Monday, September 30, 2019

Hotel Reservation System

Online Hotel Reservation System Supervisor Mr. G. J. K. November 2012 Abstract Our project is carried out to develop a web-based application called Online Hotel Reservation System. The purposes of building the Online Hotel Reservation System are for guests to make online reservations and for hotel personnel to manage reservations, housekeeping matters and content of the web application. Problems with the current system which were discovered during business studies are time-consuming reservation process, ambiguity view of hotel condition, static content in online system and lack of housekeeping management system.The Online Hotel Reservation System is significant to optimize the potential of the system, which offer the speed and convenience of one-stop availability check, instant purchase and confirmation in reservation process. The system to be developed would also allow staff to manage housekeeping matters and update all data on the Internet, 24 hours a day, without involving a web d esigner. Research on this project is conducted by visiting the websites of various hotels and material on hotel reservation all from the internet.The methodology applied in developing this system is Waterfall Paradigm. In conclusion, this automated system is aimed to save time and money for users thus resulting in high profit to the hotel and better services to the customers. Hotels will need low maintenance cost to maintain the system. The system to be developed would also provide an economical way for the customers to do room or meal booking, or to obtain information. Contents Figures Tables Part1 INTRODUCTION 1. 1 PreambleThe online Hotel Reservation is developedfor COE 497 PROJECT 1 which is one of the final year courses offered in the Computer Engineering programme. The hotel referred to in this project is the KwamengaHotel located in Fumesua, Kumasi. After studying the current system for reservation at the hotel, it discovered that the system did not provide a way for hotel pe rsonnel to manage the content of the website. The content of the website is managed by the web designer. The system did not provide housekeeping feature for the housekeeper to keep track their daily work.Potential guests are also unable to view full picture of the room their going to reserve. The purposes of developing Online Hotel Reservation System for the hotel are to manage the online hotel reservation and contents of the hotel’s website. The application will be divided willbe divided into two core functions. The first function is developed for the online transaction via Internet, which is mainly used by the hotel’s guests whereas the second function is developed for the hotel’s staff to manage the content of the website and housekeeping matters in hotel.The guests may access the hotel’s official website to get information about the hotel, such as room rates, hotel facilities, location of hotel, and virtual tour on hotel rooms and to make the online h otel reservation that is room booking via the internet. Meanwhile, this application will enable hotel’s administrator to manage the online room reservation,online meal reservation, and housekeeping of hotel rooms. This application is aimed to provide solutions for current system in order to give better services to hotel’s guest.The application also will become a good tool for the hotel staff to manage the reservations, content of portal and housekeeping matters. 1. 2 Problem Statements The problems that influences the motives for creating a new system for the hotel are stated below a) Time consuming reservation process Online guests have to spend more time to confirm or guarantee their reservations b) Ambiguity view of hotel condition There is not much information provided in current system for guests to know the condition of the hotel that they are going to stay in. c) Static content for online systemThe content of their website is static and hotel personnel have no w ay to control content themselves. They are required to contact with system developer or programmer to update their website. d) Lack of housekeeping management system Current system did not provide feature to deal with housekeeping matters. 1. 3 Objectives * To develop an internet based system that results in significant competitive advantage for the hotel in a highly competitive market by effective advertising and promoting over the internet * To maximize the hotels sales and room occupancy by empowering customer to book their hotel rooms online. To support highly integrated processes and services that cross many business functions and reach out directly to the worldwide customers. * To provide improved services for existing customers while creating new business opportunities for the hotel. * To increase the productivity of the staff by automated shared information and simplified booking process. 1. 4 Scope In this project, an online room reservation, meal reservation, package reser vation, managements for reservations, management of system’s content and management for housekeeping is developed.The guest’s will use the online room reservation, meal reservation and package reservation facilities for room, meal and package booking respectively. Guests will use the application to get information for hotel and may have virtual tour on hotel rooms. The authorized hotel staff will access the ‘back office’ to manage room, meal, package reservation and maintain information about the hotel such as room rates and hotel specific offers. This system would also provide schedule for hotel housekeeping.For the online room reservation, the scope for the guest’s usage will be focused on the instant room reservation. Meaning that, the guest may reserve the room in advance. The guests may check for room availability and choose the room type they preferred. Guest’s booking will have an instant confirmation. Guests can guarantee their reserv ation by giving the credit card details in reservation form or by cash deposit. For online meal reservation, guest may reserve their meal from hotel’s restaurant in advance.They can view the set meal available in the restaurant online without calling to the restaurant. For the ‘back office’, the scope for staff usage will be focused on management works. They can manage the room, meal and package reservation by reading the reservation records made by the guest. Staff will have a complete control of the system’s contents through the ‘back office’. They can instantly update the hotel’s room description, availability, rates, news, special promotions and more at any time, at no cost.The housekeeping feature will be providing housekeeper a monthly schedule for their work. Housekeeper Manager may easily generate schedule from the system. This is for the reference of housekeeper in order to keep the hotel rooms’ clean every day. The onli ne Hotel Reservation System will upload to the server so that visitors can browse through this system via Internet. Meanwhile, hotel staff can access ‘back office’ via local area network to manage the system’s content, reservation and housekeeping. 1. 5 Contributions 1. 6 Expected Output Part 2 LITERATURE REVIEW

