Monday, May 25, 2020

Is American Society Breed Mental Illness - 1250 Words

Nation of Anxiety Does American Society Breed Mental Illness? Over the past couple decades, disabling mental illness has drastically increased in the United States. Among these, Generalized Anxiety Disorder (GAD) is one of the most commonly diagnosed. According to the Anxiety and Depression Association Of America, GAD is characterized by persistent, excessive, and unrealistic worry about everyday things. This disorder is often linked with other anxiety disorders, such as depression and panic attacks. According to the Anxiety and Depression Association of America, New York Times columnist Marcia Angell summarizes that, â€Å"The tally of those who are so disabled by mental disorders that they qualify for Supplemental Security Income (SSI) increased nearly two and a half times between 1987 and 2007- from one in 184 Americans to one in 76.† In addition, Angell also conducted a large survey of adults between 2001 and 2003, sponsored by the National Institute of Mental Health and discovered that in their lifetime, â€Å"46 percent of Amer icans met the criteria established by the American Psychiatric Association for at least one mental illness.† Recent research has found that the amount of diagnosed mental illness cases have continued to significantly rise since 2003 alone. These startling statistics lead to the questions everyone has been scrambling to answer: Why? What is the cause of this epidemic? Is it all on account of recent overdiagnosis of psychiatric disorders? OrShow MoreRelatedThe Ways Oppressions Are Carried Out1481 Words   |  6 PagesAfrican Americans, the physically ill, and the mentally ill. In particular, the discrimination against the mentally ill becomes an interesting and unique history that has evolved due to Western medicine, and now effects the whole world. In many instances, it has become apparent that the symptoms and stigma surrounding the mentally ill stems from Western ideals as well. This paper explores this stigma, the ways oppressions are carried out, and how they are being dealt with. When society is confrontedRead MoreThe 2014 Isla Vista Massacre Essay612 Words   |  3 Pagesworldview. He also displays a deep hatred for minority races, specifically Asians and Black Americans. Ironically enough, Rodgers is half Malaysian. In one entry he describes watching an Indian man sitting with a white woman remarking on how disgusting and unfair it was. As the manifesto progresses Elliot Rodgers becomes increasingly aggressive, writing â€Å"Women should not have the right to choose who to mate and breed with. That decision should be made for them by rational men of intelligence. If womenRead MoreFreedom to Love Essays1088 Words   |  5 Pages    There are different kinds of partners in the world: Black, White, Asian, Straight, Gay, etc. However, not all of them are accepted by the society. Holding someone’s hand in public? It may be the sweetest, most innocent and natural of gesture of affection. However, when it comes to a couple wi th the same sex, things become completely different. People may think it is disgusting. Therefore, gay couples have to tolerate others’ disgust looks and nasty words, or sometimes even worse -- a punch. TheRead MoreEating Disorders And Its Impact On Society1646 Words   |  7 Pages Eating Disorders and Its Impact on Society Brett White Tallahassee Community College Psychology 1101 Michelle Peruche November 06, 2015 Abstract Eating disorders are very common in today’s society and can cause death if an intervention isn’t performed. While working in the hospital and being part of the wrestling team in high school I’ve witness several people with this disorder. Anorexia and bulimia are the most prevalent and generally are accompanied by another psychological disorderRead MorePersuasive Essay On Gun Control1178 Words   |  5 PagesVegas, Nevada. Over the course of 12 minutes, Paddock committed the worst mass shooting in modern American history. We must honor the victims and respect their memory, but we have to ask ourselves what we will do to prevent this in the future. The first and completely valid response to that question is enacting stricter gun control, but there is much more than that. We can increase funding for mental health treatment, we can take stricter security measures at hotels and concerts, however there isRead MoreThe Infringement of Animal Rights Essay1170 Words    |  5 Pagesserious mental illness. During a study the proved that animals helped this recovery process by providing empathy and therapy, providing connections that can assist in redeveloping social avenues, serving as â€Å"family† in the absence of or in addition to human family members, and supporting self-efficacy and strengthening a sense of empowerment. It seems as if pets provide more benefits than companionships (Green; Saedi; Wisdom, 2010). With an animal’s ability to help reduce symptoms of mental illnessRead MoreDog Abuse Is Wrong?1102 Words   |  5 Pagesthe animal. There are a lot of different types of dog abuse including physical, mental, and emotional abuse. Each type of abuse causes different types of pain to the dog. People do these cruel acts for a variety of different reasons. Dog Abuse is when a dog is beaten physically or mentally abused by verbal communication. â€Å"98% of Americans consider pets to be companions and members of the family† (American Humane Society 1).This means most pets aren t just considered animals they actually think ofRead MoreEugenics And Its Impact On Human Life1560 Words   |  7 Pageshave been explored. Eugenics is the scientific deal of improving human reproduction of genetic specifications of a particular race or breed. Positive Eugenics is relative to those who seem the most able and healthy with little to no history of medical abnormalities. The negative practice centers on manipulating those who are considered genetically weak in society, coercing these individuals to believe they are unfit for having children. Eugenicists believed that this practice would help to eliminateRead MoreUnfair America: Mentally Ill Inmates Essay1947 Words   |  8 PagesIndividuals suffering from mental illnesses tend to fall victim to the criminal justice system due to their uncontrollable actions that result from their mental illness symptoms. Within the United States two to three hundred thousand people in prison suffer from mental illnesses such as schizophrenia, severe depression, and bipolar disorder. Sadly, the majority of prisons are deficient in providing the appropriate resources to treat these individuals; people with mental illnesses are too frequentlyRead MoreThe Eugenics Of The Word Eugenics1626 Words   |  7 PagesThe word eugenics was first derived from the Greek word â€Å"eugenes† which means well-born. The goal of eugenics is to create and breed the utmost superior person through selection while picking out the good traits and eliminating the bad ones. Eugenics is the study of using methods to improve genetics by selective breeding (Eugenics, 2009). This came about because of the thought of being able to tell the difference between inferior and superior human beings. In 1883 the wo rd eugenics was first used

