Tuesday, November 26, 2019

Right to Work Laws

Right to Work Laws Introduction Debates on the rights to work laws have been intensifying each day especially now that competition in the business world is increasing drastically. The topic of rights to work laws I, therefore, very significant in many organizations in the globe. This is because the laws define the rights of all employees and offers security for contracts for employers who are members of work unions (Taubman, and Alston, 2010, p 1).Advertising We will write a custom research paper sample on Right to Work Laws specifically for you for only $16.05 $11/page Learn More Global organizations are much concerned about these laws because they define powers of business unions whereby the right to work laws are now prohibiting the unions from taking certain measures towards the companies involved, which would result to mandatory membership of all employees as well as payments of union dues by the employees. Some people support the laws while others oppose them. However, t hese laws should be made based on their benefits to the state in question as well as its people (both employees and employers). It is therefore important for organizations to be aware of these laws to avoid exploitation of their employees by the unions as well as to learn on the benefits of joining the unions to enable them make wise decisions to the benefit of their businesses (Niznik, 2011, p 1). How unions survive in Right to Work states Since much legislation on rights to work laws is opposing work unions, the unions have developed several strategies to help them survive the opposition. For instance, many unions are now encouraging the use of new and improved technologies aimed at improving production. This move has attracted many employers to join the unions in order to benefit from the advancements in productivity technology. They are also providing other services such as coordination of labor management and improved training for employees of member employers. Through the guar anteed increase in wages, many employees are willing to join the unions despite the laws imposed on the unions. In order for unions to maintain their members in rights to work states, they are improving the units of bargaining which keeps the nonunionized employers at greater risks of competition due to the low wages they offer and also lack of job benefits to their employees. As a result, many firms choose to remain as union members despite their rights not to do so. For instance, the construction firms have more to benefit from by maintaining their membership due to better and much quality work resulting from the increased and improved training of employees (Cooper, 2004, p. 1).Advertising Looking for research paper on labor law? Let's see if we can help you! Get your first paper with 15% OFF Learn More Similarly, fewer injuries are experienced in such companies and this attracts many such firms to join or maintain their membership in the unions. Due to the higher wages guaranteed on union members, community members are likely to have more to spend and this is beneficial to the companies and other employers in that their sales and services will increase due to the increased income of the employees which leads to subsequent increase in expenditure by society members. This encourages companies to join and maintain their membership to the unions in order to promote rise in sales. Since the rights to work laws do not limit the management powers of companies, unions in right to work states take the initiative to provide management services to members and this attracts many companies to join the unions. The unions and the member companies therefore agree on the terms and conditions of those services. This way, the unions gain benefits from the fees they obtain from the members for the services offered (Considine, 2011, p. 1). Rights for union employees and differences in collective bargaining agreement in right t work and non right to work states Union employees in both right to work and non right to work states, enjoy certain benefits. For instance, unions require their member companies to give priority to union employees when giving job opportunities. Non union employees may therefore miss a job opportunity especially where there are other union employees pursuing the same position. However, employees from non union companies (right to work laws states), gain some benefits as well. The law requires that the workers get the benefits of the company membership. All eligible employees are, therefore, entitled to representation by the unions whether they pay the union dues or not. The unions are therefore required to use their own member’s dues to pay union benefits even to those who are not willing to pay off their dues. The unions however, tend to represent collective bargaining based on arguments that everyone is entitled to freedom to speech, assembly and press. Collective bargaining gives the unions the chanc e to express their views with regard to job benefits, improvements of working conditions and better wages for member employees (Denholm, 2011, p. 1). Employees in unionized companies in the rights to work states have the right to choose either to join or refrain from joining the union. This is opposed to workers in non rights to work states where all employees of unionized workplaces are forced to join the unions or pay the union dues prior to employment. Rights to work states have laws which give employees the right to refrain from joining the unions even when their employers are members.Advertising We will write a custom research paper sample on Right to Work Laws specifically for you for only $16.05 $11/page Learn More Workers also have the rights to end their membership from the union at any given time without having to pay any post union fines or facing any disciplinary measures. Therefore, in the right to work states, employees do not need to pay any union dues to get employed while in the non right to work states, employers may require, by law, the worker to pay a reduced amount of the fees to support the union (Niznik, 2011, p 1). However, in the non right to work states, the union does not require formal membership of workers despite the agreements of collective bargaining. This agreement defines the distinction between volunteer membership in a company and the payment of financial dues without having to join the union membership. The voluntary members of the union are subject to fines and other internal agreements such as discipline while financial due payers are not. These payers are not part of the union members but are members of the bargaining unit which is completely covered by the union based on the bargaining agreements including salary and other benefits such as pension payments. Despite members of the bargaining agreement being excluded from internal participation of the union, they are fairly represented as well as bearing immunity from disciplinary measures and other fines (Barro, 2011, p. 1). Differences in employees in right to work and non right to work states Although both opponents and proponents of the right to work laws have exactly opposing views and arguments on the work laws, there are actual differences experienced between the two. Employees in the non right to work states, whose unions are stronger due to lack of restrictions, enjoy some benefits that their counter parts. For instance, compensation programs for workers in case of injuries as well insurance agreements are much friendlier and generous in states that have not yet implemented the work laws. Such employees’ families especially their children are less likely to suffer from poverty and are guaranteed of living a quality standard of life compared to those in right to work states that are poorly paid leading to low income among community members and consequently poor living standards. The unions in the non rights w ork states have pushed for health insurance services from all employers including the small ones. High income rates for employees give them opportunities to educate their children something which guarantees a bright future for the children. Immortality rates are equally lower in such states compared to those which have already implemented the laws opposing the work unions. This clearly shows that workers in the non rights to work states have much better lives than their counter parts in the rights to work states (Denholm, 2011, p. 1). On the other hand, employees in anti union states are more likely to suffer intimidation by their employers because after all they have no body through which they can air their views concerning their jobs.Advertising Looking for research paper on labor law? Let's see if we can help you! Get your first paper with 15% OFF Learn More Since employers in such states are not under any pressure, they tend to pay low wages to their employees, fail to provide important services such as medical covers and do not pay much attention to working conditions their workers are exposed to. As a result, employees earn low income, they are likely not able to live a standard life as opposed to those in states where the laws have not been implemented. Similarly, unemployment rates are higher in right to work states since workers do not have guarantee for employment unlike in non right to work states where the union members are always prioritized during recruitments. Employment opportunities are therefore high in these states and as a result living standards of communities are improved. Additionally, unions may intervene between employers and workers in case any problem arises. This way, loss of jobs by union members is prevented (Taubman, and Alston, 2010, p 1). Importance of understanding the Right to Work laws It is very importa nt for both employees and employers to understand the basics of the Right to Work laws, whether they are in the Right to Work states or in the non-Right to Work states. The workers should clearly understand their rights in the unions whether they have joined the membership or they are part of the collective bargaining agreement. Proper understanding of these laws and employees rights will put them in a better position to decide whether to join the unions’ membership or not. Similarly, employers need to understand their duties as well especially their required responsibilities in regard to the unions. The employees also need to be fully informed on the benefits associated with union membership especially provision of job opportunities. Employees need to be aware of their rights involved in payments of union dues to avoid being exploited without their knowledge as it has been the case for many workers. It is also important for state governments to consider the good side of the unions before abolishing them completely so that they can be able to put into place, appropriate laws for the benefit of employees, employers as well as the unions (Cooper, 2004, p. 1). Conclusion Right to Work laws have been implemented in many countries over the years. However, many have opposed the laws and others have supported them. The opponents of the laws are supporters of the unions arguing that the existence of the unions has resulted to increased wages to its members, high living standards of the society as a whole as well as enjoyment of other benefits. However, the proponents of the law oppose the unions with exactly the opposite views on the unions as their counter parts. According to the proponents of the law, unions have led to low wages to its members, reduced job opportunities and low living standards among the union members. Most of these unions have been, for a very long time, exploiting their members by requiring them to pay mandatory union dues in order to get themselves a job. Others have forced workers to join the union membership against their will so that the union can benefit from the dues from the members. However, the Right to Work laws requires that no employee should be forced to either join the union or pay mandatory dues. The laws also give the employees the right to choose between joining the union membership and remaining as part of collective bargaining agreement which does not involve internal participation of the members in the union affairs. Reference List Barro, R. (2011). Unions vs. the Right to Work. Retrieved from, http://online.wsj.com/article/SB10001424052748704150604576166011983939364.html Considine, A. (2011). ‘Right to Work’: GOP aims to gut labor unions. Retrieved from, nuvo.net/indianapolis/right-to-work-making-unions-illegal/Content?oid=2067037 Cooper, J.W. (2004). Effects of Right to Work Laws on Employees, Unions and Businesses. Retrieved from, johnwcooper.com/right-to-work-laws/right-to-work-la ws.pdf Denholm, D. (2011). There is no â€Å"Right† to Collective Bargaining. Retrieved from, http://unionwatch.org/there-is-no-right-to-collective-bargaining/ Niznik, J.S. (2011). Right to Work. Retrieved from, http://jobsearchtech.about.com/od/laborlaws/a/right_to_work_2.htm Taubman, G. and Alston, R. (2010). Union Discipline and Employee Rights. Retrieved from, nrtw.org/RDA.htm