Sunday, September 29, 2019

E-waste management practices Essay

Electronic technology is a cornerstone of modern society. It plays an important role in our daily lives. Increasingly throughout the world, electronic technology has become a staple in daily living. From communication, harnessing resources, to obtaining and sharing knowledge, electronic equipment plays a crucial role in the basic function of society. However, as electronic equipment grows in number due to the advancement of technology, so does electronic wastes. E-Waste refers to electronic products nearing the end of their useful life which includes computers, printers, scanners, or any electronic products. Today, the world has been embracing the age of technological changes. Such changes are adopted by various business establishments particularly Internet Cafes; leading them in replacing obsolete electronic equipments to newer ones, creating large tons of e-wastes, which in turn demands the challenge of having a proper e-waste management. For instance, sixty percent (60%) of people interviewed in Congo, particularly internet cafà © staff and owners, said that they did not know that ewaste has negative effects on health and the environment. Due to the lack of policy on management of this category of waste, people tend to mix ewaste with regular garbage and throw it in public bins. The waste is mixed up and taken to the landfill without any pre-sorting (Niombo, 2010). Internet Cafes should have a special collection system, and a management option to handle these wastes properly for a sustainable development. Without adequate e-waste management, potential threats to health will occur and may threaten ecological balance. To combat the issue, a study is conducted pertaining to E-waste Management Practices among Internet Cafes in the City of Dumaguete. This study would determine the e-waste management practiced by internet cafes and the information will be utilize in extracting valuable lessons from the study in order to improve the effectiveness of the practiced e-waste management methods on Internet cafes. From the outcome of this study, a better way of management would be developed, a systematic management would be made and would be adopted in which it would lessen their burden by providing guidelines that includes recycling process, the application of 3R’s, Reduce, Reuse & Recycle which are stipulated & highly stressed in this research. It will also be used as the basis in creating an E-Waste Tracking System that will be implemented on respective Internet Cafes in the City of Dumaguete. Review of Related Literature, Studies or Systems Review of Related Literature This section contains background information and concepts that explains the existence of the problem and the possible connection between certain factors involved in the study. This would help the researchers identify and define issues that justify the need of studying the problem. This includes the definition of e-waste and its related issues that explain the existence of a proper e-wastes management. This also includes the e-waste management by different countries. But before going though e-waste management, there should be understanding pertaining to e-wastes. Electronic waste, or e-waste, is a term for electronic products that have become unwanted, non-working or obsolete, and have essentially reached the end of their useful life. Because technology advances at such a high rate, many electronic devices become â€Å"trash† after a few short years of use. In fact, whole categories of old electronic items contribute to e-waste such as VCRs being replaced by DVD players, and DVD players being replaced by blu-ray players. E-waste is created from anything electronic: computers, TVs, monitors, cell phones, PDAs, VCRs, CD players, fax machines, printers, etc. Additionally, e-waste is any refuse created by discarded electronic devices and components as well as substances involved in their manufacture or use (Rouse, 2007). According to Johri (2008), E-waste is one of the fastest growing waste streams in the world. Some of the notable items under this category include personal computers, mobile phones. The technical innovations and rapid change in the models of these entities have generated huge quantum of wastes. With increasing level of penetration, supplemented by high rate of these equipments, the generation of electronic wastes is expected to rise. Kishore (2010) affirmed that the quantity of â€Å"e-waste† or electronic waste has now become a major problem. Disposal of e-waste is an emerging global environmental and public health issue, as this waste has become the most rapidly growing segment of the formal municipal waste stream in the world. Sales of electronic products, most notable information technology and telecom (IT) equipment have steadily increased over the past twenty years (Brown-West, 2010). Salleh (2013) revealed that the director of the Croucher Institute for Environmental Sciences, Professor Wong said that â€Å"he would call e-wastes as a global time bomb, referring to the growing pile of waste produced by old mobile phones, computers and other electronic devices. As much as 50 million tons of hazardous e-waste is being produced a year and only a small fraction of this is safely disposed. In a personal computer, for example, there may be lead in the cathode ray tube (CRT) and soldering compound, mercury in switches and housing, and cobalt in steel components, among other equally toxic substances (Rouse, 2007). In many instances, the only visible part of an electronic product is its outer shell. Unless that casing is broken, we rarely see the myriad circuit boards, wiring and electrical connections that make the device actually function. But it’s those inner mechanical organs that are so valuable and so toxic. A whole bouquet of heavy metals, semimetals and other chemical compounds lurk inside your seemingly innocent laptop or TV. E-waste dangers stem from ingredients such as lead, mercury, arsenic, cadmium, copper, beryllium, barium, chromium, nickel, zinc, silver and gold. Many of these elements are used in circuit boards and comprise electrical parts such as computer chips, monitors and wiring. Also, many electrical products include various flame-retardant chemicals that might pose potential health risks. Arsenic may disrupt cell communication and interfere with the triggers that cause cells to grow, possibly contributing to cardiovascular disease, cancer and diabetes if someone is exposed in chronic, low doses. (Toothman, 2001). With these issues pertaining to e-wastes, particularly on health, there is a pressing need to address ewaste management. The unsafe and environmentally risky practices adopted poses great risks to health and environment (Shiga, 2007). E-Waste management provides guidelines for selecting the most environmentally desired methods for managing a waste stream. E-waste collection programs need guidelines to assure that products are managed in a way that protects public health and the environment and conserves valuable resources. The best option for dealing with E wastes is to reduce the volume. Designers should ensure that the product is built for re-use, repair and/or upgradeability. Stress should be laid on use of less toxic, easily recoverable and recyclable materials which can be taken back for refurbishment, remanufacturing, disassembly and reuse. Recycling and reuse of material are the next level of potential options to reduce e-waste.(Recovery of metals, plastic, glass and other materials reduces the magnitude of e-waste. These options have a potential to conserve the energy a nd keep the environment free of toxic material that would otherwise have been released (Joseph ,2007). E-Waste issues needs special policies with strict enforcement taking into account its special nature. These policies need to address collection, processing, disposal and recycling of ewaste. These policies also need to target education and public awareness about the dangers of ewaste for a better understanding of how to dispose of it, due to a general ignorance of its problems Skills transference should also be promoted and practical proposals created to deal with old technology once it reaches its end of life. Legal measures should therefore be accompanied by capacity development programmes. Government and development partners need to develop a clear national policy for the collection and management of ewaste, encourage private investment in recycling that takes into account both environmental and human health, implement programmes to educate the public about ewaste management. Civil society needs to develop projects to raise awareness about recycling and the dangers of ewaste (Burrell, 2012). Actions to be generated are arranged into three main categories: first, a management program to help properly manage e-wastes; second, education and research to help further the knowledge of e-waste management and build upon the knowledge gained through the management program to create national policy for e-waste; and finally, a project core to provide guidance and unity of the entire e-waste project. According to a report put out by the United Nations Environmental Programme (UNEP) entitled â€Å"Solving the E-waste Problem†, the main steps in the recycling chain of proper management include Collection; Sorting/Dismantling and Pre-processing (includes sorting, dismantling, and mechanical treatment which can utilize high-tech or low-tech processes); End-Processing (includes refining and disposal).The effectiveness of the entire recycling chain depends on each step and how well the interfaces between steps are managed. (Utkucan, 2010). Prior to E-waste Management, â€Å"many of e-waste could be a new electronic item is purchased and after some time it becomes obsolete. Four options are then available to the owner of the equipment. It could be reused – possibly resold or reassigned to another user. Second, the original owner could store it. Third, it could be recycled, or fourth, the equipment could be landï ¬ lled. Recycle and landï ¬ ll are the end points† (Peralta, 2006). Several countries have their way of managing these e-wastes. According to Babington (2010), the Department of Environment (DOE) in Malaysia has placed 309 recycle bins to collect used hand pones and its accessories in various locations such as supermarkets, universities, government offices, but majority of the residence are yet to comply due to limited awareness. Subsequently, Department of Environment (DOE) have encouraged the establishment of e-waste recycling facilities by private sector and since then 141 recycling facilities have been licensed by DOE. The need for e-waste recyclers at different MRF and DOE to champion e-waste management cannot be over emphasized. In China, 88.843 million tons of recyclable waste were traded and recycled at a total value of 34.85 billion USD (Asiimwe, E.N. n.d.). In 2008, an e-Waste Association of South Africa (eWASA) was established to help establish an sustainable environmentally sound e-waste management system for the country (Waste management world, 2013). Land filling is the predominant by means of disposal of MSW now in China with approximately 90% of China’s total MSW is disposed of in sanitary and simple landfills (Dong, 2011). The city of Guiyu with its surrounding towns in the Guangdong, a region of China is the largest E-waste recycling site in the world. Recycling has been occurring since 1995. Guiyu has a population of 150,000, most of which are immigrants. Nearly 80% of families have members who have engaged in E-waste recycling operations (Robinson, 2009). Moreover, all the recycling is being carried out by the informal sector. It is estimated that 120,000 urban poor from the informal sector are involved in the recycling trade chain in Dhaka city. 15% of the total e-waste generated in Dhaka (mainly inorganic) equates to 475 tons recycled daily. Of this amount, only 20% to 35% is recycled, while the remainder is disposed of in landfills, rivers, ponds, drains, lakes and open spaces (Hossain, 2009). On the other hand, Mexico has ratified the Basel Convention. UNEP cited Mexico as a country with great potential to introduce state-of-the-art e-waste recycling technologies because of its small informal-waste sector. In 2006, in cooperation with the US State of California, one of the few state-of-the-art electronic recycling facilities in Latin America was installed in Monterrey, the first major electronic recycling operation in Mexico. Additionally, In Serbia, waste management infrastructure is seriously underdeveloped, with few regulated landfills. Large amounts of e-waste are being stored in warehouses and homes. There is also an active informal sector, consisting mainly of disadvantaged people such as the Roma. In general, collectors have low interest in e-waste due to its complexity and the lack of potential buyers; as a result, their top priorities include paper, plastic and scrap metals. However, there are highly unorganized, informal e-waste recyclers who use rudimentary techniques such as burning cables to extract copper. These practices are unregulated, with no employment contracts (Lundgren, 2012). Above All, different countries have their way of managing their e-waste; basically comprising from the informal and the formal sector. In view of the issues caused by e-wastes, a proper e-waste management is a great challenge especially to those places that are not aware of the hazards of those wastes. There must be an implementation plan and regulated policies reading the disposal of e-wastes. With all mentioned practices in various places, recycling is the most commonly practiced by various places. Furthermore, regulations should be designed in conjunction with the establishment of formal recycling infrastructure, or any collection system towards a better e-waste management to ensure the safety and protection from threats posed by these e-wastes. Review of Related Systems This contains related studies conducted by different researchers and development of e-waste tracking systems to keep track the generation of e-wastes. This includes concepts about E-Waste Tracking systems developed by different countries in order to track the generation of e-wastes. As instance, Switzerland, the first electronic waste recycling system was implemented in 1991, beginning with collection of old computer monitors; over the years, all other electric and electronic devices were gradually added to the system. The opportunity is to find better ways to manage our used and end-of-life electronics and avoid them ending up in landfills, and that is though e-waste management (Lanyard, 2000). Electronic Recyclers International (ERI) has launched a new tracking and transparency system that gives customers complete real-time access to the status of their organizational recycling efforts, the company says. The MyTrackTech software gives organizations that recycle their electronic waste through ERI up-to-the-minute access to their accounts and allows them to schedule shipments, review reports, and customize their recycling tracking. The MyTrackTech software is the first comprehensive customer access portal of its kind in the industry (Shegerian, 2012). Department of Heritage and Protection (DHP) are developing a tracking system that an effective waste tracking system will be able to provide EHP with all prescribed information required by schedule 2 of the Waste Regulation. The information from any one waste handler should be able to be provided to EHP in batches. The system must also be able to provide EHP with proof (equivalent to a signature on a form) that the information has been authorized by an appropriate person. Such authorization may include the use of a particular header for the data or a private key or password/code word (Department of Heritage and Protection, 2010). In the article â€Å"A Global Pinball Game: Tracking E-Waste† that there are two common fates for old electronics, recycling or reuse. To track the reuse stream, the team collaborated with World Computer Exchange, World Teach and the Peace Corps, which all send outdated computers to countries the developing world. Forty donated netbooks were equipped with tracking software and labeled with stickers announcing that they recording their whereabouts. After arriving at their destinations, the computers send out location updates and snapshots of their surroundings every 20 minutes. With this data, the team is able to create a real-time visual narrative of these computers’ second lives in classrooms in Nepal and public libraries in Kenya. â€Å"For the first time, you can actually see where your old laptop ends up and who is benefiting on a day-to-day basis from your donation (Foster, 2011). Environmental Protection Agency (EPA) collaborates with the United Nations University – Solving the E-waste Problem Initiative (StEP) to jointly address the e-waste problem in developing countries. EPA and StEP signed a cooperative agreement on this topic in November 2010. EPA and StEP are working collaboratively on developing a system for tracking global flows of e-waste, strengthening Ethiopia’s efforts to manage e-waste and engaging with China on e-waste management practices (Adrian, 2003). There are many related systems that are being developed in order to keep track of the flow of e-wastes coming from different sources. An e-waste management system should be implemented to avoid risks towards our health and environment. One way of having a proper e-waste management is the creation of an e-waste tracking system that provide users to keep track of the e-wastes disposed by Internet cafes in the City of Dumaguete. THE PROBLEM Statement of the problem This research aims to analyze issues regarding e-wastes, study the e-waste management strategies practiced by Internet Cafes and use the information in order to develop a better way of managing e-wastes in an environmentally manner. This study tries to answer the questions: 1. What is the demographic profile of Internet Cafes in terms of: a. Services offered; b. Number of Computers; c. Years of operation; d. Location; e. No. of personnel; and f. No. of Customers per day? 2. How often do Internet Cafes replace their electronic equipments? 3. What type of electronic equipments that are usually disposed by Internet Cafes? 4. Where do Internet Cafes usually dispose their electronic wastes? 5. What is the current e-waste management practiced by Internet Cafes? Hypothesis H0: Internet Cafes should have an e-waste management in terms of proper e-waste disposal; where and how should these e-wastes be disposed in an environmentally manner. Technical Background and Project Description E-Waste Management Practices among the City of Dumaguete is a research study about the mode/method of management of Internet cafes pertaining to their e-wastes. In order fully achieve the aims of the study, researchers first defined the design concept of the study which incorporates the conceptual framework on the methods undergone by researchers in the research process; from the defining the requirements towards the outcome of the study. The resulting outcome would be beneficial towards the implementation of a sustainable e-waste management. This also includes the approach used by researchers in fulfilling the said framework. Design Concept Figure1. Conceptual Framework Figure 1 illustrates the design concept of developing the study showing a conceptual framework; from the inputs, approach used and the outcome towards the development of the study on E-Waste Management Practices. With that occurrence, a study on e-waste management practices is conducted to aid businesses in the City of Dumaguete that would give those ideas on how to manage e-wastes in an appropriate and best way to manage them. The presentation of the conceptual framework of this study shown in Figure 1 is formulated towards the fulfillment of achieving the result; an e-waste management practices among Internet cafes in the City of Dumaguete. The Input variables includes demographic profile of the business in terms of services offered, number of computers used, years of operation, the location of the internet cafà ©, no. of personnel, no. of customers per day, frequency of replacing electronic equipments, type of electronic equipments usually disposed by internet cafes, location to where internet cafes usually dispose their e-wastes and the current e-waste management strategy practiced by internet cafes. The Input variables are passed through a task of performing operations called the a process. These data will be utilized on the development of the study. Information will then be evaluated through agile method. This method involves the initial planning, identifying the requirements, analysis and design, implementation, testing and evaluation. After executing the task of processing those input variables, an output is made. After the process, a result is formulated, a study on e-waste entitled â€Å"E-Waste Management among Internet Cafes in the City of Dumaguete†. Design Method Figure2. Agile Method Figure 2 illustrates a method used by researchers in the development of the study. It shows an agile method used by researchers. Agile Method is a practice-based methodology for modeling and documentation of software-based systems. This would include collection of practices – guided by principles and values – that are meant to be applied by software professionals on a day-to-day basis. It is intended to be a collection of values, principles, and practices for modeling software that can be applied on a software development project in a more flexible manner than traditional modeling methods. These are the methods that will be used throughout the research study for obtaining the e-waste management practices among Internet cafes in the City of Dumaguete. It starts with the initial planning. The researchers do the initial planning. In the planning phase, researchers identifies the requirements of the planned research study, thus, researchers come up with an idea of having an E-Waste Management study of E-wastes among Internet Cafes in Dumaguete City. The next method is the analysis and design. Here, researchers analyze the existence of problems pertaining to E-waste. With the results of the analysis, researchers would be creating a strategic plan based on the design concept of having such study. A strategic plan that would be implemented within the City of Dumaguete towards Internet Cafes. Next method is the implementation of the strategic plan. From the results of a survey, researchers determine the best practices on how to manage e-wastes in an environmentally manner. Thus, minimizing the threats of these e-wastes. Lastly, researchers evaluates such study whether this research is effective enough in getting rid of the hazardous effects of e-wastes and the burden of having large tons of e-wastes on some Internet Cafes, which would enable researchers to achieve their aim of this study entitled â€Å"E-waste Management practices among Internet Cafes in the City of Dumaguete.† SIGNIFICANCE OF THE STUDY This study will be beneficial because its implementation can be an opportunity in creating economically and environmentally sustainable businesses among the licensed Internet Cafes in the City of Dumaguete. To the City of Dumaguete: This study will help to promote healthy and safety environment by giving Dumaguetenians self-awareness of how important it is to dispose their electronic-wastes properly. Thus, by doing this, it contributes to energy efficiency, conservation of resources and economic growth. To the Internet Cafà © Business Owners: This study will be helpful in optimizing eco-efficiency of managing the proper disposal of their electronic wastes while maintaining the productivity of its businesses. This is very important in the sense that it provides ideas on understanding about the management of end-of-life electronic wastes, which includes their proper management through proper disposal, 3R’s, correct extraction, incinerations and others. To the Information Technology Students: This study will give benefit for them in their future studies with regards to E-waste Management. It will serve as guide references for their future studies and will give further information regarding E-waste Management. To the Researchers: This study is very essential towards researchers for their fulfillment in developing an proper E-Waste Management for further implementation towards Dumaguete Internet Cafes, which would basically give them ideas about the best practices to be done towards e-wastes and use these as a basis in creating an E-Waste Tracking System in the second semester, thus, achieving the aim of their study. QUESTIONNAIRES: Respondents: Internet Cafes in the City of Dumaguete. Instruction: Please fill up the following what is being asked. Part I: Business Profile Business Name: _____________________________________________ Owner:____________________________________________________ Address: __________________________________________________ Instruction: Please check the box that corresponds to your answer. Part II: E-Waste Management Practices I. A. What are the services offered by your business establishment? Scanning Printing Gaming Research Station Photocopying Others, please specify: __________________________ B. How many computers are used by the business? 10 20 30 35 40 Others, please specify: __________________________ C. How many years have you been operating your internet cafe? 2 3 4 5 Others, please specify: __________________________ D. Where does your internet cafà © situated? Near the highway Near the school Near the church Near the city hall Far from the city within a very crowded place Others, please specify: __________________________ E. How many attendants or personnel do you have? less than 5 less than 10 15 and above Others, please specify: __________________________ F. What is the minimum number of customers that you cater everyday? less than 10 Less than 20 Less than 15 Less than 20 Less than 30 40 and above Others, please specify: __________________________ II. How frequent do you dispose your e-wastes in a year? Once Twice Thrice Others, please specify: __________________________ III. What type of electronic equipments do you usually dispose? Monitor CPU Mouse Speaker Headset Keyboard Printers Scanners Others, please specify: __________________________ IV. Where do you dispose your electronic wastes? Landfills At home Near the cafà © Burning holes Junkshops Others, please specify: __________________________ V. What is your current management strategy pertaining to your e-wastes? Sell to Junkshops Dispose to landfills Store them to storage areas Recycle them Donate to E-waste Processing Centers Others, please specify: _______________________________________ REFERENCES: Adrian, S. (2013, May 13).Cleaning Up Electronic Waste (E-Waste).Retrieved from http://www.epa.gov/international/toxics/ewaste/index-cb.html. Last Updated: May 2013. Asiimwe, E.N. (n.d).E-waste Management in East African Community. Retrieved from https://spidercenter.org/sites/default/files/master_theses_sponsored/Edgar_Napoleon.pdf Babington, J.C. et.al. (2010). Bridging the Gaps:An E ­waste management and recycling assessment of material recycling facilities in Selangor and Penang.International Journal of Environmental Sciences, Volume 1, no.3, 385. Brown-West, B.M. (2010, May 14). A Strategic Analysis of the Role of Uncertainty in Electronic Waste Recovery System Economics: An Investigation of the IT and Appliance Industries. (Bachelor dissertation). Retrieved from http://msl.mit.edu/theses/BrownWest_B-thesis.pdf. Burrell, J. (2012). The Import of Secondhand Computers and the Dilemma of Electronic Waste. Retrieved from http://www.universitypressscholarship.com/view/10.7551/mitpress/9780262017367.001.0001/upso-9780262017367-chapter-7 Dong, Y. (2011,December). Case Study of the Guangzhou Likeng WTE plant. (Masters Thesis) Retrieved From http://www.seas.columbia.edu/earth/wtert/sofos/Dong_thesis.pdf Foster, J. (2011, July).A Global Pinball Game: Tracking E-Waste. Retrieved from:http://green.blogs.nytimes.com/2011/07/25/a-global-pinball-game-tracking-e-waste/?_r=0. Last Updated: July 25, 2011. Hossain, S. (2009). Study on E-waste: Bangladesh Situation. Retrieved from http://www.esdobd.net/ewaste%20update.pdf Johri, R. (2008). E-Waste: Implications, regulations, and management in India and current global practices. New Delhi, India: Batra Art Press. Joseph.(2000).Electronic waste management in India–issues and strategies. Retrieved Fromhttp://www.swlf.ait.ac.th/UpdData/International/NRIs/Electronic%20waste%20management%20in%20India.pdf Kishore, et. al. (2010).E-Waste Management: As a Challenge to the Public Health in India. Indian Journal of Community Medicine.Volume 35(3), pages 382-385. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2963874/ Lanyard, D. (2000). E-Wasted: A step into the shadow of Information Age. Retrieved from http://e-wastedmovie.com/index.php/e-wasted-timeline.html Lundgren, K. (2012). The global impact of e-waste: Addressing the challenge. Retrieved from http://www.ilo.org/wcmsp5/groups/public/—ed_dialogue/–sector/documents/publication/wcms_196105.pdf Niombo, S. et.al. (2010). ICTs and Environmental Sustainability. Retrieved from http://www.giswatch.org/es/node/288 Peralta, et.al. (2006). E-waste Issues and Measures In the Philippines. Retrieved from http://www.environmental expert.com/Files%5C6063%5Carticles%5C9020%5C1.pdf Rouse, M. (2007). E-waste. Retrieved from http://searchdatacenter.techtarget.com/definition/e-waste. Last updated: March 2007. Robinson, B.H. (2009).E-waste: An assessment of global production and environmental impacts. Science of the Total Environment. Volume 408, 183–191. Salleh, A. (2013, September 16). E-Waste is a ‘global time bomb’. ABC Science, p. A5. Retrived from http://www.abc.net.au/science/articles/2013/09/16/3849737.htm Shegerian, J. (2013, April 30). Electronics Recycler Launches E-Waste TrackingSoftware. Retrieved from http://www.environmentalleader.com/2013/04/30/electronics-recycler-launches-e-waste-tracking-software/ Shiga, O. (2007). E-waste Management Manual. Retrieved from http://www.unep.or.jp/ietc/publications/spc/ewastemanual_vol2.pdf Toothman. (2001). E-Waste Dangers. Retrived from http://electronics.howstuffworks.com/everyday-tech/e-waste1.htm. Utkucan et. al. (2010). Sustainable E-waste Management: Using the FSSD in a Case study at NUR. Retrived from http://www.bth.se/fou/cuppsats.nsf/all/4a00250ea2cf25c3c12577430041ffb4/$file/Sustainable%20E-waste%20Management%20-%20Using%20the%20FSSD%20in%20a%20Case%20Study%20at%20NUR,%20MSLS,%20BTH,%202010.pdf. Waste Management World. (2013). E-waste: South Africa’s Next Gold Rush? Retrieved from http://www.waste-management-world.com/articles/print/volume-14/issue-4/featur

