Sunday, January 26, 2020

File management

File management Developing a File Management System A filing system is developed by a good plan. Planning establishes direction and control it also ensures that everyone involved has a common understanding of purpose, goals and provides guidelines. Plan files in logical order- Assign responsibility Obtain support Collect information Analyze records Develop a filing system Implement system Train users Monitor implementation, follow up and revise system Assign Responsibility One person should be assigned the task for developing and coordinating a new filing system. This task usually falls to the person that is responsible for the documents. This may include Administration, Payroll/Financial Managers or Human Resource Manager. However there must be a Gatekeeper to control access to the information contained in the files. The Gatekeeper may implement the system or may supervise others in its implementation. The first step in developing or improving a filing system is to gain the support of the staff that will use the system. The support will legitimize the system and ensure the cooperation of all the office staff. Every member of the office must understand the purpose and scope of the project. Everyone should be involved in the process. The creator of a file may provide important insight useful during the analysis of the records. Office members can help determine which features or aspects of the present system work well and should be retained. Office members can also help identify specific problems within the present system that must be changed. Most importantly, involving others in the process makes them more amenable to using the system once it is implemented. Analyze Files Once files have been inventoried, they can be analyzed. Before a filing system can be designed, a thorough understanding of WHAT files are created, WHY they are created and HOW they are used is a necessity. An analysis begins with a careful consideration of the following questions: who creates the records who uses the records how often are various types of files used how long do files remain current how many people need access to the files which files are confidential are there legal requirements for retaining the files There are no set answers to these questions. Effective analysis requires that a common-sense approach be taken. The goal is to make a new system work, not just look good on paper. Analysis is the process of reviewing all information which has been collected, manipulating that information within the functional and operational requirements of the office, and then drawing conclusions. The most efficient and economical filing system is one that works well for the office and is easily understood by its users. Very often the simplest method is best. Final factors to bear in mind when establishing a filing system: ready identification and retrieval of individual files. Tools of File Analysis Classification is a tool of analysis. It is a method of sorting information into like groups. Identifying classification within the office and sorting files identified is the first step in the development of a filing system. The file classifications that are found in most offices are: Administrative files-document the internal administration and operation of an office Organizational files -document the relationship of an office with other offices and departments within Hogg Fuels Retention of Files A major consideration in the development of a filing system is the retention of the files. Retention schedules clearly state how long a file must legally be kept and whether the file is archival. Retention schedules also provide guidelines for moving files to inactive storage and for purging obsolete files. Managing correspondence and email Although correspondence may comprise only a small percentage of the total volume of files, it poses the most problems for many offices. Correspondence consists of unique documents which are often difficult to classify. Correspondence may consist of incoming and/or outgoing letters and memoranda. Classically, correspondence has been filed in chronological order. Retrieval depended on remembering the date of receipt or of transmittal. For many people this is very difficult. Information is rarely retrieved on the basis of occurrence. Email is similar to correspondence in many ways. Emails are sent or received based on date and time, not on content. This is one of the characteristics that make email so difficult to manage. Each email is different than the one sent before and will be different than the email sent after. Managing emails by date is rarely effective. Like correspondence, it is much easier to manage emails based on content or creator. Information is most commonly retrieved on the basis of content or creator. It is, therefore, most logical to file correspondence or email either by subject (with related information); by creator; by department from which it is received; or by department to which it is directed. It must be kept in mind that each office function is different, and it is necessary to tailor the management of correspondence files and email to respond to individual requirements. Completing the analysis Once the analysis is complete, a filing system can be developed. A filing system should be developed on paper before it is physically implemented. Folders should be sorted, on paper, into the appropriate classification. Within each classification files are sorted. Information without a specific retention period can be destroyed or should be managed separately. Unsolicited material can be destroyed. Arrangement Within each individual file they are arranged in an order best suited for rapid retrieval and disposition. The most common arrangements are: Alphabetic arranging records in alphabetical order is most helpful when records are retrieved by name or topic. However, it must be remembered that even the simplest alphabetic system requires establishing consistent and uniform filing standards. Chronological a chronological system is most useful for records that are created and monitored on a daily basis. Folders are arranged by sequential date order. It is, however, recommended that chronological filing be avoided. Retrieval can be slow and difficult as few people tend to remember dates accurately. The date of occurrence is rarely the basis for retrieval of information. Implement System There is no easy way to implement a new filing system. It is a very labor intensive task. If at all possible, it is recommended that the filing system be implemented in stages, by classificationone file at a time. Steps in the implementation process include: sorting paper files into classification assigning a physical location within the filing system to each classification re-labeling folders or creating folders to reflect the new file system if necessary, the purchase of new filing supplies/equipment Monitor implementation, follow-up and revise system After a test period meet with users to identify problems. Work with users to resolve inconsistencies and formulate implementable solutions. Written filing policies and procedures are useful tools which help ensure the success of the new system. Written policies should include: a brief statement describing the chosen system and its arrangement detailed procedures for the creation, maintenance, and purging of files procedures for the retrieval and re-filing of paper folders staff duties and responsibilities Written policies help ensure that the new system will be understood by all and will succeed. Filing Policy and Procedures Although many of the files we currently create may be electronic, we will always have to cope with paper files. This section includes basic information regarding the maintenance of active files. Processing information for filing check to see that the material is complete file the item in the front of folder if a folder does not exist, create a label for a new folder integrate the file into the system Sign-out Rules users check out folders, never individual documents Sign-out sheets are used to monitor the removal of the file Information on the sign-out sheet should include: file folder name borrower name date signed out date returned For convenience keep several sign out sheets in the front of each file drawer or on top of each file cabinet. For greater convenience, sign out sheets can be personalized for individual users. Sign out sheets personalized for an individual need only contain file folder title, date charged out, and date returned. (Appendix~1.0 Sample Sign-Out Sheet) Filing Supplies After determining a filing system for managing your paper records, it is important to choose appropriate supplies. Hanging folders Hanging folders are used to bring order to a drawer. They are effective only when used in the right circumstance. As hanging folders take up 1/3 of the available drawer space, they should be used only for files with high retrieval activity. Labels are used to facilitate identification of a folder and its contents. Visibility on the folder and use as a visual retrieval aid should be major considerations when choosing labels. Color coding is a method of identifying file folders within a filing system. Color, when used appropriately, can make misfiles visible at a glance, facilitate retrieval, and facilitate weeding and purging. Color is used as a visual aid to highlight a record series or the date. It can also be used to highlight a specific folder. Naming and Labeling Files For files, identification and labeling allows an office to maintain physical control over current files as well as manage growth of new files. When working with files two levels of file identification and labeling help simplify and facilitate filing and retrieval: drawer or shelf labels file folder labels

