Wednesday, October 30, 2019

Tooth transplantation Essay Example | Topics and Well Written Essays - 1250 words

Tooth transplantation - Essay Example Patients must be carefully selected for this procedure. The patient must be healthy, available for follow-up visits, and able to follow post-operative instructions. Patients must also demonstrate that oral hygiene is a part of their regular lifestyle. Furthermore, suitable candidates must have a recipient tooth and a donor tooth to undergo the procedure. Patients’ cooperation and understanding are of utmost importance for predictable results (Clokie et al, 2001). Autogenous tooth transplantation is usually done because of tooth loss due to dental caries, mainly in the first molar of the lower jaws. â€Å"Transplantation can also be opted in cases like tooth agenesis (premolars and lateral incisors), traumatic tooth loss, canine atopic eruption, root resorption (body of the cells attack and destroy a part of a tooth), large endodontic lesions, cervical root fractures, and localized juvenile periodontitis† (dentalcareadvice, 2010). The above pictures (by kunni dental office) demonstrate the removal of the third molar (the wisdom tooth) that is transplanted to the site of the first molar which is beyond repair. The site must be prepared well to receive the donor tooth. There must be sufficient space and alveolar bone structure to accommodate and support the donor tooth. Teeth with poor shape and root morphology are not used in transplants (dental care advice, 2010). The success of the procedure depends on how well healing takes place after the transplantation. Normally, the tooth with a healthy periodontal ligament provides a higher degree of success. Tooth length and development stage are also important factors in determining the success of the procedure. There is less chance of necrosis (cell death) and higher chance of pulp survival when the premolar has already completed half to two third root development. Placement of implant supported prosthesis or other type

Monday, October 28, 2019

Individual Assignment Essay Example for Free

Individual Assignment Essay 1. Introduction Nowadays, as experts are studying further and further about personality, the importance of it in the society and workplaces is highly aware by everyone. The more we know about personalities, the better we can understand why people do the things they do, and how to communicate with them. Knowing about our own personalities, we can improve our styles, reduce stress and conflicts as well as develop positive attitudes in life (punctuality, flexibility, willingness to learn, friendliness†¦) Therefore, through this paper, I will examine deeply in my personalities as a particular example to further understand this matter. Moreover, with the focus on how it affects me in personal and professional development, I can find and improve myself to achieve the best success in my future. 2. Methodology The basic concept of my assignment is the Big Five Personality Model. â€Å"Five basic dimensions underlie all other and encompass most of the variation in human personality† are: * Extraversion: one’s comfort level with relationships. Extraverts get their energy from interacting with others, while introverts get their energy from within themselves. Extraversion includes the traits of energetic, talkative, and assertive while introversion personalities are usually quiet, reserved and shy. * Agreeableness: the extent to which a person is good-natured, helpful, trusting, and cooperative. Traits include being kind, affectionate, cheerful and warm. * Conscientiousness: responsibilities and reliabilities. Conscientious people have self-discipline, well-organized, careful and responsible. * Openness to experiences: creative minds and willingness to learn. People with high level of openness tend to be imaginative, curious, independent and somehow artistic. * Emotional Stability: ability to deal with stress and other tense situations. A person who is very stable emotionally would remain calm in many situations and would feel secure. Bases on this theory, with the help of an online website, I’ve got the result about my personalities according to Big Five Model. With this result, I will be able to evaluate and improve my career as well as my positive personalities. 3. Analysis results: Results: http://img841.imageshack.us/img841/9448/yourbigfiveresults.png In my opinion, this result is matched 80% with my real personalities. In real life, I can be comfortable with people that I already knew before, especially classmates, parents, siblings†¦ I can do silly things, say lots of random things, and joke freely. However, with strangers, I usually keep a secured distance, be formal and respective as much as possible. Sometimes, in disadvantaged circumstances, I might be shy and stay quiet all the time being with strangers as I don’t want strangers to know too much about myself. That’s why my result in Extroversion is a little above average score (59/100 respectively). Consequently, this will help me find balance in group working, be opened and be quiet when needed. My job performance will be improved along with my social skills. Moreover, in competitive situations, especially facing with rivals, I can keep them from knowing about my strength and weakness; or pretend like I am not a dangerous rival for them. Next, refer to Openness to Experience trait, because I really like original, conventional and unchangeable things so the low score (20/100) is reasonable. I don’t have a variety of interests but only a few one and do it thoroughly with my passion. However, sometimes the closeness in my mind prevents me from create new ideas and stay creative while brainstorming. But it’s true that I am a down-to-earth person as I really hate unclear, misleading, dishonest things/people. I know this attitude sometimes has a bad effect on my career and my personal life since I am not willing to learn new things so my training performance will not be as good as I expect. If I am a leader, I might ignore helpful creative ideas from my teammates. My honest and straight personality also bring me hard times dealing with others although it’s a really worthy trait. However, I believe that the original is always the best basement for my every innovation. It helps me balance a group that contains many open-minded people and keep conventional values of life. This conventional and honest personality might be one of the important reasons leads to my disagreeableness (22/100 of agreeableness). Because I am a little stubborn and hard to be persuaded, sometimes I find the dishonest people, the unclear things or the too-reliable-on-others person really uncomfortable and annoy me. Normally, I am quite kind and lovable; but whenever I am concentrating in doing something, I can easily be irritated by people who try to distract me. My perfection attitude also get me into quarrels as I always find the mistakes in others’ performances and try to fix it for them. Nevertheless, as my friends and teammates stated, the perfectionist inside me really helps them a lot when they complete their tasks. I am easy to be angry and annoyed but it’s always reasonable and related to work issues or problems of the equity. So I think this is not a disadvantage but an advantage for my career and personal life. Besides that, my flexibility in Emotional Stability helps me a lot in dealing with these two weaknesses. Despite easily being irritated by others, I can hold it in and balance my emotions really well. I made decision for tense situations really slowly and calmly. I don’t take it as a pressure or stress but only a problem like other problems everyone needs to face in life. One important reason for the low score is I am truly an optimist, seeing things with believe, happiness and hope. It’s not that I paint my life with pink, but my rational thinking always leads me to better things, not worsen the situations. As a result, my stress level will be reduced a lot, prevent me from being overload with tasks, problems, personal matters†¦ Because I know how to show my expressions and emotions at the right time, to the right person, my social relationships are really good, bring me benefits in both personal and professional life. I can tell that I have only one close best friend; but I have a lot of good friends who are ready to help me anytime I need, thanks to my emotional stability. The last trait is conscientiousness with high score at 83/100. This indicates that I am a well-organized, disciplined and reliable person. I really hate disorganized things and people. I always try to arrange my stuff into a fixed positions and I hate when someone try to change it or make it messy. I usually make plans; review its process regularly and try to finish as perfect as possible. If I am assigned a task, I will try to do it thoroughly and not let anyone complain about my performance, or at least reach the bearable stage. This is applied with not only my personal events but also my working tasks and problems, especially tasks I have a lot of interests in like handicrafts, writing for magazines, reviewing things. In my point of view, this is the most important trait among five traits. My great efforts and responsibilities will bring me more and more knowledge, then contribute to higher level of my job performance, as well as help me organize my life effectively. Not only those but people also trust me and respect me for my enthusiasm, concentration and reliability. Therefore, if I am a leader, I can easily affect and lead my teammates follow my decisions or instructions; also my position, status in the group will be firm and long lasted. 4. Conclusion Lessons learned To summarize, my personalities according to Big Five are quite correct and bearable. The five traits, no matter how high or low, have certain effects on our personal and professional development. It also indicates that everyone has their own personalities and no one is similar to another one. Although this is only a test and might not say everything about oneself, but based on those personalities, we can find the best solutions for our problems, the best way to live and the best career to take. Knowing about personalities, we can try to improve the good side and reduce or fix the bad side of our attitude to improve our living standard, job performance and satisfaction. Moreover, when dealing with relationships in society, we can have a wider view of one person, especially when being a leader joining in group works or assigning suitable tasks.

Saturday, October 26, 2019

Matewan and Norma Rae Essay -- Capitalism Feudalism Economics Essays

Matewan and Norma Rae Theoretically, the characters of both Matewan, and Norma Rae take part in a capitalistic society. In both situations the people are partaking in a form of labor market, where they are selling their time and energy. However, the town of Matewan, governed by the Stone Mountain Coal Companies' monopoly on the land and businesses, and isolated by distance and limited technology, as fallen into a feudalistic condition. Despite the fact that Norma Rae's small hometown of Alabama bears a great resemblance to the town of Matewan, their economic situation remains a form of capitalism. Though the Henely Mill is a dominating force in the small town, with a strong financial hold over the citizens, it is not as dictatorial of the society as the Stone Mountain Coal Company is over Matewan. In signing the Stone Mountain Coal Company's contract the coal miners did not simply agree to sell the company their time and labor; they signed away their lives. In a capitalistic society one goes to work in an industry of their choosing, is compensated with a fair wage. In such a society the business one works for has no authority over where their workers eat, sleep, or spend their leisure hours. However, the town of Matewan is trapped under the hegemonic power of the coal company. The coal company has a monopoly over the predominant natural resources in the area. Their ownership is not only limited to the coalmines, but to the general store, and the much of the town's housing. Within the bonding contract of the mine workers are forbidden to buy their supplies from anywhere other than the general store, and are forced to reside in the coal company's housing. The coal company enforces this by paying their workers in company script... ... were not only forced to reside in company housing and buy for the company store, but were also forbidden to launch a union. Norma Rae, and her fellow workers, were not under a binding contract to the Henely Mill; and were tied to the organization only when working on the grounds. Due to their contractual agreement, or lack thereof, the Henely Mill workers held the legal rights to form a union, where the coal miners were banned from us and undertaking. A union formation was possible in Norma Rae's town due to one essential element: the legal rights, and government support. This was made possible by the time frame, and the geographical location of the small Alabama town. Rupert's odyssey to begin a union was fully supported by the U.S. government; he held the rights to inspect the mill, put up notices, and converse with the workers on their off hours and breaks.

Thursday, October 24, 2019

“Visiting Hour” by Norman Maccaig

Rewrite – â€Å"Visiting Hour† The poem â€Å"Visiting Hour† was written by the Scottish poet Norman MacCaig. In the poem, MacCaig shows the central idea is loss and death. This central idea is achieved through the use of various techniques such as imagery, structure and narrative stance. The poem is about a visit MacCain makes to a dying relative in a hospital. Throughout the poem, MacCaig gives his thoughts and feeling to how he fails to cope with the situation. The poet also uses enjambment, metaphor and imagery at the beginning of the poem when MacCaig hints at the central idea. Vanishes heavenward†, with the use of enjambment the poet introduces the idea of death. The quotation emphases the theme of death and how MacCaig may not be able to speak to his loved one again. With the use of a metaphor and imagery, as the lift physically rises up, the mood of depression associates the journey to heaven. The â€Å"corpse† represents death. The person he is visiting could easily be a corpse. The poet is occupied of images of death and sees the patient in a negative way. Though not mentioning the word death, his mind automatically makes this assumption.At this point the reader just assumes the central idea is death. Repetition is used as the poet emphasises the central concern of his loved one but also of his admiration of the nurses. â€Å"So many deaths†¦. so many farewells† emphasises how â€Å"miraculous† the nurses seem to him and they are not overwhelmed by the emotion of grief unlike him. MacCaig uses structure as he first mentions the patient, â€Å"Ward 7. She lies†. The four word line immediately links the woman with the hospital. The non-sentence â€Å"Ward 7†³ draws attention to the reality of the situation the poet is in. In a white cave of forgetfulness†, though suggesting a white curtain around the bed, it creates the impression of emptiness. The vivid colours of â€Å"green and yellow† are not present. This suggests the patient's life slipping away and a fear from MacCaig that they will not remember him. A Metaphor is used once again as the poet recognises that while he can physically touch the patient, she is dying and he is alive. â€Å"And between her and me distance shrinks till there is none left but the distance of pain that neither she nor I can cross†, he has entered the hospital, found her ward and reached her bedside but cannot â€Å"touch† her.The central idea is made clear to the reader in the last stanza where the poet writes, â€Å"books the will not be read†. MacCaig notices the uselessness of the gifts brought for the patient. The patient's inability to eat the fruit or read the books reveals their lack of life. In conclusion, the poet achieves the central idea of death and loss by the use of metaphor, imagery, enjambment and structure. By using all of those techniques made the central idea is clear.

Wednesday, October 23, 2019

My Life According to Erik Erikson Essay

Allow me to relay to everyone the stages I went through in my life based on â€Å"Erik Erikson’s Developmental Theory† (Newman, 2009, pp. 16 – 40). Here, I will mention the developmental milestones and successes that I experienced: The first stage is known as â€Å"Infancy† which begins from â€Å"birth to eighteen months† wherein according to Erik Erikson, is the stage where an individual’s crisis will be on â€Å"trust vs. mistrust† (Wagner, 2009, p. 1). During this stage, I believe I have succeeded and learned to trust because of the person who constantly took care of me (Newman, 2009, pp. 16 – 40). My mother, for sure, has always been there for me: providing me with all the essential things I need like food, water, milk, clothing, shelter, etcetera; making sure that I am free from harm & diseases; and ensuring that she is there no matter what happens (Newman, 2009, pp. 16 – 40). Through instincts, this made me realize that I will be okay and that the world or environment is a safe one, thus, I learned to trust (Newman, 2009, pp. 16 – 40). The second stage which is technically referred to as â€Å"early childhood† covers â€Å"eighteen months to three years† (Newman, 2009, pp. 16 – 40). The crisis that an individual is faced with during this stage is known as â€Å"autonomy vs. shame† (Newman, 2009, pp. 16 – 40). Here, I have to â€Å"defecate† alone; my mommy no longer has to buy diapers for me because I can already tell her when I need to â€Å"defecate† (Newman, 2009, pp. 16 – 40). Learning this task made me realize that I already have self-control and since I am already courageous enough to defecate alone, I have also conquered â€Å"shame†; I know I am already capable of doing something and that boosted my self-esteem thus I achieved â€Å"autonomy† instead of â€Å"shame† (or being ashamed) (Newman, 2009, pp. 16 – 40). The third stage is from â€Å"three to five years† or the â€Å"play age† wherein a person’s â€Å"ego development outcome† would either be â€Å"initiative† or â€Å"guilt† (Newman, 2009, pp. 16 – 40). Here, I have imagined that â€Å"Barney, Baby Bop, and BJ† would come along and play with me; I have learned so many things with them including some of the big â€Å"Why† questions I had (Newman, 2009, pp. 16 – 40). Through role playing, I have also learned that there are some who are not like me; there are boys and there are also girls (Newman, 2009, pp. 16 – 40). I have somehow realized that one is made for a purpose, for instance boys are supposed to act like this while girls, the other way around (Newman, 2009, pp. 16 – 40). Such role playing made me take the initiative to carry out my â€Å"natural desires† which is why I have conquered â€Å"unnecessary† guilt (Newman, 2009, pp. 16 – 40). The fourth stage is the â€Å"school age† which is from â€Å"six to twelve years old† (Newman, 2009, pp. 16 – 40). Here, one has to develop the strengths known as â€Å"method and competence† because the crisis that an individual faces during this stage is â€Å"industry vs. inferiority† (Newman, 2009, pp. 16 – 40). During this stage, I have learned that I can no longer just go to my parents when I have dilemmas; I have to find a way and be â€Å"competent† in order for my peers not to make me feel â€Å"inferior† (Newman, 2009, pp. 16 – 40). I developed a sense of industry during this phase because I kept on learning and I was always willing to do anything just to learn/acquire new skills which was one of the reasons why I always have excellent grades, thus I have conquered â€Å"inferiority† early on (Newman, 2009, pp. 16 – 40). The fifth stage is known as â€Å"adolescence† (Newman, 2009, pp. 16 – 40). I have acquired the strengths known as â€Å"devotion and fidelity† during my adolescent years (12 – 18 years), that’s why I have managed to go through the crisis â€Å"identity vs. role confusion† with ease (Newman, 2009, pp. 16 – 40). Friends played a large role in this stage of my life since I discovered who I am as an individual through my interactions with them; I came to know what makes me weak, as well as, what I can do to pick myself up etcetera. I have been successful in discovering my identity, thus, I did not experience â€Å"role confusion† (Newman, 2009, pp. 16 – 40). The sixth stage is from 18 to 35 years old which is technically referred to as â€Å"young adulthood† wherein the dilemma one has to face is â€Å"intimacy and solidarity vs. isolation† (Newman, 2009, pp. 16 – 40). Fortunately, I have experienced love already; it has been a â€Å"reciprocally fulfilling† one which is why I have not felt â€Å"isolation† (Newman, 2009, pp. 16 – 40). The seventh and eighth stages are phases wherein the crises to be faced are generativity vs. stagnation and integrity vs. despair, respectively (Syque, 2009, n.p.). I would gladly relay my experiences on this to everyone; however, I have not yet reached these stages.

