Saturday, August 31, 2019

Cross Language Translation in a Web-based Environment Essay

One of the major problems with cross-language translations involving those that are rarely used together (i. e. Finish Lithuanian) is that there are no dictionaries available or it is extremely difficult to find one. The main problem is that there are not enough people to create a market and no one would invest in creation of such kind of dictionaries. English-based dictionaries, however, is of abundance. This project tackled the above cited problem in Cross Language Translation using English as its base dictionary. Artificial intelligence through Neural Networks was used as it appeared well-suited to problems of this nature. For this reason, artificial intelligence through neural networks was investigated as a potential tool to improve translation accuracy but future implementation was left as a possibility. WordNet ® was also investigated as source of defining English words and possible tool to achieve greater accuracy in cross-language translations. ACKNOWLEDGMENTS I would like to take this opportunity to thank all those who have contributed in any way, shape or form to the completion of this project report, those at Zodynai. org and the Anglia Ruskin University for their advice and support. Thanks to my friends and family who (once again) tolerated my lack of time and sometimes grumpy demeanour. More thanks to friends at Anglia Ruskin University for their ideas and criticism. Your support (directly and indirectly) is greatly appreciated. T A B L E O F C O N T E N T S ABSTRACT Acknowledgements TABLE OF CONTENTS INTRODUCTION OBJECTIVES METHODOLOGIES DESIGN AND IMPLEMENTATION RESULTS AND DISCUSSION CONCLUSION AND EVALUATION BIBILIOGRAPHY APPENDICES A Project Specification B User/Software Installation Guide A C Software Installation Guide B D Poster and Visual Presentations E Source Code F Abbreviations and Acronyms INTRODUCTION The multilingual world and the barriers it entails. A large number of people across the world converse in English thus it serves as the primary lingua franca for developments in the research world. Most publications and journals are published in such language. This leaves publications in other languages inaccessible and apparently, information in English is withheld from those millions who do not speak English (Diekema 2003) Recent trends promote the construction of a far-reaching complex infrastructure for transporting information across boundaries. Apparently, language shares a vital portion in the hindrances presented by National borders. Whilst the fact is inevitable that English remains the most spoken language in the whole world and though, it is true that the spread of ‘World English’ can promote cooperation and equity, longstanding linguistic competition threatens to be even more divisive in a globalizing world. (Maurais et al n. d. ) A lot is currently going on to overcome these linguistic barriers. The most efficient approach to overcoming such is with cross-language translation and in this literature it will well be mostly in the web-based-online-dictionary aspect of such approach. English has always been the main focus of information retrieval, well, that is by tradition. Many of them retrieval algorithms and heuristics stem from English speaking countries and thus are based on the said language. Over the years, these retrieval methods have been adopted by other language communities, creating a wide selection of language-specific monolingual retrieval systems. However, to ensure complete information exchange, information retrieval systems need to be multilingual or cross-lingual. (Diekema 2003) There are a lot of ways to pin down the hindrance of being in this multi-lingual world, the barrier of being in a world divided by being in English- or Non-English-speaking territories. And, as presented, the most researched approach is through Cross-Language translation. OBJECTIVES Main problem that we are facing when translating with English based dictionary is connecting various language data bases. One of solutions for this program is to create a base dictionary (as seen in Figure 1). Figure 1 Other major problem is that performing translation a lot of noise is created. As seen in Figure 2. Figure 2 We can examine this in greater detail in Figure 3. Word Autobusas is translated from Lithuanian language to Russian based on English language. Two different possible translations occur (bus, omnibus) when translating Lithuanian -> English. First word â€Å"bus† translated from English to Russian has three meanings â€Å"Ð °Ã ²Ã'‚Ð ¾Ã ±Ã'Æ'Ã' Ã¢â‚¬  †Ã ¾Ã ¼Ã ½Ã ¸Ã ±Ã'Æ'Ã' Ã¢â‚¬  †Ã'ˆÐ ¸Ã ½Ã °Ã¢â‚¬  word translated. As first few are synonyms third one has totally different value and meant â€Å"Topology bus†. As you can see on reverse translations †Ã'ˆÐ ¸Ã ½Ã °Ã¢â‚¬  will going to give you four different meanings translated in Lithuanian language. Figure 3 We are going to investigate WordNet and Neural networks approach for possible solution of this problem. METHODOLOGIES Cross-Language Information Retrieval, its promise. Information retrieval entails an individual querying about something of interest