Friday, November 29, 2019

Rodgers And Hammerstein Changin Musical Theater History Essays

Rodgers And Hammerstein: Changin Musical Theater History There are many well-known lyricists and composers, but only a few leave such a mark as Rodgers and Hammerstein. This duo produced nine musical plays during their partnership and caused a profound change in musical comedy. They set the standards that are followed to this day in musical history. They created the modern musical that we all know and love. Before they became Rodgers and Hammerstein, they were simply Richard Rodgers and Oscar Hammerstein II, both of New York City. Hammerstein, born in 1895, was brought up in a theatrical family. His father was an ?operatic impresario?, otherwise known as an opera director or manager. He built the Harlem Opera House(1888) and the Manhattan Opera House(1906) and also introduced many new singers to the US. From a very young age Hammerstein II committed to the theater even though his family discouraged him. As soon as he was old enough to have a job in his father's theatrical business, he devoted himself to his duties and learned as much as he could about play production and the labors of the theater artist. Oscar eventually teamed up with author Otto Harbach and composer Vincent Youmans to produce Wildflower. With help from Harbach, Hammerstein began to create professional material for Broadway. Through Otto Harbach, Hammerstein was led into collaboration with Jerome Kern for Sunday. He al so worked with Herbert Stothart and George Gershwin on Song of the Flame, a very unsuccessful show. But despite the shows failure, it did lead Hammerstein to concentrate on creating operetta in order to integrate musical comedy with opera. With this in mind, he was able to achieve new standards for success in his career with his lyrics for The Wild Rose and The Desert Song. By 1927, after a few more productions, Hammerstein had achieved the technical skill that allowed him to provide a composer with a functional book and lyrics. This was best shown in Showboat, the first modern American musical. Showboat was the first show that indicated Hammerstein's great talent. Hammerstein was able to create a believable plot, situation,and characterization. At the forefront of this show was Hammerstein's concern for the southern blacks. This show contributed commentary on racial prejudice which Hammerstein would continually do. This was a big step for the 1920s and a huge victory when the show was so widely appreciated. Despite the promise indicated by Showboat, Hammerstein did not produce works of comparable success between 1928 and 1940. Some of his forgotten shows from that time are Free for All, Three Sisters, May Wine and several others. By 1941 it was apparent that except for Showboat, Hammerstein had not succeeded in creating a celebrated body of work outside the operetta form. Richard Rodgers , born in 1902, unlike Hammerstein, was not born into the theater, but his parents made sure he was cultured in the world of musical theater at a very early age. One of his earliest childhood memories was of his parents singing the full vocal scores from the latest musicals1. By age six, Rodgers had taught himself to play piano and was then given piano lessons by his proud parents. They also encouraged him to make a career in music. Like Hammerstein, Rodgers' devotion to the theater began early on in his life. Rodgers was especially influenced by Jerome Kern's shows and considered him a hero. When Rodgers was nine, he began to compose melodies of his own and eventually learned how to write them too. At fourteen he produced his first two complete songs, ?Campfire Days? and ?The Auto Show Girl?. While still in high school, he wrote scores for two amateur shows, One Minute Please and Up State and Down, after which he was encouraged to find a lyricist and begin a professional song-producing arrangement. Rodgers found Lorenz Hart. They met in 1918 and immediately hit it off. Both were very pleased with each others abilities and a creative union was made, as well as a close friendship. Their first show together was Fly with Me, which was performed for Columbia University. Broadway man Lew Fields saw the show and informed the duo that he intended to use some of their songs in his next Broadway

Monday, November 25, 2019

Computing Professional Essays - Telecommuting, Working Time

Computing Professional Essays - Telecommuting, Working Time Computing Professional Formal Comprised Interview of Devin Blank Computing Professional Compiled by Damon Blank 10-01-00 Intro to Programming ITSE 1402 A Formal Interview of Devin Blank The computer industry has taken a remarkable turn over the past 10 years. The foundation of multi-million dollar companies rest on the hands of those skilled to handle the demands of todays business networks. Email, fax and file services, print sharing and remote file access, are among the many vital functions that business network administrators are responsible for maintaining. Devin Blank is a Web Security Analyst for the Dallas based branch of Delloite and Tousch. Being a company that was built to rely on computer networks, Delloite and Tousch requires and is comprised of state-of-the-art technology ranging from palm applications to multiple branch servers. Devin handles some of the maintenance and trouble shooting for the web based applications at the company. During our interview he elaborated on the following questions. 1. What is your formal job description? Explanation Devin is a Web Security analyst for Network Service. He said that in this position he is responsible for the maintenance and security of the web based applications connected to the company. He is often contracted by outside companies to consult and diagnose their networks for security purposes. 2. How long did it take you to obtain this position? Explanation Devin attended Texas A and M University in College Station, Texas. He graduated with a four-year degree in Business Finance with a specialization in network computing. So looking at the big picture, it took 4 years of college plus the summers of internship in his field. After the hiring process, Devin was placed with an on-the-job trainer for 6 months. The only way to learn the business is to do the business Devin commented. 3. Is there a specific method you use in performing your job? If so please describe it. Explanation When I asked this question, Devin kind of laughed and stated he always looks forward to answering this question. He explained his job methods to me as follows, Have you even seen the movie sneakers? he asked. Devin went on to explain that in the movie, Robert Redford is a paid Hacker if you will. He is hired to attempt to gain access to others networks or businesses. If and when he does, Devin will consult with others in his service group on the best type of fix for the loop-hole they found. 4. What degree or certificates should one hold to attain this position? What about industry or on the job training? Explanation Like mentioned in a previously discussed question, Devin has obtained a degree in business-finance and received 4 summers worth of internship training during his college years. The training program at the company is focused on specialized job functions depending on the type or job. After working at the company, Devin was required to secure and maintain a MCNE certification but did receive the class time and necessary training to sit for the test during business hours. (Paid). 5. What advise would you give to someone just starting out in this field? Explanation Devin said that he would encourage anyone interested in the business-computing field to start as early as they can. The industry is becoming younger and younger. Companies are snatching graduates straight out of college and training then to work the way they wish. 6. What is a baseline / ballpark starting salary for your field? Explanation Devin stated that if a new hire was brought on as a trainee they would more than likely be offered anywhere from forty-four thousand to sixty-five thousand depending on the experience they have prior to start. 7. How competitive is the industry you work in? Explanation Extremely Competitive Devin said. I have seen companies offer and counter-offer for employees they really want just like buying a house 8 Do you look forward to going to work? Explanation Devin stated that he has the best job in the world. He is allowed selected travel time to various destinations and multiple incentives. He stressed that he looks forward to going to work.

