Friday, December 27, 2019
Microsoft Office a Monopoly Within a Monopoly - 946 Words
Jacob Phillips GB 6210 Microsoft Office A Monopoly within a Monopoly Microsoft Corporation has three major monopolies within itself: Office, Windowââ¬â¢s, and Internet Explorer. Microsoft Office is a monopoly that sits on top of the Windows monopoly and makes money. Office is Microsofts best monopoly, making profits of 60% per copy sold Microsoftââ¬â¢s main cash cows: Windows and Office are currently desktop applications. Microsoft has dominated the desktop scene for several decades. However, with current Internet startups and Google pushing, Microsoft has lagged with cloud computing and web applications. Microsoft Office is a commercial office suite of inter-related desktop applications, servers and services for the Microsoft Windows andâ⬠¦show more contentâ⬠¦They are not sure though whether it is a workable strategy. Microsofts plan is to embrace the demand for cloud-based tools for office workers, which promises to be less costly for companies than conventional software, and yet avoid cann ibalizing the business that is its biggest single money-maker. The Microsoft unit that includes the Office family of products is a $20 billion per year business with pre-tax profit margins of 60%. (Arthur, 2011) Its bigger and more profitable even than the companys other big profit engine, the Windows PC operating system which ebbs and flows with the sale of PCs. Microsoftââ¬â¢s Office product line has an astounding 90+ percent market share. With such an impressive command of the market, many solution providers serving the SMB market have concluded that there is no viable alternative to Microsoft Office. But that couldnââ¬â¢t be further from the truth. Several alternatives are priced significantly lower than MS Office and offer compatibility with the Microsoft productââ¬â¢s file formats and robust feature sets. References Microsof Office History In Brief. (2009, July 19). Retrieved 10 7, 2011, from http://www.intowindows.com/microsoft-office-history-in-brief/ About OpenOffice.org. (2011, Febuary 7). Retrieved October 7, 2011, from http://about.openoffice.org/index.html Arthur, C. (2011, June 28). Microsoft Office 365 goes into battle with Google Apps. Retrieved October 9, 2011, fromShow MoreRelatedMonopoly Industry And Its Economic Effect1695 Words à |à 7 PagesMonopoly Industry and its Economic Effect. We live in a world where different economic systems exist and its existence is can create balances or imbalances in the economical arena. These economic system can be characterized as Laissez-faire economy, command economy and a mixed economy, implemented by each state. Within those segments of economy, a country can have companies following different structures of industries in the marketplace with distinctive levels of competitions. To understand howRead MoreIs Microsoft a Monopoly Essay2147 Words à |à 9 PagesIs Microsoft a monopoly or not? In order to understand if Microsoft is a monopoly one must first know the definition of a monopoly. A monopoly is a firm that is the sole seller of a product that has little or no substitutes. This automatically should arouse many thoughts in the minds of ââ¬Å"usâ⬠as consumers. For all these years have we been monopolized by a producer of a product just because there were limited sources in the same fields? Yes and no should be the floating answer. Microsoft for yearsRead MoreThe Microsoft Antitrust Case11234 Words à |à 45 PagesThe Microsoft Antitrust Case A Case Study For MBA Students by Nicholas Economides* Revised April 2003 Abstract This case study discusses briefly the economic and legal issues pertaining to the antitrust case of the United States and a number of States against Microsoft. * Stern School of Business, New York University, New York, NY 10012, (212) 9980864, fax (212) 995-4218, http://www.stern.nyu.edu/networks/, neconomi@stern.nyu.edu Copyright à ©, N. Economides 2 Contents 1. 2. 3. 4. 5Read More The Microsoft Monopoly Essay1563 Words à |à 7 PagesThe Microsoft Monopoly I. Introduction United States vs. Microsoft is one the largest, most controversial antitrust lawsuits in American history. Many claim the government is wrongly punishing Microsoft for being innovative and successful, arguing that Windows dominates the market because of the productââ¬â¢s popularity, not because of malpractice by the parent company. Others argue in favor of the government, claiming that Microsoftââ¬â¢s practices conflict with the free market ideal. There areRead More Intellectual Property Essay1176 Words à |à 5 Pagesor capitalizing upon anotherââ¬â¢s work. The main areas protected by protect intellectual property law include: patent, copyright, trademark, and trade secret. Intellectual Property can be categorized under the following: Monopoly Right to prevent copying De Facto Monopoly Contractual Patents Unregistered Trade Marks Trade Secrets Confidential Information Registered Trade Marks Unregistered Designs Know-How Registered Design Copyright This essay focuses on Patents, RegisteredRead MoreGrowth of the Computer Industry Essay1377 Words à |à 6 PagesThe computer industry has experienced an impressive growth within the past 15 years. In our case, laptops fall under the category of computers as well. Even though computers had first come out in the mid 19th century, there has been a huge augmentation of ââ¬Ëadvancedââ¬â¢ computers/laptops in recent times. From 1936 to 1980, computers werenââ¬â¢t mainly used by the public. The very first system was not even considered a computer, but a mere 30 ton numerical calculator that worked through 18, 000 vacuumRead MoreEssay on Microsoft Case Study943 Words à |à 4 Pages1. INTRODUCTION Microsoft founded in 1975 by Bill Gates. It is the largest information technology (IT) company. For the year 2005, its revenue was US$39,788 million and net income after taxes US$12,254. Nevertheless, since the early 2000s, a string of bad news had seriously undermined the future growth of Microsoft. Personal Computer (PC) operating system and basic office are the near-monopoly software in the category. Purchase of QDOS (quick and dirty operating system) from Seattle programmerRead MoreCase Study : Hospitality And Tourism Management1255 Words à |à 6 Pagescharacteristics of a monopoly. A pure monopoly consists of only a single seller and if regulated, it is under government control thus permitted to set its own prices while a nonregulated monopoly on the other hand, let companies have the freedom to set their own price levels, but only on the terms of what the market will allow. Markets with oligopolistic competition on the other hand, contain limited powerful sellers who dominate the market with many small companies operating within it. It is highlyRead MoreMarket Structures and Relating Pricing Strategies Essay2098 Words à |à 9 PagesMarket Structures and Relating Pricing Strategies Abstract This paper analysisââ¬â¢s the four categories of the market structure; perfect competition; monopolistic competition, oligopoly and monopoly marketing structures. It will also provide pricing strategies as they are specifically related to each market structure. Each market structure possesses it own unique pricing structure that every business follows to achieve its maximum profit. Some market structures pricing strategiesRead MoreEng 102 Module 3 Analysis by Comparison Contrast Essay890 Words à |à 4 Pagesboards and cutouts evolving into televisions and computers. The only real difference is it is not necessary to be an artist in order to deliver a successful message, however, all that was changed in 1987 when Presenter was unleashed on the world. Microsoft PowerPoint emerged under the name ââ¬Å"Presenterâ⬠as the only presentation software available in 1987. However, due to trademark issues, Presenter was later named PowerPoint [ (Hewitt, 2009) ]. In the last 23 years, PowerPoint has proven itself useful
Thursday, December 19, 2019
Morality And Morality Principles Concerning The...
Morality ââ¬â principles concerning the distinction between right and wrong or good and bad behavior. A particular system of values and principles of conduct, especially one held by a specified person or society. The extent to which an action is right or wrong. We have beliefs about right and wrong. Despite different cultures, morals come from natural human emotions. Morality has become a difficult issue in the world today. It seems that morality is driven by religion. Those that are very religious, are less likely to conduct bad behavior. Almost every single decision we make is impacted by morality and often is affected by our conscience. The Ten Commandments form the basis for many of societyââ¬â¢s moral compass. Most people have some kind of moral code. Some are very strong and some are not. For Christians, we were created in Godââ¬â¢s image and are expected to choose good moral acts over anything else. An effective moral life is the practice of human and theological virtues. Values ââ¬â the regard that something is held to deserve; the importance, worth, or usefulness of something. A personââ¬â¢s principles or standards of behavior; oneââ¬â¢s judgement of what is important in life. Values should determine your priorities, and are a good measurement to tell if your life turned out the way you wanted it to. Most people feel good when their behavior matches their values. It is when your behavior goes away from your values that most people feel bad or wrong. This is often the main cause ofShow MoreRelatedSources Of Morality And Morality1424 Words à |à 6 Pages02/12/2016 Source of Morality Imagine a world filled with chaos, brutality, death, and fear, a world where no laws govern the people, and the people feel no sense of right or wrong, a hellish world in which morality is a things of nonexistence. A world that to our knowledge never existed, so that begs the questions where did morality come from, and what exactly is it? A simple definition would state, the principles concerning the distinction between right and wrong or good and bad behavior, which bringsRead MoreEthics And Health Care Professions867 Words à |à 4 PagesThe field of ethics includes the broad study of social morality along with reflections on its norms and practices. Ethical theory and moral philosophy refer to philosophical reflection on morality. Morality can be best defined as principles concerning the distinction between right and wrong or good and bad behavior. Philosophical ethics and health care professions focuses on learning what philosophy is and how it contributes to human history, culture, and autonomy, learning how that contributionRead MoreEvolution Of Society s Social Values925 Words à |à 4 Pagesseriously wrong.â⬠(Shlichta). How civilization views and interprets ethics and morals changes as we advance with time; the importance of the morality is at a decline, and will continue on a downward spiral as civilization advances. What are morals? How can one define the meaning of morality? Often the answers of those questions could easily be found online. Dictionaries would define Morality as the ââ¬Å"principles concerning the distinction between right and wrong or good and bad behavior.â⬠(The OxfordRead MoreDescriptive vs Normative Statements1298 Words à |à 6 PagesQuestion 1 To explain the distinction between Descriptive and Normative Statements one first has to understand the difference between Descriptive and Normative Ethics. Descriptive ethics primarily describes peopleââ¬â¢s moral beliefs, claims and behaviors. This form of ethics is studied primarily by psychologist, sociologist and anthropologist. With Normative ethics we deal with the attempt to discover what actions are in fact right or wrong, good or bad and what it takes to be a moral or immoral personRead MoreGreat Philosophers : Moral Knowledge1430 Words à |à 6 PagesLaurella Dotan 12/11/14 Great Philosophers Moral Knowledge Over the last several thousand years, ideas of what is acceptable, right, and moral have shifted and evolved. What one time period and place held as a moral truthââ¬âsuch as the acceptability of slavery due to a personââ¬â¢s skin colorââ¬âanother place and time views as a moral failing. How humans gain knowledge, and even the very nature of knowledge, have been hotly contested throughout the centuries, as philosophers have developed various theoriesRead MoreThe Moral Quality Of An Action901 Words à |à 4 Pagesambiguous for different people have various background and religion affect the way of viewing the duty they should take even though we all own the same senses. ââ¬Å"A good will is good not because of what it effects or accomplishes, nor because of its fitness to attain some proposed end; it is good only through its willing, i.e., it is good in itself.â⬠(AK394) Kant believes that the moral quality of an action is judged not according to the actionââ¬â¢s consequences, but according to the motive that producedRead MoreI Am Legend By Richard Matheson And R.u. R1351 Words à |à 6 Pages Morality, as defined by the Oxford Dictionary, is the set of principles concerning the distinction of right and wrong or good and bad behavior. While determining the difference between right and wrong may seem simple, morality is a complex idea that can be framed and developed in a number of different ways. The novels I Am Legend by Richard Matheson and R.U.R. by Karel ÃÅ'apek both examine the different ways in which moral beliefs can be developed and the possible implications of those beliefsRead MoreThe Adventures of Huckleberry Finn by Mark Twain843 Words à |à 3 PagesDespite all his adventures and decisions he has to make, Huck has a strong sense of morality. Discuss situations where Huckââ¬â¢s thoughts or actions show an awareness of justice. Morality is defined as the principles of concerning the distinction between right and wrong behavior. Morality plays an important part in everyday life and having a good set of ethics is extremely important. People are shaped by morals and they also help determine what is important to that certain individual. It not only definesRead MoreThe Murder Of Roger Ackroyd971 Words à |à 4 PagesMorality refers to an individual s principles on the distinction between doing what is right and wrong. Morals vary across cultures, but there are several that are universally agreed upon. In the perspective of Enlightenment thinkers, the approach to morality is by affirming objective, universal laws and expressing a moral ideal. [Lecture] However, who decides what is right and wrong and how are morals formed? According to David Hume, reason alone cannot determine morality because reason restsRead MoreTeaching Compassion in a World Were Compassion Is Lost677 Words à |à 3 Pages According to Arthur Schopenhauer ââ¬Å"compassion is the basis of all morality.â⬠This means that ââ¬Å"principles concerning the distinction between right and wrong or good and bad behaviorâ⬠(Google dictionary, morality) are developed by the ââ¬Å"sympathetic pity and concern for the suffering or misfortune of others.â⬠(Google dictionary, compassion) In the novel To Kill a Mockingbird we generally see this through the character Atticus Finch. Atticus demonstrates this when he pardons Bob Ewellââ¬â¢s threats toward
