Monday, September 30, 2019

Commercial Bank

A  commercial bank  (or  business bank) is a type of  financial institution  and  intermediary. It is a bank  that lends money and provides  transactional, savings, and money market accounts and that accepts  time deposit. Commercial banks represent the core of the credit for any national economy. In turn, the credit is the engine that put in motion the financial flows that determine growth and economic development of a nation. As a result, any efficiency in the activities of commercial banks has special implications on the entire economy.That is why we consider very useful to present an analysis of possibilities for evaluating the performance in the commercial banks. The management of every commercial bank must establish a system for assessing investment performance which suits its circumstances and needs and this evaluation must be done at consecutive intervals to ensure the achievement of the Bank's investment objectives of hand; and to know the general direction of the behaviour of investment activity in the past and therefore predictable as it in the future on the other hand.Because of the crucial role that commercial banks hold in the financial sector, this paper focuses specifically on the managing core risks is banking sector as a vital segment of the whole economy, without which no modern economy can exercise the role and own functions. ————————————————- ————————————————- Origin of the word The name  bank  derives from the  Italian  word  banco  Ã¢â‚¬Å"desk/bench†, used during the  Renaissanceera by  Florentine  bankers, who used to make their transactions above a desk covered by a green tablecloth. 2]  However, traces of banking activity can be found even in ancient times. — Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- The role of commercial banks Commercial banks engage in the following activities: * processing of payments by way of telegraphic transfer, EFTPOS, internet banking, or other means * issuing bank drafts and bank cheques * accepting money on term deposit * lending money by overdraft, installment loan, or other means * roviding documentary and standby  letter of credit, guarantees, performance bonds, securities underwriting commitments and other forms of off balance sheet exposures * safekeeping of documents and other items in safe deposit boxes * sales, distribution or brokerage, with or without advice, of: insurance, unit trusts and similar financial products as a â€Å"financial supermarket† * cash management and treasury * merchant banking  and  private equity  financing traditionally, large commercial banks also underwrite bonds, and  make markets   in currency, interest rates, and credit-related securities, but today large commercial banks usually have an  investment bank  arm that is involved in the  mentioned activities[clarify]. ————————————————- [editTypes of loans granted by commercial banks [edit]Secured loan A  secured loan  is a loan in which the borrower pledges some asset (e. g. a car or property) as  collateral  for the loan, which then becomes a secured debt owed to the creditor who gives the loan.The debt is thus secured against the collateral — in the event that the borrower defaults, the creditor takes possession of the asset used as collateral and may sell it to regain some or all of the amount originally lent to the borrower, for example, foreclosure of a home. From the creditor's perspective this is a category of debt in which a lender has been granted a portion of the bundle of rights to specified property. If the sale of the collateral does not raise enough money to pay off the debt, the creditor can often obtain a deficiency judgment against the borrower for the remaining amount.The opposite of secured debt/loan is unsecured debt, which is not connected to any specific piece of property and instead the creditor may only satisfy the debt against the borrower rather than the borrower's collateral and the borrower. A  mortgage loan  is a very common type of debt instrument, used to purchase real estate. Under this arrangement, the money is used to purchase the property. Commercial banks, however, are given security – a  lien  on the title to the house – until the mortgage is paid off in full. If the borrower  defaults  on the loan, the bank would have the legal right to epossess the house and sell it, to recover sums owing to it. In the past, commercial banks have not been greatly interested in real estate loans and have placed on ly a relatively small percentage of assets in mortgages. As their name implies, such financial institutions secured their earning primarily from commercial and consumer loans and left the major task of home financing to others. However, due to changes in banking laws and policies, commercial banks are increasingly active in home financing. Changes in banking laws now allow commercial banks to make home mortgage loans on a more liberal basis than ever before.In acquiring mortgages on real estate, these institutions follow two main practices. First, some of the banks maintain active and well-organized departments whose primary function is to compete actively for real estate loans. In areas lacking specialized real estate financial institutions, these banks become the source for residential and farm mortgage loans. Second, the banks acquire mortgages by simply purchasing them from mortgage bankers or dealers. In addition, dealer service companies, which were originally used to obtain c ar loans for permanent lenders such as commercial banks, wanted to broaden their activity beyond their local area.In recent years, however, such companies have concentrated on acquiring mobile home loans in volume for both commercial banks and savings and loan associations. Service companies obtain these loans from retail dealers, usually on a nonrecourse basis. Almost all bank/service company agreements contain a credit insurance policy that protects the lender if the consumer defaults. [edit]Unsecured loan Unsecured loans  are monetary loans that are not secured against the borrower's assets (i. e. , no  collateral  is involved). There are small businesss unsecured loans such as credit cards and credit lines to large corporate credit lines.These may be available from financial institutions under many different guises or marketing packages: * bank  overdrafts An overdraft occurs when money is withdrawn from a bank account and the available balance goes below zero. In this s ituation the account is said to be â€Å"overdrawn†. If there is a prior agreement with the account provider for an overdraft, and the amount overdrawn is within the authorized overdraft limit, then interest is normally charged at the agreed rate. If the POSITIVE balance exceeds the agreed terms, then additional fees may be charged and higher interest rates may apply. * corporate bonds credit card  debt * credit facilities or lines of credit * personal loans What makes a bank limited liability company A corporate bond is a bond issued by a corporation. It is a bond that a corporation issues to raise money in order to expand its business. [1] The term is usually applied to longer-term debt instruments, generally with a maturity date falling at least a year after their issue date. (The term â€Å"commercial paper† is sometimes used for instruments with a shorter maturity. ) Sometimes, the term â€Å"corporate bonds† is used to include all bonds except those issu ed by governments in their own currencies.Strictly speaking, however, it only applies to those issued by corporations. The bonds of local authorities and supranational organizations do not fit in either category. [clarification needed] Corporate bonds are often listed on major exchanges (bonds there are called â€Å"listed† bonds) and ECNs like Bonds. com and MarketAxess, and the coupon (i. e. interest payment) is usually taxable. Sometimes this coupon can be zero with a high redemption value. However, despite being listed on exchanges, the vast majority of trading volume in corporate bonds in most developed markets takes place in decentralized, dealer-based, over-the-counter markets.Some corporate bonds have an embedded call option that allows the issuer to redeem the debt before its maturity date. Other bonds, known as convertible bonds, allow investors to convert the bond into equity. Corporate Credit spreads may alternatively be earned in exchange for default risk through the mechanism of Credit Default Swaps which give an unfunded synthetic exposure to similar risks on the same ‘Reference Entities'. However, owing to quite volatile CDS ‘basis' the spreads on CDS and the credit spreads on corporate bonds can be significantly different. Assets and Liabilities of Commercial Banks in the United States * Glass-Steagall Act * Mortgage constant Functions of Commercial Banks Commercial bank being the financial institution performs diverse types of functions. It satisfies the financial needs of the sectors such as agriculture, industry, trade, communication, etc. That means they play very significant role in a process of economic social needs. The functions performed by banks are changing according to change in time and recently they are becoming customer centric and widening their functions. Generally the functions of commercial banks are divided into two categories viz. rimary functions and the secondary functions. The following chart simplifi es the functions of banks. Primary Functions of Commercial Banks Commercial Banks performs various primary functions some of them are given below 1 Accepting Deposits  :  Commercial bank accepts various types of deposits from public especially from its clients. It includes saving account deposits, recurring account deposits, fixed deposits, etc. These deposits are payable after a certain time period  2 Making Advances  :  The commercial banks provide loans and advances of various forms. It includes an over draft facility, cash credit, bill discounting, etc.They also give demand and demand and term loans to all types of clients against proper security. 3 Credit creation  :It is most significant function of the commercial banks. While sanctioning a loan to a customer, a bank does not provide cash to the borrower Instead it opens a deposit account from where the borrower can withdraw. In other words while sanctioning a loan a bank automatically creates deposits. This is kno wn as a credit creation from commercial bank. Secondary Functions of Commercial Banks Along with the primary functions each commercial bank has to perform several secondary functions too.It includes many agency functions or general utility functions. The secondary functions of commercial banks can be divided into agency functions and utility functions. a) Agency Functions  : Various agency functions of commercial banks are ————————————————- 1 To collect and clear cheque, dividends and interest warrant. ————————————————- 2 To make payment of rent, insurance premium, etc. ————————————————- 3 To deal in foreign exchange transactions. ——â₠¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- 4 To purchase and sell securities. ———————————————— 5 To act as trusty, attorney, correspondent and executor. ————————————————- 6 To accept tax proceeds and tax returns. b) General Utility Functions  : The general utility functions of the commercial banks include ————————————————- 1 To provide safety locker facility to customers. ————————————————- 2 To provide money transfer facility. ——————à ¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- 3 To issue traveller's cheque. ————————————————- To act as referees. ————————————————- 5 To accept various bills for payment e. g phone bills, gas bills, water bills, etc. ————————————————- 6 To provide merchant banking facility. ————————————————- 7 To provide various cards such as credit cards, debit cards, Smart cards, etc. Andrievskiy Wealth Management  establishes bank accounts for onshore and offshore companies and private individuals with one of the oldest banks in Switzerland, for asset management as well as for purely commercial transfers.Andrievskiy Wealth Management doesn’t charge any commissions for bank account openings. * Time period of an account opening: 7-10 days (available by mail) * Price: free of charge * Getting keys of electronic access to the account (e-banking) * Time period of getting keys: 7 days * Registering management mandate according to your strategy: 1 day * The minimum recommended amount to open a Swiss bank account is 500 000 CHF * Receiving reports: quarterly or on request Opening a Swiss bank account in the Internet age is a very easy thing to do.The main reason for opening a Swiss bank account is for the extreme security and privacy Swiss Banks uphold thanks to Swiss laws that have been in effect for over 75 years. Contrary to popular belief, opening a Swiss bank account does not always mean that you are a tax evader, criminal, or money launderer. Swiss bank accounts can protect one’s money from prying relatives, nasty divorce settlements, lawsuits, and more. Some people just want a Swiss bank account because of the allure and mystery often attached to Swiss bank accounts, but whatever your reasons it is relatively easy to find a bank and open an account.Till the end of the last century, opening a Swiss bank account may have included visiting the bank of your choice in person, paying hundreds of dollars a year in fees, and putting down a few thousand dollars as an initial deposit. As the Internet has allowed online banking to explode, you can now open a bank account at thousands of banks around the world wherever you are. Offshore bank accounts are available to anyone with money that needs a place to be kept, Swiss banks have a lot of competition these days. Sticking to trusted and insured banks is always the way to go.While most banks today have secure online banking and security features in place, a Swiss bank account comes built in with some of the strictest privac y laws in the world. Never wire money or deposit money to any site or bank without first verifying that the bank or site is secure and licensed to do banking. Making sure deposits are insured is also a good idea and be mindful that not all banks may be insured or may have deposit insurance limits. Read reviews and ask questions about the Swiss bank you choose before providing any personal information.Once you’ve found a good Swiss bank and open an account you’ll enjoy financial privacy at a level found only in Switzerland. In 1934, the Swiss passed a law that made it a criminal offense for bankers to reveal the identity of account holders. There are two reasons why this protection was reinforced: Nazi spies: The 1931 crisis led to intensified foreign exchange control in Germany. Hitler promulgated a law whereby any German with foreign capital was to be punished by death, and the Gestapo began espionage on Swiss banks. When three Germans were put to death, the Swiss gov ernment was convinced of the necessity to reinforce bank secrecy.Pressure from the French: The 1932 Basler Handelsbank affair revealed that over 2,000 members of the French elite had accounts in Switzerland. French Leftists took advantage of this to denounce the austerity program of the government. It called for legal authority over French accounts in Switzerland, but to no avail. Unlike American law where law enforcement agencies, the judicial system, and private citizens can gain access to all kinds of financial information, under Swiss law neither the bank’s officers or the its employees are allowed to reveal any information, relative to any account to anyone, including the Swiss government.No private citizen or their legal representative can ever receive any type of information about anyone’s Swiss bank account under any set of conditions. That includes all types of legal proceedings that the Swiss classify as non-criminal behavior. The Swiss consider tax evasion a political offense. Divorce, inheritance disputes and bankruptcy cases are considered private matters, and as such the secrecy of the account is protected from any legal action to verify the presence of, or attempts to seize any assets. There are some notable exceptions.The Swiss are bound by a treaty with the US to reveal accounts connected with organized crime, drug trafficking and insider trading. But the final say on revealing the identity of the account holder is up to the Swiss authorities. 