Wednesday, May 6, 2020
Practice In The Business In Stock Market â⬠Myassignmenthelp.Com
Question: Discuss About The Practice In The Business In Stock Market? Answer: Introduction The purpose of this report is to shed light on the activities like inside treading and various types of techniques for gathering non-public information of various organizations. Using the information some officials take advantage and make huge profits by investing in the stocks of those organizations (Nunan and Yenicioglu 2013). It is seen that some organizations has earned up to 100,000 million dollars overnight by investing money based on the non-public information they have gathered. These practices need to be stopped immediately and the governmental authority needs to amend some rules and regulations to prevent these types of activities. The report further highlights the factors like how people gather this non-public information, what is insider trading and whether punishment of several individuals would stop this type of malpractices or not. Information gathering techniques Gathering information and various techniques related to gathering information is a common practice in Wall Street. Business personnel at Wall Street are actually in business with intent to make money (Allan et al. 2012). The investors can fetch non-public information from the chief financial officers of various organizations and that would be something illegal. Else, the investor can develop his own prediction by piecing together small parts of information from the suppliers of the organization and from the former workers of the companies and from various other sources. It is seen that the prosecution of Rajaratnam and some others gave a pause to the hedge funds regarding their techniques to gather information. It can be said that insider trading is illegal, but in some cases, business personnel gets greedy and they does take steps due to their egoism (Jayaraman 2012). In some cases, these people lose control on their thinking capability and cannot decide what is right and what is wr ong. The egoists think that they should take decisions that would maximize their interests and undoubtedly, the insider trading and other organized crime would continue to grow and people would think and invent more clever paths to get away with those criminal acts (Allan et al. 2012). To stop and reduce this kind of practices, the government needs to implement strict asking the organizations to have robust compliance, supervisory, surveillance and control measures in place to identify illegal insider trading. Insider trading Insider trading can be referred to as a trading of public organizations stock or other bonds by people those have access to non-public information about those organizations. In many nations around the world, kinds of trading based on insider information is illegal and punishable offence, as they see it as an unfair act towards other individuals or investors who does not have those kinds of information (Beneish, Press and Vargus 2012). On the other hand, the investor, who has the insider information, can potentially make huge profits using that information. It is a matter of fact that, insider trading increases the cost of capital for the issuers of securities, and that decreases the economic growth (Allan et al. 2012). It is seen that, some economists want that insider marketing should be legalized for the benefits of the society. It is a matter of fact that, trading by some insiders, or employees is widely accepted as long as does not rely on the material information not in the publ ic domain. Various jurisdictions require that such trading should be reported for the monitoring of the transactions. In the land of United States and in many other nations trading conducted by corporate organizations, key employees or stockholders must be reported to the regulator or should be publicly disclosed within some days interval. In this type of cases, it is generally seen that, the insiders need to file Form 4 under United States Security and Exchange Commission while purchasing or selling stocks of their own organizations. The rules and regulations governing insider trading are complicated and significantly vary from country to country. Under one jurisdiction the definition of insider trading might be broad and may not cover not only the insiders but also any individuals related to those insiders, for an example the brokers, various associates and in some cases even family members. An individual who gathers the non-public information and trades based on that information might get charged as guilty (Augustin, Brenner and Subrahmanyam 2015). In United States of America and some other nations amended rules stating the insider traders criminals. In United States, Sections 16B and 10B of the Securities Exchange Act of 1934 is directly related to insider training. The congress of United States enacted this law after the crash of stock market in the year of 1929. In United States, for optional reporting purposes the corporate insiders are mostly defined as the companys officers, beneficial owners and directors in more than 10% of a class of the organizations equity securities. The trades made by these types of insiders within the organizations own stock, based on the non-public information, in most cases considered as fraudulent, as the insiders are violating the judiciary duty that they owe to the stockholders (Allan et al. 2012). The corporate insider, by accepting employment has to undertake a legal obligation to the stockholders to put the shareholders interests before their own, in some cases related to the corporation. Whenever the insiders buy and sell based on the organizations owned information, then they are violating the obligations they have towards the stockholders. For n example, it can be said that, illegal insider trading can occur if the chief executive officer of a company learns that the organization would be taken over and then buys shares of that organization, knowing that the prices of those shares would rise (Frey, Stemle and Glaznieks 2014). In America, insiders are not only limited to corporate officials and major stockholders, where the illegal insider trading is concerned but can involve any person who trades stocks based on material non-public information violating duty of trust. For an example, it can be said that in various jurisdiction, where a corporate insider give tips to a friend about non-public information, are most likely to