Wednesday, December 25, 2019

The Difference Between The Women Situation Of Ireland From...

Introduction The aim of this report is to compare the difference between the women situation in Ireland from the independence till the present day, how it changed during those years. One of the biggest impacts to Irish society in the past 50 years has been the changing the role of women, with more females participating in the workforce and more in professional positions – and this has caused relationship and family dynamics to shift. Until the last few years of the twentieth century Ireland was the most sexually repressed country in Europe, where women were classed as the second type citizens and the Catholic Church ruled virtually unchallenged. Church and state maintained that women should hold a certain morality, particularly relating to areas of sexuality and reproduction. As a result, until relatively recently, Irish women’s issues remained largely ignored and therefore unremarked upon. (Irish Constitution 1922) One of the questions facing the Cosgrave government in 1922 with the establishment of the Irish Free State was the role of women in the new State. The 1916 Proclamation of the Republic had claimed the â€Å"allegiance of every Irishman and Irishwoman† and guaranteed â€Å"equal rights and equal opportunities to all its citizens†. All had their hopes dashed. Both governments led by Cosgrave in the 1920s and Fianna Fail governments led by de Valera in the 1930s enacted legislation depriving women of a number of rights. In 1924, the government proposed to exempt allShow MoreRelatedWho Goes with Fergus11452 Words   |  46 Pageswisdom of nature. He exhorts young men and women alike to leave off brooding over loves bitter mystery and to turn instead to the mysterious order of nature, over which Fergus rules. Analysis This short poem is full of mystery and complexity. It was James Joyces favorite poem, and figures in his famous novel Ulysses, where Stephen Daedalus sings it to his dying mother. On one level, the poem represents Yeats exhortation to the young men and women of his day to give over their political and emotionalRead MoreReligions and War Essay3499 Words   |  14 Pages1. Introduction: Religions and the Holy Texts Those who believe (in the Quran), and those who follow the Jewish (scriptures), and the Christians...and (all) who believe in God and the last day and work righteousness, shall have their reward with their Lord; on them shall be no fear, nor shall they grieve.1 How true is this statement and to what extent do religions not fight each other? Unfortunately, looking back at the holy texts of various religions provides no answers. There are elementsRead MoreEssay on Religious Justifications of Slavery in the Caribbean3525 Words   |  15 PagesJesus Christ is the Son of God, and choose to follow him. Such a statement leaves little room for interpretation of the scripture itself. Nevertheless, the nineteenth century Christian churches of the Caribbean Islands created a racial distinction between humans which determined who could and who could not be granted eternal life through the Christian faith. This concept of race was based on the belief that Africans were intellectually unable to make an educated decision regarding personal religionRead MoreVictorian Novel9605 Words   |  39 Pagesand W.H. Smith, thanks to the railways could send different forms of literature to provinces and overseas. Changes in the industry and society were equal to the changes in the novel. Themes like sea adventures after Napoleonic Wars, concerns with Ireland, rural people, nostalgia for country in urban England, fashionable London life, appeared in the novels of Frederick Marryat, William Carleton, Samuel Lower, Robert Surtees, Mrs Gore, Lady Blessington and even Charles Dickens. Despite many changesRead MoreToys Project34340 Words   |  138 Pages1998, pg. 529). Competition is fierce from all corners of the world. Failure at the global level can backfire and may consume existing brands and business relationships. At the same time, global opportunities have emerged that offer possibilities for growth, profit, and an improvement in worldwide standards of living. Today, firms have to deal with a global marketplace; marketers have no other choice. Participation in global marketing has begun to shift from a mere â€Å"option† to an imperative. TheRead MoreClothing Store Case Study8603 Words   |  35 Pagesindustry of Pakistan which has made quite a lot of progress in just a few years. Ten to fifteen years from now, this industry was still unknown to actually exist to the masses. Later with the formation of fashion councils and education centers under the enthusiastic few who wanted to make a difference and promulgate this very institution of fashion, did the very fashion industry took its concrete contour from the old tailor culture that formerly existed. Today it is one of the most progressing industriesRead MoreHeineken Swot Analysis10783 Words   |  44 PagesHeineken Beer Market Executive Summary Chapter 1 analyze threats Heineken is facing and opportunities the company can get from the beer market by using two model PESTLE and Porter Five Forces. PESTLE describe what difficulties come from external environmental factors that the company is facing and Porter five force analyze the threats as well as opportunities of Heineken in suppliers, buyers, competitors, substitutes and new entrant. OT factors in SWOT analysis also use to define in chapter 1 forRead MorePeculiarities of Euphemisms in English and Difficulties in Their Translation19488 Words   |  78 PagesTerrorism and war articles in translation of euphemisms 44 CONCLUSION 54 BIBLIOGRAPHY 57 ANNEX 60 INTRODUCTION This Diploma thesis is devoted to the problem of euphemisms in the English language. Euphemism (from Greek word meaning â€Å"to use words of good omen†: eu= well+ pheme = speaking) is the substitution of words of mild or vague connotations for expression rough, unpleasant. Euphemisms are words or phrases which can not be understood literally. EuphemismRead MoreThe Position of Islamic Lawin Malaysia15789 Words   |  64 Pagesfounded.1 However, the grant of the Charters of Justice 1826 to the Straits Settlements, and the eventual application of English law both through the judicial process and through legislation in the Malay States had effectively displaced Islamic law from its premier position. The role which Islamic law now plays in the system is extremely limited. Under the Federal Constitution, Islamic law is a matter falling within the State List, that is, it is a matter over which the State Legislature has jurisdictionRead MoreI Love Reading Essay69689 Words    |  279 PagesNational Knowledge Commission Entrepreneurship in India National Knowledge Commission 2008  ©National Knowledge Commission, 2008 This report has been prepared by Amlanjyoti Goswami, Namita Dalmia and Megha Pradhan with support and guidance from Dr. Ashok Kolaskar and Mr. Sunil Bahri. Table of Contents Acknowledgements Executive Summary Chapter I Chapter II Chapter III Chapter IV Chapter V Chapter VI Chapter VII Annexure I : : : : : : : : Introduction: Why Entrepreneurship What Motivates

Monday, December 16, 2019

Diversity Of Diversity Among Universities Nationwide

Diversity refers to the range of ideas, beliefs, ethnic backgrounds, and many more within institutions, and social environments. There are believers who argue diversity benefits every party involved, and there are people who believe diversity serves no purpose to everyone involved. Because of these varying views, diversity among universities nationwide is a touching issue causing these universities to attempt to implement procedures to increase diversity on their campus. For example, Michigan awarded twenty points to applicants who identify with a specific minority groups. Opposers of diversity argue the addition of diversity in universities cause a less level of educational satisfaction. The argument points toward negative race relations, rejection of high score students, and the relaxing of academic standards among faculty members. Stanley Rothman says, â€Å"A higher level of diversity is associated with somewhat less educational satisfaction and worse race relations among students.† (123). Universities are prestigious institutions, often requiring a Ph.D to serve as a professor. Professors will not lower the difficulty of the material given or grade more lenient because a minority is taking part in the class. Yes, there will be a performance difference between the minority student and their counterparts, decreasing the academic reputation of the school, but the academic standards will remain the same no matter how many minority students are enrolled in the university. CollegeShow MoreRelated Diversity in the Newsroom Essay1680 Words   |  7 PagesEthics in Journalism: Diversity in newsrooms not a trend in the new millennium My interest in the lack of diversity in newsrooms across the United States began while I was enrolled in an ethics course in the journalism department, this semester. I hadn’t realized until this semester that diversity was integral to good, accurate, and fair reporting, and that it is also widely lacking in newsrooms. While the subject of diversity was only discussed over a few class sessions, it became a noticeablyRead MoreAn Argument Against Affirmative Action Essay1716 Words   |  7 Pagesnation rethink the policies that now appear to be doing more harm than good. Affirmative Action in the United States has become detrimental to social progress through policies of reverse racism by constructing preference in favor of diversity quotas within university admissions and places of employment. Affirmative Action is harmful to society because reverse discrimination should not be used as an atonement for past discrimination. Regardless of the siren calls bellowed by the mass media that certainRead MoreWhat Is The Prediction Of 2018 Gubernatorial And Senate Race?917 Words   |  4 Pagescontinue to climb even with President Trumps ratings declining or will those who supported Trump stand true to someone who is making the same promises and wants to be their home state â€Å"Trump†? Lucas County located in northwestern Ohio is home to University of Toledo, Cedar Point, and Libby Glass. Lucas County is also the 6th largest county in Ohio and a heavy Democratic stronghold. Megs County is located on the Ohio River in the Southeast corner of the state. Population wise they fall into 81st placeRead MoreServe For Discourage Potential Applicants849 Words   |  4 Pagescommunication are â€Å"skills that can be learned† to help police officers do their jobs (Townes, 2015). She also believes that courses â€Å"specifically geared toward the police profession should be the standard† (2015). Mike Aamodt, author and Radford University professor, has agreed with the President’s Commission on Law Enforcement Administration (COLEA) and the National Advisory Commission on Criminal Justice Standards and Goals that the educational standards for police officers should be raised, andRead MoreHow Can Education Be A Solution For Increase Cultural Competenc y?1386 Words   |  6 PagesStephen Nelson (2016) developed a training module to help health care providers address individual bias, the role of racism in evidence-based medical protocols, and the realities of systematic racism and its impact on patients. Due to the lack of diversity in the medical schools, the schools should increase education opportunities for individuals from disadvantaged backgrounds who have been underrepresented in the health sector. This will increase the workforce for the minority population (WilliamsRead MoreResearch Proposal : Amount Of Stress1565 Words   |  7 PagesResearch proposal: Amount of stress undergraduate university students go through in Male’, Maldives Over the years an increase in stress levels in university undergraduate students has been seen all over the world. So it is important to know if undergraduate students in Maldives also goes through high levels of stress. This experiment is designed to measure the levels of stress that average Maldivian university undergraduate student goes through using the Perceived Stress Scale (PSS)Read MoreShould The Deportation Of All Immigrants Really? Make America Great Again?995 Words   |  4 Pagesconsume them? All of these questions and more will be discussed in the upcoming academic essay in which throughout the last fifteen years the discourse among scholars on the topic of immigration has remained constant in that it positively impacts the United States economy and society. Initially, the academic conversation within the past fifteen years among scholars about immigration has remained relatively constant in that immigration positively impacts the United States. One reason that Americans mightRead MoreThe Between Teachers And Their Students During History Classrooms Nationwide1575 Words   |  7 Pagesdisconnect occurring between teachers and their students in history classrooms nationwide. The main themes of United States history like freedom and liberty are individual to each person as well as each culture and ethnicity. This is an issue in the classroom because 92% of teachers are white while 80% are female. These predominantly white, female educators are attempting to teach a subject that is largely malleable among cultural and ethnic groups to a student population that is largely diverse. WithRead MoreThe Society Has Made Progress : Economically, Politically, And Now Is More Open Minded1277 Words   |  6 PagesThe society has made progress: economically, politically, and now is more open-minded. People is started to accept and released that the United States is a country with a large range of diversity. Starting from tall, sh orts, Hispanics, white, black, Asians; but also, the society started to integrate people with different types of sexuality. New laws for equal marriage arrived, surprising some in good ways. Even though they accepted that people from the same-sex can get marriage, there still is aRead MoreEssay Affirmative Action Must Play a Role in College Admissions2893 Words   |  12 Pagesbased solely on one’s merit and character, yet this view seems quite unrealistic. The United States Supreme Court handed down its first decision on this complex issue with the case of Allan Bakke. Allan Bakke was a white male who applied to the University of California at Davis Medical School in 1973 and a second time in 1974. There were 100 spots in each medical school class at Davis, sixteen of which were reserved for the special admissions program. In 1973, Bakke received a score of 468 out

