the mass media advertising that has been available (Leckenby, 2006, â€Å"Advertising Issues†) and (Hong, 2007, â€Å"Advertising in the Environment†). In the ubiquitous world it will be possible to generate believable, personality rich story characters on a display that may want to appropriately alter the emotional state of a human, depending on the time and their physical condition as sensed from their body posture (Li, 2006, Pp. 132). Emotion recognition systems may also make it possible for entertainment systems to suggest the right movies, audio clips or interactive games and it may be possible to provide real – time information on a wide variety of is sues to bus commuters or to generate music which is influenced by the motion of a human conductor within the ambiance (Li, 2006, Pp. 31, 132, 223, 229, 293, 366, 384 and 433). The possibilities for enhancing interactions related to advertising and entertainment are many and ubiquitous devices generally try to ease the cognitive load and provide intelligent sensing of user needs. Entertainment and advertising are amongst the oldest concepts that are known to mankind (Vogel, 2007, Pp. 1 – 5). As a result of productivity increases, which have also been assisted by advances in computing and information technology, leisure time has increased and people spend more time on all forms of leisure and entertainment activities. Although demand for entertainment has increased, so also has the variety of entertainment which is available and individuals have the greatest preference for rich media video type viewing activities that are relatively affordable. Although, the advertising industry is doing well also, it has been hampered by strict regulations on what can and cannot be done, with expenditure shifting from the traditional advertising mediums to the new electronic forms of advertising that use emerging technologies (Sweney, 2007, Paragraph 1) and (Ramsey, 2004, Pp. 1 – 2). Online advertising expenditure in the United States in the year 2004 alone exce eded $ 17.5 billion and the consumer is in control, wanting unique and attractive forms of advertising and entertainment. Thus, it makes sense to try and understand how individuals will interact with advertising and entertainment in the new ubiquitous age and this essay presents a discussion about the likely form that advertising and entertainment will take in the future. The Ubiquitous Environment It is appropriate at this juncture to try and imagine what the ubiquitous world of tomorrow is likely to be like. The world of the future will be characterised by wireless connectivity and miniature, but immense computing power that is connected to very fine sensors (Mathieson, 2005, Pp. 1 – 10). Global positioning systems (GPS) will make it possible for location sensing to within meters and it will be possible to interact with intelligent computing devices using the most convenient human modes for interaction, speech and hearing. Converged networks that connect ubiquitous devices will be intelligent, high capacity and high speed networks with a capacity for moving huge amounts of data to any connection very rapidly. Short – range wireless networks, similar to Bluetooth, will supplement global connectivity provided by the ubiquitous network. The occurrence of selected events will be able to trigger intelligent responses from devices and as an example it will be possible to inform the police and nominated relatives of an individual’s location if air bags in a car were to be inflated as a result of an accident. It will be possible to monitor the activities of the children in a family in order to determine if a child has attended class or if they may have ventured too far away from a neighbourhood. Electronic money contained in RFID tags which are attached to a car, or mobile devices that are carried by a person will be able to pay for any road toll, bridge taxes or minor traffic violations without a requirement to stop. 3G cellular networks will become prolific and they will make it possible to have unified voice, video and data connections serve all human senses to provide rich interaction experiences. Computers will be able to create close to real life experiences for humans that stimulate all their senses and already scientists are thinking about devices that will stimulate the human sense of smell (Kaye, 2001, Pp. 1 – 20). Smart cl oths will have a capacity for monitoring body signals and it will be possible to monitor brain waves to interact with computing devices. Intelligent home appliances will be able to monitor what is available in a home and they will not only alert individuals if the refrigerator is running low on certain items, but tiny â€Å"smart dust† sensors will also monitor food items for biological and chemical agents that determine if such items are still fit for human consumption. Intelligent homes, buildings and stores as well as hospitals will react to individual needs and provide appropriate assistance as required. Prompt and pre-emptive response from computing will have become a reality. Sophisticated avatar characters will provide more pleasing human computer interactions that will convey elements of emotion that has been generated by computers. Japan’s ubiquitous architecture provides an indication of many trends that are emerging for the future (Krikke, 2005, Pp. 4 â€⠀œ 9). Ubiquitous or pervasive computing is the result of advanced networking, powerful personal computing, embedded computing and advanced artificial intelligence based human – computer interaction capability. The ubiquitous age is characterised by the evolution of ambient intelligent environments and these environments are driven by new interaction technology which provides for new ways of using content, new sensing or stimulus generating technologies, faster and more powerful computers and far greater storage capacities for data etc (Eyles, 2007, Pp. 4). The ubiquitous age will be characterised by ubiquitous computing, ubiquitous communication and intelligent user – friendly interfaces and the resulting ambient intelligence will provide for context awareness, personalisation, immersion and adaptability. Context awareness refers to a device having knowledge about its environment and acting in accordance with such knowledge, personalisation refers to having the ability to deliver information and interactions in accordance with a user’s requirements and adaptability refers to the device having a capacity for modifying its performance according to