Tuesday, December 31, 2019

Lifetime Earnings Soar with Education

How much more is higher education worth in cold hard money than a high school diploma? Plenty. Men with a graduate degree earned more than $1.5 million in lifetime earnings than those with just a high school diploma, according to 2015 statistics from the Social Security Administration. Women earn $1.1 million more. A previous report by U.S. Census Bureau titled The Big Payoff: Educational Attainment and Synthetic Estimates of Work-Life Earnings noted: The large differences in average work-life earnings among the educational levels reflect both differential starting salaries and also disparate earnings trajectories, that is, the path of earnings over one’s life. The Bureau of Labor Statistics (BLS) figures from 2017 show median weekly wages progressively increasing with educational attainment: Professional degree: $1,836Doctoral degree: $1,743Masters degree: $1,401Bachelors degree: $1,173Associates degree: $836Some college, no degree: $774High school diploma, no college: $712Less than a high school diploma: $520 At most ages, more education equates with higher earnings, and the payoff is most notable at the highest educational levels, said Jennifer Cheeseman Day, co-author of the report. Who Earns the Most? Its not surprising that doctors and engineers do best. According to the BLS, anesthesiologists, surgeons, obstetrician-gynecologists, orthodontists, and psychiatrists all make well over $200,000 a year. Even general physicians, chief executives, dentists, nurse anesthetists, pilots and flight engineers, and petroleum engineers all make $175,000–$200,000. Still in the six-figure category are: information system managers, podiatrists, architectural and engineering managers, marketing managers, financial managers, attorneys, sales managers, natural sciences managers, and compensation and benefits managers. Of course, most people pursue their passion rather than the dollar when looking at career options, though earning potential is often a factor for many. Glass Ceiling on Earnings Intact While more American women than men have received bachelors degrees every year since 1982, men with professional degrees could expect to cumulatively earn almost $2 million more than their female counterparts over their work lives, according to the 2002 report. Even by 2017, women in the United States sill earned only 80% of the median pay of men, according to the Pew Research Center. The pay gap has remained steady for the past 15 years, according to Pew. Degrees Always Needed? There has been a backlash in recent years against the push for everyone to get a college degree. According to the argument, tuition costs have risen to such a level that even with higher-paying jobs, it has become almost impossible to pay off massive student loans in a timely fashion. Some professions, of course, require advanced degrees. But the lack of skilled tradespeople have raised wages in those professions, and some high school graduates are turning to the higher wage fields of electrician or plumber without tens of thousands of dollars of student loans to repay. Another trend to avoid student loan debt: skills training. Upwork CEO Stephane Kasriel writes that freelancers say updated skills training courses are more valuable to them than their college classes. And that appears to be what more employers are asking them about on job applications. Says Kasriel: The cost of a college education is so high now that we have reached a tipping point at which the debt incurred often isnt outweighed by future earnings potential.

Monday, December 23, 2019

Our Group Surveyed Homeless Individuals To Find Out What

Our group surveyed homeless individuals to find out what needs they thought were most important. We walked around downtown Asheville near Vance Memorial Park, Library and other parts of downtown to understand the environment the homeless live daily. I could only invest two hours on the project due to the lack of communication with BeLoved and finding ways of transportation that will work around everyone’s schedule. My next steps are to provide a data analysis on the information we collected. 2) Individually, people find themselves engaged in a variety of social environments and based on experiences of overlapping environments that determine the way in that one behaves. When we saw homeless people, it appears evident that the†¦show more content†¦It gives us the sense to connect with others on a more interactive level. It allows us to become active people in the community and become the voice for others. For example, watching members of Asheville city council and voice opinions about how the community should help provide services for the homeless. When several community members voice the same concerns, this helps unite a community under a purpose. From experiences, I have learned that people who see others help will most likely help if there are a strong structure and a mission behind it. BeLoved has done that for others. It has provided shelter, a safe place, food, clothes and most of all, love and faith for everyone that comes to BeLoved. The definition of being homeless can mean many things to different people. Some may think homeless are lazy people who are just unemployed or criminals trying to steal from others, or one would be sympathetic to their living conditions and they might have had a bad past that resulted in homeless. I think it is amazing to see that one word can have different meanings, after all this culture. Culture is how we create an understanding of socioeconomic status and practice our own interpretation. Therefore, culture is changeable depending on the structure. This allows us to see the struggles of healthcare among the homeless one way; however, the government canShow MoreRelatedCase Study : Building A Policy Briefing1699 Words   |  7 PagesA POLICY BRIEFING Stephana PEA Prof. Aaron Watches May 8, 2016 Submitted on April 11, 2016 University of Baltimore- Spring Quarter 2016 What can the Baltimore government/policy makers do about homeless in Baltimore? The purpose of this paper is to evaluate the policy and actions that can be taken to end the homelessness issue. Homeless is a serious multi-faceted issue that requires the involvement of many agencies, policymakers, governments and faith-organizations. Having no home isRead MoreYouth Outreach Program At My Church1747 Words   |  7 Pages I am a very active individual within my church however we do not currently have a youth services program. This has become very popular and common in my area therefore I feel it is important to implement a youth outreach program at my church. Drift Pentecostal Church is an adult-driven church that has dissipated in youth over the last 10 years. Drift Pentecostal Church has not had a youth program since the early 70 s. The program has dwindled to a mere once a week Sunday School class that is separatedRead MoreWhen People Think Of Hollywood, They Think Of It Being1713 Words   |  7 PagesWhen people think of Hollywood, they think of it being very glamorous. In reality, it’s not all lights, camera, or action with celebrities in every corner instead having homeless and drug addicts in every corner. Drug abuse has become a bigger epidemic overtime. Many individuals have been exposed to drugs early on which has lead to their addiction. Falling into the habit of drugs does not lead down a good path when all a person desires are substances to make them feel delirious. The concept of drugsRead MoreEssay on SOME Help to the Homeless2501 Words   |  11 PagesSOME Help to the Homeless Every year approximately 2.3 to 3.5 million people go homeless in the United States of America. Twelve million adults in the US were homeless in the year 2001, or are still currently without a permanent home (â€Å"Homelessness in the U.S.†). How does this happen in â€Å"the land of opportunity?† We think of ourselves as one of the greatest nations in the world, yet citizens are living a life of poverty, often without food, clothing, and shelter. When most peopleRead MoreMental Illness and Public Administration Essay2070 Words   |  9 PagesMental illness is a prevalent issue in our country today. The Substance Abuse and Mental Health Services Administration estimated that 20-25% of our nations homeless suffer from mental illness (National Coalition for the Homeless, 2009). Many people with mental illness end up in prison without proper care and supportive housing (NAMI, 2011). Without proper care, people with severe mental illness cannot function as productive members of society (HCH Clinician’s Network, 2000). Proper housing, careRead MoreThe Challenges That We As Social Service Workers And Outside Of The Workplace1971 Words   |  8 Pageschallenges that individuals face while working in this industry, and touched on the areas I found most trying. While at Centennial College I learned a great deal about the importance of being non-judgemental and most importantly, learning to accept others beliefs and values even when they are different from our own. Critical Thinking is in my view the most valued skill to practice in order to offer the best of yourself to the clients you serve. I for one believe that we carry a lot of our own biasesRead MoreCase110038 Words   |  41 Pagesuse of X. LI, 2015. HKS751 Case Number 1989.0 Budget   Woes   and   Worse   Ahead†¦ Pine   Street   Inn,   Boston’s   Iconic   Homeless   Shelter,   Re-Thinks its Strategy In the early 2000s—after a 15-year push to create emergency shelters for the burgeoning homeless population in U.S. cities—shelter funding began to decline, nationwide.      For   Pine   Street   Inn,   Boston’s   foremost   homeless    shelter, with 715 beds in five facilities, the first sign of trouble came in the form of several consecutive yearsRead MoreGay, Bisexual, And Transgender Youth Suicide Essay1946 Words   |  8 Pagesproblem in many different countries but very limited data has been gathered about this social issue internationally. While it is well-known that it is still ongoing problem in many countries such as: Israel where a study of 1,134 teenagers were surveyed and results show that 20% of these teenagers have attempted suicide, which is 112 times the rate of the general population. The study also showed that the rate is even higher for LGBT teenagers who have religious backgrounds (Roberts, 2012). In AustraliaRead MoreCommunity and Population Health Task I4979 Words   |  20 PagesCensus Bureau, 2010a). Denver County’s population is approximately 50% male and 50% female (U.S. Census Bureau, 2010a). The ethnicity of Denver County is predominately White (52.2%), with Hispanic (31.8%) an d Black (9.8%) ethnic groups comprising the next largest population groups (U.S. Census Bureau, 2010a). The median household income in Denver County from 2008-2012 was is $49,091; compared to $58,244 for the entire state of Colorado (U.S. Census Bureau, 2010b). From2008-2012, 18.9% of households