7 myths about Swiss bank accounts Swiss bank accounts are only for millionaires. This is not true. The majority of our clients are not major manufacturers or movie stars, but everyday people (business people, computer engineers, civil servants, etc. ). Swiss banks are no longer only for stars. You can open a Swiss bank account with a deposit of only 5,000 Swiss francs.We even offer accounts with no minimum balance. Money invested in Switzerland yields no interest. Nothing could be more untr ue. You can invest your money worldwide from your account in Switzerland. Swiss bankers are among the best finance managers in the world, so it comes as no surprise that they manage over 35% of offshore holdings. It’s impossible to open an account in Switzerland by correspondence This is not true. Most of the accounts that we offer can be opened by correspondence as long as you comply with our opening procedures and provide us with the necessary documents.What is more, your banking relations can be conducted by correspondence, using the telephone, Internet banking, bank transfer and credit cards. That said, we encourage our customers to meet with their banker at least once in order to get acquainted and see where their money is held. Swiss bank accounts are very expensive to maintain This is not true. Most of the accounts we open don’t charge a cent in annual fees. Even if you would like additional services such as retained correspondence or numbered banking relations, the annual fees are very reasonable.It is difficult to close a Swiss bank account On the contrary. You can close your account in Switzerland whenever you wish and without any restriction. You will pay no financial penalty. If need be, you will just have to realize your investments. Contrary to many onshore banking practices, your money is not held hostage by Swiss banks. Swiss bank accounts attract only criminals and dictators Not true! The vast majority of Swiss bank account holders are honest people who want to keep their savings in a country renowned for its stability.Swiss banks are extremely cautious regarding politicians who wish to open an account and they systematically refuse to accept any money that is of dubious origin or poorly founded. Numbered accounts are anonymous There are no anonymous accounts in Switzerland. A numbered account is an account that is identified solely by a number, rather than a name, in order to preserve the strictest confidentiality possible durin g teller transactions or bank transfers. Only the bank manager and a few select people know the identity of numbered account holders. There exist two different types Swiss bank accounts.The first is accessible to (almost) anyone. Such an account will offer credit and debit cards, checking or whatever else you may want in a bank account. Opening such an account can be done in person–some Swiss banks have branches here in the US–or by mail. Then there are the Swiss bank accounts you’ve heard about from the movies. These are the numbered accounts, the ones with minimum balances anywhere from $100,000 to $1 million. It’s known as private banking and it’s reserved for folks who have a lot of assets to manage and who demand a lot of service.The services you receive at a private bank focus on private counseling in aspects of wealth management including investments, tax concerns, and estate planning. The numbered accounts aren’t anonymous, but only a few people know the name of the account holder and Swiss law forbids them from revealing it to most anyone. They can’t acknowledge that you have an account, give out the name of a numbered account holder or reveal any information about the transactions of any account holder. Generally, numbered accounts must be opened in person, though lawyers and/or brokers can perform this service for you by mail.Your signature and identity have to be authenticated by a notary public or consul, depending on circumstances. If you’ve got the money and want to open such account, here are links to the private banking departments of some well known Swiss banks: Ask Dr. Econ July 2001 What Is the Economic Function of a Bank? Commercial banks play an important role in the financial system and the economy. As a key component of the financial system, banks allocate funds from savers to borrowers in an efficient manner. They provide specialized financial services, which reduce the cost of ob taining information about both savings and borrowing opportunities.These financial services help to make the overall economy more efficient. Imagine a World Without Banks One way to answer your question is to imagine, for a moment, a world without banking institutions, and then to ask yourself a few questions. This is not just an academic exercise; many former eastern-block nations began facing this question when they began to create financial markets and develop market-oriented banks and other financial institutions. If there were no banks†¦ * Where would you go to borrow money? * What would you do with your savings? * Would you be able to borrow (save) as much as you need, when you need t, in a form that would be convenient for you? * What risks might you face as a saver (borrower)? How Banks Work Banks operate by borrowing funds-usually by accepting deposits or by borrowing in the money markets. Banks borrow from individuals, businesses, financial institutions, and governmen ts with surplus funds (savings). They then use those deposits and borrowed funds (liabilities of the bank) to make loans or to purchase securities (assets of the bank). Banks make these loans to businesses, other financial institutions, individuals, and governments (that need the funds for investments or other purposes).Interest rates provide the price signals for borrowers, lenders, and banks. Through the process of taking deposits, making loans, and responding to interest rate signals, the banking system helps channel funds from savers to borrowers in an efficient manner. Savers range from an individual with a $1,000 certificate of deposit to a corporation with millions of dollars in temporary savings. Banks also service a wide array of borrowers, from an individual who takes a loan of $100 on a credit card to a major corporation financing a billion-dollar corporate merger.The table below provides a June 2001 snapshot of the balance sheet for the entire U. S. commercial banking in dustry. It shows that the bulk of banks' sources of funds comes from deposits – checking, savings, money market deposit accounts, and time certificates. The most common uses of these funds are to make real estate and commercial and industrial loans. Individual banks' asset and liability composition may vary widely from the industry figures, because some institutions provide specialized or limited banking services. Banks Are Only One Type of Financial Intermediary Finally, the U.S. financial services industry and financial markets are highly developed. In recent decades, many new products and services have been created, as well as new financial instruments and institutions. Today, in addition to banks, there are several other important types of financial intermediaries. These include savings institutions, credit unions, insurance companies, mutual funds, pension funds, finance companies, and real estate investment trusts (REITS). Banks' assets have grown in recent decades in a bsolute terms; however, banks have tended to lose market share to even aster growing intermediaries such as pension funds and mutual funds. Still, banks continue to account for a significant share-over 23 percent-of the assets of all financial intermediaries at the end of year 2000, as the chart below shows. The main functions of commercial banks are accepting deposits from the public and advancing them loans. However, besides these functions there are many other functions which these banks perform. All these functions can be divided under the following heads: 1. Accepting deposits 2. Giving loans 3. Overdraft 4. Discounting of Bills of Exchange . Investment of Funds 6. Agency Functions 7. Miscellaneous Functions 1. Accepting Deposits: The most important function of commercial banks is to accept deposits from the public. Various sections of society, according to their needs and economic condition, deposit their savings with the banks. For example, fixed and low income group people d eposit their savings in small amounts from the points of view of security, income and saving promotion. On the other hand, traders and businessmen deposit their savings in the banks for the convenience of payment.Therefore, keeping the needs and interests of various sections of society, banks formulate various deposit schemes. Generally, there ire three types of deposits which are as follows: (i)  Current Deposits: The depositors of such deposits can withdraw and deposit money whenever they desire. Since banks have to keep the deposited amount of such accounts in cash always, they carry either no interest or very low rate of interest. These deposits are called as Demand Deposits because these can be demanded or withdrawn by the depositors at any time they want.Such deposit accounts are highly useful for traders and big business firms because they have to make payments and accept payments many times in a day. (ii)  Fixed Deposits: These are the deposits which are deposited for a definite period of time. This period is generally not less than one year and, therefore, these are called as long term deposits. These deposits cannot be withdrawn before the expiry of the stipulated time and, therefore, these are also called as time deposits. These deposits generally carry a higher rate of interest because banks can use these deposits for a definite time without having the fear of being withdrawn. iii)  Saving Deposits: In such deposits, money upto a certain limit can be deposited and withdrawn once or twice in a week. On such deposits, the rate of interest is very less. As is evident from the name of such deposits their main objective is to mobilise small savings in the form of deposits. These deposits are generally done by salaried people and the people who have fixed and less income. 2. Giving Loans: The second important function of commercial banks is to advance loans to its customers. Banks charge interest from the borrowers and this is the main source of th eir income.Banks advance loans not only on the basis of the deposits of the public rather they also advance loans on the basis of depositing the money in the accounts of borrowers. In other words, they create loans out of deposits and deposits out of loans. This is called as credit creation by commercial banks. Modern banks give mostly secured loans for productive purposes. In other words, at the time of advancing loans, they demand proper security or collateral. Generally, the value of security or collateral is equal to the amount of loan.This is done mainly with a view to recover the loan money by selling the security in the event of non-refund of the loan. At limes, banks give loan on the basis of personal security also. Therefore, such loans are called as unsecured loan. Banks generally give following types of loans and advances: (i)  Cash Credit: In this type of credit scheme, banks advance loans to its customers on the basis of bonds, inventories and other approved securitie s. Under this scheme, banks enter into an agreement with its customers to which money can e withdrawn many times during a year. Under this set up banks open accounts of their customers and deposit the loan money. With this type of loan, credit is created. (iii)  Demand loans: These are such loans that can be recalled on demand by the banks. The entire loan amount is paid in lump sum by crediting it to the loan account of the borrower, and thus entire loan becomes chargeable to interest with immediate effect. (iv)  Short-term loan: These loans may be given as personal loans, loans to finance working capital or as priority sector advances.These are made against some security and entire loan amount is transferred to the loan account of the borrower. 3. Over-Draft: Banks advance loans to its customer’s upto a certain amount through over-drafts, if there are no deposits in the current account. For this banks demand a security from the customers and charge very high rate of int erest. 4. Discounting of Bills of Exchange: This is the most prevalent and important method of advancing loans to the traders for short-term purposes. Under this system, banks advance loans to the traders and business firms by discounting their bills.In this way, businessmen get loans on the basis of their bills of exchange before the time of their maturity. 5. Investment of Funds: The banks invest their surplus funds in three types of securities—Government securities, other approved securities and other securities. Government securities include both, central and state governments, such as treasury bills, national savings certificate etc. Other securities include securities of state associated bodies like electricity boards, housing boards, debentures of Land Development Banks units of UTI, shares of Regional Rural banks etc. 6.Agency Functions: Banks function in the form of agents and representatives of their customers. Customers give their consent for performing such functi ons. The important functions of these types are as follows: (i) Banks collect cheques, drafts, bills of exchange and dividends of the shares for their customers. (ii) Banks make payment for their clients and at times accept the bills of exchange: of their customers for which payment is made at the fixed time. (iii) Banks pay insurance premium of their customers. Besides this, they also deposit loan installments, income-tax, interest etc. s per directions. (iv) Banks purchase and sell securities, shares and debentures on behalf of their customers. (v) Banks arrange to send money from one place to another for the convenience of their customers. 7. Miscellaneous Functions: Besides the functions mentioned above, banks perform many other functions of general utility which are as follows: (i) Banks make arrangement of lockers for the safe custody of valuable assets of their customers such as gold, silver, legal documents etc. (ii) Banks give reference for their customers. iii) Banks colle ct necessary and useful statistics relating to trade and industry. (iv) For facilitating foreign trade, banks undertake to sell and purchase foreign exchange. (v) Banks advise their clients relating to investment decisions as specialist (vi) Bank does the under-writing of shares and debentures also. (vii) Banks issue letters of credit. (viii) During natural calamities, banks are highly useful in mobilizing funds and donations. (ix) Banks provide loans for consumer durables like Car, Air-conditioner, and Fridge etc.

