Saturday, December 28, 2019

Why I Want To Do Early Childhood Education Essay

Why I Want To Do Early Childhood Education Essay Why I Want to Do Early Childhood Education Early childhood education is one of the most interesting types of teaching for me, as it involves work with the youngest children. I think that the majority of people underestimate the possibilities and opportunities open for these little personalities, which results in poor attention paid to their development. I want to do early childhood education, as I want to change this situation. There have already been conducted hundreds of researches on the ways children perceive our world, and the more there is discovered, the more questions there appear. It is so interesting to observe little children – the way they start getting familiarized with the world, learning so many valuable lessons, when they simply go for a walk or explore their home. Unfortunately, not all the parents understand how important it is to support their child in this period and let him/her find out as much as possible about the world. In this period the most essential traits of character are rooted. So, for a professional teacher children in this age are the most valuable, as they can not only learn new things, but can also understand how to learn them in the best way and can acquire the love to knowledge, which teenagers lack so much today. Children are perfect listeners as well, and it is so pleasant to see how quickly your efforts are rewarded. These are the main reasons why I decided to pursue career in early childhood education. I want to change this world for the better, and I know that teaching small kids is the only possible and right way to do it.

Friday, December 20, 2019

Essay on Effective Approaches to Prevent Teen Pregnancy

Effective approaches to prevent teen pregnancy After reading numerous articles and abstracts in regards to the ever so intriguing topic of teen pregnancy, I’ve come to a conclusion which is a little different than I had expected. Before reading any of the literature on teen pregnancy, I was under the assumption that the sex education classes provided in school were an extremely effective weapon against unwanted teenage pregnancies. Of the literature references that I’ve used and those of which I have haven’t chosen to extrapolate on, many have reported results based on random surveys while others have conducted quantifiable research to reach their findings. In an article by Dryfoos J in the Planned Parenthood Review, Dryfoos mentions†¦show more content†¦This survey also showed that 63 % of teenagers have already had Sexual Intercourse by the time they had completed the 10th and 11th grades. nbsp;nbsp;nbsp;nbsp;nbsp;In the Journal of School Health, in May 2001 was an article entitled â€Å"Effectiveness of the Baby Think It Over Teen Pregnancy Prevention Program† by Cheryl Somers, Cheryl and Mariane Fahlman speaks of a program that many school systems have adopted called â€Å"Baby Think It Over.† This program is a computerized simulation of a baby and the responsibilities that parents have to endure. It is geared towards teen-agers because the teen pregnancy rates in America are at least double of any country with similar economic background and culture. This article further evaluates the effectiveness of this new program using a controlled study in which 151 experimental students and 62 controlled subjects were used. These were all high school students of a suburban area of a Midwestern city. The average age of the students was 16.2 and they were all middle-class primarily white students, both male and female. Numerous studies were conducted, with inconcl usive evidence of the programs effectiveness. One study showed that the subjects understood and had more realistic impressions of having children, while another showed that the students had no change of intentions in regards to teen parenting. This particular studyShow MoreRelatedUnwanted and Unplanned Teen Pregnancy and Sexually Transmitted Illness1544 Words   |  7 PagesUnwanted and Unplanned Teen Pregnancy and Sexually Transmitted Illness (STI) Teen Pregnancy The birth rate among teens in the United States has declined 9% from 2009 to 2010, a historic low among all racial and ethnic groups, with the least being born in 2010; and in 2011 the number of babies born to adolescents aged 15-19 years of age was 329,797 (â€Å"Birth Rates for U.S.†, 2012). Although the decline in unwanted and unplanned teen births is on the rise the United States continues to be among theRead MoreTeen Pregnancy And Sex Education Programs900 Words   |  4 Pages1. Clemmitt, Marcia. â€Å"Teen Pregnancy.† CQ Researcher 20. 12 (2010): 267-287. Web. This particular source is an academic journal which goes into immense detail about the high rates of teen pregnancy and sex education programs the United States government provides. The article is informative and supportive of the sex education programs and explains the success rates of these programs in reducing teen pregnancy. Author Marica Clemmitt, former editor for other scholarly articles involving Medicine andRead MoreThe System Of Sex Education Essay1034 Words   |  5 Pagespullout method is effective. Some children are not ready for sex, but they do it anyway because they are not told to wait. Abstinence should be taught as part of sex education because sexual transmitted disease, teen pregnancy, and abortion rates would decrease. Sex education in schools teach children about safe sex and contraceptive methods for teen girls. Teens learn about sex in school, and they believe it is safe to have sex if they use condoms. Sex is safer with condoms, but teens don’t realizeRead MoreTeen Pregnancy Essay1314 Words   |  6 Pages(Hamilton, B.E.). That’s nearly 750,000 teen pregnancies every year. According to, â€Å"11 facts about teen pregnancy† less than 2% of teen moms earn a college degree by age 30 (Par. 2 5). There are many reasons for this and the best way to help limit teen pregnancy would be to require parents to attend teen pregnancy prevention meetings held by schools. One of the many problems is that most teens are not well informed about the troubles of being a teen parent. They don’t understand how it willRead MoreContraceptive Methods And Sterilization Procedures Prescribed For Women1348 Words   |  6 Pageseducation and counseling and male-based contraceptive is excluded t. Excluding contraceptive coverage for male raises the issues of discrimination; therefore contraceptive coverage should be covered for men as well as women. The vasectomies are cost effective among birth control choices. Vasectomy is permanent and long term; its success rate is better than tubal ligation. It also has a lower risk of complication than female surgical sterilization methods. With vasectomies, there is a mild pain, swellingRead MoreTeen Pregnancy1023 Words   |  5 PagesDoes access to condoms prevent teen pregnancy? Adolescent pregnancies remain a concern in public health worldwide. The World Health Organization (WHO) has indicated that annually about 16 million girls between 15 and 19 give birth. Indeed, in many countries policies and programs are developed and implemented for the prevention of teen pregnancy and reduction of risks and consequences it might cause. Furthermore, that a teenager becomes pregnant poses a risk to her health, her life and the fetusRead MorePublic Health Nurses : The Leading Cause Of Death Among Girls Essay1709 Words   |  7 PagesComplications from pregnancy and childbirth are the leading cause of death among girls ages 15-19 in LMIC’s (Morris Rushwan, 2015). The primary reason for these preventable death-causing complications is that teenagers are not properly supplied with contraceptives. Due to these unplanned and unwanted pregnancies approximately 4.5 million teenage girls undergo an abortion each year, with an estimated 3 million of them being performe d unsafely (Morris Rushwan, 2015). Some detrimental complicationsRead MoreTeenage Moms That Are Still In High School Get Pregnant1391 Words   |  6 Pagesare still in high school get pregnant at a young age, and are not able to support themselves or their child. There were just under a quarter million pregnancies in women ages fifteen to nineteen in 2014. About eighty-five percent of these pregnancies are unplanned, which in any population can increase the risk for problems. The biggest risk for teen mothers is delaying prenatal care or worse, about seven percent received no care at all. According to CDC, In 2014, almost 250,000 babies were bornRead MoreFixing the Teenage Pregnancy Problem: A Humble Suggestion Essay example1226 Words   |  5 Pagesproblem is no less evident. This problem is not unsolvable, in fact, many solutions exist, but no matter how promising a proposal is, nothing will fix itself without society’s cooperation. The safest and most reliable solution to avoid teenage pregnancy (and many a terrible STD) is also the most difficult proposal for teenagers to adhere to: an abstinence only policy. Not just frightened fundamentalists believe that sex-education with a curriculum that focus utterly on abstinence works. A studyRead MoreHealth And Social Service Programs1235 Words   |  5 PagesBackground: Adolescent pregnancy, primarily occurring in ages 13-18 years, has a negative impact on the physical, psychological, educational, and economic area of the pregnant girls. Objective: To evaluate some health and social service programs that can reduce American adolescent Pregnancy from Ages 13- 18 and improve their quality of life. Methods: Review two research articles and to assess the overall quality of the data from the studies. Results: After the assessment of the two research articles