Tuesday, October 22, 2019

Danielle Dawkins Essays (1054 words) - Thought, Terminology

Danielle Dawkins Essays (1054 words) - Thought, Terminology Danielle Dawkins Dr. Bentzen American Government 5/5/17 Political Culture Political culture can be defined as "historically-based, widely-shared beliefs, feelings and values about the nature of political systems, which can serve as a link between citizens and the government." Political culture is not to be confused with political ideology, which is a set of values and beliefs that an individual holds. Every country has its own political culture, which provides clues as to why certain governments are organized the way they are, or why some countries are allies with each other while others are not. As it stands, there are currently three theories of political culture: parochial political culture, subject political culture, and participant political culture. In a parochial political culture, citizens possess little to no interest in the government and are mostly uninformed other the entire political process. On the contrary, citizens in a participant political culture are, more or less, well-informed and actively engaged in the political process. America has a participant political culture with a wide array of values and beliefs. In a country that is fundamentally conservative, many American citizens believe and take pride in democracy, equality, and individualism. These values can be traced all the way back to the American revolution. Even so, America's political culture has changed generation by generation through means of political socialization, or a process by which people acquire various political values through family, religion, gender, race, and social class. One key aspect of political culture is political ideology, which is a coherent set of values and beliefs that people hold dear to themselves. The ideologies that people hold set the framework of their thought process while greatly influencing how they perceive the world. Isaiah Berlin, a historian and philosopher, stated that "ideological battles" is one factor that shaped human history in the 20th century. Berlin stated, "the other ideological battles - totalitarian tyrannies of both right and left and the explosions of nationalism, racism, and religious bigotry that the most perceptive social thinkers of the nineteenth century failed to predict." There are currently four functions that political scientists attribute to political ideologies in terms of ideas transforming into actions, and they are the following: explanation, evaluation, orientation, and political program. A lot of the time, social and political conditions are direct products of the political ideologies at hand. For example, totalitarian governments typically have poor social settings, as the government has every say over the lives of its citizens. Along with explanation, ideologies can also produce standards for social conditions and political institutions. Regarding America's standard, Americans tend to take pride in personal responsibility, which is why there so much stigma surrounding entitlement programs and whatnot. Ideologies provide orientation toward several different issues, and they also guide their political actions. In other words, identity politics are employed. There may be four functions attributed to political ideology, but there are also two ways of measuring it. To what extent do people use broad political categories to justify their own beliefs, and how consistent do their beliefs stay over time? Before one can answer these questions, they must have knowledge of American political ideologies, as they are not as simple as just being conservative or liberal. Ideologies are complex at best, and are far more than just labels. The Nolan chart, created by Libertarian party leader David Nolan, captures the political beliefs of citizens on two dimensions: economic and personal freedom. From left to right, Nolan outlined the five key political ideologies: left (liberal), moderate, right (conservative), libertarian (limited government) , and statist (big government). Conservatives tend to believe in limited government and always favor local and state government over the federal government, as they are always advocated for "States' rights". Also, conservatives believe that the private sector is more suited than the federal government in terms of addressing domestic problems like poverty and discrimination. Since the 1970's, social conservatism has been on a rise. While social conservatives tend to believe in limited government on the grounds of domestic problems or whatnot, they see no issue with the government infringing upon personal liberties, such as same-sex marriage, abortion, contraceptives. On the other side of the scale, liberals seek use for the government in terms of changing the

Monday, October 21, 2019

The Cicada Many Things to Many People essays

The Cicada Many Things to Many People essays In this century of rapid scientific discovery, there still exist natural phenomena with the power to inspire wonder and mystery. The cicada, an insect known since ancient times, is one such phenomenon. Because scientific knowledge of the cicada contains many gaps, these mysterious insects can still stimulate our imagination or lead us into confusion. At the present time, the cicada is many things to many people: it is a curiosity that should be approached scientifically; it is a source of superstition and dread; it is also little more than an annoying, seasonal inconvenience. The cicada is a stout, black insect about an inch in length. Various species of this insect can be found all over North of the America. When the cicada is at rest, its large, transparent, veined wings are folded over the top of its body and extend about a quarter of an inch beyond it. Cicada wing veins are and information reddish orange in color, as are its eyes and legs. The front legs are sharp and crablike, allowing the animal to hold tight to the bark of trees. The species of American cicada most written about by scientists and most wondered about by the general public is known as the periodical cicada. Its scientific name is Magicicada septendecim. This species of cicada appears above ground only once every seventeen years. What the cicada does underground for most of its seventeen-year life span was a mystery until fairly recently. In the early part of this century, a man named C.L. Marlett, who worked for the United States Department of Agriculture, decided to find out. He began burying cicada eggs in his backyard and digging them up periodically for observation. He soon found out that the cicada begins life as a tiny nymph about six hundredths of an inch in length. A nymph is an immature insect, before it has fully developed During their sixteen years and ten and one-half months underground, cicada nymphs are nestled against tree roots from whic...

Sunday, October 20, 2019

Using Percents - Calculating Commissions

Using Percents - Calculating Commissions A percent is a value divided by 100. For example, 80% and 45% are equal to 80/100 and 45/100, respectively. Just as a percent is a portion of 100, an actual quantity is part of an unknown whole. This article focuses on using percent and proportions to solve for that unknown whole. Finding the Whole in Real Life: Commissions Real estate agents, car dealers, and pharmaceutical sales representatives earn commissions. A commission is a percentage, or part, of sales. For example, a real estate agent earns a portion of the selling price of a house that she helps a client purchase or sell. A car dealer earns a portion of the selling price of an automobile that she sells. Example: Real Estate AgentNoà « aims to earn at least $150,000 as realtor this year. He earns a 3% commission. Whats the total dollar amount of houses that he must sell to reach his goal?What do you know?Noà « will earn 3 dollars per 100;Noà « will earn 150,000 dollars per ? 3/100 150,000/xCross multiply. Hint: Write these fractions vertically to get the full understanding of cross multiplying. To cross multiply, take the first fractions numerator and multiply it by the second fractions denominator. Then take the second fractions numerator and multiply it by the first fractions denominator.3 * x 150,000 * 1003x 15,000,000Divide both sides of the equation by 3 to solve for x.3x/3 15,000,000/3x $5,000,000Verify the answer.Does 3/100 150,000/5,000,0003/100 .03150,000/5,000,000 .03 Exercises 1. Ericka, a real estate agent, specializes in leasing apartments. Her commission is 150% of her clients monthly rent. Last week, she earned $850 in commission for an apartment that she helped her client to lease. How much is the monthly rent? 2. Ericka wants $2,500 for each leasing transaction. For each transaction, she earns 150% of her clients monthly rent. How much must her clients rent be for her to earn $2,500? 3. Pierre, an art dealer, earns 25% commission of the dollar value of the art pieces that he sells at the Bizzell Gallery. Pierre earns $10,800 this month. What is the total dollar value of the art that he sells? 4. Alexandria, a car dealer, earns 40% commission of her luxury vehicles sales. Last year, her salary was $480,000. What was the total dollar amount of her sales last year? 5. Henry is an agent for movie stars. He earns 10% of his clients’ salaries. If he made $72,000 last year, how much did he clients make in all? 6. Alejandro, a pharmaceutical sales representative, sells statins for a drugmaker. He earns a 12% commission of the total sales of the statins that he sells to hospitals. If he earned $60,000 in commissions, what was the total dollar value of the drugs that he sold?

Saturday, October 19, 2019

Ratification of the US Constitution Essay Example | Topics and Well Written Essays - 750 words

Ratification of the US Constitution - Essay Example Contemporary scholars describe this day as follows: â€Å"two hundred years ago, the United States Constitution replaced the Articles of Confederation as the fundamental law of the land when New Hampshire became the ninth state to ratify the Constitution on June 21, 1788.† (McGuire and Ohsfeldt 219) At that juncture in American history, there were those who were against the idea of a federal government that would be able to exercise control and supervision over the States. Thus, there were two primary factions with divergent perspectives on the matter: the antifederalists and the federalists. Whilst the Constitutional Convention was ongoing, robust debates were also taking place in the streets, in townhalls and the like. The federalists had belonged to the higher classes in society, while the anti-federalists tended to belong to the middle to lower classes. The Federalists and the Anti-Federalists The federalists had for its representatives statemen and American heroes in the form of George Washington and Benjamin Franklin, who were in large part responsible for galvanizing support for the federal state. In the minds of the federalists, a strong federal government and more united, integrated states would be more helpful and viable in attaining the interests of the American people. They also felt that it was a step above the Articles of Confederation. It was their belief that a weak union between the states will only make it vulnerable to external and even internal threats. The anti-federalists, on the other hand, were united by the view that the United States was such a large country and it would be difficult to unite and govern a country of the size and diversity as that. They also blamed the Federalists for â€Å"overreaching† – that is to say, exercising power in an excessive, if not despotic manner. They expressed a preference for local rule, saying that a federal government would only behave as though there was a monarchy. An important issue that the federalists raised was the lack of the bill of rights in the adopted Constitution. This was a major issue for the anti-federalists. For present day supporters like Nedelsky, (340), â€Å"the Anti-federalists argued for a polity in which the citizen stands in close relation to the State, in which active and responsible participation is a serious concern, and in which equality holds a very high place.† It was in fact because of the very valid issues on civil liberties raised by the Anti-federalists that the Amendments to the Constitution was introduced – an inviolable bill of rights articulating our cherished principles. The anti-federalists also felt that the Constitutional Convention overstepped its bounds when it adopted the Constitution. The only permission granted to the Convention was to amend the Articles of Confederation, not abolish them altogether to create a completely different Constitution. Interestingly, the Federalists were opposed to the B ill of Rights. According to them, since the government was in power through the mandate of the people and in order to represent them, it seemed illogical to establish a Bill of Rights to control government’s actions

Friday, October 18, 2019

Consumer behaviours Term Paper Example | Topics and Well Written Essays - 1000 words

Consumer behaviours - Term Paper Example Brand image – Definitely, BlackBerry has its very own strong brand image in the mobile phone market. Especially, having a BlackBerry is perfect for professional and business – minded people. As suggested by Morisy in 2008, its features catering for business world are its strength as BlackBerry is a phone highly recommended by IT professionals.2 Product Features – BlackBerry has an easy – to – use QWERTY keyboard. Apart from that, BlackBerry has coverage in lots of countries, hence used around the globe. One of its strongest features is its strong email capabilities3 which keeps one connected and does well in providing an email mobile environment. In addition to that, its mobile email provider is fast. Undeniably, BlackBerry has a strong business class features (Barker, 2011).4 On the one hand, this mobile phone has showed its usefulness in being connected in social networking sites like Facebook and Twitter as well. Hence, BlackBerry gives an edge on its utmost functionality. Absence of Innovation – BlackBerry is not an innovative phone which causes consumers to abandon it for iPhone and other android phones. According to Hansberry (2009), this is for the reason that the BlackBerry IT department is not that much interested to media, web browsing and other applications that the others can perform better.7 BlackBerry is more often than not behind the new technological innovations of phones. Limited Applications – Unlike iPhone and other android phones, BlackBerry does not have much selection of applications. It does not have the trendy applications like Instagram of which gives artsy snapshots in social networking sites and games in iPhone, and much more applications provided by the android market.8 Lacks Style and Aesthetics – In contrast to other phones, BlackBerry is not stylish and aesthetically appealing enough to a wide array of consumers because of its no more than sleek professional

