Tuesday, August 25, 2020

Safety Management Essay Example | Topics and Well Written Essays - 1000 words

Wellbeing Management - Essay Example Foundation of a viable security activity plan requires assets and time, and consequently, backing of the senior administration. When building up another activity plan, an association can have an advisory group involving representatives, board individuals and directors to encourage acknowledgment, protection from change decrease and increment odds of wellbeing activity plan achievement. The executives support on a security activity plan stays basic in guaranteeing wellbeing acknowledgment, satisfactory execution results and essential help or preparing arrangement to worker in order to improved security, in this way, bringing about a sheltered workplace (Binkley 157). Regardless of whether the activity plans involves presentation of another activity plan or alteration of old procedure, it is fundamental for the security supervisor to convey the means and the reason for the wellbeing activity plan process before usage. It is additionally basic that a security trough surveys the presenta tion the board arrangement of the association and make fundamental modifications. As referenced before, security the board is a constant procedure of arranging, checking and audit of procedures; a wellbeing activity plan ought to be founded on this congruity by first arranging, where desires are first distinguished, explained and settled upon. The arranging procedure ought to likewise remember recognizable proof for how consequences of the arrangement will be estimated, concession to the way toward observing and activity plan documentation (Ruding 15).

Saturday, August 22, 2020

De Beers and US Anti Trust Law Case Study Example | Topics and Well Written Essays - 750 words

De Beers and US Anti Trust Law - Case Study Example With the revelation of enormous mines in South Africa, the jewel accessibility on the planet advertise out of nowhere arrived at a high. So as to guarantee that the costs of the precious stone in the market are kept up, the provisions must be constrained. The excavators in South Africa which was the lead maker of precious stones, began cooperating and made a 'cartel' that would talk about and choose the cost of jewels on the planet advertise. This cartel was framed with De Beers ahead of the pack and they facilitated the whole activity of shaping this underlying organization that would canalize and fix the provisions of jewels on the planet advertise. This likewise guaranteed each body in the exchange profited in light of the fact that it kept up the cost of the precious stone on the planet showcase without permitting it to fall or rise marvelously. When the precious stone mines in different areas of the world were found, the South African power over the world market as for the provisions of the jewel mines descended. More mines in Angola, Russia, Congo and Zaire began to rule the world market and the South African offer in the market boiled down to 17%. In any case, De Beers by upholding clear business and monetary control available could manage these individuals likewise and guaranteed that the cost of jewels doesn't fall and kept on rising or settle in any event, when the provisions of precious stones continued rising. This implied De Beers needed to purchase out from the market a portion of the precious stones that was accessible to carry dependability to the valuing. This brought about a huge store for De Beers. The organization turned to both purchasing just as selling of precious stones so as to cut down the costs or raise the costs as the need might be. This guaranteed jewel cost was leveled out and the diggers didn't en dure. De Beers and the US Government De Beers has been a rehearsing imposing business model. They would in general control the cost of the precious stone market and this implied they disregard the US Antitrust law and its overseeing standards. De Beers was disregarding all of the Anti-trust law guideline with the exception of the customer security which De Beers says it covers. Be that as it may, at that point, even that would be under inquiry on investigation. US Diamond Dealers generally managed the purchasers of De Beers precious stones. The personality of the precious stones is lost once they arrive at the bank of US. In spite of the fact that the precious stones are not known to have started from De Beers, the organization as a brand was very notable. The US government and its Department of Justice were additionally mindful of the infringement of De Beers and they have found a way to bring them under the book however these are yet to emerge. The relationship with the jewel dealers in US and that of the legislature is surely not one for long and supported relationship. It must be immediate and legitimate to be economical. So as to do this, either the organization should change its strategy for activity or change the law to suit such a change. De Beers, the Illegal exchange and the US Market The structure made by the counter trust law is in accordance with the thinking about the best personalities on financial aspects. Notwithstanding that, any infringement of the fundamental standard of industrialist and free financial aspects would just prompt the rot of the structure so deliberately raised. De Beers is a violator

Friday, July 31, 2020

How to Survive in a Banking Desert

How to Survive in a Banking Desert How to Survive in a Banking Desert How to Survive in a Banking DesertWhen people lack access to traditional banking services, it can be very hard for them to improve their long-term financial health.You’ve probably heard of food desertsâ€"low-income communities where access to healthy food and grocery stores is pretty much non-existentâ€"but did you know that many of these communities are also banking deserts?According to research done by the Federal Reserve Bank of New York (among many others), the closing of bank branches post-financial crisis has left many low-income communities (especially ones populated by people of color) with little to no access to traditional banking services.In the same way that a lack of access to healthy food can negatively impact a person’s health of a community, a lack of access to banking services can harm their financial health as well.People who live in a bank desert are left with few options for affordable financial services. It’s harder for them to open a bank account, to get a loan, and to build their net worth.If you live in a banking desert, here are six things you can do to access financial services and, in some cases, improve your long-term financial health.1. Get an account with an online bank.All banks have online portals these days where you can pay bills, move money from checking to savings, etc. But with a traditional bank, you’ll still need a local bank branch for a lot of services. Online banks are different. They don’t have local branches. They are entirely online.With these banks, you can open up a checking account and receive your paycheck via direct deposit. The bank will also provide you with a debit card that you can use when making purchases. Not having a company-branded ATM can be annoyingâ€"and expensiveâ€"but most online banks have a deal with certain ATM companies where you can get the ATM fees waived, or at least reduced.Online banks also offer savings accounts, as well as a number of different investment accounts. Even if youâ €™re living on a tight budget, it’s always a good idea to start socking away money where you can.Nothing beats having a local banker that you can meet with face-to-face to discuss your finances. But if that isn’t an option for you, then having an online bank account is the next best thing.2. When all else fails, use a check cashing store.In areas without bank branches, check cashing stores are where many folks go to get basic banking services. People who don’t have a bank account (and so can’t get direct deposit) go to one of these stores to have their paychecks cashed out.And that’s not the only services these stores provide. Most of them also do bill payments, public transportation passes, wire transfers, currency exchange, and mail services. They’re a kind of one-stop-shop for basic financial services.When you get a check cashed at one of these stores, they’ll charge you a one-time fee. It’s usually a set percentage of the check amount. If you brought in a $600 ch eck and the check cashing store charges you a two percent fee, then they would hand you $588 in cash and keep $12 for themselves.Even a two percent fee is pretty high just to access money that’s already yours. But if you don’t have a bank account, or there aren’t bank-brand ATM’s in your area, it might be your best optionâ€"and it is a much better option than taking out a payday loan.What’s more: people generally seem to like check cashing stores. The fees are one-time, and most stores have their fees clearly posted. People appreciate transparency. In a  2016 article in Business Insider, University of Pennsylvania professor Lisa Servon, author of  The Unbanking of America, found that customers at check cashing stores generally reported a very high rate of satisfaction.3. Avoid payday loans.This is another service that many check cashing stores provide, but it’s one you should stay far away from.Payday loans are an extremely common type of small-dollar no credit check loa n. They have an average repayment term of only 14 days and annual percentage rates (APRs) that can reach as high as 400 percentâ€"and sometimes even higher! (They are also sometimes referred to as cash advance loans.)With their short repayment terms and high interest rates, many payday loan customers have trouble paying their loans back on time. So, instead, they roll their loan over, extending the due date in return for paying additional interest.Payday loans are often classified as a “predatory loans” because they are targeted at people with poor credit scores and low incomes. By constantly extending their payday loans, these people can easily get trapped in a never-ending cycle of debt.If you live in banking desert, there is a good chance that you are surrounded by payday lenders or other stores offering payday loan-like products. Whatever you do, steer clear of them, even if you’re running short on funds. The long-term risks of taking one out are far too great.4. Get a Sec ured Credit Card.If you live in a banking desert, the odds are fairly good that you don’t qualify for a normal credit card. And even if you can, the interest rates are probably much higher than you’d like to deal with.This is where a secured credit card can help you out. They’re a pretty good financial stop-gap, and they can help you  improve your credit score if used correctly.A loan is called a “secured” loan when it is backed by collateral. Common types of secured loans include home mortgages, which are backed by a house, and auto loans, which are backed by a motor vehicle.The same holds true for secured credit cards. In this case, the collateral is a cash deposit that also determines your credit limit. For example, if you deposit $500, then you get a $500 limit.You can use these cards to make purchases the same way you would a regular card. Just make sure you have a system set up to pay the card off regularly. The last thing you want is to be owing lots of extra money towards interest.One of the advantages of secured credit cards is that most of the card issuers will report your payment information to the credit bureaus. So the more payments you make on-time and longer you responsibly manage your credit limits, the more these positive behaviors will help raise your score. Once your score is high enough, you can graduate to a regular credit card.5. Look For a Credit Union.While there might not be a bank that has branches and local services like ATMS in your area, there very well might be a credit union. If there is, it’s a great way to get the service you need.Credit unions operate a lot like banks except that they are not-for-profit, member-based institutions. Because they  are not-for-profit, credit unions invest their profits back into the company. This allows them to offer lower interest rates on loans, higher interest rates on accounts, and lower (or non-existent) fees for their other services.And whereas a bank will pretty much accept anyo ne who wants to bank with them, so long as they clear a Chexsystems check, credit unions will not. Eligibility for membership could depend on any number of criteria. It could depend on where you live, where you work, or even what church you belong to.U.S. credit unions that belong to the National Credit Union Administration (NCUA) can even offer Payday Alternative Loans, which, as the name implies, are a great way to avoid predatory bad credit loans. These loans are between $200 and $1,000, range from one to six months, cannot be rolled over, and come with much lower interest rates than regular payday loans.Do some research to see if there’s a credit union operating in your area or that you might otherwise qualify to join. Recently, a group of local leaders in Kansas City opened a credit union dedicated to serving the poor, primarily African-American population living in in the city’s urban core.6.  Use prepaid debit cardsIf you don’t have a banking account, you still want a w ay to carry around money without resorting to cash. Because while cash certainly has its benefits, the drawbacks can be pretty severe. For instance, if you are carrying cash and you get robbed, game over. That money is gone.Folks with bank accounts have it easy. They can simply have money directly deposited into the checking account and then use their debit card for purchases. But if you don’t have a banking account, this option isn’t available to you.Except that it is. Sort of. With a prepaid debit card, you can load up your cash and be on your merry way.These cards work a lot like traditional debit cards, only they aren’t tied to a checking account. You put the money on the card directly. This is why they are referred to as “prepaid” cards. By loading up the card with cash, you’ve already “paid” the card provider. They are then free to let you spend down the balance without worrying they won’t get paid back.There a couple different ways you can load money onto th ese cards. The best way is direct deposit. Just have your paycheck placed immediately and painlessly on the debit card. You can also a bank branch or ATM from the bank that has issued the card, but that won’t work in a banking desert.If you can’t do direct deposit, Find a card that allows online or mobile deposits or that has deals with generic-brand ATMs to reload the card on their machines. You should also be able to reload the card at participating retailers, maybe your local pharmacy or grocery store.One of the downsides to prepaid debit cards is fees. There can be fees for using out-of-network ATMS, activating the card, even making deposits. Some cards come with a regular monthly fee too. This is why using a prepaid debit card isn’t as good an option as having a standard card and checking account. Then again, depending on your circumstances, it still might be one of your best options available.One last thing about prepaid debit cards: They won’t help build your credit. Since you’ve already deposited the cash, your payment information won’t be reported to the credit bureaus. If you’re deciding between a prepaid debit card and a secured credit card, this is definitely a big check in favor of the secured cardâ€"so long as you pay it off on time.Living in a banking desert is hard. But if you can improve your credit score, the financial tools you’ll have access to will grow.To learn more about improving your long-term financial outlook, check out these related posts and articles from OppLoans:Good Personal Finance for the Long Term with Tim MaurerStart Your New Year Out Right: Get a Credit Check!Want to Avoid No Credit Check Loans? Build an Emergency FundDo you live in a banking desert? We want to hear about your experience!  You can  email us  or you can find us on  Facebook  and  Twitter.