Sunday, December 15, 2019

Microsoft Office and Figure Free Essays

string(156) " To change the style of numbering or bullets, select the last list you created and click on the downward arrow to the right of the bullet or number tool 6\." Table of Contents Introduction This session is targeted at those who wish to learn the new key features of MS Word 2007. It will cover use of the ribbon, adding tools to the Quick Access Toolbar and using live preview before making selections. By the time you have completed this session you should be able to: 1. We will write a custom essay sample on Microsoft Office and Figure or any similar topic only for you Order Now Work with the new ribbon in Word 2007 2. Add tools to the Quick Access Toolbar 3. Use the Office Button 4. Use Live Preview and make selection 5. Create, save and format a document 6. Indent paragraphs and change line spacing 7. Create bullet and number list 8. Change format of bullets and number list 9. Apply borders and shading to paragraphs 10. Add a header or footer and page numbers to documents 11. Select tools from the Mini Toolbar 12. Work with Super tool tips 13. Use Launchers to display dialog boxes 14. Create and modify tables 15. Add and remove items from the Status Bar 16. Select Word Options 17. Understand the new file formats 18. Use the Compatibility Checker 19. Understand and apply the different security features Documents needed for practical are contained within the EssentialsInWord folder on the desktop or download from http://www. qub. ac. k/student Click on the Training Materials link (under Useful Information), scroll down to Microsoft Office 2007. Click on the Zip files for Word Essential. zip and download either to desktop or H drive. Right click on the zip file and select Extract All (or unzip to here) This practical should take you approximately 2 hours to complete Microsoft Word’s 2007 Ribbon When Word 2007 is first opened, a new blank document is automatically created. The ribbon displayed across the top of the screen replaces the old toolbars and menus. The ribbon is divided into eight tabs (if Developer tab is shown), plus an additional tab if add-ins are being used. The number of items shown in the ribbon will vary depending on the size and resolution of the monitor. For example, figure 1 below shows four heading styles on the ribbon, whereas a larger monitor with a higher screen resolution would display six or more heading styles. By clicking on the downward arrow to the right of the styles, the full range of styles will be displayed. By selecting the tabs across the top of the ribbon, i. e. Insert, Page Layout, References, Mailings, Review and View, a different section of the ribbon will be displayed. Notice that the Home ribbon/tab contains many of the tools previously displayed on the Standard and Formatting toolbars. Figure [ 1 ]: The Ribbon (Home Position) To hide the ribbon, (which will allow more room on the screen) double click one of the tabs across the top. To access a tool from the collapsed ribbon, click once on the tab to expand the ribbon and select the tool. To bring the ribbon back, double click on a tab or use the keyboard option Ctrl+F1. Note that when the ribbon is collapsed it is possible to use the Alt key on the keyboard to show the shortcut keys. For example Alt+N will access the Insert tab. See . Figure [ 2 ]: Short Cut Keys for Ribbon ————————————————- Across the top of the ribbon (or just below it), at the left hand side of the Title Bar, you will notice the Quick Access Toolbar (see figure 3). To add tools from the ribbon to the toolbar, right click on the tool and select Add to Quick Access Toolbar. Note: tools on the Quick Access Toolbar are saved to the computer, therefore if you use a different computer, you will not be able to access tools saved earlier. Figure [ 3 ]: Quick Access Toolbar Many of the tools contained in the earlier Edit menu, can now be accessed from the Office Button See figure 4 for list. Note that if the current document is saved on a SharePoint server, there will also be a Server Tasks button, between Publish and close. 1. ————————————————- Click on the Office Button 2. ————————————————- Right click on the Save icon 3. ————————————————- Select Add to Quick Access Toolbar Note: If the tool is already on the Quick Access Toolbar, the option will be unavailable. If this is the case, select another tool of your choice to add to the toolbar. Office Button Click on the arrows to see an extended menu in each case Live Preview Live Preview shows formatting results on text such as heading styles, font colour, background colour, etc, without actually clicking on the choice. For example by highlighting text and moving the mouse over the styles, on the Home tab, a preview of the effect of each style will be displayed without actually selecting the style. Note that not all formatting options use live preview. Click on the Office Button and select Open Browse to where you have saved the Word Essentials folder and open the document ECDL Leaflet Select the first heading ECDL and ECDL Advanced Ensure the Home tab is selected and move the cursor over the heading styles Notice how the heading changes to allow a preview (without clicking on a style). Click the downward arrow to the right of the styles to access the full range. Select Heading1 style by clicking on it. (Note: the name of the style will appear as you move the cursor over each style). Bullets and Numbering 1. ———————————————— Under the heading Why Study for an IT Qualification, select the five lines of text after By studying for the ECDL at Queen’s†¦Ã¢â‚¬ ¦ 2. ————————————————- Select the Bullets tool from the Paragraph group on the Home tab. 3. ————————————————- Scroll down to the heading What will you learn and select the seven lines of text beginning Basic Concepts of IT and select the Numbering tool from the Paragraph group. 4. ————————————————- Under the heading Moving forward with ECDL Advanced, select the text Word processing, down to Presentations and select the bullets tool. 5. ————————————————- To change the style of numbering or bullets, select the last list you created and click on the downward arrow to the right of the bullet or number tool 6. You read "Microsoft Office and Figure" in category "Papers" ————————————————- Choose a style or select Define New Bullet to choose a picture/symbol. See figure 5. (Note Live Preview of bullets before selection) : Change Bullet types * Note: within the Paragraph group there is also a Multilevel list. See figure 6, which is a useful feature for creating sub level lists. Also under the font group there is a tool to remove all formatting from a document. See figure 7. : Multilevel List : Clear Formatting Borders and Shading 1. ————————————————- Ensure the Home tab is selected. 2. ————————————————- Select the last paragraph in the document beginning ECDL and ECDL Advanced and click on the downward arrow beside the Border tool (on the Paragraph group). See figure 8. 3. ————————————————- Select Outside Borders, see figure 8. Figure [ 7 ]: Border 4. ————————————————- With the paragraph still selected click on the downward arrow beside the Shading tool (next to the border tool) on the Paragraph group. 5. ————————————————- Select a shade of grey, i. e. 25% * The MiniBar/Mini Toolbar Select any line of text in the ECDL leaflet document. Notice that the mini toolbar appears. See Figure 9. At first the toolbar will be quite faint but as the cursor is moved closer to the toolbar it becomes more solid. Moving the cursor off the mini toolbar and back may cause it to disappear. Right click on the selected text and it will reappear. Note that the mini toolbar does not produce live preview results. Figure [ 8 ]: Mini Toolbar By right clicking on text such as bullets or numbering, extended shortcut options will appear (see figure 10). Figure [ 9 ]: Extended Short Cut Menu * Super Tooltips Move the cursor over the tools on the ribbon. Notice that an extended tool tip appears. For example in Figure 11 below, the mouse was hovered over the Format Painter tool. In most cases the keyboard short cut keys also appear. Figure [ 10 ]: Super Tooltip for Format Painter * Dialog Boxes and Launchers Dialog boxes can be displayed in several ways. One example is to use the launchers. These are indicated by the small arrow in the lower right hand corner of ribbon groups, see figure 12. Click on the launcher to open the dialog box. Note that not a lot of changes have been made to dialog boxes in Word 2007 see figures 13a and 13b for one example. Figure [ 11 ]: Launcher Launcher Figure [ 12 ]a: Paragraph in 2007 Figure 13b: Paragraph in 2003 The Insert Ribbon Click on the Office Button and create a new blank document. Click on the Insert tab to display the insert section of the ribbon, see figure 14. Figure [ 13 ]: Insert Ribbon From the Pages group there is the option to insert a cover page, a blank page or page break. Section breaks can now be accessed from the Page Layout tab (covered later). Note that page breaks can also be accessed from the Page Layout tab. Tables Click on the downward arrow under tables and select a three column by three row table. See figure 15. Alternatively select Insert Table to make your selection. See figure 15. Figure [ 14 ]: Insert Table Three columns by three rows Note the table tools in the ribbon with Design and Layout tabs. See figure 16 with Design tab selected and Figure 17 with Layout tab selected. Design tab Layout Table Tools Border Launcher Figure [ 15 ]: Table Tools (Design) 1. ————————————————- Click into the first cell of the table and ensure the Layout tab is selected (see figure 17) 2. ————————————————- Select the top row of the table and click on the Merge Cells button within the Merge group 3. ————————————————- Select the Design tab and from the table styles (use the arrow key to the right of the styles), select Light List Accent 2 style, i. e. move the cursor over the styles and a name box will appear. Figure [ 16 ]: Table Tools (Layout) 1. ————————————————- Select the table and with the Design tab still selected, click on the Draw Borders launcher (see figure 16) to access the full range of borders and shading options. Alternatively click the downward arrows next to the borders and shading buttons to see the full range of options (within table styles of the Design tab). 2. ———————————————— Select All borders 3. ————————————————- Select 1 point width for the b order and the colour blue. 4. ————————————————- Right click within a table cell to bring up additional options such as insert row/column, delete row/column, etc. See figure 18. 5. ————————————————- Alternatively, select the Layout tab, see figure 17 to insert rows, columns, delete table, etc. 6. ————————————————- Using figure 19 as a guide, complete the remaining cells within the table. . ————————————————- Save the document as Table Example within the WordEssentials folder and close the document. Figure [ 17 ]: Table options Courses Microsoft Office 2007 Training Courses| October| Word| Essentials| October| Excel| Essentials| October| PowerPoint| Essentials| October| Access| Essentials| November| Word| Advanced| November| Excel| Advanced| November| PowerPoint| Advanced| November| Access| Advanced| A range of other course are available in each Microsoft application Shapes and SmartArt Click on the Office button and create a new document and ensure the Insert tab is selected. The Illustrations group on the Insert tab has buttons for inserting pictures, ClipArt, Shapes and Charts, there is also an option to use SmartArt which is a new feature on the Insert ribbon. 1. ————————————————- Click on the downward arrow below shapes. A range of shapes, lines, arrows are available. See figure 18. Note the option New Drawing Canvas at the bottom of the list (this appeared automatically in Word 2003) 2. ————————————————- Select three flow chart shapes of your choice and draw them on the page, one beneath the other. Draw connecting lines from the first shape to the second and a line from the second to the third shape. Figure [ 18 ]: Shapes 1. ————————————————- With the Insert tab still selected, click on Blank Page (from the Pages group). 2. ————————————————- Click on the SmartArt control and browse through the different categories down the left hand side. See figure 21 3. ————————————————- Select Block cycle from the Cycle category and click OK. See figure 21 with block cycle selected. Note the SmartArt ribbon appears. See figure 22. Figure [ 19 ]: SmartArt Figure [ 20 ]: SmartArt Ribbon Add Shape Change Colours 4. ————————————————- Click into each area of the cycle in turn and type the tasks associated with completing the ECDL qualification. See figure 23. 5. ————————————————- Click anywhere on the page when the cycle is complete. To access the SmartArt ribbon, double click on the shape and it will reappear. 6. ————————————————- To change the colour of the cycle, click on the Change Colours control, see figure 22. 7. ———————————————— To delete a shape, selec t the shape and press delete on the keyboard. 8. ————————————————- To insert a shape, select a shape next to where you want the new shape and click on Add Shape, see figure 22 9. ————————————————- To change the layout use the arrows to the right of the Layouts group and click a layout to select. 10. ————————————————- To change the SmartArt style, click on the arrows to the right of the Styles group and click the style to select. Figure [ 21 ]: Steps to complete ECDL Note: for more advanced features of SmartArt, see Advanced courses in Word and PowerPoint. Headers and Footers 1. ————————————————- Ensure the Insert tab is selected. Click the downward arrow under Header, (within the Header Footer group) to see the full range of header styles. Click the arrow beneath Footer and Page Number to view the styles available. See figure 24. 2. ————————————————- Click on the Footer button and select Alphabet style. Type your name in the [Type Text] box. The page number will appear on the right of the footer. . ————————————————- Notice the view of the ribbon/tab has changed, i. e. a design tab for header and footer appears. See figure 25. 