Saturday, August 31, 2019

Traditional Family a National Crisis

The idiom, â€Å"Decline of Traditional Family a National Crisis,† is deeply rooted to an assumption that national boom results from a nation rich with traditional nuclear families. Consisting of a married man and woman living together and sharing responsibilities for offspring and for each other, is the view of David Popenoe, a sociologist who believes a nuclear family defines social and national prosperity, the norm. It is when deviation from such norm occurs, that nuclear family importance is speculated.With approximate statistical data, studies show 50% of marriages will end in divorce, a common transaction that portrays dismay of family. If the society is to survive, modifications to values and norms will be subject to cultural trends. According to David Popenoe, the traditional family is the key institution in society. Therefore, the society is eroded if the key institution is distorted. Popenoe argues families provide the identity, belonging, discipline, and values that are essential for development. Furthermore, he explains the concern that is shadowing children, victims of adverse social impact.Nonetheless, Popenoe admits to social progress, such as diminishment of segregation, racism and the financial emancipation of women. Popenoe’s research is admirable but not entirely correct, due to neglecting the modern society’s value for family and structural changes that have emerged from technology. In this modern day and time, families range from traditional to modern. The traditional family is a vulnerable mirage, holding on to values once strongly deemed necessary. The modern family is a deviant reflection of traditional family.The composition of traditional nuclear family members no longer exists only in traditional sense. Participants in modern families are, the traditional man, woman and child, partnered gay men and lesbian women with or without child, single man and child, and a woman and child. Many of the family styles are respo nses to cultural evolution in freedom of choice and some are from nature’s course, whether tragic or not. Regardless of family style, the chosen avenue is not free from our roles beyond the family that restrict our access to family life, a view of Stephanie Coontz.Stephanie Coontz opposes Popenoe’s theories of a nation in crises, as well as pointing out historical data was not accurately performed. She has provided more accurate data with much more sophisticated statistical approaches, including margin of error. Data collected, state families are behaving in no-crises manner and many families are strong, today. One of Coontz’s theories included the change in woman’s role. Women of today are not just barefoot and pregnant in the kitchen, while breadwinner daddy is working to support his family.Coontz expresses, in America, there are tremendous variety of family types that have worked and not worked. She continue to explain, that families succeed because th ey were flexible in their living arrangement, oppose to then stereotypes of the past. Our choices have improved with every human movement and social trend. Scientific and technological advancements have enabled possibilities, once unattainable, for traditional partners, gay couples as well as single men and women, to have children.While traditional partners implement partnership availability, today’s single parent, has many choices from privileges bestowed. Single parents are capable of working long hours and still participate as loving and nurturing with the help of community, employer childcare accommodations, private and government programs. Communication and logistics, previously hindered from lack of technology, presently are vastly available and have narrowed deficiency in children’s need to see and communicate with parents.Being equipped with much assistance, parents work productively or extensively, trying to excel. Structure of family is not the vitality of a nation; it is the family that creates a nation. Changing laws pave further change. Yesterday’s view of family, sufficed as best, still prevails but different family structures are emerging. Meeting the needs of members and protecting them from poverty, violence or sexual exploitation, is parental, social and national responsibility. Responsibility to achieve these needs starts with parents, sifters thru society, and lives nationally anew.