have an effect on the share price of the organization. The duty that the corporate insiders owe towards the organizations is now imputed to the friend, and the friend violates a duty to the organization if he trades based on the information he got. In United States, not all the trading based on non-public information can be said is illegal insider trading. As if a person in a public place overhears a conversation of a CEO of a company about their recent profits, and the person invests money in the shares of that organization, it would not be counted as an illegal act (Dierkes et al. 2013). It is a matter of fact that punishment for insider training is dependent on various factors. There are three main factors and those are, scope, evidence and gain. How many persons the wrongdoing is affecting is the scope. How much profit did the insider make by the transaction can be said as a gain (Frey, Stemle and Glaznieks 2014). Finally, anyone who is charged of insider trading is innocent until the individual is proven guilty. In United States of America, in addition to the civil penalties, the inside trader might also be a subject to criminal prosecution for fraudulent activities where the SEC regulations are violated, the US Department of Justice might call to conduct an independent investigation in parallel. Then if the department of justice finds something to be concerned of, they might file criminal charges. United States insider trading prohibitions are generally based on English and American common law prohibitions against fraudulent activities. On the year of 1909, before the passing of Securities Exchange Act, United States supreme court stated that a corporate leader who bought any organizations shares knowing that the prices would increase can be accounted as fraudulent act as he did not disclose his inside information (Dierkes et al. 2013). The section 15 of the Securities Act of 1933 contains prohibitions of fraud in the sale of securities, which were strengthened by Securities Exchange Act 1934. Again section 16B of the Securities Exchange Act of 1934 forbids short swing profits made by the directors of corporate of organizations, officers or any stockholders who owns more than 10% of the shares of an organization (Frey, Stemle and Glaznieks 2014). Thus, it can be said that insider trading is in general illegal but in some cases it can be seen as legal dealings, although in most cases it is seen that various types of illegal activities are done under the light of insider trading. Conviction of Rajaratnam deter other investors to gather non-public information From profound and decisive analysis of the case study, it can be stated that the investigation and conviction of Rajaratnam would not deter the fund managers from sharing non -public information. The strong reason that can be cited in this regard is that there have been multiple numbers of trade frauds within the organizations that were not disclosed properly due to lack of proper investigation. However, there has been proper understanding of the cases where the trade frauds were addressed with proper business license. In fact, the number of insider trade fraud has been rising in a rapid pace thus creating a hole within the conviction process where the organizations are observed to have been losing the criteria of being trusted in the international market. Moreover, there has been a continuous threat for the organizations where they were highly threatened by continuous fraudulent activities in front of the vigilance. As a matter of fact, this has been taken into consideration that in most of the cases the basic idea remained persistent in terms of addressing to the frauds with proper measure. Else, the investor can develop his own prediction by piecing together small parts of information from the suppliers of the organization and from the former workers of the companies and from various other sources. It is seen that the prosecution of Rajaratnam and some others gave a pause to the hedge funds regarding their techniques to gather information. It can be said that insider trading is illegal, but in some cases, business personnel gets greedy and they does take steps due to their egoism (Jayaraman 2012). In some cases, these people lose control on their thinking capability and cannot decide what is right and what is wrong As a corrective measure, the insiders who are associated with accounting process would try to investigate- within the organization; and shortlist the other frauds- major or minor who have been turbulent in the money laundering process. Since there has been a proper understanding of the process pertaining to the effective understanding that was highly in the formation of the case would focus on the basic understanding of the huge concept within the society and the business market. In this case, the further investigation process would be focusing on the actuality or genuineness of workers who are closely associated with the accounts department. Two possible chances would create many opportunities for the fund managers to look into the matter. First, the managers would create a trusted circle of the employees. As a matter of fact, this would focus on the clear understanding of the process pertaining to the effective consideration of the trusted circle. With the effective measure this wo uld focus on the actuality of how the trusted circle is addressed during post-trauma period. Undoubted more stringent vigilance would be placed upon the entire case pertaining to the effective measures to restrict further fraudulent activities. Since this has been taken in to certain consideration that more stringent action is needed for the vigilance of the accounts and the fund, the fund managers, according to my own view, would look forward to recruiting fresh candidates. In order to influence upon the structure of infraction policies of the organization the managers would focus on various angles. The multidimensional approach to find out the basic understanding of the cases would be taken into certain consideration. Infringement of law or the organizational agreement would purpose to the service of transparent activity of the national law. The organizational policy would definitely focus on the adherence to the national law without a single diversion. In this case, it can be tak en into certain consideration pertaining to the effective understanding of the policies pertaining to the effective chance where in most of the cases, the law would