Friday, May 22, 2020

Benefits Of Animal Testing - Free Essay Example

Sample details Pages: 3 Words: 875 Downloads: 2 Date added: 2019/04/12 Category Biology Essay Level High school Tags: Animal Testing Essay Did you like this example? The use of animals for medical research and testing is being subjected to heated debates due to the inability of different stakeholders to strike a balance between the benefits of using the animals and the pain that is subjected to the animals in various scientific medical research. There is indeed substantial evidence that the use of animals for medical research and testing has led to tremendous advancement in the discovery of hugely beneficial drugs and still plays a critical role in the understating of different human diseases. Additionally, the use of animal testing has also provided an accurate mechanism for validating the effects of various medical and pharmaceutical products on the human body system. Despite the vast benefits of using an animal for medical testing, intensive lobbying is being made by animal rights activists to have the animal research completely abolished because they firmly believe that the pain and cruelty that the experiment does to the animals is entirely unnecessary. This paper, therefore, tries to achieve a middle ground on this vital topic by highlighting some of the benefits of animal testing in medical research and at the same time point out the critical environmental implication of animal testing. Don’t waste time! Our writers will create an original "Benefits Of Animal Testing" essay for you Create order Medical scientists generally would not prefer causing pain and injury to animals if at all the pain can be prevented. Most scientists concur that animals research and testing should be undertaken within a strict ethical framework which involves a detailed assessment of the potential effect to the animal before the testing ( Matthiensen et al. 2003). Animal testing and research remains very critical to the advancement of research in pharmaceutical and medical sector. This assertion was confirmed by the survey that was carried out by medical general practitioners 2006. In this survey, it was established that 96% of medical and pharmaceutical research experts believe that animal testing has significantly contributed to the research and discovery of drugs. The survey further affirms that 88% of medical doctors prefer pharmaceutical drugs to be tested on animals first before tried on human beings. This is to identify with high accuracy the potential effects of the pharmaceutical drugs before trying it on the human body( Gannon, 2007). Secondly, animal testing is significant in obtaining accurate medical research data that has been used to determine with the highest accuracy the potential effect of various drugs on the human body system. An expert survey by European for medical progress denoted that 84% of pharmaceutical and medical experts believes that use of animal testing has resulted into more accurate results which have led to the discovery of medicines that are potentially beneficial to the human being. Similar research by General practitioners also confirms that the use of animal research and testing improves the reliability and accuracy of medical research data (Gannon, 2007). Also, the use of animal research and testing has been confirmed to be very affordable and speeds up the medical research process. For example, the massive amount of investments that have been made by various pharmaceutical companies in discovering alternative methods of medical research and testing. The findings from these pharmaceutical companies have proven that alternative technologies that can suitably replace animal testing are costly and requires a lot of time for testing. Even in regulatory toxicology that is usually straightforward, the alternative technologies needed more than 20 tests to determine the potential risks and effects of new substances. Additionally, the introduction of alternative technologies requires validating and authentication by relevant organizations some of which are international accreditation institutions. The process of approving and certifying the non-animal techniques is always bureaucratic and not favorable to the dynamics within the medical research environment that at times requires a speedy process (Frame, 2005). Lastly, the use of animal testing can be justified in specific research by weighing out the potential benefits against the costs and effects of such medical research. This is especially true in scenarios where the risks of the new drugs to human beings outweighs the pain caused to animals to address the potential risks. Also, the use of animal testing and research can be justified when the new pharmaceutical drug is potentially impactful to human beings. For example, drugs used in the treatment of malaria and cancer that are currently prevalent in the world. In these cases, the use of animal testing is thus recommended since the benefits are much higher than the pain exposed to the animals. In conclusion, we as human beings have a responsibility to protect the animals since that is what defines us as humans. On the other hand, developing drugs to tackle certain diseases requires the use of animals for testing which makes specific animal testing experiments morally ethical. Based on these two extremes- the need to obtain accurate medical research data on certain drugs and the imperative duty of animal protection- we need to be pragmatic and strike a balance. Animal research and testing will only be justifiable if there is great precaution undertaken not to harm or expose the animals to unnecessary cruelty. Medical scientists therefore has responsibility of ensuring that any animal that they use for research should be protected. Additionally, further research on reduction and replacement technologies will reduce the use of animal for medical research and testing to only very necessary experiments where the use of animals is inevitable (Flint 2005).

Sunday, May 10, 2020

Indefinite Pronouns of Spanish

Indefinite pronouns are those pronouns that typically refer to no particular person or thing. The list below indicates which pronouns these are in both English and Spanish. In Spanish as in English, most of the words used as indefinite pronouns sometimes function as other parts of speech, often as adjectives and sometimes as adverbs. In Spanish, some of the indefinite pronouns exist in both masculine and feminine forms as well as singular and plural forms, so they must agree with the nouns they refer to. Here are the indefinite pronouns of Spanish with examples of their use: alguien — someone, somebody, anyone, anybody — Necesito a alguien que pueda escribir. (I need someone who can write.)  ¿Me llamà ³ alguien? (Did anybody call me?) algo — something — Veo algo grande y blanco. (I see something big and white.)  ¿Aprendiste algo esta tarde? (Did you learn something this afternoon?) alguno, alguna, algunos, algunas — one, some (things or people) — Puedes suscribirte a alguno de nuestros servicios. (You can subscribe to one of our services.)  ¿Quieres alguno mà ¡s? (Do you want one more?) Voy a estudiar con algunas de las madres. (Im going to study with some of the mothers.) Algunos quieren salir. (Some want to leave.) cualquiera — anybody, anyone — Cualquiera puede tocar la guitarra. (Anyone can play the guitar.) — The plural form, cualesquiera, is seldom used. mucho, mucha, muchos, muchas — much, many — Me queda mucho por hacer. (I have much left to do.) La escuela tiene mucho que ofrecer. (The school has much to offer.) Somos muchos. (There are many of us. Literally, we are many.) nada — nothing — Nada me parece cierto. (Nothing seems certain to me.) No tengo nada. (I have nothing.) — Note that when nada follows a verb, the part of the sentence preceding the verb typically is also put in negative form, making a double negative. nadie — nobody, no one — Nadie me cree. (Nobody believes me.) No conozco a nadie. (I know nobody.) — Note that when nadie follows a verb, the part of the sentence preceding the verb typically is also put in negative form, making a double negative. ninguno, ninguna — none, nobody, no one — Ninguna de ellas va al parque. (None of them are going to the park.) No conozco a ninguno. (I know nobody. — Note that when ninguno follows a verb, the part of the sentence preceding the verb typically is also put in negative form. Plural forms (ningunos and ningunas) exist but are seldom used. otro, otra, otros, otras — another, other one, another one, other ones, others — Quiero otro. (I want another one.) Los otros van al parque. (The others are going to the park.) — Un otro and una otra are not used for another one. Otros and the related pronouns can be combined with a definite article (el, la, los or las) as in the second example. poco, poca, pocos, pocas — little, little bit, few, a few — Tengo un poco de miedo. (I have a little bit of fear.) Pocos van al parque. (A few are going to the park.) todo, toda, todos, todas — everything, all, everyone — Èl comià ³ todo. (He ate everything.) Todos van al parque. (All are going to the park.) — In singular form, todo exists only in the neuter (todo). uno, una, unos, unas — one, some — Uno no puede creer sin hacer. (One cannot believe without doing.) Unos quieren ganar mà ¡s. (Some want to earn more.) Comà ­ uno y desechà © el otro. (I ate one and threw away the other.) — Uno and its variations are often used in conjunction with forms of otro, as in the third example. Although some different pronouns are translated the same into English, they arent necessarily interchangeable. Explaining some of the subtle differences in usage is beyond the scope of this lesson. In many cases, the pronouns can be translated in more than one way into English; you must rely on context in those cases to convey the meaning.

