Wednesday, November 27, 2019

The Viet Nam War essays

The Viet Nam War essays The Viet Nam "War" was a long and disastrous event that went on for decades upon decades with numerous European countries, as well as America and the France, for example, colonized Viet Nam at the end of the 19th century, but lost control during World War II and the German Invasion. After once again trying to gain a foothold, France called an end to its involvement with the Asian country in 1954. As a result, the Geneva Accords stated that Vietnam was to become an independent nation divided into the The U.S., however, paid the Accords lip service and continued the battle where the French left off. Soon, the Tonkin Golf Resolution gave President Lyndon Johnson carte blanche to build the amount of U.S. troops as he saw fit. American military personnel reached 16,000 during 1963; they increased further still in 1964 as the U.S. tried to prop up the Saigon government. Ground troops were continually enlarged. By early 1968, there were more than 500,000 Americans in Viet Nam, and both troop and civilian deaths were skyrocketing. The U.S. began declaringmostly to combat negative P.R. back homethat the Communist forces were being weakened and the war would soon be won. Wishful thinking. On the night of January 31st 1968, 70,000 North Vietnamese soldiers launched the Tet offensive. It proved to be one of the greatest campaigns in military history, and a true turning point of the war. Vietcong guerrilla fighters violated the temporary truce they had pledged to observe around the lunar new year celebrations, and surged into more than one hundred towns and cities, including Saigonseizing the American Embassy. It may have been a huge loss of life for the North Vietnamese, but it was a media and public relations coup. Many Americans were becoming increasingly skeptical. Such atrocities as the infamous incident at Mylai in 1968, ...

Saturday, November 23, 2019

Advantages and Disadvantages of Accounting information systems (AIS) The WritePass Journal

