Sunday, May 24, 2020

Essay about We Must Ban Therapeutic Human Cloning

The Senate is considering a proposal to outlaw human cloning. Two alternative proposals would ban only reproductive cloning, which would mean explicitly legalizing human cloning but not the implantation of a clone embryo into a womb. Pro-cloners are willing for the most part to outlaw reproductive cloning because it isnt safe, but they oppose a ban on cloning for research and experimentation--known as therapeutic cloning--arguing that such a cloning license is necessary to the development of future medical treatments for human ailments. This opposition to a ban on human therapeutic cloning is misinformed. The case against cloning, including therapeutic cloning, has mainly been argued on grounds of morality. Opponents†¦show more content†¦Not only is human cloning immoral but it may have negative utility--in other words, attempting to develop human cloning technologies for therapeutic use may drain resources and personnel from more useful and practical therapies. To understand why therapeutic cloning fails the utility test, we must take a quick look at the significant difficulties facing embryonic stem cell research. Embryonic stem cell researchers hope to create medical treatments that would use undifferentiated cells--known generically as stem cells--extracted from 5-to-7-day-old embryos known as blastocysts. During natural gestation, these stem cells eventually differentiate, that is, they transform into bone, neurons, muscle, organs, blood--indeed, all of the more than 200 different tissue types in the body. Researchers hope to learn how to harness this ability by extracting stem cells from embryos, transforming them into specific tissues, and then injecting the tissues into patients to treat medical ailments. In their enthusiasm for embryonic stem cells--and in an effort to assure ample funding for the research--some advocates have all but promised that such therapies are just around the corner. But that isnt even close to being true. Writing in the scientific research journal Stem Cells, editor in chief (and advocate of embryonic stem cell research) Curt I. Civin admitted that scientists have exaggerated the immediacy of the prospects of clinical therapiesShow MoreRelatedThe Debate Over Human Cloning Essay1526 Words   |  7 Pages Human cloning, an unknown wonder to the universe the world has yet to unfold. The idea of cloning can be a dream to some and others not so much, there’s just endless possibilities when it comes to cloning. With the thought of cloning humans comes reality and other things that can cause issues or keep the experiment stagnant. â€Å"Reality† includes the process of cloning humans, types of cloning, products of cloning, cost, and also ethical issues. Besides the issues and reality part of cloning, thisRead More Immorality of Human Cloning Essay1550 Words   |  7 Pages While human cloning has been a matter of science fiction for centuries, the prospect that it could actua lly happen is a recent development. On February 23, 1997, the birth of the first cloned sheep, Dolly, was announced. Since then, it seems that science has progressed faster than moral understanding. Each breakthrough in genetics presents us with both a promise and a dilemma. The promise is that we may soon be able to treat and prevent diseases such as cancer and Parkinson’s. The dilemma is thatRead MoreShould Cloning Be Allowed?872 Words   |  4 Pages Though many have agreed that cloning should not be further researched there are still those who believe otherwise. Why exactly do people believe that research on human cloning should be allowed? A significant reason is that cloned embryos are believed to be a necessity for research on embryonic stem cells that have proven to have the potential to revolutionize medicine worldwide. â€Å"Scientists believe that cloned embryonic stem cell research will lead to cures for many diseases and will provideRead MoreCloning VS Religi on Essay1349 Words   |  6 PagesThis is an example of what cloning can be in the future. People one day will be able to create another version of themselves or someone else. Cloning does not just apply to creating whole humans, but also discusses the attempt to create new cells to help cure different diseases. Science and religion often clash, and in this situation they do through majority of the religions. Buddhism has arguments for and against cloning, where Catholisicm does not like any type of cloning. From a Buddhist pointRead MoreTwo of Us: Cloning Essay1477 Words   |  6 PagesHave you ever wondered what it would be like if you had twin or even if you had a clone? If you had an illness like diabetes, have you ever wondered what it would be like if you did not? Cloning is the creation of an organism that is an exact genetic copy of another. The first successful clone was in 1997 when scientist Edinburgh cloned Dolly the sheep. She was the first animal to be cloned with an adult somatic cell by using the process of nuclear transfer. She was born on July 5 1996, lived toRead More Embryonic Wars Essay1634 Words   |  7 Pages The specific objective of this major essay is to clarify and summarise the controversial debate concerning the ethical decency of embryonic cloning for therapeutic purposes. This is the form of cloning that is supposedly beneficial to a barrage of medical applications. We will identify the key opposing ethical perspectives such as those of the justificatio n of embryonic research based on the normative theory of consequentialism. This paper will also probe into the relatively brief history of theRead MoreShould Human Cloning Be Banned?602 Words   |  2 PagesPhysicians and scientists joined the chorus of â€Å"Thou Shalt Not Clone Humans!†(Pence 1). Since the creation of Dolly, there has been a long debate about the correct practice of biotechnology and inspiring the expectable imaginations of the public (MacKinnon 3). In the end, we always come back to one specific debate. Should human cloning be banned? Cloning is immoral and we would see clones as products for our use or as â€Å"test tube babies†. The definition of a clone is an individual grown from a singleRead MoreEssay about Should Genetic Engineering Be Controlled by Law?992 Words   |  4 Pages â€Å"Just as the success of a corporate body in making money need not set the human condition ahead, neither does every scientific advance automatically make our lives more meaningful† ( Professor George Wald, Noble Prize winning biologist, The Dangers of Genetic Engineeering 1976, p.45) . Genetic engineering is the direct manipulation of an organism’s genes. It uses the techniques of molecular cloning and transformation to alter the structure and characteristics of the genes directly(Wikipedia)Read More The Benefits of Cloning Research Essay1449 Words   |  6 PagesThe Benefits of Cloning Research   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"To be or not to be†¦Ã¢â‚¬  In the last fifty years new forms of technology have been the center of attention for every human being. It seems that every day scientists come up with some new, perhaps even controversial, and exciting ways to improve the quality of life. These new technologies affect every aspect of life, as we know it. One such technology is the research being done in the area of cloning. Cloning is the production of one or more cells, individualRead MoreCloning, Pros and Cons Essay2998 Words   |  12 Pagescontinue to get worse. They may be waiting a year or longer. Is there another way to speed up the waiting process? Cloning as a Possibility? These situations and many others have brought up the topic of cloning. Cloning refers to any process that results in the creation of an identical or almost identical genetic copy of a molecule, cell, or individual plant, animal, or human (Wilson, 2002). Recently, it is being heavily researched for its potential uses. Some difficult questions arise with

Sunday, May 17, 2020

What Are Animal Rights

Animal rights are the belief that animals have a right to be free of human use and exploitation, but there  is a great deal of confusion about what that means. Animal rights are not about putting animals above humans or giving animals the same rights as humans. Also, animal rights are very different from animal welfare. To most animal rights activists, animal rights are grounded in a rejection of  speciesism  and the knowledge that animals have sentience (the ability to suffer). (Learn more about the  basic tenets of animal rights.) Freedom from Human Use and Exploitation Humans use and exploit animals in myriad ways, including  meat,  milk,  eggs,  animal experimentation, fur,  hunting, and  circuses. With the possible exception of animal experimentation, all of these uses of animals are frivolous. People dont need meat, eggs, milk, fur, hunting or circuses. The American Dietetic Association  recognizes  that people can be perfectly healthy as vegans. Regarding animal experimentation, most would agree that testing of cosmetics and household products is unnecessary. A new furniture polish or lipstick seems a frivolous reason to the blind, maim,  and kill hundreds or thousands of rabbits.   Many would also say that scientific experimentation on animals for the sake of science, with no immediate, obvious application to human health, is unnecessary because the suffering of the animals outweighs the satisfaction of human curiosity. This leaves only medical experiments. While animal experimentation may lead to human medical advancements, we cannot morally justify exploiting animals for experiments any more than experiments on mental patients or babies can be justified. Justifications for Animal Exploitation The most common justifications for animal use are: Animals are not intelligent (cannot think/reason).Animals are not as important as people.Animals have no duties.God put animals here for us to use. Rights cannot be determined by the ability to think, or wed have to give intelligence tests to determine which humans deserve rights. This would mean that babies, the mentally disabled and the mentally ill would have no rights. Importance is not a good criterion for rights holding because importance is highly subjective and individuals have their own interests that make each individual important to him/herself. One person may find that their own pets are more important to them than a stranger on the other side of the world, but that doesnt give them the right to kill and eat that stranger. The President of United States might be more important than most people, but that doesnt give the president the right to kill people and mount their heads on the wall as trophies. One could also argue that a single blue whale is more important than any single human being because the species is endangered and every individual is needed to help the population recover. Duties are also not good criteria for rights holding because individuals who are incapable of recognizing or performing duties, such as babies or people with profound disabilities, still have a right not be eaten or experimented on. Furthermore, animals are routinely killed for failing to follow human rules (e.g., the mouse who is killed in a mousetrap), so even if they have no duties, we punish them for failing to abide by our expectations. Religious beliefs are also an inappropriate determination of rights holding because religious beliefs are highly subjective and personal. Even within a religion,  people will disagree  about what God dictates. We shouldnt impose our religious beliefs on others, and using religion to justify animal exploitation imposes our religion on the animals. And keep in mind that the Bible was once used to justify the enslavement of Africans and African Americans in the United States, demonstrating how people often use religion as an excuse to further their personal beliefs. Because there will always be some humans who dont fit the criteria used to justify animal exploitation, the only true distinction between humans and non-human animals are species, which is an arbitrary line to draw between which individuals do and dont have rights. There is no magical dividing line between humans and non-human animals. The Same Rights as Humans? There is a common misconception that animal rights activists want nonhuman animals to have the same rights as people. No one wants cats to have the right to vote, or for dogs to have the right to bear arms. The issue is not whether animals should have the same rights as people, but whether we have a right to use and exploit them for our purposes, however, frivolous they might be. Animal Rights v. Animal Welfare Animal rights are  distinguishable from animal welfare. In general, the term animal rights is the belief that humans do not have a right to use animals for our own purposes. Animal welfare is the belief that humans do have a right to use animals as long as the animals are treated humanely. The animal rights position on  factory farming  would be that we do not have a right to  slaughter animals for food  no matter how well the animals are treated while they are alive, while the animal welfare position might want to see certain  cruel practices  eliminated. Animal welfare describes a broad spectrum of views, while animal rights are more absolute. For example, some animal welfare advocates might want a ban on fur, while others might believe that fur is morally acceptable if the animals are killed humanely and do not suffer for too long in a trap. Animal welfare may also be used describe the speciesist view that certain animals (e.g. dogs, cats, horses) are more deserving of protection than others (e.g. fish, chickens, cows).