Tuesday, May 19, 2020

Credit Of The 1920 S - 894 Words

Credit In the 1920’s Unlimited money!Credit in the 1920’s was as unlimited money for people. More people were concerned about spending now and paying later. Americans became infatuated with credit. Most people were spending money they knew they couldn t pay off, this caused many Americans in the 1920’s to go into debt. Credit in the 1920’s vs the credit today has evolved , but the same selfishness overuse of it still remains.Americans in the 1920’s needed to be more educated in using credit. If they were less people would have gone into debt.This could have minimized the cause of the Great Depression. With the education of credit in the 1920’s people today will be less prone to conduct their mistakes, that leads to debt. Credit was born from Alfred Sloan, â€Å" He set up the nation s first national consumer credit agency in the 1919 to make his cars affordable†( Digital History). Sloan wanted to make money, sloan was convinced that Americans were willing to pay extra for luxury and prestige. Thus he he created credit so people would buy his cars, even if they were costly. With this new product many americans began to buy cars, clothes,furniture,household products,e.t.c. Pretty soon cars came a symbol of the new society forming in the 1920’s.†In that year, one American out of every 5 owned a car, compared to one out of every 37 English and out of every 40 French car owners†(Digital History). In other words Sloan didn’t care about lowering his price so that more people couldShow MoreRelatedThe Great Depression : The Worst Economic Slump1427 Words   |  6 Pagesextensive speculation of the 1920s. Underlining these two dominant influences was the republican government practises of the 1920’s under Harding, Coolidge and Hoover Governments. The Republican economic policies of the 1920 are contributed significantly to the Great Depression. Misdistribution of income existed on many levels within the US economy. Money was unevenly distributed between rich, middle class and poor, and between industry and agriculture. The 1920’s was an era of considerable growthRead MoreSimilarities And Differences Between The 1920s And 1950s908 Words   |  4 PagesThe 1920’s were a very important era in America for better or worse. There were many issues in relation to race and how people of different ethnic groups were treated. African American had a cultural rejuvenation that being the Harlem Renaissance. The advent of the Ford Model T change the way how people traveled. Many may say an era like the 1950’s were highly comparable. Race related issues were on a decline as America as whole sought to be more accepting and the oppressed started to speak out onRead More Causes Of The Great Depression Essay1699 Words   |  7 Pages  Ã‚  Ã‚  Ã‚  Ã‚  In 1929 the stock market crashed, triggering the worst depression eve r in U.S. history, which lasted for about a decade. During the 1920s, the unequal distribution of wealth and the stock market speculation combined to create an unstable economy by the end of the decade. The unequal distribution of the wealth had several outlets. Money was distributed between industry and agriculture within the U.S.; in social classes, between the rich and middle class; and lastly in world markets, between AmericaRead More Causes of the Great Depression Essay1143 Words   |  5 PagesCauses of the Great Depression Throughout the 1920’s, new industries and new methods of production led to prosperity in America. America was able to use its great supply of raw materials to produce steel, chemicals, glass, and machinery that became the foundation of an enormous boom in consumer goods (Samuelson, 2). Many US citizens invested on the stock market, speculating to make a quick profit. This great prosperity ended in October 1929. People began to fear that the boom was going toRead MoreThe American Dream And The Roaring Twenties1336 Words   |  6 PagesEnglish 11 9 March 2016 The American Dream and the Roaring Twenties The 1920’s was knows as the Roaring Twenties or the Jazz Age because of all the dramatic political and social change, more people lived in cities rather than farms, and the nation’s wealth doubled between 1920 and 1929. There were many new technological innovations and many factors that made the United States the place to be to find the â€Å"American Dream†. The 1920’s were known as the Roaring Twenties or The Jazz Age because of many thingsRead More The Great Depression Essay682 Words   |  3 Pagesgreatly unequal distribution of wealth throughout the 1920’s and the debts not paid back from WWI. nbsp;nbsp;nbsp;nbsp;nbsp;The distribution of wealth in the 1920’s, â€Å"roaring twenties,† was done with despair between the very wealthy and the lower classes, between industry and agriculture within the United States, between the U.S. and Europe. This imbalance of wealth created an unstable economy. The excessive assumption in the late 20’s kept the stock markets artificially high, which eventuallyRead MoreEssay about Roaring Twenties772 Words   |  4 Pages The Roaring Twenties The decade of 1920-1929 was a time of great change, reform, improvement, adjustment and alteration of everything Americans had come to rely on. In other words everything changed. Not one part of common life was unaffected. Exciting new events happened in sports, entertainment, science, politics, communication and transportation. It was the age of prohibition, it was the age of prosperity, and it was the age of downfall. The twenties were the age of everything. It has beenRead MoreRoaring Twenties Essay839 Words   |  4 PagesThe Roaring Twenties The decade of 1920-1929 was a time of great change, reform, improvement, adjustment and alteration of everything Americans had come to rely on. In other words everything changed. Not one part of common life was unaffected. Exciting new events happened in sports, entertainment, science, politics, communication and transportation. It was the age of prohibition, it was the age of prosperity, and it was the age of downfall. The twenties were the age of everything. It hasRead More The Evolution of the American Dream Essay1634 Words   |  7 PagesComparing the perspective of the American dream in the 1920’s to the American Dream in the 1940’s and present day seems to be a repeating cycle. The American dream is always evolving and changing. The American dream for present day is similar to the dream of the 1920’s. An Ideal of the American life is to conform to what our society has determined is success. Money, materialism and status had replaced the teachings of our founding fathers in the 1920’s. A return to family values and hard work found itsRead MoreEssay about The Roaring Twenties of the United States1474 Words   |  6 Pagesworld. In the 1920 ´s the United States economy was booming. This is a period of prosperity, when the country ´s economy is doing well and the people are sharing in it. This period was known as the roaring twenties ´. In this period many jobs were made more secure, many families had more to eat, electricity was widespread, many people had more leisure time and most had more money to spend. This essay will show why the United States economy boomed in the 1920 ´s. Foucault denied