4. ————————————————- Click Close Header and Footer (see figure 25). Note: Another way to access headers or footers is to double click the header or footer area of the page. Figure [ 22 ]: Headers and Footers Note: When in the header or footer area the header and footer tools/controls appear, see figure 25. To return to the main document, click the Close Header and Footer button see figure 25. Figure [ 23 ]: Header and footer tools Quick Parts and Building Blocks Quick Parts and Building Blocks provide a menu of reusable document parts, for example headers, footers, cover page, tables, etc. 1. ————————————————- With the Insert tab selected, click on Quick Parts from the Text group. Any quick parts created will be displayed. In figure 26 below, a cover sheet for IT courses has been created and saved as a quick part. 2. ————————————————- Click on Building Blocks Organizer to see the full list and type. Select a building block and note the preview displayed. To use a building block, select it and click Insert Figure [ 24 ]: Quick Parts 1. ————————————————- With the Building Blocks Organizer open, click on the heading Name, to sort items by name. To sort by Gallery, Category or Template, click on the particular heading. 2. ————————————————- Select one of the building blocks and click Edit properties. The Modify Building Block box opens (see figure 27). Changes can be made, click OK Figure [ 25 ]: Modify Building Blocks 1. ———————————————— To add a document part to Quick Parts or Building Blocks, select the item (for example to create a heading with QUB l ogo): 2. ————————————————- Ensure the Insert tab is selected, click Header and select Edit Header 3. ————————————————- Click on Picture within the Insert tab and insert Logo_QUB from the folder saved to your desktop. 4. ————————————————- Click on the downward arrow next to Quick Parts and select Save selection to Quick Part Gallery (see figure 27). . ————————————————- Type a name for the Quick Part, i. e. QUBLogo, select the Header gallery from the drop down list. See figure 28 Figure [ 26 ]: Create Quick Part 1. ———â€⠀Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- Open a new blank document 2. ————————————————- Click on the arrow next to Quick Parts and select Building Blocks Organizer 3. ————————————————- Click on Name to sort by name and scroll down to QUBLogo 4. ————————————————- Click Insert The Page Layout Ribbon Click the Page Layout tab to display the page layout section of the ribbon, see figure 29. Figure [ 27 ]: Page Layout Ribbon Margins 1. ————————————————- Ensure the ECDL Leaflet document is opened. 2. ————————————————- Within the Page Setup group, click the downward arrow under Margins, to change the margins of the document 3. ————————————————- Note the range of page set up styles provided but in this case choose Custom Margins 4. ————————————————- Change the top margin to 3. cm and the bottom to 3. 00 cm (see figure 30). 5. ——â⠂¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- Note the option to change page orientation (leave as Portrait) 6. ————————————————- Click OK Figure [ 28 ]: Page Set up Indents and Spacing 1. ————————————————- Select the first paragraph of text under the heading â€Å"Is your CV missing something? † 2. ————————————————- Ensure the Page Layout tab is selected and click on the launcher button to the right of the Paragraph group (see figure 12 for launcher button) 3. ———————————————â⠂¬â€ Ensure the Indents and Spacing tab is selected and from Special select First line indent (see figure 31). 4. ————————————————- Change the line spacing to 1. 5 lines with 10 pt spacing after the paragraph (see figure 31). Click OK Figure [ 29 ]: Indents and Line Spacing As mentioned earlier section breaks can be inserted from the Page Layout tab, from within the Page Setup group, (click the arrow beside Breaks to select section breaks), see figure 29. The References Ribbon Click on the References tab to display the ribbon, see figure 32. The References tab is used for working with long documents, i. e. generating a table of contents and index, inserting footnotes and endnotes, inserting captions for tables and figures, etc. It will not be covered in this practical. Figure [ 30 ]: References Ribbon The Mailings Ribbon Click on the Mailings tab to display the ribbon, see figure 33. Tools on the Mailings tab are used to create mail merged documents, labels and envelopes. A document has been created named ExamResults containing student exam results (three topics) for seven students. Figure [ 31 ]: Mailings Ribbon 1. ————————————————- Open the document StudentResults and ensure the Mailings tab is still selected 2. ————————————————- Click on the Start Mail Merge button and select Normal Word document 3. ————————————————- Click on the downward arrow next to Select Recipients and choose Use Existing List 4. ————————————————- Browse to the WordEssentials folder and select the file ExamResults. Click Open 5. ————————————————- Position the cursor after the text Student Name and click on the downward arrow beneath Insert Merge Field 6. —————†”—————————— Select Student Title (see figure 34), leave a space and repeat, inserting Student_First_Name and Student_Surname 7. ————————————————- Position the cursor in the first blank cell of the table (beneath Module Result) 8. ————————————————- Insert fields for Introduction to Pure Maths, 9. ————————————————- Repeat point 8 above for Applied Maths and Programming (should resemble figure 35) Figure [ 32 ]: Insert Merge Field Merged Fields 10. ————————————————- Click on Finish and Merge 11. ————————————————- Click Edit Individual documents, select OK 12. ————————————————- Exam results for 7 students should be completed. The Review Ribbon Click on the Review tab to display the ribbon, see figure 36. The Tracking group is used to track changes made to a document and the Changes group is used to accept or reject changes. These will not be covered in this practical. The spell and grammar checker, thesaurus word count and translate tools can be accessed from the Proofing group of the Review tab. To spell check the ECDL leaflet, click on Spelling Grammar. As with previous versions of Word, suggestions will be given, along with the option to add to dictionary. Figure [ 33 ]: Review Ribbon Proofing group The View Ribbon Click on the View tab to display the ribbon, see figure 37. Within the Document Views group the various views with text description is displayed. Also note the views are displayed in the status bar across the bottom of the window. Figure [ 34 ]: View Ribbon Developers Ribbon To show the Developers ribbon, click on the Office Button and select Word Options. Ensure the Show Developer tab in ribbon is ticked. See figure 38. The Developers tab is not covered in this practical. Figure [ 35 ]: Show Developer Tab in Ribbon Click on the Developer tab to display the ribbon, see figure 39. Figure [ 36 ]: Developer Tab * The Status Bar The Status Bar is positioned across the bottom of the window, see figure 40. There are over 20 choices on the bar, see figure 41. To display the Customize Status Bar dialog box, right click on the Status Bar. Items with a tick beside them will appear on the Status bar. To add an item, click on it. To remove an item, click on the ticked item. Figure [ 37 ]: Status Bar Figure [ 38 ]: Status Bar Options Word Options Previously Word options were accessed from the Tools menu by selecting Options. Word Options is now accessed by clicking on the Office button and selecting Word options. The Word Options menu will then appear. See figure 42. Click on the tabs down the left hand side to access features associated with the tab. In figure 42, the Popular tab is selected showing the top options for working with Word. Figure [ 39 ]: Word Options Customize Quick Access Toolbar 1. ————————————————- With Word options still open, click on Customize 2. ————————————————- Click on the downward arrow next to Choose Commands From (see figure 43). Notice all the tabs are listed along with options to add tools not displayed on the ribbon. 3. ————————————————- Select the Insert Tab and select Convert Text to Table. See figure 43 4. ————————————————- Click the add button to add the tool to the Quick Access Toolbar 5. ————————————————- Click OK. See figure 43 Figure [ 40 ]: Add to Quick Access Toolbar File Formats Most Word files created in 2003 can still be opened in 2007. Word 2007 uses four file extensions: 1. .docx – file ending for ordinary Word 2007 documents 2. .docm – file ending for macro enabled documents 3. dotm – file ending for Word 2007 templates (does not contain macros) 4. .dotm – file ending for macro enabled templates By clicking on the Office Button and selecting Save As, you have the option to save as a Word Document (2007 version), Word Template, Word 97-2003 or select Other Formats, see figure 29. Even if the document is saved in Word 2007 format, Word 97/2003 users can still open it if they have downloaded the compatibility pack from Microsoft online. Figure [ 41 ]: File Formats Note: Word’s . doc used binary, whereas . docx uses XML. .docx creates smaller files than . doc and are less likely to become corrupt. Use SaveAs to save one type of document as another Save the Document 1. ————————————————- Click on the Office Button and select Save As 2. ————————————————- Save the document as ECDL Information (notice the file ending), see figure 45 3. ———————————————— Save it in the WordEssentials folder, see figure 45 4. ——— —————————————- Close the application Figure [ 42 ]: Save Compatibility Checker Provided Word 2000-2003 users download the free Office 2007 compatibility pack, they will be able to read and write to Word 2007 files. Occasionally users will get a message stating that certain features might be lost when converting between these different formats. Word automatically runs compatibility checks if a document is being saved in a different format from the current one. If you prefer, you can run a compatibility check at any time to find out if features would be lost in saving to another file format. To run the compatibility checker, click on the Office button and select Prepare, Run Compatibility Checker. See figure 46 Figure [ 43 ]: Run Compatibility Checker Ensure the Check compatibility when saving in Word 97-2003 formats check box is ticked. See figure 47. If the checker is turned on, whenever you use a feature in Word 2007 that is not supported in Word 97-2003 the Compatibility Checker will pop up highlighting the issue, see figure 48. Figure [ 44 ]: Compatibility Checker Security Features There are a range of different types of protection methods that can be used with Word 2007 Restricting Permission: Information Rights Management: This option allows users to access Microsoft’s service to restrict access to those who can open or make changes to a document. Click on the Office Button, select Prepare, Restrict permission and Restricted Access, see figure 48. Note you may need to download the software from Microsoft (see figure 47) and sign up to the service the first time you use it, see figure 50. Figure [ 45 ]: Restricted Access Figure [ 46 ]: Information Rights Management At this stage it is a free trial service but it is possible Microsoft might charge for the service in the future. Figure [ 47 ]: Sign Up Style Formatting, Tracked changes, comments and filling forms Restrictions * Restricts formatting to particular styles * Protection is by password * Accessed from Review ribbon, Protect Document, Restrict Formatting and Editing (see figure 51). * Make selection from Restrict formatting and Editing pane, see figure 52. Figure [ 48 ]: Formatting Restrictions Limit formatting to a selection of styles – tick box Figure [ 49 ]: Restrict Formatting and Editing Select type of editing allowed from drop down list Click Yes, Start Enforcing Protection to enter password Password to Open/modify Click the Office Button, select Save As – Tools – General Options and enter the password to either open and modify or modify only, see figure 53. Figure [ 50 ]: General Options Inspect Document To inspect a document to see if it contains personal data or comments, click the Office Button, select Prepare, Inspect Document. Click Inspect on the Document Inspector, see figure 54. Figure [ 51 ]: Inspect Document Mark as Final A document can be marked as final if it had no further modifications to be made. This option will render the document read only. Users with Word 2007 can remove the feature if necessary. Users with earlier versions of Word, even with the compatibility pack won’t even see the file as Read Only. Word Help To access Word help, click on the question mark at the right hand top of the window. Type keyboard shortcuts in the box provided and click on Search. See figure 55. Links to a range of possible solutions will be provided. See figure 55 Figure [ 52 ]: Help The Get Started Ribbon For additional help on using the Office 2007, download to your own computer the Get Started ribbon (also provided for Excel, PowerPoint). See figure 56. A range of interactive materials, videos, online training and discussion forum is provided. See figure 56. To download the Get Started Ribbon (when you return to your own computer), open a web browser and go to http://office. microsoft. com/en-us/help/HA102146851033. aspx Figure [ 53 ]: Get Started Ribbon Bibliography TitleAuthor(s)Publisher Goal Directed Project ManagementE S. Anderson et al. Kogan Page Coopers Lybrand, 1987 The Handbook of Project ManagementTrevor L YoungInstitute of Directors, 1999 Introducing Prince – The Structured Project Management MethodC. BentleyNCC Blackwell, 1992 Project Management – 5th EditionDennis LockGower, 1994 Project Management – A Managerial Approach 4th EditionJ. R. Meredith S. J. Mantel, Jr. John Wiley and Sons Inc, 2000 Project Management – A Systems Approach to Planning, Scheduling, and ControllingHarold KerznerJohn Wiley and Sons, Inc, 1998 Project Management ToolsJacques SurveyerSoftware Development Magazine, July 1997 Project Management for the 21st CenturyB. P. Lientz K. P. ReaAcademic Press, 1998 Project SkillsSam Elbeik Mark ThomasButterworth Heinemann, 2000 Step by Step – Microsoft Project 2000C. S. Chatfield T. D. JohnsonMicrosoft Corporation, 2000 How to cite Microsoft Office and Figure, Papers

