Saturday, January 25, 2020
Embryonic Wars Essay -- essays research papers
The specific objective of this major essay is to clarify and summarise the controversial debate concerning the ethical decency of embryonic cloning for therapeutic purposes. This is the form of cloning that is supposedly beneficial to a barrage of medical applications. We will identify the key opposing ethical perspectives such as those of the justification of embryonic research based on the normative theory of consequentialism. This paper will also probe into the relatively brief history of the debate while gauging the particular stumbling blocks of disagreement which bioethicists have arrived at. The topical aspects of therapeutic cloning will be closely studied by weighing the pros and cons and gaining a greater understanding of the present scenario. Formally speaking, embryonic cloning is a technique used by researchers and animal breeders to split a single embryo into two or more embryos that will all have the same genetic information. Some more extreme forms of Embryonic or Therapeutic cloning involve the deliberate creation of an identical twin to be destroyed before implantation in order to make replacement tissues. However, these identical twins are usually only six day old embryos, a minuscule collection of cells without a nervous system. Therapeutically, the notion of cloning is medically significant because cloned individuals at the embryonic stage "share the same immune characteristics as each other" (Harris 26). The possibility of cloning an individual at the embryo stage allows one clone to be used as a cell tissue and organ bank for the other. Embryonic cloning has a history of significant developments and discoveries that have occurred only in the past ten or twenty years. In the nineteen eighties and early nineteen nineties, sophisticated foetal and embryological research was banned by the United Statesââ¬â¢ Reagan and Bush administrations due to pressure from pro-life factions of the Republican party. However, these regulations against research into the controversial field were relaxed considerably with the inception of the more pro-choice Clinton administration. In October 1994, Robert J. Stillman shocked the world with the news of his successful "cloning of seventeen flawed human embryos at George Washington Medical Center" (Dyson & Harris 276) in the United States. Events such as this have continued to spark furiou... ...ead the developed nations to gain a proficient understanding of the realistic positive and negative possibilities of therapeutic cloning in the near future. This will, in time, generate the global legislations giving much needed ethical and humane boundaries to a field which is yet to be conquered. Works Referenced & Consulted Dyson, A. & Harris J. Eds. "Experiments on embryos" London, New York: Routledge, 1990. Harris, J. Chapter 1: "The Art of the Possible", in Clones, Genes and Immortality, Oxford: Oxford University Press, 1998. Hyde, Margaret O. & Hyde, Lawrence E. "Cloning and the new genetics" Hillside, N.J., U.S.A.: Enslow Publishers, 1984. Lord, B. I., Potten, C. S., Cole, R. J. "Stem cells and tissue homeostasis", Cambridge, New York: Cambridge University Press, 1988. Nicholls, Mark, "MATCH, (Movement Against The Cloning of Humans)", in The Tide is Turning, http://www.match.inweb.co.uk/, July 9th, 1999. Pence, Gregory E. "Who's afraid of human cloning?", Rowman & Littlefield, Lanham, c1998. Preston, Noel. "Understanding ethics", Leichhardt, N.S.W.: Federation Press, 1996.