Friday, May 15, 2020

Itzamná Mayan Supreme Being, Father of the Universe

Itzamnà ¡ (pronounced Eetz-am-NAH and sometimes spelled Itzam Na), is one of the most important of the Mayan pantheon of gods, the creator of the world and supreme father of the universe who ruled based on his esoteric knowledge, rather than his strength. Itzamns Power Itzamna was a fantastic mythological being that embodied the opposites of our world (earth-sky, life-death, male-female, light-dark). According to Maya mythology, Itzamnà ¡ was part of the supreme power couple, husband to the elder version of the goddess Ix Chel (Goddess O), and together they were parents of all the other gods. In the Mayan language, Itzamnà ¡ means caiman, lizard, or large fish. The Itz part of his name means a number of things, among them dew or stuff of the clouds in Quechua; divination or witchcraft in Colonial Yucatec; and foretell or contemplate, in the Nahuatl version of the word. As the supreme being he has several names, Kukulcan (underwater serpent or feathered snake) or Itzam Cab Ain, the Itzam Earth Caiman, but archaeologists refer to him prosaically as God D. Aspects of God D Itzamnà ¡ is credited with inventing writing and the sciences and bringing them to the Maya people. Often he is portrayed as an aged man, with the written form of his name including the Ahau for leadership alongside his conventional glyph. His name is sometimes prefixed by the Akbal sign, a symbol of blackness and night that at least to a degree associates Itzamnà ¡ with the moon. He is considered a force with multiple aspects, combining the earth, heavens, and underworld. He is associated with birth and creation, and maize. In Yucatan, during the Postclassic period, Itzamnà ¡ was also worshiped as the god of medicine. Illnesses associated with Itzamnà ¡ included chills, asthma, and respiratory ailments. Itzamnà ¡ was also connected with the sacred World Tree (ceiba), which for the Maya linked together the sky, earth, and Xibalba, the Mayan underworld. God D is described in ancient texts from sculpture and codices as a scribe (ah dzib) or learned person (idzat). He is the top god of the Mayan hierarchy of gods, and important representations of him appear at Copan (Altar D), Palenque (House E) and Piedras Negras (Stela 25). Images of Itzamn Drawings of Itzamnà ¡ in sculptures, codexes, and wall paintings illustrate him in several ways. He is often illustrated as a very old man seated on a throne facing other, subsidiary deities such as God N or L. In his human form, Itzamnà ¡ is portrayed as an old, wise priest with a hooked nose and large square eyes. He wears a tall cylindrical headdress with a beaded mirror, a hat that often resembles a flower with a long outpouring stream. Itzamnà ¡ is also often represented as a two-headed underwater serpent, a caiman, or a mix of human and caiman characteristics. The reptilian Itzamnà ¡, which archaeologists sometimes refer to as the Terrestrial, Bicephalic, and/or Celestial Monster, is thought to represent what the Maya considered the reptilian structure of the universe. In drawings of Itzamna in the underworld, God D takes the form of the skeletal representation of crocodiles. The Bird of Heaven One of the important manifestations of Itzamnà ¡ is the Bird of Heaven, Itzam Yeh, a bird often portrayed standing on top of the World Tree. This bird is usually identified with Vucub Caquix, the mythical monster killed by the hero twins Hunapuh and Xbalanque (One Hunter and Jaguar Deer) in the stories found in the Popol Vuh. The Bird of Heaven is a more than an associate of Itzamnà ¡, it is his counterpart, both a separate entity living alongside Itzamnà ¡ and sometimes Itzamnà ¡ himself, transformed. Sources This glossary entry is a part of the About.com guide to Maya Civilization  and the Dictionary of Archaeology. Boskovic A. 1989. The Meaning of Maya Myths. Anthropos 84(1/3):203-212.Grube N, editor. 2001. Maya Divine Kings of the Rain Forest. Cologne, Germany: Konemann. Kerr B, and Kerr J. 2005. The Way of God L: The Princeton Vase Revisited. Record of the Art Museum, Princeton University 64:71-79.Miller M, and Taube K. 1993. An Illustrated Dictionary of the Gods and Symbols of Ancient Mexico and the Maya. London: Thames and Hudson.Peck DT. 2005. Re-Examination of Spanish Colonial Period Documents Related to Prehistoric Maya History and Mythology. Revista de Historia de Amà ©rica 136:21-35.Taube K. 2001. Maya Deities. In: Evans ST, and Webster DL, editors. Archaeology of Ancient Mexico and Central America: An Encyclopedia. New York: Garland Publishing Inc. p 431-433.Taube KA. 1992. The Major Gods of Ancient Yucatan. Washington, DC: Dumbarton Oaks, Trustees for Harvard University. i-160 p. ​Updated by  Ã¢â‚¬â€¹Ã¢â‚¬â€¹K. Kris Hirst

Wednesday, May 6, 2020

The Epic Poem, Beowulf - A Jungian Reading of Beowulf Essay

A Jungian Reading of Beowulf The epic poem, Beowulf, depicts the battles and victories of the Anglo-Saxon warrior Beowulf, over man-eating monsters. The noble defender, Beowulf, constantly fought monsters and beasts to rid the land of evil. The most significant of these monsters, Grendel, represents Beowulfs shadow, the Jungian archetype explored in the essay collection, Meeting the Shadow. The character Grendel portrays the fallen self, which will assert itself violently if neglected, and must be overcome throughout life. The monster Grendel mirrors the part of our fallen state. Grendels ancestry leads to the biblical figure Cain, to which all evil can be attributed. Grendel represents the hidden evil of†¦show more content†¦Beowulf never finished fighting his demons. He defeated beasts in the sea, Grendel, Grendels mother, battled with the Swedes, and finally fought the dragon until his death. To defeat evil we must shed the grip that it has over us. Grendels hatred rose higher, but his power had gone. He twisted in pain, and the bleeding sinews deep in his shoulder snapped, muscle and bone split and broke (Burton 48). Beowulf disempowered Grendel by ripping of his arm. To rid ourselves from evil we must loosen its grip over us by eliminating its power. Grendel represents Beowulfs shadow. The suppressed shadow will surface to restore the imbalance in personal ity, like Grendel often surfaced from the swamp. Grendel is a symbol of the suppressed and unloved shadow, and he reeks terror on Herot to make his presence known. He represents the hidden neglected part of us. Every part of our personality that we do not love will become hostile to us(Bly 8). By storming into the mead hall and tearing the soldiers up before consuming them he represents this suppressed personality surfacing. Grendel is motivated by jealousy and anger. He is very envious and resentful towards the innocent people of the kingdom. He vents, and projects his anger onto society to restore a balance to Beowulfs personality. Grendel represents Beowulfs shadow. He is driven and motivated by the same things as Jungs description of the shadow. First of all, he represents the reaction of our shadow when it is