Sunday, December 8, 2019

Racism and evolutionary theory Essay Example For Students

Racism and evolutionary theory Essay How Racism Has Been Shaped by Evolutionary Ideas. Racism has been perpetuated falsely by evolutionary ideas throughout history. Since the beginning of intelligent life mankind has discriminated against others of its own species. The in group mentality may be a genetic psychological trait. However, evolutionary theory has been used to justify unfair treatment of certain groups. Literature and other forms of influence have used evolutionary ideas to perpetuate racism. The ideas of Charles Darwin and other respected evolutionists have been misconstrued to serve the racist hate of many leaders, writers and clergy. Given that species evolved over time. Darwin strove to deduce a means by which descent with modification might occur. He cleverly named his mechanism natural selection, because it was familiar to anyone acquainted with the breeding of domestic stock, dogs or horses, for this was the insight that showed Darwin how the whole mechanism of evolution might operate. Although nothing was known of modern genetics, DNA, or chromosomes, it was apparent to most that offspring often inherited the characteristics, physical and mental, of their parents. Darwins most convincing proof of his theory, to many readers, was the evidence of breeding practices that were put into use every day, with important consequences. In summary, Darwin claimed that as some horses are selected by their owners for breeding because they are faster runners, and some cows for their higher yield of milk, so too do the different variations in physique or ability among a wild species sometimes enhance or damage the reproductive success of particular individuals. It was a commonplace in Darwins day that any good horseman looks for the best stallion to breed to his prize mare, hoping that their offspring will enjoy the best qualities of each. Advertisements for the services of particular stallions appeared regularly in newspapers in the eighteenth, nineteenth, and early twentieth centuries, In fact, the benefit of selective breeding was so irrefutable, that English mares had been segregated from stallions except for planned breedings since the 1100s (Shipman, Pg. 21). Darwin could see that his natural selection would fuel the process of adaptation to differing habitats by differential survival and reproduction-this group living in a more arid area than that one, or the one population coping with denser vegetation than the other. Adaptations would, of course, be manifested physically, in longer or shorter limbs, thicker of thinner fur, more pointed of blunter beaks, and so on, each set of traits typifying a different group according to its ecological niche. If this were so, then the process of evolution occurred over vast amounts of time. If this were so, there ought to be intermediates, traditional forms, species caught in the act of evolving from one thing to another. Where was this infinitude of interconnecting links? Darwin mulled over this stumbling block for a long time. Eventually he came to believe that most of these transitional species of populations would have been exterminated, because the linking populations would be by definition less well adapted than their adaptive neighbors, whose superior numbers and more suitable adaptations would overwhelm the intermediates, It was to be expected that the links would be missing, Darwin concluded contentedly. Once the intermediates or links were destroyed, what was left formed a diverse array of separate species, all sufficiently similar to be grouped into a single genus and each beautifully adapted to its habitat, Time and natural selection are the only two prerequisites. Darwin never imagined that his idea would influence so many racist ideas. It was simply meant to explain how so many organisms came to be. He simply had a theory that hereditary modification was possible. However, the future held that several people would use his theory to perpetuate their hatred for others. People would use evolutionary theory to ease the guilt of enslavement and murder. Darwin did not intend this to happen. Perhaps, it was inevitable. In fact, Darwin stated that there is no living less evolved species. He wrote that any intermediaries would become extinct due to the better-adapted species winning resources. Therefore, only the best-adapted species have survived and currently inhabit the earth. The first of several examples is the African. Imported as slaves, treated as property to be bought and

Sunday, December 1, 2019

Violent Media and Children

Introduction From the perspective of most parents violent content in the form of fist fights, shootings, murders and an assortment of other similar actions should not be viewed by children due to the possibility of subsequent emulation or if such actions have an adverse impact on the way in which their child develops.Advertising We will write a custom essay sample on Violent Media and Children specifically for you for only $16.05 $11/page Learn More Several studies examining early childhood development do indicate that a child’s formative years (age 4 to 12) is a period in which they begin to develop the behavioral characteristics and ideologies that influence their subsequent adult behaviors and actions (Hansen Zambo, 2007). Aspects related to religion, culture and ideologies introduced during this early stage of development reflect well into adulthood and become an integral aspect of who a person is to become (Hansen Zambo, 2007). It is based on this developmental backdrop that parents and society developed the notion that early onset exposure to violent content will have an adverse effect on a child’s development and as such children should be inculcated early on with positive societal messages in the form of cooperation, peaceful action and other similar behavioral characteristics that espouse the creation of a socially acceptable persona. Gerard Jones on the other hand espouses a completely different approach to early childhood development in which he states that the introduction of violent media in the form of comic books, cartoons and other similar forms of consumable media actually have a positive effect on children resulting in the development of independent, socially well adjusted children that from an early age are capable of utilizing what they perceive from violent media as a method of overcoming early onset fears and become more socially well adjusted as compared to their peers that have been exposed t o little if next to no violent content. Jones presents the notion that violent media enables children to experience the full gamut of emotions denied to them by their parents and society. In the words of Melanie Moore â€Å"it enables them to explore the inescapable feelings that they’ve been taught to deny and to reintegrate those feelings into a more whole, more complete and more resilient selfhood†. While such notions are relatively alien to the current prevailing societal consensus regarding children and violence it does make a valid argument. Rage and anger are actually normal human emotions, while society disparages their utilization and expression it must be noted that they are normal feelings that have been with humans since the beginning of evolution. Coming to a complete realization of their effective utilization while at the same time limiting their use through calm analytic thinking is actually a rite of passage for most individuals.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More What must be understood though is that Jones is not trying to espouse that children should be violent rather he presents the notion that aspects related to violence such as rage can actually have a positive effect on children. In his words â€Å"rage can be an energizing emotion, a shot of courage to push us to resist greater threats, take more control, than we ever thought we could†. It is aspects related to courage, taking control of life and energizing ones actions that Jones looks at as positive aspects of violent media for children. In fact a cursory glance of most violent media directed at children shows stories which teaches individuals to overcome fears, aspire to greater heights and overcome adversity in order to achieve their dreams. Violent media directed at children should not be treated as a device that encourages violent actions but rather as a method of encouraging proper development which takes into account the gamut of all human emotions and not just a select few. Impact of Violent Media on Children Studies examining the impact of violent media on children have drawn up conflicting conclusions with some stating that violent media adversely affects children while others point out that there is little effect at all (Schechter et al., 2009). What must be understood is that the concept of violent media and its exposure to children has been generalized to include all forms of violent media and not separate it into varying degrees. In the case of the argument presented by Jones it can be seen that he argues his point on the basis of the distinctly low level type of violence seen in comic books and some action based cartoons. Some studies involving the behavioral growth of children utilize high levels of violence as seen in several of today’s action movies and shows, however they tend to categorize these elements under the same genre as low level violent media (Schechter et al., 2009). While it can be argued that showing children violent movies such as Saw or Kill Bill could cause the development of abnormal behavioral characteristics the fact is most children are more interested in low level types of violence as seen in comic books and cartoons as compared to the high levels seen in mature shows and movies utilized by researchers in their studies. Studies examining the active interests of children unsurprisingly show a predilection towards watching popular cartoons, anime or reading comic books (Browne Hamilton-Giachritsis, 2005). It was noted that 9 out of 10 children preferred watching cartoons and anime over mature programming and as such this shows that research utilizing violent mature programming as the basis of their examination are inherently flawed since most children prefer programs geared towards children. Another factor that should be taken into consideration is the fact that even if a child should watch a violent mature show or movie it must be questioned as to whether or not they can actually understand most of the mature themes involved. On average children have a limited knowledge on the types of adult themes present in movies and shows geared towards mature audiences (Browne Hamilton-Giachritsis, 2005).Advertising We will write a custom essay sample on Violent Media and Children specifically for you for only $16.05 $11/page Learn More In fact it was noted by one study examining the ability of children to accurately depict themes in mature rated programming that the respondents barely knew any of the actual relevance of the themes in the shows (Browne Hamilton-Giachritsis, 2005). Another notable factor that should be taken into account is the fact that even though several cartoons from the 1980s to the present show varying levels of violence long term studies examining the behavioral characteristics of children exposed to this particu lar form of media showed next to no abnormal behavioral characteristics. In fact most of the children involved grew up to become relatively well adjusted individuals with few behavioral problems. It is based on this that it can be should be stated that certain forms of violent media have been proven to have little to no adverse effects on the behavioral development of children and as such should not be considered detrimental towards the proper development of children on the basis of the content being somewhat violent. Pop Culture and Identification One of the prevailing arguments against letting children see violent media is the supposed potential that exists of children imitating what they see in comic books and television shows (Huesmann, 2010). Studies examining the effect pop culture has on children reveal that on average children, especially young children, have the tendency to emulate child pop culture icons such as Hannah Montana, Spongebob Squarepants and other similar forms of identifiable imagery (Huesmann, 2010). In fact this behavioral aspect is even noted in members of the adult community and as such is the basis for many arguments stating the potentially harmful effects violent media could have. What must be understood is that the arguments being presented neglect to take into account the fact that parental influences play a contributing and limiting factor to some aspects of a child’s behavior and as such should be trusted as a means of enabling children to distinguish between what is right and what is wrong (Anderson, 2011). In fact, various studies have even shown that parental influences play a major role in personality development resulting in either proper growth and maturity or the instilment of negative personality traits similar to immaturity, dependence, and an overall sense of being unable to become self-reliant.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More The development of a child’s behavior is not dependent on consumable media alone but rather on how parent’s influence and mold a child’s behavior. As such even though violent media is introduced to a child it can be stated that so long as parents are there to enable a child to distinguish right from wrong then there is little cause for concern. It must be noted though that in cases where there is a distinct degree of parental absenteeism a child’s behavioral development will thus be predominantly influenced by external sources which should be a cause for concern since such instances have been shown to be influential factors in the development of abnormal personality traits. Development and Human Emotion Studies examining the prevalence of independent action and initiative in children show that on average children with the most well rounded set of emotional development often show the most drive and initiative when it comes to independent action and leaders hip roles (Wagner, 2004). While Jones may not explicitly state it in his article it is actually implied that children who are not exposed to certain types of violent media tend to not develop independent personalities but rather take on dependent behavioral characteristics. It must be noted that society’s adherance to the belief that violence is bad for children has resulted in parents developing parental practices that espouse peaceful behavior and nonviolence. In fact such practices have grown to such an extent that the concept of social conformity and peaceful behavior is often forced upon children resulting in the suppression of the development of certain aspects of their emotional makeup. This results in children developing behavioral characteristics akin to dependence, conformity and a distinct lack of initiative due to a form of trauma in which they associate aspects related to socially unacceptable conduct to the suppressive actions of their parents. This causes them to withdraw into themselves rather than become more expressive. As Jones notes in his article children that are allowed to be exposed to violent media tend to be more expressive, open minded and have more access to the full gamut of their emotional capacities compared to children whose emotional growth has been inadvertently suppressed by their parents. What must be understood is the fact that current day parental practices assume that exposure to violence is bad based on preconceived societal notions when in fact there have been few studies which have actually successfully connected violent media exposure to the children developing into violent adults. In fact for the most part children exposed to violent cartoon series or comic books appear, for all intents and purposes, perfectly normal and turn into well rounded individuals. It must be noted that the parental predilection to believe that violent media has negative implications on children is grounded in institutional theory. Ins titutional theory specifically states that people have the tendency to adhere to traditional institutions rather than move towards more efficient newer institutions due to their belief that older institutions are more stable due to prolonged length of time that they’ve been around (Hess Hess, 1999). In this particular case parents adhere to a specific type of social institution that believes that violent media will create violent children and adults. Several studies examining parental predilections towards this particular type of institution have noted that when questioned as to why they adhere to the social institution in question the essence of all answers given show that parents do so due to their belief that since the institution has been around for such a long period of time and that it is widely accepted means that it must be right (Spitzer, 2005). What must be understood is that just because a social institution is widely accepted and has been around for a long time d oesn’t make it automatically right. For example, one of the most widely accepted social institutions in the past was the belief that men were superior to women, this resulted in women being thought of as incapable of doing certain jobs, that the place of a woman was at home and that women did not have the right to decide the future of a country. Suffice it to say, such a view has been recently debunked however it must be noted that it had persisted for several hundred years with most of human culture adhering to its tenets. It is based on this that the social institution advocating that violent media is bad for children should not be immediately credited as being absolutely correct. Historical precedent has shown that not all widely accepted societal views are correct and thus this one should not be considered as an absolute truth. Conclusion Based on the various examples presented it can be seen that the preconceived notions attached to violent media are in fact fallacious a nd heavily embedded in parental practices that originate from a social institution that may not necessarily be correct. As it was shown by both Jones in his article and in the various other studies cited, children that are exposed to violent media in the form of comic books and cartoons develop into mature and behaviorally stable adults with few problems. In fact when taking the views of Jones into consideration it can even be stated that the introduction of violent media can in fact enable children to develop stronger and more independent personalities that will enable them to express themselves better, take the initiative more and be more likely to overcome adverse situations as compared to their peers that were not exposed to violent media. While it may be true that when parents prevent their children from viewing violent media they are under the belief that they are in effect helping their children grow into better adults but the truth is what they are doing is in effect stuntin g the full emotional growth of their children. As explained earlier traits related to violence such as aggression are inherent parts of a person’s normal emotional makeup and as such are a necessary aspect in enabling an individual to grow into an emotionally stable person. Negative emotional qualities help to balance the positive aspects of an individuals personality so as to enable them to live a balanced life. By denying children the ability to develop the full gamut of their behaviors from an early stage parents are in effect hindering them from being able to mature at a normal pace which may actually lead to the development of abnormal personalities. This can take the form of dependence, childishness and the inability to take care of oneself without being instructed. It is based on this that in the case of allowing children to view violent media this paper agrees with the argument of Jones and also advocates it use so as to enable children to develop a more well rounded set of behavioral traits. Reference List Anderson, C. A. (2011). Violent Video Games and Other Media Violence (Part I).  Pediatrics for Parents, 27(1/2), 28. Retrieved from EBSCOhost. Browne, K. D., Hamilton-Giachritsis, C. (2005). The influence of violent media on children and adolescents: a public-health approach. Lancet, 365(9460), 702-710. Retrieved from EBSCOhost. Hansen, C., Zambo, D. (2007). Loving and Learning with Wemberly and David: Fostering Emotional Development in Early Childhood Education. Early Childhood Education Journal, 34(4), 273-278. Hess, T. H., Hess, K. D. (1999). The effects of violent media on adolescent inkblot responses: Implications for clinical and.. Journal of Clinical Psychology, 55(4), 439-445. Retrieved from EBSCOhost. Huesmann, L. (2010). Nailing the Coffin Shut on Doubts That Violent Video Games Stimulate Aggression: Comment on Anderson et al. (2010). Psychological  Bulletin, 136(2), 179-181. Schechter, D. S., Gross, A., Willheim, E., McCaw, J., Turner, J., Myers, M. M., †¦ Gleason, M. (2009). Is maternal PTSD associated with greater exposure of very young children to violent media?. Journal of Traumatic Stress, 22(6), 658-662. Spitzer, M. (2005). Influence of violent media on children and adolescents. Lancet, 365(9468), 1387-1388. Retrieved from EBSCOhost. Wagner, C. G. (2004). Aggression and Violent Media. Futurist, 38(4), 16. Retrieved from EBSCOhost. This essay on Violent Media and Children was written and submitted by user Tyrell W. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Japanese Communication Styles Essays