Thursday, December 12, 2019

Assess Risk in Planning a Project

Question: How might you assess risk in planning a project? Answer: The progression of risk management starts through trying a list of every expected risk that might impact the project (Royer 2001). Whenever the new project begins, it actually starts with the risk and at the level of uncertainty that might create deadlocks in the completion of the projects (The Owner's Role in Project Risk Management 2005). Its evident that management of risk usually ensures if the risk is evaluated and decreased when the assessment is undertaken, then it might reduce the available opportunities (The Owner's Role in Project Risk Management 2005). This is for ensuring that the management of risk cannot reduce the risk associated with the project but through conducting the proper planning, risk could be minimize at certain level and the same will be acceptable for making the project (The Owner's Role in Project Risk Management 2005).There are certain risks that go beyond the range of control and impact the budget and length of the project, for example planning need to be carried out before the risk impacts the project and either before the unexpected events get occurs (The Owner's Role in Project Risk Management 2005). Its noted that planning and analysis is the factor required for the project management success (The Owner's Role in Project Risk Management 2005). In the beginning of the project, key decisions are required to be taken that effect the various stages of the project that base the incomplete or either inaccurate information (The Owner's Role in Project Risk Management 2005). In order to ensure about the best policy of decisions, it is required to conduct risk assessment of the project in early stages in order to take effective decision (The Owner's Role in Project Risk Management 2005). Risk might occur at any project stage that is related to the specific task and some risk is different and might originate outside the project management boundaries (The Owner's Role in Project Risk Management 2005). Below are some methods of risk asses sment: Exploring and Risk Prioritization The most unique and ideal way of dealing with the risk is to explore as well as conduct the systematic research in different phases of the project that might get wrong (Benjamin and Belluck 2001). The process of risk identification for the projects might be conducted in three ways that are discussed below (Benjamin and Belluck 2001). Usually in most of the cases, the project manager tries to pulls, at the time of planning stage, core member team that squad the risk management task, and appropriate stakeholders (Bainey 2004). Participants in the project are usually encouraged to keep the point and try to produce the probable risk related to the project (Schwalbe 2009). Risk Mitigation There are many authors who ahs wrote about the two core strategies related to mitigation of risk such as reducing the adverse conditions that might impact the project and the other one is reducing the event that might occur during the project (Benjamin and Belluck 2001). Its evident that project team usually take care of these events that might halt the expected situations of the project (Benjamin and Belluck 2001). If the expected events minimizes it might reduce the expected cost for other strategy (Benjamin and Belluck 2001). Probability related to avoiding the risk at the time of projects is required; its the responsibility of the entire team to undertake the research for assessing the risk and work towards eliminating it (Benjamin and Belluck 2001). In order to avoid the risk there are certain procedures that need to be adopted in making the project successful, these are: transferring the risk, avoiding the risk, retaining the risk, as well as sharing the risk (Benjamin and Bell uck 2001). These similar terminologies are actually capable of avoiding the risk at the time of project length and eventually occur for the objective of the project (Benjamin and Belluck 2001). Risk analysis Contingency plans Project managers should form the alternative plan if the expected risk arises in the projects, which is mainly known as contingency plan (Brewer and Dittman 2013). In the contingency plan, proceedings are symbolized for mitigating the risk (Menken 2013). Every contingency plan in the project is prepared in the beginning, then it is documented and then this plan includes the funding, cost and estimation for avoiding the risk (Brewer and Dittman 2013). In the starting of the projects, there are many different risks that are explored in the contingency plan that include the possible risk list (Royer 2001). The project nature differ the process of risk identification along with its costing and scheduling (Brewer and Dittman 2013). Management of Change control For effective project completion, risk should be minimized and for minimizing the risk, there is management of change control (Committee for Oversight and Assessment of U.S Department of Energy Project Management 2004). Its the project manager responsibility to explore the changes required for reducing the negative effects for successfully completing the project (Committee for Oversight and Assessment of U.S Department of Energy Project Management 2004). In the process of change control, its not actually possible that every strategy needs to be materialized (Committee for Oversight and Assessment of U.S Department of Energy Project Management 2004). In the management of project change control different priorities should be set that is capable in cope the project as the change is applied on it (Committee for Oversight and Assessment of U.S Department of Energy Project Management 2004). Identification of Risk The process of risk identification need not be limited to the core team. Inputs taken from the sponsors, customers, stakeholders, vendors, as well as subcontractors need to be solicited (Ang, Yang and Sum 1994). Identification of risk establishes the level of uncertainty of exposure for every company (Ang, Yang and Sum 1994). There are many literatures that have written about the same (Ang, Yang and Sum 1994). It is decided that most of the professionals are involved in the huge projects (Wiegers 1998). Identification of risk is quite critical as well as time consuming work. In the realistic approach, its not quite easy to finish the command on the project risk but the exact planning with the core team members are included to bringing out the actual outcomes with both practice and experience (Boehm 1991). Mainly its a right outcome when the members of the team work in coordination and try to focus on explicit areas by focusing on external risk and types of physical relation; dividing the projects in various work pieces, and considers every entity with the project viewpoint in order to anticipate the source of the claim (Lucas, Walton and Ginzberg 1988). Analysis of Risk Analysis includes the exploration of the explanation and estimation ways as well as techniques that is required t deal with the specific risks (Lucas, Walton and Ginzberg 1988). The tenure of project enhances whenever there is a loop in the planning process and in managing the risk (Lucas, Walton and Ginzberg 1988). Every project