Saturday, August 31, 2019

Thinking about qualitative data collection & analysis for grounded theory Essay

Communication Strategies Introduction Research Design                   Creswell, John. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 3rd . New York: SAGE Publications, 2011.                   The research will incorporate a well-crafted research design to enhance an effective data collection. The design describes how data collection will be done, the relevant participantsto involvein the study, and the materials or instruments that will be used for data collection. This is done with considerations of the objective of the study. The research main aim is to evaluate The Relationship between Social Media and Effective Publicity in Organizations.                   Due to the nature and the phenomenon of the study, a qualitative research design is selected. This is because the design will employ a multi-method approach which is comprehensive in data collection and it ensures a qualitative data interpretation.                   Festinger, David. Essentials of Research Design and Methodology . New York: SAGE publishers, 2013. Participants                   The study targets a population with the relevant information that will lead to approximately accurate findings. The participants will involve customers, employees, and suppliers of selected organizations. These individualsshould have knowledge of social media, its application in business and they have an experience of the new technology in their daily business and organizational activities. A sample of 10 respondents will be selected randomly from the targeted population. This will involve different people using the social media platforms in their daily lives. The study assumes that all the data collected from the respondents is representative of the prevalentstate to usage of social media in publicity of firms.                   Vogt, Paul. Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Cambridge : Cambridge University Press, 2012.                   The study will employ a simple random technique in sampling the population. This is technique is selected because it is easy to use and manageable. It also minimizes bias in sample determination because the sample is selected randomly. The technique will enable the research get information from respondents selected randomly. This is important because sample will cover different people in different organizations at unique situations hence a comprehensive data collected.                   Stephene. Thinking about qualitative data collection & analysis for grounded theory. Cambridge: Cambridge University Press, 2013. Data Collection                   Validity of data collected defines the success of a conducted research. To achieve this goal, the study intends to utilize both secondary and primary sources of data. The primary sources data will be collected fromthe targeted respondent to the investigation. The secondary sources will include reports published by the selected organization giving the correlation between social media and the publicity of organizations.                   Patton, Michael. Qualitative Research & Evaluation Methods: Integrating Theory and Practice. New York: SAGE Publications, 2011.                   The materials that will be used for data collection are observation, interview schedules, and questionnaires. This instruments of data collection were selected due to the qualitative nature of the research. Well-structured questionnaires with both closed and open ended questions were administered to the targeted participant to the study.                   Maxwel, Joseph. Qualitative Research Design: An Interactive Approach (Applied Social Research Methods). New York: SAGE Publications Inc, 2012.                   Open-ended questions will give the respondents an opportunity to give their opinion on the relationship between social media and publicity of organizations. This aims at gathering any other additional information relevant to the study. Furthermore, the closed ended questions in the questionnaires will collect specific data from the respondents. The closed ended questions are important because they give a certain uniformity in responses and makes it easy for analysis. Before sending the questionnaires to the participants, all the vague questions will be eliminated to make the eventual data collected relevant and easy to analyze. The questionnaires will be sent to the respondents through their emails. Interviews will be done on phone where the sample population will be contacted and asked relevant questions that will address the research objectives. Conclusion                   A research design is one of the important elements that makes any study complete and successful. Due to the topic under investigation, a qualitative approach is taken. The study targets a sample of 10 participants from the targeted population and it will use a simple random technique to arrive at the sample. Data will be collected through interview schedules and administering of questionnaires. References Creswell, John. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 3rd . New York: SAGE Publications, 2011. Festinger, David. Essentials of Research Design and Methodology . New York: SAGE publishers, 2013. Maxwel, Joseph. Qualitative Research Design: An Interactive Approach (Applied Social Research Methods). New York: SAGE Publications Inc, 2012. Patton, Michael. Qualitative Research & Evaluation Methods: Integrating Theory and Practice. New York: SAGE Publications, 2011. Stephene. Thinking about qualitative data collection & analysis for grounded theory. Cambridge: Cambridge University Press, 2013. Vogt, Paul. Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Cambridge : Cambridge University Press, 2012. Source document

Digital Signal Processing

The concept of digital signal processing has been widely used these days, as it has provided many benefits to the users with its capability of converting analog signals into digital signals to facilitate the process of transmission. The encoding techniques are available which were developed after a comprehensive research to support and enable the transmission of digital signals to meet the user requirements. Apart from that, the process of ramification of every signal into many frequency bands where ever band has been digitally encoded by itself is termed as sub-band coding. Furthermore, it is better to encode lower frequency band with more bits than the higher frequency bands because the lower frequencies hold most of the speech energy. Sub-band coding method is mainly used to solve this particular problem. This paper depicts the benefits and the importance of sub-band coding, as well as it explains the steps involved in performing sub-band coding.The method of sub-band coding has b een widely practiced for the purpose of transmitting digital signals. For efficient signal encoding this particular method has provided many benefits. Moreover, sub-band coding has also been used for many years in audio industry for high quality digital audio transmission. At first, there is only one signal available which is then subdivided in many numbers of smaller sub-bands where every single number composed of a fractioned spectral of the actual spectrum from that actual signal. This process of dividing signal into sub-band will further assist each band to be transformed through distinct number of bits for every sample, and further every single band is classified according to its step size. By performing the above process resulted in a finer signal quality (Proakis and Manolakis, 2007).After completing the above process, it will now be possible to encode every single band separately according to the following set of steps. The starting step of the digital signal processing is t o apply the filtering required for the signal, which might be a high pass or a low pass signal. The purpose of filtering is to avoid the noise linked with the signal. The frequency of noise associated with the signal can be high or low, depends upon the actual signal requirement. Apart from that, to reduce the sub-band sampling rates, filters are used to minimize the bit rate in the signal encoding process. This method helps to reduce the signal on every band from a factor of two in sampling rate, which suggests that every second sample must be taken from the signal in the process of digital signal processing (Crochiere, 1981).Furthermore, the above step can be elaborated as if the signal is x[0-6], the samples taken from this would be x[0], x[2], x[4], and x[6]. The major reason of sampling through this method is to make sure that the reduced number of samples which would be quantized based on the following phase, which makes the quantization step to be as efficient and as quick as possible.The next step includes the quantization of signal on each band. In this process of quantization involves quantization noise to all the bits that are going to be sampled. However, at the   receiving end, all those signals which are acquired from the process of quantization   are to be   sampled from the   factor of two. By doing this method if the input signal is x[0-6], the output signal would now results in x[0], x[2], x[4], x[6]. Through performing this step, the identical number of samples before down sampling would be obtained where every substitute sample was missing (Veldhuis, Breeuwer, and Van Der Wall, 1989).The following step in the process of sub-band coding is to apply filters on all signals located at every single band where every filter should be of similar type which are used in the previous steps. Moreover, all filters are now used to lessen the number of sub-band sampling rates. These signals already moved through the quantization and the up and dow n sampling stages which results in proper mode of decoding (Schaffer and Rabiner, 1973).The final step requires amalgamating the signals from many sub-bands to achieve the output signal and to produce an altered version of the input signal. The following equation shows that there is only one band available from the two bands that will move in the equivalent process.X1 (z) is the signal on the transmitting end, which was acquired after moving from the H1(z) also known as the high-pass filter which is:X1 (z)= x1 (0)+ x1 (1) z-1+ x1 (2) z-2+ x1 (3) z-3   Ã¢â‚¬ ¦_____ â€Å"1†X1 (-z)= x1 (0)- x1 (1) z-1+ x1 (2) z-2- x1 (3) z-3   Ã¢â‚¬ ¦_____ â€Å"1A†It is therefore proved that Z-transformed is actually a result of passing a high pass filter to the signal which is the actual input x[n]. X1 (z)= X (z) H1(z) _____ â€Å"2†The down sampling has been performed by the factor of two on the signal which is originally X1 (z) will now be presented by Y1(z) signal as show n in the following equation:Y1(z) = y1 (0)+ y1 (1) z-1+ y1 (2) z-2+ y1 (3) z-3 †¦_____ â€Å"3†Y1(z)   = x1 (0)+ x1 (2) z-1+ x1 (4) z-2+ †¦_____ â€Å"4†The equation â€Å"4† mentioned above, explains that the down sampling effect has removed every single alternate sample available.However, at the other end signals that were previously up sampled, will now be considered as U1(z) at which every single alternate sample is equal to zero value.U1(z) = u1 (0)+ u1 (1) z-1+ u1 (2) z-2+ u1 (3) z-3   Ã¢â‚¬ ¦U1(z) = y1 (0)+0+ y1 (1) z-2+ 0+y1 (2) z-4+ †¦U1(z) = y1 (0)+ y1 (1) z-2+ y1 (2) z-4+ †¦ from â€Å"4†Ã‚   U1(z)= Y1(z2)U1(z) = x1 (0)+ x1 (2) z-2+ x1 (4) z-4+ x1 (6) z-6 †¦U1(z) = (X1(z)+X1(-z))/2 = X(z) H1(z)+X(-z) H1(-z)/2__†5†Besides, the U1(z) signal now move towards the next high pass filter which is K1(z) which is positioned at the receiving point and specified as:V1(z)= U1(z) K1(z) =  ½ K1(z) [X(z) H1(z) )+X(-z ) H1(-z)] â€Å"6†Furthermore, the final output signal will now be created after each sub-band output is added which results in the subsequent equation:X_out(z)=V1(z)+ V2(z)X_out(z)=  ½ K1(z) [X(z) H1(z) )+X(-z) H1(-z)] +  ½ K2(z) [X(z) H2(z) )+X(-z) H2(-z)] .X_out(z)=    ½ [H2 (z) –H2 (-z)] X(z).When the final output is obtained, to make equation more expressive, it will now be altered into the frequency domain of w from the resulted Z domain, which will now be expressed in the following manner:X out(w)=  ½ [H2 (w)- H2 (w-p)] X(w).X out(w)= [e-jw(m-1) Hr2 (w) – e-j(m-1)(w-pi) Hr2 (w-p)] X(w).In the above equation, m represents that even number which measures the length of the filter.After completing the above procedure, the next phase requires experimentation which includes the implementation of sub-band coding that can be accomplished through two methods. The first method of experimentation is MATLAB, which requires the theory section to be followed from the same phases outlined. There is a file named as ‘subband.dat’ is provided from the input signal in this particular method. This file consists of many values which expresses the file regarding the capacity of the signal in a given time. Moreover, H2(z) was also given as the coefficients of the low pass filters (Croisier, 1974).It is also suggested that the high pass filters H1(z) are used with the low pass filters K2(z) which creates relationship among the filters explained below:H1(z) = H(z),   H2(z)= H(-z), K1(z)= 2H(z) and K2(z)= -2H(-z).Apart from that, there is one more value known as the SNR value that is required for the process of quantization where every single value of Q1 will be computed through the following equation:SNRdB=[ à ¥ xi(n)2 /   à ¥ (xi(n)- xo(n))2 ]. Where the limits of the summation is from n=0 to N-1.The next method for the implementation of the sub-band coding used is called C6711. It is a device that works as a converter and faci litate users in converting software implementations into the physical results. On the other hand, CRO is used on which the output will be connected for the verification of results. Moreover, the sine wave is also generated through connecting the frequency generator to the C6711 device (Rabiner and Gold, 1975).Finally, the results generated through MATLAB for the sub-ban coding reveals that before performing any find of modifications on the signal, it highly requires the plotting of input signal. Apart from that, result has also shown that the low pass and high pass filters of sub-bands were moved towards an intersection point which exactly equals to 0.5 rad/sample.The SNR values used in the process of quantization of distinct number of bits reached at a highest level of 16.5dB at the 5th bit. On the other hand, the SNR value has been calculated for 4 bit PCM system was almost 13.2dB. The value suggests that there is a 0.5dB variation from the value computed at the forth bit which is 12.7 dB and is acceptable after the comparison. However, the resulted output signal appeared on the CRO is quite similar to the input signal which explains that as the frequency increases the output signal will move towards zero (Kuester and Mize, 1973).After reviewing the whole process, it is concluded that the sub-band coding is a method to encode the input signal successfully with maximum efficiency. The two methods used in the process known as MATLAB and C6711 endorse the theory presented in the preceding sections which are considered as valid and reliable.