Saturday, January 18, 2020

Bullying and Its Effects on Individual’s Education

The purpose of the research in this work is to answer the question, â€Å"Does bullying effect an individual's education? First bullying will be defined in the perimeter of the educational environment. The author of this work takes the stance that bullying does most positively affect an individual in terms of their quality of education and in fact does continue to affect the individual who receives and even the one who perpetrates the bullying behavior. Inclusive in the research will be the stated ‘signs' of bullying behavior taking place, preventative measures that are stated to be effective, types of bullying behavior, and common myths surrounding those who are bullies. Some important facts about violence in schools are stated to be that first, that 1/3 of all injury death that occurs in the United States are due to intentional school violence. Interestingly, as violence has risen quite sharply in society it has also rise in schools and in areas surrounding and related to school. During the school years from September 1992 through May 2000 the National School Safety Center in their Report on School Associated Violence† (Education World, nd) Unhealthy relationships in the family and school personnel's' exposure to ‘violent television, films as well as games containing some of the elements that seem to contribute to violence in-school behavior. Bullying can take place both directly and indirectly. Bullying is defined as the repeated exposure to negative actions on the part of a student or even on the part of a group of students toward another individual. Stated as being inclusive in this behavior are the factors of aggressive behavior, intentional harm doing, it is done on a repetitious basis and occurs in a relationship on an interpersonal level â€Å"characterized by an imbalance of power.† (Colorado.edu Website, nd) The definition proposed by Tattum and Tattum (1992) states that â€Å"Bullying is the willful, conscious desire to hurt another and put him/her under stress? Therefore, the individual that desires to hurt another individual is a bully. But, those who are not in actuality bullies are those that think better of committing such actions. Bullying may be physical or it may occur on a psychological level. It is suggested by Olweus that an â€Å"imbalance of power† exists when bullying occurs and in fact contributes to the occurrence. As stated bullying behavior may be ‘direct' bullying or ‘indirect' bullying. Direct bullying is an open attack on the individual. Inclusive are physical attacks such as hitting, kicking, pushing, and choking. Attacking someone verbally or through harassment such as calling of names, threatening behavior, taunting behavior, teasing in a cruel and malicious manner, spreading rumors and slandering are all inclusive. Indirect bullying is often difficult to detect much more so than direct bullying. Indirect bullying is characterized by social isolation and social exclusion on an intentional basis, making faces and obscene gestures as well as manipulation of friendships and relationships. III. Common Myths Surrounding Bullying Myth 1: Insecurity and low self-esteem is suffered by bullies and they in turn pick on others towards the end of making themselves feel more secure. Fact: Self-esteem among bullies are average to above-average however they do have temperaments that are aggressive as well as a ‘lack of empathy and poor parenting.' (Starr, 2000) Myth 2: Bullies are looking for attention however; ignoring the bully will stop the behavior. Fact: control is what the bully seeks and they tend to cease their bullying when ignored however if adults do not address the issue of bullying the bully generally is propelled toward another level of bullying. Myth 3: Boys will act like boys. However bullies general remain bullies and eventually get involved in a life of crime. Fact: Of all those finishing middle school that are bullies sixty percent will have committed at least one crime by the age of 24. Fact: Outgrowing bullying does not actually occur but it is redirected by the individual doing the bullying. 60 percent of bullies will have committed a crime by the age of 24. Myth 5: Standing up for themselves is something that needs to be learned by victims of bullies. Fact: Bullies generally pick those who are younger or weaker to bully and those who don't have the skills on a social level for the development of friendships that are important and are unable to effectively deal with social situations on their own. Fact: Victims are generally chosen to be bullied due to their being â€Å"sensitive, anxious, and not likely or unable to retaliate, not due to differences on a physical level. (Starr, 2000) Myth 6: The environment in large classrooms and large schools are conducive to bullying. Fact: There has been no established link between the size of the educational facility and instances of bullying. In fact there is some research that contains findings that there is less and not more bullying in larger schools. Myth 7: The largest part of bullying occurs somewhere other than school grounds. Fact: Most bullying occurs on school grounds. Myth 8: Only a small number of students are affected by bullying. Fact: In the U.S. 25% of students are victims of bullying and 20% are bullies. It has been estimated by the National Association of School Psychologists that 160,000 children don't attend school each and every day to avoid being bullied. Myth 9: If bullying is a problem in the classroom the teacher is aware of it. Fact: Reports by the victims of bullying instances are done only reluctantly out of fear of being retaliated against, due to embarrassment and because most bullies tend to justify their behavior. Myth 10: Sticks and stones will break your bones but names will never hurt you is an adage that should be followed by victims of bullying. Fact: Problems that affect students for life are low self-esteem and depression as well as suicide and mental health issues. IV. Preventative Measures in Counteracting Bullying in School Four basic principles for prevention of bullying and victim problems are stated as follows: â€Å"Awareness and warm, positive involvement of adults inclusive of teachers, principals, school counselors, and parents.† (Safe Schools Fact Sheet, Colorado.edu) Set and stick to firm limits as to what behavior is unacceptable firmly stating that bullying is not allowed or acceptable in the school. Consistent application of â€Å"non-hostile, nonphysical negative consequences for rule violation and unacceptable behavior; and â€Å"Encourage adults to act as authorities and position role models in students' academic learning and social relationships in school.† (Safe Schools Fact Sheet, Colorado.edu) The Results and Outcomes of Bullying Behavior and Victims It is clearly without question that the victims of bullies have lifelong problems and issues that result from being bullied. Stated long-term effects on victims are that depression exists as well as low self-esteem. Clinical implications are stated to be a â€Å"risk factor for poor psychological health† (Rigby, 2003). The risk is stated to be greater if the â€Å"bullying is severe and prolonged and if the victim lacks adequate social support.† (Rigby, 2003) Further stated by Rigby (2003) is that â€Å"Various strategies or treatments may be considered to reduce the changes of a child' further involvement in bullying that may worsen the condition. These include assisting victimized children to develop self-protective assertiveness skills and working therapeutically with bullying children to establish a greater awareness of the consequence of their antisocial behavior.† Other findings are that victims of bullying behavior have higher rates of absenteeism than those who do not experience bullying at school. Long-term adjustment is also affected by being bullied at school as well as the victim of bullies developing an aversion to the environment of school. (Rigby, 2003) In Factsheet Number 18 entitled, â€Å"The Emotional Cost of Bullying† it is stated that bullying can affect the physical and mental health of a child in a serious way. Children who are bullied â€Å"lack confidence, feel bad about themselves, have few friends and spend playtime alone. They may find it hard to face going to school and difficult to concentrate on their work. They may complain of various physical symptoms as a result of their upset. They may worry and try to avoid going to school. Others become very anxious, find it hard to sleep and may feel depressed, or even suicidal. These problems can carry on long after the bullying has stopped.† (Factsheet #18, Mental Health & Growing Up)A large-scale study conducted in England and Wales found that children who suffer from being bullied are more likely to wet the bed and to not sleep well along with feeling irritable, nervous, and panicky after being bullied. Recurring memories of the incidences were stated by 32% of victims in the study and 29% of the victims found concentrating hard for them to do Interestingly the bullies also have long-term effects as well. Stated is that students who bully are also likely to engage in antisocial and delinquent behaviors such as vandalism, shoplifting, drug use, and truancy. This is particularly true of boys that bully. Bullies are also more likely (4 times more likely) to be convicted of crimes by the age of 24. Finally physical bullying is considered to be a risk factor on a moderate level for serious violence acts between the ages of 15 to age 25.

