Friday, October 25, 2019
Analysis of the Sabbath in Judaism and Christianity Essay -- Papers
In both Judaism and Christianity, the Sabbath is a religious day of worship. Jewish people celebrate it on a Saturday and Christians celebrate it on a Sunday. It is a day of rest and worship. Christians celebrate it on a Sunday because that Is the day of the resurrection (Easter Sunday). Jesus was Jewish. He was a good Jew. Jesus worshiped in the synagogue on the Sabbath, but he used to come into conflict with the Pharisees, Jewish religious leaders, over many religious laws and customs. He told them that he thought they were using the laws to their own power and that they did not explain to the Jewish people the meanings of these laws. The Pharisees were the Jewish religious leaders. They were concerned to uphold in every detail the Jewish religious laws including those of the Sabbath. Jesus came into conflict with them many times, they saw Jesus as a threat. Jesus came into conflict with Pharisees` many times about the Sabbath. In Mark 1:21-31 (a man with an evil spirit). Jesus and the disciples went to Capernaum. On the Sabbath Jesus went to the synagogue to teach. People were amazed by the way he taught, ââ¬Å"he taught with authorityâ⬠they remarked. A man with an evil spirit came n, Jesus ordered the spirit ââ¬Å"Be quiet, and come out of the man!â⬠The spirit then came out of the man. People were amazed and the news spread quickly. The Pharisees wouldnââ¬â¢t agree with this being done on the Sabbath because it is a kind of work, but Jesus does agree with it because it is a good deed and helps another which is also considered as necessary work. In Mark 2:23-28 (the question about the Sabbath). Jesus and the disciple... ...nd Mary Magdalene went to go and anoint the body of Jesus. At sunrise early Sunday morning they went to the tomb. They went on the day after the Sabbath because it against the law of the Sabbath to anoint the body on the day of the Sabbath. We know that Jesus was a good Jew, because on many occasions mentioned in the Gospels he is in the synagogue, teaching and praying. We also know that Christ read the scriptures and taught in the synagogue on the Sabbath. He also healed people on the Sabbath. Different Christian denominations focus on different things that they believe are most important. You have the Pulpit based worship which the Methodists, church of Scotland and United Reformed Quakers use. Eucharist based which Catholics and Church of England focus on. Lastly the Good works based which Salvation army focus on.
Thursday, October 24, 2019
Amma Unavagam
Growth through CARS Initiatives Pfizer is the world's largest and one of the most admired pharmacy companies with an income of about US $52 Ban in 2013. In 2001 when Dry Hank McKinley took over as Chairman and CEO of the company, Pfizer was very stable and financially sound. It was poised to become the world's largest pharmaceutical company with revenues doubling In the next five years. But the CEO had other serious challenges to contend with.In response to these challenges, Dry McConnell formulated a new mission of Pfizer to become the world's most valued company not Just to Investors, patients and customers but also, to employees, partners and communities where we live and work. â⬠In line with this mission, Pfizer became the first pharmacy company and one the first corporate in the world to sign up for support for the LINE Global Compact (UNC). UNC among other things envisages that businesses should: 1. Support and respect the protection of internationally proclaimed human ri ghts and 2.Uphold the elimination of discrimination in respect of employment and occupation. To deliver on his commitments to these principles of UNC, Dry McKinley created and launched Its The Global Health Fellows Program (GAFF) In 2003 under his personal oversight. Under this program, Pfizer would send their skilled employees to developing countries on short term assignments (2 ââ¬â 3 months) to help Noose there build health and social infrastructure in communities ravaged by various dreaded diseases.These employees would transfer their professional, medical and business expertise to the Noose in such a way that the Noose would learn to promote more efficient access to quality health services for the needy. Starting with mere 18 people in 2004, today over 300 Pfizer employees participate in assignments in 45 countries in partnerships with 40 international development organizations. Experience shows that through GAFF initiative, the MONGO partners gained expertise in capacity-b uilding analysis, planning and training that they couldn't otherwise afford.This helped them to Identify health trends and plan Interventions, enhanced their drug-trial competence helping them attract more western resources, and manage their programs better. International social cause as good corporate citizen. The Program became a personnel development tool. Returning volunteers came home with new operational and business insights as well as better understanding of the company's stakeholder including patients, communities, medical professionals and MONGO etc around the world especially in emerging markets.This in turn contributed to better policy making and program planning including bringing better AIDS therapies to the market. This program also served as a valuable recruitment and retention tool. It also helped build better relationships with legislative and regulatory authorities. Interestingly, the success of the GHB Program enthused Pfizer to include reports of philanthropic a ccess programs in their financial reports to the investors.
Wednesday, October 23, 2019
Ethical Standards Within the Healthcare Industry Essay
ABSTRACT à à à à This research functions as an analysis of the essential similarities and differences between the ethical standards upheld by the health care sector and the non health care sector. The health care sector includes hospitals, clinics, and private practices while the non-health care sector includes commercial, technological, industrial and other sectors. The paper discusses regulations and legislation of ethical practices and finds that the extent to which ethics and law overlap is dependent on such factors as the type of harm that can be done to citizens as a result of an action. The paper also discusses the extent to which the administration of ethical rules takes place within the sectors in question. à à à à It posits that the health care sector maintains a high standard in ethical practice, especially in the medical, pharmaceutical and a few paramedical fields. It distinguishes as well as defines clearly the concept of ethics and law and how they are legislated in a few selected establishments. Meticulous care has also been taken to probe and illuminate the nuances of the controversial disclosure law and to give insight into the strong ethical question that it addresses in the health care industry. Equally, the issues concerning the consent and privacy rules were also dealt with in an in-depth and comprehensive manner. In addition to this, the paper explains the several ways in which information can be protected from physical and electronic abuse. It also delves into the areas of weakness and threat faced in technological security. à à à à The ethics of the health care and the non health care sectors were also examined through these lens of technological security, and analysis was done of the methods used by each sector to secure information. Finally, the implications of this research outlined at the end of this report and recommendations are then given for improving ethical practice. The researcher suggests ways of improving the quality of ethical standard in the major health sector as well as other branches like the paramedical. Furthermore, the recent developments in electronic assessment and the dissemination of business information are shown to create a need for both regulation and legislation. There is a demonstrated need for simplification of all ethical legislating and regulating information so that such might be made available to everybody who desires to learn and abide by ethical standards. Chapter 1 INTRODUCTION BACKGROUND à à à à Ethics is a philosophy of life and became a part of the business world. The complexity and critical needs of the health care industry are more prone to medical errors which could cost human lives. The quality of care is measured by ethical factors related with the medical industry. However, ethics go beyond quality of care and include many other areas in the health care industry. The role of health care administration in the organization is to ensure that customers are protected completely and that their privacy are not violated. à à à à à The practice of ethics is also one of the duties and responsibilities of the Health Care Administrator and as such, the present paper aims to identify the position and practice of ethics in the health care industry with other non health care industries. In doing so, the paper intends to gain insights of ethical practices of non-health care industries and tries to recommend the best practices for the health care industry if gaps are found. In order to evaluate the key issues of ethical practices in both sectors, the paper considers the Information Security aspect of business Information. à à à à Thus, the paper aims to compare the ethical practices mainly concentrating in the primary areas of information Privacy and Security from health care and the E-commerce sectors. Every responsible activity in any organized sector of human endeavor requires some form of regulation. Whether it is written or unwritten, legally documented or morally documented, the study also tries to observe the ethical practices against the industry specific ethical standards and legal policies. à à à à Ethics can be defined as learning of what is right or wrong and then doing the right thing. Generally, ethics are aimed at the employees of organizations whose management experienced problems. LAW AND ETHICS à à à à The Legal Information Institute (1999) defines ââ¬Å"lawâ⬠as a set of rules that are considered universal and that show both internal and external consistency. They are publicized and are usually accepted by the society in which they are published. They should also be enforced. Such laws are regulations that govern how persons in a given