Analysis Of Cloud Computing And Cyber Security - 1695 Words

CLOUD COMPUTING AND NETWORK SECURITY ISSUES(Z5140305) Executive Summary In this fast-paced technology era, organizations are always looking for new innovative ways to increase productivity and efficiency. One emerging technology adopted by many organisations is cloud computing. Cloud computing is a model that uses internet and remote servers for maintaining data and applications (Association of Modern Technologies Professionals 2017). It replaces expensive infrastructure and need of maintenance. Cloud provides access to data anytime, anywhere over the internet. However, like any cyber technology cloud computing is vulnerable to various kinds of cyber-attacks (Amna Riaz 2017). The large scale of cloud computing and virtualization†¦show more content†¦HIDS and NIDS have their own strength and limitations. HIDS is not well suited to provide visibility in the Virtual machines (VMs) (Amna Riaz 2017). NIDS can be employed within the Virtual machines but would be incapable of detecting attacks occurring within the network (C. Modi 2013, p.49). Various other techniques have been studied where NIDS can be provided at the Virtual switch to collects inbound and outbound traffic from all VMs and log it. Use of security onion tools such as SNORT could help to detect DoS or DDoS attack. However, processing all packets in large virtual network could create issue and it may fail to detect attacks in time (Amna Riaz 2017). Using OSSEC as HIDS in the cloud computing could help to resolve analysing and integrating the huge log files. OSSEC is an open source host-based intrusion detection system (HIDS). It has a powerful association and analysis mechanism, active response and real-time alerting (C. Ambikavathi and S. K. Srivatsa 2016, p. 4). Software-defined networking (SDN) is next evolving technology for the cloud computing as it provides a centralized system to manage the network. Scalable monitoring and dynamic reconfiguration requirements of the network makes SDN a perfect choice (Amna Riaz 2017). Our aim in this document is to provide an informative primer on security issues of the cloud computing and various IDS tools to combat the security issues. We concluded the document after analysing that every process has itsShow MoreRelatedImpact Of Legislation On State Of Maryland1210 Words   |  5 Pagesthis paper is to research and evaluate the legislative drivers for information security programs of State of Maryland in order to improve the information security policy to prevent loss of the confidentiality, integrity and availability of agency operations, organizational assets or individuals with new amendments in legislation. This paper elaborates the objectives of five proposals that would impact the information security policy of the State of Maryland upon becoming legislation. State of MarylandRead MoreCyber Security : A New Form Of Crime1594 Words   |  7 Pages Cyber Security is considered to be one of the hot topics in modern era. It is a national security challenge that the United States and other countries face today. Cyber Security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. While the Internet has been providing immense opportunities to individuals, organizations, and nations in diverse areas, at the same time it has also given birth to a new form of crime – cybercrimeRead MoreVirtual Machine Intrusions939 Words   |  4 Pagescontinues to work unaffectedly even in the presence of an intrusion. This capability is missing in HIDS and NIDS. In the case of a compromise, HIDS starts reporting falsely while NIDS has limited visibility (Amna Riaz 2017). Analysis of Intrusions Detection tools for Cloud Computing Each IDS technique has its own strengths and limitations. HIDS deployed on a virtual machine comes with the inherent flaw of low attack resistance (). It provides good visibility into the system; however, a HIDS on theRead MoreCloud Based Solutions for Computer Aided Engineering804 Words   |  3 PagesCloud Based Solutions for Computer Aided Engineering As cloud computing and services become increasing popular, companies like Autodesk and Ciespace are providing cloud based solutions for computer-aided engineering (CAE). The various computer software used to aid in engineering simulation and analysis tasks will be provided as a services. The cloud based CAE have various advantages over non-cloud based CAE. It is more convenient, cheaper and efficient. Cloud based CAE is more convenient, as it allowsRead MoreMarketing Analysis : Diamond Security1576 Words   |  7 Pages DIAMOND SECURITY CONSULTANTS Mohammad Iqbal Saint Leo University FL COM-514 EXECUTIVE SUMMARY Diamond Security Consultants provides Cyber Security training and Education to companies specifically in User Awareness training against the social engineering attacks and mechanism in ten countries across the world and expanding specifically in the Middle East. Our offices need to communicate through the professional email account with our business domain and video conferencing onRead MoreInternal Controls And Audit Procedures For Cloud Computing1350 Words   |  6 PagesIntroduction The popularity of cloud computing has dramatically increased because it is so easy to implement and can be a more cost effective way to provide remote access to corporate data. Since the hardware and software is owned by a third party, the upgrade and maintenance costs are the responsibility of the third party and this can be a significant gain for business that no longer have to absorb those costs. Even though cloud computing seems to be more cost effective than having those servicesRead MoreGovernmental Support For Cyber Physical System Research1006 Words   |  5 PagesGovernmental Support for Cyber Physical System Research Cyber Physical Systems research has garner support from several sectors within the public and private sector. NITRD has supported CPS SSG ( Senior Steering Groups) that supports Research and development (RD), budgets , policy endorsements, Joint planning program, and training CPS works in coordination with academia. Other activities perform with CP SSG is recommendation for Federal CPS RD priorities. CPS coordinate with otherRead MoreCloud Computing1303 Words   |  6 PagesCloud Computing CIS 500 August 28, 2012 Introduction The world is turning to cloud computing to manage data. Businesses are at the forefront of this new trend with companies such as Google, Amazon, Microsoft, and others leading the way by providing these services. What exactly is cloud computing? According to Turban amp; Volonino (2011), cloud computing is Internet- based computing in which shared resources (such as hard drives for storage) and software apps are provided to computers andRead MoreSecurity Enhancement Strategies And Strategies1660 Words   |  7 Pages VI. SECURITY ENHANCEMENT STRATEGIES: Some of the strategies and defensive measures that can be incorporated in the cloud environment to overcome the threats and challenges mentioned in the above section are as follows. In order to provide protection to the computer system and to the network, Intrusion Detection System (IDS) could be employed, which will detect hostile activities in the host or network and generates alerts to provide notifications regarding such malicious intrusions. IDS also hasRead MoreRisk Assessment Is The Top Priority For Any Type Is Impenetrable1671 Words   |  7 Pagesare very vulnerable to any holes that are within its infrastructure. In fact, many may believe that they have the best security measures in place, but no system or network of any type is impenetrable (Trim Lee, 2014). Risk assessments are extremely necessary so that corrective countermeasures can be applied and overall security can be enhanced (Broder Tucker, 2011). Security should ensure that this is the top priority for any company or organization. A detailed risk assessment shows which policies

