Wednesday, July 31, 2019

BBC The Next Five Years Essay

Introduction The purpose of this study is to investigate the information strategy of the BBC. Having reviewed the various modes of enquiry, we have decided that the unbounded mode is the most appropriate in this instance. Using this, we have investigated the BBCs’[1] IS strategy, examining the external factors that may have an affect upon its planning and design. In addition we have reviewed other issues pertinent to the BBC to determine the possible negative of these might have on the strategy. Finally we have looked at the next five years to evaluate the relevance that significant advances over that period might have on the BBC IS strategy. Enquiry system   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In compiling this report we need first to decide what method we are going to plan our research upon. There are five basic enquiry modes ranging from the simple to the complex and innovative. Enquiry Modes 1) Inductive-Consensual   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As the words suggest this mode of enquiry relies upon one reaching a single conclusion by using a restricted range of interpretations, for example from previous researches into the subject matter. The result is influenced by the general consent of these opinions. For example if one asked the question â€Å"Is public service broadcasting superior to commercial,† and this was only put to BBC employees, the consensus is likely to answer affirmatively. 2) Analytic-deductive   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This mode approaches the problem or enquiry from a different aspect. In this case the problem is broken down into its component parts. Each one of these parts is then analysed and tested for logic. Once this process is complete a formula is used to build the results from the analysis of those parts into a single solution that addresses the problem. 3) Dialectic   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   One of the more complex of the enquiry modes, the dialectic mode is based upon conflict or different viewpoints. It does not question the data, simply the views that are expressed about it, working on the basis that by discussion of the variance a logical conclusion will be reached. A relevant argument for this mode would be the discussion about whether the BBC should be allowed to sell advertising space in the same way that the commercial media does. 4) Multiple reality   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Multiple reality recognizes that people will approach problems from a predetermined viewpoint, based upon their own experience and training. For example an Accountant will look at the commissioning of a new revolutionary BBC sit-com from a different angle of the program planner. This process therefore relies upon the problem being addressed from a number of viewpoints, which will essentially come up with a range of conclusions. 5) Unbounded systems thinking   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This modes works on the basis that, in any given situation, all modes of enquiry are automatically brought to bear, and therefore cannot be separated. Thus, when addressing a problem every viewpoint and conclusion needs to be taken into account. Similarities and differences   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All of the modes described above have similarities. All five rely upon the fact that there is a situation to be addressed in the first place. Additionally the point of the exploration, review and analysis of this problem, for all of the modes is to a) gain knowledge and b) reach a conclusion based on that knowledge, or a solution to the hypothesis or problem posed. Modes 1 and 2 above are similar to the extent that they both have a singular approach to the subject matter, relying upon one viewpoint (or consensus) being the input and the result.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   With modes 3 and 4 the similarities are that both look for a range of viewpoints from which to approach a subject and neither attempt or profess to reach a singular conclusion, preferring instead to provide multiple conclusions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Mode 5, in theory, displays the most similarity to all of the others. This is simply because it works on the premises that, in the real world, none of the enquiry systems and modes described can operate independently.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Equally there are some major differentials between these systems. The key difference is in their approach to a given situation. Mode one differs from the others in that it relies upon a consensus of opinion from a limited range of sources and seeks a single conclusion. Mode two differs from three to five for the same reason, but it also differs from one in the it analyses the component parts of the problem, rather than relying solely on interpretation. Mode three and four differ from each other in that they treat the conclusion in a different manner, three allowing differing conclusions to be presented, and four, seeking argument between different conclusions. Mode fives similarity is also its difference to the others, namely that it does not limit itself to a particular enquiry mode, instead using all formats. Strengths and weaknesses   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Inherent in all enquiry modes are strengths and weaknesses, which need to be recognised. Inductive-Consensual. The strengths of this mode rest in the fact that it is focused in one direction, making it simple to use and relatively quick to apply to a given problem. Its weaknesses lie in the limitation of approach and its reliance upon consensus of opinion. There is no attempt to check the validity of core data. Using the BBC example used in the mode description, there is no guarantee that the consensus of agreement is based on a genuine or, because they are employees of the BBC, biased and inaccurate opinion. Analytic-deductive. In this instance the strength comes from the fact that the component parts have been analysed before arriving at a conclusion. It bases that conclusion on logic. Its weakness comes from the fact that, like mode 1, it relies heavily upon a single source of operator to address the problem or situation. Both modes 1 and two have a strength that is also a weakness. This relates to the fact that both seek to arrive at a single conclusion. This is strength when given a task that asks for a definitive solution and the receiver does not want to input into this, but a weakness when asked for an opinion or range of solution.   Dialectic. The major strength in this mode is that it does allow for differing viewpoints to address a situation, thus relating itself more closely with a real world scenario. Similarly, the fact that it does result in a range of conclusions, and allow these to compete against each other to reach a conclusion is good when seeking a final unified approach. It means that all the options have an opportunity to be considered and discussed. The argumentative aspect can be strength insofar as such an approach can often lead to a tempering of divergent views. Weakness may Multiple reality. Like Dialectic, the multiple approaches have the strength of numerous viewpoints. In this case though, it presents all of the options. This allows the receiver to consider the options from their own particular viewpoint, before they make the final decision. Unbounded systems. The strength of this system is in its unlimited approach to a subject. Using this method ensures that it covers all possible aspects, resulting in a wide range of probable solutions. Its weakness rests in the fact that it is cumbersome and, if used as a tool for a conclusive result, could not facilitate this. In addition it would be a time consuming project. For the purpose of this study we will be using the multiple reality mode. Information Systems strategy – External environment Socio-political   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The BBC is a public service broadcasting organisation. Because of this there are more socio-political factors that impact upon the corporation and its operations than with most other businesses.   From a social point of view one has to look at both society as a whole as well as individual groups. Such groups can consist of ethnic, class and disabled minorities. All of these groups expect to receive equality of service from the corporation. This means that the corporation needs to ensure that it represents each group within all of its programme output. For example, it needs to ensure that within the public face of its broadcasting such minorities are adequately represented, be that in a factual or fictional environment.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On the political front the BBC also has to deal with a number of factions. In line with other businesses it has to pay heed to governments and judicial legislation, although the difference that exists with the BBC is that has a closer link in that it is a public corporation. Similarly, like other media, regulatory bodies overview its product and output. However, in addition to these, the BBC has two additional political factors to deal with. These are the Royal Charter, which has recently been reviewed (2006) and the BBC Trust.    Technological   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Trust is one of the key issues, which dictates the rate at which new technology is taken up. Often the speed at which technology develops is the one thing that makes trust difficult to achieve. No sooner has a user familiarised themselves with one system than this is rendered obsolete by a new one. Davis (2002) in his paper written for the Joint Information Services Committee posed the question that many users were asking. â€Å"How sure can one be that the outcome of an interaction is what it purports to be?† As it operates within the business medium, the BBC has greater access to technology than other organisations. It is an integral part of their broadcasting environment. This includes such areas as Broadband, digital and interactive technology. Internally it uses similar modern technology to other media businesses, in terms of computers, network systems in addition to the TV and radio broadcasting technology. The latter includes such things as cameras, film equipment and outside broadcast vehicles. However, as Paul Cheesbrough, BBC head of technology for production and technology direction, admitted in his interview with Miya Knights (2004), their internal systems do need updating in a number of areas, where he says, â€Å"Internally, our processes for producing and authoring content have been the same for many years and are still very physical. It’s a very distributed set-up with lots of physically-based processes in between.† The internal technology of an organisation is important (Glasson 1996) Economic – Geographical   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The BBC, unlike the commercial broadcasting media, does not receive money from other businesses in terms of advertising revenue, nor much in the way of sponsorship. It is funded in the main by a system of revenue from the television and radio licence, together with the annual financial support that it receives from the British government. Despite the wish, within some factions of the corporation to change this situation, so far this has been rejected. The only other of funding available to the BBC is the commercial sales it makes of its programmes to other broadcasting media throughout the world, including joint ventures, and sales of its products through other medium, such as books and publications, CDs and DVDs.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   From a geographical point of view, the BBC is predominately a British based broadcaster, although it does have a world service for radio, originally set up with the intention of providing a link for armed forces overseas. Historically it has concentrated upon this limited geographical area through which to develop and market its products. However, it does produce programmes relating to and based upon many areas of the world. Nowadays it is also making use of the Internet through which to extend its audience. To add to its home-based productions, the BBC also buys programmes from other media throughout the world. Impact on IS strategy planning and design â€Å"The social, legal, political, ethical, and ecological issues facing business have never been more complex or more difficult to comprehend,† wrote Stephen Wartick (1997). This statement is particularly applicable to the BBC.   The factors mentioned previously form an intrinsic element of its Information Services at the planning and design stage. From a social point of view the BBC is required to cater for all sectors of society. The means that part of its strategy has to be geared towards minority groups. In addition it has historically been seen as a provider of learning, necessitating part of its information system strategy to be used in that direction. Political issues also impact upon its planning and design because, as a result of the need to divert resources to other areas set within its charter, this means that there are fewer resources available to pursue avenues that it might otherwise wish to develop. There have been instances in the past where the political forces have tried to introduce a modicum of pressure onto the corporation and, knowing this is a possibility, must impact on the corporation strategy. The area where the BBC does appear to both holding its own, and in some respects, making significant advances, is in technology. Whilst internally there are areas that need addressing, from an external and production standpoint the organisation is keeping up to date. Here it has encompassed the changes that have occurred since the Information era began in the 1970’s, using modern technology to maintain its reputation as possibly the best broadcaster in the industry. The planning and designing stages are very important. As Paul Cheeseburgh (2004) observed â€Å"The term ‘digital islands’ means a lot in our industry, but there’s no point in moving from analogue to digital processes if those islands are disconnected.† Nevetherless they have made some of their processes more cost competitive as a result of technology, with the use of digital technology being an example of this. Economics probably has the greatest impact on the businesses IS strategies and their planning. Because its funding is subjected to restrictions than other broadcasters, this means that some of the innovative ideas that the BBC might wish to develop may not be possible due to financial restrictions. Similarly, it has a finite budget from which to take advantage of technology advances in the way that it would like to. Geographical issues have an impact on the IS strategy. Being a media corporation means that they have to plan for communication access sometimes to even the remotest parts of the world, and have a variety of climates to contend with. In the equatorial countries for instance, the corporation has had to make use of refrigerated broadcast vehicles. Impacts on IS strategy Risk Categorization Scales   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As has been widely publicised, Information systems and Technology attract risks and these manifest themselves in a number of ways. In all areas of life and business, there is the risk of sabotage (Stewart 2000) Technology for instance, suffers from hacking, virus and other dangers instigated from outside sources. Then there are the mechanical and accidental risks.