Sunday, September 29, 2019

Black People and James Baldwin

Deborah Lee Period 1 May 28,2012 Supplemental Reading Assignment A. The theme of Baldwin’s essay is equality. He establishes this theme in his essay with the juxtaposition of a poor white man and a black man. In this essay, Baldwin speaks of how â€Å"People are continually pointing out to me the wretchedness of white people in order to console me for the wretchedness of blacks. He says that people say that being black is not that bad because there are white people in the same situation and that there is still hope for the black because of people like Frank Sinatra and Sammy Davis but it is still not something â€Å"to be regarded with complacency† because the situations of Frank Sinatra and Sammy Davis are just rare. Equality in America at the time was possible with â€Å"determined will,† but still very rare. Another way James Baldwin established the theme of equality in this essay was when he mentioned the projects, more specifically, Riverton.Baldwin establi shes this theme of equality through mentioning Riverton for Riverton was a physical representation of the inequality of blacks and whites in America back then. Baldwin said, â€Å"The people in Harlem know they are living there because white people do not think they are good enough to live anywhere else. † There was going to be no equality if people were told to live in certain places because of their color. Baldwin also makes this theme extremely clear when he says, â€Å"Negroes want to be treated like men. † B.The tone of the essay, Fifth Avenue, Uptown: A letter from Harlem by James Baldwin and the tone of the poem, Theme for English B by Langston Hughes are similar. They are similar for both authors show that there is hope for equality through the tone of each text. In the poem, Theme for English B, Hughes says â€Å"You are white — / yet a part of me, as I am a part of you. / That’s American. † Hughes expresses that although he may be the onl y black person in his class, he is still American like the rest of the class and should be considered equal.The tone of the essay and poem is different from the poem Incident by Countee Collen. This poem’s tone is complete opposite from the other poem and essay for Collen uses more of a doubtful tone. This poem is more about just being sad and bothered that blacks and whites are not equal instead of being hopeful for the equality of the two races that is soon to come like the other poem and essay. C. The perspectives on race in these texts are different than in To Kill a Mockingbird for in To Kill a Mockingbird, Atticus believes that there is good and bad in everyone and that nobody should be hated or claimed as all bad.In the book, Scout asks Atticus if it is okay to hate Hitler but Atticus says that you shouldn’t hate anybody, no matter how bad they are because there is a good side to them. This shows that Atticus’ perspective on race is different from the aut hors of the poems and essay for the authors believe that the whites are bad people because blacks and whites are not equal. While Atticus is just like the authors for he wants equality between black and whites, his perspective is different for he believes that this equality will be brought once the good side comes out of the white people.

Saturday, September 28, 2019

Economic inequality Essay Example | Topics and Well Written Essays - 750 words

Economic inequality - Essay Example What mainly creates this economic inequality is the fact that most of the people do not utilize their talents, but rather envy other successful people's talents and wish they had the same talents meaning that they are jealous. It is better to be envious than jealous of other people's success because envy comes in two forms: positive and negative envy. If someone is positively envious he/she will work towards achieving the goal the other person has achieved but when a person is negatively envious then he/she will develop jealousy in you. Jealous people wish for others not to have what they cannot have. Since everyone has his or her given talents regarding a certain field then should utilize those talents to become economically satisfied. This proves that the economic inequality comes from the wish of the people who do not want to utilize their given talents and opportunities to become economically satisfied hence creating economic inequality. In the other point of liberty upsets patte rn, imagine that the distribution is favored by one by one of the entitlement concepts and everyone has an equal share of wealth and riches. They would still lose their treasures to some more innovative people. Nozick also argues that no end state principle can be continuously realized without interference with people’s lives. This means that even if resources are distributed fairly people would still redistribute them through exchanging goods for services and giving things to other people for certain favors.

Friday, September 27, 2019

Domestic Violence Cycles Term Paper Example | Topics and Well Written Essays - 2000 words

Domestic Violence Cycles - Term Paper Example The victims are usually women, children, elderly people, physically or mentally challenged persons and partners in gay or lesbian relationship (Steiner, 1996). Domestic violence is a far-reaching and social problem which has raised many serious debates. While many sociologists argue that domestic violence is mainly a male- perpetrated issue, many others believe that women are as violent as men in intimate relationships. The issue of domestic violence, especially against women, is not new and in fact, the domestic violence movement is at least 3 decades old. The movement has caught a lot of public awareness and has got many protective laws enacted. Many extensive networks of services have been started to help the victims of domestic violence. Domestic violence can be either physical - where there is danger of harm to any part of the victims body; psychological and emotional - where the offender abuses the victim verbally or criticizes her in front of others or causes embarrassment, despair, sadness or terror; sexual- wherein the victim suffers rape or any other derogatory treatment; economical- the offender tortures the victim by causing financial tensions, not allowing her to spend or asking her penny-to-penny accounts of what is being spent; or social- where the victim is not given freedom to meet her friends and relatives or attend social gatherings. Other methods of harassment include blackmailing, following, unwanted emails, and phone calls, etc. Children, elderly and the disabled may also suffer by sheer negligence like not giving food, shelter, and clothes properly or not giving medical aid in time. Also, children may suffer by just looking at their mother being beaten up (Davies, Smith and deBenedictis, 2008). According to the 1998 Commonwealth fund survey, nearly 31% of American women report being abused by their partners at some point in their lives (Commonwealth Fund, 1999).

Thursday, September 26, 2019

Company Capabilities and Value Chain of IKEA Case Study

Company Capabilities and Value Chain of IKEA - Case Study Example A USP is defined as a cutting edge or a differentiation that separates one product or service from its competition. This, however, does not imply that the other products do not sell in the market. In a market, there are several products, each with a differentiation, each with a cutting edge – each having a separate USP associated, and the admirers of the particular benefit are retained by that product/service or brand. For example, in many regions, COKE is stronger in taste compared to PEPSI, and therefore, individuals having taste for stronger beverages prefer COKE, while others go for PEPSI. The critical point in this discussion is that both products sell, and sell well. This way, the capability of a firm to develop a USP has turned on its sale volumes. Subsequently, moving backward in the value chain, when a supplier sees the manufacturer doing well, the supply chain strengthens itself in terms of its operations and processes. Other than the operations in the value chain, t he operations within the manufacturing unit have also illustrated a positive impact. Some authors associate this feel like a current flowing in a wire; it becomes similar to the capabilities flowing back to where it is supplied. The ideas, values are engraved in the roots of the organization and from there, it circulates to all parts of an organization and the business itself indulges in boosting its unique edge for its customer values. Following is the discussion of the IKEA case that depicts a classic example of the same. Fundamentally, IKEA is all about the furniture of various sorts and types and kinds.