Wednesday, May 13, 2020

Ecommerce And The Supply Chain - Free Essay Example

Sample details Pages: 21 Words: 6178 Downloads: 6 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Silver Spoon Snacks is a fast food eatery established first in Gulshan in the year 1965. It has expanded to a second branch in Tariq road. During its heyday it revolutionized the fast food industry by introducing the concept of à ¢Ã¢â€š ¬Ã‹Å"rollsà ¢Ã¢â€š ¬Ã¢â€ž ¢ on the menu. It enjoyed this untapped market till competitors jumped on the band wagon. The menu is diverse, including Pakistani, Chinese, Continental, Western and Indian items. There is plenty of consumer traffic in both branches especially during the evening. The Tariq Road branch serves all kinds of BBQ items, club sandwich, zinger burger and the well known rolls. Don’t waste time! Our writers will create an original "Ecommerce And The Supply Chain" essay for you Create order The restaurant is owned and operated by a family. The branch managers are actually brothers and share shifts during the day and night. There are a total of 4 active brothers that are responsible for handling the day to day running and operations of the system. Key purchase decisions, menu expansion and supply chain decisions are handled solely by them. They have been following a paper based system since its inception. All the accounting work and record keeping is done manually in registers that are stocked at the residence every month. Literature Review According to Laudon and Laudon (Information Systems and Decision making, 2000), the supply chain is a collection of physical entities linked together into processes that supply goods or services from source through consumption. The supply chain consists of suppliers, manufacturers, wholesalers, distributors, retail outlets, logistics and consumers. This list also includes those activities that are necessary in facilitating the supply chain. Managing a supply chain is a difficult task that requires keen insight and understanding of the business processes and the environment in which it operates. The struggle is to create a network which has no weak links in terms of time delays, information gaps or inefficiencies à ¢Ã¢â€š ¬Ã¢â‚¬Å" in other words, all processes must be integrated. This is best achieved by the creation of networks with a smooth inflow and outflow of relevant information. This is the heart of e-commerce. The internet has allowed the growth of e-businesses across borders and physical limits. The use of an intranet is greatly appreciated within a company. Based on internet technology, the intranet is used primarily within a single company which allows the internal users to expand and share information across floors and walls. These locations may be domestic or may even be throughout the world (Bartoo, Elliot, and Naik-lyer, 2000). E Commerce is one of the most important facets of the internet to have developed in this day and age. Ecommerce, sometimes referred to as E Business, involves carrying out business over the Internet with the use of computers that are linked to each other forming a network. E-commerce includes the buying, selling, marketing, and servicing of goods or services through telecommunication technologies. E-Business, on the other hand, carries a broader definition, not just the buying and selling of goods and services, but servicing customers, collaborating with business partners, and conducting communications and transactions within and outside an organization. (Electronic Commerce a managerial perspective by Efrahim Turban, David King, Prentice Hall; US Ed edition October, 1999) According to ComScore à ¢Ã¢â€š ¬Ã¢â‚¬Å" a marketing research company that provides marketing data and services to many of the Internets largest businesses, E-commerce has had its first $1B day on 2nd December 2010. The à ¢Ã¢â€š ¬Ã…“heaviest online spending day in history and the first to surpass the billion-dollar threshold,à ¢Ã¢â€š ¬? declares ComScore. This goes to show how far and wide the scope of electronic buying and selling has reached. It is revolutionized the way business models are created and defined numerous opportunities for entrepreneurs and the like. E- Commerce can help a supply chain over the internet in areas such as placing and receiving orders, providing product information, tracking orders, filling and managing inventory, and recording inflows and outflows (Sunil Chopra and Jan A, Van Mieghem, Supply Chain Management Review, April 200) A critical area where e-commerce has established its presence in a supply chain is in the resource planning and inventory management function of an organization. It helps users track the inventory and where it is distributed from the organization. It helps plan for future forecasts and deal with shortages. It creates a hub where information is shared among relevant members of a business model; this is known as EDI à ¢Ã¢â€š ¬Ã¢â‚¬Å" Electronic Data Interchange. Similarly ERP (Enterprise Resource Planning) systems have emerged that serve similar functions in terms of smooth data flow between members of an organization. Relevant information relating to key business functions is then shared, matched and cross matched between departments and related companies that have partnered with the business. The goal is to streamline operations and produce a cost and time efficient process altogether. IBM and Siemens are 2 prime examples of organizations that heavily rely on supply chain applications produced by business management software such as SAP. This application has streamlined its processes thereby creating a real-time and efficient business model. Inventory management models are heavily used in large scale organizations in the fast food industry. Giant franchises such as Subway, KFC and Pizza Hut use business intelligence software for its operations. Zap is a leading software house that creates web based packages for KFC and Pizza Hut. As a starting point, a basic open source inventory management software coupled with internet technologies is an ideal way for a small to mid-sized business to start. The diagram below shows how e-commerce can efficiently distribute and coordinate the flow of information between the entities and business functions of the supply chain. The importance of information sharing and interchange is crucial to improve operational effectiveness. Research methodology Secondary research Secondary research consisted of going through research articles and existing information on e-commerce and supply chain models. Text books, class lectures and the internet served as sources for secondary research. This type of research was necessary to gain an understanding of existing supply chain models that are benefitting with the integration of e-ecommerce and its technologies. Primary research This is first hand research that needed to be conducted to gain an understanding of Silver Spoon Snacks This form of research was conducted over 2 face to face interviews and short telephone calls with the Branch Manager and Operations Manager A set of questions were asked to understand the existing supply chain model and how operations are carried out on a daily and weekly basis These questions also attempted to surface any inefficiencies and weaknesses that exist in the current setup Interviews were necessary to collect direct and relevant information from the involved people Data Analysis Input details pertaining to the Tariq Road branch Raw material listing Chicken Beef Mutton Flour Vegetables Ketchup/mustard Seasonings Equipment used Oven Fryer Coal Freezers Stove Tables and chairs Utilities used Electricity Gas Telephone Water Labour employed Head Chef Kitchen staff Head Waiter Waiters Cleaners Watchman For simplicity, the supply chain of chicken as a key and widely used ingredient will be studied throughout this report. Supply Chain system of Silver Spoon Snacks explained with the help of a flow chart. Supply Chain Defined Chicken Butcher Thursday morning or earlier depending on needs, the Chicken supplier receives an order of Boneless Chicken and Tikka pieces for the week. This order is placed via telephone by the branch manager. The quantity for chicken in Tikka and Boneless variation is verbally specified via telephone. The supplier confirms the order and a delivery time is specified. The butcher cuts the chicken according to pieces specified à ¢Ã¢â€š ¬Ã¢â‚¬Å" either Tikka pieces or Boneless for Chicken rolls. Delivery vehicle As per initial agreement between Silver Spoon and the supplier, the chicken supply will be delivered to the warehouse in the supplierà ¢Ã¢â€š ¬Ã¢â€ž ¢s vehicle. This is part of the negotiation. The supplier will have the chicken delivered to the warehouse and settle the payment at the end of the month. Warehouse The warehouse is owned and operated by Silver Spoon owners. It has been part of the business model since 40 years and is situated off Tariq road near the Tariq road branch. The warehouse serves as a sorting point most of the raw materials. Individual branch demand is catered to and planned here. The warehouse has a large kitchen and a storage bay. Warehouse kitchen The warehouse kitchen department is responsible for all the cleaning and preparation of the raw food. This entails cleaning the chicken, removing the fat and making it hygienic and fit for cooking. Staff is employed in this department to manage the cleaning. Warehouse storage After the chicken has been cleaned, it goes into cold storage. The amount which has to be distributed to the branches on a daily basis is dispatched and the rest goes into freezers. The amount is determined in advance by branch managers. Keep in mind that a weekà ¢Ã¢â€š ¬Ã¢â€ž ¢s supply is available for both branches at the warehouse. Official vehicle A Suzuki Pickup is on standby at the warehouse and the workers load a dayà ¢Ã¢â€š ¬Ã¢â€ž ¢s worth of chicken and transport it to the both branches. 60% of the chicken goes to the Tariq Road Branch as its chicken utilization is the highest. Tariq road branch At the Tariq Road branch, the official vehicle arrives shortly with the chicken for the day. This chicken thawed, cleaned and semi marinated at the individual branches before it is ready to be finally added with the secret spices and recipes. It is immediately transported by the workers to the freezer. Kitchen + freezer As noon approaches a portion of the boneless chicken is removed from the freezer and brought to the preparation room. Here the chicken is added with seasoning, sauce and the secret spices which are made early during the day. This preparation is done by the head chef. The boneless chicken goes to the Roll preparation area and the Tikka pieces go to the BBQ area where they are cooked. Customer Once cooked, the Rolls and Tikkas are served to customers Planning system For the sake of simplicity we will go through a typical week of ordering chicken to get a grasp of the current supply system at the Tariq Road branch. This boneless chicken is used for Chicken Rolls and Chicken Boti. Whereas full chickens are used to create 4 Tikka pieces per chicken. Demand for the week is established by looking at previous trends. Basically a base demand for consumption has been established for boneless chicken of 210 kg per week. The base demand of 210kg worth of boneless chicken is always used for Rolls and Chicken Boti. On an average, 220-250kgs of boneless chicken is purchased as demand from consumers never dips below 210kg per week. For Tikkas, the base demand is 80 Tikkas per day, which makes it 560 Tikkas on an average per week. A full chicken is able to provide 4 Tikka pieces. The key considerations that determine and influence demand for chicken are: Stage of the week à ¢Ã¢â€š ¬Ã¢â‚¬Å" Friday, Saturday and Sunday are days where demand for boneless chicken is at its highest. During these days the public goes out to eat with family. Public holidays à ¢Ã¢â€š ¬Ã¢â‚¬Å" the restaurant operates during public holidays. During these days of the calendar, families choose to visit eateries and therefore the consumption of boneless chicken is high. City turmoil à ¢Ã¢â€š ¬Ã¢â‚¬Å" during expected city turmoil and expected strikes, the public operates at an accelerated pace and attempts to get things out of the way. This may entail visiting Tariq Road for work 1-2 days before the expected turmoil or unrest. Furthermore, consumption of boneless chicken falls during the days of turmoil, hence purchasing is planned accordingly. Level of commercial activity à ¢Ã¢â€š ¬Ã¢â‚¬Å" Tariq Road is heavily populated with shops and vendors. If the activity in malls and shopping strips is high, then demand for food, especially Chicken Rolls is also high as it serves the fast food concept and is economical. The factors above have the capacity to influence demand for chicken and hence the purchasing patterns vary. Chicken that is not used is then stored in freezers for next dayà ¢Ã¢â€š ¬Ã¢â€ž ¢s use. This chicken is bought on Thursdays of the week