The Dock Street Theater Charleston South Carolina Essay

The Dock Street Theater Charleston South Carolina - Essay Example However, the main entrance to the building was built about 46 years later by J.W. Gamble in 1855 Just like it had been named, the hotel was mostly the preserve of planters who travelled to Charleston from South Carolina to take part in horse-racing activities. The hotel was reputable for its classy food and drinks during this period. It is also believed that South Carolina's famous punch was first made here. One peculiarity about this hotel was that in those early days guests passed through the recessed porch with brownstone columns. This led into a lobby that gave access to a grand staircase that ascended to a drawing room. Despite signs of considerable alteration to the interior, the elements of the antebellum hotel remained and were reintegrated for reuse in the building. Following these years of renovation works, a series of additions to the hotel spanning the entire 19th and 20th centuries can be readily identified by the different colorations of the bricks. The history of the Dock Street Theatre also brings to mind the story of Charleston's theater history. In the 1930s, the building had some restoration work carried out by the City of Charleston as a Works Progress Administration project. It was under this project that a large a large section was constructed behind the hotel containing a stage and auditorium characteristic of the 18th century. After this building was finally renovated, it was named after a 1730s theater which stood on the Queen Street side of the building. On the other hand, the theater is said to have been the first building purposefully constructed for theatrical performances in the USA. In the course of this, Planter's Hotel sporadically housed one of the city's theatrical bands, which performed at the nearby New Theatre during the mid-19th century. The most prominent actor of this band was Junius. B. Booth. He was the patriarch of an exceptional group of actors, which included J. W. Booth; the guy who assassinated President Lincoln. Junius Booth, stayed at the Planter's Hotel, and was alleged to have attempted killing his manager in 1838. Today the Dock Street Theatre is home to a community theater group called the Charleston Stage Company, and houses the city's Cultural Affairs office as well as The City Gallery, which is an exhibition space for local artists. Another interesting story about the history of the theater reveals that an announcement in the South Carolina Gazette in 1736 read that a new theater would open in Dock Street. The house later became known as the Dock Street Theatre for the two years it was in operation. It closed in 1738 and got burned in the great Charleston fire of 1740. Two more playhouses were built on or near its site, one in 1754 and a second in 1766, and then a hotel was built in its place. Before becoming a community theater, the city made a move to restore the original theatre, and they rebuilt the building using plaster and woodwork for historic buildings that were being torn down. In 1937, using funds and people from the Works Progress Administration, a same-model of the original eighteenth century interior was constructed inside the crumbling hotel. Owned by the city, the restored theatre opened, as its ancestor had, with a production of The Recruiting Officer. The Dock Street Theatre was an outgrowth of the little theatre movement. So, in 1937, the theater reopened and is today home to the Charleston

Thursday, October 17, 2019

General Movie Tourism in New York Essay Example | Topics and Well Written Essays - 250 words

General Movie Tourism in New York - Essay Example New York City has a large number of tourist attractions that serves close to 54 million foreigners as well as American nationals in each year. Some of the major tourist attraction sites include Ellis Island, Empire State Building Metropolitan Museum of Art, Broadway Theatre Productions, Statue of Liberty Rockefeller Center, Times Square, Coney Island, and Barclays Center among others. The tourists also visit the many TV scenes recording places as well as movie centers. Some of the TV shows and movies acted in New York include Taxi Driver, Sex and the City, Friends, Seinfeld among others. Many movie theatres are visited by tourists who consider them as huge attraction sources. However, despite all these major tourist attraction sites and destinations, movie tourism that forms part of them has not been fully exploited. The paper, therefore, seeks to explain how movie tourism can be developed as the leading tourists’ attraction points in the city of New York. This topic is of gre at importance to because it sought to address a key component of the American economy which is tourism. My deep interest in this topic stems from the inner desire to express the role that movie tourism which many people know little about has impacted positively on tourism. Research methods to be used for the purpose of this study include both qualitative and quantitative research methods and a total of 50 people are to be interviewed. I will be able to speak to these people and I am allowed to speak to them.

ACC Group Case Study Example | Topics and Well Written Essays - 500 words

ACC Group - Case Study Example For Claire's Antiques, this order is very important because without they would not be profitable and would have to layoff many workers.The company now has to consider its alternatives, the main assumption that we have during this consideration is that Claire's Antiques cannot have a budget based on speculations of money that is not there yet.If a rebid is to take place, it could be possible for the competitors to lower their price, thus Claire's Antiques should clearly refuse the rebid. In this the consumer would have more time to think the decision through and compare the two companies.One thing that Claire's Antiques can do is to offer more services, such as after sales service. This would make their offer more interesting even though the price is higher. Claire's Antiques should find out what type of service is important to the customer and include them in their sales process. This would help validate the higher price being charged by them. A discount can be offered if the custome r is willing to pay cash or make the payment upfront, that is as soon as the goods are received or within a week of delivery.Every company has a weak point; Claire's Antiques should find out about the weak point of their competitors and use this to their advantage. There are many things that you need to consider before actually making the bid and once you have done so, you need to sit back and see how the competitors and the customer reacts.

Wednesday, October 16, 2019

General Movie Tourism in New York Essay Example | Topics and Well Written Essays - 250 words

General Movie Tourism in New York - Essay Example New York City has a large number of tourist attractions that serves close to 54 million foreigners as well as American nationals in each year. Some of the major tourist attraction sites include Ellis Island, Empire State Building Metropolitan Museum of Art, Broadway Theatre Productions, Statue of Liberty Rockefeller Center, Times Square, Coney Island, and Barclays Center among others. The tourists also visit the many TV scenes recording places as well as movie centers. Some of the TV shows and movies acted in New York include Taxi Driver, Sex and the City, Friends, Seinfeld among others. Many movie theatres are visited by tourists who consider them as huge attraction sources. However, despite all these major tourist attraction sites and destinations, movie tourism that forms part of them has not been fully exploited. The paper, therefore, seeks to explain how movie tourism can be developed as the leading tourists’ attraction points in the city of New York. This topic is of gre at importance to because it sought to address a key component of the American economy which is tourism. My deep interest in this topic stems from the inner desire to express the role that movie tourism which many people know little about has impacted positively on tourism. Research methods to be used for the purpose of this study include both qualitative and quantitative research methods and a total of 50 people are to be interviewed. I will be able to speak to these people and I am allowed to speak to them.

Tuesday, October 15, 2019

1-3 Willow road Dissertation Example | Topics and Well Written Essays - 4000 words

1-3 Willow road - Dissertation Example Chapter III. The Context: Proportion and Other Elements of Style†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 V. Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..16 Introduction The building 1-3 Willow Road is a rowhouse consisting of 3 homes set together. Built in 1939 by architect Erno Goldfinger, 1-3 Willow Road is an example of Modernist British architecture in Hampstead Heath, London, England. He was a modern pioneer of the Modernist movement. Originally from Hungary, he studied in Paris at the Ecole des Beaux Arts. He rebelled against the conservatism of the Beaux Arts and and he and a group of students broke away to form a new studio. They at first asked Le Corbusier to be the head of the studio but he declined. It was therea fter run by one of his contemporaries, Auguste Perret. Perret introduced the use of reinforced concrete construction, and whose his rationalist style and passion for the unadorned greatly influenced Goldfinger. Goldfinger resided in the center construction, Number 2 Willow, with his family until the time of his death in 1987. Although the construction of the building was at first disputed it was later acquired by the National Trust of England and is today an historic landmark. Here it will be discussed: the architect, including every salient detail about his work; the content of the Hampstead house building itself; and the context of the work, including proportion and other elements of style. Chapter I. The Architect: Erno Goldfinger Significance 1-3 Willow Road was controversial at the time of its conception, and the residents—as well as the city council—rejected the idea of its being built. â€Å"The Hampstead house was [originally] built for solicitor Geoffrey Walf ord of Piccadilly, his wife Ursula Walford and her four children from a first marriage.†1 Erno Goldfinger had to revise his plans several times before they were approved and construction could begin. Although a modern interpretation of a Georgian style building, it is an important example of the revolutionary ideas the architects of the Modern period hoped to establish. It was modeled after 18th- and 19th-century terrace houses, but built with modern materials and detailing. This building may be seen as part of the International style movement that has social and political undertones. These particular architects—being much more concerned with building homes for the everyday man rather than elaborately-decorated edifices that had characterized much of the architecture that had preceded it—also set forth to consider the function and utility of the structure. With the advances in new technology, new materials were invented. As such, these buildings were famous for b eing the first to utilize such technological advancements. Many new ideas in the arts and architecture flourished and Goldfinger’s work embodies these precepts. Therefore, 1-3 Willow Road is an excellent example of what one would call Modernist principles. Although he became more well known for his buildings following WWII, the houses on Willow Road can be seen as their precursors. Cultural and Historical Background Hampstead Heath, where Willow Road sits, is a celebrated and picturesque part of London, England. Just minutes by train from the heart of London, many people go there to enjoy the nearby countryside. There are many ponds, a garden filled with flowers and trees and an aviary, as well as a zoo. Mainly rural, the area has several ponds and acres of undeveloped land. Although the countryside has been well preserved there are many

Monday, October 14, 2019

Current Research in Astronomy Essay Example for Free

Current Research in Astronomy Essay For many astronomers, Adaptive Optics is something like a dream coming true. Since 1609 and the first observations of celestial bodies performed with the help of an optical telescope, astronomers have always fought to improve the resolving power of their instruments. For a long time, engineers have trimmed the optical quality of the telescopes, until they finally reached the barrier set by the atmospheric turbulence. At that point, the intrinsic quality of the site became a major issue to establish new observatories with modern telescopes, and astronomers started to desert the urban skies and to migrate toward mountains and deserts (Alloin and Mariotti 2004 9). The recent emergence Adaptive optics aims at providing diffraction limited long exposure images at large telescopes, which is greatly considered as one of astronomy’s breakthrough (Alloin and Mariotti 2004 9; Espinosa 1997 12). By far, the largest limitation to the application of adaptive optics to astronomy is very limited sky coverage when using natural guide stars for wavefront sensing. Similar limitations existed for many military applications of adaptive optics (Espinosa 1997 12). Adaptive optics systems provide a real time correction of the distorted wavefronts; they restore all the properties of light prior to the final part of its travel through the atmosphere (Alloin and Mariotti 2004 9). Discussion Adaptive Optics: Wavefront and Laser Guide Star (LGS) Adaptive optic systems for atmospheric turbulence compensation require a reference star for correcting wavefront distortion. The sodium LGS relies on resonant backscattering of a laser tuned into the D2 sodium absorption line to provide a reference, but LGS must sufficiently bright to correct high order wavefront aberration (Zamorano, Gorgas and Gallego 2001 317). The key concept in adaptive optics is the wave front, which is found by tracing out an equal optical path (distance x refractive index) from a source to the region of interest. For a point source and free space, wavefronts are spherical, and for starlight, the distance is so large that for all practical purposes the wavefronts entering the Earth’s atmosphere are plane. After propagating through the random refractive index of the atmosphere, the wavefront entering the telescope pupil is random, and its statistics determine the image quality, and govern how an adaptive optical system might be used to compensate for the distortion (Agerorges 2000 4). Such effect greatly depends on the laser lunch power, polarization’s beam, atmospheric transmission and the sodium column density, which, if obtained appropriately, might even enhance the imagery, increase the scope of telescopic observatory, and improve the image details of pictures obtained from astronomical studies (Zamorano, Gorgas and Gallego 2001 317). The use of LGS AO has caught on quickly within the astronomical community in large part because, equipped with adaptive optics operating at the diffraction limit in the near-infrared, the new 6- to 10-m telescopes possess the capability to match the angular resolution in the Hubble Space Telescope (HST) in the visible and to exceed its resolution in the near infrared (Rodier 256). Laser Guide Star LGS, basically, is a technology that utilizes AO imaging in order to enhance graphical imagery of telescopes and view astronomical images with additional quality. The technology uses an artificial star in order to act as a wavefront reference source, which consequently corrects light distortion (Zamorano, Gorgas and Gallego 2001 317). The need for a bright stellar was always a concern for astronomical applications of adaptive optics. To operate, a wavefront sensor must have sufficient light to overcome photon noise and background noise with enough light left over to form the image. In astronomy, few stars of scientific interest are sufficiently bright. For imaging uncooperative satellites, reflected light is often too dim or nonexistent. In 1985, French astronomers Foy and Labeyrie published work detailing how one might use backscatter from a laser focused to a point in the atmosphere as an artificial beacon (a guide star) for astronomical adaptive optics. As work progressed in the astronomy community to build and test a laser powerful enough to have sufficient backscatter for the Foy-Labeyrie method (Tyson 2000 5). Since the beginning of the 1980s, classified U. S military work was addressing the problems of projecting high-energy laser beams from the ground to space for missile defense and secure communications. The research from 1982 at the U. S Air Force Starfire Optical Range (USAFSOR) directed by Robert Fugate advanced the laser guide star concept and produced a wealth information about laser performance requirements, adaptive optics system operation, atmospheric physics, and closed loop image of space borne objects. By 1991, the bulk of military work on laser guide starts was declassified and made available to astronomers around the world (Tyson 2000 5). Currently, LGS is being developed by various nations, setting up their own laser beacon and extensively enhancing research through the said technology. The use of a laser beacon as the reference source enables faint objects to be compensated by adaptive optics, at the expense of greater hardware complexity. The laser beacon must be directed within the isoplanatic angle of the science object at the observation wavelength; although, this procedure provide only short-exposure correction. On the other hand, a fixed natural guide star possesses the ability to further stabilized the image during long exposures so that sky coverage depends on the distribution of stars, which consequently enhances the space imagery (Hardy 1998 309). There are many cases where the object itself, such as a sunlit satellite, is insufficient for wavefront sensing. In astronomy, there are billions of stellar objects too dim for sensing and not near enough in the sky to bright objects. For high-energy laser propagation to uncooperative targets or satellite tracking and imaging, an artificial source must be placed above the atmosphere to provide photons for the wavefront sensor and subsequent compensation. Lasers actually provide only partial correction, because a natural star still is required and opposite tilt upon traveling up into the atmosphere and returning (Tyson 2000 6-7). Particularly exciting development is the use of adaptive telescope mirrors to compensate for the distortion of stellar images produced by atmospheric turbulence. Using adaptive optics, ground-based telescopes are now demonstrating diffraction-limited performance, albeit over relatively small fields of view. It can be expected that large ground-based telescopes will have higher resolution and light-gathering power than space-based telescopes, since both of these performance metrics depend on aperture size. Moreover, ground-based telescopes can be larger than those space-based ones; hence, enabling higher development and scope for stellar imagery. The adaptive optical system of LGS displays 0. 07-arcsecond resolution, which is almost a hundred times better than past ground-based telescope systems but uses a telescope built approximately 80 years ago (national Research Council 1998 137-138). Conclusion LGS AO is one of the breakthroughs of current astronomical imagery, which provides enhanced images and display features that are usually not present in the space-based telescopes, such as HCT. The mechanism involved utilizes a guide star or an artificial star that facilitates the graphical imagery. LGS works as distortion corrector enabling enhanced imaging through AO ground-based telescopes. Conclusion Ageorges, N. Laser Guide Star Adaptive Optics for Astronomy. Springer, 2000. Alloin, Danielle M. , and Jean-Marie Mariotti. Adaptive Optics for Astronomy. Springer, 2004. Espinosa, Jose. Instrumentation for Large Telescopes. Cambridge University Press, 1997. Flectcher, L. Solid State Laser for Subaru Laser Guide Star Adaptive Optics. Subaru Telescope. 6 July 2005. 8 Jan. 2008 www. nao. ac. jp/E/Outreach/pr-rl/2005/index. html. Flectcher, L. Observational Methods. 14 Feb. 2005. 8 Jan. 2008 http://www. astro. gla. ac. uk/users/lyndsay/TEACHING/A1OBSMETH/VIEWGRAPHS/starlight-figure1. jpg. Hardy, John W. Adaptive Optics for Astronomical Telescopes. Oxford University Press, 1998. National Research Council (U. S. ), . Harnessing Light: Optical Science and Engineering for the 21st Century. National Academies Press, 1998. Roddier, Francois . Adaptive Optics in Astronomy. Cambridge University Press, 1999. Tyson, Robert K. Adaptive Optics Engineering Handbook. CRC Press, 2000. Zamorano, Jaime, Javier Gorgas, and Jesus Gallego. Highlights of Spanish Astrophysics II. Springer, 2001.