Saturday, September 28, 2019

Globalization and Mass Media Essay Example | Topics and Well Written Essays - 1000 words

Globalization and Mass Media - Essay Example The concept of 'Third World' has been replaced by the term 'developing economies', as underscored in this era of globalization. The other side of the coin reveals that institutions such as the IMF showed false hopes to the LDCs (least developing countries), resulting in major crises and disasters (Journal of Libertarian Studies, 2004). James Mittelman in the 'Manifestations of Globalizationargued that globalization was integrally linked to 'multiple levels of analysis: economics, politics and ideology.' The predominance of a few satellite channels over others in international communication, have brought in this concept of 'cultural imperialism'. An aspect of globalization, cultural imperialism is a new form of traditional colonial domination. The fast developing cultural relations between the European nations and the small nation states in the late 19th and early 20th centuries made Pyenson coin the term 'cultural imperialism, which has been used scholars and historians today to describe this era of globalization. Here we argue about the definition of cult... Easy access to information, goods and services has brought the nations under one umbrella. Reazul Haque opined that international channels such as Cable News Network (CNN), British Broadcasting Corporation (BBC) and Music Television (MTV) enjoy the highest viewership. The Internet or the New Media has made information readily available to people all over the world. (Asiatic Society of Bangladesh, 2006) It was the colonial masters, who first practiced social propaganda technology from their home countries through the vehicle of mass media. There was always a tendency to make the subservient to the former imperialist powers. The big superpowers, notably USA dominated the political scene through the tool of media and communication. Schiller affirmed in his book Culture, Inc, that the media has by and large contributed to chronicle the surge of America as a corporate power and also helped in strengthening its ideological base worldwide. (Schiller, 9)Hamelink, referred to cultural imperialism as 'cultural synchronization'. By this, he meant that a particular cultural development in a developed country is immediately passed on to the receiving country through the mode of communication. He spoke about those millions of people, 'who watched foreign television programs, used the international telephone lines and mailing systems, buy recorded music and read the international news. CNN news casts, Madonna, Rupert Murdoch's empire, satellite telephony or transborder data flows, all touch upon people's daily lives around the world'. (Hamelink, 1) John Tomlinson in his book Cultural Imperialism, in chapter entitled 'Media Imperialism', contended that 'to understand the notion of cultural imperialism, we