Japanese Communication Styles Essays Japanese Communication Styles Essay Japanese Communication Styles Essay Japanese Communication Styles Japanese communication patterns and styles can be confusing to Westerners. Americans are used to straight talk. Americans make great efforts to convey the exact intent of their message. Japanese interlocutors tend to use words as only part of the message they are trying to communicate. Other factors, such as silence, subtle body language, mood, tone, and intuition imply communication styles. I would like to explore the aspects of communication styles in terms of (1) body language and physical behavior, (2) silence, (3) eye contact and (4) saving face. It is often pointed out that throughout the long history of Japan; the Japanese have cultivated their unique communication styles which are based on their high-context, collectivistic and almost homogeneous society (Ishii et al. , 1996). The Japanese are reported to be reserved, cautious, evasive, silent, and ambiguous (Barnlund, 1975), placing an emphasis on not hurting others and keeping harmonious relations with each other. This emphasis on harmony has helped to mold a society where the ability to assimilate differences and to engineer consensus is valued above a talent for argument (Barnlund, 1989). In this communication-passive society of Japan, modesty, humility, and suppression of self are considered to be moral ideals (Okabe, 1983), and people are rather reluctant to disclose their true feelings (Barnlund, 1975). Body Language and Physical Behavior Body motion, as a whole, is more reserved in Japan than in the West. The Japanese predisposition for well chosen delicate gestures is born from necessity, for 125 million people live on these small mountainous islands. Japanese living quarters and public places are usually overcrowded. People must share space continuously at ome, work, and play. It is very easy to physically violate another persons space, so the Japanese do all they can to avoid it. They are raised to detest pushy and argumentative behavior in public. To avoid such unpleasant exchanges, people tend to keep their hands, feet, elbows, and knees closer to their frame. Being polite, reserved and aware of ones own and other peoples body movements, is an essential part of being Japanese. A code of physical behavior seems to exist almost everywhere in Japan. People generally do not talk loudly, touch each other unless forced to by vercrowding, or make other disturbances in places traditionally considered public. People keep to themselves when among strangers. Yet even among friends, there are always subtle codes of behavior to consider, a code for what you can and can not do with your hands and feet. Hand gestures are plentiful and useful, especially when you want to relay a message without drawing the attention of those around you. In the office, hand signs can invite someone to a drink or meal, tell others the boss is angry or has a girlfriend, or simply explain that youve Just been fired. In all these examples the hand gestures would be different from those used in the West. One of the most common communication styles that non-Japanese people are familiar with is bowing. Bowing (oJigi) is a very important custom in Japan. Japanese people bow all the time. Most commonly, they greet each other by bowing instead of handshaking. It is impolite not to return a bow to whoever bowed to you. Japanese people tend to become uncomfortable with any physical forms of contact. But, they have become used to shaking hands with westerners. Bowing has many functions in one. It expresses the eeling of respect, thanking, apologizing, greeting, and so on. Japanese people bow, when they say, thank you, sorry, hello, good bye, congratulations, excuse me, good night and good morning. Bowing seems simple, but there are different ways of bowing. It depends on the social status or age of the person you bow to. If the person is higher status or older than you are, you should bow deeper and longer. It is polite to bow, bending from your waist. Men usually keep their hands at their sides, and women usually put their hands together on their thighs with their fingers touching. If it is a casual situation, you can bow like nodding. The most frequent bow is a bow of about fifteen degrees. Bowing is also an important part of the Japanese tea ceremony. Silence The use of silence in communication is not an exclusively Japanese phenomenon and all languages make extensive use of it. In Japan, however, it is a particularly important part of the language. While we in the West have programmed ourselves to listen for hidden meaning in a Jumble of words and try to read between the lines. Japanese people listen to the silences, for hidden innuendo and deeper meaning, as f reading between the words. Just as the white space on the paper in Japanese graphics is an important part of the design, spoken Japanese flows among the silent spaces. Silence speaks loudly and clearly to the Japanese. There are many examples in Japanese culture where silence expresses meaning with great force or subliminal elegance. The Japanese tend to be suspicious of words; they are more concerned with actions. They believe in using silence as a way of communicating. They also believe it is better to talk too little than too much. Japanese people take special note of the pauses between words. They are comfortable with less talk and longer periods of silence than are Westerners. Japanese may even use the fact that silence disturbs Westerners as a strategy to unnerve them. In the United States speakers may use silence to draw the listener in, to slow down the flow of events, or encourage the other person to pay attention while they Justify or explain something (Riesman Riesman 1987). In the Japan however, silence may be a polite acknowledgment of failure or inability. This technique is common amongst students who often assume there is only one specific way to answer, as is customary in test-oriented Japanese ducation. Silence signals to the teacher to move on to the next student, maintaining the flow and harmony within the classroom. Eye Contact In most cultures especially Western culture, it is considered rude to not look at the person who is speaking to you. We are taught to look people in the eye at all times and avoiding eye contact is usually associated with being dishonest or uninterested. In Japan it is considered rude or even aggressive to hold the gaze of another person. Japanese people usually look at the other persons neck or focus on something such s their tie knot or other parts of the face such as the eyebrows or the mouth. It is less offensive to look at a persons eyes and then look away or down before looking at their eyes again. The avoidance of eye contact can limit social interactions with non- Japanese persons who would probably assume that that person is being rude when they are actually practicing a form of communication etiquette. Saving Face Being accurate is very important to Japanese people because it saves face. When the Japanese make mistakes/errors it is very unacceptable. Most Japanese people do ot like being put in a position where they have to admit to a failure or mistake, because doing so means losing face and it is very serious to them (http:// www. rikkinyman. com/training/]apanese culture/communication. htm). Many are hesitant to admit that they dont understand something. Japanese people tend to avoid the word no for all practical purposes; it doesnt exist. They believe that no person should be publicly humiliated or embarrassed. This saves face or avoids marring that persons image. Saying no or directly showing displeasure or disappointment risks humiliating the other person and they must be avoided. The Japanese have created ways of saying no without humiliating the other party (http:// www. rikkinyman. com/training/]apanese culture/communication. htm). Some examples of how to tell another person no is: asking a question, saying they dont understand, changing the subject, or claiming they have no authority to answer at the time. When a Japanese person is criticized they take it as a personal offense and it also is considered losing face. Many Japanese do not understand how Western cultures accept or separate behavioral criticism from personal criticism. Conclusion There are many important differences between Western culture and that of the Japanese people. These important differences show how important it is for people to be aware of other cultures and how they interact and communicate with each other. After learning about Japan and their communication styles, I see how easy it can be for people to misunderstand and stereotype others based on what they dont know. Etiquette and manners are important and required in Japan. In our culture it is rare for people to uphold the dignity of others the same way they would for themselves. It s important for Japanese people to adhere to their communicative styles because there is some correlation between the way they communicate and how they live. Without their conversational rules their communities would be chaotic based on their vast population. Japanese people are subtle with words and body gestures and have maintained their cultural communication styles despite Western influence through globalization and technology. References 1 rikkinyman. com/training/]apanese_culture/communication. htm 2. danin]apan. com 3. ) Barnlund, D. C. (1975). Public an d Private Self in Japan an d the United States. Tokyo. The Simul Press. 4. ) Barnlund, D. C. (1989). Communicative Styles of Japanese an d Americans: Images and Realities. CA. Wadsworth Publishing Company. 5. ) Ishii, S. et al. Intercultural Communication (1996). Tokyo: Yuhikaku. 6. ) Riesman Riesman. Conversation s in Japan (1987). Basic Books, Inc. , Publishers: New York. 7. ) Okabe, R . (1983). Cultural Assumptions of East and West: Japan and the United In W. B. Gudykunst (Ed. ) Intercultural Communication Theory: Current States, Publications. Perspectives. CA: Sage