Advantages and Disadvantages of Accounting information systems (AIS) Introduction Advantages and Disadvantages of Accounting information systems (AIS) IntroductionType and nature of both the risks and the security threatsNature of riskType of RiskType of Security ThreatsSecurity Strategies/Measures  Control ProcedureConclusionRelated Introduction Accounting information systems (AIS) have experienced vast changes in several decades, improving from paper-based journals and ledgers to completely automated, paperless systems. However, the migration from paper to computer has its risks to the company. It contains the confidential information which becomes compromised if it is unprotected. The unauthorized use of the accounting system can be misused and involved in risking loss of the information, disastrous and bad data input. Security of accounting systems is a priority in many companies. In recent decades, the changing environment has posed a threat to the company. As a system accountant of a large established UK based Retail Company specialising in the sale of household electrical appliances, it is necessary to consider the risks and the security threats that the company would face in today’s business environment. According to Tony Boczko, risk is related to the likelihood of loss, the probability of mischance and the possibility of hazard or harm. Moreover, risk can be defined in several ways such as the chance of bad consequences, the exposure to mischance and the probability of loss. These risks and threats can lead an undesirable impact on both the present and future of the company’s financial activities and stability. Type and nature of both the risks and the security threats Nature of risk The nature and source of the risks can be distinguished into two primary sources of risk which can be categorized as the event/activity-based risk and resource/asset-based risk. By referring to Tony Boczko 2007 (pp. 681), he mentioned that event/activity-based risk is defined as the risk which is associated with the particular event/ activity or the group of activities/ events. The resource/ asset- based risk is the subsidiary primary source which can be defined as the risk which is associated with the possession and use of the resource/ asset or the group of recources/ assets. In addition, Tony Boczko 2007(pp. 681) mentioned that the source of risk can be categorized into four associated secondary sources of risks such as authorized internal employee and external agent-based risk, unauthorized persons-based risk and nature-based risk. The case of the authorized internal employee/ external agent-based risk is the possible loss which can be resulted from the unintentional or deliberate errors. Unauthorized persons-based risk is most likely involved in the risk of possible loss which can be resulted in the possible breaches of security and misappropriation of assets and information. The nature based risk is involved in the risk of possible loss which is resulted from the geographical disaster or meteorological conditions. Type of Risk What are the different types of risks? There a number of differing types of risk that can affect the household electrical appliances company in today’s business environment. One of the risks is unintentional error. Unintentional error is the error which is related to the inadvertent mistake and erroneous actions attributable to the bad judgement in decision making, ignorance and inattention. The unintentional errors that happened through computerized systems are always at of risk power failure of the computer, viruses attack and end up with losing the important information of the company such as financial documents. Furthermore, problems with computerized system could lead to a standstill in usage of the database. When the household electrical appliances company is focus and reliant on the accounting information system, the unintentional error due to the power and computer outage could lead to a work disruption. Work disruption can disable the input of the information of the c ompany can access to the stored information. Additionally, if the data is not backed up properly, the company will end up lost its important data. Risk such as deliberate errors can cause the company with the bad and serious implications. According to Tony Boczko 2007(pp. 682), deliberate errors can be explained as the conscious erroneousness and incorrectness whose occurrences are designed to damage, destroy and defraud a person, group of persons and organization. Such errors are intentional and premeditated. What if there is ‘someone’ else hosting its precious and valuable data? ‘Someone’ refers to the hacker. Hacking is the illegal action which involved in gaining unauthorized access to the company accounting information system to steal and get the data illegally. The big news of the hacking system is NASA’s system. ‘In 2002, Gary McKinnon was arrested by the UKs national high-tech crime unit, after being accused of hacking into NASA and the US military computer networks.’ (BBC NEWS, 2006) Besides that, the hacker ‘The hacker has also denied that he had made Washingtons com puter system inoperable, although he did admit he may have deleted some government files by accidentally pressing the wrong key’. (Jo Best, 2005). Deliberate errors brought a serious implication to the company. Besides that, natural disaster is also counted as the serious type of risk in today’s business environment. ‘A natural disaster is the effect of a natural hazard (e.g., flood, tornado, hurricane, volcanic eruption, earthquake, or landslide). It leads to financial, environmental or human losses. The resulting loss depends on the vulnerability of the affected population to resist the hazard, also called their resilience’. (Wikipedia, 2011) As a household electrical appliances company, if it is suffered from the natural disaster such as floods. Floods can destroy drainage computer system and cause the raw sewage to spill with water. Besides that, building and company’s equipments can be also damaged due to the floods. It will lead to the catastrophic effects on the environment as the toxic such as gasoline will be released and caused pollution. Floods can cause a huge amount of money losses to the business. Type of Security Threats In today’s business environment, there are many computer frauds and computer crimes through computerized accounting information systems. Fraud can be defined as ‘deceit, trickery, sharp practice, or breach of confidence, perpetrated for profit or to gain some unfair or dishonest advantage. In the broadest sense, a fraud is an intentional deception made for personal gain or to damage another individual’. (Wikipedia, 2011) As a household electrical appliances company, the internal employees or managers as well as the shareholders can be also fraud through the computerized accounting information system. The information stored electronically can be manipulated and accessed if proper controls and security measures are not taken place. This will affect the operation of the business. Fraud such as account takeover is a serious activity which always happens in today’s business environment. ‘An account takeover can happen when a fraudster poses as a genuine cu stomer, gains control of an account and then makes unauthorized transactions’. (Action fraud) The information of account holders such as credit card can be taken over by those fraudsters. Los Angeles attorney Christopher Painter said: If you have an explosive growth on the Internet, youre going to have this great huge growth in fraudulent conduct and crime committed over the internet. (BBC NEWS, 1999) From this evidence, we can see that there is a security threat on today’s business through the computerized accounting information system. Fraudster can be sued if they found out by people. For example, ‘Bank of America