Friday, September 27, 2019

Development of International Organizations Essay

Development of International Organizations - Essay Example An international organization†¦represents a form of institution that refers to a formal system of rules and objectives, a rationalized administrative instrument and which has ‘a formal technical and material organization: constitutions, local chapters, physical equipments, machines, emblems, letterhead stationery, a staff, an administrative hierarchy and so forth.’† (Archer, 2001, p. 2) There has been a common tendency to confuse between ‘international organizations’ and ‘international institutions.’ In this context, writers and scholars need to remember that an internal institution actually refers to ‘the detailed structure of an international organization†¦for international organizations is more restricted than the sociological meaning of the word.’(Archer, 2000, p.2) According to the historical references, formation of the international organizations commenced during First Word War at the Versailles Peace Conference (1919). Formation of international organizations in nineteenth century was propelled due to certain social reasons. Political scientists widely agree to the point that in order to formation of such organizations development of sovereign states as well as ‘a relatively stable system’ was necessary in Europe. Moreover, the Great War and its horrific consequences did cast such a tremendous effect over the nations that they immediately understood if harmony between the nations could not be maintained it will not be possible to avoid tragedy of such great dimension. In addition to such factors, the social and economic issues also played a great role in the formation of international organizations. Almost at the end of the nineteenth century the European nations witnessed that they were fighting amongst each other trivial poli tical issues and it was affecting social as well as economic stability of the countries. Consequences of those issues were also reflected in the international relationship of the countries. Thus, the

Thursday, September 26, 2019

Tattoo Discrimination in the Workplace Annotated Bibliography

Tattoo Discrimination in the Workplace - Annotated Bibliography Example These associations and stereotypes may, however, not be particularly useful as generation Y moves into the workplace – this generation has a more general relationship with tattoos and other body modifications (Hawkes, Senn & Thorn, 2004). Additionally, research shows that almost a quarter of individuals between 18 and 50 living in the U.S. have at least one tattoo (Kosut, 2000), meaning that employers that are restrictive on this front may be losing out on a significant proportion of the potential workforce. The purpose of this paper is to evaluate the current research on appearance in the workplace, with a particular focus on tattoos and other body modifications to uncover if and why tattoos are looked down upon in the professional workplace. Additionally, a focus will be held on what employers can do to become less discriminatory towards those with tattoos and why this move may be desirable or even essential. Overall, an analysis of workplace-related literature suggests that whilst tattoos and piercings are becoming more common overall, there is still a high degree of workplace discrimination with respect to body modification. The history of tattoos is an interesting one. The term â€Å"tattoo† refers to the use of indelible ink to insert a permanent (or sometimes semi-permanent) design into the dermis of the skin (Trautner & Kwan, 2010). This practice has several origins within several cultures, and can still be found amongst indigenous hunter-gatherer populations today (Trautner & Kwan, 2010). However, many believe that the origin of tattoos comes from either Polynesian tribes or Ancient Japanese culture (Trautner & Kwan, 2010), and many tattoos found in popular culture today draw their roots from these traditions.

Wednesday, September 25, 2019

Thornton's plc Essay Example | Topics and Well Written Essays - 3000 words

Thornton's plc - Essay Example The study will dwell on situational analysis of Thornton Plc, to get an insight on the overall aspect of the company on the point of view of an investor. As an investor, information provided will lead to decisions for investing particularly in choosing companies in the same category. The situation analysis should take into account the market, competitors, staff, structure, technology, control systems, production and supply, performance and financial state. (Policy Coordination and Planning Section, pp 7-8) A situational analysis will be done to analyze performance to Thornton, Plc. It will present a detailed picture of the present state of the company. It will consist with a review of the past data and its translation into future trends with regard to marketing, production and financial system of the company.. Financial state will make use of scoreboard and benchmark information analysis. What is a balanced scorecard? The balanced scorecard of the company is defined as â€Å"a performance measure which will present whether the operational activates of the company are aligned with its company’s objectives in terms of vision and strategy†. .(Wikipedia) What is a benchmark. This is defined as a â€Å"security or index against which the performance of other securities is judged.† It is explained as a â€Å"goal to meet or beat†. For example, investors use the S&P 500 Index as a benchmark, and if their returns is more than the benchmark, the investor have beaten the benchmark, meaning the company is a good investment. The theory behind this is the expected return of investment must at least be equal or more than the benchmark or otherwise, investor may well at least invest in the benchmark (Investors Glossary) Market. Thornton Plc has been in the market of confectionary since 1911 manufacturing and selling quality chocolates to

Tuesday, September 24, 2019

Food and Culture in Boston Research Paper Example | Topics and Well Written Essays - 2000 words

Food and Culture in Boston - Research Paper Example The food culture in Boston is shared largely with the food culture in New England, owing to the fact that in both regions, seafood marks the main recipes for almost every single meal that is prepared in the region (Freedman, n.p.). Dairy products also characterize the food culture in the Boston region, where most of the meals must have a dairy product component as a core recipe, not only for the home cooked foods but also for the restaurant foods. This is because; the Boston region has passed its home-based food culture to the restaurants, such that there are many restaurants in Boston that serve ethnic cuisines (La Befana, n.p.). The ethnic food culture in Boston is not only related to the American cuisines, but also to cuisines from different parts of the world, such that in the larger Boston area, different cultural restaurants serving cuisines from different parts of the world exists, such as the Italian, Korean, Thai, Chinese, Japanese and Vietnamese foods (BDG, n.p.). The culin ary life of the Boston region has undergone a renaissance over time, owing to the market culture and the bounty agricultural production, which has enabled the region to have a variety of food substances for preparing different recipes and cuisines. The market culture referred, to as the Haymarket, consists of farmers selling different agricultural products on a weekly basis, where the farmers hold an open-air market for selling mainly fruits, vegetables and dairy products (BDG, n.p.). History of culinary evolution in Boston  Ã‚  

Monday, September 23, 2019

The Five Agreements And how it has Impact in my life Essay

The Five Agreements And how it has Impact in my life - Essay Example Perceptually, this has changed my life in many ways considering the implications and literal translations of the words impeccable in your words. With this in mind, it has made me accountable for every word I utter in that there is no one to take responsibility for nay word said out of context or one that is uttered irresponsibly. As a result, this has taught me to be a person who only follows what I believe in and state that which I understand beyond reasonable doubt, and not that which I think. This has influenced to being a truthful person as there is no way I can state that which I do not know, the same way I can utter words without factual backing. However, this is not to mean that I have not been subject to issuing my own opinion on certain things and issues. Personally, truth does not refer to sticking to the facts, but also telling exactly what I feel and believe, which is a part of my belief system, as inculcated by the being impeccable in my word. Through adopting this stanc e, my opinion does not dig into other people’s privacy and rights, as well as beyond their comfort zones. Being personal is one of the reasons why the world is facing astronomical figures in terms of depressed persons that need professional help. This is what brings us to the second agreement, which is that of not taking everything or anything personally, which has affected my life profoundly. It may not be to the extent that I would like it to be so that I do not end up condemning other people for having done things that offend me. However, as a person I believe my life could not be better without this part of the agreements as it has assisted me in ridding my life of most forms of perceiving people as being fundamentally malicious. Therefore, this implies that before my encounter with the book highlighting these truths, it made everything seem to revolve around my life. As a result, everything was done towards or against me, which is one of the severe forms of

Sunday, September 22, 2019

Three information technology topics Essay Example | Topics and Well Written Essays - 1750 words

Three information technology topics - Essay Example Three information technology topics When we remind ourselves that it is we who decide how to keep technology busy, we shall be better (Turkle, 2011, p.296).† The Turkle comments criticize the current situation where people cannot survive without technology. Children prefer staying indoors. While inside, the children prefer playing computer games, surfing the internet and online relationships. The children have discarded the prior setup where children prefer face to face games with their neighbors, classmates, and relatives. Turkle insists that people should use computers and other technology devices as tools for increasing face to face communication, relationships, and other physical activities like basketball, volleyball, baseball, chess, and the like. Its difference from her findings in the past. Comparing her findings in the past, Turkle preferred that man cannot survive without technology, especially robots. Sherry Turkle emphasized that her 1984 position was for authenticity. Thus, a person is a better analy st, calculator, decision maker, and creator, when compared to a computer. The computer only follows what its software instructs it to do. On the other hand, the human being can insert other alternative procedures to one question, predicament, or activity. Authenticity is, â€Å"what sex was to the Victorians – threat and obsession, taboo and fascination. I have lived with this idea for many years (Wilks, 2010; p.9†¦)†. Turkle was initially obsessed to come up with new technology that will reduce the individual’s physical exertion. ... During the good old days, people would go the nearest store to buy a pen, paper, and envelope. The person would scribble messages on the paper. Next, the person would seal the letter inside the mailing envelope. Consequently, the person would ride the bus or train to the nearest post office. Upon arriving, the person will line up a long queue of people mailing their envelopes. After the post office clerk receives the person’s envelope, the person returns home. The entire process may take two to four hours, depending upon the traffic situation and the distance between the person’s home and the post office. In addition, Turkle prefers that all persons email their messages. Emails reach their intended receiver with a split second. The entire encoding and emailing process may take less than ten minutes. During the entire email process, the person is hiding behind the closed doors. Similarly, the person can order goods and services online. The person can click the McDonaldâ €™s website, and the McDonald’s crew ill deliver the hamburgers to the person’s home. Consequently, the person reduces face to face encounters. This is the essence of Turkle’s prior stand. 2. WHO DID IT? (Isaacson) Steve Jobs, more than anyone else, is responsible for today's digitech culture. Steve jobs created Apple computers. Before his untimely death, Steve Jobs orchestrated the user friendly computer environment. Steve Jobs was the visionary of product perfection, paving the bright and widening path of computer world conquering. Steve jobs would burn the midnight oil crafting new computer technologies. With infighting brewing up, Steve Jobs left the company that he had founded, Apple. After several years, Apple was on the brink of financial destruction. Consequently, Steve