Sunday, October 13, 2019

Instability of the Spanish Colonies

Instability of the Spanish Colonies Section 2: Investigation Many Historians would agree that Spains instability gave their colonies autonomy theyve been waiting for. Spain was ruled by a monarch while Spanish colonies were organized as vice-royalties whose loyalty was with the king. Spain attempted to control every aspect of colonial life through thousands of regulations, by increasing tax revenue, and replacing Creole officers to peninsulares (Strang). Despite Colonies restricted trade, the growing Creole American identity, and the disrespect peninsulares had toward creoles which created discontent among creoles, Spanish colonies did little to change the status quo. Although there were some uprisings in the 1780s such as the Tupac Amaru rebellion, they fought not for their independence and rights but for a change in the system under the monarchy; their slogan was viva el rey y muera al mal gobierno (long live the king and death to bad government) (Strang, popular sovereignty and decolonization). Colonies call for independence was instead tri ggered by an external force: The collapse of Spain (Blaufarb, the Western Question).Napoleons invasion of Spain and the accession of Joseph Bonaparte onto the Spanish throne sparked revolts in Latin America (Strang, popular sovereignty and decolonization), because Bonaparte wasnt seen as their legitimate king. In cities not yet controlled by the French and in Spanish colonies, Juntas were created in the name of the absent king: Ferdinand VII (Strang, popular sovereignty and decolonization). Although the colonies were still loyal to the monarchy, the idea that the power would be given to the people became increasingly prevalent; each city now only had their own interests in mind due to the fact that they couldnt answer to the king. The first two juntas established were the junta of Chuquiasaca in todays Bolivia and of la Paz; the junta of Bolivia was created to reassure its allegiance to the junta central in Spain while Junta of la Paz was created because they wanted to separate from the crown (Donghi, The Contemporary History of Latin America). The establishment of la Paz created tensions in the Americas. Bolivian Historiographers believed it to be the beginning of their struggle for independence (Donghi, The Contemporary History of Latin America). Many juntas created from then on wanted to be part of a government of liberty and independence (Donghi, The Contemporary History of Latin America). Meanwhile in Spain, Bonaparte was still ruling the empire, and was instable more than ever. The invasion depleted Spains assets which started a debate over the nature of sovereignty which will start a civil war (Blaufarb, the Western Question).Communication was also severed between Spain and its colonies after France took control of Spain. The collapse of the Spanish empire and its weakened authority, created an international competition over Spanish colonies (Blaufarb, the Western Question). After the invasion Britain attempted to keep Spanish America together in order to exploit their resources and also keep France from taking control of the colonies (Blaufarb, the Western Question). Since Spain was in chaos, they couldnt enforce trade restrictions giving colonies the freedom to trade with any nation which benefited Britain. Britain therefore had an incentive to use its naval power to keep France from taking over.  Ãƒâ€šÃ‚   Britain loosened their control of the Atlantic aft er the war was over. In 1815, although business went back to normal, tensions increased within the Spanish monarchy; wartime unity among Spaniards to fight against France disappeared after Ferdinand VII regained power, and some even turned against Ferdinand and allied with Latin American rebels to end the monarchy (Blaufarb, the Western Question).To take advantage of Spains instability and declare independence would be seen as treacherous, additionally the colonies were optimistic that Ferdinand would embrace reform which wasnt the case. After it became clear that the colonies will not return to obedience, Ferdinand established oppressive policies (Blaufarb, the Western Question).). As compromises became unattainable, uprisings against the monarchy began to take form and more people were sacrificed. Although many historians agree that the collapse of Spain was caused by the invasion which led to colonies call on independence, historians of the reform era consider the Bourbon reforms to be a crucial cause of the revolts. The colonies started to develop an identity separate to that of Spain because of those reforms(lynch). The change was so great that some historians, such as John Lunch, described them as a second conquest of the Americas (Lynch, the Spanish American Revolutions). During the 2nd half of the 18th century, Bourbon Spain sought to change its economy, society, and institutions; the main reasons of those reforms were the decline of Spains productivity (Lynch, the Spanish American Revolutions). Their goal was to strengthen the kings power, centralize state power through reforms, increase production with trade within the colonies, and increase revenues going to Spain (Lynch, the Spanish American Revolutions). Although those reforms were established in order to bring the colonies closer under Spains control, it isolated the Creole population, strengthened their American Identity and laid groundwork for the wars of independence during the 19th century (Lynch, the Spanish American Revolutions). In an effort to increase silver, and gold production (most revenues comes from mining), the monarchy decreased their taxes in half (Lynch, the Spanish American Revolutions). Bourbon monarchs prevented colonies from competing with goods exported from Spain by reinforcing laws that restricted colonies from trading with other empires with the exception of Spain; laws such as the legal code of 1778 regulations and royal tariffs for free trade (Kuethe and Andrien, The Spanish Atlantic World in the Eighteenth Century). Creole elites unhappy with those restrictions aggravated their sense of alienation from the crown. Measures taken to increase mining production increased workers and slaves labor which also led to their discontent. They succeed their goals of increasin g trade, and royal revenues but also weakened elites and lower classes sense of loyalty to the crown. Spain also established two new viceroyalties (of New Granada and of Rio de la Plata), and excluded most creoles to increase royal control and weaken creoles influence whom they thought had grown too large (Kuethe and Andrien, The Spanish Atlantic World in the Eighteenth Century), again heightening creoles negative sentiments towards Spain. As part of efforts to reinstate royal supremacy, the crown negotiated with Rome giving them a greater authority to nominate and appoint religious authorities (Kuethe and Andrien, The Spanish Atlantic World in the Eighteenth Century). But the most significant religious bourbon reform was the expulsion of the Jesuits who had economical, political and religious power; Creoles who were educated in Jesuits colleges and those who had the same views as Jesuits found their expulsion in 1767 disturbing (Kuethe and Andrien, The Spanish Atlantic World in the Eighteenth Century). The Jesuits expulsion drove another wedge between the crown and Creole elites. The bourbon reforms as a whole ultimately failed to achieve their goals mainly because it deepened divisions between the colonies and Spain. The rising nationalist sentiments in the Americas enabled the formation of a separate American identity and thus laid the groundwork for the wars of independence after The Napoleonic invasion of Spain. The bourbon reforms did weaken colonies loyalty to the crown; it created discontent among Creole elites but wasnt enough to declare independence from Spain. Without the decline of the Spanish empire and Britains naval power which kept France from controlling the colonies, colonies would have never known what true autonomy was like. Although the war for independence would have happened sooner or later, The Napoleonic invasion precipitated those uprisings. The instability in Spain gave colonies a sense of political legitimacy and power. Authority came from the king, laws were obeyed from it came from the king, but now there was no king to obey. The colonies were able to govern themselves as power was now in the hands of the people, allowing them to trade freely. The majority of the colonies waited until Ferdinand VII regained power mainly out of fear, but after it became clear that the king wanted the colonies to return to obedience, the colonies started to revolt for their independenc e. On the other hand, Latin American independence would have eventually happened because of the growing tensions before the Napoleonic war, new enlightened ideas, the American and French revolutions, the financial dependency Spain had which was revealed by the bourbon reforms, and the rise of Creoles influence; the Napoleonic war merely   precipitated the revolts.

Saturday, October 12, 2019

What is Social Psychology? Essay -- Social Influences, Behaviors, Feel

Essay Title: Social Psychology Social psychology is a broad concept which has underlying elements of studying on how we behave, foresee and feel. Myers (2011) agrees that social psychologist investigates these connections by studying on how we persuade others and how we relate to other humans. Miller (2004) stated that majority of social psychologist would acknowledge that the perspective of social psychology is one that emphasises the social changes in the environment from the influence of individual. Kassin, Fein and Markus (2013) argues that humans are really fascinated about social interaction and personal relationships, which the social context can have an immense influence on our lives. Furthermore, social psychology applies to all aspects of our lives, which I consider to be fascinating category of psychology; because we have to communicate to each other, express our feeling towards another and engage intimately with the opposite sex. In world of social human beings, we are interacting with everybody in social situations, for examples we are corresponding with our friends via social networking websites such as facebook, twitter and email accounts; we are talking to our close family members on the mobile phone; we are networking with professionals, recruitment consultants and employers in networking events. In addition our beliefs can cause significant changes in our social situations. For instance our religious beliefs or political beliefs can inspire and have huge impact over many people; parents with strong religious beliefs can instil the same traditions and ethical principles to their children, however there is a possibility that their children can grow up with similar ways of thoughts as their parents. .. ...ogical Factors in Competitive Sport. Oxford: Psychology Press Eiser, J., R. ( 1986) Social Psychology: Attitudes, Cognition and Social Behaviour. Cambridge: Cambridge University Press Maio, G.,R. , Haddock, G. (2009) The Psychology of Attitudes and Attitude Change. London: SAGE Publications LTD Martin, G., N.( 2008) Psychology: A beginner’s Guide. Oxford: Oneworld Publications Kalat, J., W.( 2010) Introduction to Psychology. London: Cengage Learning Tuffin, K.( 2004) Understanding Critical Social Psychology. London: Sage Publications Ltd Flick, U.(ed.) ( 1998) The Psychology of the Social. Cambridge: Cambridge University Press Lovaglia, M.( 2006) Knowing People: The Personal Use of Social Psychology. 2nd edition. Maryland: Rowman & Littlefield Publishers Burr, V.(2002) The Person in Social Psychology. East Sussex: Psychology Press

Friday, October 11, 2019

I Know Why the Caged Bird Sings by Maya Angelou Essay

In her anthology Written by Herself, Jill Ker Conway discuses a central theme in black women’s autobiography that is fully shown in I Know Why the Caged Bird Sings (1970) by Maya Angelou: â€Å"Because, from girlhood, these women faced the dual injustices of racial hostility and male exploitation, their life histories are told with no hint of romantic conventions. They describe, instead, a quest for physical and psychological survival† (3). Angelou’s illustration of her childhood and adolescence shows her frequent conflicts with racism, sexism, and injustice at the same time that the Maya describes her personal qualities, events, and the people that helped her to survive the destructive effects of her environment and served as positive role models for her. Despite the constant oppression she faced as a girl growing up lacking financial or other means of subsistence in the racially segregated town of Stamps, Arkansas, Angelou gives emphasis to the role models of her family members who sustained and raised her. These people contributed to Angelou’s development into a brave, independent young black woman. A Song of Transcendence: Maya Angelou Maya Angelou’s I Know Why the Caged Bird Sings was published at the end of the civil rights movement of the 1960s, and it carries with itself the bitter and hard-won fruit of this historical period. Angelou knows the cruel realities of life in the raciest Deep South in the mid-twentieth century. As the critic Roger Rosenblatt (1974) has stated, â€Å"No black American author has ever felt the need to invent a nightmare to make [her] point† (174). As Maya Angelou describes her childhood: â€Å"High spots in Stamps were usually negative: droughts, floods, lynchings and deaths† (Conway 45). Touched by the harsh effects of these negative forces, Maya Angelou goes through her life with sense of self-importance and self-respect. She moves forward toward a goal of freedom with a sense of self-knowledge, an understanding of the political realities of black life in the racist South, and a realization of the responsibility that such an understanding involves. Significant Others Maya describes several Black women nurturing a young Black girl in a racist and sexist society. These Black women characters serve as positive role models for Maya. This autobiography illustrates how Black women love themselves and each other in spite of living in a world that does not love or respect them. Angelou’s work describes a positive character of Black women who support each other and still remain individuals, free to choose their own paths to self-sufficiency. Angelou writes: â€Å"if growing up is painful for the Southern black girl, being aware of her displacement is the rust on the razor that threatens the throat. It is an unnecessary insult† (4). Her autobiography illustrates the painful double strikes of becoming Black and female adult. As a young girl, Maya Angelou has a strong desire to be white, to be a member of what she considers as the more favored and lucky race. The girl dreams to wake up out of her â€Å"ugly black dream† and instead become a white girl with beautiful long blond hair and blue eyes (2). She is aware, even as a little girl, that her â€Å"nappy black hair† and dark skin are not valued highly. The girl begins her difficult life with the painful feeling of not being â€Å"good enough,† since Maya could not find girls who were black in any literature or movies. From the age of three Maya Angelou is raised and nurtured by her devoutly religious grandmother that is severely correct in attention to rules and morality. The girl calls her grandmother â€Å"Momma. † Although Maya realizes that she is often perplexed by her grandmother’s manners, she definitely loves and respects her. This substitute mother-daughter relationship provides some state of being secure for the young Maya. Some feminist literature emphasizes the meaning of the mother-daughter relationship for young women’s psychological development (Iglesias and Cormier 259). Maya gives prominence to the important role of her grandmother (and later, her mother). Angelou’s account strategy bears witness to the strong impact these relationships had on her life, and in the end on her literary work. Maya Angelou places emphasis on the role of the black woman that has played in shaping her unique individual characteristics and destiny. Nancy Chodorow (1978) asserts that â€Å"because of their mothering by women, girls come to experience themselves as less separate than boys, as having more permeable ego boundaries. Girls come to define themselves more in relation to others† (93). In A Poetics of Women’s Autobiography, Sidonie Smith analyzes different theories of women’s autobiography and discusses among them â€Å"theories that distinguish women’s autobiographies by the way in which women seem to unfold their story through their relationship to a significant ‘other’† (18). Maya Angelou feels the pain of racism as she observes her dearly loved paternal grandmother endure embarrassment when white girls call her â€Å"Annie† instead of addressing her with respect as â€Å"Mrs. Henderson. † Being a teenager, Maya has a similar situation when she is â€Å"called out of her name† by a white female employer who calls her â€Å"Mary† (108). Momma Henderson’s painful experiences have prepared Maya Angelou for her own encounters with racist American society. The refusal of a white dentist, to whom Momma Henderson has provided loan, is another instance of the humiliation these two generations of Black women confront together. The dentist replied that he would â€Å"rather stick [his] hand in a dog’s mouth than in a nigger’s,† granddaughter and grandmother have to travel twenty-five miles to find the nearest Black dentist (189). The echo of Jim Crow, even so many years after slavery, places Black women at the very low position in a white patriarchal system. And yet despite the painful experience and examples of racism, Angelou’s autobiography is a story of victory and a praising of the strength and power of Black women. Maya portrays Momma Henderson as a strong, made by oneself, economically independent woman who has gained knowledge how operate and accomplish the goals in a world that believes women should be timid and dependent. Despite behavior conflicts with those who try to humiliate her, Momma Henderson is always the winner of any conflict because she never surrenders and retains her self-respect—and she teaches Maya Angelou to do the same. Vivian Baxter, Maya’s mother, is a woman of great ingenuity and has personal qualities like her own mother. She enjoys life, despite life’s troubles. From her mother, Maya learns the happiness of being a woman, delighting in the womanlike, and being proud of her Black female body. Mrs. Flowers, the â€Å"aristocrat† of Stamps, Arkansas, also encourages Maya to be â€Å"proud to be a Negro† (95). She helps Maya regain her self-confidence after the rape; she gives her lessons about the importance and beauty of language; she introduces to her great writers; and she gives her â€Å"lessons in living† so that Maya would learn to listen â€Å"carefully to what country people called mother wit †¦ couched in the collective wisdom of generations† (100). All of these black women teach Maya to love and respect herself, and to remember the generations of Black women who have come before her and helped pave a road of self-sufficiency in a strict world. Conclusion Maya Angelou played particular attention to the themes of motherhood within her autobiography. Angelou wrote a story in which both blackness and womanhood could be celebrated. What makes the work particularly powerful is her description of the vulnerable sexual positions in which black girls and women are placed. Readers see how Angelou presents black women among her family and friends and the significant role they play in providing the girl with security and love. Angelou describes black women as wise or trusted advisers in her intellectual development. Repeatedly Angelou expresses gratitude for the presence of these powerful and independent women in her life and credits them for the individual she becomes. Works Cited Angelou, Maya. I Know Why the Caged Bird Sings. New York: Bantam Books, 1969. Chodorow, N. The Reproduction of Mothering: Psychoanalysis and the Sociology of Gender.Berkeley: University of California Press, 1978. Conway, Jill Ker ed. , Written by Herself: An Anthology, New York: Vintage Books, 1992. Iglesias, Elizabeth and Cormier, Sherry. â€Å"The Transformation of Girls to Women: Finding Voice and Developing Strategies for Liberation. † Journal of Multicultural Counseling and Development. Vol. : 30 (4), 2002. Rosenblatt, Roger. Black Fiction, Cambridge, MA: Harvard University Press, 1974. Smith, Sidonie. A Poetics of Women’s Autobiography. Bloomington: Indiana University Press, 1987.