Thursday, November 21, 2019

Electronic music Essay Example | Topics and Well Written Essays - 2500 words

Electronic music - Essay Example For instance, if there is a synthesizer voice from an electronic keyboard, then different processes need to be used to create responses. The attack of the synthesizer when it plays the notes and the release which is created is the beginning of this. There are also different ways to manage the voices of the synthesizer to create different effects and sound. Time shifts, delays, resonance and other specialized forms within the music create even more alternatives with the music, all which help to change the way in which the music sounds. The specialty of electronic music is based on the ability to add in the different sounds and special effects. If this is crafted in the right way, then it helps to create a specific reaction from the audience where they catch onto the sounds and accept these as the right approach to the electronic music (Puckette, 15). The challenge that is created with electronic music is to take the techniques and sounds that have been established with the genre and w hich have become popular among audiences. For a new sound to catch with the audience, the production has to use the same sounds or loops and create a different sound and feel. Many of the production artists focus on mixing the same sounds for a different way of making the expression or statement with the music. There are others which change this approach to create different sound production. Inventing new sounds, creating different loops and experimenting with different connections to the electronic music are some of the various ways in which this can be used to develop different sounds and ideologies which are related to the music. The result is the ability to establish a sound that audiences will respond to differently while creating some familiarity with the... This "Electronic music" essay describes the peculiarities of this genre of music. Pop music, classical, jazz and other forms of well – known styles are easily advertised with performances and appearances by famous artists. This is followed by CD advertisements that take place through different settings. Electronic musicians take a different approach than all other genre forms. This is based on the use of electronic mixtures, as opposed to linking to famous and well – known music styles. The approach which most electronic musicians take is to create settings that advertise the music without having to make appearances. Creating CDs, establishing an Internet presence or working with different innovative sounds that are then given to different musicians for advertising are some of the ways that this is used. Electronic musicians usually consider themselves as producers or composers, as opposed to performing artists. This distinction changes the way in which audiences discov er the electronic music and respond to the sounds that are available (Holmes, 337). One of the approaches which have been used with the electronic music genre is the establishment of creative class and the underground social groups that are interested in the music. The social groups that most electronic musicians advertise to are those that are considered off – beat or which belong to social clubs that are out of the mainstream and popular ideas. The social identity that is in the mainstream is attracted more to the performances of genres such as popular music.

Wednesday, November 20, 2019

HRD 394 assignment #2 Example | Topics and Well Written Essays - 500 words

HRD 394 #2 - Assignment Example Investigations are ongoing. However, it is still unclear on the cause of the blast. Now all fingers are pointing at the leadership of Massey Company led by its belligerent C.E.O. Don L. Blankenship. Blankenship have been at the center of controversy when it comes to matters of safety measures. He tried to justify the violations by stating at one time that Violations are, unfortunately, a normal part of the mining process (Moore, 2011). The Massey Energy Company is the biggest mining coal business in Central Appalachia has always been a host of fatalities. It has found itself under scrutiny that has unearthed dismaying records on safety measures in place. Reports state that as recently as last month it attracted hefty fines for inadequate ventilation as per the federal records. According to the federal prosecutor, the company has a record of having paid the highest settlement in terms of fines. The move is after the investigations proved his guilt of violating safety rules. The violations resulted in the death of two mineworkers who burned to their deaths following a fire outbreak in one of its mine. That year (2008) alone the company paid fines worth $20miilion another record for the Environmental Protection Agency for violations of clean water. Unfortunately, workers chose to remain mum on such issues, as they fear losing their jobs if they come aloud (Moore, 2011). The Gulf oil spill is the nastiest oil spatter in American history. On 20 April 2010, the blast and tumbling of the Deepwater Horizon oil rig in the Gulf of Mexico left 11 people dead. Cameras Underwater revealed that there was a leakage on the BP that leaked oil and gas on the bed of the ocean. From projection, 3.19 million barrels of oil emptied in the Gulf having been on leak for about 87 days. The oil situated over 5000 feet underneath the water surface in the cosmic leading edge of the deep sea. The surrounding characterizes by constant cold temperatures above

Monday, November 18, 2019

Memo to Manager Essay Example | Topics and Well Written Essays - 500 words

Memo to Manager - Essay Example The giving of inexpensive gifts upon greeting, such as pens, foreign cigarettes, perfume, or shampoo are greatly appreciated by anyone, and can be used to indicate a desire for friendship. A major difference between Vietnamese and our Western culture is the meaning of eye contact. When you are introduced to a person who is your elder, of an elevated status, or the opposite sex, care should be made to not make eye contact. This is a sign of respect, and does not indicate a lack of trust as we perceive it. Also, putting your hands in your pockets or on your hips while talking is a sign of arrogance and shows disrespect. The Vietnamese prefer to follow a very rigid protocol when conducting a business meeting. A meeting will begin with the ranking guest making introductory remarks. These include formal thanks for hosting the meeting, objectives for the meeting, and an introduction of the participants. The Vietnamese host will follow with some formal remarks after which the substance of the meeting can begin. I plan to keep these rules of etiquette foremost in my mind on my visit. I will take some small gifts that would be appropriate for either a man or a woman for our initial greeting. As the most senior member of our staff, I will introduce the others during our first meeting and allow the Vietnamese to do the same.

