Sunday, December 29, 2019

List of the Marginal Seas of the Indian Ocean

The Indian Ocean is a relatively large ocean with an area of 26,469,900 square miles (68,566,000 sq km). It is the worlds third largest ocean behind the Pacific and Atlantic Oceans. The Indian Ocean is located between Africa, the Southern Ocean, Asia and Australia and has an average depth of 13,002 feet (3,963 m). The Java Trench is its deepest point at -23,812 feet (-7,258 m). The Indian Ocean is most known for causing the monsoonal weather patterns that dominate much of Southeast Asia and for being an important chokepoint throughout history.The Ocean also borders several marginal seas. A marginal sea is an area of water that is a partially enclosed sea adjacent to or widely open to the open ocean (Wikipedia.org). The Indian Ocean shares its borders with seven marginal seas. The following is a list of those seas arranged by area. All figures were obtained from Wikipedia.orgs pages on each sea.1) Arabian SeaArea: 1,491,126 square miles (3,862,000 sq km)2) Bay of BengalArea: 838,614 s quare miles (2,172,000 sq km)3) Andaman SeaArea: 231,661 square miles (600,000 sq km)4) Red SeaArea: 169,113 square miles (438,000 sq km)5) Java SeaArea: 123,552 square miles (320,000 sq km)6) Persian GulfArea: 96,911 square miles (251,000 sq km)7) Sea of Zanj (located off the east coast of Africa)Area: UndefinedReferenceInfoplease.com. (n.d.). Oceans and Seas - Infoplease.com. Retrieved from: http://www.infoplease.com/ipa/A0001773.html#axzz0xMBpBmBwWikipedia.org. (28 August 2011). Indian Ocean - Wikipedia, the Free Encyclopedia. Retrieved from: http://en.wikipedia.org/wiki/Indian_oceanWikipedia.org. (26 August June 2011). Marginal Sea - Wikipedia, the Free Encyclopedia. Retrieved from: http://en.wikipedia.org/wiki/Marginal_seas