making includes the identification of risk that is undertaken separately along with complete work team over its judgment and support professionals in carrying out the work (Keil, Cule, Lyytinen and Schmidt 1998). Every task is related to its own possible risk and explores the structure format (Keil, Cule, Lyytinen and Schmidt 1998). Risk table is often allocated for every risk along with threats and opportunities. It also includes how to sort the same and certain individual risk level for attaining the priority of risk (Lucas, Walton and Ginzberg 1988). Identification of risk along with its description is mainly due to the various projects like planning, ope ration as well as testing (Keil, Cule, Lyytinen and Schmidt 1998). Treatment of Risk Treatment of risk is the cycle to explore the measures of risk and to implement the same in modifying the risk (Keil, Cule, Lyytinen and Schmidt 1998). The treatment of risk covers up risk avoidance and risk control (Keil, Cule, Lyytinen and Schmidt 1998). This entire process includes that risk that is serious and that require to be solved through the management bodies (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). This kind of management performs certain priorities for handling the actions of risk control (Block 1983). Risk evaluation Risk could be explored through the research for the project that are underdeveloped, and explored risk starts in the beginning of the project then the risk explores the post planning (Barki, Rivard and Talbot 1993). Risk could also be identified through personal experiences, and there are ten rules for its evaluation that supports in identifying the risk in planning the project, these are: risk identification in starting of project; management of risk is part of risk; risk discussion with the members of team; opportunities and threat to be considered, limits of ownership issues; prioritization of risk; risk analysis; project agreed, implementation and planning of risk, along with exploring risk with related task (Barki, Rivard and Talbot 1993). These rules are actually indicated through the lifeline of the project on which the entire project is effectively run and help in generating the results as per the plan (Barki, Rivard and Talbot 1993). All these rules explore the management of risks that needs to be embedded while making the project through which fault might encounter (Barki, Rivard and Talbot 1993). While at the other side of the project there is no approach focused towards risk management, either the same belief there planning will have no risk or either they assume the level of over confident in both the case, and sometimes its noted that the projects have to face the deadlocks or either changes in time schedule happen in entire project that need to be avoided sometime (Barki, Rivard and Talbot 1993). Planning need to cover up assessment of risks in the beginning of the project that yield the project, risk assessment achievable with the help of two sources are the documentation and the other one is team members (Bancroft, Seip and Sprengel 1998). Team members hold the experience as well as expertise that help in making the project successful that could be completed on time (Bancroft, Seip and Sprengel 1998). In case of documentation, it is required at every step in making the project (Bancroft, Seip and Sprengel 1998). It is quite easy to explore the risk in broad cases, and every project includes various risks through which managers or either team member are made aware, but in certain cases it might get opposite for the risk handler to deal with the occurring risk (Ginzberg 1981). In case if the risk is not properly communicated to the members of the team or either project leader then project might face sufficient issues that are not required (Ginzberg 1981). Once the risk explores and there are certain threats and opportunities, then in that case, opportunities are mainly in the projects but hidden to be carried out and in those cases assessment is required and opportunities support the project in making it strong and successful (Ginzberg 1981). Below is risk assessment and mitigation ways in the IT projects: Huge IT projects needs the commitment of the sufficient time as well as resources from the side of both customers and suppliers and could leave crucial impacts on the business (Willcocks and Margetts 1994). Therefore, before starting any project, its required that detailed assessment about the important risks should be undertaken with the perception of implementing the relevant strategies of risk mitigation (Willcocks and Margetts 1994). Budget The project price could be escalated or either increases the budget amount of the customers if the project manager didnt take proper care in order to ensure that the scope of the project is properly understood as well as documented or the changes are managed in proper way (IT Projects Risk Assessment and Mitigation 2011). Expected mitigation The customers should try to determine the important needs well in advance and should not change them unless and until its really urgent (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). The suppliers should offer the fixed cost and should be clear about the expected consequences of the variations (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). Failure of System Important issues could occur if on commissioning or either after commission the new information Technology system failed in performing as per the set specifications (IT Projects Risk Assessment and Mitigation 2011). Expected Mitigation The party should need to be assured that there should be transparency in needed acceptance over the process of testing and testing needs and full acceptance testing should be undertaken (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). The needs for remedying the failure should be made clear, and need to cover up relevant allowances, which are made as per the timeframe and the results of these remedies are not properly executed in the set timeframe (McFarlan 1981). Delays Delays often occur in implementing the system that arises due to many reasons (Keil and Montealegre 2000). There are certain delays that are usually unavoidable, but there are some that could be avoided through conducting relevant planning (Keil and Montealegre 2000). Its noted that comprehensive projects plans of project addressing might get delayed that could move the project from the track (IT Projects Risk Assessment and Mitigation 2011). Expected mitigation A project plan which is delayed should include the contract, by setting up the proper milestone as well as timetable (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). It should be made clear that every party should be made responsible, especially when exist interdependence (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). Its important that the contract should also easily address what all is happening if the project is delayed and the steps that could be required in reducing the effect of delay (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). Below is the discussion on the risk assessment before project planning: In the areas of the ambiguity as well as indistinctness lies the political environment in the projects (Parr, Shanks and