Friday, August 30, 2019

Chapter One Overview of Information Systems

1. 1 Introduction When Rutherford B. Hayes, the 19th president of the United States, saw a demonstration of the telephone in the late 1800s, he reportedly commented that while it was a wonderful invention, businessmen would never use it. Hayes believed that people had to meet face to face to conduct substantive business affairs, and he was not alone in that assessment.Few of Hayes's contemporaries could foresee the profound changes that would be ushered in by the telephone and other technologies of the day, including steam engines, production machinery; transportation technologies such as railroads and automobiles, and communication technologies such as the telegraph and telephone. As we are in the 21st century, we are once again experiencing an intense period of technology-enabled innovation, creativity, and excitement that has been spurred by the information and telecommunications technologies and associated changes in our life, work and society.We are now in  the information/kno wledge age — a time when information and knowledge are power. Leading industrial countries are transforming from industrial-based economies to information/knowledge-based economy. Information is everywhere. Information and knowledge have become critical, strategic assets for most organizations. We live in an â€Å"information society,† where power and wealth increasingly depend on information and knowledge as central assets. It is a new world of doing business.Business and other organizations all over the world are focusing on information and knowledge as their key strategic resources. All firms today, large and small, local and global, use information systems to achieve important business objectives, such as operational efficiency, customer and supplier intimacy, better decision making, and new products and services. A continuing stream of information technology innovations from the Internet to wireless networks to digital phone is continuing to transform the business world.These innovations are enabling entrepreneurs and innovative traditional firms to create new products and service, develop new business models, and transform the day-to-day conduct of business. In the process, some old businesses, even industries, are being destroyed while new businesses are springing up. In 2005, journalist Thomas Friedman wrote an influential book declaring the world was ‘flat’ by which he meant that the Internet and global communications had greatly reduced the economic and cultural advantages of developed countries. U. S. nd European countries were in a fight for their economic lives, competing for jobs, markets, resources, and even ideas with highly educated, motivated populations in low-wage areas in the less developed world. The globalization trend of the world economy greatly enhances the value of information systems to the organizations. In today's global business environment, information technology is creating new opportunities for organ izational coordination and innovation. Organizations require powerful information and communication systems to manage business on an international scale.Manufacturers are using information systems to order supplies and distribute goods faster than ever before; financial institutions are employing them to transfer billions of dollars around the world electronically; investors are using them to make multimillion-dollar decisions. This globalization presents you and your business with both challenges and opportunities. The challenge for you as a business student is to develop high-level skills through education and on-the-job experience that cannot be outsourced. Information systems will continue to change our business, society and lives.Information system and technologies will also play large roles in your career. Along with the changes in business come changes in job and careers. No matter whether you are a finance, accounting, management, marketing, operations management, or informa tion systems major, how you work, where you work, and how well you are compensated will all be affected by business information systems. When interviewing potential employees, business firms often look for new hires who know how to use information technologies and systems for achieving bottom-line business results.It is widely recognized that understanding information systems is essential for managers and employees because most organizations need information systems to survive and prosper. Employees will depend on the information systems to increase their productivity. Management will use the information systems to improve their decision-making processes. Thus the knowledge of information systems and the ability to put this knowledge to work can result in a successful personal career. The knowledge and skill you learn from this subject will be valuable throughout your business career. 1. Computer Literacy and Information System Literacy Today, computers are everywhere: at work, at s chool, and at home. Many daily activities either involve the use of or depend on information from a computer. Computer advances impact all individuals, families, organizations, and schools (see Figure 1-1). Computers already are an essential part of people's daily lives, as much as the automobile, television, and telephone. Computers are taking on many new roles — providing vast information resources, fast communications, effective learning tools, and powerful support for activities in businesses, schools, and homes.Information systems and technologies have become a vital component of successful businesses and organizations. They thus constitute an essential field of study in business administration and management. Almost any career in your future will involve a computer in some way. You probably recognize that it will not be easy to get through the rest of your life without knowing about computers and information systems. In today's technology-rich world, a great demand for computer and information systems professionals exists and continues to grow.The computer and information systems industries offer many rewarding careers and jobs, but require a unique combination of hands-on computing skills, creative problem solving ability, and an understanding of business needs. In preparing yourself to enter today's fast-paced, ever-changing, and information-intense business environment, you need to understand the new thinking in business. Managers and professionals such as engineers, scientists, or architects are collectively known as knowledge workers, since their main contribution to the activities in which they are involved is their knowledge and skills.The term literacy has been used to describe two types of knowledge that are key to succeed as a knowledge worker in today's information/knowledge-based business environment. One kind of knowledge is computer literacy; the other is information systems literacy. The knowledge and understanding of computer syste ms and the ways they function are called computer literacy. Computer literacy focuses primarily on knowledge of information technology. This knowledge includes an understanding of computer terminology, recognition of the strengths and weaknesses of the computer, and an ability to use the computer.It also stresses computer equipment and devices (hardware), programs and instructions (software), databases, networking, and telecommunications. The requirements that determine computer literacy change as technology changes. As you study about computers, you will become aware of their importance, their versatility, and their pervasiveness in our society. There is no better way to understand computer systems than through interacting with one. So being computer literate also means being able to use computers for some type of applications. However, no one expects you to become a computer expert.Today, information systems provide the communication and analytic power that firms need for conducti ng trade and managing businesses on a global scale. In addition to understanding computers, the modern knowledge worker should have information systems literacy. From an organizational perspective, an information system is an organizational and management solution, based on information technology, to a challenge posed by today's dynamic environment. To fully understand information systems, you must understand the broader organization, management, and information technology dimensions of information systems (see Figure 1-2).Figure 1-2 Organization, management, and information technology dimensions of information systems Information systems are integral part of organizations. The key elements of an organization are its people, structure, operating procedures, politics, and culture. Organizations are composed of different levels and specialties. Different levels and specialties in an organization create different interests and points of view. Information systems come out of this cauldr on of differing perspectives, conflicts, compromises, and agreements that are a natural part of all organizations.Management's job is to make sense out of the many situations faced by organizations, make decisions, and formulate action plans to solve organizational problems. Managers perceive business challenges in the environment, they set the organizational strategy for responding and allocate the human and financial resources to achieve the strategy and coordinate the work. The business information systems in organizations reflect the hopes, dreams, and realities of the managers. Information technology is one of many tools managers use to cope with change.Information technology infrastructure provides the foundation or platform on which the firm can build its specific information systems. Each organization must carefully design and manage its information technology infrastructure so that it has the set of technology services it needs for the work it wants to accomplish with infor mation systems. Let us use UPS's package tracking system to identify the organization, management, and technology elements. The organization element anchors the package tracking system in UPS's sales and production functions (the main product of UPS is a service–package delivery).It specifies the required procedures for identifying packages with both sender and recipient information, taking inventory, tracking the packages en route, and providing package status reports for UPS customers and customer service representatives. The system must also provide information to satisfy the needs of managers and workers. UPS's management is responsible for monitoring service levels and costs and for promoting the company's strategy of combining low-cost and superior service.Management decided to use automation to increase the ease of sending a package via UPS and of checking its delivery status, thereby reducing delivery costs and increasing sales revenues. The technology supporting this system consists of handheld computers, barcode scanners, wired and wireless communications networks, desktop computers, UPS's central computer, storage technology for the package delivery data, UPS package tracking software, and software to access the World Wide Web. The result is an information system solution to the business challenge of providing a high level of service with low prices in the face of mounting competition.Therefore, information systems literacy is knowledge of how and why data, information, knowledge, computer, and information technology are used by organizations and individuals. It includes not only knowledge of computer technology but also aspects of the broader range of information technology. Information systems literacy can involve knowledge of how and why people use information technology; knowledge of organizations, decision-making approaches, management levels, and information needs; and knowledge of how organizations can use information systems to achiev e their goals.Thus, the key aspect of information systems literacy is knowing how to deploy information technology to help an organization achieve its business goals and to gain a competitive advantage. In general, knowing about various types of hardware and software is an example of computer literacy. Knowing how to use hardware and software to increase profits, cut costs, improve productivity, increase customer satisfaction, and improve management decision-making is an example of information systems literacy. Information system literacy includes a ehavioral as well as a technical approach to studying information systems. The field of management information systems (MIS) tries to achieve this broader information systems literacy. One of the main objectives of this course is to lay the foundation for information systems literacy. 1. 