Thursday, October 10, 2019

Introduction to Oboe and Bassoon

An Introduction Oboe and Bassoon By Marie A Rogers 300005290 Woodwind Techniques 1 1010-1100 Mr. Robinson The oboe is a soprano-range double reed instrument with a length of 62cm. Its wooden tube is distinguished by a conical bore that expands into a flaring bell. The modern oboe’s range extends from the B flat below middle C (b3 flat) to about 3 octaves higher (A6). The oboe has a very narrow conical bore. It is played with a double reed consisting of two thin blades of cane tied together on a small metal tube called a staple, which is inserted into the reed socket at the top of the instrument.Traditionally made from African Blackwood, also called grenadilla, the instrument is made in 3 parts. The top joint has 10 or 11 holes, most of which are manipulated by the players left hand. The bottom joint also has 10 holes, which are predominately controlled by the right hand. The bell has 2 keys that are not used very much by the player. Oboe History The baroque oboe first appeared in the French court in the mid-17th century, where it was called â€Å"hautbois†. This name was also used for its predecessor, the shawm. The basic form of the hautbois was derived from the shawm.Major differences between the two instruments include division into 3 sections or joints, for the hautbois, and the elimination of the pirouette, a cup placed over the reed that enabled the shawm players to produce greater volume. The latter develop more than any other, was responsible for bringing the hautbois indoors where, thanks to its more refined sound and style of playing, it took up a permanent place in the orchestra. Classical period brought upon an oboe whose bore was gradually narrowed, and the instrument became outfitted with several keys, among them were those for the notes D#, F, and G#.A key similar to the modern octave key was also added called the â€Å"slur key†. It was used more like the â€Å"flick† keys on the modern German Bassoon. Only later did French instrument makers redesign the octave key to be used in the manner of the modern key i. e. held open or upper register, closed for lower. The narrower bore allowed the higher notes to be played easier, and composers began to utilize the upper register of the oboe in their works. Oboe Reeds Most professional oboists make their own reeds since every oboist needs a slightly different reed to suit his or her individual needs.By making their own reeds, oboists can precisely control factors such as tone color and intonation. Novice players often begin playing on â€Å"fibrecane reed† which is made of synthetic material. Fibrecane reeds are much easier for the novice to control and take a shorter amount of time to ‘break in†, and usually last longer. After learning on fibrecane reeds, which are available in several degrees of hardness, a medium reed usually being used. These reed, like Clarinet and Bassoon reeds are made of arundo donax. Different types of OboesTh e oboe has several family members. The most widely known today is the Cone Anglais or English Horn, the tenor (or alto) member of the family. A transposing instrument, it is pitched in F, a perfect 5th lower than the oboe. The Oboe d’ Amore the alto (or mezzo soprano) member of the family, is pitched in A, a minor 3rd lower than the Oboe. A less commonly played instrument is the Bass Oboe which is an octave lower than the oboe. Even less common is the Hecklephone, which has a wider bore and larger tone than the bass oboe. Only 165 hecklephones have ever been made.Its hard to find competent players because of the rarity of the instrument. The least common is the mussette or (piccolo oboe), the sopranino member of the family (usually pitched in Eflat or F above the oboe), and the Contrabass Oboe ( typically pitched in C, 2 octaves deeper than the standard oboe). The Bassoon Bassoon is a member of the double-reed family, and generally plays in the bass and tenor registers. The b assoon plays most commonly in concert bands, orchestras and chamber ensembles. It is a non transposing instrument.The bassoon is generally made of maple, with medium hard types of wood, such as sycamore, maple and sugar maple preferred. Less expensive models are also made of materials such as polypropylene and ebonite, primarily for student and outdoor use. The bassoon is 4. 4 feet long. The bore of the bassoon is conical, and the two parallel bores of the boot joint are connected at the bottom of the instrument with a U- shaped metal connector. Both bore and tone holes are precision machined, and each instrument is finished by hand for proper tuning.The bocal connects the reed to the rest of the instrument and is inserted into a socket at the top of the wing joint. The range of the bassoon begins at bflat 1 and extends upward over 3 octaves. Bassoon history Earlier bassoons were called â€Å"Dulcian†. They two instruments are quite similar; they both have a double reed fitte d into a metal crook, obliquely drilled tone holes, and a conical bore that doubles back on itself. The origins of the dulcian are not clear, but by the mid 16th century it was available in 8 different sizes from soprano to great bass.Its primary function seems to have been to provide the bass in a typical wind band of the time. Early â€Å"dulcian† technique was rather primitive, with 8 finger holes and generally one key, indicating that it could only play in a few keys. The Baroque period was when the bassoon became very similar to what it is today. The man most likely responsible for developing the true Bassoon was Martin Hottorre. He was responsible for breaking the instrument down the one-piece dulcian into 4 sections (bell, bass joint, boot and wing joint).The modern Bassoon exists in two distinct primary forms the Buffett system and the Heckle system. Most of the world plays the Heckle system, while the Buffett system is primarily in France, Belgium, and parts of Latin America. Bassoon techniques The Bassoon is held diagonally in front of the player, but unlike the flute, oboe, and clarinet, it cannot be supported by the players hands alone. Some means of additional support is required; the most common ones used are a neck strap or shoulder harness attached to the top of the boot joint, a seat trap attached to the base of the boot joint which is laid across the chair seat prior to sitting down. To stabilize the right hand, many Bassoonists use an adjustable common shaped apparatus called a â€Å"crutch†, which mounts to the boot joint. An aspect of Bassoon playing technique called flicking involves the momentary pressing or â€Å"flicking† of the high A, C, and D keys by the left hand thumb at the beginning of certain note in the middle octave in order to eliminate the cracking or brief microphonic that happens without the use of the key.Bassoon Reeds Bassoon reeds, made of Arundo donax cane, are often made by the players themselves , although beginner bassoonists tend to buy their reeds from professional reed makers or use reeds made by their teachers. Reeds begin with a length of tube cane that is split into three or four pieces. The cane is then trimmed and gouged to the desired thickness, leaving the bark attached. After soaking, the gouged cane is cut to the proper shape and milled to the desired thickness, or profile, by removing material from the bark side.This can be done by hand with a file; more frequently it is done with a machine or tool designed for the purpose. After the profiled cane has soaked once again it is folded over in the middle. Prior to soaking, the reed maker will have lightly scored the bark with parallel lines with a knife; this ensures that the cane will assume a cylindrical shape during the forming stage. On the bark portion, the reed maker binds on three coils or loops of brass wire to aid in the final forming process. The exact placement of these loops can vary somewhat depending on the reed maker.The bound reed blank is then wrapped with thick cotton or linen thread to protect it, and a conical steel mandrel (which sometimes has been heated in a flame) is quickly inserted in between the blades. Using a special pair of pliers, the reed maker presses down the cane, making it conform to the shape of the mandrel. (The steam generated by the heated mandrel causes the cane to permanently assume the shape of the mandrel. ) The upper portion of the cavity thus created is called the â€Å"throat†, and its shape has an influence on the final playing characteristics of the reed.The lower, mostly cylindrical portion will be reamed out with a special tool, allowing the reed to fit on the bocal. After the reed has dried, the wires are tightened around the reed, which has shrunk after drying. The lower part is sealed (a nitrocellulose-based cement such as Duco may be used) and then wrapped with thread to ensure both that no air leaks out through the bottom of the reed and that the reed maintains its shape. The wrapping itself is often sealed with Duco or clear nail varnish (polish).The bulge in the wrapping is sometimes referred to as the â€Å"Turk's head†Ã¢â‚¬â€it serves as a convenient handle when inserting the reed on the bocal. To finish the reed, the end of the reed blank, originally at the center of the unfolded piece of cane, is cut off, creating an opening. The blades above the first wire are now roughly 27–30 mm (1. 1–1. 2 in) long. In order for the reed to play, a slight bevel must be created at the tip with a knife, although there is also a machine that can perform this function. Other adjustments with the knife may be necessary, depending on the hardness and profile of the cane and the requirements of the player.The reed opening may also need to be adjusted by squeezing either the first or second wire with the pliers. Additional material may be removed from the sides (the â€Å"channels†) or tip to b alance the reed. Additionally, if the â€Å"e† in the staff is sagging in pitch, it may be necessary to â€Å"clip† the reed by removing 1–2 mm (0. 039–0. 079 in) from its length. Playing styles of individual bassoonists vary greatly; because of this, most advanced players will make their own reeds, in the process customizing them to their individual playing requirements.