Darke 1999). It is quite similar people nature that provides the impression of good with the officers or they might be interested to relaxing the life without any kind of hassle, and along with it there will be other intention that might wish the project tactics restrictions (Parr, Shanks and Darke 1999). It might be because there are many project managers that might be interested in moving beyond the deadline of the work, and its in their own interest to keep it continue instead of experiencing the distress and then try to follow of project back from it (Parr, Shanks and Darke 1999). Its seen that there are certain projects that go fail, due to the completion culture of the project, which are taken by the users, and this project deliverable is done on time, but there wouldnt be any standards, needs, and quality (Parr, Shanks and Darke 1999). In order to explore and analyze the user needs of the projects, along with scheduling of project, contingency project planning, avoiding risk, along with collecting resources are important part of the project (Parr, Shanks and Darke 1999). These are referred as the objectives that are carried out in starting of the project (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). In order to explore the risk of the project, its importance and nature of project should be explored along with budgeting, extra risk related to user needs, and control of response change (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). Its suggested that in order to complete the assessment of risks, its important to perform the identification of every task along with its level of uncertainty (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). Every task needs to be on priority in the project plan and simultaneously its contingency table should also be prepared. If its not done, then project could get late as it is planned (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). Late projects are not a risk as it might impact whats going at the time of project; therefore, its important to consider every task of the project that might get delay in the length (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). The risk that are identified above that are mainly related to the IT projects, basically, these risks might not be appropriate to the specific project and other major risks might get apply to the project (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). Basically, both the supplier as well as customer might get benefit through preparing the risk analysis before starting of any project, as this might help in determining the ways through which risk related to the project could get mitigated both in the contract and through relevant management of projects, and these risks could be analyzed (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). In these kinds of sessions, shared solving of project in which team members could give their contribution through ideas, and the people from various perspective as well as different functional scenario will hold sophisticated manner to reduce the risk impacts (The Benefits of Risk Assessment for Projects, Portfolios, and Businesses 2009). It is quite obvious that one person could never able to easily evaluate the things that might go wrong. Its the responsibility of every member to easily generate the risk from their own perspective and try to underline the issues. Along with this, they should try to develop the list of risks and try to unify them with the help of manageable groups. These groups should try to explore the base of risk along with all the expected results in order to resolve it. In each project things might get changed by time; therefore, it is important to ensure the area where risk could get arise and the same should be avoided. References Royer, P. S. 2001. Project Risk Management: A Proactive Approach. Management Concepts Inc. The Owner's Role in Project Risk Management. 2005. National Academies Press. Bainey, K. R. 2004. Integrated IT Project Management: A Model-centric Approach. Artech House Schwalbe, K. 2009. Information Technology Project Management. Cengage Learning Robert, K., Stuart, M., Anderson, D. and Schexnayder, C. J. 2010. Guidebook on Risk Analysis Tools and Management Practices to Control Transportation Project Costs. Transportation Research Board. Menken, I. 2013. Project Management Guidance - Real World Application, Templates, Documents, and Examples of the use of Project Management in the Public Domain. PLUS Free access to membership only site for downloading. Emereo Publishing. Royer, P. S. 2001. Project Risk Management: An Essential Tool for Managing and Controlling Projects: An Essential Tool for Managing and Controlling Projects. Do Sustainability. Benjamin, S. L. and Belluck, D. A. 2001. A Practical Guide to Understanding, Managing, and Reviewing Environmental Risk Assessment Reports. CRC Press. Brewer, J. L. and Dittman, K. C. 2013. Methods of IT Project Management. Purdue University Press Committee for Oversight and Assessment of U.S Department of Energy Project Management. 2004. Progress in Improving Project Management at the Department of Energy:: 2003 Assessment. National Academies Press. The Benefits of Risk Assessment for Projects, Portfolios, and Businesses. 2009. https://www.oracle.com/us/products/applications/042743.pdf IT Projects Risk Assessment and Mitigation. 2011. https://www.simpsongrierson.com/ezine-it-projects-risk-assessments-mitigation/ Ang, J.S.K., Yang, K.K. and Sum, C.C. 1994. MRP II company proÂÅ ½ le and implementation problems: a Singapore experience. International Journal of Production Economics, 34, pp. 3546. Bancroft, N., Seip, H. and Sprengel, A. 1998. Implementing SAP R/3, 2nd edn. Greenwich: Manning Publications Barki, H., Rivard, S. and Talbot, J. 1993. Toward an assess- ment of software development risk. Journal of Management Information Systems, 10(2), pp. 20325. Block, R. 1983. The Politics of Projects. New Jersey: Yourdon Press, Prentice-Hall Boehm, B.W. 1991. Software risk management: principles and practices. IEEE Software, 8(1), pp. 1- 3241 Ginzberg, M. I. 1981. Early diagnosis of MIS implementation failure: promising results and unanswered questions. Management Science, 27(4), pp. 45978. Keil, M., Cule, P.E., Lyytinen, K. and Schmidt, R.C. 1998. A framework for identifying software project risks. Communications of the ACM, 41(11), pp. 7683. Keil, M. and Montealegre, R. 2000. Cutting your losses: extricating your organization when a big project goes awry. Sloan Management Review, 41(3), pp. 5568. Lucas, H., Walton, E. and Ginzberg, M. 1988. Implementing packaged software. MIS Quarterly, 12, pp. 53749 McFarlan, F.W. 1981. Portfolio approach to information systems. Harvard Business Review, 59(5), pp. 14250. Parr, A.N., Shanks, G. and Darke, P. 1999. Identification of necessary factors for successful implementation of ERP systems. In New Information Technologies in Organizational Processes: Field Studies and Theoretical Reactions on the Future of Work. London: Kluwer Academic Publishers Wiegers, K. 1998. Know your enemy: software risk management. Software Development Willcocks, L. and Margetts, H. 1994. Risk assessment and information systems. European Journal of Information Systems, 3(2), pp. 12738