Saturday, November 23, 2019

History of the Gatling Gun and Dr. Richard Gatling

History of the Gatling Gun and Dr. Richard Gatling In 1861, Doctor Richard Gatling patented the Gatling Gun, a six-barreled weapon capable of firing a (then) phenomenal 200 rounds per minute. The Gatling gun was a hand-driven, crank-operated, multi-barrel, machine gun. The first machine gun with reliable loading, the Gatling gun had the ability to fire sustained multiple bursts. Inventing the Gatling Gun Richard Gatling created his gun during the American Civil War, he sincerely believed that his invention would bring an end to  war by making it unthinkable to use due to the horrific carnage possible by his weapons. At the least, the Gatling guns power would reduce the number of soldiers required to remain on the battlefield. The 1862 version of the Gatling gun had reloadable steel chambers and used percussion caps. It was prone to occasional jamming. In 1867, Gatling redesigned the Gatling gun again to use metallic cartridges; this version was bought and used by the United States Army. Life of Richard Gatling Born September 12, 1818, in Hertford County, North Carolina, Richard Gatling was the son of planter and inventor, Jordan Gatling, who held two patents of his own. Besides the Gatling gun, Richard Gatling also patented a seed-sowing rice planter in 1839 that was later adapted into a successful wheat drill. In 1870, Richard Gatling and his family moved to Hartford, Connecticut, home of the Colt Armory where the Gatling gun was being manufactured.

Thursday, November 21, 2019

Employee Satisfaction Surveys Research Paper Example | Topics and Well Written Essays - 1500 words

Employee Satisfaction Surveys - Research Paper Example Their relevance to the organization will also be proffered. The first type of employee satisfaction survey is the employee engagement surveys. In an employee engagement survey, the passion and commitment of the employee with regards to their work, company and co-workers are analyzed (NBRI, 2012). This type of survey aims to determine whether the employees feel empowered and whether they have a good relationship with their supervisors and managers (Sheahan, n.d.). Through this survey, management will know what the employees think about the company’s goals and values and if they are willing to support them (NBRI, 2012). The second type of employee satisfaction survey is the employee attitude survey. This survey â€Å"assesses the feelings or emotions of employees within the workplace† (NBRI, 2012). This survey will give management an idea on how it can boost the morale of their employees by understanding their views and perceptions and identifying the root causes of their attitudes in the workplace (NBRI, 2012). The employee opinion survey is another type of employee satisfaction survey. This type of survey reveals the employees’ behaviors, beliefs, feelings, thoughts and conclusions on matters such as commitment, management style and productivity (NBRI, 2012). The data gathered from this survey entails a precise analysis. The factors that motivate and discourage employees will be exposed in this survey. The fourth type of employee satisfaction survey is the employee development survey. This survey will prevent high turnover rates within an organization because it will determine whether employees perceive the company as a place where they can develop professionally (Sheahan, n.d.). If employees believe that the company offers opportunities for growth, this survey will be able to show it. Another kind of survey is the straightforward satisfaction survey which goes directly to the point of questioning employees how happy they are with their job s (Sheahan, n.d.). Sheahan goes on further to say that this type of survey usually has a scoring system which rates the satisfaction levels on a scale of 1 to 15 (n.d.). Moreover, the questions on the survey will give management an idea if there are any problems on morale and compensation. The sixth type of employee satisfaction survey is the improvement survey. This survey is conducted when an organization is contemplating on changing some policies or job conditions (Sheahan, n.d.). It will assist management in determining whether such changes will be acceptable to the employees. They will be able to gauge how the employees will react or feel if such changes were imposed. The 360 degree survey is another kind of employee satisfaction survey which is conducted by companies to evaluate the employees from the points of view of the supervisors, peers, subordinates, customers, vendors, and other external stakeholders (NBRI, 2012). One of the more important type of survey is the exit sur vey. This is administered to an employee who will leave the company. This survey is an excellent indication of employees’ attitudes and is known to elicit very honest responses (Ipathia, Inc., 2005). All the surveys mentioned above may either be conducted online or paper-based. A primary consideration though for online surveys is that not all the employees may have computer and internet access and there may be employees who lack computer skills to complete the survey (Lock Media Services, Inc., n.d.). An online survey however is less costly than a paper-based survey.

Tuesday, November 19, 2019

Meiji Era (1868-1912) Essay Example | Topics and Well Written Essays - 3750 words

Meiji Era (1868-1912) - Essay Example The government industrialized the nation with the assistance of investing in enterprises owned by the state, development of the infrastructure for industries and obtained technology, machinery form developed nations such as European countries and privatization of industries. Japan's isolation from other parts of the world did not begin industrialization as early as the other western European countries. The Japanese government by that time tried to resist western influence in trade, and until 1853, they closed their trading boarders and ports for any trading activity with foreigners. They engaged in no foreign contact unless it was decidedly necessary and the laws forbade any Japanese civilian to travel. Japanese government also ensured that there was only one seaport open to trade with any western nation. The port of Nagasaki was the connection point for any trading activity with the western countries especially the Dutch and Chinese ships.2 In 1853, the president of America at that time sent the American commando, Mathew Perry, with a fleet of steam-powered ships (the back ships) to force a trade treaty with Japan and open the Japanese ports and boarders to trade with other parts of the world. Captain Perry gave the Japanese government one year of decision-making, and when he returned in 1954, the Japanese signed the treaty under the influence of force and opened their gates to the world trading. This was an indication of how the Japanese were weak in both economy and military.3 Creation of industrial infrastructure The Japanese realized that they needed a strong modern military to avoid intimidation by any foreign nation. However, the old rule of Tokugawa did not share the view modernizing their weapons and military. In 1968, the old Tokugawa government collapsed, and marked the beginning of the Meiji era when the Japanese begun serious consideration of modernization. However, the military modernization and arsenal buildup could not come alone; it included th e industrialization and industrial buildup of Japan and its principal cities2. Even though, there were several oppositions against industrialization, the Meija government proceeded with the modernization process. The government begun with sponsoring the telegraph system that connected the greatest cities in Japan, then they built roads and, shipyards rail network. The Meiji government also facilitated the building of mines, textile industries, munitions factories, experimental factories and agricultural stations. The leaders reloaded their efforts of military modernization including compulsory military service for all men, establishment of small standing army and a large reserve army system to boost their national security. They also engaged in foreign military education and consultation from studying foreign military, using foreign military advisors and sending cadets abroad Europe and America to study military education4. The Meiji government’s chief aim was to restore Japa nese isolation, but still maintain their contact with the west.