and two of its former bosses have been charged with fraud for allegedly misleading shareholders during the takeover of Merrill Lynch’. (guardian.co.uk, 2010) There are few types of fraud, such as false billing, financial fraud, advanced fee frauds, identity theft and phishing. In false billing scam, the fraudster will send out a so-called invoice for a particular product or service that are never be ordered, fraudster hope that it will be paid for sure from the victim without any investigation. This activity usually happened in large business organization, it is because large business organization has a billing or payments system which used to pay the invoice of the company, fraudster sends out those fake invoices and hope that this will be unnoticed by the large business organizations. ‘Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication’. (Wikipedia, 2011) It is dangerous for today’s business operation, it is because instead of stealing the personal and business information, ‘phishers’ can affect the computer with the viruses and convince the victim in order to participate in money laundering. Another security threat is computer crime, according to Tony Boczko 2007 (pp. 691), he mentioned that computer crime can be defined as the deliberate action to gain access to, or steal, damage or destroy the computer data without authorization. Computer crime involves in the activity of dishonest manipulation of computer programs or computer-based data. It also involves in the fraudulent use/abuse of computer access and resources for personal gain. The types of computer crime such as the inappropriate use of corporate information systems, theft of computer and hardware, unauthorized access and information theft or the fraudulent modification of data and programs, system failure and premeditated virus infection and disruptive software. It is hard to define a computer crime; it is because computer crime is always and easily be happened in the business organization. People might think that fraud is also kind of computer crime. It is a wide context in security threats. As a household electrical appliances company, premeditated virus infection such as spyware, it gathers the users and client’s information and relays it to the third party such as advertisers. Spyware can monitor operation of the computer, scan the important information and files, snoop on the private applications such as chat programs. By reading the cookies and change the default web browser, spyware can consistently relaying the information from the database. It is dangerous for the business organization, because if their competitors spy into their programs and get the costs and type of materials of the electrical appliances as well as the client’s contact number, the business organization will be easily defeated by competitors. There is a latest issue about the Sony PlayStation Network which involved in the identity theft. ‘Up to 3 million Britons are believed to be among the 77 million users of Sonys PlayStation Network, which has been hacked into by criminals who have stolen users personal information, possibly including credit card details’. (Charles Arthur and Keith Stuart, 2011) ‘Sony, which shut down the online games, movies and music delivery system last week after it was attacked by hackers, has said that although names, birthdates, e-mail addresses and log-in information were compromised for certain players, it has seen no evidence that credit data was taken, but cannot rule out the possibility’. (Richard Newman, 2011) Security Strategies/Measures Due to the vulnerability of the computerized accounting information system, it is easy to be attacked by internal and external people of the business organization. It is necessary to implement some methods to solve the serious issues. According to American Institute of CPAs In order to protect the business organization from the attack of risk and security threats, , TOP Technology Initiatives Task Force, which is a group of the technologically astute members of the CPA profession and other technology professionals, collaborated in the AICPAs Top Technology Initiatives project, seeking to identify the most important technology initiatives. The first method is enhancing the information security such as upgrade the hardware and software in order to protect the information systems from the security threats. Company should implement and upgrade the level of firewall which blocks the intrusion from the internet. Update the anti-virus programs with the logins of password and username to limit access. Besides that, company should hire the experienced network integrator to check whether it is work properly with the security patches. Additionally, company can have a security audit for the independent confirmation on the company’s financial data and client’s information. Through this process, business organization can be protected. The other method is disaster and business continuity planning. It is an activity which involves in the developing, monitoring and updating of the climate change, accident and other malicious destruction. It can prevent the business organization to loss their important information. It is because having the computerized accounting information system down for few hours or few days due to the natural disaster; could lead a bad impact to the profitability and liquidity of the business organization. So, business organization should plan and design a process to keep the system stable to prevent any losses.   Control Procedure According to Tony Boczko 2007(pp. 729), he mentioned that the internal control which comprises the processes or procedures within a business organization designed to provide a reasonable assurance that business objective- primarily the maximization of shareholder wealth which can be achieved and those undesired events can be prevented or corrected. The internal control related to the management control. It can be defined as a diverse range of activities designed to conduct, direct and control business activities and ensure the consistency with corporate business objective. For example auditors, their role is to audit the business organization’s internal control policies, to assure that the control within the departments is under controls and adequate, it can help in control the financial statement to prevent the financial loss in order to achieve the mission of business organization. Furthermore, internal control such as risk assessment is also needed to be taken place in every business organization. It is an effective control procedure helps in protecting company. According to health and safety executive, the risk assessment, instead of creating the huge amounts of paperwork, but rather about identifying sensible measures to control the risks in the business organization. Risk assessment is help to protect people by putting in place measures to control those risks.   As a household of electrical appliances company, risk assessment is a good starting point; manager can actually investigate and look for the hazard which may cause harm to the business organization. Furthermore, a critical thinking about how the accident could happen and who will be influenced could help in noticing and monitoring the risk. Once the managers identify the risk, it will be easily to control and put a suitable measure on it. Conclusion As a conclusion, accounting information system brings a lot of disadvantages to the organization in today’s business environment, but accounting information system combines the study and practice of the accounting with the concept of designing, implementing, controlling and monitoring the information systems. It also combines the modern information technology and the traditional accounting system to provide a better financial system to manage and improve the financial performance of the organization.

