Monday, September 30, 2019

Nabokov- Good Reader and Writer Essay

A good reader will ask themselves questions as they read along, using sticky notes for that section. This technique allows the readers to come back to the questions and answer them after reader more of the novel or essay. Also, a good reader uses hints the author hides through the passage for the reader to interpret. This lets readers figure out what message the author wants the reader to know. Good readers are active readers which means they use their reading experiences for support by bring knowledge from the world into reading. In addition, they use comprehension strategies to draw conclusions, synthesis and compare and contrast. Further, a good reader knows when to slow down and read faster based on difficulty. When a good reader doesn’t understand a word he/she use context clues to figure out the meaning of it. Lastly, a good reader should have an open mind based on his/her reading. A good writer uses proper punctuation at all times. Grammar and spelling are important as well. Also, a writer should have a lot of knowledge based on what he/she is writing about. This means that the writer should create a plan before writing about. This means that the writer will research ones topic before writing about it. In addition, a good writer should create a plan before writing to have a formal paper. To tell the truth, if a writer doesn’t truly believe in what one is writing about then that’s not a writer at all. A good writer would not care about what others think of ones opinion. Finally, a good writer grabs the reader’s attention from the beginning of the story. Lastly, a good writer writes novels with enough detail to let the reader understand, but not too much so the reader has to interpret the story you are writing about.

Sunday, September 29, 2019

Essy and Nd

An essay is generally a short piece of writing written from an author's personal point of view, but the definition is vague, overlapping with those of an article, a pamphlet and a short story. Essays can consist of a number of elements, including: literary criticism, political manifestos, learned arguments, observations of daily life, recollections, and reflections of the author.Almost all modern essays are written in prose, but works in verse have been dubbed essays (e. . Alexander Pope's An Essay on Criticism and An Essay on Man). While brevity usually defines an essay, voluminous works like John Locke's An Essay Concerning Human Understanding and Thomas Malthus's An Essay on the Principle of Population are counterexamples. In some countries (e. g. , the United States and Canada), essays have become a major part ot tormal education.Secondary students are taught structured essay tormats to improve their writing skills, and admission essays are often used by universities in electing applicants and, in the humanities and social sciences, as a way of assessing the performance of students during final exams. The concept of an â€Å"essay† has been extended to other mediums beyond writing. A film essay is a movie that often incorporates documentary film making styles and which focuses more on the evolution of a theme or an idea. A photographic essay is an attempt to cover a topic with a linked series of photographs; it may or may not have an accompanying text or caption