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Knowing that these events are likely to happen even in the best protected of systems, it is vitally important that this eventuality is recognised and addressed at an early stage. Kim Andersen (2005) in his book on the subject, shows â€Å"how getting things right† helps the information system. This is particularly relevant in a broadcasting organisation such as the BBC. At all stages of the development of an IS and IT strategy plan a consequence analysis should be carried out, this is relevant at each subsequent change as well. Within this process one needs to identify where the possibility of risks lies, what type of risks could attach themselves to the area in question and what the effect of those risks might be. Figure 1 (see appendices) gives an example of a consequence matrix. Effect/probability/Action Grid   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Having analysed the areas of risks and the types of risks that could occur, one then has to categorise and evaluate the risk. This means that one needs to first work out what the effects of that risk will be. Will it be in favour of the organisations and its IS and IT, or will it be fatal. Or will it be somewhere between the two. The next step it to ascertain the probability factor. What is the likelihood of the risk occurring, negligible or certainly? Armed with this information one can then work out what action to take in terms of prevention, assuming that the risk is not to the businesses advantage. Figure 2 (see appendices) shows a simple grid detail the possible results of this analysis. Confidentiality, Integrity and Availability (CIA)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Following on from the previous analysis, the organisation needs to work out what impact this potential risk will have on the business. This can be categorised in three ways. Firstly there is confidentiality and privacy. The BBC IS and IT systems contain a lot of sensitive data, both from an internal and external point of view, such as staff and financial details. It could be embarrassing and costly if this information were to be obtained illegally, in addition to the fact that it could see the organization facing legal action for breach of confidentiality. This area will impact on the information system, (Mwangama 2006)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The second impact of risk could be to the integrity of accuracy of the data. If information is tampered with or altered in any way this would have serious consequences for the business.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The third area of impact is when the data or system is corrupted of deleted. In this case the system or database would be unable to operate and, in an extreme case the contents and data non-recoverable. Potential Negative Impacts 1) Technical   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   From a technical viewpoint the negative impact of the consequences of risk will attach to the strategy planning and design. For example the BBC would need to ensure that, by the introduction of new and more versatile systems and upgrades, this does not increase the risks. If this appears likely then the direction of the strategy will need to be reappraised. Similarly, if by installing new software the system becomes less secure in terms of the data access, the necessity and cost benefit of new software should be evaluated. This may result in technology and information system upgrades being delayed until such time as the security of the hardware can be guaranteed to be as risk proof as possible. 2) Non-Technical   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The organisation also needs to look at the negative issues that the consequence of risk may raise in relation to human and business processing issues. Employees and others involved with the Corporation have a right to expect personal information to be maintained in a confidential and secure manner. The shoulders of the organisation that has the information, to keep it secure. In addition to this is the damage of such a risk to the business processes. It is not only losing of the programmes, which would prove costly enough, it is also the potential of lost data, which in some areas could be irreplaceable. Ethical Issues   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Added to all of the above are the ethical issues surrounding risk. The BBC, like all organisations that keep sensitive and personal data, is subject to both the data protection ACT and their own professional code of conduct and ethics. These include a duty to not harm those for whom you are responsible for and to respect their right to privacy, which includes ensuring that any personal information that they give to you are kept safe. Thus it cannot be passed to a third party, either by the organisation itself or by the intervention of an outside party. Even if that third party is committing an illegal act it does not absolve the corporation from liability. In the modern legal environment, if such an event occurs, the possibility of legal action being taken the organisation is very likely. The code of conduct for the BBC also states that it sees part of its duty being to respect and honour human rights. This extends to ensuring that the technology that is installed within its systems offers the same rights.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In addition to the rights of the individual whose rights have been violated there is the impact that such a breech will have on the corporations’ own reputation. According to a newspaper report written by Owen Gibson (2005) the BBC recently revised their code of ethics to take account of some of these issues. The Next Five Years   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Strategic planning for the future of information systems is important. (Ward & Peppard 2002) A business needs a â€Å"clear vision of where it is trying to go.† (Andersen 2004) and to produce the correct strategy the BBC needs to know what events will impact on the strategy. External changes In terms of the future, the next five years are likely to produce changes of significance in terms of IS and IT in a number of areas, in hard and software (Mark Haggerty 2006).   The advances in wireless technology are one area where these advances are proving to be particularly rapid. This development will allow both television and computers to become really possible, with consumers able to carry the receivers in pockets. They will then be in a position of being able to view at any time and in any place. Wireless technology development will also have an impact on broadcasting in that it will allow ease of access for people involved in news reporting, such as with the BBC. Using these systems, particularly in their news department, the corporation will be able to achieve instant news reporting from almost anywhere in the world. In addition the reports will be able to be accessed and reported on air in real time, in other words as it happens. Continued development in satellite technology will also improve the ability of the BBC to achieve its strategy of moving closer towards a more â€Å"on-demand† consumer environment. Video conferencing is set to be one of the main growth areas in technology over the next five years. (Laura Hailstone 2006). This technology is already being used and implemented by a growing number of businesses. In addition to the business use, this technology is set to move into the private sector, allow for projects such as games shows to be conducted with participants not having to move from their home. With increasing computer technology being incorporated within television sets, the opportunities are available for television presenters to be able to interact directly with the consumer. There will be continued developments in the field of interactive media. The continuing improvements in this area will eliminate the need for there to be two or three machines in a household in order to give the consumer flexibility and choice. Within the next five years the facility of recording direct from the TV should improve substantially, allowing additional onset recording facilities, improving upon what systems such as sky offer already. Interaction will also affect the BBC’s learning facilities leading to closer interaction between teacher and learner, (G. Conole et al 2000). B. Davies (2002) also showed how modern and future information system developments are impacting on users in the education arena. An area of significant relevance to the BBC is the continued development of compact storage systems, such as the MP3. From an internal point of view this will mean less space utilised for storage of produced material, therefore reducing the corporations costs in the area of storage. With the increase in globalisation, business systems will also witness significant innovation over the next five years. Such programmes as the multi-national, multi-lingual supply chain software could be implemented within the BBC, providing it with more accuracy and accessibility in terms of its global operations, allow it to work more closely with the stakeholders who supply the corporation and ensure that the quality of the product is maintained. Internal changes   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The BBC will see changes in a number of areas of IS and IT. It is expected that within the next five years media broadcasters will need to keep updating their technology and systems to meet the increasing demands from the public in the way in which programmes are presented. Digital development is something that the BBC sees as having a significant effect over their programming abilities over the next five years. From the point of view of the production side of their programmes, a test run on one programme has shown that it produces a significant cost reduction. More developments of this nature are planned. Development of the digital technology for the end user is also seen as a means of being able to extend the ability of the viewer to have more control over the way in which they organise their personal viewing or listening schedules. The corporation is planning to use this to restructure the way in which it produces programmes and extend the range of interaction with the consumer. Further developments on the World Wide Web are also being looked at. This will provide the BBC with the ability to make its services available in a number of new ways, including providing a service where programs can be downloaded and watched for a limited period, thereby avoiding the possibility of this being stored and affecting others possible sales of the programmes. As part of this development they are working with all of the major software organisations in the development of products, which will open new opportunities in terms of programming. The BBC sees, what its Director-General Mark Thompson (2005) â€Å"On Demand† television as the way forward in technology. In addition to this the BBC are also developing ways in which their programmes can be transmitted for screening on a range of portable devices. From an in house perspective the BBC sees that IT developments over the next five years will enable it to integrate all of its in house operations, linking together internal systems that previously have been disconnected. Internally there will also be changes in terms of office systems and other related technology usages. Microsoft’s chief technology officer, in his interview with Chris Nuttall (1999) stated that â€Å"every five years there is a revolution in the computer industry.† Therefore it is necessary that organisations like the BBC have a strategy prepared for it. Evidence Research shows that all of the changes outlined are evidenced. Tafazolli, Rahim (2006) comments â€Å"that the days of the totally wireless technology are close and that soon consumers will be able to access the media wherever they are.† Future Tech (2006), have noted that one organisation is already well advanced on a system of voice recognition for the purpose of media viewing, amongst other applications. The article also reveals that MIT are developing the computer glasses, which will make operation of computers and televisions much less tiresome, allowing the consumer to operate TV and Computer without using hands. The article also reveals that hardware companies are working to make the computer less visible. This means that, instead of the current box on the desk, they may be incorporated in the TV or portable devices, which can be, located and operated from anywhere. The BBC launched â€Å"Creative Future Project†. Part of the remit for this project is to continue to monitor the advances in new technology with a view to using the technology as part of its development strategy for the future. The project, and the BBC’s IT department are working with a number of the largest software houses, such as Microsoft and Apple, to development programmes and systems which can assist in the development of broadcasting. Energy consideration is already an area that the BBC is aware of. In the future the role of Information systems and technology will take on more significance in terms of its contribution to energy conservation, (J & R. Franchi 2004) Bibliography Andersen, Kim Viborg. (2004) The Past and Future of Information Systems. Butterworth-Heinemann Ltd Carpenter, Leona, Shaw, Simon and Prescott, Andrew (eds) (1988) Towards the Digital Library, The British Library, London Conole, G., Jacobs, G., Squires, D (ed) (2000), The Changing Face of Learning Technology. Cardiff: University of Wales Press, 1-3. Davies, B. (2002), How new technologies are impacting on users, Joint Information Systems Committee.   Retrieved 17 July 2006 from: http://www.jisc.ac.uk/index.cfm?name=pub_inform2 Franchi, John. R. Franchi (2004) Energy, Technology and Directions for the Future. Elsevier Academic Press. Future Tech. (2006) Future Computing. Retrieved 12 July 2006 from http://www.pages.drexel.edu/~jwb24/newtech/integrate.html Gibson, Owen. (2005) New Ethics Code for BBC. The Guardian Glasson, Bernard, C, Vogel, Doug, Bots, Pieter and Nunamaker, Jay (1996) Information Systems and Technology in the International Office of the Future. Chapman & Hall. UK Haggerty, Mark. (2005) GMS Software development. The next five years. Clientside News Hallstone, Laura (2006). VC market set to grow over the next five years. Retrived 16 July 2006 from www.vcunet.com Knights, Miya (2004) Interview with Paul Cheeseburgh: BBC sees new technology horizons. Retrieved 18 July 2006 from http://www.vnunet.com/vnunet/analysis/2132111/bbc-sees-technology-horizon Mwangama, Ena. (2006) Information in the Next Five Years. Retrieved 18 July 2006 from http://www.comptechlib.com/326.html Nuttall, Chris. (1999). Windows to lose its crown within five years. Retrieved 10 July 2006 from http://news.bbc.co.uk/1/hi/sci/tech/253592.stm/ Press Release (2006) Response to the white paper. Retrieved 16 July 2006 from http://www.bbc.co.uk/pressoffice/pressreleases/stories/2006/03_march/14/white.shtml Review of the BBC’s Royal Charter. (July 2006). Retrieved 17 July 2006 from http://www.bbccharterreview.org.uk/pdf_documents/BBCRoyal%20Charter_july06.pdf Stewart, R.A. (2000). Dam Risk Management (Invited Paper). Proceedings of the International Conference on Geotechnical and Geological Engineering (GeoEng2000). Melbourne, pp. 721-748. Tafazolli, Rahim (2006) Technologies for the Wireless Future. Wireless World Research Forum. UK Thompson, Mark (Director General) (2005) Creative Future Project. Retrieved 16 July 2006 from http://www.bbc.co.uk/thefuture/text/creative_future.html Ward, John and Peppard, Joe. (2002) Strategic Planning for Information Systems. John Wiley & Sons Wartick, Stephen L. (1997) International Business and Society. Blackwell Publishers [1] British Broadcasting Corporation

