Saturday, August 31, 2019

Compare Benjamin Franklin, Thomas Paine and Thomas Jefferson Essay

Benjamin Franklin, Thomas Paine, and Thomas Jefferson all had similar values and ideas about America concerning politics and its economy. They all also had a knack for getting people to follow them. Benjamin Franklin, who had only died about 30 years before William Cullen Bryant wrote To Cole, the Painter, Departing for Europe, seemed to express different views about America vs. Europe in his letters. In a letter Franklin wrote to his grandson, he expressed how he wanted to return to America before his death but didn’t think he would be able to. He seemed so passionate when writing about America. It was as if there was nothing better than America. We also know that Franklin was very involved in politics and economics. He is one of the first people we read about who was very concerned with money and how it affected status and politics. Obviously wealth affects status in at least some aspect. Whether the wealth was measured by money or by land, it defined social class. Only people of the upper class took part in politics. Franklin was one of America’s founding fathers. He helped write the Declaration of Independence, which we still abide by today, over 200 years later. Benjamin Franklin listed 13 virtues with their precepts in one of his documents. He listed these to make sure he abided by all of them and just these 13. One of the precepts was ‘order’. He expanded on this by making a schedule of how his business and his life should run. It listed what should be done for the day, including when he should eat and sleep. He was definitely ahead of his time and set the standards for Americans today. Thomas Paine instilled his ideas onto others in Common Sense. He starts out by saying, â€Å"In the following pages I offer nothing more than simple facts, plain arguments, and common sense†. Just by writing this, he has already captivated the reader and forced them to see his views and just ‘common sense’. Paine seemed to specialize in revolts and working for the ordinary person. This was Paine’s involvement in politics; getting the common person to see how they were oppressed and how things should change. He took action by forming revolutions. Paine felt that America should be free from British control. He stated, â€Å"We have boasted the protection of Great Britain without considering that her motive was interest, not attachment; and that she did not protect us from our enemies on our account, but from her enemies on her own account, from those who had no quarrel with us on any other account, and who will always be our enemies on the same account.† He used this to explain to Americans how Britain had created enemies for us because of their own personal reasons and when we were under attack, Britain didn’t care and sequentially, they had created enemies for both places. Thomas Jefferson took part in politics as well as Franklin and Paine and was the principal author of the Declaration of Independence. Jefferson, unlike Franklin and Paine, was born into his wealth. He was never a commoner and therefore never knew what it was like to be in that position. I find it interesting that someone of his stature would be allowed to help write the Declaration of Independence which helps guide everyone including commoners. He couldn’t possibly understand what would be best for them. This is probably why there are many things in the constitution that don’t seem fair to an ordinary person, such as the Electoral College. This system was basically created because a regular person could not have a vote left in their hands. Although Jefferson seems like he wants independence for America, it also seems like he doesn’t trust America to have this Independence. All three people that I have discussed seem to differ in their views of America vs. Europe from Bryant. Bryant seems to be thrilled that America is based on Europe. Places such as New York and New England were almost exact replicas of the originals. Benjamin Franklin, Thomas Paine, and Thomas Jefferson were trying to change the way America was to make it a better place to live. It is because of these men that America is everything it is today.

Friday, August 30, 2019

Succubus Blues CHAPTER 16

â€Å"Georgina?† â€Å"I'm still here.† â€Å"Pretty fucked up, huh? I guess this kills your angel theory.† â€Å"I'm not so sure.† My initial feeling of dismay was being replaced by a new idea, one that had been percolating in the back of my mind ever since I read the biblical passage at Terry and Andrea's. I wondered now†¦ wondered exactly what we were dealing with, if it was an angel after all. The words in Genesis came back to me: There were giants in the earth in those days†¦ the same became mighty men which were of old, men of renown†¦ â€Å"What's Jerome saying about all of this?† â€Å"Nothing. What'd you expect?† â€Å"Everyone else is okay, though?† â€Å"Fine, last I knew. What are you going to do? Nothing stupid, I hope.† â€Å"I have to go check on something.† â€Å"Georgina†¦Ã¢â‚¬  Hugh warned. â€Å"Yeah?† â€Å"Be careful. Jerome's in a terrible mood over all of this.† I laughed harshly. â€Å"I can imagine.† An awkward silence hung on the line. â€Å"What else aren't you telling me?† He hesitated a moment longer. â€Å"This†¦ this is a surprise to you, right? This Lucinda thing?† â€Å"Of course it is. Why wouldn't it be?† Another pause. â€Å"It's just†¦ well, you've got to admit it's kind of weird, first Duane†¦Ã¢â‚¬  â€Å"Hugh!† â€Å"And then, I mean, when no one could contact you†¦Ã¢â‚¬  â€Å"I told you, my cell phone broke. You can't be serious about this.† â€Å"No, no. It's just†¦ I don't know. I'll talk to you later.† I disconnected. Lucinda dead? Lucinda, with her plaid skirt and bob? It was impossible. I felt terrible; I'd just seen her the other day. Sure, I'd called her a sanctimonious bitch, but I hadn't wanted this. Any more than I'd wanted Duane dead. Yet, the connections Hugh had drawn were weird, weirder than I liked to admit. I'd argued with both Duane and Lucinda, and they'd died shortly thereafter. But Hugh†¦ how did he fit in? Some friend. From what I heard, he received a great deal of amusement telling anyone that would listen about your little whip and wings getup. I remembered Luanda's jibe. I had indeed had a small flare-up with the imp just before his attack. A small flare-up and a small attack, considering he had lived. I shivered, unsure as to what this meant. Doug walked in. â€Å"You get everything straightened out?† â€Å"Yeah. Thanks.† We stood there uncomfortably for a moment until I finally unlocked the floodgates of my guilt. â€Å"Doug, I-â€Å" â€Å"Forget it, Kincaid. It's nothing.† â€Å"What I said, I shouldn't have. I was – â€Å" â€Å"Wasted. Trashed. Flat on your ass drunk. It happens.† â€Å"Still, I had no right. You were trying to be nice, and I turned complete psycho bitch on you.† â€Å"You weren't that psycho.† â€Å"But definitely a bitch?† â€Å"Well†¦Ã¢â‚¬  He hid a smile, not meeting my eyes. â€Å"I'm sorry, Doug. I'm really sorry.† â€Å"Quit it. I can't take much more of this sentimentality.† I leaned over and squeezed his arm, resting my head slightly on his shoulder. â€Å"You're a good guy, Doug. A really good guy. And a good friend. And I'm sorry†¦ sorry for a lot of things that have – or haven't – happened between us.† â€Å"Hey, forget about it. It's nothing between friends, Kin- caid.† A pregnant pause hung between us; he was still clearly uncomfortable with this exchange. â€Å"Did†¦ did everything turn out all right? I lost track of you after the show. That outfit you have on doesn't reassure me any.† â€Å"You'll never believe whose shirt this is,† I teased, subsequently telling him the whole tale of getting sick with Seth and the follow-up birthday party. Doug was pushing hysterics by the time I finished, albeit in a relieved sort of way. â€Å"Mortensen's a good guy,† he finally said, still laughing. â€Å"He says the same thing about you.† Doug grinned. â€Å"You know he's – oh, man. I forgot, what with all those phone calls.† Turning to the desk, he sifted through papers and books, finally producing a small white envelope. â€Å"You got a note. Paige said she found it last night. I hope it's good news.† â€Å"Yeah, me too.† But I had my doubts when I saw it. I took it gingerly, like something that might burn me. The paper and calligraphy were identical to the last one's. Opening up the envelope, I read: So you're interested in fallen angels, are you? Well, there'll be a hands-on demonstration tonight. It should prove more informative than your current endeavors and won't require you screwing your boss in order to get help with extrapolation – not that watching you make a whore of yourself didn't have its moments. I looked up, meeting Doug's curious eyes. â€Å"No worries,† I told him lightly, folding the note up and placing it in my purse. â€Å"This is old news.† Hugh's report implied Lucinda had been killed last night, and this note had been slipped to me beforehand, according to Doug. The warning had gone unheeded. This person apparently didn't have a good grasp of my schedule, or they hadn't wanted me to actually act beforehand. It was more like a scare tactic. Whatever their point in giving me a heads-up on Lucinda, it was nothing compared to the other reference in the note. The thought that someone had watched me have sex with Warren made my skin crawl. â€Å"Where are you off to now?† Doug asked. â€Å"Believe it or not, I need to find a book.† â€Å"You're in the right place.† We went back out to the information desk, where Tammi stood. It pleased me to see Doug training her in this post; we'd need people available for all jobs when the holidays came. â€Å"Practice time,† I told her. â€Å"Tell me where we keep this book.† I gave her the name, and she looked it up in the computer, frowning at the results. â€Å"We don't. We can order it for you.† I scowled, suddenly understanding why people seemed so pissed off when I told them that. â€Å"Great,† I muttered. â€Å"Where am I going to get it tonight?† Erik probably stocked it, but he'd be closed by now. â€Å"I hate to recommend this,† joked Doug, â€Å"but a library might have it.† â€Å"Maybe†¦Ã¢â‚¬  I eyed a clock, unsure how late the local branches stayed open. â€Å"Um, Georgina?† began Tammi carefully. â€Å"I know a place that has it. And that's still open.† I turned to her in surprise. â€Å"Really? Where – no. No. Not there.† â€Å"I'm sorry.† Her blue eyes pleaded with me to forgive her for such tidings. â€Å"But there were three copies in stock the last time I was there. They couldn't have sold out.† I groaned, rubbing my temples. â€Å"I can't go in there. Doug, you want to run an errand for me?† â€Å"I've got to close,† he admonished. â€Å"What place are you avoiding?† † Krystal Starz, home of ‘freaky witch woman.' â€Å" â€Å"You couldn't pay me to go there.† â€Å"You could pay me,† noted Tammi, â€Å"but I'm closing too. If it makes it any easier, she's not there all the time.† â€Å"Yeah,† added Doug helpfully. â€Å"No manager is always on-duty. She must have other staff to cover her.† â€Å"Unless they're short-staffed,† I muttered. The irony. I left the store and got into my car for the journey to Krystal Starz. As I drove, I reflected on the two pieces of information I'd gleaned today. First, the nephilim reference. The King James translation had mentioned angelic offspring, even mentioned them as being abnormal, but I had never considered the possibilities half-angel children might present. The annotation in Terry and Andrea's translation had elaborated only slightly more on such creatures, but it had been enough to spring a lock in my head. Who better, I thought, to take on both angels and demons than some sort of bastard demigod? Of course, the whole discovery of the nephilim had come about as a spin-off to the verse Erik had given me about fallen angels. I could be running away with a blind lead here when really the culprit was just a regular immortal, albeit an unstable one, slaying members of both sides. After all, I still hadn't ruled Carter out of the realm of suspects, nor had I figured out why said killer would finish the job with Duane and Lucinda but let Hugh live. My other piece of data today, the new note, offered little I hadn't already known. I'd simply found it too late for it to be of preemptive use. And if some voyeur was following me around, there was nothing I could do about that either. Yet, it led to the obvious question: Why was this person following me around? Evidence suggested I was the only one receiving such attention, the only one receiving notes. And again, there was the niggling truth: Everyone I'd fought with had later become a victim†¦ When I had almost reached Krystal Starz, I pulled off onto a deserted street. Unbeknownst to Tammi and Doug, I already had a simple solution for facing Helena. Stripping out of the dress and Seth's shirt, lest they be consumed, I shape-shifted, taking on the guise of a tall, willowy Thai woman in a linen dress. I sometimes used this body to hunt in. The New Age bookstore was quiet when I entered, with only a couple of browsing customers. I saw the same boyish acolyte from before manning the register, and blessing upon blessing, I couldn't see Helena anywhere. Even disguised, I still had no desire to run into that nutcase. Smiling at the young man behind the counter, I approached and asked where I could find the book. Grinning back like an idiot – this was a very attractive form, after all – he led me to a certain section in their cryptic cataloging system, immediately finding the book. As Tammi had said, the store stocked three copies. We returned to the register to cash out, and I sighed in relief, thinking I was going to make it out of here unscathed. No such luck. The back door leading to the conference room opened, and Helena glided out as though conjured, clad in a flowing fuchsia gown, laden with her usual ten pounds of necklaces. Damn it. It was like the woman really did have a sixth sense or something. â€Å"Things are well, Roger?† she asked the clerk, using her raspy show voice. â€Å"Yes, yes.† He bobbed his head eagerly, apparently thrilled that she'd call him by first name. Turning to me, she gave me one of her diva smiles. â€Å"Hello, my dear. How are you this evening?† Remembering that this persona had no grudge with her, I forced a smile and answered politely, â€Å"Good, thank you.† â€Å"I imagine so,† she told me gravely as I handed cash to the boy, â€Å"because I sense excellent things about your aura.† I widened my eyes in what I hoped was a laywoman's awe. â€Å"Really?† She nodded, pleased at an appreciative audience. â€Å"Very bright. Very strong. Lots of color. You have good things in store for you.† This message was a far cry from the one she'd given me at Emerald City, I thought. Seeing my book, she eyed me sharply, probably because it was dense and filled with research, as opposed to most of the fluff she sold. â€Å"I'm surprised. I would have expected you to be reading up on how to focus your gifts more. Maximize your full potential. I have several titles I can recommend if you're interested.† Didn't this woman ever stop with the sales pitching? â€Å"Oh, I'd love to,† I oozed back, â€Å"but I only brought enough cash for this.† I gestured to the bag now in hand. â€Å"I understand,† she told me gravely. â€Å"Let me show you anyway. So you'll know what to come back for next time.† Torn, I contemplated which would cause me the most discomfort: going along with her or starting a feud in yet another body. Noticing a clock, I saw that the store closed in fifteen minutes. She couldn't waste that much of my time. â€Å"Okay. I'd love to.† Beaming, Helena led me across the store, another victim in her thrall. As promised, we looked at books on utilizing the strongest parts of the aura, a few books on crystal channeling, and even one on how visualization could help bring about the things we most wanted. This last one was so painful, I wanted to beat myself in the head with it to end my suffering. â€Å"Don't underestimate the power of visualization,† she whispered. â€Å"You can control your own destiny, set your own paths, rules, and stakes. I can sense great potential in you, but following these principles can help you unlock more – all the things you'd want for a happy and fulfilling life. Career, home, husband, children.† An image of Seth's niece curled in my lap suddenly came unbidden to me, and I hastily turned away from Helena. Succubi bore no children. No such future waited for me, book or no. â€Å"I need to go. Thanks for your help.† â€Å"Of course,† she responded demurely, handing me a list she'd conveniently written the titles – and prices – upon. â€Å"And let me give you some brochures for our upcoming programs and events.† It didn't end. She finally released me once I was sufficiently laden with paper, all of which I dumped into the trash bin in the parking lot. Lord, I hated that woman. I supposed Helena the schmoozing con artist was better than Helena the raving lunatic who had been at Emerald City, but really, it was a tough call. At least I'd obtained the book, which was all that mattered. I pulled off at one of my favorite Chinese places on the way home, back in my normal shape. Carrying Harrington's book in, I ate General Tso's chicken while reading the entry on nephilim : Nephilim are first referenced in Genesis 6:4, where they are sometimes referred to as â€Å"giants † or â€Å"fallen ones.† Regardless of the word's translation, the nephilim's origin is clear from this passage: they are the semi-divine offspring of angels and human women. Genesis 6:4 refers to them as â€Å"mighty† and â€Å"men of renown.† The rest of the Bible makes little reference to the nephilim's angelic siring, but encounters with giants and men of â€Å"great stature† are frequently recorded in other books, such as Numbers, Deuteronomy, and Joshua. Some have speculated that the â€Å"great wickedness† prompting the flood in Genesis 6 was actually a result of the nephilim's corrupting influence on mankind. Further apocryphal readings, such as 1 Enoch, elaborate on the plight of the fallen angels and their families, describing how the corrupted angels taught â€Å"charms and enchantments† to their wives while their offspring ra n wild throughout the earth, slaughtering and causing strife among humans. The nephilim, gifted with great abilities much like those of the ancient Greek heroes, were nonetheless cursed by God and neglected by their parents, consigned to wander the earth all their days without peace until eventually destroyed for the sake of mankind. I looked up, feeling breathless. I had never heard of anything like this. I had been right in telling Erik practitioners were the worst to ask about their own histories; surely this was something someone should have told me about before. Angelic offspring. Were nephilim real? Were they still around? Or was I really just chasing a dead end here, following a distracting lead when I should have restricted my search to immortals of my caliber or above, like Carter? After all, these nephilim were half-human; they couldn't be all that powerful. After paying the bill, I walked out to my car, opening my fortune cookie as I went. It was empty. Charming. A light rain misted around me, and fatigue crept in around my edges, not surprising considering the last twenty-four hours. I couldn't find a parking spot when I arrived in Queen Anne, which indicated some sort of sporting event or show going on nearby. Grumbling, I parked seven blocks away from home, vowing to never again lease an apartment that only had street spots. The wind Seth and I had felt earlier was fading, normal since Seattle was not a wind-prone city. The rain picked up in intensity, however, further darkening my mood. I was halfway home when I heard footsteps behind me. Pausing, I turned to look back but saw nothing save slick pavement, blearily reflecting streetlights. No one was there. I turned back around, starting to pick up my pace until I did a mental head slap and simply turned invisible. Jerome was right; I did think like a human too much. Still, I didn't like the street I'd chosen back; it was too deserted. I needed to cut over and walk the rest of the distance on Queen Anne Avenue itself. I had just turned the corner when something impacted me hard on my back, knocking me forward six feet, startling me so much that I shifted back to visible. I tried to turn around, flailing at my attacker, but another blow hit me in the head hard, knocking me to my knees. The sense I had was of being struck by something hand and arm shaped, but it packed a punch, more like a baseball bat. Again, my attacker hit me, this time across one of my shoulder blades, and I cried out, hoping someone would hear me. Another strike swiped the side of my head, the force pushing me over onto my back. I squinted up, trying to catch sight of who was doing this, but all I could dimly discern was a dark, amorphous shape, bearing down on me fast and hard as another blow made contact with my jaw. I could not get up from that onslaught, could not fight against the pain descending on me harder and thicker than the rain around me. Suddenly, brilliant light filled my vision – light so brilliant it hurt. I was not alone in my assessment. My attacker recoiled, letting me go, and I heard a strange high-pitched scream emitted above me. Attracted by some irresistible lure, I looked toward the light. A white-hot pain seared my brain as I did, my eyes taking in the figure moving toward us: beautiful and terrible, all colors and none, white light and darkness, winged and armed with a sword, features shifting and indiscernible. The next scream I heard was my own, the agony and ecstasy of what I had seen scorching my senses, even though I could no longer see it. My vision had gone white-whiter-whitest until all was black, and I could see nothing at all. Then, silence fell. I sat there sobbing, hurting physically and spiritually. Footsteps came, and I felt someone kneel beside me. Somehow, despite my blindness, I knew it was not my attacker. That person had long since fled. â€Å"Georgina?† a familiar voice asked me. â€Å"Carter,† I gasped out, throwing my arms around him.