society are expected to behave toward others, who make up the society, and standards the persons who live within that environment are required (and not just expected) to adhere to. The government is responsible for enacting such laws, and is empowered to use security forces to ensure these laws are enforced. Sue Anstead (1999) has identified five following criteria that must exist for laws to be considered as such: consistency, universality, publication, acceptance, and enforcement. First, Consistency refers to the idea that contradictory requirements cannot be considered law, as it would be impossible for people to obey both. Second, universality demonstrates that the requirements should apply to all who share similar situations within a given society. Third, publication promotes the idea that the requirements should be available to all via some method of written publication. Fourth, acceptance means that the requirements must be generally considered appropriate. When acceptance of the law occurs, it will be nearly universally obeyed. Finally, the enforcement criterion reflects the idea that the members of the given group must be forced to comply with the regulation and punished should they choose to disobey. à à à à à Anstead (1999) has also noted that the Greek word ethos is that from which the English word ââ¬Å"ethicsâ⬠is derived. The Greek word is one that means character, and the Latin equivalent of same words adds the idea of custom to the meaning of the term. The combination of these ideas reflects the choice that people within a society make regarding their mode of interaction. The philosophical rendering of the word ââ¬Å"ethicsâ⬠gives the definition as that which is good or wholesome for the person as well as his social environment and it also describes the duties that should be performed from one person to another. à à à à à Ethics has many philosophical traits that one might describe as ââ¬Å"commonâ⬠to all forms of the term. It is concerned with the apprehension of things considered acceptableââ¬âor the distinguishing of right from wrong. Furthermore, ethics are designed compel the individuals to choose the right over the wrong. Decisions that are considered ethical are generally attended by consequences that extend over a discernible period. There are also generally several options regarding behavior, so that a person must make a choice to be ethical in his/her behavior. à à à à However, ethics are not considered to be the same as morality. The difference that lies between them is delicate but important to learnà and understand. Judgment is at the heart of morality, as it has to do with certain ââ¬Å"standards of behavior by which individuals are judged, and [â⬠¦] which people in general are judged in their relationships with others (Anstead, 1999).â⬠Ethics, however, differs from this as it encircles the entire belief system upon which a certain version of morality rests. The values connected with ethics and those principles one finds in conjunction with the law are generally related to each other. However, ethical responsibilities are often greater than legal ones. However, the opposite is also true at times. As a matter of fact, it might be said that ââ¬Å"although law most times embodies ethical principles, law and ethics are far from co-extensive (Ibid).â⬠à One finds that no laws exist against certain actions that may be considered even by many as unethical. On the other hand, the law does prohibit some acts that are not considered unethical but may just be dangerous. Examples of these abound, but just to name a couple: making false claims about a certain situation or betraying the trust of a friend is, in most cases, not considered illegal. However, such an act is almost universally considered unethical. Similarly, speeding is against the law, though many would agree that most people do not find such an action unethical (AMA, 1994; Anste ad, 1999). à à à à McNamara (1999) has described a scenario in which the relationship between law and ethics is depicted. When setting up a set of criteria or guidelines that help in the detection, resolution, and the warding off or discouragement of breaches to ethical codes, an organization is often secured against involvement in further legal problems. According to Anstead (1999), ââ¬Å"Federal sentencing guidelines passed in 1991, for example, permit judges to reduce fines and jail time for executives proportionate to the ethical measures a company has taken (Ibid).â⬠This makes it a wise decision for any company to take time to develop a code of ethics. If an organization develops positive methods for dealing with situations concerning ethics, this will give them the opportunity to extend mitigated punishments, in the event that legal violations do occur. à à à à Guidelines or codes that govern the conduct of individuals, and which are of the sort that is universally agreed upon as good actions, should be provided to the public in written form within a document. Such a document must be observed and upheld as one containing principles that are designed to guide the public (Anstead, 1999). At this point, the document should then be transformed into law. In several contexts, and especially in non-healthcare situations, one finds that the law contains no real documented types of ethical legislation. A person is generally viewed as being capable of and willing to exercise ethical conduct within a given scenario as the need arises. However, no general effort is usually placed into predicting the types of scenarios in which ethics might play a part, as well as the types of ethical behaviors that might be required. As a result, no systematic code of ethics has been captured and written down for several industries outside of the healthcare industry (Anstead, 1999). Many laws have been drafted and put into place, guarding against harm to employees and other modes of unethical conduct in the working environment. The Department of Labor is responsible for the administration of such laws within the United States. However, they are generally reflective of ethical benchmarks adhered to by most persons and organizations within society. Laws that perform such duties include the Americans with the Disabilities Act of 1990 (ADA). The ADA (1990) has stipulated the following: No covered entity shall discriminate against a qualified individual with a disability because of the disability of such individual with regard to job application procedures, the hiring, advancement, or discharge of employees, employee compensation, job training, and other terms, conditions, and privileges of employment (ADA, 1990). à à à à It would not be against the ethical standards of most to admit that the denial of employment, promotions, or other benefits to a person with a disability would be wrong once that denial is based only on the fact that the person carries that handicap. This is especially true when the disability in question poses no impediment to the proper completion of the task required by the job. Ethics in the workplace also extends to the business person who finds himself under no legal obligation to refrain from divulging information given to him in private by a colleague. This is in direct opposition to the kind of confidentiality required in the healthcare system. Medical professionals must adhere to strict guidelines concerning the sharing of information about patientsââ¬â¢ medical conditions (Agelus, 2004; AMA, 1994). In doing this, these professionals adhere both to ethical as well as legally binding guidelines. ETHICAL RULES FOR EMPLOYEES à à à à Employees that work within corporations and at executive levels are held to guidelines that are usually termed ââ¬Å"ethics standardsâ⬠(Anstead, 1999). The sources from which these guidelines are obtained as statutes concerning ââ¬Å"criminal conflict of interestsâ⬠and those concerning ââ¬Å"administrative standards of ethical conductâ⬠(Ibid). It is by way of such statutes that the government itself has become involved in the enforcement of ethical behavior within the corporate world (Budd, 2005). à à à à The United States has a Criminal Conflict of Interest Statute, and the ethical nature of this law can be reflected within the United States Code. This statute bans such behavior as employees performing such actions that show their own interests to be given priority over that of the Federal government itself. It is known that obtaining information within a business setting is for the purpose of protecting the interested parties equally. In the healthcare industry, this refers to the doctor and the patient. In these scenarios, it becomes in the interest of all persons involved that information divulged in private remains confidential (AMA, 1994). Part 2635 of the Code of Federal Regulations exemplifies standards of administration as stipulated by the Ethical Conduct Regulation. According to Anstead (1999), ââ¬Å"The standards of conduct regulation establish principles of ethical conduct for employees within the executive branch and the regulation not only identifies the principles but also provides easy to understand examples of how the principles apply (Ibid).