Wednesday, December 11, 2019
Mitsubishi Essay Example For Students
Mitsubishi Essay BackgroundRecruitmentWorkplaceDiscriminationLawsuitMediaResponseDefenseLeaveEndInterpretationConclusionRacial Discrimination?Japanese InterviewMitsubishi Japan Employment Discrimination CaseHi, I had the misfortune of working for Mitsubishi Electric in Japan, a few years ago. This is my story of a rare employment-related racial discrimination lawsuit I filed against them in their home country. This story is somewhat different. Medias version of it (below) will let you know some facts regarding this case and for those with patience and open minds to explore the truth, a different story will emerge after reading my account. First, let me introduce you briefly to my relevant background. I am a graduate of IIT Bombay (an IITian) and we are used commonly in the IT industry for developed countries like the USA and Japan. I am a permanent resident (Green Card holder) of the USA and it took me five years to get it. Normally, it used to take about 2 years. Moreover, as you can see from my GMAT scores that I have high verbal aptitude (left scores). (GRE scores were similar.)I was preparing for a career in financial sector. MBA + Actuarial exams with high scores + CFA and CFP exams. Was expecting to pursue that career after getting my Green Card. I didnt want to work for in the IT industry and most definitely didnt want to work for notorious Mitsubishi but I landed up in their Computer Works in Japan. Mitsubishi went on an aggressive recruitment process to hire me, apparently at the orders of its highest executives. The purpose you will find out soon. By the way, as most of us very well know, Japanese executive s in places like Mitsubishi have racial-superiority complex towards the rest of us, especially the non-Caucasians, and even though they try hard, most of them are unable to master a foreign language like English. Now you are all set to begin your journey. Note: Am adding more material to the other pages. A Case of Racial Discrimination?An Indian Worker Sues His Japanese Employerby Robert GuestFrom the credit Robert Guest is a British free-lance writer based in Hiroshima who contributes business and other articles to The Far Eastern Economic Review and The Independent. The Journal Issues in Bilateral Relations, November 1992 page 37-39 (A monthly publication of American Chamber of Commerce in Japan (ACCJ).) Permission pending. You are a foreign executive working for a major Japanese firm and you are sure that the company is giving you a raw deal simply because you are a foreigner. What can you do? Nothing has long been the answer. Theres no point in suing, continues this logic, because this is Japan, the famous non-litigious society, and your chances of beating a large Japanese company in a Japanese court are virtually nil. You shrug it off and go have a drink at your favorite watering hole. But all this could be changing now because of a lawsuit filed by an Indian exec against his Japanese employer Mitsubishi Electric. A software engineer from India named name removed has sued his employer for racial discrimination and harassment, marking the first such lawsuit ever filed in a Japanese court. If the Japanese company loses, the fallout may be felt in workplaces from Sendai to Shikoku. The plaintiff is alleging that whereas Japanese employees at Mitsubishi are given English-language lessons at company expense, and Caucasian staff are provided with the best Japanese-language teaching available, he has been given no assistance whatsoever in his efforts to learn the Japanese language. Sinha understood that his contract with the Japanese company was for life and that it specifically stated that he was to be treated equally with his Japanese colleagues. Since he has not been, name removed claims that this is a clear case of racial discrimination. .uaf74675f8f4042322f40d283c66856c1 , .uaf74675f8f4042322f40d283c66856c1 .postImageUrl , .uaf74675f8f4042322f40d283c66856c1 .centered-text-area { min-height: 80px; position: relative; } .uaf74675f8f4042322f40d283c66856c1 , .uaf74675f8f4042322f40d283c66856c1:hover , .uaf74675f8f4042322f40d283c66856c1:visited , .uaf74675f8f4042322f40d283c66856c1:active { border:0!important; } .uaf74675f8f4042322f40d283c66856c1 .clearfix:after { content: ""; display: table; clear: both; } .uaf74675f8f4042322f40d283c66856c1 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uaf74675f8f4042322f40d283c66856c1:active , .uaf74675f8f4042322f40d283c66856c1:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uaf74675f8f4042322f40d283c66856c1 .centered-text-area { width: 100%; position: relative ; } .uaf74675f8f4042322f40d283c66856c1 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uaf74675f8f4042322f40d283c66856c1 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uaf74675f8f4042322f40d283c66856c1 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uaf74675f8f4042322f40d283c66856c1:hover .ctaButton { background-color: #34495E!important; } .uaf74675f8f4042322f40d283c66856c1 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uaf74675f8f4042322f40d283c66856c1 .uaf74675f8f4042322f40d283c66856c1-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uaf74675f8f4042322f40d283c66856c1:after { content: ""; display: block; clear: both; } READ: Jobs Are Not For Everyone EssayThe implications of this case are enormous, according to name removeds lawyer, Satoshi Murata. If we win, he claims, Japanese companies are going to have to take the issue of racism in the workplace more seriously than has been usual up to now. If they lose, on the other hand, It is going to make it much less attractive for foreigners, especially Asians, to come to Japan looking for work. Given the gaping labor shortage, and the desperate need for foreign labor to fill the manpower gap,
Tuesday, December 3, 2019
Online Social Entrepreneurship
Executive Summary Social entrepreneurship involves business activities that are characterized by numerous charitable activities. This kind of a business is tied to primarily social objectives and not geared towards achieving profits. In the event that the business makes surplus profits, the excess is reinvested in the business or better still in the community as opposed to profits benefiting the shareholders.Advertising We will write a custom report sample on Online Social Entrepreneurship specifically for you for only $16.05 $11/page Learn More The proposal addresses poor peopleââ¬â¢s needs to access better health care services making use of information and communication technology processes. E-Health social enterprise is anchored on the key assumption that health management, information and communication technology are very crucial to the poor members of the society, just like other basic needs. Members of the society who are not computer literate n eed to learn and embrace the tools of information and technology in the health care services. E-Health provides the poor members of the society with quality and affordable health care services and addresses the environmental problems affecting them and generally cuts down the level of poverty in various parts of the world. The Social and Business Justification Africa is a continent where most of the nations are very poor and it will not be contradictory to state that it is the most deprived one, with nine of the ten most deprived countries being its part (Ali, 2010). Our e-health programme is intended to help people of such countries. But initially, we will be targeting people from Namibia and Botswana. We plan to make use of the internet facility in delivering our services. Through internet, we will be able to reach out to several people at a time. This will be done through social networking sites like Facebook, Twitter and LinkedIn. The benefit of using such sites is that even tho ugh we may contact only one person but indirectly, we will be reaching out to numerous people because the communications made will be available for anyone and everyone to read (Carr, 2001) Apart from the financial help, the people of Africa also urgently need medical aid. Their living conditions are very unhygienic and as such, epidemics keep on erupting. So a plan based on doing something towards improving the living conditions seems to be a better option.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Social Performance Target E-Health plans to reach out to the maximum possible natives of two developing countries of Africa by the first year of its operation. These two countries are Namibia and Botswana. If the E-Health social enterprise is successful in these two countries, then the plan can be applied to other developing countries. With this plan, E-Health plans to design a concept ual model that takes into account mortality and morbidity considering economic, social and political forces that determine resource allocation and management among the poor community members. E-health plans to invest in database and website development. The e-Health database will provide a platform to offer the best quality healthcare services, referrals and maintaining repeat customers. On the other hand, the website will make it possible to reach many desperate healthcare consumers across the globe (Reid, 1996, p.32). Evidence of the social end or environmental viability of the plan is supported by relevant case studies and theoretical frameworks and models. Relevant Case Study Vodafone e-Health case study for 2009 is relevant for this plan. The Vodafone case study focused on the areas of long-term health care management, healthy living and community clinics (Vodafone, 2010, p.1). Frameworks and models that support the integration of e-Health can be best analyzed by Freemium busin ess model that allows the poor not to pay for the healthcare services offered to them, while the rich members of the society are charged highly for these services. Evidence of Market, Technical and Financial Viability of the Plan These aspects can be analyzed through application of relevant case studies and theories. Like the Vodafone e-health 2009 case study, the plan is market viable in the sense that there are many poor people who are in great need of the social health care services.Advertising We will write a custom report sample on Online Social Entrepreneurship specifically for you for only $16.05 $11/page Learn More This group of people would form a large market base for the e-Health social enterprise. Besides, e-Health is equipped with sound technical knowledge that makes it possible to reach many consumers across the globe at a faster rate. E-Health social enterprise would also manage to gather financial support from major financiers such as Wo rld Health Organization (WHO), United Nations Educational Scientific and Cultural Organization (UNESCO) and World Trade Organization (WTO). In essence, health care delivery models that are clinically driven can be relevant for this plan because the information and communication technology tools are based on patient-centred care frameworks that make it possible to involve all the stakeholders in participative-decision making process. This ensures that financial resources are properly utilized since consumers who are involved in the decision making process are not likely to resist e-Health marketed services (Reid, 1996, p.29). The Need/ Requirement Poor people from the developing world face problems such as lack of quality and affordable health care services.This is because, healthcare facilities may be located far away from their homes denying them easy access to modern medicine. As a result, most of them rely on traditional medicaments to counteract most of the ailments that they su ccumb to. Other problems include: lack of access clean water for domestic use, proper sanitation, good transport and communication networks and low levels of education (Field, 1996, p.49). The majority of the most vulnerable people are located in the developing world, especially the African subcontinent. Due to that, the need for medication that is affordable to all will make it appropriate to establish an online social enterprise (E-Health).Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This E-health social enterprise will address health care problems in a wide geographical area since it is a global phenomenon that affects many people in the entire world and will mainly target the people of Namibia and Botswana in the African subcontinent. The Implementation Tools and Approach To provide its services to the people, the E-health social enterprise will need a team of doctors, nurses, pharmacists, environmentalists, voluntary workers and even IT experts. If governments of various countries want to contribute, they can do so by providing the organization with doctors and other health experts. Medical facilities and services can be airlifted to the required areas since road transport networks are poorly developed in these areas (Tidd, 2010, p.49).This can be analyzed under the software, hosting and web service options among others. E-Health can use File Transfer Protocol (FTP) and Web interface for enterprise web site hosting services. Comprehensive packages such as Jav a would be used to provide database support, and they can help in providing application development platforms that allow clients to write and install forum application scripts (Tidd, 2010, p.57). The main element of our E-Health programme is communicating people around the globe. One of the better ways to make such communications is the open source application. There are several open source applications available on the internet. These open source applications facilitate communications with different people and allow mutual co-operation within groups (Chandler). BitNami is one such open source application that is deployed to the GNAX cloud. Even though the service is nominally charged, the benefits are immense in the sense that we will be able to approach a bigger community. BitNami can be useful in providing E-Health consultations to the people of Namibia and Botswana and the people can also have the option of accessing health services and information related to various diseases. I t also has commercial application deployed in-house that can be chosen for e-health services. E-Health social enterprise plans to incorporate cloud computing in its data centre platform so as to get faster applications that are easier to manage and maintain. It will also facilitate the IT resources adjustment according to the unpredictable or fluctuating demands of the business (Field, 1996, p.62). The Vision, Mission and Strategy Here, the plan focuses on the targeted people of Namibia and Botswana, products/services offered and the means to deliver the offerings. The vision of e-Health social enterprise is to provide quality and affordable health care services to the customers. The mission is to deliver timely and affordable health care services to the customers with the best efficiency and reliability and the strategy is to target the people of Namibia and Botswana in the African subcontinent in order to offer them quality and affordable health care services. The services will be delivered online through internet websites and mobile phones, but customers who are located in remote areas can get airlifted medical services (Field, 1996, p.39). The Impact/ Social Performance Measures Under this plan, the social performance measurement framework and social performance targets are analyzed. This includes double bottom line, triple bottom line and balanced scorecard, which can be used in this plan. Among these, social performance measurement frameworks, the most appropriate one for the enterprise is balanced scorecard (Reid, 1996, p.48). The marketing approach based on social performance target is the balanced score card. The Business Revenue Model This part of the proposal analyzes some of the business and revenue models employed by the e-Health online social enterprise. E-Health online social enterprise plans to use tools such as the Business Model Canvas to create, deliver and capture values. E-Health social enterprise plans to get funding from World Health Org anizations (WHO) and donations from various Non-governmental organizations (NGOs). The enterprise will generate its revenue through medical fees and consultancy services. Other means of generating revenue for the enterprise include promotional campaigns using the firmââ¬â¢s website. For instance pharmaceutical industries can promote their products in the website and in the process generate revenue for the organization (Field, 1996, p.47). Moreover the organization can get grants from local NGOs and other humanitarian organizations. These bodies can choose to finance various operations of the E-Health social enterprise based on their interests. Occasional contributions from well wishers, social media and the governments of various countries can be other ways of generating revenue for the social enterprise. To kick start its operations, the organization can develop a good proposal to request funds from big Non Governmental Organizations. Some of the Non Governmental Organizations a re Ford Foundation from the United States of America, Hidaya Foundation from Pakistan, Aga Khan Foundation from Afghanistan, and Rockefeller Foundation from the United States of America. The Marketing Approach This involves the use of social media, public relations approaches and other marketing approaches. Social networks to be used by e-Health online social enterprise include facebook and twitter (James, 1984, p.56). The enterprise can might as well use other media channels such as real time television shows. Apart from the tradition public relations, the enterprise can make use of online public relations. The latter will be geared towards promoting the image and brand identity of the enterprise at the global scale. Other marketing approaches include building business relationships through alliances with other online e-Health social enterprises so as to give the business more strength in terms of human resources capital and finance to acquire more customers as well as maintaining the existing ones (Reid, 1996, p.39). In addition, the social enterprise can choose to publish newsletters and brochures occasionally which are accessible online and also in printed form. Moreover, help centres can be established in rural areas where people will be able to get more information about the services offered by the organization considering the fact that the level of education may be low in some of the rural areas. Application of the above means will try to make sure that the maximum possible number of people from the target areas (Namibia and Botswana) understand better the organizationââ¬â¢s core value and missions. The Required Team and the Mechanisms for Recruiting the Members Since this will be an online business, not many people will be required. But those required should be perfect in their respective fields. The first and foremost requirement is that they have the leadership qualities imbibed in them. They should know how to convince people. They should be logi cal in their talks with people. Initially, the team required shall consist of a limited number of people. They shall be experts in finance, business, projects and efficient leaders. Such people can either be sent, as a help, by governments of various nations or they can be recruited online, through social networking websites viz., Twitter, Facebook, LinkedIn, etc. Such networking sites are instrumental in providing useful information that is helpful to the employer as well as the employee. Both can benefit in the sense that the employer can read about the expected employeeââ¬â¢s qualifications and experiences and the employee in turn can read about the employerââ¬â¢s business (Doyle, 2011). The skills and competencies of members to be recruited in the team shall be carefully analyzed. The enterprise will also focus on selection and recruitment of the team members. Areas of key skills and competencies include strong analytical and communication. However, weakness can be witness ed in lack of ability to control emotion. Strong analytical and communication skills are very necessary in my team. Online channels such as career points and skill pages can be used in locating graduates with those skills. Besides, traditional channels that can be applied in the recruitment process include adverts in the local newspapers. Among these selection and recruitment processes, online chances would be the best for the enterprise (James, 1984, p.58). An Indication of Funding Requirements and Funding Source Options As for the funding requirements, a thorough study has to be done on the expenses to be incurred. The different account statements at the end of this report shall be helpful in understanding the details. The initial requirement of funds shall be those that pertain to purchase of furniture and equipment, building and the website. Other expenses can be taken care of from the sales revenue. The principals are planning to invest an amount of $41,750. From the given tabl e at Appendix 7, it is evident that an amount of $21,390 shall be required as loans from financial institutions and/or banks. A nominal figure of $10,020 has been taken as the initial sales figure. The amount is based on the case study that has been used in this report. It is understood that profits cannot be expected from the very first month. It needs great efforts. Gradually, by virtue of the efforts made by the employees, the sales figure has been shown increasing with each passing month. The expenses also differ on a monthly basis. It is noticeable that for the first year, the cash flow is continuous in the negative. This is a feature that is not usually witnessed in cash flow statements. The simple reason is that the income is less than the expenditure. The only major source of income shown is the online sales. The loan amount is negligible. Either the income should be increased or the expenditures should be curtailed. Moreover, in the first month, the major expenditure was un der the ââ¬ËDatabase and Websiteââ¬â¢ head. Since there was no initial capital available, the cash flow is seen in negative. To increase the income, it is a must to increase the online customers. This can be done by promoting the cause of our social enterprise on social networking websites like Facebook, Twitter, and LinkedIn, urging people to participate more for the noble cause. Apart from this, help can be received in the form of loans from various companies engaged in finances to social enterprises. One such company is Big Issue Invest. The company aims at providing working capital loans, among other features, to social enterprises (BigIssueInvest). It is noticed that by the year end, cash flow has improved but itââ¬â¢s still in the negative Second year onwards, the condition seems to be improving. The figures have been assumed to be on the moderate side. However, some figures have been calculated as per the approximate rates. Like the ââ¬ËEmployee Benefitââ¬â¢ ha s been taken to be half of the employee salary. The ââ¬ËPayroll Taxââ¬â¢ has been taken to be one sixth of the salary. As for the requirement of actual funds, it can be studied under a timeline, financial projections, overall funding requirements, and funding source options. The manager of the e-Health enterprise has to write down his expectations and preferences because a deal breaker may result from the simplest idea. It is essential to ask for references from similar projects, such references should be used to provide a record of questions that the chief executive officer wants to be answered. Moreover, the conversation should not be allowed to proceed in any direction. It is important to get information that is needed to make a decision. Additionally, the manager needs to spend time documenting the requirements so that the expectations are well conceived. For example, a six month project should not be allowed to go on for more than one year (Reid, 1996, p.57). When project managers are laying out their plans, it is usually a good idea to get information from the top management. Not necessarily talking about the small details of how the project would be managed during the engagement period (Tidd, 2010, p.48). Excellence could also be manifested in project leadership. The project manager must be a confident leader for his team and should be an individual who maintains control all the times. Project managers who have difficulties in making key decisions throughout the project period may fail to keep the top managementââ¬â¢s confidence high (Nijland, 2011, p. 63). E-Health project manager who does not keep project budget on target for effective resource management should be changed. It is known that project managers; manage tasks, critical paths, budgets