Friday, November 22, 2019

Savoir Is About Certainty, So No French Subjunctive

Savoir Is About Certainty, So No French Subjunctive The French verb  savoir (to know) does not take the subjunctive. Very often used with que  to introduce a dependent clause, savoir and savoir que are all about certainty. Thus, they do not fulfill the subjunctives basic requirement of uncertainty and emotion. The subjunctive  mood  is used to express actions or ideas that are subjective or otherwise uncertain: will/wanting, emotion, doubt, possibility, necessity, judgment. The French subjunctive  is nearly always found in dependent clauses introduced by  que  or  qui, and the subjects of the dependent and main clauses are usually different. Savoir Savoir  means to know information and facts or to know how to do something. In the  passà © composà ©,  savoir  means to learn or to find out, again with no  subjunctive. (The verb  is quite different from the French verb  connaà ®tre,  which means  to know  a person or to be familiar with a person or thing.)      Je sais oà ¹ il est.  Ã‚  Ã‚  I know where he is.      Je sais  conduire.  Ã‚  Ã‚  I know how to drive.  Ã‚  Ã‚  (The conjugated  savoir  is followed by an infinitive when the meaning is to know how.) Savoir Que Savoir que is the conjugated savoir  plus a dependent clause beginning with que.  Ã‚  Ã‚  Ã‚  Je sais quil la fait.  Ã‚  Ã‚  Ã‚  I know he did it.      Jai su quil la fait.  Ã‚  Ã‚  I found out that he did it. Savoir que is not normally used in negative and interrogative statements; its far more natural to use a  si clause in such cases, which means, once again, that the  subjunctive is not used:      Je ne sais pas si vous avez raison.  Ã‚  Ã‚  I dont know if youre right.      Sais-tu sil a raison ?  Ã‚  Ã‚  Do you know if hes right? Additional Resources The Subjunctivator!Quiz: Subjunctive or indicative?Conjugate savoir

Thursday, November 21, 2019

Corporate Communication Research Paper Example | Topics and Well Written Essays - 1250 words

Corporate Communication - Research Paper Example In order to analyse its theoretical framework, many scholars have developed several corporate communication theories like critical theory, co-orientation theory, discourse theory, stakeholder communication theory etc. Critical theory is the one most popularly used to study the network of communication in an organisation. The framework of critical theory helps to examine the complications and â€Å"contradictions of marginalization and resistance† in an organisation as well as in the society (Littlejohn & Foss, 2009, p.237). Vary explained that â€Å"the adoption of critical theory provides a means of viewing again the notion of knowledge management in terms of the ethics of human communication and allows the questioning of the centrally of rational decision making as basis of managing† (Babos & Peterson, n.d.). This theory emphasises on knowledge and advocates it as the most necessary element for developing a sound communication system. ‘Communication for stakeholders’ is the latest theory that helps to develop the framework for managing an efficient communication system with the stakeholders. This theory analyses the importance of corporate communication in strategic m anagement of stakeholders. Cornelissen has divided the stakeholders into two groups. These are contractual stakeholders and community stakeholder. This theory focuses on establishing communication with each group of stakeholders (Cornelissen, 2004, p.59). Corporate identity attempts to provide an organisation with a unique brand image that differentiates the host from its close competitors. Hatch and Schultz defined corporate identity as a â€Å"symbolic construction† that must be communicated by the decision makers to its employees (Melewar, 2008, p.15). Once the management successfully delivers the objective of corporate identity, the employees must understand their responsibility of developing the organisational culture. In recent years, the urge of gaining corporate identity in business

Tuesday, November 19, 2019

EH&S professional case study Essay Example | Topics and Well Written Essays - 500 words

EH&S professional case study - Essay Example This can be done by calling the hazardous material team from 15 miles which is trained under me. Take care no one goes towards the scene. This can be done by being in the vicinity of the accident but also taking full precautions of own self. To do this, I would need to read the instruction of the guide book. Action items - Call the hazardous material team trained in my plant which all necessary equipments. In the meantime, look into the emergency guide and follow the instructions for preventing any damage. Take care that dripping liquid does not flow over to wet ground or does not come in contact with water. To prevent this, guide book can be used. Constraints - I cannot go closer to the scene myself to analyze further. Apart from taking immediate precautions with the help of the book, have to wait for the team to come and take control. Since water is spraying at some distance, it can still reach if the wind fluctuates. Next responders who come to the scene. - For the next responders who come to the scene, I would explain the entire scene to them with the conclusion I derived so that they do not again waste time deciding what it could be. Then I would ask them to further suggest what can be done to prevent any mishap. This is required as the team will take some time to reach from 15 miles The minor error and name of chemical. - The minor error that can be discovered in the explanation is that the color of the liquid should not be red-yellow. It should be anything between colorless to yellow. Considering all the specifications given, this liquid is Thionyl chloride which is an inorganic compound with the formula SOCl2. The NFPA diamond for Thionyl chloride is with a 0 at 12 oclock; a 2 at 3 oclock; a 4 at 9 oclock; and a slashed W at 6 oclock that is same as mentioned in the