Saturday, December 21, 2019

A Research On Mixed Model Online Dating - 765 Words

In brief, this thesis makes the following contributions to knowledge, theoretically, methodologically, and practically. First, it shows that anticipation of meeting another–most specifically in the context of mixed model online dating (Fiore, 2004) – can cause people to provide more veridical information, in descriptions of themselves, when attempting to manage impressions of themselves to others (Schlenker, 1980). Further, it supports the theory that, if so anticipated, people will provide such information based on the idea that, if those other persons’ expectations are disconfirmed (Burgoon Poire, 1993), in future, they will likely be dissatisfied and thereby potentially/likely terminate a possibly (romantic) relationship, perhaps even before giving it a chance. In online dating, it was theorized, the likelihood may be much larger, due to the height of the stakes. As such, it illustrates that, when primed to anticipate such a possibility – herein as a function of a Bogus Pipeline procedure (Jones et al., 1971) variation – it can lead to truthful self-presentation, so as not to miss a potentially lifelong opportunity. The results of combining the theoretical mechanisms outlined above can be ported, or used to explain different contexts, wherein the content may vary, while the structure stays the same, such as in managing impressions, when submitting rà ©sumà ©s for jobs to websites that specialize in job-seeking, such as Monster.com, because people would likely not wantShow MoreRelatedA Basic Principle Of Attachment Theory Essay1585 Words   |  7 Pagesin the Dyadic Adjustment of Dating Couples and W. Steven Rholes, Ramona L. Paetzold, Jamie L. Kohn paper Disorganized attachment mediates the link from early trauma to externalizing behavior in adult relationships will primarily be looking at how childhood maltreatment leads to disorganized attachment which is thus exhibited in later life relations. Secondarily, this revi ew will be considering the barriers of quantitative and qualitative research through each research paper and the limitations ofRead MoreRelationship and Attraction: The Attraction-Similarity Model1476 Words   |  6 PagesAccording to an MSNBC survey, 53% of single people find a great smile to be the most attractive feature in a potential mate. Another percentage of single people surveyed that flattery is the best was to attract someone (Dating/Relationship Statistics). Psychologists at the University of Pennsylvania studied data from over 10,000 speed daters and found that most people make a decision regarding a person’s attraction within three seconds of meeting (Penn New ). Whether it is the friends we chooseRead MoreThe Victimization Of Heterosexual Males : A Literature Review On Domestic Violence3581 Words   |  15 PagesChristopher L. Friendly University of South Carolina Introduction Domestic violence has become a topic of increasing interest by many public health professionals. The primary focus of these researchers, as observed through extensive research, tackles domestic violence towards women, with little attention given to the male population. In 2000, the Department of Justice published a report, based on surveys regarding each participants lifetime experiences, that provided evidence to suggestRead MoreA Theory Of Careers And Vocational Choice Based Upon Personality Types1560 Words   |  7 Pageslearn how you scored for each of the other 5 interest areas. Finally, you ll see a list of possible careers for you, based on your top interest area. The RIASEC Model has been tested with a wide range of ethically diverse individuals including those from different socioeconomic backgrounds and with internationals groups. The results are mixed, some portray strong support and others indicate less support. The O*NET Interest Profiler (IP) is a self-assessment career exploration tool that can help clientsRead MoreArgumentative Essay About Jealousy1781 Words   |  8 PagesJealousy, because it is a common social emotion, is a normal when you are dating or married, however, it is very important to know when to differentiate what is considered normal and what is unhealthy or unrealistic. The threat of co-workers and casual friends of a partner developing feelings of love or attraction towards someone else is a haunting topic that couples face every single day. Depending on the status of a relationship (dating, married, etc.), partners answers vary from being very anxious andRead MoreThe Effects Of Digital Identification : An Analysis Of Virtual Surrogacy3268 Words   |  14 Pages School Of Communication Manipal University 23-Apr-15 Research topic: Causes and Effects of Digital Identification: An analysis of Virtual Surrogacy Research Guide: Mrs Shruti Shetty Submitted by: Shray Agarwal Roll Number: 140702035 Introduction Imagine a world, not so far from today where an amalgamation of the Internet with human knowledge and ambition has formed ways of possibly doing everything sitting inside the World Wide Web. A way of life is completely possibleRead MoreSocial Media And Its Effect On Society3274 Words   |  14 Pagesinteraction. History Let’s examine the world of social media, social media is described in the Merriam-Webster Dictionary as being forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (as videos) (Social media, 2014) Interpersonal simply means being, relating to, or involving relations between persons) (Interpersonal, 2014). Our society today is filteredRead MoreInternet a Tool of Modern Age2643 Words   |  11 Pagespeople may watch television at least one hour every day. Some people usually meet news through television and others may want to watch dramas or variety shows. We can watch a lot of programs according to our tastes through television. Nielsen media research (1998) reported: â€Å"Television was introduced to the U.S.A. at the 1939 World’s Fair in New York. After two years, the Federal communications Commission licensed and approved the first commercially available television stations. In 1950, about 9% ofRead Morebullet theory7360 Words   |  30 Pagesï » ¿Bullet Theory The magic bullet perspective, also called the hypodermic needle model, is a model for communications. Magic bullet theory has been around since the 1920s to explain amp;ldquo;how mass audiences might react to mass media,amp;rdquo; reports Media Know All. According to University of Twent in the Netherlands, the theory states that mass media has a amp;ldquo;direct, immediate and powerful effect on its audiences. History Several factors, including widespread popularity of radioRead MoreAzerbaijans Tourism Industry12172 Words   |  49 Pages†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Study Goal †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Research Objectives †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Importance of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Chapter Two: Literature Review †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Chapter Three: Methodology †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Research Process †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Primary Research Process †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Research Methods †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Primary Research Design †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦... Research Procedure †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Chapter Four:

Thursday, December 12, 2019

Wireless Communication Data Eencryption Methods of WiMax

Question: Discuss about the Wireless Communication for Data Eencryption Methods of WiMax. Answer: Introduction The report has shown the data encryption methods of WiMax and compared them for forming an overview about their system. The report has a second part where the security issues of the WPAN have been analyzed. The overall report has shown the importance of the wireless communication and networking for daily activities. Compare and Contrast Data Encryption Standard of WiMax WiMax (Wireless Interoperability Multiple Access) is a standard for wireless access (802.16) and it is used for developing a network of wireless access among two end points (Desai, 2013). The security protocols of WiMax are PKMv2, EAP, and AES. These above stated protocols of WiMax have helped in forming data security and encryption. Explaining the PKMv2 security protocol PKMv2 or privacy key management protocol version 2 is used for encryption and authorization exchange of crypto keys (Sridevi Rajaram, 2012). The crypto keys help in the process of multicasting and broadcasting of the data traffic. It has been created for overcoming the short comings of the first version of PKM and it uses the standard of both RSA and EAP for security and encryption of data. Figure 1: PKMv2 Protocols (Source: Sridevi Rajaram, 2012, pp-71) The key generated for authentication of the operation is more precise as two standard principles have been used for forming the key (Desai, 2013). The mobile station can be authenticated for the wireless activities and operations by the base station using the crypto keys of mutual authorization. Replay attacks are being dealt by using Nonce. Explaining the EAP security protocol EAP is acronym for Extensible Authentication Protocol and it has primary function of user authentication and device security (Pawlowski, Jara Ogorzalek, 2014). It is used for point to point protocol formation and the process of multiple authentications has been enabled for use by the EAP protocol. Smart cards, password or passphrases, certificates, and authentication using public key are all being used sue to the implementation of EAP. EAP can be mixed with new security features easily and according to the new security feature mixed with EAP, the protocol has been named as EAP-TTLS, EAP-MD5, and EAP-TLS (Kalra Kiran, 2015). The pre-negotiation for the authentication is not needed and the identity request can be sent initially with other queries and request. Figure 2: EAP protocol authentication process (Source: Pawlowski, Jara Ogorzalek, 2014, pp-344) Explaining the AES security protocol AES or Advanced Encryption Standard is the most advanced form of network security and the data is transmitted over the cloud network (Wadi Zainal, 2013). The security protocol has helped in securing the air traffic by data encryption. The keys for the security encryption can be of various sizes and block such as 128, 192 or 256. The AES process has been based on the process of permutation and substitution. AES uses bytes for operations and specific outputs (Kalra Kiran, 2015). Encryption is done in AES by following four processes in sequence and decryption is done by doing the same processes in reverse sequence. Figure 3: AES algorithm overall structure (Source: Wadi Zainal, 2013, pp-414) Security challenges of WPAN technologies WPAN (wireless personal area network) is limited for communicating and data exchange among portable devices like PCs, PDAs, printers, pagers, and mobile phones (Amiri et al., 2013). The devices are inbuilt with two radio surfaces among which one is utilized for cellular network and the other for PAN connection. Bluetooth and ZigBee are the two WPAN technologies whose security challenges are discussed below. Security Challenges of Bluetooth (802.15.1) The security challenges of the Bluetooth WPAN are Inferior Security protocols and Denial of Service attack. Inferior Security protocols: The Bluetooth radio control can be easily misused, as it has higher vulnerabilities for impersonating and eavesdropping (Minar Tarique, 2012). The person in the middle attack can be used for attacking the devices and extracting the information from the device. It would be easily possible as the security of the Bluetooth device is less secured. The attacker of man in the middle sets up two point to point connections for negotiation of the radio frequencies of Bluetooth radio. The inferior security protocols would result in easy damaging and performing of the illicit queries. Denial of Service: The Bluetooth devices are prone to the denial of service attack. The DoS attack would be highly possible for the Bluetooth radio frequency due to the ease of accessing the device facility (Minar Tarique, 2012). DoS occur when the device is sent multiple queries for processing using fake server. It would cease the processing of user generated queries for the devices. The infiltration of the security measures would result in data theft and impersonation of the authentic users. Security challenges of ZigBee (802.15.4) The security challenges of ZigBee WPAN are Key Attacks and Injection and replay attacks. Physical attacks: The devices can be disrupted by the gaining physical access to the devices. The security of the Zigbee devices can be easily bypassed manually. Altering with the hardware and software appliances of ZigBee is easy with the gain of physical access to the device. Hence physical access is the main reason behind the attack on the security of ZigBee devices. Injection and replay attacks: The key based attacks on the ZigBee after mixing with the replay packet attack and injection attack have affect on the activities of the radio devices (Vidgren, 2013). It would result in unauthorized and unauthenticated actions of the devices. The light designs of the ZigBee would result in the interception of the data packets for the targeted networks. The ZigBee devices could be tampered without contacting the physical access to the system. Key Attacks: The keys used for connecting the two devices can be easily decrypted because of low security structure (Vidgren, 2013). The combination of hardware and software applications would result in doing the illicit operations from the devices. The device would not be required to be in physical access for performing the key attacks. The pre shared keys and OTA processes are used for connecting the devices using systematic methodologies. Conclusion The report has covered the impact of the wireless technologies for the development of the communication system. The WiMax technologies protocols (PKMv2, EAP, and AES) have been compared in the above report. The security challenges of WPAN technologies are Inferior Security protocol, Denial of Service, Injection and replay attacks, and Key Attacks. References Amiri, I. S., Alavi, S. E., Idrus, S. M., Nikoukar, A., Ali, J. (2013). IEEE 802.15. 3c WPAN standard using millimeter optical soliton pulse generated by a panda ring resonator.IEEE Photonics Journal,5(5), 7901912-7901912. Desai, P. (2013).U.S. Patent No. 8,526,348. Washington, DC: U.S. Patent and Trademark Office. Kalra, M. S., Kiran, M. V. (2015). Research and Analysis of WiMax Communication.traffic,4(9). Minar, N. B. N. I., Tarique, M. (2012). Bluetooth security threats and solutions: a survey.International Journal of Distributed and Parallel Systems,3(1), 127 Pawlowski, M. P., Jara, A. J., Ogorzalek, M. J. (2014, July) Extending Extensible Authentication Protocol over IEEE 802.15. 4 Networks InIMIS(pp. 340-345). Sridevi, B., Rajaram, S. (2012). PKMv2EAP authentication cost reduction of mobile WiMAX network entry process by the proposed key caching mechanisms.International Journal of Mobile Network Design and Innovation,4(2), 65-75. Vidgren, N., Haataja, K., Patino-Andres, J. L., Ramirez-Sanchis, J. J., Toivanen, P. (2013, January). Security threats in ZigBee-enabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 5132-5138). IEEE. Wadi, S., Zainal, N. (2013). A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor.Journal of Engineering Science and Technology,8(4), 406-415.