externally imposed requirement s to best cater to a user. Clearly, many opportunities will exist for utilising new technology for advertising and entertainment. However, in view of the fact that the ubiquitous environment will have the capacity for collecting a large amount of personal data which will be used for enriching individual experiences, but which can also be misused, privacy in the ubiquitous environment is an issue (Mutanen, 2007, Pp. 24 – 43). A number of techniques are being researched to protect individual privacy in the ubiquitous age, but the trusted authority concept is amongst the more promising ways for protecting individual privacy. Advertising in the Ubiquitous Age Ubiquitous environments will permit a variety of methods to present advertising messages to people, including email, instant messaging, cell – phone, network television and electronic display boards etc that are linked together as a result of convergence of new mobile technology, IT and media on an integrated global infrastructure (Ihlstr, 2007, Pp. 1 – 5). The ubiquitous environment will have a chain of sensors that will be deployed by advertising service providers to sense contexts, including location, weather condition variables, such as temperature and what the intended audience is engaged in at a location, so that the more appropriate advertising message on the right channel may be presented (Leckenby, 2007, â€Å"Advertising Issues†). The context information is useful for presenting the right advertising messages to the right people at the right time and on the right channel using the more appropriate form of advertising message. Context is also important f or displaying advertising messages that are likely to be important for a particular location, such as those messages that are placed by local businesses in a suburb. Research indicates that although tastes are likely to vary, recipients are interested in the entertainment content of advertisements and this means that the right advertising messages have to be created for the right format. Advertising messages should provide for a means by which a recipient can follow – up on what has been received and recipients will certainly require that their privacy and security be protected. Consumers who are linked to the ubiquitous network of devices can be made to provide information about their preferences and it is likely that they may want to have their more relevant personal attributes made available on a ubiquitous user database. The ubiquitous environment is certain to have a large number of peripheral displays that are mounted at convenient locations, including close to elevator s, at convenient points on streets and in shopping malls or other public locations. Serendipitous advertisements are most likely to fit in well on displays in a ubiquitous environment, because other messages can be sent in a more personalised and discrete manner. The advertisements that are required to be placed will be booked with advertising service providers who will have facilities for creation of advertising messages and the distribution of such messages over the ubiquitous networks. It is most likely that mobile wireless networks will become even more important in an age of ubiquitous networks and this means that personal mobile devices, especially a PDA type device or an advanced mobile phone which can be used for a wide variety of interactions with the ubiquitous network and other users will assume a higher level of significance in the lives of individual users (Loke, 2007, Chapter 3). Individuals will be using such devices to send and receive emails, transfer funds to businesses or other users, retain data for a wide variety of purposes including inventory for groceries that are in stock at home, immediate purchasing needs and any purchasing transactions that may have been carried out in the past etc. Sensors placed at various locations on the ubiquitous networks will be able to interrogate the mobile device of a user and depending on what information is permitted to be shared the advertising and entertainment service providers will be able to determine what is likely to be of interest to the owner of a mobile. Thus, those who are within an airport terminal may be provided with advertising related to bargain fares, while a short message from a PDA can bring a message containing information about local restaurants offering special deals. Advertising displays may call individuals on a first name basis after having sensed information related to their identity from their personal mobile device when they are in proximity of an intelligent display and it will be possible for such individuals to interact with intelligent displays using speech to present their preferences (Mathieson, 2005, Pp. 1 – 10). It will be possible to shop for pizza, movies, books and music anywhere and at anytime, with the purchase instructions emanating from a personal device along with a payment authority and it will be possible to accept digital delivery in a format which is both highly portable and widely usable. Today we live in a world in which very many advertising messages influence individuals as they carry on with their daily lives and many of such advertising messages are likely to be of little interest. The rising cost of advertising makes advertising expensive. It is important that if individuals find something that interests them in the large number of advertising messages that they are presented with, then they should be able to quickly retrieve information for further interactions with the advertiser. Beaming is a new advertising technique that is being experimented with by several firms and the idea is to permit those who view advertising on electronic displays to retrieve and store electronic contact information into their mobile devices through their device’s infrared or Bluetooth port (Krikke, 2005, Pp. 24). The information that is able to be transferred into a mobile device through beaming is then used by the device to provide links through the network for further inte ractions with the advertisers. Newer forms of beaming will permit those mobile devices with a camera to â€Å"photograph† information that has been coded into black and symbols, called SpotCodes. A SpotCode has been presented in figure 3, below. After a phone has succeeded in â€Å"clicking† in information that has been presented on a visual advertisement, it will be possible to use this information to retrieve all the details into an email that can be sent