Case Study – Bowel Cancer

Bowel Cancer The bowel is a long tube that is made up of the small bowel, colon and rectum. The bowel absorbs nutrients from food and also processes waste products into faeces to be removed from the body. Bowel Cancer is cancer of the rectum or colon. Bowel cancer develops from small raised growths called polyps which are found in the inner lining of the bowel. These polyps can either be non cancerous and harmless (benign) or they can be cancerous (malignant).All polyps should be removed to reduce the risk of these polyps becoming cancerous or spreading the disease further. Most polyps can be removed without surgery with a procedure called a colonoscopy. If these polyps are not removed, they can grow deeper into the bowel and spread into areas close to the area and later can spread to the liver or lungs. Causes Bowel cancer can be hereditary passed down from a before generation but mainly age and lifestyle factors also contribute to the development of bowel cancer.According to the Be tter Health Channel (BHC)(2011), There is some evidence that having a diet that consists of red meat and drinking alcohol can lead to the cause of bowel cancer. Bowel cancer is more common in people aged 50 years or older. In relation to â€Å"Lou† who is 75, eats red meat from the cattle from his farm and also drinks alcohol, his risk factors for bowel cancer was high. This inability to pass bowel movements showed that he had a very high chance of having bowel cancer. Symptoms * Blood or mucus in the faeces Weakness and paleness * Diarrhoea * Constipation * Finding your faeces are narrower than usual * Feeling that your bowel doesn’t empty completely Prevalence rates According to Bowel Cancer Australia (BCA)(2010), Bowel cancer is the responsible for the second biggest cancer related deaths after lung cancer with 14,234 people being diagnosed with bowel cancer each year and 4047 deaths occurring due to bowel cancer. The older you become the greater the risk of develop ing bowel cancer becomes with Cancer Council Australia CCA)(2011), quoting that 1 in 12 Australians develop bowel cancer before the age of 85. Bowel cancer is the most curable cancer and if detected and removed early, the cure rate is 90%, however in most cases; bowel cancer is detected in its later stage and therefore has a 60% cure rate. Table: Age vs Number of cases. Obtained from Australian Institute of Health and Wellfare (2006). Socio-Ecological Model Socio-Ecological Model (SEM) is a framework that recognises the relationship that is present between an individual and its surrounding environment.This model looks at not only at an individual reducing risk and improving health but also looks at the outer environment. These include the public policy, the community, organisations, interpersonal and the individual themselves. People who are diagnosed with bowel cancer can suffer from psychological problems due to the trauma of going through the procedures when diagnosing the cancer (such as colonoscopy) or from during the procedure where the doctor has to perform surgery on the patient.Mainly psychological affects will come from the fear of death and can lead them to withdraw themselves from friends and family leading to the sufferer not being socially active and not having that connection that is needed to get through the mental trauma that can be associated when dealing with bowel cancer. In this case the SEM can be implemented as for a patient that is suffering from psychological problems as they would need good interpersonal relationships (friends and family) and organisational involvement (social institutions) to be there to help the patient deal with their illness as best as possible.As in the case of â€Å"Lou† from the case study, he is moving 50 km away from his home, friends and family and therefore could lead him to feel that he can’t connect with anyone and lead to emotional and social consequences which include depression. Social Se rvices and Programs There are many support groups and services that are available to help a cancer patient when needed. If these are utilised, it can be beneficial in dealing with the emotional and social impacts that come with the disease.These include: * Homecare: This I when a social worker or nurse provides a cancer patient with their basic needs e. g. running errands, preparing meals, medication delivery and can have regular visits from physical therapists. This is a good asset as patients often feel more comfortable in their own home where they can be close to friends and family. This puts a great demand on other people like social workers, nurses and physical therapists to play a major role for home care to be achieved. This is also applied from the (SEM). Social workers: Can either be seen at home from home care or cancer patients can go see social workers. Social workers can offer counselling, counselling for the future, access to support groups and referrals to specialists . This Is good as it can help a cancer patient during and after they have cancer. * Cancer rehabilitation programs: The Cancer Nutrition Rehabilitation Program gives cancer patients information about diet, physical activity, treatment and other needs to successfully become rehabilitated.The social worker helps the patient obtain the needs necessary and give them general direction on how to become and maintain a healthy state after cancer. Conclusion Bowel cancer can be successfully treated and cured if early detection is made. This early detection will heighten the chances of survival then if it is found at a later stage. Regular checkups for people over 50 years of age are necessary to ensure that this early detection occurs. While an individual is responsible to obtain a healthy lifestyle, other factors need to be taken into account as outlined from the SEM.If individuals and the surrounding environment are linked together as one then becoming and staying healthy can be achieved. Reference List. 1. Polglase A (2010) Let's beat bowel cancer. Australian Pharmacist. Vol 29, issue 5, 414-416. Available from, http://ea3se7mz8x. search. serialssolutions. com/? ctx_ver=Z39. 88-2004;ctx_enc=info%3Aofi%2Fenc%3AUTF-8;rfr_id=info:sid/summon. serialssolutions. com;rft_val_fmt=info:ofi/fmt:kev:mtx:journal;rft. genre=article;rft. atitle=Let%27s+Beat+Bowel+Cancer;rft. jtitle=Australian+P