Thursday, January 16, 2020
Trojan Horse
Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today's society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People commit computer crimes because of society's declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today's non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be ââ¬Å"between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges. (Shannon, 16:2) ââ¬Å"It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from ââ¬Ënormal' individuals, but that is not the case. ââ¬Å"(Sharp, 18:3) It is believed that the computer criminal ââ¬Å"often marches to the same drum as the potential victim but follows and unanticipated path. ââ¬Å"(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall. Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. ââ¬Å"When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system. ââ¬Å"(2600:Summer 92,p. 13) Some new terms have been added to the computer criminal vocabulary. ââ¬Å"Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the perpetrator doesn't have to physically present himself or herself. â⬠(Phrack 12,p. 3) Another form of a hidden code is ââ¬Å"salamis. â⬠It came from the big salami loaves sold in delis years ago. Often people would take small portions of bites that were taken out of them and then they were secretly returned to the shelves in the hopes that no one would notice them missing. (Phrack 12,p. 44) Congress has been reacting to the outbreak of computer crimes. ââ¬Å"The U. S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statutes. (Markoff, B 13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computers to obtain money, goods or services or classified information. This also applies to computers used by the federal government or used in interstate of foreign commerce which would cover any system accessed by interstate telecommunication systems. ââ¬Å"Computer crime often requires more sophistications than people realize it. ââ¬Å"(Sullivan, 40:4) Many U. S. businesses have ended up in bankruptcy court unaware that they have been victimized by disgruntled employees. American businesses wishes that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. ââ¬Å"It accounted for $33 billion in services in 1983, and in 1988 it was accounted to be $88 billion. â⬠(Blumenthal, B 1:2) All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness, yet no one knows whether the sea of computer crimes is ââ¬Å"only as big as the Gulf of Mexico or as huge as the North Atlantic. â⬠(Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by the turn of the century, ââ¬Å"nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier. â⬠(Carley, A 1:1) A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights. â⬠(Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson's computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. ââ¬Å"I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson's game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them. (Steve Jackson Interview) Computer professionals are grappling not only with issues of free speech and civil liberties, but also with how to educate the public and the media to the difference between on-line computer experimenters. They also point out that, while the computer networks and the results are a new kind of crime, they are protected by the same laws and freedom of any real world domain. ââ¬Å"A 14-year old boy connects his home computer to a television line, and taps into the computer at his neighborhood bank and regularly transfers money into his personnel account. ââ¬Å"(2600:Spring 93,p. 9) On paper and on screens a popular new mythology is growing quickly in which computer criminals are the ââ¬ËButch Cassidys' of the electronic age. ââ¬Å"These true tales of computer capers are far from being futuristic fantasies. ââ¬Å"(2600:Spring 93:p. 19) They are inspired by scores of real life cases. Computer crimes are not just crimes against the computer, but it is also against the theft of money, information, software, benefits and welfare and many more. ââ¬Å"With the average damage from a computer crime amounting to about $. 5 million, sophisticated computer crimes can rock the industry. (Phrack 25,p. 6) Computer crimes can take on many forms. Swindling or stealing of money is one of the most common computer crime. An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $21. 3 million, it is the largest U. S. electronic bank fraud on record. (Phrack 23,p. 46) Credit Card scams are also a type of computer crime. This is one that fears many people and for good reasons. A fellow computer hacker that goes by the handle of Raven is someone who uses his computer to access credit data bases. In a talk that I had with him he tried to explain what he did and how he did it. He is a very intelligent person because he gained illegal access to a credit data base and obtained the credit history of local residents. He then allegedly uses the residents names and credit information to apply for 24 Mastercards and Visa cards. He used the cards to issue himself at least 40,000 in cash from a number of automatic teller machines. He was caught once but was only withdrawing $200 and in was a minor larceny and they couldn't prove that he was the one who did the other ones so he was put on probation. I was 17 and I needed money and the people in the underground taught me many things. I would not go back and not do what I did but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) and we are currently devising other ways to make money. If it weren't for my computer my life would be nothing like it is today. ââ¬Å"(Interview w/Raven) ââ¬Å"Finally, one of the thefts involving the computer is the theft of computer time. Most of us don't realize this as a crime, but the congress consider this as a crime. ââ¬Å"(Ball,V85) Everyday people are urged to use the computer but sometimes the use becomes excessive or improper or both. For example, at most colleges computer time is thought of as free-good students and faculty often computerizes mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper. In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss. ââ¬Å"While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems. ââ¬Å"(Alexander, V119) The issue of computer crimes draw attention to the civil or liability aspects in computing environments. In the future there may tend to be more individual and class action suits. Computer crimes are fast and growing because the evolution of technology is fast, but the evolution of law is slow. While a variety of states have passed legislation relating to computer crime, the situation is a national problem that requires a national solution. Controls can be instituted within industries to prevent such crimes. Protection measures such as hardware identification, access controls software and disconnecting critical bank applications should be devised. However, computers don't commit crimes; people do. The perpetrator's best advantage is ignorance on the part of those protecting the system. Proper internal controls reduce the opportunity for fraud.