Saturday, November 16, 2019

Research Philosophy Is A Belief Management Essay

Research Philosophy Is A Belief Management Essay The purpose of this chapter is to discuss the research philosophy, approach, strategy that is relevant to this business research. In addition, data collection method that is conducted to address the research problems as provided in chapter 2 is also included. The research methodology will be based on the research onion as introduced by Saunders et al. (2009) Figure 3.1. Selecting the appropriate methodology is essential for the effectiveness of any research (Buckley, 2006). The right choice of the approach will help to make a more informed decision about the research design and strategy that will be consistent with the research topic (Easterby-Smith et al., 1993). In this section, a questionnaire is to be designed to support data collection and further analysis on the research hypotheses. Besides, ethical issues of this research are also included in the end of this chapter. 3.2 Research philosophy Research philosophy is a belief about the way in which data about a phenomenon should be collected and analyzed (Levin, 1988). It is significant with particular reference to research methodology because: (i) it can help the researcher to refine and specify the research methods to be used in a study, that is, to clarify the overall research strategy to be used, (ii) knowledge of research philosophy will enable and assist the researcher to evaluate different methodologies and methods and avoid inappropriate use and unnecessary work by identifying the limitations of particular approaches at an early stage and (iii) it may help the researcher to be creative and innovative in either selection or adaptation of methods (Easterby-Smith et al., 1993). Figure 3.1 Research onion Source: Saunders et al. (2009) According to Saunders et al. (2009), there are four research philosophies in management research including positivism, realism, interpretivism and pragmatism. The choice of research philosophy will therefore influence the development of the research. And although each research philosophy has its strengths and weaknesses (Neville, 2005), the author chooses philosophy of positivism for this study because of the following reasons. The philosophy of positivism research is considered a source of knowledge closely associated with the physical and natural sciences (Alavi and Carlson, 1992). The special features of positivism are seen to be a philosophical ideology and movement, and it has a certain influence in human perception (Birger, 2005). By positing a reality in separation of subject and object, the positivist paradigm provides an objective reality against which researchers can compare their claims and ascertain truth (Popper, 1972). Positivism is largely concerned with the testing, confirmation and falsification, and predictive ability of generalizable theories about an objective, readily apprehended reality (Chua, 1986; Orlikowski and Baroudi, 1991). The objective of positivism is to provide a valid logical foundation for empirical research, and simultaneously restrict the scope of human rationality in scientific study to discovery the efficient means with its aim to achieve the end goal Friedman (1953). 3.3 Research approach In their 2009 work, Saunders et al. referred to the two broad methods of reasoning as the deductive and inductive approaches. Deductive reasoning works from the more general to the more specific, meaning that it starts with a theory, and then hypotheses are developed and a research strategy is designed to test the hypotheses. Meanwhile, inductive reasoning moves from specific observations to broader generalizations and theories, meaning that theories are developed as a result of data collection (Saunders et al., 2009). In this study, the author chooses deduction research approach due to the following reasons: It involves the development of a theory that is subjected to a rigorous test (Saunders et al., 2009). It is the dominant research approach in the natural sciences, where laws present the basis of explanation, allow the anticipation of phenomena, predict their occurrence and therefore permit them to be controlled (Collis and Hussey, 2003). Deductive reasoning is more narrow in nature and is concerned with testing or confirming hypotheses (Babbie, 2001) and therefore, more suitable with the context of this study. 3.4 Research strategy Saunders et al. (2009) stated that research strategy is important as it will help to answer particular research questions and meet research objectives, and that the choice of research strategy will be guided by the research questions and objectives, the extent of existing knowledge, the limit of time and other resources available. The strategies as indicated in the research onion (Saunders et al., 2009) are: experiment, survey, case study, action research, grounded theory, ethnography and archival research. In this study, the author thinks that case study strategy is most suitable and consistent with the research objectives, for the following reasons: It is a strategy for doing research which involves an empirical investigation of a particular contemporary phenomenon within its real life context using multiple sources of evidence (Robson, 2002). It provides a better understanding and content theorization of the processes and context in which the practices of management control take place (Morris and Wood, 1991; Adams et al., 2006; Berry et al., 2009 cited in Simoes and Rodrigues, 2008). It can be a very worthwhile way of exploring and challenging existing theories and provide a source of new research questions (Saunders et al., 2009). It has considerable ability to generate answers to the questions Why, What and How (Saunders et al., 2009) that are raised in this study. According to Yin (1994), the case study methodology is the most suitable approach to answer the questions Why? and How? In this case, the questions we want to answer are: Why has the BSC been introduced as a performance measurement tool? and How is the BSC model evaluated via employees feedback? How is the relationship between those measures? The advantage of this approach lies in the possibility of achieving triangulation (Denzin, 1978) which is given by the possibility of using many data sources. 3.5 Research Method As indicated in the research onion by Saunders et al. (2009), mono method, multi-method or mixed methods can be used as the system of collecting data for research projects. In multi-method, quantitative and qualitative researches are used widely in business and management research to differentiate both data collection techniques and data analysis procedures (Saunders et al., 2009). Qualitative research method focuses on discovering and understanding the experiences, perspectives, and thoughts of participants-that is, qualitative research explores meaning, purpose, or reality (Hiatt, 1986). It is usually described as allowing a detailed exploration of a topic of interest in which information is collected by a researcher through case studies, ethnographic work, interviews, and so on (Harwell, 2011). Meanwhile, quantitative research method attempts to maximize objectivity, replicability, and generalizibility of findings, and is typically interested in prediction. Its key features are th e use of instruments such as tests or surveys to collect data, and reliance on probability theory to test statistical hypotheses that correspond to research questions of interest (Harwell, 2011). In supporting this studys objectives, the author chooses to use both qualitative and quantitative researches. It is hoped that the combination of these two methods will strongly support the development of this study in terms of data collection and analysis. Specifically, qualitative approach will be applied in this study via closed questions in questionnaires to obtain information with its aim to explain how the factors impacting BSC in current context of HSBC. Besides, data of research allows researchers to access and recognize population attitudes, perceptions, and ideas about particular social questions with a small sample, as well as practical knowledge (Swidorski, 1980). Accordingly, questionnaire surveys play an important role in helping researchers understand the principles of questionnaire design to explain results in an optimal and meaningful way (Slattery et al., 2011). 