Thursday, November 21, 2019

Physics lab Essay Example | Topics and Well Written Essays - 750 words

Physics lab - Essay Example In fact, we create cars and vehicles with built-in breaks for us to be able to control their acceleration or speed and direction from time to time. We wear our seatbelts because of the danger associated with riding in a car vehicle in a speed. We also create objects with a design of making it easy for us to employ unbalanced force to transfer them from a place to another for instance and in order to break the law stating that they have the tendency to remain at rest once they do. The unbalanced force we might exert could be measured. A very important idea is the creation of meter for acceleration or speed in vehicles. Measuring the speed of an object in motion is important because in the case of automobiles this could at least ensure our safety on the road at a greater odds. On the other hand, â€Å"when a force is applied to an object, the change of motion in the object is proportional to the force applied to the object† (Grimshaw, 2007, p.74). This is Newton’s powerful second law of motion. In a simple understanding, we can easily state this law in a manner that we are conscious of the fact that heavier objects require more force to move them. At this point, it is very important to calculate the specific amount of force usually is needed to be employed in order to move an object to a certain direction or distance. Based on this concept, Newton therefore was able to calculate force as the product of the object’s mass and acceleration. This exactly applies and validates the stated given idea linked up with his second law of motion. Another learning from Newton’s concepts and ideas include the relationship existing between static friction and gravity. From the class discussion, I learned that provided an object is set undisturbed on a surface for instance, the only force that acts on it is a gravity. Static friction is therefore developed in this case because the object

Wednesday, November 20, 2019

Luis Angel Perez v. The New York and Presbyterian Hospital Essay

Luis Angel Perez v. The New York and Presbyterian Hospital - Essay Example On August 15, 2003, when Dr. Nunez observed the plaintiff speaking to a patient in a room in Spanish and had an argument with him, he wrote a letter to Dr. Nunez implying that he was acting out of good faith. The hospital prefers hiring bilingual English/Spanish-speakers for the Mental Health Workers as the patients in the Psychiatric Unit include approximately 30% monolingual Spanish-speaking and 50% who are bilingual. The defendant was frequently asked to translate to Spanish speaking patients who were not having the ability to communicate in English. Defendants allegations that his nursing supervisors had used ethnic slurs and had engaged in conduct denigrating him because of his origin was unprofessional as well as mocking patients with limited English proficiency. On August 15, 2003, Dr. Nunez observed the defendant speaking to a patient in Spanish in the patient’s room. He had an argument with the plaintiff who wrote a letter to Dr. Nunez implying that he was acting out of good faith. The plaintiff occasionally talked in Spanish to his fellow workers, but it is not in the patients presence. He did this in the presence of the patients, for instance, when talking to the clerk in an office, away from the patients and with the security guard. Perez suffered from his choice of speaking Spanish to the patients and workers who he did not cause harm to as he risked his job. The first amendment guarantees individuals freedom of expressing themselves freely and guarantees citizens the right to assemble peaceably. Perez communication to his fellow Spanish counterparts in the Medical facility was his right, as it never happened in the presence of a patient. A Title VII of the Civil Rights Act of 1964 states that an employee cannot be segregated. The employees should not be classified in a manner that deprives any individual of employment opportunities because of an individual’s race, color and or other

Sunday, November 17, 2019

Statement of purpose for undergrad in business studies Essay Example for Free

Statement of purpose for undergrad in business studies Essay â€Å"Take up one idea. Make that idea your life- think of it, dream of it, live on that idea. Let the brain, muscles, nerves, every part of your body be full of that idea, and just leave every other idea alone. This is the way to success†. I read this quote by Swami Vivekananda in 2011 when I was deciding my career choice in 2011 when I was in Grade 11. Initially I was inclined towards science as that’s the preferred career option for most in India. However a deeper analysis, introspection and influence of my parents made me realize my strengths and interests make me more suited for Economics and Business Studies. My family has been a major influence – my father and maternal uncle are both engineers with an MBA from top business schools and have made a great career for themselves. My father is into international business development and marketing and has made a successful career. After deciding on Commerce and Business Studies, I scored 91. 2 % (top 10 % in the CBSE across in grade 12 and made it to the top 10 % of candidates who took the board exam nationwide. After 12th grade, I took an entrance exam and qualified for the interview and group discussion round by securing a national rank of 143. I made it to the top 80 students to get admission to the coveted College of business studies, Delhi University (voted as Asias best undergraduate management college by the Commonwealth of Nations). Good academic performance in my school and college, active participation in academic as well as extra-curricular activities in several marketing activity groups and several part time and full time internships during college have helped me to develop analytical, communication and social interaction skills. I now feel strongly that I would like to pursue this career further. During the one and a half years of my undergraduate studies, I interacted with students from different cultural and social backgrounds. The college has a strong culture of developing practical skills and nurturing entrepreneurship. Most students got campus placements and more than 60 % students chose management consulting and marketing as career options. I used to visit NGO’s and teach students on weekends but I wanted to do something bigger. I got through Kartavya ( The social service club of my college) and here, I organized blood donation camps and collection drives in college, visited slums , organized movie screenings and talent shows for the unprivileged children living in orphanages and the happiness I got by seeing them happy is inexpressible. I was a part of MIC (The Management Interaction Cell) wherein my team co-hosted an event with FICCI ( Federation of Indian chambers of commerce and Industry ). I was given the role of Director, Human resources at DUMUN (Delhi University Model United Nations) where my key roles involved raising funds for our national level event, managing and ensuring co-ordination in the team and representing my team to the college authorities. While organizing and hosting these events, I led teams and was appreciated for my leadership skills and dedication towards my clubs. I started enjoying the whole process of recruiting new members, leading them, pitching to prospective sponsors to raise funds and managing the working of the team . This was the time I realized that I enjoy leading people and it is something I can do well. Academically, I balanced my studies well with my co-curriculars and always scored 80% and above in my semesters. I enjoyed every bit of my course and thoroughly researched on all my projects. Business Research, Organizational Behavior and Marketing management have been my favorite subjects in college. The project I enjoyed the most was a live project in Public Relations for which I studied the Cadbury worm crisis and took interviews of employees there to gain first hand knowledge over their crisis. CBS has made me confident about my choice of stream and made me realize my ambitions in life. To quench my thirst for practical management knowledge, I went on to join Vodafone as an HR intern where my assignment was to check employee satisfaction by conducting surveys, suggest better schemes and analyze the areas where improvement was required. Later, I also joined Brand Hawkers as a Marketing trainee. My job assignment involved creating a prospect list of advertising partners for our ‘SmartBooks’ product, qualifying and pitching to them and facilitating their engagement with Brand Hawkers. During this assignment I realized that marketing was the forte I wanted to excel in since this is what I enjoyed the most. It didn’t seem like work to me but it was simply fun. I am confident of my abilities to carve a niche for myself in this field of Business Management. I am ready to take the desired steps to achieve my ultimate goal.