Saturday, December 7, 2019

IT Risk Management Robust Economy

Question: Describe about the IT Risk Management for Robust Economy. Answer: Introduction: New South Wales is the most preferred site in the region of Asia-Pacific because it had a robust economy. NSW government is working on securing property and personal. It also focuses on risk management program. It works on providing structure to the on-going risk management Mark, 2014). The activities like documentation and record keeping are also generated with the development of risk management program. The most important step correspondent to the security purposes is the regular monitoring of the activities and evaluation. The activities which are associated with the risk management program are divided into four sections which are named as framework for security risk management, control for core security risk, control for security risk should be provided in priority areas, and control for security risk should be provided in unplanned activities (Moodley, 2011). Objective: The objectives of the government of NSW are summarized below: Confidentiality of the information: It restricts the unauthorized access and the disclosure of the information (Taylor, 2008). Integrity of the information: it helps in protecting the information for unauthorized alteration of the data and prevents it from challenges faced in providing authenticity. Availability: The authorized user of the information should be provided reliable and timely access of the information and data. Compliance: The security controls should comply with the applicable regulations, policies, legislation, and contractual obligation which are essential for the information to be lawfully available to the users (Jin, 2011). Assurance: The assurance should be provided to the government for accessing the confidential information. Diagram: Explanation of the Diagram: Identification of Hazard for Security: The nature of work should be observed Proper review should be carried out of incident reports, hazard reports, and any other relevant data. Proper review should be carried out of results of the recent security incident Proper review should be carried out of the operational reviews. Consultation should be done with staff to predict the data which they consider as the hazards (Taylor, 2008) Consultation should be done with the stakeholders to predict the external agencies data which they consider as the hazards Inspection and audits should be done of the workplace Development of the scenarios which can be predict as the consequence of the incident which is relevant to the security (Richard, 2011) Proper analysis of the breaches and the incidents Establishing of the risk factors which are associated with the information. Factors responsible for the security risk: Frequency and exposure of the hazard The potential of the loss which is associated with the risk Occurrence of the damage or loss Risk associated with the property Control strategies which are taken into consideration. Process of Risk assessment: Consultation with the staff members Experience at the workplace should be examined Reviewing of the incident Reviewing of the guiding material Security Risk Analysis: Source of the risk Action associated with it Cracker Profiling of the system Social engineering concept Intrusion in the system Accessing of the unauthorized system Computer criminals Cyber crime Act of frauds Bribery of the information Spoofing of the system Intrusion in the system Botnets Spam Activity of phishing Terrorist Penetration of the system Tampering of the system Espionage of the industries Exploitation of the economy Theft of the information Penetration of the system Social engineering Unauthorized access of the system Insiders Blackmailing Computer abuse Theft and the fraud Loss of personal information Misuse of personal information Creation of the system bugs Creation of the system intrusion The magnitude of the risk can be categorized as high, low, and medium which are summarized in the table below: Impact of the Risk Explanation High The costly loss of Assets is categorized as High Medium The risks which are associated with violating and harming operational activities are categorized as medium Low Some Loss of assets and operational activities are categorized as low The table below shows scaling of the risk: Portability of the Risk Low Medium High High (1.0) Medium 10 * (10 * 0.1) Medium 20 (20 * 0.1) High 30 * (30 * 0.1) Medium (0.5) Low 10 * (10 * 0.5) Medium 10 (20 * 0.5) Medium 15 (30 * 0.5) Low (0.1) Low 1 (10 * 0.1) Low 2 (20 * 0.1) Low 3 (30 * 0.1) Comparative Analysis of Deliberate and Accidental threats Deliberate threats are the threats which are caused to the sensitive data by unauthorized accessing of the data (Gordon, 2015). Failure of the equipment and software etc are come under the category of accidental threats. Sequential order of the threats is given below: Failure due to power Failure of errors in network infrastructure Obsolescence in technology Errors or failure in the hardware Errors or failure in the software Issues in operation Interception in communication Repudiation Espionage of the communication Attacks of Social engineering Deliberation attack of data Misusing of the system Unauthorized accessing of the resources Shortage of the staff Threats due to environment Reduction in the quality of service Misusing of the web application Incomplete policies or planning for the organization Fraud in finance Unauthorized access of information Equipment theft The difference between the concepts of Risk and Uncertainty: NSW government works on providing structure to the on-going risk management. The risk associated with the information security is amalgamation of the likelihood and the result associated with the incident (Brightwell, 2014). The risks are associated with the threats and threat can exploit the vulnerabilities of the information system. The situation which arises from imperfect and unknown information is known as uncertainty (Mahmood, 2015). It may arise due to the internal or external accidental loss of data. Evaluation of Risk Control: Economic Appraisal Management of the risk Management of the values Objective specification Identification of the option Modification of the option according to the reviewing of the risks Evaluation of the option Selection of the option For each option available: Establishment of the content of risk Identification of the risk associated with each option Assessment of the magnitude Development of the strategies Development of the option Identification and evaluation of the risk Evaluation of the option Preparation of the report Process of Risk Management: Familiarization of the proposal: Objective Definition Identification of the criteria Definition of the key elements Analysis of the risk Identification of the risk Assessment of the risk Ranking of the risk Risk associated with screen minor Planning of the response: Identification of the responses Selection of the best response Development and management of action Report Generation Management of the schedules and measures Implementation: Schedule management effect Monitoring and reviewing of the plan Security risk controls: Substitution of the hazard which can give rise to the hazard Isolation of the hazard by putting it on the risk Minimization of the risk by using the engineering process Minimization of the risk by using the administrative process Equipments should be used for personnel protection Inspection and audits should be done of the workplace Development of the scenarios which can be predict as the consequence of the incident which is relevant to the security Proper development of the hazard report, incident report, incident management report, incident investigation report, injury management report, and others. Principles: The key principles on which the policies are based are as follows: The objective is to provide services which are in the welfare of the people. The information related to the person should be securely managed so that the privacy and confidentiality of the data can be preserved Security should be provided to the critical and sensitive information The level of security should be determined for securing the information Policy for digital information security is classified as M2012-15 Awareness program should be organized for educating the people about the security to the digital information The information which is released should be comply with the current state of the legislation The controls for securing the information should be implemented to mitigate from the risk associated with the sensitive information. Eight Rules of Information Security: Least privileged rule: For example; creation of the security policies Change rule: For example; Backup of the test server Trust rule: For example; accuracy in the perception Weakest link rule: For example; Identification of the environment weakest link Separation rule: Isolation of services and data Three fold process rule: It is the combination of implementation, monitoring, and maintenance Preventative action rule: Awareness of security issues Immediate and proper response rule: Quick reaction References: Mark, S. (2014). Regulation of the legal services in the E-world (1st ed.). Retrieved from https://www.olsc.nsw.gov.au/Documents/regulation_of_legal-services_working_paper_oct2011_part1.pdf Moodley, K. (2011). Electronic Information Security Policy - NSW Health s (1st ed.). Retrieved from https://www0.health.nsw.gov.au/policies/pd/2013/pdf/PD2013_033.pdf Gordon, T. (2015). Useful Security Information for Business (1st ed.). Retrieved from https://www.secure.nsw.gov.au/what-you-can-do/useful-security-information-for-business/ Brightwell, L. (2014). NSW Electoral Commission (1st ed.). Retrieved from https://www.elections.nsw.gov.au/__data/assets/pdf_file/0007/193219/iVote-Security_Implementation_Statement-Mar2015.pdf Mahmood, F. (2015). Eight Rules of Information System Security (1st ed.). Iversion. Retrieved from https://blog.iversion.com.au/eight-rules-of-information-system-security/ Taylor, A. (2008). Information Security Management Principles (1st ed.). BCS. Retrieved from https://www.bcs.org/upload/pdf/infosec-mgt-principles.pdf Richard, M. (2011). Risk Management Guideline (1st ed.). Retrieved from https://www.treasury.nsw.gov.au/__data/assets/pdf_file/0009/5103/risk_management.pdf Jin, Z. (2011). Vulnerability Analysis Approach To Capturing Information System Safety Threats and Requirements (1st ed.). Retrieved from https://www.sersc.org/journals/IJSEIA/vol5_no4_2011/7.pdf

