Thursday, December 26, 2019

Roman Empire The Greatest Empire Of That Time - 1131 Words

Roman Army Ancient Rome was an empire that stretched over two million square miles, at its height. It reached the shores of the Rhine River to the Caspian Sea, and along the outskirts of Africa to Spain (Eyewitness to History, 2007). The empire was an advancement for humankind, combining multiple cultures for trading, and the collaboration of different peoples for science. Overall, it was an empire so large, that during that time, one in every four people on the planet were under Roman rule (PBS, 2014). However, it wasn’t like that all the time. The early Roman army was a simple Greek phalanx, a rectangular formation of heavy infantry. Later, emperor Servius Tullius introduced the census, and divided the citizens of Rome into recruits for the army, organizing and reforming it. The ancient Roman Empire was considered the greatest and most formidable empire of that time period (753 BC – 476 AD) (Scaruffi, 1999). This was due to a multitude of reasons, the most prominent being the wa ys of the Roman army. The Roman Army has specific traits that made it so powerful. Its advanced tactics, training methods, and reforms made it a highly reliable and successful army, and has greatly influenced today’s militaries. The Roman Army’s tactics are still taught today in History classrooms around the globe. They have an everlasting legacy on modern military. In most modern armed forces, a person only moves up ranks if he or she maintains extreme discipline and respect towards all higherShow MoreRelatedthe roman empire is the greatest civilization of all time1187 Words   |  5 PagesThe Roman Empire was the period of time after the Roman Republic and before the Byzantine Empire from 29 B.C. to A.D. 476. It was the highest point of Roman civilization, greater than any prior empires and towers over even the empires after it; it triumphed over the world . The Roman Republic was what built up the foundation for the Roman Empire. During the Republic, a small group of people started from scratch and developed their own systems, which later develops into the Roman Empire. The strongRead MoreRoman Empire Essay1583 Words   |  7 PagesDuring the time of (31 B.C.E-476 C.E) the Roman Empire had been ruled by a series of Roman emperors who had been increasingly dependent for the highly structured state of bureaucracy. The Gupta/Maurya during the time of (320 B.C.E-520 C.E.) was by way of imperial power based on family lineage. The Roman heartland was centered in Italy. Even after Italy had been conquered, it still stayed at that single peninsula that had been bounded by the Mediterranean Sea and the Alps Mountains. As for the MauryaRead MoreEssay about The Roman Empire979 Words   |  4 Pagesdiscussing the greatest empires in the history of the world, one that will always be included in the conversation is the Roman Empire. With an empire that spread from Hadrian’s Wall to Arabia, it is considered one of the mightiest empires in history. There was no single factor or individual that can be considered to be the driving force behind the success of the Roman Empire. It is rather a success founded upon political policies, military strength and cultural prosperity. No empire in history hasRead MoreWhat were the Primary Reasons for the Fall of Rome?1024 Words   |  5 PagesRome was quickly becoming one of the world’s greatest empires with their excellent military conquering territory from modern day Scotland to Spain. After the Punic Wars and the defeat of Carthage, Rome had full control of the Mediterranean region, establishing colonies in North Africa, Egypt, the Middle East, and Asia Minor. Julius Caesar became Rome’s first emperor using his military influence. Under his reign, Rome shifted from a republic to an empire under the rule of an emperor and the militaryRead MoreA Brief Note On The Punic Wars And Rome1713 Words   |  7 Pagesdestruction of Carthage (History.com Staff). At the time the war broke out, Carthage was the world’s leading maritime power in the Mediterranean and Rome was the dominant power in the Italian Peninsula (History.com Staff). In the First Punic War, Rome defeated the Carthaginians at sea and Sicily became Rome’s first overseas province (History.com Staff). This First War ended with Rome in control of Sicily and Corsica resulting in the Roman Empire’s rise to a naval power in addition to land powerRead More Rise and Fall of the Roman Empire Essay1091 Words   |  5 PagesThe Romans were on one of the greatest people of all. They had power, wealth, and even a half of the world. They built one of the strongest and vast empire that world has ever seen. They came from nothing to something awesome. It started of as a city and ended up being one of the greatest empire of all. This essay is going to focus on the Roman Empire from the rise to the fall and the government, architecture, mythology, Family Structure, and Food of the Romans. As the story goes, Rome was foundingRead MoreEssay on The Rise and Fall of The Roman Empire1033 Words   |  5 PagesStrategy. One of the greatest and most predominant empires ever built that controlled and reined over much of the entire continent of Europe is known as the Roman Empire. The Romans were beyond the most tactical and strategic army, and obtained the most authoritative military control throughout ancient history. The Roman Empire was not only a militia of brute force and authority, but their political systems also were amongst the most developed and functional governances. The Romans contained a civicRead MoreROMAN EMPIRE AND THE HAN DYNASTY IN CHINA1441 Words   |  6 Pagesï » ¿ROMAN EMPIRE AND THE HAN DYNASTY IN CHINA Rodrick Carter HIEU 201 Liberty University 29 November 2014 Roman Empire and the Han Dynasty in China The Roman Empire and Han Dynasty in China are two kingdoms that, despite the geographical difference between them, managed to achieve great success and failure in equal measure. Both were characterized by imperial dynasties that were headed by the emperors and they held large territories. Both of these kingdoms faced various challenges afterRead MoreOctavius : The Savior Of Rome1339 Words   |  6 Pagespowerful Roman emperor in war and peace and was often known as the savior of Rome. Octavius wanted the Roman empire to be the greatest of all time. This made him do whatever it took to make sure he accomplished that. Octavius did not act like a normal emperor, he was quite humble in the way he ruled. He knew what he had to do to win political battles and physical battles. He was quite smart in the way he became the greatest emperor Rome has ever seen. Octavius became the most powerful Roman emperorRead MoreThe Fall Of The Roman Empire1404 Words   |  6 PagesThe Fall of Rome The Fall of the Roman Empire, one of the greatest empires that human civilization has ever encountered, is viciously debated today among scholars all over the world. No one theory is the absolute truth as there are many fatal factors and mistakes that forged the collapse of this supreme civilization. Problems ranging from political instability, to different economic predicaments, to barbaric invasions, to imperialistic ideologies, the empire just became too complex for its own good

Wednesday, December 18, 2019

John Audubon is arguably the greatest American...

John Audubon is arguably the greatest American artist-naturalist that has lived. (Pg.17 of source #4) He was intrigued by the natural world and at the same time enjoyed the elegant feeling painting brought him. Although he is not the first artist to attempt to paint and describe all the birds of America, â€Å"he was the young countries dominant wildlife artist for over half a century. Audubon used his artistic skills to portray American birds in their natural habitat. His knowledge on birds, the environment and artistic practices made his work extremely different from others. Through his art he dismays an intense affection for birds by using a scientific and objective approach. His passion for exploring the beauty of birds and the nature that†¦show more content†¦The journal describes in his journey to England to find a publisher of his â€Å"colored drawings†. Upon his arrival he soon found success. Everyone enjoyed the richness of his works. Audubon learned that i n the art world you had to be disciplined, diligent and open to anyone who wanted to help him. This attitude got many of his paintings out into the art world and his name was eventually well known throughout Europe. Audubon developed his own method and style for drawing birds. First, he would kill the bird using a fine shot, then would use wires to prop them into a natural position unlike many ornithologists who would stuff the birds posing them in rigid positions. He would prepare the bird, study it and draw it multiple times before starting the final piece. His paintings are set true-to-life in their natural habitats and he portrays them as if caught in motion, especially feeding and hunting. JJA worked primarily with watercolors. Almost all of his paintings include watercolor, especially his works from earlier in his life. He would also use gouache, black ink, metallic, pastels and graphite. In addition to faithful renderings of anatomy, Audubon also utilized constructed composi tions full of drama and exaggerated posses to achieve artistic as well as scientific effects. â€Å"White-Breasted Nuthatch† is a beautifully detailed watercolor, graphite, pastel and black ink on paper. The picture is so detailed, so full of life and color that it looks