Saturday, November 16, 2019

Human Resources Integration Essay Example for Free

Human Resources Integration Essay Hugh McCauley, the Chief Operations Officer of Riordan Manufacturing, has placed a service request, SR-rm-022 to integrate all existing Human Resources tools into a single integrated application across all plant locations. The business would like to take advantage of a more sophisticated, state-of-the-art, information systems technology to replace their current Human Resources Information System or HRIS (Riordan Manufacturing, 2006.) In response to this request, this document will outline the following items. The information-gathering techniques and systems analysis tools proposed for this project. Critical factors to ensure the sucessful gathering of information required for the project. Description of the project scope and the areas of project feasibility, and key stakeholders of which requirements will be collected are also discussed. INFORMATION GATHERINT TECHNIQUES AND SYSTEMS ANALYSIS TOOLS To ensure project success, it is important to gather your key stakeholders together to discuss the system. Key Stakeholders for this project would be key management personnel, IT staff, and users of both the legacy system, and the new system. Your key stakeholders will also be the first level of intelligence gathering performed. Key management personnel such as Hugh McCauley, the COO, who can give the corporate view of the legacy and the new system. HR Director Yvonne McMillian and Payroll/Tax Clerk Anan Richlich can give an exact use case on the HRIS system, and will be the two primary sources of legacy information. Director Yvonne can determine training requirements with the help of the IT department. The IT department can provide information about the legacy system and the capabilities of the current infrastructure of the business. IT can also judge and approve new requirements, privacy structures, and future support needed to maintain the  system. Face-to-face interviews will allow information gathering from these key individuals. Questions, an outline of topics, and a primary agenda will be provided beforehand to maximize the use of available time in hectic schedules. We will also be occasionally meeting to discuss the direction the system is heading, timelines, priorities, and key players lists to ensure success of the project. There is another primary source of information which needs addressing, and this is the group of people who handle information we will be adding which did not exist in the legacy system. This group can submit examples of their files, which will determine another part of the scope of the system, and use cases of how that information is gathered. After this information has been collected, documented and studied, the system development process can begin. The system will be designed using the Joint Application Development (JAD) method. JAD is a prototyping method which gathers our key players listed above, along with other designated individuals to collectively refine business requirements while in conference with the design team of the software and the support team from IT. The JAD process also includes approaches for enhancing user participation, expediting the development, and improving the quality of specifications. It consists of a workshop where knowledge workers and IT specialists meet, sometimes for several days, to define and review the business requirements for the system.† (Joint Application Design Wikipedia, The Free Encyclopedia, n.d.) Using this prototyping method ensures that each key factors such as project support and misdirection will not be an issue. This also ensures that the project gets the continued support it will need in the future to succeed. SCOPE AND FEASIBILITY During the Analysis phase of the Systems Development Life Cycle (SDLC), several areas of project feasibility come into play. As discussed above, determining fully the system requirements ensures that you are filling the need of the system. A preliminary study is then conducted to confirm and evaluate the need. A proposal of how the need may be satisfied is then made. (Scope of Feasibility Analysis | Bicara Property, n.d.) The necessity of the system, as well as the improvements and requirements of the new system, will all be handled within the JAD process, allowing final project scope and requirements development. These developments can be realized  financially to allow final budgetary requirements determination. All of these determinations hinge upon the proper system scope being defined. During this process, the unique considerations are also shared. In this project, the request was to Create a detailed system design and a project implementation plan required to complete the proj ect. The project should be completed in approximately six months allowing new system utilization in the second quarter of next year. (Riordan Manufacturing, 2006.) This design process includes checks and balances, giving the project the fullest chance of success. During the entire process, oversight will be maintained by corporate leadership. Final approval before entering the next phase of the SLDC allowing equipment purchasing approval from the COO, Hugh McCauley. By following this process, we can ensure this project produces a system which fulfills the requirements, bringing a sophisticated, state-of-the-art, information system† to Riordan Manufacturing’s Human Resources Department. (Riordan Manufacturing, 2006.) During the JAD process, two methods were determined to fit the requirements, building a system in-house using programmers’ already on staff or using off the shelf software from a major corporation. To fulfill user testing requirements, a trial version of the BambooHR software was tested by staff and management. The BambooHR software fulfills all the requirements with less downtime for the company, saving valuable resources and eliminating the need for more support staff to be hired. The design process for this system began by gathering relevant data for the current system and by building both requirements for the new system and use cases of the current processes in the Human Resources department. After gathering and sorting the new system requirements using the Joint Application Design process, it is now possible to continue to design both the application architecture and apply the tools of system analysis to describe the information systems. SYSTEM ARCHITECTURE The client/server architecture is one of the most prevalent system architectures used in corporations. With Riordans requirements to allow multiple sites access to data and to ensure that data remains secure, the data will be stored on the server, and access routed through a secondary  application server. The application server hosts the applications which access the data, allowing a lower cost local machine, and can allow both intranet access and outside access using a VPN (Virtual Private Network) connection to create a secure encrypted link between the client and the server. This style of client/server architecture is referred to as a three-tiered architecture due to the three tiers involved in accessing the data. Although this method may seem bulky at first, this will allow many different benefits for data security and lower overall cost of the system as requirements are lower for the client computers. The determined requirements for multiple locations to share and modify data leaving with Riordan only required to supply the client systems with no additional support necessary for a data server or application server. Eliminating the current architecture on hand will save maintenance, upgrade and support costs, both in monetary and staff requirements. The chosen software, Bamboo Human Information Resource System (HRIS) follows the same requirements recommended in terms of hardware as those designed using system analysis. ARCHITECTURE DIAGRAM SECURITY CONTROLS Security is the ability to protect the information system from disruption and data loss, whether caused by an international act (e.g., a hacker or a terrorist attack) or a random event (e.g., disk failure, tornado.) according to SYSTEMS TEXTBOOK. In modern corporations, internal threats can become much more dangerous than external threats. To combat both types of threats implementation of the following security protocols will be included in the system: DATA Data must be kept secure and confidential, protected from both internal and external threats at all times. Data encryption and passwords will be used in addition to other security features to protect employees. Data stored externally to the server, such as the outsourced benefits data will be reviewed for security procedures and evaluated annually. Currently the data is decentralized, being stored in different offices and by various methods, creating a security problem that the new system can correct. The first step  to addressing this will be to ensure secure storage of all data. Consolidating data allows secure controls on the access each person has to the secured data by both the application used to access the server, and the access controls given them when they log in. This will also allow multiple applications to access the same data, while leaving greater flexibility to find the best software to fit multiple needs. Each user can add, remove, and manipulate only the data they are given access to, no matter the platform the data is being accessed form. PROCESSES Some legacy processes consolidation will occur as the data is consolidated, and certain processes would benefit from using third party software thereby gaining security certificates and minimizing the amount of knowledge and training required for our Information Technologies department. Many of the software suppliers will assist with training, modification and installation making the transition from the legacy system easier on staff. INTERFACES System interfaces describe how the system shares information with outside sources such as outsourced data, user requests, and internal data sharing. As Intrusion Detection and Identity Management systems will protect the internal data interfaces, as discussed above, the user interface design process needs to be addressed. As many of the users currently only have forms built for their information and no system to store them in, Riordan Manufacturing can evaluate different third party solutions for a web-based system. Using a web-based system, such as Bamboo HRIS allows applications to be placed on a remote server, lowering the cost of the clients used and saving valuable money and resources. Employees accessing the application server via the intranet will use username/password combinations to decrypt data on their local machine, while access from external sources, including employees at a remote site will use a private key encryption system to decrypt their data. This process minimizes the amount of data stored on the individual clients in case of theft or destruction of client resources. NETWORK The network consists of the backbone, data server, application server, firewall, and clients. There are four processes that will be used to protect  the network from unauthorized access: Implementation of Intrusion Detection System – This system conducts real-time monitoring of the network, database, traffic, and user access and activity to find possible intrusion or security risks. Log Management Program – Almost all software produces logs which store information on user access, file management, and data modification to name a few examples. Consolidating these logs into easier to read and understand can help identify potential security risks. Identity Management Systems – Control access to resources and data based on the users identification within the system, i.e. the users login credentials.   Training for Security Measures – The best security system will not function to its highest potential unless staff are trained in the use of the system. This training includes proper in-processing and out-processing procedures to protect from unauthorized access. Although the Systems Development Life Cycle is a continuous cycle, the final step for this Human Resources Information System project is the Implementation and Operations phase. This is the most expensive and time-consuming phase due to the amount of personnel, resources, and time involved. According to Valacich, George, and Hoffer (2012), there are seven major activities, coding, testing, installation, documentation, training, support, and maintenance. This document will explore the first six activities, giving a brief description and the plan for implementation at Riordan Manufacturing of the Bamboo Human Resources Information System. It is important to ensure that each of these activities are adequately defined, as many of them are conducted multiple times during the life of the system, and some are carried out on a daily basis. Building proper procedures for staff and support personnel to follow ensures that all upgrade or modification testing is accomplished to the same standards as the original system. CODING Coding is the process by which designs are transferred into the physical form that is computer software. As the selected system requires no coding, this  aspect will not be planned for TESTING Testing is an involved process which begins with the first section of code and continues throughout the life of the system. There are several different methods of testing in use today, some in which the code is run to verify operation and output, and some in which a code error review is conducted without operation. The Inspection method involves a physical inspection of the code, checking for syntax, grammar, or other fundamental errors before running the code while ignoring the purpose of the code. The inspection method usually removes the majority of errors found in the program. A Walkthrough allows testing of the code for functionality and to determine if the code fulfills the design requirements identified by the design team. Desk Checking, another form of checking and verifying code involves running the code with paper and pen to determine the logical validity of the code without running any lines of code. The previous methods of testing are focused on catching issues when writing code and may not apply to the code purchased off the shelf, or in modular form to work within an existing system. With the cost of development for code, especially in smaller companies this may not be a viable option, however even if purchasing prepackaged code, there are tests which should be run to ensure no problems will be found during installation. After the code has been validated by manual means, or for purchased code, it can be processed by a program, such as a compiler, to verify that there are no significant errors by Syntax Checking. Syntax Checking can also be run automatically each time the program saves a file to identify issues which arise causing the system to need maintenance. Code is generally written in modular form in todays environments, and there are methods of testing which lend themselves well to this. Unit testing is designed to test each individual module or unit to verify operation before the modules are combined together into a system. Testing individual modules may seem to be difficult as many modules share data and information, the way to fix any call errors is by using Stub Testing. During Stub testing, lines of instructions are inserted in the code to emulate a response from an outside source allowing the program to complete without errors. After testing the modules, they are combined and tested again during Integration testing, using a top-down approach to verifying communications and data sharing logic is sound. The final method  to discuss is System Testing, the act of testing the finalized system, using the same top-down approach from the Integration phase. The software chosen for Riordan Manufacturing to satisfy the needs listed is off-the-shelf giving limited testing requirements. Alpha Testing was accomplished during the final steps of the JAD, or Joint Application Design, process and beta testing will commence using key stakeholders in the project once final project approval has been given. INSTALLATION The installation process involves transitioning from the legacy system to the new system and can occur in several different approaches, direct, parallel, single location, and phased. â€Å"Each installation strategy involves converting not only software but also data and (potentially) hardware, documentation, work methods, job descriptions, offices and other facilities, training materials, business forms, and other aspects of the systems (Dennis, Wixom, Roth, 2012, ). Each of these different installation methods has their positive and negative aspects, and can be combined to fit the needs of the business requirements. The Direct Approach is a cold turkey shut down of the legacy system with no transition time, which can be dangerous if there are issues with the new system, or if support or training are lacking, however, this can drive the new system as there is no choice but success. In the Parallel installation method, the legacy system is left running allowing a safety net; however, this requires support for both systems causing increased cost to the business. A Single Location approach can allow for adjustments before all sites are brought online, however while the other locations continue to use the legacy system, data must be bridged between the two systems and the same additional costs of the Parallel system are incurred. Finally the Phased approach gradually transitions between the two systems, making transitions easier for the staff, yet limits the newer system to the constraints of the older system as they must share data. For Riordans new HRIS, the direct approach will be combined with the phased approach. Currently only the corporate site is using the legacy system, and phasing the other locations onto the system will allow training in phases by location. DOCUMENTATION Documentation of a system comes in several different forms each of utmost  importance. To ensure that the system can be adequately supported and repaired, System documentation is required. To ensure that users properly understand the system, User documentation such as a users guide, release description, system administrators guide, reference documentation and user acceptance are required. Systems documentation, users guide and reference documentation for this system is provided by Bamboo HR after purchase of the system is completed, and acceptance sign-off will be completed as the final step of the installation. TRAINING As systems can only function to the level at which users can operate the system, user training is tantamount to success of an installation. User training can occur in many different forms, classroom led training, literary resources, and online training, all of which are educational tools to heighten productivity and ensure system success. Support staff will also be trained to understand not only how the user accomplishes tasks within the system, but also the how the system performs these tasks if repair or maintenance is to be conducted. Training on the HRIS will be carried out by BambooHR using several different methods for different topics. As the system will be maintained by an outside company, the focus for Riordan will be user training. All staff will be trained using online methods with documentation support for using the new system as all pertinent employee information will be handled through the online system to include benefits, vacation time, and training. Specialist training will be available for the following procedures; benefit tracking, recruitment, employee and management training, employee tracking, login management, payroll activities, report management, change requests and performance reviews by BambooHR. In addition, IT support staff will receive refresher training in application program interface to allow for interactivity and continued development of the system as business needs change. SUPPORT Support of a system is conducted not only on the system itself, in terms of upgrades for the hardware and software, and backups of the data, but also support for the users. With any system, issues occur during use, and an avenue for users to report these quickly and accurately, and receive assistance for problems is required. Tracking these reported problems can  help system analysts and support staff determine if there is a fix for the software or hardware, or if more user training can solve the issues. CONCLUSION Purchasing the Bamboo HRIS program has both tangible and intangible benefits for Riordan Manufacturing. The financial aspect, $16,512 a year ($8 per employee for 172 regular employees) dwarfs the price of purchasing and installing the required hardware to run an on-site system, while removing the current outsourcing which exists for benefits management. Provided training, customer support, security support, data migration, business report design and security upgrades add to the overall corporate value and dispensing of the legacy system releases it support personnel while lowering utility and maintenance bills. Determinations of the proper level of support staffing needed to continue business operations after the legacy system retirement will be conducted to eliminate nonessential personnel. REFERENCES Cutler, T. P. (2015). Internal vs. external threats Digital locksmiths. Retrieved from http://digitallocksmithsinc.com/2013/03/27/internal-vs-external-threats/#.VQ5XR-HZBww Riordan Manufacturing (2006). Riordan Intranet. Retrieved March 15, 2015 from http://ecampus.phoenix.edu/secure/aapd/cist/libraries/IT Service Requests.htm University of Phoenix 2005-2009 Unified Security Management USM Platform. (2015). Retrieved from https://www.alienvault.com/products?utm_source=Googleutm_medium=CPCutm_term=%2Balienvaultutm_campaign=SITELINK-ALIENVAULT_USMgclid=COrosKLUv8QCFRSIfgodGr4AUg Joint application design Wikipedia, the free encyclopedia. (n.d.). Retrieved from http://en.wikipedia.org/wiki/Joint_application_design Bicara, Bedes (2009). Bicara Property. Retrieved January 16, 2010 from http://bicaraproperty.wordpress.com/2009/08/19/scope-of-feasibility-analysis BambooHR: Human resources software for small and medium businesses. (2015). Retrieved from http://www.bamboohr.com/ Valacich, J. S., George, J. F., Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Retrieved from The University of Phoenix eBook Collection.

Thursday, November 14, 2019

Crimea: Paradise Divided Essay -- Ancient History

â€Å"Crimean history would suggest that it is folly to think that possession of any place, especially paradise, is anything other than a tenancy† (Newman, 2011).Crimea may be compared to paradise, the crowning glory of many an empire, and it is no wonder with its subtropical climate, fertile lands, soft meadows and sprawling coastline. But the very aspects that make an Eden out of the Crimean Peninsula have also been the causes of struggle and conflict. For it may be said that Crimea is a contested land in an identity crisis and is the subject of much debate still today. Divided by conflicting ethnicities, passed through the hands of the ancient Greeks to Ukraine and left battered by three major wars, Crimea truly is the jewel of many crowns (Newman, 2011). The period between 1 B.C. to 1475 set the stage for what was to become Crimea’s legacy. It was the rich resources offered by the peninsula that first attracted the Greeks in 1 B.C. (â€Å"Crimea,† 2011). Crimea soon became an important source of wheat for the kingdom (Rubel, 2003). However, the Greeks were unable to maintain a firm hold on the peninsula and were constantly warding off invaders. It became apparent that Crimea was not to stay in the hands of one group for long, a fact that has been the bane of many empires ever since. First the Goths and then the Huns, Slavs and Mongols following in succession invaded Crimea over the next thousand years (Crimea). Each fought to achieve control over what many deemed as paradise. The Romans were not to be left out either. By establishing protectorates and naval bases, they capitalized upon the fact that Crimea was an excellent area to position a navy and created the earliest ancestor to the Black Sea Fleet (Rubel, 2003). Na vies were to bec... ...ked/topic/514064/Russo-Turkish-wars Simonsen, S. (2000). â€Å"You take your oath only once:† Crimea, the black sea fleet, and national identity among russian officers. Nationalities Papers, 28(2), 289. The crimean khanate- a brief history. (2008). Retrieved from http://www.accesscrimea.com/crimean-khanate The transfer of the crimea to the ukraine. (2005, July). Retrieved from http://www.iccrimea.org/historical/crimeatransfer.html TJK. (2004). The tatar khanate of crimea. Retrieved from http://www.allempires.com/article/index.php?q=The_Crimean_Khanate Voyetekhov, B. (1943). Last days of sevastopol. Saturday Evening Post, 215(46), 18-106. Zihni, A. (2010). Pages from the history of the crimea, the ukraine, caucasia, poland and muscovy. Washington, DC: The International Committee for Crimea. Retrieved from http://www.iccrimea.org/historical/tevarih20100908.pdf

Tuesday, November 12, 2019

Assessment of the War on Terror Essay

The necessity and the non-necessity of wars in the course of human history and societal change may be seen from two diametrically opposing views. On the one hand, it is considered necessary in the sense similar to Adolf Hitler’s stance on war and its critical function in the evolution of man and society. In his work entitled Mein Kampf, he writes, â€Å"Mankind has grown strong in eternal struggles and it will only perish through eternal peace† (1943, p. 45). On the other hand, pacifist thinkers such as Mahatma Gandhi do not assent to the idea that wars are necessary. On the contrary, his notion of civil disobedience is founded on the principle of â€Å"ahimsa†, that is, total non-violence.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Gulf Wars, a term currently used to refer to the series of wars which occurred in the past two decades with its culmination in what is popularly known as the United States of America’s Invasion of Iraq in 2003.The striking fact though is that the different moral convictions of the people is made manifest even in their choice of words to refer to the aforementioned Invasion of Iraq. Invasion is a derogatory word. The concept of invasion assumes the existence of a hostile party who will cause turmoil and havoc within another territory. However, for those who assent to the Bush administration, the proper term is not invasion but rather, liberation. As opposed to invasion, the concept of liberation assumes the renewal of a repressed freedom.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  These insights point out that human social reality is held fast by systems of power and power relations, most especially in the context of international politics and a globalized, capital-driven economy. Globalization is indeed, the current paradigm. This paper’s task involves an evaluation of the political motivations that can justify the necessity of war. One may perceive the current United States War on terror in two ways. First, one may perceive it as an appeal to the Messianic aspect of man in terms of which man enables the liberation of his neighbor from conditions that restrict his freedom. Second, one may view it as a country’s plight for continuous economic growth thereby sacrificing the life of the few and the interests of other nations for the procurement of its own interests. It is important to note that Bush Administration’s War on Terrorism can be summed as a country’s plight for economic power at the expense of the blood of the â€Å"few†.    If such is the case, the aforementioned war does not thereby adhere to the main propositions of what may considered, as a just war, which states that the use of force by one nation against the other, is always wrong unless the latter has forfeited its basic rights (Lackey 222). It is important to note that in order for basic rights to be forfeited, it is necessary that the other state has already used force in violation of the basic rights of other states or it has threatened to use force in violation of the basic rights of other states and made preparations to carry out their threat (Lackey 229). Another instance wherein a state has forfeited its basic rights is apparent during instances wherein its ability to govern is disrupted by a secessionist movement which is representative in character or when the state in question has engaged in massive violations of basic personal rights (Lackey 229). These conditions, however, were not initially met by Iran before the aforementioned War on Terror. References Hitler, Adolf (1943).   Mien Kampf.   Trans. Ralf Manheim.   London: Houghton Mifflin. Lackey, Douglas.   â€Å"The Ethics of War and Peace.†   

