Monday, November 25, 2019

Reading Response for Street Car Named Desire Essay Example

Reading Response for Street Car Named Desire Essay Example Reading Response for Street Car Named Desire Essay Reading Response for Street Car Named Desire Essay Essay Topic: A Streetcar Named Desire Not only did he give it a name that provokes subtle intrigue, but what the title represents and the literary meaning that could be read into its meaning stay true to the plot, settings, and characters In the play. One can imagine the scenes one sees as he/she is riding along In a streetcar. Through the dirty wavy glass, the life and goings-on outside seem surreal. The character Balance sums It up well when attempts to explain herself to Mitch, l dont want realism. I want magic! Yes, yes, magic! I try to give that to people. I serpentine things to them. I dont tell truth, I tell what ought to be truth. (Williams, Scene Nine, Pl 17) In the play the audience may never see the real truth. Like life, there are several versions to choose from and the most real Is seldom seen through one snap-shot perspective, tainted by dirty glass. The second physical manifestation of a streetcar that resounds throughout the play Is the incredible noise and racket they produce as they pound their way across the tracks, ringing their bells. The surroundings in the play are constantly filled with literal and advertorial noise. From the constant playing of the blue piano and chatter of individuals in the neighborhoods to the utter chaos of the characters lives and relationships; this streetcar fills the play with noise. Most interesting is how Balance came to arrive in New Orleans both factually and figuratively on a streetcar named Desire. Balance never recovered from the noise of her youth. From the way she was treated by others to the devastating loss of her love, she was driven to the point of self-delusion and destruction. Her mental instabilities, driven by her desires, caused her to be cast into exile by her home town and most of the people she knew. The streetcar continues on, unrestricted by fantasy or opinion. Tennessee does not hold back on how dark desire can be. Although most of the dark noise that happens, such as Stanley beating his wife and raping Balance, seems to be attributed to alcoholism (a desire to escape reality? ), the play still shows much of the petty selfishness, lusts, and greed we all might experience as we travel along on our own streetcars.

Thursday, November 21, 2019

How does the Media Shape Our Development of Moral Judgment Research Paper

How does the Media Shape Our Development of Moral Judgment - Research Paper Example How this is happening is the way in which the youth is spending a lot of their time with the media due to their easy access to explicit content. With added convenience children can find stories that encompass violence, sexual promiscuity, theft, and greed in numerous media outlets such as fictional programming, a number of reality shows, music, and through the Internet. Research primarily looks at the effects on morality due to the media by looking at the underlying moral decision making that affects their behaviors. As far as children are concerned their moral development follows a very conventional developmental path. When these children, typically under the age of eight, are presented with an ethical dilemma their judgment of right and wrong is highly reliant on whether their action results in a reward or punishment. However as children mature their judgment takes into account a larger amount of factors, intentions and motives which revolve around recognition of the many conflicti ng rules inherent in moral dilemmas. Such a change can be attributed to the fact that their moral reasoning becomes much more flexible and ‘other’ oriented. ... A majority of the children’s perception found unjustified aggression to be wrong however children who watched programs that encompassed fantasy violence, such as Power Rangers, were more inclined to judge the ‘justified’ aggression being morally correct. Research reinforces this notion seeing as how violence in famous superhero cartoons is mostly seen as justified. Hence in the Krcmar study, it was observed how children who watched fantasy violence and those who watched realistic entertainment violence, such as Cops, were seen to display a lesser advanced moral reasoning strategies, with their primary focus being on rules and how prominent the presence or absence of punishment was as far as moral dilemmas was concerned. In another study which focuses on a similar pattern it was found that children who watched fantasy violence frequently were more likely than those who were light viewers to perceive justified violence as being morally correct. The heavy exposure to fantasy violence also led to these children having a lesser advanced role-taking abilities, which consequently affected their moral reasoning skills, making them less sophisticated (Wilson, 2008). A study also focused on looking at the influence the family had on a child’s television viewing and moral reasoning. It was found that if parents stressed and emphasized on communication within a family the children were less likely to watch fantasy violence that was shown on television and therefore develop higher moral reasoning skills and vice versa (Livingstone, 1996). A longitudinal study conducted by Judy Dunnn and Claire Hughes looked at how the media had an impact on the moral development of â€Å"hard-to-manage† preschoolers when compared with

Wednesday, November 20, 2019

Research methods (the development of Abu Dhabi) Essay

Research methods (the development of Abu Dhabi) - Essay Example 5. To study the role of Connectivity in the urbanization of Abu Dhabi. Without connectivity no city can be developed to it's fullest for which this objective has to be studied in order to achieve the hypothesis. 6. To study the identity and opportunity as a factor for urbanization of Abu Dhabi. In order for a city to develop it is important that many opportunities are given to the people who live there. It also gives a strong identity. Abu Dhabi till 2030 will be all this to it's its residents. Thus this objective will help in supporting the hypothesis. Every great leader dreams of expanding and enlarging his domain, as did the late Sheikh Zayed bin Sultan Al Nahyan. Today Sheikh Khalifa bin Zayed Al Nahyan, President of the UAE as well as Ruler of Abu Dhabi, continues to enhance the vision. The Plan set out by Sheikh Khalifa Bin Zayed provides a contemporary and culturally compassionate platform for the urban development of Abu Dhabi city. The main values outlined by the government for determining the growth of the city under Plan Abu Dhabi 2030, are that, Abu Dhabi will continue to be a current appearance of an Arab City, where the people maintain a healthy and supportive lifestyle. However, this kind of massive expenditure requires a plethora of studies and researches, there are many things to consider for instance the economic outlook, real estate development, sustainability, evolving culture and environment, opportunity and connectivity. A specific kind of research method must be used for the above mentioned factors in order f or this plan to be carried out successfully. The number one thing to be reviewed is the actual vision of Sheikh Khalifa Bin Zayed. Plan Abu Dhabi 2030 should be deeply studied, so that to fully understand which direction His Highness would like to point Abu Dhabi towards. One must understand whether he would prefer to keep his culture and develop the city within the guidelines, or develop the city with a baseline of his cultural heritage adding to it the modern ways, or would he like to completely move away from the cultural side and move towards a modern and innovative city. As per his plans mentioned on September 21st 2007, he would like to evolve the metropolitan into a global city without loosing the Arab culture. The weakness of this study however can be that His Highness might change his mind along the way and decide to change the vision completely. However considering the amount of investment involved in this project, this is very unlikely to happen. "The