Thursday, December 5, 2019

Breakthrough free essay sample

The paper quivered in the morning light, now beaming through the cracked blinds, it crinkled as sweaty palms clutched its edges-bleeding the peripheral text, as tears stained the dull thin paper. The paper quivered as I read that 500 word essay on page two of the Washington Post over and over again. It quivered as each and every word bore its way into my mind, as I desperately attempted to grasp this evanescent euphoria. Breakthrough. Yervoy. Melanoma. Ipilimumab. Prolong. Survive. Eight years too late, but the utterance comforted me. Between those lines of serif font, I could see the desolate image of my mother fading away, scarred skin sinking into a skeletal frame, all senses fading leaving only a feeble reminder of the toll six months of surgery and chemotherapy take. I could feel the weight of her absence and the desire for one more hour, day, week or month of her presence. We will write a custom essay sample on Breakthrough or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Between those lines of serif font, I could see a child pleading with fate for more time, as they watched their own parent slip away. I could see four to eight months from the breakthrough, a child’s nativity to loss preserved, an unconditional love untarnished by death. In that quivering paper, I found hope- hope that one day melanoma’s mordant agenda will be but a secluded musing buried behind triumphs and victories, hope that loved ones may live not only in our memories, but in our lives as a constant reminder of the progress that overcame death.