Sunday, November 17, 2019

A comparison of Public and Private Policing in America Essay Example for Free

A comparison of Public and Private Policing in America Essay The responsibility of citizen protection, property security, and the maintaining of law and order in a community is traditionally taken on by the public police department. The police personnel are hired, paid, and report to officials at various levels of the local government. Local responsibilities usually fall under the umbrella of the city police department or county Sheriff, while other tasks such as patrolling our highways may be the responsibility of the state police. An increase in population, growth of industry, and a rise in crime have resulted in the inability of many police departments to effectively provide services as in the past. The result is the emergence of private police departments and private security companies. Private police departments have been operating since the early 1970’s (although private security companies have been in existence much longer). Large corporations, gated communities, retail establishments, and businesses that engage in government contracting all have formed private police departments. These departments, however, have not been met without criticism, skepticism and debate. Arguments have been made that the private departments are not adequately trained, lack professionalism, and do not have the authority of public police departments. This may be partially true but each private department needs to be examined individually to better assess these arguments. Some private departments require officers to attend law enforcement academies along side officers from municipal departments. This ensures the proper training is obtained and creates a more professional department. The responsibilities of a private police department have also been met with criticism. A comparison of responsibilities shows that many of the private departments perform the same duties and function in a similar manner to that of the public departments. In fact, Zalewski (2007) suggested that â€Å"the functions performed by the private organizations are not dissimilar to the functions of the public services†. Both public and private departments enforce laws, protect lives and property, and are required to report to higher authority. The manner in which, and to whom these responsibilities are carried out do differ in many ways. According to Joh (2006) public police systems and policies are governed by law. The U. S. Constitution, state constitutions, and local ordinances provide parameters establishing many of the procedures used in police work. Public police must also be responsive to requests of an entire community, city, town, or state. The interest of all citizens regardless of where he or she lives or works is protected by the public police. The need to protect all citizens of the community may give some citizens the feeling that not enough patrols are being made because of lack of exposure of the police. All public police officers are required to attend a law enforcement training academy and undergo field training prior to performing the duties and meeting the needs of the community. In many instances psychological evaluations are part of the screening process for entry into the police field. Private police departments and their personnel are governed by the policies established by the business or client paying for the service. An exception to this is a case in which an officer attends a municipal training academy and receives a state certification. These officers are also bound by the policies and regulations set forth by the local government in addition to the business or client. Although Joh (2004) suggested that there is difficulty in distinguishing the differences between the responsibilities, function, and appearance of the departments, the law recognizes an absolute distinction. Joh suggested that the private police are â€Å"unburdened by the constitutional criminal procedure or state regulation†. Zalewski (2007) indicated there were several more distinctions between the public and private police. Training, accountability, and job responsibilities may vary depending on the business or client associated with the private police. They receive minimal training as compared to the public officers. They are accountable to the client or business owner, instead of government officials and the citizens of the community. The job is primarily that of securing the property and interests of the client as compared to the general public as in the case with public police. Private police are also constrained to the boundaries of the client when performing duties. They are not allowed to conduct law enforcement work in the city streets. Training is a very controversial issue in the comparison of public versus private policing. As previously mentioned, public police officers attend an extensive and intensive training program supported by the local and state government. Part of the recruiting process usually involves written, oral and psychological testing to ensure candidates have the capability to learn the legal aspect of the job, and the psychological capability to deal with the unknown and sometimes grueling calls for service. Field training with an experienced officer is also a requirement to allow the recruits the opportunity to demonstrate their acquired skills and learn additional procedures that are better taught in a â€Å"hands-on† environment instead of the classroom. In contrast, O’Leary (1994) suggested that the training of most private police and security officers is limited, at best. The only training some of these officers receive is in the use of firearms. Training in areas such as search and seizure and other legal issues is almost non-existent within a private police department and O’Leary indicated it is critical that officers receive constant training in these areas. An argument against the private police department could be that the lack of training is putting the officers at potential risk. They may be called upon to handle a situation in which they received no training or had limited exposure to it. Although these risks may be associated with the public police also, there is a greater probability that the public police have received more training, and will probably have assistance from other officers patrolling the streets when they come upon a risky situation. Although there are an increasing number of private police departments, the shift away from the public police to maintain community security has been gradual (Noaks, 2000). Most organizations opting for the private policing are do so with extreme care, an in many instances, with the assistance of the public police. For instance, a local gated community has its own private police department. The police are responsible for protecting the lives of the residents within the community as well as patrolling the entire boundary and streets of the property including all of the facilities and buildings. Most of the officers on this department have attended a municipal law enforcement training academy, and therefore, respond to criminal complaints within the boundaries of the property. Summons’ can be issued and arrests made when the officers determine a crime has been committed. Depending on the nature of the crime however, a local public police may also be called in to assist the private police. The local police may have more experience handling particular situations, but also have more resources available to them, such as mental health counselors or social workers, in the event of possible suicide or other domestic cases. The growing population, increase in crime, and limited resources of public police make private police departments valuable assets. Although the controversy and debate over the abilities and responsibilities will probably continue, there is evidence that communities, businesses, and other private entities can benefit from both private and public policing. There are obvious differences in organizational and operational structures between the different departments, but the overall job is quite similar. Both types of departments are tasked with protecting life and property and assisting residents or citizens.

Thursday, November 14, 2019

Dredd Scott Decision Essay -- Supreme Court Scott v. Sanford

INTRODUCTION United States Supreme Court case Scott v. Sanford (1857), commonly known as the Dred Scott Case, is probably the most famous case of the nineteenth century (with the exception possibly of Marbury v. Madison). It is one of only four cases in U. S. history that has ever been overturned by a Constitutional amendment (overturned by the 13th and 14th Amendments). It is also, along with Marbury, one of only two cases prior to the Civil War that declared a federal law unconstitutional. This case may have also been one of the most, if not the most, controversial case in American history, due simply to the fact that it dealt an explosive opinion on an issue already prepared to erupt - slavery. Thus, many scholars assert that the Dred Scott case may have almost single-handedly ignited the ever growing slavery issue into violence, culminating ultimately into the American Civil War. It effectively brought many abolitionists and anti-slavery proponents, particularly in the North, "ov er the edge". BACKGROUND Dred Scott was a slave born in Virginia who early in life moved with his owner to St. Louis, Missouri. At this time, due to the Missouri Compromise of 1820, Missouri was added as a slave state, but no state may allow slavery if that state falls above the 36 degree 30 minute latitudinal line. Later, in 1854 under the Kansas-Nebraska Act, states were allowed to vote on whether they will allow slavery or not, known commonly as popular sovereignty. In St. Louis, Scott was sold to an army surgeon named Dr. John Emerson in 1833. A year later, Emerson, on a tour of duty, took Scott, his slave, to Illinois, a free state. In 1836, Emerson's military career then took the both of them to the free Wisconsin territory known today as Minnesota. Both of these states, it is important to recognize, where both free states and both above the 36 degree 30 minute line. While Emerson and Scott were in Wisconsin, Scott married Harriet Robinson, another slave, and ownership of her was subsequently transferred to Emerson. Dr. Emerson himself took a bride while on a tour of duty in Louisiana, named Eliza Irene Sanford, whose family happened to live in St. Louis. While the slaves (Dred and Harriet) stayed in St. Louis with Eliza and the rest of the family, Dr. Emerson was posted in Florida in 1842, where the Seminole war was being fought. He returned a year later but died within... ...dment, which abolished slavery altogether, and the 14th Amendment, which pronounced all persons born in the United States to be citizens of the U.S. regardless of color or "previous condition of servitude." Also, this case was the first to employ the substantive due process clause which would be referred to again later in many other cases. AREAS FOR FURTHER STUDY There was one specific issue that puzzled me, and I confess I was unable to find any adequate answer to the query. I am referring to how a slave, in this case Dred Scott, was able to marry another slave, Harriet Robinson, in the free territory of Wisconsin, which was well above the 36 degree 30 minute line. Why was she a slave at all? Hadn't the Missouri Compromise, still constitutional in the 1830's, eliminated slavery there? Or perhaps she was not "technically" a slave at all but a free black living in that territory, then why would she marry a slave? And if she did, why would she then fall under the ownership of Dr. E merson if she had already been freed? This is an area I would suggest further research be employed so that our understanding of the slavery situation in the territories at this time be more fully enhanced.