Friday, August 30, 2019

Controversy Paper on United States Involvement in Global Affairs

Involvement of the United States in Global Affairs A major debate that is being discussed both domestically and internationally is the involvement of the United States of America in international affairs. This debate includes the practicality of where the United States has intervened in foreign affairs, its right to intervene in the first place considering past mistakes and questionable leadership, and whether or not that foreign involvement is in the general public’s best interest.Obviously, the two sides of the debate refer to the ‘yes’ position, explained by Ivan Eland (as in yes, the United States should limit it’s global involvement) and also the ‘no’ position, backed by President Barack Obama (as in no, the United States should not limit it’s foreign involvement). Eland’s basis for his argument is that the United States has habitually overspent it’s treasure and overextended it’s military power to a point where we cannot keep pace economically and which could bring upon the demise of the American government as we know it.He also points out that continued foreign endeavors increases the risk of the United States being a target for terrorist attack. Obama’s vision is that The United States of America needs to re-establish its place as a world leader by maintaining an active foreign policy. Obama admits that mistakes have been made where international affairs are concerned, but that is a reason to fix those mistakes and step up as a suitable leader once more. Discussed later in the paper is my own point of view, which supports President Barack Obama and his plan for active engagement in foreign affairs, in a conservative and confidant manner.In his position, Eland points out that both republican and democratic actors, as of now, support the use of military force and United State intervention in foreign affairs. This begs the question, who is on Eland’s side? His half of the deb ate offers advice to both the conservatives and the liberals who are currently apart of US involvement decision-making. While he upholds fair and good points, his arguments hold less sway due to his non-direct involvement.Eland’s first argument has a basis in the research of Christopher Coyne, a professor at West Virginia University. The bottom line of this research is that the Unites States attempts of bringing about democracy in countries where we have tried to intervene militarily has yielded low percent success rates. So it may be that it is time for America to change its tactics from a military to a more democratic approach. Another notion brought up by Eland is that it is in America’s best interest to unextend it’s military power.He points out that is unlikely for another hegemonic power to arise very quickly in the absence of our lessened military power, and also compares the overextending of the United States assets to when the Soviet Union overextended itself and it’s socialistic government collapsed. However, Eland also points out that economically, European countries and China are achieving much more than the US. Therefore, if America does not keep up its involvement globally, it is likely that one of those countries could succeed us as the new superpower, thus contradicting his earlier statement that there is unlikely to be a new hegemon anytime soon.It is also unfair to liken the demise of Russia to that of the United States, when the governmental systems are very different. President Barack Obama is in favor of upholding US involvement globally, and maintaining a leadership role. He plans to do this with 5 steps. First, by bringing troops home from Iraq but also leaving some to keep Al Queda and other terrorists at bay. However, the president doesn’t explain exactly how this will be accomplished more effectively since we are already supposedly fighting â€Å"The War on Terrorism† with all our best resourc es.The main point in Barack Obama’s debate is that the United States needs to stay active in the world to remain on top. To do that, new alliances must be built within NATO, but also keep up with the times and constantly revise our alliances and position within the global community. It is also clear that The United States of America has made mistakes in it’s leadership and economically, but overall, Obama’s plan is fairly clearly outlined in his debate, that mostly makes logistical sense. The first step outlined in order to regain influential leadership is changing the troops and approach in the war in Iraq.Second, to employ a 21st military that is powerful, bright and able. Third, to reinforce allies and stand by other in countries in attempt to keep the world’s deadliest weapons out of the worst hands. Fourth, to reduce carbon emissions, and lastly, to provide more foreign aid to countries who are lacking in basic needs and fair governments. As stated a bove, I believe that President Barack Obama’s side of the debate, supporting United States involvement globally, is the right path for America. I choose this because it isn’t just about the yes or no side of this debate.Obama successfully explains that continued involvement doesn’t mean America stomping on poorer countries and participating in unsuccessful expeditions in helping third world countries. US involvement in global affairs means leading the by way of example and will result in putting the interests and safety of American citizens first. Obama’s reasoning of this debate will hold the backing of American citizens. It gives a probable solution to our countries problems at hand. This policy is the best because the public can understand it and they can feel a stake in its success.Countering pro involvement is Eland’s isolationism position. I don’t believe it measures up because it ignores America’s ability to do well unto others , and it diminishes our ability to lead. America is one of the only countries able to use a quantifiable amount of money and military power for use of foreign aid. And unfortunately, a lot of counties need that. If America were to withdraw, many states would be worse for wear (Lieber). I also believe that America’s defining attribute is its leadership position.Withdrawing from international affairs would be to sacrifice that privilege. It is because that no other regional power has the economic power, political will, or military strength to match the United States that we have a great international influence. However, the European Union or China are certainly striving for that same international influence and will not hesitate to rise to it if the opportunity presents itself (Guest). Part of Obama’s outline to maintain world leadership is to build and maintain a 21st century military.He clarifies that recruiting the best and the brightest and rewarding the veterans who serve because they deserve it will be the foremost way to build a military power that is confident and skilled. A force likened to this will not only allow America’s staying power in the prime leadership spot, but also allow us to provision foreign aid. Eland does bring up an excellent point though, when he brings up that the US spends a great deal on it’s military compared to other countries. He points out that other countries are able to do better economically because they do not have such large ilitaries weighing their economies down. Nonetheless, sacrificing America’s military power is an unacceptable notion. All things considered, the United States should not limit its global involvement. It needs to maintain its leadership position in the world, not only for our own benefit but for other actors also. The procedures used by the United States to determine how it will become involved need to be always evolving and reconsidered to ensure the best possible out comes for our United States citizens, and also other citizens around the globe.The United States is very capable of accomplishing this if we lead by example and are always mindful of fellow countries and the repercussions, positive or negative, that our actions are able to preform. Citations Database Used: Academic Search Premier Lieber, Robert. â€Å"Examining America's Role in Global Affairs. † VOA. Voice of America, 31 Oct. 2009. Web. 14 Nov. 2012. Guest, Robert. â€Å"Examining America's Role in Global Affairs. † VOA. Voice of America, 31 Oct. 2009. Web. 14 Nov. 2012.

Thursday, August 29, 2019

Strategy in Action. Zurich Insurance Essay Example | Topics and Well Written Essays - 3000 words

Strategy in Action. Zurich Insurance - Essay Example The major issues addressed involves how effective business strategies are adopted by Zurich Insurance, and how can they improve the strategies to run the business in better and efficient way. The analysis is executed through SWOT and PESTLE analyses to identify the internal strengths and weaknesses and uncontrollable external opportunities as well as threats are identified by overall industry analysis, value chain analysis and other telescopic observation matrix. The study has revealed that through customer-centric approach Zurich Insurance can sustain and make growth in the coming years as the prospect for industry is generally found to be quite promising. The life-insurance segment can also provide further leverage for the company in the coming years as the demand for such financial product is increasing among people. Zurich HelpPoint can provide the company certain advantages in attaining their objectives in future. Zurich Insurance is an international company that is engaged with the rendering of financial services related to insurance-based sector. The services provided by Zurich Insurance are vehicle insurance, life insurance, business insurance, building insurance along with pension and investments. The market in which Zurich operates its business is highly competitive. The vision of Zurich Insurance is to be the leader in rendering of economic safeguard as well as investment solutions in relation to customer requirements, financial performance along with employee motivation. The company’s philosophy is to focus on ‘Customer Centricity’. They emphasise on individual customers that can assist them to reinforce the brand. Moreover, the company also puts attention towards its employees as the employees work as ‘one team’ (Zurich, 2011). ... es 3.1 Vision Zurich Insurance is an international company that is engaged with the rendering of financial services related to insurance-based sector. The services provided by Zurich Insurance are vehicle insurance, life insurance, business insurance, building insurance along with pension and investments. The market in which Zurich operates its business is highly competitive. The vision of Zurich Insurance is to be the leader in rendering of economic safeguard as well as investment solutions in relation to customer requirements, financial performance along with employee motivation. The company’s philosophy is to focus on ‘Customer Centricity’. They emphasise on individual customers that can assist them to reinforce the brand. Moreover, the company also puts attention towards its employees as the employees work as ‘one team’ (Zurich, 2011). 3.2 Mission Statement Mission statement of any organisation can be stated to be a reflection of its core principl es, identities and values. Mission statement shows the future perspective of the company. The target market segments for the company are individuals, small along with medium-sized businesses and key global corporations. The mission statement of Zurich Insurance is as follows: â€Å"We’re working to become the UK’s leading provider of financial services, giving you customer service you’ve never experienced before. We’re committed to doing the right thing, in the right way and for the right reason for you, our employees and the communities we work in† (Zurich, 2011). The aim of the company is to eradicate the obstacles that prevent people from the ultimate utilisation of their earning (Zurich, 2011). 3.3 Corporate Objectives The corporate objective of the company towards environment is aimed to decrease