Saturday, September 21, 2019

American fast food restaurant Essay Example for Free

American fast food restaurant Essay Subway is an American fast food restaurant franchise that primarily sells submarine sandwiches (subs) and salads. It is owned and operated by Doctors Associates, Inc. Subway is one of the fastest growing franchises in the world with 40,229 restaurants in 102 countries and territories as of 11 September 2013.[1] It is the largest single-brand restaurant chain and the largest restaurant operator globally.[3][4][5] Subways main operations office is in Milford, Connecticut; five regional centers support Subways growing international operations. The regional offices for European franchises are located in Amsterdam, Netherlands; the Australia and New Zealand locations are supported from Brisbane, Australia; the Asian locations are supported from offices located in Beirut, Lebanon, and Singapore; and the Latin America support center is in Miami, Florida. [6] Contents [hide] 1 History 1.1 Early history 2 Products 2.1 Regional variations 2.2 Nutritional content 3 Advertising 3.1 $5 footlongs 3.2 Sub Club 4 Controversies 4.1 Sandwich size 4.2 Franchise relations 4.3 UK VAT treatment 4.4 Caseys trademark case against Subway 5 References 6 External links History Early history Subways original logo used from 1965 to 2002. In 1965, Fred DeLuca borrowed $1,000 from friend Peter Buck to start Petes Super Submarines in Bridgeport, Connecticut, and in the following year they formed Doctors Associates Inc to oversee operations of the restaurants as the franchise expanded.[7] The holding company derives its name from Fred DeLucas goal to earn enough from the business to pay tuition for medical school, as well as Peter Bucks having a doctorate in physics.[8] Doctors Associates is not affiliated with, nor endorsed by, any medical organization.[9] In 1968, the sandwich shop began using the name Subway for the first time.[7] Subway restaurant, Pittsfield Township, Michigan The first Subway on the West Coast was opened in Fresno, California in 1978. [10] The first Subway outside of North America opened in Bahrain, in December 1984.[11]In 2004, Subway began opening stores in Walmart supercenters, and surpassed the number of McDonalds locations inside US Walmart stores in 2007.[12]

Friday, September 20, 2019

Examining Bonnie And Clyde Film Studies Essay

Examining Bonnie And Clyde Film Studies Essay When someone speaks about a female criminal; without a doubt Bonnie Parkers name will be mention. She is one of the most famous women in the history of crime. Bonnie and her partner Clyde was the most dangerous pair during the Great Depression Era. The two of them went on a two year robbing and killing spree that ultimately ended in their deaths. The way the two constantly eluded the police and Bonnie Elizabeth Parker was born on October 1, 1910 to Charles and Emma Parker. Her father was a brick layer who died when she was only five and her mother was a house wife. She was the second child of three. Bonnie was a very bright and well educated girl. She was an excellent speller and was exceptionally good at writing poetry. This was a passion that she had and poetry helped her to express he feelings. Later in life she would write some poems while on her crime spree and they will become famous. When she was 16 she married a man name Roy Thornton. He eventually was arrested for his part in a robbery and was sentenced to prison. She left him but never divorced him because she felt it wouldnt be right to do so while he was in jail. Although she was a waiter she eventually took a job as housekeeper and that is where she met Clyde Barrow. A couple of weeks after they met, Clyde was sentenced to prison of two years for past crimes that he had committed. Clyde then came up with a plan for Bonnie to help him escape. When she came to visit him she smuggled a pistol into jail and Clyde used it on the guard and he escaped. Soon after his escape; he was arrested again and was then sentenced to fourteen years in prison. On February 2, 1932, Clyde was released from prison. He soon met up with Bonnie in a stolen car and this is when their crime spree began. (about.com) Bonnie went with Clyde on his first robbery since his released from prison. The plan was for Clyde and his gang (Buck (Clydes bother), W.D. Jones, Frank Clause, Henry Methvin, Everett Milligan, and Ray Hamilton) to rob a hardware store. Bonnie was in the car while the robbery was going on. She was arrested by the police while sitting in the car. She was soon released because of lack of evidence. Soon after her release, Bonnie and Clyde continued their crime spree. Although Bonnie and Clyde were on the run they often made stops in Texas to see their mothers. Bonnie was very close to her mother and she made it mandatory to see her mother every 2-3 months. In March 1933 Bonnie and Clyde made another stop in Joplin, Missouri. Clydes brother Buck was released from prison, so the two decided to rent an apartment to spend time with Buck and his wife Blanche. In April they spotted two policemen and that is when a shootout began between the two groups. Bonnie, Clyde, Buck and Blanche all escaped. In the apartment they left pictures that showed Bonnie and Clyde posing with stolen cars, money, and guns. Bonnie also left one of her poems in the apartment also. These items that were left in the apartment made the couple very famous. In November 1933 W.D. Jones was captured and told the police about how Bonnie and Clyde visits their family. The police then set up an ambush that put Bonnie and Clydes family in danger. This angered Clyde and he decided to take revenge on the Eastman Prison. Bonnie and Clyde helped to free Raymond and Henry. Raymond and Clyde got into an argument and Raymond left but Henry stayed. Little did Bonnie and Clyde know; Henry and his family would help cause the death of them. Henry and his father Ivan were the two who help to set Bonnie and Clyde up. They did this for an exchange for Henry to be pardoned. Henry knew that Bonnie and Clyde didnt have anywhere to stay so he insisted that they stay at his fathers cabin. Ivan told the police the route where Bonnie and Clyde would be traveling. The police then set up an ambush and also made it look as if Ivan had a flat tire. As Bonnie and Clyde came down they seen Ivans car and slowed down. That is when the police men came out and demand for them to stop. Bonnie and Clyde attempted to getaway but the police men fired approximately 167 rounds. Bonnie and Clyde died instantly because of the gunshots. They were buried separately at their families burial sites/ They knew Bonnie and Ckyde would stop to help and that is when they would capture them. As Bonnie and Clyde approached the car they In April of 1934 Clyde and Henry Melthvin killed two policemen. It was this incident that would help to lead the police to them. Ivan Melthvin( Henrys father) was took into custody after authorities found out that he often hid the gang. He them Bonnie and Clyde had many co conspirators. Some of their Coconspirators were by the of Buck (Clydes bother), W.D. Jones, Frank Clause, Henry Methvin, Everett Milligan, and Ray Hamilton. Bonnie went with Clyde on his first robbery when he was released from prison. The plan was for Clyde and his gang to They often helped Bonnie and Clyde with their robberies and the murders. They would mainly rob grocery stores and gas stations. The money they stole from these places was the money they lived on. They would sometime banks but would not make off with too much money. They enjoyed stealing cars; mainly for the thrill of riding in a different car.

Thursday, September 19, 2019

Inequalities and Interdependence :: Argumentative Persuasive Essays

Inequalities and Interdependence According to my small nephew, milk does not come from cows, it comes from stores. He's never seen a cow being milked, but he has been to the store with his mother to buy milk, so in his world, milk comes from stores. Purchasing is a major activity in our daily lives. In fact, if there were to be a national crisis of some sort that would prevent us from being able to purchase the barest of daily necessities such as milk, bread, cereal, toothpaste, deodorant, toilet paper, or soap, it would be a very unsettling experience. In fact, as Dr. Nassar is so fond of saying, "I know almost everyone in here is too young to remember"...everyone except me. I do remember a time in 1974 when within four hours of the onset of a national trucking strike, the shelves in the stores were empty. Not just slim pickin's...but empty. We take a lot for granted in this country. We're very lucky that we have been able to do so. As students, we are not producers of goods, we are consumers. We live in state of economic dependence on the goods of the entire world. So, what is interdependence? Interdependence means that two or more parties rely on what they can do for each other to succeed. Mutual contribution is necessary for the well-being of the parties involved. As a nation-state, the economy of the United States of America is interdependent on other nation-states for its well-being. Because of the relative isolation of this continent, the U.S. was able to remain free of foreign intervention and develop a strong national identity for nearly 150 years. We were free to develop a strong sense of nationalism: an inclination toward self-reliance and rugged individualism in which we took fierce pride. It was sort of the John Wayne approach to national and international relations. We were able to amass great wealth from our natural resources of gold, silver, furs, timber, steel, cotton, coal, and oil, to name a few. The entrepreneurial experiments of individuals were allowed to develop unhindered. Personal industry and imagination eventually developed major industries of steel, intercontinental railroads, textiles, and shipping. Innovation led to the development of the internal combustion engine and its subsequent uses in industry. Agriculture became an industry, and with the aid of intercontinental railroads and shipping, contributed to the general economy and personal wealth of many. Inequalities and Interdependence :: Argumentative Persuasive Essays Inequalities and Interdependence According to my small nephew, milk does not come from cows, it comes from stores. He's never seen a cow being milked, but he has been to the store with his mother to buy milk, so in his world, milk comes from stores. Purchasing is a major activity in our daily lives. In fact, if there were to be a national crisis of some sort that would prevent us from being able to purchase the barest of daily necessities such as milk, bread, cereal, toothpaste, deodorant, toilet paper, or soap, it would be a very unsettling experience. In fact, as Dr. Nassar is so fond of saying, "I know almost everyone in here is too young to remember"...everyone except me. I do remember a time in 1974 when within four hours of the onset of a national trucking strike, the shelves in the stores were empty. Not just slim pickin's...but empty. We take a lot for granted in this country. We're very lucky that we have been able to do so. As students, we are not producers of goods, we are consumers. We live in state of economic dependence on the goods of the entire world. So, what is interdependence? Interdependence means that two or more parties rely on what they can do for each other to succeed. Mutual contribution is necessary for the well-being of the parties involved. As a nation-state, the economy of the United States of America is interdependent on other nation-states for its well-being. Because of the relative isolation of this continent, the U.S. was able to remain free of foreign intervention and develop a strong national identity for nearly 150 years. We were free to develop a strong sense of nationalism: an inclination toward self-reliance and rugged individualism in which we took fierce pride. It was sort of the John Wayne approach to national and international relations. We were able to amass great wealth from our natural resources of gold, silver, furs, timber, steel, cotton, coal, and oil, to name a few. The entrepreneurial experiments of individuals were allowed to develop unhindered. Personal industry and imagination eventually developed major industries of steel, intercontinental railroads, textiles, and shipping. Innovation led to the development of the internal combustion engine and its subsequent uses in industry. Agriculture became an industry, and with the aid of intercontinental railroads and shipping, contributed to the general economy and personal wealth of many.