Saturday, September 28, 2019

Lee Kuan Yew Essay

1. Historical Background of the Leader Lee Kuan Yew was born a British subject in at Kampong Java Road Singapore on September 16, 1923. He was born to Lee Chin Koon, an English-educated and a British subject, and Chua Jim Neo. He had three brothers and a sister namely, Dennis Lee, who was able to put up a law firm with Lee Kuan Yew called Lee & Lee, Freddy Lee, a stockbroker, Lee Suan Yew, who read medicine at the University of Cambridge, and Monica Lee. Lee Kuan Yew got married to Kwa Geok Choo on September 30, 1950. They had two sons, Lee Hsien Loong, who became a Prime Minister in Singapore, and Lee Hsien Yang, who was a former President and Chief Executive Officer of SingTel. They also had a daughter named Lee Wei Ling, who runs the National Neuroscience Institute. He first studied at Telok Kurau Primary School, which he perceived as a school whose primary students were poor and not as bright and advantaged. He moved to Raffles Institution, where he was challenged because he was surrounded with the top 150 students in Singapore. Despite this, he still strived to get into the top of his class. On his junior year, he studied in Cambridge where he was able to receive scholarships and top position for the School Certificate examinations. Lee also received a scholarship for Raffles College (National University of Singapore) where he obtained the top student position for both Singapore and Malaya. When the Japanese arrived in Singapore, Lee’s university education was delayed. He used this time to learn Japanese and work as a clerk in a textile importing company. He also put up his own business where he manufactured stationery glue. When the war finished, Lee continued his studies in London School of Economics and afterwards moved to University of Cambridge. Here, he took up law at Fitzwilliam College and graduated with a double First Class Honors, an award that is rarely received. After taking up his graduate degree, he returned to Singapore to work as a lawyer. He was offered a job in John Laycock’s law firm, which he served as a legal advisor to the trade and students’ union. He also worked as an  election agent for the company, and this is where he encountered politics. Eventually, he was able to work is way to the top and he became the first Prime Minister of Singapore on June 3, 1959. During his term, he was able to make third world country, Singapore, to a first world country.1 2. Application of Edwin Locke’s Framework 3. Leadership Styles Covey’s Transformational vs. Transactional Lee Kuan Yew was more of a transformational leader. He involved changing the organization and its members for the better. He motivated his subordinates to work for â€Å"higher level† goals that allegedly transcend their personal interests. He shaped and drove Singapore’s development, catapulting the city-state from a Third World backwater, to the front ranks of the First World. An example for this would be when he wanted to lower down the unemployment rate. He decided that change was necessary and they specifically needed to get manufacturing sectors put up in Singapore then sent back to America. This resulted to them running and exporting within months, which solved their unemployment problem. Another example would be the time when he inspired the polyglot population to become the intellectual and technical center of the region. This resulted then to becoming a major player in the international economic market. Lee Kuan Yew was able to transform Singapore drastically by appealing to his followers’ values and sense of higher purpose to execute his vision for a new and improved Singapore. He was also able to align his vision accordingly with his followers, which can be seen in a testimony saying that Lee has created a tiny island of three million who constantly strive to improve. Schmidt and Tannebaum’s Continuum Lee Kuan Yew’s style is nearing the Laissez Faire leadership. He shares decision-making with group members specifically cabinet and party members, experts, the people of Singapore and many others and works with them side by side (Dubrin et al., 2006).8 He cannot be depicted wholly as a Laissez Faire  leader due to the fact that although he considers other peoples’ opinions, but since he is a Prime Minister, he has to make the final decisions. Lee Kuan Yew also allows his people to take a vote on certain issues and make them decide the outcome. An example for this would be him holding a referendum on merger with Malaysia. Blake and Mouton There are people who believe that Lee Kuan Yew is a participative leader (Dubrin et al, 2006, 75) since when he makes deicisions, he does so with a group of members and he works with them side by side. In this case, Lee’s group included his cabinet and party members, the experts he consulted with, the people of Singapore and many others. It is hard to pin point a specific subtype of participative leadership and he displays all three: Consultative, Consensus and Democratic. As Prime Minister it is important to consider other people’s opinions but often he has the power of making the final decision. This is called consultative leadership. A consensus leader will aim to have all members agree on an issue although in Lee’s case, it is virtually impossible as there are so many people involved when making decisions on behalf of the nation. A democratic leader is one who takes a vote on an issue to decide the outcome. The best example of that in Lee’s case is holding a referendum.10 His high concern for people is also seen in the riot between Malaysia and Singapore. The riot ended with twenty-three fatalities and hundreds injured so Lee appealed to the public to end the riot and severed ties with Malaysia (Wikipedia, 2007, n.p). This demonstrated his â€Å"utilitarianism† approach to decision making. He believed that the merger with Malaysia was crucial for Singapore’s survival but he saw that his people were displeased and that the situation could result in more bloodshed so he decided that ending the Federation would be the most beneficial decision. Situational Leadership and David Coleman’s Situations Lee Kuan Yew is definitely has a coercive leadership style. Despite the fact that Singapore was in a crisis, he was able to deal with a very difficult task and that is to transform a developing nation into one of the world’s most developed countries. Through industrialization, Singapore was able to  work her way up to the top. Lee Kuan Yew could also be considered as having affiliation as his leadership style since he was able to devise a plan with the Malayan Prime Minister, Tunku Abdul Rahman to merge the countries of Malaysia, Brunei and Singapore together to form a Federation in order to end British Colonial Rule, despite the fact that this union was short-lived. 