Thursday, August 29, 2019

OB3-LEADERSHIP Essay Example | Topics and Well Written Essays - 5000 words

OB3-LEADERSHIP - Essay Example Of course, you are welcome to write interpretations for more than five assessments if you wish. Out the 36 self-assessment exercises that I took, I find these five dimensions to be a close representative of my â€Å"self,† my leadership style and preference. These are emotional intelligence of which I scored 14, Measuring Locus Control of which I scored 37 (reversed scoring), Transformational Leadership of which I scored five on both dimensions (develop followers into leaders and inspire followers to go beyond their own self-interest), Communication openness of which I scored 9 and change leader of which I scored 9 Five Self -assessment Exercises a) Emotional Intelligence – I scored 14 on this Simply put, emotional intelligence is an ability to identify, assess, and control the emotions of oneself, of others, and of groups. Translating to an organization or a workplace, this will enable me to better relate to others. Initially, I thought that the ability to get along we ll with others is trivial and unimportant. Until I took the subject which made me realize that this a very potent leadership and management aptitude that should be harnessed and even a prerequisite to being a transformational leader. b) Measuring Locus Control – I scored 37 on this (reversed scoring) I scored well on this assessment which measures self-control. I appreciate the result for it validated my belief that I have the capacity to guard myself against intemperance which could undermine my integrity as a leader. I believe that this assessment is also connected to emotional intelligence, the ability to assess and control myself. c) Transformational Leadership – scored 5 on both dimensions which are to develop followers into leaders and inspire followers to go beyond their own self-interest. Perhaps I was biased when I took the assessment for this is the type of leadership that I would like to be. But I took the assessment honestly without looking at the answer ke y and I was glad to know that I scored five on both dimensions; which are to develop followers into leaders and inspire leaders to beyond their self-interest. I will endeavor that when my skill set as a leader will be fully developed, that I will evolve into this kind of leader in the future. d) Communication openness – I scored 9 on this. I scored a near perfect on this. Perhaps this is just a reinforcement of one of my obvious aptitude for emotional intelligence or ability to know myself and others and the ability to relate to others. Because to be able to get well with others, I have to be open to good communication first. I expected to score high on this. e) Change Leader – I scored 9 on this This too I expected to fare well because I tend to get well with others. As I can easily get through others, implementing change for me is almost effortless that my personality can easily get consensus even if I have to initially contradict the status quo. After taking the ass essment and reflected on the common ground on the dimensions that I scored well, I figured that it is my ability to know myself and others. I scored well on locus control, transformational leader, change leader and communication openness which has a requisite of intra and interpersonal skill and ability to get well with

Wednesday, August 28, 2019

Fonterra Ltd, a diary company in New Zealand Assignment

Fonterra Ltd, a diary company in New Zealand - Assignment Example The number of employees working for Fonterra is around 16800. The strategies adopted by the company are to make business in the emerging economies like China, Latin America and ASEAN; thus creating a strong presence. Optimizing the business of milk in New Zealand, protect the exports of milk exports in New Zealand by building integrated offshore milk pools, so that the higher value returns gets back to the country; focusing on creating quality product for its customers with special concern for mother and babies (Fonterra Ltd., 2011, pp.2-20). Computer fraud and abuse Accounting information system is a process by which the accounting of the company is done based on the Generally Accepted Accounting Principles (GAAP) by the use of the modern information technology. The Accounting Information System (AIS) of a company is composed of six main elements of the company, namely, people who will operate the system, procedure and instructions based on which the data is retrieved from different sources of the company, the related data which is very essential for the organization’s business practices, the required infrastructure for the information technology of the company so as to smoothly operate the system comprising of both the software and the hardware and lastly the internal controls so as to adopt security measures which will prevent the leakage of the sensitive data. Thus Fonterra can be exposed to the risk of fraud and abuse related to the theft of equipment, inventory or cash of the company. Even the fraud and abuse in the accounting information system of the company may result in false invoicing; payroll fraud arising out of the accounts made for directing the salary to a non-existing employee of the company; e-commerce frauds which have become very common now a days; for high level of outsourcing forgeries takes place on the ground of assets of the company being used for personal uses. If the employee of the company is not loyal then the risk of fraud a nd abuse of the company on the ground of accounting information system may lead to the disclosure of information and the intellectual property of Fonterra. Generally the fraud of a company usually occurs on the ground of poor internal control of the company. Thus Fonterra must take precautionary measures to tighten the internal control system of the company. If the items of the company is highly desirable the chances of forgery increases leading to fraud and abuse. Other reasons behind the occurrence of fraud and abuse of the company may arise from insufficient preventive measures and detection strategies having loop holes. The company should also know how to deal with the detection of the fraud; for example if a person is convicted of committing forgery in the company, just looking at the reputation of the company the concerned person is asked to resign. But in a situation like this civil or criminal action should be taken against the fraudster. Thus the fraud and abuse of the comp any generally arises from lack of strong internal control of the company. Since the AIS department is the heart and soul of the company, on the basis of which the company is able to carry out its operations. So, the personnel being appointed in the department of AIS should go through extensive interview process in order to appoint the most appropriate person for the concerned department. Fraud and abuse are ought to happen with the increase

Tuesday, August 27, 2019

Real Time flash flood forcasting Research Proposal

Real Time flash flood forcasting - Research Proposal Example Such a plan is aimed at raising the preparedness levels and making response activities by the local authorities’ and the general public more efficient especially during a flash flood3. Such plans integrate the use of technological variables of weather forecasting and GIS-based system for data management processing. This research is aimed at contributing to the development of integrating flash flood management plan in some flood prone areas. The most important things about planning for a flash flood is warning the general public and the response to the floods ensuring that loss of lives and property is minimal. Warnings about flash floods are transmitted by the meteorological departments and the hydrological services in various countries. In all flood management plans, organization and dissemination of information to warn the people is the most important thing4. The first element of a flashflood management strategy is finding out about all those who are at risk and whatever else is at risk. Risk is determined through assessing by establishing the hazards, the levels of exposure and the vulnerability of the people. The hazard entails the magnitude and the probability of occurrence of the flood5. This information can be given in form of maps which outline the borders of the areas at risk and their expected velocity6. Exposure on the other hand is the information of all those who are in danger as well as all what is in harms way. Vulnerability entails the expected losses which are looked at in terms of the geophysical, economic and the societal attributes of a given region. By establishing all the three elements enables those involved in the flood management to adopt the most effective strategies, be it to deal with engineering problems or dealing with the social challenges7. To establish the extent of the three elements, a risk analysis must be conducted. Metrological and hydrological data is essential in determining the hazard levels of an

Monday, August 26, 2019

Instructions Memo Coursework Example | Topics and Well Written Essays - 500 words

Instructions Memo - Coursework Example The images that were shown were the actual graphic tablets to be used in digital painting and diagrams that were shown were the actual image of photoshop. The vocabularies were also audience friendly because it explained the jargons in the instruction such as what the definition of Pan. The online instruction however is not consistent of showing what to do in the navigation drill portion. It only showed the drill but it fell short of showing the instruction as well as the illustration just like what it did in the previous portions. It is recommended that the online instruction should also include the illustration as well as the instruction just like in the first two sections. Giving a navigation drill without instruction and illustration is pointless because the audience would not know what to do. To change your color to blue, and draw a rectangle in the lower right quadrant, click on the color palette located on the tools bar. Choose the color blue or any color of your preference and draw the rectangle. Change your color to green and draw a squiggle connecting the two shapes. Repeat the same process of clicking the color palette this time however choose green and draw an image of squiggle between the two

Sunday, August 25, 2019

Beef Hormone Issue Essay Example | Topics and Well Written Essays - 2750 words

Beef Hormone Issue - Essay Example The use of synthetic hormones has been linked to the onset of early puberty along with a link to an increase in breast cancer cells in pubescent girls that lead to higher incidents of breast cancer masticizing. This paper will not only review the history of how synthetic hormones are required to be used in a safe manner according to FDA regulations, but also in discussing the US/EU debate issue in how this issue relays to the general public using bipartisan discussion. Since the European Union's ban on products containing beef hormones is not supported by scientific evidence, is detrimental to the United States cattle industry, and is detrimental to the over all economy of the United States, the United States is right in seeking an end to the ban. According to the USDA government website, this is an ongoing issue over the past fifteen years between the US and the EU (European Union). The disagreement itself is over the use of hormones in cattle came to a head in 1989 when the EU effectively banned any U.S. exports of beef to their country that have been treated with growth promotants. The U.S. has retaliated with scientific studies, evaluations (EU and CODEX conducted) have supported the U.S. position. The disagreement may have some merit with respect to independent testing of the effects that the synthetic hormones on a particular demographic community, mainly the increase in the onset of puberty in prepubescent girls along with an increase in the instances of breast cancer in females. The beef hormone issue is not specifically segregated to an increase in molecular alteration of cancer cells as described above, but, the increase in consumer awareness of the beef farmers using synthetic hormones with their cattle and the need to have labeling included stating the use of synthetic hormones. Hormones The hormones that are naturally occurring in every human are required for normal physiological functioning and maturation and three of these hormones in question, estradiol, progesterone and testosterone, are naturally occurring in all humans and food animals. The other three hormones, trenbolone acetate, zeranol and melengestrol acetate (MGA), have been made into a synthetic version in order to mimic the natural occurring hormone versions.1 Safety Records The FDA has conducted thorough research on the effects of growth hormones used on beef cattle since 1950 and had concluded there was no danger posed to human health and they concluded that there is "essentially no difference between beef from animals raised using hormones and those raised without their use." There is a world wide consensus is that these hormones when used according to approved veterinary practices are very safe and the USDA web site advises that this consensus is reflected in the 1984 and 1987 Lamming Committee reports-- the scientific expert group commissioned by the European Community; the 1987 Joint Expert Committee on Food Additives (JECFA) of the World Health Organization and the Food and Agriculture Organization of the United Nations; the Codex Committee on Residues of Veterinary Drugs in Food (CC/RVDF), the Codex