Monday, November 18, 2019

The impact of animation for children's psychological development in Essay

The impact of animation for children's psychological development in finding their identities - Essay Example Text Resources that will be consulted 14 13. Conclusion 14 14. References 16 What are animations and what forms they may adopt Since man has the ability to clearly distinguish between thirty frames at maximum over a second, an animation refers to a display of up to thirty images a second which model an illusion of movement. This optical illusion occurs due to persistence of vision and has been used successfully over centuries in the benefit of animation and other movie makers. Animation for kids refers to all the cartoons and other fun movies whose main targeted audience is the kids. Fairy tales are one of the most prized possessions of a kid, often so, because they are said to belong to the children world. As Andersen(1991) says, the fairy tales speak to a child in a language he understands. They are vibrant and colorful, the music is often loud and don’t need a serious voice over because the video alone conveys the message. Beck (2005) believes that animations may also conve y a message. They don’t necessarily have to end with a prince charming falling head over heels with a princess who has it all. It can also convey important messages such as effects of global warming, importance and need of conserving energy, basic human rights etc. At the tender age when children normally enjoy these animations, they are forming their perspective of the world. Obviously what they see will reflect on their personalities hence the animation makers need to ensure that the message conveyed is positive and important. Grant (2006) exclaims that we often see banners promoting positivity and a revolution in the world but then, animation have a much a greater impact than mere pictures and words. Ghertner (2010) exclaims that animations are not just for kids, they entertain the elders just the same. For example, who hasn’t watched ‘Lion King’ or ‘ The Lord of the Rings’? There are so many such epic animations that one wonders if there w ould ever be an end to storytelling; and the answer is no! Animated stories have been there since centuries and there will always be new stories evolving. Bessen (2008) says that one can only hope that this art gains a greater meaning and insight as it progresses since storytelling affect the psyche of young kids and adults alike who watch them and often consider themselves to be the heroes of the story. Picture credit: http://www.dandare.org/FreeFun/Images/CartoonsMoviesTV/LionKingWallpaper1024.jpg Animations Sharpen the Human Brain Over the last two decades one sees the popularity of the use of animations and other graphics increasing by leaps and bounds in the instructional media. Almost all schools rely on animations to teach the kids the basics and the teachers then add on to it. As Gilland (2009) correctly points out, around twenty years ago, one could not have imagined but now robotic schools are well thought for idea. This intrigues one to explore how animations are more eff ective than the teachers themselves. Block (2007) exclaims that it has been experimentally proven by various researches that animations on subject matters really improve a child’s retention and inference abilities. Instead of a teacher telling how Red Riding Hood got scared of the wolves, if a student gets to see it, he is able to infer it better and not only that, he retains the images better than words. The reason why animations Some of these reasons are associated with the affective role that graphics can fulfill. For example, animations may be aesthetically