Wednesday, January 8, 2020
Geography Of Texas An Amazing City - 1306 Words
Geography of Texas When you think of Texas you probably think big...well youââ¬â¢re correct. The biggest mountain in Texas is Guadalupe Peak which is towering at 8,751 feet. Another one of these mountains is El Capitan which is huge in itââ¬â¢s own way at 7,569 feet. Also did you know that El Capitan is spanish for The Captain? The last mountain I decided to write about is Bush Mountain which is the tallest mountain in the Bush Mountains which is towering at an amazing 8,632 feet. Rio Grande is an amazing city, but another thing is that it holds the biggest river in the state the coincidentally is named the Rio Grande. It is 1,896 miles. There is another river called The San Antonio river and it is one of the smallest rivers in Texas. Did youâ⬠¦show more contentâ⬠¦History The first settlers in Texas were not the Americans it was the Tejano indians a tribe which had lived in the Texas region for about 100 years. The worst part of the whole Americans coming and and taking the texas land is that the natives in Texas who had lived there for 100 years get kicked out because apparently our priorities are bigger than the people who have lived there a long time. One of the great past events that had come up in the history of Texas is that it was the 28th state named just after the 27th state Florida. Another great historic event in Texan history is when Sam Houston launched a surprise attack on the Mexican general Santa Anna along the San Jacinto River. One of the greatest battles in Texan history is the Battle of the Alamo in which two volunteers named George Collinsworth and Benjamin Milam take over the Alamo breaking away from Mexico and later joining the U.S.A. Francisco Vazquez de Coronado was an explorer who was in search of Gran Quivira which is a vast city with multiple pueblos and kivas. Famous People Jim Parsons was born on March 24, 1973 in Houston, Texas. Fun Fact March 24 is the same birthday as Peter Braun!! Parsons has become most famous for his work on the show The Big Bang Theory. Later he got from his work on the show he got the main speaking role in the new movie Home
Tuesday, December 31, 2019
The Lottery By Shirley Jackson - 887 Words
When I first started reading ââ¬Å"The Lotteryâ⬠a short story by Shirley Jackson, I thought it was about when the lottery, as we know it today, first originated. After reading the entire short story I couldnââ¬â¢t have been more wrong. It reminds me of the popular book series and movie franchise called The Hunger Games. Even though, I am taken aback by the ending I am not completely surprised, because of the era this story took place in. Had this lottery taken place in todayââ¬â¢s modern society in the United States, it would be completely outrageous and horrifying. As soon as I started reading the short story I knew that it took place over a century ago as Jackson presented the community as being a small farming village of 300 people. Winning the lottery is supposed to be a great, thing met with excitement and celebration, which is why in the beginning of this story I felt like it was about todayââ¬â¢s lottery. The writer wrote about the townââ¬â¢s people ga thering together with the children laughing and playing, the men telling jokes, and the women gossiping. These are not the actions of people during a somber event. When the young boys of the village were gathering smooth round stones I thought they were going to be used to go skip stones at the local swimming hole when the lottery concluded, again I couldnââ¬â¢t have been more wrong. The people in the story did not seem horrified or scared about what was about to happen, so neither did I. Mrs. Hutchinson laughed with Mrs. DelacroixShow MoreRelatedThe Lottery, By Shirley Jackson1195 Words à |à 5 PagesOn the surface, Shirley Jacksonââ¬â¢s short story, ââ¬Å"The Lottery,â⬠reads as a work of horror. There is a village that holds an annual lottery where the winner is stoned to death so the village and its people could prosper. Some underlying themes include: the idea that faith and tradition are often followed blindly, and those who veer away from tradition are met w ith punishment, as well as the idea of a herd mentality and bystander apathy. What the author manages to do successfully is that she actuallyRead MoreThe Lottery by Shirley Jackson757 Words à |à 4 Pagessucceed but many fail just like the main character Tessie Hutchinson in Shirley Jacksonââ¬â¢s short story ââ¬Å"The Lotteryâ⬠. When someone hears the word ââ¬Å"lotteryâ⬠, he or she may think that someone will be rewarded with prize. But ââ¬Å"The Lotteryâ⬠By Shirley Jackson is different than what one thinks. In the story, a lottery is going to be conducted not like Mega Million or Powerball one play here. In the story, the person who wins the lottery is stoned to death instead of being rewarded with the prize. TessieRead MoreThe Lottery By Shirley Jackson931 Words à |à 4 PagesIn 1948 Shirley Jackson composed the controversial short story ââ¬Å"The Lottery.