â⬠These guidelines that govern conduct refer to such actions as how to handle the receipt of gifts obtained from sources outside the organization; how to regulate the exchange of gifts between one employee and another; how to mediate conflicts of interests in financial situations; the removal of biases when conducting official business; how to go about finding alternate employment; the proper handling of a position of authority; how properly to balance activities outside and inside the organization. CODE OF ETHICS à à à à Companies and organizations within the private, non-health sector often set up their own ethical guidelines in addition to the already established guidelines provided by the government. These guidelines may be written in a formal manner, or just informally understood among those persons involved. It is usually up to these private bodies to enforce such codes, as the government is generally not capable. When these codes are violated, employees or members within the organization or group may have their employment terminated. à à à à Within the healthcare industry, as well as in any related sector in which humans are heavily involved in research, strict rules generally govern the actions of the professionals involved. One example of the strictness of such rules is found in the ethics that govern the carrying out of experiments that involve human subjects. Such research is carried out in hospitals, clinics, and even in universities around the world. In such cases, ethics and law work hand-in-hand, and the idea of consent (which shall later be discussed in further detail) form a large part of that research. à à à à The principle concern of all ethical research done on humans is the offer of informed consent to the subjects who participate in that research. This is defined by the researchersââ¬â¢ granting respect and justice to those being studied (Schrag, 1979). Such research methods that include deception, covert observation, or any other type of concealment regarding the use of information or purpose of the research is considered to be unethical. In some cases, however, it might be necessary that participants be recruited, who are unaware of certain aspects of the processes involved in the study. In such cases, an institutional review board or ethics committee must be approached, and accommodations made, to satisfy the committeeââ¬â¢s stipulations of certain aspects of the project that may require deception (NHMRC, 2001). STATEMENT OF THE PROBLEM à à à à In the main, this paper seeks to examine from a managerââ¬â¢s point of view, the ethical standards of securing business information in the healthcare industry and in comparison with the ethical standards of securing business information in the non-healthcare industries. As such, this paper intends to answer the following specific questions: What are the ethical standards of securing business information in the healthcare industry? What are the ethical standards of securing business information in the non-healthcare industries? and What is the comparison between the ethical standards of securing business information in the healthcare industry and the non-health care industries? HYPOTHESIS à à à à The ethical standards of securing business information in the healthcare industry are more rigid and standardized compared with the ethical standards of securing business information in the non-health care industries. OBJECTIVES OF THE STUDY à à à à This paper is written in order to achieve the following objectives from a managerââ¬â¢s point of view: To determine the ethical standards of securing business information in the healthcare industry; To determine the ethical standards of securing business information in the non-healthcare industries; To compare and analyze the similarities and differences between the ethical standards of securing business information in the healthcare and non-health care industries; and To recommend for policies or managerial improvements based upon the analysis and implications of the comparison of ethical standards in the healthcare industry, and non-health care industries. à METHODOLOGY à à à à In this study, the literature search is considered to eliminate the possibility of needless duplication of the outcome of the study. The study found that there is no evidence that a comparative analysis of ethical practices was conducted in the health care and e-commerce industries. Hence the study started analyzing the ethical practices in both the industries to make a recommendation to the health care professionals. à The study found that literature review saves considerable time by building on what is already known as well as using tested methodology, including instruments. The study progresses by assessing the merit of previous studies: their soundness, relevance, design quality, findings and conclusions. à à à à The literature research, especially in the findings and recommendations of others, often provides more and more persuasive justification for research on the problem. Previous researchers often identify gaps or areas where more research is needed. Besides enlarging the knowledge about the topic, the method allows to gain and demonstrate skills in areas such as: Information seeking: the ability to scan the literature efficiently, using manual or computerized methods, to identify a set of useful articles and books, and Critical appraisal: the ability to apply principles of analysis to identify unbiased and valid studies. à à à à The Literature is collected from Journal articles, books, Government reports, Theses, Internet articles and online magazines. Each of the sources has its own contribution to the paper. Journal articles were used for their up-to-date and concise information. Books were reviewed to have a basic ground theory and to collect facts on ethical practices. Government and corporate reports were studied to understand the relevant policies and legal frameworks for the ethical practices of the industries considered for the study. Theses and research papers were reviewed to understand and compare the knowledge gained in similar fields by authors and scholars.à Internet articles and online magazines were studied to review the application areas of the study in recent times to gather different opinions and illustrations. ORGANIZATION OF THE STUDY à à à à This paper is organized and structured in accordance with the American Pyschological Association (APA) format. Chapter one discusses the introduction and background of the study including the statement of the problem, hypothesis, and its objectives, and methodology. Chapter two reviews the literature which is also the main research method in data gathering as well as in the preparation for analysis and discussion. à à à à Chapter three analyzes and discussed the ethical standards of gathering information in the healthcare and non-health care industries. Finally, Chapter four concludes and make recommendations. Chapter 2 REVIEW OF LITERATURE DISCLOSURE LAW AND SECURING INFORMATION à à à à It must be agreed that the health sector is one of the most delicate and even complicated sectors of the national economy, and that it requires handling with utmost care. It is intimately concerned with handling the most delicate areas of personal information, as it is involved in the documentation of health records, and the treatment and handling of all ailments suffered by persons within society. So, the management of healthcare data requires competence and very high standard of ethics (Agelus, 2004). So here what must also inevitably be considered is the question of drafting laws and regulations to govern how this information can be secured in the best interest of the stakeholders (Morejon, 2006). Of importance is the question of what the ethical rules are which govern security of these data and information. Also of importance is the protection of the rights of all concerned, and this is what shall be explored here. Sage (2000) has identified the fact of the extreme popularity of laws that require physicians, hospitals, and other healthcare organizations to give extensive disclosure privileges to patients and customers.à He continues: The reason for this lies in politics, not policy: disclosure laws suggest a less intrusive role for government and greater reliance on individual choice and free markets than do other oversight mechanisms. This strikesà responsive chord in todayââ¬â¢s anti-regulatory political climate. At a policy level, however, few healthcare disclosure laws have been carefully designed to achieve specific objectives (Sage, 2000). à à à à An interesting and important way in which this process in which regulations are diversified is able to manifest itself is though the popularity of these disclosure laws. (Morejon, 2006). Researchers have expounded on this matter by showing how patients have been requesting extensive information about their health records in direct response to the widening scope of managed healthcare (Marshall et al., 2000). à à à à It has also been applied to regulation ensuring the quality and safety of hospitals and physicians as well as to the laws that are responsible for the decisions made by patients concerning their treatment. The main issue that is currently being faced in the healthcare sector with the laws concerning disclosure is that they are not focused. In the words of Sage (2000), they are ââ¬Å"scattershot, reflecting short-term political compromises or the equities of individual lawsuits rather than a coherent understanding of the purposes served by mandatory disclosure and the conditions necessary to achieve desired effects.â⬠So it is obvious that managing and securing business information is a whole lot of serious issues. In spite of this fact, persons who advocate disclosure are usually quick to point toward such laws issued concerning federal securities as models for healthcare disclosure laws. Their argument is that Congress should carve out for the healthcare industry ethical regulations that are similar to those drafted and enforced by the Securities and Exchange Commission (SEC) or by other financial agencies, such as the Financial Accounting Standards Board (FASB). Sage (2000) agrees that these boards do have the ability to illuminate some of the issues regarding ethics that face the healthcare sector. However, Sage goes on to point out that ââ¬Å"well-designed information requirements can serve therapeutic goals regarding openness, trust, and participation and can remind physicians and other health professionals of the tensions between their daily practice environment and their overarching ethical obligations (Sage, 1999).