Friday, November 29, 2019

War And Psychology Essay Example For Students

War And Psychology Essay The experience of war places stresses on the human spirit that can scarcely beimagined in peacetime. Dilemmas that can be largely avoided in time of peacemust be faced in a time of war. Concern for ones own physical safety is oftenat odds with concern for the wellbeing of ones countrymen. The dictates ofthe mind often fight the dictates of the emotions. In such a tug of warsituation, where practical and moral factors align themselves in strange andironic patterns, it is hardly surprising that individuals respond in highlydivergent ways. In this paper, the dangers that war poses to the human psychewill be considered and an attempt will be made to account for the some of thevariability that can be seen in the way in which individuals respond to thesethreats. An examination of two books suggests that certain character traits helpinoculate people in time of war, better enabling them to withstand the assaultsof war. It also suggests that the absence of certain traits makes peoplevulnerabl e when they are placed in threatening circumstances. In examining twoliterary works: The Screwtape Letters by C.S. Lewis and The English Patient byMichael Ondaatje three character traits that were necessary in order to ensurespiritual survival were clearly shown. These traits were faith, courage, andloyalty. In the course of this paper, special attention will be given to thecharacter traits described above. The significance of their presence or absencein the personalities of a number of literary characters will be considered. InThe Screwtape Letters, Lewis portrays an anonymous English protagoniststruggling to maintain his spiritual integrity against the assaults oftemptations of Hell during World War Two. In The English Patient, Ondaatjeportrays a group of characters, brought together by their circumstances,reacting to what the author portrays as the tidal wave of war. The importance offaith, courage and loyalty enable Lewis character to spiritually survive allthe assaults of warti me. The absence of these characteristics cause Ondaatjescharacters to flounder. Faith, courage and loyalty provide a necessary frameworkfor moral thought and action, enabling the soul to survive even under theadverse conditions presented by war. C.S. Lewis deals extensively with thedangers that war poses to the human psyche. In his wartime work entitled TheScrewtape Letters, he presents an essentially hopeful view concerning theability of the soul to survive the assaults of war. He proposes that having theright perspective is the key to the souls survival. Lewis deals with a widevariety of temptations that serve to undermine the integrity of man in hisjourney through life. All of these temptations assert their power to some degreein peacetime. Yet, their power is often strengthened by the pressures of war. InThe English Patient, Michael Ondaatje presents an entirely different perspectiveconcerning the effects of war on the human psyche. Although he never spells itout, Ondaatje seems to take a fairly deterministic view. The fate of hischaracters often seems to lie beyond their control. It is almost as if hischaracters have been struck by a giant tidal wave and are helpless to resist asthey are carried away. The reader seldom gets the impression that Ondaatjescharacters have alternatives other than to think and act the way they do. Theyare presented as victims of circumstances who warrant our compassion but not ourjudgment. Each leaves the war deeply scarred in the spiritual sense. In the workof C.S. Lewis, faithfulness to God is the factor that ensures the soulssurvival. Lewis describes the danger of being overwhelmed by the stream ofimmediate sense experiences (Lewis pg.12). A mans tendency to focus on theimmediate and the personal at the expense of the universal threatens his abilityto survive in any spiritual sense. When focusing on his own inconvenience,hunger and pain, a man tends to lose sight of broader concerns, such as hisspiritual wellbeing and the co mmon good. Faith enables a man to focus on thespiritual and the eternal, to face each days trials with commitment anddetermination and to survive war with his psyche intact. Lewis grapples with theparadox of war. Lewis argues convincingly that, while some may be destroyed bywar, others may actually experience spiritual growth through adversity. Alertedto the finite nature of life and made more conscious of the needs of others, amans faith and strength may flourish in ways that he never dreamed possible. .u50874588cec140a3385170e43a3b4e0c , .u50874588cec140a3385170e43a3b4e0c .postImageUrl , .u50874588cec140a3385170e43a3b4e0c .centered-text-area { min-height: 80px; position: relative; } .u50874588cec140a3385170e43a3b4e0c , .u50874588cec140a3385170e43a3b4e0c:hover , .u50874588cec140a3385170e43a3b4e0c:visited , .u50874588cec140a3385170e43a3b4e0c:active { border:0!important; } .u50874588cec140a3385170e43a3b4e0c .clearfix:after { content: ""; display: table; clear: both; } .u50874588cec140a3385170e43a3b4e0c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u50874588cec140a3385170e43a3b4e0c:active , .u50874588cec140a3385170e43a3b4e0c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u50874588cec140a3385170e43a3b4e0c .centered-text-area { width: 100%; position: relative ; } .u50874588cec140a3385170e43a3b4e0c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u50874588cec140a3385170e43a3b4e0c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u50874588cec140a3385170e43a3b4e0c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u50874588cec140a3385170e43a3b4e0c:hover .ctaButton { background-color: #34495E!important; } .u50874588cec140a3385170e43a3b4e0c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u50874588cec140a3385170e43a3b4e0c .u50874588cec140a3385170e43a3b4e0c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u50874588cec140a3385170e43a3b4e0c:after { content: ""; display: block; clear: both; } READ: Chemistry And Atom Essay We will write a custom essay on War And Psychology specifically for you for only $16.38 $13.9/page Order now Lewis dispels the belief that a long, relatively peaceful or painless life isany guarantee of spiritual survival. He expresses fear for the souls of thosewho die in costly nursing homes amid doctors who lie, nurses who lie, friendswho liepromising life to the dying, encouraging the belief that sicknessexcuses every indulgence, and even withholding a priest lest is should betrayto the sick man his true condition. (Lewis pg. 32). During wartime, the needfor courage cannot be ignored. Lewis sees courage as not simply one of thevirtues, but the form of every virtue at the testing point, which means thepoint of highest reality. A chastity or honesty, or mercy, which yields todanger will be chaste or honest or merciful only on conditions. Pilate wasmerciful till it became risky (Lewis pg. 148). Yet, courage must be groundedin faith and resignation to Gods will. Lewis explains how worrying about thefuture and taking precautions against the dangers of war tend to underminecourage. When a man begins to obsess about all the things he can do to increasehis chances of survival, his commitment to doing his duty becomes honeycombedall through with little unconscious reservations. In a moment of terror,these reservations will assert themselves and his overriding concern will bephysical self-preservation.(Lewis p150). Only by putting his full trust in Godcan a man avoid the threats to the spirit that uncertainty brings and actcourageously under all conditions. Key characters in The English Patient eachpossess some of the traits that Lewis deems to be important: Yet each ofOndaatjes characters displays certain frailties that weaken his chances ofspiritual survival. Each of the characters is profoundly influenced by the?stream of immediate sense experiences that Lewis analyses so vividly inthe Screwtape Letters. Each allows the pain and suffering that he has witnessedto destroy any faith he had in God, country or the war effort. Caravaggio is aman who possesses tremendous courag e. In his role as a spy for the Allies, herisks death and torture on a daily basis throughout the war. After beingcaptured by the Germans and having his thumbs cut off by them, he finds his wayto a villa in Florence where Hana, a Canadian nurse and daughter of an oldfriend is caring for a burned and dying patient. There, he devotes his days toconvincing Hana and Kip, the sapper whom Hana loves, to abandon theirresponsibilities. He urges Hana to leave her dying patient even though there isno one left to care for him. Referring to the Bedoin tribesmen who rescued theburning man, he says, Those men in the desert were smarter than you. Theyassumed that he could be useful. So they saved him, but when he was no longeruseful, they left him.(Ondaatje pg. 45) Confiding to Kip, he blames the waron the rich who have to follow the rules of theircivilized world. Theydeclare war, they have honour and they cant leave. But you two. We three. Were free. How many sappers die? Why arent you dead yet? Be irresponsible. Luck runs out. (Ondaatje p.123) Caravaggio is portrayed as warm, human andvery likable. Yet, he is a man who has lost his faith, his loyalty and hisconfidence. The English Patient is portrayed as a man of great intellect. He is?the wise man who sees ?the greater picture. Yet, at critical times,he reacts in a manner that is narrow and self-serving. He has an affair with thewife of friend and colleague, a man whom he claims to love. This is portrayed asa natural response of one caught up in a tidal wave of emotion. He blames ?thewar for destroying his research, his adopted homeland, and his friendships;yet he makes no credible attempt to come to terms with the terrible events thatmade war inevitable. He collaborates with the Germans, dooming thousands in thedesert to torture and death. He rationalizes his behaviour and abdicatesresponsibility for his actions by blaming the war on international financial andmilitary interests rather than on Nazi aggression. Yet the English Patient ispor trayed as a thoroughly likable victim. Never is it suggested that he is theproduct of the choices that he himself has made. Kipp, the Sikh sapper, is a manof tremendous discipline. Charged with the unenviable task of diffusing bombs,he survives against all odds through a combination of resourcefulness and agreat ability to concentrate. He possesses many admirable qualities, traits thatshould have enabled him to withstand the assaults of war with integrity. Yet,Kip never seems to reflect upon the issue of why he is at war until the end whenhe falls apart . Kips wartime relationships with the English arecharacterised by mutual respect, acceptance and, in several instances, love. .uec4ac3ffd856191cc830018fff72610f , .uec4ac3ffd856191cc830018fff72610f .postImageUrl , .uec4ac3ffd856191cc830018fff72610f .centered-text-area { min-height: 80px; position: relative; } .uec4ac3ffd856191cc830018fff72610f , .uec4ac3ffd856191cc830018fff72610f:hover , .uec4ac3ffd856191cc830018fff72610f:visited , .uec4ac3ffd856191cc830018fff72610f:active { border:0!important; } .uec4ac3ffd856191cc830018fff72610f .clearfix:after { content: ""; display: table; clear: both; } .uec4ac3ffd856191cc830018fff72610f { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uec4ac3ffd856191cc830018fff72610f:active , .uec4ac3ffd856191cc830018fff72610f:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uec4ac3ffd856191cc830018fff72610f .centered-text-area { width: 100%; position: relative ; } .uec4ac3ffd856191cc830018fff72610f .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uec4ac3ffd856191cc830018fff72610f .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uec4ac3ffd856191cc830018fff72610f .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uec4ac3ffd856191cc830018fff72610f:hover .ctaButton { background-color: #34495E!important; } .uec4ac3ffd856191cc830018fff72610f .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uec4ac3ffd856191cc830018fff72610f .uec4ac3ffd856191cc830018fff72610f-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uec4ac3ffd856191cc830018fff72610f:after { content: ""; display: block; clear: both; } READ: My Thoughts on Marriage EssayThroughout the story, Kip is glued to his radio where he would, no doubt, haveheard of the German and Japanese atrocities that were being revealed on a dailybasis in 1945. Yet, suddenly, he is swept away with revulsion at the news of thedropping of The Bomb on Hiroshima. He literally blames the English for all ofthe evils of the world, including the dropping of the bomb. In response to anact that he sees as racist and imperialistic, he abandons his post and allloyalty to the war effort. Hana, the heroine of the novel, is, in many respects,the noblest of Ondaajes characters. After months of sustained and intensiveexposure to the pain and sufferi ng of others, she refuses to move on with theAllied troops as they travel north in their occupation of Italy. Instead, shechooses to remain with one horribly burned patient who is too ill to move. Hanas psyche is deeply damaged by the pain that she has witnessed. She istotally caught up in what Lewis would term ?the stream of immediate senseexperience. She is portrayed as half-mad, prone to mania and depression. Attimes she is completely overwhelmed with her sorrow and sense of helplessness. At other times, she rejoices as the rain drenches her through the gutted roof ofthe villa that she calls home. She seems to be lacking in religious faith andfeels nothing but scorn for the leaders of the Allied war effort. Still, sheremains loyal to a cause that goes beyond her own wellbeing. She risks death ona daily basis as she fulfils her duties in a villa that the Germans left full ofmines and booby traps. Her devotion to the English Patient and her stubbornrefusal to abandon him redeem her. They help compensate for her frailties,giving her something greater than her self to live for during the dreary springof 1945. Faith, courage, discipline and loyalty preserve the soul, though notthe body of Lewis anonymous hero. The absence of one or more of these traitsweakens the spiritual immune system of each of Ondaatjes leading EnglishPatient characters. Carvaggio faces post-war life lacking confidence and faith. Kip returns to India hating the system that he has given his heart and soul for. At best, he can see himself as a helpless pawn, a victim or a fool. At worst, hecan see himself as a willing agent of death and destruction. The EnglishPatient, presumably, dies muddled as much by his own rationalisations as by hismorphine. He clings to a love that he uses to excuse acts of personal andcollective treachery. Hana finds herself in an extremely vulnerable position asshe faces her post-war future. She has abandoned any faith that she ever had inGod, her country and her civilisation. She has placed all of her faith, trustand loyalty in the hands of her patient and her lover. This has given hersomething to live for as the war winds to an end. But when these two abandonher, she has no faith in anything but herself to fall back on. She returns toCanada, completely distrustful of human relationships. Many who have endured thehorrors of war may relate to the disillusionment portrayed by Ondaatjescharacters. Many who would never claim to possess the virtues promoted by C.S. Lewis clearly reflect them in the way in which they live their lives. These arethe wartime survivors who continue to inspire those who have never endured thehorrors of war. These are the survivors who show what it means to live a goodlife, even under the most adverse conditions. BibliographyLewis, C.S. The Screwtape Letters. Great Britain: Fontana Books, 1942Ondaatje, Michael. The Engish Patient. Toronto: Vintage Canada, 1996