Tuesday, November 12, 2019

Banking and Finance Law Essay

Joint account holders, case: Arden v Bank of New South Wales (1956) VLR 569 Combination of account, the bank’s right to combine accounts is dependant on the accounts being the same or closely similar. The right to combine accounts without express agreement: accounts must be held by customer in the same capacity, must not be an agreement or course of dealing with the customer which has negated the bank’s right to combine accounts, customer’s indebtedness must have been incurred to the bank as an banker and not in relation to other business carried on by the bank eg travel business. The main case of this rule is: Garnett v McKewan 1872. Knowing Receipt: Case: Thomson v Clydesdale Bank Ltd (1893) AC 282 APPLICATION Fantastic Landscapes is a customer of the Red Bank because it has accounts in this bank which are overdraft account with has a borrowing limit of $100000 accepted by Red Bank and another account has $20000 (Account No 2) Applying to the content of the contact, Fantastic Landscapes has signed an agreement form that is an express terms made between Red Bank and Fantastic Landscapes. The general terms and conditions included the following clause 12: upon receipt of each monthly overdraft account statement, the account holder shall read the statement and notify the bank of any errors contained in the statement within 15 days. Failure to notify the bank of any errors within that time will be treated as a breach of contract by the account holder entitling the bank to its remedies at law. Applying to the bank’s duty of confidentiality, the Red Bank recorded transactions between it and its customer (Fantastic Landscapes) and reported to its customer every 15 days as written in the general term. However, Red Bank did not complete its duty to question valid mandate because the cheques drawn by Minnie (one of the director of Fantastic Landscapes) within a period of 3 months are unusual drawn on Fantastic Landscapes’ overdraft account. When according to joint account holders, Ben actually is an innocent joint account holder, so he has a right to sue the Red Bank for the breach of contract. However, applying to the duty of customer in section duty to organize business, following cases: Lewes Sanitary Steam Laundry Co Ltd v Barclay Co Ltd (1906) 95 LT 444; and (6. 1) National Bank of New Zealand Ltd v Walpole and Patterson Ltd (1975) 2NZLR 7. The Red bank has an absolute advantage in this case because of the express term written in the contract Another director of Fantastic Landscapes, Ben has failed when sue Red Bank to recredit account which Minnie has stolen because he did not check overdraft account during 3 months, and in the contract with Red Bank has asked he to rea d and notify the bank of any errors contained in the statement within 15 days. Therefore, Ben or Fantastic Landscapes could not claim back $50000. When apply to combination of account, the Fantastic Landscapes has won in this lawsuit. The Red Bank has combined overdraft account and Account No 2 without any notice because they hear that this company has just lot a large landscaping contract and not working any more. Moreover, Red Bank has agreed Fantastic Landscapes to borrow maximum $100000, so they can not combine account without any notice to this company even though its overdraft account has reached to $100000. Therefore, Red Bank has to pay $10000 penalty fee for Fantastic Landscapes to the finance company. According to duty of the banker, the BLB (Big Lender Bank) does not have any duty to Fantastic Landscapes because in this case, its customer Minnie just is its client. Therefore, BLB do not have any duty to her company although she is a director in that company and she has committed fraud. Moreover, BLB do not care about how Minnie paid off her debt because Minnie did not withdraw money in the trust account. In addition, according to Thomson v Clydesdale Bank Ltd (1893) AC 282. BLB does not need to care about its customer detail particularly. Hence, the chances for Fantastic Landscapes win in this case in not to high than the case it won before when against Red Bank to reclaim $10000 penalty fee for finance company. CONCLUSION In conclusion, the Fantastic Landscapes has won in the case against Red Bank for compensation for $10000 penalty fee when they applied their case to combination of account. They won because Red Bank has committed the rule when combine two accounts without any notice to its customer. On the other hand, although the main fault belong to Minnie, the Fantastic Landscapes has failed in the case to recredit, its account when apply express term between it and the Red Bank. After all, the BLB do not have any duty to Fantastic Landscapes for compensation because when apply knowing receipt rule via Thomson case.