Friday, November 15, 2019

Monte Verde :: essays research papers

After long, often bitter debate, archeologists have finally come to a consensus that humans reached southern Chile 12,500 years ago. The date is more than 1,000 years before the previous benchmark for human habitation in the Americas, 11,200-year-old stone spear points first discovered in the 1930s near Clovis, N.M. The Chilean site, known as Monte Verde, is on the sandy banks of a creek in wooded hills near the Pacific Ocean. Even former skeptics have joined in agreeing that its antiquity is now firmly established and that the bone and stone tools and other materials found there definitely mark the presence of a hunting-and-gathering people. The new consensus regarding Monte Verde, described in interviews last week and formally announced Monday, thus represents the first major shift in more than 60 years in the confirmed chronology of human prehistory in what would much later be called, from the European perspective, the New World. For American archeologists it is a liberating experience not unlike aviation's breaking of the sound barrier; they have broken the Clovis barrier. Even moving back the date by as little as 1,300 years, archeologists said, would have profound implications on theories about when people first reached America, presumably from northeastern Asia by way of the Bering Strait, and how they migrated south more than 10,000 miles to occupy the length and breadth of two continents. It could mean that early people, ancestors of the Indians, first arrived in their new world at least 20,000 years before Columbus. Evidence for the pre-Clovis settlement at Monte Verde was amassed and carefully analyzed over the last two decades by a team of American and Chilean archeologists, led by Dr. Tom D. Dillehay of the University of Kentucky in Lexington. Remaining doubts were erased by Dillehay's comprehensive research report, which has been circulated among experts and is to be published next month by the Smithsonian Institution. And last month, a group of archeologists, including some of Monte Verde's staunchest critics, inspected the artifacts and visited the site, coming away thoroughly convinced. In his report of the site visit, Dr. Alex W. Barker, chief curator of the Dallas Museum of Natural History, said: "While there were very strongly voiced disagreements about different points, it rapidly became clear that everyone was in fundamental agreement about the most important question of all. Monte Verde is real. It's old. And it's a whole new ball game.

Tuesday, November 12, 2019

Deception Point Page 78

â€Å"Anyhow, Mike,† the message went on, â€Å"tonight was incredible. Kind of makes you proud to be a scientist, doesn't it? Everyone's talking about how good this looks for NASA. Screw NASA, I say! This looks even better for us! Amazing Seas ratings must have gone up a few million points tonight. You're a star, man. A real one. Congrats. Excellent job.† There was hushed talking on the line, and the voice came back. â€Å"Oh, yeah, and speaking of Xavia, just so you don't get too big a head, she wants to razz you about something. Here she is.† Xavia's razor voice came on the machine. â€Å"Mike, Xavia, you're a God, yada yada. And because I love you so much, I've agreed to baby-sit this antediluvian wreck of yours. Frankly, it will be nice to be away from these hoodlums you call scientists. Anyhow, in addition to baby-sitting the ship, the crew has asked me, in my role as onboard bitch, to do everything in my power to keep you from turning into a conceited bastard, which after tonight I realize is going to be difficult, but I had to be the first to tell you that you made a boo-boo in your documentary. Yes, you heard me. A rare Michael Tolland brain fart. Don't worry, there are only about three people on earth who will notice, and they're all anal-retentive marine geologists with no sense of humor. A lot like me. But you know what they say about us geologists-always looking for faults!† She laughed. â€Å"Anyhow, it's nothing, a minuscule point about meteorite petrology. I only mention it to ruin your night. You mig ht get a call or two about it, so I thought I'd give you the heads-up so you don't end up sounding like the moron we all know you really are.† She laughed again. â€Å"Anyhow, I'm not much of a party animal, so I'm staying onboard. Don't bother calling me; I had to turn on the machine because the goddamned press have been calling all night. You're a real star tonight, despite your screwup. Anyhow, I'll fill you in on it when you get back. Ciao.† The line went dead. Michael Tolland frowned. A mistake in my documentary? Rachel Sexton stood in the restroom of the G4 and looked at herself in the mirror. She looked pale, she thought, and more frail than she'd imagined. Tonight's scare had taken a lot out of her. She wondered how long it would be before she would stop shivering, or before she would go near an ocean. Removing her U.S.S. Charlotte cap, she let her hair down. Better, she thought, feeling more like herself. Looking into her eyes, Rachel sensed a deep weariness. Beneath it, though, she saw the resolve. She knew that was her mother's gift. Nobody tells you what you can and can't do. Rachel wondered if her mother had seen what happened tonight. Someone tried to kill me, Mom. Someone tried to kill all of us†¦ Rachel's mind, as it had for several hours now, scrolled through the list of names. Lawrence Ekstrom†¦ Marjorie Tench†¦ President Zach Herney. All had motives. And, more chillingly, all had means. The President is not involved, Rachel told herself, clinging to her hope that the President she respected so much more than her own father was an innocent bystander in this mysterious incident. We still know nothing. Not who†¦ not if†¦ not why. Rachel had wanted to have answers for William Pickering but, so far, all she'd managed to do was raise more questions. When Rachel left the restroom, she was surprised to see Michael Tolland was not in his seat. Corky was dozing nearby. As Rachel looked around, Mike stepped out of the cockpit as the pilot hung up a radiophone. His eyes were wide with concern. â€Å"What is it?† Rachel asked. Tolland's voice was heavy as he told her about the phone message. A mistake in his presentation? Rachel thought Tolland was overreacting. â€Å"It's probably nothing. She didn't tell you specifically what the error was?† â€Å"Something to do with meteorite petrology.† â€Å"Rock structure?† â€Å"Yeah. She said the only people who would notice the mistake were a few other geologists. It sounds like whatever error I made was related to the composition of the meteorite itself.† Rachel drew a quick breath, understanding now. â€Å"Chondrules?† â€Å"I don't know, but it seems pretty coincidental.† Rachel agreed. The chondrules were the one remaining shred of evidence that categorically supported NASA's claim that this was indeed a meteorite. Corky came over, rubbing his eyes. â€Å"What's going on?† Tolland filled him in. Corky scowled, shaking his head. â€Å"It's not a problem with the chondrules, Mike. No way. All of your data came from NASA. And from me. It was flawless.† â€Å"What other petrologic error could I have made?† â€Å"Who the hell knows? Besides, what do marine geologists know about chondrules?† â€Å"I have no idea, but she's damned sharp.† â€Å"Considering the circumstances,† Rachel said, â€Å"I think we should talk to this woman before we talk to Director Pickering.† Tolland shrugged. â€Å"I called her four times and got the machine. She's probably in the hydrolab and can't hear a damn thing anyway. She won't get my messages until morning at the earliest.† Tolland paused, checking his watch. â€Å"Although†¦ â€Å" â€Å"Although what?† Tolland eyed her intensely. â€Å"How important do you think it is that we talk to Xavia before we talk to your boss?† â€Å"If she has something to say about chondrules? I'd say it's critical. Mike,† Rachel said, â€Å"at the moment, we've got all kinds of contradictory data. William Pickering is a man accustomed to having clear answers. When we meet him, I'd love to have something substantial for him to act on.† â€Å"Then we should make a stop.† Rachel did a double take. â€Å"On your ship?† â€Å"It's off the coast of New Jersey. Almost directly on our way to Washington. We can talk to Xavia, find out what she knows. Corky still has the meteorite sample, and if Xavia wants to run some geologic tests on it, the ship has a fairly well-equipped lab. I can't imagine it would take us more than an hour to get some conclusive answers.† Rachel felt a pulse of anxiety. The thought of having to face the ocean again so soon was unnerving. Conclusive answers, she told herself, tempted by the possibility. Pickering will definitely want answers. 92 Delta-One was glad to be back on solid ground. The Aurora aircraft, despite running at only one-half power and taking a circuitous ocean route, had completed its journey in under two hours and afforded the Delta Force a healthy head start to take up position and prepare themselves for the additional kill the controller had requested. Now, on a private military runway outside D.C., the Delta Force left the Aurora behind and boarded their new transport-a waiting OH-58D Kiowa Warrior helicopter. Yet again, the controller has arranged for the best, Delta-One thought. The Kiowa Warrior, originally designed as a light observation helicopter, had been â€Å"expanded and improved† to create the military's newest breed of attack helicopter. The Kiowa boasted infrared thermal imaging capability enabling its designator/laser range finder to provide autonomous designation for laser-guided precision weapons like Air-to-Air Stinger missiles and the AGM-1148 Hellfire Missile System. A high-speed digital signal processor provided simultaneous multitarget tracking of up to six targets. Few enemies had ever seen a Kiowa up close and survived to tell the tale. Delta-One felt a familiar rush of power as he climbed into the Kiowa pilot's seat and strapped himself in. He had trained on this craft and flown it in covert ops three times. Of course, never before had he been gunning for a prominent American official. The Kiowa, he had to admit, was the perfect aircraft for the job. Its Rolls-Royce Allison engine and twin semirigid blades were â€Å"silent running,† which essentially meant targets on the ground could not hear the chopper until it was directly over them. And because the aircraft was capable of flying blind without lights and was painted flat black with no reflective tail numbers, it was essentially invisible unless the target had radar.