Saturday, August 24, 2019

Marketing research Essay Example | Topics and Well Written Essays - 2000 words

Marketing research - Essay Example Moreover on its growing popularity Skitka and Sargis (2006) stated that in 2003-2004 American Psychological Association Journals had at least one article published that used web based data collection. Web based survey gained popularity at accelerated pace. Lyons, Cude, Lawrence, and Gutter (2005) mentioned that web based surveys provide greater benefits as compare to traditional methods of paper –pencil or telephonic surveys. Most frequents benefits associated with online survey are efficacy, specific to time and money, huge data availability, less response bias etc while biggest demerits associated with this kind of survey are reliability and validity of the research (Vereecken, 2001). This ease of conducting survey is being witnessed in two domains; first, reduced cost as it is relatively less expensive and cheaper to get the required data through online survey. Second, the ease provided by the online survey, in getting one’s customers’ feedback has provided sm all companies an opportunity to conduct survey which was earlier confined with companies having large marketing and research budgets. Companies now use this option on constant on-going basis to keep customers intact with their websites; hence, it has become an important tool to keep bringing traffic to the websites that on one side brings in revenue from advertisers as well as constantly upgrades data-bank regarding changing customers’ thought patterns. On most prominent feature of the web based survey is characteristics of population it uses to get responses. At an instance, where internet based population provides access to virtual groups and communities this feature can also turn as disadvantage (Wright, 2005). With lack of control on environment it gets difficult to verify participants. For instance, verification of age, status etc is not possible. Similarly, one cannot verify if the participants are actually eligible for the response e.g. minors responding to surveys des igned for adults etc or people are participating frivolously or maliciously in a way that could undermine the integrity of the study (Garrick, 2009). RESEARCH PROBLEM: Web based survey has taken an extensive importance in business research as well as business enhancing tools. With the growing popularity of web based research there has arisen many problems with it more specifically with the main component of research .i.e. population (Litvin and Kar, 2001). For every product there is certain group of customers who do not participate in online surveys and hence, their liking, disliking or in general their opinions are left unattended. Therefore, there arises a problem to cater the suggestions of that particular group of people (Yun and Trumbo, 2000). Hence, the research problem this study is aimed to address is finding if any difference exist in response of people in online surveys and other surveying techniques. Internet usage has grown in multiples in past years and the pace is stil l growing, however there is still certain percentage of population that do not use internet. The objective of this research is to explore the fact that how much similarity exists in the responses of customers through online surveys and through other survey techniques. This study will explore an entirely new domain for researchers as well as businesses. Similarity in results would benefit the research organizations to divert their resources (expertise) more towards web based resources. On contrary to this, if

Friday, August 23, 2019

Global pattern of earthquakes and seismic energy distributions Term Paper

Global pattern of earthquakes and seismic energy distributions - Term Paper Example Most of these papers have offered the evidence that chances are particularly limited for the seismicity to exist beyond 65 degrees towards the North. Additionally, the studies have pointed out that evidence is limited that the distribution of the released energy is limited to the zones, where maximum is considered to be the equator and other areas lying beyond 45 degrees north. The crucial question is whether these points hold relevance for events with magnitudes supposing magnitude 7. Importance of this study Since time immemorial, earthquakes have been ranked among the world’s most recurrent and devastating tragedies. Regions that have been most susceptible include the Asian countries, (especially China and Japan), the Caribbean, South America and Middle East. The recent events have seen other nations such as Turkey and Chile also ranked as countries prone to earthquakes. Even so, there are various insights that have been attached to catastrophes such as earthquakes. For ins tance, the severity of 2011 Japan quake can best be approached basing on the Steinberg’s insights on disasters. Steinberg (2000) focuses on how human economic and social forces turn natural events into calamities. Steinberg comes up with a compilation of a series of events that support his insights. According to him, events that culminate disasters are as a result of human decisions, such encouraging development on flood plains or in earth-quake ravaged zones, as well as attempts to divert river channels by using dams and dykes. Steinberg argues that responses to natural calamities do not work out effectively. They instead increase destruction and death, as well as social injustices. Stein erg elucidates how response teams eventual turn out to attribute the disaster events as the acts of God, when some people are to take the blame. Steinberg attributes the significant number of casualties in disasters to human decisions to desire economic growth, as well as decisions to provi de cheap housing in the disaster zones. Governments are concerned about the plight of property developers than those who would rent the property. Steinberg draws example from Earthquake that struck San Francisco in 1906. Government did not want to give impression of possible recurrence of the earthquake for fear that it would discourage the investments within the city. Moreover, the State did not want to fund scientific research and examination of the situations. Steinberg cited various recurrent catastrophes in United States, elucidating that the causes for the natural disasters, as well as their severity, were instigated by the human social, political and economic forces. Even pertinent give that globalization is deeply rooted, an impact of the earthquake in one areas has also an impact on other areas and this comes directly or indirectly. It requires contingency measures. Of course, contingency measures may only be effective once the dynamics of the Global pattern of earthquakes and seismic energy distributions are well know; hence, the importance of the subject. It also functions to demystify some of the notions attached to the seismicity. Focus of the Paper A typical approach to analysis of earthquake events is that which incorporates seismic energy, abbreviated as E, the number of earthquake events (N) on the earth surface along the radius, as derived

Thursday, August 22, 2019

Strategy management questions Essay Example | Topics and Well Written Essays - 1750 words

Strategy management questions - Essay Example Innovations are largely due to hard work and systematic analysis of the opportunities available for creating something new. Innovation has strong marketing components. The best of ideas do not sell themselves. They need to get a buy in from the people involved. New networks have to be built. According to Sutton (2002) "Too many innovations succeed because they are sold better, not because they are objectively superior to those of competitors". Peter Drucker (1985, 1988) puts unexpected success and failures as managers' dilemma. When a product succeeds or fails unexpectedly, there is potential for innovation. The unexpected success is an affront to the management's judgment. Very few managers pay attention to the unexpected success. It should force managers to ask; what would it mean to us if we exploited it Where could it lead us What would we have to do to concert it into an opportunity How do we go about it What basic changes are now appropriate for the organization in the way it d efines its business, its technology and its market If these dilemmas are answered, then the unexpected success is likely to open up various innovation opportunities. Unexpected failures also create opportunities to innovate. But they are usually handled better. Any change likely to offer an opportunity for innovations. Managers often do not make adequate efforts to understand why there is a discrepancy between what is and what 'Ought' to be or between what is and what everyone assumes it to be. But they realize that these discrepancies present an opportunity to innovate. As Christensen and Raynor (2003) points out, companies who understand what job the customer is trying to get done and how the products or services fits in, will have an opportunity to innovate. In the era of global unification, the emergence of new knowledge and technology also increases the dilemma of managers knowledge based innovation is very risky because of the long lead times involved. Knowledge based innovati ons are usually not based on one factor but on the convergence of several kinds of knowledge. Knowledge based requires a careful analysis of all the relevant factors, social, economic and perceptual. To be successful, a knowledge based innovation has to be ripe. It must gain customer acceptance. The risks are not because highest in innovations based in new knowledge and technology not because of failure but perception of the public. But innovations are essential to any organization be its' product or services to meet its market its market needs. So companies must modify the traditional innovation process, companies need a flexible product development process. Top management must keep goals broad and tolerate ambiguity. It must encourage trial and error and at the same time generate creative tension by setting challenging goals. Knowing customers priority and needs is essential for successful innovation. According to Drucker (1985, 1988), nothing motivates a manager to be a better in novator than the realization that the present product or services will be abandoned within the foreseeable future. There is only one way to make an innovation attractive to managers: a systematic policy of abandoning whatever is outwork, obsolete and no longer productive. Innovation performance must be regularly assessed. Management must judge the company's total innovative performance against its innovation objectives. 2. Business strategies are the courses of action adopted by a

Types of Cooperatives Essay Example for Free

Types of Cooperatives Essay The following are the main types of cooperative enterprises: i.Producer Cooperative Societies These are formed to eliminate the middlemen and capitalist groups from the  industrial production. Its main purpose is to produce goods for the requirements of its members. Surplus productions are also supplied to out riders in the open market at profit. All the necessary activities .as production, management and marketing are performed by the members themselves. Its members get dividend on the basis of the capital invested by them. Objects (a)To purchase the raw materials and other factors at most economical prices. (b)To produce the goods at the most economical level. (c)To supervise the production most efficiently and effectively. (d)To dispose of the surplus production to non members at maximum prices. (e)To eliminate the middlemen and capitalists. (f)To remove the workers grievances in respect of working conditions, wages etc. (g)To arrange for the democratic control of the industrial unit. ii.Consumer Cooperative Societies The society is the voluntary association of ordinary people formed with the object of obtaining daily requirements of the members. It directly purchases the goods at large scale from the producer or wholesalers at whole sale price. It thus eliminates capitalists, retailers and other middlemen from the channel of distribution and members are in a position to make their purchase at cheater rate. Anyone can become member by purchasing one share of the society. Sometimes goods are also supplied to non-members but they do not share in the profit of the society. Profit earned by the store are distributed among the members according to the value of the purchases conducted by the manager who is elected by the members. Generally its two types are popular in the world. (a)Retail cooperative store. (b)Wholesale cooperative store. Objects 1.To eliminate the retailers, capitalists and wholesalers. 2.To promote the welfare of the members. 3.To supply the daily necessities of life to its members at market price. 4.To increase the purchasing power an standard of living of the members of the society. iii.Marketing Cooperative Society It is the voluntary association of producers formed for the object of arranging the disposal of their output. It pools together the output of the individual members and arranges to supply the product at highest possible price. The profit of the sale of the ~ products is distributed among the contributing producers according to their individual contribution to the pool. This kind of society is particularly useful for the small producers and agriculturists. It can be formed in two organization according to the local condition of the country i.e. (a)Single purpose society (b)Multi purposes society Objectives 1.To eliminate the middlemen who are liable of the high cost of marketing. 2.To pool together the output of the individual members. 3.To grade and process of the pooling products of the members. 4.To dispose of the product at the maximum price. 5.To adjust supply to demand. 6.To provide storage facilities to its members. 7.To procure the information relating to market for the members product. 8.To provide the financial facilities to its members. iv. Insurance Cooperative Society This type of cooperative society is formed for the objects of providing group insurance facilities to its members. It makes the contract with sound insurance company on collective terms and conditions and thus pay lower premium rate to insurance company as compared with ordinary policy holders. These are other two forms of cooperative Insurance i.e. 1.Mutual office 2.Self concern. In the Mutual office, the policy holders are the owners and the profit of the insurance company is utilized in the following ways: (a)To strengthen the financial position of the company. (b)To decrease true amount of premium. (c)To distribute bonus to its members. Self concern Cooperative society is organized to provide insurance facilities like the private insurance company and issued policy to its members for reasonable amount. Object 1.To provide insurance facilities to its members. 2.To charge the low rate of premium. 3.To promote the welfare of the members. 4.To encourage the habit of thrift and investment. v.Housing Cooperative society It is an association of middle and low income groups of people. Generally it is formed in urban areas. The main purpose of this form of society is to protect its members against exploitation by landlords. It not only grants financial assistance to its members but also achieve the economics of purchase of building material in bulk. In order to become a member of the society one must buy at least one share of the society. The liability of the member is limited to his capital contributed. It is also called Building Society and may be divided into three types i.e. (1)Housing Building Society (2)Land Society (3)Finance Society Objectives 1.To receive deposits from its members. 2.To make loans to its members for the construction of house at low rate of interest. 3.To render technical services for its members. 4.To purchase building materials at economical rate. 5.To perform the welfare activities as water supply, roads, sewerage, electricity etc. vi. Cooperative Farming Society This form of Society is formed with the object of obtaining the benefits of large scale farming and maximizing agricultural products. It is basically agricultural. cooperative which is confined to agricultural countries. Its members generally relate to the formers including those owing land. The cooperative forming are of the following types: 1.Cooperative collective farming Society. 2.Cooperative joint farming society. 3.Cooperative better farming society. 4.Cooperative tenant farming society. Objective (a)To consolidate holding. (b)To introduce new technique of cultivation. (c)To improve the irrigating system. (d)To increase the area under agricultural operations. (e)To make necessary steps for the improvements of the standard of living of the farmers. (f)To increase the production per acre. (g)To provide seeds manures and implements to its members. (h)To dispose of agricultural output. vii. Credit Cooperative Society Credit cooperative society is the voluntary association of .the financially weak persons organized with the object of providing short term financial requirements to them. This society performs important role in the rural areas where the dishonest money lenders have been exploiting simple villagers by charging high rate of interest. The Funds of the society consist of (a) Membership fees, (b) Dispose of shares (c) Deposits from members and non-members (d) Loan from govt. and semi govt. The liability of members is unlimited. This assists the society in raising funds and ensures that every member will take keen interest in the activities of the society. The society prefers the poorer members in granting loan and charges low rate of interest from them. Generally the society advances the amount for productive purposes but some loans are also given to members for unproductive purposes. Credit cooperative society may be divided into two types: (1)Agricultural Credit Society (2)Non-agricultural credit Society Objects (a)To get rid of the pressure of money lenders. (b)To provide the financial facilities for short term to its members. (c)To keep the minimum rate of interest on loan. (d)To develop the habit of thrift and saving among the members. (f)To encourage the habit of mutual aid.