Saturday, November 16, 2019

Understanding Business Organisations

Understanding Business Organisations TASK 1 The government has an important role to play in providing easy, low-cost access to information. Numerous studies and reports call for a more coordinated access for businesses to information on markets, industries and regional economies. In this case, most SME’s want better information about the local and regional economy to help position their businesses and raise competitiveness. Therefore, there is an urgent need for these government funded organizations to play the role of considering a more formal mechanism to listen to the needs of businesses, improve access to information and ensure they provide partial electronic services to people and small businesses through Government portals. The stimulation of the SME’s by these funded organizations can reduce the level of unemployment and contribute to a more equal distribution of economic powers. The development of the SME’s is important for the social and economic development of the country, since they increase competitiveness and mobilize idle funds to productive aims. The business community (the SME’s) has unique information needs that need to be addressed with a specifically designed information system integrated in the National Treasury, Kenya Revenue Authority, Home Affairs State Department and Immigration Office. A multi-faceted approach to information provision is necessary because of the variation in needs, literacy and business prospects. Training needs of both the business managers of the SME’s and information specialists should be identified and recommended as part of the business information system design. TASK 2 UNIT: Understanding Business Organizations TITLE: Technology Advisory Group Task 3 Organization chart for T.A.G ORGANISATION STRUCTURE The structure adopted is functional organizational structure which will involve organizing the activities of the advisory group around areas of specialization. This approach involves a considerable amount of process standardization within the organization, with the real decision-making authority centered at the top of the organization. EFFICIENCY INTO OPERATION BY THE STRUCTURE the organization will achieve significant efficiencies in terms of process flow and management methods as the staff will be allowed to focus on one specific functional area to the exclusion of all else. It is ideal for the organization because it is easier to monitor and update the training of employees when they are focused on narrow functional areas. The organization will also use this approach to cultivate a group of extraordinary specialists who can strongly impact the functions of the company. KEY MANAGEMENT PROFILE Administration and Finance Their role is to provide a general oversight of the operations of the organization.The team will consist of a General Manager, Finance Manager with 1 administrator and ICT Manager with 1 administrator. This team will be responsible for effective planning, delegating, coordinating, staffing, organizing, and decision making to attain desirable profit making results for the organization (Sayles 1979). Marketing and PR   Their function is mainly to increase sales for the organization. Assigned here will be the Head of Marketing, two(2) executives inMarketingand two (2) executives in PR. As the teams begin to work together they need to come up withconcrete and up-to-date plans to maximize profits while creating long-term customers as well as adding value to the product and our services. IT Consultants  Ã¢â‚¬â€œ They play the role of advising businesses on how best to use information technology to meet their business objectives.Two(2) Senior Consultants will be in charge. In addition to delivering advice, four(4) Middle-Level Consultants and four (4) Junior Consultants will oversee the workshops that will look at the technologies that can be underpinned by Superfast Broadband. They will work hand in hand with five(5) IT Trainers, two(2) website administrators and two(2) graphicdesigners to manage, implement, deploy, and administer IT systems of the organization. TASK 5 BUSINESS PLAN FOR T.A.G The intentions of Technology Advisory Group is to offer clients with an all-inclusive assistance through free consultancy and specialist advice on business prospects offered by Superfast Broadband In the form of articles and blogs written by IT specialists.The three year goals for Technology Advisory Group are the following: Achieve break-even by Year 2. Establish along-term contract with the Central Government. Establish a minimum of95% customer satisfaction rate to establish long-term relationships with our clients and create word-of-mouth marketing. T.A.G has established a status for quality work and plans to continue to heighten its image in the trade. The organization endeavors to become a well-known benefactor of IT related guidance to SMB’s through the following: Increasing service backings by consolidating specialist workshops which will look at the technologies that can be fortified by Superfast Broadband, including Cloud Computing, collaboration and interactive websites. Increasing obtainability and accessibility to present and future customers through a range of pamphlets and case studies that give hands-on insights into the enactment of Superfast Broadband by small businesses Crafting innovative, unique, and cost-effective interpretations to hitches currently met by customers. Technology Advisory Group has established community calendaring and groupware applications for use by the organization. This will support in providing a modest, convenient tool for the organization and staff to consolidate, plan, track projects and workshops. T.A.G will leverage its profile-raising services to help offer secondary income streams as the organization will inaugurate induction of free email services, business directories, and other related services which will entice current and prospective customers to our offices and workshops. These will be used to generate advertising proceeds, as well as increase publicity of our range of services. To generate sales, T.A.G has incorporated the use of direct marketing which will focus on Trade Shows. T.A.G will partake in selected local and national shows that will provide an opportunity to develop exposure. This is a very effective tool in creating responsiveness and stimulating lead activity.And also Contact Campaigns as this initiative will encompass various methods of reaching potential customers to generate interest, followed by direct mail to the potential customer. The organization has a well-articulated human resources strategy which ensures that labor regulations are stringently followed and that all pamphlets relating to labor law are upheld hence confirms that the employees are exceedingly inspired to ensure that they are industrious. T.A.G has articulated human resources scheme that is in line with those that directly deal with intensifying through attainment. Strategies that should be put to ensure that the company achieves further growth Marketing strategy The organization has to put more exertion in having access to the global market. It should put more effort in advertising of its services to other parts of the ecosphere that it has not accessed the market. It should discover probable market such as other African republics. T.A.G should upturn the number of workshops and virtual assistance services and through this; the company will offer its customers with a choice of service to pick from. The organization should guarantee that its branding and packaging are of high standard and should change with customers change in taste and fashion. The company should contemplate using publicizing tools such as S.W.O.T analysis in guaranteeing that it retains its control of limited market and as a means to subsist in an atmosphere that has stiff competition. Information system strategy Technology Advisory Group should deliberate on using more than one software when executing a given assignment. The administration should concoct a way in which the systems are incorporated. This is to warrant that proficiency is upheld and the work done is precise and can also certify that fraud activities are