3.6 Methods of collecting data 3.6.1 Data source Data are facts, figures and other relevant materials, past and present, serving as bases for study and analysis (Dekeba, 2012). Therefore, data collection is an important aspect of any type of research study. Data gathered by different methods may provide different windows onto social world (Gilbert, 2008). On the other hand, inaccurate data collection can impact the results of a study and ultimately lead to invalid results (Afroze, 2010). Basically, data collection includes primary data and secondary data. Primary data is the data which is collected for the first time (Hair et al., 2011). Researchers discussed that the major advantage of primary data is that the information is specific, relevant, up-to-date and that they answer specific research questions that secondary data cannot. However, cost and time consuming are its main disadvantages (Onkvisit Shaw, 2008). Secondary data is the data which is not originally collected but rather obtained from published or unpublished sources (Jha Shah, 2009). Its advantage is that it can be quickly and cheaply obtained, however the most important limitation is that it may not be accurate and updated, therefore not meeting specific research needs (Saunders et al., 2009). In particular, both primary data and secondary data are used in the research with the purpose of providing an objective and multifaceted view on the topic. Secondary data retrieved from e-books, e-journals from the Universitys e-library, websites and HSBCs available internal sources and the banks internal and restricted reports on strategy, structure and procedures as inputs for chapter 1 and 2 and for designing questionnaires. Primary data is to be collected from a survey using questionnaires amongst HSBCs staff within the scope of this research. 3.6.2 Data collection method As mentioned by Saunders et al. (2009), three ways of primary data collection include Observation, Interview and Questionnaires. Observation involves the systematic observation, recording, description, analysis and interpretation of peoples behavior (Hodges Videto, 2011). The main advantage is that it allow researcher to witness behaviors, skills, record and reflect those in their research. However, it is possible that the researcher makes incorrect observations and interpretations (Kerlinger, 1988). Interview is defined by Kahn and Cannel (1965) as a purposeful discussion between two or more people. Interviews help researchers gather valid and reliable data that are relevant to their research questions and objectives but it is a costly method in term of time and money. The interviewer is also needed to be equipped with skills so that they do not interfere or mislead the interviewees with their questions (Saunders et al., 2009). Questionnaire is one of the most widely used data collection techniques widely in business and management research for descriptive or explanatory (Saunders et al., 2009). The term questionnaire is defined as a formalized set of questions with the purpose of obtaining information from respondents (Malhotra et al., 1996). According to Ackroyd and Hughes (1981), questionnaire has some limitations such as: (i) respondents can misinterpret the questions and therefore give incorrect answers, (ii) limited information can be retrieved due to formatted questions, (iii) low chance for the collector to come back and ask for clarification from respondents and (iv) respondents may not be willing to answer if they are not required. However, according to Afroze (2010), there are various factors influencing the choice of a data collection method, including research questions, resources available, scope of work, timeline, and so on. Further to this study, the author decides to choose collecting data using questionnaires rather than observation and interview approaches when considering all these factors and referring to the following advantages (Ackroyd and Hughes, 1981). Large number of responses can be collected from a large number of people in a short period of time and in a relatively cost effective way The results of the questionnaires can be quickly and easily quantified by the researcher or through the use of a software package It can be analyzed more scientifically and objectively than other forms of research When data has been quantified, it can be used to compare and contrast other research and may be used to measure change Positivists believe that quantitative data can be used to create new theories and/or test existing hypotheses Figure 3.2: Types of questionnaire Source: Saunders et al. (2009) As indicated by Saunders et al. (2009), there are two kinds of questionnaires including self-administered and interviewer-administered questionnaires. In this research, self-administered, delivery and collection questionnaire is used, due to the following rationales. à ¢Ã¢â€š ¬Ã‚ ¢ It is more cost effective to administer than face-to-face interviews, convenient to respondents as they can complete it at a time and place that is convenient for them, reducing the possibility of interviewer bias, and is perceived to be less intrusive than telephone or face-to-face surveys and hence, respondents will more readily respond truthfully to sensitive questions (Eiselen et al., 2005). à ¢Ã¢â€š ¬Ã‚ ¢ The responses are gathered in a standardized way, so questionnaires are more objective than interviews, and information can be collected from a large portion of a group (Milne, 1999). It facilitates generalization but on the downside, could lead to false conclusions (Deem et al, 2010). According to OLeary (2004), a well-designed questionnaire should meet the research objectives. It should give accurate and relevant information to the research questions and be clearly organized and presented in a way that ensures respondents fully understand the questions and provide accurate, unbiased and complete information. Accordingly, the author was trying hard on building a questionnaire that works in practice and meets the research objectives as elaborated in Chapter 1. In this research, the questionnaire is divided into six sections of 28 questions as described in Figure 3.3 below. They are designed to collect information regarding employees comments and feedback during the implementation process of BSC in HSBC. Figure 3.3: Allocation of questions and research content Section Description Question Section 1 Balanced Scorecard weighting Q1-4 Section 2 Setting objectives Q5-14 Section 3 Financial Q15-18 Section 4 Customer Q19-21 Section 5 Internal processing Q22-24 Section 6 Learning and growth Q25-28 It is a combination of a 5-point Likert rating scale (Likert, 1932) (1=strongly disagree; 2=disagree; 3=neutral; 4=agree; 5=strongly agree) and open-ended statements Please explainà ¢Ã¢â€š ¬Ã‚ ¦ to collect both quantitative and qualitative information. In other words, questionnaires include both quantitative and qualitative questions with which participants can choose one of the five ratings and explain their choice. This ensures respondents have the option to add their own views and feelings (Fisher, 2007) and, on the other hand, providing more information and facts to the author in doing research. It may take 10-15 minutes to complete a self-administered questionnaire. In general, the research is more about what employee experience is with the BSC than about getting a correct answer (Waal et al., 2009). In addition, it is necessary to have a questionnaire cover letter written in order to shortly explain to the respondents of the questionnaire what the survey is all about and what is the purpose of asking the questions (Kiernan, 2005). Considering the nature of this research, it is also essential to let people know that their participation is voluntary and that their data are anonymous and confidential. In this survey, 28 questions are designed in an attempt to get answers to 7 hypotheses as mentioned in Chapter 2, following are the