Tuesday, December 10, 2019

Ten Years of Tracking Online Education in the United States

Question: Discuss about the Case Study for the Ten Years of Tracking Online Education in the United States? Answer: Introduction With the advancement of technology, the education system has changed a lot. Students are able to undertake cloud based education over the air (Grabara Bosun, 2014). Such a type of education may also be referred to be the distance education. On the other hand, there is the campus-based education, which is the traditional system of education. With the progress of time, the education courses and style has changed a lot that creates a win-win situation for both university and candidates. On one hand, traditional campus based education helps in delivering most detailed style of education and on the other hand, online education or online courses helps in delivering study materials over the internet that supports learning method for candidates who are associated with any job or other education (Allen Seaman, 2013). Here arises the main question that whether the online education is as effective as campus-based education or not. Candidates are getting the best knowledge from traditional campus based education and on the other hand, from online courses candidates are able to get a huge amount of study materials and supporting course guides that are too much related to the current educational materials (Boud et al. 2014). Thus, some major questions can be listed down in this regards, which are: Are candidates able to get the best knowledge of educational course from online education? Are the candidates able to clarify their doubts instantly through online means of education? Does the online system of education save time for students with regards to related course learning? The above-mentioned study questions are enough for the critical evaluation of online style of education. Three more supporting points that will be discussed in this essay are Effect in relation between candidate and tutor in both campus drive education and online education Degree of gap creation between tutor and student in both campus drive education and online education Ability of tutor to judge a students performance in both campus drive education and online education In this essay, the above-mentioned questions and supporting points will be critically discussed and the consequences of both online education and campus-based education will be evaluated critically with proper evidences as examples. Finally, in the conclusion, personal opinion will be given regarding the topic. Comparison of online based education with campus drive education The three main sections that will be discussed are already mentioned in the above questions. Now further discussion will be accomplished one by one for each question. Knowledge gathering In the first question, one of the major issues of online education has been highlighted. With rise in professional courses, the specification of online courses is increasing day by day. According to Andres, (2015), online course of education is mainly for those students who are not able to avail time for deeper offline course. Some of the major reasons are such as the candidates are associated with several additional activities in their career and hence they are not able to get time for offline education. Many students are related with arts and graphics and activities related to sports, which they consider as their primary field. Such students are not able to get adequate time to go to college and hence they prefer learning from home. This type of education is also known as distance education. According to Bossi, (2015), online education does not provide enough knowledge of educational course. Most of the online education sectors deliver many study materials with the progress of course and even provide huge amount of test-guides or practice materials. Thus, it becomes hard for the student to practice the test papers as they often they do not get proper assistance from the tutor. On the other hand, Choshanov (2015) has pointed out that online education helps in delivering the most current study materials that are suitable for the candidates and even the most widely used question pattern is delivered to the students. Thus, it becomes easy for the students to get the most advanced knowledge of the course with which he is associated. According to Clark, (2015), online means of education is widely accepted just because of the fact that tutors are able to deliver the links of authentic sites and online libraries by which candidates are able to get the most advanced knowledge of educational course. On the other hand, Diwan, (2015) has contradicted that through online means, tutors are not able to relate with students and the possible improvements that the students require. Thus, it becomes difficult for the student to relate with teaching style and as a result, a gap is generated between the tutors and candidates. According to Habib, (2015), campus based education is the oldest form of education that gives the deepest knowledge of course. Students are able to raise their doubts and seek help from the tutors. Education is interactive, and hence candidates need to cooperate with tutors and even the tutors must evaluate the shortcomings that the students face. In this way, a cordial relationship is sustained between both teachers and students in campus based educational course. On the other hand, Hajdicsne Varga, (2015) has contradicted that campus based education follows the age-old books and the libraries are containing very less number of books, which are not sufficient for completing assignments. As a result, students are found to take help from educational companies to get their assignments done against certain amount of payment, which is an unethical behavior (Waldrop, 2014). For example, most of the students from Australia are found to take help from online educational companies, where they are found to buy their projects. There are a whole lot of such educational sites, that help the students to get highest marks in graduation. Thus, from here it can be said that students are lacking knowledge in campus-based education, and they finally need to get assistance from online education. On the other hand, it must be said that online education is the supportive sector to enhance knowledge of students as the core and basics of the related educational course can only be provided through campus education (Beetham Sharpe, 2013). From the above discussion, some vital implications of online education can be concluded. Both online and offline education is required for students of this era. The online education just forms a supporting base of primary education courses (Stromquist Monkman, 2014). Study materials that the online companies deliver to the students, forms as the base of practice but the main basics are learnt from offline campus educational course. Thus, it can be said that the consequence of online educational course will not perfectly serve in educating students, whereas offline course will serve in adequate knowledge base creation of students. If students rely only on online course they will not get best knowledge. It can even be said that online course is just for such candidates who does not get enough time for college courses and hence they need to have distance course of learning, by which they will be able to sustain both career related competencies and simultaneously get the certificate of course completion (Cusumano, 2013). Clarification of doubts University students at present are facing trouble related to tough projects. Professors are not able to allocate time for each of the students and hence, it is found that students do not get assistance from the campus professors. On the other hand, Kravtsov, (2015) pointed out that universities or colleges allocate separate tutors for online education courses but students do not find the availability of teachers at the time of their requirement. In the campus education system, students are able to raise their questions or doubts at the time of urge and hence doubts are easily clarified within very less time. It is found that number of students in technical field is of more number than students of non-technical field. The number of tutors is less in technical department and hence most of the tutors are not able to clarify the doubts of the students (Siemens, 2013). From here it can be understood that in both of the sectors, whether online or offline, students are not able to get proper assistance from the tutors. According to Lee and Son, (2015), offline education courses give the ability to students to get verbal assistance from the tutors. The gap between tutors and students are comparatively lower than online educational courses as tutors can differentiate the students and their understanding ability. According to the understanding ability, tutors specifically educate the campus students. On the other hand, according to Nakai, (2015) it is often found that students fear in clearing their doubts in the class as tutors may humiliate one particular student in front of other. Thus, students find the online educational course to be the better sector as they will be able to minimize their humiliation. According to Nissen, (2015), time taken for doubt clearance in online method of education does not let the students to get prompt assistance from tutors. The students have their account where they need to drop query regarding the course progress, and the time taken for doubt clearance varies according to the availability of tutor. On the other hand, Opletalova, (2015) has pointed out that with huge level of doubts, the same tutor for the particular student may not be available at the time of urgency, and hence the new tutor generally gives a different answer to the doubt raised by the student. As a result, quality education is hampered through online means of education. For example, Case Western Reserve University in Ohio, forms the online system of education as well as campus based education. Students who are in campus, they are basically from local towns. The online education is generally for such students who are from different states and even from foreign countries (Spada, 2014). Such students do not have enough time to complete their graduation course or master degree. Hence, the students opt for online education system so that they can handle their both career perspectives and simultaneously achieve their certification of related course. It is found that such distance education does not maturely end up the course, as students are not able to clarify their doubts in the online system of education. The time required for doubt clearance takes a huge time, which indicates communication is lacking(Yuan et al. 2014). Still, it is a benefit for both management and student, as students are able to undertake simultaneous activities, and even management is getting their timely fees. From the above discussion, certain consequences and implication can be ascertained. Students, who are engaged with online course of education, are able to get responses from the tutor only when the tutors are online otherwise it will be too much late for the students to get reply (Kuo et al. 2014). On the other hand, offline course of education such as college campus, students are able to clarify their course related doubts right from the required teacher. In online course, teachers who are having their shifting duty are able to communicate with the students at the time of their working hours and hence any student doubt that arise post their duty are not entertained (Masud Huang, 2012). Thus, if any other teacher is clarifying the doubts, then surely quality of education is hampered. In this way, a relational gap is created between both the teachers and students. As a result, the tutor is even not able to communicate at the time of requirement. The most widely used method of online teaching is that an account of student is created and any requirement or study material is uploaded for the respective students and they are only able to get access when they open their account (Yuan et al. 2014). Thus, any query that is raised, takes more time than usual traditional campus education style. Time saving At most, of the time it is seen that students of different universities are engaged with several other activities other than educational course. According to Tao, (2015), a high percentage of students in the recent era are quite familiar with certain activities that are other than education. Students have not restricted themselves to one particular field such as education but are always engaged with activities that are other than education, and are found to be highly successful in their career. Huge amounts of students are engaged with sports, painting, arts, and music and are too much engaged with such activities all the daylong (Rutherford Kerr, 2014). For such students who are having a very busy schedule, are not able to get best education from the college as they found to be very rare in college sessions. On the other hand, Wang, (2015) pointed out that a lot of students are engaged with part-time jobs to simultaneously earn and learn. Hence, as time is quite low, it becomes tou gh for the students to carry on parallel activities. According to Werbiska, (2015), college campus education system is best for those who what to get successful in their career through qualitative educational background. On the other hand, Bray et al. (2015) pointed out that online course of education is particularly for those students who just need a certificate in their life to get eligible for certain positions that are non-educational background. From here it can be said that students who are highly engaged with different course of activities other than education, for them online educational course is the best suitable. Candidates who are having busy schedule or who are not getting enough time for studies, are the one who are engaged with online course of education (Simpson, 2013). In order to save time, such students find online educational course to be best option. Students are benefitted with both sides as in simultaneous manner they are able to learn and carry out their jobs. The tendency of online education is too much common for those who are wanting to save time against money. For example, in the United States, the Call Centre jobs considering both inbound and outbound are huge in number. As candidates are trying to be independent from their early stages if life, they opt for online education, so that they can carry on both education and part time out-bound service (Young, 2012). As a result, candidates are able to get knowledge that is more practical in corporate sector and finally they are able to be more success in terms of finance. On the other hand, Vexler et al. (2014) pointed out that campus based education system is related with such students who want to be qualified graduates and whose target is to work with MNCs. With deeper knowledge of course, such offline campus students are having more theoretical knowledge of study materials than that of students who are engaged with distance education. Thus, it can be said that both types of educations are having their own benefits that will be vary among students. Online system of education is much related with such people who are both talented or having average merit. The examinations in the online method of education are configured through IP address. The exams are carried out over the air and students are able to give the exams right from their home. According to Fumasoli and Huisman, (2013), online exam is rather quite opaque as the authenticity of education is tremendously limited. It is quite sure that students will be not able to use other websites during examination, as real time exams will be carried out via IP tracker, but still students may cheat using books or helps from other candidates surrounding them. Thus, the reliability of examination is very much limited for online courses. On the other hand, Lai et al. (2014) pointed out that university students sit for the most authentic examination as they are guarded with faculties and invigilators. The evaluation of students is done in the most authentic way in campus-based education. It is found that students who are certified through online system of education do not get appreciated in several corporate sectors and they are not selected in interview (Bacow et al. 2012). This is because, corporate officials are quite aware about the difference between qualified and non-qualified candidates. Evaluation of students is done because of merit but not through degree certification. Thus, often it is found that attrition rate is increasing in the SMEs as they are not able to get most suitable candidates with average pay scale. If the implication and consequences are considered, then it can be said that it depends upon students whether they are being benefitted by online education or campus based education. For those students who needs to save a lot of time, are the best suitable for online education. If students are wanting to build their career in non-educational field such as sports, arts, painting, entertainment, then surely online basis of education is the best option for them (Yuan et al. 2014). On the other hand, if students are wanting to build their career in top MNCs, then campus based education is the best option for them. From the discussion, it is clear that online-based education serves benefits to certain group of candidates but if overall field is considered, then campus education system is the best suitable education system. Conclusion While discussing the above arguments and evidences, it can be said that both online and offline system of education are required for candidates. University students are having a huge amount of pressure and they do not get proper guidance from the teachers in timely manner. In such a situation, online system of education serves as the supportive structure of education, from where students get the best knowledge of current environment. As the study materials are updated twice a year, hence candidates are able to get most required knowledge for completion of projects and assignments. This can even be said that campus based education is not the most perfect style of education as a high percentage of students need to rely on online education provided by other private certified organizations. From the discussion, it is evident enough that online system of education is limited to accessibility as there is a huge communication gap between students and teachers, which is negligible in offline traditional campus based education. Cordial coordination between students and teachers are not available in online system of education, whereas in campus based education candidates are able to instantly clarify their doubts. Finally, it is evident enough that campus based education is generally for students who are wanting to build their career in the most concrete way so that they become qualified enough to serve for top organizations. To conclude, it must be jotted down to support the questions formed earlier. Candidates are able to get the supportive knowledge of educational course from online education. Candidates are not able to clarify their doubts instantly through online means of education. Online system of education saves time for students with regards to related course learning. The supportive points can also be addressed such as effect in relation between candidate and tutor in both campus drive education and online education is different. In campus drive education, students are able to sustain a more cordial relationship with the tutors. Degree of gap creation between tutor and student in both campus drive education and online education is huge and ability of tutor to judge a students performance is better in campus drive education than in the online-based education system. Reference Allen, I. E., Seaman, J. (2013). Changing Course: Ten Years of Tracking Online Education in the United States. Sloan Consortium. PO Box 1238, Newburyport, MA 01950. Andrs, S. (2015). The Higher Education System in Argentina. Networks, Genealogies and Conflicts.Creative Education,06(18), 1943-1959. Bacow, L. S., Bowen, W. G., Guthrie, K. M., Lack, K. A., Long, M. P. (2012). Barriers to adoption of online learning systems in US higher education. New York, NY: Ithaka S+ R. Beetham, H., Sharpe, R. (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. routledge. Bossi, E. (2015). Language, Literacy, and Learning in STEM Education.System,50, 76-77. Boud, D., Cohen, R., Sampson, J. (Eds.). (2014). Peer learning in higher education: Learning from and with each other. Routledge. Bray, M., de Castro, B. V., de Guzman, A. B. (2015). Confronting the shadow education system: What government policies for what private tutoring?. The Asian Journal of Educational Research and Synergy, 3(1). Choshanov, M. (2015). Education and National Security: System Deficiencies of Mathematical Education In Russia And The USA.Obraz. Nauka, (8), 15. Clark, J. (2015). Indian medical education system is broken, Reuters investigation finds.BMJ,350(jun18 3), h3324-h3324. Cusumano, M. A. (2013). Are the costs of'free'too high in online education?.Communications of the ACM, 56(4), 26-28. Diwan, R. (2015). Small schools in rural India: 'Exclusion' and 'inequity' in hierarchical school system.Policy Futures In Education,13(2), 187-204. Fumasoli, T., Huisman, J. (2013). Strategic agency and system diversity: Conceptualizing institutional positioning in higher education. Minerva, 51(2), 155-169. Grabara, J., Bosun, P. (2014). Consideration on online education in Romania. International Letters of Social and Humanistic Sciences, 14, 59-65. Habib, S. (2015). Maulana Abul Kalam Azad and His Ideas about the National Education System.Contemporary Education Dialogue,12(2), 238-257. Hajdicsn Varga, K. (2015). National Defence Education in the Hungarian Educational System.Hungarian Educational Researcch Journal,2015(4). Kravtsov, S. (2015). The System of Checks and Balances in General Education Management.Russian Education Society,57(6), 429-441. Kuo, Y. C., Walker, A. E., Schroder, K. E., Belland, B. R. (2014). Interaction, Internet self-efficacy, and self-regulated learning as predictors of student satisfaction in online education courses. The Internet and Higher Education, 20, 35-50. Lai, F., Liu, C., Luo, R., Zhang, L., Ma, X., Bai, Y., ... Rozelle, S. (2014). The education of China's migrant children: The missing link in China's education system. International Journal of Educational Development, 37, 68-77. Lee, J., Son, J. (2015). Perceptions and Needs of Parents on the System of Special Education Assistants.Special Education Research,14(2), 105. Masud, M. A. H., Huang, X. (2012). An e-learning system architecture based on cloud computing. system, 10(11). Nakai, A. (2015). Scenario Development for Safety Training/Education System in Chemical Plant.Science Journal Of Education,3(3), 68. Nissen, S. (2015). Reforming the Continuing Medical Education System.JAMA,313(18), 1813. Opletalov, A. (2015). Financial Education and Financial Literacy in the Czech Education System.Procedia - Social And Behavioral Sciences,171, 1176-1184. Rutherford, A. G., Kerr, B. (2014). An inclusive approach to online learning environments: Models and resources. Siemens, G. (2013). Massive open online courses: Innovation in education.Open educational resources: Innovation, research and practice, 5. Simpson, O. (2013). Supporting students in online open and distance learning. Routledge. Spada, K. (2014). Higher Education in the Digital Age [Book Review].Professional Communication, IEEE Transactions on, 57(2), 150-153. Stromquist, N. P., Monkman, K. (Eds.). (2014). Globalization and education: Integration and contestation across cultures. RL Education. Tao, C. (2015). Reform of the Engineering Mechanics Course System.Creative Education,06(12), 1403-1406. Vexler, V. A., Bazhenov, R. I., Bazhenova, N. G. (2014). Entity-relationship model of adult education in regional extended education system.Asian Social Science, 10(20), 1. Waldrop, M. M. (2014). Massive open online courses, aka MOOCs, transform higher education and science. Wang, A. (2015). The wear out effect of a game-based student response system.Computers Education,82, 217-227. Werbiska, D. (2015). Teacher Evaluation in Second Language Education.System,52, 154-156. Young, J. R. (2012). " Badges" Earned Online Pose Challenge to Traditional College Diplomas. Chronicle of Higher Education. Yuan, L., Powell, S., Olivier, B. (2014). Beyond MOOCs: Sustainable online learning in institutions. Cetis. White paper. Recuperado de https://publications. cetis. ac. uk/2014/898.