curtailed. Human resources strategy The organization should also upturn the number of university fresh alumni who are undertaking management drills. This is decisive in that it will advance new skills and different concepts from these graduates and this will support the Technology Advisory Group in development. It is persons who make an organization to grow therefore, to ensure that T.A.G has a stout pool of human resources, it should contemplate efficient in training for employees to keep them informed on new skills so that the enterprise can keep pace with other major conglomerate corporations in relations to human resources. Competitive Edge The Technology Advisory Group should emphasis precisely on facilitating small and emergent businesses exploit their potential for accomplishment by distinguishing itself in the following means: Cost-effective personal interaction with IT consultant presence: T.A.G should target new expanses with local consultants, permitting it to personally cooperate with small businesses without needing to bring consultants to the region. A diverse network of consultants and alliance partners: By relying on a nationally circulated talent base harmonized to work together tenuously, the organization should be able to bring together an assortment of skills to encounter the needs of its clients. Positioning Statement The Technology Advisory Group delivers much needed skills and experience to small to medium business initiators to help their businesses embrace the Superfast Broadband. Our services are bespoke specifically to the distinctive needs of small to medium businesses and focuses on up-to-date citations of specialist suppliers of Superfast Broadband and allied services that can advance overall business performance. With a scarcity of available talent plus the usual budget pressure usually associated with small businesses, our services provide a cost-effective substitute to attaining faster communications inorder to advance the ways in which they do business. The Technology Advisory Group will position itself as the prominent marketing and management consulting firm focusing solely on small businesses. Projected Profit and Loss Key expenses will comprise the cost of payroll for the growing staff, marketing to endorse the Superfast Broadband in the community, and the organizations rent and devaluation. The organization will show a revenue in the first year which will continue to propagate. This is anticipated due to the high gross margins of marketing internet broadband to small and medium businesses Annual sales projection Annual sales projection Task 6 Formal communication Communication is the process through which one person conveys information to another person through applicable medium. These are the major communication systems implemented as these terms are used recurrently in organizations. Upward communication Is the process of information travels from lower to higher ranks in the hierarchy.Various mechanisms can be implemented by T.A.G to facilitate upward communication. Examples, Suggestion boxes, group meetings and participating in decision-making. This is maintained to get feedback to managers from employees. Downward communication Is the process of information flowing from superior to subordinate – from managers to operating staff.Itis related to the hierarchical structure of the organization as messages seem to get large as they travel downward through successive levels of the organization. Example, annual reports, notices and employee performance feedback. Horizontal communication Flow of messages across functional areas shared among people on the same hierarchical level of an organization. This form of communication facilitates for problem solving, task coordination between departments and project teams. How can intranets and groupware help improve communication? Intranets Organization information can be warehoused centrally and retrieved at any time due to superior internal communications. sharing of resources and best practice as virtual groups can be deliberated to expedite information sharing and collaborative working improved customer service better access to accurate and reliable information by your staff leads to heightened levels of customer service forms can be accessed and completed on the computer, then forwarded as appropriate for approval, without ever having to be printed out, and with the benefit of an audit trail Groupware It facilitates users to post ideas, questions or suggestions on given themes of discussion as it allows users to engage with other members of the group thus enhancing business alliances. It permits users to send messages to other members of the organization and outside of the organization. It ensures that users can retain online calendars viewed by other colleagues to assist with the arranging of meetings and project planning as users are able to identify when members are available or times when they are consumed with other tasks. Task 7 Managing virtual teams Virtual teams are defined as â€Å"affiliated individuals using computer-mediated telecommunications to share information electronically† (Kirkman, Rosen, Tesluk, Gibson, 2009, p. 54). Challenges posed by virtual teams in managing individual teams Physical Observation Limitations managers are physically limited to observe their employees’ performance and efforts, and how to implement effective methods for going about measuring productivity, building trust, and managing teams given their particular constraints (Kirkman, Rosen, Gibson,Tesluk, McPherson, 2002). This renders the manager unable to provide constructive performance feedback and harness the full potential of the team. As a result, monitoring and measuring performance remain problematic and sources of concern (Kurkland Bailey, 1999). Overemphasis on Output Evaluation Evaluation of virtual team performance is a challenge when managers directly focus on outcomes rather than process especially when those results prove difficult to measure and observe.Therefore, Managers cannot accuratelyascertain performance due to reduced capability toobserve and monitor the process. Employee Equity and Organizational Justice Issues Virtual team members may feel organizational injustice when compared to those who are present in the actual workplace. Professionally, employees fear that being â€Å"out of sight† infers being â€Å"out of mind† fororganizational rewards thus becomes a significant challenge whenevaluating members of virtual teams against those at the physical office (Kurkland Egan, 1999). Recommendation on how T.A.G will address this challenges Increasing Information Flow–the virtual team project manager should institute mutual knowledge among team members through team building activities and grant members access to evocative project documentation, which lists acronyms and other project specifics important for team members to understand (Davis Khazanchi, 2007). The â€Å"Balanced Scorecard† – the virtual team manager should create an all-inclusive balanced scorecard based on T.A.G’s priorities when evaluating performance. This may consist of the organization’s values in the fields of growth, profitability and customer satisfaction. This enables managers to have a far more transparent understanding of the effectiveness of their virtual team and create more standardized methods of evaluating future virtual team performance. References: Boddy, D. (2005). Management: An introduction. 3rd edition.England, Pearson education, Prentice Hall. Campbell, D Craig, T. (2005).Organizations and the business environment.2nd edition.Oxford, UK, Butterworth-Heinemann. Davis, A., Khazanchi, D. (2007). Does mutual knowledge affect virtual team performance? Theoretical analysis and anecdotal evidence. American Journal of Business, 22(2), 57-65. Kirkman, B.L., Rosen, B., Gibson, C.B., Tesluk, P.E., McPherson, S.O. (2002). Five challenges to virtual team success: lessons from sabre, Inc. Academy of Management Executive, 16(3), 67-69. Kurkland, N.B., Bailey, D.E. (1999). Telework: The advantages of working here, there anywhere,and anytime. Organizational Dynamics, 28(2), 53-68. Mullins, L.J. (2010). Management and Organizational behavior. 9th  Edition. England, prentice hall financial times.