be focused through the eyes of organizational transparency. I do not think that it would not have the possibility to deter any sort of infraction from being taken place. Since this would focus on the actual understanding of the process pertaining to the effective chance where the law and the organizational policies would create a stronger base for restricting and challenging further fraudulent activities in relation with money, behaviour or other ethical activities, the fund managers would incur more stringent policies, in association with, the newly formed body. In this case, this would undoubtedly provide the organization with a clear scope to fight the frauds who still exist without being recognized. Provision of corporate insider training would focus on the effective understanding of the organizational policies where this would be focusing on the actuality of the forces within the frame that is constructed in adherence to US organizational law framework. However, the nature in the form of infraction would be addressed since there is a sheer need to maintain a close observation and attention of the surroundings. As a matter of fact, this would be targeting the basic understanding of the policies with the effective nature where this would somehow address the greater number of the law firms. Conclusion: From the discussion cited above it can be stated that the organizational law is always structured with the basic understanding of the policies in adherence to the national framework. In this context, it has been taken into certain consideration pertaining to the effective nature of the cases where the law is highly addressed by the stringent policies. With the effective nature of the law, there has been a thorough understanding pertaining to the effective nature of the organization pertaining to the methods to fight the frauds. References Agrawal, A. and Cooper, T., 2015. Insider trading before accounting scandals.Journal of Corporate Finance,34, pp.169-190. Allan, J., Croft, B., Moffat, A. and Sanderson, M., 2012, May. Frontiers, challenges, and opportunities for information retrieval: Report from SWIRL 2012 the second strategic workshop on information retrieval in Lorne. InACM SIGIR Forum(Vol. 46, No. 1, pp. 2-32). ACM. Augustin, P., Brenner, M. and Subrahmanyam, M.G., 2015. Informed options trading prior to MA announcements: Insider trading?. Beneish, M.D., Press, E. and Vargus, M.E., 2012. Insider trading and earnings management in distressed firms.Contemporary Accounting Research,29(1), pp.191-220. Beneish, M.D., Press, E. and Vargus, M.E., 2012. Insider trading and earnings management in distressed firms.Contemporary Accounting Research,29(1), pp.191-220. Dierkes, M., Erner, C., Langer, T. and Norden, L., 2013. Business credit information sharing and default risk of private firms.Journal of Banking Finance,37(8), pp.2867-2878. Frey, J.C., Stemle, E.W. and Glaznieks, A., 2014. Collecting language data of non-public social media profiles. InWorkshop Proceedings of the 12th Edition of the KONVENS Conference(pp. 11-15). Jayaraman, S., 2012. The effect of enforcement on timely loss recognition: Evidence from insider trading laws.Journal of Accounting and Economics,53(1), pp.77-97. Kim, S.H., 2012. The Last Temptation of Congress: Legislator Insider Trading and the Fiduciary Norm Against Corruption.Cornell L. Rev.,98, p.845. Nunan, D. and Yenicioglu, B., 2013. Informed, uninformed and participative consent in social media research.International Journal of Market Research,55(6), pp.791-808.
Tuesday, May 5, 2020
Network Needs For Data Communication Samples â⬠MyAssignmenthelp.com
Question: Discuss about the Network Needs For Data Communication. Answer: Importance of Physical layer: The physical layer refers to the first layer of the Open System Interconnection Modelor the OSI model. The bit-level transmission is managed in this layer. Transmission between physical devices is controlled by this layer. The mechanical or electrical interface that is needed for the communication between the communicating devices is also provided by this layer (Chen et al. 2015). The layer is responsible for dealing with the various physical connections that the network needs for data communication. It includes the wireless transmission, cabling standards, various types of connectors, interface cards and many more as needed by the network (Goseling, Gastpar and Weber 2015). Error free communication: The data that hardware devices generate are optimized by the layer to make it suitable for digital communication. Without the optimization the data will communication may not be effective due to discrete timing over the network. This optimization of data timing to make it suitable for the transmissions makes the communication error free. The optimization is done using the line coding technique (Zou et al. 2015). The layer also allows for interleaving of bits which helps to improve the error correction. Robust communication: The layer helps to detect the carrier collision. It can sense if there are sufficient carrier is available for data communications and this helps to avoid carrier congestion created due to the data packets undelivered for unavailability of data carriers and thus ensures robust communication (Kapetanovic, Zheng and Rusek 2015). Reliable communication: The layer with the help of Signal equalization and multiplexing technique helps in ensuring reliable communication (Mukherjee et al. 2014). Importance of Data-Link layer: The data link layer is the second layer in the seven layer OSI model. It helps to connect two nodes that are involved in the data communication. The connection is made using the logical link. The link that is established between the nodes is also terminated by the layer once the communication is completed (Marquardt 2017). Ease of communication: The layer provides end-to-end message delivery with proper acknowledgement of message delivery, thus ensures ease of communication (Cui , Yu and Yan 2016). Error free communication: In order to ensure error free transmission the layer control the traffic generated by the data frame. It communicate with the transmission node for telling it to back -off when there is no availability of buffer message (Kizza 2017). Robust communication: The layer helps in detecting the any errors occurred in the physical layers and based on that the errors are acknowledged and again retransmitted by rectifying the errors and making necessary correction. Thus ensures