Wednesday, August 28, 2019

Discuss the impact of the National Curriculum on child-centred Essay

Discuss the impact of the National Curriculum on child-centred principles and the use of play within primary education - Essay Example It was evident that a single plan was needed. In 2000, it was reported by the National Institute of Economic and Social Research (NLT: Early Debate, 28.1.00) that English children were falling behind Japanese children because English children started school earlier and didn’t have sufficient development of behavioral and social skills. Teachers found they were spending more time on bad behavior and less time on teaching than did their Japanese equivalents. A study of play-based learning in Nursery School has shown it to be important for preschoolers, and this type of learning might be extended to children up to 6 years old and perhaps even 7 before formal teaching takes over. This thinking was first developed by Rudolph Steiner of Austria, whose Steiner Waldorf approach was instituted in Stuttgart, Germany, in 1919, with many Steiner early years centres presently located throughout the world. The centres focus on three stages - birth to 7 years old, 7 to 14 and 14 to 21. Gareth Lewis, author and advocate of home schoolin g (2001), lists the following principles as part of the approach: The Foundation Stage became part of the English National Curriculum in October 2002, and its profile has replaced baseline testing. Updated to the Early Years Foundation Stage in November 2005, it focuses on â€Å"the distinct needs of children aged three to the end of the reception year (age 5)† (NLT: Foundation Stage, par. 2). In the U.S. there was a move in 2003 to cut playtime in order to make more time for testing. This view was not shared in the United Kingdom, however, because researchers found that â€Å"shortening school breaks undermined children’s social relationships and long-term emotional development† (NLT: elgoals: Primary Play Cut for Testing, par. 2). Controversy surrounding this issue continued through 2004 and a report by the Qualifications and Curriculum Authority in

Tuesday, August 27, 2019

MANAGING DECISIONS Essay Example | Topics and Well Written Essays - 3000 words

MANAGING DECISIONS - Essay Example It is with this, that they came up with goals in which they strive to achieve. Tap helps to introduce children to the rhythm and music; it was first introduced in African American dance and named, Juba or Irish Step-Dancing and thought to have taken roots since 1800 when minstrel shows were taking course. Later in 2008, it was started by Rachael when she relocated to Greenwich from Islington after taking a career as a professional dancer. Her aim was to establish the benefits to creative and independent children. The school attracts customers by offering the first free lesson for starters, this works as an encouragement where those who really have the urge to cut down calories voluntarily get encouraged and start the exercises as soon as they get time. Povaly (2007), stated that for old members, the organization charges four weekly, where each day, people pay different rates like, they begin their classes with Tots Tap among the three year olds, where children are first taught how to count music and hold a beat, after gaining this skills, they are then taken to the next step of pre-primary tap. By this time the organization targets the school going child. With goals at hand and support from her clients, Rachael has transformed and brought in new styles of teaching which have integrated dance, music and methods that build on her past experience when she was working with major bodies of dancing in the United States. She has also worked to incorporate her styles with that of the British Ballet Organization, so as to make sure as the groups develop; they are able to work in accredited recognition of their development. The mentioned factor of the growing market is due to the merits the organization is striving to give its clients. An example is where, for starters, they are allowed free services for that day, and then the subsequent days of the week, they are charged at

Monday, August 26, 2019

Market plan task 2 Essay Example | Topics and Well Written Essays - 1500 words

Market plan task 2 - Essay Example Based on the company and the current position, it is clear that Starbucks has a strong product profile and the company is very ethical and has also developed products to meet the needs of the children as well. Keeping in mind the current interest in healthier lifestyles, the following recommendations can be made to the company for their marketing. Also a detailed explanation of the marketing mix has also been provided below. The recommended strategy for the company is to develop product extension. Here the company can effectively introduce new products to the current menu. The main aim and target audiences here are the younger customers. Hence the company can introduce the products to meet the needs of these individuals. The following details in the marketing mix helps provide a better understanding on the inclusions that the company can make to their menus as a product expansion. Product: In terms of the products, the company needs to focus on introducing new kid size drinks. These drinks need to be less caffeinated, less sweetened and also need to met the health norms. The products should be available in low calories for young adults below (Hakansson and Waluszewski). Since it is clear that healthier options like fresh fruit juices or other nutritional choices will not help the customers stay away from the high calories (Rudelius). Hence here the company can take an initiative by introducing the same products however with low fat and calories for the children. Place: In terms of place, the company can continue to use the current place for the children as well. Here they can however also include a more appropriate setting and environment for the younger audiences (Jobber). This will help keep up the current environment of the adult audiences and will also provide the younger customers with a more appropriate place (Hakansson and

Sunday, August 25, 2019

Contemporary Art in Russia Thesis Example | Topics and Well Written Essays - 750 words

Contemporary Art in Russia - Thesis Example The paper "Contemporary Art in Russia" talks about Russian Contemporary Art. It gave the Union new foreign policies that achieved political power. The policy of Perestroika with it market reforms influenced the Russian art scene and function of the art centers. Perestroika influenced the functions of museums, contemporary art and the market since its inception. It also influenced the role of contemporary spaces such as the Loft Etashe and the Garage Center. Museums such as the Museum Of Non-Conformist Art, Hermitage and the National Center of Contemporary Art also felt the influence of the Perestroika policy. During the inception of the policy, the market for art in Russia experienced a boom. However, the financial implications that followed Perestroika resulted to a decline of art sales. Sotheby used to host an art auction, but it was closed in 1988. The auction was later reopened in 2007. 22 years ago, the Russian art market was withdrawn from the rest of the globe. However, the Mi nistry Of Culture in Russia persuaded Sotheby to hold an auction of contemporary Russian art in Moscow. The aim of the auction was to portray to the world the message of Perestroika and expose contemporary Russian artists to the world. All the contemporary art sold on the auction was exclusively for exportation. The auction turned out to be a market success. The auction raised two million Euros, and it increased the earning from art for the Russian artists. Some of the art pieces fetched up to 242,000 Euros at the time.

Saturday, August 24, 2019

The QWERTY keyboard Essay Example | Topics and Well Written Essays - 1250 words

The QWERTY keyboard - Essay Example A quintessentially American invention, the QWERTY design demonstrates one of the key principles of human development: the triumph of culture over logic and the survival of a tradition which may not be the fittest for purpose, but certainly wins the prize for durability under pressure. The initial design of the typewriter keyboard was motivated by an intention to slow down the writing process, for technical reasons due to the tendency of the metal keys to stick if they were moved too fast (Baron 27). Through trial and error, early type writer inventor Christopher Latham Sholes from Milwaukee came up with the mechanically optimal arrangement of characters: in four rows, all in upper case (David 333). A further refinement was added by production partner Remington in the form of a letter combination which allowed the word â€Å"TYPEWRITER† to be formed using only the top row of characters. (David 27). So it was that the combined demands of technology limitations and sales ambition led to the final QWERTY format. As is the way of things in the modern world, technology moved on rather rapidly, and competitors soon appeared on the horizon, eager to take the ideas that had gone before and transform them into something better and cheaper than existing models. The so-called â€Å"Ideal† keyboard appeared in the 1870s, using the sequence DHIATENSOR in the top row, based on a calculation of the frequency of letter use in the English language: these ten letters were sufficient to produce over 70 per cent of words in English (David 334). Other ideas which have emerged since then include the use of an arrangement based on alphabetical order and the famous Dvorak layout which places the most common consonants in the central right hand position and the vowels on the left. The aim of this distribution is to shorten the distance between the most common letters, and encourage left and right hands to work in sequence (Bridger 380) with the result that typing on this k eyboard layout becomes both faster and more accurate than the original QWERTY arrangement. The Dvorak arrangement (see figure 1 below) was named after its creator Dr August Dvorak, and the patent was filed in 1936, at a time when industrial factory-style systems were common, and typing pools were set up as a way of speeding up business communications. Fig. 1 QWERTY and Dvorak keyboards compared. Source: Bridger, p. 381. On the face of it, these alternative layouts look like eminently sensible improvements based on a desire to better match the machine layout to the natural attributes of the human hands and mind. In practice, however, these later layouts have been rejected by mainstream typewriter and later also computer production in favour of the early QWERTY version. This raises the question why the older model has stuck, and improvements have been rejected. The answer comes down to a combination of different factors. Some of these are due to the momentum that the QWERTY layout gai ned in the critical years of atomization in the United States. As companies were set up they designed integrated systems which fed into each other, so that for example sales, processing of orders and invoicing were conducted by letter and telephone, and instead of handwritten ledgers, typewritten documents were used, and then retained in filing systems. People were appointed to undertake these tasks, equipment was bought, training was provided and everyone

Friday, August 23, 2019

Health Administarion Essay Example | Topics and Well Written Essays - 250 words - 10

Health Administarion - Essay Example As a result, there is a conflict of languages among the staff and the patients. The primary problem that is faced in this context is to assess that the staff has correctly noted the prescription which the doctor has prescribed and whether they are implementing the organization’s rules and regulations. The Culturally and Linguistically Appropriate Services (CLAS) is a self-assessment tool that has been designed for the public health care agencies and organizations in United States to self-assess their communication among staff and patients of diverse cultures and population (COSMOS Corporation, 3-5). There are several questionnaires that the organizations need to fill and then to assess whether there is effective communication and implementation of rules and regulations in the organization or not. There are several important aspects that helps to ensure that the patients of middle class backgrounds are able to understand the prescription and medical advice from the doctor. For instance, the effective use of verbal and non-verbal communication in a way that they do not conflict with the cultures of the respective patients. According to OHIO State Medical Centre, the most effective way to improve communication in a culturally diverse population is to hire medical interpreters who can interpret the medical prescription in the language of the patient (p.7). Thus, eliminating the problem of language barrier. Effective Verbal and Written Communication with Those from other Cultures, OHIO State Medical Centre (2010). Web. Link: http://medicine.osu.edu/sitetool/sites/pdfs/ahecpublic/Writing_for_other_cultures.pdf Developing a Self-Assessment Tool for Culturally and Linguistically Appropriate Services in Local Public Health Agencies, COSMOS Corporation (2003). Web. Link:

Wireless Networking Essay Example | Topics and Well Written Essays - 1000 words

Wireless Networking - Essay Example Individuals with desktop computers connected to Wide Area Networks (WANs) and Local Area Networks (LANs) in their places of work may need to be connected while away, which is literary impossible with the concept of wiring. Here is where wireless networking comes in. A wireless network is a system that receives and transmits radio signal through the air from one point to another. The term wireless network often refers to a Wi-Fi or 802.11 networking, from the protocols that control the wireless network concept (Kumar, Manjunath & Kuri 2). Wireless networks are consistently proving their worth in today’s world, with coverage of important services like FM radio, AM radio, satellite television, broadcast television, and satellite internet, which all form a basic part of our lives. The history of wireless networking discovery takes us back to 1888 when Heinrich Herz discovered the first radio wave. In the years that followed, other scholars were further developing the radio frequen cy concept. Marconi was the first known man to successfully transmit and receive a message using radio waves in a distance of two miles, labeling him the â€Å"father of radio†.... The resultant second generation WLAN was upgraded and was four times faster, with an operational speed of 2Mbps. Further developments led t the design on the third generation WLAN, which are in use currently (Kumar, Manjunath & Kuri 23). The Institute of Electrical and Electronic Engineers (IEEE) 802 committee in 1990 set up the 820.11 Working Group that would be the foundation of the WLAN standard. Among the specifications of the standard was an operating frequency of 2.4GHz ISM band, and consequently approved the IEEE 802.11 to be the first WLAN standard with frequency of between 1and 2 Mbps. Building a wireless network will require an access point, which receives and sends radio signals, as well as acting like a repeater. Another vital device required in all the devices in the wireless network is the wireless network card. A desktop computer usually has an internal card, and may or may not have antennas. Notebooks have a PCMCIA extension slots for the card, if not installed from t he manufacturer. There are two basic forms of configuration for a wireless network: infrastructure and Ad-Hoc. An infrastructure wireless configuration constitutes more than one access point connections to an already existing single wireless network. This will enhance the sharing of resource among the devices in the network, like the internet and printers. Here, a computer acts like a hub that provides connectivity for the other computers in the network, hence connecting a wireless LAN to a wireless LAN (Kumar, Manjunath & Kuri 54). On the other hand, an Ad-Hoc wireless network configuration connects one device directly to another device on the network, hence the common reference to peer-to-peer network. All devices can connect directly to each other, but there must be one that is

Thursday, August 22, 2019

Visual Imagery and Metaphorical Thinking Essay Example for Free

Visual Imagery and Metaphorical Thinking Essay References Navaneedhan, Cittoor Girija Reflective Teaching-Learning Process of Integrating Metaphorical Thinking and Visual Imagery, Journal of Behavioral and Brain Science, No. 2, 2012, pp. 407-410, doi:10.4236/jbbs.2012.23047 Abstract: Reflective teaching-learning process= self evaluation technique= promoting motivation Metaphorical thinking= natural process of human mind by findind similarity between two different universes of meaning Visual imagery= natural process in which human brain associates text material with structures in one’s own mind’s eye Introduction: Reflective teaching methodology= constructivist approach The learners construct new knowledge from their experiences related to the mental frame work that already exists in their mind (Jean Piaget 1967) The teacher should foster this process integrating metaphorical thinking and visual imagery takes Emphasy on an active and cooperative learning, connection between theory and practise Each teacher has his/her own experiences, beliefs, knowledge and values which determine the way a teacher teaches D. Schon suggested that reflective teaching practice is a continuous process. It involves learner thoughtfully considering one’s own experience in applying knowledge to practice while being taught by professionals It helps to develop the individuals personality Self Inquiry Reflective Teaching Model: The main aim is to frame learning objectives of a selected topic based on  Benjamin Bloom’s Learning Taxonomy (1956): 1) knowledge; 2) understanding; 3) application; 4) analysis; 5) synthesis and 6) evaluation or creating /Users/saraiacozza/Desktop/cartella senza titolo/reflective teaching-learning process.pdf figure 1. Metaphorical thinking= a direct comparison between two unrelated things. Metaphors can create strong links Metaphorical thinking should be integrated into teaching methodology