Business Continuity Plan as a Part of Risk Management

Celem niniejszej pracy jest zaprezentowanie roli i znaczenia Planu Ciaglosci Funkcjonowania Przedsiebiorstwa w calosciowym procesie zarzadzania ryzykiem w firmie oraz przedstawienie przykladowej tresci takiego planu.Rozdzial pierwszy zawiera ogolne wprowadzenie do zagadnienia zarzadzania ryzykiem. Przedstawia on definicje ryzyka w sensie, w jakim jest ono rozumiane w niniejszej pracy. Ponadto, znajduje sie w nim opis wielorakich zagroSen, ktore sa zwiazane z funkcjonowaniem przedsiebiorstwa, a takSe lista metod sluSacych do pomiaru ryzyka oraz opis przykladowych postaw, jakie sa przybierane wobec zagroSen. W rozdziale drugim zaprezentowano pojecie Zarzadzania Ciagloscia Funkcjonowania Przedsiebiorstwa. Znajduje sie tu charakterystyka ewolucji tego zagadnienia oraz wyjasnienie, dlaczego Plan Ciaglosci FunkcjonowaniaPrzedsiebiorstwa jest dokumentem o ogromnym znaczeniu dla firmy i jej interesariuszy. Ponadto, w rozdziale tym poddano dyskusji pewne szeroko rozpowszechnione mity dotyczac e Zarzadzania Ciagloscia Fukncjonowania Przedsiebiorstwa. Ta czesc pracy konczy sie opisem Analizy Wplywu na Przedsiebiorstwo jako glownego narzedzia, ktorym posluguje sie opisywany typ zarzadzania. W rozdziale trzecim przedstawiono rezultaty dokonanej przez autorke analizy roSnych Planow Ciaglosci Funkcjonowania Przedsiebiorstwa i ich szablonow.To studium bylo podstawa do zaprezentowania przykladowej struktury Planu oraz opisu najczesciej spotykanych w nim bledow. Ostatni rozdzial zawiera takSe charakterystyke faz wprowadzania i testowania Planu, ktore sa rownie waSne jak etap jego przygotowania. Wspolczesne przedsiebiorstwa nie moga sobie pozwolic na postawe reaktywna wobec realnych zagroSen, gdyS wydarzenia bedace w stanie zaklocic ich funkcjonowanie sa liczne i moga zaistniec zarowno w wewnetrznym, jak i zawnetrznym srodowisku firmy. Profesjonalnie przygotowany i skrupulatnie 5 aktualniany Plan Ciaglosci Funkcjonowania Przedsiebiorstwa cechuje postawe proaktywna. Jest nie tylko ogromnie pomocny w przezwycieSaniu trudnosci, ale dla interesariuszy firmy stanowi takSe dowod jej wiarygodnosci. MoSna wiec oczekiwac, Se coraz wiecej przedsiebiorstw bedzie sie staralo zdobyc ten nieoceniony atut. 6 ABSTRACT The aim of this thesis is to present the role and significance of a Business Continuity Plan (BCP) in the holistic process of a company’s Risk Management, and to provide a characteristic of exemplary BCP contents. The first chapter contains a general introduction into Risk Management.It delivers the definition of risk as it is understood in the context of the present thesis. Moreover, there is a description of multiple risks which are relevant to a company’s activity, as well as a list of the risk measurement methods and an account of exemplary attitudes towards threats. The second chapter presents the question of Business Continuity Management (BCM). It characterizes the evolution of this concept and explains the reasons why the BCP is a documen t of utmost importance to the company and its stakeholders. What is more, certain wide-spread myths concerning BCM are also disputed there.This part of the thesis ends with a description of Business Impact Analysis as the main tool of Business Continuity Management. The third chapter provides the results of the author’s analysis of various Business Continuity Plans and their templates. That study has been the basis for the presentation of an exemplary structure of a Business Continuity Plan, as well as for the description of the most frequent mistakes which occur in BCPs. The last chapter also contains a characterization of implementation and testing phases which are as significant as the preparation of a Business Continuity Plan.Modern companies cannot afford a reactive stance towards possible threats as the dangers which may disrupt their functioning are multiple and come both from the inner and outer environment. A professionally prepared and carefully updated Business Con tinuity Plan characterizes a proactive attitude. Not only does it significantly help to overcome difficulties, but it is also a convincing proof of the firm’s reliability to all its stakeholders. Therefore, it may be expected that more and more companies will attempt to acquire this invaluable asset. 7 INTRODUCTIONThe present thesis is the result of the author’s interest in various aspects of Risk Management, especially in the procedures which are applied by companies in case their functioning is faced with a serious threat. The most effective method used by business units is called Business Continuity Management (BCM) and focuses on the preparation and implementation of a Business Continuity Plan (BCP). The aim of this thesis is to present the role and significance of a Business Continuity Plan in the holistic process of a company’s Risk Management, and to characterize the contents of an exemplary Plan.The first chapter contains a general introduction into Risk Management and includes, inter alia, a description of multiple threats which are relevant to the company’s activity and a list of risk measurement methods. The second chapter discusses the concept of Business Continuity Management, explains the importance of Business Continuity Plan and characterizes the steps which lead to the development and implementation of this document. In the third chapter, there is a description of the contents which should be included in a Business Continuity Plan.That presentation is based on the author’s analysis of various BCPs and their templates. The exemplary materials enclosed in appendices have been provided by Punk, Ziegel & Company, Business Link, London Borough and Wallsal Council. All the translations which are enclosed in the present thesis have been made by the author. The references have been edited in accordance with the traditional Footnote/Endnote System. 8 CHAPTER 1 RISK MANAGEMENT This chapter contains an introduction into the nature and types of risk, as well as a description of the methods by which risk is assessed and managed.All these issues are inseparably connected with the concept of Business Continuity Plan, which aims at making provisions for the whole spectrum of present and future threats that may put a company's proper activity into danger. When a company decides to prepare and implement such a plan, it has to carry out a complex and accurate analysis of all the factors which may influence its operation, so that even the least expected dangers are taken into consideration. The first phase of drafting a BCP requires the recognition of existing and prospective risks, evaluation of their possible impacts and assumption of particular attitudes towards them.These vital steps are covered by Risk Management, which helps to organize the findings and solutions in a logical way. The proactive nature and principles of this comprehensive process will be presented and explained in the following chapte r. 1. 1. The Definition of Risk Risk and uncertainty are inseparable parts of every aspect of life. As Jan Mikolaj writes, â€Å"risk is connected with human activity, while uncertainty applies to the environment. †1 When these terms are used in the scientific context, they must be precisely defined.Some of the authors of economic and financial literature do not stress the difference between them. For example, Allan Willet states that â€Å"risk is objective uncertainty of the occurrence of an undesirable event. †2 In his opinion, â€Å"risk changes in accordance with uncertainty, not with probability level. †3 Similarly, Joseph Sinkey defines risk as â€Å"uncertainty connected with some occurrence or profit 1 2 Jan Mikolaj, Risk Management, (RVS FSI ZU, Zilina 2001), p. 17. Allan Willet, The Economic Theory of Risk Insurance, (Philadelphia 1951), p. . 9 in the future. †4 Frank Reilly thinks that â€Å"risk is the uncertainty that the investment may not bring the expected return. †5 However, the prevailing trend in modern professional literature is to differentiate between them. According to the Dictionary of Economic and Financial Terminology by Bernard and Colli, risk is â€Å"the probability of incurring losses by a business unit as a consequence of making a certain economic decision by this unit. The probability results from the uncertainty of the future. 6 The same source states further that â€Å"the concept of uncertainty is used in the situation when calculus of probability cannot be applied, whereas the term risk concerns recurrent events which possibility of occurrence can be calculated using the calculus of possibility. †7 Similar classification is introduced by Frank Knight. In his opinion, risk is a â€Å"measurable uncertainty,†8 while â€Å"immeasurable uncertainty†9 is uncertainty sense stricto. According to Irving Pfeffer, â€Å"risk is the combination of hazard and is measurable by pr obability mathematics, whereas uncertainty is measured by the level of confidence.Risk is a state of the world while uncertainty is a state of mind. †10 To summarize, risk means â€Å"a condition in which there exists a possibility of deviation from an outcome that is expected or hoped for. †11 Risk â€Å"can be expressed as a probability, ranging from 0 to 100 percent. †12 What is important, although not often mentioned in professional literature, there is not only the negative aspect of risk, but also the positive one. Thus, it is a possibility of loss as well as gain. 3 4 ibid. Joseph Sinkey, Commercial Bank Financial Management, (New York: Macmillan Publishing Co. 1992), p. 391. 5 Frank Reilly, Investments, The Dryden Press, (London: Intenational Edition, Collins, 1988), p. 463 6 Bernard and Colli, Slownik ekonomiczny i finansowy, (Wydawnictwo â€Å"KsiaSnica†, 1995), p. 156. 7 ibid. , p. 157. 8 Frank Knight, Risk, Uncertainty and Profit, (Boston: Univ ersity of Boston Press, 1921), p. 233. 9 ibid. 10 Irving Pfeffer, Insurance and Economic Theory, (Illinois: Irvin Inc. Homewood, 1956), p. 42. 11 Reto Gallati, Risk Management and Capital Adequacy, (New York: Mc Graw Hill, 2003), p. 7. 12 ibid. , p. 8. 10 1. 2. Risk in Business ActivityThe volume and diversity of risk obviously depend on a company’s type and branch of economy, but risk as such is a phenomenon which accompanies in its versatile forms any kind and field of business activity. It may come from the external environment of a company as well as from the internal one. For some entrepreneurs, risk is a necessary evil, whereas for others it is an additional motivation, if not the main one. Whatever the point of view is, if a given business activity is to succeed, it is essential to recognize what are the kinds of possible risk, asses their possible impact and acknowledge ways of reacting towards them.Such identification will considerably help in developing a suitable a ttitude, which allows minimizing a potential loss and maximizing a gain. 1. 2. 1. Types of Risk Types of risk which threaten a company’s activity are complex and numerous. Classifications of risk provided by professional literature differ with regard to the assumed criteria. The following comprehensive categorization is based mainly on the division presented in the book Risk Management in Emerging Markets.How to Survive and Prosper by Carl Olsson13: †¢ business risk (also called strategic risk) concerns potential results of inappropriate strategies, inadequate allocation of resources and changes in economic or competitive environment; †¢ market risk is associated with potential results of changes in market prices. It can be divided into: – interest rate risk, –foreign exchange risk, – commodity price risk, Carl Olsson, Risk Management in Emerging Markets. How to Survive and Prosper, (London, Pearson Education United, 2002), pp. 35-36. 13 11 shar es price risk; †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ credit risk means that a debtor may not pay in due time; industry risk regards operating in a particular industry; liquidity risk applies to inability to pay debts because of the lack of available funds; operational risk means potential results of actions by people, processes, and infrastructure; accounting risk concerns a possibility of financial accounts not being in accordance with the reality; reputation risk regards the results of changes in a company’s reputation; country risk is associated with effects which the mother ountry’s and foreign countries’ economic policies may have over the company; sovereign risk applies to lending money to the government or a party guaranteed by the government; political risk means results of changes in political environment; legal/regulatory risk is associated with the consequences of non-compliance with legal or regulatory requirements; environmental/ecological risk applies to the changes in natural environment which affect a company; systemic risk concerns small events which may produce much larges results than expected; technological risk is associated with the consequences of bringing new technology products to the market and introducing new IT systems; natural risk concerns natural and space disasters. All these risks usually appear simultaneously and their effects are synergic. Therefore, none of them should be ignored when considering the company’s situation. After realizing the large number and complex nature of different types of risk involved in all aspects of business activity, a logical step is to try to estimate their potential impact and results. 12 1. 2. 2. Methods of Risk Evaluation An assessment of a particular risk, both internally- and externally-driven, allows taking an appropriate attitude towards it.As Andrzej Stanislaw Barczak writes, such a measu rement involves both subjective and objective elements. 14 The subjective component consists in assuming a priori particular stipulations of a given evaluation tactic, as well as interpreting obtained results in a specific way. The objective constituent derives from the common agreement of the business circle on the methods widely applied to the assessment of risk. Two main types of risk measurement tactics are quantitative risk assessment and qualitative risk assessment. 1. 2. 2. 1. Quantitative Risk Assessment The main conception of quantitative risk assessment is to determine the cost of a given unwelcome occurrence, i. e. o calculate how big the loss would be if an adverse event happened. As it is pointed out in The Security Risk Management Guide, â€Å"it is important to quantify the real possibility of a risk and how much damage, in monetary terms, the threat may cause in order to be able to know how much can be spent to protect against the potential consequence of the threat . †15 This method involves: †¢ evaluation of assets (determining the overall value of a company’s assets, the immediate financial impact of losing the asset and the indirect value of losing the asset); †¢ measurement of the Single Loss Expectancy (SLE), which means â€Å"the total amount of revenue that is lost from a single occurrence of the risk. 16 It is calculated by â€Å"multiplying the asset value by the exposure factor (EF). The 14 Andrzej Stanislaw Barczak, Ryzyko – kategoria obiektywna czy subiektywna? , (Poznan: WSB, 2000), s. 30. 15 Microsoft, The Security Risk Management Guide, (Microsoft Corporation, 2004), p. 19. 16 ibid. , p. 18. 13 exposure factor represents the percentage of loss that a realized threat could have on a certain asset. †17 †¢ assessment of the Annual Rate of Occurrence (ARO), which is â€Å"the number of times that one can reasonably expect the risk to occur during one year. †18 This step is very diffi cult; it bases on historical data and previous experiences, and requires consultation with experts. calculation of the Annual Loss Expectancy (ALE), which stands for â€Å"the total amount of money that an organization will lose in one year if nothing is done to mitigate the risk. †19 This figure is established by multiplying the SLE and the ARO. †¢ valuation of the Cost of Controls (ROSI), i. e. establishing â€Å"accurate estimates on how much acquiring, testing, deploying, operating, and maintaining each control would cost. â€Å"20 It is estimated by using the following equation: (ALE before control) – (ALE after control) – (annual cost of control) = ROSI Although quantitative risk analysis provides clearly defined goals and results, all of the involved calculations are based on subjective estimates, which may prove inaccurate. Moreover, the whole process can be long and costly. 1. 2. 2. 2. Qualitative Risk AssessmentIn opposition to the quantitative method, qualitative risk assessment does not â€Å"assign hard financial values to assets, expected losses, and cost of controls†21 but instead, 17 18 ibid. , p. 19. ibid. , p. 19. 19 ibid. , p. 19. 20 ibid. , p. 19. 21 ibid. , p. 20. 14 â€Å"calculates relative values. †22 It involves distribution of questionnaires among people in the company who have relevant skills and knowledge, and workshops. The questionnaires are designed to discover what assets and controls are already deployed, and the information gathered can be very helpful during the workshops that follow. In the workshops participants identify assets and estimate their relative values.Next they try to figure out what threats each asset may be facing, and then they try to imagine what types of vulnerabilities those threats might exploit in the future. The information security experts and the system administrators typically come up with controls to mitigate the risks for the group to consider and the approx imate cost of each control. Finally, the results are presented to management for consideration during a cost-benefit analysis. 23 This tactic does not require a lot of time and it is not a big burden for the people involved. What is more, the results of the implemented solutions are quickly visible. However, the estimated figures are often perceived as too vague.These two presented approaches are often used together in order to obtain the most comprehensive information about a potential threat. Although scientific methods of risk assessment are helpful in estimating the possible impact which particular occurrences may have on the company’s activity, it is essential to remember that none of the methods can be perceived as 100% trustworthy and absolutely infallible. However, even if it is impossible to predict all threats and provide for all undesirable events, the significance of risk evaluation tactics combined with human knowledge, experience, imagination and intuition canno t be questioned. 1. 3. Risk Management in Business ActivityThe fact that the phenomenon called risk is measurable and its occurrence may be predicted means that it is also possible to take preventive measures and proactive attitude towards it. As Reto Gallati stresses, â€Å"the term Risk Management is a recent creation, but the actual practice of risk management is as old as civilization itself. †24 In everyday life, people face risk in a varying degree all the time and they manage it in a natural way so as to minimize undesired impact and render possible profits. 22 23 ibid. , p. 20. ibid. , p. 20. 15 Certain individuals even enjoy plunging into extraordinarily dangerous situations in order to check how they will cope in difficult moments.However, Andrew Holmes notices that â€Å"at the individual level, if a person takes a risk and fails to manage it properly, the damage is limited to him, and maybe his near relatives,†25 while â€Å"the management of risk for orga nizations is not as simple. †26 As it was presented in the part 1. 2. 