to a nominated address, or if desired, immediate purchase can be made by using the mobile device. Thus, emerging technologies will make it possible to enhance the effectiveness of advertising by making it cheaper, easier and more convenient to follow up on advertising, which should be of benefit to the advertiser and the consumer. The idea is to facilitate transactions and to enhance convenience in a manner that will not waste resources or the attention span of the consumer. Great opportunities will exist to develop evolving relationships with consumers through ubiquitous advertising and advertisers, or at least their messages, can go where the customer is, with a capacity for initial interest to be rapidly transformed into more information or interaction without any need to move through the physical space. Advertising message delivery does not have to be visual all the time and â€Å"targeted audio† technology will make it possible for laser beams to be pointed to persons who will then be the only ones who will be able to hear an audio message (Krikke, 2005, Pp. 143 160). Thus, after sensing individual preferences, it will be possible to direct speech communications to individuals in a location so that only those who are likely to be interested listen to these messages. Thus, it is not just Bluetooth that will be used to transmit short range location based information. The ubiquitous network will follow the user and not the other way round. Augmented reality devices will have been made perfect in the ubiquitous age and those who live in this age will not just be carrying a PDA type device, but they will also be wearing a comfortable spectacle, if they so desire, that will assist in visual encounters with the ubiquitous world. It will be possible to superimpose additional inform ation on to visual advertising messages that may be presented to individuals through the augmented reality devices and examples of such additional information may include balance of a bank account containing electronic money, or location information for outlets. It will even be possible to interact with large electronic advertising boards through gestures in order to prompt them to provide additional information to either a PDA type wireless device or the augmented reality device which may be worn by a user. Researchers have already tried to develop a gesture recognition language that can change the way in which humans interact with ubiquitous computing devices of the future (Krikke, 2005, Pp. 202). Promotions and special offers can be quickly presented to consumers who can electronically collect coupons and if a loyal shopper is identified during an advertising or promotional campaign, they can be presented especially attractive discounts or offers electronically. Face recognition and the detection of emotions by examining faces will make it possible to cheer – up a loyal customer who may be feeling a bit down and the buying habits of consumers can be examined to determine if certain consumers are loosing interest, so that a special effort can be mounted to win them back. It will be possible to embed identity on to each person using RFID devices that may be mounted on to a watch, or even be embedded under a person’s skin so that immediate identification and connection to the most appropriate databases that are likely to be of interest can be made possible. Very many possibilities for enhancing advertising present themselves, but the key to have these possibilities becoming reality is the advances that can be made in packing small chips with huge computing power and imbuing networks with capacity and speed. Entertainment in the Ubiquitous Age Although better networks and more powerful computers as well as advances in technology on a broad front will enhance the overall entertainment experience in the ubiquitous age, entertainment in the new era will be characterised by its extension into the physical world and a capacity for interaction (Eyles, 2007, Pp. 1 – 5). Augmented reality will have an impact on the entertainment experience by superimposing the virtual on to the real in a number of ways that may also include the use of holograms. Internet will add to the traditional methods for delivering entertainment content to viewers and video appliances will be able to predict what will be the most appropriate viewing choice for individuals based on their estimation of the emotions of a user, their activities and important occurrences in the real world. Video on demand is already a reality, but context aware music and wireless networked video on demand will be the norm with the entertainment devices of tomorrow. Sur round screen systems, using mist or water droplets to project video images and collaborative multiple browsing arrangements are examples of new ways in which the senses can be artistically manipulated (Peterson, 2005, Pp. 8 – 12). Entertainment is likely to be influenced by notions of temporal and spatial mobility as well as context, mood and emotion. The integration of artistic forms and technology, interactivity with a capacity for manipulating entertainment and media experiences, the use of hypermedia concept to link media elements into a personally satisfying experience, immersion which will permit entering a three dimensional environment that approaches complete entertainment and a emphasis on a superior ability to narrate in order to support the moment – by – moment mood of the individual mind will continue to dominate entertainment in the ubiquitous age with entertainers and artists innovating to exploit the power of technology (Burnett, 2003, Chapter 1). Individual users are more likely to be closely connected to ubiquitous computing devices through cybernetic systems and this will permit a closer connection of the human form with the electronic environment (Burnett, 2003, Chapter 2). This means that the human user will be able to more intimately control a variety of ubiquitous devices through the motion and expression of every part of their body and as an example, dance will be able to influence music and stage lighting effects more closely then ever before, resulting in new and richer forms of artistic impression for the audience. Wireless or sonar tracking systems will eliminate any need to have physical connections between a human form and any ubiquitous devices, resulting in a true freedom of movement and expression with a capacity for artistically manipulating other sensory impulses for the audience. The smart entertainment