Monday, December 2, 2019

Using M

Activity Introduction The use of mobile applications in the classroom has immensely changed the learning system worldwide. Earlier, Educationists were reluctant to adopt this new mode of learning as they viewed the technological change as a threat to the morals of the school-going children. Currently, Educationists are turning to e-readers, iPads, iPods, Personal Digital Assistants (PDAs), and even notebooks (Wylie, n.d.).Advertising We will write a custom assessment sample on Using M-Learning Applications to Enhance Learning specifically for you for only $16.05 $11/page Learn More In mobile learning (m-learning), one is free to study at any time and place of his/her choice. Notably, most generation Ys are always attached to their new gadgets; the educationists ought to take advantage of this situation and develop applications that can help this generation. Mobile phones are similar to pocket friendly computers. Designing Learning Activities In an Englis h class, a teacher can use these technological applications to motivate his/her learners. For example, learners can use a designed mobile-assisted language learning (MALL) in developing their listening skills, advance their vocabulary, pronunciation, and better understanding of socio-cultural practices. The teacher should use the iMovie application in order to maintain the motivation level of the learners. This application can help in developing an audio dictionary, which the learners can use to study the meaning of words and their synonyms at anytime and anywhere (Valarmathi, 2011). In addition, students can record their own definitions and mail to the class website so that they can rate each other’s posting. Activities that engage learners tend to stimulate their creativity and ability to work towards perfection. Evidently, the rating system will not only act as a source of motivation to the kids but also enhance their daily learning program. Remarkably, kids who are shy, n ervous, and slow will use this opportunity to learn how to listen to the audio programs in their free time. Further, the children should practice role-playing, movie making, and simulation; these activities will enable them come up with new words, for instance, using cameras on their phones to record videos. As a result, the learners will practice and easily comprehend new activities that the teacher brings for discussion. Moreover, learners who have challenges in pronunciation, for example, verbs, will find this application extremely useful as they will be able to store these pieces of information for their farsighted revision in the future (Drury, 2012). As a rule, pronunciation evaluation is automated online to give instant feedback to the learners on their progress. In storing information, the learners should use the Evernote ipad application.Advertising Looking for assessment on education? Let's see if we can help you! Get your first paper with 15% OFF Learn More Evernote is a user-friendly application that stores information; therefore, the students can retrieve, edit or delete this information. In addition, social networks like Facebook and Tweeter can prove helpful to the kids; they can recognise, deduce, paraphrase, and even compare verbs after bookmarking or commenting on these activities. In addition, it motivates the learners to use these apps. Applications like Google docs and Docs To Go can prove helpful to the kids in developing independent learning skills. Equally, the learners would access these pieces of information at their own times and places. In bridging the gap between theory and practice, the children should use their phones and take pictures or record videos of different events and post in the Evernote. They can include actions like storytelling sessions and song presentations. As a teacher, I can create a Facebook page for the English subject; this will be a discussion board, where the kids can articulate their ideas, or express their perceptions. Mobile learning in a language classroom (2012) asserts that the arguments among the learners will enhance their understanding of the concepts and even develop their cognitive skills. The learners should also practise to play games and carrying out problem-based learning activities. This process increases the learners’ online interaction; hence, they will be able to practise teamwork (Palalas, n.d.). As the teacher, I will be updating the games at a given interval to maintain the kids’ attention to the learning site. In addition, I will post audio stories on the class profile so that they can listen to the audio program and, simultaneously, read the printed text. After the reading, they should answer questions that follow. Consequently, the students will rehearse the story in order to submit correct answers. In line with this, other programs like poems will enhance their rehearsal and procedural mastery. Mobile Learning Strategy Introduction An effective mobile learning blueprint does not only demands for the knowledge of our intended destination but also how we will gauge our success (Garg, 2010). In considering a mobile learning strategy, I will evaluate the techno savvy ability in my audience/organization. Notably, in the strategy, I will try to provide a cost friendly mobile application for learning. In addition, I will ensure that I inculcate the recent technological changes on the mobile industry. The app should also be user friendly so that members in the organization can quickly adjust to its operation mode.Advertising We will write a custom assessment sample on Using M-Learning Applications to Enhance Learning specifically for you for only $16.05 $11/page Learn More Aiming at a specific device In targeting the organization, I will devise a program that operates in most mobile devices because it is costly to incorporate all the gadgets in the program. On the other hand, the organiza tion can supply a specific gadget to all members. This action will reduce the production cost since a specific mobile app will be able to operate in all the gadgets. It is also factual that not all devices that the trainees have are similar. Design for Performance and Support While training members of an organization on new issues at the workplace such as employees’ conducts or on contemporary issues like gender issues, climate change, and Corporate Social Responsibilities (CSR), I will design a mobile application that takes a short time (Garg, 2010). The intention herein is to maintain the attention and interest of the participants. Markedly, this type of learning can take place from any point and anytime. For instance, a sales representative who is meeting other clients will prefer going through a short bursts of explanations so that he/she can manage the clients at the same time. The design, hence, will glue the participants on their devices in order to comprehend the conc ept. Avoiding large chunks of content The design should not have large chunks of information that will seem difficult to process. Therefore, I will portion the ideas into small and manageable lumps, as this will minimize the excessive scrolling of data. Distinctly, I will include flash cards at the end of each theme to summarize the whole content. According to Galhotra (2012), this step helps in enhancing deeper understanding of the contents since human beings tend to store information in their short-term memories before allowing it into the long-term memories; this memory stores limit information. This idea is related to the cognitive aspects. It will immensely affect the comprehension and concentration level of the trainees, therefore, I will develop this app to assist the trainees in comprehension. Eliminate interface and code complexity In the design, I will consider that most mobile devices have limited processors and small screens. Again, most trainees may not be possessing so phisticated phones with large processing capacities. As a result, it will be practical to opt for a simple user interface that has all the necessary functionalities. The design will be accommodating the trainees’ devices.Advertising Looking for assessment on education? Let's see if we can help you! Get your first paper with 15% OFF Learn More This will enhance the independent learning skills in the trainees since they are familiar with the operating systems in their mobile devices (Osborne, 2012). Additionally, the new interface will motivate them to study its contents or features. The mobile devices that the members possess, therefore, act as a guide in designing the mobile learning strategy. The simple HML coding is applicable in this scenario. The feature will be compatible with many mobile devices, reduce the size of files, and even accelerate the downloading rates (Galhotra, 2012). Besides, data accessibility among the participants will be upgraded using the Open Source Products (OSPs). OSPs also give the locals the opportunity to tailor the data according to their environment. These features enable members to handle the information acquired properly as they can store the data in their best way, which they can retrieve effortlessly. Clearly, they are able to change the data to fit their needs, thus enhancing their i ndependent skills. Use of inherent Mobile Device Apps and Features I will explore all features of any mobile device in order to design an interactive content. These features, like those of iPad and iPhone, have a wide choice of modifications that can be highly interactive. An inclusion of these apps helps in increasing efficiency because of the availability of the devices. Consequently, the trainees will be able to bridge the gap between theoretical aspects of data storage to the practical features (Osborne, 2012). Inclusion of Collaborative Learning Since people have these mobile devices at all times, they can use them for interaction or communication purposes. For that reason, I will ensure that social networking is enhanced among the members of my organization by including this important application. The learning process will go a notch higher than before, as members will be able to share ideas, discuss issues amongst themselves, and connect with each other. Moreover, they will b e able to send videos or pictures to colleagues. In this effect, such an environment will make all members feel that their contributions are valued. The inclusion of these apps builds and maintains motivation among the members. Conclusion Mobile devices are gadgets that are efficient in terms of time management as they are available at any instance. In addition, they have the ability to cater for a large population compared to other learning systems. Practically, it is easy for a person to forget a textbook than a mobile phone showing there is an urgent need to change from e-learning to m-learning. An educationist, therefore, should withdraw the total negative perception of not allowing learners to handle mobile devices, especially in schools. For example, how do we expect the learners to change the world when we are deterring them from accessing the new technological developments? Yet, we claim that technology will continue changing the world. This irony is unacceptable, and a dras tic step should be taken to involve everybody in this new venture. The technology ought to be included in the classroom learning under the supervision of the facilitators to prevent cases like cyberbullying, sharing and viewing of wrong contents, and even control cases of phishing scams and hacking. Finally, if the educationists can design and supervise the implementation of an effective e-learning, hopefully there will be many more things to come. References Drury, E. (2012, September 10). Mobile Phones in the Classroom: Teachers share their Tips. The Guardian. Retrieved from http://www.guardian.co.uk/teacher-network/2012/sep/10/mobile-phones- classroom-teaching Galhotra, A. (2012, May 15). How to Develop Your Own Mobile Learning Tools. Edudemic. Retrieved from http://edudemic.com/2012/05/how- to-develop-your-own-mobile-learning-tools/ Garg, A. (2010, July 14). How To Create Successful M-Learning Strategy: mLearnCon – Part II. Upside Learning, India. Retrieved from http://ww w.upsidelearning.com/blog/index.php/2010/07/14/creating-successful- mobile-learning-strategy-mlearncon-part-ii/ Mobile Learning in a Language Classroom. (2012, July 29). Slide share. Retrieved from www.slideshare.net/titova/mobile-learning-in-language- classroom-13793622 Osborne, C. (2012, April 10). The Pros and Cons of Social Media Classrooms. ZDNet | Technology News. Retrieved from http://www.zdnet.com/blog/igeneration/the-pros-and-cons-of-social-media- classrooms/15132 Palalas, A. (n.d.). Mobile-Assisted Language Learning: Enhancing Student Learning with Mobile Phones. Contact North | Contact Nord. Retrieved from http://www.contactnorth.ca/pockets-innovation/mobile-assisted-language- learning Uys, P. (2004, February 12). Creating and Executing A Successful Mobile Learning Strategy. Slide share. Retrieved from http://www.slideshare.net/puys/creating-and-executing-a-successful-mobile- learning-strategy-a-charles-sturt-university-case-study Valarmathi, K. E. (2011). Mobile Assisted Language Learning. Journal of Technology for ELT, 1(2). Retrieved from https://sites.google.com/site/journaloftechnologyforelt/archive/april2011/mobileas sistedlanguagelearning Wylie, J. (n.d.). Mobile Learning Technologies for 21st Century Classrooms. Scholastic.com. Retrieved from http://www.scholastic.com/browse/article.jsp?id=3754742 This assessment on Using M-Learning Applications to Enhance Learning was written and submitted by user Jayden E. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