Wednesday, August 21, 2019

Wolves Communication Pack

Wolves Communication Pack COMMUNICATION AMONG WOLVES ABSTRACT Just like any other animal wolves communicate with each other, with most of its communication being between pack members. Wolves use three differing types of communication; 1) Vocalizations; Wolves are frequently heard at night because it is when they are most active. Wolves howl for many reasons, particularly to locate other members of the pack and to warn outside wolves to stay away from an occupied area. 2) Scent marking; Wolves possess a very keen sense of smell (about 100xs greater than humans). Wolves use this ability along with the others to communicate with other wolves. Scents are used to mark pack territories or lone wolf territories. These territories are marked most often by urination and defecation on or around trees and other objects. In addition to these two means of scent marking wolves also scent mark by scratching and scent rolling. And the last method of communication 3) Body postures; Wolves also use body language to communicate, whether it is to others in the pac k or outside of the pack. Some postures are used to show affection, some fear or humiliation, others happiness and even others can emanate respect between pack members. All are important and used by wolves on a daily basis, whether it be to warn off competing packs, communicate a fresh kill or to portray dominance. INTRODUCTION One of the things that distinguish different members of the family Canidae is the differential development of social behaviour. Among the close relatives of the domestic dog, the most highly social species is the wolf. Wolves belong to a family group often referred to as a pack. This social structure was originally thought to allow the wolf, a social predator, to take prey many times its size, however new theories are emerging suggesting that the pack strategy instead maximizes reproductive success and has less to do with hunting. They live, travel and hunt in these packs which consists of anywhere from four to fifteen members (pack sizes are subject to change overtime and are controlled by such things as food supply, individual personalities and habitat type). The rare exception is the lone wolf, this wolf will most likely be the omega wolf, the lowest ranked member of the pack, and if it is lucky will find a mate and start a new pack. Wolf packs have a very elaborate hierarchy, one in which is topped by the alpha male and female, followed by their pups, often several sub-adults from the previous years litter and sometimes some older siblings as well. When pack sizes are large (usually more then 8 members) it is possible to witness two differing hierarchies in one pack, one in which is the females being led by the alpha female and the other the males being led by the alpha male. The alpha pair share the most social freedom among all pack members, they are very influential and simply have the most freedom in where to go, what to do and when to do it, with the rest of the pack usually following. The alpha male and female therefore usually direct the pack in hunting and tracking prey, choosing den sites and establishing and maintaining the packs territory. Rank order is ascertained and sustained through a series of ritualized fights and posturing best expressed as ritual bluffing. Wolves prefer physiological warfare to physical confrontations, meaning that the hi gher ranking status is based more on personality or attitude rather than on size or physical strength. Rank order may be lost rather suddenly or gradually. An older wolf may simply choose to give way to a motivated challenger, yielding its position without bloodshed. On the other hand the challenged individual may opt to fight back with varying degrees of passion. Wolves communicate using three main strategies; 1) vocalizations- howls and growls; 2) facial expressions and body postures and; 3) scent marking. Howling alone can have a variety of meanings; a greeting, a rallying call to gather the pack to get ready for a hunt, an advertisement of their presence to warn other wolves away from their territory or spontaneous expression of play and bonding. The howl of a wolf can be heard up to six miles away making it the most useful means of communication given that wolves range over large distances while hunting and traveling. Wolves engage in a variety of displays of dominance, and submission that helps reinforce the hierarchy in packs. Wolves use their entire bodies; expressions of the eyes and mouth, the position of the ears, tail, head and overall position of the body are used to convey excitement, anxiety, aggression or compliance. Wolves also wrestle, rub cheeks and noses and nip and lick one another. They leave behind messages for themselve s as well as other pack members by means of urination, defecating or scratching the ground to leave scent marks. These marks can set the boundaries of territories, record trails, warn off other wolves or help lone wolves find unoccupied territories. In a similar fashion wolves will roll around in items with a strong scent such as carrion as a way of letting other pack members know where they have been or what it has encountered. In the end it can be said that the â€Å"habits of the wolves require members of a social unit to be visually separated at times so that these olfactory and auditory means of communication are possible† ( Berge, 1967). VOCALIZATIONS â€Å"The wolf is a wide ranging social carnivore with a complex spatial organization for which acoustic communication plays an important role† (Palacios et al. 2006). There are four kinds of vocalizations that are popular among wolves, they include; the growl, the whimper, the bark and the more associated sound of the wolf, the howl. Any one of these or a combination of these allows the wolves to communicate with one another. The bark can be used over long distances and can take on the roll of sounding an alarm or presenting a challenge. The alarm bark is most often used when a wolf is caught off guard and surprised at the opening of its den, and a challenge bark is a warning for a wolf to back off when two wolves are encountering a â€Å"face off† (a fight). The growl has similar meanings to the bark however it is used in shorter distance communication. It is used to keep other wolves away, to reinforce dominance and, it can also be used at short range to challenge. T he whimper is used at short ranges as well and portrays a sociable stance (often used by young to receive care). The howl, the most well known form of communication among wolves, seems to have many complex functions and will be looked at in greater detail compared to the other three types of communication listed above. Howls allow wolves to communicate over several kilometers. Howls have been described as long harmonic sounds with a fundamental frequency from 150Hz- 1000Hz for adults. There have been two types of vocalizations involving howls that have been recorded; 1) Solo howls and 2) Chorus howls. Solo howls, also referred to as a lonesome howl is emitted by a sole individual. In the study down by Berge many years ago unique features were found to exist in individual howls. Harmonic characteristics were found that would distinguish individuals on the basis of any one howl. Therefore the variation in structure likely indicates who is howling and the frequency modulations, predominantly the change in pitch makes the howls much easier to locate. The ability of a wolf to detect these very subtle changes in sounds indicates that a response to this information is possible (view figure 3). As with any form of behaviour there is a cost/benefit to this action. The lone wolf is just that, it is alone, an d when producing sound its pack mates are not the only ones who pick up the vocalization, thus this behaviour could turn out to be detrimental. However with any cost comes with it benefits, a lone wolfs howl can help one locate the other members of its pack proving to be advantageous. A chorus howl on the other hand has been described as a vocalization in which one wolf begins howling, with the other members joining in subsequently until the whole pack is howling together. Rather than using howls with a single pure tone, wolves use modulated tones. With the rapid changes in pitch it makes it very difficult to follow only one individuals howl, and to add to it the surrounding environment helps reflect the sound and scatter it making it extremely challenging for a competitor pack to distinguish where the pack is and how many members the pack consists of. The heart of a wolfs universe is its pack and howling could be the adhesive that keeps it together, suggesting that howling may reinforce the social bonds between pack members as well as keeping the pack safe. In view of the fact that wolves are separated great distances during a hunt, it is not unlikely that howling keeps the pack as one physically. Of all their calls howling is the only one that works immensely over great distances. Its long duration and low pitch are what make it suitable for long range communication through the forest and in tundra areas. Its unique features are what allow a wolf to convey its identity and each wolf can be identified by its pack just by means of its howl. SCENT MARKING While howling may provide much information about a wolfs whereabouts elaborate spatial patterns of scent marks provide precise information about inhabited territory. A territory is a â€Å"space within which an animal is aggressive to and usually dominate over certain intruders† (White et al, 1996). It is a silent way of steering clear of violence that would otherwise be required to preserve a territory. Scent marking can also provide a silent exchange between animals that share territories and can also help an individual keep its point of reference when traveling. When Roger Peters and David Mech conducted studies on a variety of wolf packs in the Superior National Forest of northern Minnesota they found that wolves scent mark using four differing methods. The first method is by means of raised leg urination. â€Å"This form of scent marking is closely connected with territorial marking and maintenance† (Macdonald et al. 1998). These markings are made throughout the te rritory and heighten in concentration at the limits of the territories. The alpha male and alpha female are the primary users of raised leg urination (more often it is the alpha male) with only few instances where it will be used by other wolves. The second mode of marking is squat urination. This mode of urination is the ordinary form of urinating, and is performed by the lower ranking individuals in the pack. This method of scent marking supplies them with information about which fraction of the territory has been hunted during times of separation. Scratching, and or scent rolling the third strategy to scent marking involves a wolf that may rub its lips and neck against a tree or on the ground or scrape the ground with their paws (normally after urination) to mark out their territory. Scraping, usually with the hind legs and sometimes also done with the front is predominantly performed by the dominant individuals, the alphas (can be done by mid ranking individuals depending on th e circumstances). Wolves have scent glands between their toes which release odours/ a characteristic scent. The wolf has several specialized glands, located all over the wolfs body that function as a chemical and a visual message for other wolves. There is one located near its anus (anal gland), another on its back, one at the tip of its tail (precaudal gland), in its eyes, behind its ears, on its cheek near the corner of the wolves mouth and between their toes (as mentioned above). The aroma from these glands is as individualistic as our own fingerprints. Each scent is specific to an individual each with its own meaning. Scats also referred to as defecation is then the fourth means of marking. Again this form of marking is very similar to that of urination and serves many of the same purposes. However here it acts as a more visual warning. Here again the anal scent gland becomes important. It produces a pungent oily pheromone that is excreted during bowel movements, thus scenting t he wolfs scat with his/her own odour. The exact purpose of this means of scenting is unknown however it could very well be that these anal scent glands play an imperative role in wolves of higher ranking for it has been observed that when higher ranking individuals meet they sniff under the tail, this action is not performed by submissive wolves (lower ranking wolves). (Refer to figure 1 and table 1) â€Å"Olfactory communication is defined as the process whereby a chemical signal is generated by a presumptive sender and transmitted to a presumptive receiver who by means of adequate receptors can identify, integrate and respond to the signal† ( Kleiman, 1972). Scent plays a exceedingly imperative role in the life of a wolf, by smell alone wolves can locate prey, other pack members or enemies. It can tell them if other wolves were in their territory, if they were male or female and how recently they were there. Therefore marking can be used for non-territorial purposes as well. It can also be used to identify individuals, lay claims to a kill, for navigational purposes during those long ranging hunts and can also be used as a indication for sexual receptivity during mating season ( suggested that this is the purpose of sniffing under the tail upon greeting). BODY POSTURES Wolves convey their emotions through body language. Here they can â€Å"communicate visually a number of expressions and moods that range from subtler signals to more obvious ones† (Berg, 2003). The following are observed behaviours. Wolves display dominance by standing tall and stiffed leg. The ears are erect and forward and the tail is held vertically and curled toward its back. This demonstration declares the wolfs rank to the rest of the pack. Submission can take the form of either active submission or passive submission depending on the circumstances. In active submission the wolf lowers its entire body toward the ground and the lips and ears are drawn back, in essence the teeth are bared. The tail is down and either half way or completely between its legs (depends on level of submission) with their muzzle (refer to figure 2) pointing up toward the more dominant individual. The back will be arched and again depending on the level of submission the back may be arched more or less. During passive submission, a more intense form compared to active submission the wolf will roll over onto its back and render its susceptible throat and underside, with the paws being drawn into the body. If a wolf is displaying anger its ears will be erect and its fur may bristle. Here the teeth are bared and it is usually accompanied by a snarl or growl. When a wolf is fearful it tends to make itself look small and less conspicuous. The ears flatten and again the tail is tucked between the legs. If a wolf senses danger suspicion will arise. This is displayed by the pulling back of the ears and the narrowing of the eyes. The tail will be parallel to the ground and pointing straight out. A playful wolf will hold its tail high and wag it. The wolf may frolic and dance around, or bow by placing the front of its body down to the ground all the while holding its rear in the air. (Table 2 summarizes body postures) CONCLUSIONS Wolves are multifaceted social animals whereby communication signals are used for a variety of purposes. In order to function as a group communication among individuals in a pack is crucial. Communication is used for recognition, reproduction, social status, alarm, foraging and group spacing also referred to as territoriality. â€Å"The wolf is a wide ranging social carnivore with a complex spatial organization for which acoustic communication plays an important role† (Palacios et al. 2006). There are four kinds of vocalizations that are popular among wolves, they include; the growl, the whimper, the bark and the more associated sound of the wolf, the howl. Any one of these or a combination of these allows the wolves to communicate with one another. While howling may provide much information about a wolfs whereabouts elaborate spatial patterns of scent marks provide precise information about inhabited territory. Scent plays a very important role in the life of a wolf, by smell alone wolves can locate prey, other pack members or enemies. It can tell them if other wolves were in their territory, if they were male or female and how recently they were there. Therefore marking can be used for non-territorial purposes as well. It can also be used to identify individuals, lay claims to a kill, for navigational purposes during those long ranging hunts and can also be used as an indication for sexual receptivity during mating season. Wolves communicate at close range their emotions through body posture, tail positions and facial expressions. Here they can â€Å"communicate visually a number of expressions and moods that range from subtler signals to more obvious ones† (Berg, 2003). All forms of communication are important and used by wolves on a daily basis to ensure that they stay in touch with the rest of the pack. FIGURES (Figure 1 and table 1- Macdonald et al., 1998) Figure 1: Table 1: Table 2: Body Language Chart: Submission: Play: Aggression: Dominate Postures: (Alpha(s)/ Beta(s))  · Ears back against skull  · Lowered Body  · Whining  · Tail lowered/tucked  · No eye contact  · Prancing around  · Upper body lowered in play bow  · Barking playfully  · Yipping  · Ears forward alert  · Ears flat to the side  · Upper lip curled bearing teeth  · Tail lowered aggressively  · Shoulders up (posing more dominate)  · Hackles raised  · Growling  · Tail held high  · Chest held outwards  · Head held high  · Ears locked forward  · Always alert  · Demeanour always regale http://www.wolfspirits.org/aboutwolves.htm Figure 2: http://www.wolfdancer.org/communication/ Figure 3 Wolf howl sonogram REFERENCES Evaluation of a Simulated Howling Survey for Wolves Todd K. Fuller; Barry A. Sampson The Journal of Wildlife Management, Vol. 52, No. 1. (Jan., 1988), pp. 60-63. Scent-marking in wolves. Peters RP and Mech LD Am Sci. 1975 Nov-Dec;63(6):628-37. A Model for Wolf Pack Territory Formation and Maintenance K.A.J WHITE, M.A LEWIS AND J.D MURRAY Journal of Theoretical Biology Volume: 178 Issue: 1, pp.29-43, 2006 Analysis of a model for wolf territories M. A. Lewis, K. A. J. White, J. D. Murray Journal of Mathematical Biology, Volume: 35 Issue: 1 pp. 749-774, 1997 5. Olfactory Communication in Mammals J F Eisenberg, and D G Kleiman Annual Review of Ecology and SystematicsVol. 3: 1-32 (Volume publication date November 1972) Scent-marking and territorial behaviour of Ethiopian wolves Canis simensis Claudio Sillero-Zubiri and David W. Macdonald Journal of Zoology Volume 245 Issue 3 Page 351-361, July 1998 Howling as a means of communication among timber wolves Theberge, John American Zoologist, 7:331-338, 1967 Fred H. Harrington. Whats in a Howl? Mount Saint Vincent University, Nova Scotia http://www.pbs.org/wgbh/nova/wolves/howl.html Berg, Karyln. Communication, 2003. Retrieved on Nov. 19/07 http://www.wolfdancer.org/communication/ 10. Author unknown. The Wolf Spirits Pack, 2001. Retrieved on Nov. 19/07 http://www.wolfspirits.org/aboutwolves.htm