Wednesday, August 21, 2019

Effects of Foreign Direct Investment

Effects of Foreign Direct Investment The removal of cross-border restrictions on international capital flows and the trend toward an integrated world economy has been a substantial progress over recent two decades. Hence, it has increased the growth of foreign direct investment(FDI) activity. Madura and Fox (2007) define foreign direct investment (FDI) as the investment in real assets (such as land, buildings, or even existing plants) in foreign countries. They also find that multinational corporations(MNCs) commonly capitalize on foreign business opportunities by engaging in FDI. They engage in joint ventures with foreign firms, acquire foreign firms, and form new foreign subsidiaries. These types of FDI can generate high returns when managed properly. A substantial investment is required, and thus can increase the risk at capital. It may be difficult for multinational corporation to sell the foreign project when the investment does not perform well as expected. In order to maximize the corporations value, it is significant for MNCs to understand the potential return and risk of FDI and analyze the potential benefits and costs before making investment decisions. 2.1.2 Motives for FDI The reason why firms locate production oversea rather than exporting from the home country or licensing production in the hose country, and the reason why firms seek to extend corporate control oversea by forming multinational corporations have been developed by many scholars. Kindleberger(1969) and Hymer(1976), emphasize various market imperfections in product, factor, and capital markets as the key motivating forces to accelerate FDI. Eun and Resnick (2004) explore some key factors that are important for corporations making decisions to invest oversea. These factors include trade barriers, imperfect labor market, intangible assets, vertical integration, product life cycle and shareholder diversification services. Dunning (1993) interpret four different types of motives for foreign direct investment: resource seeking, market seeking, efficiency seeking, and strategic asset (or capability )seeking. The first motive means that MNCs acquire some particular resources which may mainly cnsist of primary products at a lower cost in the host country than at home. The second motive depends on the expectation of new sales opportunities from the opening of markets where MNCs had no access at before. The third one refers to utilizing the specific comparative advantages of a host economy. The last one is related with long-term strategic considerations such as gaining an significant stake in the market in the long run. To be more specific, Madura and Fox (2007) indicate that MNCs engage in foreign direct investment widely because it can improve profitability and enhance shareholder wealth. In most cases, MNCs utilize FDI to boost revenues, reduce costs, or both. Revenue-related motives include attract new source of demand, enter profitable markets, exploit monopolistic advantages, react to trade restrictions and diversify internationally. Cost-related motives involve fully benefit from economies of scale, use foreign factors, use foreign raw materials, use foreign technology and react to exchange rate movements. 2.1.3 Benefits of FDI It seems unwise to conclude that both forms of geographic diversification are likely to be equally profitable or unprofitable. Errunza and Senbet (1981, 1984) find evidence to support a positive relation between excess firm value and the firms extent of international diversity by using multinational firms only. Focusing on international acquisitions, Doukas and Travlos (1988) and Doukas (1995) document that US bidders gain from industrial and international diversification. Similarly, Morck and Yeung (1991, 2001) find a positive relation between international diversification and firm value. However, they show that industrial diversification and international diversification add or destroy value in the presence or absence of intangible assets. Their findings support the view that the synergistic benefits of international diversification stem from the information-based assets of the firm. Christophe and Pfeiffer (1998) and Click and Harrison (2000) find that multinational firms trade at a discount relative to domestic firms. More recently Denis, Denis and Yost (2002), using the Berger and Ofek (1995) excess value measure and aggregate data, show that global diversification reduces shareholder value by 18%, whereas industrial diversification results in 20% shareholder loss. In contrast, Bodnar, Tang and Weintrop (1999), relying on a similar valuation measure, find share-holder value to increase with global diversification. Doukas and Lang (2003) take firms which made foreign new plant announcements during the period 1980 1992 as a sample, regardless of the industrial structure of the firm, they interpret that unrelated foreign direct investments are associated with negative announcement effects and long-term performance decreases in subsequent years, whereas related investments are associated with positive short-term and long-term performance. Although their findings indicate that both specialized and diversified firms benefit from core-business-related rather than non-core-business-related foreign direct investments, the gains are larger for diversified firms. They conclude that geographic expansion of the firms core business itself is beneficial to shareholder value. In contrast, they find that geographic expansion of the firms peripheral (non-core) business harms firm value and performance. Hence the evidence indicates that the internalization theory is more consistent with the international expans ion of the core rather than the non-core business of the firm. That is, the positive synergies from global diversification are rooted in the firms core competencies. Theories of foreign direct investment (FDI) agree on at least one major point: foreign firms mush have inherent advantages that allow them to overcome the higher costs of becoming a multinational (Hymer, 1976) These advantages may be tangible, such as an improved production process or a product innovation. They also may be intangible, such as brand names, better management structures or the technical knowledge of employees. Girma, Greenaway and Wakelin (2001) conclude that foreign firms do have higher productivity than domestic firms and they pay higher wages in the UK after their investigation. They do not find aggregate evidence of intra-industry spillovers. However, firms with low productivity relate to the sector average, in low-skill low foreign competition sectors gain less from foreign firms. FDI brings two main benefits to the host country. First, it introduces new production facilities into the domestic economy directly, or may rescue failing firms in the case of acquisition, raising overall output, employment and exports. Second, domestic governments hope that foreign firms will be unable to internalise their advantages fully, and local firms can benefit through spillover. 2.1.4 Effects of FDI Borensztein, Gregorio and Lee (1998) test the effect of foreign direct investment (FDI) on economic growth in a cross-country regression framework by utilizing data on FDI flows from industrial countries to 69 developing countries over the last two decades. The results suggest that FDI is significant for transfer technology, and contribute more to growth than domestic investment. Moreover, they find that the contribution of FDI to economic growth is improved by its interaction with the level of human capital in the host country. However, the empirical results imply that FDI is more productive than domestic investment only when the host country has a minimum threshold stock of human capital. Thus, FDI contributes to economic growth only when a sufficient absorptive capability of the advanced technologies is available in the host economy. Investigating the effect of FDI on domestic investment, they find that the inflow of foreign capital à ¢Ã¢â€š ¬Ã‹Å"crowds in domestic investment rather than à ¢Ã¢â€š ¬Ã‹Å"crowds out. FDI support the expansion of domestic firms by complementarity in production or by increasing productivity through the spillover of advanced technology. A one-dollar increase in the net inflow of FDI is associated with an increase in total investment in the host economy of more than one dollar, but do not appear to be very robust. Thus, it appears that the main channel through which FDI contributes to economic growth is by stimulating technological progress, rather than by increasing total capital accumulation in the host economy. Markusen and Venables (1999) develops an analytical framework to assess the effects how an FDI project affect local firms in the same industry. There are two forces for the effect of entry of a multinational firm on the domestic industry. One is a competition effect, under which multinationals displace domestic final-goods producers, and the other is a linkage effect back to intermediate-goods producers, creating complementarities which could benefit domestic final-goods producers. They explore the determinants of the relative strengths of these effects. In circumstances of initial equilibrium with no local production, multinational entry can push the economy over to an equilibrium with local production in both the intermediate and final-goods industries, with a resulting welfare improvement. They then pay attention to endogenise the entry decision of multinational firms. It may now also be the case that multinationals provide the initial impetus for industrialisation, but the developed local industry creates sufficiently intense competition to eventually drive the multinationals out of the market. Hobday (1995) finds initial multinational investments in developing East Asia created backward linkage effects to local suppliers in a large number of situations. There are some examples such as computer keyboards, personal computers, sewing machines, athletic shoes, and bicycles in Taiwan. 2.2 Cost of capital and capital structure Many major firms through the world have begun to internationalize their capital structure by raising funds from foreign as well as domestic sources. As a result, these corporations become multinational not only in the scope of their business activities but also in their capital structure. This trend reflects not only a conscious effort on the part of firms to lower the cost of capital by international sourcing of funds but also the ongoing liberalization and deregulation of international financial markets. If international financial markets were completely integrated, it would not matter whether firms raised capital from domestic or foreign sources because the cost of capital would be equalized across countries. On the other hand, some markets are less than fully integrated, firms may be able to create value for their shareholders by issuing securities in foreign as well as domestic markets. Cross-listing of a firms shares on foreign stock exchanges is one way a firm operating in a segmented capital market can lessen the negative effects of segmentation and also internationalize the firms capital structure. For example, IBM, Sony, and British Petroleum are simultaneously listed and traded on the New York, London, and Tokyo stock exchanges. By internationalizing its corporate ownership structure, a firm can generally increase its shares price and lower its cost of capital. 2.2.1 Definition of cost of capital Eun and Resnick define the cost of capital as the minimum rate of return an investment project must generate in order to pay its financing costs. If the return on an investment project is equal to the cost of capital, under taking the project will leave the firms value unaffected. When a firm identifies and undertakes an investment project that generate a return exceeding its cost of capital, the firms value will increase. It is significant for a value-maximizing firm to try to lower its cost of capital. Madura and Fox (2007) explain that a firms weighted average cost of capital (referred to as Kc ) can be measured as: Kc = [D/(D+E )] * Kd * ( 1-t ) + [E / (D+E)] * Ke Where: D = market value of firms debt Kd = the before-tax cost of its debt t = the corporate tax rate E = the firms equity at market value Ke = the cost of financing with equity The ratios reflect the percentage of capital represented by debt and equity, respectively. In total the cost f capital, Kc is the average cost of all providers of finance to the firms. A multinational company finances its operations by using a mixture of fixed interest borrowing and equity financing that can minimize the overall cost of capital (the weighted average of its interest rate and dividend payment). By minimizing the cost of capital used to finance a given size and risk of operations ,financial managers can maximize the value of the company and therefore maximize shareholder wealth. According to the different size of firm, international diversification, exposure to exchange rate risk, access to international capital markets and exposure to country risk, the cost of capital for MNCs may different from that for domestic firms. 2.2.2 Costs of capital across countries Madura and Fox (2007) interpret that the reason why cost of capital is different among countries is relevant for three reasons. First, MNCs based in some countries may have more competitive advantages than others not only for the different technology and resources across countries, but also the cost of capital. MNCs in some countries will have a larger set of feasible projects with positive net present value because of the lower cost of capital, hence these MNCs can increase their world market share more easily. MNCs operating in countries with a higher cost of capital will be forced to decline projects. Second, MNCs may be able to adjust their international operations and sources of funds to capitalize on differences in the cost of capital among countries. Third, the different component as debt and equity in the cost capital can explain why MNCs based in some countries tend to use a more debt-intensive capital structure than others. To estimate an overall cost of capital for an MNCs, it needs to combine the costs of debt and equity, and weight the relative proportions of debt and equity. The cost of debt to a firm is primarily determined by the risk-free interest rate in the currency borrowed and the risk premium required by creditors. Risk-free interest rate is determined by the interaction of the supply and demand for funds. Factors include tax laws, demographics, monetary policies and economic conditions can influence the supply and demand then affect the risk-free rate. The risk premium on debt can vary among countries because of the different economic conditions, relations between corporations and creditors, government intervention, and degree of financial leverage. In addition, a firms cost of equity represents an opportunity cost what shareholders could earn on investments with similar risk if the equity funds were distributed to them. This return on equity can be measured as a risk-free interest rate th at could have been earned by shareholders, plus a premium to reflect the risk of the firm. According to the different economic environments, the risk premium and the cost of equity will vary among countries. 2.2.3 MNCs capital structure decision Madura and Fox.