Friday, January 10, 2020

Emergency Preparedness Essay

Role of Public Health Personnel During the Franklin County disaster, there were numerous individuals that participated in the disaster response. Each member had a specific role in the Public Health Team. The Community Health Nurse was crucial in the efforts to assure that the residents of Franklin County were safe and their houses were repaired from the damages caused by the storm. By going door-to-door to asking questions from a prepared survey, the Community Health Nurse was able to better evaluate the needs of the residents and assess the level of coping that was necessary and report back to the team in order to rally support in order to mend the damage of the storm. Later the Community Health Nurse was able to provide support by offering assistance by phone through the disaster hotline, to support the residents and offer guidance of whom to contact for further assistance in matters that need to be attended further by individuals with certain specialties. Chain of Command In the Franklin County crisis, the team put an Emergency Operations Plan in place to establish a clear line of people in the chain of command. At the top of the chain of command was the County Emergency Manager as the Commander, followed by the Operations Chief, Logistics Chief, Financial and Administrative Chief and lastly the Planning and Intelligence Chief. While the Commander has his hands full he delegated responsibility to the Operations Chief to oversee the responsibilities of the Medical and Health Branch Director, the Community Service Branch Director, the Fire Branch Director, the Law Enforcement Director and the Public Works Director. The Public Health Group was supervised by the Medical Health Director. The Planning, Operations, Logistics, and Finance and Administrative Chiefs all reported to the Incident Commander. All tiers worked hard together to communicate the needs that needed to be accomplished in order to keep the residents safe during the Franklin County disaster. Resources During the door-to-door visits that the Community Health Nurse conducted, different scenarios presented that required outside resources the nurse was unable to complete herself. In order to meet the needs of the residents the  Community Health Nurse used her resources of Environmental Health Specialist for the first household she visited, in order to assist in the cleanup of a spill. For the second household the nurse was able to suggest a nearby shelter that could help the family with their needs until a visit from a social service worker could be set up. With the third family who spoke Spanish only, the nurse was able to use her limited communication to provide information for cleanup after the disaster. The nurse can also plan for an interpreter to join her on her next visit to provide more thorough details. And lastly for the fourth resident, the nurse was able to plan for him to evacuate to a shelter in order for him to obtain his blood pressure medication. The Community Health Nurse was able to use resources provided by the community of Franklin County in order to meet the needs of all the residents she visited. Actions of Community Health Nurse Although the Community Health Nurse was able to use appropriate resource to help the residents, she was faced with emergency situations prior to her being able to use those resources. In the first house the nurse encounter a potential chemical spill and had to advise the resident not to attempt to clean it up prior to inspection from a specialist to avoid being expose to toxins. The second household was in crisis following the disaster; the nurse was able to calm the mother down by providing support to the desperate parents by assuring that social services would make a visit soon in order to find way to reduce the families stress. At the third house, although the nurse was faced with language barriers, she was able to provide knowledge through pamphlets to educate the family about potential exposure due to their poorly ventilated house. And at the last house the nurse was able to assess the resident for hypertension and arrange for him to get his blood pressure medication at a local shelter nearby. Throughout all the home visits, the nurse was able to remain calm in order to provide all the residents reassurance in their time of crisis. Coping with Aftermath In the first house the nurse was able to help the resident cope with his basement flooding and chemical spill in his shed by providing adequate information regarding chemical spills and cleanup techniques. The nurse was also able to reassure the resident by arranging for a visit from the Environmental Health Specialist to evaluate the chemical spill. By doing this the stress and concern was lightened for the resident. In the second house, the stress level was high for the parents. The nurse was able to provide supplies for the infant and suggest evacuation for the family while their power remains to be out. In order to move on from this disaster the nurse arranged a visit from social services to provide support in order to cope with their stressful time. At the third household the nurse was able to keep the residents safe by providing information about keeping water and dietary needs safe. This calmed their fears of keeping their family safe and healthy in their home. For the last house, the nurse was able to assess the man’s blood pressure immediately to assure him good health and alleviate his stress level. She was able to further lessening his stress by getting the man to a safe shelter in order to get his blood pressure medications in order. Techniques To further the support during the door-to-door visits the nurse could have offered to help put together volunteers to help the resident with the basement cleanup in order to move out any heavy object in order to remove the stagnant water. In the second house, the nurse could have also offered to arrange childcare for a few hours in order for the parents to complete necessary tasks or receive a mental break to lessen their stress level. The nurse could have immediately retrieved a translator for the third house to immediately alleviate stress of the residents. An in the last house, the nurse could have arranged for the resident to have daily blood pressure checks for the following week to assure that the blood pressure regiment was successfully in order. Preparation of Nurses Luckily the small community of Franklin County was able to pull their resources together in order to provide adequate care and safety for their residents. Similar steps would need to be taken if this similar situation were to happen in a larger affected area. Similar chain of commands would need to be put into place immediately in order to delegate tasks to those in supportive roles. It would proactive to have these roles in place for the local, state and federal agencies. Preparations can be made with education of preparedness of protocols and training for any given crisis. Having the hospitals and local shelters aware of policies to put into place at the first sign of disaster will make the initial hours of the disaster more manageable. In order to lessen the anxiety of the communities, constant communication about preparation and evacuation plans is necessary in order to be able to work as a team when disaster strikes.