Sunday, November 10, 2019

A report on measures to reverse the Declining sales output of companiy product

The purpose of this report is to analyze the reasons for the falling demand of the company’s product by consumers; to give explanations of our understanding of the problems and recommend effective intervention strategies that will bring speedy increase in the sale of the products to improve revenue for the company.The scope of the report also covers proferring solutions to organizational lapses, administrative bottlenecks and structural defects that will make our strategic interventions more effective.This report is segmented into three parts: the first part throws light on the poor administrative style and inefficient policies, and how they have helped to undermine harmony in the operations of the various departments, which consequently led to the decline of product sales.How unrealistic staff benefits and remunerative package led to loss of morale and mass resignation of key departmental managers, among other substandard industrial practice that brought untold challenges tha t destabilize the financial fortune of the company.The second part is a detailed illustration of the intervention strategies, new policies, principles and organizational restructuring that shall be used to bring a reversal of the downturn of the company’s fortune. We shall explain how we arrived at such measures, and their efficacy in solving and resolving the many challenges facing the establishment.The third and final part analyses the internal organizational history, the politics of its operations, as well a weak decision making procedures, and how they have contributed to the company’s weakness and present problems. We shall give solutions on how these problems should be addressed, without which no intervention measures will be effective.

Friday, November 8, 2019

Borders Group Inc. Case Study Essay Example

Borders Group Inc. Case Study Essay Example Borders Group Inc. Case Study Paper Borders Group Inc. Case Study Paper Borders Group Inc. Professor: Simon Dekker Student: Yanhui Zheng Student ID: 021244231 Date: 02- -2010 Introduction Borders Group Inc. is one of leading and well-known retailers of books, CD, and other educational items. Its idea is â€Å"To create richer, more satisfying lives through knowledge and entertainment. † In order to accomplish its mission, Borders provide additional services to make its customer enjoy spending in the store. Borders’ store is not just a bookstore that people go in, buy books, and leave. More likely, it is a place that people can relax and learn knowledge at the same time. Despite the stores throughout nationwide, Borders also has stores in Australia, Malaysia, New Zealand, Oman, Singapore, and United Arab Emirates, and in total approximate 600 stores. Its headquarter is located in Ann Arbor, Michigan. Borders Group Inc. ’s history can be traced by two brands: Borders and Waldenbooks. Lawernce Hoyt ran a rent library in 1933. Later in 1962, Hoyt opened first independent bookstore named Walden Book Store. In 1971, an 800-square-foot used bookstore named Borders Book shop was opened. In 1984, Waldenbooks was purchased by Kmart Corporation, and in 1992 Kmart Corporation also merged Borders and named them as Borders-Walden Group. Three years later, it was renamed as Borders Group Inc. , and moved headquarter to Ann Arbor. Recent years, Borders can not compete with online sellers, especially Amazon. com. It starts to lose business, and has to close stores in order to cut its expenses. Now, it is close to bankruptcy, and is preparing the files. As-is Condition According to Moneycentral. com, from 2001 to 2006, Border Group Inc. made approximate 100 million dollars every year. Later it started to lose money. In year 2009 and 2010, it boomingly lost 184. 7 and 110. 2 million dollars. Borders as a leading traditional bookstore, its experience is a live example that shows the industry life cycle for the tradition bookstore industry. Following char illustrates the whole process. Chart1: Traditional Bookstore Industry Life Cycle Combining the Borders’ financial statements, it shows that during maturity period, Borders made a lot profit. Later on, because of the new technology, the way to sell books and other related items is changed. Compared with the online sales, the traditional bookstore is getting out of fashion, and the whole industry is going to the decline period, or even phase-out period. Within this period, Borders started to lose business, and now can not even operate normally. Borders can not disobey the industry life cycle, it has to close its business or follow the new technology. Actually, Borders has already taken some actions. News form internetretaler. om, on August 1, 2010, CEO Mike Edwards announced that Borders was trying to open an e-books store with 1. 5 million titles, and also provided 38 million loyalty program members incentives. The goal was that by this time next year, it would take 17 percentages of online market. Unfortunately, Borders did not recognize the potential of online sales at the first place. By the same time, its biggest online competitor Amazon has already taken 90% market s hare. Following char is used to illustrate the situation. Chart 2: The Impact of Speed to Market on Sales According to Moneycentral. om, in 2003 Amazon. com broke even and made 35. 28 million dollars of net income. After that it started to grow dramatically, by the end of 2010, the income went up to1,152 million dollars. Amazon took advantage of new technology, and made an early entrant to the new market. When the market was mutual, it already owned 90% market share before some other competitors realized the new trend, such as Borders, Apple and Google. ( dailyfinance. com/) Due to late entrant, Borders is facing great challenge. To sum up, new technology forces traditional bookstores lose competitions. On the other hand, Borders missed the early entrant, and it is very difficult for Borders to catch up. Analysis Despite its competitors, Borders itself already gets some problems. According to its last year’s financial statements, Borders’ metrics and trends is shown as following chart: Chart 3: Borders’ Metrics and Trends in 2010 Current Levels| Item| Metric Description| 1st Q| 2nd Q| 3rd Q| 4th Q| Measurement| 1| Total sales| 1,016,200| 547,200| 507,900| 475,600| Monetary ? | 2| COGS %| 75%| 80. 30%| 80. 90%| 84. 80%| Pecentage ^ | 3| Admin cost/sales| 21. 40%| 25. 0%| 26. 20%| 30. 30%| Pecentage ^ | 4| Net Income| 59,900| 64,100| 46,700| 74,400| Monetary ? | It is very clear that total sales are continuously decreasing each quarter. What is worse is that the costs are increasing boomingly. Only 1 year the cost of goods sold goes up by 10%, and operational activities costs also is increasing. Of cause, the profit is keep going down. Compared with Borders, Amazo n is skyrocketing growing. Its sales went up from 3. 1 billion in 2001 to 34. 2 billion dollars in 2010, especial it grew by approximately 10 billion dollars in 2009. The last three years analysis is showing in the following chart: Chart 4: 2008-2010 Amazon. com’s performances | 2008 | 2009 | 2010 | Total sales| 19,166,000 | 24,509,000 | 34,204,000 | COGS %| 77. 72%| 77. 43%| 77. 65%| Admin/sales| 17. 89%| 17. 96% | 22. 34% | Net income | 645,000  Ã‚   | 902,000  Ã‚   | 1,152,000  Ã‚   | Amazon did not only make more sales or profit, it also had obviouly lower cost of goods sold and admin/sales ratio. Most important thing is Amazon still growing while Borders already goes to the downturn and has to close stores in the reality. The following is Borders’ â€Å"Causes and Effects† diagram. Chart 5: Borders’ Causes and Effects Diagram Compared to virtual bookstore, the physical bookstore needs more staff to maintain, and has to pay renting, utility, cleaning, and others. Therefore, it is too expensive to hold the traditional stores, especially when it can not make profit. Not like online sales that the customer just need to summit his/her credit card information, the customers have to stand in line to pay for the items. If customers choose to purchase online, they do not need to drive to store. They only need a computer and internet. Without computer, smart phone, iPod, or other devices can access to internet also works. It also is easier to look for a book online. Compared to online sales, traditional bookstore has more process and other inconveniences before making a sale. In contract to online sellers, Borders’ employees have to do more in order to make a sale, while online sellers just need to take care of the delivery and customer support. Borders management team realizes the trend of online sale, but it is already late to take advantage of early entrant. At the end, the products sold in bookstore usually are more expensive, and also Amazon has much more different items, not only educational stuff. In 2010, the management team did realize the value of online store, and tried to entry the online retail industry. Following is the Borders e-book transformational process. Chart 6: Borders’ e-Book Transformational Process Inputs eBooks 1. 5 million titles, customers Transformational process Outputs Make sales Amazon 90% market share; Apple and Google 38 million loyalty program members incensive Feedback Measurement Adjust Borders planned to open a e-Books’ store with up to1. 