general descriptions: Q1 is to classify sales and non-sales position of participants at HSBC. Q2 is to classify the seniority of the participants at HSBC. Q3 4 are to explore the proportion of the four perspectives of HSBC BSC. Q5 is about the effectiveness of BSC at HSBC. Q6, 8, 9, 10, 11, 12, 13, 14, 16 19 are to explore positive effects of BSC at HSBC, in which Q6 is about strategy translation, Q8 about strategy link, Q9 about employee understanding, Q10 about tracking record, Q11 about clear communication, Q13 about feedback encouragement, Q14 about employee satisfaction, Q15 about long and short term link, Q16 19 about a clear focus on achieving targets. Q7, 8, 9 11 are more focused on employee understanding Q17, 18, 20, 21, 22, 23, 24 are about potential relationships between four perspectives, in which Q17 18 are about relationships between financial and customer value and learning and growth, Q20 21 about relationship between learning and growth and customer, Q22 23 about relationship between customer and internal processing and Q24 about relationship between learning and internal processing. Q25, 26, 27 28 are more focused on learning and growth to figure out if it is the weakest point in HSBC BSC. All these questions are written in details in the Appendix 1 under a full questionnaire. 3.6.3 Sampling method Sample is a part of a population whose properties are studied to gain information about the whole (Webster, 1985). It is a process of selecting respondents form larger part for the purpose of a study. Sampling owns a lot of advantages. It saves time, costs and efforts, making data collection become more manageable as fewer people are involved, and the results will be available more quickly. And to ensure a sample is representative, it is suggested to obtain as high a response rate as possible. According to Saunders et al. (2009), sampling techniques help to reduce the amount of data needed to collect by considering only data from a sub-group rather than all possible cases or elements. Two types of sampling techniques are probability sampling and non-probability sampling. In probability sampling, sample units are selected randomly, whereas in non-probability sampling, they are selected based on the researchers judgment, convenience, or other non-random process (Blattberg et al., 2008). The choice of which technique is used in this research is made in favor of non-probability sampling. Due to the scope of work and the limitation of time, the survey is conducted amongst Premier Center staff only. Only 40 people are included in the survey, they are at different positions (teller, counter officer, service assistant, service manager, relationship officer, sales manager) and different levels of seniority (senior, junior, new joiner). And in this case, it is not necessary to launch a pilot test as recommended by Peterson (2000). There are two primary reasons. First, they are every day dealing with issues related to BSC systems, from setting objectives at the beginning to rating performance every mid-year or year-end. Their daily work and performance is directly subject to all measures of the BSC. Hence, a lot of opinions and feedback can be collected as a source of data collection. Second, they are all working in Premier Center that is the same workplace with the author, then the nature of working environment and the point of view can be quite identical and easier to approach. Moreover, response rate can be high and they are more willing to support the author in doing questionnaires with frank answers. It is believed by many observers that higher response rate will assure more accurate survey results (Rea and Parker 1997). 3.7 Framework of data analysis Figure 3.4 below provide a summary and connection between research objectives as mentioned in chapter 1 and related literature in chapter 2 and equivalent hypotheses as provided in regards to questions designed in chapter 3 to collect data and information for further analysis. Figure 3.4: Summary of chapter 1, 2 and 3 and relevance Objective O Literature Hypothesis H Question Q O1: To understand BSC as a performance measurement tool Performance Measurement and BSC H1: BSC and its perspectives act as an effective performance measurement tool Q5 O2: To identify positive and negative effects of BSC in HSBC Vietnam Positive and negative effects of BSC (9P3N: 9 positive 3 negative points) H2: There are relatively positive impacts of BSC in HSBC H4: There are relatively negative impacts of BSC in HSBC Q6-8-9-10-11-13-14-16-19 Q12 O3: To measure if HSBC BSC model is different compared to an ideal model What is an ideal model? (Norton, 2000) H6: The execution of BSC in a specific organization in practice is different with an ideal BSC Q3-4 O4: To evaluate the relationship between employee understanding of the organizations objectives with a well-performing organization What is a well performing organization? (Steward, 1999) H3: There is a positive relationship between a well performing organization and its employees understanding of its objectives Q7-8-9-11 O5: To analyze the causal relationships between 4 perspectives of BSC Relationship between four perspectives H7: There is a causal relationship between 4 perspectives of BSC in HSBC Q17-18-20-21-22-23-24 O6: To identify the weakest one of the four perspectives. H5: Of the four perspectives of HSBCs BSC, learning and growth is the weakest point. Q25-26-27-28 Due to the nature of this study and the limited timeframe, the author only uses simple formulas in excel 2007 to consolidate figures and analyze data. Analysis is based on quantitative and qualitative information collected from the survey as well as from the authors individual understanding of the subject. 3.8 Ethical issues Since people are the subject of research, it is very difficult to avoid falling into ethical issues (Monette et al., 2005). Therefore, approval has to be obtained from management to conduct this survey at Premier Centers, and a brief explanation of the purpose of the questionnaire is necessarily included in cover letter in order to have an appropriate approach and outlook from participants. In addition, the research topic is about Balanced Scorecard, which is in fact a relatively sensitive issue in terms of human resource management. It covers all employees and managers at all levels as well as issues concerning employees benefits, corporate governance, empowerment, motivation and retention policy and so on. As such, particular attention must be paid to the approach of gathering information from subjects in banking area which are considered to be sensitive, especially in HSBC where privacy and confidentiality is part of its code of conduct and execution. Being aware that disclosure of the banks information to third parties can put the bank at risk and result in operational and reputation loss, there are several points that need high commitment as follow. First, participation in this survey is entirely voluntary and the rights of respondents as human beings should be respected at all times (Cohen, Manion Morrison 2004). Second, for privacy concerns, no actual names of participants are to be revealed. Information provided by them remains confidential and will be reported in summary format only. Third, the content and results of this study are required to be kept private and confidential between the author and the professor only. As some restricted and highly restricted information has been used in this study, particularly highly sensitive and confidential performance data has been obtained, public access and reference are not allowed for any purposes. 3.9 Chapter summary This chapter on methodology enables the author to gain a rich understanding of the context of the research and the processes being enacted, therefore answering the why, what and how questions (Saunders et al., 2006). This section also provides a connection between itself with the research objectives in chapter 1, literature and hypotheses in chapter 2 by presenting research method and data collection via a list of questions to be worked on. Further in the next chapter, results and analysis on collected data will be discussed in details.