Wednesday, September 25, 2019

Radio Essay Example | Topics and Well Written Essays - 2000 words

Radio - Essay Example which broadcasting is carried out throughout the world and involves the airborne transmission of electromagnetic audio signals in the case of radio and audio and visual signals in case of televisions that can generally be accessed by a wide population through receivers (Biagi 2014, p.131). Broadcasting plays a crucial role in ideology, news values, social and cultural context as well as the political context as most people use them to address and tackle the issues affecting a country. The major reason for the use of broadcasting is its capacity to reach a large number of people or masses in the passing of information as well as entertainment. Broadcasting emerged as a remedy to the traditional or conventional means of sending information that was used previously. Radio developed as an improvement of the telegraph as an instantaneous system of information to address the desire of humans for a mode of communication free from the obstacles of long-distance transportation (Timmons 2005, p.53).   The first system developed by Guglielmo Marconi transmitted information which was picked about 3km away by a receiving device that had no connection to the transmitting device that demonstrated that electronic signals could be cast broadly through space and could be captured by receivers. As already stated, the radio transmits news through sounds also known as audio medium that is played on the radio for the audience. Radio broadcasts may range from as little as a few seconds to lengthy minutes and may include local or international news as well as entertainment that may be incorporated in the program to encourage a flow in the broadcasts. News plays an important role on radio such as contribution of flow and a source of content that may be social or c ultural as well as other contexts. News plays a major role in radio that may be grouped in such criteria as enabling citizenship, helping us know the world around us, facilitating the exchange of ideas and information, revealing

Tuesday, September 24, 2019

Gigabit Token Ring Research Paper Example | Topics and Well Written Essays - 2000 words

Gigabit Token Ring - Research Paper Example It is possible to make use either of the first two token rings in the same equipment. The drawback to this functionality is that the introduction of a new device to such network brings problems to the entire ring (Carlo, 1998). The token ring was first initiated by IBM in the early 80s in their research facility located in Zurich. In 1985, IBM launched its fist token-ring product as a form of adapter that could be used in their original personal computers. In the following year, in collaboration with Texas Instruments, they jointly developed a chipset to help other companies to develop devices that are compatible with the token ring. The year 1989 saw IBM introduce an improved version of their earlier token ring model which had a speed of 4 Mbit/sec. The improved version had a speed of 16 Mbit/sec and in line with this development; the IEEE 802.5 standard was extended to cover it (Muller, 2003). In the year 1994, the leading suppliers of token ring created the Alliance for Strategic Token-ring Advancement and Leadership (ASTRAL) whose main mission was increase the speed of Token-Ring technology to counter the ever rising popularity of Ethernet technology. The members of this group included: ACE/North Hills, 3Com, Bytex, Bay Networks, Cabletron, Chipcom , Centillion, IBM, Hewlett-Packard, , Intel, Olicom ,Madge, Racore, Proteon, Texas Instruments, SMC, UB Networks., Xircom, and XPoint (Muller, 2003). In 1997, a revised version of 802.5 standards was developed which marked the introduction of Dedicated Token-Ring. It was a form of full duplex token ring that bypassed the usual protocol used by token ring in data transfer. A single station thus had the capability of sending and receiving data streams concurrently. This had the effect of doubling the transfer rate of any token ring such that a 4 Mbit/sec dedicated Token-ring station acquired an overall transfer rate of 8 Mbit/sec. They are mainly Type 1, type 6 and type 3. The first wiring done on token ring

Monday, September 23, 2019

Roman State Essay Example | Topics and Well Written Essays - 2500 words

Roman State - Essay Example The Romans usually described by their cultural-identity in very simple terms, which included the use of Latin language, regard for traditional Latin literature, loyalty to Roman laws and hereditary civilization. Else - everyone who wasn't a Romanian and didn't want to share this way of life - was barbarian (P.J. Geary, 2001, pp. 107-109). By the similar gauge, all persons who lived inside the borders of Rome were, theoretically, tied by their widespread contribution in Roman culture (P.J. Geary, 2001, pp. 107-109). Following the fall of Alexander and the rejection of Greek domination in the 3rd century BC, the Illyrians twisted their fates to piracy (P.A. Brunt, 1976, pp. 161-74). Carrying out their invasions from the isolated waterfronts of the coastline, they devastate the shoreline of Italy along with Greece and victimized the commerce of the Adriatic. In return to help calls from Greece, Rome demanded a termination of the piracy, but the Illyrians discarded. This negative response caused two consecutive trounces in the Roman wars of 229 and 219 BCE. Illyria, but, remained an influential Empire with its center at Skodra, until 180 BCE, when the Dalmatians stated themselves autonomous of Ruler Gentius (P.A. Brunt, 1976, pp. 161-74). ... They, but, opposed to yield Romans annexation until the earliest part of the 1st century CE. They tied in an endeavor with the Pannonians and to set free their provinces from Romans in 6 C.E. and they were not finally controlled until 9 C.E. by Augustus and Tiberius (P.A. Brunt, 1976, pp. 161-74). From that time on, the entire of Illyria was occupied and unified as the Roman territory of Illyricum and finally developed to be one of the major employing grounds for the Rome's army. Finally, as it developed into highly-Romanized, it was acknowledged as the hometown of some Emperors counting Diocletion. After the demise of King Prasutagus (AD 50-60), though, the Roman overseers in Britain made the Iceni a subject populace. In Iceni, Boudicca was a true combatant ruler. In 60-61 A.D., she enthused and directed the biggest rebellion in opposition to Romans in Britain. Rome had got the wrong impression about Boudicca and the Iceni. Instead of yielding to Romans, Boudicca lifted up a massive army and guided them in opposition to Roman's forces in Britain. Nine out of ten Rome's legions were busy in Wales, combating with Druids. There was less-effective resistance as Boudicca and her territorial army swept into the business centre of Londinium on the Thames (Guy De La Bedoyere, 2003, pp. 64). Rome routed the Britons in one of the very old world's most blood-spattered massacres. The Romans way of life was not as good as all over the place than it is nowadays, mainly for the minor classes. The command was an armed domination - a benevolent one, but domination however. Possessing complete Roman nationality, the former soldiers were at the peak of the 'totem pole' amongst citizens. This was particularly significant as the essential feature of Romanization demanded the

Sunday, September 22, 2019

Strategic Analysis of Costa Coffee Market Entry to Azerbaijan Assignment

Strategic Analysis of Costa Coffee Market Entry to Azerbaijan - Assignment Example The chosen country is Azerbaijan which is located in Southwestern Asia, bordering the Caspian Sea, between Iran and Russia, with a small European portion north of the Caucasus range. (CIA 2012). It is of utmost importance that the company finds the niche factors that will guaranty its successful entry in Azerbaijan. Initial to the process is a research that analyzes the market. Objectives to be met are: a) to discover any advantage Costa Coffee may have over its competitors; b) To find if there is an unmet need or underserved needs of customers; and c) find the right segment. To complete the analysis, use of Michel Porter's model of analysis is prescribed. 1. Consumer Demographics. Azerbaijan has a total population of 9,643,000 as of 2011 (CIA). It is composed of 3,436,459 females and 3,307,88l males in the bracket of ages 15-64 and a male population of 227,172 and 367,675 bracket of 65 years and above. Population is composed of Azeri 90.6%, Dagestani 2.2%, Russian 1.8%, Armenian 1.5%, other 3.9% (1999 census). Population growth rate is 1.017% with a rank of 114 in world comparison. Baku, its capital holds 1.9 million people. 2. Product/service. Tea and coffee remain to be the favorite hot drinks in Azerbaijan. Euromonitor (2012) reports tea is consumed by almost 100% of its citizens, while coffee remains to be one of the stable areas in hot drinks, Multinationals strongly positioned here are Nestle, Unilever, and Ahmad due to the popularity of their brands. Brand loyalty is very strong in coffee. Their business structures are general partnership agreement with an LLC for Nestle, a trading company for Unilever, and corporation for Ahmad coffee. 3. Distribution channel. Hot tea and coffee products are sold in supermarkets and independent stores.  