Wednesday, May 6, 2020

Discussion Boards Hsa 520 Free Essays

Has 505 The major online computer services such as Health Grades, America Online Inc. , and WebMD provide health news and medical and health forums where users can access medical libraries, exchange messages, and discuss health problems. In what ways might the growing use of these services by consumers affect future strategies for: Family practitioners? HMOs? Technology refers to the innovations or inventions from applied science and research. We will write a custom essay sample on Discussion Boards Hsa 520 or any similar topic only for you Order Now According to the book, adult use of the Internet as a health information source has increased dramatically. A lot of people use the Internet to find out different diseases and illness. From a family practitioner perspective use of the Internet could be a god thing. Most people find their health care providers from the Internet and also find out about health care issues. The Internet sites allow patients to gain knowledge about what is going on with their health and help solve questions they might have. Health care coverage through the use of an HMO costs less than comparable traditional health insurance, with a trade-off of limitations on the range of treatments available. HMO might view the internet site as an advantage because that’s where majority of people to research information and this could better help HMO reach out to the general population. They can get information from potential health care seekers based off the information they are providing on the sites, it could also help them use advertise strategies to put information out there to people. Internet sites have their advantages and their disadvantages but it seems there are more advantages than not. A primary care medical group has a list of patients who had once used the group on a regular basis as their primary source of care. However, in scanning their records, these patients had not been in for an appointment in the past two (2) years. The senior partner wants to send them an informational flyer about the practice and a refrigerator magnet that has the group’s telephone number and after-hours service number. As the marketing director for the practice, evaluate this approach in light of the HIPAA regulations. Is it acceptable to implement this marketing plan under the current regulations? Explain your answer. HIPPA is used to facilitate health insurance portability, protect patient security and privacy of information, and further reduce health care fraud and abuse. HIPPA requires all health care providers to have patient consent for access to their medical records or information. According to the book, data will need to be aggregated so that medical information cannot be attached to names and addresses of individual patients. Patient identifiable information cannot be use of marketing items. Under the current regulations there are some marketing strategies that can take place but it cannot have any patient information if it is not related to treatment or payment of their care. If the organization does not have the consent of the individuals to use their information that I don’t think that it would be acceptable. Has 520 Discuss the factors that should be considered when developing a consistent IM / IT strategy. Explain your rationale. Information systems should support the strategic goals, and objectives, and priorities of the organization they serve. The factors that should be considered when developing a consistent IM/IT strategy are: 1. Aligning IM/IT with organizational strategy: This is important because there is a need for interrelationships among IM/IT, the rest of the organization and the external environment. 2. Developing IM/IT infrastructure, architecture, and policies: This plan should identify the major types of information required to support strategic objectives and establish priorities for installation for computer applications. 3. Setting IM/IT project priorities, and overseeing investments: The organization needs to be aware of the investments and where their money is going and for what projects it is going to. They have to set boundaries and have set priorities. 4. Using IM/IT benefits assessment to enhance accountability: Accountability is very important to any organization. Knowing what they have and what they are missing is very vital. Analyze the various approaches to reviewing software and hardware standards and make at least three recommendations for improvement. Provide specific examples to support your response. Three recommendations for the various approaches to reviewing software and hardware standards are: 1. Data compatibility-use of common codes and data definitions for electronic information exchange across an organization. Its important that any organization make sure the soft ware and hardware is compatible to the systems they are trying to use. 2. Central review ensures that hardware and software will ne of a type that can receive technical support and maintenance from the information system staff. . Central review can help prevent illegal use of unlicensed software within the organization. Integration discusses the advantages and disadvantages of end-user computing and determines if this is an application that should be progressively pursued. Explain your rationale. End-user computing offers the potential to expand the base of IM/IT development and overcome issues that arise when a low priority is assigned to certain applications that are nevertheless viewed as important to units within the organization. Some of the advantages of end user computing are overcoming shortages of professionals, establishment of user friendly and responsive systems, and overcoming implementation problems. Some other advantages are the systems tailored to users, enables creative use of IS, generates competitive advantage, overcomes backlog by providing systems that IS could not get round to doing, puts users nearer the information, allows for variety, Increases user awareness of IS, and Relieves work load of IT professional. The disadvantages are that they produce inappropriate systems, causes duplication, takes users away from their real job, ignores long range and technical issues, courts disaster due to lack of attention to procedures, and causes integration problems. From the e-Activity, discuss what additional challenges exist with systems integration between / among health care organizations and possible solutions to those challenges. How to cite Discussion Boards Hsa 520, Papers