space concept is illustrated in figure 4, below. The concept of anytime anywhere entertainment will mean that it will be possible to use an individual’s PDA device to shop for a very wide variety of entertainment games, videos or experiences from anywhere and at anytime (Krikke, 2005, Pp. 63 – 64). High speed networks will deliver what has been requested in a flash and the content can be viewed on a portable PDA or a home entertainment centre which will offer more options for enhancing entertainment pleasure or even interacting with the entertainment presentation. Interactivity will mean that as a story rolls on, a viewer can choose options that influence future narration and influence the present in the narration. Wideband network connectivity will mean that it will be possible to carry on with social interactions with distant human friends while simultaneously interacting with computer generated entertainment which may include avatars that are beamed into the homes of all those who are connected to a social gatherin g which is distant in space, but close in time. All those who are connected can interact simultaneously with the computer that is generating entertainment animations and view the results in real time. Such entertainment sessions are certainly going to need very high speed networks, immense computing power for the ubiquitous entertainment centres and real time processing power to put together socialisation in an augmented reality world and large amounts of data will have to be maintained in storage for rapid retrieval with such data also being rapidly moved over the ubiquitous networks. When individuals are indulging in remote interactions, such as those over videoconferencing, it is not possible to touch or feel the people at a distance and this means that a certain loss of emotional information currently exists in computer mediated interactions. Touch, or hepatic interaction devices that are being considered in research today and new forms of interfaces that attempt to present more emotion information by various means, such as colour changing displays or avatars will make entertainment and social interactions more fun (ISMAR, 2007, Pp. 33 – 35). Thus, it will be possible to further improve the tangible content of interactions involving computers. Computer generated reality will make it possible for individuals to either learn or play games, such as squash, all by themselves using a racquet that will contain position sensors that are coupled to a computer that will fix the position of such a racquet in real time, in relation to a computer generated ball, mak ing it possible for the user to experience the thrill of a real squash game (ISMAR, 2007, Pp. 4 – 9 and 21 – 27). Many different games, including fencing, tennis, table tennis, badminton or even ice hockey etc will be available on the same entertainment centre, which will also provide delights of high speed driving, ice skating or piloting a jet fighter with appropriate gaming attachments. Natural interaction will be possible with contemporary art, including music and lighting patterns emanating from a music wall and this will make it possible for individuals to seek new creative and thrilling experiences (ISMAR, 2007, Pp. 47 – 52). New forms of interactive exhibitions will be possible for art and antiquities etc, with computer generated avatars providing more human like guidance around museums or other interesting places (ISMAR, 2007, Pp. 53 – 58). It will be possible for painters and graphic artists to create on computer palettes and to imbue their work with emotionally responsive features and a certain level of dynamism that will make their work far more interesting as compared to the paintings of today (ISMAR, 2007. Pp. 61 – 66). Changes in te

Wednesday, November 13, 2019

The Character of Pearl in Hawthornes The Scarlet Letter Essay

The Scarlet Letter:   Pearl  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      Children are incredibly sensitive and can sense almost any emotion of an adult by observing body language and facial expressions. Such is the case with the youthful Pearl from the novel The Scarlet Letter, by Nathaniel Hawthorne. As the daughter of the adulteress Hester Prynne, the townspeople view Pearl as a demon in an angel’s clothing; who not only knows exactly what the letter "A" signifies on the bosom of her mother, but as the demon who placed it there, as well. The townspeople believe that Pearl uses this information against Hester by constantly mentioning the letter in order to make Hester extremely uncomfortable. This belief of the townspeople is certainly not supported by the following dialogue. " ‘Nay, mother, I have told all I know,’ said Pearl more seriously than she was wont to speak†¦Ã¢â‚¬â„¢But is good earnest now, mother dear, what does this scarlet letter mean?- and why dost thou wear it in thy bosom?- and why does the minister keep his hand over his heart?’ She took her mother’s hand in both her own, and gazed into her eyes with an earnestness that was seldom seen in her wild and capricious character." (Hawthorne 164)    This dialogue does not seem to be the words of a demon, but of a child who is utterly curious about what the letter "A" on her mother’s bosom means. One should not underestimate Pearl’s intelligence. Pearl is not the demon many townspeople consider her to be; instead she is intelligent and sensitive towards her surroundings and can understand much about the scarlet letter Hester wears. "The neighboring townspeople†¦ had given out that poor little Pearl was a demon offspring; such as ever since old Catholic times had occasionally bee... ...tions lead a reader to realize that she does see a link between Hester’s letter and Dimmesdale’s habit of covering his heart with his hand, although she does not know what this connection is. Pearl is an amazing child and perhaps one of the few many-sided characters in the novel. Although some readers of this novel may not care to read between the lines and see beyond the labeling of demon, the true Pearl is completely different from this stereotype. The real Pearl, the inquisitive, intelligent, and beautiful creature that she is, becomes the symbol for salvation in this novel. Pearl may be the product of sin and "filthiness", yet she possesses traits that make her an amazing child. Indeed, Pearl is the rosebush which grows near the prison door: she is the one bright spot the prisoners of this novel see as they peer through the small windows of their confinement.