Tuesday, July 30, 2019

Napoleon Bonaparte

Napoleon Bonaparte â€Å"The human race is governed by its imagination. †(Napoleon Bonaparte)is This quote by Napoleon shows how he believed that government should be made by the voice of the people. Napoleon Bonaparte was a great leader of war for France, and ruled as a democratic reformer. Ever since he was a kid, Napoleon had great leadership skills, and a love for the military. He was an excellent student, and he studied the tactics of previous rulers. Napoleon led many great battles and won most of them by changing the style of the army.His new tactics, leadership skills, and many conquests led him to be praised by many people. This resulted to him being appointed Consul of the French Republic and gaining political power. Napoleon Bonaparte was a democratic reformer because he granted people rights based on the ideas of the French Revolution, understood the importance of civilians, and his people viewed him as a great ruler. Napoleon Bonaparte was a ruler who granted many rights and freedoms to his people. Many of his rights were based on the French Revolution such as the idea of equality.He believed that all people should be treated fairly no matter who they are. This is shown in document four, â€Å"No one should get special treatment based on birth or fortune, and this system of equality is the reason that your English monarchy hates me so much†. Napoleon also believed that improving education was very important, and that it would help bring their country forward. This belief is shown in document two, â€Å"Of all our institutions public education is the most important. Everything depends on it, the present and the future†.He also granted religious freedom, abolished serfdom, and respected his people. All of these freedoms are freedoms that a democratic reformer would certainly give to his people. Napoleon Bonaparte was a man who loved his country and his people which he showed by giving them many rights and freedoms. Napoleon was a man who believed in his people and understood them. He mainly gave his people equality because he understood how important it was throughout his life, especially his childhood. This is shown in document two, â€Å"Before I became a ruler, I was a subject, and before that I was a student.I can never forget how powerfully the sentiment of equality influenced my mind and excited my heart†. He told his civilians that he once was one of them, and he knows how tough life can get. Document four shows how he believes he can make their lives better, â€Å"I have always been of the opinion that the sovereignty should lay with the people†. A democratic reformer would let his people have a say in their government which is exactly what Napoleon did. He wanted the best possible for his people. Unlike an absolute monarch, he listened to what the people had to say, and he based the laws on them.Napoleon Bonaparte was an understanding person who helped the voice of the people be heard . Not only did Napoleon do such great things, but his people admired and praised him as a ruler. Christians believed that God had placed him on Earth to rule as their own benefit. This is shown in document ten, â€Å"God, who has created†¦ by loading our emperor with gifts both in peace and war, established him as our sovereign and made him the agent of his power and his image on earth. † Many of his people respected him, and they were able to list many positive things about Napoleon’s contribution to them.This is shown in document ten, â€Å"Napoleon, our emperor, love, respect, obedience, fidelty, military service, and the taxes levied for the preservation and defense of the empire and of his throne†. Such praise for Napoleon by his people clearly shows that what he does is for them which is a trait of a democratic reformer. His ways to connect and make his citizens happy definitely affected the way his people think about him. Napoleon Bonaparte’s rights and ideas based on the French Revolution, a strong understanding of his people, and his people praising him as a great person all lead to the conclusion that he was a democratic reformer.It is very important to know what his views on government were and how they resulted because we can relate it to governments of today. People can compare how certain rights given to people can better their view on their government. Additionally, it is a way to compare and contrast Napoleon and his ideas to present day government officials. With all of this information, people can make many connections to present day government to other’s such as Napoleon’s. Overall, Napoleon Bonaparte was a great democratic reformer of the past of France. Napoleon Bonaparte Napoleon Bonaparte â€Å"The human race is governed by its imagination. †(Napoleon Bonaparte)is This quote by Napoleon shows how he believed that government should be made by the voice of the people. Napoleon Bonaparte was a great leader of war for France, and ruled as a democratic reformer. Ever since he was a kid, Napoleon had great leadership skills, and a love for the military. He was an excellent student, and he studied the tactics of previous rulers. Napoleon led many great battles and won most of them by changing the style of the army.His new tactics, leadership skills, and many conquests led him to be praised by many people. This resulted to him being appointed Consul of the French Republic and gaining political power. Napoleon Bonaparte was a democratic reformer because he granted people rights based on the ideas of the French Revolution, understood the importance of civilians, and his people viewed him as a great ruler. Napoleon Bonaparte was a ruler who granted many rights and freedoms to his people. Many of his rights were based on the French Revolution such as the idea of equality.He believed that all people should be treated fairly no matter who they are. This is shown in document four, â€Å"No one should get special treatment based on birth or fortune, and this system of equality is the reason that your English monarchy hates me so much†. Napoleon also believed that improving education was very important, and that it would help bring their country forward. This belief is shown in document two, â€Å"Of all our institutions public education is the most important. Everything depends on it, the present and the future†.He also granted religious freedom, abolished serfdom, and respected his people. All of these freedoms are freedoms that a democratic reformer would certainly give to his people. Napoleon Bonaparte was a man who loved his country and his people which he showed by giving them many rights and freedoms. Napoleon was a man who believed in his people and understood them. He mainly gave his people equality because he understood how important it was throughout his life, especially his childhood. This is shown in document two, â€Å"Before I became a ruler, I was a subject, and before that I was a student.I can never forget how powerfully the sentiment of equality influenced my mind and excited my heart†. He told his civilians that he once was one of them, and he knows how tough life can get. Document four shows how he believes he can make their lives better, â€Å"I have always been of the opinion that the sovereignty should lay with the people†. A democratic reformer would let his people have a say in their government which is exactly what Napoleon did. He wanted the best possible for his people. Unlike an absolute monarch, he listened to what the people had to say, and he based the laws on them.Napoleon Bonaparte was an understanding person who helped the voice of the people be heard . Not only did Napoleon do such great things, but his people admired and praised him as a ruler. Christians believed that God had placed him on Earth to rule as their own benefit. This is shown in document ten, â€Å"God, who has created†¦ by loading our emperor with gifts both in peace and war, established him as our sovereign and made him the agent of his power and his image on earth. † Many of his people respected him, and they were able to list many positive things about Napoleon’s contribution to them.This is shown in document ten, â€Å"Napoleon, our emperor, love, respect, obedience, fidelty, military service, and the taxes levied for the preservation and defense of the empire and of his throne†. Such praise for Napoleon by his people clearly shows that what he does is for them which is a trait of a democratic reformer. His ways to connect and make his citizens happy definitely affected the way his people think about him. Napoleon Bonaparte’s rights and ideas based on the French Revolution, a strong understanding of his people, and his people praising him as a great person all lead to the conclusion that he was a democratic reformer.It is very important to know what his views on government were and how they resulted because we can relate it to governments of today. People can compare how certain rights given to people can better their view on their government. Additionally, it is a way to compare and contrast Napoleon and his ideas to present day government officials. With all of this information, people can make many connections to present day government to other’s such as Napoleon’s. Overall, Napoleon Bonaparte was a great democratic reformer of the past of France. Napoleon Bonaparte Napoleon Bonaparte is one of the most powerful individuals in history. He was a great soldier, an unparalleled tactician and a skilled administrator. His dictatorship and ruthlessness led him to his thinking that he could do no wrong. As a teenager, he grew in a revolutionary era that gave him the opportunity to become an achiever. His first military opportunity came when he became the captain at the siege of Toulon. Here, he was able to seize crucial forts even bombed the British naval and land military men. The incident brought about the retreat of the British forces. When he was the brigadier-general, he joined the military campaign in Italy but was unfortunately arrested and sent to jail because of his association to his younger brother Maximilien Robiespierre. After his release, he worked with Paul Barras who was a member of the Directory. Barras used Bonaparte’s great passion to stop a royalist mob in 1795 with what the now famous â€Å"whiff of grapeshot.† Despite Napoleon’s leadership skills, he had certain weaknesses such as impatience dislike of criticisms and over-optimism. These qualities manifested when he controlled and censored the press. Perhaps, he would be more admired if he was able to face and do something about his shortcomings rather the controlling the press. One of the grave weaknesses that he committed was actually reforming the tax system. He imposed heavy taxes in Germany and even cut off imports because of the continued wars. This actually decreased his popularity among the people. It is never a good tactic to become a dictator. A leader will only be a good one if his leadership is ratified in the hearts of his people. This was violated by Bonaparte when he opted to put the burden to the people in order to prioritize the war. Bibliography Asprey, R. (2000). The Rise of Napoleon Bonaparte. New York: Basic Books. Connelly, O. (2006). Blundering to Glory: Napoleon’s Military Campaigns. London: Rowman and Littlefield. Cronin, V. (1994) Napoleon. London: Harper Collins. Durant, W. (1975). The Age of Napeleon. New York: Simon and Schuster.         