â⬠Therefore, in order to design fitting ethical standards and reg ulations, the particular idiosyncrasies of the healthcare industry must be taken into consideration. à à à à It is the job of the government to collaborate with the healthcare personnel to establish a hierarchy of actions through which ethical standards might be met. This will necessitate the prioritizing of such issues as education of the public and overall improvement of performance in as far as social issues may have a bearing on decisions made in healthcare. Furthermore, financial considerations should not have too great a bearing on the privacy and self-determination rights of citizens (Hsinchun et al., 2005). These are some of the basic issues that must be kept in mind in understanding the important role the healthcare sector is playing in securing and managing information. Another dimension of ethics exists in the form of economic theory, and in this dimension, no rule exists which stipulates that all consumers must necessarily be completely informed in order that efficiency exist in the sector (Baird et al., 1994). In fact, according to Sage: The SEC has had to accept the fact that the meaning of intricate corporate disclosure may elude unsophisticated recipients, especially as larger segments of the population purchase securities. It has become obvious that, the absence of a secondary market pricing mechanism in healthcare reduces the ability of a few sophisticated partiesââ¬âsuch as large employers or government purchasersââ¬âto discipline the entire market and those few have smaller incentives to achieve informational superiority (Sage, 2000). à à à à In the opinion of Baird et. al. (1994), ââ¬Å"overcoming the current degree of public ignorance is [still] a weighty challenge for a disclosure regime. This is particularly true because the least educated users of healthcare often have the greatest health needs and are vulnerable both to risk-selection in insurance and to substandard provision of care (Baird et. al., 1994).â⬠The federal security laws establishing disclosure law, as pointed out by Sage (1999), has suggested three core reasons for its necessity, which are to (1) Facilitate market competition; (2) Monitor agents and intermediaries; and (3) Improve corporate governance. The researcher has seen fit to take the time to explain what these disclosure law is as it is considered the basis upon which rests a healthcare officerââ¬â¢s ability to comply with his ethical demands. Again, ââ¬Å"it can serve varied and sophisticated purposes, but only if objectives are clearly articulated and laws carefully designed to achieve them (Sage, 2000).â⬠Dealing with the science of human even veterinary medicine without properly enabling regulatory laws will only lead to frustrations and conflicts (Agelus, 2004; AMA, 1994). This is the foundation and à understanding upon which this research is based. ETHICS IN BOTH INDUSTRIES Every sector in the health delivery field has governing ethical standards that regulate its operations, be it theoretical, clinical, paramedic or even veterinary sectors. Regardless of the different departments, the governing ethical rules are basically very similar. Therefore, bodies exist for the purpose of overseeing and managing, as well as securing the interest, survival and maintenance of these ethical standards. In the same way, the non healthcare sector (covering such fields as technology, law, business, commerce and sports) have their own ethical standards by which all companies are expected to act (Agelus, 2004; Budd, 2005). The stringency of laws that back these ethics, however, tends to differ between the two sectors. Every one who operates in the field of life has a moral or compulsive obligation to play by the rules, and every organized body is governed by sets of rules. These might be rules concerning financial management, training, membership, and qualification for certification in certain fields. These rules all involve the regulation of standards of practice and may be as diverse as the scope of the organization itself. The fact and reality to be noted here is that every member, and all those who desire to be responsibly associated with such a body, must abide by the ethics of such profession in good conscience, and may even be willing to be reprimanded and disciplined when the need calls for it (Baird et al., 1994). For example, lawyers believe that advertising their profession will have dire consequences (David, 2005). So it is expected that no lawyer will be so hungry for patronage as to put up an advertisement to improve his number of cases handled. Professionally that would be unacceptable. In instances such as this, a violation of an ethical standard does not constitute a punishable offence, but would be regarded as a moral burden on such an individual. If it is agreed that lawyers must appear noble, if a ââ¬Å"deviantâ⬠lawyer decides to publicly put up an advertisement in the papers or electronic media, there is no law that recommends prosecution. Colleagues, however, may look down on him, or at least see his actions as contemptuous. On the other hand, a civil engineer who opts to carry out an inferior job for a client may go unnoticed for a while. But if, by chance, such a building collapses over time, he may be sought out and may face possible prosecution. However, the reality is that certain ethical standards hardly have strong backing from the law enforcement agencies. The reason for this is that many are merely regulations and unwritten codes of understanding (Anstead, 1999). On the other hand, most health sector fields are very strict in adherence and implementation of their ethics of practice (AMA, 1994). The reason is quite obvious. The health sector has very strong relationship with maintaining human life, human health, hygiene, animal life, environmental concern, etc. So laxity, negligence, deliberate omission and commission may lead to casualties and unintended sad consequences. It could be conceded, therefore, that the ethics in the healthcare sector has a much stronger backing than its counterpart in the non-healthcare sector. For instance, a doctor who violates his code of practice, or carries out action that is not in conformity with the rules of practice will stand the risk of having his license withdrawn In his preface to his book, The Ethics of Human Resources and Industrial Relations, J.W. Budd, had this to say: In the business and economic spheres, many of the most pressing ethical issues involve the employment relationship, such as the rights of employees versus ER shareholders, employee privacy and monitoring, whistle blowing, pay equity, discrimination, employee safety, anti-union campaigns, and minimum labor standards. Since the field of human resources and industrial relations is ultimately about people and quality of life, there is a pressing need to develop applications of business ethics for the employment relationship in the context of research, practice, and teaching (2005, p. 1). à à à à In following the media coverage of the many scandals which have plagued countries throughout the world, the public has gained a greater understanding of what can happen when businesses do not adhere to ethical practices. Many scholars of business ethics consider that it is now time for the human resources and industrial relations communities to explore the application of ethics to the employment relationship and to discover the importance of treating employees, not just numbers, properly. This goes to show that the issue of observing ethics in profession is gradually taking a more serious dimension (Marshall et. al., 2000; Sage, à 2000). POSSIBLE CONFLICTS à à à à à It has already been emphasized that certain beliefs and actions may be perfectly legal, but might yet be considered unethical. One organization, the Marriot Corporation, holds itself and its employees to some very high ethical standards (Anstead, 1999). In fact, certain aspects of the companyââ¬â¢s standards might be said to be overdone. However, in the pursuit of comprehensive ethical standards, the dress code, for example, had once included certain stipulations that might today even be considered unethical. This had to do with the appearance of its employees while on the job, and on some level extends itself into areas that differentiate the sexes in what might be considered inappropriate ways today.à Some stipulations were (1) Prohibition of women from wearing skirts that go higher than about four inches above knee level; (2) Prohibition of women from showing bare legs and the requirement that they wear panty hose or long pants always; (3) Prohibition of women from wearing clothing that exposed their shoulders; (4) Prohibition of men from wearing their hair at a length that touches or goes beyond the collar without having express religious reasons for doing so; and (5) Prohibition of men from wearing certain types of jewelry, such as earrings. Despite the fact that such rules were considered binding within the confines of the company itself, nothing regarding them had anything to do with legal status at a judicial level. Still, within the culture of the Marriot Corporation, behaviors that went against the established codes were considered unethical (Anstead, 1999). à à à à There is also no law exists that prohibits companies from outsourcing their manufacturing jobs for the sake of profit. Furthermore, though minimum wages might differ greatly between the host country and the United States, corporations are not bound to meet anything more than the minimum wage requirement of the host country in order to remain unsusceptible to legal action. à Succinct with to the two aforementioned examples, other practices (though lesser in degree by comparison) demonstrating illegal actions might be considered ethical by the majority of the public. The removal of office supplies at ones place of employment for personal use is one such example. Another is the installation of a copyrighted program on multiple computers within a company. Technically, such an action is in violation of intellectual property and other copyright laws (Budd, 2005; Software Use, 1999). Despite this, ââ¬Å"the piracy of software is widespread, even in corporations that con sider themselves ethicalâ⬠(Anstead, 1999). Like the healthcare industry, the software community has plenty of legal backing when it comes to the proper use of its products. Unlike the healthcare community, however, many breaches to the legal guidelines take place and little is (or can be) done to prevent this. One reason for this is that such illegal conduct is difficult to detect and control, and such widespread software knowledge exists that hackers may be able to get around security measures, further complicating the matter. à à à à Copyright law enacted by the Federal government seeks to protect software creators as soon as the product has been developed. Title 17 of the United States Code concerns the Copyright Act, see 17 U.S.C.A. à § 102, and accords exclusively to the developers and owners of software the right to reproduce and disseminate the work in question. Anyone found to encroach upon the rights of the owner of the copyright is subject to penalties, and those who purchase a copy the software has license only to put the software on one computer and create