Project Delivery Methods-Free-Samples for Students-Myassignment

Question: Analyse various Project Delivery Methods. Answer: Introduction WestLINK aim at increasing the chances of success of this project by integrating the design and management of the activities. Thus, this report briefly analyses various project delivery methods and recommend the best option based on the various assumptions and rationale. Some of the project delivery methods that are briefly highlighted include design-bid-build, design-build and CM@Risk among others. The report further highlights various types of financial contract based on the most relevant project criteria. The discussed financial contract type must be the most pertinent for this type of project and include Lump sum, guaranteed maximum price and cost plus fixed fee contracts. Lastly, the report analysis and recommend the most viable procurement method that can be used to widen the project scope and size. Specifically, the report evaluates Competitive, Best value and Negotiated procurement methods and recommends the most suitable one for a process of this magnitude. Background of case study The case involve the preparation of a comprehensive plan for a client on how to select the best and most viable project delivery system, the financial contract type and the most relevant procurement procedure. The Sydney motorway network is embarking on the improvement and construction of various roads to supplement the existing one. In order to attract funding from the Australian Government to effectively execute the project, this plan is necessary. The proposal will ensure effective monitoring of the quality of the work and ensure relevant approaches are undertaken towards the completion of the project. Some of the inherent challenges that necessitate such a plan include the companys inability to sustain the fast-tracking and control of related costs. Correspondingly, without such a plan, it will be difficult for the company to ensure that workers are safe from the massive traffic from Paramatta road given that more than 140,000 vehicles occasionally move through the corridor. Besi des, a strict 2023 deadline for the project completion implies that WestLINK must adhere to the specified plan that is subsequently detailed. Project delivery methods According to Mollaoglu-Korkmaz et al. (2011), project delivery method refers to a detailed system that is used in the organization and financing specific projects, facilitating operations and maintaining related services. Specifically, project delivery involves such processes and mechanisms involve in the design and building projects. WestLINK must enter into a contractual relationship with the Australian government among other important agencies to effectively design and successfully construct the project. There are numerous factors that influences the selection of project delivery methods. For instance, the experience of the company to the contacted, qualifications and capabilities must be taken into consideration. Likewise, the scale, form, purpose and project complexity are also important factors that cannot be ignored whatsoever (Harold Kerzner, 2013). A project sequence, establishment of timelines, costs and the inherent ability to fast-track project progress are other important factors that will influence project delivery methods (Laslo, 2010). GOALS/CRITERIA CRITERIA WEIGHT Project delivery methods Design-bid-build Design-build CM@Risk Score Weighted score Score Weighted score Score Weighted score Project delivery speed 30 5 150 8 240 5 150 Seamless communication 20 5 100 5 100 5 100 Cost control 30 4 120 6 180 6 180 Work with local subcontractors 20 5 100 6 120 5 100 Total 470 640 530 Design-build with a weighted score of 640 is recommended. This method involves a single entity that is responsible for the design and construction of the project. The company responsible for the project design must ensure that all relevant performance specifications are met before suggesting the start of the actual project (Harold Kerzner, 2013). A single contractor is tasked with developing a contractual relationship with the project owners to identify related costs and better their relations at early stages. The figure below shows this relationship. Under this project delivery method, the involvement of a single entity will save the project owner from the typically difficult bidding process, enhance communication and facilitate effective control and design of the project (Kent Becerik-Gerber, 2010). However, the project owner must give clear details on the specific need and objectives of the project coupled with regular management of the contract to ensure absolute understanding of the stipulated activities (Burke, 2013). Also, the project owner has limited option on the choice of the most appropriate project subcontractor and this may significantly affect delivery. This report recommend this project delivery method to execute the specified construction activities. Under this project delivery method, the project owner is required to seek professional design services who will provide a detailed project design before initiating the actual construction activities. The project is opts to unify such relevant entities to conduct the design and construction activities. According to Mollaoglu-Korkmaz et al. (2011), the best project delivery method must adhere to various financial, organizational and time constraints that are clearly stipulated under the agreement. As outlined in the figure above, the project owner contracts a project design professional who may include a design-build professional and subsequently seeks the services of a general contractor who will facilitate construction process (Kent Becerik-Gerber, 2010). This project delivery method is recommended because it is tested and both the project owner and contractor have increased control and involvement in the design process. The table below gives a summary of recommended project delivery system. Project delivery system Project deliver roles Owner decision maker Project management Design Contracting Construction Coordination of construction Construction coordination and administration Design- build Owner (O) General contractor (GC) GC GC GC O GC and O