â⬠Generally speaking, a title such as ââ¬Å"The Lotteryâ⬠is usually affiliated with a n optimistic outlook. However, Jacksonââ¬â¢s approach is quite unorthodox and will surely leave readers contemplating the intent of her content. The story exposes a crude, senseless lottery system in which random villagers are murdered amongst their peers. Essentially, the lottery system counteracts as a form of population control, but negatives easilyRead MoreThe Lottery By Shirley Jackson1504 Words à |à 7 Pagesââ¬Å"The Lotteryâ⬠by Shirley Jackson In The Lottery Shirley Jackson fills her story with many literary elements to mask the evil. The story demonstrates how it is in human nature to blindly follow traditions. Even though some people have no idea why they follow these traditions. The title of the story plays a role in how Shirley Jackson used some literary elements to help mask the evils and develop the story. The title ââ¬Å"The Lotteryâ⬠serves as an allegory. When people think of the lottery majorityRead More`` The Lottery `` By Shirley Jackson894 Words à |à 4 Pagesshort story ââ¬Å"The Lotteryâ⬠, author Shirley Jackson demonstrates Zimbardoââ¬â¢s concepts in three different areas: Authority figures, Tradition and Superstition, and Loyalty. The first concept Jackson portrays in ââ¬Å"The Lotteryâ⬠is the authority figures. Jackson indicates that the lottery is being held in the town center by one authority figure, Mr. Summers, annually on June 27th. Every June 27th, without fail, townspeople gather in the town square to participate in the annually lottery even though mostRead MoreThe Lottery, By Shirley Jackson1510 Words à |à 7 PagesShirley Jacksonââ¬â¢s ââ¬Å"The Lotteryâ⬠illustrates several aspects of the darker side of human nature. The townspeople in Jacksonââ¬â¢s ââ¬Å"The Lotteryâ⬠unquestioningly adhere to a tradition which seems to have lost its relevance in their lives. The ritual that is the lottery shows how easily and willingly people will give up their free will and suspend their consciences to conform to tradition and people in authority. The same mindless complacency and obedience shown by the villagers in Jacksonââ¬â¢s story are seenRead MoreThe Lottery By Shirley Jackson8 11 Words à |à 4 Pagesââ¬Å"The Lotteryâ⬠was published by Shirley Jackson. The story was true expression of Jacksonââ¬â¢s genuine thoughts about human beings and their heinous competence in an annual village event for corn harvest . First, her used to word symbolized main point of the story. Second, Jackson was inspired by few historical events happened in the past and a life incident in her life. Lastly, She was able to accomplish the connection between historical and biographical with the story. Therefore, Shirley Jacksonââ¬â¢sRead MoreThe Lottery By Shirley Jackson934 Words à |à 4 Pagesââ¬Å"The Lotteryâ⬠by Shirley Jackson signifies the physical connection between the villagers and their unwillingness to give up their tradition. ââ¬Å"The Lotteryâ⬠is very unpredictable and quite misleading. The black box has no functionality, except every June 27th. Shirley Jackson depicts the black box as an important and traditional tool. Although the villagers in ââ¬Å"The Lotteryâ⬠are terrified of the goal of the lottery and the black box, they are unwilling to let go of the tradition. Shirley Jackson portraysRead MoreThe Lottery by Shirley Jackson799 Words à |à 4 Pagesthe mood and to foreshadow of things to come. The Lottery by Shirley Jackson is a story in which the setting sets up the reader to think of positive outcomes. However, this description of the setting foreshadows exactly the opposite of what is to come. In addition, the theme that we learn of at the end leads us to think of where the sanity of some human beings lies. The story begins with the establishment of the setting. To begin, Shirley Jackson tells the reader what time of day and what time ofRead MoreThe Lottery by Shirley Jackson1764 Words à |à 7 Pagesfilled with excitement and eeriness, leaving the reader speechless. The Lottery , a short story written by famous writer Shirley Jackson, created an uproar on June 26, 1948, when it was published in the magazine The New Yorker (Ball). The gothic thriller, set in an unknown time and place, shares the tradition of a small town, a little larger than three hundred people, in which a drawing is held once a year. In this ââ¬Å"Lottery,â⬠each familyââ¬â¢s husband draws a slip of paper from a black box. The husband
Monday, December 23, 2019
My Sen 180 Intercultural Communication Class Essay