Wednesday, September 18, 2019

Career Resilience Essay -- Employment Work Jobs Essays

Career Resilience Change in the workplace continues at a rapid pace, affecting careers and career development. Mergers, acquisitions, reengineering, and downsizing are influencing employment patterns and altering the career directions of many. No longer are individuals advised to think in terms of spending their entire careers in one organization. Rather, they are being led to recognize the temporary nature of all jobs and the need to prepare themselves for redefined career paths that require resilience and an ability to be self-reliant. This Digest defines the concept of career resilience, including the characteristics of individuals who are career resilient and the characteristics of organizations that support career resilience. Definition of Career Resilience Collard et al. (1996) present several definitions of career resilience. One of these is "the ability to adapt to changing circumstances, even when the circumstances are discouraging or disruptive" (p. 33). Another definition of career resilience is "the result or outcome of being career self-reliant" (p. 34). Although career self-reliance and career resilience have been used interchangeably, there is a slight difference in the focus of each term. Career self-reliance refers to individual career self-management taking responsibility for one's own career and growth while maintaining commitment to the organization's success; career resilience refers to individual career development developing the knowledge and skills required to make a visible and personally motivated contribution to the organization and its customers. The Need for Career Resilience The emphasis on the self-management and self-development of one's career is a reflection of the shift in the ... ...ouse on Adult, Career, and Vocational Education, 1996. (ED 396 191) Filipczak, B. "You're on Your Own." Training 32, no. 1 (January 1995): 29-36. Fox, D. "Career Insurance for Today's World." Training & Development 50, no. 3 (March 1996): 61-64. Hall, D. T. and Mirvis, P. H. "The New Career Contract: Devel-oping the Whole Person at Midlife and Beyond." Journal of Vocational Behavior 47, no. 3 (December 1995): 269-289. Hequet, M. "Flat and Happy?" Training 32, no. 4 (April 1995): 29-34. Kaye, B., and Farren, C. "Up Is Not the Only Way." Training & Development 50, no. 2 (February 1996): 48-53. Koonce, R. "Becoming Your Own Career Coach." Training & Development 49, no. 1 (January 1995): 18-25. Waterman, R. H., Jr.; Waterman, J. D.; and Collard, B. A. "Toward a Career-Resilient Workforce." Harvard Business Review 72, no. 4 (July-August 1994): 87-95.

Tuesday, September 17, 2019

John Updike :: essays research papers

Evolution of Sirenia   Ã‚  Ã‚  Ã‚  Ã‚  Many scientists believe that sirenians evolved around fifty-five million years ago from small hoofed animals. The closests living relatives today are elephants and small asian mammals called hyraxes. Although there are vast differences between elephants, hyraxes, and sirenians, fossil evidence shows that all three evolved from a common ancestor. The manatee’s physical characteristics are visible remnants of their ancient heritage. The dugong’s tusks are another link to elephants. Like elephants, sirenians are enormous animals.   Ã‚  Ã‚  Ã‚  Ã‚  There are five species of Sirenia, but scientists theorize that there were many more in the past. Early forms of manatees are thought to have originated near the Amazon basin in South America. Some remained there to become the Amazonian manatee, while others migrated up through the Caribbean, giving rise to the Antillean and Florida manatees. Another group managed to swim or where carried on currents across the Atlantic and became the West African manatee.   Ã‚  Ã‚  Ã‚  Ã‚  Dugongs thought to have evolved along with mantees once ranged from Europe to Africa, and along the East and West coasts of the Americas. At the present time, they are only found in the Eastern Hemisphere in the Indian and Pacific Oceans. Steller’s Sea Cow, another species of Sirenian became extinct by fisherman within 25 to 30 years of its discovery in the 1700’s. Physical Characteristics   Ã‚  Ã‚  Ã‚  Ã‚  An adult manatee has a rounded body, usually light to dark gray or black, that tapers to a horizontally flattened, rounded tail, which provides propulsion and also serves as a rudder. Manatee’s range in length from 8 to 14 ft. long, depending on the species and can weigh 440 to 1300lbs. Although males can grow larger than the females. The small head includes a straight snout and a cleft upper lip with bristly hairs. Whiskers can be found on the surface of the lips, each attached seperatly to nerve endings and its own blood supply in the follicle. A manatees only teeth are 24 to 32 molars located in the back of the mouth, in addition to molars, manatees have horny, ridged pads at the front of the upper and lower jaws. The manatees upper lip is cleft with two lobes this isn used for gathering food. There small eyes are located on the sides of the head. Its nostrils, set on the upper surface of the snout are closed tightly by valves when the animal is under wa ter. Their lungs and diagphram run lengthwise along the body, unlike other mammals, in which they run crosswise.

Monday, September 16, 2019

Depression and Women

Women and Depression Christina Eddy October 2012 Women and Depression WOMEN AND DEPRESSION Introduction A. What is causing more women to be depressed then men? B. Depression is one of the leading causes of death in women today. 2. Depression in women is caused by many different reasons a. Hormonal changes due to pre menopause and menopausal conditions. b. Women of all ages seem to suffer from depression at one time or another. c. Depression can put a strain on many areas of a women’s life. 3.What can society do to help women deal with depression? a. Working with these women to help them learn how to over come depression b. Treatment through counseling and possible medication C. more informative information on how to handle depression through advertisements 3. Conclusion Society need to take a better closer look at what is causing this depression in women. If is very important the we treat both the mental and emotional issues that women deal with when diagnosed with depressionW omen and Depression There are many symptoms related to depression, these symptoms could be as simple as difficulties concentrating, or may be presented as an over-whelming of feelings of worthlessness and even becoming delusions. Women are thought to be more sensitive than men; this could lead to feeling over-whelmed which in turn could lead to suicide. Some emotions such as: not feeling pretty enough or not being skinny enough tend to be magnified. Studies have shown that 12% of U.S women may suffer from depression while approximately only 6% of men may be diagnosed as depressed. . Cyranowski, J. M. ,&Frank. (2006). Targeting populations of Women for Prevention and Treatment of Depression. In C. M. Mazure,G. Keita (Eds. ) Understanding depression in women. Mental health workers have stated that it’s psychological and that woman should be able to recognize how they are feelings and get help. But the question still remains, what is causing all these women to be depressed. It m ight be due to heredity, sexual abuse.There are those that are being harassed or discriminated against. There are doctors who believe that much of the depression in women is hormonal and could be brought on through their menstrual cycle or menopause. Psychologists believe that this depression has roots that can be passed through generations, therefore when something tragic accurse it can cause the depression to resurface. Some scientists believe that the stress factors lean more towards heredity; depression may be a gene that is passed down through generations.Through investigations it was found that the women who did not have a family history of depression, but did experience stressful events raised their chances of becoming depressed. There was about a 6% chance compared to those whose family had a history of depression, even this only raised their chances to 14%. Scientists have wondered if the gondola steroids estrogen and progesterone produced while a woman is menstruating migh t be putting women at a higher risk of becoming depressed, therefore showing that some girls may become depressed after puberty when they began to menstruate and their hormones start to fluctuate.Recent studies have shown that estrogen might play an active part in depression; this could be due to the fact that estrogen triggers body stress responses. Doctors know that the adrenalin glands are controlled by the pituitary gland in the brain which produces higher levels of a hormone called cortisol; this in turn increases the bodies metabolic and immune systems, stress then increases cortisol levels. These cortisol levels gradually will return to normal when the stress has passed.Although some evidence has shown that structured behavioral marital and family therapies are effective in treatment of depression (Holon, Summit2000). With the right combinations of therapy and drugs depression can be controlled. It’s has been proven in market research that approximately 30% to 35% of i ndividuals who have tried anti-depressant drugs felt no sense of improvement while taking the drugs. Keller, Gelenberge, &Hirschfeld, 1998; Keller et al. , 2000)Depressed women have been known to have more marital issues, this can sometimes lead to divorce, with this factor already in place depressed women are more likely to get involved with, and marry men with psychiatric disorders. (Hammen,Rudolph,Weiser,Roa,& Burge,1999). Although this is one factor in the cycle of women’s depression there is also another disorder called Major Depressive Disorder (MDD) this disorder is mostly found in women of child rearing ages, however, this disorder is now being found more often in younger patients.With this newfound information doctors are trying to figure out what effects if any (MDD) has on the children of depressed women. (Collaborative Group, 1992) There has been some research done stating that depression begins in early childhood. This could show us that it may also continue into adulthood, evidence has shown that it may lead to morbidity a higher risk of suicide. Therefore, children of depressed mothers when compared to mothers who do not suffer from depression have greater chance of inheriting a major depressive disorder.References Cyranowski, J. M. , &Frank. (2006). Targeting populations of Women for Prevention and Treatment of Depression. In C. M. Mazure, G. Keita (Eds. ) Understanding depression in women: References: (Psychological Applying empirical research to practice and policy (pp71-112) American Association. ) Doi: 10. 1037/11434-003 (Cross National Collaborative Group, 1992) (Holon, Summit2000) (Keller, Gelenberge, &Hirschfeld, 1998; Keller et al. , 2000) (Hammen,Rudolph,Weiser,Roa,& Burge,1999).