from a vendor that has been partnered with the business. An order is placed via telephone on Thursday morning by the Branch Manager and it arrives by noon. If for some reason demand is abnormally high, the regular chicken supplier is contacted and is urged to make an emergency drop to the warehouse. If he is unable to do so from his own inventory, then he is responsible for making other arrangements. Supplier selection A chicken supplier is selected on the basis of: Total cost Cleaning and cutting Cost is the most important factor that ultimately determines which supplier/butcher to choose from. Silver Spoon negotiates on the basis of à ¢Ã¢â€š ¬Ã¢â‚¬Å" the foremost is cost (low or discounted price), quality, and delivery service. Secondly, it is favourable if the supplier can clean and cut the chicken into pieces at his outlet before delivering it to the Silver Spoon warehouse. Although Silver Spoon has a chicken slaughtering and cleaning/cutting facility, but is used for only further cleaning of the chicken and cutting for marinating purposes. Financial costs pertaining to Tariq Road Branch Cost for chicken: this rate is Rs. 4 per kilo less than the prevailing marketing rate. The chicken suppliers set the price every Thursday of the week. Price of chicken per kilo varies on a weekly basis and is determined by the laws of demand and supply. For example, if chicken is in excess supply then the price falls. Conversely if there is high demand then the price rises à ¢Ã¢â€š ¬Ã¢â‚¬Å" such as on weekends. Due to this the chicken suppliers set their prices on Thursday. The Tariq Road branch bears 60% of the total cost of the chicken whereas the Gulshan branch, only 40%. Consumption and sale of chicken items is the highest at the Tariq Road branch. The basis for making profits for Tikkas is to earn Rs. 20-25 profit per Tikka. Utilities Electricity Bill: varies between Rs. 50,000 to 60,000 per month. Gas Bill: varies between Rs. 10,000 to 12,000 per month Telephone Bill: Rs. 1,000 per month on an average Coal Usage: worth Rs. 1,500 on a daily basis.    Labour Employed Waiter: The starting salary per waiter is Rs. 6000 per month. Senior waiters (determined by length of employment) are paid Rs. 8000 per month. There are a total of 8 senior waiters (8 x 8000 = Rs. 64,000 per month) and 6 junior waiters (6 x 6000 = Rs. 36,000 per month). Kitchen Staff: these employees include assistants to the chef (3 assistants), and additional workers who produce other items on the menu (5 kitchen workers). They are assigned various tasks in the kitchen to add value to the system. On an average, the total labour costs assigned to the kitchen staff are Rs. 75,000 Head chef: There is 1 head Chef who is paid Rs. 12,000 per month. Total labour costs per month = Rs 64,000 + Rs 36,000 + Rs. 65,000 + 12,000 = Rs 187,000 Discussion Inefficiencies or weaknesses in the supply chain Supplier/butcher: Silver Spoon has had the same supplier for chicken for nearly 20 years. They should search the market for other suppliers that can offer competitive rates for bulk purchases of chicken. The order is placed on the phone and a Silver Spoon official does not personally monitor the chicken selection, which means an old chicken or unhealthy chicken can be part of the mix Warehouse: At the warehouse, the supplier delivery vehicle drops off the chicken and drives away after collecting the payment. There is no check here, no one counts the chicken or weighs it upon arrival so there is no way of making sure if they received the amount they paid for. There is no record system or inventory management. The chicken is not à ¢Ã¢â€š ¬Ã‹Å"logged inà ¢Ã¢â€š ¬Ã¢â€ž ¢, just immediately shifted to the kitchen where it is cleaned for use. Therefore there is no actual account or record for the amount of chicken that entered the facility nor is there any receiving slip or receipt. Warehouse Storage: Once the chicken is cleaned and processed fit for use, it goes into storage freezers and only the days worth is kept outside for delivery. However, there is no one who counts the number of chicken breasts or legs, or kilograms of chicken that goes into the freezer. So there is no check or monitor system. Silver Spoon Snacks Vehicle The days worth of chicken is transported to the Tariq Road Branch, but there is no formal record of the amount that leaves the warehouse, nor is there any receiving document from the branches end. Branch Again, there is no counter checking or counting system of the chicken that arrives in the branch. It is blindly kept in the freezer. Customer The customer does not receive an electronic receipt. Which means that there is no formal record at Silver Spoonà ¢Ã¢â€š ¬Ã¢â€ž ¢s counter of the items sold and the cash received. There is an informal scribble in a worn out register. Other deficiencies with the current setup Marketing: There are limited marketing efforts carried out by the restaurant. At most, marketing involves re-doing the company banner or releasing a dozen flyers in the area. No website exists. Recording: It is a complete paper based system with not a computer or digital device in sight. Records are loosely maintained at the warehouse and branch in registers and journals. There is no formal record keeping system. Customers are not given receipts therefore there is no cross checking. Tracking: there is no way for Silver Spoon Snacks to forecast demand judging by trends, as figures and statistics for trends do not exist. Paper based: it is a paper based system with information regarding transactions loosely recorded in registers. Checks and balances: checks and balances do not exist, there is no tangible record keeping when it comes to inventory and purchases. It is not possible to confirm orders with suppliers and inter branch as orders are verbally given. There is no proof. Proposed system The proposed system involves the purchase of computer hardware and the use of an internet connection. The idea is to create a basic centralized system at the warehouse as the server with 2 additional linked systems at the branches. The purpose is to track and record inventory that moves into the warehouse and out to the branches. A real time system is proposed where inventory levels are monitored by the hour. The systems will need to be linked by an internet connection to provide a real time feed of information between the branches and warehouse. With an inventory management and tracking software, the loopholes and loose-ends in the current system will be neutralized. How it works Once the systems have been installed and made operational, the current stock, inventory and work in progress are uploaded to the servers. The software will be used be the warehouse, and both the branches. Each user will update the records from their end so it can be seen at the warehouse server. The software will have section for the warehouse, branch A and branch B. Depending on the fresh demand levels, the warehouse determines the quantity of chicken needed and sends an order via telephone to the butcher. Had the butcher/supplier been using a computer system (example Makro), then an email would have been dispatched instead. The quantity ordered is punched into the system and falls under the status of pending. The rate per kilo is noted. Order time is also noted. Once the stock of chicken arrives at the warehouse, its exact quantity is manually counted and weighed by an employee and then the numbers are punched into the warehouse server. This will cross check the amount ordered with the amount received. Once the figures tally, a receiving slip is generated electronically and printed after the order has been confirmed and accounted for. A slip is generated and given to the supplier and a formal record now exists in the system. A notification is sent in a matter of seconds to both branches informing them of the added inventory levels. The levels now appear on the screens of both branch A and B (Tariq road and Gulshan). Preparations are made. Depending on the opening inventory and the base level demand of 210kg of chicken and 80 Tikka pieces, each branch sends its required amount of chicken (bonless and Tikka pieces) through the softwareà ¢Ã¢â€š ¬Ã¢â€ž ¢s built in messaging system. Each transaction and order is then recorded. After the warehouse server acknowledges receipt of the order from the branch, it then forwards it verbally to the warehouse freezer where the employee loads the Silver Spoon vehicle (Suzuki pickup). The vehicle then travels to the relevant branch. A printed slip is dispatched. From the warehouse, the inventory levels are then reduced and this is also reflected in each branches terminal. Once the vehicle is unloaded at the branch, a branch employee manually supervises the unloading and stocking of the chicken in the freezer. Once confirmed and signed, the branch manager then updates his terminal with the added inventory of chicken. Back at the warehouse, the reduction in inventory is equal to the gain in inventory at both branches. As the day goes by and the orders accumulate and dispatch, the inventory levels are monitored not only at the branch, but at the warehouse as well. Each chicken Tikka order placed or each chicken roll uses a certain portion of the inventory. And once the orders are fed and updated in the Silver Spoon register, the chicken based inventory is automatically deducted. Towards the end of the day, the ending inventory is tallied and counted. The warehouse manager reads these inventories on an hourly basis and incase of a shortage dispatches a vehicle to make up for the shortfall. The cycle is then repeated every day depending on the closing inventory levels. Notes on the proposed system The recommended software for Silver Spoon Snacks is inFlow Inventory management software (https://www.inflowinventory.com/). The software is easy to use and does not require extensive training. A simple understanding of images, inputting data and confirming orders is all it takes. Free software exists, but does not provide security, reliability and expansion as inFlowà ¢Ã¢â€š ¬Ã¢â€ž ¢s suite. Each terminal is given a unique pin code which only the operator is aware of. This means only the relevant person in charge can use the terminal which is a security check as well as a confirmation. Each transaction is logged and stored in a log file sent to the warehouse computer. Backups are made on a daily basis Financial Costs involved with this system Software: although many free software packages exist, inFlow Inventory Management provides the best balance between features and cost. To create a multi user network (ideal in this case), the license cost $299 per computer for lifetime use. 3 licenses will be needed. $299 x 3 = $897 = ~ Rs. 75000 (@ Rs. 84 per U.S Dollar) Hardware needed: processor, motherboard, RAM, hard drive, casing, power supply, monitor. Based on the software requirements, the hardware cost is as follows: Tariq Road Branch cost: Rs 23,000 Gulshan Branch cost : Rs 23,000 Warehouse cost: Rs. 27,000 Total : Rs. 73,000 Internet connection: 3 connections Initial setup cost : Rs. 800 x 3 Monthly cost: Rs. 1000 x 3 Total initial investment: Rs. 75,000 (3 licenses) + (73,000 (hardware) + 2,400 (internet setup) + 3000 (first month internet payment) = Rs. 153,400 Benefits of the proposed system Accountability: first and foremost, the new system will hold each branch accountable for what it has received in its inventory. Once its handed over the inventory, it is held accountable for its storage, sales and payment. The sales of the branch should match the inventory received. Inventory control: from the moment the chicken supply reaches the warehouse, it will be tracked and accounted for. The system will make sure that there is adequate supply at all branches at all times so as to not lose out on potential sales Economic order quantity: the ideal quantity of chicken to order each week and the ideal quantity to store in the freezers can be calculated based on demand and supply conditions. Inventory planning is thereby improved. Accuracy: with figures, statistics and numbers well accounted for and cross references, the books of Silver Spoon will present and accurate picture of state of affairs. A reduction in human error in terms of calculations, counting and so on will also be witnessed. Record keeping: instead of scribbling in registers and writing journals, an electronic system with constant updates is hence created with the use of e-commerce technologies. Past transactions, exchanges, buying and selling are stored electronically thereby staying safe. The option to print out the records exists, thereby creating tangible records. Electronic Data Interchange: Information sharing between branches and the warehouse will be more convenient as real time updates and inventory levels can be monitored. Offers and promotional schemes by suppliers can also be entertained. Expansion: This inventory monitoring and management system is not just limited to chicken; it