My HUN 180 Intercultural communication class conducted a field trip to the Jamaica Islamic Center, Queens, on November 22, 2016. I did some research about the Jamaica Islamic Center and, according to JIC ââ¬Å"Jamaica Islamic Center, INC is an initiative of Muslims in America dedicated to promoting Islamic awareness and facilitating socio-economic welfare of the common people in Jamaica, Queens, New Yorkâ⬠. (http://jamaicamuslimcenter.org/) I met my HUN 180 class in the E-building lobby in LaGuardia community College where we discussed the agenda for the day. Then we proceeded to the train station on Rawson Street where we took the Queens-bound 7 train. Once we arrived at the Hillside station in Queens on 167th, we met Mr. Zaheer who was our guide for the trip. He gave us a brief talk about Hillside. I remember him telling us that majority of the people living there are from Bangladesh and owns most of Business. We introduced ourselves then proceeded to the Muslim center. It was a walk of about two minutes. On reaching there, there a man wearing a blue outfit (it looks like clothing that Muslims wear, similar to a robe) who told us that we had to remove our shoes before we enter the room. Once we took our shoes off we walked in and sat quietly, waiting for our tour guide to arrive. As we waited, I observed that the floor was covered with a red carpet, the walls had Arabic writings, and there was a shelf on the opposite side of the room from where I was sitting, that was full of
Sunday, December 15, 2019
Forces Leading to the War of 1812 Free Essays
The war of 1812, supposedly fought over neutral trading rights, was a very peculiar conflict indeed. Britainââ¬â¢s trade restrictions, one of the main causes, were removed two days before the war started; the New Englanders, for whom the war was supposedly fought, opposed it; the most decisive battle, at New Orleans, was fought after the war ended. Before the war began, Britain and France had disrupted US shipping, confiscated American goods, taking US seamen into the British navy, and both sides had blockaded each otherââ¬â¢s ports which caused great annoyance to American traders, and Britainââ¬â¢s abduction of American sailors especially caused great uproar and indignation at home. We will write a custom essay sample on Forces Leading to the War of 1812 or any similar topic only for you Order Now These forces led Americans to declare war on Britain in 1812. When the war began, it was being fought by the Americans to address their grievances toward the British. This seemed like a justifiable cause for a war, however not all of the citizens shared the same sense of unity about the political issues the war was being fought over. The US was quite upset about the continuing impressments of American sailors into the British Navy and the seizures of American merchant trading vessels by the British. In a committee report in 1811, congressmen address their complaints against Britain. The British defied an ââ¬Å"incontestable rightâ⬠, and they captured ââ¬Å"every American vesselâ⬠that they could find. In response to these intolerable actions, The president of the United States wishes to declare war against Great Britain. A group of congressman known as the War Hawks desperately desired going to war. One of these ââ¬Å"War Hawks,â⬠John C. Calhoun, agrees with the committeeââ¬â¢s report, by saying ââ¬Å"these rights are essentially attacked, and war is the only means of redress. â⬠Hugh Nelson, congressman from Virginia, believed that the war was inevitable and that it would bring the American people together. He stated, ââ¬Å"to demonstrate to the worldâ⬠¦ hat the people of these state were united, one and indivisible. â⬠This quote demonstrates his thoughts that if the United States were to unite in a strong fashion, it would indeed ââ¬Å"repel all foreign aggression. â⬠President Madisonââ¬â¢s Declaration of War coincided directly with the report and the writings of the War Hawks, in that it explained itself by stating, ââ¬Å"We behold our seaf aring citizens still the daily victims of lawless violenceâ⬠¦ We behold our vesselsâ⬠¦ wrested from their lawful destinations. â⬠In the War of 1812, many groups had apprehensions to the war at hand. Some, like the War Hawks, used the plight of the New England maritime traders as an excuse to go to war. In reality though, New England was doing better off before the war, because during which it became increasingly difficult to ship goods across the Atlantic and it was impossible to trade with Great Britain. John Randolph, a Representative from Virginia, even went as far as to say that ââ¬Å"maritime rightsâ⬠had no say in influencing the war. He believed that ââ¬Å"agrarian cupidityâ⬠was the true influence that urged the war. By that, Randolph means that men are looking to take the fertile lands of British Canada for themselves, considering that the