Thursday, November 28, 2019

The implications of downsizing to the employees, communities and families of the employees

Introduction Downsizing is a corporate practice that many employees are concerned about. This process can be described as a practice whereby firms reduce the number of employees and the scope of their business in order to achieve improved service and financial performance (Baumol, Blinder, Wolff, 2003).Advertising We will write a custom term paper sample on The implications of downsizing to the employees, communities and families of the employees specifically for you for only $16.05 $11/page Learn More Many companies lay off their employees due to a variety of reasons that may include the following: when the service of an employee is no longer required owing to technology upgrade; an internal shift in the requirements of the organization; restructuring; a change in financial fortunes, etc. Downsizing is a common practice in the corporate world, especially in times of financial hardships. For instance, in 2007, during the global financial crisis, close t o one million employees were laid off in the United States (Bain Company, 2010). The impact of downsizing is felt hardest by the departing employees as well as their families and the community in general. This paper seeks to establish the effects of downsizing to the employees, communities and the families of the employees. The paper will also discuss the current or future applications and relevance of downsizing. Effects of Downsizing on Dismissed Employees Losing a job impacts significantly on any employee. Though the effects are mostly negative, there can be one or two positive consequences that come with losing a job. Positive effects It’s rare for anyone to benefit if he/she has been a victim of organizational job cuts. Normally, success or failure following a job dismissal will depend on an individual’s preparedness and the availability of other opportunities. All employees who lose their jobs through downsizing are often compensated, especially if the employmen t contract provides a severance pay policy (Baumol, Blinder, Wolff, 2003). There are rules and guidelines which organizations are required to abide by when downsizing.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More These include the provision of an early notice and the severance pay. Receiving a severance pay can be positive for some employees as it can enable them to boost their savings or fund their own business ventures (Mroczkowski Hanaoka, 1998). It’s depressing for a worker to hear that he/she will be laid off. However, this fact presents other opportunities which the employee might not have considered. Several organizations assist departing employees to secure alternative employment. Therefore, a dismissed employee may land a job that offers better pay and working conditions (Baumol, Blinder, Wolff, 2003). Negative effects As stated earlier, the negative effects of lo sing a job far outweigh the positive effects. The negative impacts can be broadly categorized into the psychological and financial effects. Most employees get shocked when learn about their sacking. Initial emotional reactions may include bitterness and anger towards the company. There are several other psychological effects that may come along the way. These effects commonly include depression, increased anxiety and subjective perceptions of incompetence (Mellahi Wilkinson, 2004). Job loss is also associated with increased incidences of suicide, risk of alcohol abuse and violent behavior (Tyler Wilkinson, 2007). Individuals who are downsized often develop negative views towards the administration and politics in general. They blame governments and the capitalistic systems of economy, and generally give pessimistic views on the economy (Cascio, 2002). Job loss almost always results into negative financial impacts on the dismissed employee. People construct their lifestyles based o n the regular income they receive (Mellahi Wilkinson, 2004). Some commit themselves to pay mortgages and other debts that are deducted on monthly basis. Losing a regular means of income can be financially devastating for an individual, especially if he/she cannot secure another job in the short term. The severance pay provided by the company might not last more than two months and therefore cannot effectively cushion a downsized employee.Advertising We will write a custom term paper sample on The implications of downsizing to the employees, communities and families of the employees specifically for you for only $16.05 $11/page Learn More In some cases, one can find himself/herself in a job that offers a lower pay and he/she is forced to change his/her lifestyle to accommodate the lower earnings. According to the data provided previously, more than 65% of people who lost their jobs through downsizing report being paid lower than what they were being pai d in their previous employment (Tyler Wilkinson, 2007). And many of them find new work in temporary or part time arrangements. Effects of Downsizing on Employee’s Families and the Community in General The impacts of downsizing are often felt beyond the dismissed person. His/her family and the larger community are subject the ripple effects of downsizing. An individual’s family may go through similar physical and psychological experiences as the downsized individual. These effects can be broadly classified as financial, social, and psychological effects. Effects of downsizing on the employee’s family The family of an individual who has lost his/her job may not be able to continue with the same lifestyle they had before. They are forced to cut their spending to accommodate themselves to the new reality. The family might be forced to forego some privileges they previously enjoyed. If the situation is not solved in the short term, the family may find it hard to mee t their basic needs. Job loss through downsizing can be socially devastating for the victim’s family. The family might be required to vacate their current home and look for a cheaper house elsewhere. Sometimes it reaches a point where one cannot pay rent or mortgage a house. For some people it may imply losing home through eviction or foreclosure. A family that finds itself in this situation may find it hard to survive. Finding a new house offers many social challenges which may include finding new friends and getting children to new unfamiliar schools. Changing schools negatively impacts children’s academic performance due to the fact that they are forced to abandon the educational setting that they are familiar with.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Families that have no emergency savings usually suffer the most. Basic things like food usually turn into luxuries that they can barely afford. As a result, many families address welfares associations to get money for food and other basic requirements (Tyler Wilkinson, 2007). The psychological effects are far much overwhelming as compared to the financial and social effects. Normally, the family members may go through anger, anxiety and bitterness that might accompany loss of employment. The tension that is built up due to anxiety causes a lot of friction in the family setup. Several studies have shown that loss of employment has contributed to the rise in divorce incidences (Mellahi Wilkinson, 2004). The reason for that is such families tend to quarrel and argue more. Other psychological impacts of downsizing that affect the entire family include low self-esteem, stigma, the feeling of being isolated, and depression (Cascio, 2002). The psychological effects may give rise to real health issues in the affected families. However, there are families that work through the difficulties and come out as a stronger unit. This normally depends on how the family members communicate during that period. Effects of downsizing on the community in general The economic effects of downsizing are not limited to the dismissed individuals and their families alone. Jobs usually provide â€Å"stability for individuals, their families and the communities they belong to. Salaries of the employed usually flow back to the community when they