Sunday, November 10, 2019

Employee Management Plan

Running head: EMPLOYEE PORTFOLIO: MANAGEMENT PLAN Employee Portfolio: Management Plan MGT/311 Organizational Development University of Phoenix Riordan Manufacturing has implemented a management plan that will assess employees’ characteristics. By assessing their characteristics, the organization will know how to use their characteristics to make the organization more successful. The company has asked three employees to complete self-assessments about job satisfaction.The assessments will ultimately allow management to discover characteristics of the employees and determine how these characteristics will affect Riordan Manufacturing in the future. Self-assessments give an employee the opportunity to provide a narrative description of their major accomplishments, job satisfaction, emotional influence and how they make decisions related to their performance. In a self? assessment, the employee can describe their major contributions and how they accomplished or did not accomplish their performance expectations.After a thorough analysis of the self-assessments, additional recommendations will be presented to assist Riordan Manufacturing gain a better perspective on the management and motivation that these employees will need in order to succeed. The participants in the Riordan Manufacturing self-assessments were Catrina Toth, Kyle Rogers, and Paul Holliday. The following self-assessments were administered to the employees: How Satisfied Am I with My Job, Am I Engaged, How Are You Feeling Right Now, What’s My Affect Intensity, What’s My Emotional Intelligence Score, and Am I A Deliberate Decision Maker?Management will use these assessments to identify the areas in which they scored high and low and create a plan based on the areas that mostly need more engagement. Catrina’s self-assessments indicate a job satisfaction rating at an average. She is satisfied with her job but not really engaged, is a deliberate decision maker, and exhibits po sitive emotions. Kyle has an above average rating in most areas; he is very satisfied with his job and is engaged in his work, exhibits an average score on deliberate decision-making and demonstrates positive emotions.Paul demonstrates a high score in job satisfaction, is a deliberate decision maker and also exhibits positive emotions on his self-assessments. The efficiency of the company is directly affected when employees are satisfied with their job and position held. An employee with a high level of job satisfaction feels more positive about his or her job and will continue to be a productive member of the company. Job Satisfaction Job satisfaction is the general attitude one holds about a job, which can dramatically affect the effectiveness and efficiency of the organization† (Robbins & Judge, 2011). Companies with satisfied employees tend to reduce the levels of absenteeism and turnover rate. Employees with low levels of job satisfaction experience negative attitudes abo ut their jobs, tend to have a high absenteeism rates, leave the organization, or engage in deviant behaviors that negatively affect the organization and other employees.The self-assessment results reveal that employees at Riordan Manufacturing exhibit positive behaviors influencing other employees in the workplace. Employee Engagement The employees’ engagement indicates their involvement and enthusiasm for their work (Robbins & Judge, 2011). All three of the self-assessed employees are highly satisfied with their jobs, are committed to their responsibilities, and motivated. Dedicated employees commit more time to their work, are a positive influence on others, and perform at higher levels than expected.Self-Assessment Recommendations Management at Riordan Manufacturing recommends additional assessments to conclude what is their job satisfaction level. Understanding these factors would describe a positive feeling about a job. It is important to understand what provides positiv e feelings and low-level negative feelings. Also management recommends more job involvement because this would enhance the level of attitude toward the assigned tasks and duties.It is important to be involved because management can identify strengths and show that company cares about the kind of work employees do. The recommendation of additional assessments will provide both the employees and managers with additional information on each personality to implement better managerial techniques. Based on those results, managers will develop management plans to encourage and mentor employee success. References Robbins, S. P. , & Judge, T. A. (2011). Organizational behavior (14th ed. ). Upper Saddle River, NJ: Pearson/Prentice Hall.