Tuesday, August 20, 2019

Importance Of Explicit Knowledge Information Technology Essay

Importance Of Explicit Knowledge Information Technology Essay This document deals about the importance of Explicit Knowledge in the organizations. Most of the knowledge occurs in the organizations in the form of tacit knowledge. Here we deal with how to transform the tacit knowledge to explicit knowledge. The accumulation, storage and reuse of the explicit knowledge. Here we are talking about the barriers in the acquiring of explicit knowledge. The use of technology for the purpose of accumulation, storing and reuse of knowledge is also discussed. Todays business environment knowledge is emerged as a driving force in the organization. The knowledge workers and their ability are very important (LI , BRAKE,CHAMPION ,FULLER,GABEL AND HATCHER-BUSCH 2009 : 347). Recent studies show that organizations success depends on its ability to learn and adapt to particular situation. The unique performance in the organization is the key to outperform their competitor.(LI , BRAKE,CHAMPION ,FULLER,GABEL AND HATCHER-BUSCH 2009 : 348). In organization there are mainly two types of knowledge exist tacit knowledge and explicit knowledge .Scholars noticed that most part of human knowledge is present in the form of tacit knowledge (UNGAN (2006):403) . Its in the minds of the people. Explicit Knowledge is the knowledge that is expressed and documented. The documented and codified knowledge will have a structure and is easily accessed by others. (STOVER 2004 : 164).To create true knowledge it is necessary to see tacit and explicit knowledge as complem entary and both are needed to knowledge creation. IMPORTANCE OF EXPLICIT KNOWLEDGE: Tacit knowledge is something that is acquired by individuals experience in particular area. It help him to find solution for problems faster than his colleagues It is acquired through once experience and experiment in particular field (STOVER 2004 : 165). Articulating the tacit knowledge, making tacit knowledge explicit is very important in the perspective of the organization (STOVER 2004 : 165).Explicit knowledge is described in structured language. It is mainly more technical data this knowledge is gained mostly through formal education or by structured study .This will help organizations to preserve their huge knowledge capital from losing. When employees leave organization they take with them the huge amount of knowledge. (STOVER 2004 : 165). Valuable Knowledge will be wasted if organizations fails to collect , standardize and store and share the knowledge. The KM scholars believes that the articulation of knowledge helps the organization and individuals to access the knowledge in a cost effective way. Explicit knowledge is carefully organized and stored in data bases in priority basis .It should be accessible with high quality , fast and easily. The explicit knowledge can be reused for sole problems of similar kind (SMITH 2001 : 315).For instance Anderson consulting created methods to codify store and reuse explicit knowledge. They used a people to document approach. It took information from person who developed it and made independent to its developer. All the sensitive information is removed and it can be used in the same similar context (SMITH 2001 : 315).When knowledge is shared among the members of the organization , it can be viewed as organizational history and experience (BONTIS 1998 : 64). In small companies they manage their knowledge is by training the new employees. Its a costly process. Thats where the importance of comput er based learning comes. Transformation of tacit to explicit knowledge is important here (WICKERT AND HARSCHEL 2001:330). If a expert employee got sick or left the organization the expertise of that employee is not available for a fixed amount of time or permanently (WICKERT AND HARSCHEL 2001:331). In job market skilled and experienced workers are getting retired. New young workers are replacing them . So there is a high demand for sharing of experience . This can be possible by the articulation of tacit knowledge they have gained from their experience (JACKSON 2010:915). EXPLICIT KNOWLEDGE CREATION EXPLAINED IN S.E.C.I AND BA MODEL In S.E.C.I model externalization phase deals with the transformation of tacit knowledge to explicit knowledge. For knowledge transformation they use different methods. Some of the methods are storytelling , narrative and using some IT medias like emails, chat rooms etc. The knowledge should be structured so as it should provide accessible and reusable. Externalization should be structured then the knowledge can be made sensible and available for potential users(JACKSON 2010:911).Top management can influence the externalization of knowledge. They can encourage the teams to develop their own metaphor for what they should do (RICHTNER AND AHLSTROM 2010:1020).The creation of concept of a new product is the example of externalization. In combination phase the extracted knowledge is standardized and systematic procedures to combine the knowledge using computer database or an expert system. The internalization deals with the transformation of explicit knowledge again to tacit knowledge by t he use of stored explicit knowledge.(STOVER 2004 : 165). The meaning of Ba is place . Ba does not mean only the physical space . It is the concept of interaction . For the creation of knowledge a space is necessary. This space may be a physical one or a virtual like online one. There are four types of Ba . Among that dialoguing ba deals with the face to face interaction . It is the space where individuals share knowledge. The process of tacit to explicit knowledge conversion happens here. Dialoguing ba is more structured than the previous ba . In systematic ba the collected knowledge is combined to a more structured form. The use of information technology like online networks , group ware etc contribute to systemizing ba .The excersiing ba where the stored knowledge is shared through virtual media or print etc. The healthy interaction between all these ba can amblify the knowledge creation ( Nonaka,I.Toyama,R and Konno,N.(2000) :16-17). BARRIERS IN KNOWLEDGE ARTICULATION: Converting tacit knowledge to explicit knowledge is a tedious job. As we said tacit knowledge is embedded in the minds of the individuals. This make it difficult to formalize and express. There are some personal issues in articulating the knowledge. Individuals believe that articulating the knowledge one may lose his competitive advantage. Some people believe their knowledge is not worth expressing . Some KM scholars believe that language barriers also hinder the transformation of tacit knowledge to explicit knowledge. (STOVER 2004: 166) The culture of the organization also may be a factor that hinders knowledge generation and sharing in the organization. There may be political issues between the departments that prevent the transfer of knowledge. Sharing culture is very important before implementing any strategies in any organization (Syed-Ikhsan and Rowland 2004 : 100). Knowledge transfer requires groups or individuals to work together and share their expertise and knowledge. The knowledge transfer does not occur unless group or individuals shows a co-operate behavior(SYED-IKHSAN AND ROWLAND 2004 : 96). Individualism is one of the major factors that hinder the creation and transfer of knowledge in any organization ( Syed-Ikhsan and Rowland 2004 : 100). For the sharing of knowledge there should be trust among the employees. In project team leadership style also effect the process of knowledge sharing(MA,QI AND WANG 2008:101).The authoritarian style leaders give no chance for the team members to participate and share knowledge. While the democratic style leaders encourages team members to interact and share knowledge (MA,QI AND WANG 2008:101).Another factor that hinders the knowledge sharing in the public organization is limited access to the resources (Syed-Ikhsan and Rowland 2004 : 100).Time is one of the major factors that inhibits the process of a rticulating the tacit knowledge. Most of the employees have a little time for articulating their knowledge. Patrick and Lee done research and they contradicted the views of Richard and Kabjian who says the fear of losing superiority and reward system are inhibitors of knowledge sharing. They also argues that the size of the company is not a problem in knowledge transferring (FONG LEE 2009:304) Some KM scholars like Swartz and Marwick argues technology is unable to provide a complete solution for knowledge capture . At many instance the experts find it is very difficult to trigger a knowledge person by query unless they are put into problem situation (JACKSON 2010 :911). Researchers found that the fear of not being adequately rewarded is the one of the barrier for the knowledge sharing. CAPTURING KNOWLEDGE: As we said conversion of tacit knowledge to explicit knowledge is difficult. There are several ways in which tacit knowledge can be made explicit. The formal ways of interviewing is a useful method. In interviews participants are asked structured questions. This format of interview should be made such that they shouldnt feel that the articulation is happening (STOVER 2004 : 166-167).The level of details available in documentation depends on the purpose of documentation (UNGAN 2006 : 404).For conversion of tacit knowledge to explicit knowledge the interviewer should accompany the knowledge worker in his process. In between the knowledge can be articulated. For this formal language is used (UNGAN 2006:407) . Individuals poses high level of tacit knowledge . If organizations fail to track it then it cannot be made explicit and will not reach its fullest potential (BONTIS 1998:66). The role of knowledge managers is very important. He can encourage the employees to share their knowledge and make them explicit (STOVER 2004 : 166-167). The knowledge management is riskier unless the organizations take initiatives and reward system for sharing of knowledge (SMITH 2001 : 312). For instance Buckman Laboratories recognizes their knowledge in their annual conference. Lotus one of the divisions of IBM evaluates the customer support workers on the basis of their knowledge sharing activities (BARTOL AND SRIVASTTAVA 2002 : 64). Xerox developed a system called Eureka which is meant for the maintenance engineers to share their ideas and experience .Once these ideas are posted they are verified and made available for service engineers all over the world. This help the Xerox in saving $100 million . Companies like Cap Gemini Ernst Young makes merit decision based on the knowledge sharing activity of its employees .In these companies the people who are posting ideas are evaluat ed and then posted into the knowledge contribution database(BARTOL AND SRIVASTTAVA 2002:67). Technology is important in collecting and codifying knowledge. There should be a strong framework for the systematic storing of knowledge. IT itself cannot helps something to get out of someones head. It is the role of managers to find out what is important for the organization . Some KM theorist like Pawar doubts the centralization of knowledge. He states that centralization of knowledge will reduce the cost of sharing the knowledge . He agrees the role of role of technology plays in the acquiring, storing and structured distribution of knowledge . Combining the intellectual property with IS will help the individual intellectual property to the group property (BONTIS 1998:66).KM combined with It will support the data mining and sharing of explicit knowledge (WICKERT AND HARSCHEL 2001 :333).Internet is one of the major repository of explicit knowledge(WICKERT AND HARSCHEL 2001 : 335). Knowledge exchange protocols can be used in transferring tacit knowledge to explicit knowledge. SOAP protocol which is used by physicians is one of the examples. This protocol helps to structure clinician patient conversation and helps to share issues by understanding the physicians thinking. This also helps in documentation of patient medical record (HERSCHEL,NEMATI AND STEIGER 2001:107).New generation tools such as wikis , blogs ,social networking etc. helps a greater collaboration in work place. This will solve some of the problems associated with knowledge capturing. These forms even can accommodate videos , images etc. It can be used to capture informal indicates of tacit knowledge (BARTOL AND SRIVASTTAVA 2002:64).This videos and images can then be summarized based on the content . They can be linked to topics of relevance and stored. These can be accessed through portals later (COAKES 2006:583). Mobile technology can be used for the capture of knowledge .In organizations there will be mobile workers will be advantaged by these technology. The challenge is how to incorporate the this knowledge to main memory. Information technology can be used as a powerful tool. It can be transformed from the role of storing and retrieving data to improve access to knowledge by removing the spatial obstacles of knowledge transfer. IT has got a ability to spread knowledge across different departments of the organizations (TOHIDINIA AND MOSAKHANI 2010 : 615). CONCLUSION: For any organization the Knowledge is very important. The conversion of Tacit knowledge to explicit knowledge is very risky process. There are the barriers like individualism, politics inside the organizational departments. The factor of trust plays a major role in conversion of knowledge . For some small companies the cost of knowledge sharing is not affordable. Technology can play a major role in the tacit to explicit knowledge transfer. There are new generation technologies that can be used for the this purpose. The reward system is one factor that will encourage knowledge transfer. The role of the management in promoting the knowledge conversion is very important . The uniqueness of knowledge the organization owns will brig the organization the competitive advantage.