and several Gant charts. The ability to efficiently and effectively manage resources has a direct bearing on the project staying within the allocated budget, which is a major determining factor in the success of a project. Likewise, the e-Health social enterprise project managers should check the project status weekly for update so that people can be held accountable to the duties that they have been assigned. A manager who focuses the budget regularly may prevent the project from delays. Focusing by managers should be based on what is known, what was known and future of the expectation. These change on a weekly basis depending on the progress details. An effective manager often informs his team by providing them with continuous update both on forecast and actual budget financial (Lawrence Weisz, 1998, p.37). Since Non-governmental Organizations are no-profit organizations, they are not allowed to have equity. It means that an NGO cannot offer any share in the profit in exchange of any financial assistance. The Non-profit Finance Fund arranges funds from various quarters like affluent people, companies engaged in social services and money lending companies (Ransom, 2008). The t able at Appendix 7 indicates the overall funding requirements. Plan of Action between 24 to 48 Months Period It is vital to develop an audit team that reviews the e-Health online social project after every short period during the project cycle. The audit team should be self- dependent without personal interest in the project. Auditing should be carried on project classification, collected data, advantages and disadvantages of carrying out the project, achievements and relevance of the managementââ¬â¢s priorities (Schà ¶n, 1983, p. 23). Finally, integrative management process that meets the priority, definition, scope, mission, budget schedules, and control must be prioritized. The manager of e-Health online social enterprise must set clear conditions for schedule, budget and tasks that must be achieved. A standard contract for the signature should be drawn to allow the contract consider all the obligations. The project needs good auditing that depends on appropriate processes, e ssential setting priorities, goals, schedules, project definition, supportive culture, and budgetary control for project implementation. The lessons learned from the process should be stored so that other customers can use it. Establishing processes for terminating projects that are not feasible help in achieving objectives and goals of the e-Health online social enterprise as argued by Tidd (2010, p.54). References Ali, M 2010, Poorest countries of the world, poorest nations by GDP per capita. Web. BigIssueInvest n.d., Finance for social enterprises. Web. Carr, NG 2001, The digital enterprise: How to shape your business for a connected world, Harvard Business Press, USA. Chandler n.d., Open source applications foundation. Web. Field, ME 1996, Telemedicine: A Guide to Assessing Telecommunications in Health Care, National Academy Press, Washington DC. Field, ME 1996, The Oxford Companion to Philosophy: New Edition, Oxford University Press, New York. James, S 1984, The Content of Soci al Explanation, Cambridge University Press, Cambridge. Lawrence, C Weisz, G 1998, Greater Than the Parts: Holism in Biomedicine, Oxford University Press, New York. Nijland, N 2011, Grounding eHealth: Towards a Holistic Framework for Sustainable eHealth Technologies, University of Twente, Enscheda. Ransom, D 2008, Starting up: Funding your social venture. Web. Reid, JA 1996, Telemedicine Primer: Understanding the Issues, Innovative Medical Communications, Billings, MT. Schà ¶n, D 1983, The Reflective Practitioner: How Professionals Think in Action, Basic Books, New York. Tidd, J 2010, Gaining Momentum: Managing the Diffusion of Innovations, Imperial College Press, London. Vodafone 2010, E-Health Case Study: Vodafone. Web. Appendix Appendix 1 Appendix 2 Appendix 3 Appendix 4 Appendix 5 Appendix 6 Balance Sheet for Second Year Appendix 7 Overall Funding Requirement This report on Online Social Entrepreneurship was written and submitted by user LaNu1t to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Wednesday, November 27, 2019
Theseus and Athens Essay Sample free essay sample
The metropolis of Athens ascribes its name harmonizing to fabulous traditional knowledge to Athena. the Goddess. and that it was founded by Sais. a indigen of Egypt. It is besides known that it was Theseus. boy of King Aegeus. who was responsible for doing the metropolis into a existent land. Harmonizing to Plutarch: ââ¬Å"Theseus suppressed offense and brought the indigens of Attica together into the first democracy. He saved the Athenian kids from the Minotaur. but his kidnap of the queen of the Amazons brought problem. and he ended his yearss in shame. â⬠ââ¬Å"The figures of myth are peculiarly of import in the self definition of the metropolis and its apprehension of the universe. because myths concern the distant yesteryear and can be retold in different ways. harmonizing to the illustrations that the society needs to pull from them. â⬠( Mills. 1 ) Athenian literature has plentifulness of it. The myth environing the birth of Theseus has different versions. We will write a custom essay sample on Theseus and Athens Essay Sample or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Theseus is considered as the great fabulous hero of Athens. Harmonizing to one version Poseidon. God of the sea. was his male parent and Aethra. girl of Pittheus. his female parent. However. more frequently Theseusââ¬â¢ male parent was known to be the Athenian male monarch Aegeus. Harmonizing to this version King Aegeus. the swayer of Athens wanted a boy who would be the inheritor to the throne. He hence went to the prophet at Delphi for advice. The prophet advised Aegeus to forbear from intercourse with all adult females outside Athens. It besides told him non to worry and sent him back to Athens with the direction non to unbrace his vino tegument until he returned place. On his manner back he visited his friend Pittheus in Troezan to confer with him. as he was considered to be a wise adult male and the words of the prophet seemed equivocal to Aegeus. Pittheus understood the significance of the prophet. and he deceived Aegeus. He got him rummy and so made him to lie with his gir l Aethra. who conceived that really dark. Aegeus. when he came to cognize that Aethra was pregnant through him set a blade and a brace of places under a big stone. He so gave her instructions that if she gave birth to a boy who could raise up the stone. the blade and places would be his. She was so to direct their boy to Athinais but she had to maintain this a secret from all. as he was frightened that if his brother Pallasââ¬â¢s 50 boies came to cognize about his boy. his sonââ¬â¢s life may be in danger. Aethra gave birth to Theseus. though Pittheus claimed that he was Poseidonââ¬â¢s boy as mythology says that Aethra after holding made love with Aegeus went to Poseidon that really dark and ballad with him. Theseus was therefore raised in his maternal grandfatherââ¬â¢s house at Troezan and he grew up to be a chap of huge bravery and intelligence. When Theseus came of age his female parent took him to the stone and told him about his male parent. Theseus could raise up the stone easy and taking the blade and the p laces he set off for Athens. It was customary to sail. but Theseus decided that he would travel on pes. On his manner Theseus encountered many brigands. These work forces were strong persons who had great strength and staying power. and they used these God given gifts inhuman treatment on others. They took great pride in bring downing hurt on others who were lame. Heracless had killed many of them and those who were afraid to meet him maintain out of his manner and when Hercules had no brigands to run and kill and the land of Greece appeared really peaceable Hercules had left Greece and had gone to Lydia. but when he was at that place no more. the brigands one time once more took to offense. Theseus knew all about these felons as Pittheus had told him about these brigands who waited on the roads to rob and kill their victims. therefore Theseus thought that it would be cowardly to take the ship and so he planned to travel by pes to bravely run into these brigands. He was charged with bravery and strength and wanted to follow in the footfalls of his cousin Hercules. He besides wanted to baptise his fatherââ¬â¢s blade with evil blood so that he might turn out to the universe his ain bravery and hence he started his journey as he had planned. The really first brigand he met was Peripethetes. or the Club- Bearer. as he was known. He killed him and from so onwards he used Periphetesââ¬â¢ nine as his ain arm. Next. met Sinnis. who was called the Pine-bender. because this was the manner he killed his victims. Theseus killed him the same manner without flexing the pines in any unreal mode. Therefore he demonstrated his natural power. The 3rd evil animal he killed was the Sow of Crommyon. She was really old and fierce. She was really a adult female robber who got this name because she was really foul and soiled and barbarian. Theseus being brave and brave hunted her out and killed her for Theseus believed that all brave work forces should run out the immorality and kill it. After killing the Sow of Crommyon. he met Sciron of Megera. Sciron of Megera was a well-known ill-famed robber who killed many travellers on the high manner near the seashore. He would command his victims to rinse his pess and while they were making so. h e would kick them down the drop. Theseus threw Sciron into the sea from the same drop. He so met Cercyon at Eleusis in a wrestle lucifer and killed him. Last of all before making Athens he killed Procrustes. He stretched Procrustes on the same bed of anguish. which he used for his victims. Therefore he made all the brigands suffer in similar mode as they did to their victims. Theseus arrived in Athens. his fatherââ¬â¢s metropolis and found it in pandemonium. It was divided into cabals. His male parent had married Medea who had fled fom Corinth and utilizing her socery she had promised to give Aegeus a boy. When Theseus arrieved at Athens Medea understood who he was and recognizing that her influence would now acquire over. planned to poison him. Thus she spoke ailment of him to Aegeus and influenced Aegeus to poison the immature adult male at a feast which would be given in his award. Theseus did non state his male parent who he was. preferring that his male parent discover for himself who he was. Now at the feast Theseus casually pulled out his blade. Aegeus acknowledging it stopped Theseus from imbibing the poisoned vino therefore salvaging his boy. Medea recognizing her influence was over fled back to Corinth. Aegeus. after oppugning his ain boy let it be known to the Athenians that Theseus was the inheritor to the throne. and as intelligence of his courage on his manner to Athens had already preceded him. the people of Athens were pleased to hold such an inheritor to the throne. Now when Aegeusââ¬â¢ brother Pallas and his boies heard about Theseus they openly revolted against Aegeus. and attacked him but Theseus rapidly defeated them killing many of them. Athenas and his staying boies fled from at that place. Now that Theseus was settled at Athens as its prince. he set out to salvage its people from all that were terrorising them. First of wholly he went to Marathon. to kill the immense bull. which was a menace to its dwellers. Theseus captured this bull and brought it back to demo it to its dwellers. Subsequently. he took the bull to Delphi. where he made of it a forfeit to Apollo. Very shortly. after his feat with the bull. aggregators from Crete came to take the seven misss and seven male childs. as Athens was required to direct them every nine old ages. Minos was king of Knossos in Crete. Many old ages ago. Aegeus had killed Androgeos. Minosââ¬â¢ boy. out of green-eyed monster because Androgeous had won all the events at the Penathenaic ( ââ¬Å"All-Athenianâ⬠) games and Aegeus was frightened that he would replace him as male monarch. so he had him killed. Minos attacked Athens to revenge the decease of his boy. and portion of the pact that ended this war was an understanding. This understanding was a testimonial. which had to be paid for the slaying of Androgeeus. the eldest boy of the King Minos of Crete. The Gods had punished the Athenians by directing down dearth. drouth and pestilence upon them. The prophet had said that the problems of the Athenians would stop merely if they appeased Minos. Minos instantly asked for the seven misss and the seven male childs to be send to Crete as a testimonial. There was much discontent among the Athenians as every Athenian who had a adolescent girl or boy had to take part in the draw which would make up ones mind who would be send as a testimonial. As Aegeus was non take parting in the draw there was a batch of unhappy grouching against Aegeus. Theseus therefore offered himself as one of the victims ; he declined to be in the lottery. The Athenians admired the bravery of Theseus and nil Aegeus would state or make could alter Theseusââ¬â¢s head. Theseus promised to kill the Minotaur. Aegus this clip kept white canvass on board the ship with the sole bid that the black canvass which were ever used on ship were to be changed to white if Theseus managed to kill the Minotaur. ââ¬Å"A considerable part of the myth of Theseus is devoted to his image as a young person on the brink of manhood. person who has yet to turn out himself as a her o. but the decease of his male parent makes him the male monarch of Athens. â⬠( Atkins. 