Monday, November 25, 2019

Battle of Midway essays

Battle of Midway essays The turning point in the American Civil War was reached at bloody Antietam, Maryland, when Confederate forces were fought to a standstill. The Allies reached several turning points in World War II: the Battle for Britain, the Battle of the North Atlantic, and the Defense of Stalingrad. For America, her shining hour, her turning point in that wars Pacific Theater was reached at an island called Midway. Midway is located in the Pacific Ocean, about 2100 miles east of Tokyo and 1135 miles west of Hawaii. Midway is actually two islets, Sand and Eastern, with a lagoon about five miles across and is located just inside the southern reef. Sand Island is only 850 acres or so and its highest point is only thirty nine feet. Eastern is not half of what Sand is, but the Navy placed great strategic value on Midway. Since1903, a telephone cable had connected it with Honolulu, and this cable was used in the battles preliminaries, leaving the level of radio traffic normal and there by foiling any enemy listeners. (1) The Battle of Midway started on the third of June, 1942 and lasted until the sixth of June, but the actual fighting in this battle only lasted one day. However, it could be argued that the real battle began the eighteenth of April, when Army Air Corps Lieutenant Colonel Jimmy Doolittle and his forces of sixteen B-25 Mitchell bombers were launched from the deck of the USS Hornet (CV 8), 668 miles off Tokyo for what was to be the famous Raid Over Tokyo. In Washington, D.C. President Franklin D. Roosevelt told reporters that the raid originated from a place called Shangri-La, a name designed to mislead enemies. The plan worked. The Japanese figured that the Aleutians or Midway Island had to be Shangri-La because it was within the bombers range. They Japanese decided that Midway had to be destroyed. (2) Admiral Isoroku Yamamoto, commander in chief of the Combined Fleet, argued that the...

Friday, November 22, 2019

A Company That Has Had a Lawsuit in the Last 10 Years Research Paper

A Company That Has Had a Lawsuit in the Last 10 Years - Research Paper Example The paper chronologically accounts for the case how it started, got to be developed and concluded in a court of law. In the determination of the ruling, this paper has considered that basics that were used by the court of law to determine this case. In relation to this, the paper also gives accounts of the changes that has characterized the company following the law suit, the agencies charged with giving certificate of operation for drug companies as well as the recommendation to the companies in similar products based on the suit. Mylan Company is one of the world’s biggest and leading generics and pharmaceutical companies. The company’s products are available in almost over 150 countries worldwide; Germany, New Zealand, Austria, Belgium, Zech Republic, Denmark, Finland, and France are among the countries where the company operates. In its production, the company relies on contemporary production mechanisms where drugs safety and hygienic processes are observed. Throug h this, the company is producing reliable pharmaceutical products for consumers (Ceder, 2011). The company employs about 18,000 employees in all the branches all over the world. Given the company’s growth and service to the consumers, it has realized tremendous success in the industry. In this regard, it supplies most of the pharmaceutical drugs including the antiretroviral for treatment of HIV/AIDS patients (Ceder, 2011). The company was started in 1961 and became a publicly traded company in 1973 (Ceder, 2011). In 2002, the company was involved in a legal issue with the one of its client who sustained a back pain while changing the tires of the vehicle and was administered a painkiller fentanyl. Fentanyl is an addictive narcotic that affects the nervous system. After two days, the patient died and the postmortem results indicated that a lethal dose of the drug, Fentanyl was found in his blood stream, this was in 2002. The family filed a lawsuit against Mylan of manufacturin g lethal products since the physiological effects of the drugs contradicted the recommendation given in the package. The plaintiff lawyer argued that a defect in the drug and the only thing that has not been ascertained is the type of defect that was in the drug. During the period of the suit, Mylan maintained that the products were not defective and that they complied with the food and drugs administration that inspects quality of the drugs (Sobel, 2012). Discuss the legal theories used by the plaintiff to recover in this lawsuit. How the lawsuit was resolved, and why you agree with the decision in the case. The plaintiff asserted during their argument that there was defect in the drug and that is the company’s responsibility to identify such mistakes and to address any defect before releasing the drugs into the market. Specifically, they asserted that the defect was occasioned by negligence of the company workers during manufacturing. That the company has the duty of care t o its customers and should ensure that their products in the market are suitable for use by the customers (Mickey, 2004). The plaintiff accused the company of not observing professional due diligence in drug manufacturing and that this was not followed, defective drugs found their way into the market and resulted in to the death of their own. The defective in the drug was in its physiological departure where it affected the functionality of the nervous system. In the decision that was reached by the court over the case is that the company was liable for the death and they had to compensate the family appropriately for contributing into the death of the family’s bread winner. The court found that the company

Wednesday, November 20, 2019

Effectiveness of Senior Team Member and In-Depth Knowledge of the Essay

Effectiveness of Senior Team Member and In-Depth Knowledge of the Subject - Essay Example As it has been aforementioned that my role as a senior team member is very notable and important for the success of an entire team, in the same manner, the role and functions of other team members also play a crucial role in this regard. As a senior team member, I should be able to understand the potential, proficiencies, and skills of my team members so that I can effectively place them in the right order and can assign them the right duty and task which fits them the most. Furthermore, I should respect other team members and should expect the same from them. As a team, it is our foremost responsibility to understand that every individual and his role are equally important and that no one is assigned with an easy job or has been favored. Furthermore, I also need to check that all members of the team are performing their duties well and are following all the ethical and legal guidelines of prescribing, selling, and administration. It should be noted that prescribing someone is a serious and important issue. Although only authorized professionals are allowed to prescribe medicines, it is important that as a senior team member I should keep a check and balance on the procedures. A daily, weekly and monthly evaluation of the prescribing practices should be incorporated in the routine tasks as well as auditing and monitoring these practices. This will allow fewer chances of error and will ensure an effective and steady process of prescribing and other tasks. The presence of a code of ethics and conduct is made by the Ethics committee of â€Å"The British Psychological Society† (Cowden & Pullen-Sansfacon, 2014). They provide an insight to the educational, professional roles of Psychologists but they are not merely specific rules for psychologists but they are associated with certain principles that provide guidance on when to fulfill the demand of the patients and when it would be feasible to say no to them.

Monday, November 18, 2019

H.R. and line managers interaction Essay Example | Topics and Well Written Essays - 1250 words

H.R. and line managers interaction - Essay Example This suggests that the line managers should be aware of the link between the management of human resources and the strategic direction designed by the top management. However, the contribution of the line managers in playing the role of HR functions has been challenged. The middle managers or the line managers interact most frequently with the employees and hence play a vital role in any organization. The top management is busy formulating the strategies, goals and objectives and plays the role of transformational leaders (Thornhill & Saunders). Under the circumstances the line managers are expected to have the ability to inspire, motivate, direct and facilitate change by encouraging the employees to become committed to the organization. Bond and McCracken (2006) contend that the line managers should become more involved in HR functions at the operational level. A study at the NHS revealed that the middle managers did use their discretion on a number of issues which implies that the HR strategy is operationalized at the NHS. Line managers are definitely in a position to translate the HRM policies in an organization at the operational level. However, line managers may not be able to cope with the additional responsibilities given to them. They may feel stressed or may be unable to handle the HR functions (Renwick, 2003) and doubts have also been expressed whether they possess the necessary skills and knowledge (Whittaker & Marchington, 2003). This situation, according to Bond and McCracken, can arise when the line managers are not adequately trained and hence lack discretion and maturity. When a subordinate asks for leave the line managers are between positioned to ascertain how this leave would impact the work at the organization. The line manager must also have the ability to motivate the leave applicant to work extra hours in case of emergencies. This requires the use of discretion and calls for maturity on the part of the line managers. When line managers ar e not adequately trained they are not competent enough to make the right decisions and this situation may not be fair to the staff. At the same time, the line managers may be unable to embrace HR functions as they remain preoccupied with their primary responsibilities and the HR duties remain low on priority, emphasize Brandl et al (2009). Thus, the HR personnel must know the areas of priorities of the line managers before assigning responsibilities so that the right functions are delegated to them. Brandl et al also find that the line managers are keen to handle HR functions such as motivation and staff welfare but they are not keen to take on responsibilities of team building and coaching or in managing conflicts. The purpose of involving the line managers is to free the HR personnel for policy matters, to reduce costs and to enhance employee motivation. This is in view of the belief that direct interaction with the employees enhances competitiveness and production (Larsen & Brews ter, 2003). The input from the line managers is significant as it enables the HR to institute and frame the rewards policies. Moreover, certain issues may be too complex for the HR personnel to manage. Since the line managers are in direct contact it may be easier for them as it enhances the decision-making process which according to Budhwar (2000) is one of the most effective tools for employee motivation. For best results the line managers have to work in conjunction with the HR practitioners as it could lead to greater achievement of corporate