Saturday, September 21, 2019

Romance Versus Reality Essay Example for Free

Romance Versus Reality Essay â€Å"The best laid schemes of mice and men go aft astray, and leave us naught by grief and pain for promised joy†¦Ã¢â‚¬  (Robert Burns). This quote means that the romantic themes in the book vanish and leave behind realistic shock. In â€Å"Of Mice and Men† by John Steinbeck, Lennie, George and Curley’s wife’s romantic dream of owning a farm is crushed by the reality of death. The dead mouse symbolizes that Lennie’s dream of taking care of rabbits will never come true. The dead puppy also proves he will never own the rabbits. Curley’s wife’s death again proves they will never get the farm because they won’t get the money she promised. Finally, Lennie’s death makes George realize the farm house dream would never come true. The mouse Lennie hides in his pocket from George, proves the point that Lennie will never take care of the rabbits. Lennie tries to convince George, the mouse was dead when he found it, â€Å"’Jus’ a dead mouse, George. I didn’ kill it. Honest! I found it. I found it dead.’† (Steinbeck 6). Lennie wants to someday take care of the rabbits on the dream farm, and if George knew he lacked self-control and accidently killed the mouse, Lennie’s dream would never come true. Although, in reality Lennie has actually killed the mouse and most likely other creatures. Overall showing, he will never gain enough responsibility and self-control to own the rabbits. Later on, Lennie is given a puppy with the purpose of showing George, that he might someday be able to someday take care of the rabbits. George wants to believe Lennie can take care of a puppy because it is bigger than a mouse. But Lennie ends up murdering the puppy and only worries that George will not allow him to take care of the rabbits. â€Å"’Maybe if I took the pup out and throwed him away George wouldn’t never know’†¦ ‘Don’t you think of nothing but rabbits?’† (Steinbeck 98). George hopes the puppy will prove that Lennie will be able to take care of the rabbits, but in reality he is let down again. Lennie destroyed his last opportunity to care for the rabbits by killing Curley’s wife. She wanted to make something out of her life, â€Å"’ I coulda make somethin’ of myself†¦maybe I will yet.’† (Steinbeck 96). Curley’s wife gave up her life savings to help buy the farm, but never her death they would never get the money. Her death foreshadows that the romance of the farm will die causing the reality that they will never own the farm. Lennie’s death shows George that the farm could have never happened. George realized he wanted the farm only because Lennie loved the idea of it. Deep down George never thought they would ever get the farm. â€Å"’I think I knowed we’d never do her. He†¦liked to hear about it†¦I got to thinking maybe we would.’† (Steinbeck 103). George only told the story to trick Lennie into following his rules. George listened to his stories of the farm, and obeyed him, because he did if he did not listen, he would not take care of the rabbits. Due to Lennie’s death, George no longer needs to dream of the farm anymore. Robert Burns explains there is conflict between reality and romanticism among the characters in the novel, Of Mice and Men by John Steinbeck. The character of the dead mouse shows to us that Lennie is not capable of taking care of the rabbits on the dream farm. The dead puppy again shows that Lennie cannot control himself, so he will never have the rabbits. Curley’s wife’s death shows they will never purchase the farm because they never will get her promised money. Lastly, Lennie’s death makes George realize they knew they would never actually get the farm, and that he only told the story for Lennie’s entertainment.

Friday, September 20, 2019

Comparison of Privacy and Communication on Social Networking

Comparison of Privacy and Communication on Social Networking I propose to conduct a research on the topic- A cross-cultural comparison of privacy and communication on Social Networking Sites between India and United Kingdom. Abstract My research will try to examine the cross cultural differences in the context of sharing personal information on Social Networking Sites (SNSs) and the various aspects of online privacy between the college students in India and the United Kingdom. To begin with, the research will require the students to complete a paper based survey with a variety of questions regarding their attitudes towards sharing personal information on social networks and privacy. It will also seek to better understand the behavioural issues by studying their communication pattern. The emphasis of this research will remain on identifying the commonalities and differences in the communication patterns and attitudes towards privacy between the Indian and UK students by conducting an empirical research. Literature Framework We define social network sites as web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site. While we use the term social network site to describe this phenomenon, the term social networking sites also appears in public discourse, and the two terms are often used interchangeably. We chose not to employ the term networking for two reasons: emphasis and scope. Networking emphasizes relationship initiation, often between strangers. While networking is possible on these sites, it is not the primary practice on many of them, nor is it what differentiates them from other forms of computer-mediated communication (CMC). What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks. This can result in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings are frequently between latent ties (Haythornthwaite, 2005) who share some offline connection. On many of the large SNSs, participants are not necessarily networking or looking to meet new people; instead, they are primarily communicating with people who are already a part of their extended social network. To emphasize this articulated social network as a critical organizing feature of these sites, we label them social network sites. Social Networking Sites (SNS) have achieved phenomenal success since the launch of sixdegrees.com in 1997. Original sites such as Friendster, Lunarstorm and MiGente, are now all dwarfed by the phenomenally successful Myspace1, and Facebook2. A useful historical record of the development of Social Networking sites was made by Boyd and Ellison in 20073, although more work is needed to understand the gratifications delivered how users derive a sense of identity and the cross cultural implications to users. The goal of this short paper is to weave digitization, identity and community into an analysis that is both historically rigorous and conscious of contemporary innovations. Launch Dates of Major Social Networking Sites (SNSs) Source: Social Media Graphics Among undergraduate college students, the three most visited social networking websites are Facebook, MySpace, and Friendster, with one study reporting Facebook use as the most popular at 90% (Stutzman, 2006) while another study reports Facebook use as most popular with 78.8% who à ¢Ã¢â€š ¬Ã‹Å"à ¢Ã¢â€š ¬Ã‹Å"sometimes or à ¢Ã¢â€š ¬Ã‹Å"à ¢Ã¢â€š ¬Ã‹Å"often use Facebook (Hargittai, 2007). Undergraduate students using Facebook averaged 10à ¢Ã¢â€š ¬Ã¢â‚¬Å"30 min daily use for the time categories and averaged 150à ¢Ã¢â€š ¬Ã¢â‚¬Å"200 friends for the friend categories (Ellison, Steinfield, Lampe, 2006). Students and alumni use Facebook to communicate, connect and remain in contact with others (Acquisti Gross, 2006; Charnigo Barnett-Ellis, 2007; Ellison et al., 2006). There are conflicting reports whether Facebook is used for dating with one study that reports such use (Charnigo Barnett-Ellis, 2007), while another study reports that students do not use Facebook for that purpose (Acqu isti Gross, 2006). Also, undergraduate students typically use Facebook for fun and à ¢Ã¢â€š ¬Ã‹Å"à ¢Ã¢â€š ¬Ã‹Å"killing time rather than gathering information (Ellison et al., 2006). Although Facebook is very popular among students, others have profiles on it too. Over the past decade, the communication uses of the Internet have become a very important part of young peoples lives (e.g., Gemmill Peterson, 2006; Jones, 2002; Lenhart Madden, 2007; Subrahmanyam Greenfield, 2008). Social networking sites are the latest online communication tool that allows users to create a public or semi-public profile, create and view their own as well as other users online social networks (Boyd Ellison, 2007a), and interact with people in their networks. Sites such as MySpace and Facebook have over 100 million users between them, many of them adolescents and emerging adults. Although research on young peoples use of social networking sites is emerging (e.g., Boyd Ellison, 2007b; Ellison, Steinfield, Lampe, 2007; Valkenburg, Peter, Schouten, 2006), questions remain regarding exactly what young people do on these sites, whom they interact with on them, and how their social networking site use relates to their other online (such as instant messaging) and off line activities. Furthermore, because of the potential to interact with known others as well as meet and befriend strangers on these sites, it is important to study the nature of their online social networks in order to get an understanding of how such online communication relates to young peoples development. The goals of the present study were to explore emerging adults use of social networking sites for communication and examine the relation between their online and offline social networks. Given the vast array of information that can be shared and the number of users, concerns regarding security and privacy issues are a recurring issue (Acoca, 2008). Some concerns involve potential threats to personal safety from the abundance of information that is assumed to be available and accessible about an individual on their online profile. Specifically, there are concerns regarding identity theft if users provide too much information (e.g., birth date, address, phone, full name etc.). In addition, there are concerns for personal safety for vulnerable users who could be stalked, or otherwise threatened. A less commonly considered threat is the possibility of social risk as a function of self-identification with minority or stigmatized groups. Although some of these concerns have surfaced in the popular media (e.g., news.cnet.com), there is little empirical investigation documenting how much and what kind of information is present in personal FACEBOOKà ¢Ã¢â‚¬Å¾Ã‚ ¢ profiles to determine the potential for threats of any type, nor is there any information regarding how users differ in the information disclosed in their profiles to provide clues as to who is most likely to be at risk. India is ranked fourth in the world in terms of the Internet users. It had a total population of 1,147,995,898 people by the year 2008, out of which 81,000,000 people were using the Internet which makes 7.1% of the total population of Internet users (Internet World Stats, 2009). Social networking is catching on fast. About 56 percent users do both social and professional networking on the Web, while 29 percent do only social networking (Madhavan, 2007). There are about 10 million people who are on social networking sites. What started with the popularity of Orkut in India has now become a cultural revolution. Even most of the schools going teens have an account on some social networking site (Java, 2007). Out of the total social networking users in India, only 1 mn to 2 mn (only 10% to 20%) are on Indian social networking sites. According to a recent report by comScore, Inc. (Mishra, 2009), visits to the social networking sites have increased by 51 percent from the last year. The stu dy also found that global social networking brands continued to gain prominence in India during the last year, with Orkut, Facebook, hi5, LinkedIn and MySpace each witnessing significant increases in visitation. Orkut reigned as the most visited social networking site in December 2008 with more than 12.8 million visitors, an increase of 81 percent from the previous year. Facebook, the second most popular social networking site, had 4 million visitors, up by 150 percent since last year. To make its position strong in the Indian social networking market, Facebook has launched an Indian interface which helps local users to connect with their friends in 6 different languages e Hindi, Punjabi, Tamil, Malayalam, Telugu and Bengali. This move allows users to choose any of the six languages and use it as per their convenience by selecting the language tab. MySpace also promotes a lot of India specific content like promoting musical talent and even taking their talent abroad thereby upliftin g the Indian culture. It is followed by local social networking site Bharatstudent.com with 3.3 million visitors (up 88 percent) and hi5.com with 2 million visitors (up 182 percent). Other popular networking sites in India featured in the list in descending order are ibibo, MySpace, LinkedIn, BigAdda and Fropper. Top Social Networking Sites in India by Unique Visitors December 2008 vs. December 2007 Total India e Age 15+, Home/Work Locations (excluding visits from cyber cafes, mobile phones and PDAs) Source: comScore World Metrix Users Demography for the United Kingdom Source: Socialbakers (2010) User age distribution on Facebook in United Kingdom Source: Socialbakers (2010) Male/Female User Ratio on Facebook in United Kingdom Source: Socialbakers (2010) Age Growth on Facebook in United Kingdom Source: Socialbakers (2010) Top 10 Countries on Facebook Source: Socialbakers (2010) Research Strategy The process will be initiated by the collection of social network data through a survey of Indian and UK college students. The population sample chosen for this research purpose will be a specific number of college going students in India and UK (to be decided at a later time). The sample will be restricted to a few hundred students from each country so as to make it easier to do a survey research. The student will be encouraged to participate and share their views on the subject of content sharing and privacy. The information provided by them will solely be used for the educational research purpose. The survey employed in this study will be based on a popular survey used previously by Pew Internet and American Life Project among American teenagers. The survey used in this research may differ in some ways to adjust the variations from previous similar researches. A copy of the original survey questions is available to consult on the Pew Internet and American Life Project website. The responses in the original survey were categorical, thus quantitative analysis will require performing chi-square (à Ã¢â‚¬ ¡2) test. Collection of data The primary data for this research will be collected by conducting a survey based on numerous questions that will seek to answer the questions based on information sharing and the degree of privacy maintained by students in their social profiles. The type of information sought is presented in the next section in the form of tables. However the level of information has been limited and the original research is expected to be more comprehensive in nature and may include more variables and situations. Other secondary data presented in the research will be collected from various social networking sites, social networking research services, network usage statistics, sharing and privacy reports published by various organizations. Research Methodology The purpose of this research determines its methodology. It will be a comparative study of Indian and UK college students attitudes and behaviour towards communication patterns and controlling privacy on Social Networking Sites (SNSs). Research Questions How do the students in India and UK differ in reference to privacy on Social Networking Sites? How do the students in India and UK differ in reference to communication patterns on Social Networking Sites? The college students in India and UK will be contacted through friend lists of my own friends on prominent SNSs. I will encourage my friends to persuade their friends on SNSs. Later on I will segregate the lists of Indian and UK college students for the purpose of comparison. I am expecting a response rate of nearly 60-70 percent. The results will be formatted according to the following tables. Table 1. Public Nature of Social Network Site Profile Degree to which your online social profile is public India N= X United Kingdom N= Y Visible to everyone Visible to friends of friends Visible only to friends Table 2: Attitude towards sharing personal information on SNSs Is it alright to share the following information on social sites? India United Kingdom à Ã¢â‚¬ ¡2 N df p State in which you live City in which you live College name IM Screen Names Birth date Family members names Relationship (s) Email address (es) Links to other personal blogs or websites Mobile Number Table 3: Types of information shared on SNSs Would you share the following detail on your social profile? India United Kingdom à Ã¢â‚¬ ¡2 N df p Surname Photos of yourself Photos of your friends Photos of family members City name High School name Email addresses MP3 files Video content Events list Birthdays Table 4: Response to contacting by strangers How would you normally respond to a strangers friend request? India United Kingdom Completely ignore Respond positively Decline the request Block the user Block and report the user to avoid further contact Table 5: Communication patterns on SNSs Do you usually do the following? India United Kingdom à Ã¢â‚¬ ¡2 N df p Post messages on friends wall or comment on their posts Send private messages to someone on your friend list Send private messages to someone not on your friend list Poke your friends Poke your friends friends