can be used for the entire product line, mutton, beef, vegetables, cold drinks, seasoning, flour and so on. The scope is limitless with unlimited suppliers and customers. Improved Customer Service and loyalty: when a customer always gets his or her desired order in desired quantity, it creates customer satisfaction and creates repeat customers. It improves loyalty as well. A computerized receipt also creates a positive impression on the customers. Reduce stock-outs and overstocks: with supply synchronized with demand, the chances of ending up with à ¢Ã¢â€š ¬Ã‹Å"expiredà ¢Ã¢â€š ¬Ã¢â€ž ¢ inventory or facing shortages are greatly reduced. Shortages are prevented as inventory as planned well in advance, and in the same way excess inventory is also reducing thereby curbing inventory carrying costs. Ready alerts: if the inventory dips below a certain level at a branch, an automatically generated alert is sent to the warehouse or Gulshan branch and inventory can be moved around. Furthermore this will act as an early warning sign to the warehouse to acquire more inventory. Meeting demand: demand is almost always met unless outside forces have some play. With inventory always available due to a tracking and trend analysis system, sales will always be met. Forecasting: due to its ability to track charts and record daily transactions, the stored information can be used to conduct trend analysis for certain times of the calendar year. This will allow better planning for inventory and sales. Website: Silver Spoon Snacks Pvt. Ltd. can go on-line and have a web presence. This on its own is a marketing tool Networking: since Silver Spoon is now on-line and has a presence on the world wide web, it will be able to reach out to suppliers and customers on a larger scale. It is a ready marketing tool. It can partner with other restaurants, sponsors, FMCGs and causes. Marketing: with the use of e-commerce technologies, Silver Spoon Snacks can expand its marketing operations by sending out e-mails and creating ad banners and partnering with other websites. Costs of proposed system Change: it is possible that managers and top management may resist the change/transition from a paper based system to a technical system. The current system, though not ideal sets comfortably with current management. A management paradigm shift is required. Training: the system users will require some short initial training to understand the use of the software and technology in general. Although the Operations Manager à ¢Ã¢â€š ¬Ã¢â‚¬Å" Mr. Talha Awan is well versed with computer software and hardware, there will still be a slight lag due to training. Initial investment: although a small amount, roughly Rs. 150,000 will need to be diverted for a project that has no immediate monetary returns. Software support: although a helpline for customer support exists, it can become cumbersome to ask for guidance incase of software failure or confusion. Hardware failure: at the mercy of KESC and the elements, the computer hardware may fail thereby causing confusion and a stop in information flow. Although an uninterrupted power supply may be purchased, as well as a warranty plan, it will only add up in costs and delays. Internet failure: from time to time, the internet service provider may fail to provide a 100% uptime. This can cause delays and lags in the system. Industry Standard Bar B Q Tonight à ¢Ã¢â€š ¬Ã¢â‚¬Å" Inventory Management System To further add value to this report, I studied Bar B Q Tonightà ¢Ã¢â€š ¬Ã¢â€ž ¢s current inventory management setup which is computerized. Information was gathered through telephonic interviews and e-mail exchange with the Operations Managers, Sardar Ishaq and Mr. Abur Rehman. The findings are compiled below. Bar B Q Tonight is one of Karachià ¢Ã¢â€š ¬Ã¢â€ž ¢s most famous restaurants that came into being in 1988. It prepares all kinds of cuisine that caters to thousands of customers on a daily basis. In-fact the multi storeyed establishment can house upto a thousand customers at a time. The restaurant has enjoyed high growth levels consistent with every year. Recently a branch has been erected in Lahore. Chicken, Beef, Fish, vegetables, pastas, fruit, ice cream, mushrooms, sausages, cheese, beverages and tissue rolls are just a small list of the inventory that are in storage and continuous use at the restaurant. These are key inputs needed to give customers a full service and experience backed by quality that the restaurant promises. To ensure proper delivery of storage, roughly 500 employees and 2 dozen management level officers are part of the work force. The availability of sufficient inventory and especially at the right time is perhaps the single most crucial factor at the restaurant. Insufficient inventory levels can result in a loss of potential sales. Furthermore due to the sheer quantity of inventory that enters and exits the building, checks and balances, control and proper monitoring of stock are required. This serves a number of functions such as quality control, waste management and theft protection. The current supply chain is as follows: SUPPLIER à ¯Ã†â€™Ã‚   DRY/COLD STORAGE à ¯Ã†â€™Ã‚   CUTTING/PROCESSING à ¯Ã†â€™Ã‚   RELEVANT FOOD DEPARTMENT à ¯Ã†â€™Ã‚   CUSTOMER The suppliers supply meat, chicken, tinned items, cold drinks, eggs, vegetables and basically all the inputs needed. Once the orders are received, they go into processing/cleaning/cutting/batching depending on the type of item. For instance, the chicken and meat go into the kitchen to be prepared and made ready to eat and then go to the cold storage à ¢Ã¢â€š ¬Ã¢â‚¬Å" basically the freezer. This area also contains all the perishable items that need to be frozen to be preserved. Dry storage contains items that are tinned such as mushrooms, sausages, pastas and so on. This is a dry storage area which does not require cooling or temperature monitoring. Dry storage contains the masalas cutlery, packaging materials and similar items. Once the items have been sorted according to usage and servings, they go to the relevant food category area such as Pakistan, Indian, Chinese etc. Here the kitchen and chefs take over. Finally, the items are used to prepare the dish and served to the customer. To manage its inventory levels and inflows and outflows at all times, BBQ Tonight has installed an inventory management software that serves a number of functions. Some of these most basic functions are; Recording of stock levels Recording of consumption Units received Units issues Supplier details and records Wastage Purchase order creation Plates per kilo of material Forecasting Average demand level Inventory shortage alerts; example à ¢Ã¢â€š ¬Ã‹Å"only 10 tins of mushrooms leftà ¢Ã¢â€š ¬Ã¢â€ž ¢ Demand level is determined based on average sales, restaurant traffic and past trends. Once the demand has been calculated, the units/kilos to be ordered are punched into the software and it generates a formal purchase order. This software also has the option to create automated purchase orders. Issuance or requisition is always recorded on an issue form for checks and balances. Data from this form is also used to generate the consumption report of all items at the end of the day. The production and usage of inventory has been categorized based on the departments. For instance, there is a pantry for drinks, juices, tea and dessert. Then there is a Tandoor for the usage of flour and oil and seasoning. The kitchen itself is divided into many different departments as discussed earlier. More specifically departments include English Grill (for chops, ribs and so on), Seekh Kebab Grill, Chicken Tikka Grill and the main kitchen (which includes steaks, curry and fried items) Based on trends and previous records, each individual department is given the liberty to issue the demand and material usage to the store and the store eventually generates the requisition orders. Based on this order data, the software is able to compile a consumption report for each individual item and department. This report is helpful for costing, cross checking sales and determining the performance of individual departments. Another benefit of this software is its ability to calculate and record wastage. For example, if 10kg of meat is purchased, after cleaning and processing only 7kg is actually fit for production. This is the same case with many items especially chicken, meat and fish. The software at first assumed a 1:1 ratio for stock incoming and outgoing à ¢Ã¢â€š ¬Ã¢â‚¬Å" but in reality it is never the case. In reality the weight, volume and size vary when goods reach the store and leave as finished meals. For this purpose, some customization needed to be done. According to the restaurantà ¢Ã¢â€š ¬Ã¢â€ž ¢s standards, the store issues goods in à ¢Ã¢â€š ¬Ã‹Å"platesà ¢Ã¢â€š ¬Ã¢â€ž ¢ and not kilograms. Raw materials enter the store in kilogram, but the output is recorded as number of plates sold. Also, the weight of plates/meals sold is different (almost always less than) from the raw form when received. This caused recording problems as units of measure used were different. To rectify this, management developed a formula to convert kilograms into plate servings and this was fed into the softwareà ¢Ã¢â€š ¬Ã¢â€ž ¢s functions. For example, the weight of one plate of ribs by restaurant standards is around 700-800grams à ¢Ã¢â€š ¬Ã¢â‚¬Å" but when received the recorded weight is actually 1300-1500grams and this is because of water, fat and bone content. The same can be said for chicken à ¢Ã¢â€š ¬Ã¢â‚¬Å" the restaurant does not get pre cut chicken, is is bought in whole. One chicken is able to supply 4 Tikkas, in other words 4 servings/plates. The store issues Tikkas to the Tikka Grill in terms of plates à ¢Ã¢â€š ¬Ã¢â‚¬Å" which means that 1 plate is actually 1/4th of the quantity of 1 chicken purchase. Therefore the software needed to be fed a formula that accepts chicken as 1 whole unit but converts it into 4 servings/plates. Hence recoding standards became easier. Finally, suppliers are paid on the basis of KG, but sales at the restaurant are recorded on the basis of pieces sold. Hence a formula was derived to link demand/receiving to consumption and supplier payment was standardized. On a typical day, the software works as follows: The store (dry or cold) makes the purchase order and the purchase officers then telephone the supplier once the store manager approves the quantity to be ordered. The store receives the goods and the butchers/kitchen staff prepare/marinate the meat and then it goes into storage. The departments then make a request for the stored goods for production purposes and so on. The software is able to record this shift of inventory for storage to department while monitoring inventory levels on a real time basis throughout. This software has been in the testing phase since the past 6 months at the restaurant in Karachi. It is still in trial mode and most of its features are being used to the maximum. Benefits have been noticed mostly in the form of checks and balancing, equating supply with demand and keeping a watch on the movement of materials from department to department. There is adherence to quality, minimum wastage and more security in the stores. Bar B Q Tonight plans to make this software fully functional after further testing in the near future. Conclusion The purpose of this research report was two fold; first to study and uncover the problems in the supply chain system of Silver Spoon Snacks Pvt. Ltd à ¢Ã¢â€š ¬Ã¢â‚¬Å" a fast food restaurant in Karachi. Secondly to propose an inventory management system as an alternate to their current paper based system to enforce checks and balances of materials. Shifting from a traditional, paper based system to a computerized system is always going to cause conflicts and resistance to change. Friction will exist no doubt. Unfortunately, the management at Silver Spoon Snacks Pvt. Ltd comes from a rather traditional setup and has not seen the benefits of the proposed system. They are not to blame as they have been operating within the current system since nearly 5 decades and are quite comfortable with it. Profit is the singly strongest motive for and this proposed system does not generate any immediate monetary returns à ¢Ã¢â€š ¬Ã¢â‚¬Å" it is instead a strategic move. This was the main reason for this proposition to fail à ¢Ã¢â€š ¬Ã¢â‚¬Å" it does not yield any financial returns or return on investment. What management was looking for was a reduction in operation costs and perhaps an increase in restaurant traffic. However, the idea to implement a computerized system was not shot down completely. Instead of an investment of 3 computers and a $900 software, the managers were open to the idea of using one computer at the warehouse and creating simple spreadsheets to log in and out data. It is not the ideal setup and many of the above mentioned benefits of the proposed system will be lost, but it is certainly a step in the right direction.