Wednesday, December 4, 2019

Equity Bank New Mobile Solutions Technology

Question: Discuss and Explain how Reducing the queues at Equity bank using the new mobile solutions technology in the world. Answer: Introduction: Equity bank, a biggest bank in Africa by customer base, it provides financial services to customers, the organization has a footprint in East and central Africa. The purpose of this assignment is to analyze how Equity bank, can use a new product which is mobile banking to solve the long queues that have been experienced in the banking halls. Traditionally the bank has embraced paper banking where customers fill in deposits slips or situations where the customers fill in forms in account opening, or even loans applications It has been a complaint by customers, the long queues experienced in the banking halls, are very frustrating and it leads to customers spending a lot of time while doing transactions. The customers also use lots of resources to reach the banks, like fuel. As a result this financial institution, is dedicated to introduce a new mobile app solution, that will allow over 100million of its customers, to access banking services on their mobile phones, the new product is expected to move the banking services from paper work to internet and mobile based transaction. This paper endeavors to examine use of TRIZ (Theory of inventive problems) the problem in this context being the long queues experienced by customers in the banks, and how DFSS can be used in executing the new product mobile banking for the bank. The purpose of this project is to eliminate long queues in the bank (TRIZ) by introducing new product mobile banking(DFSS). Introducing the new mobile banking solution will, will tend to reduce the number of customers visiting the banks to complete bank transaction, this will also improve service delivery to the customers, since customers will serve themselves via the technology. Queues will greatly reduce and banking will be transformed from where you go into something you do. The focus will not be on customer service, but more on the systems serving the customers. Introduction of mobile banking will reduce the banks operative costs like the number of employees serving customers, and the stationery that was used when customers are purchasing products and services. As result of the bank embracing the mobile banking services and solution, the number of walk ins in the bank will greatly reduce, the image about the bank will be improved, this will also be observed as good principle by the regulators (Choudhry, 2012)Employing mobile banking measures is expected to reduce the cost of production at the branches level at 80% and the queues are greatly expected to reduce, the banking halls by 50%. Before execution of mobile banking system, it is expected that Equity bank will record the number of customers accessing the branches in a given day and there will be compare the statistics after the new mobile banking service has been introduced across all countries in operation. Project Plan For the project to become reality the bank will use an already existing network company and in this context happens to be the Airtel company, the company has 40% of its infrastructure unused, and thus the bank will set up mobile virtual network service (mvno) on Aitrel infrastructure. After the organization has laid the infrastructure, it will test the service through its staff, who will give feedback on the service while accessing loans and transfer of money. The organization will develop a questionnaire submitted via emails to all of its employees who are expected, to give a feedback on the experienced received, the challenges experienced by the employees such as delay of money transfer, will greatly help the institution in redesign of the products a very important aspect in product cycle (Niemann et al, 2008). Once the product has been redesigned it is the duty of the organization to come up with a backup plan, in case the system backfires like using its own network to avail servi ces concurrently. After the redesign of mobile banking, the organization will offer sim cards to access the service to the family members and relatives of the staff, ensure that they are enrolled to the system and allow a few transactions, observe the trends on the systems and finally make it public to customers, on availability of the product. During the project implementation, time frame is very important, the organization will test the product during mid-month when less customers are accessing banking facilities to test the reliability when transactions are few and during end month when more people are accessing facilities, to test robust nature of the systems. Some of the major challenges the organization is expected to encounter during the mobile banking introduction are a poor network coverage, by the network company which will affect the testing and pretesting phases. Being a relatively new product in the world, it is expected that the subscribers will have a problem in accessing key features, before embracing it well from the sim card manual provided. The product will greatly help the banks operation even with introduction of new product through the mobile banking, it will only need a new feature to be introduced in on the menu. For instance, If the organization is introducing a new loan facility to agricultural customers, it will need to send an SMS to all its profiled customers and ask them to check it out in the menu. Solutions The mobile banking service is designed to meet all the operation services at the bank, the question behind the design is security of customers transactions, it is the responsibility of the bank to guard customers sim cards by introducing a onetime pin that can only be submitted to the customers mobile phone, and in