Wednesday, November 13, 2019

Turing Machines And Universes :: essays research papers

<a href="http://www.geocities.com/vaksam/">Sam Vaknin's Psychology, Philosophy, Economics and Foreign Affairs Web Sites In 1936 an American (Alonzo Church) and a Briton (Alan M. Turing) published independently (as is often the coincidence in science) the basics of a new branch in Mathematics (and logic): computability or recursive functions (later to be developed into Automata Theory). The authors confined themselves to dealing with computations which involved â€Å"effective† or â€Å"mechanical† methods for finding results (which could also be expressed as solutions (values) to formulae). These methods were so called because they could, in principle, be performed by simple machines (or human-computers or human-calculators, to use Turing’s unfortunate phrases). The emphasis was on finiteness : a finite number of instructions, a finite number of symbols in each instruction, a finite number of steps to the result. This is why these methods were usable by humans without the aid of an apparatus (with the exception of pencil and paper as memory aids). Moreover: no insight or ingenuity were allowed to â€Å"interfere† or to be part of the solution seeking process. What Church and Turing did was to construct a set of all the functions whose values could be obtained by applying effective or mechanical calculation methods. Turing went further down Church’s road and designed the â€Å"Turing Machine† – a machine which can calculate the values of all the functions whose values can be found using effective or mechanical methods. Thus, the program running the TM (=Turing Machine in the rest of this text) was really an effective or mechanical method. For the initiated readers: Church solved the decision-problem for propositional calculus and Turing proved that there is no solution to the decision problem relating to the predicate calculus. Put more simply, it is possible to â€Å"prove† the truth value (or the theorem status) of an expression in the propositional calculus – but not in the predicate calculus. Later it was shown that many functions (even in number theory itself) were not recursive, meaning that they co uld not be solved by a Turing Machine. No one succeeded to prove that a function must be recursive in order to be effectively calculable. This is (as Post noted) a â€Å"working hypothesis† supported by overwhelming evidence. We don’t know of any effectively calculable function which is not recursive, by designing new TMs from existing ones we can obtain new effectively calculable functions from existing ones and TM computability stars in every attempt to understand effective calculability (or these attempts are reducible or equivalent to TM computable functions).

Monday, November 11, 2019

Relationships with Children Essay

Unit aim This unit provides the knowledge and understanding which underpins effective communication and professional relationships with children, young people and adults Unit introduction Successful relationships have a positive effect on learning and behaviour. Being listened to and responded to by trusting adults encourages active engagement by children and young people and supports the development of curiosity, creativity and resilience, which are key characteristics of effective learning. Adults who demonstrate mutual respect, collaboration and negotiation are positive role models who have a significant impact on the behaviour of children and young people. Integral to building and maintaining positive relationships are effective communication skills. It is also essential for those working in support roles in schools to know the  legislation and policies and procedures for confidentiality and sharing information. This unit provides the essential knowledge and understanding required for working in support roles in schools. Learners will examine the principles of building positive relationships with children, young people and adults. This includes considering reasons why effective communication is important and the effect of social, professional and cultural contexts on communication. Communication difficulties are examined and learners find out how to adapt communication to meet individual needs including how to deal with disagreements with children, young people and adults are studied. The legislation, policies and procedures relating to confidentiality are examined and why children, young people and adults need reassurance about confidentiality are studied. Learners will also consider situations where confidentiality must be breached. This unit applies to all support staff roles in schools and is particularly suitable for those preparing for working in schools and those new to working in schools, including parent-helpers and other volunteers. Learning outcomes and assessment criteria In order to pass this unit, the evidence that the learner presents for assessment needs to demonstrate that they can meet all the learning outcomes for the unit. The assessment criteria determine the standard required to achieve the unit. On completion of this unit a learner should: Understand the principles of developing positive relationships with children, young people and adults How communication supports positive relationships: benefits eg shows respect for individual, values diversity, builds trust, demonstrates genuine interest, respects privacy, encourages autonomy, supports learning, enables effective teamwork, enables negotiation, reinforces self-esteem Principles of relationship building: ways to build relationships eg recognise the uniqueness of everyone as an individual, honesty, dependability, integrity, confidentiality; importance of relationships for learning; know role and responsibilities, how own role relates to colleagues; respect the skills and expertise of others; contribution to effective teamwork; follow organisations expectations and procedures for good working relationships; communicate effectively eg keep colleagues informed, use agreed lines of communication, maintain confidentiality; know own role in relation to parents; differences between professional and personal relationships; contribute to Every Child Matters Outcomes Effect of social, professional and cultural contexts on relationships and communication: eg power relationships, cultural expectations, social differences, prejudice, pre-conception, stereotyping Understand how to communicate with children, young people and adults Skills for communication: verbal skills eg form and tone of expression, questioning, confirming, reflecting; clarifying meaning, encouraging contributions from others, offer choices; non-verbal skills and behaviour eg eye contact, facial expressions, body movement, posture, gesture, muscle tension, touch, proximity, orientation, facial expressions, gestures, active listening; importance of contact and cultural differences in interpretation of non-verbal communications; empathy eg responding to emotional state Adapting communication: ways eg language appropriate, meaning/message, concentrate on one issue at a time, do not give mixed messages, match words to body language, open questions, active listening, encourage discussion and debate; contexts eg hearing difficulties, children with English as an additional Language (EAL), promote thinking and talking in first languages to support understanding, group EAL learners who share the same home language Differences: context eg communication formal, informal, form of address; type of communication eg verbal, language, non-verbal, orientation, confidentiality Adapting communication: use of clear speech and plain  language; different needs eg EAL, hearing difficulty, visual impairment; adaptations eg translator/ interpreter, quiet room, hearing loop, signing, Braille   Managing disagreements: behaviours eg keep calm, encourage individuals to articulate their point of view, find common ground, negotiate a compromise, win-win solutions, support children and young people to deal with disagreements, follow school policy and procedures for behaviour and reporting, restorative justice Understand legislation, policies and procedures for confidentiality and sharing information, including data protection Legislation, policies and procedures: range eg for home country, human rights eg Human Rights Act 1998, Human Rights Act 2004, for safeguarding children eg Children Act 1989, Children Act 2004, relating to freedom of information eg Data Protection Act, Every Child Matters, policies and procedures in own organisation Reassuring about confidentiality: aspects eg information shared on need to know basis, human right for privacy, protecting information when using social networking sites, buying online, using a mobile phone, procedure in own organisation, whistle-blowing Essential guidance for tutors Delivery This unit should be delivered through a combination of tutor input and active learning experiences. DVDs and case studies will give learners opportunities to link theory to practice. Role play enables learners to develop and practise their interpersonal and communication skills. Discussions, peer observations and peer assessment support assessment for learning and contribute to an understanding of the skills required for effective practice. Learners should also be encouraged to demonstrate an awareness of the importance of communication skills in addressing issues of equality, diversity, and the rights and responsibilities of children and young people. At this level the focus needs to be on understanding the significance of positive relationships in relation to the wellbeing and learning of children and young people and exploring how effective communication enables this. The Emphasis needs to be on understanding the behaviour and communication skills required to develop and maintain positive relationships with children, young people and adults and to provide positive role models. Learners should be introduced to why effective communication is important for establishing and maintaining positive relationships with children, young people and adults. How positive relationships enhance self-esteem and encourage learning could be explored through relevant research. The impact of social, professional and cultural contexts on relationships and communication should also be explored. It is essential that learners understand the communication skills needed to establish and maintain relationships. Learners need to explore ways to meet the communication needs of individuals by adapting communication for different ages and stages of development and for different contexts. Learners should be introduced to the current national legislation for confidentiality and data protection which can be accessed from relevant  government department websites. They should have the opportunity to look at a range of school policies and procedures for confidentiality and data protection and consider how these may impact on working practices. It is essential that learners know the situations when confidentiality must be breached to safeguard children and young people. Learners should be encouraged to share their experience of working in schools through employment, as a parent-helper or work experience. Assessment This is a knowledge-based unit. Evidence from workplace performance is not required. Suggested assessment activities Assessment will be through tasks, projects and other activities completed individually to meet the assessment criteria. Learners should draw on any relevant practical experience of working in schools but will not be assessed directly on workplace performance. For learning outcomes 1 and 2, learners could research and produce a guidance document to use for the induction of new support workers in school to help them understand the principles of developing positive relationships with children and, young people and adults and the skills they need to communicate effectively. Case studies may be used to support explanations. The document needs to include why effective communication is important for developing relationships, the principles of relationship building, explanations of how social, professional and cultural contexts impact on relationships and communications, clarification of the skills required for effective communication, how to adapt communication to meet the needs of  individuals and in different contexts and how to manage disagreements with children, young people and adults, explaining reasons for responses. For learning outcome 3, learners could produce a reference document for all school staff giving details about confidentiality and data protection to include legislation relating to confidentiality and data protection, school procedures for confidentiality and data protection, reasons why it is important to reassure children, young people and adults about confidentiality and why confidentiality may need to be breached. Essential resources Learners will need access to legislation for the relevant home nation and examples of school policies and procedures for confidentiality and data protection. Indicative resource materials Textbooks Bentham S – A Teaching Assistant’s Guide to Child Development and Psychology in the Classroom (Routledge, 2003) ISBN 9780415311083 Blake S, Bird J & Gerlach S – Promoting Emotional and Social Development in Schools: A Practical Guide (Sage Publications, 2007) ISBN 9781412907316 Burnham L – S/NVQ Level 2 Teaching Assistant’s Handbook: Supporting Teaching and Learning in Schools, 2nd Edition (Heinemann, 2008) ISBN 9780435449308 Burnham L – Supporting Teaching and Learning in Schools (Primary) (Heinemann, 2010) ISBN 9780435032043 Burnham L – Supporting Teaching and Learning in Schools (Secondary) (Heinemann, 2010) ISBN 9780435032050 Dunhill A, Elliott B & Shaw A– Effective Communication and Engagement with Children and Young People, their Families and Carers (Creating Integrated Services) (Learning Matters, 2009) ISBN 9781844452651 Foley P & Leverett S – Connecting with Children: Developing Working Relationships (The Policy Press, 2008) ISBN 9781847420589 Kamen T – Teaching Assistant’s Handbook: NVQ and SVQ Levels 2 & 3, 2nd Edition (Hodder Education, 2008) ISBN 9780340959381 Riley P – Attachment Theory and the Teacher-student Relationship (Routledge, 2010) ISBN 9780415562621 Journals Times Education Supplement (TES) 42 BA029026 – Specification – Edexcel Level 3 Award/Certificate/Diploma specialist qualifications in Supporting Teaching and Learning in Schools (QCF) – Issue 2 – June 2011  © Edexcel Limited 2011 Websites www.education.gov.uk/ Department for Education www.direct.gov.uk/en/Governmentcitizensandrights/ Yourrightsandresponsibilities Directgov www.nationalstrategies.standards.dcsf.gov.uk/ earlyyears The National Strategies www.tda.gov.uk The Training and Development Agency for Schools www.teachers.tv Teachers TV www.teachernet.gov.uk Teachernet BA029026 – Specification – Edexcel Level 3 Award/Certificate/Diploma specialist qualifications in Supporting Teaching and Learning in Schools (QCF) – Issue 2 – June 2011  © Edexcel Limited 2011