Monday, July 29, 2019

Government Essay Example | Topics and Well Written Essays - 250 words - 5

Government - Essay Example The names given to these government forms might vary depending on the state. However, the number, size and population also vary from state to state (Steytler 386). States do provide county governments with a various organizational structure. The county board has the power to govern most counties in a given state, although the name of this board varies from one state to another. Some of the commonly used names include county board of supervisors, the board of county commissioners, and the board of free commissioners. These members are popularly elected officials and that the state law strictly limits their legislative powers. However, their main responsibilities include deciding on the county budget, taxes, as well as zoning codes (Bowman and Kearney 107). In most counties, the county board supervisor has both executive and legislative authorities. The board members usually share the executive authorities with each member responsible for a different county unit and officers who are elected. The officers may include attorney, clerks, coroner, auditors, sheriff, recorder of deeds, treasurer, superintendent of schools and others (Steytler 28) County government further, issue licenses, supervise elections, keep records of vital statistics and over see many essential services including hospitals, sports facilities, as well as public welfare

Sunday, July 28, 2019

Journal entry Essay Example | Topics and Well Written Essays - 250 words - 10

Journal entry - Essay Example The main importance of this structure is to consolidate the comparative nature of the essay. Additionally, it fuses well with the overall plot outlined by the story in the matters regarding the comparisons between Lee and Grant. The essay also deployed the use of whole-by-whole approach as shown in the paragraph below: â€Å"In terms of background, Grant was a middle-class man from humble beginnings in the mountains. He was tough, self-reliant, and independent, believing that he alone was responsible for his fate. Only his skills, efforts, and perseverance would determine if he would be successful. Because he was dissatisfied with the status quo, he believed in democracy and competition. Grant also believed any man could become a leader, provided he had the ability, skills, and was able to assume the position. He wanted only to be able to improve himself and to prove what he could accomplish. Moreover, Grant had no sense of loyalty to his region. As far as he was concerned, every man had an equal chance to show how far he could rise. Privileges had to be earned, not given. Life was competition.† (Kirszner & Mandell, 2001) From the paragraph above, it is evident that the author is using the whole-by-whole method since it only focuses on describing Grant. Structurally, the paragraph has a well-defined introduction with enough subordinate sentences and a good conclusion. However, the structure of this particular paragraph does not represent the general structure of the essay. The context of the essay revolves around the comparative conflict between two subjects- Lee and Grant. Conclusively, I think the essay was well structured in line with the context of the story. The choice of sentences fitted the context of the story perfectly. By the deployment of part-by-part and the whole-by-whole comparison approach, the two characters are described vividly.

Saturday, July 27, 2019

Current Economic Essay Example | Topics and Well Written Essays - 500 words

Current Economic - Essay Example According to Aversa, May â€Å"was the second month in a row that consumer spending went up by 0.5 percent.† This is a trend showing that May was not merely a fluke, and this could be the start of a sustainable trend. Further supporting that hypothesis was the fact that incomes also rebounded in May. As Aversa asserts, incomes are â€Å"the fuel for future spending.† Thus, it is a reasonable assumption that we could see continued strong performance on this leading economic indicator. Aversa also mentions in her article that construction spending also increased in May by nearly a full percentage point. This increase in construction spending was â€Å"the biggest gain in nearly 1  ½ years,† and was fueled by â€Å"Brisk spending on big government projects, such as hospitals and other health care facilities, and by private builders on commercial construction, such as office buildings, eclipsed continued weakness in the housing sector.† The combined increases in consumer and construction spending arguably illustrate broad economic strength in both the commercial and personal consumer areas leading into the summer months. This article speaks directly to a couple of very fundamental economic indicators. While it is mostly a litany of facts about the state of economic performance in May, the article alludes to the power of incomes and spending to produce a strong economy. Spending, both consumer and commercial, quickly reverberates to other areas of the economy. Without strong consumer and other spending, it is difficult for other factors of economic health to take hold. Manufacturing and production will only result in large idle inventories if spending is low. That means fewer jobs as companies seek to slash there supplies in response to lower demand, and in doing so reduce their overhead costs including employment. On the other hand, strong consumer spending translates into increased manufacturing of supply, which in turn leads to greater hiring and lower