Thursday, September 19, 2019

Long and Short Term Causes of WWI :: World War I History

Long and Short Term Causes of WWI There were several long-term events that led to the outbreak of World War One. The most prominent factors include: nationalism, militarism, imperialism, the Balkan and Morocco crises, and the alliance system. Ironically, these things were either started in response to, or upheld because of, one of the other factors. The alliance system was one of the last factors to emerge before the war. Consequentially, the contributions of this system to the beginning of the Great War have to be considered. Although the alliance system was a main cause of the First World War, it arose because of several other factors, and did not cause the war single handedly. Nationalism, the love and support of one's country, has always existed. In this era, however, it was to take part in the creation of one of the most famous wars in history. Since so much pride was devoted to countries, it made the possibilities of peace between past rivals less probable. It also meant that most nations, especially the great powers, would rather fight a war than back down from a rival's diplomatic provocation. In effect, nationalism was also a contributing factor to the alliance system. No country feels comfortable being in a war alone, and with the growing militaries in almost every country, allies provided much comfort. The supreme present of militarism, "a policy of aggressive military preparedness" , in this period of time gave all countries great reason to feel the heavy weight of an oncoming war. Great Britain's naval policy (to always be twice as big as the next two largest navies put together), along with the predominate feeling of war provided countries with a strong reason to try and create an incredibly strong military force. This led to an arms race, which made the impending war seem inevitable. The military planning in some countries also caused an increased fear of war. Since military machines were being developed, each country was appointing a general staff of experts. The greatest problem with this was that there was a fear that "some chief of staff, in order to maintain the schedule on his 'timetable', might force an order of mobilization and thus precipitate war." These two factors also led, in part, to the alliance system. If two or more countries are allied with each other then the y have a better chance of defeating their common enemy if war is declared.

Wednesday, September 18, 2019

Animal Rights is a Cause for Vegetarianism Essay -- essays research pa

Animal Rights - Cause for Vegetarianism The choice of eating meat or not has been a debated issue for a continued number of years. There have long since been two sides: the proponents and opponents of meat consumption. More and more debates of its value and effect on the world have risen. Many claim it is wrong, while others think of it as a needed pleasure. Today, a greater percentage of the population eats meat. Only a few individuals seek the alternative route. Yet, there has been a steady rise in the number of vegetarians. Many may already know that religions all over the world have advocated a meat-free diet. While a few are lenient, the majority is steady. The reason a vegetarian diet has been preferred over meat dates back thousands of years. Take for example, the Christian tradition. Although most are now lenient, previously many great saints advocated a meat-free diet, for more reasons than one. In the beginning it was said by God, " Here I have given you all vegetation bearing seed which is on the surface of the whole earth...to you let it serve as food." (gen.1.29) Later it was spoken by Jesus of the commandment, "thou shall not kill". Jesus said, "You heard that it was said to those of ancient times, 'Thou shall not kill; and whoever shall kill shall be in danger of the judgment."(Matthw.5.21) There is also the Hindu tradition, where a meatless way of life has gone on for thousands of years (until the invasion by foreign rule,...

Tuesday, September 17, 2019

North Korea: Nuclear Friend or Foe? :: Nuclear proliferation

North Korea: Nuclear Friend or Foe? Introduction It is 2025. After decades of bickering and intense fighting, India and Pakistan finally break out into general war. Millions are killed in the nuclear exchange. Other countries are drawn into the fray, ultimately widening the landscape of war. The death toll reaches a billion lives. In essence, you are witnessing a nuclear holocaust. Fortunately, this is a completely fictitious event; something one would think was straight out of a movie. The scary part is that as more and more countries begin to acquire nuclear weapons, further nuclear research, and pursue other nuclear-related projects, this can be very real. It might happen in ten years, a few months, or even – tomorrow. The issue of nuclear proliferations is an issue of much concern by the United States. Since its creation back in the 1940s through the Manhattan project, the atomic bomb has been the bane of society, in terms of the level of potential threat it holds for the international community. The focus of this paper looks at U.S. policy towards nuclear proliferation, both past and present, with a special focus on the status of North Korea. For some analysts and many governmental officials, North Korea seems to be the next big threat to U.S. and international security. Proponents of this belief cite statements made by North Korea, efforts to enrich used fuel rods, and other pursuits to utilize nuclear power in some way or other. In an effort to really break down on a critical level the United States’ approach towards the country of North Korea, this paper examines not only the historical context of U.S./North Korea relations, but also the U.S. stance towards proliferation among such countries as Iran, Libya, Israel, India, Pakistan, and other countries. In using other countries to compare and contrast U.S. policy, hopefully this will bring about some sort of rationale behind the approach to North Korea. Understandably, the issue is way more complex than just a chosen stance towards each individual country. History, political balance, as well as, the intent of the U.S. administration at the time shape the policy instituted toward the particular country. A Colored History On June 27, 1950, President Harry S. Truman â€Å"authorized the use of American land, sea, and air forces in Korea; a week later, the United Nations placed the forces of 15 other member nations under U.

Monday, September 16, 2019

Pagibig Sa Tinubuang Lupa Poem Analysis Essay

This poem was written in Tagalog by one of the heroes of the Philippines but there are English translations as well,probably since it is a very good poem that not only Filipinos can read and appreciate it but other nationalities can too. Some lines that struck me are: â€Å"Aling pag-ibig pa ang hihigit kaya sa pagkadalisay at pagkadakila gaya ng pag-ibig sa tinubuang lupa? Aling pag-ibig pa? Wala na nga, wala.† This stanza translates to- ‘What love can surpass purity or greatness like love of country? None.’ It can be seen in the first part of the poem. I like the message of this because it will be agreeable to most people. When we think of it, if you love your country, it means you do not only think of yourself, but all the people around you. You care for the well-being of other people, and only wish them well. You try to help others in the best way you can. If you love your country, it means you are loyal and committed and that you are too with the people you encounter in your life. Overall, this poem is about being proud of one’s nationality and country. We have to love, praise, and fight for our own country and appreciate the things that it has to offer for us. This poem makes me proud to be a Filipino and proud to have a hero like Andres Bonifacio who fought and battled to save his fellowmen and country. He was not only thinking of himself, but also the sake of other people. We should be just like him and start loving our country and not complain about things we don’t like in it since it will not do anyone good anyway, instead we should start helping out in our own simple ways to make our country a better place.