Armorial dish Supper at the House of Simon the Pharisee essay

Armorial dish Supper at the House of Simon the Pharisee essay Armorial dish: Supper at the House of Simon the Pharisee essay Armorial dish: Supper at the House of Simon the Pharisee essayArmorial dish: Supper at the House of Simon the PhariseeTin-glaze decoration pottery presents an amazing world of paints, ornaments and forms. Although several centuries have passed since maiolica gained popularity among the Italian artisans, the entire collection goes on fascinating and inspiring today’s visitors of the exhibition. Here, mythological and biblical subjects are met side by side, and together this thematic direction is known as ‘istoriato’ style. It goes without saying that historiated imagery is rather helpful and informative. On the one hand, it is a significant cultural and historical source because it reflects important events and facts of the past. On the other hand, most of the dishes fulfilled not only a decorative role, but were also used in household. In this way, maiolica also reflects the household realities and tableware nuances typical for Italy of the 16th century. Joined to gether with aesthetic significance, the facts listed above make this exclusive type of decorated pottery extremely attractive for both specialists and common people. This study is intended to analyze the attractiveness of Italian maiolica by the example of one of the most extraordinary works in the collection, Armorial dish: Supper at the House of Simon the Pharisee made by maestro Giorgio Andreoli in 1528.The subject of Armorial dish: Supper at the House of Simon the Pharisee is devoted to one of the Biblical scenes, conventionally known as the story of Jesus’ feet anointed in the house of a Pharisee. Jesus’ visit to Simon the Pharisee is described in the Gospel according to St. Luke (New Jerusalem Bible, Luke 7.36-50). To be more specific, the plate presents a scene of a feast. One of the guests is Jesus sitting on a divan. Together with a woman by His feet, He makes up a critical segment of the work. They are not placed in the center of the composition, still the fo cus is deliberately made on them. The dish is a traditionally round plate, and the Biblical subject is placed at the main part of it. The round shape of the plate creates an illusion of a peeped scene, as if the viewer looks at it through a round opening. Such an illusion fills the artwork with a mysterious allure and grabs the viewer’s attention the same moment he or she comes in touch with it.The rim of the plate is, meanwhile, decorated with an exquisite ornament. The ornament includes elaborately produced grotesques, arabesques, and strapworks. The elements of the ornament do not have a direct connection with the subject, but they edge the composition making it look completed and add the sense of relief to it.As it has been already mentioned, the literary source for the subject is the Gospel according to St. Luke. It is written that Simon the Pharisee invited Jesus to his house despite the common attitude of this sect to Him. Jesus could not decline the invitation because it was His rule to communicate with all the estates. Simon was probably driven by curiosity or had a will to assert himself through the act of condescending patronage to a poor man. What is more, he probably wanted to test Jesus and get an evidence of His fraud. As a result, however, he received an evidence of his own delusion. For Simon the Pharisee, Jesus was not among the respected guests, so he did not care to provide Him with traditional honors, such as washing the feet and anointing the head with oil. While rest of the guests were surrounded by slaves’ care and provided with comfort, there suddenly appeared a woman to eliminate the injustice. In that town, the woman was famous for her sins. Driven by sincere emotions, Mary came to Jesus, washed His feet with tears, dried them with her hair and anointed with an expensive ointment from an alabaster cruse. While Simon omitted all the traditional courtesies, Mary did more than the most respected guest could expect: â€Å" I entered into thy house, thou gavest me no water for my feet: but she hath wetted my feet with her tears, and wiped them with her hair. Thou gavest me no kiss: but she, since the time I came in, hath not ceased to kiss my feet. My head with oil thou didst not anoint: but she hath anointed my feet with ointment† (New Jerusalem Bible, Luke 7.44-46). It is this moment that is fixed at the dish made by maestro Giorgio Andreoli. Still, the full sense of the scene can be understood only if to read the chapter further. Simon the Pharisee is naturally struck by the event, but even more is he struck by Jesus’ reaction of not pushing the sinful woman from Him. According to Simon’s logic, Jesus tended to be a prophet, and being a prophet, should have seen who the woman was and should defend Himself from her mud. Simon made a conclusion that Jesus could not understand who the woman was and this fact proved to him that Jesus was a pretender. However, Jesus could easily read the thoughts of Simon the Pharisee and, in response, told him a parable about debtors who could not pay a debt to their creditor. God is a mighty creditor for all the people on earth and all of them have a lot of debts to pay and know chance to do it. But Jesus explains that the debts will be forgiven for love, and such people as Mary are the first to be forgiven because of their sincere repentance and strong faith. This subject provides essential material for thinking about vanity and arrogance personified by Simon the Pharisee on the one hand and obedience and humility personified by Mary on the other hand.As the dish is rather big (18 5/16 inches in diameter), it is enough to carry such a complex narrative composition and is also rather convenient in studying the image. The author of the dish borrowed the composition from Marcantonio Raimondi’s engraving of the same subject. It is worth of noting that Marcantonio Raimondi’s engravings were rather popular as a source for maiolica artisans, but the armorial dish under consideration is considered to be one of the most extraordinary works of that time. The scene is draped with dark-blue curtains that correlate with the clothes of Jesus and Mary of the same color. There are two painted pieces on the wall, and they seem to be the two parts of the same painting because their contents supplement each other. The dishes are on the table, and a little slave brings some more for the guests. The scene would be conventional if the woman did not do such an unprecedented honor to the least honored guest of the house. Therefore, the overall impression of the dish can become rather strong if a viewer finds strength and wish to go deeper into its sense. One can even suppose that the curtains framing the story are meant for the viewer to go to the backstage hidden in the book of the New Testament of the Bible.Since the work is entitled as an armorial dish, it apparently means that the dish did not have a utilitar ian meaning, but was an important component of the patron’s coats of arms (heraldry). It seems not to be used in household, but to have a great decorative meaning for its master and further owner. On the other hand, the subject of the product includes a scene of mealtime and being evaluated by its surface could easily accompany a grand dinner or a ceremonial feast. The more obvious the association between the mealtime and the conventional purpose of a dish, the stronger the contrast between first impression and the true meaning of the subject.All in all, Armorial dish: Supper at the House of Simon the Pharisee is an eloquent example of how painting on pottery can make a profound impact on a viewer. No manufacture can be compared with craft production of decorative arts like that presented in this collection. Maybe golden and silver tableware could be more expensive and respectful, but this kind of production has shown its own bonuses. It could be either utilitarian or decorat ive, but more often majolica played both of the roles, so it makes the collection of tin-glaze decorated pottery meaningful and informative.

Saturday, November 23, 2019

Let Me Not to the Marriage of True Minds by William Shakespeare Essays

Let Me Not to the Marriage of True Minds by William Shakespeare Essays Let Me Not to the Marriage of True Minds by William Shakespeare Paper Let Me Not to the Marriage of True Minds by William Shakespeare Paper Basically, this poem is about love, but here shakespeare has discussed the love which is in his mind. you may disagree with him if you like. The first stanza in this poem is a quatrain and its rhyme scheme is abab. Shakespeare uses alliteration, assonance, consonance, and repetition to develop this stanza, which, as a whole, states that love does not change. The first line contains an example of alliteration in the words â€Å"me,† â€Å"marriage,† and â€Å"minds. † In this line, he is referring to love as â€Å"the marriage of true minds. † He uses the alliteration of the â€Å"m† sound to draw attention to his view of love as being a type of marriage. The words â€Å"admit† and â€Å"impediments† in the second line are examples of both assonance and consonance because of the identical â€Å"i† and â€Å"m† sounds. The second, third, and fourth lines of this stanza contain repetition. â€Å"Love,† â€Å"alter,† and â€Å"remove† are repeated to put emphasis on the points that he is trying to make. He is saying that if a person is really in love he or she would not have to make changes in their lover to make themselves happy, and that love cannot be taken back. The second stanza of this poem is a quatrain with a rhyme scheme of cdcd. This stanza contains assonance, a very clever metaphor, and personification in stating that love is ever-lasting and can be used as a guide in life. The words â€Å"star† and â€Å"bark† in line eight of the poem contain assonance of the â€Å"a† sound. Shakespeare uses this assonance to bring attention to the metaphor he is using, which compares love to the North Star, which is a guide for ships. By following their hearts, people can use love as a guide to get them through life. Also, the North Star is relatively permanent, and Shakespeare says love is an â€Å"ever-fixed mark† in line five of the poem. Line eight refers to a star when it says â€Å"Whose worth’s unknown, although his height be taken. † Stars have neither ownership nor a set gender, so this line contains personification. Shakespeare speaks of love as if it were human to express the importance of it. The third stanza of this poem is another quatrain and its rhyme scheme is efef. Personification, assonance, and consonance help to get the point across that love is independent of time. In lines eight and nine, Shakespeare says â€Å"Love’s not Time’s fool, though rosy lips and cheeks within his bending sickle’s compass come. Even though beauty fades with time, love does not. Shakespeare personifies time to help express that love does not operate on any specific clock. He even capitalizes â€Å"Time† as if it were a real person’s name. He also personifies death in line nine when he refers to the bending sickle, which would be the weapon of the infamous reaper. Death can t ake away physical traits, but not true love. Shakespeare intentionally expresses his view of love as not yielding to time or any other force. The use of the words â€Å"but† and â€Å"bear† in line twelve of the poem is an example of alliteration. Shakespeare uses these words to help express that love can survive anything on its own despite the pressures and influences of time. The fourth and final stanza of this poem is a couplet with a rhyme scheme of gg. In this stanza, the poet-speaker boasts how confident he is in his opinion of love, suggesting that if his opinion is wrong, no one has ever loved. In line fourteen, the poet-speaker declares â€Å"I never writ, nor no man ever loved. † The words â€Å"never,† â€Å"no,† and â€Å"nor† are an example of alliteration. These negative words are used to strengthen the poet-speaker’s certainty of his opinion of love. Line fourteen also has internal rhyme. â€Å"Never† and â€Å"ever† are positioned before the word â€Å"loved†. Shakespeare uses this internal rhyme to make it clear that the speaker has full faith in his own words. William Shakespeare’s poem â€Å"Sonnet 116 is an excellent poem. Using multiple literary tools, such as metaphors, personification, and internal rhyme, Shakespeare has created a masterpiece that describes love by what it is and is not. Because of the brilliant use of tools and flow in this poem, it will remain one of the best poems ever written.

Thursday, November 21, 2019

Reflections on reading Essay Example | Topics and Well Written Essays - 250 words

Reflections on reading - Essay Example Main hero, Zach is a complicated, not an ordinary person, who is put by author in not a casual kind of circumstances. Maybe this novel is even metaphorical: for example, Zach’s roommate in rehab has a name Raphael, what calls up a parallel with name Raphael like the angel’s name. (Koenig, L.) â€Å"Hairstyles of the Damned† by Joe Meno I loved most. It’s entertaining and helpful for young people, and a little bit philosophical – all at ones. This novel gives reader an opportunity to feel like you are (or were) not alone with your teenage problems, and believe, that if everyone is going through it, you also will. First love and sex, complexes about the way you are and way you look, problems with friends, parents and at school – it’s all common teenage problems. To my mind, such books should be written for a different ages, because in every age there are specifical problems and fears, and in every age it’s important to feel you’re not alone. I also loved the main hero for his mistakes and his honesty to himself. It’s often we can not explain all our emotions to other people, even to family and friends, but it’s important to confess your feelings to yourself and be not ashamed of what you desire. So after the end of my literature class, that force me to read, I think I still be reading sometimes for all three reasons: to know briefly something new, to think about high important things together with the intellectual author and to feel I’m not alone with something that bothers me right

Wednesday, November 20, 2019

Current Event Paper- Marketing Essay Example | Topics and Well Written Essays - 1000 words

Current Event Paper- Marketing - Essay Example The most interesting fact is that word-of-mouth adverting penetrates into online environment becoming one of the adverting tools in the Internet. Today, for many companies a website is the main tool on the basis of which the firm carries out the transactions flow between itself and the buyer. In indirect marketing the company utilizes the services of various types of independent marketing organizations or cooperative organizations that are located in the home country. When a manufacturer exports indirectly, the responsibility for carrying out the foreign selling job is transferred to some other organization. For instance, the Wee Ninja doll is one of the popular toys for children available online. Smiths and their partner use online marketing as one of the main tools of adverting and sales. They state that it is more â€Å"about personal taste and online conversation as they are about buying itself, although no products are sold on the sites† (Schneider, 2006). As businesses compete in a progressively fiercer market place for a larger wallet share of an increasingly discerning and diverse customer base, they become ever more communication-dependent. On the one hand the right to be informed of the facts involved in any buyer-seller relationship is clearly a fundamental right. Some of the key aspects, which have already been subject to legislation or regulation in Europe, include the full cost of credit/loans taken up, often known as truth-in-lending; the true cost of an item, under the slogan unit pricing; the basic constituent elements of products, known as ingre ­dient informative labeling; the freshness of foods, discussed generally as open-dating; and truth-in-advertising. â€Å"Patti Freeman Evans, a senior retail analyst at Jupiter Research, added: â€Å"Shopping tends to be a social experience in the offline world† (Schneider, 2006). The emergence of direct marketing, customer relationship management, and various other marketing