3 Data and Information Today, information is one of an organization's most important and valuable resources. Organizational information systems contain information about people, places, things, ideas and events within the organization and in the environment surrounding it.By information we mean data that have being processed into a form that is meaningful and useful to the recipient. Data are therefore the raw facts for producing information. The relation of data to information is that of raw material to finished product. The information systems process data in unusable form into a usable form that is information for intended recipient. As the simplified example shown in Figure 1-3, the student name, ID number, semester, curse codes, and course grades all represent data. The computer processes the data to produce the grade information (report). | | Figure 1-3 The process of transforming data into information| Organizational activities require information. Producing products, assigning workers, making sales, billing amounts due, and providing customer services are examples of activities that use information. Data represents real-wor ld facts, such as an employee's name, weekly sales, customer numbers, or product inventory. Data items are organized for processing purpose into data structures, file structure, database, and data warehouse. Data are simply raw facts and has little value beyond its existence.Information systems manipulate and process data to create information. The information in an information system take a variety of forms including text, numbers, pictures, sounds, animations and videos. The value of information is described most meaningful in the context of a decision. In other words, the value of information is directly linked to how it helps decision-makers achieve their organization's goals. If there were no current or future choices or decisions affected by a piece of information, the information would be unnecessary.It is cited frequently in explaining why information systems that collect vast amounts of data often fail to satisfy managerial information needs. The value of information might be measured in following three dimensions: * Content — information should be accurate, relevant, and complete * Time — information should be timely and current * Form — information should be provided at the appropriate level of detail and in the most appropriate form. More specifically, information should have certain characteristics to make it valuable.The characteristics of valuable information include being accurate, verifiable, timely, organized, meaningful, useful, and cost effective. * Accurate information is correct information. Inaccurate information often is worse than no information, because inaccurate information can lead to incorrect decisions. For example, you assume that your transcript correctly list your grades. If your transcript incorrectly reports low grades in your major courses, a potential employer might deny you an interview. * Verifiable information means that the information can be confirm by the user.For example, before relying on the c umulative GPA on your transcript, a potential employer might want to check that the GPA is calculated correctly. The potential employer can verify the accuracy of the accumulated GPA by calculating it from the individual semester GPA values. * Timely information has an age suited to its use. Your transcript, for example, has value for a potential employer only if the employer receives it in time to make a hiring decision. Although most information loses its value with time, some information, such as information on trends, gains value as time passes and more information is obtained.Your transcript, for example, gains value as you complete more coursework because it reflects your work ethic and dedication over a time period. * Meaningful information is relevant to the person who receives it. Because certain information is meaningful only to specific individuals or groups, unnecessary information should be eliminated. * Cost-effective information costs less to produce than the value of the resulting information. Most organizations periodically review the information they produce in reports to determine if the reports provide valuable information.Based on that review, the companies can determine whether to continue, scale back, or even eliminate these reports. The need for timely information can change for each business decision. Some decisions require weekly or monthly information while other decisions require daily information. Timeliness is an aspect of information that depends on the situation. In some industries such as insurance and construction, information that is a few days or weeks old can be relevant, while in other industries such as 911 centers and stock trading information that is a few minutes old can be almost worthless.Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to query requests. Many organizations use real-time systems to exploit key corporate transactional informatio n. Real-time systems provide valuable information for supporting corporate strategies such as customer relationship management. The growing demand for real-time information stems from organizations’ need to make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully.Nevertheless, timeliness is relative. Organizations need fresh, timely information to make good decisions. Information also needs to be timely in the sense that it meets employees’ needs, but no more. If employees can absorb information only on an hourly or daily basis, there is no need to gather real-time information in smaller increments. Many people request real-time information without understanding one of the biggest pitfalls associated with real-time information’s continual change. Imagine the following scenario: Three managers meet at the end of the day to discuss a business problem.Each manager has gathered information at different times during the day to create a picture of the situation. Each manager’s picture may be different because of this time discrepancy. Their views on the business problem may not match since the information they are basing their analysis on is continually changing. This approach may not speed up decision making, and may actually slow it down. Organizations must evaluate the timeliness of the information required for each business decision. Organizations do not want to find themselves using real-time information to make a bad decision faster.Information and knowledge are becoming the foundation for many new products and services. Information/ knowledge-intense products such as computer games require a great deal of knowledge to produce. Entire new information-based services have sprung up, such as Lexis, Dow Jones News, and America Online. These fields are employing millions of people. Information technology constitutes more than 75 percent of the invested capital in s ervice industries such as finance, insurance, and real estate. Knowledge is used more intensively in the production of traditional products as well.In the automobile industry, both design and production now rely heavily on knowledge and information technology. 1. 4 Information Systems 1. 4. 1 The Concept of System System concepts underlie the field of information systems. A system is a set of elements or components that operate together to accomplish an objective. Many examples of systems can be found in the physical and biological sciences, in modern technology, and in human society. A system (sometimes called a dynamic system) has three basic interacting components or functions: *   Input involves capturing and assembling elements that enter the system to be processed.For example, raw materials, energy, data, and human effort must be secured and organized for processing. * Processing involves transforming processes that convert input into output. Examples are a manufacturing pro cess, the human breathing process, or mathematical calculations. * Output involves transferring elements that have been produced by a transformation process to their ultimate destination. For example, finished products, human services, and management information must be transmitted to their human users. The system concept becomes even more useful by including two additional components: feedback and control.A system with feedback and control components is sometimes called a cybernetic system, that is, a self-monitoring, self-regulating system. * Feedback is data about the performance of a system. For example, data about sales performance is feedback to a sales manager. * Control involves monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal. The control function then makes necessary adjustments to a system's input and processing components to ensure that it produces proper output.For example, a sales manager exercises control wh en reassigning salespersons to new sales territories after evaluating feedback about their sales performance. 1. 4. 2 Information Systems An information system is a specialized type of system and can be defined in a number of different ways. An information system can be defined technically as a set of interrelated information technology components that collect (or retrieve), process, store, and distribute data and information and provide a feedback/control mechanism to meet an objective.From a business perspective, information systems can be defined as a combination of hardware, software, and telecommunications networks which people build and use to collect, create, and distribute useful data and information, typically in organizational settings. Information systems support managers and workers make decisions, control operations, analyze problems, visualize complex subjects, and create new products and services. An information system contains information about an organization and it s surrounding environment.The basic activities of input, processing and output in an information system produce the information that organization need for decision-making and operations. An information system also requires feedback and control components to meet an objective (see Figure 2-4). | Figure 1-4 An information system| In an information system, input is the activity of gathering and capturing raw data from within the organization or from its external environment. For example, in producing paychecks, the number of hours worked for every worker must be collected before the pay amounts can be calculated and checks can be printed.Processing involves converting or transforming data into more meaningful form. Processing can involve making calculations, making comparisons and taking alternative actions, and storing data for future use. In the payroll example, the required processing may first involve calculating gross pay. If weekly hours worked are greater than 40 hours, overtime pay must be determined. Then deductions are subtracted from gross pay to get net pay. Output involves producing useful information in a proper form such as reports, paychecks or documents, and transferring the processed information to the user.In some cases, output from one information system can become input for another. Information systems also provide feedback/control mechanism to allow people to evaluate the performance of the systems and make necessary changes to input or processing activities. Information technologies (IT) are tools used to build information systems. Information technologies include hardware, software, database, networks, and other related components. Information systems use and integrate these technologies to meet the information needs of different users.The information technology, then, must support the goal of the information system, which is to provide accurate, timely, relevant, complete, well-formatted information that users value. Computer architecture ensures a fit between information systems and technologies. Computers are valuable tools. As technology advances and computers extend into every facet of daily living, computers have become an essential part of organizational information processing because of the power of the technology and the volume of data to be processed.When we use the term information systems, we are referring to computer-based information systems (CBIS) — organizational information systems that rely on computer technology to collect, process, store and disseminate information. A CBIS is composed of hardware, software, database, telecommunications, people, and protocols/procedures, as shown in Figure 1-5. | | | Figure 1-5 The components of an information system| In a computer-based information system, hardware consists of physical computer equipment and associated devices used to perform input, processing, and output activities.Software is a broad term given to the instructions that direct the operatio n of the hardware. Database contains all data utilized by application software. Telecommunications is the electronic transmission of signals for communications and enables organizations to link computer systems into effective networks. Information systems personnel include all the people who develop, program, operate, manage, use and maintain the information systems. Protocols are standards and guidelines used for designing and deploying information systems.Procedures include strategies, policies, methods, and rules for developing, managing and using the information systems. Although computer-based information systems use computer technology to process raw data into meaningful information, there is a sharp distinction between a computer system and an information system. Electronic computers and related software programs are the technical foundation, the tools and materials, of modern information systems. Computer systems provide the equipment and software for processing, storing and distributing information. Knowing how computer systems work is important in esigning solutions to organizational problems, but computer systems are only part of an information system. Computers and programs alone cannot produce the information a particular organization needs. To understand information systems, you must understand the problems they are designed to solve, their architectural and design elements, and the organizational processes that lead to these solutions. In other words, to be information systems literate as opposed to computer literate, you must understand the broader organization, management, and technology dimensions of information systems. 1. 