(2007) indicate that an MNCs capital structure decision includes the choice of debt versus equity financing within all of its subsidiaries, hence the overall capital structure is combined of all subsidiaries capital structures. The advantages of using debtor equity vary according to the corporate characteristics specific to each MNC and specific to countries where the MNCs establish subsidiaries. They interpret some specific corporate characteristics which can influence MNCs capital structure. MNCs with more stable cash flows can deal with more debt because their cash flows are constant to cover periodic interest payments. In contrast, MNCs with erratic cash flows might prefer less debt. MNCs with lower credit risk have more access to credit, their choice of using debt or equity can be affected by factors which influence credit risk. MNCs with high profit may be able to finance most of investment with retaining earnings and use an equity-intensive capital structure, while others with small level of retained earnings may prefer on debt financing. The subsidiaries borrowing capacity may be increase and need less equity financing once the parent backs the debt. Agency costs are higher when a subsidiary in foreign country can not be monitored easily be investor from parents country. In addition, they also describe the specific country characteristics unique to each host country can influence MNCs choice of debt versus equity financing and thus influence their capital structure. Firstly, some host countries have stock restrictions which means the governments allow investment only in local stocks. This kind of barrier of cross-border investing, potential adverse exchange rate and tax effects can discourage investment outside home countries. MNCs operated in these countries where investor have fewer stock investment opportunities may be able to raise equity at a relatively low cost, and they would prefer using more equity by issuing stocks. Secondly, according to the government-imposed barriers on capital flows along with potential adverse exchange rate, tax and country risk effects, loanable funds do not always flows th where they are needed most and the price of them can vary across different countries. MNCs may be able to obtain loanable funds at lower cost in s ome countries and they will prefer the debt financing. Thirdly, regard of the potential weakness of the currencies in subsidiaries host countries, an MNC may attempt to finance by borrowing currencies instead of relying on parent funds. Subsidiaries may remit a smaller amount in earning because they can make interest payments on local debt, and thus reduce the exposure to exchange rate. Conversely, subsidiaries may retain and reinvest more of its earnings when the parent believes a subsidiaries local currency will appreciate against its own currency. The parent may provide an cash infusion to finance growth in the subsidiaries, and thus transfer the internal funds from the parent to subsidiary possibly resulting in more external financing by the parent and less debt financing by the subsidiary. Fourthly, possibility of a kind of country risk is that the host country will temporarily block funds to be remitted by subsidiary to the parent. Thus aubsidiraies may prefer to local debt fi nancing. At last, MNCs make interest rate payments on the local debt when they are subject to a withholding tax. Foreign subsidiaries may also use local debt if the host country impose high corporate tax rates on foreign earnings. Bancel and Mittoo (2004) survey on the cross-country comparisons of managerial views on determinants of capital structure in a sample of 16 European countries: Austria, Belgium, Greece, Denmark, Finland, Ireland, Italy, France, Germany, Netherlands, Norway, Portugal, Spain, Switzerland, Sweden, and the UK. They show that factors related to debt are influenced more, and those related to equity are influenced less, by the countrys institutional structure, especially the quality of its legal system. They find that financial flexibility and earnings per share dilution are primary concerns of managers in issuing debt and common stock, respectively. Managers also value hedging considerations and use windows of opportunity when raising capital. This evidence strengthens arguments of La Porta et al. (1997, 1998) that the availability of external financing in a country is influenced primarily by its legal environment. Since agency costs of debt are likely to be higher in countries with lower quality of legal systems, this evidence is also consistent with theories of capital structure such as agency theory that assign a central role to debt contracts and bankruptcy law (Harris and Raviv, 1991). They find that although a countrys legal environment is an important determinant of debt policy, but it plays a minimal role in common stock policy. They find that firms financing policies are influenced by both their institutional environment and their international operations. They also show that firms can adopt strategies to mitigate the negative effects of the quality of the legal environment in their home country. For instance, firms in civil-law countries have significantly higher concerns for maintaining target debt-to-equity ratios and matching maturity than do their peers in the common-law countries. Further, they find that firms operating internationally have significantly different views than do their peers in several ways. For example, firms that have issued foreign debt or equity in the sample during the last ten years are more concerned about credit ratings. Firm-specific variables that are commonly used in the capital structure literature to explain leverage also expla in cross-country differences in managerial rankings of several factors. For example, large firms are less concerned about bankruptcy costs, and high growth firms consider common stock as the cheapest source of funds and use windows of opportunity to issue common stock. These results support the arguement by Rajan and Zingales (1995, 2003), that firms capital structures are the result of a complex interaction of several institutional features as well as firm characteristics in the home country. Their results support that most firms determine their optimal capital structure by trading off factors such as tax advantage of debt, bankruptcy costs, agency costs, and accessibility to external financing. They confirm the conclusions of Titman (2002): Corporate treasurers do occasionally think about the kind of trade-offs between tax savings and financial distress costs that we teach in our corporate finance classes. However, since this trade-off does not change much over time, the balancing of the costs and benefits of debt financing that they emphasize much is not MNCs major concern. They spend much more time thinking about changes in market conditions and the implications of these changes on how firms should be financed. Lee and Kwok (1988) examine the impact of international environmental factors on some firm-related capital structure determinants which in turn affect the MNCs overall capital structure. They consider international environmental variables of political risk, international market imperfections, complexity of operations, opportunities for international diversification, foreign exchange risk and local factors of host countries, and test agency costs and bankruptcy costs. They find that MNCs tend to have higher agency costs of debt according to Myers definition than DCs. This finding remained unchanged even when size and industry effects were controlled. Though MNCs appeared to have lower bankruptcy costs than DCs, the difference largely disappeared when the size effect was controlled. Quite contrary to the conventional wisdom, the empirical findings showed that MNCs tended to be less leveraged than DCs. This finding remained even when the size effect was controlled. However, when compani es were separated under different industry groups, the results varied significantly. Burgman (1996) directly estimate the effect of foreign exchange risk and political risk on the capital structure of MNCs. Using the foreign tax ratio to classify firms as either MNCs or DCs and controlling for industry and size effects, Burgman finds that MNCs have lower debt ratios and higher agency costs than DCs. Furthermore, international diversification does not appear to lower earnings volatility. To estimate the sensitivity of a firm to foreign exchange risk, Burgman conducts a regression analysis of the stock returns of each sample firm on the returns of an index of U.S. stocks and on the U.S.$:SDR returns. His political risk measure is based on the following ratio: number of low political risk countries to the total number of countries in which the firm operates. Low political risk countries are the top 20 in the country risk rankings provided by Euromoney in 1989. The results of a regression analysis for his sample of MNCs suggest that the debt ratios of these companies are positively related to both risks. Burgman concludes that this evidence is consistent with the hypothesis that MNCs use debt policy as a tool to hedge foreign exchange risk and political risk. Chen et al. (1997) conducted regression analyses to investigate the effect of international activities (as measured by foreign pre-tax income) on capital structure. They report that even after controlling for firm size, agency costs of debt, bankruptcy costs and profitability, the long-term debt ratios of MNCs are lower than those of DCs. However, within their sample of MNCs, debt ratios increase with the level of international activities. 2.2.4 Segmented capital market A capital market for asset claims is integrated when the opportunity set of investments available to each and every investor is the universe of all possible asset claims. In contrast, a capital market is segmented when certain groups of investors limit their investments to a subset of the universe of all possible asset claims. Such market segmentation can occur because of ignorance about the universe of possible asset claims, or because of transactions costs (brokerage costs, taxes, or information acquisition costs), or because of legal impediments. From an international perspective, market segmentation typically occurs along national borders, a condition wherein investors in each country acquire only domestic asset claims. Grubel, Levy and Sarnat, and Lessard employ a mean-variance portfolio theoretic framework, have stressed the benefits of diversifying investments across national borders, namely the pooling of risks that results from investing in projects that are less than perfectly correlated. Subrahmanyam points out that when segmented capital markets are integrated, in addition to the diversification effect (always positive), there is a wealth effect (possibly negative) which arises out of changes in the macro-parameters of the risk-return relationship. For the special cases of quadratic, exponential, and logarithmic utility functions, it can be shown that international capital market integration is Pareto-optimal, that is, the welfare of individuals in the integrated economies will not decline, and will generally improve. The positive effect of an expansion in the opportunity set offsets any negative wealth effect. The market reformed and liberalized in developed economies in the 1970s and emerging economies during the second half of the 1980s led to the removal of many barriers. The deregulation and the development of local equity markets allowed the possibility of foreign portfolio investments (FPIs). Overall, FPIs would provide a new source of capital and internationalize the domestic capital markets. Subsequent improvements in risk sharing and risk matching would cause the cost of capital to fall. Errunza and Miller (2000 ) use a sample of 126 firms from 32 countries, document a significant decline of 42% in the cost of capital. In addition, they show the decline is driven by the ability of U.S. investors to span the foreign security prior to cross-listing. The findings support the hypothesis that financial market liberalizations have significant economic benefits. 2.2.5 Interaction between subsidiary and parent financing decisions In segmented markets the parent and its subsidiaries will generally have different valuation objectives and investment-acceptance criteria. Under some conditions these depend on the international financing mix. Decentralization can be optimal in the sense of global maximization, provided that the parent is unrealistically free, ex-ante, to optimize its percentage ownership in the subsidiaries at the beginning of each planning period. In the case of a two-country firm, the subsidiaries maximands are independent of the parents. But when the parents ownership position is predetermined at a fixed level, as it is normally, the situation is radically different. Market values cannot then be maximized independently and Pareto optimization is required. Michaels (1974) main result is that, unless agreement can be reached on a compensation principle, the joint ventures cost of capital will be indeterminate. In such circumstances optimal financial planning for the MNC as a whole may be impossibl e. Concluding remarks draw attention to the attendant possibility that the MNC in this case may be unstable and/or inefficient. 2.2.6 The MNCs capital structure decision An MNCs capital structure decision involves the choice of debt versus equity financing within all of its subsidiaries. Thus, its overall capital structure is essentially a combination of all of its subsidiaries capital structures. MNCs recognize the tradeoff between using debt and using equity for financing their operations. The advantages of using debt as opposed to equity vary with corporate characteristics specific to each MNC and specific to the countries where the MNC has established subsidiaries. Madera and Fox (2007) indicate some common firm-specific characteristics that affect the Macs capital structure such as stability of Macs cash flows, Macs credit risk, Macs access to retained earnings, Macs guarantees on debt and Macs agency problems. They also point the unique host country characteristics can influence the MNCs choice of debt versus equity financing and therefore influence the MNCs capital structure. These characteristics include stock restrictions in host countries, interest rates in hose countries, strength of host country currencies, country risk in host countries and tax laws in host countries. 2.3 Risk analysis 2.3.1 Country risks With operations under the jurisdiction of a foreign government the firm is also exposed to political risk, therefore it must estimate the potential costs it will face due to unstable governments, regime change and changes in policies. Political risk may be defined as a particular exposure to risk which depends on the actions of a government, and its assessment or analysis for a MNC is a decision-making tool for investing in foreign countries. An MNC must assess country risk not only in countries where it currently does business but also in those where it expects to export or establish subsidiaries. Many country risk characteristics related to the political environment can influence an MNC. Madura and Fox (2007) indicate that an extreme form of political risk is the possibility that the host country will take over a subsidiary. In some cases of expropriation, some compensation is awarded, and the amount is decided by the hose country government. In other cases, the assets are confiscated and no compensation is provided. Expropriation can take place peacefully or by force. They also explore other common forms of country related risks include attitude of consumers in the host country, actions of host government, blockage of fund transfers, currency inconvertibility, war, bureaucracy and corruption. Over recent decades, there has been a significant increase in political risk for MNCs. This is true not only for an MNCs operations in developing countries, but also for those in developed countries. Governments have felt the need to respond to various pressure groups aimed at curbing the power of MNCs. For example, oil companies may face unfavourable legislation designed to pay for the damage to environment. Developing countries may have to respond to populist sentiments or worsening economic circumstances by seeking to renege on contracts signed by previous regimes. Another risk area which has grown in recent years has been the strength of fundamentalist religious groups in a number of eco