a back-up copy for the purposes of archiving it. à à à à The discrepancy one finds between the sentiments of different persons concerning software piracy is akin to the delicate difference between what is legal and what is ethical. Many people are adamant in their belief that certain illegal uses of software are indeed ethical. Yet, the financial impact that such piracy has globally is significant. One study has shown that in 1998, approximately 38% of all software installed in businesses worldwide was pirated, and this amounted to a reduction in profits of approximately $11 billion (SILA, 1999). à à à à When one considers the management of a non-healthcare businesses, it becomes clear that rules governing ethical practices are less stringent than those within the healthcare industry. Ethics are not compulsory, though it usually benefits the company to demonstrate ethical practices. The relationship between law and ethics becomes evident here again, and such a relationship is of immense importance in the area of management. It is one of the duties of managers to assess both what is considered legal and what is considered ethical in the running of their businesses. It is the job of managers, therefore, to ascertain whether employees and the company as a whole abide by the legal statutes and societal standards concerning ethics. Also important here is the evaluation of what is considered acceptable and ethical behaviors by customersââ¬âas they also must be satisfied as much as managers and employees are with the ethics of the company (Budd, 2005). It is of course true that no policy developed to secure ethical standards will be satisfactory to all concerned. However, managers have the responsibility of establishing the most comprehensive code of ethics possible given the information currently available to him or her. The code will have the advantage of demonstrating to employees, customers, and society alike that the company is at least concerned with the ethical practices of those who do business in and with it. In this way, businesses outside the health industry do themselves a favor by demonstrating ethical practices above and beyond their legal obligations. However, within most non-healthcare sectors, such attention to ethics is not mandatory (Budd, 2005). à Pains have been taken to go through the above details for the purpose of making it possible for readers to appreciate what and how ethics apply in other aspects of life. However, this study will be limited to the healthcare and non healthcare industries, focusing on their ethical standards in securing information. ETHICS AND PRIVACY à Sometimes, people may act deliberately to defy the written and unwritten codes of ethics within their line of work in the organizations. This may be done through deviant means, such as sophisticated electronic devices that facilitate the bugging or taping conversations that were never meant to be recorded. It appears that such actions occur more in the business world than in the health world. It is not, for example, common to hear of health workers engaging in such extreme activities in order to gain access to information of a delicate and private nature. However, one does hear of other forms of ethical breaches in the health sector and the pharmaceutical industry. Some scientists may also attempt to misrepresent the results of clinical trials for similar reasons. Such actions are unethical as they may eventually prove harmful to the public at large (Bassett, et al., 1992; Girotra, Terwiesch & Ulrich, 2006). à à à à The issue of consent according to the Privacy Rule, states that workers and establishments in the healthcare sector, such as physicians, hospitals and clinics must receive consent from patients or other clients before compromising or turning over to a third party information concerning that personââ¬â¢s state of health. Such permission must be given in written form prior to the disclosure and before any form of treatment or other operation can be performed (Sage, 2000). Currently, it is the practice of healthcare providers to ââ¬Å"obtain a patientââ¬â¢s consent for disclosure of information to insurance companies or for other purposes (DHHS, 2001, p. 4).â⬠This is done for reasons having to do with ethics and professionalism. The Rule itself has as its foundation these said practices, and these rules are eventually expanded for the purpose of having a uniform system by which workers in the healthcare sector can systematically gain consent for the procedu res necessary to ensure the proper treatment of patients (DHHS, 2001; Hsinchun et al., 2005). GENERAL PROVISIONS à à à According to McNamarra (1999), the general provisions for ethical standards in the healthcare industry are as follows:à à It is necessary for patients to give consent prior to being treated by health care provider that offers direct treatment to that patient. Such a health care provider may utilize or share protected health information (PHI) only for purposes of TPO. Exceptions to this standard are given subsequently; When an emergency arises (such as in the event of life-threatening accidents or communication barriers), it is possible for health care workers to use and disclose information concerning a patient without first having obtained his/her consent. This is especially true in the health care sector, where laws require that workers treat patients that come into their care; Certain members of the healthcare community whose employees have very minimal contact with patients, such as persons who work in laboratories, may use or disclose information concerning those patients without first obtaining their consent. Other organizations within the health care sector, such as health insurance agencies and clearinghouses also have the privilege of using or divulging patientsââ¬â¢ information without gaining consent. These agencies do have the option of getting this consent if they wish to do soââ¬âbut it is left to their discretion; Health care providers have the right to refuse treatment to any patient who fails to grant permission for disclosing their protected health information. It is not necessary for such consent to be obtained by more than one provider at any given time; and There is no real need for the document that gives consent to be an in-depth one. Such permissions may be given in very general language. The language must, however, be plain enough to be easily understood. It must also contain all that is necessary to make it clear to the patient that any information that is provided might be shared and that he/she does have the right to refuse, impose restrictions, and to peruse the privacy statement of the organization. The consent may be a brief document in written from with general terms. Any such statement must then be signed and dated by either the patient himself or the patientââ¬â¢s proxy (McNamara, 1999). INDIVIDUAL RIGHTS à à à à à Individuals have the right to revoke statement of consent except when the health care provider has already acted in response to the consent. Restrictions may be imposed upon the permissions for disclosures and uses of protected information. The provider is not obligated to agree to these restrictions, but must abide by those to which it does agree (McNamara, 1999). à à à à Patients must be privy to the privacy codes of the entity to which he/she gives permission to use or disclose informationââ¬âand such access to the privacy code must occur before signing consent forms (Ibid). ADMINISTRATIVE ISSUES According to the Department of Health and Human Services (DHHS), any consent form that is signed by a patient must be kept by the health care provider (or other entity) for a period of six years following its last effective date. The forms may be retained in paper form, electronically, or otherwiseââ¬âthis is left to the discretion of the provider. à à à à Further provisions for privacy and consent have been issued, which stipulate that if a covered entity obtains consent and also receives an authorization to disclose PHI for TPO, the covered entity may disclose information only in accordance with the more restrictive document, unless the covered entity resolves the conflict with the individual. CONSENT VERSUS AUTHORIZATION ââ¬Å"Consentâ⬠is the name given to any document that accords to health care personnel the permission regarding the usage and disclosure of delicate information regarding a patient. This permission is granted solely to the particular health personnel (Sage, 2000). It is not necessary that the consent form be specific about the type of information that will be used included in the disclosure (Sage, 2000). It is generally only the ââ¬Å"direct treatment providerâ⬠that has the legal right to obtain consent from the patient, and such a person should be ââ¬Å"one that treats a patient directly, rather than based on the orders of another provider, and/or provides health care services or test results directly to patients. à à à à An authorization differs in that it offers requests for permissions to patients in a fashion more tailored to suit them and their health needs. This offers permissions to use specific portions of a patientââ¬â¢s PHI for detailed and specific purposes. Such purposes are usually for things that are unrelated to the TPO or for disclosure to be done with a specified third party. Authorizations expire, while consent forms are more open concerning the time-frame in which information might be used or disclosed. Further stipulations include the fact that ââ¬Å"covered entities may not condition treatment or coverage on the individual providing an authorizationâ⬠and that it ââ¬Å"states the purpose for which the information may be used or disclosedâ⬠(DHHS, 2001, p. 6). PRIVACY RULES IN THE HEALTH CARE SECTOR à à à à It is highly necessary to have a deeper understanding of what privacy rule entails as a basis for sustaining quality ethical standard especially for someone working in the healthcare sector. In the healthcare industry, privacy is a more delicate issue than other sectors and its workings are very intricate. The background information released from the Office for Civil Rights, (DHHS, 2001; OCR, n.d.) indicates the intricacy of the Privacy Rule, which became effective on April 14, 2001. The Privacy Rule, according to the Department of Health and Human Services, ââ¬Å"provides the first comprehensive federal