113 ) When the ship arrived at Crete. Ariadne. the girl of King Minos. fell in love Theseus the minute she saw him. She gave him a ball of threading to tag his trail through the Labyrinth where the Minotaur lived. Theseus entered the Libyrinth with the ball of twine. found the Minotaur and killed it. Then he and all the other sureties managed to get away from Crete in the same ship that brought them. Ariadne accompanied them. On their manner they stopped at the island of Naxos. where Theseus abandoned Ariadne. go forthing her asleep at that place. He did this as Minerva had appeared to him in a dream and she warned him that Ariadne was betrothed to Bacchus. the wine-god. ( One can see in Italy the famed statue of Ariadne siting on the tiger of Bacchus. one of the finest pieces of sculpture in Italy. made by Danneker ) When the ship came in sight of Athens. Aegeus. who was on the sentinel saw the ship with black canvass. for everyone in their felicity of holding killed the Minotaur. forgot to replace the black canvass with the white canvass. When Aegeus saw the black canvass. he was grieved that bhis boy was no more and in his heartache he jumped off the drop and died. Theseus was really sad to larn of his fatherââ¬â¢s decease and that excessively on his history. He now became the King. His first measure was to garner the dwellers of Attica as one metropolis. He settled their differences and brought peace under one cardinal authorities. Earlier they were all spread out into cabals. The hapless readily accepted the new signifier of authorities and the rich were promised the terminal of monarchy and the debut of democracy for he said that the male monarch would now be no more than the commanding officer in head and the defender of the jurisprudence. All local tribunals were abolished and Athens was made the lone place of the authorities. and as promised he gave up his kingly powers. Harmonizing to Aristotle. Theseus was the first male monarch to organize a democracy. In order to happen out the hereafter of his new political program. which he put to pattern. he traveled to Delphi to confer with the prophet. The prophet gave him the reply: ââ¬Å"Many are the metropoliss which will stop by and be spun out of your ain. Therefore do non despair ; the float will traverse the violent ocean. â⬠He enlarged his metropolis by ask foring aliens to come and populate at that place. giving them the same civil rights as the citizens of the metropolis. Further he divided all the citizens into three groups. each group had their ain responsibilities and privileges. They were the husbandmans. the craftsmen. and the Lords. The husbandmans were the wealthy of the society. whereas the craftsmen were more in figure and the Lords had the prestigiousness. The Lords were in charge of the jurisprudence. the choice of the Judgess and the faith. Theseus therefore saw that there was a balance among the different groups in Athens. All this goes to demo that Theseus was the true laminitis of Athens the metropolis. He is a semi-historical figure. Athenians believed that Theseus was responsible for the fusion of the Athenian province. Earlier where there had been independent small towns of cabals. now it was as the Athenians called synoikismos or brooding together and they celebrated it ; at least in the 4th century and may be even earlier with a national vacation called the Synoikia. They justly attributed the beginnings of Athenian democracy to Theseus. Several folks were united and Attica became one province with Athens as its capital. In order to observe this juncture he instituted the festival of Panathenaea. This festival was in award of Minerva. It was different from other Grecian festivals for its main characteristic was a grave emanation in which the sacred robe of Minerva known as the Peplus was carried to the Panthenon. where it was suspended before the statue of the goddess. Choice virgins belonging to the noblest households of Athens embroidered this sacred robe. Both work forces and adult females participated in this emanation. The immature adult females carried baskets on their caputs. These baskets contained the sacred utensils. bars and all other things needed for the forfeits. Old work forces had olive foliages in their weaponries whereas the immature work forces carried weaponries. The fusion of Attika. nevertheless. was a gradual procedure. and Theseusââ¬â¢ function here and in the beginning of democracy can besides be understood as political myth. Theseus besides instituted the Isthmian Games. in award of Poseidon. after which he set out sailing the Black Sea. to see the land of the Amazons. These lustful adult females. when Theseus and his crewmans came in sight. brought them nowadayss of welcome. Theseus invited their queen. Antiope. to come aboard. and one time he had her. he set canvas at one time with Antiope. The war between Athens and the Amazons started. The Amazons traveled by land and after a really long journey they arrived at Athens. A bloody war was fought which finally ended in a draw. A peace pact was drawn and the Amazons left Athens. but many Gravess of the Amazons in Athens prove that this war took topographic point. Therefore Theseus renowned for his bravery and intellegence was a legendary hero of antediluvian Athens. His make bolding feats inspired his countrymen for coevalss. and made him a favourite of poets and dramatists and the stating ââ¬Å"Not without Theseus! â⬠became an emblem of Athenian wisdom and courage. The ruin of Theseus started with his friendly relationship with Perithous. Perithious wanted Theseus to befriend him and so he stole some cowss from around Marathon. Theseus went after him but when the two warriors met. they had no desire to contend and became friends and brothers in weaponries. When Perithous got married. Theseus attended the matrimony banquet. where some of the centaurs got drunk. Theseus joined Perithous and his people in trailing the centaurs out of the part. When Theseues was 50 old ages old. he went with Perithous to the temple of Diana at Sparta. where they saw Helen dancing. Helen was merely 12 old ages old so. She was excessively immature for matrimony but they abducted her. Though they were chased by armed work forces they managed to get away with her. They so agreed to swear to luck as to who should maintain her provided the victor would assist the other to win a bride for himself. As fortune would hold it Theseus won. and he sent Helen to his female paren t in Aphidane. and went with Perithous to Epirus to steal the girl of the male monarch. Pluto the male monarch had a Canis familiaris by the name of Cerberus. Pluto had proclaimed that anyone who wanted to get married his girl had first to contend his girl. When Pluto came to understand that they had no purpose of courting his girl but had come instead to nobble her. Pluto threw Theseus into prison and had Cerberus tear Perithous into pieces. Now all this piece when Theseus was absent from Athens. Menestheus. one of the Lords of Athens. began to stir up problem in Athens. He told the Lords that Theseus had removed the power they had in Athens and that they were now moving like his slaves in the metropolis. and to the hapless he said that Theseus was non a true Athenian and was merely giving them the psychotic belief of autonomy while in world he was governing over them. In the interim Helenââ¬â¢s brothers had reached Athens in hunt of Helen. The Athenians replied that they had no thought where Helen was. at this Castor and Pollux. Helenââ¬â¢s brothers decided to occupy the metropolis. Menestheus got the Athenians to welcome the Spartans as their wrangle was with Theseus and non with them. The brothers found out that Helen was with Theseusââ¬â¢s female parent. they rescued her and captured his female parent to be her retainer. Theseus was Plutoââ¬â¢s captive for a long clip. It happened that Hercules was going in Epirus and he visited Pluto. Pluto casually told him all about Theseus. Hercules was horrified and asked Pluto to let go of Theseus. Pluto therefore released Theseus. When Theseus returned to Athens. everything had changed and he realized that he would non be able to acquire back his kingship. Therefore he retired to Scyros where he died subsequently. Menestheus was king so and the Athenians did non care about Theseusââ¬â¢ decease. but the prophet at Delphi commanded that Theseusââ¬â¢ castanetss be brought back to Athens and an honest entombment be given to Theseus. The Athenians were non able to make so at that clip as the Scyros was hostile towards them. It was old ages subsequently when Cimon captured Scyros that he saw an bird of Jove clawing the land and it came to his head to delve at that place and hunt for the castanetss of Theseus. He found a casket of a adult male more than ordi nary size. and a bronze spearhead and blade. He took these on board his ship back to Athens. The Athenians were greatly delighted that at length the remains of Theseus were brought back. that their laminitis had come back. He was buried in the center of Athens and his grave is considered as a sanctuary particularly for the hapless for he remembered as a defender of the weak and the hapless. Plants Cited:
Sunday, November 24, 2019
Oil and Gas How Both Affect the Economy essays
Oil and Gas How Both Affect the Economy essays The economy is affected by many factors that determine if it is strong or weak. These factors have to do with buyers consuming goods and services and at what rate they do this. Do the goods and services that are consumed by people created wealth, jobs and a better overall economy for a country. Throughout history some economies have evolved faster and stronger than others. Policies that the government places on industry, technology and the environment can all affect the prosperity of an economy. Of the factors that affect economic growth the industry of Oil and gas is one that holds a stronghold in the world's and America's economy today. When evaluating the economic growth factor of economy and specifically oil and gas on must consider the following questions: What relationship does the factor have with the whole economy? How does this factor affect economic growth Is the factor a cause or effect of economic growth? what would the economy be like if there were significant problems with this factor? What relation does a central bank have to this factor? I will answer each of these questions in respect to how economy is affected by oil and gas. The economy in the United States today is greatly affected by oil and gas. When there are large reserves and an increase of active drills in respect to oil, the economy seems to receive a boost. This is because prices for such things like gas and oil fall and people are able to consume more gas at a lower price. There is more supply and prices fall, therefore people save money on gas and can consume other items in the economy. People working in these industries have more job openings and more jobs filled, therefore creating a lower unemployment rate and a higher national per capita income. The need for substitutes are not there so, consumers will consume oil and gas at a growing rate. Since, people use oil and gas for so many different things like heating there homes, driving...
Thursday, November 21, 2019
Developing An Authentic Productive Assessment Dissertation
Developing An Authentic Productive Assessment - Dissertation Example The paper tells that giving the students a feeling of pride in their work, like the mini diorama by displaying it for all to see and appreciate during a special occasion helps in the development of their self-esteem. Not to encourage external motivation, such an act provides internal satisfaction more because they would realize that their hard work and creativity becomes all worth it at the end. The fact that I scored mostly average to above average in this assessment validates my ideas of how a good authentic assessment should be. I am aware that the tasks develop a whole range of skills not only in literacy but in work habits, creativity, and planning. It also promotes communication and collaboration among the students as they share with each other their own ideas, thereby learning from each other. However, I must not be complacent because there is still much work to be done in the pursuit of an excellent authentic learning assessment. Going for further knowledge and information beyond what is available from the texts themselves and the insights of the students is another wonderful suggestion from one of my peers, as it develops research skills in the students. Thus far, I am glad that I was able to modify what could be a traditional assessment task to a more authentic one by giving the students opportunities to construct their own knowledge and communicate it to the whole class. I am sure that in doing so, I shall be able to engage the studentsââ¬â¢ interest in the task, and the positive experiences will heighten their learning.