Wednesday, May 6, 2020

Chaucer’s Canterbury Tales Proves How Historical Changes...

Chaucer’s fourteenth century story The Canterbury Tales can be considered almost impossible to read by many modern day readers. They tend to struggle thru understanding many of the words, as well as their meanings within this story. As I read The Canterbury Tales I noticed how the rhythm and rhyme differ from modern day English, the vowel are pronounced differently, and many of the words used within this story are no longer used in modern English. Additionally there are three main changes to that can be seen over time within the English language, vocabulary, pronunciation, and sentence structure. The many historical language changes that have happened since the fourteenth century can be found within The Canterbury Tales, and explain why†¦show more content†¦Or swinken with his handes and labà ³ur ( Chaucer, lines 184-186) I picked this example because I have always found it fascinating how there can be the subtlest of changes to vocabulary, and yet we still struggle to read the earlier words. In the above passage himselfen, cloister, pore, swinken, labour, all stand out as unfamiliar words. However if we look a little closer we can quickly discover that himslfen breaks down to himself, pore become pour, labour becomes labor, cloister swinken are a little harder. As I stated I have previously studies Chaucer as well as his works, as I result I am aware that swinken means to work . Cloister actually is a word that has not changed, yet many people struggle to understand the meaning, because it is not a commonly used word, it is referencing a monastery or convent. I picked the above passage because it provided multiple examples of the vocabulary change thru out history, the subtleties of spelling changes can cause us to feel that the vocabulary is something completely different. When is all actuality it still means the same thing today that it meant in the fourteenth century when this was written. However the real reason I picked this passage is because of cloister. It is a word that has not changed spelling or meaning wise since this story was written, however it is a word many people will not understand. Why? Well that is because the vocabulary that was used when this was

The Foolproof What Are the Top 10 Items on Your Bucket List Mba Essay Samples Strategy