History and Comparison of Windows, Linux, and Apple Essay

An operating system is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources. Most operating systems perform similar functions that include starting and shutting down a computer, providing a user interface, managing programs, managing memory, coordinating tasks, configuring devices, establishing an Internet connection, monitoring performance, providing file management and other utilities, and automatically updating itself and certain utility programs (Shelly p. 398). There are three major operating systems that exist today that are going to be compared to decide which operating system could be best for different user purposes. The three operating systems are Windows, Linux, and Apple. Windows operating system is developed and maintained by Microsoft in Seattle, WA. The Microsoft Company was developed by Bill Gates. The first version of the Windows operating system was released in 1985, and has been the leading operating system used by 90% of users (Satyam). It is used by the Server 2008 R2 (Satyam). Windows is a Graphical User Interface (GUI) which allows its users to manage files and run software programs easily on desktop and laptop computers (Satyam). On the desktop, icons are used to represent programs that are easy to find and can be clicked to easily access and run the program of choice. Windows is also very popular because of its user interface programs such as Microsoft Office, which include Microsoft Word, Microsoft Power Point, and Microsoft Office Outlook. Windows also has a great reputation for its high and efficient security. Some popular Windows editions are Win 98, Win 2000, Win Me, Windows NT, Windows CE, Win 2003, Win XP, Win Vista and Windows 7 ( Satyam). Windows 8 is now the new successor of Windows 7 and is now available. Linux (Linus’ Unix) is a leading server operating system, and is used for running the top 10 fastest supercomputers in the world (Satyam). Linus Torwalds created Linux, and is the current owner of the Linux Trademark (Satyam). LIndows, Lycoris, Red Hat, SuSe, Mandrake, Knopping, Slackware are the various companies that distribute the Linux operating system (Satyam). NASlite is a version of the Linux operating system that runs off of a single floppy disk and converts an old computer into a file server (Satyam). Some popular versions of Linux include Debian, Fedora, and Red Hat. This operating system is ranked just below Windows operating system, but is quickly becoming popular and is predicted to give future Windows some tough competition. Since 1984, Mac OS 9 had been Apple’s primary operating system, but has been recently succeeded by Mac OS X. Mac OS X is a sequence of Unix-based operating systems and GUI’s developed, marketed and sold by Apple (Satyam). Mac OS X is user friendly, and is popular for its plug-and-play support, which means the operating system automatically configures new devices as they are installed (Shelly p. 408). As stated in the beginning of this paper, Windows, Linux, and Apple are the three most popular operating systems with Windows as the most popular of the three with 85% to 90% of personal computers using this operating system (Satyam). Compared to Windows, Mac is used by fewer people, but is more reliable and less likely to fail than Windows OS because of Mac regularly monitoring and the software and hardware add-ons. Linux is the least popular of the three and is based on UNIX, which has been used for more than three decades that now powers about 90% of Web sites (Satyam). Compared to both Mac and Windows, Linux is an open source project, meaning anyone can modify the Linux Code (Satyam). Linux offers great security and flexibility compared to Windows and Mac, but it takes a great deal of knowledge to install and operate the Linux operating system. Linux is also very much less expensive or even free compared to Windows operating system. When using a server, Linux is much cheaper compared to Windows because Microsoft only allows only a single copy to be used on one computer. However, once Linux is purchased, it can be used on any number of computers at no additional charge (Satyam). Windows can make it difficult for users to store user information and settings and switch to a new computer, but Linux stores the user’s data in the home directory, making it easier to transfer from an old to a new computer (Satyam). In conclusion, Linux is much more secure, reliable, flexible, and more cost efficient than Windows or Mac, but much more difficult to install, understand and operate, it is ideal for industry sectors. Windows and Mac operating systems are much easier for personal use and require less knowledge than Linux operating system. Windows and Mac, however, are more expensive, but are more widely used than Linux, with Windows leading the three in popularity. References Shelly, G. B., & Vermaat, M. E. (2011). Discovering Computers 2011: Living in a Digital World, Complete (pp. 398-408). Boston, MA: Course Technology, Cengage Learning. Satyam. (2011, June 29). Windows, Linux or Mac OS A Comparison. In HackDigital. Retrieved September 26, 2012, from Google.