General contr. owner CM CM GC GC GC CM Advisory mgmt. Owner Construction manager (CM) CM O GC CM CM The delivery method is also appropriate because the project has a strict 2023 deadline, and WestLINK is absolutely committed towards meeting the stipulated deadline without any significant cost overrun. The contractor and owner will also be able to fast trace the construction phases and identify possible costs earlier enough. The contractor is also solely responsible for any risk in the design and this is explicitly stipulated in the contractual agreement (Meskendahl, 2010). Financial contract type: Lump Sum contract GOALS/CRITERIA CRITERIA WEIGHT Financial contract types Lump Sum Unit price GMP CPFF Score Weighted score Score Weighted score Score Weighted score Score Weighted score Project delivery speed 30 7 210 5 150 4 120 5 150 Cost control 20 6 120 6 120 5 100 4 80 Quality work 25 6 150 4 100 6 150 6 150 Risk sharing 25 4 100 6 150 5 125 4 100 Total 100 580 520 495 480 After selecting the best project delivery system for the execution of the project, WestLINK must select the most appropriate contract type that will facilitate the process based on the above criteria. According to Mollaoglu-Korkmaz et al. (2011), a contract refers to an agreement between two or more individuals or bodies to avail specified tasks in exchange for certain payment or compensation. However, contract type highlights the layout that will be used to pay for the services that are stipulated under the contract. The recommended financial contract for this project is lump sum (also known as fixed price contract) with a total weighted score of 580. Under this contract, the project owner is obligated to pay the contractor a particular amount for completing a scale or work without necessarily providing a comprehensive cost breakdown. Specifically, the project owner agrees to pay the contractor an indicated contracted amount after the contract has been validated (Touran et al., 2010). The contractor is solely responsible for any cost overrun and can only issue a change not related to costs in the contract through an official order to the owner. Cost overruns can be as a result of the escalated cost of building materials, poor supplier performance and possible labour unrests. A single lump sum price is all that the project owner is obligated to pay the contractor before the validation of the contract (Schwalbe, 2015). Also, given the strict 2023 project deadline, the contractor must complete the project within the stipulated fixed cost under the agreement. The contractor can make profit from this contract is the project costs are below the estimated expenses (Kerzner, 2013). Also, the project owner is not eligible to claim the remaining amount after project completion. This type of contract is recommended because it eliminates the need for extensive project design and administration. Thus, the project owner must first give a clear definition of the project to enable the contractor to give a rough estimate of the total costs (Kerzner, 2013). If the project owner has a relatively tight time-frame, limited construction experience or tight budget constraints, then this type of financial contract is recommended. According to Mollaoglu-Korkmaz et al. (2011), lump sum contract obligates the contractor to avail specified services under the fixed lump sum amount as postulated under the contractual agreement. Under this contract type, if the estimated costs goes up, the profits are likely to go down. Procurement method: Negotiated contract GOALS/CRITERIA CRITERIA WEIGHT Procurement method Competitive Negotiated Best Value Score Weighted score Score Weighted score Score Weighted score Project delivery speed 35 4 140 8 280 6 210 Product quality 35 6 210 7 245 6 210 Selection flexibility 30 5 150 5 150 5 150 Total 100 560 675 570 Projct owners are tasked with selecting the best contractor based on the price, speed quality of previous work or a combination of both (Touran et al., 2010). The project owner should conduct a comprehensive assessment of the contractors and make the best decision. The recommended procurement method for selecting a contractor for a project of this magnitude is the negotiated contract with a weighted score of 675. Under this procurement method, a contractor is pre-selected based on market reputation and general qualification for the project (Pinto, 2007). The method is time saving as there are no bidding processes allowing the construction activities to start and move as quickly as possible. References Burke, R. (2013). Project management: planning and control techniques.New Jersey, USA. DESIGN-BUILD DONE RIGHT. A DESIGN-BUILD INSTITUTE OF AMERICA PUBLICATION, April 2015 Harold Kerzner, (2013) Project Management: A System Approach to Planning, Scheduling, and Controlling. Chapter 19. Kent, D. C., Becerik-Gerber, B. (2010). Understanding construction industry experience and attitudes toward integrated project delivery.Journal of construction engineering and management,136(8), 815-825. Kerzner, H. (2011).Using the project management maturity model: strategic planning for project management. John Wiley Sons. Kerzner, H. (2013).Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Laslo, Z. (2010). Project portfolio management: An integrated method for resource planning and scheduling to minimize planning/scheduling-dependent expenses.International journal of project management,28(6), 609-618. Meskendahl, S. (2010). The influence of business strategy on project portfolio management and its successa conceptual framework.International Journal of Project Management,28(8), 807-817. Mollaoglu-Korkmaz, S., Swarup, L., Riley, D. (2011). Delivering sustainable, high-performance buildings: Influence of project delivery methods on integration and project outcomes.Journal of Management in Engineering,29(1), 71-78. Pinto, J. K. (2007).Project management: achieving competitive advantage. Upper Saddle River, NJ, USA: Pearson/Prentice Hall. Schwalbe, K. (2015).Information technology project management. Cengage Learning. Touran, A., Gransberg, D. D., Molenaar, K. R., Ghavamifar, K. (2010). Selection of project delivery method in transit: Drivers and objectives.Journal of Management in Engineering,27(1), 21-27.