case mobile phone is stolen or misplaced, the organization should device a duress signal through its customer care platform, preventing further loss to the customers. Comparison of loans uptake by customers through traditional queue system and current mobile banking systems will enable the organization to increase the loans limits for the customers and thus increase the volumes released to the market, for more profitability. Integration The organization is expected to do mass media communication to the customers about the new product that is being proposed in the market, through mass media customer awareness is very fast (Schramm and Roberts, 1971). It will also incorporate aspect like radio and advertising to reach out customers who prefer listening to radio, other than watching TV. In the integration period, the customers that are used to the traditional banking system will continue lining in the banks though there will be a desk marketing the mobile banking service, ushering customers to embrace the new technology giving an emphasis; customers can access the service through mobile banking without leaving their premises of operations. To make the integration a reality, the bank should cause queues in the banks intentionally, this can be done via closing some cashiers tills, tills closure and marketing of the new system, will highly push the customers to adopt the new system. Costing While implementing a new banking solution for the bank, the organization is expected to set out the budget for the implementation, cost of the places where by core teams are meeting for the project execution and analysis, cost of the transport of high ranking officials might change during the entire period. As a result of the bank embracing the new technological system, there is a lease fee to be paid for the leased space through Airtel network, the engineers who might move from their home countries for project realization, they need to be paid for the service and well accommodated, a cost that the organization incurs. Validation For the validation of the process, the organization needs to acquire licenses from the communication commission in host countries, giving a detailed information on their business operation with the intentions behind the new product. This will ensure the company is subjected to fair competition and the service for the customer is safeguarded, preventing issues like sabotage by the hosting network company and bad publicity about their service. The organization needs to test the mobile banking service speed and reliability through customers that are conducting a few banking transactions in comparison to customers making numerous production, the customers perception in the new advancement will highly help, customers perception highly helps in product development of a product or service (Haque and Ahmed, 2013). Testing will happen by sending messages, to a number of customers asking them to transact on a certain service and watch how fast the system will complete the transactions in focus. Conclusion The paper begins with introduction of Equity bank a financial service provider, with some footprint in East and Central Africa, biggest company in Africa by customer base, the company has been greatly affected by long queues of customers in the banking halls. Ion discussion is the main purpose of the paper which, endeavors to examine use of TRIZ (Theory of inventive problems) the problem in this context being the long queues experienced by customers in the banks, and how DFSS can be used in executing the new product mobile banking for the bank. The purpose of this project is to eliminate long queues in the bank (TRIZ) by introducing new product mobile banking(DFSS). The benefits expected as well as outcomes of eliminating the queues have been analyzed, it gives a project plan and methodology in problem solving, analysis of the new product like its robustness and reliability, solution and integration of the new product, aspect like the cost and factors to consider during the budget al location and last but not least is the project validation whereby in this project customers have been greatly used in testing and validating the product. References Asefeso. Ade MCIPS MBA ,2012. Design for Six Sigma (Dfss). AA Global Sourcing Ltd Bachler, E.B., 2007. The evolution of innovation-TRIZ trends and bionics. Cavanagh, R., Neuman, R. and Pande, P., 2005.What is design for Six Sigma. McGraw Hill Professional. Domb, E.R., 2014.Global Innovation Science Handbook, Chapter 24-TRIZ: Theory of Solving Inventive Problems: Theory of Solving Inventive Problems. McGraw Hill Professional. Ehrlich, B.H., 2002.Transactional six sigma and lean servicing: leveraging manufacturing concepts to achieve world-class service. CRC Press. www.equitybankgroup.com Martin, J.W., 2007.Operational excellence: using lean six sigma to translate customer value through global supply chains. CRC Press. Terninko, J., Zusman, A. and Zlotin, B., 1998.Systematic innovation: an introduction to TRIZ (theory of inventive problem solving). CRC press. Truscott, W.T. and Truscott, W.G., 2003.Six sigma: Continual improvement for business: A practical guide. Routledge. Yi, Y., 2014.Customer value creation behavior. Routledge. Yeoh, T., 2014. TRIZ: Systematic innovation in business and management.Selangor: Firstfruits Sdn Bhd. Creveling, C.M., Slutsky, J. and Antis, D., 2002.Design for Six Sigma in technology and product development. Prentice Hall Professional. Niemann, J., Tichkiewitch, S. and Westkmper, E. eds., 2008.Design of sustainable product life cycles. Springer Science Business Media Schramm, W. and Roberts, D.F., 1971. The process and effects of mass communication. Haque Jr, A. and Ahmed 3rd, S.I., 2013.Customers' Perception Towards Cellular Mobile Telephone Operators. ORIC Publications.