4. Special Qualities Bennis’ Attributes Lee Kuan Yew possessed a guided vision. An example for this would be his vision of greening the city in Singapore. Due to his determination he has transformed Singapore to one of the greenest cities of the world.13 Lee Kuan Yew also possessed passion. According to the former Malaysian Finance Minister Daim Zainuddin. He remains, as always, passionate about Singapore, its citizens, its future and its relationship with its neighbors. That passion has driven him to make Singapore vibrant and relevant, and towards this he is committed to shaping the minds of young Singaporeans. This latest book illuminates his thinking that is bound to raise discussions about the future of Singapore. Covey’s Seven Habits Lee Kuan Yew was also believed to have made proactive movements under his governance. Himself a lawyer, Mr. Lee Kuan Yew knows the importance of effective law enforcement and rigorous administrative system. Under his leadership, the Government has been proactive in developing high standards of public health and a quality environment with clean air, clean land, clean water and also a control on noise pollution. Aside from this, Lee Kuan Yew set his priorities straight. He aimed for Singapore’s economic and social development, which he made sure that the government delivered, even if it meant tough laws such as the Land Acquisition Act. He also prioritized nationhood and unity. He provided a  quality living environment, regardless of status, coupled with universal home ownership. He believed this will contribute to the sense of equality in the society. He even said in a speech â€Å"You can’t have this sense without giving all Singaporeans a clean and green Singapore. Today, whether you are in a flat, executive condominium or landed property, it’s clean. You don’t live equally, but you are not excluded from the public spaces for everybody.† Greenleaf’s Servant Leadership Lee Kuan Yew was a prime minister and a public servant. He places service before self-interest (Dubrin et al, 2006, 69). He is concerned with developing his people’s welfare and socioeconomic status, which included creating a better health and education standards. Lee is also believed to â€Å"listen first to express confidence in others,† another attribute of a servant leader. He pays attention for his to be able to acquire insights to concerns and problems in order to decide what action he has to take to resolve these issues. As a politician in a democratic society, this is crucial because if Lee ignored the needs of his country he would have be overturned and lost power. A servant leader must also be able to â€Å"inspire trust by being trustworthy.† Lee built a foundation of trust early in his political career. He was able to relate to his voters by describing his political party, People’s Action Party as, â€Å"beer-swilling bourgeois.† (Wikipedia, 2007, n.p) More importantly, he consistently delivered on his policies. An example for this would be when he was recognising Singapore’s housing problem and solving it. There was a shortage of housing so he organised housing to be built on government owned land and currently, 90% of Singaporeans own their own home as cited by Elegant, Elliot and Smith. (2005, p.38). Lee Kuan Yew is also considered a servant leader since he focuses on what is feasible to accomplish† and concentrates on the most important issues which means some will be neglected. As Prime Minister, he was responsible for an entire country with a population of over four million so naturally, some issues would be overlooked but he ensured that his people’s interests were placed first and his three main concerns were national security, the economy a nd social issues. 5. Conclusions and Implications for Organizational Effectiveness Lee Kuan Yew is considered one of the most successful and exceptional leaders of our time. He is able to communicate with people and identify with their goals and aspirations. He is also trustworthy and this could be demonstrated in his track record of good judgment. Smedinghoff (2004, p.9) believes Lee displays excellent character and this is shown through his integrity. He states that, â€Å"Lee Kuan Yew’s insistence on replicating his integrity was recognized when the Institute for National Development voted Singapore the least corrupt country in Asia, and the seventh least corrupt worldwide.† His accomplishment and forty year reign in Singapore’s political scene speaks for himself. It is evident that he is highly regarded by many. Lee is testimony to show what hard work, perseverance and discipline can achieve. Lee Kuan Yew has achieved what many world leaders dream of and accomplished this without violence. He is an example of an exemplary leader. Reference: AsiaOne. â€Å"Lee Kuan Yew: Hard Truths to Keep Singapore Going.† AsiaOne. N.p., 9 Sept. 2011. Web. 25 Nov. 2013. Chan, Robin. â€Å"Lee Kuan Yew: Rare Leader Who Lived by His Convictions.†Singapolitics. N.p., 16 Sept. 2013. Web. 21 Nov. 2013. Drysdale, J. G. S. (1984). Singapore: Struggle for Success.Singapore: Times Books International, p. 301. (Call No.: RSING 959.57 DRY) Edinger, Lewis. â€Å"The Comparative Analysis of Political Leadership.† Comparative Politics 7.2 (January 1975): 253-69 Family (Lee, Lee Kuan Yew (2000). From Third World to First. Singapore: Marshall Cavendish.) Keng-Lian, Koh. â€Å"Singapore: Vision of Former Prime Minister Lee Kuan Yew of the Garden City.† ESCAP Virtual Conference. Han Fook Kwang, Warren Fernandez and Sumiko Tan, n.d. Web. 21 Nov. 2013. Kissinger, Henry. â€Å"Lee Kuan Yew.† Time 100. Time, 29 Apr. 2010. Web. 21 Nov. 2013. â€Å"Leadership Analysis – Lee Kuan Yew.† A Student’s Guide to Leadership. N.p., n.d. Web. 25 Nov. 2013. â€Å"Lee Kuan Yew Interview Transcript.† Interview by Lorraine Hahn. Singapore Window. N.p., 14 May 2002. Web. 21 Nov. 2013. Singapolitics. â€Å"Top Leaders Recall LKY’s Leadership Style.† AsiaOne. N.p., 16 Sept. 2013. Web. 21 Nov. 2013. â€Å"The Planning of a City-State.† Proc. of Remarks by Mr Peter Ho, Chairman of the Urban Redevelopment Authority at the Lee Kuan Yew and the Physical Transformation of Singapore Public Conference. N.p., 18 Sept. 2013. Web. 21 Nov. 2013.