to him. Inevitably, since we are life forms known to be ever inquisitive, we do Information Retrieval in every aspect of our living. This event so commonly happens in a lot of situation and may be best displayed in a Library when a student picks his book of choice. Formally, let us define Information Retrieval (IR) as the process in which users with information need query a collection of documents to find those documents that satisfy his need. (Diekema 2003) In the electronic realm, the user queries by typing in related words, the system then processes these keywords to create a representation understandable by the system. In the course of the procedure, the system usually strips off non-bearing fragments of the query keywords such as articles like determiners, prepositions, and pronouns. The document collection undergoes the same process resulting to a list of document representations or a catalogue. To find documents that are similar to the query, the ‘stripped off’ query representation is then matched against the catalogue. When a certain degree of similarity between the catalogue and the ‘stripped off’ query has been established, the documents with the uppermost similarity scores (depending on the settings, say top 10) are shown to the user as results. This occurs typically during browsing through the internet and Google. comTM best displays this example. A development of IR is CLIR – the Cross-Language Information Retrieval, which, as the name implies, is information retrieval in a multi-linguistic environment. Consequently, CLIR techniques simplify searching by multilingual users and allow monolingual searchers to judge relevance based on machine translated results and/or to allocate expensive translation resources to the most promising foreign language documents. (Diekema 2003) Simple IR systems only consist of a Query, an Input Cleanser, a Matcher, the Document database and the Output, in logical order. The addition of Language Translators would make this system a Cross-Language Information Retrieval system. Of course the Document database would now contain multi-lingual entries as well and the output is to be presented in the way the query has been placed in the input. Figure 4 would show the Cross-Language Information Retrieval system in schematics. The method Cross-language Retrieval Systems promises users to state their queries in their native language and retrieve documents in all the languages supported by the system. (Diekema 2003) Artificial Intelligence and Machine Learning. Artificial intelligence (AI) results to simulation of intellectual practice such as comprehension, rationalization and learning symbolic information in context. In AI, the automation or programming of all aspects of human cognition is considered from its foundations in cognitive science through approaches to symbolic and sub-symbolic AI, natural language processing, computer vision, and evolutionary or adaptive systems. (Neumann n. d. ) AI considered being an extremely intricate domain of problems which during preliminary stages in the problem-solving phase of this nature, the problem itself may be viewed poorly. A precise picture of the problem can only be seen upon interactive and incremental refinement of course, after you have taken the initial attempt to solve the mystery. AI always comes hand in hand with machine logistics. How else could mind act appropriately but with the body. In this case, a machine takes the part of the body. In a bit, this literature will be tackling about AI implemented through Neural Network. The author deems it necessary though to tackle Machine learning and thus the succeeding paragraphs. Machine Learning is primarily concerned with designing and developing algorithms and procedures that allow machines to â€Å"learn† – either inductive or deductive, which, in general, is its two types. At this point, we will be referring to machines as computers since in the world nowadays, the latter are the most widely used for control. Hence, we now hone our definition of Machine Learning as the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. (Dietterich n. d. ) Machine learning techniques are grouped into different categories basing on the expected outcome. Common types include Supervised, Unsupervised, Semi-supervised or Reinforcement learning. There is also the Transduction method and the ‘Learning to learn’ scheme. A section of theoretical computer science, Computational Learning Theory is the investigation on the computation of algorithms of Machine Learning including its efficiency. Researches on Machine Learning focuses mainly on the automatic extraction of information data, through computational and statistical methods. It is very much correlated not only to theoretical computer science as well as data mining and statistics. Supervised learning is the simplest learning task. It is an algorithm to which it is ruled by a function that automatically plots inputs to expected outputs. The task of supervised learning is to construct a classifier given a set of classified training examples (Dietterich n. d. ). The main challenge for supervised learning is that of generalization that a machine