Saturday, November 9, 2019

Blood Bank Management

Abstract The purpose of this study was to develop a blood management information system to assist in the management of blood donor records and ease/or control the distribution of blood in various parts of the country basing on the hospital demands. Without quick and timely access to donor records, creating market strategies for blood donation, lobbying and sensitization of blood donors becomes very difficult. The blood management information system offers functionalities to quick access to donor records collected from various parts of the country.It enables monitoring of the results and performance of the blood donation activity such that relevant and measurable objectives of the organization can be checked. It provides to management timely, confidential and secure medical reports that facilitates planning and decision making and hence improved medical service delivery. The reports generated by the system give answers to most of the challenges management faces as far as blood donor r ecords are concerned. Chapter 1 1. 0 INTRODUCTION 1. 1 Background to the StudyBlood Donor Recruitment (BDR) is the process of drawing blood from a voluntary Blood Donor (BD) for future blood transfusion, Wikipedia (2006). In Uganda, blood collection, safety and management is an activity that is carried out by Uganda Red Cross Society (URCS) in partnership with Uganda Blood Transfusion (UBTS). Founded in 1939, URCS is part of the world wide Red Cross Humanitarian Movement whose mission is to mobilize the power of humanity for improving the lives of the vulnerable in Uganda, Muller (2001).URCS fulfills this mission while adhering to the principles of impartiality, neutrality, independence, unity, universality and voluntary service for the Red Cross/Red Crescent Movement. It operates throughout Uganda with 45 branch offices. Besides providing adequate supply of blood for transfusion, URCS is involved in the first aid services, road safety, tracing, disaster mitigation/preparedness, mob ilization for routine immunization, HIV homecare, youth empowerment and Community based HealthCare (CBHC).URCS had a manual system using paper cards to recruit BDs, collect/keep blood donor records and disseminate results to BDs who are scattered throughout the country. The paper card system (PCS) used to specifically capture personal data and medical history of the BDs. This information would be used in identifying/locating existing BDs, carrying out pre- donation counseling and taking blood results. Unauthorized persons however, easily accessed the paper system and hence making it impossible to keep secrecy and confidentiality expected of medical records.The security of the medical records was also not inadequate as any person could easily access them. Lukande (2003), states that such a system is time consuming, prone to errors of entry and analysis resulting from the fatigue of the users. The PCS at URCS had lead to accumulation of physical paper cards due to increasing number of blood donors, a situation that frustrated the system users because of the delays and at times failure to access historical records. The safe blood policy was lacking at URCS because the PCS could not cater for the key attributes of the policy.Gerard (2002), states that the main principles upon which the safe blood policy is based on are the informed consent, confidentiality and secrecy of the BDs. The Ethiopian Red Cross Society publication, Development in the 1990 states that information from blood donors should be completely confidential and if this is not assured, names of the blood donors should not be recorded at all and/or an alternative record identification should be used. Full implementation of the safe blood policy has called the use of information technology (IT) in providing working solution to the identified challenges.The associated problems with the PCS included delays in accessing historical records, inconsistencies and errors in data entry that stem right from acqu isition of data from the blood donors because the exercise is of routine nature and very tedious to the system users. The automation of the system using modern IT has improved the quality of service. Secondly, with the use of IT, now relevant and timely blood donor reports can easily be generated and hence facilitating planning and decision-making.Scolamiero (2000), recommends blood donor services automated information system as a solution to routinely collected, accurate and readily available information in blood transfusion services. It is also important to note that the impact of information technology on organizations is increasing as new technologies evolve and existing ones expand. According to Clifton (1995), nearly all business executives say that information technology is vital to their business and that they use IT extensively.Certainly business executives main concern is planning, coordination and decision-making, therefore, the role of IT in enhancing management of blood donor records is of major importance. In all, the computerization of blood donor PCS at URCS came at the ripe time given the background to the situation. This is more so because the demand for safe blood in Uganda has increased due to soaring increase in total population. Therefore, modern means to manage the PCS using IT had to take route. 1. 3 General ObjectiveThe main objective of the study was to create electronic blood donor management information system in order to assist in the management of blood donor records, planning and share information in a more confidential, convenient and secure way using modern technology. [pic] 1. 3. 1 Specific Objectives To conduct a study on blood donor management To design an electronic blood donor management system To validate the design using a prototype 1. 4 Scope The study geographically limited itself at the URCS blood donation/collection centers.It focused more on the acquisition, distribution and management of blood units for BDR activit ies. The study specially emphasized the creation and implementation of an electronic management information system that automated blood donor data acquisition and dissemination of results. This in turn will ease and speeds up the planning, decision-making process because of the timely, secure, confidential and reliable reports. 1. 5 Significance of the Study This study is important to URCS and the blood donors because it aimed at addressing problems of security, secrecy and confidentiality of blood donor records.It also strived to check the delays, errors, inconsistencies in medical records and timely access to historical records all of which had far fetched impact on planning and decision-making. The study resulted into the following benefits: It has eased the control and distribution of blood in various parts of the country basing on the hospital demands. URCS can now create market strategies for blood donation, lobbying and sensitization of the blood donors. Automated data acquis ition and quick access to medical records by the legal users of the system will be assured. [pic]It has eased the monitoring of the results and performance of the blood donation activity and hence relevant and measurable objectives of URCS are checked. It will continue to improve on the planning and decision-making process by providing to management timely, secure and confidential medical reports related to blood donation. It will also improve medical service delivery due to timely and easy generation of management reports by the relevant entities. The study will benefit the URCS management, who will find it easy to strategically plan, coordinate and take decisions concerning BDR activities.URCS counsellors on the other hand will be able to keep confidentiality of the donor’s results and disseminate blood results to donors with ease. Meanwhile that is the case, the automation of the data collection process will simplify the work of the data clerks. Equally important, the bloo d donormmobilizes will be have strong grounds for laying sensitization strategies between regions thatmyield more blood units and those with less. The study also has formed further environment of knowledge for students who may wish to take research in blood donor management. 2. Blood Donor Systems: Challenges and Successes The blood donation service involve a series of interdependent operations such as donor registration, donor screening/evaluation, blood collection, blood screening, inventory management and blood dissemination. Most of the popular existing blood information systems in the western world today are mainly online systems. The systems interfaces do not meet fully the blood safe policy described in this study and as such not suitable for illiterate population. Most blood donors in Uganda are rural based where online systems ay not be the best. The level of computer literate among the blood donors in Uganda is growing because the majority of them are school students. The main challenge remains customizing interfaces that are suitable for capturing basic donor information. Some of the attributes on the interfaces used in the western world such as state and province are not applicable in Uganda. Tripura blood donor information system is a good example of the blood donorsystem that is not suitable for Uganda. Also some key attributes such as age and sessions in [pic]Uganda are lacking on most the interfaces viewed. The interfaces also are not user-friendly as there are many links within the system that can easily confuse the system users and hence leading to data entry errors and boredom. At the Macau blood Transfusion Centre, system Integrado de Bancos de Sangue (SIBAS) works as its solution of computerized blood bank information system. SIBAS complies with the client/server infrastructure, as does its client, and provides an integrated environment for those isolated but interdependent operation in the blood center.With the introduction of the SIBAS t he blood service at Macau has been enhance in the following aspect. Operational efficiency- the processing time has been shortened in that blood donors need not fill in many regular items. On the other hand, the steps for donor cards are under full control and hence leading to donor satisfaction and confidence. There is also improved information consistency and validity. The Indian case study of Prathma Blood Center, Gupta (2004), promises insights into the integration of IS/IT in management of blood records.The Prathma Blood Center is a quest for modernizing blood banking. The entire function from blood donation to its testing and separation, storage, issue and usage have been integrated through a custom designed enterprise resource planning (ERP) software that minimizes human intervention and making it less error prone. The implementation of ERP in blood bank in India has registered many successes in medical data such as security, confidentiality, secrecy and quick retrieval of hi storical records all of which were challenges at URCS blood center.However, full automation of all blood donation activities like the case cannot be done in Uganda due to limited resources. It requires transition, as it is resource constraining in terms of IT, other equipments and human resources. 2. 3 Blood Donor Systems: Challenges and Successes The blood donation service involve a series of interdependent operations such as donor registration, donor screening/evaluation, blood collection, blood screening, inventory management and blood dissemination. Most of the popular existing blood information systems in the western world today are mainly online systems.The systems interfaces do not meet fully the blood safe policy described in this study and as such not suitable for illiterate population. Most blood donors in Uganda are rural based where online systems may not be the best. The level of computer literate among the blood donors in Uganda is growing because the majority of them are school students. The main challenge remains customizing interfaces that are suitable for capturing basic donor information. Some of the attributes on the interfaces used in the western world such as state and province are not applicable in Uganda.Tripura blood donor information system is a good example of the blood donor system that is not suitable for Uganda. Also some key attributes such as age and sessions in Uganda are lacking on most the interfaces viewed. The interfaces also are not user-friendly as there are many links within the system that can easily confuse the system users and hence leading to data entry errors and boredom. At the Macau blood Transfusion Centre, system Integrado de Bancos de Sangue (SIBAS) works as its solution of computerized blood bank information system.SIBAS complies with the client/server infrastructure, as does its client, and provides an integrated environment for those isolated but interdependent operation in the blood center. With the introdu ction of the SIBAS the blood service at Macau has been enhance in the following aspect. Operational efficiency- the processing time has been shortened in that blood donors need not fill in many regular items. On the other hand, the steps for donor cards are under full control and hence leading to donor satisfaction and confidence.There is also improved information consistency and validity. The Indian case study of Prathma Blood Center, Gupta (2004), promises insights into the integration of IS/IT in management of blood records. The Prathma Blood Center is a quest for modernizing blood banking. The entire function from blood donation to its testing and separation, storage, issue and usage have been integrated through a custom designed enterprise resource planning (ERP) software that minimizes human intervention and making it less error prone.The implementation of ERP in blood bank in India has registered many successes in medical data such as security, confidentiality, secrecy and qu ick retrieval of historical records all of which were challenges at URCS blood center. However, full automation of all blood donation activities like the case cannot be done in Uganda due to limited resources. It requires transition, as it is resource constraining in terms of IT, other equipments and human resources. SYSTEMS ANALYSIS AND DESIGN 4. 