Monday, August 19, 2019

Solar Energy Essay -- Essays Papers

Solar Energy Since the beginning of humanity, people have relied on the sun for their daily needs. Whether it is to grow the crops that they eat, dry clothes or warm their family, people have relied on the resource of the sun for sustainability. It was not until people started to get the idea of managing this energy source, that people were able to fully take advantage of the sun. In 1767, a Swiss scientist discovered a practical way to harness the energy of the sun. Horace de Saussure invented the â€Å"solar hot box,† the first devise to attract and capture the energy capabilities of the sun. The main uses of this primitive solar box consisted of cooking food, distilling water and pumping water for irrigation. It was not until the 1880’s that America caught on to this new source of energy. Introduced by John Ericcson, this engineer created solar power engines, used for power steam generators onboard ships. The most famous person credited with exposing solar capabilities to the west, however, was Clarence Kemp, the first man to patent solar water heaters in 1897. His invention caught on so well, that within seven years, thirty-percent of houses in California were using his invention. This was just the beginning of solar energy’s popularity within the US. In 1908, Carnegie Steel Company’s William J. Bailey produced the solar panels we are most familiar with today. The popularity of the solar power boom peaked around the end of World War I, when â€Å"more than 4,000 rooftop solar water heaters had been sold, and more than 60,000 were in place† (EIA). Shortly after this, scientists discovered the possibilities of solar energy in space. Even to date, many satellites and space projects take advantage of this renewable... ...olar energy has undergone many stages throughout its existence, especially within the United States. At the beginning of its discovery, carried out through its peak in popularity around the 40’s and 50’s, solar energy enjoyed its time in the spot light. Due to limits on where solar plants can be built, inefficiency, unreliability and high prices, the use of this fairly environmentally friendly, renewable energy source has dwindled. While some hope for advances in the methods of collecting solar energy, currently it does not have the ability to meet our world’s ever-growing consumption of energy. Works Cited - â€Å"Current Uses and Future Prospects.† . - Energy Information Administration (EIA). The U.S. Government.. - â€Å"Solar Power.† Energy Matters. .

Sunday, August 18, 2019

Female Circumcision in African Countries :: Female Circumcision Culture Essays

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Female circumcision is a horrifying procedure that can be defined as the removal of the clitoris on the body of a female. The surgery is often accompanied by ceremonies intended to honor and welcome the girls into their communities. It can be observed in parts of Northern Africa and Southern Arabia where many girls undergo ritual surgery involving removal of parts of their external genitalia. About eighty million living women have had this surgery, and an additional four or five million girls undergo it each year (Kouba and Muasher). This tradition is prevalent and deeply embedded in many countries, including Ethiopia, the Sudan, Somalia, Sierra Leone, Kenya, Tanzania, Central African Republic, Chad, Gambia, Liberia, Mali, Senegal, Eritrea, Ivory Coast, Upper Volta, Mauritania, Nigeria, Mozambique, Botswana, Lesotho, and Egypt (Abdalla). It is usually performed between infancy and puberty. From a Western point of view, it may seem unnecessary and vulgar. However, these ancient practices hold significant meaning to the people who practice it. They are supposed to promote chastity, religion, group identity, cleanliness, health, family values, and marriage goals. Although it is conducted with good intentions, tragically, the usual ways of performing these surgeries deny women sexual orgasms, cause significant morbidity or mortality among women and children, and strain the over-burdened health care systems in these developing countries. These practices are often referred to as ‘female circumcision’, but those who wish to stop them increasingly use the description ‘female genital mutilation’. My paper will explore the various forms of female genital mutilation, it’s deep association with the patrilineal system in Africa, and the efforts to stop this tragedy.   Ã‚  Ã‚  Ã‚  Ã‚   Impalpable cultural clashes explode when people from societies practicing genital mutilation settle in other parts of the world and bring these rites with them. For example, it is practiced by Muslim groups in the Philippines, Malaysia, Pakistan, Indonesia, Europe, and North America (Kluge). It is obvious that when different cultures are forced to live a similar life side by side, differences will occur. However, it is difficult to observe and accept any form of physical, mental or emotional abuse. In this particular case, the issue is addressed towards female genital mutilation which is strongly involved with all the forms of abuse. It is most common for parents to use traditional practitioners but there are some who seek medical facilities to reduce the morbidity or mortality of this genital surgery.

Saturday, August 17, 2019

John Winthrop’s “A Modell of Christian Charity” Essay

John Winthrop’s â€Å"A Modell of Christian Charity† is a primary source and â€Å"The summary of John Winthrop’s â€Å"A Model of Christian Charity†Ã¢â‚¬  was the secondary source. 2.According to the sermon, what type of society and government do the Puritans want to establish in the New World? According to John Winthrop’s sermon, the ideal form of society and government that is to be formed , would a secular government. 3.According to the sermon, what is the only way for the Puritans to avoid the â€Å"wrath of God?† Winthrop uses the metaphor of a shipwreck. According to the sermon, the only way to avoid the â€Å"wrath of God’ is to ‘followe the counsell of Micah, to doe justly, to love mercy, to walk humbly with our God† and to live by the â€Å"articles† of which God has given them in their every day life without failure and follow the commandments of God. They must also build the ideal community that of which one must give, lend, and forgive. One must also give according to necessity, not lend as required. 4.What does Winthrop mean by the quote â€Å"†¦..for wee must Consider that we shall be as a City Upon a Hill, the eies of all people are upon us?† Winthrop’s quote â€Å"†¦..for wee must Consider that we shall be as a City Upon a Hill, the eies of all people are upon us† means that they will be the role model for the rest of the world by fulfilling their pact with God and creating a holy community of which they will rule by secularism, obey the commandments, and preserve themselves from the rest of the evil and corrupt world. 5.What are some recent examples in which the notion of America as a city on a hill has entered public dialogue? Be very specific in your answer. America is one of the most developed countries in the world and considers itself a leading example towards achieving the highest level of pure democracy. We see this today in the involvement with the United Nations. America tries to relieve the atrocities that have and are taking place in the Middle East by trying to bring democracy to these suffering countries such as Afghanistan and Iraq.

Cream Cracker Under The Settee

The name of the play that we are studying is ‘Cream Cracker under the Settee'. This play was written in 1987 by a middle aged Alan Bennett who was born in Leeds in 1934. He grew up through the Second World War and in his play he writes about how views on life have changed over the years. The play is part of the ‘Talking Heads' series of plays in the 1980's. ‘Cream Cracker' is a dramatic monologue in which Doris, a 75 year old â€Å"lady of leisure†, speaks throughout. Doris is played by Dame Thora Hird who has just recently passed away. The play explores the changes within society from when Alan Bennett was a child, through the sixties and to the 1987. In the 1960's, the younger generations were getting most of the love and care from the family but the elderly were beginning to be seen as a hindrance. The play also explored how people had changed with the feeling that it was necessary to lock their doors and to be very secure rather than leaving the door open like they did in the ‘olden days'. Doris' personality changes throughout the play, as in the beginning, Doris wants to be independent but Zulema, Doris' care worker, has forbid her from doing any housework. This enrages Doris as she believes Zulema doesn't clean her house properly as she says â€Å"Zulema doesn't dust. She half dusts†. This is pointing out that Doris is quite fussy with the help that she receives from Zulema and doesn't seem to be grateful for any of it. There is proof that Doris is correct about the way Zulema dusts when she finds an old cream cracker under the settee. Doris intends on keeping the cream cracker to send off to social services to show that Zulema doesn't dust her house. This shows that Doris is quite spiteful. Later on in the play, Doris seems to be quite dull but she also recites quite a few conversations that her late husband Wilfred and she had. An example of which is when she spoke about the garden and that Wilfred wanted to have a bush but Doris wanted concrete. Wilfred argued about it having non character but Doris wanted it because of the hygiene. This shows that Doris is quite obsessive about hygiene and now she has to try and keep her house tidy otherwise she believes she will be put in Stafford House, an elderly home, but in fact, it is the other way round. By cleaning Doris is putting herself at more risk of being put in Stafford house as she is not very good on her feet and suffers from dizzy spells and has a pacemaker. This will make the audience feel sorry for her and will make them hope that she doesn't fall or be moved to Stafford House. The way in which Doris speaks makes her seem very realistic and can help people in the audience relate to her in many ways e.g. you could relate to someone you know such as an elderly relative when she's breathless. This makes it feel as if you know Doris more than you actually do and makes her seem like a real person who would be very easy to like. She also brings up past conversations she has been a part of as I mentioned before which help the audience to become more interested in the play as they are finding out what Doris is like and what kind of things she chatted about with her husband. Doris' life story is quite a moving, involving and very emotional journey. Alan Bennett makes the story very interesting and even more involving by making the actress look directly into the camera and making her seem like she's upset and choking through her sentences. She tells the audience about the way that, when Wilfred and she were younger, they were trying for a baby and when they were having the baby, it was a still birth. The midwife then wrapped the baby boy, who Doris wanted to call John, in newspaper and Doris was horrified by this. She saw this action as saying that the baby was dirty and that it was worthless. By the time Doris had awoken, the baby had gone. This makes this part of the play very sad and distressing. There are many unseen characters in this play which Doris interprets in her own special way. She mimics a lot of the characters, especially Zulema, and she is also talks quite sarcastically about Zulema in the way she talks to her. You see this when Zulema says about Doris being unable to run around with the Ewbank and all Doris says in reply is â€Å"Yes, Zulema.† This would make the audience feel sorry for Doris but in the same way happy that she isn't going to let Zulema boss her around. Another character that is introduced by Doris is Wilfred. We first hear of Wilfred when Doris knocks the photo of the two of them from the mantel piece when she attempts to dust and falls off the buffet. This would make the audience gasp in shock and feel sympathetic for her when she says â€Å"we're cracked Wilfred†, which means she is referring to her leg as she may have broken it and that their marriage is cracked. There are a few other characters used in the play such as the little boy who pees in the garden, which shows how disrespectful young children are nowadays, the neighbours whose leaves blow onto Doris' garden and the policeman who comes to check on her at the end of the play. These characters are all well timed to come into the play as it breaks the scenes up nicely and is like a chapter in the story being broken by turning the page. If Alan Bennett hadn't put these breaks in the play could have become a bit boring. Alan Bennett uses his genius and past experiences to make the play realistic by making Doris very able to relate to. A lot of old people from the same era as Doris are very reluctant to change like when Doris is in her own home and Zulema mentions Stafford House, she becomes all defensive and wary of what might happen next. This will create a lot of interest as people may be threatening their elderly relatives with being placed in a home if they cannot cope on their own and then the people will be able to see how it could be affecting them.