is expected in approximating the conduct that a function will exhibit which maps out a connection towards a number of classes through comparison of IO samples of the said function. When many plot-vector pairs are interrelated, a decision tree is derived which aids into viewing how the machine behaves with the function it currently holds. One advantage of decision trees is that, if they are not too large, they can be interpreted by humans. This can be useful both for gaining insight into the data and also for validating the reasonableness of the learned tree (Dietterich n. d. ). In unsupervised learning, manual matching of inputs is not utilized. Though, it is most often distinguished as supervised learning and it is one with an unknown output. This makes it very hard to decide what counts as success and suggests that the central problem is to find a suitable objective function that can replace the goal of agreeing with the teacher (Hinton & Sejnowski 1999). Simple classic examples of unsupervised learning include clustering and dimensionality reduction. (Ghahramani 2004) Semi-supervised learning entails learning situations where is an ample number of labelled data as compared to the unlabelled data. These are very natural situations, especially in domains where collecting data can be cheap (i. e. the internet) but labelling can be very expensive/time consuming. Many of the approaches to this problem attempt to infer a manifold, graph structure, or tree-structure from the unlabelled data and use spread in this structure to determine how labels will generalize to new unlabelled points. (Ghahramani 2004) Transduction is comparable to supervised learning in predicting new results with training inputs and outputs, as well as, test inputs – accessible during teaching, as basis, instead of behaving in accordance to some function. All these various types of Machine-Learning techniques can be used to fully implement Artificial Intelligence for a robust Cross-Language translation. One thing though, this literature is yet to discuss the planned process of machine learning this research shall employ, and that is by Neural Networks. There is yet to be a precise definition as to what Artificial Neural Network is, though many researchers would agree that it concerns a network of austere processing elements – otherwise known as the neurons, which presents complex behaviour established by the relationship amongst processing and parametrical elements. The main inspiration that lead to the development of this technique was from the investigation of, no lesser than, our Central Nervous System and the neurons (including their axons, dendrites and synapses) which make up its most important information processing elements. A neural network model would show us that simple nodes are connected forming a network of nodes — thus, its coining as â€Å"neural network. † A Neural Network functions in 2 different manners – learning and testing. The former would literally mean, the system learns the ways it is supposed to behave while the latter is when rigorous repetition of training would eventually result to a stable system, defined by its giving of constant satisfactory outputs. Most â€Å"abstract reasoning† of an Artificial Neural Networks are being implemented through three learning types – supervised, unsupervised and the reinforced learning, as has been introduced in the preceding paragraphs. Supervised learning entails a functional relationship between the input and the output. The system has to learn every possible IO pair that can be thought of. In case, there is a miss, all that has to be done is to input the said pair into the memory of the system hence when it resurfaces, the system knows how the handle it. Hence, basically, the goal is to ‘teach’ the network to identify the given input with the desired output. (Sordo 2002) This is usually best achieved when function f has already been derived to represent the behaviour of the Neural Network system. For unsupervised learning, we feed an input and a function to the system and record what behaviour the system outputs with such input and function. To begin with the learning process, there are no IO-pairs as opposed to supervised learning. Ultimately, the main goal of achieving the stable state will be attained through rigorous repetition of test with different sets of inputs. This type of systems – imploring unsupervised learning as its method of learning, are best displayed in statistical modelling, and the likes. Reinforcement learning stems its roots from the related psychological theory that has been conceived even before AI has been. Dynamically, in this type of learning, the machine interacts with its environment by producing actions a1, a2, †¦ These actions affect the state of the environment, which in turn results in the machine receiving some scalar rewards (or punishments) r1, r2, †¦ The goal of the machine is to learn to act in a way that maximizes the future rewards it receives (or minimises the punishments) over its lifetime. Reinforcement learning is closely related to the fields of decision theory (in statistics and management science), and control theory (in