1 Introduction Following the literature review, background information and correlative knowledge regarding this research project follows.In the first part of this chapter, the demand and requirements of the proposed system are discussed and analyzed through dataflow diagrams, the entity relations model and the data dictionary. According to this analysis, the specification of the system is defined. This provides the foundation for chapter 5 (Implementation and Testing). This chapter presents the various design techniques and processes available for building web based applications. It explains the design technique chosen, showing its advanta ges and disadvantages. 4. 2 A different approach for designing web based applicationsTraditionally, software has been broadly classified into different categories. Some of these categories include real-time software, personal computer software, artificial intelligence software and business software. Web-based systems and applications (WebApps) such as web sites and information processing applications that reside on the Internet or an intranet, require a somewhat different method of development than these other categories of computer software (Pressman, 2000) [xx]. This is because web based systems involve a mixture of print publishing, software development, marketing, computing, internal communications, external elations, art and technology. WebApps are network intensive,content driven, continuously evolving applications. They usually have a short development time, need strong security measures, and have to be aesthetically pleasing. In addition, the population of users is usually d iverse. These factors all make special demands on requirements elicitation and modelling. 4. 3 Requirements and Analysis The requirement analysis stage of a software engineering project involves collecting and analyzing information about the part of the organization that is supported by the application.This information is then used to identify the users' requirement of the new system (Conolly et al, 2002) [xx]. Identifying the required functionality of the system is very important as a system with incomplete functionality may lead to it being rejected. A description of the aim of the project is given here along with details of the functional and non-functional requirements for the system. The test sheets for evaluating the completed system are also presented. [pic] 4. 3. 1 RequirementsThe requirements of the Web-based management information system are to develop: †¢ a web based front end for entering donated blood details including the donor, his/her blood group, sex, age, and status of the donated blood †¢ a web based front end for searching the information relating to a given donor or a given blood group; †¢ a facility to still enter donor and donated blood information via Endnote and also maintain the Endnote database using those details entered via the web front end and †¢ a facility to produce summary information of donor and donated blood particulars and any other related activities. . 3. 2 Functional Requirements In this research project we aim at developing a system which should improve on the current one with a lot of functionalities and therefore the Major target or goal here is to: †¢ to develop a blood donor database that can support the five above mention sub- databases that is to say; DonorDB, Donation DB, DiseaseDB, Transfusion DB and Statistical DB †¢ to develop a client interface that allows privileged users to carry out tasks such as inserting or modifying and deleting data in the database; to develop a searching functionality in order to allow normal and privileged users to search the details of a given donor, blood group, stakeholder and if necessary a type of disease common which causes one to need the donated blood †¢ to fully integrate the Web-based management information system to the World- Wide-Web and hence allow access from any Internet networked terminal and Web browser around the world; to develop a facility that can export details entered via the web front end to Endnote as well as import and confidential detail from the Endnote Database; †¢ to develop a functionality that produces summary information of required data to enhance decision making; †¢ to embed high security features in the Web DBMS to provide privacy, integrity; †¢ to allow privileged users to maintain the Web-based management information system by adding/deleting particulars, backing-up or resetting the database and extract online summary in the form of histograms for each donor and lists of f ree-format comments.Thus a graphical reporting tool should be provided for analyzing the data. †¢ and finally the system should be flexible enough to store data for several years and also be able provide sufficient User and Administration Guides. 4. 3. 3 Non-functional Requirements The system must be developed to suit the particular needs of a user-friendly environment. This means that the system must accommodate a clearly understandable user interface as well as clear online help documentation at any stage of the user interaction with the system.A fast response time in obtaining and providing information to the system may also prove to be a significant advantage. In addition to these requirements, the system should also embrace the following requirements:- Security: Each user is required to log in. The system should log staff that has been assigned user names and passwords. The system should be designed to make it impossible for anybody to logon without a valid username and pa ssword. Data encryption should be employed to keep the user login name and password secret.Reliability: The system would be used by about 50 staff working at the Red Cross head quarters and also some other many staff in the collaborating clinics and hospitals. The system should have little or no downtime and be able to handle multiple concurrent users. Ease of Use: The general and administrative views should be easy to use and intuitive. Online help and documentation should be provided. Performance: The system should have a quick response time. For the purpose of this research project, this would be defined as less than 5 seconds.System and Browser compatibility Testing: The system should be accessible on the following browsers – Microsoft Internet Explorer 5. 5+, NetScape Navigator 6. 0+ and Mozilla 1. 3+. System requirements: Red Cross society Uganda has a UNIX server. This system would be designed to run on a minimum hardware configuration of 500MHz x86 machines. Consideri ng the vast hardware available at the society , this would not pose any problems. Server Software: Operating System: Windows XP PHP version: PHP 5. 0+ Web Server: Apache Web Server. 2. 0+ Database: MySQL 4. 01+ [pic] . 4 Access Level Analysis In order to take closer look into what the system should do and how, it was necessary to decompose the system’s functionalities based on the user type and levels of access. The three main user groups and access levels are: †¢ Global User Group (normal access level) †¢ The Red Cross User Group (privileged access level) †¢ The Administration (privileged access level) Therefore, the requirements could be efficiently analyzed depending on the user group and the functionalities they should be allowed to perform. 4. 4. 1 Main System Page (Index)It is required for the system to provide a Main Page where any Global user (any user within and outside the Red Cross Organization) will be able to access. The main functionality of this page will be to allow any user to search the database by using information such as quantity of donated blood, available blood and the groups, or any other general information which may not be considered confidential. The search capabilities of the main page might not be limited to the exact blood donor, but may for example provide the means for displaying any information that might be relevant but not confidential.The Main Page should also include a Login facility for any privileged or normal user to be able to have access to more advanced functionalities of the System. 4. 4. 2 The Red Cross User Group When a Red Cross user has successfully logged into the system via the Main Page Login facility, it will be necessary for the system to display a specific menu with all available option that can be carried out. Therefore by taking into account the system requirements, it will be necessary to nclude options such as Enter donor details, Search donor, Use Endnote Facilities, Produce Summa ry Information as well as an option that will be related to the appropriate User Guide. A Logout option will also be appropriate for the Red Cross user to be able to logout when desired. 4. 4. 3 Entering-Amending Blood donor Details For a user to be able to amend and enter into the system’s database it will be essential to take into account that the blood donor system will be integrated to Endnote. Therefore, it will be essential for the system to provide to the user the exact fields as Endnote does for any particular type of details.In addition, when a particular of a given donor has successfully been submitted or amended into the database it will be essential for the system to display the appropriate message (i. e. Blood donor successfully entered into database). 4. 4. 4 Searching the Blood Donor Database The Searching Facility for the Red Cross user should not differ from the facility that will be provided on the Main Page of the system for all users. Therefore, the Red Cr oss user will be able to search any type of information in the database using the same way as specified for the Global User. 4. 4. 5 Producing Summary InformationFor this requirement it is essential to firstly understand why and when it will be used and to adjust the functionality to best suit these purposes. In order for the system to efficiently produce summary information it will have to provide a menu providing options such as Produce Annual Report, or Produce General Report etc. 4. 4. 6 Endnote Facilities In order for the system to be effective, it will be necessary for it to be integrated with the Endnote software. Therefore, it will be very significant to accommodate two options that will include Importing blood particulars from Endnote and Exporting blood particulars to Endnote.How this will be done will mainly rely on taking full advantage of particular Endnote filters that are provided for these reasons. 4. 4. 7 Administrator For maintenance purposes it will be of great si gnificance to include advanced Administrator functionalities that can only be accessed by this particular user group. The most reasonable options for an administrator to perform may include tasks such as deleting donors (should not be provided to the Red Cross user group for security reasons), Backing-up and Restoring the database, Resetting the blood donors database etc.In addition to these functionalities the administrator may also be asked to perform tasks related to Red Cross or Global user (i. e. Entering new donors, Searching for a given donor or available blood group) and therefore any functionality provided by the system must be included in the administrator capabilities. .5 Task Structure Diagrams For the development of a more consistent and effective system, it was essential to firstly identify which information should be included accomplish this, it was first of great significance to group all the relevant tasks (system functionalities) depending on the users.The way the systems tasks could be efficiently identified was by using a special technique from the Discovery method called Task Structure Sketching (Simons, 2002). 4. 5. 1 The Red Cross User Red Cross User Functionalities Fig 4. 1: The Red Cros User Task Structure Diagram Insert New Data Edit data Search for Data Produce summary Use Endnote Search for a recipient Search donors Search for disease Export d donations Weekly report Produce annual reports Import donations Search for hospitals Edit clinics Update data Edit donors -recipients Edit diseases Insert new disease Insert recipients Insert donor The Administrator UserAdministrator Functionalities Fig 4. 2 The Administrator Task Structure Diagram Red Cross user Functionalities Delete data Backup data Reset database Backup database Restore Database Delete a phased out disease Delete donor Delete recipient The administrator can perform any task that are performed by the Red Cross User 4. 5. 3 The Global User Global User Functionalities Search database Login Search by recipients Search by donors Search y Year Login as Red Cross User Login as Administrator Want to donate blood – 4. 