Wednesday, April 29, 2020

Offshore Outsourcing free essay sample

Aztec Software has an offshore development enter in Bangor, India, that develops the new integration product, Embarcadero DOT/Studio. The entire product lifestyle -? from development to maintenance takes place in India. Aztec work on the DOT/Studio tool helped Embarcadero to quickly establish a competitive market position for this particular product. There are many definitions of offspring as outlined below, but most accept that it generally refers to the process of an organization replacing services obtained from domestic providers with imported services (Greene 2006; Backchat et al. 004). Offspring refers to the acquisition of intermediate inputs by companies (or governments) from locations outside the consumer country. It is the crossing of international borders that distinguishes it from outsourcing in general (Kirkland, p. 4 2005). Offshore outsourcing can have far-reaching implications beyond those associated with onshore outsourcing.Various authors have made the assumption that the countries that send work offshore are primarily developed nations (Interrogator, 2001; Spray, Maydays Verdi, 2006; Raja 2004, Kodiak Lair, 2007). We will write a custom essay sample on Offshore Outsourcing or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Most definitions assume that offspring is directed to developing countries in the interest of saving costs; it was possible o shift the actual production location of services to lowest countries in a manner theoretically transparent to end-users (Kirkland, 2005 ; Corroboratory Remington, 2005). 1 The World Trade Organization (WTFO) in its General Agreement on Trade in Services used the following parameters to define offshore outsourcing (Corroboratory Remington, 2005): Despoilers and buyers remain in their respective locations; Dmoving the service recipient to the location of the service provider; [Noncommercial presence of service provider in a foreign country; and C]temporary migration -? seller moves to the location of the service buyer.All definitions are compelling but for the purpose of this thesis, the previously stated definition of offshore outsourcing as the delegation of administration, engineering, vendor in a lower-cost location will be used (Robinson Oklahoma 2004). The WTFO parameters will also be respected as they expand upon that definition. 2. 3 History of IT outsourcing The history of IT outsourcing is part of IT in that the early time-share systems were a form of outsourcing. Sass sass 1 9805 sass 20005 20105 Hardware Software Standardization Total Solution Time Sharing Facilities Management Infrastructure Client Server Application OutsourcingProcess Offspring Rationalization Layering Best of Breed Technical Models Utilized Trends Figure 2. 1: Technical Models and Trends Figure 2. 1 gives an indication of the timeline for technical models and trends by combining charts and information (Hillocks Fenny, 2006; Zoning et al. , 2006% Wagner et al. , 2006; Lee et al. , 2003; AAA, 2007 and AAA, 2007). In the early 1 sass software programming was first moved offshore as software production was easily movable, since it seldom needed to be committed to a physical medium (Dossals Kenney, 2004).However, offshore outsourcing as a trend didnt begin until relatively recently. Since Sodas initial decision to outsource the bulk of 12 their IT functions in October 1989, they have outsourced the bulk of their data centre operations to IBM in an initial IIS$250 million deal that was originally scheduled to run for a 10-year span (Lacily Hillocks, 2000; Dibbers, et al. 2004; Patton, 2005). It was a momentous occasion for Kodak and dozens of other large companies would soon follow the film giants lead. Sodas deal set the stage for massive outsourcing negotiations with vendors such as IBM and DES, and brought about a basic change in the way corporate America approached IT. Suddenly Coos were paying more attention to core competencies, cost saving and strategic partnerships with their IT vendors. Service quality was also an important factor (EBBS, 2006; Patton, 2005). Because of the success of the Eastman Kodak outsourcing agreement of 1989, multi-sourcing has become an integral part of the IT industry.General Electric (GE) was a business leader in the offshore outsourcing arena. In the early sass Jack Welch, then CEO of GE, introduced a new rule that governed Gees offshore actions called the 70:70:70 rule (EBBS, 2006). In an e- mail to GE employees, Welch mandated that 70% of Gees IT work would be outsourced. Out of this, 70% of that work would be completed from offshore development centers and from that, about 70% would be sent to India. This has resulted in a total of about 30% of Gees work being outsourced to India (Scope, 2009; Spray et al. 2006). Currently, offshore outsourcing to India receives the most press but other countries such as Poland, Ireland (sometimes referred to as the Celtic Tiger) and Israel are just as prominent. Emerging countries such as China, the Philippines, Russia, Mexico and South Africa should also be included in any discussion about major offshore outsourcing venues. The strong growth in IT outsourcing can be attributed to the tight US labor market caused by the dot. Com boom and the year 2000 problem (Y K) (Friedman, 2005; Hillocks, Fenny, 2006). In Australia, national organizations such as National Australia Bank (NAB) and Tellers continue to outsource to offshore IT groups (Dibbers et al. , 2004). BP- Billion and Shell Australia have transferred data centers and IT support to Malaysia and Singapore from Melbourne (Bogota, 2005). In the late 1 9905 and early 20005 outsourcing maintained a growth rate of 20% per year, although recent figures indicate that it appears to be slowing. In 2005, the total contract value of such mega-deals was just under ISSUES billion -? the lowest such 13 total since 1996.HTTP predicts that the first absolute decline in commercial IT outsourcing revenue could occur between 2006 and 2007 (Gibson, 2006). Some authors argue that this was due to more focused outsourcing deals i. E. Multi-sourcing and tighter IT budgets which may have lessened the prevalence of long-term mega deals. Wagner et al. , (2006) highlighted best of breed in their study and linked it to ERP systems that are responsible for the current trend of layering in which existing ERP systems that replaced best of breed as part of the rationalization are being enhanced with specializes systems.In interviews conducted at Tellers, a new terminology of layering was used to describe current systems (Herbert Murderer, 2001; AAA, 2007; AAA 2, 2007; Pair Cinematographic, 2005; Peppier, 1999). A typical example is NAB, which uses SAP as core ERP but layers specialist systems such as Bank Analyses on top of ERP/SAP. Although not following a best of breed concept in special circumstances, this methodology does leave room for exceptions in strategic requirements. Table 2. Gives a timeline for relevant outsourcing literature.TimeLine for Outsourcing Literature Related Articles 1776: Adam Smith, in The Wealth of Nations, formulates a theory of competitive advantage, expounding the notion of outsourcing as a way to cut costs by hiring cheaper labor in less developed countries. (Smith, 1776) 1963: Electronic Data Systems signs an agreement with Blue Cross of Pennsylvania to handle its topdressing services the first time that a large corporation has turned over its entire topdressing department to a third party. (Electronic Data Systems, 2008) ass and ass: Cost reduction pressure and need for deter communications. Lacily, Hillocks Fenny, 1995; Costa Beaumont, 2001 1989: Total outsourcing of Sodas IT function with the anticipation of about 50% savings in cost. (Hierarchies Lacily, 1996; Kelly, 2004; Lee, 2000) Cost containment as well as reduction and the need to hire IS professionals are proposed as the reasons behind outsourcing. (Cobol Apt, 1995) Improved cost predictability focus on strategic use of IS, resulting in Transaction Cost Theory (TACT) being proposed as a measure of outsourcing. (Williamson, 1979) General framework Of procurement strategies for IS development. (Sardine Pepslnine, 1994) .NET 8 T PI is a sourcing advisory company; refer: wan. . Tip. Net 14 TimeLine for Outsourcing literature Related Articles Contingency framework for analyzing economically efficient relationships after the outsourcing decision. (Sleeper, 1993) Transaction Cost Theory (TACT) is disproved and fails to explain outsourcing experience and contradiction Of TACT. TACT is fraught with imprecise constructs that are difficult in operational. (Lacily Hillocks, 1995; Auber Weber, 2001) Risks and benefits of outsourcing lost in rhetoric (Backchat, Panegyric Cravings, 2004; Meyer, 1994) Loss of control over the quality of the software.Fox, 1 994) Reduced flexibility and loss of strategic alignment are linked as drawbacks of outsourcing. (walker, 1985) Analysis of pitfalls and potential risks of outsourcing gives guidelines for successful contracts, costs of negotiating, monitoring outsourcing contracts and cost of incurring. (Dibbers et al. , 2004 Lacily Hierarchies, 1995) Conduct in-depth interviews with firms and executives in order to understand the forces that drive outsourcing decisions and how these decisions are made. Clark, smug McCrae, 1995) Analysis of advantages and disadvantages of outsourcing based on 11 risks. Earl, 1996) Observation that major driver for outsourcing is disparity in the salary levels between developed and Third World countries. (Apt Mason, 1 995) Studies find that some strategic applications are not (and are unlikely to be) outsourced to foreign countries in the future due to issues of communication and coordination, potential violation of intellectual property rights, concerns on unclear government rules, cross-border twofold and trade in service. Paten Jurists, 1 994) Hidden cos t of outsourcing from users perception. (Birthlimy, 2001 ) Literature identifies service quality (SURVIVAL) as n important instrument used to measure the service actually experienced by customer due to outsourcing. (Wrigley, Dry Farmhand, 1997) Changes in reasons for outsourcing: L]Delivered quality of service; C]Decades to new technology; C]Divisible and responsive systems; C]Defocus on business competencies; and C]Teleprompter in cash flow. AAA-Grim, 2003; Kebabs Kebabs, 2003) 15 Attempts to provide a complete guide to the complex issue of outsourcing and strategies: C]Dont Outsource Core Competencies; and ADSTAR Small. (Your, 2005) Globalization seen as a part of the world economy tit both positive and negative aspects. For positive aspects see (Robinson Oklahoma, 2004; Patterson, 2006; Underwater, 2005) and negative aspects (Trucker, 1997; Greene, 2006; Interrogator, 2001 Examines how counties provide and implement IT outsourcing services e. G. China. Drivers and obstacles of outsourcing practices in China. (Luau Ghana, 2006) Table 2. 1: Timeline of Major Outsourcing Literature Most of the current literature is based on the American offshore outsourcing experience, with the remaining literature primarily concerned with European experiences in this field. 2. 3. 1 ERP offshore outsourcing Fortune 500 companies have implemented ERP systems such as SAP, Peoples and Oracle (Snyder Basel, 2010). ERP systems were originally embraced because they promised the power of enterprise-wide, international coordination and integration. ERP technology has moved from mainframe-based, batched operations to the clerestories architecture and Internet-enabled, real-time operations (Lenders, 2000). Currently, Accentuate, IBM and Price Waterholes Coopers dominate the field of ERP systems implementation consultancy. ERP are a rapidly growing segment of the IT market. In 1996 ERP IT outsourcing was estimated at around LOSSES billion Ross (Thralldom Guarani, 1998), while in 2008 Gardener estimated that the world outsourcing market for IT services had grown to IIS$748 billion in 2007 (Gardner, 2008; Richter, 2008).Studies have indicated that for every dollar spent on ERP systems such as SAP, an expense of $10 in consultancy can be expected (Perez, Went Mathematician, 2004). As defined by Pair Cinematographic (2005), ERP functional development and deployment have been classified into four main areas, namely: ICC]markets; 9 Gardner is a major IT research company; refer www. Gardner. Com 16 Kicked operations; C]Administrators; and Addressers. This standardization in corporate systems has also allowed standardization in processes, procedures and support.This then brings into question the need for internal business IT support for generic processes and development, as individual resources are better able to focus on value adding (MacDonald, 1996). 2. 32 IT organization workings Organizations are becoming increasingly complex with multiple business units and various IT departments, both internal and external, combined in strategic partnerships. One of the problems for management is achieving a reduction of internal and external boundaries so that diverse groups can ark with better coordination.There are several ways in which an outsourced IT group can work with users to reduce the us versus them boundary. Authors such as Gaffe Ridings (2003) suggest reduction of the inter-group boundaries in order to increase the perception of responsiveness and thus increase their acceptance of the IT work by creating shared goals, user education and joint work activity. In a typical Australian IT project, touch points, direct and indirect lines of communications exist between: Itinerant business unit users; Collaborate business units; L]The head office;C]The IT department for application and hardware support; specialized project teams; Elderliness; and C]Outsourcing partners. These various teams are split into a multitude of roles that include business experts and analysts, developers, managers, functional experts and testers. In essence this means that outsourcing adds another dimension to a complex situation. 17 The lines of communication are complex, in that service chains within a corporations structure and with outside customers and vendors are all interlinked in one way or another as demonst rated in Figure 2. . Customers Business Units Units Outsourcer Hardware Us port Vendors Vendor IT Department Support Project Teams Outsourcer Developers Corporate Figure 2. 2: Typical Touch Points in an IT Organization 2. 3. 3 Trends in IT The current trend is for organizations to view IT as a commodity that can either be managed with alliances or outsourced. An increased reliance on software giants such as Oracle or SAP to provide end-to-end solutions and the move away from best of breed has been replaced by a layering concept.For example, at Tellers the major Human Resources systems are provided on the primary SAP ERR system (with Organization Structure as the source of truth) UT they utilities specializes systems, each from different vendors, as layers to meet specified requirements such as training, portals and wages comparison (AAA 2007; Nordic 2006). This results in different outsourcing contracts with hardware vendors, system vendors and applications support. A hierarchy of support is employed from low-level (i. E. Alp desk) to high-level vendor support for strategic and complex problems. The result is a combination of a vertical, horizontal and matrix organization of relationships and partnerships. The role of the internal IT department has changed from one of a service reviver with skills in systems development to one of facilitating a partnering model that provides the social glue to hold diverse systems and support together (AAA 2006; 18 Based on the research of Zoning et al. (2006), Wagner et al. , (2006) Lee et al. 2003) AAA (2007), AAA (2007) and the researchers experience, Figure 2. I was constructed to give the timeline of IT trends in relationship to the technical models in use. The change towards layering has resulted in software giants buying out smaller specialist software providers whose products they then add or layer onto existing products (Ellis, 2007; Snyder Basel, 2010). A software companys assets are all inside peoples heads ((Poisons, 2007).. Examples of this are Peoples buying J. D.Edwards, then Oracle purchasing both Peoples and Hyperfine and attempting to integrate them. The combining of Oracle Financial, Hyperfine, Business Object, Peoples and J. D. Edwards allows the combined entities to compete with ERP market leader SAP, which in turn has purchased Business Objects in the late sass (Philips, 2007; Wailing, 2007). 2. 4 IT outsourcing: success or failure Authors such as Interrogator (2001) argue that globalization and the free trade yester have been the catalysts that have helped to make offshore outsourcing the success that it is today.Outsourcing has been the result of the global agreement on ideology, with a convergence of beliefs in the value of a market economy, trade liberations and a movement toward a borderless world (Raja, 2004). It can be argued that the emergence of off- the-shelf software such as SAP for corporate usage has helped develop a system for standardizing software applications, making the landscape suddenly more conducive to IT outsourcing (Levine Ross, 2003). The drivers of outsourcing can be summarized as in Table 2. Drivers of Outsourcing Identified by Improved productivity (Thralldom Guarani, 1998) Centralized IT delivery model (Currie Celestial, 2001) Flexibility in staffing levels( Aloof, 1996) Increase in cost-efficient foreign competition (Corroboratory Remington, 2005) Focus on core business (Delbert Inhere, 2006 in pervade, 2001) Organization structure (Your, 2005) IT sourcing partnerships (Welch 1999; Ye, 2005) Competitive advantage (Delbert Inhere, 2006) World Best Practice (Barr, 2005) 19 Table 2. : Drivers of Outsourcing Authors such as Catchalls Soil-Sthere (2005) have attempted to rank ritual success factors and link them to the management theory used in managing the outsourcing relationship. These are outlined in Table 2. 3.Rank Critical success factors Theory 1 Core competency management Theory of core competencies 2 Stakeholder management Stakeholder theory 3 Production cost reduction Neoclassical economic theory 4 Social exchange exploitation Social exchange theory 5 Transaction cost reduction Transaction cost theory 6 Vendor resource exploitation Resource-based theory 7 Contract completeness Contractual theory 8 Relationship exploitation Relational exchange theory 9 Vendor behavior control Agency theory 0 Demarcation of labor Theory of firm boundaries 11 Alliance exploitation Partnership and alliance theory Table 2. : Ranking of Critical Success Factors in IT Outsourcing Relationships 2. 41 Considerations in the outsourcing process The decision to outsource IT is a variant of the classic make/buy decision an organization can invest in the non-core activity of supporting IT infrastructure, or they can contract out (Lealer, 2006; Fine Whitney, 1999).The considerations and factors relating to outsourcing are many and varied but may be based on skill requirements, privacy of information, quality and tragic direction of organizations. Factors such as the quality of service rather than labor arbitrage, is emerging in European countries as a factor in the outsourcing decision (Kodiak Musketeer, 2008).