4. Enterprise System Architectures System architecture refers to the arrangement of software, hardware, and tasks in an information system needed to achieve a specific functionality. To support the volume and complexity of today’s users and application requirements, information technology needs to take a fresh appro ach to enterprise system architectures by constructing smarter, more flexible environments that protect from system failures and crashes. Enterprise system architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets.A unified enterprise system architecture will standardize enterprisewide hardware and software, with tighter links to the business strategy. A solid enterprise system architecture can decrease costs, increase standardization, promote reuse of IT assets, and speed development of new systems. The right enterprise system architecture can make IT cheaper, strategic, and more responsive. Enterprise system architectures are never static; they continually change. Organizations use enterprise system architects to help manage change.An enterprise system architect is a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business. An enterprise s ystem architect is expensive and generally receives a salary of $180,000 per year on average. Companies that have created solid enterprise system architectures are reaping huge rewards in savings, flexibility, and business alignment. Basic enterprise architectures contain three components, as shown in Figure 2-6. | | |   Ã‚   Figure 1-6 Three components of enterprise system rchitecture| Information Architecture Information architecture identifies where and how important information, like customer records, is maintained and secured. A single backup or restore failure can cost an organization more than time and money; some data cannot be recreated, and the business intelligence lost from that data can be tremendous. Three primary areas an enterprise information architecture should focus on include back up and recovery, disaster recovery, and information security. Each year businesses lose time and money because of system crashes and failures.One way to minimize the damage of a syste m crash is to have a backup and recovery strategy in place. A backup is an exact copy of a system’s information. Recovery is the ability to get a system up and running in the even of a system crash or failure and includes restoring the information backup. Organizations should choose a backup and recovery strategy that is in line with its business goals. If the organization deals with large volumes of critical information, it will require daily backups, perhaps even hourly backups, to storage servers.Deciding how often to back up information and what media to use is a critical business decision. If an organization decides to back up on a weekly basis, then it is taking the risk that, if a total system crash occurs, it could lose a week’s worth of work. If this risk is unacceptable, then the organization needs to move to a daily backup strategy. Some organizations find the risk of losing a day’s worth of work too high and move to an hourly backup strategy. Two tec hniques used to help in case of system failure are fault tolerance and failover.Fault tolerance is a computer system designed that in the event a component fails, a backup tolerance can be provided with software, or embedded in hardware, or provide by some combination. Failover is a backup operational mode in which the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime. A failover procedure involves automatically offloading tasks to a standby system component so that the procedure si as seamless as possible to the end user.Disasters such as power outages, floods, and even harmful hacking strike businesses every day. Organizations must develop a disaster recovery plan to prepare for such occurrences. A disaster recovery plan is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood. A comprehensive disaster recovery plan takes into consideration the location of the backup information. Many organizations store backup information in an off-site facility. A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.A cold site is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster. Security professionals are under increasing pressure to do the job right and cost-effectively as networks extend beyond organizations to remote users, partners, and customers, and to cell phones, PDAs, and other mobile devices. Regulatory requirements to safeguard data have increased. Concerns about identify theft are at an all-time high. Hacking and other unauthorized access contribute to the approximately 10 million instances of identity theft each, according to the Federal Trade Commission.A good information architecture includes a strong information security plan, along with managing user access and up-to-data antivirus software and patches. Managing user access to information is a critical piece of the information architecture. There is little doubt that security is a top priority for business managers, regardless of the size of their company. The main focus for most managers is preventing hackers, spammers, and other malcontents from entering their networks, and they are looking to enhance their network-security-management, intrusion-detection, content-filtering, and anti-spam software.Infrastructure Architecture Infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals. As an organization changes, its systems must be able to change to support its operations. If an organization grows by 50 percent in a single year, its systems must be able to handle a 50 percent growth rate. Systems that cannot adapt to orga nizational changes can severely hinder the organization’s ability to operate. The future of an organization depends on its ability to meet its artners and customers on their terms, at their pace, any time of the day, in any geographic location. The following are the five primary characteristics of a solid infrastructure architecture: 1. Flexibility: Organizations must watch today’s business, as well as tomorrow’s, when designing and building systems. Systems must be flexible enough to meet all types of business changes. For example, a system night be designed to include the ability to handle multiple currencies and languages, even though the company is not currently performing business in other countries.When the company starts growing and performing business in new countries, the system will already have the flexibility to handle multiple currencies and languages. If the company failed to recognize that its business would someday be global, it would need to red esign all its systems to handle multiple currencies and languages, not easy once systems are up and running. 2. Scalability: Scalability refers to the ability of a system to increase in size as demand warrants. If an organization grows faster than anticipated, it might all types of performance degradations, ranging from running out of storage space to a slowdown in transaction speeds.Capacity planning determines the future IT infrastructure requirements for new equipment and additional network capacity. Performing a capacity plan is one way to ensure the IT infrastructure is scalable. There are three steps you can take to meet the demands for service at your system: scale hardware vertically, scale hardware horizontally, and improve the processing architecture of the system. Vertical scaling refers to increasing the processing poser of individual components. Horizontal scaling refers to employing multiple computers to share the workload and increase the ‘footprint’ of t he installation.Improving the processing architecture is a combination of vertical and horizontal scaling, combined with artful design decisions. 3. Reliability: Reliability ensures all systems are functioning correctly and providing accurate information. Reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency IT metrics. 4. Availability: High availability refers to a system or component that is continuously operational for a desirably long length of time. Availability is typically measured relative to 100 percent operational.A widely held but difficult-to-achieve standard of availability for a system is known as ‘five 9s’ (99. 999 percent) availability. Systems, however, must come down for maintenance, upgrades, and fixes. One challenge organizations face is determining when to schedule system downtime if the system is expected to operate continually. Many organizations overcome this problem by having redunda nt systems, allowing the organization to take one system down by switching over to a redundant system. 5. Performance: Performance measures how quickly a system performs a certain process or transaction.Not having enough performance capacity can have a devastating, negative impact on a business. People usually use IT metrics to measure the system architecture. Efficiency IT metrics measure the performance of the IT system including throughout, speed and availability. Effective IT metrics measure the impact of the IT system on business processes and activities including customer satisfaction, conversion rates, and sell-through increases. Application Architecture Application architecture determines how applications integrate and relate to each other.Advances in integration technology are providing new ways for designing more agile, more responsive enterprise architectures that provide the kind of value businesses need. With these new architectures, IT can build new business capabiliti es faster, cheaper, and in a vocabulary the business can understand. Web services promise to be the next major frontier in computing. Web services contain a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services.The major application of Web services is the integration among different applications. Before Web services, organizations had trouble with interoperability. Interoperability is the capability of two or more computer systems to share data and resources. If a supply chain management system can share data with a customer relationship management system, interoperability exists between the two systems. Web services encompass all the technologies that are used to transmit and process information on and across a network, most specifically the Internet.A Web service is really a piece of reusable software code. A software developer can quickly build a new application by using many of t hese pieces of reusable code. For example, a ‘Deposit’ Web service for a banking system might allow customers to perform the task of depositing money to their accounts. The Web service could be used by a bank teller, by the customer at an ATM, and by the customer performing an online transaction through a Web browser. The trick to building Web service is finding the right level of granularity.An open system is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them. The designs of open systems allow for information sharing. In the past different systems were independent of each other and operated as individual islands of control. The sharing of information was accomplished through software drivers and devices that routed data allowing information to be translated and shared between systems.Open system integration is designed to: * Allow sy stems to seamlessly share information. The sharing of information reduces the total number of devices, resulting in an overall decrease in cost. * Capitalize on enterprise architectures. This avoids installing several independent systems, which creates duplication of devices. * Eliminate proprietary systems and promote competitive pricing. Utilization of open systems allows users to purchase systems competitively. 1. 5 The Role of Information Systems in Business 1. . 1 Business Environment Business students frequently ask, â€Å"Why do we need to study information technology? † The answer is simple: Information technology is everywhere in business. Information technology plays a critical role in reducing costs, improving productivity and generating growth by facilitating communication and increasing business intelligence. Information technology is supplying the foundation for new business models, new business processes, and new ways of distributing products, services and know ledge.Companies are relying on information technology and telecommunications to conduct more of their work electronically, seamlessly linking factories, offices, sales forces, managers, customers, and suppliers around the globe. Understanding information technology provides great insight to anyone learning about business. Business students who understand technology have an advantage in business. | | | Figure 1-7 Seven major factors that affect today's business environment| Before discussing the role of information systems in organizations, let's xamine some of the most important factors shaping today's new business. These and other factors have altered the environment of business and posed new challenges to business firms and their management. To you, these factors can be translated into a substantial career opportunity, if you understand them and prepare yourself through education to take advantage of them. Figure 2-7 lists seven important factors including globalization, competiti on, information as a key resource, organization restructuring, end-use computing, electronic commerce, and virtual workplace.Emergence of the global economy means that business today is global business. The success of firms today and in the future depends on their ability to manage business globally. Business globalization greatly enhances the value of information systems to organizations and offers new opportunities to business. Organizations need powerful information systems and communications systems to conduct trade and manage businesses on a global scale. Obviously, globalization has increased competition. Information technology is another reason competition is heating up.Globalization and information technology bring new threats to domestic business firms. Customers now can use global communication and information systems to shop in a worldwide marketplace, obtaining price and quality information reliably 24 hours a day. To become competitive participants in international mark ets, firms need powerful information and communication systems. In the information age, information is so important that businesses must have information to be successful. The need to capture and record information about what customers want has led to many databases and data warehouses.These databases and data warehouses contain valuable information to help firms to throb with the pulse of marketplace. These databases and data warehouses of great economic value are based on new information technologies. Today, many organizations are restructuring in a variety of ways. The explosive growth in computing power and networks is turning organizations into networked enterprises, which allow organizations to redesign and reshape their structures, scope of operations, control mechanisms, work practices, work flows, products, and services.Many organizations have reduced the number of levels in their organizational hierarchies. In these flatter organizations, employees are empowered to make mo re decisions than in the past. Contemporary information technology can make more information available to line workers so they can make decisions that previously had been made by managers. Companies can use information and communications technologies to organize in more flexible ways, increasing their ability to respond to changes in the marketplace, to take advantage of new business opportunities, and to reduce the cost of obtaining products and services from outside the firm.Many organizations use information technology to recast the management process, providing powerful new capabilities to help managers plan, organize, lead, and control. One important trend is using information technology for enterprise resource planning. For example, more and more firms are using the Enterprise Resource Planning (ERP) system. The ERP system is a business information system that integrates all facets of the business, including planning, purchasing, manufacturing, sales, finance and human resourc es.The ERP system creates an integrated database to coordinate business activities within and across functional areas by sharing consistent information, and automates many business processes. Information and telecommunications technologies