1, the company is a subject to various and multiple threats. Holmes stresses that â€Å"ultimately, all risks have a financial impact. †27 The complexity of the required actions aimed at coping with the risk means that â€Å"within the modern corporation, risk management must encapsulate managing strategic, business, operational, and technical risks, rather than those associated with pure finance such as credit, interest rate, and currency risk. †28 Nowadays, Risk Management is not an extra feature added to a company’s basic activity, but â€Å"an essential skill of all modern corporations. †29 All usiness units should realize its great importance, because it is essential not only for their success but simply survival. According to Holmes, a company’s attitude towards the risk depends on its risk sophistication, which can be divided into five stages30: †¢ at the lowest level of sophistication (reactive stance), risks are dealt with only when they turn into live issues or when crisis strikes. There is no effort to recognize and measure possible risks in advance. †¢ At a slightly more sophisticated stage, a company understands the importance of risk management and takes the trouble to identify and manage threats more actively. It tends to seek out the best practice and views adverse events in a wide context. At the next level, there are organizations which acknowledge the need to manage risks throughout the organization and usually develop some form of 24 25 Reto Gallati, Risk Management and Capital Adequacy, (New York: McGraw Hill, 2003), p 11. Andrew Holmes, Risk Management (Oxford: Capstone Publishing, 2002), p. 2. 26 ibid. 27 ibid. 28 ibid. 29 ibid. 30 ibid. , p. 8. 16 risk management framework to ensure consistency of approach. †¢ At the following stage, a company understands the link between risk and reward. It is aware that for eve ry risk there is an associated opportunity which can be exploited. Such a business unit is often a market leader and is willing to take risks to achieve its strategic objectives. At the ultimate level of risk sophistication, there are organizations which integrate risk management with the goal of enhancing shareholder value. Thus, they shift the responsibility for risk management away from the traditional areas of audit and compliance to everyone within the organization. Of course, the active process of Risk Management requires commitment and focus as it means following a deliberate set of actions which are designed to identify, quantify, manage and then monitor the events or actions that could lead to financial loss. Often, there is too little data about a given risk, and therefore, this kind of management may involve a large degree of judgment and assumptions concerning the future. 1 Yet, all the effort is worthwhile as â€Å"successful organizations tend to be excellent risk man agers, not only because they understand the risks they face, but also because of how they manage them. Conversely, those organizations that are poor at risk management spend no time scanning the risk horizon, instead leaving their futures to fate. This invariably means shocks, falling market share, takeovers and missed opportunities. †32 As Holmes reflects, â€Å"risk management is both an art and a science, and being successful depends on how well the two are kept in balance. †33 1. 3. 1. Methods of Risk Management John Holliwell, the managing director of Smith Williamson Consultancy, once said, â€Å"There is nothing wrong with risk.It is the lifeblood of business and the test of entrepreneurs and managers. What matters is how you handle risk and the culture in 31 32 ibid. ibid. 17 which you operate. ’’34 A similar thought is expressed by Clifford Tijok, â€Å"Entrepreneurial behaviour demonstrated in real life entails, i. a. , the ability to enter int o calculated risk, so that return-driven opportunities can be pursued and the ability to identify the relevant risks associated with these opportunities and the decision on appropriate behaviour to address these risks. †35 When a company decides on its risk management techniques, it usually analyses the following features: Table 1. Factors influencing the type of risk management framework required by the organization36ors the type of risk managementframework required by an organizatio FACTORS INFLUENCING RISK MANAGEMENT REQUIREMENT DIMENSIONS TO CONSIDER Strategy risk appetite of owners/risk managers industry geographical coverage aggressive or conservative risk taking or risk averse sunrise or sunset industry; primary, manufacturing, service sector local, national, regional or global is the company critically dependent on critical success factors one or two factors which require close management? volatility is the environment likely to change significantly or unpredictability ? monopoly, few or limited number of osition in industry players, or free market with many players and no barriers to entry is the area of operations highly controlled by regulatory environment legislation and/or regulatory bodies? are regulators intrusive or hands off? 33 34 ibid. ibid. , p. 2. 35 Clifford Tijok, Risk Management in Finance, (Lehrverangstaltung, 2005), p. 8. 36 Carl Olsson, Risk Management in Emerging Markets†¦ pp. 110-111. 18 is deregulation occurring or the level of regulation increasing? management style centralized or decentralized adequate or inadequate people and resources technology resources, financial position – adequate funds available, highly or lowly geared. tatus/ownership Organizational culture Public or privately owned Is the culture strong or weak? are they simple and predictable or nature of risks faced complex/ unpredictable? is the size of risks manageable or is catastrophic risk a cause for concern? Such an analysis leads to adopting one of the main risk management techniques, as presented by Cliff Tijok37: †¢ †¢ †¢ risk limitation – a company establishes its range of tolerance towards a given risk and constantly monitors whether the limits are not breached; risk avoidance – a company chooses the least risky option or none of them; risk transfer – a company reduces or completely transfers specific risks by hedging against a risk (i. e. , obtaining insurance) or diversification.Whatever the approach is, managing risks â€Å"takes a degree of courage and requires the organization to take responsibility for its actions. †38 It is a continuous process, which is â€Å"based on a distinct philosophy and follows a well-defined sequence of steps. †39 After the application of the methods and rules provided by risk management, the obtained data are organized in a clear and logical way. This is the basis which allows the company to go one level up and prepare action schedul es that will be used in case a recognized danger occurs. An essential part of such planning is encompassed by Business Continuity Management and will be discussed in the next chapter. 37 38 Cliff Tijok, Risk Management†¦ pp. 12-13. Andrew Holmes, Risk Management†¦ p. 2. 39 Reto Gallati, Risk Management†¦ p. 11. 19 CHAPTER 2 BUSINESS CONTINUITY MANAGEMENT This chapter provides information on what is Business Continuity Management, when it appeared in the history of management, what purposes it serves and how it should be organized and introduced into a company’s activity. Moreover, it contains a description of the steps which lead to the preparation of a Business Continuity Plan and of the implementation process that follows. Business Continuity Management forms an integral part of Risk Management. It met with particularly deep interest in the 1990s as the result of the frenzy which concerned the year 2000.At that time, there were many anticipated business conti nuity problems, implicated by the date change in computer systems. Business Continuity Management became even a bigger focus of attention in 2001, after the terrorist attack in New York. As Michael Gallagher observes, that huge calamity â€Å"increased awareness of business interruption issues, resulted in a better understanding of critical processes and vulnerabilities and improved co-operation and collaboration between public and private sectors on emergency management questions. †40 Lyndon Bird adds that â€Å"‘business today has far more economic interdependency between regions than ever before. There are often global consequences when risk becomes reality. 41 Yet, at the same time â€Å"there is a growing awareness of what business continuity really is about and why it is so important to both businesses and individuals. †42 8 2. 1. The Concept of Business Continuity Management Business Continuity Management (also called BCM) is defined by the Business Conti nuity Institute as â€Å"a holistic management process which identifies potential Michael Gallagher, Business Continuity Management, (Edinburgh: Pearson Education Limited, 2003), p. 7 41 Lyndon Byrd, â€Å"Business Continuity Management in a shrinking world,† Business Continuity & Risk Management (a supplement distributed in The Times), July 26 2006, p. 2 40 20 mpacts that threaten an organization and provides a framework for building resilience and the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities. † Its main purpose is to enable the company’s regular functioning, even though everyday operations are disrupted. As Lorraine Lane observes, â€Å"organizations must be capable of withstanding the shocks that can so easily distract management from their primary purpose of meeting and beating their ‘normal’ operational goals. †43 BCM appears as the solutio n that is exactly needed to guarantee such stability to the business. Obviously, BCM looks different in various companies as each organization is a unique system of multiple factors and interdependencies.Dr David Smith explains that â€Å"because of its all-embracing nature, the way BCM is carried out will inevitably be dependent upon, and must reflect, the nature, scale and complexity of an organization’s risk profile, risk appetite and the environment in which it operates. †44 Gallagher supports this view by stating that â€Å"the plan must fit comfortably with the culture and management style of the organization. For example, the type of plan that suits a financial institution would be totally inappropriate in a radio or television broadcasting organization. †45 It is also very important to acknowledge that the company’s BCM must be continuously revised and tested, in order to stay valid and fulfill its tasks. As Dr Smith emphasizes, â€Å"BCM is, by necessity, a dynamic, proactive and ongoing process. It must be kept up-to-date and fit-for-purpose to be effective. 46 Maintaining the validity of proper plans and policies is actually more difficult than establishing them, but this is what constitutes the point of developing BCM by a business. On the following page, there is an approximate structure of steps involved in Business Continuity Management, which is focused on planning. 42 43 ibid. â€Å"Corporate resilience: the new regime,† Business Continuity & Risk Management,†¦, p. 11 44 David Smith, â€Å"Business continuity and crisis management,† Management Quarterly, July 2003, p. 27 45 Michael Gallagher, Business Continuity Management,†¦, p. 43 46 ibid. 21 Scheme 2. 1. Procedures involved in Business Continuity Management47 INPUTS 1. 2. 3. 4. 5. 6. scope definition desired objectives policies and standards inventory – information, technology, people management commitment financeANALYSIS ASSET ASS ESSMENT BUSINESS IMPACT ANALYSIS TECHNICAL REQUIREMENTS 1. analyze BIA and Asset Assessment 2. list technical strategies based on the analysis of each asset and business process in scope 3. document drawbacks and advantages of each listed strategy 1. identify and quantify asset needs 2. document ownership 3. assign weight based on importance 4. assess exposure 5. identify access control and other preventive measures 1. rate processes based on criticality 2. identify dependencies 3. identify custodian 4. identify threats and consequences 5. identify safeguards needed/possible 6. list critical resource requirement 7. quantify acceptable owntime and and losses DEVELOPMENT 1. 2. 3. define continuity goals and chosen strategy in the form of a plan acquire resources needed for preparing and implementing the continuity plan test the plan RESULTS 1. 2. 3. 4. preventive control Business Continuity Plan continuity team training plan for team 47 Padmavathy Ramesh, Business Continuity Planning, (Tata Consultancy services, 2002), p. 28 22 2. 1. 1 The Evolution of BCM As Halls observes, â€Å"Business Continuity Management is a relatively modern idea. Its first mentions can be found in the 1980s, although it was only in the very late 1990s that it became a more widespread as a business discipline. 48 In fact, Business Continuity Management is â€Å"the outcome of a process that started in the early 1970s as computer Disaster Recovery Planning (DRP) and then moved through an era where the emphasis was on business continuity planning rather than on management. †49 In that time, computer managers were responsible for DRP. Soon, they realized that â€Å"the concentration of systems and data in itself created new risks; computer operations management introduced formal procedures governing issues such as backup and recovery, access restrictions, physical security, resilience measures such as alternative power supply, and change control. †50 In 1970s, if a big probl em appeared, the tolerated downtime was not measured in hours, but days. Therefore, â€Å"the cost of back-up computers sitting idle in an alternative location waiting for a disaster to happen was prohibitive. However, for some companies, data safety was a priority; no matter at what cost it would be obtained. As Gallagher points out, â€Å"organizations such as banks were in a more vulnerable position and invested considerable resources in installing and testing computers at alternative sites. Back-up tapes or disks were increasingly stored at protected locations well away from the computer centre. †51 Later, in the 1980s, commercial recovery sites offering services started to appear, often on a shared basis. â€Å"This was the start of the sophisticated recovery centers that operate today,†52 notes Gallagher. However, they all concerned mainly IT: â€Å"The disaster recovery plans documented the actions required to safeguard and restore computer operations.These co vered computer processing, computer applications, telecommunications services and data after a disruptive event. The objectives were to 48 49 Michael Halls, â€Å"What is Business Continuity Management? † †¦ Michael Gallagher, Business Continuity Management,†¦, p. 6 50 ibid. 51 ibid. 52 ibid. 23 prevent or at least minimize the impact that such an event would have on the business. †53 Such plans were far from being perfect as â€Å"they were more concerned with, for example, restoring a company’s financial systems to an operational state than with worrying about whether there would be accommodation available to allow the staff of the finance department actually to use the systems. 54 Not much attention was paid to implementing BCL into every aspect of the company’s activity. In 1990s, a significant change in the IT environment took place and the movement from DRP to Business Continuity Planning became considerably quicker. Gallagher confirms tha t â€Å"throughout this decade, and into the 2000s, there were significant changes in the IT approach to DRP/BCP and in what constituted acceptable downtime. The emphasis moved from being mainly on IT to an approach that considered all aspects of an organization’s business and relationships. †55 It is only then that â€Å"BCP has become BCM with the emphasis on management – not just planning.This encompasses the emphasis on risk management and the measures to be taken to reduce risk. BCM is no longer regarded as a project – it is now a program, emphasizing that it is a continuous process rather than a task with a defined enddate. †56 The next step is to make managers of all companies aware of the importance of BCM as â€Å"the increased recognition of BCM means that a greater budget allocation may be available to it. More significantly, the message preached by business continuity practitioners for years that business continuity principles should b e an integrated part of the business planning process may be heard. † 57 2. 1. 2 The Significance of BCMThanks to proper Business Continuity Management, a company has a professional plan which allows acting as quickly and efficiently as possible in case a dangerous 53 54 ibid. ibid. 55 ibid. 56 ibid. 57 ibid. 24 event happens, because â€Å"BCM not only aims to provide continuity in customer service at a minimum acceptable level, it also aims to limit the impact on the financial position of an organization by ensuring that its critical functions continue to operate during a crisis and that the remainder are recovered in a controlled manner. †58 Therefore, when a BCP is applied, there are no chaotic, haphazard attempts to minimize the losses as clear and logical procedures have been devised earlier and communicated to the staff.As Mel Gosling notices, â€Å"decisions made in the first few hours of an event that causes serious disruption to an organization’s opera tions are critical, and actions undertaken in the first few days will have a significant financial impact†59 and â€Å"a company that has an effective and well-tested Business Continuity Plan is more likely to take the right decisions in the first few hours and to subsequently undertake the best actions to limit the impact on its financial position. It has a better chance of incurring significantly less additional expenditure at the time of a disruption. †60 Moreover, â€Å"one of the benefits that implementing business continuity management brings to a firm, which is not immediately apparent, is an understanding of what the business does and what is important to it. †61 In this way, a company can analyze its allocation of resources and improve it, as well as â€Å"find out what is critical and of value, and what can be outsourced or left undone. †62 Besides, certain companies, e. g. , financial institutions, are legally obliged to develop BCM and maintain an effective business continuity plan.It is also becoming increasingly common that businesses require from their suppliers to be presented with their BCM plans. This facilitates the process of assessing the supplier’s infallibility and constitutes an element of developing a sound business relationship. Mel Gosling, â€Å"Why invest in business continuity,† 1 February 2007, . 59 ibid. 60 ibid. 61 ibid. 62 ibid. 62 ibid. 58 25 The investment into Business Continuity Management is beneficial not only in the matter of a business being prepared for multiple diverse crises. It also adds significantly to the company’s reputation and brand image by â€Å"demonstrating effective and efficient governance to the media, markets and stakeholders. 63 Moreover, it enhances the competitive advantage of the business, because to some investors and customers it may be a vital factor in deciding to which company they should entrust their capital. Osborne explains it as follows, à ¢â‚¬Å"To a firm’s shareholders it’s part of investor relations – you are showing your commitment to keeping their investment safe. To a firm’s staff it is labour relations – you are showing your willingness to protect the livelihood of your staff. †64 Furthermore, he stresses that â€Å"it’s customer relations too – you’re demonstrating your commitment to providing a service for them even in the most extreme of circumstances. †65 Last but not least, devising professional plans and keeping them updated increases the company’s credibility in the eyes of nsurers and auditors because they are becoming increasingly aware of the importance of BCM. As Osborne observes, â€Å"Five years ago, auditors simply would have said to their clients, do you have a plan in place? A couple of years ago, they would have wanted to inspect it, to see if every contingency was covered and how practical it appeared to be. Nowadays, they will ask how it worked in practice. When it was last tested and what were the results? †66 What is more, â€Å"insurers like to see evidence that all reasonable steps have been taken to understand the past accident record and that actions have been put in place to prevent them from happening again. 