Sunday, November 17, 2019

Monarchial constitution Essay Example for Free

Monarchial constitution Essay Under the monarchial constitution of the United Kingdom (UK), the majority of prerogative powers are now exercised by the government in the name of the Crown. There are two principle definitions of Royal Prerogative (RP); that of Sir William Blackstone and that of Professor A. V. Dicey. According to Dicey, RP is defined as the residue of arbitrary or discretionary authority, which at any given time is legally left in the hands of the Crown. RP has several defining characteristics RP is inherent to the Crown, derived from common law, exercised by the government on behalf of the crown, the powers are residual and RP legitimises government actions without the need for an Act of Parliament (AOP). Before the 17th century, the monarch had all three powers, the legislative, executive and judicial powers. The judiciary started gaining independence since the Case of Prohibitions 1607 and was fully independent after the Act of Settlement 1700, which effectively removed the power of the monarch to remove a judge at will. The independence of the legislature started with the Case of Proclamation 1611 and culminated in the Bill of Rights 1689, which curbed future arbitrary behaviour of the monarch and guaranteed Parliament’s power vis a vis the Crown. With these changes made to the UK constitution and as support grew for a democratic government, RP seemed out of place in the hands of the monarch and was slowly transferred into the hands of the government to be used in the name of the Crown. It is possible for RP to be codified i.e incorporated into an AOP, as can be seen from the Constitutional Reform and Governance Act 2010 (CRGA). The CRGA codified several RPs, such as the RP to ratify treaties. The codification of RP meant that it would be under Parliamentary control and not the Executive. In the UK today, the UK government makes certain decisions based on the RP if they are not covered under any statutes. However, there have been several cases regarding the use of RP brought to the courts, spearheaded by Darnels case as well as the Case of Ship Money. The fact that these cases could be judged by the courts showed that the government (on behalf of the monarch) could exercise the prerogative power granted by the courts. Therefore, the courts have the power to determine whether that prerogative power exists and the extent of the power exercised by the government. Codifying the RP ensures that courts would not have the power to determine its existence, as they are unable to determine the validity of an AOP, as directed by Lord Reid in Pickin v British Railways Board. It would also prevent conflicts with statutes, as well as promote greater certainty and accessibility in the law. However, codifying the RP would make it more rigid, which may affect the reflexes of the government in responding to situations which are time-sensitive. Nevertheless, the current practice of the UK government with regards to such RP would be to consult Parliament first. Thus, it would be desirable to codify the RP. The RP has always been a part of common law in the UK Constitution. In the Case of Proclamation 1611, then King James I declared two royal proclamations without the consent of Parliament. When the case was brought before the court, Lord Coke held that ‘the King hath no prerogative, but that which the law of the land allows him’, meaning that the King could only exercise the prerogative power granted by the courts. Following the judgment, there were several cases which involved the use of the RP which the courts upheld. In Darnels case, the Defendant was imprisoned due to a warrant issued from the King in which there was no reason for the imprisonment. The court held that the arrest was valid as this was the exercise of the monarch’s prerogative power to arrest. The Case of Ship Money also exemplified how the court could decide if use of RP was legitimate. Hampden had refused to pay taxes to the King, upon his RP to raise revenue in an emergency situation. The court subsequently upheld the power of the Crown. Lastly, the judgment in Lord Advocate v University of Aberdeen upheld the RP that things lost, abandoned or ownerless belongs to the Crown. However, the courts have also held several decisions which restricted the RP. In BBC v Johns, BBC claimed there was a prerogative to grant immunity to them so as to avoid paying taxes. This case was famous for the dictum of Lord Diplock who stated that it is â€Å"350 years and a civil war too late for the Queen’s courts to broaden the prerogative†. Some feel that the exercise of prerogative powers was outside judicial review. Lord Devlin (in Chandler v DPP) agreed, but in his obiter statement stated that the courts will not review the proper exercise of discretionary power but they will intervene to correct excess or abuse. Despite this, not all prerogative powers are subjected to judicial review, the reviewability is dependent on its subject matter and not the source of power. In the GCHQ case, Lord Roskill mentioned that â€Å"Prerogative powers such as those relating to the making of treaties, the defence of the realm, the prerogative of mercy†¦ are not, I think, subjected to judicial review because of their nature and subject matter is such as not to be amendable to the judicial process†. Thus, with RPs, courts would have the ability to judge whether they are implemented legitimately or not, dependent on the scope of the prerogative in question, but in the case regarding AOP, courts would not be able to question its validity, as stated by Lord Reid in Pickin (as above). This would be desirable as it would smoothen the relations between the Judiciary and Executive, with fewer conflicts between them. There are also situations whereby RP will be in conflict with statutes. As such, the Crown would not be able to exercise the prerogative power due to the doctrine of Parliamentary Sovereignty. In AG v De Keysers Royal Hotel, the Crown used the Royal Hotel during the First World War and the hotel later claimed for compensation under Defence Act 1842. Although the Crown argued that no compensation should be paid since there was an RP to acquire any land of the subject during wartime, the court held that when the statutory power and prerogative power co-existed, statutory power would override that of prerogative. Similarly, in R v Secretary of State for the Home Department, ex parte Fire Brigades Union, the Criminal Injuries Compensation Scheme set up under Ministerial Prerogative powers was used instead of the Criminal Justice Act 1988, so as to save money by awarding less compensation. The court held that if there is a statutory scheme, it cannot be replaced by the RP. To prevent these scenarios from happening, Parliament has taken steps in recent years to incorporate some RP into statutes. For example, the Treasure Act 1996 states that the prerogative right of treasure trove has been abolished and replaced by this Act. The Human Rights Act 1998 protects citizens against arbitrary use of prerogatives, and the Fixed-Term Parliament Act 2011 has incorporated the RP of dissolution of Parliament. Hence with these recent developments, RP will be in less conflict with AOPs and more consistent with them, enabling them to be more certain and accessible to the public. There are naysayers of codifying the RP that argue that such an act would increase the rigidity of the process to achieve the intended result. Indeed, this is true as can be seen in the prerogative to declare war on other countries. For such a result, the government would need the operational flexibility and speed of deployment that the RP provides. By incorporating it into a statute, not only will the efficiency of the government be reduced, excess publicity that the AOP will bring would undermine the success of the operation. In addition, there will be situations where the government cannot await Parliamentary approval due to time constraints. Be that as it may, in practice, the government in modern times have looked for Parliament’s approval regarding the issue of war. In 2006, then Prime Minister Tony Blair, following his own vote over Iraq in 2003, acknowledged that he could not conceive of a situation in which a government is going to go to war except in the circumstances where immediate action is required without a full Parliamentary debate. The Iraq war vote was a significant precedent that Parliament should give its approval regarding such matters. Following which, Prime Minister David Cameron in 2011 held a Parliamentary debate on whether UK should establish a no-fly zone in Libya after the outbreak of military action. Lastly, in September 2013, a Parliamentary debate was called to discuss the possible military intervention in Syria after chemical weapons were allegedly used on civilians. By calling a vote, the government was ensuring continuing adherence to the practice that Parliament should have a say in such issues. Hence, even if codifying the RP does increase rigidity, the process of ensuring Parliament’s approval is already established. Some might feel that codifying the RP would be sacrificing UK history as they would be forgoing part of their culture which makes their unwritten constitution unique in today’s world (inclusive of New Zealand and Israel). Nevertheless, the RP is considered by many to be an outdated power and is such an important one that it should not bypass democratic representation.

Friday, November 15, 2019

An Alliance in Distress Essay -- Foreign Policy

It is almost too hard to fathom that only 70 years ago the United States possessed such strong feelings of hatred and fear towards Japan in the wake of the devastating Pearl Harbor attacks. The federal government even went as far as to unjustly imprison 110,000 Japanese-Americans. Also, the Japanese felt much animosity and held an inhumane view of Americans following their surrender in WWII after two U.S. atomic bombs killed an estimated 240,000 people. However, from the midst of this painful and dark history has risen one of the most peaceful and powerful alliances of the twenty-first century. The United States rose to be a political superpower with the most technologically advanced military and largest economy in the world. Japan also rose to be a technological superpower with the second largest economy in the world, although it was recently surpassed by China in late 2010. The mutual growth of the two countries stemmed from the Treaty of Mutual Cooperation and Security (TMCS) betw een the United States and Japan that was signed on January 19,1960. The TMCS helped foster the mutual and prosperous trade between the two countries, while also setting forth an agreement of security assistance to one another in times of conflict. As a result of the treaty, the U.S. was allowed by Japan to place bases on various islands, but primarily on the island of Okinawa for strategic purposes and to aid in the defense of Japan. Over fifty years have passed since this agreement was made by the two nations and now an international debate has risen over complications with this arrangement to a magnitude so large that Japanese citizens now even question the merits of the overall U.S.-Japan alliance. The main question that now stands between the Japan... ...ates. Congress. House. Committee on Armed Services. Japan†¯: Recent Security Developments†¯: Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, Second Session, Hearing Held July 27, 2010. Washington: U.S. G.P.O.†¯:, 2010. Print. United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Asia, the Pacific, and the Global Environment. U.S.-Japan Relations [microform]†¯: Enduring Ties, Recent Developments†¯: Hearing Before the Subcommittee on Asia, the Pacific, and the Global Environment of the Committee on Foreign Affairs, House of Representatives, One Hundred Eleventh Congress, Second Session, March 17, 2010. Washington: U.S. G.P.O., 2010. Print. Sato, Ikenberry, G. John, and Yoichiro Inoguchi, Takashi. U.S.-Japan Security Alliance: Regional Multilateralism. Gordonsville, VA, USA: Palgrave Macmillan, 2011. Print.

Tuesday, November 12, 2019

My Papa’s Waltz

Theodore Roethke’s poem, â€Å"My Papa’s Waltz†, can be quite mystifying in terms of comprehending the exact feeling of the speaker towards his father. Presumably, one would immediately notice the impression created by the author regarding the father. The first line of the poem already suggests the negative image of the father as a drunken man playing with his son. â€Å"The whiskey on your breath / Could make a small boy dizzy; / But I hung on like death: / Such waltzing was not easy† (Roethke 30). The first stanza speaks of the narrator’s recollection of the nausea that his father’s drunkenness has caused when he was a little boy. After finishing Theodore Roethke’s poem, it is quite clear that the speaker implies contrasting emotions of pain and enjoyment of a son’s rough dance with his father. However, despite the pain caused by the alcohol smell, he still appreciated his father’s efforts in â€Å"waltzing† with him for he knew it was not that easy. Furthermore, it can also be noticed that the pain that the narrator felt is directly insinuated in the poem in this stanza: â€Å"The hand that held my wrist / Was battered on one knuckle; / At every step you missed / My right ear scraped a buckle† (Roethke 30). Nonetheless, the contrasting emotions of the narrator’s enjoyment were implicit. Instead, the emotions were portrayed through the words that the author has chosen to describe the situation. According to Edward Byrne, a writer and English professor in Valparaiso University, â€Å"the poet refers to his father as ‘papa’, connoting greater affection. Additionally, the word choice of ‘romp’ reflects a more playful tone† (Byrne). Considerably, Roethke made use of words which portray affection and delight towards the father; therefore, the poem consists of two different emotions and at the same time correlates them with each other. The contrasting emotions become related because the narrator insinuates that he is able to endure the pain as long as his father plays with him. The poet may not have directly expressed the enjoyment that he felt, but by understating it through his use of words, he was able to show his happiness with his father in spite of the pain.