buy goods and services† (Hossfeld, Legerton, Dumas, Keuster, 2005). When mass layoffs are carried out, particularly in times of economic hardships, the effects tend to be felt throughout the community. A study carried out in Robeson County, NC, to identify the effects of loss of employment on the community, established that the loss of employment due to loss of manufacturing activity caused far reaching economic implications to the Robeso n community (Appendix 1). In times of widespread economic problems like the global financial crisis, many companies downsize to better manage their resources. When a significant number of employees lose their jobs as a result of widespread downsizings, the ripple effects are felt in the community. Other sectors, particularly the service sector, will register decreased profits as a result of reduced spending by their clients. Layoffs also increase the existing level of unemployment in the community. The unemployed members of the community usually find it hard to meet their basic needs. Studies have shown a high incidence of poor health in the unemployed. This includes disease such as diabetes, pneumonia, bronchitis, influenza, and other specific chronic illnesses (Sahdev, 2003). Children who are born in families with parents who have lost their employment are likely to have long-term educational and social problems (Mroczkowski Hanaoka, 1998). The family stress that is associated wi th the loss of employment has been identified as a major cause of behavioral problems in their children (Hossfeld, Legerton, Dumas, Keuster, 2005). Loss of work through downsizing and other causes also results into social divisions. In most cases, the less fortunate in the society are contempt to live less affluent older industrial areas. Effects of downsizing on the remaining employee’s morale Downsizing has been known to impact negatively on the morale of the remaining employees. Most employees acquire friends and mentors among people at their place of work. Such close people might be affected during a downsizing activity. The remaining employees may be affected in a number of ways that will impact his/her confidence levels, interpersonal relationships, and perception of job security (Sahdev, 2003). In today’s society, many people are spending more time with their coworkers as compared with their families. Many employees are usually heartbroken to see their coworker s sacked (Sahdev, 2003). Downsizing impacts heavily on the sense of familiarity and the support networks developed by employees (Sahdev, 2003). The trust that had existed between different sections of the company will need redevelopment. Apart from loosing key friends and colleagues, downsizing will cause fear among employees. The remaining employees may feel that they will be targeted in the next round of downsizing. Studies indicate that downsizings usually happen in waves, as the management experiments and gauges the effect. The fear that one might be targeted in the next round of downsizing affects his/her productivity. Such employees may begin to consider other options that are available to them even before they are laid off. Downsizing also affects the employee’s confidence in the employer. Most companies fire people when things are not working as expected. While the company may cease further downsizing, workers will be aware that other measures will be instituted to cu t spending. They might be subjected to pay cuts, lower allowances, and reduction of business trips among other cost cutting measures (Sahdev, 2003). This may result in a less motivated work force. Relevance of Downsizing as Measured by the Objectives Many companies usually find it necessary to reduce their work force in order to survive through hard times and achieve improved efficiency. However, studies indicate that the stated objectives of retention are rarely achieved by the organizations that indulge in the practice (Mroczkowski Hanaoka, 1998). A study conducted by Wyatt found that only a third of the 1,005 corporations included in the study, had gained from layoffs (Tyler Wilkinson, 2007). Less than a third part gained higher than what they had anticipated, while four out of five had to hire again to refill the vacant positions left after downsizing. Indeed downsizing only serves as a short term reprieve for the company. In the long term most companies are not able to show a ny gains from previous downsizing strategies. Some of the issues that affect companies after downsizing have been described above under the effects on the morale of the employees. The adverse effects associated with corporate downsizing can be partly related to the focus on the outgoing employees rather than those who remain back. Managers tend to concentrate on offering counseling, training and other support services to the laid off staff. While there is no doubt that the laid off staff need such services, it should not be done at the expense of the remaining employees, who are equally affected (Baumol, Blinder, Wolff, 2003). The effects of downsizing on the morale of the remaining employees have been discussed earlier in this paper. Companies that carry out downsizing should rethink the strategy because it is least likely to improve efficiency (Tyler Wilkinson, 2007). The practice only results into great psychological and physical suffering of the affected employees and their fa milies. Thus, firms should develop other strategies of dealing with short term financial problems rather than indulge downsizing activities. Many studies have shown that sacking is a practice that is negatively viewed both from inside and outside the organizations (Cascio, 2002). Conclusion This paper sought to establish the effects of downsizing on the employees, communities, and the families of the employees. The paper also aimed to discuss the current or future applications and relevance of downsizing. It has been established that downsizing impacts negatively on dismissed employees, their families, and the community in general. The effects are mainly economic, social, and psychological. The practice also negatively impacts on the remaining workforce and the reputation of the organization that indulges it. According to the findings of many research studies, downsizing is not that relevant as it does not serve the intended purpose in most cases and only creates a lot of suffering for the dismissed employees and their families. The practice has contributed to a significant level of rebellion against capitalism in several areas of the world (Mellahi Wilkinson, 2004). Downsizing should only be carried out in justifiable circumstances such as technology upgrade or major change in company’s operations. References Bain Company. (2010). Downsizing. Retrieved from Management Tools: https://www.bain.com/insights/management-tools-2011-downsizing Baumol, W., Blinder, A., Wolff, E. N. (2003). Downsizin in America:Reality, Causes  and Consequences. New York: Russell Sage Foundation. Cascio, F. W. (2002). Strategies for responsible restructuring. Academy of Management  Executive , 16(1): 80-91. Hossfeld, L., Legerton, M., Dumas, C., Keuster, G. (2005). The Economic and Social  Impact of Job Loss In Robeson County North Carolina 1993-2003. Lumberton:Center for Community Action. Mellahi, K., Wilkinson, A. (2004). Downsizing and Innovation Output: A Review of  literature and Research Propositions. London: British Academy of Management. Mroczkowski, T., Hanaoka, M. (1998). Effective downsizing strategies in Japan and America: Is there a convergence of employment practices? Academy of  Management Review , 22(1): 226-56. Sahdev, K. (2003). ‘Survivors’ reactions to downsizing. Human Resource Management  Journal , 13(4): 56–74. Tyler, M., Wilkinson, A. (2007). The Tyranny of Corporate Slenderness.  Understanding Organizations Anorexically, Work, Employment and Society , 21: 537-549. Appendix Appendix 1: Impact of loss of employment in Robeson County This term paper on The implications of downsizing to the employees, communities and families of the employees was written and submitted by user Adam D. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Example English Sentences of the Verb Beat