Thursday, January 2, 2020

Afro-American Music Essay - 560 Words

In Cornell West reading on Afro-American Music: From Bebop to Rap; West discussed three major points about Afro-American music. West also discuss on how Afro-American music alienated young people. Afro-American music, its rhythmic effects are meaningless with status quo according to West. Afro-American music is a reflection on Afro-American culture since the early times as slavery. According to West â€Å"First, the rise of the United States as a world power focused international attention more pointedly on native U.S. cultural forms and styles.† As the Untied States grew in power, so did Afro-American music came to be with a social freedom and linguistic wealth instead of pecuniary wealth. Example, Jazz with its melody and vocalization†¦show more content†¦Also, songs that influent the Afro-American community as the folk blue in 1900th to the 1950th southern blues and the smooth jazz 1990th change by recording industry. Motown was the main cause, which made Afro-American music boom cross the United States according to West. Motown was a recording companying build by Berry Gordy in 1958, which made black musicians, writers, singers and producers a phenomenal success. Since, Motown was establish, West say that Afro-American lost its music soul touch by artists as James Brown who made â€Å"I wanna know if it’s good to you† and †˜Losse Booty.† Also, the Temptations songs as â€Å"My girl† and â€Å"Since I lost my baby†, which absolutely had no heritage music as previous Afro-American music had for black religious, gospel and its soul. As Afro-American music grew so did Motown records, which became a so call â€Å"sell out† among the black community. Motown made Afro-American music from folk music about the spiritual struggle, personal empowerment, human rights and perseverance about the Afro-American community to a commercially market within the white American audience. According to West, Motown distort and produced music for Afro-American to dance: twist, jerk, boogaloo, philly dogShow MoreRelatedAfro American Music And Its Influences On America2128 Words   |  9 PagesAfro-American music has a rich history in the United States and is vital when considering American music in general. There is a disagreement among scholars whether Afro-American music and its distinctive styles have positively affected race relations in the United States. Its history is so large that there is no doubt that there were, and continue to be, both negative and positive effects among the population. It is important to examine th e entirety of black music in the U.S. from its African rootsRead MoreBrazil And Its Impact On America1872 Words   |  8 Pagesonly mined gold in Rio and surrounding areas, they also were responsible for building many of the beautiful sculptures and landmarks that remain today. African influence is present in many areas in the Brazilian culture. Some of these areas include music (such as samba festivals like carnival), religion, and food as can be seen in the cults of African deities of the candomblà © as well as the delicious appetizers sold by baianas on the streets of Salvador da Bahia. Because of the coerced migration ofRead More Maintaining Cultural Identity in the Face of Adversity Essay1445 Words   |  6 Pagesthe century, Sea Island Gullahs, descendants of African Captives, remained isolated from the mainland of South Carolina and Georgia. As a result of their isolation, the Gullah created and maintained a distinct, imaginative, and original African American Culture. Gullah communities recalled, remembered, and recollected much of what their ancestors brought with them from Africa†¦ - Prologue to Julie Dash’s Daughters of the Dust The people who settled in the United States from all over the worldRead MoreThe Black Of Black Arts Movement Essay2194 Words   |  9 Pagesartistic ideology that was developed from many Black Americans who desired self-determination and separation from the white community. Several of the artists who contributed to the Black Arts Movement included, but is not limited to, Leroi Jones, also known as Amiri Baraka, Larry Neal, Nikki Giovanni, and Sonia Sanchez. They sought to create art that spoke directly to the issues, needs, aspirations and sociopolitical rights of Black Americans. Overall, this movement is one of the most influentialRead MoreThe Black Freedom Movement of the 1950’s and 1960’s2001 Words   |  9 PagesFor my essay, I have chosen to discuss the statement â€Å"The Black Freedom Movement of the 1950’s and 1960’s captured the attention of millions†¦ As American Americans started streaming into American cities, or what American corporat ions call â€Å"†major markets† U.S. businesses sought to influence the consumption patterns of these increasingly important black consumers.† I have chosen to discuss this title because I believe it had an extremely rich and interesting background to it as well as being ableRead MoreThe Road For Discrimination Is Still A Work Of Progress2600 Words   |  11 PagesAlthough the road to discrimination is still a work in progress, we as African American are making great strides. There have been numerous acts, bill and movements over the years that have said or promised change only to be altered. They were meant to improve the lives of everyone, but was the better life meant for African American in the 1800’s up until now. The events and developments in this assignment will depict why there has to be continues effects to improve our way of life. It was the leadersRead MoreThe Importance Of Saving And Sharing The Heritage Of Our African Ancestors1688 Words   |  7 PagesAfricans carried within them first landing first in the Bahamas then to the Americas a rich tradition. What traits of our African ancestors installed in each of us that is shared among African Americans and African Bahamians. It is amazing the similarities of how the African were brought to the Bahamas and the Americans. When Christopher Columbus made land fall in the Bahamas on the island now named San Salvador, he found the land inhabited by what we call Arawak Indians that were thought to have arrivedRead More Dominicans And Afro-americans Essay944 Words   |  4 PagesIn America today, there is a large and diverse African-American population. Within this population, there are several ethnic groups. The other ethnic group similar to Afro-Americans is Dominicans. Not only are they both minorities, but they also look similar as well. Both Dominicans and Afro-Americans are originally from Africa, but their slave masters separated them into two different cultures. African-Americans was African slaves of Americans, and Dominicans were African slaves of the Spanish. HevesiRead MoreResearch: How did Cuba and Brazil Affect Popular Music, Culture and Dance in the 1940’s and 50’s?1305 Words   |   6 PagesBrazil affect popular music, culture and dance in the 1940’s and 50’s? A. Plan For Investigation How did Cuba and Brazil affect popular music, culture and dance in the 1940’s and 50’s? In this investigation I am going to establish what affects Cuba and Brazil had on popular music and dance. The first thing I’m going to do is discover how the music from Cuba and Brazil spread to America, the center of music. While doing my research I will be looking at what types of music were popular in CubaRead More Puerto Rican Music as Representation of Their History and Culture1423 Words   |  6 PagesPuerto Rican Music as Representation of Their History and Culture Puerto Rican music is an evolving art form that expresses Puerto Rican culture and identity. The development of Puerto Rican music is also a reflection of their history, both being complicated by several layers. Social, political, and economic conditions are all related to the musical expressions of Puerto Ricans (Glasser, 8). Puerto Rican migration to the United States and the culture clash experienced by migrants is another