Sunday, November 10, 2019

Chapter One Overview of Information Systems

1. 1 Introduction When Rutherford B. Hayes, the 19th president of the United States, saw a demonstration of the telephone in the late 1800s, he reportedly commented that while it was a wonderful invention, businessmen would never use it. Hayes believed that people had to meet face to face to conduct substantive business affairs, and he was not alone in that assessment.Few of Hayes's contemporaries could foresee the profound changes that would be ushered in by the telephone and other technologies of the day, including steam engines, production machinery; transportation technologies such as railroads and automobiles, and communication technologies such as the telegraph and telephone. As we are in the 21st century, we are once again experiencing an intense period of technology-enabled innovation, creativity, and excitement that has been spurred by the information and telecommunications technologies and associated changes in our life, work and society.We are now in  the information/kno wledge age — a time when information and knowledge are power. Leading industrial countries are transforming from industrial-based economies to information/knowledge-based economy. Information is everywhere. Information and knowledge have become critical, strategic assets for most organizations. We live in an â€Å"information society,† where power and wealth increasingly depend on information and knowledge as central assets. It is a new world of doing business.Business and other organizations all over the world are focusing on information and knowledge as their key strategic resources. All firms today, large and small, local and global, use information systems to achieve important business objectives, such as operational efficiency, customer and supplier intimacy, better decision making, and new products and services. A continuing stream of information technology innovations from the Internet to wireless networks to digital phone is continuing to transform the business world.These innovations are enabling entrepreneurs and innovative traditional firms to create new products and service, develop new business models, and transform the day-to-day conduct of business. In the process, some old businesses, even industries, are being destroyed while new businesses are springing up. In 2005, journalist Thomas Friedman wrote an influential book declaring the world was ‘flat’ by which he meant that the Internet and global communications had greatly reduced the economic and cultural advantages of developed countries. U. S. nd European countries were in a fight for their economic lives, competing for jobs, markets, resources, and even ideas with highly educated, motivated populations in low-wage areas in the less developed world. The globalization trend of the world economy greatly enhances the value of information systems to the organizations. In today's global business environment, information technology is creating new opportunities for organ izational coordination and innovation. Organizations require powerful information and communication systems to manage business on an international scale.Manufacturers are using information systems to order supplies and distribute goods faster than ever before; financial institutions are employing them to transfer billions of dollars around the world electronically; investors are using them to make multimillion-dollar decisions. This globalization presents you and your business with both challenges and opportunities. The challenge for you as a business student is to develop high-level skills through education and on-the-job experience that cannot be outsourced. Information systems will continue to change our business, society and lives.Information system and technologies will also play large roles in your career. Along with the changes in business come changes in job and careers. No matter whether you are a finance, accounting, management, marketing, operations management, or informa tion systems major, how you work, where you work, and how well you are compensated will all be affected by business information systems. When interviewing potential employees, business firms often look for new hires who know how to use information technologies and systems for achieving bottom-line business results.It is widely recognized that understanding information systems is essential for managers and employees because most organizations need information systems to survive and prosper. Employees will depend on the information systems to increase their productivity. Management will use the information systems to improve their decision-making processes. Thus the knowledge of information systems and the ability to put this knowledge to work can result in a successful personal career. The knowledge and skill you learn from this subject will be valuable throughout your business career. 1. Computer Literacy and Information System Literacy Today, computers are everywhere: at work, at s chool, and at home. Many daily activities either involve the use of or depend on information from a computer. Computer advances impact all individuals, families, organizations, and schools (see Figure 1-1). Computers already are an essential part of people's daily lives, as much as the automobile, television, and telephone. Computers are taking on many new roles — providing vast information resources, fast communications, effective learning tools, and powerful support for activities in businesses, schools, and homes.Information systems and technologies have become a vital component of successful businesses and organizations. They thus constitute an essential field of study in business administration and management. Almost any career in your future will involve a computer in some way. You probably recognize that it will not be easy to get through the rest of your life without knowing about computers and information systems. In today's technology-rich world, a great demand for computer and information systems professionals exists and continues to grow.The computer and information systems industries offer many rewarding careers and jobs, but require a unique combination of hands-on computing skills, creative problem solving ability, and an understanding of business needs. In preparing yourself to enter today's fast-paced, ever-changing, and information-intense business environment, you need to understand the new thinking in business. Managers and professionals such as engineers, scientists, or architects are collectively known as knowledge workers, since their main contribution to the activities in which they are involved is their knowledge and skills.The term literacy has been used to describe two types of knowledge that are key to succeed as a knowledge worker in today's information/knowledge-based business environment. One kind of knowledge is computer literacy; the other is information systems literacy. The knowledge and understanding of computer syste ms and the ways they function are called computer literacy. Computer literacy focuses primarily on knowledge of information technology. This knowledge includes an understanding of computer terminology, recognition of the strengths and weaknesses of the computer, and an ability to use the computer.It also stresses computer equipment and devices (hardware), programs and instructions (software), databases, networking, and telecommunications. The requirements that determine computer literacy change as technology changes. As you study about computers, you will become aware of their importance, their versatility, and their pervasiveness in our society. There is no better way to understand computer systems than through interacting with one. So being computer literate also means being able to use computers for some type of applications. However, no one expects you to become a computer expert.Today, information systems provide the communication and analytic power that firms need for conducti ng trade and managing businesses on a global scale. In addition to understanding computers, the modern knowledge worker should have information systems literacy. From an organizational perspective, an information system is an organizational and management solution, based on information technology, to a challenge posed by today's dynamic environment. To fully understand information systems, you must understand the broader organization, management, and information technology dimensions of information systems (see Figure 1-2).Figure 1-2 Organization, management, and information technology dimensions of information systems Information systems are integral part of organizations. The key elements of an organization are its people, structure, operating procedures, politics, and culture. Organizations are composed of different levels and specialties. Different levels and specialties in an organization create different interests and points of view. Information systems come out of this cauldr on of differing perspectives, conflicts, compromises, and agreements that are a natural part of all organizations.Management's job is to make sense out of the many situations faced by organizations, make decisions, and formulate action plans to solve organizational problems. Managers perceive business challenges in the environment, they set the organizational strategy for responding and allocate the human and financial resources to achieve the strategy and coordinate the work. The business information systems in organizations reflect the hopes, dreams, and realities of the managers. Information technology is one of many tools managers use to cope with change.Information technology infrastructure provides the foundation or platform on which the firm can build its specific information systems. Each organization must carefully design and manage its information technology infrastructure so that it has the set of technology services it needs for the work it wants to accomplish with infor mation systems. Let us use UPS's package tracking system to identify the organization, management, and technology elements. The organization element anchors the package tracking system in UPS's sales and production functions (the main product of UPS is a service–package delivery).It specifies the required procedures for identifying packages with both sender and recipient information, taking inventory, tracking the packages en route, and providing package status reports for UPS customers and customer service representatives. The system must also provide information to satisfy the needs of managers and workers. UPS's management is responsible for monitoring service levels and costs and for promoting the company's strategy of combining low-cost and superior service.Management decided to use automation to increase the ease of sending a package via UPS and of checking its delivery status, thereby reducing delivery costs and increasing sales revenues. The technology supporting this system consists of handheld computers, barcode scanners, wired and wireless communications networks, desktop computers, UPS's central computer, storage technology for the package delivery data, UPS package tracking software, and software to access the World Wide Web. The result is an information system solution to the business challenge of providing a high level of service with low prices in the face of mounting competition.Therefore, information systems literacy is knowledge of how and why data, information, knowledge, computer, and information technology are used by organizations and individuals. It includes not only knowledge of computer technology but also aspects of the broader range of information technology. Information systems literacy can involve knowledge of how and why people use information technology; knowledge of organizations, decision-making approaches, management levels, and information needs; and knowledge of how organizations can use information systems to achiev e their goals.Thus, the key aspect of information systems literacy is knowing how to deploy information technology to help an organization achieve its business goals and to gain a competitive advantage. In general, knowing about various types of hardware and software is an example of computer literacy. Knowing how to use hardware and software to increase profits, cut costs, improve productivity, increase customer satisfaction, and improve management decision-making is an example of information systems literacy. Information system literacy includes a ehavioral as well as a technical approach to studying information systems. The field of management information systems (MIS) tries to achieve this broader information systems literacy. One of the main objectives of this course is to lay the foundation for information systems literacy. 1. 3 Data and Information Today, information is one of an organization's most important and valuable resources. Organizational information systems contain information about people, places, things, ideas and events within the organization and in the environment surrounding it.By information we mean data that have being processed into a form that is meaningful and useful to the recipient. Data are therefore the raw facts for producing information. The relation of data to information is that of raw material to finished product. The information systems process data in unusable form into a usable form that is information for intended recipient. As the simplified example shown in Figure 1-3, the student name, ID number, semester, curse codes, and course grades all represent data. The computer processes the data to produce the grade information (report). | | Figure 1-3 The process of transforming data into information| Organizational activities require information. Producing products, assigning workers, making sales, billing amounts due, and providing customer services are examples of activities that use information. Data represents real-wor ld facts, such as an employee's name, weekly sales, customer numbers, or product inventory. Data items are organized for processing purpose into data structures, file structure, database, and data warehouse. Data are simply raw facts and has little value beyond its existence.Information systems manipulate and process data to create information. The information in an information system take a variety of forms including text, numbers, pictures, sounds, animations and videos. The value of information is described most meaningful in the context of a decision. In other words, the value of information is directly linked to how it helps decision-makers achieve their organization's goals. If there were no current or future choices or decisions affected by a piece of information, the information would be unnecessary.It is cited frequently in explaining why information systems that collect vast amounts of data often fail to satisfy managerial information needs. The value of information might be measured in following three dimensions: * Content — information should be accurate, relevant, and complete * Time — information should be timely and current * Form — information should be provided at the appropriate level of detail and in the most appropriate form. More specifically, information should have certain characteristics to make it valuable.The characteristics of valuable information include being accurate, verifiable, timely, organized, meaningful, useful, and cost effective. * Accurate information is correct information. Inaccurate information often is worse than no information, because inaccurate information can lead to incorrect decisions. For example, you assume that your transcript correctly list your grades. If your transcript incorrectly reports low grades in your major courses, a potential employer might deny you an interview. * Verifiable information means that the information can be confirm by the user.For example, before relying on the c umulative GPA on your transcript, a potential employer might want to check that the GPA is calculated correctly. The potential employer can verify the accuracy of the accumulated GPA by calculating it from the individual semester GPA values. * Timely information has an age suited to its use. Your transcript, for example, has value for a potential employer only if the employer receives it in time to make a hiring decision. Although most information loses its value with time, some information, such as information on trends, gains value as time passes and more information is obtained.Your transcript, for example, gains value as you complete more coursework because it reflects your work ethic and dedication over a time period. * Meaningful information is relevant to the person who receives it. Because certain information is meaningful only to specific individuals or groups, unnecessary information should be eliminated. * Cost-effective information costs less to produce than the value of the resulting information. Most organizations periodically review the information they produce in reports to determine if the reports provide valuable information.Based on that review, the companies can determine whether to continue, scale back, or even eliminate these reports. The need for timely information can change for each business decision. Some decisions require weekly or monthly information while other decisions require daily information. Timeliness is an aspect of information that depends on the situation. In some industries such as insurance and construction, information that is a few days or weeks old can be relevant, while in other industries such as 911 centers and stock trading information that is a few minutes old can be almost worthless.Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to query requests. Many organizations use real-time systems to exploit key corporate transactional informatio n. Real-time systems provide valuable information for supporting corporate strategies such as customer relationship management. The growing demand for real-time information stems from organizations’ need to make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully.Nevertheless, timeliness is relative. Organizations need fresh, timely information to make good decisions. Information also needs to be timely in the sense that it meets employees’ needs, but no more. If employees can absorb information only on an hourly or daily basis, there is no need to gather real-time information in smaller increments. Many people request real-time information without understanding one of the biggest pitfalls associated with real-time information’s continual change. Imagine the following scenario: Three managers meet at the end of the day to discuss a business problem.Each manager has gathered information at different times during the day to create a picture of the situation. Each manager’s picture may be different because of this time discrepancy. Their views on the business problem may not match since the information they are basing their analysis on is continually changing. This approach may not speed up decision making, and may actually slow it down. Organizations must evaluate the timeliness of the information required for each business decision. Organizations do not want to find themselves using real-time information to make a bad decision faster.Information and knowledge are becoming the foundation for many new products and services. Information/ knowledge-intense products such as computer games require a great deal of knowledge to produce. Entire new information-based services have sprung up, such as Lexis, Dow Jones News, and America Online. These fields are employing millions of people. Information technology constitutes more than 75 percent of the invested capital in s ervice industries such as finance, insurance, and real estate. Knowledge is used more intensively in the production of traditional products as well.In the automobile industry, both design and production now rely heavily on knowledge and information technology. 