error free and robust communication (Ding and Jiang 2016). Importance for lower layers: The data link layer helps in error-free data transmission between the nodes with proper control over the physical layer that resides bellow the data link layer in the OSI model. The error free transmission helps layers above it in assuming transmission which is virtually error free (Zafar and Ejaz 2016). Importance of internet layers: The internet layer lies above the physical and data link layer. The layer plays an important role in data communication and also helps in managing the layers below it (Blekneni et al. 2016). Error free communication: The layer helps in controlling the subnet traffic. Whenever the any router in this layer exceeds the buffer limit the layer sends an instruction to the transmission station to hold on the transmission to avoid error in data communication (Qadir et al. 2015). Robust communication: The layer allows for frame fragmentation that helps in determining the maximum transmission unitor the MTU for the router that is used for the downstream communication. It checks if the data fragment size is less or greater than the transmission unit size. In case the fragment size is greater than the transmission unit size, then fragmentation is done on the data frame and at the time of receiving the data at the destination site the data is again reassembled to keep the data integrity and robustness of the system (Kalakech 2016). Importance for lower layers: The network layer control how the subnet will operate. It decides the allocation of the physical path for the data communication to take place to facilitate the network conditions and the service priority. The data link layer acts as an interface between the physical layer and network layer (Garman and Sherman 2015). The data link layer with the help of the network layer helps for smooth operation of the physical layer by proper resource allocation of the physical layer entities allowing for robust and error free execution of the physical layer components with proper resource management Drills: a) Boolean operation on bit patterns: not 0010111000101100 : 1101000111010011 0010111000101100 or 1110000011100001: 1110111011101100 iii. 0010111000101100 and 1110000011100001: 10000000100000 1100111000111011 and 0110111100011100: 100111000011000 b) What are the subnet masks for the following slash address blocks Slash address blocks Subnet masks /8 255.0.0.0 /15 255.254.0.0 c) Address mask validity and slash forms for the correct address masks: Address masks validity Slash forms i) 255.255.248.0 valid /21 ii) 255.224.252.0 Not valid NA iii) 255.255.255.224 valid /27 iv) 255.255.156.0 Not valid NA The criteria of a valid subnet mask is that when it is converted to binary the binary equivalent have to consists of only consecutive 1's and then 0's, but no intermittent mixing is allowed. The binary equivalent of the address mask 255.224.252.0 is 11111111.11100000. 11111100. 00000000 which is not valid according to the above mentioned criteria. The binary equivalent of the address mask 255.255.156.0 is 11111111. 11111111. 10011100.00000000 which is also not valid. d) Number of hosts in the following address blocks: Address blocks Number of hosts /13 524272 /26 62 Controlled access and contention-based access to a physical medium : Controlled access grant permission to the transmitting stations to enable it for communication. Only that station granted for permission will be allowed to send data node in the communication. This helps to control the traffic and collision of message is also avoided in this way (Thilina et al. 2015). Contention refers to media access method that is used for sending broadcasting medium. In this method any transmitting station can send data at any time. However, this might create collision in the network. In order to avoid the collision carrier sensing mechanism is used. References: Belkneni, M., Bennani, M.T., Ahmed, S.B. and Kalakech, A., 2016, October. Network Layer Benchmarking: Investigation of AODV Dependability. InInternational Symposium on Computer and Information Sciences(pp. 225-232). Springer, Cham. Chen, G., Gong, Y., Xiao, P. and Chambers, J.A., 2015. Physical layer network security in the full-duplex relay system.IEEE transactions on information forensics and security,10(3), pp.574-583. Cui, L., Yu, F.R. and Yan, Q., 2016. When big data meets software-defined networking: SDN for big data and big data for SDN.IEEE network,30(1), pp.58-65. Ding, R. and Jiang, H., 2016. Simulation of data-link networks used in cooperative terminal guidance. InElectronics, Electrical Engineering and Information Science: Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science (EEEIS2015)(pp. 504-511). Garman, S. and Sherman, R., 2015. Automation at the Network Layer. Goseling, J., Gastpar, M. and Weber, J.H., 2015. Random access with physical-layer network coding.IEEE Transactions on Information Theory,61(7), pp.3670-3681. Kalakech, A., 2016, September. Network Layer Benchmarking: Investigation of AODV Dependability. InComputer and Information Sciences: 31st International Symposium, ISCIS 2016, Krakw, Poland, October 2728, 2016, Proceedings(Vol. 659, p. 225). Springer. Kapetanovic, D., Zheng, G. and Rusek, F., 2015. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks.IEEE Communications Magazine,53(6), pp.21-27. Kizza, J.M., 2017.Guide to computer network security. Springer. Marquardt, R.R., 2017. Data Link Layer Trust Signaling in Communication Network.filed Jul,11. Mukherjee, A., Fakoorian, S.A.A., Huang, J. and Swindlehurst, A.L., 2014. Principles of physical layer security in multiuser wireless networks: A survey.IEEE Communications Surveys Tutorials,16(3), pp.1550-1573. Qadir, J., Ali, A., Yau, K.L.A., Sathiaseelan, A. and Crowcroft, J., 2015. Exploiting the power of multiplicity: a holistic survey of network-layer multipath.IEEE Communications Surveys Tutorials,17(4), pp.2176-2213. Thilina, K.M., Tabassum, H., Hossain, E. and Kim, D.I., 2015. Medium access control design for full duplex wireless systems: challenges and approaches.IEEE Communications Magazine,53(5), pp.112-120. Zafar, S. and Ejaz, U., 2016. SCTP-aware Link Layer Retransmission Mechanism for Smart-grid Communication Network.Engineering, Technology Applied Science Research,6(4), pp.1093-1098. Zou, Y., Zhu, J., Wang, X. and Leung, V.C., 2015. Improving physical-layer security in wireless communications using diversity techniques.IEEE Network,29(1), pp.42-48.