are creating new ways of conducting business electronically both inside and outside the firm. The Internet is emerging as the primary technology platform for electronic commerce. Electronic commerce is the computerized process of buying and selling goods and services through the Internet, networks, and other digital technologies.The Internet links millions of organizations and individuals into a single network, creating the foundation for a vast electronic marketplace. An electronic market is an information system that links together many buyers and sellers to exchange information, products, services, and payments. Many organizations are increasingly apply Internet technology to facilitate the management and coordination of other business processe s within the firm — publishing company's policies and work procedures, scheduling work flow, reviewing production plan, revising design documents, and so on, which is called electronic business.Information and telecommunications technologies have eliminated distance as a factor for many types of work in many situations. Many companies are using networked information systems to coordinate their geographically distributed capabilities. Works can be done wherever the employees are located. The term virtual workplace describes a technology-enabled working arrangement where work can be done at virtually any geographical location as along as the work site is linked to one or more of the firm's fixed locations by some type of telecommunications capability.Some companies are even using networked information systems to coordinate with other organizations such as suppliers, distributor, or even competitors as virtual organizations to create and distribute new products and services with out being limited by traditional organizational boundaries or physical location. Intensive use of information technology in business firms, coupled with equally significant organizational redesign, has created a new type of business: the fully digital firm. The digital firm can be defined along several dimensions.A digital firm is one where nearly all of the organization's significant business relationships with customers, suppliers, and employees are digitally enabled and mediated. Core business processes are accomplished through digital networks spanning the entire organization or linking multiple organizations. Key corporate assets–intellectual property, core competencies, and financial and human assets–are managed through digital means. In a digital firm, any piece of information required to support key business decisions is available at anytime and anywhere in the firm.Digital firms sense and respond to their environments far more rapidly than traditional firms, g iving them more flexibility to survive in turbulent times. Digital firms offer extraordinary opportunities for more global organization and management. By digitally enabling and streamlining their work, digital firms have the potential to achieve unprecedented levels of profitability and competitiveness. A few firms, such as Cisco Systems, Dell Computer Corporation or Google, are close to becoming fully digital firms, using the Internet to drive every aspect of their business.In most other companies, a fully digital firm is still more vision than reality but this vision is driving them toward digital integration. For today's managers, information technology is not simply a useful handmaiden, an enabler, but rather it is the core of the business and a primary management tool. There are four major systems that help define the digital firm. Supply chain management systems seek to automate the relationship between suppliers and the firm to optimize the planning, sourcing, manufacturing, and delivery of products and services.Customer relationship management systems attempt to develop a coherent, integrated view of all the relationships a firm maintains with its customers. Enterprise systems create an integrated enterprise-wide information system to coordinate key internal processes of the firm, integrating data from manufacturing and distribution, sales, finance, and human resources. Finally, knowledge management systems seek to create, capture, store, and disseminate firm expertise and knowledge.Collectively, these systems represent the areas where corporations are digitally integrating their information flows and making major information system investments. For example, building only cars that customers order and building them in record time has been every automaker's dream. Now, it appears that Toyota Motor Corporation is coming close to making that dream come true. Toyota is using new software tools and Internet technology to drive its processes for designing a nd manufacturing automobiles and to integrate them with customers and suppliers.The company is moving toward a digital firm organization. In many organizations, end users are developing a growing percentage of information systems with little or no formal assistance from technical specialists. This phenomenon is called end-user computing. Information technology education programs at both the college and pre-college level and easy-to-use of both computer hardware and software have made more and more managers and employees have good computing knowledge and skills.End user computing involves you, as a future knowledge worker, in more than just developing a budget using spreadsheet software, creating a presentation using presentation graphics software, or using a system that someone else developed. It requires you to take an active role in developing systems that support your specific needs or the needs of a team. 1. 5. 2 Functional Areas in Business Understanding information technology begins with gaining an understanding of how businesses function and IT’s role in creating efficiencies and effectiveness across the organization.Typical businesses operate by functional areas. Each area undertakes a specific core business function. These functional areas are interdependent (see Figure 2-8). For example, sales must rely on information from operations to understand inventory, place orders, calculate transportation costs, and gain insight into product availability based on production schedules. For an organization to succeed, every department or functional area must work together sharing common information. Information technology can enable departments to more fficiently and effectively perform their business operations. | Figure 1-8 Common functional areas in business| To perform the MIS function effectively, almost all organizations today, particularly large and medium-sized ones, have an internal IT department. The plans and goals of the IT department must al ign with the plans and goals of the organization. Information technology can enable an organization to increase efficiency in manufacturing, retain key customers, seek out new sources of supply, and introduce effective financial management.Information technology is a relatively new functional area, having been around formally in most organizations only for about 40 years. Job titles, roles, and responsibilities often differ from organization to organization. Most organizations maintain positions such as chief executive officer (CEO), chief financial officer (CFO), and chief operations officer (COO) at the strategic level. Recently there are more IT-related strategic positions such chief information officer (CIO), chief technology officer (CTO), chief security officer (CSO), chief privacy officer (CPO), and chief knowledge officer (CKO).The CIO is responsible for overseeing all uses of information technology and ensuring the strategic alignment of IT with business goals and objective s. The CTO is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization’s information technology. The CSO is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses. The CPO is responsible for ensuring the ethical and legal use of information within an organization.The CKO is responsible for collecting, maintaining, and distributing the organization’s knowledge. The CKO designs programs and systems that make it easy for people to reuse knowledge. All the above IT positions and responsibilities are critical to an organization’s success. While many organizations may not have a different individual for each of these positions, they must have leaders taking responsibility for all these areas of concern. It is not always easy for managers to make the right choices when using IT to support business initiatives.Most managers understand their business initiatives well, but are often at a loss when it comes to knowing how to use and manage IT effectively in support of those initiatives. Managers who understand what IT is, and what IT can and cannot do, are in the best position for success. Individuals anticipating a successful career in business must understand information technology including: * Information technology basics. * Roles and responsibilities in information technology. * Measuring information technology’s success. 1. 5. 3 The Role of Information Systems in BusinessIn 2007, American business invested over $1 trillion in information systems hardware, software and telecommunications equipment, more than half of all capital investment in the United States. In addition, they spent another $250 billion on business and management consulting and services, much of which involves redesigning firms’ business operations to take advantage of these new technologies. More than half of all business investment in the United States each year involves information systems and technologies. In 2007, more than 40 million U. S. usinesses had cot-com Internet sites registered. E-commerce and Internet advertising are booming. Companies today manage their operation and inventories in near real time in order to reduce their production and overhead costs and get to market faster. What makes information systems so essential today? Why are businesses investing so much in information systems and technologies? They do so to achieve the following six important business objectives: 1. Operational Excellence: Businesses continuously seek to improve the efficiency of their operations in order to achieve higher profitability.Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations, especially when coupled with changes in business practices and management behavior. 2. New Products, Services and Business Models: Information systems and technologies are a major enabling tool for firms to create new product and services, as well as entirely new business models. A business model describes how a company produces, delivers, and sells a product or service to create wealth. . Customer and Supplier Intimacy: Information systems can help a business know its customers and serves them well, the way they want to be served, the customers generally respond by returning and purchasing more. This raises revenues and profits. Likewise with suppliers: the more a business engages its suppliers, the better the suppliers can provide vital inputs. This lowers costs. 4. Improved Decision Making: Many business managers operate in an information fog bank, never really having the right information at the right time to make an informed decision.Instead, they rely on forecasts, best guesses, and luck. The result is over- or underproduction of goods, misallocation of resources, and poor response t imes. Information systems and technologies have made it possible for managers to use real-time data from the marketplace when making decisions. 5. Competitive Advantage: Information systems and technologies can help a business achieve a competitive advantage: doing things better than its competitors, charging less for superior products, and responding to customers and suppliers in real time. 6.Survival: Business firms invest in formation systems and technologies because they are necessities of doing business. Sometimes these necessities are driven by industry-level changes. Many federal and state statutes and regulations create a legal duty for companies to retain records. Firms turn to information systems and technologies to provide the capability to respond to these information retention and reporting requirements. Information systems directly affect how top management draw up long-tern planning, how managers make decisions, and what products and services are produced and how.In f act, information systems play a strategic role in the life of the firm. Figure 2-9 illustrates the relationship between businesses and information systems. | Figure 1-9 Growing interdependence between businesses and information systems| There is a growing interdependence between business strategy, organizational structure, operation rules and procedures, and production on the one hand, and IT infrastructure, IT strategy and information system management on the other. A change in any of these components often requires changes in other components.Existing information systems can act as a constraint on businesses. Often, what the organization plans to do in next five years depends on what its information systems will permit it to do. Developing new products and service, increasing market share, becoming the high-quality or low-cost producer, providing better customer service, and increasing employee productivity depend more and more on the scope and quality of information systems in th e organization. Businesses are not in the business of processing information for its own sake. Instead they rocess information in order to improve organizational performance and produce profits. From a business perspective, an information system is an important instrument for creating value for the organization. There are many ways in which information systems can contribute to firm value, including increasing the firm's return on its investments, enhancing the company's strategic position, or increasing the market value of the firm's stock. Information processing activities support management decision making, enhance the execution of business processes and as a result increase business value.Every business has an information value chain, shown in Figure 2-10, in which raw information is systematically acquired, and then transformed through various stages that add value to that information. From this perspective, information systems are part of a series of value-adding activities fo r acquiring, transforming, and distributing information that managers can use to improve decision making, enhance organizational performance, and ultimately increase firm profitability. | Figure 1-10 Business information value chain|