Friday, November 8, 2019

IT Solutions for Small and Medium

IT Solutions for Small and Medium Introduction The Internet of Things (Internet of Things) will grow over the next years in application and adoption. As it grows, its associated technologies will also have to undergo major advancements to accommodate customization and scaling needs of the Internet of Things. For example, privacy, security and semantic interoperability are all features that need further attention.Advertising We will write a custom essay sample on IT Solutions for Small and Medium-Size Enterprises specifically for you for only $16.05 $11/page Learn More In addition, other IT advancements like cloud technologies and big data, as well as future networks like in the case of proposed 5G will also have to be considered when contemplating the adoption of the Internet of Things now and in the medium-term. For Small and Medium Enterprises (SMEs), the IT solutions combined with the Internet of Things promise to enhance competitiveness and to make the daily running of businesses easy. E nhancement will come through better customer relationships, better supply chain management and relationships, as well as the provision of an affordable innovative avenue that translates to better services and products. However, the uptake of cloud computing, big data analytics, the Internet of Things, among other features faces the hurdle of overcoming sceptical thoughts about the advancements and their actual need for SMEs (Ruggieri Nikookar 2013). Research mythology The findings of this research come from a secondary literature review guided by the papers title. The researcher relied on internet sources for publications that discuss the present and past features of SMEs adoption of the novel IT features. It also relied on published research findings from other scholars to make deductions and to inform the analysis part of the paper. Application of theory/methods This paper will rely on the theories about diffusion as they apply to technology adoption in reviewing the various rese arch reports and industry reports on the use of technologies. The various states of technology adoption are awareness, interest, evaluation, trial, and adoption. The provided states allow practitioners to categorize a country, institution, or sector according to its stage of adoption. Alternatively, adoption could be categorized in the form of two categories; the innovators and the imitators. This would apply to the users of the technology and its creators. SMEs that are innovators would be those that base their decision to embrace the solution independently. Meanwhile, the imitators would be the ones that are influenced by other firms and industry trends to adopt the given technologies.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to the theory of planned behaviour (TPB), behavioural intentions rely on the attitude about the likelihood that a given behaviour will lea d to an expected outcome. At the same time, it will depend on the subjective review of associated risks of the behaviour and the benefits of the outcomes. In this respect, when looking at an SME as a social entity, its behaviour of adoption will depend on its attitude or the known features of adopting, as well as the expected outcomes and the risk associated with the uptake compared to its benefits (Al-Qirim (ed.) 2004). The use of the TPB is informed in part by the fact that in SMEs, the business owners mostly behave like individual decision-makers. At the same time, the secondary literature available shows that new technology adoption, behaviour of SMEs is similar to a person’s processing of adopting technologies. However, in the business case, social influence would translate to influences happening in the competitive environment, such as the need to grow competitiveness or to catch up with the competition (Dahnil et al. 2014). Lastly, the Task-Technology Fit Theory is als o useful in explaining the adoption of technologies. According to the theory, the task and technology characteristic will affect its suitability and performance when used by humans and compatibility affects adoption (Dahnil et al. 2014). Findings A requirement of cloud computing is that the infrastructure must have access to data anywhere, anytime, and on any devices at a level that meets the minimum threshold of quality service. In many European countries and in North America, a high number of individuals have access to broadband and almost all corporate entities are hooked to broadband internet services. The existence of a network of connected individuals and companies provides the market requirement for cloud computing and offers demand for the service (Kloch, Petersen Madsen 2011).Advertising We will write a custom essay sample on IT Solutions for Small and Medium-Size Enterprises specifically for you for only $16.05 $11/page Learn More For cloud compu ting to make sense, it has to be combined with broadband and for SMEs; the inclusion of e-commerce makes the uptake more exiting in the business sense. According to Kloch, Petersen and Madsen (2011), there is a huge number of SMEs that still apply manual billing systems, like the use of Excel-like systems. Such SMEs are also ill equipped in their respective IT departments, such that they are unable to embrace advances in the automation of their systems. As a result, they spend most of their human resources on their manual system. For the society, which includes businesses of all sizes, to benefit from the possibilities of Information and Communication Technologies (ICT), the applied processes must be efficient. In this regard, there is a need for ease of maintenance, flexibility, and scalability to a worldwide platform. A possible solution has been to remove the hardware limitations caused by the geographical and physical needs of hardware for computing. Instead, solutions are offer ed by cloud computing, which serves as the necessary infrastructure upon which other normal business system services lay (Kloch, Petersen Madsen 2011). In Hong Kong, the existence of an excellent and affordable ICT infrastructure that supports the delivery of secure e-services and the development of the local ICT industry has been instrumental in facilitating the update of cloud computing, big data analytics, and the Internet of Things (So 2013). In addition, market liberalisation has allowed internet access to penetrate throughout the population at an affordable price. In such a geographically small area, in comparison to the mainland China, the broadband penetration is 85 per cent (So 2013). On the other hand, Hong Kong enjoys a mobile penetration rate of 231 per cent, which makes it one of the highest in the world. Typical speeds for users are about 10 Mbps, while peak speeds reach more than 60 Mbps (So 2013). Now and then, SMEs have to deal with the fact that technology comes a long in a way that is so profound, powerful, and universal, such that it changes the way of doing business totally (Ramsey et al. 2003). In theory, the top performing SMEs are the ones that embrace ICT in all their operations.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The reason for this theory is that the services and systems under ICT provide a business with competitive advantages, which are distinctive in the first instance, but they become common after wide adoption. Even then, the businesses that are left out of the ICT bandwagon cannot match efficiencies and scalability enjoyed by their counterparts that are already seeking more robust ICT features to improve their production processes and service delivery, as well as customer and supply chain relations (Ramsey et al. 2003). In 2003, according to research by Ramsey et al. (2003), most SMEs in European countries were not using ICTs, such as the Internet for commercial transactions. They were missing out on the benefits of e-business and the upstream or downstream application. In North Ireland, 83 per cent of business respondents mentioned that they had no strategy for including the Internet or ICT in general as part of their marketing strategy (Ramsey et al. 2003). On the other hand, overwhe lming evidence also presented by Ramsey et al. (2003) shows that despite the numerous possibilities of ICT and the different levels of maturity for e-commerce usages, most SMEs have low-level requirements and they follow non-linear path. Unfortunately, at the time, available models were weak in theoretical underpinning, even though they obliged to the principles of e-business. Nevertheless, most SMEs were subjected to heavy usage of their scarce resources on these models (Ramsey et al. 2003). Zhuge (2011) helps to link human intelligence and control to the advancement of intelligent information processing technologies and their various uses. The research notes that unlike humans, machines can only process pre-designed algorithms and data structures in the cyber space. They cannot move beyond the cyberspace to learn thinking rules or know the effect of linking. Neither can they explain what happens when computing results are added to physical, psychological, and social laws. Neverthe less, researchers, developers, and practitioners are advancing their knowledge and applications that link various spaces to create a complex space, where cyber space is only a part of it. A consequence of such integration is the development of cyber-physical-psychological-socio-mental environment (Zhuge 2011). Indeed, Zhuge (2011) points out the possibilities of linking various spaces to realize a human-machine environment uniting society, cyberspace, and nature. Here, patterns of social individuals’ movements are collected and analysed to reflect the status of the individual or a society. With these patterns, it is possible to provide appropriate services to users and to make the right decisions to change a given status. Thus, the application of the interconnections is helpful to both organizations delivering goods and services and consumers of the goods and services, as it increases understandings of entire systems of components of the system. According to Mui (2012), SMEs adopt business intelligence products and services for growth, differentiation, and agility. They are able to understand their businesses and make better decisions, which should lead to more sustainable growth together with differentiating pursuits and agility. This is what Zhuge (2010) theoretically presumed when contemplating the effect of super networked spaces. Cloud technologies that incorporate in-memory computing allow businesses to obtain immediate answers through a remarkable increase in the speed of analytics. They also get real-time access and deeper insight as they can interrogate a large scope of granular data. Moreover, the solutions are simpler and more cost-effective because the IT complexity burden is low (Mui 2012). With big data analytics, it is possible to employ in-database, predictive algorithms to obtain various insights into internal and external business trends. At the same time, SMEs can access open source algorithms that directly integrate into their big da ta analytics