Thursday, November 28, 2019

Musculoskeletal Lecture Notes Essay Example

Musculoskeletal Lecture Notes Essay Musculoskeletal Physiology Be familiar with bones and muscles of body 3 types of muscle skeletal, smooth, cardiac attaches muscle to bone, decreasing angle of Joints during contraction proximal part of esophagi doesnt connect to bone, proximal (upper) conscious control is primary skeletal, distal is involuntary and smooth muscle T- tubules: inside is SEC, deep investigations of plasma membrane in muscle cell PM is sarcoma allows high concentration of Ca, like other CE spaces (ICC Is low) Ca floods into cell through T-tubules at uniform and fast rate Ca signals contraction Triads t tubes with ceroplastic respectful (also high In Ca) on each side, SIR Is resolve for Ca Ca comes In from SIR T-tubule Motor unit Neuromuscular Junction 22. 1. Skeletal muscles are all innervated by somatic nerves, conscious control Neuron goes directly to the muscle and innervated it Motor unit is a single axon and all the muscle fibers it innervates Short distance from terminal of axon and muscle fiber, d/t ACH dumped Into synaptic cleft and bind to receptors on skeletal muscle, when Ach withdrawn muscle relaxes Nerve Impulse down axon, when hits the Exxon terminus It causes a voltage gated Ca channel to pen, wave of depopulation causes Ca to come Into cell (Ca tells cells to do what It does best) and axon terminus releases Its neurotransmitters. ACH) ACH vesicle fuses with plasma membrane, what was inside the vesicle Is now outside the cell, ACH drifts across synaptic cleft to bind to an ACH channel, when 2 Aches bind the channel opens, this allows An to move into the muscle fiber. An wants to go into cell anyways (+ inside). An floods into cell causing muscle fiber to deplorable, causing voltage gated An channel causing further deportation. Ultimately causing voltage dated Ca channel on a T-tubule to open, then Ca flows into cytoplasm from SIR. Rapid influx of Ca throughout muscle cell. We will write a custom essay sample on Musculoskeletal Lecture Notes specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Musculoskeletal Lecture Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Musculoskeletal Lecture Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Ca channels: 1) Voltage gated Ca channel also called: DIP receptors, on T tubule, open d/t deportation of sarcoma. 2) Ca induced Ca channels = reloading channels which are on the SIR and open In response to DIP receptors allowing Ca to come In from SIR. During popularization the Ca gets pumped back Into SIR to Walt for next deportation Muscle Contraction 22. 1. 3 Acting: globular protein thats forms together to make a filament Transmission: small sections that form together and bind to acting at specific place. @ rest covers myosin binding site Trooping: bound to tromping. Parts, l: Ignore C: binds to Ca when it comes into cell T: binds to tromping. When Ca binds to trooping, causes trooping to move tromping exposing the myosin binding site Myosin can now bind to acting, muscle contracts 4 steps to muscle contraction 1 . Myosin head bind to acting filament that has been uncovered, causing release of Phosphate 2. Head of bound myosin flicks, moves one acting globulin, this is the powe r stroke 3. TAP binds to acting head, allowing release of, requires and TAP 4. TAP is hydroxide and head is repositioned As long as Ca is available this will occur. If muscle runs out of TAP = release cant happen = rigor Morris Muscle Fiber Types, Injury Repair 22. 1. 4 Slow oxidative Type 1 more TAP is hydrazine in reposition stage, happens slow high fatigue resistance, lots of oxidative compatibility, aerobic makes TAP as needs it more mitochondria b/c it needs it more myosin RED dark meat (legs walk a lot) doesnt need to store a lot of glycogen smaller and weaker fibers recruit these smaller motor units first Fast oxidative Type AAA Fast glaciology Type b less TAP is hydrazine in reposition stage, happens fast (lox faster) low fatigue resistance, slow oxidative compatibility, anaerobic, blows through TAP fast few mitochondria few capillaries and myosin WHITE breast (wings- seldom) high glycogen content (glycoside) larger and stronger recruit these larger motor units less often Denigrate and innervate (spinal cord injury) other axons will re-innervate those that have been devastated, less fine control Karri poison dart frog Blocks ACH receptor, powerful neuromuscular blockade Colostomies Botulism Causes ACH vesicles to not fuse with PM bottom paralyze muscles, half life is a month or so Colostomies Tennis EXCESSIVE release of ACH, muscle tenses, EX: lock Jaw Mechanical Disorders of the Bone 23. 1. 2 Arthritis- Osteoarthritis Gout Bursitis inflammation of bursa Bone Cancer 1% Dislocation movement of bone out of normal position, no tendon injury Sprains injury to Joint that involves ligament damage Strain occurs to muscles or tendons Fractures Oblique: oblique angle Occult: difficult to visualize, neck of femur Open: skin has been penetrated Pathologic: secondary to another disease EX: CA Segmented: broken into multiple pieces Spiral: oblique angle but spirals, result of twisting force Transverse: straight across Cricketing: cortex is only broken on one side, break doesnt go all the way through Impacted: two ends impacted, pushed one end into other Repair: Casts, external fixation may be needed so pin goes through bone (ankles holds tarsal anchored to tibia) Syphilis- compression fractures, older woman, hump Loriss pregnant women, wet pulls lumbar vertebrae forward increase curvature Scoliosis teenage girls, S-shaped back Treatment: surgery to place intertribal rods Osteoporosis 23. . 3 Osteoporosis loss of bone mass, traceable bone (spongy bone) lots in vertebrates Thinner cortex Estonian: precursor to osteoporosis, some bone loss Women affects men less 1. Men have larger bone mass to begin with 2. Menopause increases rate of bone loss 3. Men die younger, dont have a chance to loss the bone Males continue to produce bone at almost same rate as it is being reabsorbed Descant: X-rays through bone to see attenuation of bones,