Sunday, April 12, 2020
College Application Tips from a Homeschooled Student
Applying to college is a challenging experience alone. Being a homeschooled student and a college applicant makes it a little extra harder, and certainly more unique.While homeschooled students may have many interesting ââ¬Å"out of the classroomâ⬠experiences to discuss at interviews or in essays, you have to prove that your own learning methods have proved productive. As a homeschooled student, I spenta great deal of time explaining why I chose to homeschool, my parents teaching methods, and how it has prepared me for college. Theres no admission counselor to walk you through the application process, or teachers to remind you and help you to fax in any transcript or test scores you have. It is a much more independent process, and as a fellow homeschooler, here are a few tips to make it easier for you:Be proud of being a homeschooled student! You shouldnt feel like you need to make excuses for being homeschooled. Just having a more positive mindset to explain why you were home schooled will make a difference. Plus, youll be answering this question countless times during senior year, you might as well have some fun doing it. Learn how to design a competitive application. Just like any other college applicant, Ihad high test scores and interesting extracurricular activities. I needed to learn how to set myself apart from other students who were homeschooled, and even applicants currently attending high school. Without a counselor, I asked for external help from friends and family to help review my application. Challenge untrue stereotypes in your application. Being homeschooled, I always seen as an under socialized teenager. Its important to highlight any activities outside the home that matter to you, and emphasize your strongest interpersonal skills on your application. In doing so, you actively combat predispositions and paint an accurate portrait of who you are to admissions officers. Show that you have used your time toward inventing something that matters to you. Homeschooling lends us time to pursue our passions more thoroughly, so use additional essays to discuss how it gave you a new perspective that can benefit their campus. This college application journey may be challenging, but remember that you can always ask for help from mentors on , your friends, your family, and your community! Submitted by intern, Samantha M.
Professional Sports Stadium Sample Essay
Professional Sports Stadium Sample EssayIf you've ever thought about writing a professional sports stadium sample essay, then you'll know that writing a great one is no easy task. A professional sports stadium sample essay is a very tough subject for anyone to tackle, as there is so much packed into the brief. If you're not prepared with your subject knowledge and won't have the time to make a well-written essay, then don't despair.The first thing to realise when writing a professional sports stadium sample essay is that it must be brief and to the point. You should avoid too much detail - this will defeat the purpose of writing a professionally written essay. Ideally, your essay should only be about 10 pages long, so do not worry if you are writing for a small audience. If it has to be a product launch, for example, then the more information you can include in the essay, the better.You will also need to carefully consider your personal opinion. Remember that while you are trying to impress a reader, they will also be trying to do the same thing, so do not take the opinions of others to heart. Personal opinions will help you create a good impression on the reader, but remember that you are writing to impress them, so don't spoil their chance of doing so by telling them you think their thoughts are rubbish.To make the most of your professional sports stadium sample essay, you will also need to select a topic that they will be interested in. A theme is likely to be more successful as you have a complete picture of who they are. Think about what subjects they would enjoy, or what their hobbies might be. If you are going to write for a school project, you may want to look at what topics you would want to write about.When writing a professional sports stadium sample essay, you will also need to use strong, engaging language. Your essay will be judged by the reader, so it is essential that you know how to write effectively. In fact, there is no point writing an essay if you cannot capture their attention.Using simple language will also help you make the most of your professional sports stadium sample essay. People will struggle to read essays that use complicated language, and even if you can follow an academic jargon, it is not likely to grab their attention. Therefore, try and stick to the simplest language possible. One thing to keep in mind, however, is that readers often prefer a less complicated essay, so be careful not to write too much to make the essay too complex.The best way to make the most of your professional sports stadium sample essay is to write it as fast as you can. If you put off writing it, you will struggle to come up with an effective essay that will impress your reader, and you will end up struggling to finish it, which will leave you with a poor essay that does not impress them.