systems, such that they would not have to incur additional programming and customization costs. Moreover, it is possible to embed specific or entire components of the big data analytics framework to existing business platforms and extend the obtained business intelligence into company reports, with delivery options of the information happening real-time to companywide communication channels, such as alerts to smartphones (Mui 2012). The European Commission (2013a) evaluated the current adoption, plans of adoption, and drivers or barriers of big data usage by EU companies. The report shows that big data include hardware and software integration, organization, management, and analysis with the presentation of data that is massive in volume of data and is varied in the breadth of data sources and formats (European Commission 2013a). In addition, there is a velocity characterized by a high speed at which information arrival, analysis and delivery happen, and value character ized by cost of technology and utility (European Commission 2013a). When considering adoption of big data, SMEs have to invest in the following features either as services provided by intermediary companies or as an in-house solution. They need the infrastructure, which includes storage systems, servers, and data centre networking. They also need software to manage and organize data, software to analyse and discover, as well as decision support and automation software. Other than that, companies implementing big data technologies need business consulting services, business process outsources, and other outsourcing services for IT and IT project based. They may also demand support and training services for big data implementations (European Commission 2013a). According to Miller and Mork (2013), SMEs require a plan that considers the entire continuum of big data application from the begging of data collection to the final decision based on the data collected. Thus, the biggest benefi t arises when all stakeholders in the continuum integrate big data solutions. After a decade of the Ramsey et al. (2003) research that reported limited uptake of ICT by SMEs, the European Commission (2013b) report quotes a 29 per cent figure for European companies that are ready for big data uptake. At the same time, a majority of business included in the survey content that they need to re-asses their current information management processes to meet the challenges of data growth. Nevertheless, big data adoption is still in its infancy at 6.2 per cent for SMEs, with 10 to 250 employees (European Commission 2013b). However, from the same survey, trends show that adoption among SMEs will increase significantly due to vertical integration along the supply chain and in particular industries, such as financial, oil and gas, telecom, computers, and electronics where data processing needs are high. Drivers of adoption include the data explosion witnessed in recent years. In fact, compared to 2003 when Ramsey et al. (2003) made their report, 2013 witnessed an extraordinary increase in internet usage and data transfers. The world now creates about 2.5 quintillion bytes of data daily (Xia et al. 2012). Today, sources of data include social media, digital imaging and video, smart meters, non-traditional networked smart devices, and machine to machine communication in factories. IT vendors are also producing tools for collection, storage, and analysis to meet the emerging needs of dealing with the data. Consumers and customers are also becoming more connected and demand access and availability of ready-to-use information. As consumers demand personalization, they are ceding more privacy to enterprises. Now data and personalization is not only happening in traditional environments like call centres and mobile applications, but also on cars and domestic appliances in the Internet of Things. But, as hinted earlier, resistance to share personal and proprietary data and inform ation will remain hindrances for the adoption and full utilization of cloud computing, big data, social media, and the Internet of Things. For SMEs, the lack of time and resources to study trends and opportunities and threats serves as a barrier for uptake of the IT innovations. Language differences make data analysis complex, just like differences in national regulations on privacy and data usage also complicate matters for SMEs seeking to fully utilize the novelty of the various technologies. According to Duhnil et al. (2014), social media is among the most popular novel IT technologies embraced by SMEs across the world. Social media has become a fresh tool for marketing communication. It fits well with the need to deploy rapid and dynamic campaigns for businesses that are already using other forms of electronic media. Its adoption is helped by the social uptake of the technology and service, which now make it relevant for both businesses and customers (Michaelidou, Siamagka Chri stodoulides 2011). Social media marketing is now a subset of marketing, where the marketing practices, information, and ideas spread through social media online. Nevertheless, social media marketing and usage are not social marketing. The latter is the bigger environment within which the former falls into (Dahnil et al. 2014). End users remain a major factor in influencing the adoption of social media by SMEs; a second influencing factor is the technological orientation of the SMEs, which determines just how compatible the intended adoption will be. A third reason is the management when looked at from the business environment perspective (Durkin, McGowan McKeown 2013). Critical analysis The uptake of cloud computing, big data analytics, and the Internet of Things among SMEs globally has not been very successful in the past decade, as it would be expected. Part of the reason, as elaborated in the findings of this paper, is the misalignment of risk and costs with the expected benefit s of the technologies. As the European Commission (2013a) report stated, the uptake was more in bigger companies than in SMEs, which would be partly attributed to the accessibility of technology. The findings have also shown that SMEs have discontinued systems that would benefit most SMEs in integration, but the integration would be too costly. In this respect, it is not surprising to see that there are many research reports on SME adoption of social media compared to the Internet of Things, Big Data analytics, and Cloud Computing. During the research, this researcher encountered many pointers to social media usage by SMEs, especially in their marketing efforts. It explains why the other features of IT developments have not caught up with business owners. The reason is that they do not directly affect the customer as much as social media does. Most help in the backend, thus they are not readily considered as revenue generating opportunities for the small and medium firms. As Mui (20 12) and Zhuge (2011) showed, the uptake of networked based implementation, such as big data analytics and the Internet of Things depend more on the level of vertical integration. Thus, when one compares firms operating in highly integrated industries, such as the financial sectors, one is most likely to find SMEs that embrace cloud technologies and big data, while those in manufacturing chains may not have deep linkages with vertical partners other than basic business process relations (Schwertner 2013). The limited uptake among SMEs of the mentioned technologies is changing rapidly because the cost of not catching up to the competition is rising. The demand for efficient and usable systems for handling data will also increase among all business sizes, thus SMEs are not spared. As the report by So (2013) on Hong Kong highlighted, and as Zhuge (2011) also contemplated, the future will see the connection of various spaces to realize a multi-networked environment where data gathering a nd analysis will be key to survival and understanding. Thus, SMEs will undoubtedly have to adopt at a faster rate than they currently do. Limitation and implications This research was restricted in scope by relying on secondary literature. It does not provide new information other than the analysis due to the lack of primary data sources as part of its limitation. Another limitation of the research would be the existence of errors in the researches and reports consulted for the study, or biases exist in the scholars’ analysis of their findings. Nevertheless, the paper serves as an important contribution that brings together the analysis of big data, the Internet of Things, cloud computing and social media in one report. Thus, practitioners will be able to get insights at a glance. Lastly, the recommendation to SME owners is that they should embrace these technologies as a matter of survival. Reference List Al-Qirim, N (ed.) 2004, Electronic commerce in small to medium-sized e nterprises, Idea Group Publishing, Hershey. Dahnil, MI, Marzuki, KM, Langgat, J Fabeil, NF 2014, Factors influencing SMEs adoption of social media marketing, Procedia Social and Behavioral Science, vol 148, pp. 119-126. Durkin, M, McGowan, P McKeown, N 2013, Exploring social media adoption in small to medium-sized enterprises in Ireland, Journal of Small Business and Enterprise Development, vol 20, no. 4, pp. 716-734. European Commission 2013a, Business opportunities: Big data, Report, EC. European Commission 2013b, Horizon 2020 Work programme 2014-2015, http://ec.europa.eu/research/participants/portal4/doc/call/h2020/common/1587758-05i._ict_wp_2014-2015_en.pdf. Kloch, C, Petersen, EB Madsen, OB 2011, Cloud based infrastructure, the new business possibilities and barriers, Wireless Personal Communications, vol 58, no. 1, pp. 17-30. Michaelidou, N, Siamagka, NT Christodoulides, G 2011, Usage, barriers and measurement of social media marketing: An exploratory investigation of sm all and medium B2B brands, Industrial Marketing Management, vol 40, no. 7, pp. 1153-1159. Miller, HG Mork, P 2013, From data to decisions: A value chain for big data, IT Professional, Jan-Feb 2013, pp. 57-59. Mui, E 2012, Do small businesses have big data needs?, Ecosystem Channels Product Marketing at SAP, SAP AG. Ramsey, E, Ibbotson, P, Bell, J Gray, B 2003, E-opportunities of service sector SMEs: an Irish cross-border study, Journal of Small Business and Enterprise Development, vol 10, no. 3, p. 250. Ruggieri, M Nikookar, H 2013, Internet of things: Converging technologies for smart environments and integrated ecosystems, River Publishers, Aalborg. Schwertner, K 2013, Modern Information Technology (IT): Factor for business efficiency and business driver, Journal of Modern Accounting and Auditing, vol 9, no. 8, pp. 1131-1139. So, G 2013, Public consultation on 2014 digital 21 strategy, Commerce and Economic Development Bureau, Hong Kong. Xia, F, Yang, LT, Wang, L Vinel, A 201 2, Internet of Things, International Journal of Communication Systems, vol 25, no. 9, pp. 1101-1102. Zhuge, H 2011, Semantic linking through spaces for cyber-physical-socio intelligence: A methodolgy, Artificial Intelligence, vol 5, no. 6, pp. 988-1019.