Wednesday, December 25, 2019

Skeletal Muscle Contraction And Relaxation Is Vital For

Skeletal muscle contraction and relaxation is vital for voluntary body movements to occur. Skeletal muscles contract when myofibrils composed of actin and myosin slide past each other, which contracts the muscle by altering its length. The gastrocnemius muscle in Rana pipiens, which is attached to the sciatic nerve, can be stimulated to find threshold and maximal stimulus voltage. Once threshold is reached, contraction amplitude increases with stimulus voltage until the maximal voltage is reached, at which point it levels off. Altering the interstimulus interval can induce twitch summation in the gastrocnemius, leading to one combined contraction with a high amplitude. Increased stimulus frequency can be used to induce a tetanic†¦show more content†¦Twitches are the resulting contraction from the firing of an AP in muscles. Twitches are much longer than the APs themselves. Twitch recruitment uses external stimuli to determine the threshold and maximal voltages of nerves and muscles. Stimuli below the threshold voltage, or the minimum stimulus strength required to elicit an action potential, will not cause a muscle to twitch. Once threshold potential is determined, increased stimulus voltage will increase the contraction amplitude of the twitch until the maximal stimulus is reached. The twitch will not significantly increase in strength for any voltage above maximal. This is because at maximal stimulus voltage all motor units have already been recruited to contract. The gastrocnemius muscle has a far higher threshold and maximal voltage that the sciatic nerve due to its size and the number of motor units present in the gastrocnemius. Along with increasing stimulus voltage, contraction amplitude can also be increased through twitch summation. Twitch summation occurs when a muscle is stimulated twice in quick succession, so that the second twitch occurs before the first twitch has relaxed. The twitches then combine to form a stronger muscle contraction. T his process is made possible by the temporal relationship between a muscle’s AP and the resulting twitch, which is far longer in duration than the 1 ms AP that causes it. Due to the nature of skeletal muscle contraction, the length-tension relationship inShow MoreRelatedThe Body s First Line Of Defense And Protection1254 Words   |  6 Pagesand nightly bases. Starting from the outside and working inwards this paper will give you a basic rundown of how each system works. Then talk about how that system works with the other systems within the body. The eleven systems are; integumentary, skeletal, muscular, cardiovascular, endocrine, nervous, respiratory, lymphatic/immune, urinary, gastrointestinal, and reproductive. The integumentary system is the body’s first line of defense and protection. This is your skin, and it is the main part ofRead MoreUnit 5769 Words   |  4 PagesP2: Outline the four main tissue types such as Epithelial, connective, muscle, nervous. Tissues are groups of cells, which are placed together to achieve a common function. There are four main types of tissue: Epithelial, connective, muscle and nervous. Most of these tissues are found in our bodies, however the epithelial tissue is covered all over the surfaces of the body. Epithelial tissue This tissue covers the whole surface of the body and is specialised to form the covering or liningRead MoreThe Effect Of A 15 Concentration Of Creatine Phosphate On The Rate Contraction3055 Words   |  13 PagesPhosphate on the Percent Contraction of Glycerinated Rabbit Psoas Muscle Fibers Group 4 Saria Sultan Meghan Shmunes Prachee Patel General Biology III Laboratory. 81296.02 Fall 2013 ____________________________________________________________________________________________________ Abstract: The purpose of this study was to compare contractility of individual preparations glycerinated rabbit psoas muscle exposed to two different solutions known to cause muscle contraction. A standard contractingRead MoreFunction Of The Heart And The Structure Of Arteries, Veins And Capillaries2283 Words   |  10 Pagesbody via the circulatory system, supplying nutrients and oxygen to the tissues and removing carbon dioxide and other waste products. According to Louise Tucker arteries are thick walled, hollow tubes with a fibrous outer covering, a middle layer of muscle and elastic tissue. The functions of arteries are: †¢ Carry oxygenated blood away from the heart to the rest of the body †¢ Transport nutrients e.g. iron, zinc †¢ Main artery is the aorta Structure: †¢ Lumen, small passage †¢ Thick, muscular and elasticRead MoreDiseases and Immunization: Tetanus Infection1278 Words   |  5 PagesTetanus is an acute, potentially fatal disease that is characterized by generalized increased rigidity and convulsive spasms of skeletal muscles. The symptoms are caused by tetanospasmin, a neurotoxin produced by Clostridium tetani, an anaerobic bacillus, whose spores survive in soil and cause infection by contaminating wounds (Hassel, 2013). The spores enter the body through breaks in the skin, and germinate under low-oxygen conditions. Puncture wounds and wounds with a significant amount of tissueRead MoreHuman Body Systems Outline7161 Words   |  29 PagesThe Human Body Systems By Yash Dhayal, Mathew Nemet, and Tom Battaglini Table Of Contents Overview * Skeletal system - Functions and Parts * Muscular System - Types of Muscles * Integumentary System - Functions * Circulatory System - Parts of the Circulatory System * Immune System - Organs and Cells of he Immune System * Respiratory System - Parts of the Respiratory System * Digestive System * Urinary System * Endocrine System * Nervous System Overview *Read MoreEssay on Skeletal, Muscular Articular Systems3909 Words   |  16 Pages|Skeletal, Articular and Muscular Systems | |Human Anatomy Physiology Assignment 6 | |A short study of the human bodies skeletal, muscular and joint types. | Contents Read MoreThe Basic Difference Between Anatomy and Physiology6198 Words   |  25 Pagesthat orbit the nucleus. Molecule (MOL-e-kÃ… «l)The chemical combination of two or more atoms covalently bonded together. CellThe basic structural and functional unit of all organisms; the smallest structure capable of performing all the activities vital to life. TissueA group of similar cells and their intercellular substance joined together to perform a specific function. OrganA structure composed of two or more different kinds of tissues with a specific function and usually a recognizable shapeRead MoreCongestive Cardiac Failure6720 Words   |  27 Pagesconditions that may contribute to CCF are: ï‚ § High blood pressure 1 ï‚ § Myocardial infarction - where scar tissue hinders the normal working of the heart muscle ï‚ § ï‚ § ï‚ § ï‚ § Impairment of a heart valve Congenital defects of the heart Myocarditis – an inflammation of the muscular tissue of the heart (myocardium) Cardiomyopathy - a disorder of the heart muscle or myocardium, generally of unknown causes ï‚ § Endocarditis - an inflammation of the heart valves and the endocardium [Medicinenet (2009) p1] HeartRead MoreWhat Is Hypnosis?2003 Words   |  9 Pagesvarious writers’ concepts, The multistate phenomenon, five states of hypnotic features, will be addressed, (Karle Boys) as will Edmond Jacobson (1929) on the effects of muscle contractions between patients and the benefits of relaxation leading to the role of relaxation in hypnotherapy today and the use of progressive muscle relaxation techniques. Hypnosis goes back thousands of years to the Greeks and Egyptians. They used to put people in a trance-like state, to bring on dreams, so they could help