engineering). The fundamental problems studied in these fields are often formally equivalent, and the solutions are the same, although different aspects of problem and solution are usually emphasised. (Ghahramani 2004) Advantages of investing a system through Neural Networks. Neural networks with always have the outstanding characteristic of deriving intelligence from the usually complicated and, oftentimes, fuzzy data stored in the neurons. These systems, oftentimes, offer to be easy utilities to deduce patterns and perceive trends that are difficult to be noticed by either human observation or by our current computer intelligence. A trained neural network is regarded as an â€Å"expert† in the category of information it has been given to analyze. This expert can then be used to provide projections given new situations of interest and answer â€Å"what if† questions. (Chung et al 2007) It is used for adaptive learning on how to handle tasks based on the input provided for training or preliminary experience. It is a self-organizational tool that hones its own picture of the data it receives in as early as learning time. Neural networks another feature is that it is a real-time operation system where all calculation may be performed in parallel. Fault Tolerance via Redundant Information Coding is another aspect of the neural system where partial destruction of a network leads to the corresponding degradation of performance. However, some network capabilities may be retained even with major network damage. The platform to a successful implementation. Several environments can be used in totally implementing a Cross-Language Translator through with the various and fast developments in computer technology since its introduction. In the succeeding paragraphs we will be tackling some of those that has come the author’s A-list. Microsoft . NET Framework. This framework form part of Microsoft Windows operating systems, containing a vast number of pre-coded resolutions to general program requirements, and governing the performance of programs written particularly for the framework. This framework is a vital Microsoft contribution and is projected on being utilized by most applications created and to be created for Windows platform. Pre-coded solutions outlining the framework’s Base Class Library (third layer from Operating System in the . NET Framework) encompass a wide range of software requirements in areas including: cross language translation, user interface, database connectivity, cryptography, data access, web application growth, network communications, and numeric algorithms. This layer contains classes, value types, and interfaces that you will use often in your development process. Most notably within the . NET Framework Base Classes is ADO. NET, which provides access to and management of data. Supervising the software’s runtime requirements, this software is written for the . NET Framework implemented in an environment. This runtime environment, which is also a part of the . NET Framework, is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine, so that programmers need not consider the capabilities of the particular CPU that will implement the program. The CLR also provides other significant services such as security mechanisms, memory management, and exception handling. The class library and the CLR together compose the . NET Framework. The . NET Framework is included with Windows Server 2003, Windows Server 2008 and Windows Vista, and can be installed on some older versions of Windows. .NET Framework 1. 1 This is the first major . NET Framework upgrade that is accessible on its own as a redistributable package or in a software development kit since its publishing on April 3, 2003. It forms part of the second release of Microsoft Visual Studio . NET – the Visual Studio . NET 2003, and is the first version of the . NET Framework to be included as part of the Windows operating system, shipping with Windows Server 2003. 7 .NET Framework 3. 5 This version was authoritatively released to manufacturing (RTM) on November 19, 2007. As with . NET Framework 3. 0, this version applies the CLR of version 2. 0. It also installs . NET Framework 2. 0 SP1 adding some methods and properties to the BCL classes in version 2. 0 which are vital for version 3. 5 features such as Language Integrated Query (LINQ). These changes, however, do not involve applications written for version 2. 0 and a separately, new . NET Compact Framework 3. 5 was released in hand-in-hand with this revision to give support for additional features on Windows Mobile and Windows Embedded CE devices. The source code of the Base Class Library in this version has been partially released under Microsoft Reference License. 7 .NET Framework 3. 5 builds incrementally on the new features added in . NET Framework 3. 0 – for example, feature sets in Windows Workflow Foundation (WWF), Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF) and Windows CardSpace. This version also consists of a number of new features in several technology areas which have been added as new assemblies to avoid breaking changes. They are: (a) deep integration of Language Integrated Query (LINQ) and data awareness which will let to write code written in LINQ-enabled languages to filter, enumerate, and produce projections of several types of SQL data, collections, XML, and datasets by means of the same syntax; (b) ASP. NET AJAX 3. 