Saturday, November 16, 2019

Identifying Illogical Fallacy And Arguments Philosophy Essay

Identifying Illogical Fallacy And Arguments Philosophy Essay Have you wondered the truth behind some peoples logic when considering why they believe what they do or why they believe it is true based upon their own interpretation? In almost every aspect of life there is some underlying reason that people conform or believe in things, whether its regarded as truth or fallacy. Most people would argue that there is a higher power in terms of religion while most or others will disagree that there is no such existence because they have not seen him personally. An argument can be said to be the exchanging of opposing views by means of persuasion in asserting that a view or purpose is true or false; right or wrong. Philosophers in history have argued that there is error in reasoning in the causation of life and this is can be referred to as a fallacy. A fallacy can be an intentional act or unintentional act or line of reasoning. There are several illogical fallacies beginning with a mere assertion. Mere Assertion: An illogical fallacy based up on the belief that an argument is true because you believe in it. In other words, if you argue that the sky is black ant is something that you believe or feel strongly about, and then it is presumed true. Clearly, any other person would note that the sky is never black and is in fact blue at all time. However, in this case, it is true because you believe it. Circular Reasoning: circular reasoning is the argument that suggests that whatever the argument may be, as long as the conclusion of an argument supports the premise (justifiable claim) then it is true. In simpler terms, the reason for the argument is also the reason in the conclusion. There must be evidence to prove that what you are arguing is a valid argument. For example: Reading is an excellent practice in learning as it helps to enhance ones knowledge. It is clear that reading does assist in learning new things but reading alone does not promote being more knowledgeable but it does assist in the learning processes. Ad Hominem: Ad Hominem is an arguments reasoning associated with demeaning the opposition relevant to the argument. My 4 year old I famous for this because whenever he does something he is not supposed to do or I asked him not to do, and I get on him because of his behavior, he attempts to divert my attention away for the purpose of preventing himself for getting a spanking or yelled at. He may say things like I just love you so much or Mommy can I give you a hug. Another example is when my mother and I get into arguments about the rude ways she speaks to me; she brings up the topic of money because she wants to control my income. Because we are already in a heated argument, she includes other things in the argument that are irrelevant to her rude ways when conversing. Red Herring: A form of drawing attention away for means of confusion and irrelevant subjects within an argument. Red herring is a part of an argument where the parties intend to manipulate the argument by including irrelevant reasoning and allow the opposing party to consider the irrelevant information pulling away from the initial reason for the argument. For example: An employee is in trouble with his boss for not completely assignments timely and being rude to clients. The employee mentions other employees who mingle in the workplace and take personal calls pretending to be talking business with clients. In this situation, the employee is attempting to influence his boss to consider the quality of others work in order to reduce the tension between the boss and himself. Pseudo Questions: Pseudo questions can be defined as rhetorical questions which mean that they cannot be answered. Pseudo question can be simple question that are hard to answer because the person who supposed to answer has no knowledge of the topic. A question by Billy Corgon asks If practice makes perfect and no one is perfect, then why practice? Or George Corlin asks Why do doctors call the work a practice? Isnt what they learned a skill? False Cause: False cause is a fallacy that suggests that something is the result of something else. This fallacy is similar to determinism where every event has a cause. An example of false cause: Tyler Perry became famous, a great writer and actor because he gained experience from living on the streets and being homeless. If this were true, then all homeless people would become actors because they lived on the street thus gaining experience. Sweeping generalizations: The fallacy that says if one assumes that all incidents of reason are applied to every situation. Furthermore, sweeping generalizations accepts the sense that there are no exceptions to generalization. For example: People who dont eat pork are Muslims. You are a Muslim because you dont eat pork. In this case, not eating pork can be for religious purposes but also can apply to the fact that the person is a vegetarian thus invalidating the argument because there is an exception to this argument. Slippery Slope: Suggests that a cause of events will continuously occur because one thing causes another. In other words, by chance one thing will finally lead to the last. Consider the slippery slope fallacy in this situation. Not wearing a coat in the winter will cause you to catch a cold eventually. How does this occur? Well first you get the sniffles and maybe allergy like symptoms (i.e. stuffy nose, clogged ears, runny eyes) following maybe changes in your body temperature then eventually you will cough which signifies that you have caught a cold. Any human knows that if you act carelessly in the winter, you will be subjected to catching a cold and being sick. Being sick is not fun right? Equivocation or Changing Means: Altering the meaning of a word in the course of an argument. Christmas celebrates the birth of Jesus Christ and is a time of happiness therefore the birth of Jesus Christ must too be full of happiness. This example signals that both implications of the argument produces happiness (i.e. Christmas and the birth of Jesus Christ); Jesus himself being full of happiness because his birth was full of happiness.

Wednesday, November 13, 2019

Comparing Villains and Victims from The Speckled Band, Twisted Lip and

Comparing Villains and Victims from The Speckled Band, Twisted Lip and The Cardboard Box The three villains which I am going to compare / contrast are Dr Roylott from The Speckled Band, Mr Neville St Claire from The Man With The Twisted Lip and Sarah Cushing from The Cardboard Box. The three victims I am going to compare / contrast are Helen Stoner from The Speckled Band, Mrs St Claire from The Man With The Twisted Lip and Susan Cushing from The Cardboard box. Dr Roylott is a stereotype villain. He is feared by his neighbours and is very violent and threatening. He is described as being "a man of immense strength, and absolutely uncontrollable anger". I can say this because "he beat his native butler to death." He even abuses Helen physically "and covered over her injured wrist." This is when Holmes observes her. Helen finally falls in love with Percy Armitage who asks for her hand in marriage but Dr Roylott "offers no position to the match." This shows his selfish personality, he only cares for himself and not his stepdaughter's happiness. He hangs about with criminal gypsies but he is in fact worse than the gypsies. "He has a baboon and cheetah which wonder freely over his grounds" This shows his weird, strange hard character. He is also quite a bully because Helen says, "for a long time we did all the work of the house" They had to do this because all the servants were afraid of being employed by him "No servants would stay with us". He is such an evil character because he even kills his stepdaughter Julia just so he gets to keep her money and he also intended on killing his other stepdaughter Helen. The villain from The Man With The Twisted Lip, Mr Neville St Claire is a different type of... ...y are victims; they have most characteristics in common for example Helen is made to be a lonely person and so is Susan Cushing because Susan looses her sister who was described as being "an angel" and is left with the sister who she does not get along with, Sarah "a devil". Mrs Neville St Claire is also made to appear as if she is lonely because her husband goes and does not come back for a whole week "What a week she must have spent" this also shows that she could have been suffering. Helen and Mrs Neville St Claire end up having everything work out the best because Helen goes and gets married and claims the will her mother left her and Mrs Neville St Claire gets her husband back but Susan is just stuck as being a retired old lady with an evil sister, She does not have anything better going for her. This makes me feel moderately sympathetic towards her.