Wednesday, November 13, 2019

Rape and Intimate Partner Abuse In The Lesbian Community Essay

In every 45 seconds, someone is sexually violated in the United States. Out of every 6 women, one has experienced an attempted rape or complete rape. Lesbians and bisexual women remain at increased risk of sexual victimization compared to heterosexual women. In order for a woman to determine the direction of her life, she must first determine her sexuality. Sexuality is a deep, integral part of any human’s life. This should not be a subject of coercion or debate. The society must recognize that a woman has the right to freely pre-determine her sexuality without oppression and discrimination (Burn, 2004). Traditionally, women throughout history and culture have undertaken the role of independent, non-heterosexual, women-connected existence. Lesbianism according to ancient literature review has always existed. The practice has always been unacceptable and deviant. Lesbians are subjected to rape more often than other women. Worldwide, lesbians are subjected to verbal and physical abuse. In most cultures, lesbianism occurs prior to heterosexual marriages. These facts were gathered by Faderman in 1981. Female-female romantic relationships were found in European communities since the 17th century through the early 20th century after studying the fiction and poetry written during this period (Burn, 2004). Today, many societies view bisexuality and homosexuality as a sickness. The societies deny their existence entirely. However, biologists and psychologists believe that both are mere instances of many human variations. After successful lobbying by gay and lesbian political organizations in 1974, the American Psychiatric Association (APA) eliminated homosexuality from its list of mental disorder. The APA now takes the position that homos... ...(2010). External Barriers to Help-Seeking Encountered by Canadian Gay and Lesbian Victims of Intimate Partner Abuse: An Application of the Barriers Model. Violence and Victims, Vol. 25(4), 536-552. Pinto, S. (2012). Intimate Partner Violence: Sexual Abuse. CINHAL Nursing Guide. 1-2. Renzetti, C. M. (1996). The Poverty of Services for Battered Lesbians. Journal of gay and Lesbian Social Services, Vol. 4, pp 61-68. Tigert, L. M. (2001). The Power of Shame: Lesbian Battering as a Manifestation of Homophobia. Women & Therapy, Vol. 23, pp 73-85. Walters, M. L. (2011). Straighten up and Act Like a Lady: A Qualitative Study of Lesbian Survivors of Intimate Partner Violence. Journal of Gay and Lesbian Social Service. Vol. 23, pp 250-270. West, C. M. (2002). Lesbian Intimate Partner Violence: Prevalence and Dynamics. Journal of Lesbian Studies, Vol. 6(1), pp 121-127.

Monday, November 11, 2019

The Charles Dickens’ Great Expectations

The Charles Dickens’ Great Expectations, a novel released in 1861 about social criticism, is a story of a young boy named Pip who was in struggle to find his fortune or to be successful rather than to be confined on being a common man of his time. The novel was set in the mid-nineteenth century and took place in the town of Kent and London, England. Using the first person point of view, Pip, the protagonist in the novel talked about his childhood in the first few chapters of the book, describing his life, the first encounter with the convict who will soon changed his fortune in the following chapters.He also mentioned the development of his fascination and later on love for Estella, who was trained to break a man’s heart. Unlike the traditional the traditional novels and story structure, the novel of Dickens does not contain a particular antagonist, rather, he visualized some people who will affect the existence of Pip. He made several characters who took charge of the antagonism in the novel in the person of Magwitch, Estella, Orlick, Miss Havisham, Compeyson and Bentley Drummle. They will cause some of Pip’s misfortune and struggles.Magwitch, Miss Havisham and Estella, in the end of the novel redeemed themselves and reconciled with Pip (Dickens, n. pag). The novel housed many symbols which were explained through the actions of the characters. The clocks which were stopped in the house of Miss Havisham symbolize her attempt to stop time while the other objects like handcuffs, convicts, file and chains stands for guilt and innocence. Joe, the husband of Pip’s sister is the conscience and loyalty. These symbols helped the protagonist to further develop his character (Philips & Cheng, n.pag).In mixed tones of cheerfulness, dramatic and sympathetic storytelling, Pip showed what his life was all about, what happened to him and what happened to his desire of being trained as a gentleman in the world wherein common people weren’t en ough to be respected and treated fairly. Although the novel talked about several crimes and dealt with such criminality, these made Pip a person of much desire. The novel ended when they failed to help Magwitch escape from being imprisoned, following his death.Miss Havisham was redeemed in the end while Estella and Pip were reconciled with each other. Pip had reconciliation with Joe also and the story ended with Pip and Estella walked hand in hand and promised never to part again (Dickens, n. pag). It is quite interesting that Charles Dickens’ worked on two endings for this novel. The natural writer have a fix idea or story in mind thus, any criticism will not prevent him from publishing what he does like. In this case, Charles Dickens was influenced by what the people might think of the novel.Instead of giving the readers a tragic and sad ending, he ventured into following the suggestion of his good friend Edward Bulwer to give a happy ending so that he people will be happy with what happened between the characters. While his critics thought that the ending published was less of reality, the people who embraced the happy ending the original ending was too harsh and thought that their past is actually a bridge for them to be together in the end of the novel. They pointed out that their experiences would lead them into mutual development and soon will help both to realize that they were in love with each other (Philips & Cheng, n.pag).The second ending were Estella and Pip reconciled and walked away holding hands was the one published because of Dickens’ desire to somehow please his readers while the original ending was left hanging and was not used to justify the ending of the story. Like the critics of Charles Dickens’ Great Expectations, I go in favor with them that the ending used was not appropriate and that it does depict reality. It is quite impossible that after what happened between him and Estella, he would remain to love her desp ite of her being that girl who broke his heart.The original ending is far more considerate and realistic in the sense that in life, it is quite impossible to retain the love you feel for the person after going through so many troubles somehow caused by the same person. Also, the difference in their status and the way they were raised is a very big factor why they should not be brought back together. The way that Estella judged Pip because of his status and the fact that he is just a common person, is enough evidence that the two will not be compatible with one another.In the end, their reunion and reconciliation with each other did not give a better look of reality and it also did not simply give a better justification with the fallen expectations which Pip had. The ending also foreshadowed the main idea of having a fair and equal ending. It also shows that those people who have hurt us can be given a chance to hurt us more for the second time. Although I don’t really critici ze the ending of the novel, I would just want to give an opinion regarding the reality that the book should have.Although it was an autobiography fiction, it should still have a touch of reality in it so that it will be more convincing. Analyzing the background of both Pip and Estella, there was really no hint that the latter will fall in love with the former and that their common pasts of being deceive and fooled does not justify the reason that they became compatible with it. In the end, whether it was a bad ending or a favored ending, the novel brought realization and many teachings to the readers thus, it opens the mind of a person and it somehow touches the heart of someone who gives too much attention of their life expectations.