Example English Sentences of the Verb Beat A good writer should march to the beat of a different drum, except marching to that beat represents a cliche, something all writers should avoid. In the preceding sentence, beat wore the trappings of a noun, but, like many words, its versatile enough to perform additional duties as a verb or adjective. We will concern ourselves with examples of beat as a verb in all of its tenses, including in the active, passive, conditional, and modal forms. All Forms of Beat Base Form beat / Past Simple beat / Past Participle beaten / Gerund beating Present Simple I often beat my friends at chess. Present Simple Passive Jack is usually beaten by Mary in poker. Present Continuous Johnson is beating Anderson in the boxing match. Present Continuous Passive Anderson is being beaten by Johnson in the boxing match. Present Perfect Peter has beaten me at least fifty times at chess. Present Perfect Passive Ive have been beaten at chess at least fifty times by Peter. Present Perfect Continuous None Past Simple Jennifer beat me last week. Past Simple Passive I was beaten by Jennifer last week. Past Continuous I was beating Peter in that game when you walked in the door. Past Continuous Passive Peter was being beaten when you walked in the door. Past Perfect Tom had beaten Jane at least ten times before Jane finally won a match. Past Perfect Passive Jane had been beaten by Tom at least time times before she finally won a match. Past Perfect Continuous None Future (will) I will beat you the next time we play. Future (will) Passive She will be beaten in the next match. Future (going to) Look! Jack is going to beat Mark. Future (going to) Passive Look! Mark is going to be beaten by Mark. Future Continuous This time next week, Ill be beating you in our rematch. Future Perfect By the time you read this, he will have been beaten by his opponent. Future Possibility I think  she might beat Ralph in the next game. Real Conditional If she continues like this, she will beat her opponent. Unreal Conditional If she played better, she would beat Jack. Past Unreal Conditional If Peter had concentrated more, he would have beaten his opponent. Present Modal He should beat Mark. Past Modal They must have beaten their opponents. They are so much better at chess! Quiz: Conjugate With Beat Use the verb to beat to conjugate the following sentences. Quiz answers are below. In some cases, more than one answer may be correct. Jennifer _____ me last week.Tom _____ Jane at least ten times before Jane finally won a match.Johnson ______ Anderson in the boxing match.If Peter had concentrated more, he _____ his opponent.Look! Mark _____ by Mark.Peter _____ me at least fifty times at chess.Jack _____ usually _____ by Mary in poker.I often _____ my friends at chess.By the time you read this, he ______ by his opponent. Quiz Answers beathad beatenis beatingwould have beatenis going to be beaten  has beatenis beatenbeatwill have been beaten