The Foolproof What Are the Top 10 Items on Your Bucket List Mba Essay Samples Strategy Why Almost Everything You've Learned About What Are the Top 10 Items on Your Bucket List Mba Essay Samples Is Wrong You will see such form of list templates as follows where it is possible to note down and share the ideas that you want to accomplish someday. Such a list can likewise be termed as an action list because they have the ability to make your aims and desires into reality. Therefore, writing a bucket list provides you the chance to design a life that's centered on your individual objectives and dreams. At precisely the same time, writing your bucket list is a significant exercise that allows you to reflect on your life. Some goals take more time to achieve than others and should you spend years working toward only a single objective, you're most likely to get discouraged when it doesn't happen immediately. The tasks might take some opportunity to finish but when you commit your precious time and energy, it's certain to be well worth the attempt. Starting a person's own business brings positive changes to those that are seriously interested in doing something extraordinary with their life. Starting your own company will supply you with ample time and approaches to plan for your success, something that's impossible when you're doing a boring job, and you can't apparently outline where you need to see yourself in next five decades. If you're searching for bucket list ideas which are a tiny bit more adventurous, take a look at the subsequent. If you are a person who believes your idea can change the Earth, then this post is vital read for you. All you will need is a few good ideas and some opportunity to write them down. Nobody has ever said that starting your own company is easy. Cold statistics aren't meant to discourage you if you're dreaming of being a prosperous entrepreneur someday. Therefore, the aforementioned questions are to get to know you and how you are going to fit in the culture. For foreigners, itas almost not possible to compose impeccable papers from the very first try. Staying awake for 24 hours can be rather difficult but once it's accomplished, you will sleep as a baby. Make Lifelong Friends One of the biggest advantages of studying abroad is the chance to meet new lifelong friends from other backgrounds. It has many advantages. All you need to do is click on the Start Making My Persona button, and it'll ask you a succession of questions regarding your perfect customer. What Are the Top 10 Items on Your Bucket List Mba Essay Samples for Dummies The Oktoberfest is the world's biggest folk festival with over 6 million visitors annually. Sing in the rain and take pleasure in the refreshing experience. If you prefer, run for a great cause. It may also have therapeutic results. The stars look much more impressive once you're at a location where there isn't any unnatural light. All you have to do is to get a peek at the meteor shower peak dates in where you are. All you have to do is jot down the dreams, unfinished objectives, and desires that you desire to fulfill someday. This prompt gives you the chance to speak about your passions and showcase your extracurricular pursuits. It is possible to also put them to use should you need to do certain things at a distinct fixed moment. There are several beautiful pure phenomena around the world. The spectacular view of a storm unfolding right in front of you can be a really remarkable experience so long as the storm is much away from your home. As a guideline, if there's a really large forest near you, odds are high there's also a treehouse. There are a few waterfalls where there's a cave behind it.

Gmat - Awa free essay sample

Conclusion Acknowledge the other position but re-affirm yours and conclude that it is the stronger. 2. Structural Word (should be all over the essays) Supporting examples for example, to illustrate, for instance, because, specifically Additional support furthermore, in addition, similarly, just as, also, as a result, moreover Importance surely, truly, undoubtedly, clearly, in fact, most importantly Contrast on the contrary, yet, despite, rather, instead, however, although, while Decide against one cannot deny that, it could be argued that, granted, admittedly Ying-yang on the one hand/on the other hand Concluding therefore, in summary, consequently, hence, in conclusion, ultimately, in closing 3. Templates 3. 1 Argument Intro: The argument claims that . (restate) Stated in this way the argument: a) manipulates facts and conveys a distorted view of the situation b) reveals examples of leap of faith, poor reasoning and ill-defined terminology c) fails to mention several key factors, on the basis of which it could be evaluated The conclusion of the argument relies on assumptions for which there is no clear evidence. Hence, the argument is weak/unconvincing and has several flaws. 1st Para: First, the argument readily assumes that This statement is a stretch. For example, Clearly, The argument could have been much clearer if it explicitly stated that 2nd Para: Second, the argument claims that. This is again a very weak and unsupported claim as the argument does not demonstrate any correlation between. and To illustrate, While, However,. indeed. In fact, it is not at all clear rather. If the argument had provided evidence that.. then the argument would have been a lot more convincing. 3rd Para: Finally, (pose some questions for the argument).. Without convincing answers to these questions, one is left with the impression that the claim is more of a wishful thinking rather than substantive evidence. Conclusion: In conclusion, the argument is flawed for the above-mentioned reasons and is therefore unconvincing. It could be considerably strengthened if the author clearly mentioned all the relevant facts. In order to assess the merits of a certain situation/decision, it is essential to have full knowledge of all contributing factors. In this particular case. Without this information, the argument remains unsubstantiated and open to debate. . 2 Issue Intro: Many/some people think that. Others.. (restate) The issue is a controversial one but a closer examination reveals that. (take a position) for several reasons. 1st Para: One reason is that/for For example, Furthermore, Clearly, 2nd Para: Another reason is that/for To illustrate, As a result, 3rd Para: Perhaps the best reason is (that). Specifically, Moreover/In addition. In f act,. Therefore,. Conclusion: In summary, while there are arguments to be made for both sides, it is clear that there are greater advantages to. repeat the reasons). Certainly,.. outweigh. Hence,. (re-affirm your position) 4. Going from the templates to full-fledged essays 4. 1 Argument ESSAY QUESTION: The following appeared in the editorial section of a national news magazine: The rating system for electronic games is similar to the movie rating system in that it provides consumers with a quick reference so that they can determine if the subject matter and contents are appropriate. This electronic game rating system is not working because it is self regulated and the fines for violating the rating system are nominal. As a result an independent body should oversee the game industry and companies that knowingly violate the rating system should be prohibited from releasing a game for two years. Discuss how well reasoned you find this argument. Point out flaws in the arguments logic and analyze the arguments underlying assumptions. In addition, evaluate how supporting evidence is used and what evidence might counter the arguments conclusion. You may also discuss what additional evidence could be used to strengthen the argument or what changes would make the argument more logically sound. YOUR RESPONSE: Quote: The argument claims that the electronic games rating system, although similar to the movie rating system, is not working because it is self regulated and violation fines are nominal, Hence, the gaming rating system should be overseen by an independent body. Stated in this way the argument fails to mention several key factors, on the basis of which it could be evaluated. The conclusion relies on assumptions, for which there is no clear evidence. Therefore, the argument is rather weak, unconvincing, and has several flaws. First, the argument readily assumes that because the electronic game rating system is self regulated, it is not working well. This statement is a stretch and not substantiated in any way. There are numerous examples in other areas of business or commerce, where the entities are self regulated and rather successful. For instance, FIA, the Formula1 racing organization is self regulated. Yet, the sport is very popular and successful, drawing millions of spectators around the world each year. Tickets are rather expensive, races are shown on pay-per-view, and nearly all drivers are paid very well. Another example is the paralleled movie rating system that the argument mentions. The author fails to clarify whether it is working well, but it is clear that the movie rating system is pretty well received by people, who often base their decisions to go see a movie with kids or not on the movie rating. It has never been a case when someone would feel cheated by the movie rating and express disappointment afterwards. Since the movie rating system is also self regulated, it follows that this regulatory method is working pretty well and it is not obvious how it can be the reason for the poor electronic game rating system. The argument would have been much clearer if it explicitly gave examples of how the self regulatory system led to bad ratings and customer dissatisfaction. Second, the argument claims that any violation fees for bad electronic game ratings are nominal. It thus suggests that this is yet another reason for the rating system not working. This is again a very weak and unsupported claim as the argument does not demonstrate any correlation between the monetary amount of the fines and the quality of the electronic game rating system. In fact, the argument does not even draw a parallel with the mentioned movie rating system and its violation fines. If any such correlation had been shown for the movie rating system, which supposedly works well, then the author would have sounded a bit more convincing. In addition, if the argument provided evidence that low violation fines lead to electronic game manufacturers to ignore any regulations with respect to the game rating system, the argument could have been strengthened even further. Finally, the argument concludes that an independent body should oversee the game industry and companies that violate the rating system, should be punished. From this statement again, it is not at all clear how an independent regulatory body can do a better job than a self regulated one. Without supporting evidence and examples from other businesses where independent regulatory bodies have done a great job, one is left with the impression that the claim is more of a wishful thinking rather than substantive evidence. As a result, this conclusion has no legs to stand on. In summary, the argument is flawed and therefore unconvincing. It could be considerably strengthened if the author clearly mentioned all the relevant facts. In order to assess the merits of a certain situation, it is essential to have full knowledge of all contributing factors. 