Thursday, August 29, 2019

Opportunistic Smoking Cessation Intervention Health And Social Care Essay

This essay provides a brooding history of the bringing of an timeserving smoke surcease intercession. In building this history, Gibbs ( 1988 ) theoretical account of contemplation has been utilised, which incorporates the undermentioned constituents: description ; feelings ; rating ; analysis ; decision ; and action program. Whilst shadowing a pattern nurse, I was provided with the chance to implement a brief smoke surcease intercession with a patient. The patients name will non be used, in regard of confidentiality ( NMC Code, 2008 ; NHS Confidentiality Code of Practice, DH 2003 ) , nevertheless, for the intent of this contemplation she will be referred to by the anonym Sarah. Sarah is a 65-year old female presenting with a figure of wellness issues. She is an fleshy tobacco user who has late been diagnosed with chronic clogging pneumonic disease ( COPD ) , a lung disease characterised by the narrowing of the air passages. COPD besides refers to chronic bronchitis and emphysema, the latter of which Sarah has been diagnosed with. It is emphysema that is Sarah ‘s primary wellness job at nowadays. The wellness publicity scheme adopted was a brief intercession consisting motivational interviewing ( Rollnick, Miller and Butler, 2007 ) , which took topographic point within the pattern surgery as portion of Sarah ‘s audience. Motivational Interviewing is a directing patient-centered manner of reding designed to assist people decide ambivalency about behavior alteration, such as smoking surcease. Alongside motivational interviewing, some specific props and learning AIDSs were utilized, including the proviso of evidence-based information, the creative activity of a COPD self-management program ( British Lung Foundation, 2010 ) , and inside informations of helpful resources Sarah could use for farther support. This included the Surrey NHS Stop Smoking Service ( www.surreyquit.net ) , which offers free NHS support tailored to the person ( i.e. hebdomadal clinic visits or telephone contact ) .FeelingssI was ab initio rather dying about this wellness publicity chance, as I was non confident in my ability to supply constructive support in the limited clip we had. However, on originating a conversation with Sarah, utilizing unfastened inquiries as recommended within motivational interviewing, the anxiousness disappeared as I listened to Sarah ‘s narrative. Active hearing requires concentration, which in bend focused me on how I might be able to assist Sarah. In set uping that Sarah was concerned for her grandchildren, who stayed with her quite often and were therefore around 2nd manus fume, this provided an ground tackle to ease the development of Sarah ‘s motive to alter. In bend, this ground tackle besides provided me with a patient-centred method for alleviating my frights, since I had found a manner of prosecuting Sarah in the procedure. Interestingly, as Sarah ‘s motive grew, so did my ain motive to guarantee that Sarah gained every bit much from this brief intercession as possible. With every inquiry that I could reply, I gained in assurance and enjoyed my function as ‘educator ‘ and ‘learner ‘ within the collaborative partnership between myself and Sarah. In this sense, the collaborative attack that underlies motivational interviewing and much of health care pattern today can profit both the patient and health care supplier. My overall feelings sing the interaction with Sarah are one of fulfillment. I feel I positively contributed to this patients increased decide to halt smoke for both herself and her household.EvaluationMotivational interviewing was selected as the most appropriate wellness publicity intercession for Sarah for a figure of grounds. First, grounds sing behaviors alteration and, in peculiar, smoking surcease, shows that degree of motive is an of import factor in inventing the best wellness publicity method or instruction program for a patient ( Prochaska, DiClemente, and Norcross, 1993 ) . This attack takes into consideration humanist larning theory and the rules of autonomous acquisition. Harmonizing to Prochaska et Al. ‘s ( 1983 ) five phases of behavior alteration, Sarah presently resides in phase 2 of the undermentioned phases: Phase 1 ( pre-contemplation ) is when the person does non mean to alter behavior ; Stage 2 ( contemplation ) is when an person is sing alteration ; Stage 3 ( readying ) is serious resoluteness to ship on smoking surcease ; Stage 4 ( action phase ) is the first few important hebdomads and months where an person is actively taking positive actions towards smoking surcease ; and Stage 5 ( care ) is about 6-months to 5-years after the induction of the smoke surcease determination, where behavior alteration has been sustained. Bing in the contemplation phase suggests that Sarah still has some unsolved ambivalency about alteration and therefore demands help traveling to present 3, where she can get down to fix for smoking surcease. If I had started to assist Sarah program for smoking surcease before she was ready, this could hold been damaging in both the short- and long-run. For illustration, it has been shown that get the better ofing the hurdlings associated with smoking surcease can increase an person ‘s self-efficacy ( i.e. assurance ) in their ability to win at their quit effort, which in bend Acts of the Apostless to cut down the likeliness of a backsliding and increase the likeliness of long-run sustained smoke surcease ( Schnoll et al. , 2010 ) . If Sarah was pushed towards a quit effort before prepared, her hazard of backsliding would hold been high ; this would hold finally reduced her assurance to seek once more. The passage from the contemplation phase to the readying phase has been cited as being critically of import to the result of quit efforts ( Prochaska, DiClemente, and Norcross, 1993 ) , as has the fact that healthcare professionals can be highly influential at this phase Long et al. , 1996 ) . I considered motivational interviewing to be cardinal to act uponing Sarah ‘s determinations sing smoke surcease since it was designed specifically to assist people decide ambivalency about behavior alteration, which is the chief feature of people in the contemplation phase of motive. Motivational interviewing can accomplish the resoluteness of ambivalency by avoiding confrontation and steering people towards taking to alter their behaviour themselves. I was cognizant that motivational interviewing would necessitate to be accompanied by elaborate instruction about smoke-related wellness issues and the likely class of COPD, together with possible complications and its association with increased morbidity and mortality. Sarah is an intelligent person and lament to have such information and reading stuff. Unfortunately, nevertheless, I was unable to reply all of her inquiries. In peculiar, I could non reply her inquiries sing the pathophysiology of smoke. Unanswered inquiries can move as a barrier to come on, something which I do non wish to bring forth in a patient who requires such barriers taking. Fortunately, I was able to reply Sarah ‘s inquiries whilst mentioning to an educational information cusp. I do, nevertheless, feel that I would hold been able to prosecute with Sarah more efficaciously if it had non been necessary for me to concentrate my attending on the cusp before me. It became evident throughout the audience that although Sarah was most surely sing discontinuing smoke, she possessed some traits that might impede her attempts. In peculiar, Sarah appeared to hold an external wellness venue of control. This means that she attributes control over her behavior to external factors as opposed to internal factors. It is good documented within the literature that an internal venue of control is more productive to behaviour alteration and healthier lifestyle picks ( Wallston and Wallston, 1978 ; Tones et al. , 1992 ) . Taking this into consideration, I was aware to admit Sarah ‘s control over her picks. In one case, I used her hubby as an illustration since Sarah had informed me that her hubby had quit smoke. I asked her how he managed to accomplish this and in recognizing her hubby ‘s function in his ain smoke surcease, Sarah appeared to be seting her venue of control towards a more internal one. However, Sarah ‘s self-efficacy remained low throughout the audience despite efforts to hike her assurance. It is believed that increased self-efficacy, which can be achieved via motivational interviewing, is an of import factor involved in the success of smoking surcease ( Brown et al. , 2003 ; Karatay et al. , 2010 ) , therefore I felt this was an of import facet to include in Sarah ‘s self-management attention program – to put herself an accomplishable end each hebdomad that would bit by bit construct her assurance.AnalysisThe Department of Health have been working with the NHS, patients, and health care professionals since 2005 to develop a scheme to better the attention and results of people with COPD ( DH, 2010 ) . This scheme places a big focal point on the bar and intervention of smoke, every bit good as the importance of supplying patients who have COPD with behavioral support and entree to halt smoke services. The Department of Health ( 2009 ) have produced counsel on effectual halt smoke services, offering three degrees of behavioral intercession: brief intercessions ( level one ) ; intensive one-to-one support and advice ( flat two ) ; and group intercessions ( flat three ) . In footings of degree one, brief intercessions, the National Institute of Clinical Excellent ( NICE ) have published guidelines and recommendations for smoking surcease ( NICE, 2004 ) . Furthermore, old UK counsel has emphasised the importance of offering timeserving, brief advice to promote all tobacco users to discontinue and to signpost them to resources and interventions that might assist them ( West, 2005 ) . They Department of Health counsel provinces that all tobacco users should be advised to discontinue and asked if they are interested in discontinuing ; this is unless there are exceeding fortunes such as other medical conditions that might impede smoking surcease. Those who are interested in discontinuing should so be offered a referral to an intensive, flat two, support service such as NHS Stop Smoking Services. Sarah was referred to the Surrey service and informed of the success rates found for NHS Stop Smoking Services. There is grounds that such services are effectual in the short-run ( 4-weeks ) and the long-run ( 52-weeks ) ; so, between 13-23 % of successful short-run quitters remain abstentious at 52-weeks ( NICE, 2007 ) . Approximately 900,000 people in England and Wales have been diagnosed with COPD ( NICE, 2004 ) and it is the 5th most common cause of decease in the UK, ensuing in over 30,000 deceases yearly ( National Statistics, 2006 ) . By 2020, it is estimated that COPD will be the 3rd most common cause of mortality worldwide ( Lopez et al. , 2006 ) . Smoke is the largest hazard factor for developing COPD, with 20 % of long-run tobacco users finally developing clinically important degrees of the disease and 80 % developing lung harm ( Garcia-Aymerich et al. , 2003 ) . These statistics highlight the urgency of hold oning timeserving wellness publicity and utilising brief intercession accomplishments to assist present the DH scheme and better the attention and outcomes provided to people with COPD. Delivering brief timeserving intercessions for smoking surcease requires an attack that does non make defensiveness but develops a patient/provider partnership conductive of the patient doing their ain determinations, with support, as to their life style. Motivational interviewing and consideration of single patient features and traits ( i.e. venue of control, phase of preparedness to alter, etc. ) provides a method of accomplishing this partnership within limited clip and resources, as is frequently the instance in busy health care environments. Learning the accomplishments within motivational interviewing will add to a healthcare professional ‘s repertory of techniques for back uping patients through behaviour alteration, as I found in the instance reflected upon within this essay.Action PlanThe UKCC Code of Professional Conduct ( 1992 ) proposes that nurses should â€Å" keep and better her professional cognition and competency. † In relation to my ain cognition and c ompetency in timeserving wellness publicity, I have recognised that I need to increase my accomplishments for fostering patient self-efficacy. Patient assurance is cardinal to successful behavior alteration and although I feel satisfied with my attack to Sarah, it would hold been utile to hold possessed a larger repertory of techniques for heightening self-efficacy. I could besides profit from a greater apprehension of the pathophysiological mechanisms by which smoking causes COPD. Sarah was peculiarly interested in the physiological effects of smoke and whilst I could offer her basic information verbally, I needed to mention to information cusps for more elaborate penetration, which disrupted the ‘flow ‘ of conversation. I have started to research these issues via a hunt of the literature on behavior alteration and wellness publicity. As portion of this hunt, I have come across the construct of ‘implementation purpose ‘ ( Gollwitzer, 1999 ) . The theory behind this construct is that in order for person to implement a coveted behavior, it is necessary for them to invent a specific program that will increase their purpose to prosecute that behavior ( Gollwitzer and Sheeran, 2006 ) . This is an interesting technique that could be integrated into motivational interviewing and wellness publicity via the self-management attention programs presently provided. I intend to research this farther and to discourse it with a superior. Using Gibb ‘s brooding theoretical account to construction this history has helped me to recognize my strongest accomplishments and those that require farther development. I will endeavor to take a proactive attack to using this greater penetration into my professional abilities.