Friday, July 26, 2019

Gender at work Essay Example | Topics and Well Written Essays - 500 words

Gender at work - Essay Example Multiple roles with unique responsibilities of both home and work, are seen to be beneficial to women, if domestic responsibilities are shared with the spouse. The numbers of women in the work force are increasing steadily, and may soon be equal in proportion to men. (p.271). Gender relations are more prone to conflict in today’s stressed lives. One reason is the following of traditional concepts of inequality of the sexes. The concept of imposing one’s will appears both in gender relations and war. Why is that? In gender relationships, the stronger or more dominant partner is perceived as the one who is superior physically, financially, or by education. The term status is linked with power, and refers to an individual’s position in the structure of social relationships with respect to other individuals. Status is dependent on the set of values attached by the culture concerned, to attributes like abilities, education, wealth, etc. Watts (1991) is of the opinion that power is exercised on the basis of higher status. The term ‘dominance’ is often connected to interruptive behavior. In terms of the hierarchy of status relationships, dominance is an explicit expression of power over others. Latent or overt conflict is interruptive behavior between two persons. Watts quotes Weber and Durkheim: â€Å"Power is the opportunity of imposing one’s will on another.† Power also forms part of the content of the network links of each individual. (pp. 55-56). Dominance and power give rise to control, which results in conflict. Conflicts in gender relationships, where the ‘weaker’ partner refuses to submit to the will of the dominant partner arise from perceptions about gender, and an individual’s sense of personal worth. The same definitions of power and conflict can be applied in the larger picture of war between two nations. According to Clausewitz and Rapoport, (1982) â€Å"war is nothing but a duel on an

Holographic Design Essay Example | Topics and Well Written Essays - 250 words

Holographic Design - Essay Example This is where the people are in the process of learning to see the organization as a whole (Senge, 1990). Organizational reality is linked to the understanding of uncertainty of the organizational environment by the key executives and their ability to drive the organization in a particular direction (Stacey, 2010). The concept of a learning organization is taken to the next level by a particularly organic approach to systems thinking (Hà ¤mà ¤là ¤inen & Saarinen, 2008). This emergent approach is called the Holographic design of an organization. The principles of the Holographic design (Morgan, 2006) are used hereunder to conceptualize the organization from a holographic perspective: The first principle of the holographic design represents the incorporation of the vision and values of the whole organization in to the individual parts. The principle directs organizations to integrate the above values into a corporate DNA and achieve a networked intelligence structure. The structure so achieved is has an inherent ability to duplicate itself. Wherein teams with holistic visions of the organization are created. The x organization can achieve a collective sensory perception of the vision and values and enable its employees to see things in individual and collective gaze as one. The second principle of Holographic design underlines the importance of redundancy in processing of organizational information and design of skill set and the work of the team members. The X organization can enable and encourage its employees to help discard old thinking systems and bring in fresh approach and thought processes. The third holographic principle emphasizes the requisite variety in the sense that internal complexity of an organization should be in consonance with the external variety. The X organization shall foster the inherent variety of ideas and capabilities of the members of the organization to match that of the external

Thursday, July 25, 2019

Foreign direct investment in the mining industry in burkina faso Essay

Foreign direct investment in the mining industry in burkina faso - Essay Example Later in 2013 the country was ranked 153 out of 185 in according to the ‘Doing Business 2013’ report (US Department of State, â€Å"2011 Investment Climate Statement - Burkina Faso†; Ficci, â€Å"Burkina Faso†; US Department of State, â€Å"2013 Investment Climate Statement - Burkina Faso†). The government of Burkina Faso revised its investment code in the year 2010 that demonstrates the government’s interest in attracting Foreign Direct Investment in order to be able to develop industries producing goods that can be exported. In addition to that such industries would also provide adequate training and jobs for the domestic workforce. The code also provides standardized guarantees to all the firms which are legally established, whether domestic or foreign, that are operating in Burkina Faso. The code constitutes of four different investment and operations preference scheme which are evenly valid to all mergers and acquisitions as well as Greenfield investments. Exhibiting its new status as a significantly large mining industry, the Government of Burkina Faso is revising the mining code stipulated in 2003 in order to better capitalize in the mineral resources generated from the industry as well as to create a suitable climate for the mining industry. The announcements for privatization bids made by the country’s government are extensively distributed targeting both domestic and foreign investors. The bids announcements are published in the regional and local newspapers, international magazines, e-mailed to interested investors based in foreign countries, mailed to diplomatic missions and are also hosted over the internet (US Department of State, â€Å"2012 Investment Climate Statement - Burkina Faso†). The strategies implemented by the government of Burkina Faso have proven to be highly successful in grabbing the attention of foreign investors. The investment code was revised in

Wednesday, July 24, 2019

Challenges of restaurant operations in new Jersey Essay

Challenges of restaurant operations in new Jersey - Essay Example New Jersey is one of major tourist destinations in wildwood, Ocean City, Point Pleasant beach, fishing villages, beautiful barrier islands and scenic views. With all these we expect local and foreign tourists in these areas. To accommodate foreign tourists, there are several restaurants which serve as dining and accommodation avenues (Wilkerson, 2008). We shall look into details management of these restaurants and the overall effects of internal administration challenges, external factors and come up with possible mitigation strategies to these challenges. Management of restaurants is associated with several challenges due to the need of the industry to incorporate varied client needs and preference, develop and maintain the company image and to stand relevant businesswise. Managers of these restaurants and relevant stakeholders have to make decisions from administrative point of view and try to incorporate other factors such as state laws and provided statutes, demographic and geogr aphic factors to enhance operations of the restaurant. In the administration perspective managers are faced by several challenges which include; training of the staff, they should be trained to understand the menu items, how to respond to customers and overall organization flow within the restaurant. For instance, training of the front office employees may be different from those of the kitchen section otherwise known as back house operations. Training of front office employees who may include cashiers, waiters/waitresses and customer care requires diligence as they are the face of the restaurant. They need to understand different languages, be resilient to different attitudes of customers and the general customer-friendly attitude. Training of the back office staff has challenges in that they need to meet varied tastes and preferences of different customers because the kitchen section is the heart of the restaurant. To address this, employees need to be trained and attached to thei r areas of specialization. This is to bring the competitive aspect of the business in terms of quality services to the customer which is a necessity for image and brand development. Another challenge in restaurant management is cultural integration. Most restaurants employees are either immigrants from other states or from different regions with different cultures and incorporating these cultures in a single work force is a challenge. To address this challenge training and integration of cultural heterogeneity will be of paramount benefit to the restaurant and customers. Unpredictability is another challenge in a service industry where you cannot tell who is visiting today, what they will order and what is in stock. There could be a crisis if the operations for instance were expecting a thousand visitors, then the number increases and there are no radical measures to meet the increased demand. To address this, I would stand-by employees in case of an influx, gather reliable informat ion on tourist trends so as to enable procurement procedures and be flexible on duty allocation to the employees. Social concerns are another challenge facing restaurant industry in terms of amenities such as hygiene, security and incorporation of varied tastes and preferences of different visitors. These challenges can be addressed by understanding particular needs and want of the visiting clients and coming up with measures to

Tuesday, July 23, 2019

Chapter 5 Reaction Essay Example | Topics and Well Written Essays - 500 words

Chapter 5 Reaction - Essay Example I am now more aware that precautions should be observed when communicating with others, especially those people from diverse cultural orientations or those who do not belong to the same generation to prevent misunderstanding. The authors’ style of using diverse real life scenarios to explain points of contention provided clear illustration and support to the arguments. Examples in the form of stories, incidents, and funny communication scenarios reinforce meanings to the lessons that the author aimed to impart. The value of the information in the chapter is measured in terms of its applicability to one’s personal life. As I live in a Western culture where people are more open, frank, and honest in terms of verbal communication, I have accepted and adapted the practice of being direct but likewise vigilant in using frames and idioms depending on the situation and the person I am talking to. Likewise, not because I live in the United States, does it necessarily mean that I have to impose the American culture and way of live to other people from diverse racial and cultural background. The article assisted in guiding me towards using proper decorum and to be more vigilant in exerting appropriate efforts in learning and being aware of critical acceptable and unacceptable behavior in terms of communication patterns and expressions.