Wednesday, March 11, 2020
Change Management Essays
Change Management Essays Change Management Paper Change Management Paper Unit: 9740 Change Management Table of contents Introduction p3 1. 0 Description of 2 schools of thought 1. Theories of planned change p3 2. Lewinââ¬â¢s change model p3 3. The positive model p4 2. 0 Comparison of each school p5 3. 0 Drive or impede planned change and reactive change p6 Conclusion p7 Reference List p8 Introduction In this report, there are two models; Lewinââ¬â¢s Change model and the positive model. The case for these models is SAMSUNG Company. Firstly, this essay starts with description of two schools of thought and each step of two models. Secondly, there will be comparison between Lewinââ¬â¢s Change model and the positive model adapt with the case. Finally, drive or impede planned change and reactive change are demonstrated. 0. Description of 2 schools of thought 1. Theories of planned change Conceptions of planned change have tended to focus on how change can be implemented in organizations. Called ââ¬Å"theories of changing. â⬠These frameworks describe the activities that must take place to initiate and carry out successful organizational change. In this section, we describe and compare two theories of changing: Lewinââ¬â¢s change model, the action research model, an the positive model. These frameworks have received widespread attention in OD and serve as the primary basis for a general model of planned change. (Cummings, 2005) 2. Lewinââ¬â¢s change model One of the earliest models of planned change was provided by Kurt Lewin. The level of performance of a work group might be stable because group norms maintaining that level are equivalent to the supervisorââ¬â¢s pressures for change to higher levels. This level can be increased either by changing the group norms to support higher levels of performance or by increasing supervisor pressures to produce at higher levels. Lewin suggested that decreasing those forces maintaining the status quo produces less tension and resistance than increasing forces for change and consequently is a more effective change strategy. Cummings, 2005), (Palyong. S, 2011) Unfreezing: This step usually involves reducing those forces maintain the organizationââ¬â¢s behaviour at its present level. Unfreezing is sometimes accomplished through a process of ââ¬Å"psychological disconfirmation. â⬠By introducing information that shows discrepancies between behaviours desired by organization members and t hose behaviours currently exhibited, members can be motivated to engage in change activities. (Cummings, 2005), (Palyong. S, 2011) Moving (Transition): This step shifts the behaviour of the organization, department, or individual to a new level. It involves intervening in the system to develop new behaviours, values, and attitudes through changes in organizational structures and processes. (Cummings, 2005), (Palyong. S, 2011) Refreezing: This step stabilizes the organization at a new state of equilibrium. It is frequently accomplished through the use of supporting mechanisms that reinforce the new organizational state, such as organizational culture, rewards, and structures. (Cummings, 2005), (Palyong. S, 2011) 3. The positive model The positive model represents an important departure from Lewinââ¬â¢s model. This model focuses on what the organization is doing right. It helps members understand their organization when it is working at its best and builds off those capabilities to achieve even better results. Thus, positive expectations about the organization can create an anticipation that energizes and directs behaviour toward making those beliefs happen. (Cummings, 2005) à ¦ Initiate the Inquiry: This first phase determines the subject of change. It emphasizes member involvement to identify the organizational issue they have the most energy to address. If the focus of inquiry is real and vital to organization members, the change process itself will take on these positive attributes. Cummings, 2005) à ¦ Inquire into Best Practices: This phase involves gathering information about the ââ¬Å"best of what isâ⬠in the organization. If the topic is organizational innovation, then members help to develop and interview protocol that collects stories of new ideas that were develop an interview protocol that collects stories of new ideas that were developed and implemented in the organization. (Cummings, 2005) à ¦ Discover the Themes: In this phase, members examine the stories, both large and small, to identify a set of themes representing the common dimensions of peopleââ¬â¢s experiences. The themes represent the basis for moving from ââ¬Å"What isâ⬠to ââ¬Å"What could beâ⬠(Cummings, 2005) à ¦ Envision a Preferred Future: Members then examine the identified themes, challenge the status quo, and describe a compelling future. Based on the organizationââ¬â¢s successful past, Members collectively visualize the organizationââ¬â¢s future and develop ââ¬Å"possibility propositionsââ¬â¢-statements that bridge the organizationââ¬â¢s current best practices with ideal possibilities for future organizing. (Cummings, 2005) Design and Deliver Ways to Create the Future: The final phase involves the design and delivery of ways to create the future. It describes the activities and creates the plans necessary to bring about the vision. It proceeds to action and assessment phases similar to those of action research described previously. Members make changes, assess the results, make necessary adjustments, and so on as they move the organization toward the vis ion and sustain ââ¬Å"What will be. â⬠The process is continued by renewing the conversations about the best of what is. Cummings, 2005) 2. 