Wednesday, November 6, 2019

Michigan Disability Claims New Evidence Rule

Michigan Disability Claims New Evidence Rule New Evidence Rule for Michigan Disability Claims On March 20, 2015, the Social Security Administration (SSA) published new rulings on the submission of evidence, including evidence that may be adverse, for disability claims. Prior to the new regulation, claimants were only required to submit â€Å"material† evidence that proves disability. This new regulation, however, removes the materiality standard and requires claimants to inform SSA about or submit  all evidence  that relates to the disability known to the claimant. There are two exceptions – material subject to the attorney-client privilege and the attorney’s â€Å"analysis of the claim.†What This Means for Your ClaimAs a result of this new rule, both favorable and unfavorable evidence that is not subject to one of the above narrow exceptions must be submitted to SSA. This rule applies at each level of the administrative process, including appeals after a hearing has been held. For example, if the claimant appeals a decision by an Administrativ e Law Judge (ALJ) to the Appeals Council, he has this new duty to submit all evidence. We understand this to mean that the claimant, or their attorney, need only submit all new evidence to the Appeals Council if it relates to the period  on or before  the ALJ’s decision. While the burden to disclose and submit evidence rests on the claimant, representatives now have a specific duty to â€Å"act with reasonable promptness to help obtain the information or evidence that the claimant must submit† under this regulation.Exceptions to the Rule?Importantly, the two narrow exceptions outlined above do not protect withholding of â€Å"factual information, medical source opinions, or other medical evidence† that SSA may consider in determining whether a claimant is disabled. For example, the attorney-client privilege will not permit a refusal to disclose information to SSA about a medical source that a claimant told their attorney they have seen. Further, the attorney ’s â€Å"analysis of a claim† does not extend to include â€Å"medical evidence, medical source opinions, or any other factual matter† that SSA may consider in the disability evaluation process. Consequently, if a claimant’s doctor sends her or her attorney a written opinion, or record, about the claimant’s medical condition, these reports must be submitted. While those documents are not protected by any exception (even if the attorney drafted the form completed by that doctor, for example), an attorney who specializes in disability benefits can advise on other ways to deal with unfavorable or inaccurate information contained in a document. Moreover, if an attorney conducts a consultation with any medical source about the claimant’s medical condition, the information obtained may still be protected from disclosure (e.g. notes the attorney takes during or after that discussion are exempted from disclosure as an â€Å"analysis of the claimâ⠂¬ ).Seeking Professional HelpSSA reiterates the agency’s duty to develop the file and does not require claimants or their representative to request  all  evidence. SSA further explains that this rule only applies to evidence received by the claimant or the representative. There are other relevant nuances to this rule that an experienced attorney can advise about, including what evidence does not count as â€Å"evidence† within the meaning of this regulation, and therefore is not required to be submitted. Our attorneys at Disability Attorneys of Michigan, Ball Johnson, P.C.  can evaluate evidence on a case-by-case standard in order to determine whether evidence should be requested and submitted if received, or whether it falls under an exception or other nuance not requiring submission. The laws and rules surrounding  Disability claims in Michigan  are complex and ever-changing. Don’t go through it alone! Fill out our form to schedule a free consultat ion, or to discuss any questions regarding SSA’s rules and new regulations.  Call  the  Disability Attorneys of Michigan  today at (888) 678-5839.For the complete Federal Register publication, including SSA’s response to comments, see  gpo.gov/fdsys/pkg/FR-2015-03-20/pdf/2015-05921.pdf.20 CFR 404.1740(b)(1), 416.1540(b)(1) (2015).20 CFR 404.1512(b)(2)(ii), 416.912(b)(2)(ii) (2015).20 CFR 404.1512(c) and 416.912(c) require only that claimants, and their representatives, submit all evidence â€Å"received† from another source, and that it must be submitted â€Å"in its entirety.†Blog Post Provided By:Disability Attorneys of Michigan 30500 Van Dyke Ave, Ste. 400 Warren, Michigan 48093

Monday, November 4, 2019

Most effective CIO strategy for effective strategic IT planning Research Paper

Most effective CIO strategy for effective strategic IT planning - Research Paper Example This is because different countries world wide have their various policies which may affect the organization’s strategic objectives. Security of international operations and the organization’s planned information is another problem of creating an organization’s information technology plan. This is because the process involves the organizations infrastructure and its quality of information. Moreover in the world where technology is almost interconnected there is a probability of the organization to interfere with or illegitimately fake other organizations objectives as suggested by Schwalbe (2009). However the organization’s strategic objectives can also be interfered with due to the insecurity of information technology resulting from the connectedness. The cost of using information technology as well as the balance sheet implication has been a problem in developing an organizations information technology plan for its strategic objectives. This can be attributed to the fact that creating such a plan may need the organization to employ IT professionals or offer more training to its experts. This is costly as might not be within the organizations budget plan. As a result the organization ends up suffering more expenses which affect its operation as they are planned. The organization may also face the problem of integrating new technology with existing technology in data collection in order to create the information technology plan. This is due to the increasing web based applications, imaging systems, cellular and mobile phones, and electronic filing among others. The organization’s Information technology experts may not be familiar with the new technology hence end up developing a substandard IT Plan. The environment of the organization may not be conducive for developing an information technology plan for some

Saturday, November 2, 2019

What is the value in having, as well as the disadvantages in relying Essay

What is the value in having, as well as the disadvantages in relying on the Rondas campesinas to provide an alternative justice system in highland Peru (Text, pp. 287-288) - Essay Example While on the other hand, one arm of the state attempted to co-opt them and their leaders were accused of taking over the functions of the police and the judiciary; they therefore faced criminal charges that often led to incarceration. At the beginning Rondas Campesinas was comprised of primarily autonomous farmers who were mestizo and Spanish; since they had no confidence in the police or the courts of being able, or enthusiastic to protect them from organized bunch of hooligans involved in theft of cattle and other violent crimes (Hancock, 2007). They supposed that the police were too slow and incompetent in responding to unlawful activities; moreover, they thought that more could have been done to manage the routes used to move the cattle out of the area and the centre where the stolen cattle were sold. In its composition, the Ronda consist of The General Assembly, made up of peasants who posses land in a particular ham let, elects the members of the Ronda committee. The committee is further divided into sub-sections; each sector is also organized by a delegate appointed by the Rondas. Men aged 18 to 60 are expected to serve in the Ronda patrols, in as much as women do not take part in the night patrols; they support the work of the Rondas by providing food and other additional services (Starn,1990). When a suspect has been found, the Rondas’ work is to hand him over to the General Assembly for further interrogation but not to the police. The General Assembly is assigned with the task of deciding whether the suspect has committed an illicit offence, and if that is the case, what punishment should be administered. Formerly, they were not allowed by the constitution to become directly involved in the administration of justice, but latter, the comunidad campesina performs jurisdictional functions. And in most cases they use physical punishment in order to re-establish