Monday, July 22, 2019

Internal Building Security Proposal Essay Example for Free

Internal Building Security Proposal Essay Internal Building Security Proposal Access Control is an important part of any business. Anytime a business is under construction it will be more vulnerable to threats and attacks. Construction will need more protection because of the ability to gain easier access to a building because of the open areas within the building. Certain areas in a building are a target for attacks. Some areas are higher risk because of the information or high-value assets within the building. Access Control is the best way to wing out some threats and minimize other threats. Each individual at an access point will have several types of protection such as gates, lighting, cameras, detectors, sensors and other devices that can check individuals thoroughly and make sure each one is authorized to be in the building. Keeping individuals out that have no authorization can lower threats and minimizes chances of damage occurring externally. Access control will work from the outside in to protect a business. Technology is continuing to get better and there are a lot more devices available that can enhance security and help assist the personnel when concerning responsibilities. Access control still needs the support of security personnel to make sure all the devices are functioning properly. Technology has to be maintained to run properly and do what it is designed to do. Access Control was created to keep unwanted individuals from entering a location and to prevent from any employees or personnel from leaving with any valuable information unnoticed. There are so many ways to access a building that any vulnerable areas may be threatened at some point. Access control helps to minimize the vulnerabilities and lower threats against a business. Construction on a building will leave certain areas vulnerable and will be more difficult to secure because of all the individuals coming from outside of the business to do a job. More people can mean more threats, this will need more protection. Some of the types of technology that are becoming popular for protection are wireless access points, cameras, sensors,  detectors, wands, and computers. Security personnel are using these devices to detect and deter crime in the work environment (University of Phoenix, 2008). Wireless Access points and surveillance are becoming more common because of the portability. It is more difficult to carry around a big computer for monitoring purposes and access control. A wireless computer is much more compact and lighter to carry around while handling the responsibilities of monitoring employees at an access point. A building will also have a way for security personnel to monitor different areas of the building by using cameras. A wireless computer can make it easier to monitor these different areas all in one area. Cameras will not take the place of security but can make it easier for security to cover more ground successfully and still be able to perform other duties. One advantage that cameras have is that as long as maintenance is kept up that cameras will run non-stop even when security is unavailable or just in a different location. Crime can still occur with security on patrol. Areas more vulnerable can use cameras to help catch any activity that seems out of place. In most instances cameras are only viewed when something has already occurred and can validate an individual’s where physical where about during a certain time period. Sensors are a growing trend at access points. Many industrial buildings will have products that employees will have contact with during a work day. A business will use sensors on products to keep track of the location, while in the building. One product may be received and shipped from one location to the next until the process is complete and ready to be shipped to another building. Sensors can also be caught at access points if individuals attempt to leave the building with a product without authorization. One device that can find such sensors is the detector. At several access points for employees’ detectors will be present and scanned over an individual to ensure that no sensors are found before leaving a building during lunch and after work hours. A wand is just one type of detector that will scan and have an alarm go off when it detects certain materials. Individuals will have to physically take anything out of their pockets and show that it is not a business product. Another type of detector is a full body detector that can detect different objects on a person without having to do a strip search. Computers is somet hing that is storing more data for a business and also it has the capability of doing other tasks  such as viewing camera feed during recording, and keeping track of authorization, cards, and keys for employees. At different access gates, a card will need scanning before entering. A computer can make sure that the card scanned at the gate is valid. A private intranet will hold information for a business about employees, customers, employers, and the business products and services. This type of device will have access points within the system. A computer will have a private server but is still running on the internet and can be hacked. Hackers will try and find ways to access the information and retrieve or damage it. A business can find ways to strengthen the access points into the private database and prevent hackers from accessing business information. A computer will have software, updates, passwords, and programs to protect intruders from hacking thedatabase without authorization. Computers need protection to prevent from damage. A system that has been hacked can corrupt the system and make it unusable. A way of protecting a system before it is damaged is having a back-up system. If the system is destroyed the back-up can make a business more prepared for any threats or damage to restore the system back to normal (University of Phoenix, 2011). A business will have certain areas that contain more vital information or equipment that can be threatened by construction. Areas that are more high-value need more layers of protection against any threats. Data of a business will contain information such as customer records which will have information, such as where they live, telephone numbers, full names, social security numbers and more which can be used to commit other crimes such as fraud. High-value areas are more vulnerable because the amount of damage that can be done will cost more than in other areas of the building. For instance, bathrooms of a facility will have little to no products and are less of a risk than an office. So the security will focus more on offices because of the amount of value. Some areas may only include security cameras for monitoring an area. A big high-value area could include the main power room. This area can cause damage to not only the building but also to the equipment. The main power room may have heavier walls, more cameras, passwords, security personnel, and other types of protection. There are several considerations that should be kept in mind such as who can access the room, who will be working in a room that is in the high-value areas? High-value rooms will be threatened  normally both internally and externally. If a construction area is near anything high-value at a business, extra precautions may be taken to make sure the area is secure from both types of threats. Internal building security is important to have for every business to protect the business. A business has many assets that are unable to protect themselves. Security personnel are hired to protect the business, the people, and the environment. In a new building security will be less effective because of financial status and experience with threats. The type of threats will vary and the only way to avoid vulnerabilities is attempting to use other existing buildings methods when concerning access control, surveillance, and the protection of high-value areas. A business has to prepare for threats before they occur and then deal with new ones as they arise if there is no prior experience with the type of threat. For example, hackers are always finding ways to hack a system. No code or encryption that is created is identical and all the programs and software in the world can protect a business from all threats. A business needs constant management to evolve with society and the new changes. Taking advantage of new technologies will improve the chance of success for both the business and security. References University of Phoenix. (2008). Design and Evaluation of Physical Protection and Systems.