Friday, March 20, 2020

Absence of security awareness in the Bangladesh Army Essays

Absence of security awareness in the Bangladesh Army Essays Absence of security awareness in the Bangladesh Army Essay Absence of security awareness in the Bangladesh Army Essay ABSENCE OF SECURITY AWARENESS AMONG THE SOLDIERS OF BANGLADESH ARMY- A MAJOR Menace TO THE ORGANIZATION Chapter I – INTRODUCTION (RESEARCH PROPOSAL AND DESIGN ) Problem Statement 1.â€Å"Security is the status achieved when designated information, stuff, forces, activities and installings are protected against espionage, sabotage, corruption and terrorist act, every bit good as against loss or unauthorised revelation. The term is besides applied to those steps necessary to accomplish this status and to the organisations responsible for those measures† ( Joint Services Glossary of Operational Footings, p. S-4 ) . â€Å"Individual security consciousness is the cognition and attitude of the members of an organisation about the precaution of physical, material and information assets of that organisation. Awareness sing the hazards and available precautions is the first line of defense mechanism for the security of forces, information and stuff. The focal point of security consciousness should be to accomplish a long term displacement in the attitude of the members of the organisation towards security, whilst advancing a cultural and behavioral alteration within an organization† ( Wikipedia, n.d ) . 2.The inordinate usage of cell phones, posting sensitive images on the Facebook, go forthing official paperss unattended by the soldiers etc. have become a regular phenomenon. It is go oning as a usual affair. Thereby, military forces are jeopardizing themselves every bit good as the organisation is besides being affected. Many soldiers are transgressing security unwittingly due to miss of equal cognition on security. The existent fact is that, they truly do non believe that it can impact their personal every bit good as organisational security. An organisation can merely be protected when its forces are good protected and witting about their personal security. Therefore, single security consciousness plays a critical function to guarantee overall organisational security.This paper will critically analyze whether absence of security consciousness among soldiers a major menace to Bangladesh Army or non. 3.The issue at manus is a complicated and intangible component. While it is perceived that absence of single security consciousness of the soldiers impacting the overall security of the organisation, the other factors are besides perchance knotted together in changing degree straight or indirectly. Research Questions 4.To reference the job statement, replies of the undermentioned inquiries will be pursued in this research:  ­ a.Primary Question.How the absence of security consciousness among soldiers of Bangladesh Army is impacting the security of the organisation? B.Secondary Questions.In order to reply the primary inquiry, the undermentioned secondary inquiries need to be answered: ( 1 ) What is the present province of security consciousness among soldiers of Bangladesh Army? ( 2 ) How the absence of security consciousness of the soldiers going a major menace to the organisation? ( 3 ) How to heighten the security consciousness among the soldiers of Bangladesh Army? Research Objective 5.Bangladesh Army as an organisation subjected to figure of external and internal menaces. Absence of security consciousness is one of them which can impact the overall security of the organisation to a great extent. Therefore, aim of the research is to happen out whether the absence of security consciousness among the soldiers of Bangladesh Army is a major menace to the organisation or non. Purpose of the Research 6.The intent of the research is to measure the present province of security consciousness among the soldiers of Bangladesh Army. This research will besides happen out the effects of absence of single security consciousness of the soldiers on the organisation, if it has any so to happen a manner out to extenuate those. Significance of the Research 7.In the present yearss, it is of great concern that the soldiers of Bangladesh Army are missing single security consciousness. In the recent yesteryear there were many incidents like espionage, loss/theft of stuff, excess matrimonial personal businesss, route accident, drug trafficking, corrupting etc. took topographic point in about all the fort of Bangladesh Army. The figure is increasing twenty-four hours by twenty-four hours, which finally affects the overall security of Bangladesh Army as an organisation. In this respect, no paper has been developed to happen out the affects and effects on the overall security of the organisation caused due to miss of security consciousness of the soldiers. It is traveling to unleash the country that single security consciousness can greatly act upon the overall security of the organisation. So, research on this affair would give a new position of understanding the prevailing jobs. Restrictions and Premises 8.Following restrictions were identified and premises are considered while carry oning the research: a.The subject is related to absence of security consciousness among soldiers of Bangladesh Army, as such, the research sphere is confined within the soldiers of Bangladesh Army. b.Most of the informations required for the research were confidential or secret paperss for ground forces. Therefore, sing the security jeopardy, all the required informations were non provided by the different security bureaus and subdivisions of AHQ. c.It was assumed that basic operation of all the units of Bangladesh Army is similar. The samples are collected largely from Dhaka and Mirpur camp presuming these units as the chief watercourse of Bangladesh Army. d.It was hard to acquire the true contemplation of ideas by the soldiers because of their rigidness. e.It is assumed that the samples used in the research represent the population of Bangladesh Army at an acceptable significance and the respondents have answered the study inquiries truthfully. f.The study was conducted among the soldiers, JCOs, NCOs and officers at assorted degrees from different weaponries and services. Though the figure of participants in study was less, but the consequence was assumed to be a right contemplation of the members of Bangladesh Army. g.Time and chance was non plenty to travel for a realistic land study among all the formations countrywide. Hence, the research is based on limited land study and content analysis. Review of Literatures 9.List of Literatures Consulted. a.A Survey of IT Professionals ( 2012, January ) ,The Impact of Mobile Devices on Information Security. b.Australian National Audit Office, Audit Report No. 25 ( 2009-10 ) ,Security Awareness and preparation. c.The Global Conference for Wikimedia onSecurity Awareness( 2014, August6-10 ) , London ) . d.Major Md Ferdous Iqbal ( 2012 ) , A research conducted onPsychological Approach Towards Enhancing Professionalism Among the Soldiers of Bangladesh Army,Mirpur. e.Major Md Humayun Kabir ( 2010 ) , A research conducted onAn Insight into the Military Valuess of Bangladesh Army,Mirpur. f.Robert Mcpherson and Bennett Pafford ( 1999 ) ,Safety and Security Handbook,CARE International. g.Squadron Leader Md Obaidulla ( 2004 ) , A research conducted onInformation security System of Bangladesh and in the Context of Information Warfare,Mirpur. 10.Findingss of the Literature Review.The research worker has studied a few related books, articles and a good figure of research documents on organisational and national security facet. The important 1s are highlighted below: a.A Survey of IT Professionals (2012 ) highlighted in their cardinal findings that security hazards are on the rise because of nomadic devices. It besides mentioned that deficiency of employee consciousness has greatest impact on security of nomadic informations. B.Australian National Audit Office( 2009-10 ) in their audit study mentioned that security incidents can supply valuable penetrations into an organization’s security environment, including the degree of security consciousness. Common types of security incidents like loss of personal or official resources, unauthorised entree to an organization’s premises, wrong storage of security classified information, via media of entree control etc. may be the declarative of security consciousness issues. It is besides mentioned that defects in security consciousness and preparation can sabotage the operation of the controls and patterns put in topographic point to pull off exposures to security hazards. degree Celsiuss.The Global Conference for Wikimedia on Security Awarenessheld at London has mentioned security consciousness is the cognition and attitude members of an organisation possess sing the protection of the physical and specially information assets of that organisation. Many organisations require formal security consciousness preparation for all workers when they join the organisation and sporadically thenceforth, normally yearly. vitamin D.Major Md Ferdous Iqbal( 2012 ) in his research discussed about the psychological motive of the soldiers needs to be addressed with immediate precedence for the sweetening of professionalism among the soldiers of Bangladesh Army. He besides mentioned about development of sense of duty among the JCOs / NCOs need particular attending by the appropriate authorization. vitamin E.Major Md Humayun Kabir( 2010 ) highlighted that the psychological conditioning is indispensable to insulate the members of armed forces from being infected with societal desires and outlooks which are incompatible with military life. Hence pre-cautionary steps and counterpoisons are necessary to countervail the effects of inauspicious societal influences. degree Fahrenheit.Robert Mcpherson and Bennett Pafford( 1999 ) in the Safety and Security Handbook for CARE International’s staff mentioned that each member of an organisation has a responsibility to turn to issues of safety and security proactively and flexibly at all clip. g.Squadron Leader Md Obaidulla( 2004 ) in his research paper mentioned that information in warfare should be recognized as a military and national plus. The undertaking of puting up a well-conceived construction for contending a high-tech war demands to be handled professionally. 11.Areas for Further Research.There are figure of books, booklets, literatures have published and a good figure of researches have been carried out on organisational and national security facet. So far no research has been carried out on absence of security consciousness among soldiers of Bangladesh Army which in fact is impacting the overall security of the organisation to a great extent. In the 21stcentury as a member of Bangladesh Army a soldier must be cognizant of single security in order to guarantee personal every bit good as organisational security. In visible radiation of above in this research an enterprise will be made to measure the present province of security consciousness among the soldiers of Bangladesh Army with a position to happen a manner out to guarantee overall security of the organisation. Research Hypothesis 12.There is a common perceptual experience predominating among most of the officers that soldiers of Bangladesh Army are missing in security consciousness facet which in fact presenting a security menace to the organisation. There could be figure of causes lending to the organisational security. Among those causes, absence of security consciousness is one of the of import and important 1. Therefore, the hypothesis of this paper isAbsence of security consciousness among the soldiersof Bangladesh Army is a major menace to the organisation. Research Design and Methodology 13.Conceptual Framework.The hypothesis is based upon a job statement mentioned antecedently. The sensed job is conceptualized by the research worker in the conceptual model given atAnnex A. 14.Research Type.This is a causal and primary research on which no effort was taken antecedently to carry on any survey. Therefore, the demand of a thorough survey was extremely felt to place the causes and effects of absence of security consciousness among the soldiers of Bangladesh Army on the organisational security and thereby happening possible steps to cut down their effects. 15.Research Variables. a.Case.Soldiers of Bangladesh Army. B.Independent Variable.Absence of security consciousness among soldiers. Security consciousness means holding knowledge on security issues. Absence means the province of being off ; absence of head. Therefore, absence of security consciousness implies the absence of head sing security issues. degree Celsiuss.Dependent Variable.A major menace to the organisation. â€Å"Threat means hazard, indicant of a possible threat. Negative event that can do a hazard to go a loss, expressed as an sum of hazard, effects of hazard, and the likeliness of the happening of the event. A menace may be a natural phenomenon such as temblor, inundation or a semisynthetic incident such as fire, sabotage etc.† ( BusinessDictionary.com ) .Each organisation is cognizant of the importance of security. Therefore, it is of import to acknowledge that forces, stuff and information are the assets that require top security against possible menace. Data Collection Method 17.The research worker utilised assorted methods of informations aggregation to finish the research, as both qualitative and quantitative methods are used. The inside informations of informations aggregation methods are given atAnnex B. Survey included questionnaire study and drumhead and inside informations of which are given atAnnex C( including informations processing ) andAnnex Dseverally. Interview methods including sum-up is given atAnnex E. Summary of FGDs are appended atAnnex F. Detailss of few instance surveies are included atAnnex G. For the study, bunch trying on the random choice footing was done. Outline of the Paper 18.This paper will hold the undermentioned chapters: a.Chapter–I.This chapter contains Research job, Research inquiries, Literature reappraisal and findings, Purpose and significance of research, Hypothesis and variables of research, Data aggregation method. B.Chapter–II.In this chapter the chief focal point is to measure the present province of security consciousness among the soldiers of Bangladesh Army. The findings of the informations on the research subject are included here. degree Celsiuss.Chapter–III.In this chapter a really critical and in-depth survey has been carried out to measure how the absence of security consciousness of the soldiers affects the overall security and becomes a major menace to the organisation. It will besides foreground the causes of absence of security consciousness among the soldiers. vitamin D.Chapter-IV.In this chapter few steps is highlighted to heighten the security consciousness among the soldiers of Bangladesh Army. vitamin E.Chapter-V.It contains the sum-up of major findings of the research. Finally establishing on the findings, a few recommendations will be made to get the better of the grey countries.