Friday, September 27, 2019

Should DDT Be Used to Control Malaria Essay Example | Topics and Well Written Essays - 750 words

Should DDT Be Used to Control Malaria - Essay Example falciparum), Plasmodium malariae (P. malariae), Plasmodium ovale (P. ovale) and Plasmodium vivax (P. vivax). due to P. falciparum which is the only species associated with severe morbidity and mortality (Guidelines, South Africa). The other three species cause milder illness. Infections with P. ovale and P. vivax have a tendency to relapse if timely appropriate treatment is not provided (CDC, U.S). The life cycle of the malaria parasite involves two hosts- the mosquito and the human. When a female anopheles infected mosquito bites a human for blood meal, it inoculates sporozoites into the human host. These sporozoites infect liver cells1, multiply and mature into schizonts, which rupture and release a number of merozoites into the blood stream where they infect red cells and cause symptoms of the disease like fever, chills, tiredness and muscular pain. In P. vivax and P. ovale malaria infections, a dormant stage can persist in the liver of the human in the form of hypnozoites. These can later invade blood stream, weeks, or even years later, and cause relapse. In the red cells2, the parasites undergo asexual multiplication. Initially, the merozoites turn in to ring stage trophozoites which mature into schizonts. These rupture to release merozoites. Some parasites differentiate into gametocytes (sexual erythrocytic stages) which in turn produce the male (microgametocytes) and fe male (macrogametocytes) gametocytes. These are ingested by a female anopheles mosquito during a blood meal and they multiply in the mosquito releasing sporozoites which settle in the salivary glands and enter the human host during biting. The multiplication in the mosquito is known as the sporogonic cycle. Thus the mosquito carries the disease from one human to another, acting as a "vector" (Guidelines, South Africa). Of the 430 known species of anopheles mosquito, only 30 to

Thursday, September 26, 2019

Self-Assessment Essay Example | Topics and Well Written Essays - 500 words

Self-Assessment - Essay Example Understanding people and their culture help people to appreciate the culture. The book provides the history of the Latin Americans, their landscapes, migration and cities, and the current condition of that region (Sanabria 12). The information provided by the book is essential to compare Latin America’s past and current life. As a student, the book will help me know the successes and challenges the Latin Americans encountered, and how to face the future. The history of America is very long. What America is now is very different from the America of a century ago. The modern America is very developed. The book paints a picture of Latin America from the past to the modern picture. The book helps to trace the history of the Latin Americans, the development it has made, and the expectation of the future. The information provided opens people’s eyes concerning Latin Americans. The book offers some good lessons on what countries or individuals ought to do in order to face their challenges. As an individual, I learn that challenges exist in order to be conquered by people and countries. When an individual or country has planned well, when a country has a clear vision, it is a matter of time before the realization of the goals and objectives. The Latin America has developed since it values its culture and appreciates good leadership. Great leadership is a necessary ingredient if a country is to spur development (Sanabria 120). The people must be ready to work hard in order to ensure that the country grows in terms of social, economic and political facets. The Europeans played an important role in the process of civilization of the Latin Americans. The Latin Americans borrowed some cultures from the Europeans, and so did the Europeans. It might explain why Latin Americans have a good relationship with the Europeans. The book describes the impact of globalization in Latin America. Latin America has obtained many benefits from

Exchange Rate Risk Assignment Example | Topics and Well Written Essays - 250 words

Exchange Rate Risk - Assignment Example Economic exposure involves potential negative effect on business future cash flows from foreign subsidiaries due to fluctuation of exchange rate (Madura, 2012). The various hedging strategies that GBATT can employ to cushion exchange rate risk entails futures contract, forward contract, and options contract (Madura, 2012). GBATT can employ the futures contract to avoid exchange rate risk by entering into a contract with a financial institution on the price and quantity of foreign currencies that will be applied at a specific date. Similarly, the forward contract can be applied by specifying the price at which the foreign currency will be exchanged at with a financial institution in a contract. The options strategy on the other hand will involve entering into an agreement that will give GBATT to sell the foreign denominated currencies but not an obligation at a given rate to domestic currency at specific date. Consequently, the three hedging strategies will enable GBATT to avoid exchange rate volatility. One of the firms that employ hedging strategies to cushion exchange rate risk is Coca Cola Company to reduce translation exposure from its foreign subsidiaries (Coca-Cola.com, 2012). In addition, Dell Corporation has adopted hedging strategies to cushion exchange rate fluctuation (Dell,