Thursday, November 21, 2019

What microeconomic factors affect the role of U.S. gov't in the health Research Paper

What microeconomic factors affect the role of U.S. gov't in the health care system - Research Paper Example The quality and cost problems in the health care system, in United States, can be solved trough establishing a strong leadership from the federal government, and mobilizing and setting up the national priorities. This enhances development and promulgation of the standards in health care. The federal agency carries out these functions while the government designs the payment policies depending on performance standards, investment in information technology, and investment in research to improve the nationwide care (Greenfield 111–121). Health care in United States consumes a high percentage of gross domestic products, delivers diminishing values and eludes the remedies continuously. The present state of the healthcare represents functional and structural outcome of the historic contradictions that substantially damage the self organizing capacity. The changing political and economic cycles review show risks in the healthcare system. The improvement of quality healthcare in US requires stronger government leadership throughout the healthcare system. This does not preclude continued existence of the care system. Nonetheless, the strong federal leadership will enhance development and implementation of the strategies in enhancing the value from the government (Leatherman and McCarthy 305–312). The increased concern by the federal government for the costs in healthcare dates back to about fifteen years when accelerated the federal budget and costs on the national health after approval of Medicaid and Medicare. First proposals in health care cost strategies happened in 1970s. The Nixon administration advised the health policy experts during the health care crisis and proposed regulatory efforts and market policy. Administration envisioned to expand the health care maintenance organizations, HMOs, within five years time and enroll 40 million people in 1976. The