International business Essay Example | Topics and Well Written Essays - 2500 words

International business - Essay Example    Table of Contents    Sl. No. Title Page No. 1 1. Introduction   4 – 5 2 2. Entry Strategy   5 – 10    2.1 Rationale for choosing Indian Market       2.2 Entry Mode       2.3 Advantages of Chosen Strategy       2.3.1 Licensing Vs. FDI       2.3.2 Joint Venture Vs. FDI       2.3.3 Strategic Alliance Vs. FDI       2.4 Possible Risks of Adopting FDI    3 3. Conclusion   10 – 11    Works cited    1. Introduction Market entry is one of the most crucial strategic decisions that every business organization takes. Market entry can either be an entry into a new market within the country or entry into a foreign market. In both the cases, it is very important to have an effective planning regarding the market entry process because it determines the future of the company with regard to success in the new. This report will make a detailed look into the market entry strategy suitable for Reliance Retail, one of the largest retail com panies in India, to enter the UAE retail segment. Reliance Fresh is one of the largest retail companies in India. It is founded in the year 2006 and is headed by Mukesh Ambani, the wealthiest person in India. Reliance Fresh is part of Reliance Industries Limited which has interests in petroleum, power, chemicals, textiles, polyesters, telecommunications, polymers, natural gas and petrochemicals. Reliance Fresh had huge success ever since it was established in the year 2006. Reliance fresh currently has a network of more than 560 outlets spread over in India. (Reliance Industries Limited, 2011) Reliance Fresh was placed as a retail company focussed on selling fresh fruits and vegetables and thus named as Reliance Fresh. But recently the company had announced its plan to shift its focus from fruits and vegetables to emerge as a super market or multiband retail store. One reason for this decision is the political and social issues faced by the retailer in many parts of India regarding dearth of vegetables and fruits. Another reason is to rebrand itself as a multi-brand retail store. Therefore, the company is now gradually reducing its exposure of fruits and vegetables in their outlets. As part of the expansion plan, Reliance Fresh is planning to invest around Rs. 25000 crores in the coming years. Reliance retail now operates under several brands namely, Reliance Super, Reliance Footprint, Reliance Timeout, Reliance Jewels, Reliance Wellness, Reliance Mart, and Reliance Digital catering to the specialized needs of consumers. Apart from all these Reliance also operates the brand Reliance IStore which is a specialized store selling only the products of Apple Inc. Reliance Footprint is now one of the largest footwear retailers in the country. The store caters to all the income groups of the society. Reliance Jewels is its jewellery brand and has entered the jewellery market by setting up its stores in major cities of the country. Jewellery business is one of the most promising business segments in India. Similarly Reliance Timeout is now of the largest book store in India. (Reliance Industries Limited, 2010) As of now, Reliance is only confined to the Indian market. It is now time to take the brand to a global market. Expanding retail to a global market is not easier. The main reason is that the global organized retail sector is highly competitive than the Indian retail sector. This report is intended to make an analysis of the best strategy

Wednesday, August 28, 2019

Inorgnic Synthesis Lab Report Example | Topics and Well Written Essays - 1000 words

Inorgnic Synthesis - Lab Report Example Test for SO42- required use of BaCl2 whereby the resulting component was a precipitate of BaSO42- whereas that of Al3+ yielded to a cloudy precipitate by adding KOH and disappearing in excess. During the experiment, the first step was to cut aluminum foil into small pieces, hence increase their surface area for effective and quick reaction. Afterwards, the prepared pieces of aluminum foils were put in a beaker having a capacity if 150 ml and its weight taken before they were put in a 250 ml whose weight together with its contents was 1104.7g. Then the rest of the experiment was transferred to the fume hood to void inhaling of obnoxious gases while reactions were in progress. 13 ml of 3M KOH were added in the 250 ml beaker coupled with stirring continuously to ensure all the aluminum pieces were completely dissolved. Observations made during this process encompassed bubbling reaction, black color and elevation of the contents’ temperature above the room’s ordinary. Upon completion of the entire reaction process, the contents were cooled to room temperature whereby the involved chemical equation was as follows, The cooled contents were then filtered using glass wool. This is by putting glass wool in a funnel and in 100 ml beaker whereby based on the resulting filtrate’s clearance one could do another filtration to ensure clearer resultant. There was rinsing of the glass wool (using 2 ml of hot water) before allowing resulting filtrate to cool and addition of 22 ml of 4M H2SO4. On adding of 23 ml of 4M H2SO4, the filtrate stated to change its appearance from black color to colorless before becoming dense near the bottom of the beaker. This was a precipitate while the reaction equation that took place encompassed, After the above reaction, the resultant was heat on a hot plate (5-10 minutes) to vaporize excess liquid to approximately 25 ml then testing

Tuesday, August 27, 2019

Latin american history Essay Example | Topics and Well Written Essays - 750 words

Latin american history - Essay Example analysis of the political and economic history of Columbia, Cuba, and Mexico, this essay demonstrates that the flawed economic policies of the countries are predominantly at fault. In Latin America, the 1980’s are referred to as ‘Decada de aprendizaje doloroso’ , or the decade of painful experiences. Nowhere were these experiences more evident than in Columbia. According to David Robinson, â€Å"economic problems†¦had a significant impact on the political systems in the region. Elected governments still tend to support their own interests or those of elite groups (Robinson).† The government had increasing levels of foreign debt, which forced them to devalue the currency repeatedly. People from rural areas became poorer. Even the resource-rich Columbia faced internal problems of guerrillas and the drug cartels. According to a May 8, 1990 Time magazine article, kidnapping and murder of political aspirants became a routine affair carried out by the drug cartels, in order to influence the outcome of the elections. According to the magazine, 503 people were murdered and 18 kidnapped in a single week in May. From the United States per spective, Columbia is of national importance because of its geographic location and natural resources Although Columbia is an ally of the United States, 90% of the illegal cocaine in the United States comes from Columbia, which has still not become a safe place. Fighting continues between the armed groups maintained by the drug cartels and the government forces. A United Nations report indicates that â€Å"2 million people have been displaced because of armed conflict in Columbia† this year. Most of the internally displaced persons were Afro-Columbians, who fled because they were frightened of the fighting between the Columbian army and the armed groups operating near the Atrato river in north-western Columbia. Although a determined effort by the government to overcome the drug cartels has resulted in a semblance of order in

Monday, August 26, 2019

Effectiveness of reverse gender role-play exercises in tackling trauma Research Paper

Effectiveness of reverse gender role-play exercises in tackling trauma adaptation in children witnessing domestic violence - Research Paper Example The children who become witnesses to this violence from an early age have been found to have many adjustment problems even in their adult lives (Galloway, 2005). Here, the term, ‘witnessing violence’ means, â€Å"being within range of violence and seeing it occur† (Edleson, 1999, p.841). When a child has this kind of experience, he/she may or may not have trauma adjustment problems in current and/or future life. But the research so far has shown that a considerable percentage of this group have such problems. Objective and background As researchers like Galloway (2005), Hague and Malos (1993), and Edleson (1999) have put it, a considerable percentage of children witnesses to domestic violence are found to have trauma adaptation problems. But much investigation has not been made into what could be the role of the gender of such children in relation with their trauma adaptation capabilities. It is in this context that this research envisages exploring what the role of gender flexibility is, in the process of adaptation to trauma by children who are witnesses to domestic violence. The purpose of this study is also to develop further insight into the methods of imparting gender flexibility for handling child trauma and adaptation issues, which may in turn be of help to mental health professionals who deal with this target group. It is hypothesized in this research that training in gender flexibility imparted through reverse gender role-play exercises in the form of skits will help children who are witnesses of domestic violence to better adapt to their trauma. Here, what is meant by reverse gender role-play is that girls are made to the play the roles of men and boys are made to play the roles of women in performance skits practiced as part of group therapy. Review of Literature One major study related to this topic was carried out by Catina Galloway (2005), who observed, if a child who is witnessing domestic violence has access to â€Å"tools from both ‘masculinity’ and ‘femininity’, then the child is found to have better possibility of adaptation to trauma (p.3). Galloway (2005) has called such a child, â€Å"gender-flexible† (p.3). By reverse argument, Galloway (2005) has also theorized, â€Å"a simple feminine response or masculine response to trauma inhibits or prevents adaptation† (p.3). Such an inference will lead to the assumption that the normal tools that usually children possess by way of the conventional gender training that they get in average families are not sufficient to deal with their domestic violence related trauma situation. And it will have to be concluded that only children who are either trained to use both masculine and feminine tools or specially equipped children who naturally know how to handle both these tools can hope to adapt to the situation. Jaffe, Wolfe and Wilson (1990, p.27) and Peled and Davis (1995, p.5) have opined that the reactions of childre n to domestic violence, among many other factors, may vary based on their gender as well. Jaffe, Wolf and Wilson (1990) have also found out that being witness to domestic violence, a boy often grows up to believe that violence is masculine behavior and to become himself a wife batterer, while a girl often grows up to believe that she is naturally destined to suffer violence from men and to become herself a silent victim to similar violence (p.16). Methodology The methodology adopted for this research will be participant observation (Tischler, 2010, p.35). Though participant observation has been considered as highly subjective, it has also been observed, â€Å"participant observation generates more inside information† (Kendall, 2010, p.58). As the individuals under study here are