Wednesday, September 25, 2019

Is the USA Trying to Seek Control on China Research Paper - 1

Is the USA Trying to Seek Control on China - Research Paper Example Barack Obama has recently suggested that they are trying their best to pull out their manufacturing process from China in an attempt to dent their economy. Moving on, in the second statement made in this research paper, it is a known fact that china has been trying to influence markets outside Asia to come and invest in their country. USA has been trying to contain the influx of FDI from their country towards China in order to manage the currency of China. â€Å"US interest in Asia revolves around containing China and the growth of the SCO, and securing under its economic sphere of influence, the most populous region in the world. Asia is home to 4.14 billion people or 59 percent of the world’s population.† USA has been putting its efforts to further exercise control on the military might of the Chinese. The important factor here to note that is the fact that USA wants to build a strong far east base to counter any future attacks by China over the USA, since the Chinese missiles are capable of destroying the majority of the major cities of the USA. Moving onto the fourth point, the USA is seeking China as a major economic threat, which plans to control and maximize the potential available to them in order to take away all the major jobs from the citizens of the USA. The economy of the USA is at a current downfall, while the economy of China is on the rising. One of the primary reasons behind this is the fact that China is deploying majority of its jobs into fields, which are hurting the European, and the American consortium. Moving onto the next important aspect of the attempts made by the USA to curb the growth of China has been the attempts to immobilize the workers of China settled in the USA who are continuously sending in Foreign Direct Investment in their home country of China as a mark of improving the economy of China. It is imperative to understand that Chinese settled in abroad have the highest grossing number of FDI influx to their home country. USA’s retaliation to the same has been its attempts to devalue the currency of China, however, this has been happening at a very subtle pace.

Tuesday, September 24, 2019

This part of the exam requires some consideration of all concepts of Case Study

This part of the exam requires some consideration of all concepts of the Assess, Decide, - Case Study Example is likely to face is the practice by officers program officer to encourage officers not to drop out of the program for a time long enough to shift the blame to another department. This practice, although not illegal was unethical and Commander Allan Deveneux had to act on it, therefore, he had to assess the how rampant was the problem and the factors that contributed to it. The problem would be found to be loopholes in the system; therefore, a decision would have to be made on how those loopholes would be covered to avoid such incidents in future. After the finding the right way to seal those loopholes in the system, Commander Allan Deveneux would go ahead and implement the decision he found suitable. The final step would be to ensure that the problem of encouraging officers to hold in the program for a period long enough to shift the blame has stopped. The friction between chief Piersall and chief Cyphre caused by a recent firing and widespread command failures to make goals which left a lot of employees unsettled. While Piersall, who was the CMC, was deeply concerned about the morale of the staff and wanted to take some time to help the staff overcome the incident, Cyphre thought that they were just shaken up because they had been used to poor leadership and bad habits and when they resume their normal duties, they would feel better. In order to get to the real cause of the friction between the two senior staff members, assessing them on a personal basis would bear much fruits since they were insincere in their public apologies. In addition since master Piersall was not a career recruiter while master Cyphre was a career recruiter might have been part of the reason for the friction, Allan would have sought the perspectives of both which would have helped him determine whether it may have been a cause. Based on the information tha t he got from both parties Allan would then opt for a solution that would ensure that they work amicably. As the commanding officer,

Monday, September 23, 2019

What are the main roles that the United Nations plays in international Essay

What are the main roles that the United Nations plays in international politics To what extent is it successful, and how should that success be gauged - Essay Example Economic instability and imperialistic tendencies led to WWI and WWII, a fact not lost on the founding nations of the UN. The Security Council, the most influential component of the UN is responsible for preserving international security. Comprised of 15 member nations, five of which, the UK, US, Russia, China and France are permanent members, the Security Council convenes whenever it considers a threat to world peace exists. The UN General Assembly, all member nations, gathers at regular intervals to deliberate international problems (â€Å"The United Nations†, 2007). Recent and continuing issues addressed by the UN include alleviating world hunger and disease, reducing child deaths, protecting the civil rights, language and culture of indigenous peoples of the world and confronting global warming, AIDS, the genocide in Sudan, victims of natural disasters and war crimes among many other topics (UN News Service, 2007). No one can debate that the formation of the UN has provided relief and stabilisation for millions of the world’s population over the past 60 years. However, many rightfully question the ability of this international organisation to successfully manage present and future adverse scenarios. The power of the UN to stop imperialist actions was put in serious doubt when it could not stop the US from invading a sovereign country that did not initiate military conflict. The genocide in Darfur, Sudan was ignored until just recently and many thousands of children worldwide die from starvation every day. In addition, globalization has gone far beyond the scope of what could have been imagined in 1945. â€Å"Globalization has also created new vulnerabilities to old threats. Criminal networks take advantage of the most advanced technologies to traffic around the world in drugs, arms, precious metals and stones even people† (â€Å"We the