Tuesday, August 20, 2019

Simple Network Management Protocol (SNMP) for MIB

Simple Network Management Protocol (SNMP) for MIB SNMP Abstract: SNMP or Simple Network Management Protocol (SNMP) is an application layer protocol that provides the exchange of management information between network devices. SNMP is a part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Through this research the emergency of network management will be managed for fire alarm, power off. Managing devices such as computers is vital and tracking for its safe and emergency issues will assist in many aspects such as identifying location, solving communication issues etc. In this research we will propose a SMNP based solution for effectively managing computer devices. In this research we will propose a MIB [Management Information Base] using ASN1.0 specification and also proposing a prototype on the implementation. Then based on our proposed prpotype we will evaluate. ASN for the proposed MIB has been designed as part of this research but it could not be implemented with real time implementation due to lack of resource for SNMP based developemnt. Aim: Propose a solution for SNMP based Emergency management for an organization Objectives: Research on network management using SNMP. Proposing an MIB Tree for the emergency network management Critically evaluating the proposed solution for SNMP based emergency network management. Introduction Network management is managing and maintaining different components and its functioning in a network. Network should be managed in an efficient way for avoiding different attacks. Several protocols are used for managing network. Management plays a vital role for monitoring the state of the network and analyses the performance. Among such protocols Simple Network Management Protocol (SNMP) is one which is used for monitoring the network. The main purpose of this protocol is designed for maintaining devices in network in internet protocols (IP). The network management performance can be used for transporting network information and its elements functioning (Stephen F. Bush and Amit B Kulkarni, 2001). SNMP in networks provides reliable and integrated network management. Several attacks may occur in network, for analyzing networks should be managed in an efficient way. The SNMP manages the network with the usage of different commands to the network and is useful in different networks. Th ere are several architectures for SNMP which is used depending upon the network mechanisms. It performs several operations in network for managing different components in the network. For performing all these operations SNMP uses Management Information Base (MIB) for handling components in the network. In this project SNMP and its performance in network is analyzed with the help of case study approach. The emergency preparedness is important part in network management and is equal to other maintenance works. One of the problems in network is traffic (German Goldszmidt and Jurgen Schonwalder, 2003). Sometimes the flow of data is more in network which causes traffic in network. In order to avoid traffic limited number of data should be transmitted in the network. Another problem that occurs in networks is security. Sometimes intruders may involve in network which leads to loss of data, in order to avoid this SNMP protocol performs several operations. For identifying network problems w ith SNMP components in network uses Management Information Base. Manager plays major role in managing the network. SNMP emergency services are very much helpful for the managing the network. This project uses emergency management of SNMP in order to solve problems that occur in networks (Geln E. Clarke, 2005). Hence from above context it can be concluded that SNMP is one of the protocol which helps in managing the network. Several problems may occur in network like traffic and security to the data. SNMP emergency management helps in managing the networks by performing different operations. Research Problem The network management protocols identify the communication between the network management server programs that are executing on the router or host, and the network management client program invoked by the manager. Considering these factors, it can be expected that the network management protocols contains numerous commands (Douglas Comer, 2006). The major disadvantage of constructing the network management protocols is the resulting complexity because this protocol needs an individual command for every operation on the data item. The Simple Network Management Protocol (SNMP) is useful in such types of cases. SNMP makes an interesting approach to network management. In place of defining the large command set, SNMP directs all the operations in a fetch-store paradigm. SNMP makes use of only two commands which allow the manager to store values into the data item and get the value from the data item. Other operations are described as the side-effects of the two operations. The main adva ntage of using the fetch-store paradigm is simplicity, flexibility and stability. SNMP is stable as its meaning remains fixed. SNMP is also easy to understand, debug and implement as it evades the difficulties of using special cases for every command. Finally the SNMP is flexible as it can contain the arbitrary commands in a well-designed framework (Douglas Comer, 2006). Problem Context: Importance of emergency in SNMP In the present scenarios of the Simple Network Management protocol, there are numerous of conditional factors that involves in defining the perspectives of the response in emergency SNMP (Amjad Umar, 2003). The emergency response can be used as a tool guide to the proposed scheme. The situation of the emergency can be found in the several areas of the networking management. The state of emergency can be found in many context such as market demand, failure in the key resources, shortage in the areas of the supply, in the same way there is a need of the emergency can be found in the areas of the political sciences and public administration. As in the same way in this research the point to be focused on is the emergency response of the Simple Network Management Protocols (Harold F. Tipton and Micki Krause, 2004). The factor that contributes to the difficulty in the emergency are lack of flexibility in making decision, lack of available resources, lack of response in option, failure in c ommunicating and cascading the events. To overcome these whole problems in the SNMP emergency, it must have to develop the outstanding plans that can be used for giving the training on the extensive simulation of the Emergency Response. Most of the organizations get failure only because of the one reason that is managing the emergency situations (Rob Cameron, Neil R. Wyler, Trent Fausett, Kevin Fletcher, Patrick Foxhoven and Mark J. Lucas, 2007). If the emergency situations in an organization are maintained in a superior approach then it may lead to loss in the communication, information and essential data. Hence a proper management system is required for organizing the emergency situations in Simple Network Management protocol. This protocol is used to reduce the traffic when a emergency situation is occur in the network, then the preventive measures that has to be taken are recovery, preventives in the system, improving the communication scheme, performance and work on the basis o f the propriety. Research Method: Case study is one of the best methods for researchers; these are effectively used by the people to understand the contest of the study. It is less complexity and adds strength to the data which is used in the research. The steps that is followed in this case study are * Determine the theme of the research * Select the cases and analysis the techniques for gathering the data * Preparation for the collection * Collection of the data according to the field * Estimate and analyze that data * Preparation of the report This study is to manage the emergency in Simple Network Management protocol. The organization that involves in the SNMP managements standards, that provides the major introduction to the organization management. There are several conditions that have an impact on the areas like co-operation and trading (Bill Gillham, 2000). To develop the management system in the SNMP is based on the information and communication. This includes the problems, listing the questions, describing the method that involve in the research. The key features of the report includes the detail of the Simple Network Management Protocols in the management information of specific data that relates to the successes or disappointments experienced by the organizations that were conveyed during data collection and answers or comments illuminating issues directly related to the research questions (Ben Beiske, 2007). The researcher develops each issue using quotations or other details from the data that is collected, and points out the uses of data where it is applicable. The data also includes the confirming and conflicting findings from literature reviews. The report conclusion makes assertions and suggestions for further research activity, so that another may apply these techniques to another electronic community, network and its management to determine whether similar findings are particularly to in communities that belongs to the network (George L. Dunbar, 2005). Final report distribution includes all participants. Within the case study it has been analyzed at the first time whether the technique used with each non-profit organization under study. The assigned investigator studies each organizations written documentation and survey response data as a separate case to identify unique patterns within the data for the single organization. A detailed case study that is, written ups for each organizing management, categorizing interview questions and answers and examining the data for within group similarities and differences. Cross case analysis follows. Investigators examine pairs of cases, categorizing the similarities and differences in each pair (Kathleen Stassen Berger, 2004). Investigators then examine similar pairs for differences, and dissimilar pairs for similarities. As patterns begin to emerge, certain evidence that may stand out as being in conflict with the patterns. In those cases, the investigator conducts follow-up focused interviews to confirm or correct the initial data in order to tie the evidence to the findings and to state relationships in answer to the research questions. Chapters Summary: In summary, here there is a discussion about the case studies in terms of the different types of case studies which is found in the literature. The case studies are considered to be useful in research as it enable researchers to examine data at the fine level. It is an alternative to quantitative or qualitative research, case studies is a practical solution to when a big sample population is difficult to obtain. Although the case studies have a variety of advantages, so it is used for data management for having the better situations and it provide a better insights for the document in detail to which the subjects of Interest is related. Case study method has always been criticized for its lack of severity and the tendency for a researcher. It is the base for establishing reliability and generality in subjected to uncertainty when a small sampling is deployed. Some case study research is dismissed as useful only as an exploratory tool. Hence as the case study have various advantages o ver the qualitative or the quantitative researches. So it is used in this research. Summary of chapters: Chapter 2 includes the Literature review for the related research work. Chapter 3 discusses the analysis of problem requirements which is providing a solution for managing or developing emergency based system. We have used SNMP and MIB based approach to provide the design of the emergency based provision. We will be using MIB tree and ASN based design and development for this. Chapter 4 includes the development and data collection which will be obtained through SNMP Query for Firealarm and Power off. Chapter 5 covers the analysis and evaluationof results or test data, This has the effectiveness of the research and proposed solution for emergency. Chapter 2: Literature Review 2.1 Network Management Network Management is a service which employs different applications, tools and devices to assist the network managers in maintaining and monitoring networks. Hence the meaning of Network Management is different for different users. For example in certain cases the network management involves a single network advisor monitoring the network activity by utilizing an obsolete protocol analyzer. In other cases the network management involves auto polling, distributed database and high end workstations producing real time network topology traffic and changes (Network Management n.d). Architecture of Network Management Many of the network management architectures use similar set of elements, structure and relationships. The managed devices or end devices like the computer systems and network devices run the basic software which allows them in producing alerts when problems are recognized. For instance consider the exceeded user determined thresholds. The alerts received are programmed by the management entities to respond by executing one, group of actions like operator notification, system shut down, automatic attempts and event logging by system repair. Even the entities of the management can be polled for end stations to verify the values of definite variables (Network Management n.d). The polling can be user initiated or automatic but the agents of managed devices react to all polls. These agents are the software modules which first compile information regarding managed devices in which they reside. Later the information is stored in management database and is finally produced to the management entities reactively or proactively of the network management systems (NMSs) through a protocol of network management. The network management protocols include Common Management Information Protocol (CMIP) and Simple Network Management Protocol (SNMP). Figure 1 represents basic network management architecture (Network Management n.d). Sampling Techniques Network Management involves the status information of queue occupancy, latency, load and other parameters which is available from devices like switches, networking interfaces and routers. This information of the network management is accessed by the Simple Network Management Protocol (SNMP) (Edwin A. Hernandez, Matthew C. Chidester, and Alan D. George, 2000). The Network Management Station (NMS) of the SNMP queries the agents or network devices to evaluate the status of the network links or devices periodically. The accuracy of the data measured is determined by period of sampling. A transient activity cannot be detected accurately if the sampling interval is large and a greater storage capacity is required at the NMS as small intervals consume larger bandwidths on the network. For instance, a burst of major action with few seconds is probable to be undetected with sampling interval of some minutes. To balance the accuracy with sampling several sampling techniques have been practical to the managers of network. Some of these sampling techniques are: SNMP Architecture: Simple Network Management Protocol (SNMP) is the network protocol which is used in network management systems. This protocol is designed to administer the devices on an Internet Protocol (IP) network. It collects the information from different network devices such as routers, servers, hubs on an internet protocol. It is used for managing complex networks. The SNMP architecture consists of different set of components such as network management system and the SNMP