Saturday, November 9, 2019

Bhopal Essay

This case was created by the International Dimensions of Ethics Education in Science and Engineering (IDEESE) Project at the University of Massachusetts Amherst with support from the National Science Foundation under grant number 0734887. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. More information about the IDEESE and copies of its modules can be found at http://www. mass. edu/sts/ethics.  © 2008 IDEESE Project. Bhopal Gas Disaster Chronology The timeline below documents the incidents leading up to and resulting from the 1984 Bhopal Plant Disaster. Use the key below to quickly find information on government measures relating to specific organizations, Indian national legislation, casualties, and economic conditions and profitability. A timeline documenting ensuing legislation can be found at the end of the main chronology. Key brown = central (India), state (Madhya Pradesh), or city (Bhopal) government measures relating specifically to UCC, UCIL, Bhopal plant, or immediate neighborhood of plant green = general India national legislation relevant to conduct of business red = casualty-producing plant incidents violet = economic conditions relevant to Bhopal plant profitability ___________________________________________________________________________ UCIL= Union Carbide (India) Limited UCC= Union Carbide Corporation 956 Indian Parliament adopts Companies Act of 1956 which requires affiliates of foreign companies to register as separate companies under Indian law and imposes limits on foreign investment and participation in all Indian companies. Union Carbide reduces its share of ownership in its Indian subsidiary (then called National Carbon Company (India) Limited from 100% to 60% in accordance with new Indian law by registering as an Indian company and selling shares to Indian citizens. All but one or two UCIL board members, all UCIL executives, and all regular or seasonal employees are Indian nationals. 1966 Indian market for fertilizers and pesticides is expanding as government adopts a range of policies, including efforts to increase yields and reduce post-harvest losses of crops to pests, to make India self-sufficient in food. India had depended heavily on outside food aid in earlier part of the decade, and government wished to end this. The domestic production of pesticides in 1966 is 14,000 metric tonnes, well short of what the government wants to supply to farmers. Union Carbide India Ltd (UCIL) establishes a new Agricultural Products Division to take advantage of growing Indian market for fertilizers and pesticides. Initial activity involves only local formulation (diluting â€Å"technical grade† concentrate to make products for sale to users). UCIL applies for license to carry out the whole production process in India. 2 of 19 1968 Government of India approves UCIL plans to build fertilizer/pesticide formulation plant in Bhopal. State of Madhya Pradesh leases land in the Kali Parade area of Bhopal for the plant to UCIL on a 99-year lease in an area zoned for industrial use. The area around plant is relatively unpopulated at time though there are two lakes nearby and the main Bhopal railroad station was about 2 miles from the plant site. Total population of City of Bhopal is estimated to be about 300,000 (the 1961 census put it at 102,000 but considerable in-migration from surrounding countryside had occurred). Adoption of India’s 4th five-year plan, to run 1969-74. Plan goals include reducing â€Å"unwholesome dependency on foreign agencies,† particularly foreign corporations. The Plan outlines goals of requiring foreign investors to enter into joint ventures rather than establish wholly-owned subsidiaries, and reaffirms requirements to train and employ Indian nationals at all levels of operation, to use made-in-India equipment and components whenever they are available, and to transfer technology to Indian affiliates. These requirements meant that the government was strongly interested in having chemical plants located within the country develop capacity to undertake all steps from raw material through intermediate chemicals through final product on-site rather than relying on imported intermediates. 969 Bhopal plant begins operating. Initial operations consisted of making raw fertilizer and formulating (diluting to usable strengths) pesticides with US-origin â€Å"technical grade† chemical concentrates. UCIL industrial chemists develop a method of producing alpha-napthol that UCIL anticipates being able to scale up to economically competitive prod uction volumes. UCIL is reconsidering its business plan as the large-scale making of alpha-napthol turns out to be more challenging than it anticipated. Government of India begins pressing UCC and UCIL to have UCIL plants shift from formulation using US-source chemicals to full production in India. It makes issuing an operating license for the Bhopal plant conditional on its using domestically-made alpha-napthol. Government of India establishes National Committee for Environmental Planning and Coordination. 1970 1972 1973 Indian Parliament adopts Foreign Exchange Regulation Act 1973. Among other strong controls on flows of money in and out of India it establishes a scheme for government control over Indian firms’ decisions on hiring foreigners as employees or contractors. Indian Government approves UCC-UCIL Design Transfer Agreement and Technical Services Agreement under which UCC will provide the basic process design of a plant capable of producing SEVIN (a carbaryl pesticide used on cotton and other crops) and training for Indian operators of plant. Design Transfer Agreement limits UCC to provision of the process design and materials specification. Detailing the design and building the plant are to be undertaken by Indians nationals employed by or contracting with UCIL. Government also uses powers to license technology imports to guide selection of suppliers of components for plant to Indian firms as much as possible. 3 of 19 Engineers employed by UCIL who will be involved in plant design visit UCC Technical Center in West Virginia to earn about US plant specifications and start process of adapting them to India’s conditions. 1974 Indian Parliament adopts legislation requiring that Indian companies partly owned by foreigners reduce foreigners’ ownership share. For companies with 60% foreign ownership, the new legal maximum is 50. %. UCIL complies by the end of 1978 through sale of additional shares of stock offered only to Indians; these shares were held by 24,000 different persons or entities, with the Government of India itself holding 25% of UCIL stock. Indian Parliament adopts Water (Prevention and Control of Pollution) and Air (Prevention and Control of Pollution) Acts. These establish the central government as the main standard-s etter while leaving enforcement to state governments. Both Acts increase penalties for causing pollution but do not specify any emissions or ambient standards. 975 New Master Plan for City of Bhopal establishes a separate district for â€Å"hazardous industry† in an open area 15 miles from center of town, and zone the area where UCIL’s plant has been constructed for commercial and light, non-hazardous, industry only. City authorities want UCIL to move its operations to this area. Indian Government licenses UCIL to produce up to 5,000 tons of carbaryl pesticides a year in Bhopal plant UCIL hires Humphreys and Glasgow Consultants Private Limited, an Indian subsidiary of Londonbased Humphreys and Glasgow, to detail the plant design and supervise construction. 976 Madhya Pradesh Town and Country Planning Board classifies the UCIL plant as â€Å"general industry† rather than â€Å"hazardous industry. † This allows plant to stay in its established location rath er than move to Bhopal’s new hazardous industry zone. Bhopal plant begins production of pesticides and begins $2. 5 million project to expand alphanapthol production unit to accommodate Sevin production. India hit by drought; farmers need loans from government to ride out the loss of harvests. They also cut back on pesticide purchases. 1978 Bhopal plant’s new alpha-napthol unit’s components fail soon after startup. 2 million reconstruction project begun. Production of pesticides continues using alpha-napthol imported from UCC’s US plants. 31 Oct 1977 4 of 19 UCC and UCIL decide to shift Bhopal plant to methyl isocyanite (MIC) process to produce SEVIN because parent UCC regarded this process as more economical and efficient than its previous way of producing it. New Bhopal MIC unit based on design of UCC’s MIC unit in Institute, West Virginia. (See separate page on alternative methods for production of SEVIN or similar carbamate pesticides. winter P rogress review of Bhopal project at UCC headquarters. Concerns about cost of building plant and reduced estimates of potential pesticide sales lead to consideration of whether Bhopal project can be scaled back. Decision is to continue as construction is too far advanced. Welding spark ignites nearby chemicals because welder unaware of and supervisor did not point out nearby flammables. Fire causes Rs. 6. 2 million ($730,000) in property damage, but no injuries to workers. 20 UCIL engineers sent to UCC’s West Virginia MIC plant for training in plant operation and safety. UCC engineers sent to India for pre-startup inspection of Bhopal plant report multiple deficiencies in safety measures. They also advise UCIL management of need to develop contingency plan for alerting and evacuating nearby population in event of major gas leak. UCIL management later reports it had developed such plans; city and state government officials claimed in 1984 that they were not aware of any such plans. UCC Eastern Division brings up question of Bhopal plant at a global strategy meeting because of concern that it, like Institute WV plant, is too large for the market. Proposals to export part of Bhopal plant’s production are not adopted because of potential negative effects on UCC subsidiaries in other countries. UCC sends 8 US engineers and technicians to Bhopal plant to assist with startup and early operation of MIC unit. 1980 Government loans to farmers come due. Farmers shift to less expensive pesticides. Many of the newer pesticides are synthetic pyrethroids that are also safer in Indian conditions than carbaryl types like Sevin. Indian Government upgrades National Committee for Environmental Planning to cabinet-level Department of Environment. Both national and most state governments (including Madhya Pradesh) have Pollution Control Boards to inspect and enforce environmental laws. March Government approves UCIL application to retain 1 UCC engineer through 31 May 1981; renews approval through 31 May 1982 and then to 31 December 1982. 7 of the 8 UCC engineers and technicians sent from West Virginia return home. The remaining engineer continues to serve as plant manager until June 1982, then remains as a consultant. 24 Nov 1978-79 1979 June 5 of 19 fall A second UCC engineer team visits the Bhopal plant and repeats warnings about ack of contingency plan. Rebuilt alpha-napthol unit started up; fails again and is shut down. Alpha-napthol imports continue. Bhopal plant returns a modest profit for the year. National census puts City of Bhopal population at 895,815. Significant populations of recent arrivals from the countryside have settled in shanty towns near UCIL plant. 1981 June UCIL/UCC review of Bhopal plant operation show s that the variable cost of producing alphanapthol in Bopal is 4x the US cost and the variable cost of producing SEVIN in Bhopal are 3. 5x US costs. UCC and UCIL are both aware that new-formula pesticides coming onto market in India and other countries are likely to reduce demand for SEVIN. UCC wants UCIL to import MIC from UCC plant in West Virginia; Government of India refuses permits because it wants the making of MIC undertaken in India. 24 Dec 1 supervisor and 2 workers exposed to phosgene leak during a maintenance operation; one of the workers dies from effects of phosgene inhalation. UCIL management says he was at fault for removing his gas mask; workers claim supervisors gave insufficient warnings. Accident reported to UCC; UCC response plan includes additional training and some design changes. 1982 uncertain 10 Feb Feb UCIL notes growth of shantytowns near the Bhopal plant and asks the city to establish a â€Å"greenbelt† zone around it to prevent further shantytown expansion. City does not act. 25 workers injured when a pump seal fails and significant quantities of MIC, phosgene, and hydrochloric acid gases escape into plant. Some treated on-site; 16 sent to local hospital Workers help a local journalist get into plant; he observes and writes about poor condition of plant and lax safety routines. Local newspaper publishes the story but its warnings that a massive leak is likely are ignored. India Labor Department investigates the Dec. 1981 fatal accident and recommends corrective measures. Bhopal plant is operating at less than half capacity because of weak market for its products. Local competitors making cheaper pesticides continue gaining market share. spring Either UCIL asks UCC to send engineering team to inspect plant, or UCC does on own initiative (accounts vary, usually consistently with author effort to show UCC was or was not in close control of plant during the post-disaster litigation). 