Wednesday, November 20, 2019
International Business Essay Example | Topics and Well Written Essays - 1500 words - 7
International Business - Essay Example ote that the financial markets do not often work best when they are left alone and as such there shall be some intervention by the government in the form of regulations. This argument becomes more pertinent in the wake of current financial crisis which many believe is a direct result of a de-regulated and highly independent financial system. The globalization of finance therefore is something which is now considered as something which may not be entirely good for the national and international economies. There can be many reasons that have culminated into the present crisis and as such governments tackled this issue more swiftly. However, question still remains as to why such episodes of extreme crisis happened despite the fact that financial system was considered as safe and sound before the emergence of the crisis. Most apparent reason for the financial crisis was labeled as the sub-prime mortgage crisis which resulted into defaults by the sub-prime borrowers on their mortgage obligations with the financial institutions. The process of securitization further added the fuel to this whole drama because most of the financial institutions, through their special purpose vehicles, securitized their mortgage portfolios and tied the cash flows received from their subprime mortgage portfolio with that of the securitized securities. This mismatching of the cash flows therefore resulted into the credit crunch and extension of credit to private sector therefore was reduced causing the credit crunch and started the chain reaction for the current financial crisis. What is also significant to understand that the craze of securitization increased a lot as many countries started to use this process in potentially more speculative dimensions? The spreading of the securitization however, made this process more complicated and as such very few had the capability to understand as to how the process of securitization is interconnected with each other across the markets and what can
Sunday, November 17, 2019
Growth and Development Essay Example | Topics and Well Written Essays - 1250 words
Growth and Development - Essay Example Thus, it is a period when young people are out of their adolescence but are yet to attain the adult title. The age span for emerging adulthood ranges from 18 to 25 though this may be extended up to the age of 29. During this period, most young people are always struggling to put various components of their lives in order so that they can achieve the status of being referred to as adults. This paper will be a discussion of various issues as pertains to emerging adulthood. According to Arnett, 2004, ââ¬Å"during Emerging Adulthood, young people are in the process of developing the capacities, skills and qualities of character deemed by their cultures as necessary for completing the transition to adulthoodâ⬠. As such, it is an important period of life since most people going through it have the same aspirations. As a result, all of them have the same characteristics. Insatiability is one common characteristic that people in the emerging adulthood phase of life have. This is showca sed with the tendency of changing life plans. People between the ages of 18 to 29 can be observed to constantly change partners, jobs and even residences. This is because they often feel that they have to do much more than they have already achieved. This in turn gives them an aspect of insatiability. Identity exploration is another characteristic that most people in the Emerging Adulthood stage of life have. ... Along the same line, emerging adults will always delay responsibilities so that they can focus on themselves. Most of them tend to avoid marriage and parenting so that they can have all their time and resources to themselves. Self focus is what seems to be the most important thing to them at during this time (Arnett, 2004). Feeling caught up in between is another characteristic common with emerging adults. This is due to the fact that most of them feel that they are more independent and mature than when they were adolescents t at t same time feel that they are not fully accomplished to be referred to as adults. Lastly, most people in the above age bracket always have a very optimistic view of the future with the belief that they will accomplish all that they have set out to do and eventually become what they would want to be (Arnett, 2004). These are the characteristics that most people in this phase of life irrespective of culture and financial capability have. Generally, the period of emerging adulthood is different from the adolescent and early adulthood phase due to the fact that the reality of emerging responsibility finally begins to dawn on these individuals. During adolescence, people are not responsible of their actions but simply do what will be acceptable in the eyes of their peers. They do not fear rebellion and do not listen to what their parents say. Their decisions are dependent on how their peers will judge them and the aspect of being financially independent does not bother them. They are minors and still live at their parentââ¬â¢s home and are experiencing the physical changes of puberty but people in the emerging adulthood phase have already reached full reproduction maturity. On the other hand, adulthood is characterized by
Friday, November 15, 2019
K-degree-l-diversity Anonymity Model
K-degree-l-diversity Anonymity Model Abstract Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node reidentification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer oneââ¬â¢s private information if a group of nodes largely share the same sensitive labels (i.e., attributes). In other words, the label-node relationship is not well protected by pure structure anonymization methods. Furthermore, existing approaches, which rely on edge editing or node clustering, may significantly alter key graph properties. In this paper, k-degree-l-diversity anonymity model that considers the protection of structural information as well as sensitive labels of individuals. A novel anonymization methodology based on adding noise nodes has proposed. New algorithm by adding noise nodes into the original gr aph with the consideration of introducing the least distortion to graph properties. Most importantly, completed the rigorous analysis of the theoretical bounds on the number of noise nodes added and their impacts on an important graph property. Extensive experiments used to evaluate the effectiveness of the proposed technique. Introduction The complexity of current software systems and uncertainty in their environments has led the software engineering community to look for inspiration in diverse related fields (e.g., robotics, artificial intelligence, control theory, and biology) for new ways to design and manage systems and services. This endeavor, the capability of the system to adjust its behavior in response to the environment in the form of self-adaptation has become one of the most promising research directions. The ââ¬Å"selfâ⬠prefix indicates that the systems decide autonomously (i.e., without or with minimal interference) how to adapt or organize to accommodate changes in their contexts and environments. While some self-adaptive system may be able to function without any human intervention, guidance in the form of higher-level objectives (e.g., through policies) is useful and realized in many systems. The landscapes of software engineering domains and computing environments are constantly evolving. In p articular, software has become the bricks and mortar of many complex systems (i.e., a system composed of interconnected parts that as a whole exhibits one or more properties (behaviors among the possible properties) not obvious from the properties of the individual parts). The hallmarks of such complex or ultra-large-scale (ULS) systems are self-adaptation, selforganization, and emergence. Engineers in general, and software engineers in particular, design systems according to requirements and specifications and are not accustomed to regulating requirements and orchestrating emergent properties. Ottino argues that the landscape is bubbling with activity and engineers should be at the center of these developments and contribute new theories and tools. In order for the evolution of software engineering techniques to keep up with these ever-changing landscapes, software engineers must innovate in the realm of building, running, and managing software systems. Software-intensive systems m ust be able to adapt more easily to their ever-changing surroundings and be flexible, fault-tolerant, robust, resilient, available, configurable, secure, and selfhealing. Ideally, and necessarily for sufficiently large systems, these adaptations must happen autonomously. The research community that has formed around self-adaptive systems has already generated many encouraging results, helping to establish self-adaptive systems as a significant, interdisciplinary, and active research field. Self-adaptive systems have been studied within the different research areas of software engineering, including requirements engineering, software architecture, middleware, and component-based development; however, most of these initiatives have been isolated. Other research communities that have also investigated self-adaptation and feedback from their own perspectives are even more diverse: control theory, control engineering, artificial intelligence, mobile and autonomous robots, multi-agent systems, fault-tolerant computing, dependable computing, distributed systems, autonomic computing, self-managing systems, autonomic communications, adaptable user interfaces, biology, distributed artificial intelligence, machine learning, economic and financial systems, business and military strategic planning, sensor networks, or pervasive and ubiquitous computing. Over the past decade several self-adaptation-related application areas and technologies have grown in importance. It is important to emphasize that in all these initiatives software has become the common element. That enables the provision of self-adaptability. Thus, it is imperative to investigate systematic software engineering approaches for developing self-adaptive systems, which areââ¬âideallyââ¬âapplicable across multiple domains. Self-adaptive systems can be characterized by how they operate or how they are analyzed, and by multiple dimensions of properties including centralized and decentralized, top-down and bottom-up, feedback latency (slow vs. fast), or environment uncertainty (low vs. high). A top-down self-adaptive system is often centralized and operates with the guidance of a central controller or policy, assesses its own behavior in the current surroundings, and adapts itself if the monitoring and analysis warrants it. Such a system often operates with an explicit internal representation of itself and its global goals. By analyzing the components of a top-down self-adaptive system, one can compose and deduce the behavior of the whole system. In contrast, a cooperative self-adaptive system or self-organizing system is often decentralized, operates without a central authority, and is typically composed bottom-up of a large number of components that interact locally according to simple rules. The global behavior of the system emerges from these local interactions. It is difficult to deduce properties of the global system by analyzing only the local properties of its parts. Such systems do not necessarily use internal representations of global properties or goals; they are often inspired by biological or sociological phenomena. Most engineered and nature-inspired self-adaptive systems fall somewhere between these two extreme poles of self-adaptive system types. In practice, the line between these types is rather blurred and compromises will often lead to an engineering approach incorporating techniques from both of these two extreme poles. For example, ULS systems embody both top-down and bottom-up self-adaptive characteristics (e.g., the Web is basically decentralized as a global system, but local sub-webs are highly centralized or se rver farms are both centralized and decentralized). Building self-adaptive software systems cost-effectively and in a predictable manner is a major engineering challenge. New theories are needed to accommodate, in a systematic engineering manner, traditional top-down approaches and bottom-up approaches. A promising starting point to meet these challenges is to mine suitable theories and techniques from control engineering and nature and to apply those when designing and reasoning about self-adaptive software systems. Control engineering emphasizes feedback loops, elevating them to firstclass entities. In this paper we argue that feedback loops are also essential for understanding all types of self-adaptive systems. Over the years, the discipline of software engineering strongly emphasized the static architecture of a system and, to a certain extent, neglected the dynamic aspects. In contrast, control engineering emphasized the dynamic feedback loops embedded in a system and its envi ronment and neglected the static architecture. A notable exception is the seminal paper by Magee and Kramer on dynamic structure in software architecture, which formed the foundation for many subsequent research projects. However, while these research projects realized feedback systems, the actual feedback loops were hidden or abstracted. Engineering Self-Adaptive Systems through Feedback Loops 51 Feedback loops have been recognized as important factors in software process management and improvement or software evolution. For example, the feedback loops at every stage in Royceââ¬â¢s waterfall model or the risk feedback loop in Boehmââ¬â¢s spiral model are well known. Lehmanââ¬â¢s work on software evolution showed that ââ¬Å"the software process constitutes a multilevel, multiloop feedback system and must be treated as such if major progress in its planning, control, and improvement is to be achieved.