Sunday, September 15, 2019

Ethical Decision Making and Ethical Leadership Essay

To improve ethical decision making in business, one must first understand how individuals make ethical decisions in an organizational environment. Too often it is assumed that individuals in organizations make ethical decisions in the same way that they make ethical decisions at home, in their family, or in their personal lives. Within the context of an organizational work group, however, few individuals have the freedom to decide ethical issues independent of organizational pressures. ETHICAL – ISSUE INTENSITY The first step in ethical decision making is to recognize that an ethical issue requires an individual or work group to choose among several actions that various stakeholders inside or outside the firm will ultimately evaluate as right or wrong. Ethical issue intensity, then, can be defined as the relevance or importance of an ethical issue in the eyes of the individual, work group, and/or organization. it is personal and temporal in character to accommodate values, beliefs, needs, perceptions, the special characteristics of the situation, and the personal pressure prevailing at a particular place and time. Ethical – issue intensity reflects the ethical sensitivity of the individual or work group that faces the ethical decision – making process. Research suggest that individuals are subject to six â€Å"spheres of influence† when confronted with ethical choices – the workplace, family, religion, legal system, community, and profession – and that the level of importance of each of these influences wiil vary depending on how important the decision maker perceives the issue to be. Additionally, the individuals sense of the situation’s moral intensity increase the individuals perceptiveness regarding ethical problems, which in turn reduces his or her intention to unethically. Moral intensity relates to a persons perception of social pressure and the harm the decision will have on others. The perception of ethical issue intensity can be influenced by managements use of reward and punishments, corporate policies, and corporate values to sensitize employees. In the words, managers can affect the degree to which employees  perceive the importance of an ethical issue through positive and/or negative incentives. INDIVIDUAL FACTORS When people need to resolve ethical issues in their daily lives, they often base their decisions on their own values and principles of right or wrong. The generally learn these values and principles through the socialization process with family members, social groups, and religion and in their formal education. Research regarding individual factors that affect ethical awareness, judgment, intent, and behavior include gender, education, work experience, nationality, age, and locus of control. Education, the number of years spent in pursuit of academic knowledge, is also a significant factor in the ethical decision-making process. The important thing to remember about education is that it does not reflect experience. Work experiences is defined as the number of years within a specific job, occupation, and/or industry. Generally, the more education or work experiences that one has, the better he/she is at ethical decision making. Nationality is the legal relationship between a person and the country in which he/she is born. Age is another individuals factors that has been researched within business ethics. In other words, the older you are, the more ethical you are. However, recent research suggest that there is probably a more complex relationship between ethics and age. Locus of control relates to individual differences in relation to a generalized beliefs about how one is affected by internal versus external events or reinforcements. In other word, the concept relates to where people view themselves in relation to power. Those who believe in external control see themselves as going with the flow because that’s all they can do. They believed that the events in their lives are do to uncontrollable forces. They consider what they want to achieve depends on luck, chance, and powerful people in their company. Conversely, those who believe in internal control believe that they control the events in their lives by their own  effort and skill, viewing themselves as masters of their destinies and trusting in their capacity to influence their environment. ORGANIZATIONAL FACTORS Although people can and do make individual ethical choices in business situations, no one operates in a vacuum. Indeed, research has established that in the workplace the organizations values often have greater influence on decisions than a persons own values. Ethical choices in business are most often made jointly, in work groups and committees, or in conversations and discussions with coworkers. The outcome of this learning process depend on the strength of each person personal values, the opportunities he or she has to behave unethically, and the exposure he or she has to others two behave ethically or unethically. A corporate culture can be defined as a set of values, beliefs, goals, norms and ways of solving problems that members of an organization share. An important component of corporate, or organizational, culture is the company’s ethical culture. Whereas corporate culture involves values and rules that prescribe a wide range of behavior for organizational members, the ethical culture reflects whether the firm also has an ethical conscience. Ethical is a function of many factors, including corporate policies on ethics, top managements leadership on ethical issues, the influence of coworkers, and the opportunity for unethical behavior. Obedience to authority is another aspect of the influence that significant others can exercise. Obedience to authority helps to explain why many employees resolve business ethics issues by simply following the directives as superior. OPPORTUNITY Opportunity describes the conditions in an organization that limit or permit ethical or unethical behavior. Opportunity results from conditions that either provide rewards, whether internal or external, or fail to erect  barriers against unethical behavior. Example of internal rewards include feelings of goodness and personal worth generated by performing altruistic acts. External reward refer to what an individual expects to receive from others in the social environment. Rewards are external to the individual to the degree that they bring social approval, status, and esteem. An example of a condition that fails to erect barriers against unethical behavior is a company policy that does not punish employees who accept large gifts from clients. Opportunity relates to individuals immediate job context – where they work, whom they work with, and the nature of the work. Opportunity also comes from knowledge. Major misconduct observed among employees in the workplace include lying to employees, customers, vendors, or the public or with holding needed information from them. The opportunity for unethical behavior cannot be eliminated without aggressive enforcement of codes and rules. BUSINESS ETHICS EVALUATIONS AND INTENSIONS Ethical dilemmas involve problem-solving situations in which decision rules are often vague or in conflict. The results of an ethical decision are often uncertain, no one can always tell us whether we have made the right decision. An individuals intentions and the final decision regarding what action he or she will take are the last steps in the ethical decision-making process. When the individual intention and behavior are inconsistent with his or her ethical judgment, the person may feel guilty. Guilt or uneasiness is the first sign that an unethical decision has occurred. The next step is changing one’s behavior to reduce such feelings. This change can reflect a persons values shifting to fit the decision or the person changing his or her decision type the next time a similar situations occurs. For those who begin the value shift, the following are the usual justifications that will reduce and finally eliminate guilt: 1.I need the paycheck and cant afford to quit right now. 2.Those around me are doing it so why shouldn’t I? they believe it’s okay 3.If I hadn’t have done this, I may not be able to get a good reference from my boss or company when I leave. 4.This is not such a big deal, given the potential benefits 5.Business is business with a different set of rules 6.If not me, someone else would do it and get reward The road to success depends on how the business person defines success. The success concepts drives intentions and behavior in business either implicitly or explicitly. USING THE ETHICAL DECISION-MAKING FRAMWORK TO IMPROVE ETHICAL DECISIONS It bears repeating that it is impossible to tell you what is right or wrong; instead, we are attempting to prepare you make in framed ethical decisions. Although this chapter does not moralize by telling you what to do in a specific situation, it does provide an overview of typical decision-making processes and factor that influence ethical decisions. The framework is not a guide for how to make decisions but is intended to provide you with insights and knowledge about typical ethical decision making processes in business organizations. Because it is impossible to agree on normative judgments about what is ethical, business ethics scholars developing descriptive models have instead focused on regularities in decision making and the various phenomena that interact in a dynamic environment to produce predictable behavioral patterns. THE ROLE OF LEADERSHIP AN A CORPORATE CULTERE Leadership the ability on authority to guide and direct others toward achievement of a goal, has significant impact on ethical decision making because leader have the power to motive others and enforce the organization’s rules policies as well as their own viewpoints. LEADRESHIP STYLE INFLUENCE ETHICAL DECISIONS Leadership styles influence many aspects of organizational behavior, including employees’ acceptance of and adherence to organizational norms and values. Styles that focus on building strong organizational values among employees contribute to shared standards of conduct. The ethical leadership concept is not only for CEOs, boards of directors, and managers but can also  be fellow employees. Ethical leadership by the CEO requires an understanding of the firm’s vision and values, as well as the challenges of responsibility and the risk in achieving organizational objectives. Six leadership styles that are based on emotional intelligence—the ability to manage ourselves and our relationships effectively—have been identified by Daniel Goleman. 1.The coercive leader demands instantaneous obedience and focuses on achievement, initiative, and self-control. Although this style can be very effective during times of crisis or during a turnaround, it otherwise creates a negative climate for organizational performance. 2.The authoritative leader—considered to be one of the most effective styles—inspires employees to follow a vision, facilitates change, and creates a strongly positive performance climate. 3.The affiliative leader values people, their emotions, and their needs and relies on friendship and trust to promote flexibility, innovation, and risk taking. 4.The democratic leader relies on participation and teamwork to reach collaborative decisions. This style focuses on communication and creates a positive climate for achieving results. 5.The pacesetting leader can create a negative climate because of the high standards that he or she sets. This style works best for attaining quick results from highly motivated individuals who value achievement and take the initiative. 6.The coaching leader builds a positive climate by developing skills to foster long-term success, delegating responsibility, and skillfully issuing challenging assignments. Transactional leaders attempt to create employee satisfaction through negotiating, or â€Å"bartering,† for desired behaviors or levels of performance. Transformational leaders strive to raise employees’ level of commitment and to foster trust and motivation. HABITS OF STRONG ETHICAL LEADERS In particular, we believe that ethical leadership is based on holistic thinking that embraces the complex and challenging issues that companies face on a daily basis. Ethical leaders need both knowledge and experience to make the right decision. Strong ethical leaders have both the courage and the most complete information to make decisions that will be the best in the long run. Strong ethical leaders must stick to their principles and, if  necessary, be ready to leave the organization if its corporate governance system is so flawed that it is impossible to make the right choice. Ethical Leaders Have Strong Personal Character There is general agreement that ethical leadership is highly unlikely without a strong personal character. The question is how to teach or develop a moral person in a corporate environment. White, a leading authority on character development, believes the focus should be on â€Å"ethical reasoning† rather than on being a â€Å"moral person.† Ethical Leaders Have a Passion to Do Right The passion to do right is â€Å"the glue that holds ethical concepts together.† Some leaders develop this trait early in life, whereas others develop it over time through experience, reason, or spiritual growth. They often cite familiar arguments for doing right—to keep. society from disintegrating, to alleviate human suffering, to advance human prosperity, toresolve conflicts of interest fairly and logically, to praise the good and punish the guilty, or just because something â€Å"is the right thing to do.† Ethical Leaders Are Proactive Ethical leaders do not hang around waiting for ethical problems to arise. They anticipate, plan, and act proactively to avoid potential ethical crises.44 One way to be proactive is to take a leadership role in developing effective programs that provide employees with guidance and support for making more ethical choices even in the face of considerable pressure to do otherwise. Ethical Leaders Consider Stakeholders’ Interests Ethical leaders consider the interests of and implications for all stakeholders, not just those that have an economic impact on the firm. This requires acknowledging and monitoring the concerns of all legitimate stakeholders, actively communicating and cooperating with them, employing processes that are respectful of them, recognizing interdependencies among them, avoiding activities that would harm their human rights, and recognizing the potential conflicts between leaders’ â€Å"own role as corporate  stakeholders and their legal and moral responsibilities for the interests of other stakeholders. Ethical Leaders Are Role Models for the Organization’s Values If leaders do not actively serve as role models for the organization’s core values, then those values become nothing more than lip service. According to behavioral scientist Brent Smith, as role models, leaders are the primary influence on individual ethical behavior. Leaders whose decisions and actions are contrary to the firm’s values send a signal that the firm’s values are trivial or irrelevant. Firms such as Countrywide Financial articulated core values that were only used as window dressing. On the other hand, when leaders model the firm’s core values at every turn, the results can be powerful Ethical Leaders Are Transparent and Actively Involved in Organizational Decision Making Being transparent fosters openness, freedom to express ideas, and the ability to question conduct, and it encourages stakeholders to learn about and comment on what a firm is doing. Transparent leaders will not be effective unless they are personally involved in the key decisions that have ethical ramifications. Transformational leaders are collaborative, which opens the door for transparency through interpersonal exchange. Earlier we said that transformational leaders instill commitment and respect for values that provide guidance on how to deal with ethical issues. Ethical Leaders Are Competent Managers Who Take a Holistic View of the Firm’s Ethical Culture Ethical leaders can see a holistic view of their organization and therefore view ethics as a strategic component of decision making, much like marketing, information systems, production, and so on. Although his company is called Waste Management, CEO David P. Steiner is as committed to renewable energy as just about anyone working for a multibillion dollar business. Steiner was selected as one of the 100 Most Influential People in Business Ethics by the Ethisphere Institute in 2007, and his company, Waste Management, was chosen as one of the World’s Most Ethical Companies in 2008. Case study : Tyco International: Leadership Crisis INTRODUCTION On September 12, 2002, national television showcased Tyco International’s former chief executive officer (CEO) L. Dennis Kozlowski and former chief financial officer (CFO) Mark H. Swartz in handcuffs after being arrested and charged with misappropriating more than $170 million from the company. They were also accused of stealing more than $430 million through fraudulent sales of Tyco stock and concealing the information from shareholders. The two executives were charged with more than thirty counts of misconduct, including grand larceny, enterprise corruption, and falsifying business records. Another executive, former general counsel Mark A. Belnick, was charged with concealing $14 million in personal loans. Months after the initial arrests, charges and lawsuits were still being filed—making the Tyco scandal one of the most notorious of the early 2000s. TYCO’S HISTORY Founded in 1960 by Arthur J. Rosenberg, Tyco began as an investment and holding company focused on solid-state science and energy conversion. It developed the first laser with a sustained beam for use in medical procedures. Rosenberg later shifted his focus to the commercial sector. In 1964, Tyco became a publicly traded company. It also began a series of rapid acquisitions—sixteen companies by 1968. The expansion continued through 1982, as the company sought to fill gaps in its development and distribution networks. Between 1973 and 1982, the firm grew from $34 million to $500 million in consolidated sales. THE RISE OF DENNIS KOZLOWSKI In 1975, armed with a degree in accounting, Dennis Kozlowski went to work for Tyco, following brief stints at SCM Corporation and Nashua Corporation. He soon found a friend and mentor in then CEO Joseph Gaziano. Kozlowski was impressed by Gaziano’s lavish lifestyle—company jets, extravagant vacations, company cars, and country club memberships. However, Gaziano’s reign ended abruptly in 1982 when he died of cancer. Gaziano was replaced by John F.  Fort III, who differed sharply in management style. Where Gaziano had been extravagant, Fort was analytical and thrifty. His goal was to increase profits for shareholders and cut the extravagant spending characterizing Gaziano’s tenure, and Wall Street responded positively to Tyco’s new direction. Kozlowski, who had thrived under Gaziano, was forced to adapt to the abrupt change in leadership. Adept at crunching numbers, Kozlowski focused on helping to achieve Fort’s vision of putting shareholders first. Kozlowski’s largest acquisition was Wormald International, a $360 million global fire-protection concern. Integrating Wormald proved problematic, and Fort was reportedly unhappy with such a large purchase. Fort and Kozlowski also disagreed over rapid changes made to Grinnell. Kozlowski responded by lobbying to convince Tyco’s board of directors that problems with Wormald were a â€Å"bump in the road† and that the firm should continue its strategy of acquiring profitable companies that met guidelines. KOZLOWSKI’S TYCO EMPIRE After Fort’s departure, Dennis Kozlowski, then 46, found himself helming Tyco International. With a new lifestyle—parties and multiple homes in Boca Raton, Nantucket, Beaver Creek, and New York City—and an aggressive management style, he appeared to be following in the footsteps of his mentor, former CEO Joseph Gaziano. Kozlowski knew Tyco from the bottom up, and stated that he was determined to make it the greatest company of the next century. Among other things, he recognized that one of Tyco’s major shortcomings was its reliance on cyclical industries, which tend to be very sensitive to economic ups and downs. In 1997, Kozlowski acquired ADT Security Services, a British-owned company located in Bermuda. By structuring the deal as a â€Å"reverse takeover,† wherein a public company is acquired by a private company so as to avoid the lengthy process of going public, Tyco acquired a global presence as well as ADT’s Bermuda registration. The majority of members had served for ten years or more, and they were familiar with Kozlowski’s management style. As directors, they were responsible for protecting Tyco’s shareholders through disclosure of questionable situations or issues that might seem unethical or inappropriate. Despite this, after the arrests of Kozlowski and Swartz, investigations uncovered the following troubling relationships among the  board’s members: 1.Richard Bodman invested $5 million for Kozlowski in a private stock fund managed by Bodman. 2.Frank E. Walsh, Jr. received $20 million for helping to arrange the acquisition of CIT Group without the other board members’ knowledge. 3.Walsh also held controlling interest in two firms that received more than $3.5 million for leasing an aircraft and providing pilot services to Tyco between 1996 and 2002. 4.Stephen Foss received $751,101 for supplying a Cessna Citation aircraft and pilot services. 5.Lord Michael Ashcroft used $2.5 million in Tyco funds to purchase a home. Meanwhile, Jeanne Terrile, an analyst from Merrill Lynch who worked for Tyco, was not impressed with Kozlowski’s activities and Tyco’s performance. Her job at Merrill Lynch was to make recommendations to investors on whether to buy, hold, or sell specific stocks. After Terrile wrote a negative review of Tyco’s rapid acquisitions and mergers and refused to upgrade Merrill’s position on Tyco’s stock, Kozlowski met with David Komansky, the CEO of Merrill Lynch. THE FALL OF DENNIS KOZLOWSKI AND OTHERS In early 2002, Kozlowski announced Tyco’s split of its four divisions into independent, publicly traded companies: Security and Electronics, Healthcare, Fire Protection and Flow Control, and Financial Services. Kozlowski stated, â€Å"I am extremely proud of Tyco’s performance. We have built a 5 great portfolio of businesses and over the five years ended September 30, 2001, we have delivered earnings per share growth at a compounded annual rate of over 40 percent and industry-leading operating profit margins in each of our businesses. During this same period, we have increased annual free cash flow from $240 million in 1996 to $4.8 billion in fiscal 2001. Nonetheless, even with this performance, Tyco is trading at a 2002 P/E multiple of 12.0x, a discount of almost 50 percent to the S&P 500.† Also in 2002, the New York State Bank Department observed large sums of money moving in and out of Tyco’s accounts. What made this unusual was that the funds were being transferred into Kozlowski’s personal accounts. Authorities discovered that Kozlowski had sought to avoid around $1 million in New York state import taxes. In September of that year, Dennis Kozlowski and Mark Swartz, who also had resigned, were indicted on thirty-eight felony counts for allegedly stealing $170 million from Tyco and fraudulently selling an  additional $430 million in stock options. Among other allegations, Kozlowski was accused of taking $242 million from a program intended to help Tyco employees buy company stock. REBUILDING AN EMPIRE After Kozlowski’s resignation, Edward Breen replaced him as CEO. The company filed suit against Dennis Kozlowski and Mark Swartz for more than $100 million. The SEC allows companies to sue insiders who profited by buying and selling company stock within a six-month period. Tyco stated, â€Å"To hold him accountable for his misconduct, we seek not only full payment for the funds he misappropriated but also punitive damages for the serious harm he did to Tyco and its shareholders.†