4. 2 Issue ESSAY QUESTION: â€Å"Poor health and high stress levels diminish the productivity of today’s office workers. In order to maximize profits, companies need to provide white-collar employees with free exercise facilities and free wellness classes. † In your opinion, how accurate is the view expressed above? Use reasons and/or examples from your own experience, observations, or reading to develop your position. YOUR RESPONSE: Quote: Some people think that productivity at work could be increased if workers are provided with free exercise facilities and wellness classes, as this will improve the workers health and diminish the level of stress in the office. Other people support the claim that people should manage their own health and stress level outside the work space. The issue is a controversial one but a closer examination reveals that companies that promote healthy living among their employees are indeed more productive. One reason is that people often do not find the motivation or the energy to o to a wellness class and exercise outside of work. Most people are usually very tired by the end of the work day and have other family duties or priorities to worry about. For example, doing grocery shopping, cooking, picking up the kids from practice, etc. Therefore, it is very difficult for such people to make time for exercising and maintain healthy habits. As a result, the stress from a long day of work at the of fice gets carried over to the next day and the pattern repeats. Eventually, the health of those people worsens and their productivity on the job diminishes. Another reason is that people often find it attractive to do what their friends or colleagues do. For instance, if five colleagues of a worker join a pilates class and are happy about it, they then tend to recommend it to the worker in question and she will eventually join the class. Contagious behavior such as this can be very easily achieved on the job if pilates classes are offered, because then the discovery of the opportunity and the motivation to join are easily found. Hence, exercising at work becomes a very comfortable activity easily fit into a schedule and promotes the health and happiness of the employees. They not only feel better heath-wise after exercise, but also strengthen relationships with co-workers by doing activities together. In a way, this whole experience can be viewed as team building. Consequently, workers are more energized, alert and therefore productive in their jobs. Perhaps the best reason is that by providing free exercise facilities and wellness classes companies improve their image and become attractive places to be at for future employees. Not only can such companies attract more viable candidates for new openings, but they can also retain longer the employees they already have. To illustrate this point, let us take Google for example. The company was recently ranked as the best one to work at. One of the main criteria for achieving this rank was the fact that the company takes very good care of its employees in terms of encouraging healthy living. There are numerous sports facilities on the Google campus which people are encouraged to use. Those include gyms, swimming pools, volleyball courts, massage chairs, etc. Personal trainers are also available for free for anyone that needs them. There is also a health center facility on site. With that kind of environment it is difficult to not take advantage and live a healthy living, resulting in better productivity on the job. In summary, while there are arguments to be made for both sides of the issue, it is clear that there are much greater advantages for companies to provide their workers with free health facilities and classes. Workers find it not only much easier to take advantage of such opportunities on site, but also are much more motivated to do so there. Participating in sports activities improves the workers mood, desire to work hard, keeps them healthy, and creates a bond among workers. As a result, this translates to a better productivity of the workers and ultimately to maximized profits for the company. 5. Final tips During the tutorial type in a few sentences in the mock essay window to get used to the keyboard. Again during the tutorial, jot down on your notebook the basic structure of your essays or the opening sentences in case you get too nervous and forget them when the clock starts ticking. Write as much as you can. Try to write at least 500 words per essay. Always have the e-rater in mind as your potential reviewer. Remember that the human rater will make every effort to grade just like the e-rater. In that sense, keep your structure and volume in mind over actual quality/content. Be careful of spelling mistakes. Double check words that you normally know you misspell (e. g. exercise). Try to finish 2-3 minutes before time is up so you can slowly re-read your essay for the purposes of spell checking. Do not reorganize/delete sentences/paragraphs with less than 2 min left. No matter how great you thought your essays went, try to stay humble and focused remember this was just a warm-up and the real stuff hasnt started yet! Good luck! - Here is an essay I wrote for a PR Test Graded a 6. 0 (normally they grade harder than real thing) Prompt: â€Å"The autonomy of any country is based on the strength of its borders; if the number of illegal immigrants entering a country cannot be checked, both its economy and national identity are endangered. Because illegal immigrants pose such threats, every effort must be made to return them to their country of origin. † Assignment: Discuss how well-reasoned you find this argument. In your discussion, be sure to analyze the line of reasoning and the use of evidence in the argument. For example, you may need to consider what questionable assumptions underlie the thinking and what alternative explanations or counterexamples might weaken the conclusion. You can also discuss what sort of evidence would strengthen or refute the argument, what changes in the argument would make it more logically sound, and what, if anything, would help you better evaluate its conclusion. This argument relies heavily on unverified assumptions and has a very extreme conclusion. The author fails to make logical connections between the evidence provided and the conclusion that all illegal aliens must be returned to their country of origin. The first problem with the argument is that it suffers from multiple unsubstantiated claims. The first evidence that is given to support the extreme conclusion is that the autonomy of any country is based on the strength of its borders. This statement is also extreme because it infers that every countries autonomy could be ranked by the strength of its borders. There are many European countries that have very little strength exerted at the borders, but still maintain autonomy. The author should clarify this statement by grouping countries together or using a more vague statement that would include most countries but not all. The next statement in the argument is conditional phrase stating that the more illegal immigrants that enter a country the worse off the economy and national identity will be. While this statement might be true for some countries it is certainly not true for all countries. The very foundation of early US society was based on immigrant labor and culture that brought from over the sea. There are still many countries whose economy is heavily dependent on immigrant labor. Even though many economist feel this statement is true in the US today, most would disagree that this statement is true of all countries. The final portion of the authors argument is the conclusion. The conclusion states that the because of disadvantages mentioned earlier all illegal immigrants must be returned to their country of origin. Although this statement might appear to be a logical conclusion of this extreme argument it fails to take extra information into account. The author doesnt give any indication on how extreme these problems will be or how costly it will be to return the amount of illegal aliens to their home country. What if the cost to the economy was half the amount that it would cost to send all of the immigrants back to their country of origin? The author could use some monetary figures to prove that some savings would be incurred if all illegal immigrants were deported. In conclusion, the argument suffers from logical flaws and makes an extreme conclusion based on unproven assumptions. The addition of hard examples and connections between the statements would prove to strengthen the argument. *This just shows you how you dont have to write great to get a good score*