â⬠Therefore, any attempt to make parts of this ââ¬Å"multiloop feed back systemâ⬠self-adaptive necessarily also has to consider feedback loops. With the proliferation of self-adaptive software systems, it is imperative to develop theories, methods and tools around feedback loops. Mining the rich experiences and theories from control engineering as well as taking inspiration from nature and biology where we can find systems that adapt in rather complex ways, and then adapting and applying the findings to software-intensive selfadaptive systems is a most worthwhile and promising avenue of research. In the remainder of this paper, we therefore investigate feedback loops as a key aspect of engineering self-adaptive systems. Outlines basic principles of feedback loops and demonstrates their importance and potential benefits for understanding self-adaptive systems. Control engineering and biologically inspired approaches for self-adaptation. We present selected challenges for the software engineering community in general and the SEAMScommunity in pa rticular for engineering self-adaptive computing systems. Existing system In Existing system forced by the recognition of the need for a finer grain and more personalized privacy in data publication of social networks. In this paper we implement privacy protection scheme that not only prevents the disclosure of the disclosure of selected features in users profiles and also for identity of users. The features of her profile she wishes to conceal by an individual user can select. The users are nodes and features are labels in social networks are modeled as graphs. The Labels are denoted either as non-sensitive or sensitive. In Existing system the background knowledge an adversary may possess, as sensitive information that has to be protected in both node and labels To allow for graph data to be published in a form such that an adversary who possesses information about a nodes neighborhood cannot safely infer its identity and its sensitive labels in this we present privacy protection algorithms that. The goals of these algorithms transform the original graph into a graph in which nodes are sufficiently indistinguishable in these algorithms are designed. While losing as little information and while preserving as much utility as possible. The algorithms preserve the original graphs structure and properties thatââ¬â¢s why we evaluate empirically the extent to which. In Existing system that our solution is, efficient, scalable and effective and while offering stronger privacy guarantees than those in previous research. Proposed system k-degree anonymity with l-diversity to prevent not only the reidentification of individual nodes but also the revelation of a sensitive attribute associated with each node. If the k-degree-l-diversity constraint satisfies create KDLD graph. A KDLD graph protects two aspects of each user when an attacker uses degree information to attack A novel graph construction technique which makes use of noise nodes to preserve utilities of the original graph. Two key properties are considered: Add as few noise edges as possible. Change the distance between nodes as less as possible. The noise edges/nodes added should connect nodes that are close with respect to the social distance. There exist a large number of low degree vertices in the graph which could be used to hide added noise nodes from being re-identified. By carefully inserting noise nodes, some graph properties could be better preserved than a pure edge-editing method. MODULES Data Collection. Reduce Node Degree. Add Node Degree. Add Noise Node. 1. DATA COLLECTION In this module the employee data is collected. Each employee has unique Id, Name and Sensitive Label Salary. Each employee links with number of other employee. Based on the employee data construct the Social Network Graph: a social network graph is a four tuple G(V, E, ÃÆ', à » ), where V is a set of vertices, and each vertex represents a node in the social network. is the set of edges between vertices, ÃÆ' is a set of labels that vertices have maps vertices to their labels. 2. REDUCE NODE DEGREE For any node whose degree is larger than its target degree in Pnew, decreasing its degree to the target degree by making using of noise nodes. 3. ADD NODE DEGREE For any node whose degree is smaller than its target degree in Pnew, increasing its degree to the target degree by making using of noise nodes. For each vertex u in G which needs to increase its degree, to make its degree reach the target degree. First check whether there exists a node v within two hops of u, and v also needs to increase its degree. Connect n with v. Since v is within two hops of u, connecting v with n will not change the distance between u and v. After this step, if nââ¬â¢s degree is bigger than the minimum degree in Pnew but does not appear in Pnew, recursively deleting the last created link until the degree of n equals to a degree in Pnew. Otherwise, leave n for processing and continue adding noise to u if u:d 4. ADD NOISE NODE In this module the noise node will added to the original data set. After that adding noise node add new degree for that noise node. For any noise node, if its degree does not appear in Pnew, some adjustment can happen to make it has a degree in Pnew. Then, the noise nodes are added into the same degree groups in Pnew. Conclusions In this paper, k-degree-l-diversity model has implemented for privacy preserving social network data publishing. Implementation of both distinct l-diversity and recursive (c, l)-diversity also happened. In order to achieve the requirement of k-degree-l-diversity, a noise node adding algorithm to construct a new graph from the original graph with the constraint of introducing fewer distortions to the original graph. Rigorous analysis of the theoretical bounds on the number of noise nodes added and their impacts on an important graph property. Extensive experimental results demonstrate that the noise node adding algorithms can achieve a better result than the previous work using edge editing only. It is an interesting direction to study clever algorithms which can reduce the number of noise nodes if the noise nodes contribute to both anonymization and diversity. Another interesting direction is to consider how to implement this protection model in a distributed environment, where diffe rent publishers publish their data independently and their data are overlapping. In a distributed environment, although the data published by each publisher satisfy certain privacy requirements, an attacker can still break userââ¬â¢s privacy by combining the data published by different publishers together. Protocols should be designed to help these publishers publish a unified data together to guarantee the privacy. Future Enhancement: Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. The label-node relationship is not well protected by pure structure anonymization methods. k-degree-l-diversity anonymity model that considers the protection of structural information as well as sensitive labels of individuals. Adding noise nodes into the original graph with the consideration of introducing the least distortion to graph properties.
Tuesday, November 12, 2019
Principal Agent Theory Essay
There are many settings in which one economic actor (the principal) delegates authority and/or responsibilities to an agent to act on his behalf. The primary reason for doing so is that the agent has an advantage in terms of expertise or information. This informational advantage, or information asymmetry, poses a problem for the principalââ¬âhow can the principal be sure that the agent has in fact acted in her best interests? Can a contract be written deï ¬ ning incentives in such a way that the principal can be assured that the agent is taking just the action that she would take, had she the information available to the agent? Solving this problem is a matter of some concern for patients dealing with their doctors, clients dealing with their lawyers, etc. It is also a crucial concern for business ï ¬ rms dealing with their employees. Especially in the twenty-ï ¬ rst century, employees are often hired precisely because they have information available that is unavailable to the managers of a ï ¬ rm, who changes or implements new ways of work (Innovation), making sure that employee expertise is put to work in the interest of the ï ¬ rm can make the difference between success and bankruptcyââ¬âas illustrated by the performance of Google Corporation and their success. Principal-Agent Theory The key common aspect of all those contracting settings is that the information gap between the principal and the agent has some fundamental implications for the design of the bilateral contract they sign. In order to reach an efficient use of economic resources, this contract must elicit the agentà ´s private information. This can only be done by giving up some information rent to the privately informed agent. Generally, this rent is costly to the principal. This cost or payment is what is known as Monitoring Cost, on which the Principal can limit divergences from his interest by establishing appropriate incentives for the agent and by incurring monitoring costs designed to limit the aberrant activities of the agent (Jensen, 1976, pg. 5). And just like in any other trade, the Principal is giving something in exchange of the actions and decisions of the Agent; we can say that the Monitoring Cost is an action with its own reaction:Bonding Cost. This is the Welfare the Agent is willing to take, on behalf of the Principal, to limit or restrict his own actions, therefore reducing the deviation from the Principalââ¬â¢s interests. These costs guarantee that the Agent will not take certain actions which would harm the principal or to ensure that the principal will be compensated if he does take such actions (Jensen, 1976, pg. 5). Nevertheless there will always be some divergence between the agentââ¬â¢s decisions and those decisions which would maximize the welfare of the principal. The equivalent of the reduction in welfare experienced by the principal as a result of this divergence is what we refer as the Residual Loss (Jensen, 1976, pg. 5). But as said on the beginning, this deal is because of a lack of information or expertise of the Principal in comparison with the Agent. This lead us to the Asymmetrical relationship. Asymmetrical relationship refers to the fact that the Agent may have more information than the Principal, leading to the fact that the Principal may not know to what degree are the actions of the Agent in the Principalââ¬â¢s own interests. Given the self-interest of the Agent, he may or may have not behaved as agreed (Eisenhardt, 1989, 61). Information is asymmetric because the agent, of course, knows which decision he is going to make (Spremann, 1987, pg. 4). This Asymmetrical relationship leads into a field of risk and uncertainty represented by the dilemma of Moral Hazard and Adverse Selection. Moral hazard is a situation where the behavior of one party may change to the detriment of another after the transaction has taken place. A party makes a decision about how much risk to take (Agent), while another party bears the costs if things go badly (Principal), and the party insulated from risk behaves differently than how it would if it were fully exposed to the risk. According to contract theory, moral hazard results from a situation in which a hidden action occurs. Bengt Holmstrà ¶m (1979) said this: It has long been recognized that a problem of moral hazard may arise when individuals engage in risk sharing under conditions such that their privately taken actions affect the probability distribution of the outcome. The non-observability of the agentââ¬â¢s action may then prevent an efficient resolution of this conflict of interest since a contract can never stipulate which action should be taken by the agent. In a moral hazard context, the random output aggregates the agentââ¬â¢s effort and the realization of pure luck. However, the principal can only design a contract based on the agentââ¬â¢s observable performance. Through this contract, the principal wants to induce, at a reasonable cost, a good action of the agent despite the impossibility to condition directly the agentââ¬â¢s reward on his action. In general, the non-observability of the agentââ¬â¢s effort affects the cost of implementing a given action. Moral hazard can be divided into two types when it involves asymmetric information (or lack of verifiability) of the outcome of a random event: Ex-Ante Moral and Ex-Post Moral. An ex-ante moral hazard is a change in behavior prior to the outcome of the random event, whereas ex-post involves behavior after the outcome. For example, in the case of a health insurance company insuring an individual during a specific time-period, the final health of the individual can be thought of as the outcome. The individual taking greater risks during the period would be ex-ante moral hazard whereas lying about a fictitious health problem to defraud the insurance company would be ex-post moral hazard. However, there is a second type of informational asymmetry which can also characterize principal-agent relationships. Adverse selection, anti-selection, or negative selection is a term used in economics, insurance, risk management, and statistics. It refers to a market process in which undesired results occur when buyers and sellers have. This is where the agent possesses some information prior to choosing an action which, if known by the principal, would influence the choice of action he would like the agent to make. The agent is then required to pass some message to the principal which depends on the ââ¬Ëprivate informationââ¬â¢ he has. Since the chosen effort, outcome and payoff to the agent may all depend on the message he transmits, the agent may have an incentive to misrepresent his information. The design of the contract will then have to take account of this problem of ââ¬Ëadverse selectionââ¬â¢. It is important to stress that, as adverse selection, moral hazard would not be an issue if the principal and the agent had the same objective function. Crucial to the agency cost arising under moral hazard is the conflict between the principal and the agent over which action should be carried out. Managing Innovation. First of all we have to define what is innovation. An Innovation is a new idea, which may be a recombination of old ideas, a scheme that challenges the present order, a formula, or a unique approach which is perceived as new by the individuals involved (Zaltman, Duncan, and Holbek 1973; Rogers 1982). As long as the idea is perceived as new to the people involved, it is an ââ¬Å"innovation,â⬠even though it may appear to others to be an ââ¬Å"imitationâ⬠of something that exists elsewhere. Included in this definition are both technical innovations (new technologies, products, and services) and administrative innovations (new procedures, policies, and organizational forms). Even though innovation is always progress, it does not mean that can fit on everyone or that everyone will be happy applying it, and more because it involves changes. When we are talking about innovation in an enterprise, managers have to deal with 4 problems. This problems are reflected in a variety of questions the CEOs often raised (Van de Ven 1982).: 1. How can a large organization develop and maintain a culture of innovation and entrepreneurship? 