Weighted Average Cost of Capital

WACC: Weighted average cost of capital =WACC= SS+B? Rs+BS+B? RB? 1-tC note: Rs , cost of equity; RB , cost of debt; tC , corporate tax rate. For cost of equity, Rs, we calculate it by using the SML, according to CAPM model. Rs=RF+ [RM-RF] As we can see in the chart behind the case, beta of Worldwide Paper Company is 1. 10; the Market risk premium (RM-RF) is 6. 0%. Because this on-site longwood woodyard project has six year life and the investment spend over two years, the total long of this program is more closer to 10-years, we choose the 10-year government bonds as risk free rate, 4. 60%.Thus, Rs=4. 60%+1. 10? 6. 0% =11. 20%. For the cost of debt, there are two kinds of debts of Worldwide Paper Company, bank loan and long-term debt. The cost of long-term debt is 5. 78% (A rating 10-years maturities corporate bonds) , and the value of long term debt is $2500M. Thus, RB=5. 78%. For the value of equity and debt, market value weights are more appropriate than book value weights, becaus e the market values of the securities are closer to the actual dollars that would be received from their sale. There are the market weights expected to prevail over the life of the firm or the project.S=500? $24. 00=$12,000M; B=$2500 RWACC=1200012000+3000? 11. 20%+300012000+3000? 5. 88%=9. 76% Payback Period: YEAR| 2007| 2008| 2009| 2010| 2011| 2012| 2013| Total CF of investment| -16| -2. 4| -0. 6| Â  | Â  | Â  | 2. 08| OCF| Â  | 2. 88| 4. 5| 4. 5| 4. 5| 4. 5| 4. 5| Cumulative CF| -16| -15. 52| -11. 62| -7. 12| -2. 62| 1. 88| 8. 46| Thus, the payback period is 4+2. 624. 5=4. 58 year. Discounted Payback Period: YEAR| 2007| 2008| 2009| 2010| 2011| 2012| 2013| Total CF of investment| -16| -2. 4| -0. 6| 0| 0| 0| 2. 08| discounted CF of investment| -16| -2. 18| -0. 0| 0| 0| 0| 1. 18| OCF| Â  | 2. 88| 4. 5| 4. 5| 4. 5| 4. 5| 4. 5| discounted OCF| Â  | 2. 62| 3. 73| 3. 39| 3. 09| 2. 81| 2. 56| sum| -16| 0. 44| 3. 23| 3. 39| 3. 09| 2. 81| 3. 74| Cumulative CF| -16| -15. 56| -12. 33| - 8. 94| -5. 85| -3. 04| 0. 70| Thus, the discounted payback period is 5+3. 044. 5=5. 81 year. Average Accounting Method: YEAR| 2007| 2008| 2009| 2010| 2011| 2012| 2013| average| net income| Â  | -0. 12| 1. 5| 1. 5| 1. 5| 1. 5| 1. 5| 1. 23| investment| 16| 15. 4| 13| 10| 7| 4| 0| 9. 34| Thus, AAR=Average net incomeAverage investment=1. 239. 34=13. 16% Weighted Average Cost of Capital WACC: Weighted average cost of capital =WACC= SS+B? Rs+BS+B? RB? 1-tC note: Rs , cost of equity; RB , cost of debt; tC , corporate tax rate. For cost of equity, Rs, we calculate it by using the SML, according to CAPM model. Rs=RF+ [RM-RF] As we can see in the chart behind the case, beta of Worldwide Paper Company is 1. 10; the Market risk premium (RM-RF) is 6. 0%. Because this on-site longwood woodyard project has six year life and the investment spend over two years, the total long of this program is more closer to 10-years, we choose the 10-year government bonds as risk free rate, 4. 60%.Thus, Rs=4. 60%+1. 10? 6. 0% =11. 20%. For the cost of debt, there are two kinds of debts of Worldwide Paper Company, bank loan and long-term debt. The cost of long-term debt is 5. 78% (A rating 10-years maturities corporate bonds) , and the value of long term debt is $2500M. Thus, RB=5. 78%. For the value of equity and debt, market value weights are more appropriate than book value weights, becaus e the market values of the securities are closer to the actual dollars that would be received from their sale. There are the market weights expected to prevail over the life of the firm or the project.S=500? $24. 00=$12,000M; B=$2500 RWACC=1200012000+3000? 11. 20%+300012000+3000? 5. 88%=9. 76% Payback Period: YEAR| 2007| 2008| 2009| 2010| 2011| 2012| 2013| Total CF of investment| -16| -2. 4| -0. 6| Â  | Â  | Â  | 2. 08| OCF| Â  | 2. 88| 4. 5| 4. 5| 4. 5| 4. 5| 4. 5| Cumulative CF| -16| -15. 52| -11. 62| -7. 12| -2. 62| 1. 88| 8. 46| Thus, the payback period is 4+2. 624. 5=4. 58 year. Discounted Payback Period: YEAR| 2007| 2008| 2009| 2010| 2011| 2012| 2013| Total CF of investment| -16| -2. 4| -0. 6| 0| 0| 0| 2. 08| discounted CF of investment| -16| -2. 18| -0. 0| 0| 0| 0| 1. 18| OCF| Â  | 2. 88| 4. 5| 4. 5| 4. 5| 4. 5| 4. 5| discounted OCF| Â  | 2. 62| 3. 73| 3. 39| 3. 09| 2. 81| 2. 56| sum| -16| 0. 44| 3. 23| 3. 39| 3. 09| 2. 81| 3. 74| Cumulative CF| -16| -15. 56| -12. 33| - 8. 94| -5. 85| -3. 04| 0. 70| Thus, the discounted payback period is 5+3. 044. 5=5. 81 year. Average Accounting Method: YEAR| 2007| 2008| 2009| 2010| 2011| 2012| 2013| average| net income| Â  | -0. 12| 1. 5| 1. 5| 1. 5| 1. 5| 1. 5| 1. 23| investment| 16| 15. 4| 13| 10| 7| 4| 0| 9. 34| Thus, AAR=Average net incomeAverage investment=1. 239. 34=13. 16%

Sunday, September 15, 2019

The Effects of Steroids on the Human Body and Steroid Abuse

The Effects of Steroids on the Human Body and Steroid Abuse by Athletes For many years, the use and abuse of anabolic-androgenic steroids have been linked closely to athletes. Steroids come in different forms. They can be taken in pill form or injected straight into the user’s muscles by a needle. There are many sports that are associated with steroid abuse like weightlifting, basketball, and track and field. Anabolic-androgenic steroids are synthetic forms of male sex hormones, like testosterone.They speed up the growth and development process of muscles in the body. Steroids were originally developed around the 1930s in order to treat hypogonadism, which is a disease that prevents the male testes to not produce enough testosterone for its functions. Once scientists began to test steroids on animals, the same effect of increased muscle size was present in the animals. This immediately led to the abuse of steroids by body and weight lifters, and then closely followed by athletes from all kinds of different sports to enhance their performances.Whet her the user is male or female, certain sexual mannerisms of the male body will begin to produce in their body. There are several temporary and permanent side effects of abusing steroids. Temporary side effects include acne, increased breast size in men, and aggression. The sebaceous glands in the skin become inflated with excessive steroid use. Once this happens, the oils in the glands are increased which causes the skin to break out with acne. Another effect would be gynecomastia (increased breast size in men).This occurs when the body converts extra testosterone into female hormones, like estrogen, and female breast tissue is sometimes formed creating breasts on the man. Females will also experience male characteristic changes to their bodies. They might notice that their voices may be deepening because the testosterone from the steroids sends male signals to the brain. Facial hair and body hair with begin to grow rapidly on the female’s body, along with coarse skin and sh runken breasts. Both men and women will experience â€Å"roid rage† which is a heightened aggression for no certain reason.This anger can lead to irritability, stress, and violence. The long term side effects can include HIV, cardiovascular problems, stunted growth, and weight problems. HIV, not taken very seriously by must steroids abusers, is one of the most dangerous and deadliest side effects of steroids. This is because people don’t think they can get HIV even though most of the time they are sharing their needles with a numerous amount of other users. HIV could be spread from one person to another just by using one needle.Using steroids can increase one’s blood cholesterol which can lead to heart problems, heart attacks, and even strokes. The new weight of the user’s muscles puts an unnecessary strain and pressure on the heart, because it has to pump more blood to so much more tissues in the muscles. Stunted growth mainly affects teenagers going thr ough puberty because once the brain senses a certain amount of hormones in the body; it sends a message to the bones to stop growing to the teenager will most likely be shorter than the average height for their gender, ge, and weight. One last long term side effect of using steroids would be weight gain and other weight problems. People who eventually stop abusing steroids often end up having a weight problem. If they bulked up with lots of muscle, these muscles will turn to an absurd amount of fat on their body. They also have an issue with losing the excess fat because the muscles were so used to being injected with steroids. The World Anti-Doping Agency (WADA) has written a list of banned drugs that all athletes are not allowed to use to enhance their performance.The list includes steroids that can be taken orally or steroids that can be injected by a needle into the abuser’s muscle. There have been thousands of athletes that have been banned from the respective sports bec ause of doping (using steroids) while training and/or participating. Several doping scandals in the athletic world have unfortunately come up in the past. One example would be the steroid scandal of Marion Jones. She had won the 100 meter dash, 200 meter dash, and the 4Ãâ€"1 meter relay in the Sydney Olympics.Around 2005, there was an investigation to see whether she was doping or not. Marion denied ever using steroids before or during the Summer Olympics. But in 2007, she admitted in court that she lied to the investigators and two grand juries saying she had in fact used steroids during the Summer Olympics. Because of this confession, she was sentenced to six months in 2008 prison for lying to the prosecutors who were investigating her case. In an interview with Oprah, Marion Jones admitted that she most likely could have won in the Sydney Olympics without the use of steroids.Honestly, if she was confident enough to know that she was going to win without doping, what was the poin t of taking steroids in the first place? It makes me sad to hear that there are hundreds of thousands of doping scandals like this and even in other sports. If you’re good enough in what you’re doing, I think that you don’t need to over-do it by adding steroids into the mix. Marion was stripped of her gold medals from Sydney. Nowadays, WADA and other anti-doping agencies are cracking down harder on drug testing athletes several times before and after games and races.If you know you’re not good enough and you feel like you have to take steroids, don’t bother wasting your time because sooner or later someone is going to find out and you’ll end up embarrassing yourself and your family. It feels better to win knowing that all you did was work hard, keep to eating a healthy diet, and train as much as you could, instead of getting lazy and buying steroids. I understand people need to see that they are â€Å"the best† instead of just believi ng it, but there are other ways to improve your performance and do well in whatever sport you play.