Sunday, November 24, 2019

Bundling Campaign Contributions - How It Works

Bundling Campaign Contributions - How It Works Bundling campaign  contributions is a common practice in American congressional and presidential elections. The term bundling refers to a form of fundraising in which one person or small groups of people - they might be lobbyists, business owners, special interest groups or activists seeking legislative action  - convince  their wealthy friends, coworkers and other like-minded donors to simultaneously write checks to their preferred candidate for public office. It is not uncommon for bundlers to raise hundreds of millions of dollars in a presidential-election year and receive special treatment in return for their work. A bundler is the person or small group of people  who pool or aggregates these contributions and then delivers them in one lump sum to a political campaign. In the 2000 presidential campaign, Republican nominee  George W. Bush used the term pioneers to describe bundlers who raised at least $100,000 for his White House bid. Bundlers are often rewarded by successful candidates with plum positions in an administration or other political favors.  Four out of five of Democratic presidential nominee  Barack Obamas largest fundraisers in the 2008 presidential campaign received  key posts in his administration, according to the Washington, D.C.-based Center for Responsive Politics. Bundling is a legal way for campaign supporters to circumvent  individual contribution limits set forth in federal campaign finance laws.  An individual can contribute up to $2,700 to a candidate for federal office in a single election cycle, or up to $5,400 a year. But bundlers can persuade like-minded donors to give at once, typically by inviting them to a fundraiser or special event and in turn rolling up those contributions into massive sums of money to federal candidates. Bundling Is Not Heavily Regulated The Federal Election Commission, the entity that regulates campaign-finance laws in the U.S.,  requires candidates for federal office  disclose the funds bundled by registered lobbyists. For everyone whos not a lobbyists? Disclosure is voluntary and sporadic. In the 2008 presidential election, for example, Obama and Republican nominee John McCain both agreed to make public the names of bundlers who raised more than $50,000. The FEC rules, however, are considered loose by government watchdogs and  easily circumvented by crafty bundlers and lobbyists wishing to remain out of the public eye. In some cases, bundlers are able to avoid disclosing their role in raising large sums of money for a campaign by never physically pooling and delivering the checks, just organizing the fundraising.   How Much Money Do Bundlers Raise? Bundlers are responsible for generating tens of millions of dollars to their preferred candidates. In the 2012 presidential race, for example, bundlers delivered about $200 million to Obamas campaign, according to the Center for Responsive Politics. Bundlers, who are often corporate CEOs, lobbyists, hedge fund managers or independently wealthy people, are able to funnel far more money to campaigns than they could personally give under campaign finance laws, states the good-government group Public Citizen.   Why Bundlers Bundle Bundlers who deliver large amounts of campaign cash to candidates have been rewarded with access to prominent White House advisers and strategists, official titles and privileged treatment in campaigns, and ambassadorships and other plum political appointments. The Center for Public Integrity reported that Obama rewarded about 200 bundlers with jobs and appointments. Bundlers play an enormous role in determining the success of political campaigns and are apt to receive preferential treatment if their candidate wins, Public Citizen wrote. Bundlers who direct money to presidential candidates tend to be first in line for plum ambassador positions and other political appointments. Industry titans and lobbyists are more likely to receive preferential treatment from elected officials if they raised large amounts of money for them. When Is Bundling Illegal? Bundlers seeking political favors often promise big money to candidates. And sometimes they fail to deliver. So in some cases, bundlers have been known to give large sums of money to employees, family members and friends with the implicit goal of having those employees, family members and friends turn around and contribute to a candidate for Congress or the presidency. Thats illegal.

Thursday, November 21, 2019

What is Gospel Research Paper Example | Topics and Well Written Essays - 1250 words

What is Gospel - Research Paper Example Gospel to Christians, is described as the saving acts of Jesus on the cross and through his resurrection which acted as a reconciliatory bridge to bring back the initial relationship that existed between God and the people (Dunn 37). The discussion below will try to expound more on what the gospel means, taking into account several publications by various authors and the Bible. It is meant to give an insightful discussion into the topic and will culminate into an argument on the comparisons between the gospel of Jesus and that of Paul. In the discussion, Biblical referencing will largely rotate around the four main books that outline the life of Jesus: Mathew, Luke, Mark and John. Alongside these books will be the authorship works of Paul which will also be considered to bring out the meaning of the topic from Paul’s perspective. Publications from other authors who have already dug into the topic of gospel will also be consulted. At the end of the research, I will also discuss my opinion of why the gospel is good to Christianity and how it has helped to make a difference in my life. Before proceeding to the topic, however, I will provide a brief overview of the lives of both Jesus and Paul as it will help to set the basis of our discussion. According to the lines in (Mathew 2:1), Jesus was born in Jerusalem, Judea during the rule of King Herod. He began his life in Nazareth and only started his gospel ministry after 30 years. (Luke 3:1). The commencement of his ministry followed his baptism by John the Baptist and this set way for his Divine Mission of spreading the good news. He then withdrew into the desert where he took a 40-day fast. After overcoming temptations by the devil, He went back to the neighbourhood of his Baptist’s ministry from where he won his first disciples (Mathew 3:4). It is during this time that Jesus performed his maiden miracle and where prepared wine from water at a nuptial party at Cana,