Wednesday, March 4, 2020

Emperors of Chinas Han Dynasty B.C. 202 to 220 A.D.

Emperors of China's Han Dynasty B.C. 202 to 220 A.D. The Han Dynasty ruled China after the fall of the first imperial dynasty, the Qin in 206 B.C. The Han Dynastys founder, Liu Bang, was a commoner who lead a rebellion against the son of Qin Shi Huangdi, the first emperor of unified China whose political career was short-lived and full of contempt from his peers. For the next 400 years, civil unrest and war, internal familial conflicts, sudden deaths, mutinies, and natural succession would determine the rules that would lead the dynasty to great economic and military success over their long reign. However, Liu Xis ended the long reign of the Han Dynasty, giving way to the Three Kingdoms period of 220 to 280 A.D. Still, while it maintained power the Han Dynasty was hailed as a Golden Age in Chinese history - one of the finest of Chinese dynasties - leading to a long legacy of the Han people, who still comprise the majority of Chinese ethnicities reported today.   The First Han Emporers In the final days of the Qin, Liu Bang, a rebel leader against Qin Shi Huangdi beat his rival rebellion leader Xiang Yu in battle, resulting in his hegemon over the 18 kingdoms of imperial China that had pledged allegiance to each of the  combatants. Changan was chosen as the capital and Liu Bang, posthumously known as Han Gaozu, ruled until his death in 195 B.C. The rule passed to Bangs relative Liu Ying until he died a few years later in 188, passing in turn to Liu Gong (Han Shaodi) and quickly onto Liu Hong (Han Shaodi Hong). In 180, when Emporer Wendi took the throne, he declared that Chinas border should remain closed to maintain its growing power. Civic unrest resulted in the next emperor Han Wudi overturning that decision in 136 B.C., but a failed attack on the southern neighbor Xiongu  realm resulted in a several-year campaign to attempt to overthrow their biggest threat. Han Jingdi (157-141) and Han Wudi (141-87) continued this plight, taking over villages and converting them to agricultural centers and strongholds south of the border, eventually forcing the Xiongu out of the realm across the Gobi Desert. After Wudis reign, under the leadership of Han Zhaodi (87-74) and Han Xuandi (74-49), the Han forces continued to dominate the Xiongu, pushing them further west and claiming their land as a result. Turn of the Millenium During the reign of Han Yuandi (49-33), Han Chengdi (33-7), and Han Aidi (7-1 B.C.), Weng Zhengjun became the first Empress of China as a result of her male kin - though younger - taking the title of regent during her supposed reign. It wasnt until her nephew took the crown as Emporer Pingdi from 1 B.C. to A.D. 6 that she advocated her rule. Han Ruzi was appointed as emperor after Pingdis death in A.D. 6, however, due to the childs young age, he was appointed under the care of Wang Mang, who promised to relinquish control once Ruzi came of age to rule. This was not the case, instead and despite much civil protest, he established the Xin Dynasty after declaring his title was a Mandate of Heaven. In 3 A.D. and again in 11 A.D., a massive flood struck Wangs Xin armies along the Yellow River, decimating his troops. Displaced villagers joined rebel groups who revolted against Wang, resulting in his ultimate downfall in 23 wherein Geng Shidi (The Gengshi Emporer) tried to restore the Han power from 23 to 25 but was overtaken and killed by the same rebel group, the Red Eyebrow. His brother, Liu Xiu - later Guang Wudi - ascended the throne and was able to fully restore the Han Dynasty throughout the course of his reign from 25 to 57. Within two years, he had moved the capital to Luoyang and forced the Red Eyebrow to surrender and cease its rebellion. Over the next 10 years, he fought to extinguish other rebel warlords claiming the title of Emporer. The Last Han Century The reigns of Han Mingdi (57-75), Han Zhangdi (75-88), and Han Hedi (88-106) were rife with small battles between long-time rival nations hoping to claim India to the south and the Altai Mountains  to the north. Political and social turmoil haunted the rulership of Han Shangdi and his successor Han Andi died paranoid of eunuchs plots against him, leaving his wife to appoint their son the Marquess of Beixiang to the throne in 125 in hopes of maintaining their family lineage. However, those same eunuchs that his father feared ultimately led to his demise and Han Shundi was appointed the emperor that same year as Emporer Shun of Han, restoring the Han name to the dynastys leadership. Students of the University started a protest against Shundis eunuch court. These protests failed, resulting in Shundi being overthrown by his own court and the quick succession of Han Chongdi (144-145), Han Zhidi (145-146) and Han Huandi (146-168), who each tried to fight against their eunuch adversaries to no avail. It wasnt until Han Lingdi ascended the thrown in 168 that the Han Dynasty was truly on its way out. Emperor Ling spent most of his time roleplaying with his concubines instead of governing, leaving control of the dynasty to eunuchs Zhao Zhong and Zhang Rang. Downfall of a Dynasty The final two emperors, brothers Shaodi  - the Prince of Hongnong - and Emperor Xian (formerly Liu Xie) led lives on the run from mutinous eunuch counsels. Shaodi only ruled one year in 189 before being asked to relinquish his throne to Emperor Xian, who ruled throughout the remainder of the Dynasty. In 196, Xian moved the capital to Xuchang at the behest of Cao Cao - the Yan Province governor - and a civil dispute broke out between three warring kingdoms vying for control over the young emperor. In the south Sun Quan ruled, while Liu Bei dominated western China and Cao Cao took over the north. When Cao Cao died in 220 and his son Cao Pi forced Xian to relinquish the title of emperor to him. This new emperor, Wen of Wei, officially abolished the Han Dynasty and its familys inheritance to rulership over China. With no army, no family, and no heirs, the former Emporer Xian died of old age and left China to a three-sided conflict between Cao Wei, Eastern Wu and Shu Han, a period known as the Three Kingdoms period.