0 Comparison of each school |Area of change |Lewinââ¬â¢s change model |The positive model | |Technological change |SAMSUNG CEO figured out that the |SAMSUNG Company organizes the | | |company needs new product to compete|meeting for staff to discuss about | | |with I-phone 4 from APPLE Company.. necessity of developing new software| | |SAMSUNG Company forces to develop |for new product. It is a step of | | |new software to staff for Galaxy S |Inquire into Best Practices. | | |4G which takes aim to I-Phone 4. It | | | |is a step of unfreeze. | |Structural change |New members, new team and post for |SAMSUNG Company CEO organizes the | | |developing new software must be |meeting to choose the staffs for | | |created in SAMSUNG Company. It helps|creating new team and post for | | |member to facilitate to develop new |developing Galaxy S 4G. It is a step| | |software. It is a step of |of Initiate the Inquiry. | | |transition. | | |People change | | | | |SAUMSUNG Company staffs have to |SAMSUNG Company staffs understand | | |figure out new ideas to develop new |necessity of developing new software| |Self |software. |for Galaxy S 4G. | | | | | | | | | | | | | | | | | | | | |Team | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |Organisation | | | | | | | | | |SAMSUNG Company staff members can | | |New teams have to gather their ideas|gather information about development| | |together and figure out which idea |of Galaxy S 4G in the organization. | | |is the best for new software. |It is a step of Discover the Themes. | |SAMSUNG Company changes their output|When SAMSUNG Company CEO consider | | |schedule, because of production of |about change of output schedule, | | |Galaxy 4G. Then, there would be |the staff members will be provided | | |change in the organisation of the |meeting again and discuss about | | |company. |which way is the best. It means, | | | |staff members will figure out the | | | |way of change themselves. | (SAMSUNG, n. d) 3. 0 Drive or impede planned change and reactive change Schools of thought |Planned change |Reactive change | | |Drive |Impede |Drive |Impede | | |Transition (Moving) |There is no time to |Unfreezing stage helps |Refreezing stage | | |stage encourage member|adopt new change for |to reduce time. So, it |ensures that there is| | |to follow the change. |staff members in |is helpful when the |no way back to | | |Using facilitation |unfreezing stage. |company needs change |previous ways of | | |helps members too. |Staff members cannot |suddenly. Transition |working. It will not | |Lewinââ¬â¢s change model |Refreeze stage also |be given any option, |(Moving) stage helps |flexible device if | | |helps staffs to be |but to obey. Staffs |members to follow |the change goes | | |satisfied about their |may be unable to bear|change. When pressure of|different way from | | |change. |a burden. |company become hardly, |expected way. | | | | |staff members need to | | | | | |facilitation to helps | | | | | |member. | | |Initiate the Inquiry, |In the Discover the |Inquire into Best |Totally, this model | | |Inquire into Best |Themes phase, members|Practices stages can |takes too long time | | |Practices and Envision|examine the stories |gather information. |to make staff act. | | |a Preferred Future |to identify a set of |Then, members help to |There are too many | | |helps staff members |themes representing |develop an interview |discuss among the | | |understand and adapt |the common dimensions|each other and tell |staffs. Also, it is | | |into the chan ge. They |of peopleââ¬â¢s |stories of innovation in|not easy to gather | | |can be given choice, |experiences. It is |which they have |all of staffââ¬â¢s | | |communicate each of |not so important |personally been |opinion. So, it is | | |members and shown good|stage, because it is |involved. In this stage,|not suitable for | | |team work. Also, they |similar stage with |staff members can create|sudden or immediate | | |can act after |second; Inquire into |huge idea from each |change. Initiate the | | |understanding and |Best Practices. The |small idea. In Design |Inquiry, Discover the| | |deciding their way to |final step; Design |and Deliver Ways to |Themes and Envision a| |The positive model |act. Moreover, staff |and Deliver Ways to |Create the Future stage,|Preferred Future | | |members are able to |Create the Future |members make changes, |stage could be left | | |create unique idea |also describes the |assess the result, make |out. | | |together. |activities and |necessary adjustments, | | | | |creates the plans |and so on as they move | | | | |necessary to bring |the organization toward | | | | |about the vision ,but|the vision. It helps | | | | |it s not big |members to continue | | | | |different from fourth|conversation about the | | | | |stage; Envision a |best of what is. | | | | |Preferred Future. So,| | | | | |it could be left out | | | | | |to reduce time to | | | | | |practice. | | | (Cummings,2005),( Palyong. S,2011) Conclusion There were two different styles of schools of thought in this essay. As shown in this essay, Lewinââ¬â¢s model differ from the positive model in terms of the level of involvement of the participants and the focus of the change. Lewinââ¬â¢s model focuses on the general process of planned change. SAMSUNG Company externally seems to follow the Lewinââ¬â¢s model as a change model, but it was also able to figure out the strategy in the positive model. In conclusion, SAMSUNG Company flexibly follows two models. Reference List 1. Cummings, T. G Worley, C. G. (2005). Organization Development and Change, 8th ed. Ohio: South-Western p9 2. Cummings, T. G Worley, C. G. (2005). Organization Development and Change, 8th ed. Ohio: South-Western p12 3. Palyong, S. (2011. October 12). Original solving the problem practice of alternative and change management. Retrieved November 4, 2011, from http://blog. daum. net/songpy80/6045890 4. SAMSUNG . (n. d). New business of SAMSUNG Company. Retrieved November 4, 2011, from samsung. co. kr/samsung/philosophy/new. do 5. SAMSUNG . (n. d). Philosophy of SAMSUNG Company. Retrieved November 4, 2011, from samsung. co. kr/samsung/philosophy/principle. do 6. SAMSUNG. (n. d). The history of SAMSUNG Company. Retrieved November 4, 2011, from samsung. co. kr/samsung/history. do