The Showtime Sound Lighting System Information Technology Essay

The Showtime Sound Lighting System Information Technology Essay The Showtime Sound Lighting System undertaken as a project is based on relevant technologies. The main aim of this project is to develop software for sound lighting System. This project has been developed to carry out the processes easily and quickly, which is not possible with the manuals systems, which are overcome by this software. Hence it provides the complete solution to provide customer services and time management. The software provides good services and remove the repetitions in order to nurture the needs of the customer by providing various ways tasks. Also, to improve time management to handle large volume of business. Current Problems faced by the system Currently, the traditional manual system holds the information on clipboards until it is entered on the computer system. The current system is the one that evolved as the company grew from a part-time, one-man business to a full-time operation with permanent employees. The system does not ensure that the services can be provided to the customers needs. They are using computers to store the information or customer data i.e. Proposals, orders and invoices, in MS-WORD documents and thus redundancy of data is created which leads to inefficient programming and also decrease in the productivity. System Requirements Showtime Sound Lighting System is intended to help the user keep account of his customers in an efficient way. Thus provide good services and increase the productivity. It helps to handle the large volume of business, to provide good services to the customers, to remove the redundancy by providing various technicalities. The system is required to run in a more efficient way thus save time. If it is not feasible for customer to get the proper services then he has got no option left. The main aim of project will be to minimize these limitations and provide customer with better functionalities and services. Requirements Specification Requirement analysis is the first technical step in the software engineering process. It is at this point that a general statement of software scope is redefined into concrete a specification that forms the foundation for all software engineering activities that follow. There is no doubt that the presentation of specification has much to do with quality of the solution. Developers working with incomplete, inconsistent, or misleading specifications have to ultimately deal with confusion and frustration. The quality, timeliness and completeness of the software suffer as a consequence. Software Requirement Specification is developed as a consequence of analysis and market surveys. Review is essential to ensure that the developers and customers have the same perception of the problem. Unfortunately, even with the best of the methods, the problem is that the requirements keep on changing conditions. So it is necessary that during the requirement specification, user should know competence of the software. Requirements are prone to issues of ambiguity, incompleteness, and inconsistency. Techniques such as rigorous inspection have been shown to help deal with these issues. Ambiguities, incompleteness, and inconsistencies that can be resolved in the requirements phase typically cost orders of magnitude less to correct than when these same issues are found in later stages of product development. Requirements analysis strives to address these issues. Take a long time to produce Begin to limit the implementation option available Are costly to produce Requirements for both the system and the software are documented and reviewed with the customer. Scope of Project Today, the information technology has become the very advance and so the convenient means of handling the lots of information. The Showtime Lighting System is an application for maintaining a customers account in a company. The system provides the access to the customer to create a request, validate provide services to customers. Project Objectives And Deliverables: The objective is to design a tool which consists of all basic functionalities of an organization that holds all information of the customer using this application, value added services provided by the company that can be accessed by the users (customer and administration) through a user-friendly interface. There can be a possibility of online business. Target Customer Base: This system is made in such a way that this will be able to meet the basic requirements of advanced user as well as for the user those who are new to the system. Having a user friendly GUI, this application is a good option to used by a large section Feasibility Analysis Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of the existing business or proposed venture, opportunities and threats as presented by the environment, the resources required to carry through, and ultimately the prospects for success. In its simplest term, the two criteria to judge feasibility are cost required and value to be attained. As such, a well-designed feasibility study should provide a historical background of the business or project, description of the product or service, accounting statements, details of the operations and management, marketing research and policies, financial data, legal requirements and tax obligations. Generally, feasibility studies precede technical development and project implementation. Technical Feasibility Technical Feasibility centers on the existing manual system and to what extent it can support the proposed system. According to the feasibility analysis procedure, the technical feasibility of the proposed system is analyzed and the technical requirements such as software facilities, hardware facilities, procedures, inputs and outputs are identified. It is one of the important phases of the system development. In technical feasibility the following issues are taken into consideration. Whether the required technology is available or not Whether the required resources are available Manpower- programmers, testers debuggers Software and hardware Once the technical feasibility is established, it is important to consider the monetary factors also. Since it might happen that developing a particular system may be technically possible but it may require huge investments and benefits may be less. For evaluating this, economic feasibility of the proposed system is carried out. Showtime Sound Lighting System requires only the software to be installed on the system and the information can be accessed by authorized user in the organization. Economic Feasibility An economic feasibility test focuses on returns and costs of a proposed plan in both the short and long-term. An economic feasibility study (EFS) should consider investment and operating costs, the time value of money, risk and uncertainty, quality of available data, and the sensitivity of assumptions. An economic feasibility study should demonstrate the net benefit of the proposed course of action in the context of direct and indirect benefits and costs to the organization and to the general public as a whole. An EFS makes a business case, prepares analytical worksheets and other necessary supporting documentation. An EFS should be required for both pilot and long-term activities, plans and projects. For any system if the expected benefits equal or exceed the expected costs, the system can be judged to be economically feasible. In economic feasibility, cost benefit analysis is done in which expected costs and benefits are evaluated. Economic analysis is used for evaluating the effectiveness of the proposed system. In economic feasibility, the most important is cost-benefit analysis. As the name suggests, it is an analysis of the costs to be incurred in the system and benefits derivable out of the system. Showtime Sound Lighting System requires the software to be economically feasible. It should be according to the cost benefit analysis of the company. Organizational Feasibility The success of investment projects depend to a large extent on the capability of those responsible for managing them. The feasibility analysis should investigate the legal status of the organization, the level of staffing and the capability of the management and staff. Organizational Feasibility is conducted to determine whether a proposed business has sufficient management expertise, organizational competence, and resources to successfully launch its business. This also involves questions as whether it brings an excessive amount of change, and whether the organization is changing too rapidly to absorb it. It involves the questions as: Is the current organisational structure able to provide the necessary support during the implementation phase? How can a managing scheme for the project be crafted out of this structure and effectively interface with it? Will the systems introduction create new needs that cannot be accommodated by the current organisational structure? Is it possible to plan and implement all needed organisational changes in time, so as not to delay the systems implementation and operation? Showtime Sound Lighting System requires the software to be designed according to the needs of the organization Schedule Feasibility The schedule feasibility shows the estimated time to complete the project. This includes the schedules of each process in a project and the total project time. This can change if unexpected challenges occur. A project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop, and if it can be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Given our technical expertise, are the project deadlines reasonable? Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable. Showtime Sound Lighting System requires the software to be built within the stipulated time in an efficient way. Resource feasibility This involves questions such as how much time is available to build the new system, when it can be built, whether it interferes with normal business operations, type and amount of resources required, dependencies, do you have enough resources, what resources will be required, what facilities will be required for the project, etc. Showtime Sound Lighting System requires the software to be built by skilled and expert resources. Not only should the software be handled further by expert resources. Current Systems Specification UML Case Diagram This diagram displays the brief description of the current existing system. In this SSL System receive request from customers, then the request is validated, it will check for the equipment availability, after the equipments available then generate proposal, after that generate order and then the bill is provided to the customer. Major Description This diagram describes all the scenarios in detail with all possibilities of the current prevailing system SSL System gathers information from customers, put it on the clipboard, then validate customer request, then enter into the computer system maintaining the customer information. If existing customer then update the information otherwise create a new customer. After that, check for the mode of request. Whether it rental or information is for purchase or operators support. Accordingly the equipments availability is checked by the user. If the equipment is available and the associated employee is also available, the order is generated. Then the services are provided to the customer. Structural Model (Class Diagram) The below diagram displays all the classes and their relationship of the existing current system. In this diagram, different classes have been generated with attributes and methods. First is customer class with attributes and methods getcustomerdetails(), addnewcustomer() and updatecustomer(). Then the class event is created with methods addnewevent(), updateebent(). There is 1 to many relationship between customer and event. Employee class is created with methods getemployee(). One customer can deal with only one employee at a time depends upon the availability of employee. Then order class is generated with methods generateorder(), generatebill(). One employee can generate many orders at a time. . Activity Diagram This diagram shows all the activities of the prevailing system. In this diagram, first get the request from customer, check for the equipment availability, then process the request mode i.e. whether it is rental request, or request for purchase or request for the operators support. After taking the decision the information is first written on the clipboard, and then stored in the computer. After checking the time requirement and employee availability, the proposal is generated. Once the proposal is confirmed, the order is generated and the services are provided to the customer. Structured Design Models A Context Analysis Diagram A Context Diagram confines project scope to an agreed limit by obtaining agreement from the customer on the data flows that are included in the scope of a project. The Context Diagram focuses on relationships with external entities and identifies the information that is exchanged between these external entities and the business system under review. The external entities themselves are outside the scope of the project but the data flows between the entities and the business system are within the project scope. Customer SSL SYSTEM Customer Provide services Generate Proposal Equipment Availability Information request Equipment details validate request Generate Order Request Type request details validate proposal A LEVEL 0 DFD On Level 0, a DFD shows all the data flows from the system to the external entities, with the whole system being represented as one large process. A Level 0 diagram is sometimes created to show the interaction of the system with external entities, some of which may also be systems. Process Request CUSTOMER CUSTOMER Information Services A LEVEL 1 DFD Customer request information Collect information on clipboard Process Request Provide Services Update Information Generate Order details check for equipment Generate proposal Process Equipment availability validate information equipment available Employee availability Schedule Timing Mode of request rental,purchase,operator support A LEVEL 2 DFD 1.2 Check for equipment availability 1.1 Process Request Customer send request details 1.3 Process Request Type provide services equipment details 1.4 Generate order order details A Level 1 DFD A Level 1 DFD normally shows very few (8 10) processes, and is intended to explain the basic functioning of the system. A Level 1 diagram should show all the processes of the system and the external entities that the system actively interacts with (and in some rare cases exchange of data between those external entities, when absolutely necessary). A Level 2 DFD This level is a decomposition of a process shown in a level-1 diagram, as such there should be a level-2 diagram for each and every process shown in a level-1 diagram. In this example, processes 1.1, 1.2 1.3 are all vital of process 1. Together they wholly and completely describe process 1, and combined must perform the full capacity of this parent process. Proposed System Specificaion UML Model Detailed Use Case Model Problem Situation Showtime Sound Lighting (SSL) Inc is an organization deals with the equipments related with sound and lighting systems. SSL deals with wide range of customers. Many local organizations, churches, and entertainment businesses have contracts for support of sound, projection, and lighting in their facilities. SSL provides different types of services such as provide equipments on rent, for purchase; they also provide operators support to the customers. To produce a large amount of business, they frequently upgrade the cost of equipment but this leads to their loss. They also occasionally upgrade damaged or obsolete equipment. Currently SSL system is divided into four major business activities in providing services and products to its customers. Collect and process customer information and requests. A customer provides a request to SSL. If the request is from an existing customer, it is compared to previous requests. This process requires information from the customer file. The information of the customer is then updated. If the customer is new, a customer file is created that records the newly obtained customer information. Match customer requirements with equipment availability. The customers order information is collected, specifically listing the customers needs. Customer requirements can range from a simple set of items to purchase to a request for consulting services resulting in recommended alternative system solutions to a request for a full set of equipment complete with operators. After availability of equipment, the order can be generated. After that match the details with customer time requirements as well with the availability of employee. There are two types of employees working in the organization i.e. Permanent employees and contractors which are again full time part time. If the employee schedules match with the customer requirements, then the proposal will be raised. Customers want SSL to bid. To prepare the bid SSL must compare needs with equipment and personnel availability. Equipment and personnel requirements must be planned for and reserved in the event that the proposal is accepted. This is often the case for organizations that must obtain approval from finance committees. When the organization accepts the proposal, the order is then created, and the equipment and personnel are scheduled to support the event. After that the service provides to the customer. In current environment or system there is no proper database being maintained. All the information gathered from the customer is stored on the clipboard and then written on MS-WORD to convert and store data electronically. In this way, the data can be repeated. It means the same order, information of the customers, etc. can be repeated which is not an efficient way of programming. Moreover, redundancy leads to the confusion in the system. There can be the confusion that which equipment is available, or which of the equipments has been given to which customer etc. Then Provide services and products. The process entails the actual support of the event. SSL management prepares a list of all support needed for the event so that the technician delivers everything SSL has agreed to provide. This list is essential because the support needed for a large gathering must be on hand and functional at the time of the event. All order information is provided to the technician. This allows the tech nician to load all necessary equipment and to ensure that the proper contract workers, if required, are available for the event. At the conclusion of the event, the technician must report that the order was successfully completed. If any overtime was required, the technician must report this as well so that the contract workers are properly paid. The technician also evaluates the performance of the contract workers; this information helps SSL decide which workers to hire for future events. Finally, the technician notes any equipment problems that may require immediate attention or routine maintenance. Comparison and Analysis SSL provides different types of services such as provide equipments on rent, for purchase; they also provide operators support to the customers. To produce a large amount of business, they frequently upgrade the cost of equipment but this leads to their loss. A manual system stores the information on clipboards and later on enters the information in computer system. In this way an efficient data and accurate data cannot be stored for later use.. Moreover there can be redundancy of data that leads to confusion. The system currently does not ensure that customer information is readily available to support daily operations, nor does it provide information needed for decision making by management. As a result, much of the information in the set of customer files is repetitious. The business currently does not have a system for assigning customer numbers or cross-referencing documents. Locating information about a specific order, previous customer service provided, and other business acti vities are time-consuming and difficult. This deficiency in turn has a negative impact on servicing customer. All order information is provided to the technician. On the contrary, the Proposed Showtime Sound Lighting System is a system based on relevant technologies. The main aim of this project is to develop software for sound lighting System. The software provides good services and remove the repetitions in order to nurture the needs of the customer by providing various ways tasks. Also to improve time management to handle large volume of business. The traditional manual is being overcome by the information stord in proper databases in the proposed system.Currently, the traditional manual system hold the information on clipboards until it is entered on the computer system but in the proposed system , the data will be stored in the databases for all the functions and activities take place in the organization. There should be more permanent employees which are of full time to increase the productivity.Collect and process customer information and requests. For this a separate customer database should be created with the relevant fields. Cust_id should be the key field. That it stores only unique records, not more than one same record can be stored. A customer provides a request to SSL. Check for the existing customer in customer database and update the information.. If the customer is new, add his information in the database through addnewcustomer() method. Match customer requirements with equipment availability. The details of the equipments should be stored in another database called item .If the equipment is available then (check for the availability from the database) then validate request. In validation, check for the genuine order being placed by the customer. After this check which type of request is being made, i.e the order is for rental, purchase or the operators support is needed. Again this information is also stored in separate database. If all the information is stored in separate database, then there would be no chances of redundancy and smooth functioning of the system. As far relationship is concerned, relation can be with the cust_id. Many customers can place the orders at the time and all the details should be stored in their respective databases. Only one equipment should be provided to one customer. For the availability of the equipments, check the database and update the database side by side. Match the requirement with the employee availability and also with the time required. Update the database of the employee for the same to validate the request. The customers order information is collected, specifically listing the customers needs. Order should be generated and the details should be stored in order database along with its type and the shipping details of the customer To increase the productivity and goodwill , the company should appoint more and more full time skilled employees. In this way they can provide good services to the customers.