1. 4 Information Systems 1. 4. 1 The Concept of System System concepts underlie the field of information systems. A system is a set of elements or components that operate together to accomplish an objective. Many examples of systems can be found in the physical and biological sciences, in modern technology, and in human society. A system (sometimes called a dynamic system) has three basic interacting components or functions: *   Input involves capturing and assembling elements that enter the system to be processed.For example, raw materials, energy, data, and human effort must be secured and organized for processing. * Processing involves transforming processes that convert input into output. Examples are a manufacturing pro cess, the human breathing process, or mathematical calculations. * Output involves transferring elements that have been produced by a transformation process to their ultimate destination. For example, finished products, human services, and management information must be transmitted to their human users. The system concept becomes even more useful by including two additional components: feedback and control.A system with feedback and control components is sometimes called a cybernetic system, that is, a self-monitoring, self-regulating system. * Feedback is data about the performance of a system. For example, data about sales performance is feedback to a sales manager. * Control involves monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal. The control function then makes necessary adjustments to a system's input and processing components to ensure that it produces proper output.For example, a sales manager exercises control wh en reassigning salespersons to new sales territories after evaluating feedback about their sales performance. 1. 4. 2 Information Systems An information system is a specialized type of system and can be defined in a number of different ways. An information system can be defined technically as a set of interrelated information technology components that collect (or retrieve), process, store, and distribute data and information and provide a feedback/control mechanism to meet an objective.From a business perspective, information systems can be defined as a combination of hardware, software, and telecommunications networks which people build and use to collect, create, and distribute useful data and information, typically in organizational settings. Information systems support managers and workers make decisions, control operations, analyze problems, visualize complex subjects, and create new products and services. An information system contains information about an organization and it s surrounding environment.The basic activities of input, processing and output in an information system produce the information that organization need for decision-making and operations. An information system also requires feedback and control components to meet an objective (see Figure 2-4). | Figure 1-4 An information system| In an information system, input is the activity of gathering and capturing raw data from within the organization or from its external environment. For example, in producing paychecks, the number of hours worked for every worker must be collected before the pay amounts can be calculated and checks can be printed.Processing involves converting or transforming data into more meaningful form. Processing can involve making calculations, making comparisons and taking alternative actions, and storing data for future use. In the payroll example, the required processing may first involve calculating gross pay. If weekly hours worked are greater than 40 hours, overtime pay must be determined. Then deductions are subtracted from gross pay to get net pay. Output involves producing useful information in a proper form such as reports, paychecks or documents, and transferring the processed information to the user.In some cases, output from one information system can become input for another. Information systems also provide feedback/control mechanism to allow people to evaluate the performance of the systems and make necessary changes to input or processing activities. Information technologies (IT) are tools used to build information systems. Information technologies include hardware, software, database, networks, and other related components. Information systems use and integrate these technologies to meet the information needs of different users.The information technology, then, must support the goal of the information system, which is to provide accurate, timely, relevant, complete, well-formatted information that users value. Computer architecture ensures a fit between information systems and technologies. Computers are valuable tools. As technology advances and computers extend into every facet of daily living, computers have become an essential part of organizational information processing because of the power of the technology and the volume of data to be processed.When we use the term information systems, we are referring to computer-based information systems (CBIS) — organizational information systems that rely on computer technology to collect, process, store and disseminate information. A CBIS is composed of hardware, software, database, telecommunications, people, and protocols/procedures, as shown in Figure 1-5. | | | Figure 1-5 The components of an information system| In a computer-based information system, hardware consists of physical computer equipment and associated devices used to perform input, processing, and output activities.Software is a broad term given to the instructions that direct the operatio n of the hardware. Database contains all data utilized by application software. Telecommunications is the electronic transmission of signals for communications and enables organizations to link computer systems into effective networks. Information systems personnel include all the people who develop, program, operate, manage, use and maintain the information systems. Protocols are standards and guidelines used for designing and deploying information systems.Procedures include strategies, policies, methods, and rules for developing, managing and using the information systems. Although computer-based information systems use computer technology to process raw data into meaningful information, there is a sharp distinction between a computer system and an information system. Electronic computers and related software programs are the technical foundation, the tools and materials, of modern information systems. Computer systems provide the equipment and software for processing, storing and distributing information. Knowing how computer systems work is important in esigning solutions to organizational problems, but computer systems are only part of an information system. Computers and programs alone cannot produce the information a particular organization needs. To understand information systems, you must understand the problems they are designed to solve, their architectural and design elements, and the organizational processes that lead to these solutions. In other words, to be information systems literate as opposed to computer literate, you must understand the broader organization, management, and technology dimensions of information systems. 1. 4. Enterprise System Architectures System architecture refers to the arrangement of software, hardware, and tasks in an information system needed to achieve a specific functionality. To support the volume and complexity of today’s users and application requirements, information technology needs to take a fresh appro ach to enterprise system architectures by constructing smarter, more flexible environments that protect from system failures and crashes. Enterprise system architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets.A unified enterprise system architecture will standardize enterprisewide hardware and software, with tighter links to the business strategy. A solid enterprise system architecture can decrease costs, increase standardization, promote reuse of IT assets, and speed development of new systems. The right enterprise system architecture can make IT cheaper, strategic, and more responsive. Enterprise system architectures are never static; they continually change. Organizations use enterprise system architects to help manage change.An enterprise system architect is a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business. An enterprise s ystem architect is expensive and generally receives a salary of $180,000 per year on average. Companies that have created solid enterprise system architectures are reaping huge rewards in savings, flexibility, and business alignment. Basic enterprise architectures contain three components, as shown in Figure 2-6. | | |   Ã‚   Figure 1-6 Three components of enterprise system rchitecture| Information Architecture Information architecture identifies where and how important information, like customer records, is maintained and secured. A single backup or restore failure can cost an organization more than time and money; some data cannot be recreated, and the business intelligence lost from that data can be tremendous. Three primary areas an enterprise information architecture should focus on include back up and recovery, disaster recovery, and information security. Each year businesses lose time and money because of system crashes and failures.One way to minimize the damage of a syste m crash is to have a backup and recovery strategy in place. A backup is an exact copy of a system’s information. Recovery is the ability to get a system up and running in the even of a system crash or failure and includes restoring the information backup. Organizations should choose a backup and recovery strategy that is in line with its business goals. If the organization deals with large volumes of critical information, it will require daily backups, perhaps even hourly backups, to storage servers.Deciding how often to back up information and what media to use is a critical business decision. If an organization decides to back up on a weekly basis, then it is taking the risk that, if a total system crash occurs, it could lose a week’s worth of work. If this risk is unacceptable, then the organization needs to move to a daily backup strategy. Some organizations find the risk of losing a day’s worth of work too high and move to an hourly backup strategy. Two tec hniques used to help in case of system failure are fault tolerance and failover.Fault tolerance is a computer system designed that in the event a component fails, a backup tolerance can be provided with software, or embedded in hardware, or provide by some combination. Failover is a backup operational mode in which the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled downtime. A failover procedure involves automatically offloading tasks to a standby system component so that the procedure si as seamless as possible to the end user.Disasters such as power outages, floods, and even harmful hacking strike businesses every day. Organizations must develop a disaster recovery plan to prepare for such occurrences. A disaster recovery plan is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood. A comprehensive disaster recovery plan takes into consideration the location of the backup information. Many organizations store backup information in an off-site facility. A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.A cold site is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster. Security professionals are under increasing pressure to do the job right and cost-effectively as networks extend beyond organizations to remote users, partners, and customers, and to cell phones, PDAs, and other mobile devices. Regulatory requirements to safeguard data have increased. Concerns about identify theft are at an all-time high. Hacking and other unauthorized access contribute to the approximately 10 million instances of identity theft each, according to the Federal Trade Commission.A good information architecture includes a strong information security plan, along with managing user access and up-to-data antivirus software and patches. Managing user access to information is a critical piece of the information architecture. There is little doubt that security is a top priority for business managers, regardless of the size of their company. The main focus for most managers is preventing hackers, spammers, and other malcontents from entering their networks, and they are looking to enhance their network-security-management, intrusion-detection, content-filtering, and anti-spam software.Infrastructure Architecture Infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals. As an organization changes, its systems must be able to change to support its operations. If an organization grows by 50 percent in a single year, its systems must be able to handle a 50 percent growth rate. Systems that cannot adapt to orga nizational changes can severely hinder the organization’s ability to operate. The future of an organization depends on its ability to meet its artners and customers on their terms, at their pace, any time of the day, in any geographic location. The following are the five primary characteristics of a solid infrastructure architecture: 1. Flexibility: Organizations must watch today’s business, as well as tomorrow’s, when designing and building systems. Systems must be flexible enough to meet all types of business changes. For example, a system night be designed to include the ability to handle multiple currencies and languages, even though the company is not currently performing business in other countries.When the company starts growing and performing business in new countries, the system will already have the flexibility to handle multiple currencies and languages. If the company failed to recognize that its business would someday be global, it would need to red esign all its systems to handle multiple currencies and languages, not easy once systems are up and running. 2. Scalability: Scalability refers to the ability of a system to increase in size as demand warrants. If an organization grows faster than anticipated, it might all types of performance degradations, ranging from running out of storage space to a slowdown in transaction speeds.Capacity planning determines the future IT infrastructure requirements for new equipment and additional network capacity. Performing a capacity plan is one way to ensure the IT infrastructure is scalable. There are three steps you can take to meet the demands for service at your system: scale hardware vertically, scale hardware horizontally, and improve the processing architecture of the system. Vertical scaling refers to increasing the processing poser of individual components. Horizontal scaling refers to employing multiple computers to share the workload and increase the ‘footprint’ of t he installation.Improving the processing architecture is a combination of vertical and horizontal scaling, combined with artful design decisions. 3. Reliability: Reliability ensures all systems are functioning correctly and providing accurate information. Reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency IT metrics. 4. Availability: High availability refers to a system or component that is continuously operational for a desirably long length of time. Availability is typically measured relative to 100 percent operational.A widely held but difficult-to-achieve standard of availability for a system is known as ‘five 9s’ (99. 999 percent) availability. Systems, however, must come down for maintenance, upgrades, and fixes. One challenge organizations face is determining when to schedule system downtime if the system is expected to operate continually. Many organizations overcome this problem by having redunda nt systems, allowing the organization to take one system down by switching over to a redundant system. 5. Performance: Performance measures how quickly a system performs a certain process or transaction.Not having enough performance capacity can have a devastating, negative impact on a business. People usually use IT metrics to measure the system architecture. Efficiency IT metrics measure the performance of the IT system including throughout, speed and availability. Effective IT metrics measure the impact of the IT system on business processes and activities including customer satisfaction, conversion rates, and sell-through increases. Application Architecture Application architecture determines how applications integrate and relate to each other.Advances in integration technology are providing new ways for designing more agile, more responsive enterprise architectures that provide the kind of value businesses need. With these new architectures, IT can build new business capabiliti es faster, cheaper, and in a vocabulary the business can understand. Web services promise to be the next major frontier in computing. Web services contain a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services.The major application of Web services is the integration among different applications. Before Web services, organizations had trouble with interoperability. Interoperability is the capability of two or more computer systems to share data and resources. If a supply chain management system can share data with a customer relationship management system, interoperability exists between the two systems. Web services encompass all the technologies that are used to transmit and process information on and across a network, most specifically the Internet.A Web service is really a piece of reusable software code. A software developer can quickly build a new application by using many of t hese pieces of reusable code. For example, a ‘Deposit’ Web service for a banking system might allow customers to perform the task of depositing money to their accounts. The Web service could be used by a bank teller, by the customer at an ATM, and by the customer performing an online transaction through a Web browser. The trick to building Web service is finding the right level of granularity.An open system is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them. The designs of open systems allow for information sharing. In the past different systems were independent of each other and operated as individual islands of control. The sharing of information was accomplished through software drivers and devices that routed data allowing information to be translated and shared between systems.Open system integration is designed to: * Allow sy stems to seamlessly share information. The sharing of information reduces the total number of devices, resulting in an overall decrease in cost. * Capitalize on enterprise architectures. This avoids installing several independent systems, which creates duplication of devices. * Eliminate proprietary systems and promote competitive pricing. Utilization of open systems allows users to purchase systems competitively. 