northern mountains did them no good. When observing the votes for war in the House of Representatives, one might notice a peculiar detail. The agrarian regions of the United states, which includes the Western Frontier, The South and The Agricultural Mid-Atlantic States, have many more yes votes than no votes. Whereas in New England, and the Maritime and Commercial Mid-Atlantic States, the no votes heavily outweighed the yes ones. The Jeffersonians claim that they want war to fight for the ââ¬Å"maritime rightsâ⬠and yet the Maritime and Commercial States stand out with a majority of no votes. Not a single Federalist voted yes for the congressional vote for war, while a large majority of Democratic-Republicans voted yes for war. Most of these Federalists were also ironically located in New England, but most of the Democratic-Republicans were located in the South and the West. Before the War of 1812, If Americans had been able to put aside their regional selfishness and differences, a declaration of war may not have even been required in the first place. Forces such as disrupted shipping, confiscated goods, and abduction of sailors could have been negotiated over with Great Britain. The United States lacked the unity, discipline, and strength to challenge the British and ended up paying dearly for the declaration of war against them. It is evident in the representativesââ¬â¢ voting that New England and other Maritime regions were against the war. This may suggest that the idea for war was prompted by Democratic-Republicans like the War Hawks, whose motives may have been questionable as mentioned by Randolph. How to cite Forces Leading to the War of 1812, Essay examples
Saturday, December 7, 2019
Report on Research Proposal TAJ NZ Limited
Question: Write the Report onResearch Proposal for TAJ NZ Limited. Answer: Introduction: TAJ NZ limited is a retail company which is engaged in the making of home making goods such as electronics, appliances and the furniture and the online stores. The company is also involved in the financial activities. The company is a limited liability company and here the liability is limited to the number of shares held by the members of the company. The company is involved in the online shopping which is the ongoing trend. The retail company intends to reduce the cost incurred and improve the satisfaction level of the consumers. The company is in the phase of the competition and is at growing stage (Ciarocco, 2016). Description of the Problem: The research is conducted on the system of the inventory management. The growth and the profitability of the company can be enhanced through the inventory system. The company needs to improve the satisfaction of the consumers and the investigation should be done in the research area of the inventory system. The role of the inventory management in improving the growth and the profitability of the company (Elliott Higgins, 2012). The company has been experiencing delay in the delivery of the stocks of goods and the unavailability of the stocks. The profitability, growth and the sales of the company is highly affected by this factor. Scope of the Problem: The ultimate target of the research lies in investigating the performance of the management system, since it is responsible in the growth and development both of TAJ NZ Ltd. The inventory level management is facing difficulties in stores. The reason behind it is researchers would solve the problems and also the problem of the inventory management. The capabilities of the inventory management would be obtained in terms of present day business requirements. The conclusion of this research is it would conclude the problems and their ultimate solution. Research Catalyst: The organization is experiencing rapid increase in the complaints by the customers in terms of the stocks availability in the stores. Consequently it causes delay in the online order of the customers. This concern is significant for the organization in order to maintain the productivity and customer satisfaction as well. The incompatibility in the inventory and communication between the online consumers is not fruitful to the organization if the prompt resolution is not obtained. Investigating the customer complaints would be a correct approach in improving the online consumer support. Therefore through these approaches we can aid in competitive advantage for the company. Preliminary Literature Review There are illogical and incompatible issues related to the company in inventory management .The IT software such as the MYOB and CIN7 monitors the company'smerchandise and other operations. The recorded inventory does not match the match with the physical inventory which lies within the store. These inconsistencies are due to the inappropriate inventory records or the stocks which