Monday, November 11, 2019

Money Transfer in Ghana Case Study

The introduction of mobile money service is taking place in isolation but in parallel with the advent and expansion of other financial electronic payments services. One of these is E-Zwich, an electronic platform that enables the loading and spending of electronic cash and also allows the settlement of inter-bank claims in addition to online transactions. Others are being made available over the Internet and through SMS-text messages. The government regards these services as banking. They are strictly regulated and licensed by the Central Bank- Bank of Ghana under its branchless banking policy. Both MTN and ZAIN SIM cards are enabled to utilize the service but each new subscriber needs to register for the service at before it is activated. Upon activation, the user is provided with a secure electronic â€Å"wallet† where funds can be disbursed or uploaded. The users can either exchange electronic money for physical cash (cash out) at shops, partner banks and accredited agents or make use of it in making purchases or transfers. Enabling a Cash Flow to Rural Areas In general, the most popular mobile money service is money transfer. The trend is for users in urban areas to transfer funds to recipients in rural areas. Traditionally in Ghana, city dwellers often send money to members of their extended family living in rural areas. Other typical services include the purchase of mobile phone airtime, goods and services through electronic transfer of money from user's wallet to the merchant's account. Commenting on money transfer via mobile phones, Carl NiikoiAshie, an mcommerce (mobile commerce) specialist at Zain who works on ZAP, said: â€Å"The customers can ‘cash in' by loading money onto their ZAP wallet, then send the money to someone else on their phone in a simple process. The person receiving the money can ‘cash out' by going to any of our outlets and exchanging the evalue for physical cash. We're seeing tremendous growth in the service across the country, with more cash-in done in the major cities while cash-outs are seen predominantly in the smaller towns. † Ashie sees a lot of evidence that his product is reaching Ghana's unbanked. â€Å"Users do not need to have a bank account to use the service. Currently, there are a lot of monetary transactions that take place outside the confines of the banks and it will take a product like ZAP to fill the void while providing a secure, convenient and trustworthy channel of transaction,† said Ashie. â€Å"Some customers have also requested products that will allow them to use their ZAP wallets for savings and hence enjoy interest on their savings, just as pertains in the traditional bank setting. † Today, consumers have a variety of ways to send and receive funds or money transfers. Although using cash to send a money transfer is the most popular method for most people, more and more people want additional options: to send and/or receive funds on the internet, over the phone, and now, on their mobile phones. Mobile money transfer is simply another way to send money. It is a transfer of money to a receiver in which the funds are deposited into a mobile or â€Å"virtual† wallet. As the number of mobile phone subscribers in Ghana increases, so does the market for mobile money services. The majority of Ghanaians lack any formal bank account. mobile money could change the shape of financial transactions in the country. An estimated 80 percent of Ghanaians are â€Å"unbanked† – meaning they conduct their transactions outside the banking sector with no access to financial services. Products like â€Å"mobile money,† that enable safe and secure money transfers without the use of a bank account, could have a major impact on this unserved segment of the population. Mobile money gives anyone with a mobile phone the ability to transfer money, make cash payments and conduct other financial transactions over the phone. Mobile money is a relatively new phenomenon in Ghana. It was first introduced by the telecom company MTN some years ago. MTN Mobile Money operates in partnership with nine banks. Currently, more than 2 million Ghanaians are registered as active users. MTN expects this number to grow as a result of the resources they have committed to educating subscribers about switching from the traditional mode of cash payments to electronic payments. Earlier this year, Zain became the second mobile operator to provide mobile money services through the introduction of ZAP, working with three banks. The coverage and accessibility that mobile services provide is of increasing interest to the financial services sector. Countries are considering mobile technology to reduce the cost of delivering financial services to clients beyond the reach of traditional financial services. ECONOMIC BENEFITS Mobile money transfer has some socio-economic benefits in Ghana, some these are Firstly Improved Financial Access, consider a situation whereby a given business has to carry out a common payment operation, such as bill payment or funds transfer, and that operation demands transportation with all inconveniences attached to it. If the same transportation cost were paid to a service that would effect the same payment on behalf of the company over the mobile phone instead, this more convenient method brings about saving time and energy for other activities, in so doing increasing productivity by performing two tasks instead of one at the end of the day. It appears, therefore, that using your mobile phone to make payments represents to a very large extent convenience taken to another level. By exploiting the extensive reach of mobile networks, the mobile industry has the opportunity to complement and extend remittance channels, make transferring money significantly more convenient and also bring many people into the formal banking system. With more than 15,000,000 mobile phone subscribers in Ghana, the potential market for these new services is significant. Mobile money presents certain advantages for Ghanaians without access to banks. Penetration of mobile services across the world is increasing rapidly. In 1990 there were just over 11m mobile phone users worldwide. Today, over 3 billion consumers own mobile phones. At the same time, the possibility to technically integrate mobile and financial services is becoming increasingly apparent. A recent survey conducted by Edgar Dunn & Company and the GSM Association (GSMA) predicts that, given an improved regulatory environment, in 2012 7% of the subscriber base in developed countries and 4% in developing countries will initiate at least one cross-border remittance. This equates to just over 248 million consumers in 2012 using mobile money transfer services. Financial access for the poor is still an issue in many developing countries. There are currently approximately only 0. 5 million bank branches globally with only 1. 4 million ATM's compared to over 3 billion mobile customers worldwide. The mobile device has the potential to extend access to financial services for the banked, but also for the under-served and unbanked parts of the population. This improved, financial access can be achieved by exploiting the extensive reach of mobile networks. Traditional remittance channels can be complemented and extended with mobile money transfer services. Thus making mobile money transfers significantly more convenient, bringing many remittances from informal channels into the formal system. Secondly it reduces the transaction cost of money transfers. Bank transfers and specialist remittance companies can be prohibitively expensive for small denomination transfers, limiting the ability of individual workers to distribute funds to a larger number of people and penalizing those sending small amounts. Retail premises and staff costs increase overheads, leading to high commissions, especially for remittances below ghc100. It drastically cuts down the cost of providing service to customers. A study carried out proved that there is a substantial cut in customer care cost. This results from the fact that mobile money transfer eliminates the need for costly call centers and frees up customer service help desk. In addition real-time information is provided to customers and employees. Using a mobile platform such as SMS fro simple task as payment reminders and funds transfer can reduce the burden on IT and personal resources. This has also been found to reduce cost and errors associated with paper-base operations. Significant reduction in operational costs means additional revenues can be invested in other areas of the business. Mobile technology can lower the cost of remittances as it removes the need for physical points of presence and ensures a timely and secure method of transaction. This concept of ‘mobile money' is extremely attractive to low income users in particular Mobile money transfer services can make remittances more affordable. Mobile technology lowers the cost of remittances as it removes the need for physical points of presence by banks and ensures a timely and secure method of transaction. This concept of ‘mobile money' is extremely attractive to low income users in particular. It reduces the transaction costs of financial services for the poor, especially those in rural areas where financial services seldom exist. Mobile money saves the cost of travel and time spent visiting the nearest town to access financial services. As noted in AudienceScapes research, mobile money provides people with a way to transfer money safely and keep (or even increase) their savings. From the customers’ perspective, mobile banking is relatively easy to use, and this is another advantage compared to traditional means of banking as well as electronic banking, given the fact that text messaging has become a common application of mobile phones. Thirdly mobile money transfers drive growth and development. Mobile money has the potential to create jobs directly through hiring in the mobile phone companies, partner banks and the more than 4,000 merchants involved in Ghana's mobile money system. Key partners in the provision of mobile money services include commercial banks, mobile phone operator's shops, distributor shops and accredited agents. Jobs may be created indirectly as mobile money contributes to growth in Ghana's business and trade. If deployed successfully, mobile money could help individuals harness funds outside the banking system and channel them into the formal financial sector, thus making it easier to gather funds for investments. Not surprisingly, the general manager of Mobile Money-MTN, Bruno Akpaka, sees many benefits for Ghana as it continues adopting this service. Akpaka believes mobile money will â€Å"help trade activities within the country and foster strong business partnerships. † â€Å"The creation of wide merchant footprints in places where traditional banks cannot go also contributes to bringing people into this new model of financial transactions,† said Akpaka. â€Å"MTN Mobile Money is bridging this existing huge gap between the unbanked and the financial sector. † Mobile-financial convergence creates socio-economic benefits. It is widely accepted, that increased access to mobile telephony in developing countries brings considerable benefits to the economies of the respective countries. It is estimated that an extra 10 mobile phones per 100 people in a typical developing country lead to an extra 0. 89 – 1. 210 percentage points of growth in GDP per person. In addition, remittances are an important engine for growth and development in developing countries. The World Bank estimates that reducing remittance commission charges by 2-5% could increase the flow of formal remittances by 50-70%, boosting local economies. Reducing the cost of sending each individual remittance would encourage the delivery of lower value remittances, at smaller values than today's average transfer of ghc200. Financial regulators have the opportunity to use the development of mobilefinancial convergence to achieve their aims: ? ? ? ? New services offered to consumers, i. e. mobile money transfer services (innovation) Cheaper prices through more efficient use of the mobile infrastructure (competition) Across all consumer groups (banked, under-banked, unbanked) Transition remittances from informal to formal remittance channels (more visibility of money flows) Both the mobile and the financial industry benefit from this opportunity to cooperate in new ways providing innovative services to an increased customer base. The challenges facing the market. Access Access to the facilities to receive money is often limited, particularly for the poorest people in more rural areas where the banking sector is under represented and a largely cash-based economy exists. There are currently approximately only 0. 5 million bank branches globally with only 1. 4 million ATM's compared to almost 2 billion mobile customers worldwide. Those who would benefit the most are therefore the least likely to benefit from remittances from migrant workers, locked out of their market through their social, economic and geographical position. Cost Bank transfers and specialist remittance companies are prohibitively expensive for small denomination transfers, limiting the ability of individual workers to distribute funds to a larger number of people and penalising the poor who can only afford to send small amounts. Retail premises and staff costs increase overheads, leading to a high fixed commission cost per remittance with industry revenues estimated at an average 15% per transaction, increasing to over 25% for remittances below ghc100. Handset operability There are a large number of different mobile phone devices and it is a big challenge for banks to offer mobile banking solution on any type of device. Some of these devices support Java ME and others support SIM Application Toolkit, a WAP browser, or only SMS. Initial interoperability issues however have been localized, with countries like Ghana using portals like R-World to enable the limitations of low end java based phones, while focus on areas such as South Africa have defaulted to the USSD as a basis of communication achievable with any phone. The desire for interoperability is largely dependent on the banks themselves, where installed applications (Java based or native) provide better security, are easier to use and allow development of more complex capabilities similar to those of internet banking while SMS can provide the basics but becomes difficult to operate with more complex transactions. There is a myth that there is a challenge of interoperability between mobile banking applications due to perceived lack of common technology standards for mobile banking. In practice it is too early in the service lifecycle for interoperability to be addressed within an individual country, as very few countries have more than one mobile banking service provider. In practice, banking interfaces are well defined and money movements between banks follow the IS0-8583 standard. As mobile banking matures, money movements between service providers will naturally adopt the same standards as in the banking world. Security Security of financial transactions, being executed from some remote location and transmission of financial information over the air, are the most complicated challenges that need to be addressed jointly by mobile application developers, wireless network service providers and the banks' IT departments. The following aspects need to be addressed to offer a secure infrastructure for financial transaction over wireless network: 1. Physical part of the hand-held device. If the bank is offering smart-card based security, the physical security of the device is more important. 2. Security of any thick-client application running on the device. In case the device is stolen, the hacker should require at least an ID/Password to access the application. 3. Authentication of the device with service provider before initiating a transaction. This would ensure that unauthorized devices are not connected to perform financial transactions. 4. User ID / Password authenticationof bank’s customer. 5. Encryptionof the data being transmitted over the air. 6. Encryption of the data that will be stored in device for later / off-line analysis by the customer. One-time password(OTPs) are the latest tool used by financial and banking service providers in the fight againstcyber fraud . Instead of relying on traditional memorized passwords, OTPs are requested by consumers each time they want to perform transactions using the online or mobile banking interface. When the request is received the password is sent to the consumer’s phone via SMS. The password is expired once it has been used or once its scheduled life-cycle has expired. Because of the concerns made explicit above, it is extremely important that SMS gateway providers can provide a decent quality of service for banks and financial institutions in regards to SMS services. Therefore, the provision of service level agreements (SLAs) is a requirement for this industry; it is necessary to give the bank customer delivery guarantees of all messages, as well as measurements on he speed of delivery, throughput, etc. SLAs give the service parameters in which a messaging solution is guaranteed to perform. Scalability & Reliability Another challenge for the CIOs and CTOs of the banks is to scale-up the mobile banking infrastructure to handle exponential growth of the customer base. With mobile banking, the customer may be sitting in any part of the world (true anytime, anywhere banking) and hence banks need to ensure that the systems are up and running in a true 24 x 7 fas hion. As customers will find mobile banking more and more useful, their expectations from the solution will increase. Banks unable to meet the performance and reliability expectations may lose customer confidence. There are systems such as Mobile Transaction Platform which allow quick and secure mobile enabling of various banking services. Recently in India there has been a phenomenal growth in the use of Mobile Banking applications, with leading banks adopting Mobile Transaction Platform and the Central Bank publishing guidelines for mobile banking operations. Application distribution Due to the nature of the connectivity between bank and its customers, it would be impractical to expect customers to regularly visit banks or connect to a web site for regular upgrade of their mobile banking application. It will be expected that the mobile application itself check the upgrades and updates and download necessary patches (so called â€Å"Over The Air† updates). However, there could be many issues to implement this approach such as upgrade / synchronization of other dependent components. Conclusion. For customers and businesses in the country, it is a unique platform to bring convenience in financial transactions to customers, an area which before this period had been beyond our domain and reach for those of us in Ghana and most of Africa. For the customer, its time and cost saving elements cannot be over emphasized and the earlier we adopt electronic ways of financial transactions, the better it will be for a whole society that would see a transformation, resulting from the ability to cut down on time lost accessing basic services like funds transfer amongst businesses and individuals.