agent and the managed device. The managed device is also known as the network elements. It is connected to the data network. The SNMP agent collects the data from the managed device and transforms it to another format using SNMP. This agent acts as a server, switch, hub and many others. The NMS is the one of the module of the SNMP which basically executes the applications which can manage and control the managed devices like physical devices such as routers, network interfaces and software. They manage the remote monitoring of these managed components and do the sampling. Then after do the analysis of the collected information and finally gives the presentation of the information (Steven Karris T, 2004). All the devices in the architecture are referred as managed devices. The managed device in the architecture acts as an SNMP agent which facilitates the network management syst em to recover the status of managed device. All the available information of the managed devices is been addressed through management information base (MIB). There are two types of MIBs. They are scalar and tabular. The scalar object of MIBs denotes the single object instances and the tabular objects of MIBs define the multiple object instances. If the network management system recognizes which device to be managed in MIB then it changes the MIB objects with the relevant requests to the agent of SNMP. The information of MIB is loaded into the network management system with the help of MIB file. The network management system acts as the master device where as the managed device and the SNMP agent acts as a slave device. It provides security by preventing unauthorized users to gain access on the system. This security is performed with the help of community string. This string acts as the password and groups the data either to read-only or read-write areas (Thomas Porter, 2006). The ap plication server of the SNMP agent is designed to run the specific applications. The SNMP agents and the network management systems communicate each other with different set of operations such as read, write and trap. The NMS requests the SNMP agent through read operation and it sends the information through write operation. The notifications are sent from SNMP agent to NMS through trap operation. Hence from the above context it is understood that SNMP is used in many applications. It is implemented in many operating systems. The storage network of the SNMP architecture consists of switch and the hub which acts as the interface between the components. All the devices such as managed devices, MIB are connected only through storage network. Tape library contains more than one tape drives which stores bulk amount of data. It acts as a SNMP agent. The SNMP agent translates the whole information. Different SNMP versions are derived to increase the performance of the system. SNMP ahs the followings: Network Element: if any tool connects to the network then that tool can be called as network element. Some of the tools like gateways, hosts, terminal servers, servers, switches, firewalls, and active hubs. Management station: this station includes a platform which contains software in SNMP that manages and controls the network elements. SNMP agent: it is a software management agent which is responsible for executing the functions in the network management after receiving the messages from the management station. SNMP request: a message which travels from management station to SNMP agent in the network device. SNMP trap receiver: it even receives the notification messages from SNMP agent on network devices. Management information base: it is a method which identifies the elements in SNMP database. SNMP Architecture Simple Network Management Protocol is very popular not only because of its simple operation but also due to easy of usage. This protocol is very useful for manufacturers and seller as it is easy to use SNMP technology for the manufacturers while adding network management functions to their products (Kerrie Meyler, Cameron Fuller, John Joyner Andy, 2008). Components of the SNMP Architecture: The SNMP architecture mainly contains two components, managers and agents, apart from standards which are used for controlling the interactions between components. By using SNMP commands, these managers and agents communicate with each other. These commands are explained in RFC 1157. Here, the managers organize the functioning of agents. The agents provide the data to the managers by interacting with the devices like routers and computers. These devices are also known as managed devices (Ramadas Shanmugam, R. Padmini S.Nivedita, 2002). The protocol used for communication between manager and agent is referred as SNMP. Generally, the SNMP managed network consists of three components; they are (Deon Reynders Edwin Wright, 2003): * Managed devices. * Agents. * Network-management systems (NMSs). Managed devices: It is a network node which includes SNMP agent which exists in a managed network. These devices gather and store the management information. By using SNMP, managed devices enable the management information to network-management systems (NMSs). It also responsible for querying the agents by using SNMP commands. Managed devices can also be known as network elements, these can be any type of devices like routers, switches, hubs, access servers, bridges, IP telephones, printers, or computer hosts (Gilbert Held, 2003). Agent: It is a network-management software module which exists in managed devices. Agent software represents one or more program modules which operate within the managed devices like bridge, router, workstation or gateway. Each of the managed agent stores information and provides these information to the manager after receiving the request from the manager. It translates the management information into a well-suited form with SNMP (Deon Reynders Edwin Wright, 2003). Network-managed systems (NMSs): This system performs applications that examine the managed devices. It provides a large amount of memory resources for network management. In any managed network, there should one or more number of NMSs (Gilbert Held, 2003). SNMP operations SNMP reads or writes the values in applications from SNMP devices. There are four basic SNMP operations, they are Get, Get-next, Set and Trap. Get and Set are the basic operations which are mostly used for reading and writing data to a node which are identified by a specific OID. It also requests the values of one or more SNMP objects and sets the values of SNMP object. Get-next reads the content of the tables at a time and steps through MIB hierarchy. Trap is an asynchronous notification from server (agent) to client (manager) which reports the occurrence of an interesting event. It sends the information in the form of packet to SNMP (Evi Nemeth, Garth Snyder Trent R. Hein, 2006). Basic commands of SNMP Commands are explained in RFCs, there are many RFCs which relate to SNMP components. The importance of these RFCs is it describes the operation of the protocols. Generally, there exists three RFCs; they are RFC 1155, RFC 1157 and RFC 1213. RFC 1155 used for Structure of Management information (SMI), it explains about the data types and structure that should be used for managed objects. RFC 1157 is used for Simple Network Management Protocol (SNMP), it describes protocol and operation of SNMP. RFC 1213 is used in Management Information Base (MIB) (Philip Miller, 1997). By using four basic commands in SNMP, managed devices are monitored and controlled. They are namely read, write, trap, and travel operations (Deon Reynders Edwin Wright, 2003). Read command it is used by NMSs, in order to monitor the managed devices. NMS inspect various variables which are maintained by managed devices. Write command to control managed devices, these commands are used by NMS. The variables in the managed devices are changed by NMS. Trap command- these commands are utilized by the managed devices to asynchronously report the result to the NMS. Whenever there are certain results in the managed devices, then managed devices send rap to NMS (Deon Reynders Edwin Wright, 2003). Transversal operations- NMS make use of these operations to identify the variables which supports managed device and also collects the data in variable tables like routing table. SNMP Network Management Managing a network is very difficult task for any administrator as it deals with huge number of nodes and protocols. The best way to keep track of all the nodes that exists in a network is to identify and implement an effective protocol which can allow a user to read or write a particular piece of information. SNMP is one of the network management protocol preferred by most of the network administrators in organizations. SNMP can be available with three versions; each has enhanced features when compared with its previous versions. SNMPv3 can offer high security features while managing organizational network. A network manager in an organization has to play a key role in managing the networks. Using of SNMP for network management can be advantageous as it can solve most of the problems that exists in a network (Sebastian Abeck and Adrian Farrel, 2008). Thus, performance of network mostly depends on the network protocols used by the administrator. Network management using SNMP protocols can be identified as a request/reply process. SNMP makes use of request messages like GET and SET while managing a network. Through GET request a SNMP server can retrieve the required information from a node where as SET request can stores specific information on a node. SNMP servers mostly use GET requests in order to manage a network. SNMP implementation efficiency largely depends on these requests and replies from the nodes or servers (Dinesh Chandra Verma, 2009). A network administrator has to recognize the network details before implementing SNMP protocols. Client programs in networks can be utilized by network administrators in order to display the actual details of a network. While displaying network details a client program acts like an interface. When a user or administrator wants to access specific information, a request must be sent to the server. For sending request to particular node, a client program makes use of SNMP protocols. R equests from the users will be received by SNMP servers running on the specified node. SNMP server processes these requests and finds the information required for a user. Finally a client program will display the information based on the response received from SNMP servers. The major aspects that has to be understood in SNMP network management is, how a user can specify the information request and how a server recognizes the required information (Larry L. Peterson and Bruce S. Davie, 2007). SNMP makes use of Management Information Base (MIB) for retrieving the required information. MIB performs the function of identifying information from SNMP databases. As SNMP uses MIB, a particular syntax for the requests has to be specified. For implementing SNMP with MIBs a standard specification like ASN.1 can be used. A SNMP client agent keeps an ASN. 1 identifier in MIB, SNMP server searches the required information based on the identifier specified by the client. For managing a network SNMP makes use of various network components. Every SNMP agent will interact with MIBs and Network Management Systems while managing a network (Monique Morrow and Kateel Vijayananda, 2003). Hence from the above discussion it can be understood that, SNMP operates in client/ server mode which establishes virtual connections with the servers to provide information to the Network Management Systems (NMS). The information provided to NMS can provide the devices status at a particular time. MIB in SNMP refers to the databases controlled by SNMP agents and SNMP servers retrieve the information based on MIBs in networks. Network management through SNMP can be an effective and most used method in present organizational networking environments. Many large organizations use SNMP tools for managing their networks effectively. Why SNMP SNMP is defined as simple network management protocol. Network management system will make use of SNMP for communicating with various network objects. SNMP is mostly used for the remote management of network device. SNMP is widely used because it easy to use and user can easily add the network management functions to their new or existing products. SNMP runs on various devices like network tools, core network devices and office network tools (Ray Rankins, Paul Jensen and Paul Bertucci, 2002). SNMP allow network and system administrator to access network devices that are present in their networks such as server, routers etc. SNMP for the management of network device contains one SNMP station and management station. Management station is mainly utilized to arrange the network elements and to receive the SNMP traps from those elements. By making use of SNMP, network monitor can observe changes and alerts that are identified in the network elements. If the size of network is increased th en method called management is required. In SNMP errors obtained are varies from one agent to other agent but will include system failure, disk warning etc (Harold F. Tipton and Micki Krause, 2004). If the device passes an alert to the management station then network management itself involves in rectifying the problem. Time to time configuration request should be send to the device. If provided string is correct then automatically configuration of the device will change according to the requirement. Organizations can identify the status of all equipments and can also perform remote trouble shooting. SNMP is nothing but a protocol that is used to develop and manage nodes that are present in the network system. SNMP allows system administrator to work on the problems that are executed in the network and should plan for the growth of network. Network management service will identify the changes that are done in the network devices based SNMP (Douglas R. Mauro and Kevin James Schmidt, 2005). SNMP consists of three features; they are managed device, agents and network management system. Managed device is usually a network node. It contains SNMP agent that is located on a managed network. Management data that is gathered and stored will be available to network management system of SNMP. Managed devices can also be called as network elements. An agent is nothing but network management module software module which is present in the management device. This device has great knowledge on local management information and this information can ne transferred to SNMP. NMS usually carry out applications that can manage and control the managed device. Hence from the above discussion it is identified that SNMP is a protocol which can help in managing the networks. Why MIB Management Information Base (MIB) is an essential component for handling a network. The importance of MIB increased as it comprises data definitions for managed objects. For managing the networks through SNMP protocol, an information base is necessary. The information base must allow a user to retrieve required data. MIB provides the facility of managing databases in SNMP agents. Managed object instances stored in MIBs will be exchanged between SNMP agents and managers (Stephen B. Morris, 2003). Thus, MIB is necessary for managing the information while implementing SNMP protocol in networks. Managed objects in MIB will be specified with a unique identifier, a user has to send request regarding information by following a particular syntax. MIB in SNMP also helps in recognizing the present status of a network device. Identifying the network information in case of small networks can be done very easily as the host names and IP addresses can be available to the users directly. But in lar ge networks, a MIB