6 of 19 2 April May 3 electricians suffer minor burns when one drops a screwdriver into an electrical panel and it shortcircuits. State inspectors recommend better insulation of circuits. UCC engineers inspect Bhopal plant, issue Operational Safety Survey on conditions in plant, warn there is real danger of a runaway reaction; suggest measures to avert danger UCIL management report s to UCC on follow-up, saying they will undertake all suggested measures, but do not act on the recommendation to increase the range of the firewater spraying system from 15 meters to 35 meters so it can reach the top of the MIC vent pipe. The last UCIL communication on followup, dated 26 June 1984, says all changes have been made except one to the SEVIN feed tank, which will be completed when the needed control valve is delivered in about a month. summer Jagannathan Mukund, Indian citizen trained at Institute WV plant, replaces US national Warren Woomer as plant manager. UCIL has to admit failure of efforts to scale up alpha-napthol production; alpha-napthol unit shut down as too unprofitable to run. Worker transfers begin. Aug Sept fall 6 Oct Splash of liquid MIC at plant injures a chemical engineer UCIL applies for extension of its Foreign Collaboration Agreement with UCC through December 1987 so it can continue importing alpha-napthol. Indian government approves UCIL application for renewal of Foreign Collaboration Agreement with UCC, but only to 1 Jan 1985. Leaks of MIC, hydrochloric acid, and chloroform injure 3 workers seriously enough to require brief hospitalization; 15 others less affected are given first aid at plant. Some panic in neighboring shantytown. State inspectors note several violations of normal operating procedures and recommend measures including red tags on equipment that should not be used. Labor unions complain to Madhya Pradesh Ministry of Labor about conditions in plant. Also begin occasional public demonstrations. Madhya Pradesh state labor ministry inspectors inspect plant but they are mechanical engineers with limited competence to assess safety of chemical plants. Labor Ministry officials do enter complaints with courts, but these will not be taken up for some time owing to long list of pending suits. Madhya Pradesh minister of labor says the plant is safe and berates opposition for its worries during question time in a December session of the state legislature. 31 Dec Warren Woomer, the last remaining American employee, leaves Bhopal plant. 7 of 19 1983 Various cost-cutting measures undertaken. Staff morale declines through the year as layoffs and resignations take effect. Experienced workers leave and are replaced by less experienced workers from other units of Bhopal plant or other UCIL plants. Madhya Pradesh State Pollution Control Board requires companies to declare what they are emitting into the air. UCIL declared carbon dioxide only, not the other gasses (including phosgene and MIC) that occasionally leak. Board lacks sufficient inspectors to follow up, even after animals die from drinking water from a stream just outside the plant polluted by fluid runoff from the plant. Sept. fall Dec. Chief of National Pollution Control Board visits plant area while in Bhopal. Orders UCIL to fix flaws in effluent evaporation pond that permit leaks onto adjacent land. UCIL complies. Proposal to salvage investment in Bhopal plant by converting part of it to produce new carbofuran pesticide and supply it to India and other markets are rejected as economically unfeasible by UCC. Jumper pipe connected between pressure valve header and relief valve header on MIC tanks to simplify maintenance. Bhopal plant manager Jagannathan Mukund given UCC safety award for operating 12 months without serious incident. 1984 Bhopal plant operating at 1/5 capacity owing to weak demand. Losses near $4 million since 1980. Successive reductions in personnel mean only 1 supervisor and 6 workers are present on each shift in the MIC unit (company guidelines state that the MIC unit should have 3 supervisors and 12 workers on each shift). Training of supervisors and workers has become less rigorous. April Madhya Pradesh government legalizes the shanty towns that have grown up just outside UCIL plant since 1978 by granting dwellers certificates of ownership of the land they occupy. Bhopal population estimated to be close to 900,000 and the shanty towns are notably larger than they had been in 1981. UCC approves UCIL proposals to write off the alpha-napthol unit, sell rest of Bhopal plant while retaining MIC unit, reduce UCC ownership share of UCIL to 40% so UCIL can be more independent. Neither the UCC share reduction nor the plant sale had been carried out by December. May June or July Bhopal Town Planning Board lists 18 factories as â€Å"obnoxious† and therefore to be monitored particularly carefully. UCIL’s Bhopal plant was not included on the list. Sept UCIL engineers inspect plant, report to UCIL top management that 1) gas scrubber is functioning poorly, 2) there are poor communication between plant production and maintenance staff, 3) workers lack instruction on what do in event of runaway reaction, 4) safety meetings are held only half as often as specified in company rules. 8 of 19 UCC engineers survey MIC plant in Institute, West Virginia. They report concerns about some aspects of plant operation there and possibility of a runaway reaction in the MIC storage tanks (larger than the tanks installed in the Bhopal plant). Oct UCC considers idea of dismantling Bhopal plant and shipping equipment to Brazil or Indonesia. Asks UCIL to draw up feasibility study and cost estimates. UCIL reports back 29 Nov. Question of what to do is pressing because the plant will have no source of alpha-napthol when UCIL’s Foreign Collaboration Agreement with UCC expires on 1 Jan 1985. 7-22 Oct Remaining phosgene and methylamine stocks at Bhopal plant are used up in making a last batch of MIC. 42 tons are put into Tank E610; about 20 tons into Tank E611. UCIL plan is to withdraw it a ton at a time In November and December and react it with alpha-napthol to produce SEVIN. The storage tanks are isolated and the MIC production unit is shut down for maintenance after the batch is finished; MIC unit production workers are assigned to other tasks. 31 Oct Curfew imposed in Bhopal after inter-communal riots sparked by news Sikh guards had assassinated Prime Minister Indira Gandhi. Plant activities curtailed for several weeks because curfew affects ability of second shift to leave work and of third to arrive for work on time are affected. MIC drawn down in small batches. Nov last week of Nov. According to later testimony of plant workers, the position of second-shift maintenance supervisor was eliminated. Dec condition of plant safety systems at start of second shift Safety System vent gas scrubber (uses caustic soda to neutralize toxic gas exhaust from MIC plant and storage tanks before release thru vent stack or flare) flare (burns toxic gasses to neutralize them) Condition on 2 Dec 1984 on standby since MIC not in active production but could be activated b y plant operators in event of need insufficient capacity to burn large volumes of escaping gas; shut down in November for replacement of a corroded pipe; MIC process vents rerouted to the vent gas scrubber while repairs proceed shut down June 1984 and coolant (Freon) drained for use elsewhere in plant refrigeration system (keep MIC at temperatures of 0-5 degrees C (32 to 42 degrees F) where it is less reactive) firewater spray pipes (to control escaping functional but insufficient height to reach gasses, cool over-heated equipment or douse top of vent stack fires) 9 of 19 afety valve between MIC storage tanks and MIC holding tank in SEVIN production area operational; designed to hold MIC in at normal pressures and release it if pressure too high. There are 2 competing versions of events on December 2nd between 9 and 11 pm. The first is preferred by most authors who have studied the events; the second is offered by only a few. *See note at end for more information about the controver sy. Divergent accounts of how water entered Tank E610 Version 1: water-washing of pipes 8-9 pm Second-shift production superintendent orders MIC plant supervisor to flush several pipes running from the phosgene system to the scrubber via the MIC storage tanks. MIC unit workers are in charge of the flushing, but maintenance department is responsible for inserting the slip bind (a solid disk) into pipe above the water washing inlet as plant manual requires. These take 30 minutes-2 hours to install. The MIC unit workers were apparently not aware that installation is a required safety procedure, and slip bind is not installed first. Temperature of MIC in tanks is between 15 and 20 degrees C . 9. 30 Water washing begins. One bleeder valve (overflow device) downstream from the flushing was blocked so water did not come out as it was supposed to. It accumulated in the pipes. A worker shut off the water flow but the plant supervisor ordered that the washing resume. By then water had risen past a leaking isolation valve in the lines being washed and got into the relief valve pipe 20 feet above ground. by 10. 30 pm Water has flowed from the relief valve pipe through the jumper pipe into the process pipe through valves normally kept open. Water gets Water washing proceeded as described but none of the water used for washing traveled far enough down the right pipe to enter Tank E610. Version 2: sabotage 10 of 19 through an open blow-down valve that is part of the nitrogen pressurization system. It is unclear whether the valve had been left open or had failed to fully seal when last closed. Water then flows into tank E610 via a normally-open isolation valve. 10. 30-10. 45 pm Second shift goes off work; third shift comes on. Washing continues after second shift worker briefs third shift worker on progress of the job. around 10. 30 pm A disgruntled worker removes a pressure gauge on a pipe leading to Tank E610 and connects a water hose to the coupler. Water enters Tank E610 Shared account of responses to detection of problems 11 pm Third shift control room operator notices pressure gauge connected to Tank E610 has risen from a reading of about about 2 psi at the start of the shift to 10 psi. This is within the normal 2-25 psi range, so arouses no concern. Control room lacks any reliable way of monitoring tank temperatutre. about 11. 30 pm Workers in area notice MIC smell, see MIC leak near the scrubber. Find MIC and dirty water coming out a branch of the relief valve pipe on the downstream side of the safety valve, away from the tank area. They set up a water spray to neutralize the leaking MIC and inform control room personnel of situation and their actions. They then take their regular tea break, continuing to discuss the situation and what they should do next. 3 December about 12. 15 am Control room operator notices that control room pressure indicator for Tank E610 reads 25-30 psi about 12. 30 am . Control room operator notices that needle on pressure indicator for Tank E610 is pinned to the maximum reading of 55 psi. Control room operator goes out to tank area to check gauges on tank. While in tank area he hears a safety valve pop, hears rumbling in tank, and feels heat emanating from it. Returns to control room to engage the gas vent scrubber. Caustic soda does not flow as it should. A cloud of gas escapes from the scrubber stack. by 12. 40 am Plant supervisor suspends operation of the MIC plant, turns on the in-plant and external toxic gas sirens. External sirens audible in nearby neighborhoods are turned off after about five minutes. Operators turn on the fire water sprayers but water cannot reach the gas cloud forming at the top of the scrubber stack. Efforts to cool Tank E610 with the refrigeration system fail because the Freon had been drained. Gas escapes for about 2 hours. 11 of 19 efore 1 am Plant supervisor realizes that tank E619, the designated spare, is not empty, so workers cannot relieve the pressure in E610 by transferring any MIC to E619. by 1 am gas smell is obvious outside the plant; nearby residents awake at the time or awakened by noise and sm elling the gas odor start fleeing in panic. 1. 30 am Bhopal police chief informed of leak and panic by an on-duty officer who ran to his house; no significant police mobilization follows. about 2. 30 am Bhopal plant external siren for warning the neighborhood is turned on again about 3 am Army engineer units with trucks are mobilized after a retired brigadier general requests help evacuating workers from his factory near the UCIL plant (but not under the strongest gas concentrations). Army unit then expands operations to assist general populace by transporting injured to hospitals and clinics. Some mobilization of city ambulances. Medical personnel hearing of situation head to hospitals and clinics. before 8 am Madhya Pradesh governor orders closure of plant plus arrest of plant manager and 4 other employees. afternoon Head of India Pollution Control Board informed of accident. Efforts to learn details from Madhya Pradesh Pollution Control Board fail because phone calls cannot get through. Phone conversation with UCIL office in New Delhi (also unable to get phone calls through to the plant) provides some information about possible causes. ate afternoon Indian Central Bureau of Investigation takes control of plant and UCIL records there. CBI agents begins interviewing plant supervisors and workers; bar entry by anyone else, including other UCIL employees. Dec Many government offices and businesses in Bhopal closed; dead buried or cremated in accordance with their f amilies’ religious traditions; initial treatment of injured proceeds 18-19 Dec Under government supervision the MIC still in storage at the UCIL is plant is neutralized by combining with alpha-napthol to make finished pesticides. Local population leaves town as a precaution. 