Sunday, February 23, 2020
Pain management in nursing Research Paper Example | Topics and Well Written Essays - 2000 words
Pain management in nursing - Research Paper Example Luckily, quite a lot of studies and print and electronic literatures cover the subject of pain management. In many occasions, literatures define pain management as composed of medical practitioners, occupational therapists, clinical nurse specialists, clinical psychologists, physiotherapists, and nurse practitioners (Gordon et al., 2005). When need arises, other practitioners such as massage specialists and psychiatrists may be incorporated in pain management practices, especially in cases of non-physical pain. Pain healing process is sometimes rather quick, once the underlying disease or trauma has been healed. This kind of pain management requires mostly one physician to deal with completely, using drugs such as analgesics (Gordon et al., 2005). On the other hand, proper management of long-term pain will require a dedicated team of physicians from a wide range of specializations to manage effectively. Medicine is concerned with the treatment of sickness and injury to enhance speedy heeling, and also treats upsetting symptoms like pain to alleviate suffering during the recovery process. In cases where a painful injury fails to heal quickly, or when the pain persists even after the injury or sickness has healed, or when the cause of the pain cannot be ascertained, the task of medicine is to relieve the pain (Gordon et al., 2005). Clinical Trials of Pain Management and Studies of Pain Mechanisms are some of the avenues by which pain management has achieved considerable growth and development in recent times. For instance clinical trials by the World Health Organization (WHO), institutions such as the National Institutes of Health, National Institute of Neurological Disorders and Stroke and pharmaceuticals such as GSK Pharmaceutical. For example, the National Institute of Neurological Disorders and Stroke did a pilot trial of intravenous pamidronate for chronic low back pain while a GSK Pharmaceutical sponsored a randomized randomized, double-blind, placebo-contr olled, crossover pilot trial of lamotrigine for central pain due to multiple sclerosis: a model for the role of lamotrigine in the treatment of central pain. Investigator initiated grant. This paper investigates the available and accessible studies and print and electronic literatures on pain management in nursing with a view to finding the current pain management methods in use, their effectiveness, and chance for improvement if any. Further, the relevance of these literatures and any gaps and other weaknesses will be explored. Literature Review on Approaches to Pain Management in Nursing The reviewed literatures revealed that quite a number of approaches to pain management in nursing have been in use for a very log time. These techniques include; the use of physical therapy, antidepressants, analgesics, anticonvulsants, physical exercise, psychological measures like biofeedback, application of heat or ice, and in some cases, cognitive behavioral therapy (World Health Organization, 2013). Pain management in nursing can also be attained by the use of drugs or through interventional means. The interventional methods available are commonly used to cure chronic back pain. Examples of these intervention procedures are injection of facet joints, the use of spinal cord stimulators, and use of epidural steroid injections. As stated earlier, pain management may sometimes involve physicians from
Friday, February 7, 2020
The Nature of War and US Security Policy in the Aftermath of the Cold Essay
The Nature of War and US Security Policy in the Aftermath of the Cold War - Essay Example According to the research findings, it can, therefore, be said that as one of the most significant conflicts in modern human history, the Cold War was marked by high expectations of conflict and violence, as well as continuous detailed planning and mobilization for war by the USSR, the US, and their respective allies. Over the course of the Cold War, hegemonic relations and alliances around the US and the USSR incorporated most of the free world with both countries occupying opposite and confrontational positions on most international issues. As a result, countries in the sphere of each hegemon were always in a state of military readiness and the risk of war was ever-present. Indeed, the most bloody post-WWII wars were fought by proxies of the USSR and the US, including the Korean War and the Vietnam War. With the end of the Cold War in 1991, however, global conflicts did not decline and, in fact, there were over 115 violent conflicts reported in the first ten years of the post-Cold War period. Gray states that while some aspects of war have changed since the end of the Cold War, the objective nature of war has remained unchanged even as the subjective nature of war has changed. Deutsch also notes that war has not dissipated with the fall of the Soviet Union, but has only changed in terms of strategy and symmetry. This paper aims to show that the end of the Cold War altered the security policy of the US by replacing a conventional military adversary with a more mobile and asymmetrical adversary. Newman broadly defines the Cold War as the relationship that developed between the USSR and the US following their joint triumph against Nazi Germany in WWII. The unique nature of this relationship came to dominate international affairs for almost five decades and led to several major crises like the Hungarian revolution, the Vietnam War, the Cuban Missile Crisis, the Korean War, and the Soviet-Afghan War. Possibly the tensest issue was the proliferation of nuclear weap ons and other weapons of mass destruction in preparation for eventual war.
Subscribe to:
Comments (Atom)