Sunday, August 25, 2019

Managing non-profit organizations Research Paper - 1

Managing non-profit organizations - Research Paper Example In a nonprofit organization the output is the fulfillment of the community’s needs without any profit and trained staff members. Management of a nonprofit organization is also different. It includes four steps; planning, developing, operating and evaluating (Kotler). Each step in turn includes other tasks. While planning, one has to plan for three different things; strategy, resources and programs. Staff members carry out strategic planning to find out the overall purpose (mission) and direction (vision and goals) for the nonprofit, in addition to the methods (values, approaches and programs) for the nonprofit to work toward the purpose and direction. The strategic planning course offers input to all other major tasks in the organization, especially program planning and resource planning. Thus, if strategic planning is not done well, the entire organization can be unfavorably influenced. During program planning, the marketing investigation (or â€Å"inbound marketing†) activities are performed to recognize, for example, precise society requirements for the nonprofit to meet, what conclusions are desira ble to meet those needs, what explicit groups of customers to provide, and how to serve them to accomplish those outcomes. Program planning makes available input to many other functions, such as resource planning (regarding staff, funds, and people), financial management, advertising and promotions, and also fundraising. Many problems commonly connected with fundraising and promotions are really the result of poor program planning. Planners (McNamara). Typically, resources include people, financial support, amenities, equipment, supplies, and even certain policies and procedures. Budgets usually are developed that contain listings of resources that are needed, along with the predictable costs to get hold of and support the use of those resources. Resource planning straightforwardly influences the superiority of all operating

Saturday, August 24, 2019

Strategy Development And Implementation Term Paper

Strategy Development And Implementation - Term Paper Example This report stresses that the specific chapter of the book Art of War refers to a critical issue regarding a battle: the tactical disposition. The term tactical disposition incorporates two elements: securing that there is no risk of defeat from enemy, trying to identify a chance for defeating the enemy. The specific chapter highlights the importance of alternative techniques for developing a battle. This paper makes a conclusion that the identification of appropriate tactics for securing the effectiveness of a strategic business plan can be a challenging task. Moreover, it has been proved that the ability of strategic planners to identify and evaluate appropriately all risks related to a particular plan is not standardized. In fact, it seems that each strategic planner uses a different approach for evaluating business needs. In this way, most business plans are often exposed to high risks, a problem that it is usually revealed with a significant delay, when the potentials for resolving the relevant problem are limited. The use of existing theoretical models for developing effective business plans can be a method for securing the success of these plans. The views of Sun Tzu, as included in his book Art of War, would be a valuable theoretical framework of such kind. Even if the above book refers to military strategy, its involvement in business planning cannot be rejected. As prov ed above, the specific book can help strategic planners in increasing the effectiveness of their plans, either in the short or the long term.

Friday, August 23, 2019

Four Goals of Psychology Essay Example | Topics and Well Written Essays - 500 words

Four Goals of Psychology - Essay Example 17). With that distinction, psychology becomes an integral discipline that has goals to unravel information about the mind. In connection to the direction and progress of the study of the mind, four goals will be presented in the paper regarding psychology. Each will be elaborated and their advantages and disadvantages will be explored. The author then will take a position as to whether the goals are helpful or harmful to human beings supported by facts. The four goals of psychology are description, explanation, prediction, and behavioral change (Plotnik and Kouyoumdjian, 2010, p. 4). Description pertains to the objective of psychology to provide the details of the mind, behavior and motivation of people (Cutler and Penrod, 1995, p. 57). It also explores deep into the attitudes and emotions by conducting studies through surveys, observations, interviews and experimentation with the aid of equipment. On the other hand, explanation is the next step after description. It allows the psychologists to provide the information and analysis to other people and putting rational judgments on their findings (Plotnik and Kouyoumdjian, 2010, p. 4). Usually generalization is done to create principles and theories that will hold true for the majority of the findings. After explanation comes prediction which is an intelligent guess and differs from wild guess as the former makes use of science and past findings to predict the future. In the case of psychology, prediction is done based on the data or principles regarding past behaviors and attitudes (Cutler and Penrod, 1995, p. 58). With prediction, it allows people to make more accurate decisions. The last goal is behavioral change and it pertains to the act of intervening with the habits and actions of people using the techniques based on the findings about the workings of the mind (Plotnik and Kouyoumdjian, 2010, p. 4). The advantages of psychology then are easily seen as the

Thursday, August 22, 2019

Discuss with reference to two other poems Essay Example for Free

Discuss with reference to two other poems Essay Crossing the Bar’ contains the most powerful presentation of death in the anthology. To what extent do you agree? Discuss with reference to two other poems in the collection – Tennyson question Tennyson presents death in different ways in ‘Crossing the Bar’, ‘Break break break’ and ‘Morte D’Arthur’. Each presentation is powerful however; it is difficult to decide whether ‘Crossing the Bar’ contains the most powerful presentation because it depends on what type of death the reader finds the most significant. If it is the death of one’s own life, then ‘Crossing the Bar’ might seem more powerful because it is a representation of Tennyson’s complacency with his own death. But, if the death of a friend relates more to the reader’s personal experience, death in ‘Morte D’Arthur’ could be more meaningful and powerful. To some extent I do not agree that ‘Crossing the Bar’ contains the most powerful presentation of death in the anthology. Both ‘Crossing the Bar’ and ‘Break break break’ use imagery of the sea to convey different meanings. In ‘Crossing the Bar’, the sea represents the world the speaker will transgress into after death. ‘And may there be no moaning of the bar, when I put out to sea’. Tennyson uses the metaphor of the sandbar to describe the barrier between life and death. One side of the sandbar is life and the sea on the other side is death. This is a powerful representation because Tennyson sets out a distinction between the two worlds clearly, suggesting that death should be embraced because it’s now peaceful and natural. ‘And may there be no sadness of farewell, when I embark’. This is in contrast to the normal response of death, which is indicated in ‘Break break break’. In ‘Break break break’ the speaker displays feelings of anguish and pain, this is shown in the title. The repetition of the word ‘break’ emphasises the onomatopoeic sound of a heart breaking. It could also be interpreted as waves breaking on the rocks. ‘Break break break at the foot of thy crags, O sea! ’ This quote describes how life progresses in an endless cycle even in the event of the death. The effect of the ‘O’ and exclamation mark at the end punctuates the speaker’s frustration that life still continues to go on. The speaker takes on a tone of bitterness that the world is not morning with him. ‘O, well for the sailor lad, that he sings in his boat on the bay! ’ In contrast, the use of an exclamation mark in ‘Crossing the bar’ demonstrates the speaker’s excitement of death instead of feelings of enragement. ‘Sunset and evening star, And one clear call for me! ’ This shows how the speaker is compliant of death because it is their own life and they are ready, however in ‘Break break break’ the speaker is demoralised because death has taken their friend without warning. ‘Crossing the Bar’ and ‘Break break break’ both present death powerfully, however ‘Break break break’ may appear more powerful because it uses an expression of grief caused by loss and uses intense emotions, like anguish. Then again, to some extent I do agree that ‘Crossing the Bar’ contains the most powerful presentation of death in the anthology, especially in comparison with ‘Morte D’Arthur’. A similarity between ‘Crossing the Bar’ and ‘Morte D’Arthur’ is that they both discuss religion and relate them to death. King Arthur’s death in ‘Morte D’Arthur’ can be seen as an allegory for the loss of honour and chivalry in an increasingly materialistic age. ‘And the days darken around me, and the years, among new men, strange faces, other minds’. Arthur and his knights at the round table can be interpreted as Jesus and his disciples. ‘But now the whole round table has dissolved, which was an image of a mighty world. ’ The presentation of death here appears powerful because it is the removal of a higher authority, which has followers and believers just like religion. If a God is removed, then the religion will fall apart because it no longer has a leader. This makes the death of Arthur seem even more significant because it represents the collapse of civilisation. ‘Ah! My Lord Arthur, whither shall I go? ’ However, ‘Crossing the Bar’ uses religious connotations such as ‘crossing’ to describe the speaker’s journey into the next world or crossing into faith and devotion. Tennyson complements this metaphorical link with a spiritual one as he hopes he will see his ‘Pilot face to face’. This can also be interpreted as Tennyson hopes to see Hallam in the Pilot, however it is more likely that Tennyson is discussing a Christian God. This is because seeing God face to face is a biblical theme and the transition from life to death in Christianity allows people to join God in heaven, which is beyond ‘Time and Place’. The presentation of death in ‘Crossing the Bar’ may appear the most powerful because unlike ‘Morte D’Arthur’, death becomes an end that is not confusing. In ‘Morte D’Arthur’ Arthur goes to Avilion, which could be a metaphor for heaven. However, he leaves behind a disorientated world with a lack of guidance. In comparison, the bar in ‘Crossing the Bar’ is also a metaphor for heaven, but the crossing is far more peaceful and conclusive. To conclude, I believe that ‘Crossing the Bar’ contains the most powerful presentation of death because in contrast to ‘Break break break’ Tennyson is conclusive – he is being valiant about his own deaf or has come to terms with the grief of his friend and is ready to be reunited with him. ‘And may there be no moaning of the bar’. Even the structure of the poem can represent the shortness of life. By having fewer words, they can hold more control and capture the attention of the reader. In contrast, ‘Morte D’Arthur’ is longer and this makes the presentation of death less powerful because the meaning may be lost as the poem is read.