Friday, August 16, 2019

I Turned over the Question Paper

I turned over the question paper, I flipped through all the pages. I did not know how to answer any of the questions. I racked my brain to recall what I had studied yesterday but I barely could remember anything. I viewed around the class and found all my classmates were poring over and solving the question papers intently. My bosom friend, Serene was sitting beside me at the corner of the class. I doubted I was the only one who was still musing. The exam started at 10 a. m. and now the wall clock above the whiteboard was showing 10. 30 a. m. Time really flew, but I still had not even written a single word on my question paper. I started to have butterflies in my stomach. ‘What can I do now? ’ I kept asking myself. My brilliant yet filthy mind suddenly thought of an idea. I occasionally threw surreptitious glances at Serene. When I noticed Miss Lim was busy marking the exam papers, I rapidly threw a folded memo I had written to Serene: ‘Serene, please pass me your paper for just a couple of minutes. ‘ I could sense that she hesitated for a split second, however, she still handed her question paper to me in a swift manner so that Miss Lim would not have realised what we were actually doing. Serene was like my angel, she had always been part and parcel of my life since we had first met in Form 1. With lightning speed, I copied the answers favourably but apprehensively. My jubilance came to an abrupt end when I heard a discreet cough from behind. It was Miss Lim! She speedily snatched the question papers from me and glanced at me with the eyes of a hawk. It was too late for me to react when Serene beckoned me as I was profoundly concentrating with what I was doing. Then her creepy eyes turned to Serene who was close to tears. Her tears had yet accumulated in her guilty eyes. Miss Lim was too dazed to even talk. I could sense that all eyes were looking at us at that moment. Regaining her composure, she asked all the students to continue with their exam and took us out of the class. Just then, she made a phone call to our well-known discipline teacher, Mr Lambert. Mr Lambert took us to his discipline room together with the question papers in his hand. He scrutinised the question papers attentively. We thought he would have scolded us as loud as thunder until the staffroom located a few miles away could hear us. Surprisingly, he did not. He looked at us with his smiley and warmth face. Tears welled up in our eyes and we tried to hold them back. However, we could not. They started flowing down our cheeks. He waited with the patience of a saint until we had finished and asked us if we wanted to tell him why and how everything had happened. We told him. I confessed that I was the one who insisted Serene to pass me her question paper. He gave us a lecture and warned us not to repeat the same thing in future if not we would be suspended from school. Each of us was given a warning letter and our parents were called to the school. We vowed to Mr Lambert that we would never cheat again during examinations. From that day onwards, we were renowned to be the best cheaters ever.

Thursday, August 15, 2019

A Critical Analysis of My Strengths and Weaknesses

A Critical Analysis of My Strengths and Weaknesses in the skills of Assertiveness Assertiveness enables us to act in our own best interests, to stand up for ourselves without undue anxiety, to exercise personal rights without denying the rights of others, and to express our feelings honestly and comfortably (Alberti & Emmons, 2008). Within interpersonal communication, the skill of assertion is absolutely vital; it is a skill we are constantly utilising either consciously or unconsciously.Through nurturing the skill of assertiveness a person may have fruitful relationships with family, friends, peers, superiors and subordinates (Rakos, 1997) based on honesty and equality. The skill of Assertiveness can be viewed in differently within diverse cultures, for example in the highly extraverted, expressive and individualistic culture that is apparent in America; Assertiveness is a particularly important, if not essential skill.However in the much more reserved and introverted culture of Bri tain more emphasis is placed on interpersonal sensitivity, being a rewarding partner and the use of non-verbal signals (Forgas, 1985). The skill of Assertion has 9 main functions, these include; helping individuals to ensure that their personal rights are not violated, make reasonable requests of others, recognise the personal rights of others, avoid unnecessary aggressive conflicts and confidently, and openly communicate their position regarding any issue (Hargie, 2009).Assertiveness is a skill that is learned and training is available for those who may find it hard to assert their feelings within a social context. Assertiveness is a great skill to possess however there are times when an assertive response may in fact be the least responsive, in such times a non assertive or passive response may be what is required. The different levels of response are displayed well by the continuum which ranges from Non Assertive – Assertive – Aggressive.In most instances people sho uld aim to remain as close to assertive on the continuum as possible, as this promotes both standing up for yourself whilst also taking the other persons views into consideration. As a result of my Assertiveness practical I found myself to be just slightly towards the more non-assertive side of the continuum. I was quite pleased with this result as I did not want to be positioned too close to aggressive or non assertive.Throughout the Assertiveness Practical I had a number of Strengths which were outweighed by quite a number of Weaknesses, this is natural as Rakos stated â€Å"Assertion is a learned skill, not a trait that a person has or lacks. † An area throughout the practical in which I was strong was ‘Gesturing’, upon analysing my video I found my gestures to be smooth and fluid, I feel this conveyed a non-verbal message that I was calm within the situation. Accentuating your message with appropriate gestures can add emphasis, openness and warmth.A relaxed u se of gestures can add depth or power to your messages (Alberti & Emmons, 2008). Another area which analysing my practical revealed I was strong was ‘Paralanguage’ this can include an individual’s rate of speech, intensity, tone and volume. I found the tone of my voice to be conversational but not overly friendly and I felt this was perfect for the situation, the other people involved in the practical commented on the intensity of my voice being quite firm but not intimidating as the still felt comfortable.This is quite an important aspect of being assertive as a Kimble and Seidel study showed that those who spoke with a dominant conversational tone where perceived as being confident and therefore more likely to gain a more adequate answers (Richmond & McCroskey, 2000). Analysing my practical led me to see that I excelled in complex direct assertion, most notably the use of embellishments. Embellishments lessen the social risk whilst having a discussion with some one, however if they are used too much they can be seen as false and can dilute a person’s argument. I was particularly well versed in the use of both Praise and Empathy.An example of this in my practical was when the woman, who was trying to return a phone which was out of warranty said â€Å"you must understand where I’m coming from† in response to this I said â€Å"of course I do Miss X, I was in your position just over a year ago before I began to work here and you are handling the situation much better than I did. † The woman who prior to this piece of dialogue was getting rather agitated seemed to calm down and come to terms with what I was trying to explain. Hargie states that empathic assertion conveys sensitivity to the other person thus allowing that person to feel understood and not undermined.Although I had a number of Strengths throughout my practical I also had quite a few weaknesses which are illustrated by my personal assertiveness invento ry score which was +9, although the class average was +2, my score still showed that I can be assertive but find it quite difficult. One of the weaknesses I noticed was that I failed to keep eye contact with the person in my practical; this was a major flaw and undoubtedly hindered my assertiveness. At quite regular intervals, namely when the discussion was getting a bit heated, I tended to look at the desk in front of me rather than focus on the other person.Gaze aversion is typically an intentional act, you may be unsure of yourself and do not want him/her to see it in your eyes (Richmond & McCroskey, 2000). This was probably the case in my practical, I was unfamiliar with the given situation and felt that I was out of my depth thus I avoided eye contact; I can now see that this was a critical mistake. The second major flaw that I had involved my body posture, upon analysing the practical I realised that during our entire interaction my body was never directly facing the other per sons.When talking to another person, notice how much more personal the conversation becomes with a slight turn of the shoulders and torso toward the other person, this suggests confidence and openness to the conversation at hand (Alberti & Emmons, 2008). I now realise from my practical I was portraying quite a defensive posture, thus not putting the other person at ease whilst talking to me. Also from a defensive posture it is a lot harder to be assertive as the other person is likely to already have a certain prejudice about you.My final and most glaring weakness was overuse of the â€Å"broken record† approach, after analysing my practical session I realised that I used the phrase â€Å"I am sorry, but there is nothing I can do† a staggering amount of times. This is not a good tactic to employ as it can frustrate the other person, it can also dilute the argument and take away the relevance of what you are saying. Persistence should not be confused with the broken rec ord method, â€Å"be fair with others and keep after them until they’re fair with you† (Alberti & Emmons, 2008).Throughout my practical I also used too much ‘you language’, this attributed responsibility to the other person and was possibly too aggressive rather than assertive. In conclusion I feel that as a whole my assertiveness practical was a success; there are a number of areas in which I can improve vastly such as posture and eye contact. However I feel that I did do extremely well in a few areas, these being; gesturing and embellishments. Jim Rohn once said â€Å"Every time we speak we choose one of the four basic communication styles: assertive, aggressive, passive and passive aggressive†.This quotation helps me to illustrate that our learning of the skill of Assertion is continuous, throughout this practical research I have realised that Assertiveness is a great facet of an individual’s personality, and when used right can be an outs tanding tool. When a person has mastered the skill they will know when to be assertive, whom to be assertive with and with what intensity to put their message across (Journal of Communication, Volume 19, Issue 03, Pages 257-265). In a minority of places where cultural sensitivity is raw assertion may be deemed somewhat wreck less.Nevertheless, assertion that accommodates cultural norms is an accepted communication style and is widely used the world over. (Hargie, 2002) References Alberti, R. and Emmons, M. (1975) Stand Up, Speak Out, Talk Back: The Key to Assertive Behaviour. Pocket Books, New York Alberti, R. and Emmons, M. (2008) You’re Perfect Right, Assertiveness and Equality in Your Life and Relationships. Impact, San Luis Obisopo American Communication Journal, Volume 10, Issue 01, Spring 2008. Forgas, J. (1985) Interpersonal Bahaviour: The Psychology of Social Interaction. Hargie, O. , Dickson, D.Skilled Interpersonal Communication, Research, Theory and Practice, 7th e dition. Routledge, London. Chapter 11. Journal of Communication, Volume 19, Issue 03, Pages 257-265, September 1969 Knapp, M. and Vangelisti, A. (2006) Interpersonal Communication and Human Relationships. Allyn and Bacon, Texas Rakos, R. (2006) Assertive Behaviour: Theory, Research and Training. Routledge, London. Richmond, V. and McCroskey, J. (2000) NonVerbal Behaviour in Interpersonal Relationships, Allyn and Bacon, Texas The Electronic Journal of Communication, Volume 13, Number 4 2003. Townend, A. (2007) Assertiveness and Diversity. Palgrave, Basingstoke.