Sunday, July 21, 2019

The market allocates resources

The market allocates resources Introduction The market allocates resources efficiently by the price system. The invisible hand of Adam Smith is a system of prices, which will promote the producers and consumers making their own decision. Consumers make purchase decisions on the basis of utility maximization while producers make marketing decisions according to the principle of profit maximization. Based on the changes in prices, the markets guide resources toward the most efficient aspects of allocation between supply and demand. Chandler (1977) presented that the enterprises internal administration and coordination as the visible hand was replacing the visible hand of market mechanisms. With the rise of modern business enterprise and its managers, the large modern enterprise was gradually replaced the small traditional family firm and was taking over the coordination function of economy activities and resource allocations, as well as its management team were becoming the most influential group of economic decision makers. Actually, the visible hand is not a denial of the visible hand. The effect of both invisible hand and visible hand is conditional. Therefore, the visible hand was not completely replacing the visible hand; it was a kind of supplement and development of the invisible hand from the perspective of administrative coordination. How effective the market allocates resources For market, the price system is the coordinating device that takes care of allocation. Price, which makes balance between the consumers demands and the producers supply, is achieved through interaction in the market. The process of market interaction is what we call the invisible hand. Demand and supply affect the market interaction. On one hand, consumers demand for a commodity depends on its price to a large extent. The total demand will go up if the price goes down. This is the rule of demand. On the other hand, the total supply of goods is also determined by its price. The total supply will go up if the price goes up. This is the law of supply. Figure 1 illustrates that when a commodity oversupply and the price will drop, on the contrary, it will stimulate consumption, so that increase the demand. Besides, it will inhibit the production, hence reduce the supply. Market equilibrium occurs when the supply curve and demand curve meet. The meeting point of supply and demand needs to be achieved through price adjustments. At this time, resources will be allocated in a variety of purposes through price. The market will out of equilibrium no matter supply excess demand or demand overrun supply. The price will then be adjusted until equilibrium comes back. However, the invisible hand is not a panacea. In real life, the market has its limitation in allocating resources. The invisible hand of market can be effectively only in the perfectly competitive market. Public goods, externality, monopoly, market control lag, as well as the unbalanced information may lead to the disorder and chaos of the market economy. For example, according to statistics from Sina Finance, there were 80 big department stores in 2005 in Beijing. A Beijing persons average purchasing power was one- third of a persons buying power in Tokyo, while the number of large shopping malls was 8 times greater than it in Tokyo. This Phenomenon made a general decline in department stores economic benefits, thus malls closed down one after another. It shows that market has a certain degree of blindness and the market mechanism does not always achieve their ideal state. The management was affecting the economy as a Visible Hand Chandler posed the Visible hand of management, which was playing an ever-increasing key role in the allocation of resources. Today, the companies are not the small workshops anymore in the time of Adam Smith. Modern business enterprises were replacing small traditional enterprises. Some of them can be as rich as a country, which have great powers to directly affect national economy and even politics; moreover, they may make sense to the relationships between countries as well. The companys management was playing a significant impact on the allocation of resources. Chandler indicates that before the rise of the modern enterprise, the small personally owned and managed firm was a single-unite firm, which charges a single economic function and operating a single product line in one location. Thus the activities of these small traditional enterprises were coordinated and controlled by market and price system. In contrast, most of the modern business enterprise is multi-unit enterprise, which has its own administrative office, handles various types of products and services and operates diverse types of economic activities in different areas. Therefore the activity of these unites and transactions between them were internalized. They were coordinated and controlled by salaried managers rather than market mechanisms. As some propositions which Chandler mentioned in The Visible Hand (1977), can provide that the visible hand of management coordination was replacing the invisible hand of market mechanisms. Fist of all, small traditional business will replaced by modern multiunit business when administrative coordination allowed lower costs, greater productivity, and higher profits than coordination by market mechanisms. Modern enterprises interiorized the transactions, which transacted between some business units before. This internalization may reduce transaction costs and information costs, improve productivity, provide a more stable cash flow and thus reduce costs to improved profits. Secondly, only by forming a formal managerial hierarchy can the advantages of the internal activities of many business units be created. In modern business enterprises, middle managers control and coordinate the production and distribution in the company. Meanwhile, top managers are not only evaluate and coordinate with the intermediate managers, but also replaced the market for future production and distribution of resource allocation. Thirdly, the management system promotes the companys specialization and sustainable development. The majority of the traditional enterprises are partnerships and family firms, which were always short-lived. In contrast, management hierarchy allows the functions of company be maintained even the staff turnover and makes the salaried managers becoming more professional through various formal trainings. The managerial authority and ownership of enterprise can be divided when the business scale and the scope of operational diversity of business developed to a certain level, meanwhile the manager become more and more professional From the viewpoint of Chandler, to manage and coordinate this visible hands, compared to the invisible hands, could not only bring huge productivity and profits, but also enhance the competitiveness of capital. Thus, it could largely promote the productivity and consumption which caused by the revolution of organization management. That is what called the revolution of business enterprise management It cannot be denied that the visible hand has become a more and more crucial role in the contemporary economy, but there are still some defects in the view of Chandlers visible hand. First of all, Chandlers over-praise of the executive of corporation is just partly making sense to some extent. Managers may hide various levels of opportunism and potential trickery, such as the Enron scandal, as well as high-paying CEO scandal. Secondly, Chandlers understanding of large enterprise is not entirely accurate. Enterprises are expanding for large enterprises, because there is some kind of asset specificity. Enterprises expanding the scale do not mean that it is capable enough to build up its strength. Take the American slaughter Gustavus in 19th century as an example, he run a train transport business and freezer factory because it was the best way that he could control the quality and efficiency of meat-packing. He worried about that he would be plot in secret by his competitor if buying t ransport services and freezers from others. It is obviously that internal management of large enterprise would not substitute the regulatory action of market, the visible hand would play a role only in the case of management mechanism can produce greater productivity than the market mechanism and internal coordination costs are cheaper than the market transaction costs. To sum up, the market allocates resources efficiently by making equilibrium between demand and supply through the price system, while the visible hand coordinates and allocates resources by management. Every sword has its two sides. Both the invisible hand and the visible hand have their strength and weakness. The visible hand can not totally replace the visible hand, while the visible hand is the supplement and development of the invisible hand from the aspect of management coordination. They supplement each other to ensure the allocation of resource processed efficiently. References: Alfred D., Jr. Chandler (1977) The Visible Hand The Managerial Revolution in American Business Massachusetts and London: Belknap Press of Harvard University Press. P.1-4, P6-9 Eitan Goldman Gary Gorton (2000 ) The Visible Hand, The Invisible Hand And Efficiency. National Bureau of Economic Research. JEL NO.D21, G30 Economypedia [online]. [Accessed 1th December 2009]. Available from World Wide Web : Economypedia [online]. [Accessed 1th December 2009]. Available from World Wide Web : Jintang Wang Wenfan Zhong (1995) Modern American large enterprise and American society. Wuhan: Wuhan University Press. P3-5 Wikipedia [online]. [Accessed 1th December 2009]. Available from World Wide Web : Wikipedia [online]. [Accessed 1th December 2009]. Available from World Wide Web : Sean, Douma Hein, Schreuder (2008) Economic Approaches to Organizations Essex: Pearson Education. P.3-5, P9-10, P12-19, P28-38, P42-44, P46-51, P56-60 Sina [online]. [Accessed 1th December 2009]. Available from World Wide Web :