Friday, November 8, 2019

Biography of Henry Avery, the Most Successful Pirate

Biography of Henry Avery, the Most Successful Pirate Henry â€Å"Long Ben† Avery (c 1659–1696 or 1699) was an English pirate, plying the Atlantic and Indian Oceans and making one big score: the treasure ship of the Grand Mughal of India. After this success, he retired. Little is known for certain of his ultimate fate. Contemporaries believed that Avery took his loot to Madagascar where he set himself up as a king with his own fleet and thousands of men. There also is evidence, however, that he returned to England and died broke. Fast Facts: Henry Avery Known For: Most successful pirateAlso Known As: Long Ben, John AveryBorn: Between 1653 and 1659 in Plymouth, EnglandDied: Perhaps in 1696 or 1699 in Devonshire County, England Early Life Henry Avery was born in or near Plymouth, England, sometime between 1653 and 1659. Some contemporary accounts spell his last name Every, while some references give his first name as John. He soon took to sea,  serving on several merchant vessels as well as ships of war, when England went to war with France in 1688, and a few slave ships. In early 1694, Avery took a position as the first mate aboard the privateer vessel Charles II, then in the employ of the king of Spain. The mostly English crew was extremely unhappy with their poor treatment and they convinced Avery to lead a mutiny, which he did on May 7, 1694. The men renamed the ship the Fancy and turned to piracy, attacking English and Dutch merchantmen off the coast of Africa. About this time, he released a statement declaring that English vessels had nothing to fear from him, as he would attack only foreigners, which clearly wasnt true. Madagascar The Fancy headed to Madagascar, then a lawless land known as a safe haven for pirates and a good place to launch attacks in the Indian Ocean. He restocked the Fancy and had it modified to be swifter under sail. This improved speed began paying dividends immediately, as he was able to overtake a French pirate vessel. After looting it, he welcomed 40 new pirates to his crew. Then he headed north, where other pirates were amassing, hoping to loot the Grand Mughal of Indias treasure fleet as it returned from an annual pilgrimage to Mecca. Indian Treasure Fleet In July 1695, the pirates got lucky: the great treasure fleet sailed into their arms. There were six pirate ships, including the Fancy and Thomas Tews Amity. They first attacked the Fateh Muhammed, the escort ship to the flagship, the Ganj-i-Sawai. The Fateh Muhammed, outgunned by the large pirate fleet, didnt put up much of a fight. There were 50,000 to 60,000 British pounds in treasure aboard the Fateh Muhammed. It was quite a haul, but it didnt go far divided among the crews of six vessels. The pirates were hungry for more. Soon Averys ship caught up with the Ganj-i-Sawai, the powerful flagship of Aurangzeb, the Mughal lord. It was a mighty ship, with 62 cannons and 400 to 500 musketeers, but the prize was too rich to ignore. During the first broadside they damaged the Ganj-i-Sawais main mast and one of the Indian cannons exploded, causing mayhem and confusion on deck. The battle roared on for hours as the pirates boarded the Ganj-i-Sawai. The terrified captain of the Mughal ship ran below decks and hid among the concubines. After a fierce battle, the remaining Indians surrendered. Looting and Torture The survivors were subjected to several days of torture and rape by the victorious pirates. There were many women on board, including a member of the court of the Grand Mughal. Romantic tales of the day say that the beautiful daughter of the Mughal was on board and fell in love with Avery and then ran off to live with him on a remote island, but the reality was probably far more brutal. The haul from the Ganj-i-Sawai was hundreds of thousands of pounds in gold, silver, and jewels, worth tens of millions of dollars today and possibly the richest haul in the history of piracy. Deception and Flight Avery and his men didnt want to share this prize with the other pirates, so they tricked them. They loaded their holds with loot and arranged to meet and divide it, but they took off instead. None of the other pirate captains had a chance of catching up with the speedy Fancy, which headed for the lawless Caribbean. Once they reached New Providence Island, Avery bribed Gov. Nicholas Trott, essentially buying protection for him and his men. The taking of the Indian ships had put a great strain on relations between India and England, however, and once a reward was put out for Avery and his fellow pirates, Trott could no longer protect them. He tipped them off, however, so Avery and most of his 113-man crew got out safely. Only 12 were captured. Averys crew split up. Some went to Charleston, some to Ireland and England, and some remained in the Caribbean. Avery himself vanished from history at this point, although according to Capt. Charles Johnson, one of the best sources of the time (and often thought to be a pseudonym for novelist Daniel Defoe), he returned with much of his loot to England only to be later swindled out of it, dying poor in perhaps 1696 or 1699, maybe in Devonshire County, England. Legacy Avery was a legend during his lifetime and for a while thereafter. He embodied the dream of all pirates to make a huge score and then retire, preferably with an adoring princess and a large pile of loot. The idea that Avery had managed to get away with that booty helped create the so-called Golden Age of Piracy as thousands of poor, abused European seamen tried to follow his example out of their misery. The fact that he supposedly refused to attack English ships (although he did) became part of his legend, giving the story a Robin Hood twist. Books and plays were written about him and his exploits. Many people at the time believed that he had set up a kingdom somewhere- possibly Madagascar- with 40 warships, an army of 15,000 men, a mighty fortress, and coins bearing his face. Capt. Johnsons story is almost certainly closer to the truth. The part of Averys story that can be verified caused great headaches for English diplomats. The Indians were furious and held officers of the British East India Company under arrest for a while. It would take years for the diplomatic furor to die down. Averys haul from the two Mughal ships put him at the top of the earnings list for pirates, at least during his generation. He took in more loot in two years than pirates such as Blackbeard, Captain Kidd, Anne Bonny and Calico Jack Rackham- combined. Its impossible to know the exact design used by Long Ben Avery for his pirate flag. He only captured a dozen or so ships, and no first-hand accounts survive from his crew or victims. The flag most commonly attributed to him is a white skull in profile, wearing a kerchief on a red or black background. Below the skull are two crossed bones. Sources Cordingly, David. Random House Trade Paperbacks, 1996.Defoe, Daniel (writing as Capt. Charles Johnson). A General History of the Pyrates. Edited by Manuel Schonhorn. Dover Publications, 1972/1999.Konstam, Angus. The World Atlas of Pirates. Lyons Press, 2009.Henry Every’s Bloody Pirate Raid, 320 Years Ago. History.com.John Avery: British Pirate. Encyclopedia Britannica.