Sunday, September 22, 2019

Principles of Instructional Design Essay Example for Free

Principles of Instructional Design Essay Client – The client is a company known as Delta Computers, which manufactures computers and peripherals. This is a mid-sized 20-year-old company with 2,000 employees worldwide. It has annual sales of $90 million. Its sales force is 400 in number. Of these about 100 are senior sales managers and directors, and the remaining 300 are the frontline sales force consisting of sales executives.   The sales executives make sales calls, both in person and by telephone, to various companies to sell the company’s products. Data Collection – The first step in the creation of the e-learning course is to collect all the information that is required to create an effective e-learning course. There are various data collection techniques, such as interviewing, questionnaires, focus group questionnaires, observation, Internet, and libraries. The Instructional Designer (ID) can conduct an interview with the Senior Sales Managers of Delta Computers to get information about various sales techniques, which they want their employees to learn and which are relevant to their business. They can also gather information from freely available sources on the Internet and libraries, and also existing content about sales techniques that the company may have, created by their erstwhile and present sales managers. They can also send a questionnaire to the Senior Sales Managers seeking the following information that would be required for creating the course. 1. Who is the audience for this course? (Managers, Sales Executives, Directors, Engineers, Administrative employees, Sales Managers) 2. What is the age group of the learners? 3. What are the qualifications of the learners of this course? (High School, Graduate, Engineering Graduate, Management Graduate) 3. What is the means by which the learners will access this course? (Home computer, office computer, Internet, CD) 4. What is the goal of the course or what purpose does the course seek to accomplish? 5. What is the existing knowledge that the learners have about this topic? (Beginners, experts, proficient) 6. Is the goal you seek to accomplish through this course measurable, if so what are the quantities? 7. How many people will access this course per month? 8. How much time can the learners devote to this course per week? 9. Would you like the performance of the learners to be scored at the end of the course? 10. Typically, the passing score of a learner is 80%. What would you like the passing score of the learner to be? 11. Would you want the learner to undergo the complete course again if he or she fails, or would you like them to undergo only the part in which they have failed again? 12. What is the level of technical knowledge of the learners, i.e. do they know how to operate computers, email, Internet? (Beginner, expert, proficient) 13. Within what duration would you like the learner to complete the course? 14. Would you want more interactivity, simulations, graphics, and fun element in the course or would you want the course to be factual and to the point with minimal graphics and fun element? 15. Do you have any existing material on sales techniques which you would like us to incorporate in the course? Analysis – After the required information has been collected, the analysis for the e-learning course would be done. The analysis would include: 1. Learning needs analysis, 2. Goals of the course. 3. Learning gap. 4. Audience analysis. 5. Prerequisites of course. 6. Learning environment. 7. Passing criteria. 8. Objectives of the course. A detailed analysis and design document is created, which is then sent to the client for approval. After the client provides their approval on the document, the storyboarding for the e-learning course is started. Learning needs analysis – After interviews with the senior managers and from the information acquired through the questionnaire, the learning needs are determined. The senior managers of Delta Computers state that most of their sales executives who make customers calls either through telephone or personally come from varied backgrounds. The current information about sales techniques that they have is gained through the Powerpoint presentations created by the erstwhile and present sales and marketing managers of the company for internal training purposes. When a new sales employee joins, he or she is asked to read these presentations. The information in these presentations, which number about 20, is old and also there is no evaluation at the end of the presentations. The information is organized haphazardly and there are very little graphics and interactivity. The information is also outdated. Learning goals – After understanding the current level of knowledge, the ID gets information about the goals of the course. In this case, Delta Computers wants their sales executives who actually make customer calls to learn the latest sales techniques so they can close many more deals successfully. Learning gap analysis – The ID then chalks out in detail what is the gap between the learning goals and the current level of learning. The ID is able to understand that the existing information about sales techniques is generally what the Senior Sales Managers had put down informally on presentations. The information is haphazardly structured, out-of-date, incomplete, and uninterestingly presented. The ID proposes to get information on latest sales techniques by interviewing the Senior Sales Managers and Sales Directors of the company and other outside sales experts, and through books, journals, and Internet articles. Audience Analysis – After the learning gap analysis, the audience for the course is analyzed. From the information obtained from the answers to the questionnaire submitted to Delta Computers, the ID is able to understand the profile of the learner of this course. The learners who will undergo this course are males and females belonging to the age group of 24 to 55 years. They are mostly graduates in various disciplines, including arts, sciences, and management. About 5% of them are engineering graduates in various disciplines and 10% have obtained management degrees in sales and marketing. They are all computer and Internet savvy and 10% of them have their personal laptops. Prerequisites of the course – The ID formulates certain prerequisites for undertaking the course. The learners should all have basic knowledge of computers, Internet, and English language. They should also have adequate knowledge about the various products in the portfolio of Delta Computers and the features and benefits of the products. Learning environment – The learners will undertake the course through the company’s Learning Management System (LMS). This will be an online course and each learner will be provided a login ID to log in to the LMS. The hardware requirements would be minimum Pentium IV configuration, 2.40 GHz, and 256 MB RAM with broadband Internet. Passing criteria – The learner will need to score a minimum of 80% in the assessment to pass the course. If they are unable to do so, they will have to undertake the course again. Terminal objectives – The next step is to divide the course content into modules and topics and to formulate the terminal objectives for each module of the course. The name of the course is â€Å"Sales Techniques to Make Effective Sales.† The five levels of Bloom’s taxonomy are knowledge, comprehension, application, analysis, synthesis, and evaluation. The five learning types according to Gagne are verbal information, intellectual skills, cognitive strategies, motor skills, and attitudes.