Tuesday, May 5, 2020

Ethical Consideration Of National Security -Myassignmenthelp.Com

Question: Discuss About The Ethical Consideration Of National Security? Answer: Introduction Ethics is an integral part in the workplace operations. Exposure of ethical approach reflects the culture of the employees. This approach is crucial for the managers in terms of involving the employees in group discussions. Respecting the individual sentiments is one of an essential component of workplace ethics. Consciousness in this direction enhances the professionalism of the employees. Legal compliance is one of the other examples of workplace ethics (Cohen 2016). Delving deep into the aspect, ethics brings in behavioral theory into the discussion. This assignment peeks into the ethical consideration of NSA. This is carried out through the Doing Ethics Technique and ACS Code of ethics. Analysis of the situation using Doing Ethics Technique Edward Snowden performed an action of leaking the classified information of the National Security Agency, which intensified the danger of the malfunctioning of the systems. On the other hand, the step that was taken by the .employee of the NSA has compromised the details of the people. The violation of the ethics of the company was based on the compromise of the phone and internet traffic details of the terrorists (Nsa.gov 2018). The systems helped the security systems to keep a close track on the activities of the terrorists and therefore the leakage of the functioning of the systems has helped the terrorists in finding a refuge away from the security systems. Some of the people however think that Snowden is a marketing whistleblower who has drawn attention on the undertakings of the NSA, which is unethical. On the other hand, some others believe Snowden to be traitor to the security systems and the country by compromising the security of millions of people (Nsa.gov 2018). What is the facts/information? In the year 2013, June, Edward Snowden revealed certain classified information of the National Security Systems (NSA) and thereby compromised the information of the systems that are undertaken by the agency. On the other hand, the compromise of the information that is being undertaken by Edward has made the terrorists aware of the practices that are undertaken by the agency for tracking their activities (Nsa.gov 2018). Edward revealed the classified information of the undertakings of the agency in a mass media channel through which the mass is made aware of the processes that are undertaken by the organization. The report on the NSA surveillance programs has helped in undertaking steps for bringing in the varied changes in the security systems that are undertaken by the agency. Alternatively, the revelation of the functioning of the NSA has helped in the understanding of the unethical and unconstitutional procedure undertaken by the agency. What are the issues? The issues that are being faced by the organization are based on the revelation of the important classified information, which has made the terrorists and the other antisocial aware of their functioning and the processes undertaken by the organization. The major aspects of the change that is being undertaken by the organization is based on the requirements of the people to secure their surroundings and the neighborhood. On the other hand, the information of the processes has made the processes vulnerable to the cyber theft and data piracy, which might affect the smooth functioning of the organization (Nsa.gov 2018). The proper functioning of the organization is based on the resourcefulness and the processes that are undertaken by the organization for the better functioning of the same related to the security of the people. Therefore, the issues that are faced by the organization are due to the concession of the data of the organization in the markets and the people being made aware o f the systems of the security that is being undertaken by the agency (Nsa.gov 2018). Who are affected? The people of the nation and the security systems are affected by the breach in the information of the agency. On the other hand, it has affected the functioning of the organization as per the requirements to deal with the issues faced by the people relating to their security (Nsa.gov 2018). The mishandling of the phone records and the other significant documents are subjected to the data theft and has resulted to an issue in the cyber security system of the agency. The organization and its functioning is mostly affected through the breach of information. On the other hand, the people of the region are affected through the mismanagement of their private details that has endangered their existence in the region. Ethical issues and implication The ethical issues that are faced by the agency is based on the revelation of the classified information of the systems that are undertaken by the organization. The classified information has not only affected the functioning of the organization but also has affected the security of the people (Nsa.gov 2018). The major impact that the agency might face while making use of the security systems are based on the data piracy, which might affect the smooth functioning of the security systems. On the other hand, the breach of the information has caused havoc impacts on the livelihood of the people. The security systems of the company should have been integrated which would have helped in the prevention of the data theft and other unethical practices. What can be done? In order to avoid the circumstances and the atrocities, the agency might take steps in order to ensure the safety of the data from the piracy and the cyber crime activities. The steps that might be taken by the agency are framing policies for the control of the cyber theft and the development of the organization in the markets. On the other hand, the agency must take steps in order to review the policies for the proper management of the information that is retained by the agency. Limited access to the employees will also help the organization in securing the classified information. The company must also take steps to secure the information through the application of various software that helps in retaining the important information away from the outsiders and even provide very limited access to the employees. What are the options? The various options that can be implemented by the organization in order to handle the situation is being discussed in this section of the report. It helps in the understanding of the different steps that are undertaken by the management of the organization. The various options that can be undertaken by the organization in order to handle the situation are: Review of the policies The company must take steps in order to review the policies of the security in order to keep the classified documents secured and away from the cyber crime. It will be helping the organization in retaining the secrecy of the information safe and away from breaches and leaks. Introduction of a firewall The introduction of a firewall through the implementation of a software, which might help the organization in keeping the records safe and away from disclosure. It helps the organization in safeguarding the classified information away from the disruptions in the systems. Limited access to the employees Ensuring the limited access to the employees also helps the organization in monitoring over the security of the information and therefore prevent data theft from affecting the systems of the undertakings of the agency. What is the best option and why? The best option that can be counted by the organization is based on the level of security systems and the importance of the documents that are required to be secured. The best option that might be undertaken by the agency is the introduction of a firewall, which will actually help the organization in preventing invaders from looking into the confidential documents of the organization. The NSA must take steps in order to implement the software in the best possible manner in order to prevent data theft and disclosure of classified information of the agency. Analysis of the situation using ACS code of ethics ACS code of ethics is an essential component of the Australian constitution. According to the standard and protocols of ACS code of ethics, maintaining the honor, dignity of the personnel is very important in order to abide by the workplace ethics (Jensen and Delany 2016). These aspects contradict the situation of NSA, as one of the personnel, Edward Snowden, leaked the private and confidential data of the operations. As he leaked the private and confidential information, it can be considered that he neglected the public interest of his colleagues, managers and other staffs. This negligence strained the relationship between Snowden and the organization. Herein lays the appropriateness of the instance, suggesting different perceptions regarding Snowdens deeds. Delving deep into the perspective, the intensity of crime is so high, that any initiative from Snowdens end would not bear positive result. This is in terms of raising the standard of living of his colleagues. Snowdens deeds lack honesty in the practical application of the learnt skills in the workplace operations. This is reflected from his unethical revelations of the confidential data to the third party. This revelation also indicates Snowdens lack of competence regarding catering to the needs, demands and requirements of the stakeholders (Erford 2017). Absence of these skills stalls the professional development of personnel like Snowden. Along with this, it also acts as an obstacle towards the professional development of his colleagues, as they are compelled to bear with the illegal issues and scandals. Viewing it from broader perspective, obstacles in the professional development adds an ombre shade to the professionalism of Snowden as well as the other staffs of NSA. Countering this, obstacles in the professional development aggravates complexities towards enhancing the quality of life. This is applicable both in cases of Snowden and his colleagues in NSA. These complexities reflect the misutilization of the preconceived competencies by people like Snowden compelling the organization to encounter losses (Rogers and Braunack 2015). Confessing regarding the crime can be considered as the presence of honesty within Snowdens characteristic traits. However, in terms of the loss, which NSA had to face, this honesty is of no use. Leaking the information to terrorists is Snowdens unethical approach, adding interrogative parameter to Snowdens professional career. Fleeing from the country nullifies the attribute of honesty in case of Snowden. Avoiding the federal charges reflects the negligent attitude of Snowden towards performing the duties of a faithful citizen. Being a whistle blower raises doubts over Snowdens post as an employee. Violation of the civil rights and constitutional elements attaches questions regarding the Snowdens citizenship as well as the post offered (Congress 2017). In view of this parameter, perspectives his prosecution is appropriate. Herein lays the appropriateness of the term traitor. Countering this, his confession regarding committing a crime reduces the intensity of prosecution. In his confession, the names of Newspaper agencies emerge, which spoils the reputation of NSA. Revealing the information to these agencies reflects the foolishness of Snowden in terms of ensuring the betterment of the organization, of which he is an employee. This foolishness contradicts the true essence of ethics in workplace. As a matter of specification, ACS code of ethics indicates the responsibility of the individuals to adhere to the societal values for adding value and weightage to their citizenship (Komi?, Marui? and Marui? 2015). In view of this, Snowdens citizenship is at stake. This is because he has assisted terrorists in misutilizing confidential data about the organization. Taking into consideration all these aspects, perceiving Snowden as a traitor is appropriate. Along with this, prosecution is also justified. Delving deep into the aspect, Snowdens activities makes him a violator of security in his own country. Revealing details of the surveillance programs can be Snowdens disinterest towards keeping track of the information, which flows from the internal to the external environment of NSA. Known terrorists can be correlated with the fact that without the information of the Agency, Snowden was practicing illegal alliance with the terrorists, supplying them with confidential information and data (Holtzhausen 2015). Delving deep into Snowdens position, he works for a defence contractor Booz Allen Hamilton. This side parting with the terrorist puts Hamilton in an awkward situation. However, this is just an assumption. The word code in the AcS code of ethics represents the customs, rules and regulations developed by an organization for maintaining the workplace decorum. All the employees, upon their recruitment are expected to abide by these rules and regulations. However, Snowden is an exception, as he violates the Agency norms. This connotation raises doubts over the ways and means adopted by him to gain this position (Parsons 2016). Along with this, violation of the constitutional rights contradicts the aspect of public interest in case of Snowden. In view of this connotation, the aspect of professional development is nullified. This is in terms of neglecting the interest of his colleagues, managers and the organization as a whole. Viewing it from the perspective of ICT industry as a whole, the loss of secret and confidential data degrades the reputation. Violation of the code of ethics compels the employees like Snowden to encounter illegal instances, which can go up to the extent of termination. Accepting this consequence reflects the absence of competence from Snowdens end regarding the application of learnt skills to the execution of the workplace operations (Barker and Branson 2014). This incompetence can be perceived in terms of intentional or incapability. In case of Snowden, it is intentional as Snowden neglects public interest as well as the interest of his colleagues. Overall, it can be said that in case of Snowden, none of the elements of AcS code of ethics is applicable. He is not at all conscious towards protecting the of his colleagues, which reflects the lack of competence towards the proper application of the learnt skills. This lack contradicts honesty, stalling the professional development of employees like Snowden. Consistency in this approach acts obstacle in the enhancement of professionalism for these employees, degrading their quality of life (Brinkman et al. 2016). Perceptions about Snowden are the consequences of his own actions. The adjectives whistle blower and traitor degrade his individualism. However, confessing that he has commited a heinous crime, reflects his consciousness about the consequences, which he has to face on violation of the constitutional rights. Placing the personal interests above the organizational interest makes him self-centred, nullifying the aspect of ensuring the benefit of organization as a whole (Holtzhausen 2015). This type of approach is against the workplace ethics, raising doubts over his adherence to the position offered. Conclusion This assignment emerges successful in providing an insight into the workplace ethics. The consideration of the analytical tools of Doing the Ethics and ACS code of ethics enliven the ways and means in which the workplace ethics can be preserved. The example of NSA enhances the clarity of the readers in this regards. Doing the ethics analysis mainly enlightens the knowledge of the readers regarding the issues and the solutions in which these issues can be resolved. AcS code of ethics is relevant with the requirements of the assignment. The case study of Edward Snowden reflects unethical approach towards the workplace activities. This approach stalls the professional development of such employees, degrading their individualism. References Barker, R.L. and Branson, D.M., 2014.Forensic social work: Legal aspects of professional practice. Routledge. Brinkman, B., Gotterbarn, D., Miller, K.W. and Wolf, M.J., 2016. All hands on deck for ACM Ethics: updating the Code, revising enforcement, promoting integrity.ACM SIGCAS Computers and Society,46(3), pp.5-8. Chou, T.S., 2013. Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), p.79. Cohen, A.I., 2016. Ethics and professional practice. InPracticing Professional Ethics in Economics and Public Policy(pp. 237-244). Springer, Dordrecht. Congress, E.P., 2017. What social workers should know about ethics: Understanding and resolving practice dilemmas.Social Work Ethics, p.1909. Erford, B.T., 2017.Orientation to the counseling profession: Advocacy, ethics, and essential professional foundations. Pearson. Guo, K.H., 2013. Security-related behavior in using information systems in the workplace: A review and synthesis.Computers Security,32, pp.242-251. Holtzhausen, D.R., 2015. The unethical consequences of professional communication codes of ethics: A postmodern analysis of ethical decision-making in communication practice.Public Relations Review,41(5), pp.769-776. Jain, P., 2012. Security Issues and their solution in cloud computing.International Journal of Computing Business Research, pp.2229-6166. Jensen, G. and Delany, C., 2016. The Discourse on Ethics and Expertise in Professional Practice. InProfessional Practice Discourse Marginalia(pp. 73-82). SensePublishers, Rotterdam. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges.Wireless Networks,20(8), pp.2481-2501. Komi?, D., Marui?, S.L. and Marui?, A., 2015. Research integrity and research ethics in professional codes of ethics: Survey of terminology used by professional organizations across research disciplines.PloS one,10(7), p.e0133662. Kshetri, N., 2014. Big data? s impact on privacy, security and consumer welfare.Telecommunications Policy,38(11), pp.1134-1145. Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing.The journal of supercomputing,63(2), pp.561-592. Moore, J.F. and Labovitch, B.A., NewsILike Media Group Inc, 2013.Security systems and methods for use with structured and unstructured data. U.S. Patent 8,347,088. Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive data.Network Security,2012(12), pp.5-8. Nsa.gov (2018).NSA.gov. [online] Nsa.gov. Available at: https://www.nsa.gov/ [Accessed 6 Feb. 2018]. Parsons, P.J., 2016.Ethics in public relations: A guide to best practice. Kogan Page Publishers. Rogers, W. and Braunack-Mayer, A., 2015. General practice ethics: inter-professional responsibilities.Australian family physician,44(7), p.519. Verma, S. and Singh, A., 2012, December. Data theft prevention endpoint protection from unauthorized USB devicesImplementation. InAdvanced Computing (ICoAC), 2012 Fourth International Conference on(pp. 1-4). IEEE.