5 million titles by 2011. In additional, the management team came out an intensive plan which Borders would give away 38 million dollar to its loyalty members. This plan will encourage some customer to go to Borders online store. However, Borders’ effort is greatly impact by the online retailers’ leader Amazon, which already takes 90% of e-Books market. Despite the huge market share of Amazon, Apple and Google are also working on online bookstore. According to Sarah Weinman, Amazon’ market share will drop to 35% by next 5 years. At the nd of 2010, due to Apple and Google, Amazon is likely to go down to 72%. However, Amazon’s e-Books’ revenue will be triple by 2015. This is has both good and side effect. The good news is Borders still can take market share from Amazon decreasing share. The bad news is Border still one step behind Apple and Google, its competitors also should include Apple a nd Google. Borders put its e-Books resource and customers’ relationship into input, plus its incentive effort. It is surely that Borders will get a lot customer to support its online store. However, its competitors, especially Amazon. om already takes over the market. Border still has long way before it can grow to certain level. Proposed improvement When new technology coming out, it always brings a lot challenge to the old industry. Sometimes, it replaces the whole industry. The other times, they can both survive. Just like radio, and TV. When they first came, people start to worry that there is no place for newspaper. Actually, they did challenge the newspaper industry, but later on new balance came out and newspaper still existed. Online retail bookstore is exactly same as the radio and TV. It did bring a downturn to the traditional bookstore; for instance, Borders closed about 200 stores last year. It is irreversible that traditional book store are going to the decline period. However, there still is some place for traditional bookstore. Compared with Amazon, it is obvious that the reason for Borders to lose money is higher cost of goods sold and admin cost. Therefore, the key point for Borders physical bookstore to survive is to cut its cost of goods sold and admin cost. If Borders can not significantly cut the cost, its bookstores have to be closed. Chart 7: cost reduction process The cost comes from two sources cost of goods sold (inventory) and admin cost. In order to cut the cost of goods old, the first step is to find cheaper supplier with satisfied quality. If customers accept the normal price, then try to find another source with cheaper price. If can not find any other cheaper supplier and this price already can make profit, it is OK to keep use the same supplier. If customers resist the price, offer a discount in order to make a sale within profitable arrangement. If the discount sale can not make profit, definitely go to find cheaper source, or ave to skip this product. The second part is to reduce the administrative cost. This cost is mainly from employees’ salary. One way is to cut the salary. Reasonable salary cut due to slow business is fine, but do not cut too much. If doing so, the employees are not going to appreciate with the cut (actually cutting salary never make employee happy), they can not perform their best. If they can not provid e satisfied services, customer will not be happy to buy items from here. Another way is to fire some employees, retrain the remaining staff so they can take more duties. If the cutting cost solution works, the customers can get cheaper products. For example, the cost of goods sold goes down to 75%, which is its first quarter rate and also lower the Amazon average level. Admin cost can be back to 21. 4%, which is lower than the Amazon’s. Therefore, profit margin is larger than Amazon’s margin. This also can provide a space for Borders to give some benefit back to its customer, such as discount sales, incentive plans, and so on. Base on the economic rule, price goes down, and demand will go up because customers are willing to buy more relative cheaper products. More products are sold, and Borders is able to make profit. If the efforts on cutting cost still can not help Borders to make profit, Borders will have to close its stores in order to step away from keeping lose money. The other part of Borders operation, which is online store is much more important, it decides how far Borders can go. The major problem is the market share. As mentioned above, Amazon already takes 90% market share, Apple and Google also step into this industry, and Borders is left behind. In order to catch up with Amazon or other competitors, Boreders has to continuously improve its products and services. The related elements for improvement are price, quality, delivery and customer support. Chart 8: Online sale improvement process Whether a business can exist or not is greatly up to marketing department or sales department. The first thing should be focused is to make sales. Try to sell at the normal price firstly, if the sales do not go well, then lower down the price try it one more time. This is very important to earn money. Later on, purchasing the inventory becomes priority, it help a company to cut the cost. However, Borders can not just chase for cheaper resources, poor quality would lead customers to balk or return the products that they just bought, and this will cost more then just simply purchased high quality products. A biggest difference between physical store and online store is online store usually has to deliver items to the customers. The speed of delivery also is a key factor for online sales. If it is too slow, customer might look for another online retailer in order to get it sooner even with higher price. Customers’ feedbacks are basic and critical facts for evaluating an organization’s operations. Management team should pay enough attention to customers’ feedback as well as employees’, in order to improve its operations. For instances, if customers complain quality is not good and delivery is slow, the organization has to improve them. Even customers do not complain, the organization still need to care about the improvement. Continuously improvement is the key to success. Borders losing business also is result from careless improvement. A huge part of online sales is customers’ support. Because customers can not face to face communicate with the employees, it has to pay attention in order to satisfy customer. Despite the continuous improvement, to eliminate the wastes is another point to gain competitions. The most efficient way to do that is using lean production. Borders should pay attention to three parts: supply, transformational process and market. Borders can use enterprise resources planning (ERP) to organize its resource and operations to avoid big waste. This is key for Borders to gain competitions since it already behind the market. Conclusion Due to new technology, the traditional bookstores are running out of fashion. Book store follows the industry life cycle; it already goes to the phase-out period. Online sales give customer more profit and conveniences. Borders closed stores are the price paid for the new innovation. However, there still is space for bookstore to survive. Compared to Amazon, Borders’ biggest problem is the high cost. There is only one way to help Borders’ stores to survive, which is to cut the cost. Borders has to process cost reduction procedure constantly, or else it needs to graduated close the stores. New technology brings new opportunity. Borders continuous development depends on market the new industry, which is online bookstore. Due to its late entrant, Borders needs to do much more then earlier entrant competitors. The most important thing is to continuously improve its products and services. Any efforts that work for cutting cost must be done, such as lean production, which can help Borders to eliminate the wastes. To sum up, if an organization wants to develop for the long run, it has to constantly improve its operations, production and other related activities. The technology makes it easy for all business to share information, but still people are the decision maker. People have to learn or train in order to catch up with the development of technology and society. Borders’ experience is the live example for being behind the technology. References About Us. (2010). Borders. com. Retrieved on Feb. 21, 2010 from borders. com/online/store/BGIView_bgiabouthistory Amazon. com, Inc. (2011). Finance. yahoo. com. Retrieved on Feb 21, 2010, from http://finance. yahoo. com/q? s=AMZNql=1. Amazon. com, Inc. (2011). Money. msn. com. Retrieved on Feb 21, 2010, from http://investing. money. msn. com/investments/stock-price? Symbol=AMZN Brohan, M. (2010). Borders jumps into the e-books fray with a new online bookstore. Internetretailer. com. Retrieved on Feb. 21, 2010 from internetretailer. com/2010/08/01/borders-jumps-e-books-fray-new-online-bookstore Weinman, S. (2010). Amazons E-Book Market Share May Plummet: Great News for Amazon. Dailyfinance. com. Retrieved on Feb. 21, 2010, from dailyfinance. com/story/company-news/amazons-e-book-market-share-may-plummet-great-news-for-amazon/19361847/