1. 5 The Role of Information Systems in Business 1. . 1 Business Environment Business students frequently ask, â€Å"Why do we need to study information technology? † The answer is simple: Information technology is everywhere in business. Information technology plays a critical role in reducing costs, improving productivity and generating growth by facilitating communication and increasing business intelligence. Information technology is supplying the foundation for new business models, new business processes, and new ways of distributing products, services and know ledge.Companies are relying on information technology and telecommunications to conduct more of their work electronically, seamlessly linking factories, offices, sales forces, managers, customers, and suppliers around the globe. Understanding information technology provides great insight to anyone learning about business. Business students who understand technology have an advantage in business. | | | Figure 1-7 Seven major factors that affect today's business environment| Before discussing the role of information systems in organizations, let's xamine some of the most important factors shaping today's new business. These and other factors have altered the environment of business and posed new challenges to business firms and their management. To you, these factors can be translated into a substantial career opportunity, if you understand them and prepare yourself through education to take advantage of them. Figure 2-7 lists seven important factors including globalization, competiti on, information as a key resource, organization restructuring, end-use computing, electronic commerce, and virtual workplace.Emergence of the global economy means that business today is global business. The success of firms today and in the future depends on their ability to manage business globally. Business globalization greatly enhances the value of information systems to organizations and offers new opportunities to business. Organizations need powerful information systems and communications systems to conduct trade and manage businesses on a global scale. Obviously, globalization has increased competition. Information technology is another reason competition is heating up.Globalization and information technology bring new threats to domestic business firms. Customers now can use global communication and information systems to shop in a worldwide marketplace, obtaining price and quality information reliably 24 hours a day. To become competitive participants in international mark ets, firms need powerful information and communication systems. In the information age, information is so important that businesses must have information to be successful. The need to capture and record information about what customers want has led to many databases and data warehouses.These databases and data warehouses contain valuable information to help firms to throb with the pulse of marketplace. These databases and data warehouses of great economic value are based on new information technologies. Today, many organizations are restructuring in a variety of ways. The explosive growth in computing power and networks is turning organizations into networked enterprises, which allow organizations to redesign and reshape their structures, scope of operations, control mechanisms, work practices, work flows, products, and services.Many organizations have reduced the number of levels in their organizational hierarchies. In these flatter organizations, employees are empowered to make mo re decisions than in the past. Contemporary information technology can make more information available to line workers so they can make decisions that previously had been made by managers. Companies can use information and communications technologies to organize in more flexible ways, increasing their ability to respond to changes in the marketplace, to take advantage of new business opportunities, and to reduce the cost of obtaining products and services from outside the firm.Many organizations use information technology to recast the management process, providing powerful new capabilities to help managers plan, organize, lead, and control. One important trend is using information technology for enterprise resource planning. For example, more and more firms are using the Enterprise Resource Planning (ERP) system. The ERP system is a business information system that integrates all facets of the business, including planning, purchasing, manufacturing, sales, finance and human resourc es.The ERP system creates an integrated database to coordinate business activities within and across functional areas by sharing consistent information, and automates many business processes. Information and telecommunications technologies are creating new ways of conducting business electronically both inside and outside the firm. The Internet is emerging as the primary technology platform for electronic commerce. Electronic commerce is the computerized process of buying and selling goods and services through the Internet, networks, and other digital technologies.The Internet links millions of organizations and individuals into a single network, creating the foundation for a vast electronic marketplace. An electronic market is an information system that links together many buyers and sellers to exchange information, products, services, and payments. Many organizations are increasingly apply Internet technology to facilitate the management and coordination of other business processe s within the firm — publishing company's policies and work procedures, scheduling work flow, reviewing production plan, revising design documents, and so on, which is called electronic business.Information and telecommunications technologies have eliminated distance as a factor for many types of work in many situations. Many companies are using networked information systems to coordinate their geographically distributed capabilities. Works can be done wherever the employees are located. The term virtual workplace describes a technology-enabled working arrangement where work can be done at virtually any geographical location as along as the work site is linked to one or more of the firm's fixed locations by some type of telecommunications capability.Some companies are even using networked information systems to coordinate with other organizations such as suppliers, distributor, or even competitors as virtual organizations to create and distribute new products and services with out being limited by traditional organizational boundaries or physical location. Intensive use of information technology in business firms, coupled with equally significant organizational redesign, has created a new type of business: the fully digital firm. The digital firm can be defined along several dimensions.A digital firm is one where nearly all of the organization's significant business relationships with customers, suppliers, and employees are digitally enabled and mediated. Core business processes are accomplished through digital networks spanning the entire organization or linking multiple organizations. Key corporate assets–intellectual property, core competencies, and financial and human assets–are managed through digital means. In a digital firm, any piece of information required to support key business decisions is available at anytime and anywhere in the firm.Digital firms sense and respond to their environments far more rapidly than traditional firms, g iving them more flexibility to survive in turbulent times. Digital firms offer extraordinary opportunities for more global organization and management. By digitally enabling and streamlining their work, digital firms have the potential to achieve unprecedented levels of profitability and competitiveness. A few firms, such as Cisco Systems, Dell Computer Corporation or Google, are close to becoming fully digital firms, using the Internet to drive every aspect of their business.In most other companies, a fully digital firm is still more vision than reality but this vision is driving them toward digital integration. For today's managers, information technology is not simply a useful handmaiden, an enabler, but rather it is the core of the business and a primary management tool. There are four major systems that help define the digital firm. Supply chain management systems seek to automate the relationship between suppliers and the firm to optimize the planning, sourcing, manufacturing, and delivery of products and services.Customer relationship management systems attempt to develop a coherent, integrated view of all the relationships a firm maintains with its customers. Enterprise systems create an integrated enterprise-wide information system to coordinate key internal processes of the firm, integrating data from manufacturing and distribution, sales, finance, and human resources. Finally, knowledge management systems seek to create, capture, store, and disseminate firm expertise and knowledge.Collectively, these systems represent the areas where corporations are digitally integrating their information flows and making major information system investments. For example, building only cars that customers order and building them in record time has been every automaker's dream. Now, it appears that Toyota Motor Corporation is coming close to making that dream come true. Toyota is using new software tools and Internet technology to drive its processes for designing a nd manufacturing automobiles and to integrate them with customers and suppliers.The company is moving toward a digital firm organization. In many organizations, end users are developing a growing percentage of information systems with little or no formal assistance from technical specialists. This phenomenon is called end-user computing. Information technology education programs at both the college and pre-college level and easy-to-use of both computer hardware and software have made more and more managers and employees have good computing knowledge and skills.End user computing involves you, as a future knowledge worker, in more than just developing a budget using spreadsheet software, creating a presentation using presentation graphics software, or using a system that someone else developed. It requires you to take an active role in developing systems that support your specific needs or the needs of a team. 1. 5. 2 Functional Areas in Business Understanding information technology begins with gaining an understanding of how businesses function and IT’s role in creating efficiencies and effectiveness across the organization.Typical businesses operate by functional areas. Each area undertakes a specific core business function. These functional areas are interdependent (see Figure 2-8). For example, sales must rely on information from operations to understand inventory, place orders, calculate transportation costs, and gain insight into product availability based on production schedules. For an organization to succeed, every department or functional area must work together sharing common information. Information technology can enable departments to more fficiently and effectively perform their business operations. | Figure 1-8 Common functional areas in business| To perform the MIS function effectively, almost all organizations today, particularly large and medium-sized ones, have an internal IT department. The plans and goals of the IT department must al ign with the plans and goals of the organization. Information technology can enable an organization to increase efficiency in manufacturing, retain key customers, seek out new sources of supply, and introduce effective financial management.Information technology is a relatively new functional area, having been around formally in most organizations only for about 40 years. Job titles, roles, and responsibilities often differ from organization to organization. Most organizations maintain positions such as chief executive officer (CEO), chief financial officer (CFO), and chief operations officer (COO) at the strategic level. Recently there are more IT-related strategic positions such chief information officer (CIO), chief technology officer (CTO), chief security officer (CSO), chief privacy officer (CPO), and chief knowledge officer (CKO).The CIO is responsible for overseeing all uses of information technology and ensuring the strategic alignment of IT with business goals and objective s. The CTO is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization’s information technology. The CSO is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses. The CPO is responsible for ensuring the ethical and legal use of information within an organization.The CKO is responsible for collecting, maintaining, and distributing the organization’s knowledge. The CKO designs programs and systems that make it easy for people to reuse knowledge. All the above IT positions and responsibilities are critical to an organization’s success. While many organizations may not have a different individual for each of these positions, they must have leaders taking responsibility for all these areas of concern. It is not always easy for managers to make the right choices when using IT to support business initiatives.Most managers understand their business initiatives well, but are often at a loss when it comes to knowing how to use and manage IT effectively in support of those initiatives. Managers who understand what IT is, and what IT can and cannot do, are in the best position for success. Individuals anticipating a successful career in business must understand information technology including: * Information technology basics. * Roles and responsibilities in information technology. * Measuring information technology’s success. 1. 5. 3 The Role of Information Systems in BusinessIn 2007, American business invested over $1 trillion in information systems hardware, software and telecommunications equipment, more than half of all capital investment in the United States. In addition, they spent another $250 billion on business and management consulting and services, much of which involves redesigning firms’ business operations to take advantage of these new technologies. More than half of all business investment in the United States each year involves information systems and technologies. In 2007, more than 40 million U. S. usinesses had cot-com Internet sites registered. E-commerce and Internet advertising are booming. Companies today manage their operation and inventories in near real time in order to reduce their production and overhead costs and get to market faster. What makes information systems so essential today? Why are businesses investing so much in information systems and technologies? They do so to achieve the following six important business objectives: 1. Operational Excellence: Businesses continuously seek to improve the efficiency of their operations in order to achieve higher profitability.Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations, especially when coupled with changes in business practices and management behavior. 2. New Products, Services and Business Models: Information systems and technologies are a major enabling tool for firms to create new product and services, as well as entirely new business models. A business model describes how a company produces, delivers, and sells a product or service to create wealth. . Customer and Supplier Intimacy: Information systems can help a business know its customers and serves them well, the way they want to be served, the customers generally respond by returning and purchasing more. This raises revenues and profits. Likewise with suppliers: the more a business engages its suppliers, the better the suppliers can provide vital inputs. This lowers costs. 4. Improved Decision Making: Many business managers operate in an information fog bank, never really having the right information at the right time to make an informed decision.Instead, they rely on forecasts, best guesses, and luck. The result is over- or underproduction of goods, misallocation of resources, and poor response t imes. Information systems and technologies have made it possible for managers to use real-time data from the marketplace when making decisions. 5. Competitive Advantage: Information systems and technologies can help a business achieve a competitive advantage: doing things better than its competitors, charging less for superior products, and responding to customers and suppliers in real time. 6.Survival: Business firms invest in formation systems and technologies because they are necessities of doing business. Sometimes these necessities are driven by industry-level changes. Many federal and state statutes and regulations create a legal duty for companies to retain records. Firms turn to information systems and technologies to provide the capability to respond to these information retention and reporting requirements. Information systems directly affect how top management draw up long-tern planning, how managers make decisions, and what products and services are produced and how.In f act, information systems play a strategic role in the life of the firm. Figure 2-9 illustrates the relationship between businesses and information systems. | Figure 1-9 Growing interdependence between businesses and information systems| There is a growing interdependence between business strategy, organizational structure, operation rules and procedures, and production on the one hand, and IT infrastructure, IT strategy and information system management on the other. A change in any of these components often requires changes in other components.Existing information systems can act as a constraint on businesses. Often, what the organization plans to do in next five years depends on what its information systems will permit it to do. Developing new products and service, increasing market share, becoming the high-quality or low-cost producer, providing better customer service, and increasing employee productivity depend more and more on the scope and quality of information systems in th e organization. Businesses are not in the business of processing information for its own sake. Instead they rocess information in order to improve organizational performance and produce profits. From a business perspective, an information system is an important instrument for creating value for the organization. There are many ways in which information systems can contribute to firm value, including increasing the firm's return on its investments, enhancing the company's strategic position, or increasing the market value of the firm's stock. Information processing activities support management decision making, enhance the execution of business processes and as a result increase business value.Every business has an information value chain, shown in Figure 2-10, in which raw information is systematically acquired, and then transformed through various stages that add value to that information. From this perspective, information systems are part of a series of value-adding activities fo r acquiring, transforming, and distributing information that managers can use to improve decision making, enhance organizational performance, and ultimately increase firm profitability. | Figure 1-10 Business information value chain|