7 Web Engineering Web engineering is the process used to create high quality Web-based systems and applications (WebApps).Web engineering (WebE) exhibits the fundamental concepts and principles of software engineering by following a disciplined approach to the development of computer-based systems, emphasizing the same technical and management activities (Pressman, 2000) [xx]. The design and production of a software product (such as a web application) involves a set of activities or a software process (Sommerville, 2004) [xx]. A software process model is an abstract representation of a software process. Three generic process models usually adopted in projects are †¢ The waterfall model – This has distinct project phases, which can be easily monitored.These phases are requirements specification, software design, implementation and testing. †¢ Evolutionary development – An initial system is developed quickly from abstract specifications. This is later refined with the input of the user to produce a system that meets the users needs. It is an iterative model. Two refinements of this approach are the incremental and the spiral models. The incremental model of evolutionary development delivers software in small but usable â€Å"increments†, where each increment builds on those that have already been delivered.The spiral model couples the iterative nature of prototyping with the controlled and systematic aspects of the waterfall model. †¢ Component-based software engineering – This is based on the existence of a large number of reusable components and is best suited in an object-oriented environment. A process model helps address the complexity of software, minimize the risk of project failure, deal with change during the project and help deliver the software quickly. For this pr oject two process models were considered: 1. Spiral model 2. A waterfall model. [pic] 4. A WebE Spiral model The spiral model shown in Fig 4. 4 is suggested by Pressman (2000)[xx]. The process consists of 6 main stages, outlined below: 1. Formulation: This is an activity in which the goals and objectives of the WebApp are identified and the scope for the first increment in the process is established. 2. Planning: This stage estimates overall project cost, evaluates risks associated with the development effort, prepares a detailed development schedule for the initial WebApp increment and defines a more coarsely granulated schedule for subsequent increments. Analysis: This stage is the requirement analysis stage for the WebApp. Technical requirements and content items to be used are identified. Graphic design requirements are also identified. Fig 4. 4: The WebE Spiral Model 4. Engineering: Two parallel set of tasks make up the engineering activity. One set involves content design and production, which is non-technical work. This involves gathering text, graphics, and other content to be integrated into the WebApp. At the same time, a set of technical tasks (Architectural design, Navigation design, and Interface Design) are carried out. . Page generation: This is the construction activity that makes use of automated tools for WebApp creation and the content is joined with the architectural, navigation and interface designs to produce executable Webpages in HTML. 6. Customer Evaluation: During this stage, each increment of the WebEprocess is reviewed. Powell (2002) [xx] presents a waterfall model for web engineering (Fig 5. 2). The advantage of this model is that it helps developers plan most of the work up front. 4. 9 Design Phase The design involves the production of technical and visual prototypes.This stage has some on-technical aspects such as gathering of web content. Powell (2002)[xx] points out that ontent gathering can be one of the biggest problems in we b projects. This clearly is not the ase with this survey application as there is very little content required. For the server side rogramming and other technical aspects of the design emphasis will be laid on such design oncepts and principles as effective modularity (high cohesion and low coupling), nformation hiding and stepwise elaboration. The goal is to make the system easier to adapt, ehance, test and use (Pressman, 2000) [xx]. 4. . 1 Producing HTML There are basically 4 methods of producing HTML – 1. Coding by hand using a simple text editor 2. Translation in which content produced in a tool such as note pad is saved as aHTML document. 3. Using a tagging editor that helps fill in the required tags 4. Using a â€Å"What you see is what you get editor† (WYSIWYG) such as MS FrontPage or Macromedia Dreamweaver ©. All these methods have their advantages and disadvantages. While coding by hand may be slow and error prone, it does provide great control over markup, a s well as help address bugs and new HTML/XHTML elements immediately.At the extreme, â€Å"What You See Is What You Get† (WYSIWYG) editors provide visual representation of a page and require no significant knowledge of HTML or CSS. However hey often generate incorrect or less than optimal markup and tend to encourage fixed size resentations that do not separate the look and the structure (Powell, 2003) [xx]. Putting all hese into consideration, a tagging editor, HTML-kit © was chosen for this work. While tagging editors can be slow and require intimate knowledge of HTML and CSS, they provide agreat deal of control and are a lot faster than hand editing. [pic] 4. 10 Architectural DesignWebApps fall into 4 main structures. They can be linear, grid, hierarchical, or networked (fig 4. 5). In practice most web sites are a combination of some of these structures. Fig. 4-5. Navigational Structures of websites/Web Applications ( Lemay, 2000) Considering the nature of this web applic ation, a combination of both hierarchical and linear structures will be adopted. The actual survey web pages will have a linear structure while the Admin pages will have more hierarchical nature. 411 Database Design Database design involves the production of a model of the data to be stored in the database.A data model is a diagram of the database design that documents and communicates how the database is structured. The database design methodology followed in this project is that suggested by Connolly et al(2002)[xx]. Connolly presents quite a detailed guide to designing database but not all of those steps may apply here, as this project is not too complex. The design process is divided into three main stages – conceptual, logical and physical database design. The purpose of the conceptual database design is to decompose the design into more manageable tasks, by examining user perspectives of the system.That is, local conceptual data models are created that are a complete an d accurate representation of the enterprise as seen by different users. Each local conceptual data model is made up of entity types, relationship types, attributes and their domains, primary keys and integrity constraints. For each user view identified a local conceptual data model would be built. (Connolly et al,2002) [xx]. In building the conceptual data model, a data dictionary is built to identify the major entities in the system. An entity relationship (ER) diagram is used to visualize the system and represent the user’s requirements.The ER diagram is used to represent entities and how they relate to one another. The ER diagram also shows the relationships between the entities, their occurrence (multiplicities) and attributes. Following the view integration approach, a different data model (ER diagram) is made for each user Data Dictionary Entity Name Description Donors A person who donates blood Recipients A person who receives blood Diseases The diseases which are foun d in the infected donated blood Blood group The blood that is donated by the donors Hospital/ClinicHospitals to which donated blood is distributed Staff Red Cross staff District Districts from which donors and recipients originate from Table 4. 1: Data Dictionary 4. 11. 1 Conceptual Database Design In this stage, a local conceptual data model is built for each identified view in the system. Alocal conceptual data model comprises of entity types, relationship types, attributes and their domains, primary and alternate keys, and integrity constraints. The conceptual data model is supported by documentation such as a data dictionary.The entity types are the main objects the users are interested in. Entities have an existence intheir own right. Entity types are identified and their names and description are recorded in adata dictionary. Care is taking to ensure that all relationships in the users requirements specification are identified. An Entity-Relationship diagram is used to represe nt the relationship between entities. The multiplicity of each relationship is included. This is because a model that includes multiplicity constraints gives a better representation of the enterprise.Relationship descriptions and the multiplicity constraints are recorded in the data dictionary. Each model is validated to ensure it supported the required transactions. Entity name Attributes Description Data Type Size Nulls Multi Valued Donors donorId (PK) -dNames -sex – dob – distId (FK) – doreg Donor identification number Donor’s names Donor’s sex Date of birth District of origin Date of registration Text Text Text Date Int Date 8 30 6 30 3 30 No No No No No No No No No No No No Recipients -rId (PK) -rNames -sex – dob – distId (FK) – doreg Recipient’s identification umber Recipients names recipient’s sex Date of birth District of origin Date of registration Text Text Text Date Int Date 8 30 6 30 3 30 No No No No N o No No No No No No No Diseases -dId (PK) -dNames -drating Disease identification number Disease names Disease rating on how people are infected from it Text Text text 8 30 20 No No No No No No Blood bGroup(PK) donorId (FK) rId (FK) status Blood group Donor identification number recipient identification number status of the donated blood whether infected or not Text Text Text text 2 8 8 15 No No No No No No No No Hospital/Clinic hId (PK) hNames distId (FK) Hospital identification number Hospital name District identification Number text text int 8 100 3 No No No No No No Staff staffId (PK) staffNames sex dob department Staff identification number Staff names Sex Date of birth Department to which the staff belongs text text sex date text 8 50 6 15 100 No No No No No No No No No No District distId distName District number District name int text 3 100 No No No No Entity name Multiplicity Relationship Entity Name Multiplicity Donors 1 Donates Blood 1 Recipients 1 Receives Blood 1 Disease s Contained in Blood 0 .. * Blood 1 Donated by Donor 1 .. * Hospital/ Clinic 1 Receives Blood 1 .. * Staff 1 Registers Donors 1 .. * District 1 Has Recipients 1 .. * Table 4. 2: An extract from the data dictionary showing a description of the relationships between the entities. 4. 11. 2 Logical Database Design The process of logical database design constructs a model of the information used in an enterprise based on a specific data model, such as the relational model, but independent of a particular DBMS and other physical considerations (Connolly et al, 2002)[xx].The logical database design consists of an ER diagram, a relational schema, and any supporting documentation for them. In the logical data model, all attributes of entities are primitive. Producing a logical data model involves normalization. The aim of normalization is to eradicate certain undesirable characteristics from a database design. It removes data redundancy and thus prevents update anomalies. Normalization helps increase the clarity of the data model. Integrity constraints are imposed in order to protect the database from becoming inconsistent.There are five types of integrity constraints – required data, attribute domain constraints, entity integrity, referential integrity and enterprise constraints. The resulting relations are validated using normalization. For this project, producing relations in third normal form (3NF) will suffice. Non-relational features, such as many-to-many relationships and some one-to-one relationships, are removed from the conceptual data model. The design is also reviewed to make sure it meets all the transaction requirements. [pic] 1.. * 1.. 1 1.. * 1.. * 1.. 1 1.. 1 registers Donors PK donorId Names sex dob FK distId doreg District PK distId distName Recipient PK rId rNames sex dob FK distId doreg Hospital PK hId (PK) hNames FK distId Staff PK staffId staffNames sex dob department Diseases PK dId dNames drating Blood PK bGroup FK donorId FK rId status Fig. 4. 6: The ER diagram 4. 11. 3 Physical Database Design Physical database design translates the logical data model into a set of SQL statements that define the database for a particular database system. In other words, it is the process of producing a description of the implementation of the database on secondary storage.It describes the base relations and the storage structures and access methods used to access the data effectively, along with associated integrity constraints and security measures. The target DBMS in this case is MySQL. The following translations occur: 1. Entities become tables in MySQL. 2. Attributes become columns in the MySQL database. 3. Relationships between entities are modeled as foreign keys. Donation Process View Video †¢ [pic] Getting Ready for Your Donation †¢ †¢ The Donation Process Step by Step †¢ †¢ After the Donation To get ready for your  donation: | |[pic] | |Make an Appointment | |It always helps us to know in adv ance when you are coming in to make a donation. | |[pic] | |Hydrate |[pic] | |Be sure to drink plenty of fluids the day of your donation. | |[pic] | | |Wear Something Comfortable | | |Wear clothing with sleeves that can easily be rolled up | | |above the elbow. | |[pic] | | |Maintain a Healthy  Level of Iron in Your Diet  Before | | |Donating | | |If possible, include iron-rich foods  in your diet, | | |especially in the weeks before your donation. | |[pic] | |Bring a List of Medications You Are Taking | |We will need to know about any prescription and/or over the counter medications that may be in your system. |[pic] | |[pic] |Bring an ID | | |Please bring either your donor card, driver's | | |license or two other forms of identification. | |[pic] | | |Bring a Friend | | |Bring along a friend, so that you may both enjoy | | |the benefits of giving blood. | |[pic] | | |Relax! | | |Blood donation is a simple and very safe procedure| | |so there is nothing to worry about. |