protection for the privacy of health informationâ⬠(DHHS, 2001, p. 1). à à à à à The different departments within the health care sector have all joined in support of the aims advocated by this rule to protect the privacy of the patient. However, these departments also understand how necessary it is that privacy not interferes with the treatment of patients (DHHS, 2001; OCR, n.d.). The delicacy of the privacy problem becomes even more apparent for other reasons. Though privacy consents and authorizations are generally granted to primary care providers, health care clearing houses and health insurers, it is usually the case that such entities require the aid of yet other entities (such as contractors) in order to provide the best care possible to the patient. To make allowance for the possibility of divulging PHI to such associates, conditions and stipulations are included in the privacy rule for ensuring that the provider obtain satisfactory assurances that the business associate will use the information only for the purposes for which they were engaged by the covered entity, will safeguard the information from misuse, and will help the covered entity comply with the covered entityââ¬â¢s duties to provide individuals with access to health information about them and a history of certain disclosures. Therefore, personal health information can only be shared with contractors and associates when such information is necessary for the providers to do their jobs accurately and thoroughly. To facilitate the usefulness of this regulation to the health care officer as well as the individual in securing information in compliance to the ethical requirements, most health care providers must know that they are covered by the new rule and therefore must comply with the new requirements. Analysts have wondered whether these requirements for consent have not presented barriers to the proper treatment of patients, as this often necessitates open consultation with other specialists and health care providers. However, the stipulations of the consent requirements should not hinder such comprehensive treatment, as those providers who had at one time treated the patient would have also been required to obtain such consent. Furthermore, since necessary consultations with other health personnel are considered part of the ââ¬Å"treatment of an individual, it is considered within consensual boundaries to engage in such consultation. Such actions are therefore considered ethical. à à à à The ethical practices in the commercial, technological and other industrial sectors are governed by corporate regulations and social responsibilities. The issues of these sectors differ from those of the health care sector, which deals with the more serious issues of providing medication for human and veterinary sciences, and as such, requires more serious and stringent ethical standard compliance (Hsinchun et al., 2005). PRIVACY IN THE CONTEXT OF E-COMMERCE à à à à The ethical difficulties associated with e-commerce revolve around privacy and identity, both with reference to the human subject involved in the transaction and transaction non refutability (Baum 1998, p.65; Suprina 1997, pp.8ââ¬â12; Joyanes, 1997, pp.277ââ¬â281). à à à à The online e-store Amazon (Linden, G., Smith, B. & York, J. as cited in Teemu Mutanen) uses consumer data on cross-selling growth and theà information about buying patterns is transformed into recommendations. Chris Anderson as cited in Teemu Mutanen argues that this combination of good-quality recommendations with huge inventory of items is a real business advantage. The advantage is gained only if the customer can be targeted with relevant recommendations, the variety of items is not sufficient. Hence E-commerce organizations tend to use the consumer data they have collected from their visitors through online transactions. à à à à However, the online consumers expect ethics from the e-commerce traders in protecting the privacy of their details.à They want the e-commerce sites to have and to display a highly visible privacy policy, which can be easily understood. They want a prominent page where corrections of past mistakes are available. Berman & Mulligan highlights that an internet-user possesses three expectations when online: (1) an expectation of anonymity, (2) an expectation of fairness and control over personal information, and (3) an expectation confidentiality (Berman & Mulligan 1999).All three expectations are eliminated through three critical cyberspace practices that are (Gindin, 1997): 1) personal information provided on the Internet, (2) online transactions, and (3) government record keeping. Although each practice provides only a minute description of an individualââ¬â¢s personal life, the slow accumulation of such descriptive material may eventually expose a detailed profi le (Mason 1986). à à à à The consumersââ¬â¢ experiences on the Net concerning their privacy lists several themes. Beth Givens in his presentation, ââ¬ËPrivacy Expectations in a High Tech Worldââ¬â¢ outlined the following themes on consumer experiences regarding privacy concerns: The first theme is the invisibility of data capture. à à à à A second theme is the potential ubiquitousness of data gathering, and the ability of data from several sources to be merged to create massive electronic dossiers on individuals. A third theme is invasion. Web sites can capture and track visitorsââ¬â¢ clickstream data by placing small text files called ââ¬Å"cookiesâ⬠onto their hard drives. Unless users are savvy enough to set their browsers to notify them about the pending placement of a cookie, it is done without the userââ¬â¢s consent, and itââ¬â¢s an invisible process. A fourth theme is the fear of harm befalling Internet users ââ¬â fear, and a fifth theme is confusion over their privacy rights. à à à à The problem of privacy in e-commerce is concerned with the difficulty of securely conveying the information required for online transactions (Suprina, 1997 as cited in A.J.G. Sison). à à à à Information technology and computer professionals began seriously considering the long-term effects of computer ethics in the late 1980s and early 1990s. They recognized the need to organize professionally through such bodies as the Association for Computing Machinery and the Institute of Electrical and Electronics Engineers to devise professional codes of conduct. However, the increasing proliferation of powerful computers in the hands of nonprofessionals widens the scope of potential problems. PRIVACY AND ETHICAL INFORMATION AMBIGUITY Ethical ideologists have confusing opinions most of the time, and such problems can actually undermine ethical practices (Budd, 2005). In one profession, an action which is not ethically sound may not even be considered an offense in law. In many cases, there is no clear demarcation as to what is ethically wrong and what is legally offensive. à à à à These are some problems encountered by those who practice in the healthcare field, and there exists by no means a consensus on what should be done in such cases (AMA, 1994). For example, economic ethical theorists believe it is the right of every citizen of a country to access health and medical opportunities, irrespective of his financial status (Budd, 2005).à DISCLOSURE LAW IN HEALTH CARE à à à à It must be agreed that the health sector is one of the most delicate and even complicated sectors of the national economy, and that it requires handling with utmost care. It is intimately concerned with handling the most delicate areas of personal information, as it is involved in the documentation of health records, and the treatment and handling of all ailments suffered by persons within society. So, the management of healthcare data requires competence and very high standard of ethics (Agelus, 2004). So here what must also inevitably be considered is the question of drafting laws and regulations to govern how this information can be secured in the best interest of the stakeholders (Morejon, 2006). Of importance is the question of what the ethical rules are, that govern security of these data and information. Also of importance is the protection of the rights of all concerned, and this is what shall be explored here. Sage (2000) has identified the fact of the extreme popularity of laws that require physicians, hospitals, and other health care organizations to give extensive disclosure privileges to patients and customers.à He continues: ââ¬Å"The main issue that is currently being faced in the health care sector with the laws concerning disclosure is that they are unfocussedâ⬠. In the words of Sage (2000), they are ââ¬Å"scattershot, reflecting short-term political compromises or the equities of individual lawsuits rather than a coherent understanding of the purposes served by mandatory disclosure and the conditions necessary to achieve desired effects.â⬠So it is obvious that managing and securing business information is becoming a serious issue from the standpoint of ethics and law. In spite of this fact, persons who advocate disclosure are usually quick to point toward such laws issued concerning federal securities as models for healthcare disclosure laws. However, Sage goes on to point out that ââ¬Å"well-designed information requirements can serve therapeutic goals regarding openness, trust, and participation and can remind physicians and other health professionals of the tensions between their daily practice environment and their overarching ethical obligationsâ⬠(Sage, 1999). à à à à à Therefore, in order to design fitting ethical standards and regulations, the particular idiosyncrasies of the health care industry must be taken into consideration. This will necessitate the prioritizing of such issues as education of the public and overall improvement of performance in as far as social issues may have a bearing on decisions made in health care. Furthermore, financial considerations should not have too great a bearing on the privacy and self-d etermination rights of citizens (Hsinchun et al., 2005). These are some of the basic issues that must be kept in mind in understanding the important role the health care sector is playing in securing and managing information. à à à à Certain practices that may be acceptable in a health care setting are included below under the condition that measures are taken to keepà minimum disclosures and other ways of exposing delicate information (Sage, 2000): à Health care personnel are at liberty to coordinate actions orally for the service of patients when located at nursing stations within a hospital; à Doctors, nurses, and others responsible for patients are allowed to converse about the condition of a patient currently under their care, whether on the phone, in the presence of the patient, with a provider, or with another (authorized) family member; à Doctors and nurses are allowed to converse concerning test results from aà laboratory. They may do so with the patient or just amongst themselves in an area for joint treatment; and à Health care personnel are also allowed to discuss the condition of a patient when involved in rounds dedicated to training when in an institution that facilitates the training of health care workers (Sage, 2000). à à à à Also necessary are ethical measures that govern the language that might be used during the care of a patient. When talking in elevated tones becomes necessary in a less-than-private location, the language used should be carefully tailored and then reinforced as the proper method of oral communication among colleagues.