Saturday, September 21, 2019

Misuse of Information Technology

Misuse of Information Technology INTRODUCTION The word IT stands for Information Technology and it is defined as a part of engineering that contributes in creating and studying computer systems and computer application as well as being part of telecommunication, helping to retrieve, store and transmit data. In this current era many impossible things has been made possible with the help of Information Technology. In fact, many organizations are computerized and they use information technology in many ways in their day-to-day routine. The use of IT has becomes part of everybodys life. Information technology has many norms and rules that one should follow and respect. This is where the ethics of information technology comes into action. Ethic is the reflective study of the general nature of moral values, legal and social issues. There are some rules to be followed and standard to direct and control conduct of an individual at professional level. Most of the professional organizations which deal with computing have published their c ode of ethics. OBJECTIVE One should study computer ethics because doing so will make individuals behave like responsible people. One should also study computer ethics as it will keep the latter away from computer abuse and catastrophes. These can be done by studying the different code of ethics. A code of ethics is defined as a means to promote a variety of purposes and goals, in other words, it is a way to promote many motives. Misuse of Information Technology Computer crime is a very vast topic. It includes many mal functions by computer users. It is all about making bad use of information technology for personal interest or in order to create troublesome situation for others. Plagiarism is one aspect. It is passing off the work of other people as your own without giving any credit to them. Piracy is another topic worth thinking about because people make a lot of effort and spend lot of money to create or make something where other just make a copy of them instant of buying the original one. Crackers are basically attention who break into computer system and make illegitimate use of them. With the rapid evolution in Information Technology, the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is why we have some association running, aiming to reduce and stop these concerns. Ethics from different perspective When talking about ethics in information Technology, there are different issues that come in our mind. In order to deal with these problems, there are many associations that have been created and some of them have been mention below. Many professions have established professional societies which have adopted codes of conduct. For example, the medical profession established the AMA (American Medical Association), and the legal profession established the ABA (American Bar Association) (Tavani 2007, p.100). These two associations deal with code of conducts of their members. The Association for Computing Machinery (ACM) and the Institute for Electrical and Electronics Engineers-computer society (IEEE-CS) are examples of professional societies recognized by the computing profession. The Association of Information Technology Professional (AITP) deals with level of conduct for professional. Institute of Electrical and Electronics Engineers (IEEE) Here we will be looking at the Institute of Electrical and Electronics Engineers code of ethics. The IEEE code of ethics contains ten general directives. The first four teach members to accept responsibility in making engineering decisions consistent with the safety, health and welfare of the public. The second command is to let alone difference of opinion wherever possible. The third instruction is to be honest and the fourth is not to accept bribery. These four commands are same for both ACM and the IEEE code of ethics. The member of the IEEE needs to accept responsibility in making engineering consistent with the safety, health and welfare of the public. They also need to avoid real conflict of interest wherever possible. They need to be honest in their work and while handling the organizations data. A member of IEEE should support colleagues and subordinates in their happening and achievements. The IEEE code gives a list of categories for nondiscrimination, but does include anything that might be interpreted to include sexual preference (Bowyer 2001, p56). The Association of Computing Machinery In 1992, the ACM adopted a new code of ethic and professional conduct with supplemental explanation and guidelines. The ACM code of ethics consists of eight general imperatives, eight specific professional responsibilities, six organizational imperatives and two elements for compliance (Bowyer 2001, p.50). Here we are looking at a scenario where a member of the ACM has to implement general moral. He will have to contribute to the society. He will have to avoid harm to others; he will need to be honest and trustworthy. He will have to be fare in his decision making and fair judgment. He will also need to respect property rights including copyrights and patents. He will have to give proper credit for knowledgeable property. He will need to respect the privacy of others, and he will also need to keep confidentiality. Now, we are looking at some more qualified duties, as an ACM computing professional, a member will have to work hard to achieve the highest level in both the development and outcomes of skilled works. He will need to obtain expert skills, which means that he will need to show that he can perform skillfully. The member needs to know and respect the laws belonging to the appropriate profession. He will need to give performance review of computer systems and their