Tuesday, December 17, 2019

Breast Cancer Cancer And Cancer Essay - 2052 Words

Breast cancer Cancer is a broad term to describe a disease that the cells grow and invade the health cells in the body. Breast cancer starts in the breast and the damaged cells invade the surrounding breast tissue and can spread to other areas of the body. But if early detected as well as treatment most people are able to carry on living there life. [1] Cancer begins in the cells of the body, which is the basic building blocks of the tissue. sometimes the growth of the cells go wrong and thats when the build up of the cells happen and causes a lump in the tissue. Because the ducts are very tiny it can only hold a small amount of cells and by the cancer cells forming it causes the duct to split. once it is in the bloodstream this may lead to the cancer spreading to other parts of the body. The majority being 70-90% of breast cancer is called ductal breast cancer this is where the breast cancer begins in the ducts in the breast tissue. There is also other types of breast cancer such as lobular and triple negative which seem to develop from different cells in the breast. [2] Breast cancer is a serious issue in new zealand, Breast cancer is the second leading cause of death among women. About one in eight women are diagnosed with cancer in their life time. [3] according to the world health organisation breast cancer is the most common cancer known to women worldwide taking hundreds of peoples lives each year. Western scientific medicine. Western medicine is a termShow MoreRelatedBreast Cancer : Cancer And Cancer Essay1433 Words   |  6 PagesBreast cancer is a carcinoma that develops due to malignant cells in the breast tissue. Cancerous cells are more likely to produce in the milk-producing ducts and the glands, ductal carcinoma, but in rare cases, breast cancer can develop in the stromal, fatty, tissues or surrounding lymph nodes, especially in the underarm (Breast Cancer). For women, breast cancer is the most commonly diagnosed cancer and the 2nd leading cause of cancer death – behind skin cancer. While treatment or surgeries canRead MoreBreast Cancer : Cancer And Cancer1346 Words   |  6 Pagesinternational symbol for breast cancer support and awareness. Breast cancer knows neither racial boundaries nor age restrictions. Females of all ages and ethnicities can develop breast cancer and it is the leading most common cancer among women. Calling attention to this often fatal disease is important by su pporting its victims, families and friends of victims, as well as raising funds for breast cancer research. Though males are not immune from developing a breast cancer, for the purposes of thisRead MoreBreast Cancer : Cancer And Cancer Essay1711 Words   |  7 Pagesacknowledge the health beings of a women is quite scary knowing that in about 1 in 8 women in the U.S will develop breast cancer. By this year of 2016 going into 2017 there will approximately be 246,660 cases found. The 20th century is described to be the cancer century. One main cancer I wanted to talk about that has my full attention was breast cancer. The important ways of looking at breast cancer as a tremendous problem is because we are losing our women to this disease. Categorizing the main issues toRead MoreBreast Cancer : Cancer And Cancer946 Words   |  4 PagesSkylar Steinman Period 6 Ms. Jobsz 12 February , 2016 Breast Cancer It is commonly known that Breast Cancer is one of the most insidious diseases that mankind has had to deal with. With the discovery of the BRCA1( BReast Cancer gene one) and BRCA2 (BReast Cancer gene two) genes, breast cancer can be detected with a great amount of certainty on a genetic level in some women and men. 40,000 women and men die of breast cancer each year. Knowing this it is very important to try to detect the mutationRead MoreBreast Cancer : Cancer And Cancer1530 Words   |  7 Pagesâ€Å"Cancer† is the name for a group of diseases that start in the body at the cellular level. Even though there are many different kinds of cancer, they all begin with abnormal cell growth with the potential to invade or spread to other parts of the body. These abnormal cells lump together to form a mass of tissue or â€Å"malignant tumor†. Malignant means that it can spread to other parts of the body or Metastasize . If the breast is the original location of the cancer gr owth or malignant tumor, the tumorRead MoreBreast Cancer : Cancer And Cancer981 Words   |  4 PagesThe Grand Rounds Research Project: Breast Cancer To hear you have breast cancer can be a very shocking thing. â€Å"Besides skin cancer, breast cancer is the most common cancer diagnosed among women in America as of 2015† (breastcancer,2015). First step is to know what you are dealing with when your doctor believes you have cancer, you will want to know what cancer is and how your doctor can detect it. Next your doctor will go over different stages of breast cancer that will help come to a conclusionRead MoreBreast Cancer : Cancer And Cancer1714 Words   |  7 PagesBreast Cancer The twentieth century has often been called and known as the cancer century. The reason being is that throughout the century, there have been more than a hundred types of cancer discovered across the world. In addition to the discovery of these many cancers, there has been an enormous medical effort to fight all kinds of cancer across the world. In the early decades of the century, cancer was considered to be a fatal disease, resulting in a high number of deaths. Although manyRead MoreBreast Cancer : Cancer And Cancer Essay1741 Words   |  7 Pages Internationally, breast cancer is the most commonly diagnosed cancer and the leading cause of cancer related death amongst women. (CITE) Each year an estimated 1.7 million new cases are diagnosed worldwide, and more than 500,000 women will die of the disease. (CITE) According to (CITE), somewhere in the world one woman is diagnosed with breast cancer every 19 seconds and more than three women die of breast cancer every five minutes worldwide. (CITE) Breast cancer is a heterogeneous condition thatRead MoreBreast Cancer : Cancer And Cancer1372 Words   |  6 PagesBreast Cancer Disease Overview Breast cancer is a disease in which certain cells in the breast become abnormal and multiply uncontrollably to form a tumor. Breast cancer is the second most commonly diagnosed cancer in women. (Only skin cancer is more common.) About one in eight women in the United States will develop invasive breast cancer in her lifetime. Researchers estimate that more than 230,000 new cases of invasive breast cancer will be diagnosed in U.S. women in 2015. Cancers occur when aRead MoreBreast Cancer : Cancer And Cancer1471 Words   |  6 PagesBreast cancer Introduction to Breast cancer Breast cancer is one of the most common forms of cancer only surpassed by lung cancer. It involves a cancerous tumour located inside the breast but spreads if treatment is not administered. (Evert et al 2011) Breast cancer can be treated if diagnosed in its early stages but becomes progressively more difficult upon reaching more advancing malignant stages. Breast cancer can be confused with being a female only disease however both sexes suffer. According