à In the same way, businessmen who may be discussing classified information may not be aware of the ability of a person in another room to hear the details of their private conversation. Nothing forces this hearer to block his ears or otherwise ignore the delicate information being transmitted to him, and as a result he becomes privy to privileged information (Budd, 2005; Sage, 2000). à à à à Self-protection mechanism can be described with the online users when they decide on the choices provided for them without any assistance.à When individuals chooses not reply to ââ¬Å"Spamâ⬠e-mail even to request removal from a mailing list since replies indicate to a company that individualââ¬â¢s e-mail account is active and marketable (Navrette, 1998). Such measures protect privacy information by providing steps that may prevent the transmission of personal information to business and criminals. In this protective mechanism, individuals remain in control of their own personal information without the assistance of other groups. ROLE OF HEALTH CARE ADMINISTRATOR à à à à Health care industry is also a business industry including management and administrative responsibilities. The managers of the health care industry are called as health care administrators who take responsibilities for planning, direction, coordination, and supervision and the delivery of health care. Unlike the administrators in other industries, health care managers include specialists and generalists. Generalists manage or help manage an entire facility or system, while specialists are in charge of specific clinical departments or services. à à à à Due to the rapid changing in the structure, technology adaptations, evolving integrated health care delivery systems, an increasingly complex regulatory environment, restructuring of work, and an increased focus on preventive care, the role of the health care administrator is also changing and modifying according to the situation. They are responsible to improve efficiency in health care facilities and the quality of the health care provided. à à à à The health care administrators are responsible for the maintenance of patient records, health plans etc., along with the regular Information System managers. In order to maintain authentication and privacy of such key records, the Healthcare administrators should be flexible with the technology, requirements and the developments in and around the industry. The accurate and continuous maintenance of patient record database lies in the hands of the health care administrator and he should maintain the patient record database accurately and completely. à In addition, à as the health care data is also being shared with others for the purpose of research and compliance practices, the expertise and skill levels of health care administrators have become more crucial in maintaining privacy and ethical practices of the industry. à à à à In this context the health care administrators are often called on to maintain and develop professional standards, procedures, and policies for their institutional activities. The expanding role of the health care administrator includes management of preventive medicine and health care programs, medical and vocational rehabilitation, community health and welfare etc. which needs good leadership and managerial skills along with sound knowledge of policy and protection regulations. CONCLUSION à à à à à The review of the literature is also the main research method in this study. As such, it was found in the review that ethical standards in acquiring business information in the healthcare industries are much more rigid and organized compared to the ethical standards in the non-health care industries. Thus, the reviewà affirms the temporarily the hypothesis of this study. Thus, the next chapter would further discuss and analyze the ethical standards of both industries so as to make a conclusive finding regarding the hypothesis of this study.
Tuesday, October 22, 2019
Insects That Defend Themselves by Playing Dead
Insects That Defend Themselves by Playing Dead Insects use many defensive strategies to protect themselves from predators, from chemical sprays to bites or stings. Some insects take a more passive approach to self-defense, though, by simply playing dead. Thanatosis Predators quickly lose interest in dead prey, so insects that employ the strategy of playing dead (called thanatosis) can often escape unharmed. The act of feigning death often looks like a demonstration of stop, drop, and roll, as threatened insects let go of whatever substrate they happen to be clinging to and drop to the ground. They then stay still, waiting for the predator to give up and leave. Insects that evade predation by playing dead include certain caterpillars, ladybugs and many other beetles, weevils, robber flies, and even giant water bugs. Beetles of the genus Cryptoglossa are known by the common name death-feigning beetles. When trying to collect insects that play dead, its often easiest to place a collecting jar or beating sheet beneath the branch or substrate where youve found the insects.
Monday, October 21, 2019
Free Essays on Swot Analysis Of Motorola
Since it first entered the competitive electronic firm market, Motorola has continued to remain successful as a world leader in mobile communication technology, ranking as the leading manufacturer of cellular telephones, paging devices, automotive semi-conductors, and microchips that are used to operate devices other than computers. Although it has lost a few battles, Motorola has taken on the Japanese head to head, through these times of Japanese competition. In the 1980ââ¬â¢s Motorola controlled the emerging U.S, Market for cellular phones and pagers but they werenââ¬â¢t aggressively focused on competing with the Japanese, even though Japanese firms began to flood the U.S. market with low-priced, high-quality telephones and pagers, leaving Motorola pushed into the background. This is when Motorola ââ¬Å"heard the call to battle.â⬠Managers at first were not sure how they should respond, so they originally decided to abandon some business areas and even considered merging their own semiconductor operations with those of Toshiba. After a lot of searching they decided to fight back and regain the firmââ¬â¢s lost market position. This fight involved two main strategies: First learn from the Japanese, and then compete with them. To carry out these strategies, Motorola executives decided to set a numb er of broad based goals that essentially committed the firm to lowering costs, improving quality, and regaining lost market share. Managers were then sent out on missions, mainly focused on Japan, to learn how to compete better. Some managers even observed Motorolaââ¬â¢s own Japanese operations to learn and to understand how it fully functioned; while others focused more on how other successful Japanese firms operated. At the same time, the firm also drastically boosted its budget, R&D, and employee training worldwide. One important thing that executives learned from their trip to Japan after viewing a flag flying outside one of its plants was that... Free Essays on Swot Analysis Of Motorola Free Essays on Swot Analysis Of Motorola Since it first entered the competitive electronic firm market, Motorola has continued to remain successful as a world leader in mobile communication technology, ranking as the leading manufacturer of cellular telephones, paging devices, automotive semi-conductors, and microchips that are used to operate devices other than computers. Although it has lost a few battles, Motorola has taken on the Japanese head to head, through these times of Japanese competition. In the 1980ââ¬â¢s Motorola controlled the emerging U.S, Market for cellular phones and pagers but they werenââ¬â¢t aggressively focused on competing with the Japanese, even though Japanese firms began to flood the U.S. market with low-priced, high-quality telephones and pagers, leaving Motorola pushed into the background. This is when Motorola ââ¬Å"heard the call to battle.â⬠Managers at first were not sure how they should respond, so they originally decided to abandon some business areas and even considered merging their own semiconductor operations with those of Toshiba. After a lot of searching they decided to fight back and regain the firmââ¬â¢s lost market position. This fight involved two main strategies: First learn from the Japanese, and then compete with them. To carry out these strategies, Motorola executives decided to set a numb er of broad based goals that essentially committed the firm to lowering costs, improving quality, and regaining lost market share. Managers were then sent out on missions, mainly focused on Japan, to learn how to compete better. Some managers even observed Motorolaââ¬â¢s own Japanese operations to learn and to understand how it fully functioned; while others focused more on how other successful Japanese firms operated. At the same time, the firm also drastically boosted its budget, R&D, and employee training worldwide. One important thing that executives learned from their trip to Japan after viewing a flag flying outside one of its plants was that...