Wednesday, November 6, 2019

DBQ-Articles of Confederation essays

DBQ-Articles of Confederation essays After the American Revolution ended, life in America was different. States reduced the property holding requirement for voting and got rid of primogeniture. The aristocratic leadership was weakened. The Quakers founded the first antislavery society in 1775. Individual states could trade freely with foreign nations. The states also wrote their own constitutions. Even though they were written for separate states, they had a few things in common. They all called for the annual election of legislators and most included a bill of rights. In 1776 Congress called for a committee to draft a written constitution for America; the result was the Articles of Confederation. Adopted in 1777, it was not enforced until 1781 when Maryland finally ratified it. These articles set in motion a system of government which, even though it had some good points, seemed to take its toll on the newly named United States of America. The states were united in a firm league of friendship (Article 3) but retained their sovereignty and independence. This meant that each state could do what it wanted without concern to what the other states thought. The Articles of Confederation put Congress as the dominant power without any executive or judicial branches; judicial duties were left up to each individual state. In the years between 1784 and 1789, the market value of exports from the United States ultimately rose; its only drop was in 1786 (Document B). This came at the same time as Shays Rebellion. Farmers who were losing their homes to taxes and mortgages demanded cheap paper money and lighter taxes. After the rebellion fell, aristocratic colonists said that the revolution had created a mobocracy. The domination of Congress would have been a good idea if they had more control over commerce. In 1784, Spain closed the Mississippi River to American commerce. Secretary of foreign affairs, John Jay, spoke to Congress about ...

Monday, November 4, 2019

Motorola Inc. Research Paper Example | Topics and Well Written Essays - 1000 words

Motorola Inc. - Research Paper Example Of significance to the situation is considering the external opportunities and threats that Motorola Inc. has to take into account. Furthermore, Motorola Inc. also needs to be aware of its internal strengths and weaknesses. The SWOT analysis is a method that companies use to assess and analyze internal and external factors so that they can use them to make further judgments for the future. Internal and external factors are divided into a two by two matrix. The four quadrants are allocated to strengths, weaknesses, opportunities and threats, hence the name SWOT. When assessing the strengths, the company may look at numerous factors including the company’s capabilities unique selling point and competitive advantage, its knowledge and experience base, innovative aspects and price and quality etcetera. For Motorola Inc. its strengths include the fact that it has a lot of knowledge and experience in the field, having dominated it for such a long time. It is also in the process of i nnovating, to keep pace with the modern times and is investing heavily in WiMax technology. The weakness part of this analysis usually includes aspects like disadvantages, gaps in capabilities and lack of competitive advantage, it also encompasses the company’s vulnerability and pressures and problems of reliability, predictability etcetera. Motorola Inc.’s weaknesses have cost the company dearly in terms of revenue, profits and market share. It has failed to keep its pace as fast as some of its competitors and has duly lost to them some of its market share and profit levels. Also, it has been having financial difficulty and hasn’t been able to streamline costs with a deflated economy and falling profits. The opportunities quadrant includes aspects like market developments, technological innovation, new or niche markets, new USPs or tactics, product or brand development, investment in research and any other external factors that might positively affect the busin ess. Opportunities for Motorola Inc. seem few in these economically and financially hard times. The market has developed into a much more technologically savvy one; Motorola Inc. has tried using this to its advantage by innovating using WiMax technology. With the help of this, it will develop and restructure its products to streamline them with market demand while keeping costs low. Threats include aspects like, adverse political, legislative or environmental effects; it also includes factors like competitors’ competitiveness, market demand, economy, and etcetera. Threats that are causing the most damage to Motorola Inc. over the recent years include the condition of the economy for one. The economy has been in a slump, which means that peoples’ consumption has gone down; this has lead to a significant drop in the demand of mobile technology. Consequently, this has caused Motorola Inc.’s profits to decrease and costs to increase, creating recent fiscal losses fo r the company. Moreover, competitors like Nokia, Sony Ericsson, Apple Inc. and RIM have really stepped up their game recently and in some cases found very profitable niche markets that they are quite comfortably exploiting. As a result they are enjoying a good profit level and growing market shares, even in these depressed economic conditions. Motorola Inc. is considering some strategic options to effectively combat the bad times. Their main aim is to cut down the losses and return the firm to

Saturday, November 2, 2019

Strategy Formulation Essay Example | Topics and Well Written Essays - 250 words - 1

Strategy Formulation - Essay Example The task is acknowledged as essential to enable taking track of sales leads.The areas that can be changed are as follows: (1) determining the scope of the assistant’s job. It could be that there are more important responsibilities that need to be urgently taken cared of and that taking phone messages were regarded as insignificant (unless explicitly communicated); (2) the location of the telephone might also be far from the assistant’s work place making it tedious to take messages, as such, putting the telephone near the assistant’s work place would help in taking the needed phone messages; (3) use of advanced technology could help (like using a headphone where the assistant could immediately talk to clients while doing other tasks); and (4) assigning other staff or personnel to take phone message, if and when possible. The strategy would therefore really depend on the root causes of the assistant’s inability to take phone message. If it stems from structu ral causes, the strategy entails changing the location of the phone or applying advanced digital peripherals that would assist in multi-tasking. If the cause of the inability stems from personal traits , the strategy could entail hiring another assistant who would be competent in doing the task. If this is not possible, the assistant could be trained to do the task, as required. Finally, if the cause of work overload, the task should be delegated to other staff who could be relied on to take phone messages, as needed. Â