2. What are the critical factors in successfully launching new organizations, joint ventures with other firms, or innovative projects within large organizations over time? 3. How can a manager achieve balance between inexorable pressures for specialization and proliferation of tasks, and escalating costs of achieving coordination, cooperation, and resolving conflicts? From these questions we can find three of four different factors that related to the Principal-Agent Theory, as Google did and we will explain it, to succeed in the implementation of innovation.First, there is the human problem of managing attention, second, the process problem is managing ideas into good currency so that innovative ideas are implemented and institutionalized, and finally there is the structural problem of managing part-whole relationships, which emerges from the proliferation of ideas, people and transactions as an innovation develops over time. It is often said that an innovative idea without a champion gets nowhere. People develop, carry, react to, and modify ideas. People apply different skills, energy levels and frames of reference (interpretive schemas) to ideas as a result of their backgrounds, experiences, and activities that occupy their attention. People become attached to ideas over time through a social-political process of pushing and riding their ideas into good currency, much like Donald Schon (1971) describes.Schon also states that what characteristically precipitates change in public policy is a disruptive event which threatens the social system. Here is where the Principal enters, because he needs the new ideas, so he makes a deal (contract) with the Agent to get those ideas. He (Agent) needs to respect and fulfil the contract previously made, incurring the bonding costs, so think or adapt ideas. In some way, the Principal or the contract is the pressure who makes the Agent work. A more realistic view of innovation should begin with an appreciation of the physiological limitations of human beings to pay attention to non routine issues, and their corresponding inertial forces in organizational life (Van de Ven and Hudson 1985). This make us think on the psychological aspect of the human being. You can implement innovation in your company or to your life (or someone else), it will be a new thing and our attention will be all focused on it. But when exposed over time to a set of stimuli that deteriorate very gradually, people do not perceive the gradual changes- they unconsciously adapt to the worsening conditions. Suddenly we lose our focus on the innovation and we just keep doing the same routine without even thinking why. Organizational structures and systems serve to sort attention. They focus efforts in prescribed areas and blind people to other issues by influencing perceptions, values, and beliefs. Janis (1985) states that only the vigilance pattern generally leads to decisions that meet the main criteria for sound decision making. Vigilance involves an extended search and assimilation of information, and a careful appraisal of alternatives before a choice is made. Here is where the Leader enters, setting the way where all efforts should go to. Most of the times, these directions go around the customers needs or wishes, and the manager materialize them into the new goals, ideas or direction of the innovation.In Principal- Agent language, here is where we can find the monitoring cost, the Principal pay attention into the actions of the Agent and corrects if necessary, in case that the actions of the Agent go in a different direction as they had stipulate on the contract. Proliferation of ideas, people, and transactions over time is a pervasive but little understood characteristic of the innovation process, and with it come complexity and interdependence ââ¬â and the basic structural problem of managing part- whole relations. Transactions are ââ¬Å"dealsâ⬠or exchanges which tie people together within an institutional context. The relationship between the Principal and the Agent is a deal, a transaction. As the Principal wants a result but can not produce it by himself, puts him in the position of a transaction. The prevailing approach for handling this complexity and interdependence is to divide the labor among specialists (Agents) who are best qualified to perform unique tasks and then to integrate the specialized parts to recreate the whole. The objective, of course, is to develop synergy in managing complexity and interdependence with a deal design where the whole is greater than the sum of its parts, where both of them obtained what they were looking for. In search of that correct synergy, John R. Commons (1951), argued that transactions are dynamic and go through three temporal stages: negotiations, agreements, and administration. The deal between Principal- Agent has to be very flexible to succeed this, without being vague and confusing. Following Ashbyââ¬â¢s (1956) principle of requisite variety, learning is enhanced when a similar degree of complexity in the environment is built into the organizational unit. This principle is a reflection of the fact that both parts are dependant of the other (the main reason of the Principal- Agent relationship) but also a reflection of the need of being in the same ground of information, or at least on the same conditions of it (if not, there would be no deal and no need of each other). With this point and Management of Attention, the Principal can avoid and solve the problems and risk of Moral Hazard and Adverse Selection. Google case Talking about innovation and implementation, we can see Google. Google is the place to work according to Fortune magazine, which listed the top 50 companies to work for. Google appears as a top contender for most features, including unusual perks, cafeterias, health cover and work environment. Even Management guru Gary Hamel praised Google in his book The Future of Management, stating that more companies should adopt their system. The system ensures that interesting ideasââ¬âeven those that arenââ¬â¢t obvious fits for Googleââ¬â¢s capabilities or core business modelââ¬âreceive some degree of attention. Their management have 3 statements and the base of all of it: First, set and communicate clear criteria for how you make funding decisions. Make sure those criteria include quantitative elements (how big could the market be) and qualitative elements (how passionate are we about this). Second, create an ââ¬Å"idealâ⬠innovation portfolio that blends core improvements and new growth businesses. Finally, consciously seek ideas that provide ââ¬Å"uniqueâ⬠diversification by using a new channel, reaching a new customer, or creating a new revenue stream. Every developer has 20% of their time to work on any project they want, free time if you want to see it like that, but they have also to fulfil some goals, achievements and chores. they have freedom, but still, have some responsibilities that have to accomplish. Developers have to report to their managers that they had finished all of those chores. As long as they keep doing that, the deal or transaction still valid. About those 20% of free time, everything the developers creates, is property of the company, and still have to be approved by his manager, but have a complete freedom of the way of working and develop it. In exchange of that intellectual currency, Google give their employees not only their salary, but also a lot of benefits and rewards. For example Google offers include 100% health care coverage and onsite childcare facilities, also a rule at Google is that no staff member should ever be further away than 100 feet from a source of food. That doesnââ¬â¢t mean that they only have access to vending machines with junk food, or that the cafeterias give out quick, easy and grease-laden meals. Chefs of the highest calibre prepare range of meals, with unique variations on everyday meals. Macaroni and cheese, for instance, comes with wild mushrooms and truffles. In Google we see that the Principal-Agent and Innovation Management concepts and ideas applied. First of all, we have to begin with the need of the Principal, the motor of the transaction. Google needs to keep on the market via innovations and new products. To fulfil those needs, Google hires new development engineers, the Agents, to create those innovations. As Bonding Cost, Google offers the engineers a payroll and to take care of their life needs, such as health, food and, in some cases, housing as an equivalent of their intellectual currency. There is no way to eliminate the Residual Loss, but in Google they try to have the smallest one. They know they are asking a lot, but give a lot as well. As an example of that, Google tries to increase the welfare of their agents at all time more than any other company in the world, by giving them a greater payroll (incentive or Bonding cost) as exchange of actions, decisions and innovations that favors both parts. We can see here the vigilance that the Principal has over his Agent, the Principal does not have a total control over the Agent, but gives him some chores to do to keep him on track and to keep his ideas flowing. This vigilance or monitoring is what we can see as Monitoring Cost. Talking about Moral Hazard and Adverse Selection, Principal and Agent are always on the same track and in a lot of communication, making their bond flexible and healthy. As we said earlier, when both Principal and Agent have the same objective function, Moral Hazard and Adverse Selection, are not an issue. Great part of their success is because they understood for who are they working for: themselves. Google hires young people, not only because their potential and innovative ideas, but also because young people are the greatest part or their market. Young people working and developing tools for young people. Who understands better their needs as themselves! Conclusion Innovation is the goal of every enterprise and person in this world: we were born to improve in any moment. And even though, it is very difficult to create it or implement it. Thankfully, the Principal-Agent help us understand how some part of the human relationships work and how we can keep a healthy staff and also to remunerate them truly. Also it is important to denote that is impossible to know at all the time what the Agent is doing or going to do, but if you create the correct synergy, and set goals that will benefit both parts, the risk of a bad decision and therefore, the vigilance, can be almost eliminated and an ambience of trust is built. Something that surprise me itââ¬â¢s the fact that being in the same situation for a long time doesnââ¬â¢t helps the Innovation, when normally one thinks that this will create experience and knowledge enough to know how to change the method or create a new one to make it better. Bibliography Jean-Jacques Laffont & David Martimort; 2001;The Theory of Incentives:The Principal-Agent Model. Merton H. Miller; Kevin Rock;1985; Dividend Policy under Asymmetric Information; The Journal of Finance, Vol. 40, No. 4. (Sep., 1985), pp. 1031-1051. Ray Rees; 1985; THE THEORY OF PRINCIPAL AND AGENT:PART 2; Bulletin of Economic Research 37:2;1985. Andrew H. Van de Ven; 1986; Central Problems in the Management of Innovation; Management Science, Vol. 32, No. 5, Organization Design (May, 1986), pp. 590-607. Michael C. Jensen,William H. Meckling; 1976; Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure. Kathleen M. Eisenhardt; 1989; Agency Theory: An Assessment and Review. Klaus Spremann; 1987; Agency Theory, Information, and Incentives; pp. 3-38. Bengt Holmstrom; 1979; Moral Hazard and Observability; The Bell Journal of Economics, Vol. 10, No. 1, (Spring, 1979), pp. 74-91. Zaltman G., Duncan R., Holbek J; 1973; Innovations and Organizations. Rogers E.; 1982; Diffusion of Innovations. Schon D.;1971; Beyond the Stable State. Janis I., Groupthink; 1982; ââ¬Å"Sources of Error in Strategic Decision Making,â⬠in J. Pennings (ed.), Strategic Decision Making in Complex Organizations, Jossey-Bass, San Francisco, 1985. Commons J.;1951; The Economics of Collection Action. Ashby W. R.; 1956; An Introduction to Cybernetics.
Subscribe to:
Posts (Atom)