Saturday, September 14, 2019

Alexander Technique

The famous Athenian comic playwright Menander (342-291 B. C. ) once said â€Å"health and intellect are the two blessings of life. † This was the standpoint of his almost realistic depiction of a situational character as a stand-up comedian wherein mind and body were overjoyed upon Menander’s satires. Probably the best aspect of Menander’s hilarity was his insightful mental and physical gestures that captivated the spontaneity which he conveyed to the audience.The conveyance of mental and physical gestures have indeed become the therapeutic norm of the Australian actor and Shakespearean orator Frederick Matthias Alexander (1869-1955) who then discovered a technique of effective vocalization through mental and physical easement and control known as the ‘Alexander Technique’. In this regard, this paper will discuss several studies on the Alexander Technique which has been known and adopted by most stage and movie performers and has been publicly recomm ended to be used as therapy. What is Alexander Technique?According to the electronic journal, ‘The Complete Guide to Alexander Technique’, the Alexander Technique (AT) was developed in the early 1900’s by Frederick Matthias Alexander (1869-1955) to release his chronic laryngitis tension for best vocal performance which he later developed as a complete mental and physical therapy. Based on the personal experience of renowned health columnist of the New York Times Jane Brody, the Alexander technique is a method of adjusting body postures to relieve her damaging stresses, like relieving her neck tension, occasional pain, and even crippling spasms (Brody, 1990).Moreover, according to Anne Rickover’s Life Bridge Coaching, the Alexander Technique can be helpful to everyone, especially those who are engaged in the delicate harmonization of the mind and body [like actors, dancers and musicians], as well as to injured musicians. Today, the mastery of this technique is required in various arts and music schools across Europe, America and Australasia. (Rickover, R. , 2007). Rationale of method According to Nicholas Brockbank, a teacher of the Alexander Technique, the functions of mind (mental) and body (physical) are the primary coordinates in using the Alexander Technique.Thus, the coordinative functions are the basic method of application or usage. The discovery of functional coordinates [as a method] was regarded by Frederick Matthias Alexander when he felt his voice or vocalization was â€Å"vacillating† (Brockbank, 2007). In front of a mirror, Alexander observed the inconsistency of his voice to his mind setting. Moreover, the mind and the body were â€Å"indivisible† human faculties from which the way people think the way they acted was the primary cause of their physical ills (Brockbank, 2007).Brockbank concluded that the method of coordinating mind and body are elements of â€Å"physical habits† that Alexander Techn ique adopts the method of functional coordinates (Brockbank, 2007). Application of method Upon Frederick Matthias Alexander’s discovery and adoption of the method, he was inspired and encouraged to share it with performing artist, most especially with the musicians and the vocalists, which he thought were stressed during the rehearsals with the added anxiety (stage fright) in front of the audience.To cite, the mental and physical movement must be applied with proper coordination and function [as the presence of mind and body] that eventually meets and sets aside the complex of stress that may result to Repetitive Strain Injury (which becomes a medical term known as RSI), which is a common injury of singers, musician, and dancers (Brockbank, 2007).The Alexander Technique has developed as an effective and applicable method in coordinating the mental and physical functions and are used by most of the performing artists like Paul McCartney, Yehudi Menuhin, Sting, Julian Bream, Ja mes Galway, and the conductor, Sir Adrian Boul (Brockbank, 2007). It has also been integrated into the curriculums of various schools such as the Juilliard School of Performing Arts in New York, The Royal College of Music in London, the Royal Conservatory of Music in Toronto, and other schools of music, universities and colleges around the world (Brockbank, 2007).Findings, descriptive procedures, and relevance The descriptive procedures in applying the method of Alexander Technique are found to be similar to the method of â€Å"Ergonomics†. Several â€Å"naturalists† [or those using the natural cure and therapy] believe that what Frederick Matthias Alexander discovered was a â€Å"self-taught† procedure which he incidentally applied and thought as his own method. In which case, the naturalists acknowledges Alexander’s discovery as an applied natural science.Meaning, Alexander theorized and practiced the application of Ergonomics method in which several me thods of natural cure were only limited to countries like Asia, Africa, the Middle East and other parts of European countries. Moreover, according to Mark Hyman’s journal, Alternative Therapies in Health and Medicine, the natural cure through therapy has long been practiced by the Egyptians, Africans, Chinese, and the Malays. Among of the indigenous and famous natural cures are Acupuncture, Acupressure or the Thai massage, aromatherapy, Reiki, and what is commonly known today as methods of â€Å"Reflexology† or Physical therapy (Hyman, 2008).According to Holly A. Sweeney, a certified Ergonomist, the only method that is being recognized in Alexander Technique is that the functional use of mind and body coordinates without external physical manipulation. In addition, the power of thinking (mind) has some degrees or level of dictation to what the physical (body) self shall do or to do (Sweeney, 2007). Based on Sweeney’s findings, the term â€Å"ergonomics† i s derived from the two Greek words â€Å"ERG† (meaning to work) and â€Å"NOMOI† (meaning natural laws).The study of Ergonomics focuses on human capability towards work, in which the connection or link to work shall meet the â€Å"demand† or performance of human capability that has the following fundamentals: (1) All work activities should allow the worker take on equally healthy and safe postures, (2) Muscular force has to be exerted it should be done by the largest appropriate muscle groups available, and (3) Work activities should be carried out with the joints at about mid-point of their range of movement which applies specifically to the head, trunk, and upper limbs. (Cortlett, 1983; in Sweeney, 2007).It may be deduced from the findings of Sweeney that Ergonomics is very much interrelated technique to Alexander’s, considering the fact that Ergonomics also covers all â€Å"stress-out† methods, which is also known as stretching at the sudden spa sm of body joints and muscles while at work. However, the recognition of Alexander Technique [although parallel to Ergonomics] has been carried out by the unique method of â€Å"exercising out† the stress from the vocal chords of the singer and larynx of musicians [using pipe instruments] through coordination of â€Å"psycho-physical† functions (Sweeney, 2007).In addition, the functional â€Å"psycho-physical† coordination invokes the prowess of the performer with a sudden â€Å"gush† of esteem and self-confidence that conveys the good physical posture and perfect vocalization (Sweeney, 2007). Conclusion Natural cure is indigenous and partly an evolutionary medicine that complements the continuous development of medical sciences. Indeed, what has been quoted by Menander (342-291 B. C.), that â€Å"health and intellect are the two blessings of life†, has been proven by the theory and practice of Frederick Matthias Alexander. The Alexander Technique is a natural therapy that must impart furtherance of developmental studies as a restorative healing method that adheres to preventive medicine. The medicinal value indicates the benefits, usefulness, and cost efficiency. However, the practice of the Alexander Technique may only be limited and relevant to occupational work of renowned expertise.The practice of Alexander Technique could be more beneficial, appropriate, and therapeutic when valued at the large-scale advocacy of treatment. Over the years, the accompanying development of medical science has brought in trial and error of scientific exploits. The medical malpractice in diagnostic and hospitalized treatment still occurs around the world, although the incidents are few and not alarming. The paranoia may not only be a post-surgical trauma but a social stigma. Practically, no one wants to be hospitalized.This mainly due to the large costs of hospitalization, scarcity to healthcare benefits or medical welfare (specifically in p oor countries), the surging prices of medicines, and the anxiety to medical treatment or â€Å"medical phobia†. It can be then deduced that various forms of natural healing, like Alexander Technique, could be rationalized into a broader social perspective as a preventive alternative medicine rather than always resorting to hospital cure. References Brody, J. (1990). ‘Personal Health’. New York Times electronic magazine.Retrieved 10 May 2008 from http://query. nytimes. com/gst/fullpage. html? res=9C0CE0DB1031F932A15755C0A966958260&sec=&spon=&pagewanted=all. Brockbank, N. (2007). ‘What did Alexander Discover – And why is it Important? ’ . Retrieved 10 May 2008 from http://www. alexandertechnique. com/articles2/brockbank/. Hyman, M. A. (2008). ‘Alternative Therapies in Health and Medicine’. InnoVision Issue Vol. 14, No. 3. Retrieved 10 May 2008 from http://www. alternative-therapies-digital. com/alternative-therapies/20070506/?sub_id =DLuKONBMDWMwD. Rickover, R. (2007). ‘Life Bridge Coaching’. Retrieved 10 May 2008 from http://www. lifebridgecoach. com/lbcmain. htm. Sweeney, H. A. (2007). ‘Applying Ergonomic principles in the Workplace: How the Alexander Technique can help’. Retrieved 10 May 2008 from http://www. alexandertechnique. com/ergonomics. htm. The Complete Guide to Alexander Technique (2008). Electronic Journal of the Institute of Alexander Technique in Nebraska and Toronto. Retrieved 10 May 2008 from http://www. alexandertechnique. com/.

Friday, September 13, 2019

Abortion Essay Example | Topics and Well Written Essays - 2250 words

Abortion - Essay Example Spontaneous abortions refer to the natural process during which the human body rejects and expels the fetal contents without any â€Å"voluntary involvement or utilization of induction methods† (102). These events are often the source of great psychological distress to expecting parents and communities. However, the real social dilemma is regarding induced abortions; which refer to a voluntary disruption of a pregnancy brought upon through medical intervention (Hou Chap. 29). As a legal matter, the Supreme Court of United States supported the right to abortion in the judgment given for Roe v Wade case (Hou, Chap. 29). It was seen as the biological right of a woman to decline to carry an undesired child to term, as her physiological right. After this decision was taken there was a significant increase in the rate of abortions in the country (National Right to Life Committee, 4). But not everyone in either the public or private sector agreed with the decision and different states in the United States implemented separate legislations with varying degrees of leniency with regards to the accessibility to abortion services (Hou, Chap. 29), and in many states the debate for the right to abortion is still going on. Recent trends reveal that there is a reduction in abortion rates in the country (National Right to Life Committee 4), indicating that the perspective of the population has shifted against the process, which is labeled â€Å"barbaric† by individuals who oppose it. Anti-abortion perspectives are fueled by the concern for the rights of the unborn child as well as the sanctity of human life – eliminating a human life destroys the sense of a safe and beneficial society for all. Given these sentiments, states with the majority against abortion should implement strong anti-abortion policies which can guide