are misplaced within the stores. Even when inventory records are accurate, location of the articles can be difficult within the store and can be misplaced within the wrong locations. Improper transaction update by the employee of the company also disrupts the inventory management. Delay in online order of the customer can also increase the complaints. It is significant to look into the customer complaints as it would otherwise result in damaging the company's reputation. The ultimate target of the company is to improve the overall customer'sview towards the company which should be honest and loyal. Proposed Methods of Research: In order to complete the research proposal the informations and the ideas collected is comprised of the section of the method of research proposal. The data has been collected using the qualitative as well as the qualitative methods. Interviews are the method of direct observation has been used in the qualitative analysis and in the quantitative analysis, secondary research has formed the major part and which include the survey by either visiting the data published by the institute or by accessing the online data available. The data have been collected are both the primary and the secondary. In order to produce the reliable results, ethical culture and the brief literature are also considered (Saunders Lewis, 2014). Authorization: The person involve in solving the problems have been identified with the research conducted using the primary and the secondary data. The members of team conducting the research and the team leader Narushka is being held responsible for the presentation of the reports of the research successfully. The other two team members who are identified to solve the problems are Tajinder singh and Saurabh walia and this is because of the past experience possessed by them. The meeting notes of the research conducted every day and the associated outcome would be shared by him and tajinder singh would be responsible to share with all the other team members. Responsibility for Implementation: The data in the research proposal would be searched using the different terms such as: Managing the operations by inventory management Management of the inventory is done suing the different software and the retail business operations Limitations of the software used in the management of the inventory Benefits of the inventory management software Conclusion and Recommendation: The main issue of the company is the discrepancies in the inventory and the way it is being managed and the discrepancy arises on account of the recording and the actual location of the inventory. The merchandising functions of the company are getting affected by the inaccurate recording and handling of the inventory system. The disparity in the recording of the inventory might be attributed to the manual errors in the recording of the inventories. The transaction of the company regarding the inflow and the outflow of the inventory is not checked properly, therefore the transactions need to be updated and the communication technologies need to be improved. Implementation, Plan and Responsibilities: The company needs to improve the system due to the arising discrepancies from the inventory and it needs to enhance the communication system to provide the platform to the consumers to communicate the complain. The service provided online could be improved if the real time information to the consumers is implemented. This would enable to them to monitor the inventory as this would lower the number of complaint filed by the customers. When the customer is accessing the information using the online platform, the customers would have much better experience (Rofieq et al., 2012). Reference: Baccaglini, L. (2015). Research Proposal Development. Ciarocco, N. J. (2016). of Resource Assignment: Presenting a Research Proposal. Drummer, O. H., Bassed, R. (2013). How to Write a Research proposal and Conduct Productive Research.Pathology-Journal of the RCPA,45, S23. Elliott, N., Higgins, A. (2012). Surviving grounded theory research method in an academic world: Proposal writing and theoretical frameworks.The Grounded Theory Review,11(2), 1-12. O'Leary, Z. (2013).The essential guide to doing your research project. Sage. Pickard, A. (2012).Research methods in information. Facet publishing. Rofieq, A., Husamah, H., Wahyuni, S., Hindun, I., Purwanti, E. (2016, January). Research Methodology through Writing Research Proposal Retrospectively by Combining Classroom Discussion and Collaborative Working Group in Lesson Study. InProceeding of International Conference on Teacher Training and Education(Vol. 1, No. 1). Saunders, M. N., Lewis, P. (2014).Doing research in business and management: An essential guide to planning your project. Pearson Higher Ed.
Subscribe to:
Posts (Atom)