Tuesday, November 5, 2019

The 7 Types of Possessive Case

The 7 Types of Possessive Case The 7 Types of Possessive Case The 7 Types of Possessive Case By Mark Nichol The possessive case is used to indicate relationships between one person, place, or thing and another. However, it’s more accurate to call it by its alternate name, the genitive case (genitive means, essentially, â€Å"generation†), because in many uses, one person, place, or thing doesn’t actually belong to the other. The genitive is indicated one of two ways: A singular noun is followed by an apostrophe and the letter s (as with book’s), and an apostrophe alone follows a plural noun that ends in s or es (as with teams’ or arches’). The genitive form of an irregular plural noun, one in which a change in spelling, rather than s or es, marks the word as having a plural form (such as men), is treated as if the word were a singular noun (men’s). Here are examples of the seven categories of genitive use. 1. One type of genitive case is that denoting occupation, or ownership or possession, as in â€Å"She walked into Jane’s office† or â€Å"John’s car is being repaired.† (In all genitive forms, the noun to which the apostrophe or the apostrophe and the s are attached is called the dependent, or modifier, noun; the word with which it is associated is the head, or modified, noun.) 2. Another is relationship, as in â€Å"The school’s principal is retiring this year.† (This idea can also be represented by omitting the apostrophe and the s â€Å"The school principal is retiring this year† but the meaning is slightly different; in the latter sentence, the reference is to a person identified as the school principal, whereas the genitive form treats the school and the principal as separate entities.) In this category, the idea can be expressed in a phrase beginning with the head noun: â€Å"The principal of the school is retiring this year.† The previous type is not so flexible; â€Å"She walked into the office of Jane† is awkward, and constructions such as â€Å"She walked into the office belonging to [or occupied by] Jane† are usually unnecessarily verbose. 3. The genitive can also be used to express agency, or representation, as in â€Å"The board’s secretary consulted the minutes from the last meeting.† (The secretary is a member of the board but technically doesn’t belong to it.) â€Å"The secretary of the board consulted the minutes from the last meeting† is also correct, but as in the previous example, the emphasis is slightly different, and the first version is more concise. 4. Description is another function of the genitive, as in â€Å"She admired the fabric’s glossy sheen.† (Loosely speaking, the glossy sheen â€Å"belongs† to the fabric, but the phrase is, strictly, speaking, a description.) 5. Another category is that relating to the role of the person, place, or thing that serves as the subject of a sentence, as in â€Å"The officer’s report was conclusive.† (â€Å"The report of the officer was conclusive† has the same slight distinction of meaning as similar constructions in previous examples.) 6. Then there is the role of the person, place, or thing identified as the object of a sentence, as in â€Å"The baby’s delivery was uneventful† (which can be rendered â€Å"The delivery of the baby was uneventful† with a slight difference in the meaning). 7. The most troublesome genitive form is that in which a phrase including of is truncated, as in â€Å"He gave two weeks’ notice† in place of â€Å"He gave notice of two weeks†: Many writers mistakenly treat â€Å"two weeks† as simply a modifier of notice (â€Å"He gave two weeks notice†) rather than correctly including the apostrophe to indicate the genitive case. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:20 Great Similes from Literature to Inspire YouTaser or Tazer? Tazing or Tasering?The 7 Types of Possessive Case

Sunday, November 3, 2019

Assignment 8 Essay Example | Topics and Well Written Essays - 1250 words

Assignment 8 - Essay Example Most workplace violence cases are being reported to victimize the women. It has been reported that about 2 million people across the United States. Workplace violence pros a higher risk to some of the workers likes the workers that are dealing with public affairs, law enforcement workers, community workers, medical staff and taxi drivers. However, workplace violence may impact the other workers. The bank workers that exchange money, transportation workers and workers those work alone during night shift may have reduced immunity against the workplace violence (Mediate.com, 2013). Pre-Event aspect of the workplace violence deals with the aspects that are prior to the assault. These aspects include the inequality; improper behavior of fellow workers, potential objects that can become a tool for any assault. Employers can minimize the workplace violence event by minimizing the pre-event aspects of the workplace violence. Placing cameras for monitoring and maintaining high security come i n the pre-event aspects. Event aspects of the workplace violence deal in condition of assault. In case of assault one must be trained to deal with the workplace violence. Enabling alarm bells and maintaining the security staff will reduce the impact of the event of the workplace violence. Easy escape passage should also be provided in case of assault. Post-Event aspects of workplace violence are the punishment of the culprit by the employers and the by the law. There should be tough punishment for the culprits, so that no one in a workplace environment should think to try any act of assault. 2. Discuss three occupations which are among the most vulnerable to workplace violence and why. The three occupations that are most vulnerable to workplace violence are the law enforcement agents or police officers, security guards or security agents are most vulnerable to the workplace violence. As police officers are there to protect the other citizens from any criminal activity, they are like ly come to come across the workplace violence. It is more likely for the professions that deal with the general public affairs and interaction to be in workplace violence situation as compared to professions (Mediate.com, 2013). Visiting nurses are also vulnerable the most. Most reported cases of workplace violence victimize the women. Sexual assault, sexual abuse and sexual harassment are some crimes that victimize women the most, when considering the workplace violence. Taxi drivers work day and night to earn bread for the family. Taxi drivers work alone and thus vulnerable to violent attacks (Dol.gov, 2013). 3. Compare the London train bombings in 2005 and the train bombing that occurred in Madrid, Spain in March 2004. The London Train bombing in 2005 and Madrid (Spain) train bombing in March 2004 nominated a terrorist group â€Å"Al-Qaida†. The London train bombing took 39 person’s life and injured about 700 people in the total of four incidents. Three bombs were d etonated in the train at various locations at about 8:50 and the fourth incident of bomb explosion happened after an hour of the train explosions. All of the attacks were done by suicidal bombers that are the permanent citizens of the United Kingdom. The terrorist choose the busiest underground train to attack and preferred busiest office hours to attack the train. All bombers died in the incidents. The terrorists started their journey from Leeds and travelled to Luton where they collected the bombs packed in their back packs. The

Friday, November 1, 2019

Consultant Review Essay Example | Topics and Well Written Essays - 750 words

Consultant Review - Essay Example When we talk of fairness during the selection of officers for a special training or course, we come through several aspects which are faced by the selector which binds him to step aside the path of righteousness and select candidates on the basis other than merit and required attributes. Greed: This is the most common reason of corruption. Cash or kind is generally offered to buy the selector. Money is important to all and everyone wants to be rich. But service is more important than riches. We should know where to draw the line. Power: Having power puts you in a position where doing both the right and the wrong is in your hand. You need to utilize the powers entrusted in your hand judiciously. Remember, power also brings with it responsibility. Favoritism: The selector can be biased about a certain applicant who is a personal favorite of his. But this is not the time to shower your appreciation. You might be steeping over the right candidate for the job. Political and Bureaucratic Patronage: Believe in your self and do what is only and only right and then no one can force you to do something which you know is wrong. Do not yield to pressure. It doesn’t pay in the long run. But, this is one reason where you might not be in a position to say in the negative. Find alternate ways. Obliging nature: Don’t say yes when you want to say no. Every now and then we are stuck in such a position that although we know what is right we are compelled to take the opposite road. Police force is not your personal entity so do not let your personal nature come in between the path of your duty. Now, the question that arises is what comes under the term ‘unfairness’. What we might not do with an intention of being unfair others may cry foul at it. Employee Survey is one of a number of instruments used to look at fairness in selection. Perception of fairness at times correlates with other workplace issues. First and foremost what is required is a