Monday, December 9, 2019

Mnc Strategies For Growth And Innovation â€Myassignmenthelp.Com

Question: Discuss About The MNC Strategies For Growth And Innovation? Answer: Introduction The main of this research is to establish the advantages and disadvantages of outsourcing business functions. This would involve applying both qualitative and quantitative research designs and methodologies. However, the primary source of information will be content analysis. This will help in interpreting what other authors have written on the topic. There is no doubt that globalization has had a great impact on the business sector since its invention. The impacts range from creating a global platform for learning, changing attitudes among businessmen, communication, creating instant access to products and services. Business technology has grown to be the major facilitator and sustainer of economies in the contemporary society. It has helped some regions to be successful as well as helping others to survive hence transforming the manner in which business is carried out. Comparing the business sector today and how it was almost 20 years ago is like comparing day and night. Thanks to globalization, there has been a great revolution. Apart from increased sales and partnerships, it has created new platforms for conducting business. For example, outsourcing in business enables a business to obtain goods and services from suppliers through contract. This has both advantages and disadvantages. For example, it leads to better efficiency being that the company has time to focus on core business functions. On the other hand, the activity harbors hidden costs that threaten business profits. Project Objective The following are the objectives that the study plans to meet: To establish the advantages of outsourcing business functions To establish the disadvantages of outsourcing business functions To give reasons why businesses outsource functions. One of the ways in which this study will meet the above objectives is through literature review. The process enables one to understand what other authors have discussed regarding the topic and the gaps. Project Scope This project is limited to the outsourcing of business functions in a multinational organization. This is an enterprise that operates in many countries but is managed from one point; home country. A company that gets more than a quarter of its revenue from operations outside the home country is classified under MNC. Coca-Cola, BMW, and Total are among the most common MNCs globally (Elo 13). Through investing in other countries, MNCs have led to the growth of the host countrys economy, the flow of capital, development of infrastructure, the introduction of new technologies and creation of employment opportunities (Luca, 2015). Because of its nature of operating n many countries, a multinational organization is more prone to business functions (Wlliams, 2015). Therefore, for adequate information and better understanding, this study shall review articles and reports on the advantages and disadvantages of outsourcing business functions in multinational business organizations. Literature Review Several studies have been conducted to establish reasons for outsourcing business functions n organizations. While a section of them agrees that outsourcing is a noble course, there are people who do not agree and would not advise any serious business to explore the services of outsourcing business functions. Therefore, this section provides an analysis of what other authors have written regarding outsourcing business functions. Outsourced tasks According to statistics, the number of organizations outsourcing business functions has increased. For example, in the financial year 2016, private sector organizations spent $309 billion on outsourced business functions (Andelic, 2011). This was spent on various processes as shown in the following list: Finance and accounting Human resource management Legal procedures Apple Inc. is known for its partnership with Foxconn. The latter implements iPhone blueprint. This way, Apple saves money that would have been used had it employed people to do that. Apart from giving it time to concentrate on other core business functions like marketing, outsourcing business functions help Apple Inc., to improve quality in delivering products and services (Hattersley, 2017). Advantages of outsourcing business functions Outsourcing is a process of contraction another organization to provide products/services to a particular organization. It has been cited to save costs and time taken to perform tasks that could be carried out by another party at a less costly price (Clarkson, 2016). In this section, this study provides what other authors have written regarding the advantages of outsourcing business functions. It increases business efficiency. Many organizations have turned to outsourcing functions because it has been proven that outsourced functions are helpful, meaningful and essential to the general functioning of the organization (Ling, 2015). For example, if a company is consulted for recruitment and hiring, it ensures that those chosen are qualified based on skills and experiences. Similarly, it gives organizations time to focus on core business functions. Indeed, there are numerous tasks in business that need to be executed (MIchael, 2013). However, sometimes attending to them efficiently may be hard because of time constraints (Dhar, 2013). Therefore, if a business seeks the services of another group for some tasks, it gets adequate time to perform other equally important tasks. Conversely, outsourcing has hidden costs that threaten the potential of a company to make profits. Organizations use this method to reduce business expenditures like labor costs. However, outsourcing also involves additional expenditures on legal processes (Wlliams, 2015). Moreover, is that the cost of outsourcing is not normally included in the financial report, it is hard to assess the extent to which this process affects the organizations. Also, being that the process involves sharing of a companys sensitive and confidential information, there exist data security risks in outsourcing business functions (Touboulic, 2016). For example, when a company contracts a firm to design its products, it may have to provide information that could damage it when leaked to competitors (Elo, 2015). This can cost the company opportunities for making profits from its products. Additionally, outsourcing business functions may lead to a weak management in a particular business. The main role of the business management unit is to make decisions on critical aspects of the functioning of an organization (Allen, 2012). Being that outsourcing involves another organization making decisions on behalf of the company, it makes the latter lose control. Similarly, research has also shown that outsourcing business functions may not be successful because of difference in cultural values. Multinational organizations have been cited by most authors for preferring outsourcing (R Randall, 2014). In this situation, it may involve doing business with people from a different country with a different culture (Greenwood, 2013). A clash in culture threatens efficiency and productivity. Therefore, because of a difference in culture, outsourcing may not be as beneficial to a company as one would have hoped. Justification In business, it is not possible to perform all functions without compromising quality and maintaining the schedule. Hence it is necessary to issue roles to be performed by other organizations (Gruyter, 2015). For example, a business organization can contract another to train its employees at a cost. Similarly, it can use another consultancy firm to help develop marketing strategies (Boorman, 2016). Admittedly, outsourcing business functions seem as a relief to businesses. However, there have been concerns over the extent of which this is true. Being that outsourcing involves spending both time and resources (Dhar, 2013). This justifies the need for the research. Apart from establishing the advantages and disadvantages of outsourcing business functions, it also educates on the type of business rules to be outsourced (Graham, 2017). This can help business organizations in creating a plan for outsourcing business activities. Gap opportunities From the literature that was reviewed, it was clear that it inclined towards supporting that outsourcing business functions have both advantages and disadvantages. However, it was quite vague on the type of organizations that mostly outsource business functions. Further, there was not enough data on multinational companies that have outsourced business functions and incurred decline n profits. Hypothesis Outsourcing business functions increase quality, efficiency and focus on core business operations. However, it may lead to a company to lose control of the company, risk-sensitive confidential information contains hidden costs and depends on culture. Research questions The following are the questions considered to be important in tackling the topic on the advantages and disadvantages of outsourcing business function: What are the advantages and disadvantages of outsourcing business functions n multinational organizations? Why do businesses outsource business functions? Research Design The choice of the research design utilized in this study was informed by the nature of the data required in this case (Boorman, 2016). This section will contain a description of the qualitative research designs used in this study. Researchers have managed to develop various research designs like