Saturday, October 19, 2019
Airline Customer Relationship Management Tool
Existing System b. proposed System 3. Feasibility Report a. Technical Feasibility b. Operational Feasibility c. Economical Feasibility 4. System Requirement Specification Document a. Overview b. Modules Description c. Process Flow d. SDLC Methodology e. Software Requirements f. Hardware Requirements 5. System Design a. DFD b. E-R diagram c. UML d. Data Dictionary 6. Technology Description 7. Coding 8. Testing Debugging Techniques 9. Output Screens 10. Reports 11. Future Enhancements 2. Conclusion 13. Bibliography * INTRODUCTION The Main Objective of this System is to design a system to accommodate the needs of customers. This application helps a customer to know about the flightââ¬â¢s information and can reserve seats throughout the globe irrespective of the location. This is a computerized system to make seats reservations, keep ticket bookings and availability details up-to-date. This web based system provides all flightââ¬â¢s information, availability of flights, availabili ty of seats. It contains information about pilots, air hostess and airport information. It also provides time schedules for different flights and source, destination details. It provides cost of tickets and enquiry details. Features of the project Reduces the complexity present in the manual system and saves time. 1. Users can access the required data easily. 2. It maintains accurate information. 3. Provides instantaneous updated information to all users. 4. Communication is fast and clear and avoids misunderstandings. It is a computerized system to make room reservations and keep room bookings and availability of details up-to-date System Analysis Purpose of the System This web based system provides all flightââ¬â¢s information, availability of flights, availability of seats. It contains information about pilots, air hostess and airport information. It also provides time schedules for different flights and source, destination details. It provides cost of tickets and enquiry details. Existing System * This system doesnââ¬â¢t provide register the multiple Flights * This system doesnââ¬â¢t provide online help to the public Proposed System The development of this new system contains the following activities, which try to develop on-line application by keeping the entire process in the view of database integration approach. * This system provide online help to the public * This system provide agents registration and book the bulk tickets * This system provide late running flights information before 3 hours * Online status of the tickets must be provided in real time Feasibility Study TECHNICAL FEASIBILITY Evaluating the technical feasibility is the trickiest part of a feasibility study. This is because, at this point in time, not too many detailed design of the system, making it difficult to access issues like performance, costs on (on account of the kind of technology to be deployed) etc. A number of issues have to be considered while doing a technical analysis. i) Understand the different technologies involved in the proposed system Before commencing the project, we have to be very clear about what are the technologies that are to be required for the development of the new system. i) Find out whether the organization currently possesses the required technologies * Is the required technology available with the organization? * If so is the capacity sufficient? For instance ââ¬â ââ¬Å"Will the current printer be able to handle the new reports and forms required for the new system? â⬠OPERATIONAL FEASIBILITY Proposed projects are beneficial only if they can be turned into information systems that will meet the organizations operating requirements. Simply sta ted, this test of feasibility asks if the system will work when it is developed and installed. Are there major barriers to Implementation? Here are questions that will help test the operational feasibility of a project: * Is there sufficient support for the project from management from users? If the current system is well liked and used to the extent that persons will not be able to see reasons for change, there may be resistance. * Are the current business methods acceptable to the user? If they are not, Users may welcome a change that will bring about a more operational and useful systems. * Have the user been involved in the planning and development of the project? Early involvement reduces the chances of resistance to the system and in * General and increases the likelihood of successful project. Since the proposed system was to help reduce the hardships encountered. In the existing manual system, the new system was considered to be operational feasible. ECONOMICAL FEASIBILITY Economic feasibility attempts 2 weigh the costs of developing and implementing a new system, agai nst the benefits that would accrue from having the new system in place. This feasibility study gives the top management the economic justification for the new system. A simple economic analysis which gives the actual comparison of costs and benefits are much more meaningful in this case. In addition, this proves to be a useful point of reference to compare actual costs as the project progresses. There could be various types of intangible benefits on account of automation. These could include increased customer satisfaction, improvement in product quality better decision making timeliness of information, expediting activities, improved accuracy of operations, better documentation and record keeping, faster retrieval of information, better employee morale. System Requirement Specification Modules Description No of Modules The system after careful analysis has been identified to be presented with the following modules: The Modules involved are 1. Admin 2. Flight 3. Reservation SDLC METHDOLOGIES This document play a vital role in the development of life cycle (SDLC) as it describes the complete requirement of the system. It means for use by developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in his 1988 article, ââ¬Å"A spiral Model of Software Development and Enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: * The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system. * A preliminary design is created for the new system. * A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product. A second prototype is evolved by a fourfold procedure: 1. Evaluating the first prototype in terms of its strengths, weakness, and risks. 2. Defining the requirements of the second prototype. 3. Planning an designing the second prototype. 4. Constructing and testing the second prototype. * At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involved development cost overruns, operating-cost miscalculation, or an y other factor that could, in the customerââ¬â¢s judgment, result in a less-than-satisfactory final product. * The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. * The preceding steps are iterated until the customer is satisfied that the refined prototype represents the final product desired. * The final system is constructed, based on the refined prototype. * The final system is thoroughly evaluated and tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. The following diagram shows how a spiral model acts like: Fig 1. 0-Spiral Model ADVANTAGES * Estimates(i. e. budget, schedule etc . ) become more relistic as work progresses, because important issues discoved earlier. * It is more able to cope with the changes that are software development generally entails. * Software engineers can get their hands in and start woring on the core of a project earlier. SOFTWARE REQUIREMENT AND HARDWARE REQUIREMENT Software Requirements Operating System:Windows XP Professional or Above. Languages:C#. NET, ASP. NET Data Base:SQL Server. Web Server: IIS 5. 0 OR Above. Hardware Requirements Processor:Pentium IV Hard Disk:40GB RAM:512MB or more
Friday, October 18, 2019
Business Etiquette and Elevator Pitch Activities Essay
Business Etiquette and Elevator Pitch Activities - Essay Example However, if the elevator pitch is a failure, the conversation will die just as the elevator ride stops. Successful business people are always prepared with their elevator pitch speech because they know that one missed shot will cost them quite a lot. (Mike Gunderloy, 2004). In the chosen airline industry, the concept of elevator pitch is very important. All employees of an airline serves as the companyââ¬â¢s ambassadors because whatever they will communicate through their actions and words would actually help people create a positive or negative image of the airline in their minds (Chris Westfall, 2012). If a flight attendant does not treat a customer in a friendly and polite manner, it is likely that he will never travel with the same airline ever in his life and might also used the ââ¬Ëword of mouthââ¬â¢ to discourage others. A flight attendant must always be prepared for an elevator pitch speech because every day or so he is interacting with people who are really interested in knowing about their experience, skills and association with the airline company. If a flight attendant is unable to communicate the elevator pitch speech to the other person, it is likely that his skills will be doubted because a flight attendant is assumed to be very confident, quick and rational. The elevator pitch speech of a flight attendant has to be very interesting, catchy and memorable. He first needs to identify his goal so that he knows where he is directing all his efforts. A very important step in the creation of an effective pitch is that you need to be aware of what you do, what kind of soft skills you possess and what you have learned from all the years you have served in the airline as a flight attendant. Once this step is accomplished, you need to select exactly what part of the identified information could be shared. This will help you define yourself in a
Subscribe to:
Posts (Atom)