Tuesday, May 5, 2020

Fundamentals Of Entrepreneurship Business †Myassignmenthelp.Com

Question: Discuss About The Fundamentals Of Entrepreneurship Business? Answer: Introducation With the advent of modern technology and the increased usage of the Internet due to reasons like reduced cost of data and availability of data, common people have become more and more dependent on the internet to lead their livelihood. Starting from booking a cab to buying clothes and accessories online and also booking a doctors appointment everything is possible through internet and Smartphone. The world has crunched in its size thanks to the increased use of internet and internet based applications (Barnes and Hunt 2013). Type of industry: The industry that the business will be operation on is the e-commerce or the e-market, this is a virtual place of business that exists and is in full rage now. Jeff Bezos the owner of an e-commerce giant, Amazon, has recently been awarded the title of the worlds richest person. Hence it can be clearly understood that there is a huge capacity of this market if it is used wisely and with proper planning. The E-market is a place that has a lot of pros and cons and the biggest pro being the braking of the geographical barrier opening a wider scope of the target market. One of the major cons of the e-commerce sector is that an individual cannot use the service that is being offered if he or she does not have a Smartphone or a computer with working internet plan (Awa, Ojiabo and Emecheta 2015). Mission statement: The vision and mission this new business idea is to create a positive thinking for the online grocery material purchasing. To make the consumers understand the optimum utility of the service. Another positive and innovative point of this application will be the choice of shop from where the consumers will receive their desired product at their door step. In this way the retail stores also can sing up and supply the products without being out of business (Ong and The 2016). Business Model: The suggested name of the service and the new business idea is DELIGROCE. It would include an internet based mobile application that can be downloaded from App store. The city which is suggested to be the point of inception of the operation is Adelaide. Adelaide is a geographically smaller city in comparison to others in Australia, but it has a youthful crowd who use internet on a daily basis and are also open to new and innovative ideas of livelihood hence Adelaide will prove to be a good start to the new business. First of all technical support will be required in order to develop an application based portal which is not only user friendly and easy to use but also has two sides to it one is the consumer end and the other is the vendors end. The business model of the new idea will flow a two course path that is going to run parallel to each other. One is the vendor side and the other is the customer side. To combat the busy time table that individuals lead nowadays there are several services that are available in the internet. This business model also follows the same path as the customer side of the model is planned and designed in a way that the time and effort of the consumers are reduced so that they can indulge their time in something more worthwhile. But, there is always a trust issue with the products that are available in the virtual world, especially if the products are in the perishable goods category and most groceries are in this category. To deal with this dilemma of the consumers there is the vendor side of the model, which is to sign up with local grocery stores that the consumers usually visit and trust so that along with the products the customers can also choose the stores from which the products are go ing to be bought. Good quality products are going to be delivered by the suppliers and grocery shops, the shops will pack the orders received from the mobile application and supply it to the delivery partners of the company. The idea is to remove the hoarding of the inventories and stocks as the market is dealing with goods that can easily be perished therefore cutting on a large amount of capital investment on the stocking of inventories and warehousing charges etc (Chaffey 2015). Description of the Industry Future outlook and trends In todays world the schedule that an individual follows is very bus and hence there is an upward trend of the internet based market. As it saves time and effort of the people it is growing and gaining popularity with the reduced cost of internet and data plans. In the next five years the expectation of the consumers form the e-commerce sector is going to increase and hence there is a lot of opportunity for the business to upgrade and expand in other cities as well. There is drone delivery system in 30 minutes and virtual trying of clothes and shoes also possible. Analysis of Competitors There are a number of players in this market already as it has a lot of opportunities the biggest threat being the supermarket retailer giant Aldi. It is a retail market but it has a strong presence online as well. In a very little time the company has garnered a lot of good reputation in the Australian sector as well owing to the reasonable cost and high quality products that they offer. As Aldi has a home grown brand it can offer very low price of products and offer high quality (Kurnia et al. 2015). The business model is a little different form that of the DELIGROCE as in this business model the products are going to be delivered from a selected store to the consumer and the business itself will not own any products of its own. It will just as service providers for delivery of fresh and high quality grocery from the selected stores. Grocery Run is another major competitor some of the services that it offers are $9.99 flat shipping rate all over Australia which is a big marketing plus point for the company, apart from that it also offers great discounts on items. Furthermore, customers usually like to physically check grocery items such as fruit, vegetables, meat and eggs before purchasing them; hence the retail is a big competition to the market (Falk and Hagsten 2015). Here is a list of other potential competitors: Woolworths Coles Harris Farm Australian Farmers Direct Shopwings Industry and Market forecasts he market of the retail grocery is lead by some of the big players like Metcash, Wesfarmers, Woolworths Limited, Aldi and many more and hence the online service of grocery is still yet to gain popularity even among the urban population. In the last financial year 2016-17 and considering the numbers of the past five years, industry revenue has seen an upward rise and opportunity and the approx number that is annualized 15.8%, to reach $2.7 billion. The target market of the industry is still dealing with the new idea of buying groceries online as there is a huge possibility of getting tampered goods because the market deals in perishable items as well. The widespread set of connections of the significant supermarket chains of Australia like Coles and Woolworths, the proximity of the stores form the location of the people have made the online industry of groceries a tough competition as people get a local store very close to their house or locality where they can choose the desired good s from the aisle of these store. The online grocery industry in Australian is expected to grow in its capacity to be worth AU$5.8bn in 2020, which is over twice its current value of AU$2.7bn. Currently the sales of the online market are at 2.3%, which is analyzed to grow to 4.1% of online grocery sales by 2020 (retailanalysis.igd.com, 2017). Technology Plan Description of technology The technology that is required for the inception of the business plan is mainly an application development that is going to be available both in the android play store and also in ISO app store. the application must have some of these features: User-friendly, easy to download, easy to sign in, a section of notes where a person can set reminders, an option on uploading documents which is necessarily the list of items so that the items can automatically move in to the cart of the account. There should also be an analysis metrics in the app which will analyze the buying trend of the consumer and give the customer options while purchasing suggesting new and upgraded products. There also should be a provision for the customers to give the vendors review so that more and more people can order form a particular store, this can be used as a shared marketing tool with the business. Another important aspect of the business is partnering up with a delivery service which is going to serve the company and help the business with the logistics (Cosenz and Cosenz 2017). Technology comparison Most of the application of the online grocery market deal with similar kind of application based program where the customer can pick and choose form by looking at the pictures. There are several companies which offer free shipping after a certain amount along with 