grounded theory, ethnographic studies, historical and case studies to be employed when conducting a qualitative research study. For this study to fully answer the two research questions stated above, it would be best to use the grounded theory and case study research designs. In the first instance, data collected shall be used to develop a theory. The Case study design will be used to collect information from top managers at Coca Cola offices. Information acquired here will be analyzed and interpreted to help in testing the hypothesis. Methodology This section presents details on the overall methodology used in carrying out the research exercise. The chapter also presents the sampling procedure which involves the research site, target population, sample study population with a clear explanation of the relationship between the sample population and the target population of this study. The chapter further provides the data generation techniques utilized in this study, data analysis, validity assessment criteria and the ethical considerations touched by the research before finally concluding the chapter Scholars have defined qualitative research as a process of inquiry of human or socio-economical problems which are founded on methodological traditions (Zahra, 2016). In the process of the study, the research seeks to answer questions on the what and how of the issue (Zahra, 2016). These questions help in limiting the study to a particular phenomenon, concept or problem. Also, they help the researcher establish the effects of the issue on stakeholders in a particular system (Clarkson, 2016) Employing this methodology will help arrive at the best conclusion based on the existing information and conditions connected with the advantages and disadvantages of outsourcing business functions. Therefore the research tools to be employed will be both primary and secondary sources. Approaches to reliability and validity The trustworthiness of the study will be arrived at through a comprehensive assessment by the research supervisor and the collective insights to be collected from different co-researchers who were actually fellow students. Each respondent that will participate in the study will be sampled and data collected from them using hand-picked instruments that are not general to all the respondents. This will ensure that each respondent uses the most appropriate data collection technique under the circumstances (Zahra, 2016). The researcher was able to identify the most relevant items for each one of the instruments that were utilized in the study. Sampling and sample size For the purpose of this study, random sampling will be employed. Because of the scope of the research, it was relatively cheaper, easy and manageable to meet Multinational organization leaders randomly and convince them to participate in the process of giving data. Data collection methods This study will use both quantitative and qualitative data. A close examination of the research questions informed the selection of the instruments that were used to solicit data from among the study population which comprised of shop owners, business people, taxi operators, and office workers. As such, this study utilized the triangulation method of data collection (John James, 2006). This involves using two or more research instruments in collecting the required data. The data collection tools to be used by the researcher include; content analysis, questionnaires, and interview schedule. The observation was carried out randomly without following any systematic order since the trends in business functions would in most cases be spontaneous. After obtaining permission, the questionnaires will be hand-delivered to the respondents in their respective offices/places of work. The objectives of the study will be clearly explained to the various respondents before allowing them a chance to respond to the questionnaires. These questionnaires were self-administered. There was a need to allow them the freedom to fix the questionnaires into their days schedule, given the busy nature of the time during which this study will be conducted. The questionnaires had both open-ended and closed questions and provided for standardized answers that are easy to compile. The interview method will also be used for a section of the respondents. They will be randomly interviewed and their responses tape recorded for the study. These interviews conducted on one- to- one basis. In essence, they enable a better understanding of the experiences of the respondents. Variables and specifications The following are the variables in the research: Here, the research will focus on the labor costs, efficiency, roles and outsourcing costs. Business organizations: From the literature review, t has been established that MNCs prefer outsourcing business functions. Therefore, this study will conduct interviews and questionnaires in Coca-Cola Time: The study will compare the time taken by a company to perform a task and by another outsourced company to perform the same. Research Limitations Some of the perceived limitations that I am likely to encounter in this study include: Lack of adequate time and other resources Financial constraints The lack of flexibility to use more methods Problems in terms of content or geography of the place Nevertheless, in spite of these limits, enough necessary steps will be taken to ensure the study still makes a worthwhile contribution to the business field. Time Schedule Conducting this research project will take a period of 5 weeks. This is because apart from taking time to review content on this topic, the researcher will also need to organize for interviews with managers of business organizations which outsourced functions. Criteria Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Introduce the topic on advantages and disadvantages of outsourcing business functions Forming research objectives, questions and hypothesis Organize literature to be used Review literature on the advantages and disadvantages of outsourcing business functions Identify research design, methodology and data collection techniques Accumulate data from questionnaires, interviews and content analysis. Data interpretation and evaluation Conclusion and recommendations for future studies Conclusion The purpose of this study was to give the advantages and disadvantages of outsourcing business functions. Here, we established that outsourcing leads to productivity, effectiveness, and enables businesses to focus on core business processes and conduct business in 24 hours. Conversely, outsourcing may lead to the management to lose control of the organization, hidden costs, risk data security and the difference in culture and pricing. The study utilized both qualitative and quantitative data collection methods. Therefore, it recommends that organizations conduct a cost-benefit analysis to establish risks involved. This is because outsourcing business functions sometimes end up making companies spend more thus leading it to make losses. References Allen, R. C. (2012). Technology and the great divergence : Global economic development since 1820. Journal of Economic History , 1-16. Andelic, G. (2011). The impact of Globalization on the Insurance and Reinsurance Market of Eastern Europe. South East European Journal of Economics and Business , 95-112. Boorman, K. N. (2016). Assumptions beyond the science: Encouraging cautious conclusions about functional magnetic resonance imaging research on organizational growth. Journal of organizational behaviour , 13-20. Clarkson, M. (2016). Communication training for scientists and engineers: A framework for highlighting principles common to written, orasl, and visual communication. Professional Communication Conference (IPCC) (pp. 1-8). IEEEInternational. Dhar, S. (2013). From outsourcing to Cloud computing: evolution of IT services. From outsourcing to Cloud computing: evolution of IT services , 20-45. Elo, M. (2015). Diaspora Networks in International business: A review of emerging stream research. Handbook on International Alliance and Network Research , 13-40. Graham, J. (2017, May 3). Apple iPhone sales slip on next-iPhone hype. Retrieved May 18, 2017, from USA TODAY TECH: https://www.usatodaytech.com Greenwood, M. (2013). Ethical analyses of HRM: A review and research agenda. Journal of Business Ethics , 355-366. Gruyter, D. (2015). Starbucks Marketing Analysis. Journal of Case Research in Business and Economics , 220-253. Hattersley, L. (2017, 20 January). The 17 best Apple ads of all time: Funny, weird and embarrassing Apple adverts. Retrieved May 18, 2017, from Mac World: https://www.macworld.co.uk Ling, J. H. (2015). Emotional appeal in recruitment advertising and applicant attraction: Unpacking national cultural differences. Journal of organizational behaviour , 35-42. Luca, N. (2015, October 9). Towards a service-dominant approach to social marketing theory. Retrieved 12 November 2016, from sage pub.com: https://www.sagepub.com Michael, H. T. (2013). Information Technology Adoption in Small Business: Confirmation of a proposed framework. The Journal of Small Business Management , 25-40. R Randall, B. L. (2014). India: MNC Strategies for growth and Innovation. Strategy Leadership , 30-39. Touboulic, A. (2016). Sustainable purchasing and supply. Journal of Marketing Channels , 85-87. Wlliams, O. (2015, July 10). Apple has forgotten to sell the iPhone. Retrieved May 18, 2017, from The Next Web: https://www.thenextweb.com Zahra, S. (2016). Developing theory-grounded family business research: Some suggestions. Journal of family business strategy , 3-7.