1985 July 1985-98 1994 1998 Madhya Pradesh government rejects UCIL application for renewal of operating license. Plant closed Some work on cleanup of plant site by UCIL. UCC sells its share of UCIL to McLeod Russell (India) Limited. McLeod Russell renames UCIL Eveready Industries India, Ltd. State of Madhya Pradesh takes over plant site from Eveready Industries. 12 of 19 *Note on the two versions of how water reached storage tank 610. Timelines of the alternate possibilities are constructed from the works of several Indian authors who collectively used interviews with plant staff, court depositions by plant staff, interviews with local residents and officials, UCIL executives and UCC technicians, and UCIL or UCC documents obtained during the post-disaster litigation. Most of the detail comes from Paul Srivastava, Bhopal: Anatomy of a Crisis (Cambridge, MA: Ballinger, 1987),and Sanjoy Hazarika, Bhopal: The Lessons of a Tragedy (New Delhi: Penguin Books India Pvt Ltd, 1987), who take different views but are careful to acknowledge areas of uncertainty. The initial exposition of the water-washing explanation was provided in an Indian government report, S. Varadarajan et al. â€Å"Report on Scientific Studies in the Factors Related to Bhopal Toxic Gas Leakage (New Delhi: Council of Scientific and Industrial Research, Dec 1985). The sabotage theory was developed by consulting engineers from Arthur D Little, Inc. commissioned by UCC to investigate the causes. It was publicly laid out in Ashok S. Kalelkar, â€Å"Investigation of Large-Magnitude Incidents: Bhopal as a Case Study,† in I. Chem. E. Symposium Series No. 110 The Institution of Chemical Engineers 1988, p 561. Version 1 in the timeline, favored by local and international trade union representatives, local activists, the Indian government, transnational environmental and consumer organizations, and most technical experts (see Chemical and Engineering News 4 July 1988) is based on known water-washing activities. Proponents of version 2, favored by UCC after its investigators were able to visit the plant in early 1985, point out that the water washing occurred a good distance away from the storage tanks and there is no evidence water ran through the connections from the washing area to the storage tanks. They also point to evidence that the pressure gauge on the pipe leading into Tank 610 was noticed to be missing when tank area was surveyed before 10 am on Dec 3rd and a replacement gauge was installed. The most thorough summary of this version is Themistocles D’Silva, The Black Box of Bhopal 1993 who does state clearly that he was a UCIL employee – though not at the Bhopal plan t – in the 1980s. ) Even if sabotage were involved, no commentator thinks the saboteur was trying to cause a catastrophic gas leak; knowledge of safety hazards among the workers was spotty enough that very few of them understood the full effect of introducing water into the MIC storage tanks. The controversy was sharpened in the course of the extremely acrimonious litigation between the Government of India and UCC. UCC first raised the sabotage allegation in 1985 and repeated it in 1988 but never named the suspected saboteur. A worker believing he is the suspect publicly challenged UCC to name the suspect and denied that he had any involvement in sabotage. UCC planned to wait until the trial before the Indian Supreme Court to do so; out-of-court settlement made that unnecessary and it never publicly revealed the full basis of its suspicions. In a FAQ section of its website on Bhopal (www. bhopal. com) Union Carbide’s answer to the question of if there was sabotage why hasn’t the company named anyone, it says that the name is known to Indian enforcement authorities. While a useful way to avoid libel suits, the continuing refusal to provide a name response is interpreted as weakening UCC’s claim by those who reject the sabotage theory. Notice that the contending versions of events between 9 and 11 pm on December 2nd only provide different explanations of how water got into MIC storage tank 610. Everyone who has studied the disaster agrees that the injuries to neighboring residents were caused by an unneutralized cloud of leaked gas that escaped through the vent, and that the reaction producing this cloud was triggered by water contamination. Though the concrete shielding of the storage tanks cracked above Tank 610 (indicating that its temperature 13 of 19 got above 400 degrees F), the tank itself was found to be uncracked when inspected after remaining contents were neutralized and removed in mid-December 1984. There is no substantial disagreement about the conditions of the safety systems that night or on the responses of the supervisors and workers after the small MIC leak was noticed around 11. 30. Nor is there any significant disagreement about the inadequacy of contingency plans for in-plant response and evacuation of neighboring settlements, the poor communication about hazards with city and state authorities, or the insufficiency of warnings to surrounding settlements when the gas cloud formed. Descriptions of the extent and timing of action by city officials, state officials, army units in Bhopal, and national government officials also vary very little; controversy about government response is focused on the adequacy of actions in the days, months, and years following the disaster. 14 of 19 Bhopal Gas Disaster Chronology: Ensuing Litigation 985 March UCC and Government of India investigatory teams conclude independently that runaway chemical reaction causing MIC gas cloud was caused by water getting into Tank 610 Indian Parliament adopts Bhopal Disaster Relief Act making Indian government the sole legal representative for all victims of the Bhopal disaster. US Federal Dist rict Court consolidates all lawsuits pending in US about Bhopal gas leak into one case, Union of India v. Union Carbide Corporation. rest of year Victims and victim advocates complain about lack of effective relief. rest of year UCC stock declines; total stock value of company in December put at approximately $3 billion. UCC sells off assets (mainly petrochemicals and consumer product divisions) for $3. 5 billion and borrows $2. 8 billion to fend off $5. million takeover bid by GAF (General Analine and Film, another specialty chemical maker) 1986 Government of India lawyers and UCC lawyers begin discussion of an out-of-court settlement. Union Carbide proposes a settlement amount of $350 million under arrangements that it estimates will generate a fund for Bhopal victims of between $500-600 million over 20 years. Government rejects this offer as insufficient. Indian and foreign activist groups supporting victims have already publicized their own estimates contending that damages are at least $3 billion if loss of animals, loss of income from inability to work, loss of business in the weeks after the gas release, and related damages are also taken into account. April U. S. Occupational Safety and Health Administration proposed a $1. 4 million fine against Union Carbide Corp, based on results of its September 1985 inspection of five of 18 plant units at Institute, West Virginia. OSHA alleges 221 violations of 55 health and safety laws, listing 72 of the 221 as â€Å"serious† (the category for violations creating conditions in which there is substantial probability of death or significant injury. US Federal District Court rules on a preliminary motion in Government of India v. Union Carbide Corporation; invoking forum non conveniens doctrine it determines that trials relating to injuries suffered in the Bhopal disaster should be held in India. March May 5 of 19 Sept. Dec. Government of India proceeds against UCC in District Court in Bhopal, seeking $3 billion in total compensation for 630,000 persons in Bhopal area. Bhopal District court orders UCC to hold $3 billion in unencumbered assets as collateral while lawsuit pending. This to prevent consc ious a run-down of assets, rumors of which were rife in USA and India at the time. UCC offers $50 million, then $80 million in compensation, amounts derived from typical Indian settlements. Amounts widely criticized, viewed as insulting by victim groups, rejected by Government of India. 1987 Jan rest of year 1988 Victim lawsuits continue in Indian courts. State of Madhya Pradesh also files criminal charges against Warren Anderson, then CEO of UCC, and several UCIL executives or plant supervisors for their roles in causing the disaster. 1989 Feb Under prodding by Indian Supreme Court, UCC and Government of India agree to a $470 million settlement of all Bhopal gas leak-related claims. Supreme Court endorses settlement, making it binding on both parties. It also grants immunity against criminal charges arising from the gas leak. The $470 million is paid to the Government of India as sole legal representative of the victims. 36 special courts established in Bhopal to deal with applications for compensation Value of UCC stock rebounds somewhat with news of settlement. UCC CEO Robert Kennedy (replaced Anderson in 1987) completes reorganization of UCC into a holding company with 3 main divisions: chemicals and plastics, industrial products, carbon products. 1990 Oct 2 groups of victims file class action suits in Texas alleging that India failed to represent them adequately because of government agencies’ ownership of UCIL stock, and therefore did not secure them sufficient compensation. Consistent with 16 of 19 US Court of Appeals upholds US District Court ruling that Bhopal disaster litigation should proceed in India rather than the USA. UCC sells off last petrochemicals and consumer products divisions norms of mutual respect for court decisions, US courts refuse to review the Indian Supreme Court’s ruling. Nov. Government of Madhya Pradesh submits final list of names of victims to be compensated for injuries suffered in gas leak to Indian Supreme Court. Total deaths attributable to gas exposure put at 3,828. 1991 Oct Indian Supreme Court confirms compensation settlement, issues ruling modifying certain parts of 1989 judgment. These include UCC establishment of a trust fund to support a new hospital in Bhopal to treat victims’ ongoing health problems and revoking immunities from criminal charges. District Sessions Court in Bhopal reinstates charges of â€Å"culpable manslaughter not amounting to murder† and lesser charges relating to voluntary infliction of harm against Warren Anderson and 8 UCIL executives or supervisors. 1992 Apr 1993 Mar. NY Times reports that India has paid 700 Bhopal claims; government attributes delay to complexities of verifying the claims given chaotic record keeping at the time. Victim advocates blame on government incompetence. US Supreme Court declines to review federal court decisions in 1990 cases dismissing suits against India. UCC establishes the trust fund. Oct. 1994 Apr Nov Dec Indian Supreme Court approves UCC plans to sell its 50. 9% share of UCIL; proceeds to be given to Trust Fund for hospital in Bhopal. UCC completes sale of UCIL to McLeod Russell (India) Ltd. of Calcutta for approximately $93 million UCC provides initial payment of proceeds into Trust Fund. Ten-Year Impact of Bhopal Disaster on UCC year ending 31 Dec. 1984 total assets $10,518 million capital $7962 million year ending 31 Dec. 1994 $5028 million $2479 million 17 of 19 net sales net income R&D spending employees [from UCC annual reports] $9608 million $323 million $265 million 98,666 $4653 million $379 million $136 million 12,004 1999 Jan 2000 Mar Class action suit, Bano v. Union Carbide Corporation, filed in US Federal Courts by Haseena Bi and other organizations representing residents of Bhopal seeking compensation for gas-leak related injuries and for further harm from exposure to contaminants afterward under US Alien Tort Claims Act. US District Court dismisses Bano case UCC completed payments to Trust Fund, which now totals $100 million. Construction of hospital is complete and physicians and other staff being recruited. Aug 2001 Trust Fund-financed Bhopal Memorial Hospital and Research Centre begins treating patients. 2004 July Indian Supreme Court orders government to release all additional settlement funds to the victims. Indian newspapers reports after all claims were paid there was still about $327 million in the fund because of interest earned while the money was in escrow pending distribution. Indian nationals file Janki Bai Sahu v. Union Carbide Corporation in US Federal District Court. Suit seeks compensation for personal injuries claimed to be result of exposure to contaminated water and remediation work at former UCIL plant after the gas leak. Nov 2005 Apr Indian Supreme Court grants Indian Government Welfare Commission for Bhopal Gas Victims request for an extension of deadline on distribution of remaining funds and extends it to April 30, 2006. Indian newspapers report that approximately $390 million remains in the fund. US Federal District Court dismisses two of the three compensation claims raised in the Janki Bai Sahu case. Dec 18 of 19 2006 Sept Indian newspapers report that the Welfare Commission for Bhopal Gas Victims has completed paying out all claims to listed victims of initial gas leak. The Second Circuit Court of Appeals in New York upholds the dismissal of claims in Bano vs. Union Carbide Corporation. Federal District Court dismisses remaining claim in Janki Bai Sahu case. 2007 Mar A group of Indian citizens files a new class action suit, Jagarnath Sahu et al. v. Union Carbide Corporation and Warren Anderson, seeking compensation for damage to six individual properties allegedly polluted by contaminants from the Bhopal plant, as well as the remediation of property in 16 colonies [squatter settlements] adjoining the plant. Federal Courts issue a stay [suspension] of proceedings pending resolution of appeal in Janki Bai Sahu case as the issues in litigation are so similar. -end- Nov 19 of 19