24 hrs delivery service. There also provisions available for return of items that the customer did not like. There are applications and websites who just focus on home grown items and encourage Australian vendors. A lot of these plans can be imitated by DELIGROCE as well in the future (Kaptein and Parvinen 2015). Commercialization requirement he first requirement is to understand the local customer and the mind set along with it build al list of supermarkets and local stores who are the potential vendors of the company. The user interface of the application has to be attractive and at the same time engaging for the customers to understand the application easily and use it without any hassle. There should be a GPS navigator built in to connect with the delivery boys in no and keep in contact with them (Fernie and Sparks 2014). The resources that are required to develop this internet based application for both the Android and IOS module is first skilled and trained software technician, a partnership with a friend of the entrepreneur who owns an application designing company is proposed. The next import resource that is required by the company is a trained business development and marketing team who will present the companies and bring aboard vendors by analyzing and identifying a list of supermarkets and local grocery stores. Another major requirement of the initial start up of the business is a content team who will manage the basic content of the application (Brooks, Heffner and Henderson 2014). Marketing Plan Market segment Demographic: The target market of the business is people who buy their own grocery 20-60 years old. Geographic: Initially the geographic area that is going to be focus on is Adelaide. Psychographic: People who have a busy lifestyle and want to take out time form their busy schedule to indulge in some quality time with oneself or friends and family. Behavioral: A person who is tech savvy and understands the usage of such applications, someone who is a regular e-commerce website user, and is not skeptic about the quality of service offered by e-commerce websites and applications (Hennart 2014). Product and service The company is going to offer a service to the customers of delivering the groceries that can be ordered online via an application. On the vendor end, the company is going to offer a platform for the local grocery stores to set up an online presence and reach out to people who are their potential customers (Turban et al. 2015). Pricing he price will be two folds one form the customers end and one from the vendors end. The delivery charges are kept at the minimum and will be free after a certain point of purchase. From the vendors end it will be a contract of the service for 6months, 8months and 12 months option to choose form. The vendors can renew their contract on the basis of their choice. Distribution The distribution of the products will be done by the delivery partner and the delivery will be monitored by the GPS system that will be developed for the app and for the back end usage. Promotion Promotion of the business will be done via medium which is most used by the target market. Digital and internet based marketing is the best option for the business (Rawat and Divekar 2014). Financial Plan Break even Analysis Monthly Revenue Break-even $65,000 Assumptions: Average Percent Variable Cost 30% Estimated Monthly Fixed Cost $46,925 Pro Forma Cash flow Statement Starting Cash Position Inflow (individual investment) Sales from customers Sales from vendors Other Cash Receipts Total Cash Inflow Outflow (Use of Fund) Fixed Cost Administration Marketing Operations Total Cash Outflow Closing Cash Position Production plan The production of the technology is given to another firm which specializes in the technology development sector. This firm belongs to the friend of the entrepreneur and hence a mutual benefit and understanding will be much better than any other outsourced unit. The company will be offering a service and not a product hence the option of production is unavailable but for a service industry as well has a production procedure in this case is the development of the technology is part of the production (Cannone and Ughetto 2014). Organizational plan Form of Ownership The form of ownership of the business is sole proprietorship where the entrepreneur is the sole owner and the receiver of any profit that is drawn from the business. He or she is the person who is the risk taker and the risk barer of the company. Identification of Partners The firm will need collaboration with the technology support company and will also have a delivery partner of the venture to begin with. Both the technology and the delivery are significant to the company, the future plans are to set up own logistics phase in the future while expanding the business. Organizational Structure It is an independent venture and will be released at small scale only for the customers in the Adelaide area. The entrepreneur of the company is the person who is all in all in the management. Apart from that there is a marketing and business head along with a content manager in the establishment. There are around seventeen employees in the marketing, operation and the content team. Operational plan The aim is to launch the application as soon as possible as the online grocery market of Australia is expected is the eight largest in the world with full potential to grow exponentially over the next five years. Before the launch some promotional activity will occur to kick start the download process. Six months before the launch the application will be used extensively by the technology team to understand and deal with the short comings (Wang et al. 2016). Summary The prospect of this business is dependent on the acceptance of the idea among the urban population of Adelaide. There is tough competition of the retail stores on the online front in the grocery sector. The development of the application and the smooth running of the app will the prime focus at the initial stages. While, the marketing team at the will concentrate on finding the vendors to participate and collaborate with the application. By the end of the first financial year there is an expected growth in the industry and in the outlook of people hence focusing on expanding in other adjacent cities as well. Reference List: Awa, H.O., Ojiabo, O.U. and Emecheta, B.C., 2015. Integrating TAM, TPB and TOE frameworks and expanding their characteristic constructs for e-commerce adoption by SMEs.Journal of Science Technology Policy Management,6(1), pp.76-94. Barnes, S. and Hunt, B. eds., 2013.E-commerce and v-business. Routledge. Brooks, G., Heffner, A. and Henderson, D., 2014. A SWOT analysis of competitive knowledge from social media for a small start-up business.The Review of Business Information Systems (Online),18(1), p.23. Cannone, G. and Ughetto, E., 2014. Born globals: A cross-country survey on high-tech start-ups.International Business Review,23(1), pp.272-283. Chaffey, D., 2015.Digital business and E-commerce management. Pearson Education Limited. Cosenz, F. and Cosenz, F., 2017. Supporting start-up business model design through system dynamics modelling.Management Decision,55(1), pp.57-80. Falk, M. and Hagsten, E., 2015. E-commerce trends and impacts across Europe.International Journal of Production Economics,170, pp.357-369. Fernie, J. and Sparks, L., 2014.Logistics and retail management: emerging issues and new challenges in the retail supply chain. Kogan page publishers. Galliers, R.D. and Leidner, D.E. eds., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Hennart, J.F., 2014. The accidental internationalists: a theory of born globals.Entrepreneurship Theory and Practice,38(1), pp.117-135. Kaptein, M. and Parvinen, P., 2015. Advancing e-commerce personalization: Process framework and case study.International Journal of Electronic Commerce,19(3), pp.7-33. Kurnia, S., Choudrie, J., Mahbubur, R.M. and Alzougool, B., 2015. E-commerce technology adoption: A Malaysian grocery SME retail sector study.Journal of Business Research,68(9), pp.1906-1918. Ong, C.E. and Teh, D., 2016. Redress procedures expected by consumers during a business-to-consumer e-commerce dispute.Electronic Commerce Research and Applications,17, pp.150-160. Rawat, S. and Divekar, R., 2014. Developing a Social Media Presence Strategy for an E-commerce Business.Procedia Economics and Finance,11, pp.626-634. retailanalysis.igd.com. (2017).Australias online grocery market set to double. [online] Available at: https://retailanalysis.igd.com/news/news-article/t/australias-online-grocery-market-set-to-double/i/10350 [Accessed 9 Sep. 2017]. Turban, E., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2015.Electronic commerce: A managerial and social networks perspective. Springer. Wang, K.J., Widagdo, J., Lin, Y.S., Yang, H.L. and Hsiao, S.L., 2016. A service innovation framework for start-up firms by integrating service experience engineering approach and capability maturity model.Service Business,10(4), pp.867-916.