67 This is confirmed by Gosling, who states that â€Å"insurance companies themselves are now starting to realize the opportunities that business continuity provides for loss reduction, and it is becoming increasingly common for a condition of insurance cover to be the existence of a business 63 64 David Smith, â€Å"Business continuity and crisis management,† †¦ p. 27 Ask the panel of business continuity experts,† †¦ 65 ibid. 66 ibid. 67 â€Å"Pro-active Risk Management: Avoiding catastrophe. † Business Continuity & Risk Management,†¦, p. 14 26 continuity plan. †68 All in all, devising and implementing an effective BCM plans brings ve rsatile advantages to a company, while the failure to do so â€Å"means taking an unnecessary risk with an organization’s future and profitability. †69 2. 1. 4 Continuity Culture in a Company A vital step in forming Business Continuity Management in a company is to instill a proper attitude in the staff.Michael Gallagher believes that â€Å"it is about creating a continuity culture in the organization. This can be at least as important as producing the actual plans. †70 He also states that â€Å"for BCM to work, it must be driven from the top. â€Å"71 Therefore, senior managers must understand that BCM is â€Å"not just another expense but also a significant resource,’ 72 as Mike Osborne assures. However, the amount of data that has to be taken into consideration while developing preventive measures is overwhelming. Lane points out that â€Å"while responsibility for corporate resilience sits firmly with the executive board, the skills and experience required to combat the growing list of disruptive threats exists throughout the organization. 73 Thus, in large companies, it is a wise move to appoint a full-time Business Continuity Manager, whose tasks are to accumulate the relevant knowledge from all departments and co-ordinate proper procedures, as well as devise professional plans and keep them updated. Smaller businesses may use the services offered by consulting companies. The staff’s awareness of specific procedures ready to be applied in case of any foreseeable disaster enhances their efficiency and identification with the company. Instructing them of the specific plans encourages them to pay bigger attention to the safety issues, which significantly contributes to the BCM process. 68 69Mel Gosling, â€Å"Why invest in business continuity,† †¦ ibid. 70 Michael Gallagher, Business Continuity Management,†¦, p. XI 71 ibid. 72 â€Å"Ask the panel of business continuity experts,† Business Continu ity & Risk Management,†¦, p. 12 73 David Smith, â€Å"Business continuity and crisis management† †¦ p. 27 27 Gallagher explains that â€Å"if the business continuity culture is sufficiently developed, the continuity considerations will be a natural part of the development of the plans. †74 2. 2 BCM and the Company’s Size For the definite majority of large corporations, BCM is a regular part of their activity but, as Gallagher states, â€Å"there is a feeling that it is not a matter of concern to the smaller business. 75 This happens because â€Å"a lot of the emphasis in the business continuity press, and in business continuity material generally, relates to large organizations and to the financial services industry. †76 While â€Å"for the largest corporations and those with enormous sums of money at stake, the complexity of planning is breathtaking,†77 â€Å"small and medium-sized enterprises tend to get ignored when talking about bus iness continuity planning. The planning is more prosaic. The challenges are fewer. And most importantly, their budgets are smaller. †78 Another problem is the fact that â€Å"smaller companies are typically less aware of the correct procedures than larger firms where systems have been developed. 79 The managers of small and medium-sized businesses simply tend to think that their company’s size is a kind of safeguard against a disaster, or that potential recovery will be quick and simple, so â€Å"the process of developing a plan is perceived as too complicated, involving excessive costs and management time. †80 However, Mike Osborne emphasizes that â€Å"the issue for small to medium sized businesses is that they often do not have the inherent resilience that say, a UK multinational has. †81 He warns the managers against an illusive safety feeling as â€Å"smaller firms often trade from a single location and do not benefit from vast armies of support sta ff and Michael Gallagher, Business Continuity Management,†¦, p. 88 Michael Gallagher, Business Continuity Management,†¦, p. 28 76 ibid. 7 Michael Halls, â€Å"What is Business Continuity Management? † Business Continuity & Risk Management,†¦, p. 3 78 Michael Halls, â€Å"Small is still beautiful (but riskier too),† Business Continuity & Risk Management,†¦, p. 10 79 ibid. 80 â€Å"It’s never too late to plan for the future,† Business Continuity & Risk Management,†¦, p. 15 75 74 28 specialists who can react to and recover from an incident. If they are hit by a disaster, the impact is greater then it would be the case in a larger organization. †82 This view is supported by Gallagher, who states, â€Å"Small businesses should remember that their biggest threats do not come from high profile incidents such as earthquakes or terrorist bombs.It is the dozens of relatively minor issues such as prolonged power outages or computer ne twork failures that may cause the problems. The vast majority of problems are caused by people or process failures. †83 He points out that â€Å"this is where the effort and investment should be concentrated. Because of size, the process is simpler and the cost will be proportionally less than for larger organizations. The consequences of not having a plan are, however, likely to be disastrous. †84 Therefore, as Michael Halls stresses, â€Å"Business Continuity Management is a must for companies of all sizes. A small firm that loses its data will go out of business just as surely as a larger one. †85 2. 3 BCM in Relation to InsuranceSome managers wonder why they should engage themselves into Business Continuity Management while their company is insured. To them, devising a BCM plan seems to be an unnecessary waste of time and money, because they think that risks are looked after by the insurers and thus, there is no need to worry. But these are absolutely false c onclusions. As Mark Baylis emphasizes, â€Å"insuring the risk is not the answer, because it is better for the business that the problem does not happen at all. † 86 This view is supported by Gallagher, who states that â€Å"insurance is simply a necessary part of the total business protection and recovery plan – but it is only a part. 87 Although it is true that insurance provides financial aid in case a disaster strikes, the money may 81 82 ibid. ibid. 83 Michael Gallagher, Business Continuity Management,†¦, p. 28 84 ibid. 85 Michael Halls, â€Å"Small is still beautiful (but riskier too),† †¦ 86 Mark Baylis, â€Å"Weak links in the supply chain,† Business Continuity & Risk Management,†¦, p. 11 87 Michael Gallagher, Business Continuity Management,†¦, p. 33 29 arrive after quite a long period. Moreover, â€Å"insurance for loss of profits, or for increased cost of working, will cover only a defined period – which in practice may prove to be inadequate. †88 Besides, â€Å"proving loss of profits can be very difficult.The outcome may be based on historical performance and may not take account of recent market developments. †89 It is also very important to notice that insurance will not â€Å"keep customers supplied or guarantee that market share will be recovered,†90 nor will it â€Å"protect the organization’s reputation and image. †91 Last but not least, as it was mentioned in the previous paragraph, there may be a situation when the insurer refuses to provide a cover unless the company devises a BCM, because nowadays businesses are required to act more actively in protecting themselves from various possible risks. Therefore, it is vital for a firm to have efficient Business Continuity Management in order to obtain insurance on favourable terms.To sum up, managers must remember that â€Å"insurance is reactive – while it has its place, the whole protection proce ss must be more proactive and BCM is the key. †92 2. 4 Business Impact Analysis Business Impact Analysis (also known as BIA) is the most important tool of Business Continuity Management. Gallagher defines it as â€Å"a management-level analysis that identifies the impacts of losing company resources. It measures the effect of resource loss and escalating losses over time in order to provide senior management with reliable data upon which to base decisions on risk mitigation and continuity planning. †93 The BIA process â€Å"identifies and ranks the business processes, 88 89 ibid. , p. 34 ibid. 90 ibid. 91 ibid. 92 ibid. 93 ibid. , p. 146 30 criticalities and dependencies. 94 It is closely related to risk analysis, which was discussed in the previous chapter, therefore, it may base on the materials that have already been gathered during the general Risk Management process in the company. The method by which BIA is carried out â€Å"depends on the nature of the organiza tion – size, structure, local or international, etc. †95 Generally, in order to maximize the efficiency of a BIA processes, standardized questionnaires should be used. They should contain questions which are formed in such a way as to provide information that concerns the following issues: †¢ †¢ the nature of given problems; the impact of the problems, which should be presented from different perspectives, e. g. the company’s reputation, costs involved, loss of future business, etc. †¢ †¢ †¢ the influence that may be caused by the problems at different times of the day, week, month and year; the kind of resilience that may be currently provided in a quick and easy way; the recovery from the addressed problems (time needed for recovery, priorities for resumption, duration of backlog, additional costs, insurance cover); †¢ †¢ the available workarounds and the way they operate; the continuity and recovery requirements, e. g. , acco mmodation, computer systems, etc. 96 After the questionnaires have been filled in, the Business Continuity Manager prepares a comprehensive report which presents the company’s Business Impact Analysis. The report is composed of the following parts: 1. Introduction 2. Executive Summary 3. Background to Study 94 95 ibd. , p. 47 ibid. 96 cf. Michael Gallagher, Business Continuity Management,†¦, p. 57 31 4. Current State Assessment 5. Threats and Vulnerabilities 6. Critical Business Functions/Operations 7. Business Impacts – Operational and Financial 8. Potential Strategies 9. Recommendations 10. Conclusion 11.Appendices97 Thanks to the logical and substantial structure, the report fully represents the current standing of the company, clearly indicates its weak points and realistically describes possible procedures. Business Continuity Management is an extremely important process, which not only enables the assumption of proper attitudes towards multiple threats that endanger a firm’s functioning, but it also significantly deepens the understanding of the business and improves the staff’s morale. Proper implementation of BCM in a company leads to the creation of a Business Continuity Plan, which will be discussed in detail in the following chapter. 32 CHAPTER 3BUSINESS CONTINUITY PLAN In the previous chapters, the importance of Business Continuity Management was explained and it was stated that devising a Business Continuity Plan is one of the main tasks of this type of management. This chapter provides information on how to construct, implement and test a Business Continuity Plan. Moreover, it contains a description of the most frequent mistakes that appear while drafting a BCP and advises how to avoid them. The exemplary plans and templates on which the analysis is based are attached as Appendices B, C, D, E and F at the end of the present thesis. 3. 1 The Structure of an Exemplary Business Continuity PlanBusiness Continuity Plan s vary in length and are divided into different parts, which mostly depends on the size and type of a company. However, certain sections are vital and thus common for all the plans. They should be organized in such a way as to enable quick access to the required information. These crucial parts will be successively discussed herein. 3. 1. 1 Front Page and Introduction On the front page of a Business Continuity Plan, there should be written the name of the company, the issue date and a distinct lettering stating BUSINESS CONTINUITY PLAN. Moreover, if the Plan is confidential, it should be indicated on the front page as well. Optional elements inserted here may include contact details for feedback, references, the revision date, etc.These components are followed by an introduction, which consists of a distribution list (copy number, name and location) and a table of contents. 97 cf. Michael Gallagher, Business Continuity Management,†¦, p. 57 33 3. 1. 2 Aim This section should con tain the description of the purpose for which the Plan has been created. It usually gives examples of possible disasters and explains the objectives which the plan is intended to meet in case of a calamity. What is more, a company which wishes to convey an especially powerful message concerning its reliability may include in this part a summary of the extensive works and professional researches which have been involved in the development of the Plan. 3. 1. 3 Critical Functions ChecklistCritical Functions are these activities without which the company would not be able to perform. In order to prepare a Critical Functions Checklist, the following steps should be completed: †¢ †¢ †¢ †¢ †¢ the identification of Critical Functions, e. g. , sales and distribution; the description of the Functions in terms of the impact which may be caused by their interruption in the first 24 h, 48 h, one week and two weeks; the prioritization of the Functions; the ascription of a reasonable timeframe within which the recovery is possible; the determination of resources which will be necessary in the recovery process, such as: a) the staff – the required number of people, their knowledge and skills; b) alternative location – e. g. the staff working at home or provisional premises; together with necessary equipment like computers, cars; c) data – information and documents, e. g. , insurance certificate, service, customers and suppliers details; d) communications – all ways in which customers, suppliers, the staff and media can be contacted in case of disaster. 34 Such a Checklist allows ensuring that â€Å"critical tasks are completed on time and according to a pre-agreed priority schedule. It may also be used to provide a handover document between different shifts in the recovery process. †98 3. 1. 4 Risk Analysis Table This part should contain a table comprising a list of dangers which may interrupt and threaten the activi ty of the company.The matrix presented below may be used to ascribe values to the particular risks with regard to the likelihood of their occurrence and their potential impact. Table 3. 1. 4 Risk Matrix LIKELIHOOD NEGLIGIBLE CATASTROPHIC RARE UNLIKELY POSSIBLE PROBABLE M M M L L H H M L L VH VH H M L VH VH H M L VH VH H M L IMPACT SIGNIFICANT MODERATE MINOR INSIGNIFICANT Legend: L – low, M- medium, H – high, VH – very high Moreover, there may be also attached a list of possible losses, endangered people and equipment, as well as the actions which had to be taken in case a particular risk occurs. 98 Appendix D, p. 77. 35 3. 1. 4 Emergency Response Checklist Such a Checklist greatly facilitates the performance of people involved in fighting a potential adverse event.It also acts a concise register of actions that were taken after the disaster happened. It should be later analyzed, developed and improved. It is preferable that tasks to be completed are organized in the form of a table, together with a column in which the date of termination will be written down. The actions may be listed as follows: †¢ during the first 24 h a) to establish the Actions and Expenses Log, which is a more detailed and comprehensive version of the Emergency Response Checklist; b) to contact emergency services; c) to identify and approximately assess the damage which has been incurred by the staff, equipment, buildings, data, etc. d) to determine the critical functions which have been interrupted; e) to decide on the steps that need to be taken within the recovery process, which is based on the Critical Function Checklist; f) to contact the staff, customers, suppliers, insurers, relevant authorities and other stakeholders in order to assure them that the situation is under control; g) to issue a special PR statement to the media. †¢ daily within the recovery period a) to update the Actions and Expenses Log; b) to provide valid information to the staff, cu stomers, suppliers, insurers, relevant authorities and other stakeholders, as well as the media; †¢ after the recovery period a) to interview the staff with respect to their welfare needs; b) to analyze the Emergency Response Checklist and Actions and Expenses Log in order to introduce possible improvements into the Business Continuity Plan. 36As it can be seen, the response to the crisis should focus on its effects, not on the causes. The reasons of the adverse event should be identified as quickly as possible, but a comprehensive analysis of them must not be performed before the main steps of the recovery process have been taken. 3. 1. 5 Roles and Responsibilities This section should contain information and contact details regarding the people who are responsible for the shape and content of the Business Continuity Plan (e. g. , Business Continuity Manager, the BCM Team). Moreover, there may be included a list of duties which are ascribed to the particular staff members in ca se an adverse event happens.Last but not least, it is necessary to indicate the names and contact details of the co-ordinators of the recovery process, help-line numbers (possibly, with pre-recorded messages) and location of meeting rooms and the Business Recovery Command Centre, together with maps. 3. 1. 6 Contact List In this part, there should be listed the following contact details: †¢ staff members (divided in respect to the departments) and their next of kin a) name, b) address, c) work telephone number, d) home telephone number, e) mobile telephone number, f) e-mail address; †¢ key suppliers a) name, b) provided goods, c) address, d) telephone/fax number, 37 e) e-mail address; †¢ key customers a) name, b) service/good used, c) address, d) telephone/fax number, e) e-mail address; †¢ mergency services (ambulance, fire service, flood line, hospitals, police) a) address, b) telephone number; †¢ utilities (water, telecommunication, gas and electricity comp anies) a) name, b) telephone number, c) e-mail address; †¢ insurers and banks a) name, b) address, c) telephone/fax number, d) e-mail address; †¢ authorities a) name b) address c) telephone/fax number; †¢ media a) name, b