Monday, February 17, 2020

Business Model Generation Canvas Essay Example | Topics and Well Written Essays - 500 words

Business Model Generation Canvas - Essay Example so taking the utmost care to see to it that there is absolute visualization of the business model so created and the templates of the business model has got nine templates that fits very well for the better understanding and the due contribution from each of the participant. This type of Business model canvas can very well be formatted in a very large way depending on the number of participants and so even a very large number of the business participants can very well participate together and jointly contribute together towards the success of the business model canvas. Most of the people who participate in this joint exercise can very well contribute their own ideas and sketch down whatever they feel towards turning the business concern towards the success. Thus this Business Model Generation Canvas is a very powerful tools that can very well force business people to really undergo the process of first understand the problems of the business and then start the discussion process and finally create very useful and readily applicable ideas that can very well be applied to real time business problems. Thus as a final step it helps in the analysis of the business problems and gathers the ideas and the views of the different people participating in the business discussion. This kind of business canvas will very well help the business establishments in reaching and also setting new goals for the organization. This kind of model really challenges the business people to really think about the ways by which they can develop new and innovative business ideas which can very well satisfy the business goals of an organization that would very well satisfy and serve the business interests of its creators. This kind of business canvas is very well suited for any type of business organization be it a large or a small organization and this very well enhances the business capability of the organizations under consideration thus becoming a very important tool that could very well

Monday, February 3, 2020

A Rose for Emily, William Faulkner Essay Example | Topics and Well Written Essays - 1000 words

A Rose for Emily, William Faulkner - Essay Example The story, like most of the author’s other works, is noted for its complicated plot and elements of horror. It is the delicate portrayal of a person, denied of love, isolated by the family and society. This story employs the literary devices of mystery throughout to keep the audience hooked to the narration. The way in which the servant behaves and the instance of Miss Emily buying â€Å"arsenic from the druggist† are examples of clever deployment of mystery (Patrick 7). The story’s most unique and striking aspect is the murder of her lover by Emily Grierson but its impact comes to a full circle with the revelation that she keeps his body because she yearns so deeply for his companionship. Through this work Faulkner memorializes Emily, a character that reflects several traits of the Old South, as seen through the townsfolk’s perspective. The story begins with Emily’s death and a description of the house, the insides of which the townsfolk seldom see. The author then gives out the information about the character in bits and pieces, in a jumbled chronological order, immortalizing Emily and her eccentricities. This technique works very well in hiding the vital clues and thus eliminates the chances of compromising the story’s twist in the end. The narrative style helps the audience to understand the faults in Emily’s character. ... The narrative style helps the audience to understand the faults in Emily’s character. The settings of the house, described in the beginning, indirectly refer to the protagonist’s state of existence, as can be evidenced from descriptions like a â€Å"fallen monument† which connotes to the present state of Miss Emily (Faulkner 1). Similarly, the present state of the house, described so clearly as â€Å"stubborn and coquettish decay† and â€Å"eyesore among eyesores† hint both at Emily’s deranged mind as well as the rotten truths that lay buried within her home. (Faulkner 1). The images of the rose colored curtains and the shade lights are the description of a feminine dwelling space and the author illustrates how she remains trapped in a haunted house, without receiving love either from her father or from her lover. The diligent way in which the author portrays her tragedy renders her as a memorable character in the readers’ mind, and th us Faulkner effectively memorializes Emily. The events from Emily Grierson’s childhood, when she lives with her father, also helps in memorializing the character. The author’s style of writing emphasizes such traits that will make the readers remember Emily. The choice of words he uses in the story focuses immediately on the unity of the community knowing about the secrets of Emily since she is dead, and this makes the reader curious to know more about the character. As the readers go on with the story, they find many instances that immortalize Emily in their minds. The gothic horror presented in the story is also one of the aspects that capture the readers’ attention. The decaying mansion that no outsider has entered before Emily’s death and the Negro servant also leave

Saturday, January 25, 2020

Nikes CSR Policy Ethical Issues and Dilemmas

Nikes CSR Policy Ethical Issues and Dilemmas NIKE – ETHICAL ISSUES AND DILEMMAS INTRODUCTION Nike has been dodging accusations of employing people in the developing and under-developed economies, at low wages and poor working conditions for a considerable period of time. Having tried course correction and public relations as a measure to salvage the bad image generated by the sweatshops that Nike is accused of running, Nike has undertaken massive efforts to overcome these hurdles. Herein we will analyze Nike’s international business operations with a critical eye over the ethical issues and dilemmas that this organization has faced while manufacturing its goods in foreign lands. PROBLEM AREAS There are a number of areas that are seen as weak points or links in this Nike case. We shall first highlight the problem areas and then dive into the ethical theories that are supposed to govern them. According to the Wikipedia dictionary, ethics is defined as a general term for the science of morality.[1] While this branch of study can be further sub-divided into various categories, we have to remember that what is appropriate in a given situation may not be so among different circumstances and the decision of right or wrong is relative to its surroundings. Elaborated here are the issues and problems that stand out due to their ethical nature as issues or dilemmas faced by Nike and its operations towards its employees and customers as mentioned in the case study: Poor Working Conditions – In Nike factories, the laborers were provided with poor working conditions that were certainly below the norms accepted in the developed world. While lower standards of living may apply in the countries that have Nike factory contracts, the inhumanity of these conditions drives attention to Nike’s responsibility towards its employees. Considerable overtime and long working hours had to be endured by Nike employees desperate to remain employed in their country. An example states that Nike factory workers in Korea had to work for seventeen straight hours in silence. This indicates almost barbaric behavior on Nike’s part towards workers in these conditions. Low Wages – Nike contracts with companies to do all of their manufacturing in developing or under-developed countries. While the wage levels there are lower than the ones in developed nations, Nike still fails to employ people at a rate that can sustain their basic needs. The wages provided are much lower than the wages needed and as such cheap labor is thoroughly exploited. Nike has attempted at correcting the problem and employing people at a rate at least equal to the minimum wages prescribed in the country. Child Labor – Child labor laws in many countries are overlooked by Nike and children as young as 12 and 13 years of age are made to work long hours and treacherous conditions. Nike has taken steps to meet the starting age limit subsequently. Operations in Countries with Union Restrictions – Nike has been known to set manufacturing efforts in countries like Indonesia and China that prohibit union operations. This leads to lack of revolt and protests that leave the employees with little choice regarding work conditions and wages. Ethically, it is hard to argue against these countries as their laws do not have provisions for employment governance. In fact these countries often do not have minimum wage requirements and abundant labor is put to use by companies like Nike for the absolute minimum. Expensive Endorsements – While Nike has been continuously targeted by human rights committees, they have unceasingly maintained a high profile image by getting celebrities like Michael Jordan and Tiger Woods to endorse their products. Over five years, Tiger Woods is expected to earn 80-90 million US dollars of Nike money.[2] Ethically it would have been more beneficial to engage a part of that money in Nike factory and employee enrichment. Expensive Products – Nike sells its products at steep prices, while we all know that the products are manufactured in contracted factories on foreign lands for low costs. The cost of production being low leads Nike to generate massive profits from the sales revenues. Cover-up Public Relations Efforts – Being involved in child labor initiatives was undertaken by Nike to handle the issue at large and also to rectify the public relations pitch for Nike. The actual problem is being pointed out as adequate wages problem as opposed to the child labor initiatives that seem like a cover up for the bigger issues plaguing Nike. Lack of Development Work at Factory Locations – While one constantly hears stories of sweatshops and defense by Nike regarding its work force problems, one rarely hears of philanthropic activities adopted by Nike in the area of the factory location. For example, at Hershey, PA one hears of the development the company Hershey’s has done for the community. Likewise it reflects as selfish behavior from Nike in not supporting the causes faced by the community occupying Nike’s workforce. Health Hazards in Factories – Skin and breathing problems are observed in factories that makes Nike products. Nike has to make sure that it performs by the standards set by OSHO in protecting employees from hazardous chemicals and processes in the manufacturing cycle. ETHICAL THEORIES Ethical theories can help rationalize certain decisions that Nike has made as a company and highlight the issues pertaining to its followed consequences. Let us now examine some ethics theories and observe the case of Nike in this light.[3] Egoism – This theory states that individuals or corporations have a right to guide their conduct placing ones own interest foremost in rational decisions. Through this theory one can justify the placement of profits or revenue generation as the high attained goal of an entity. In this regards Nike has played to the theory as far as possible. They have not only conducted manufacturing with cheap labor but also ensured that the factories do not earn even a little extra than they were supposed to. This theory states that every person that promotes self interest bring about social good. In this context we could see that while the founder of Nike, Phil Knight performed with self interest in mind, he was propelling Nike ahead by huge proportions. Doing so, he did manage to bring about the rise of one of the most well known brands in the world today. Social Group Perspective – It is not only self that determines all decisions but the surrounding that forms the social group under which the individual or company resides. It is the norm or standard in social groups wherein an entity can determine the wrong or right in that particular case. For Nike this social group has become a collection of customers, shareholders, employees, foreign contractors and others. The perception of right and wrong is determined by these social groups that operate differently in different places. For example, while the minimum wage in Indonesia, Korea and China may be less that that in the United States of America, the standard of living there will meet the minimum wage requirements and Nike has to ensure that they abide by that. Cultural Relativism – Every country has its unique culture that accompanies it. For Nike, a company that has a presence in many countries in the world, minding the cultural relevance can prove to be an effective means to growth. For example, while bribes are seen as a cultural norm in some countries, they are seen as unlawful in certain other countries. Society as a whole in certain countries is known to consider bribes as a normal occurrence, which for some countries is a crime. This culture makes or breaks certain laws in place and as long as Nike abides by these laws, in the respective country, and at the same time minds its home country standards, controversy for Nike will be minimized. Utilitarianism – This theory works under the premise that the greatest good is for the greatest number. Herein it is the majority that counts above anything else. If only a few elements of the entity think that the decision is wrong, the decisions must be right which is what is said by the majority. In the case of Nike, the decisions that were enforced by the majority are responsible for the sustained controversy surrounding it. The board obviously took certain steps in clearing the controversies that have affected the company. Since these decisions are taken with the view of the company good in mind, with the majority of the people agreeing to it, the decision must be seemed as right. Deontological Perspective – This view goes by the saying ‘do unto others as you would have them do unto you.’ The duty to make this world a better place is a duty that one has to take upon themselves, besides following certain obligations. For example, telling the truth is an obligation and that is seen as ‘right.’ In the same way for corporations, it is the giving back in return concept that needs to be perfected. The corporation is obliged to provide a good product and it is entitled to bring positive changes to its constituents. Values Clarification[4] This ethical theory expects that one is familiar with ones own views, reasoning and rationale. It is for this reason that companies try to build cultures within the organization in the same way that Nike has evolved its corporate culture. Nike’s branding, products and apparel indicate its image and success. ETHICAL DILEMMAS Nike has faced ethical dilemmas in operations and manufacturing for a while now. The definition of ethical dilemma states that it is a situation wherein exists conflicts between moral imperatives and choosing one situation consequence over another can lead to compromising of what also seemed like a viable solution in the situation[5]. Let us go over the ethical dilemmas that Nike has faced over its functioning. Manufacturing Ownership – Nike chooses to contract its manufacturing to factories in foreign lands where the wages and conditions do not meet developed nation’s standards. Yet they have their products made there at low costs after enforcing their product controls. While they could manufacture these products in the United States of America, profitability of these products wins over providing the home country with employment and opportunities in the manufacturing segment. Advertising Budgets – Nike has endorsed many athletes and celebrities like Tiger Woods and Michael Jordan paying them exorbitant amounts of money. While the brand has succeeded in maintaining an image of athleticism, it has compromised on how the money could have been used to better serve the country where they have their factories. Public Relations – Nike has had to go lengths to protect its public image and had to employ many legal experts and public relations individuals. The dilemma occurs when Nike may have to admit to its mistakes but doing so would cost them greatly, hence the truth may have to be manipulated and then disclosed, which does not conform to ethical standards. Employee Enrichment – With the profits that Nike generated from manufacturing products in foreign countries at low costs, a dilemma in front of them can arise from the fact that even if the country’s wage and standards are met they fall way below the US standards. While Nike can invest in employee welfare, it is not a norm in the country that runs their factories. Besides a lot of these factories are contracted to do Nike manufacturing and Nike as such is not obligated to conduct factory and employee welfare. CONCLUSION While Nike has faced severe criticism due to its manufacturing decisions, it as a brand and product has fought and sustained its success. Ethics experts will continue to question Nike in unfavorable ways, however when we apply the ethical theories that have relevance in the business world, we observe that Nike does its best to meet the requirements. This is especially evident when Nike made decisions to conduct independent audits and engage in human rights activities. On the other hand Nike faces ethical dilemmas due to its operations and these dilemmas will continue to exist in the world economy. Nike has gone with the route of foreign contracting in its earlier phase and has received tremendous criticism through it. Faced with its plenty of ethical dilemmas, Nike has managed to sustain the product, develop new products and continue to be a force to reckon with as a consumer brand. [1] http://en.wikipedia.org/wiki/Ethics [2] http://www.golftoday.co.uk/news/yeartodate/news99/woods12.html [3] http://www.mgmtguru.com/mgt499/TN2_PAGE3.htm [4]http://64.233.187.104/search?q=cache:ofLIUDDIiW0J:jan.ucc.nau.edu/~dgs2/theories.pdf+theories+in+ethicshl=en [5] www.ethicsscoreboard.com