impacts together with the analysis of possible risks as well as respect arrangement made and the given responsibilities. He will need to improve good understanding of computing. And finally he will get the opportunity to use computer and communicating resources but with authorization. Regarding the Organizational Leadership Imperatives, a member of the ACM will need to handle social duties of the members of an organizational unit and fully take over his responsibilities. The member also needs to practice personnel and resources to design and build information system that will raise the self respect of the member. He must ensure that the members, who are getting access to the computer system and those who will be affected, will have their needs clearly stated during the assessment. Afterwards the system must be formalized to such a level so that it satisfies all the needs. The ACM member should also create favorable circumstances for others in the organization to absorb notion and bound of computer systems. There should be accordance with the code. The member of the Association of the Computing Machinery has to retain and boost the rules of the code. The member will also have to treat violation of this code unstable with membership in the ACM. The Software Engineering Code of Ethics The Software Engineering code of ethics starts with a summary of eight general ethical rules. The eight views represent different areas of concern for the software engineer: public, employer, product, judgment, management, profession, colleagues and self (Bowyer 2001, p.51). Computers have a role in industry, government, medicine, education and many more. Software engineers role start with the implementation part in the software life cycle where they deal with coding of the software systems. Software engineers have relative chances to perform well without causing harm. Together with the commitment, software engineers shall stick to the following code of ethics and professional procedure. The code contains definite rules related to the behavior of and decisions made. It is not expected that the individual parts of the code is to be used in isolation to justify errors. The code prescribes these as duties of anyone targeting to be or aiming to be a software engineer. The code is not a simple ethical procedure that brings ethical decisions. In some instances, the level could be in conflict with each other. Ethical conflicts can best be reported by considerate consideration of important rules, rather than blind confidence on guidelines. These rules should make a difference to software engineers to consider who is altered by their performance. In all these decisions, concern for health, safety and welfare of the public comes first, which means that the public interest is the most important. Software engineers shall perform reliably with the public interest. In other words, software engineers should be very loyal to their job. Software engineers shall act in a way that is best for their client and employer. Software engineers should also ensure that their outcomes meet the highest skilled standards possible. Association of Information Technology Professionals (AITP) The AITP code of ethics comes in two parts. One of which is the code of ethics and the second one is the standards of conduct. Sections of the standard of conduct are related to the members obligations to management. A member of the AITP code of ethics should be honest in all professional relations. He should be loyal and there should not be any kind of whistle blowing at any point in the organization. He should be ready to share his experience and knowledge with the other members. He should not take credit for work that he has not done, unless given permission. He should not take advantage of other members who lack experience or knowledge. The member should be up to date and he should have the skills required. Members should not make use of computer system for personal use. Conclusion The whole idea here was to see how ethics have become part of information technology and what the implementations of those ethical codes are. The code of ethics discussed here are more of voluntary kind in other word there is no observance against disobedience. Discrimination based on sexual preference is still a major concern in the community these days. Licensing is another issue worth talking about because companies or individual tend to buy a computer program and then have it installed on different systems. This debate will never come to an end until your internal moral sense guide you to take a step forward for the welfare of the Information Technology society, as it is always said lead by example. References Tavani,H. T., 2007. Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. 2nd ed. United States of America: Bruce Spatz. Bowyer,K. W. ed., 2001. Ethics and Computing: Living Responsibly in a Computerised World. 2ne ed. New York: The Institute of Electrical and Eletronics Engineers. Quinn, J.M. 2006., Ethics for the Information Age. 2nd ed. New York: Pearson Education. Bibliography Adams A., McCrindle J. R., 2008, Pandoras Box: Social and Professional Issues of the Information Age. West Sussex, England: John Wiley. Baase S, 2009, A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet. New Jersy: Pearson Education. Spindello A. R., 1995, Ethical Aspects of Information Technology. New Jersy: Prentice-Hall. Johson.D.G., 2009, Computer Ethics, 4th ed. New Jersy: Pearson Education. Online Resources http://www.cs.bgsu.edu/maner/ethicomp95/keynote3.pdf (last accessed 06.02.2010) http://www.bcs.org/server.php?show=ConWebDoc.2914 (last accessed 06.02.2010) http://www.southernct.edu/organizations/rccs/resources/teaching/teaching_mono/moor/moor_definition.html (last accessed 08.02.2010)