Thursday, November 7, 2019

Maya Angelou essays

Maya Angelou essays The great dancer, playwright, songwriter, poet, author, historian, director, performer, and civil rights activist known as Maya Angelou was born on April 4, 1928 her childbirth name being Marguerite Johnson. Growing up she underwent many hardships, including her parents divorcing and being sent to live with her grandma. Upon turning eight she was sexually assaulted, the man that did this was soon murdered. This being a traumatizing event it silenced her. For four entire years she refused to talk to anyone except her brother, Bailey. After graduation she become a single mother of a son, Guy. Seven years later she married, and adopted the stage name Maya Angelou, Maya is what Bailey called her, and Angelou her new married name. Going through so much at such a young age is unimaginable. In 1954, Maya begun touring with a chorus know as Everyman's Opera Company. This interested her in writing lyrics; these lyrics she writes soonturn into poetry and short stories. This is when her career really starts to develop. Next she moves back to Brooklyn, New York, to join the Harlem Writers Guild. Maya directs her first play, "Cabaret for Freedom" over these years she struggles with her husband and remarries to Vusumi Make, a freedom fighter of South Africa. The next year her and her son Guy move to Africa where she continues her craft of writing sharing her knowledge in Cairo, Egypt, becoming the editor of the Arab Observer. Next she starts educating in a more serious way, in a classroom. Maya serves as assistant administrator at the School of Music and Drama, University of Ghana. Students loved her. She had a natural way of communicating with and teaching these young adults. In 1963 two years later she becomes a feature editor for the African Review; and contributor to the Ghanaian Times and Ghanaian Broadcasting Company. 1970 is one of her most famous years, she authors "I Know Why the Caged Bird Sings" a autobiographical no...

Tuesday, November 5, 2019

Cover Letter Sample Applying for Content Editor Job

Cover Letter Sample Applying for Content Editor Job SAT / ACT Prep Online Guides and Tips According to author Nick Hornby, "The secret of good writing is to cut it back, pare it down, winnow, chop, hack, prune, and trim, remove every superfluous word, compress, compress, compress." The same could be said to bethe secret of writing good cover letters! Since the writer of this next sample letter is applying for the position of Content Editor, she especially needs toshow strong editingskills in her letter. Read on to see if Leila successfully compresses her cover letter into the most persuasive points. Cover Letter Sample for Content Editor Position Leila Shadi1709 Broderick St.San Francisco, CA 945 May 1, 2016 Mr. Ernie SandersChief Marketing OfficerGlobex Tech55 Valley RoadPalo Alto, CA 95014 Dear Mr. Sanders, I was pleased to find your posting for HeadContent Editorwith Globex Tech on MediaBistro.com. I’ve been following your company for the past several months and would be thrilled to contribute to its mission of engaging IT content with global reach.As a Content Editor with CloudArk, I possess both the editorial expertise to grow readership and the leadership experience to manage a team of writers. Please allow me to highlight my skills as they relate to your stated requirements. As a Content Editor with CloudArk, I have Effectively managed a team of five writers; led bi-weekly strategy meetings; assigned topics and projects and maintained editorial calendar. Increased blog readership from 1,000 unique visitors monthly to 50,000 unique visitors monthly in eight months. Produced several viral campaigns with over 10,000 social media shares. Oversaw creation of a bi-weekly newsletter and daily maintenance of social media channels, including Facebook, Instagram, Twitter, and Pinterest. Demonstrated excellent writing, editorial, and marketing skills and thorough knowledge of trends in IT industry. Maintained productive and positive relationships with coworkers characterized by open communication, creative support, and mutual respect. I’m inspired by your mission to create informative and accessibleIT content and have several ideas for editorial directions that I’d love to discuss. I will call you on Monday to see about arranginga meeting. In the meantime, please don’t hesitate to contact me by phone or email. My professional resume and portfolio of writing samples are attached. Thank you for your time, and I look forward to speaking with you soon. Sincerely, Leila Shadi Leila Shadileila.shadi@gmail.com555-555-5555 Leila sounds like she's had a lot of success as a Content Editor. Will a position as Head Editor be next? Content EditorCover Letter: The Breakdown Leila chooses to present her skills and experiences by bullet point in her cover letter. This list format allows her to pare down her qualifications to the essentials and present them in a clear, easy-to-read manner. While you can write out your cover letter, a format like the one Leila uses can also be an effective way to stick out from the crowd. Leila customizes her letter by stating at the beginning that she's been following the prospective company for some time. She gives specific examples of her experiences and uses data to quantify her accomplishments. She also conveys enthusiasm with her proactive call to action at the end of her letter, saying that she'll call on Monday to set up a meeting. This language can be useful for some jobs, though applicants should carefully consider whether the hiring manager might perceiveit as pushy. Overall, Leila has produced a clear cover letter that highlights her professional achievements as they relate to the new job. The bullet point format allows her to cut down unnecessary wordiness and get straight to the heart of what she wants to say. In addition to the bullet point format, Leila also usestraditional headers in her letter. Should you add those headers to your cover letter, too? A Note on Format While the sample cover letter above uses a traditional format with headers and a signature, your cover letter doesn't necessarily have to. If you're sending your letter as a Word attachment or hard copy, then these headers are a nice touch, especially if they match the formatting on your resume. Lots of organizations, though, expect you to send your cover letter in the body of an email or a text box on their application websites. As both of these modes tend to use plain text, you usually don't need to dress up your cover letter with headers or any extra formatting. You can just start right in with the salutation. If you're not including your email and phone number in a header, then you should probably make sure you add it in your conclusion. Make sure the hiring manager can clearly see how to contact you. Once you've figured out formatting, you can focus the rest of your energy on filling your cover letter with impressive content! What's Next? Care for another sample? Click here to read a cover letter for the position of Customer Experience Representative with an eyeglass company. Are you looking for more cover letters? Check out our full cover letter guide with writing tips and five more samples. If you're writing a cover letter, you should check out our cover letter template. This guide has tips for format, structure, and foolproof phrases, and it leads you through each step of the writing process.

Sunday, November 3, 2019

Contemporary Issues In Marketing Essay Example | Topics and Well Written Essays - 2500 words - 2

Contemporary Issues In Marketing - Essay Example Though the customers perceive the whole thing as a single offering but actually customers reacts differently to each element of the marketing mix. If each part of the marketing mix acts differently and contradicts each other, then it creates an ambiguous effect that makes the customers behave in a confused manner and they tend to purchase product from other companies who have defined brands (Foxall, 1981). The method of marketing mix is used by the marketing manager to produce optimal response in the target market. By creating a perfect blend of the marketing mix elements such that they are utilized in an optimum way. All the elements in the marketing mix are controllable variable and can be altered to meet the need of the target market and the environment. Hence marketing mix is most useful tool to design the strategy and achieve success in the target market (Bootwala, Lawrence and Mali, 2009; Botha, Bothma and Brink, 2005). This study focuses on the use of the marketing tool for a restaurant chain in London that aims to generate a positive experience for the customers. Marketing Mix for the service chain The marketing mix for the service industry deals with the 7P’s like product, price, place, promotion, people, process and physical evidence. Product The package or product in the service industry is seen as a bundle of benefits and features, which has a close relevance to the target market. This makes it important to develop the service product or the benefit package to meet the expectation of the customer. The products offered by a restaurant can be classified into five levels like core benefits, basic product, expected product, augmented product and potential product. Core benefit is the fundamental service or benefit that the customer is buying. Basic product indicates the basic functional attributes of the product that is offered by the service provider. Expected product is the attributes that are normally expected by the customers. Augmented produ ct indicates the facilities or services that are provided by going beyond the expectations of the customers. Potential product are those that are created by innovation and distinguishes the service provider from others operating in the market (Srinivasan, 2012). In case of the restaurant chain the core benefit will be the taste of the food and the Italian cuisine in which it specialises. Studies have shown that eating habit of the people of London has undergone dramatic changes due to the opening of restaurants of diverse tastes specially French, German, Italian, Australian etc (White, 2011). The basic product will be foods and drinks of diverse origin and taste. The expected products that the restaurant offers is cleanliness and good ambience that is perfect for family and official dining. Augmented services would include just in time services, aroma and music. The potential product that would make the restaurant most distinguishing is the Italian food and some dietary foods; since people of London are now getting more and more diet concerned and health conscious (Wheelock, 1997). Price Competitive pricing should be done in order to be acceptable to the customers. It is the general tendency of the customers to link the price with the product or services offered by the organization. In simple words it indicates that the pricing of any product or services is largely influenced by the quality perceived by the customer