Friday, January 17, 2020

Effects of prejudice, racism and discrimination in society

Discrimination involves treatment of an individual or a group of people based on class or category. It can be personal, legal or institutional discrimination. It involves denying an individual or a group of people an opportunity that is available to other individuals or groups. Discriminatory actions can be done in different ways but they all involve in one way or the other some form of rejection.There are different forms of discrimination which include but not limited to the following: Age discrimination, gender discrimination, castle discrimination, employment discrimination, sex orientation and gender discrimination, language discrimination, reverse discrimination, disability and religious discrimination (Camponovo, 2003). According to Dunn & McDonald (2004), age discrimination involves unfair treatment of an individual or a group based on age. It usually occurs in one of the three different forms: Adultism (discrimination against adults), discrimination against people older than 40 and also discrimination against elderly people.It mostly happens in employment where by employees prefer younger people for employment ignoring older people with their experience although laws have been put in place to help reduce the practice. Gender discrimination involves negative believes and attitude based on gender. Employment discrimination involves locking out a group of people from applying and receiving jobs because of race, disability, religion, age and sexual orientation (Michinov, Dambrun, Guimond & MÃ ©ot, 2005).Racism refers to discrimination of individuals based on social divisions that may not always be connected to race. Prejudice involves an opinion or judgment made before facts are verified. The judgment is mostly based on gender, race, ethnicity, social class, disability and also age. There are different forms of prejudice; cognitive, affective and behavioral (Guerin, 2005). These types of discriminations have led to unequal distribution of jobs and resource s in general. Because of inequality, most groups have been denied justice.Examples include legal discrimination against Black South Africans and also different post-civil war laws that exist in the southern American states which disadvantaged blacks living there in regard to property ownership, employment and other factors such as movement, where Blacks are not allowed o pass through Whites’ residential areas. This has led to increased crimes and hatred among people. It has raised tensions between countries like the Muslim countries and America (Mcdonald, 2009). For peaceful co-existence, there is need to ensure equal treatment amongst people regardless of their age, religion and other differences that may exist.

Thursday, January 9, 2020

Parens Patriae Definition and Examples

Parens patriae is a legal term referring to the power of the government to act on behalf of people who are unable to care for themselves. For example, the doctrine of parens patriae empowers a judge to assign or reassign custody of a minor child, regardless of the parents’ wishes. In practice, parens patriae may be applied as narrowly as representing the interests of a single child and as broadly as protecting the wellbeing of the entire population. Key Takeaways: Parens Patriae Parens patriae is a Latin term meaning â€Å"parent of the fatherland.It is a legal term that refers to government’s power to act as the legal guardian for people who are unable to care for themselves.Parens patriae is most commonly applied to cases regarding the custody and care of minor children and disabled adults. However, parens patriae is also applied in lawsuits between the states and in suits dealing with the wellbeing of a state’s entire population, e.g. environmental concerns or natural disasters. Parens Patriae Definition Parens patriae is a Latin term meaning â€Å"parent of the fatherland.† In law, it is the power of the government—through the courts—to intervene on the behalf of individuals or groups of individuals who are unable to represent their own interests. For example, children and disabled adults who lack willing and able caregivers often require the intervention of the courts through the doctrine of parens patriae. Rooted in 16th century English Common Law, parens patriae was considered in feudal times to be the â€Å"royal prerogative† of the king, as the father of the country, to act on behalf of the people. During the 17th and 18th centuries, the term became more closely associated with the power of the courts to protect the rights of children and incapacitated adults. Parens Patriae Doctrine in the United States In the United States, parens patriae has been expanded by the courts to include the power of the state to act on the behalf of all of its citizens regardless of their age or health.  Ã‚   Precedence for this far broader application of parens patriae was established by the U.S. Supreme Court in the 1900 case of Louisiana v. Texas. In the case, Louisiana sued to prevent Texas from using its public health quarantine regulations to prevent Louisiana merchants from sending goods into Texas. In its landmark decision, the Supreme Court acknowledged that Louisiana had the power to bring the suit as parens patriae representative of all of its citizens rather than any individual person or business. In the 1972 case of in Hawaii v. Standard Oil Co., the State of Hawaii sued four oil companies seeking to recover damages to its citizens and general economy resulting from price fixing. While the Supreme Court ruled that Hawaii could sue as parens patriae guardian of its people, it could do so only to force the oil companies to end their illegal pricing collusion, not for monetary damages. The citizens, said the court, would have to sue individually for damages. The Broader Applications of Parens Patriae In 1914, the U.S. Congress enacted the Clayton Antitrust Act, granting broad powers to the state attorneys general to file parens patriae suits on behalf of their citizens or corporations harmed by violations of the Sherman Antitrust Act. This broader application of parens patriae was tested in the 1983 case of Pennsylvania v. Mid-Atlantic Toyota Distributors, Inc. In this high-profile case, the Fourth U.S. Circuit Court in Maryland ruled that the attorney generals of six states had legal standing to act as parens patriae plaintiffs in a lawsuit to recover damages for their citizen who had been overcharged in a price-fixing scheme by a group of car dealers. The court reasoned that since the price-fixing scheme had violated federal antitrust laws, state laws, and state constitutions, the states could sue on behalf of their citizens. Since the states have thus been empowered to act as the trustee of the public, a growing number of parens patriae suits are being filed in cases involving the wellbeing of the general population rather than specific monetary damages. Often involving natural resource disasters, such as oil spills, hazardous waste releases, and the effects of climate change, the prevalence of parens patriae actions is likely to increase in the future. For example, in 2007, Massachusetts led a group of mostly East Coast states in suing to force the Environmental Protection Agency (EPA) to regulate greenhouse gas emissions they claimed were causing rising sea levels due to global warming. â€Å"These rising seas have already begun to swallow Massachusetts’ coastal land,† stated the petitioners. In the resulting case of Massachusetts v. EPA, the Supreme Court ruled that the states had legal standing as parens patriae to sue the EPA. In April 2018, a coalition of 17 states led by California filed a preemptive parens patriae lawsuit against President Donald Trump over his proposal to rollback implementation of tougher national vehicle fuel economy standards established by President Barack Obama. In its petition, California called the EPA’s plan to weaken auto emissions rules an unlawful violation of the Clean Air Act. â€Å"This is about health, it’s about life and death,† former California Governor Jerry Brown said at the time. â€Å"I’m going to fight it with everything I can.† Sources â€Å"parens patriae.† Nolo’s Plain-English Law DictionaryHimes, Jay L.. â€Å"Two Enforcers Separated by a Common Mission: Public and Private Attorneys General.† The Federal Bar Council (2008).â€Å"Massachusetts v. Environmental Protection Agency.† Ballotpediaâ€Å"Supreme Court: Heat-Trapping Carbon Dioxide is Pollution.† Natural Resources Defense Council, Inc. (2007).Tabuchi, Hiroko and Davenport, Coral. â€Å".†California Sues Trump Administration Over Car Emissions Rules New York Times (2018)