5 lets you craft more resourceful, more interactive and highly-personalized Web experiences that work transversely with almost all the most popular browsers; (c) The New Web protocol sustain for building WCF services adding AJAX, JSON, REST, POX, RSS, ATOM, and several new WS-* standards; (d) Full tooling support in Visual Studio 2008 for WF, WCF, and WPF, including the new workflow-enabled services technology; and, (e) New classes in . NET Framework 3. 5 base class library (BCL) that address many common customer requests. Visual Studio 2008 and the . NET Framework 3. 5. The Microsoft Visual Studio development system is an appropriate development instrument devised to aid developers to tackle complex problems, thus create inventive resolutions. This system’s role is to improve the development process; hence, achieving breakthroughs would be easier and more satisfying. Using the Microsoft Visual Studio Development system will be very productive for this project since it would continually deliver better ways for cross language translations with less energy and with ease from other software. It has efficient form of code editors, IntelliSense, Wizards, and multiple coding languages in one integrated development environment (IDE) to high-tech applications in life- cycle management. New versions of Visual Studio keep bringing innovative tools to help developers focus on solving problems without wasting time. With this development system, software developers gain from an integrated product experience that spans tools, servers, and services. Visual Studio products work well together with other Microsoft software, such as Microsoft server products and the Microsoft Office system. Visual Studio offers a comprehensive choice of tools for all phases of software development, testing, deployment, integration, and management. Every kind of software developer, from novice to skilled professional, can use the Visual Studio because it is engineered to support the development across all types of devices such as PCs, servers, the Web, and mobile devices. Visual Studio is the most reliable tool that is engineered and tested to be always dependable, secure, interoperable, and compatible. Visual Studio offers an unparalleled combination of security features, scalability, and interoperability. Although Visual Studio always incorporates forward- thinking features, it is designed to ensure backward-compatibility everywhere possible. Being a set of technology capabilities, core products, and best practice guidance, the Microsoft Application Platform (MAP) focuses on aiding IT and development business partners to maximize opportunity. As one of its core products, Visual Studio has always and continues to help spearhead for the right customer links, business efficiencies, and value-added services through provision of a fully integrated and single development environment for all types of advances, including Microsoft Windows, Microsoft Office, Web, and mobile applications.

Friday, August 30, 2019

A Sample Position Paper

A SAMPLE POSITION PAPER Globalization: A Transition to What? Barber, Benjamin R. Introduction to Jihad vs. McWorld (New York: Ballantine Books, 1996) Kobrin, Stephen J. â€Å"Back to the Future: Neomedievalism and the Postmodern Digital World Economy,† Globalization and Governance (London: Routledge, 1999. After the bloody clashes between anti-globalization protesters and the police in Genoa, globalization is once again on the world's agenda and it is here to stay. A dream to some and a nightmare to others, globalization is a widely debated issue among journalists and scholars, among intellectuals of all profiles, business people and decision-makers alike. Benjamin R. Barber, Walt Whitman professor of political science, and Stephen J. Kobrin, professor of multinational management, both join the discussion, each giving his own vision of what the post-modern future of this globalized world might look like. In â€Å"Jihad vs. McWorld† Barber's fragmented and at the same time integrated world is â€Å"terminally post-democratic† (20). It is pulled apart by two opposing forces: disintegrating ethnic hatreds and unifying mechanisms of global economy, none of which cares much for civic society and civil liberties. In Barber's terminology Jihad stands for the blind parochialism of any kind, but primarily for tribal instincts that tear countries apart and cause bloody wars. McWorld epitomizes the world of consumerist capitalism unified by commerce, entertainment and consumerism that knows no borders. Although Jihad seems like a more obvious threat to democracy, McWorld is no less dangerous because both are enemies of the sovereign nation states and of democracy. Barber warns that democracy might be collateral damage from the confrontation between globalization and parochial fragmentation. While Barber is primarily interested in the fate of democracy, Kobrin gives a great deal of attention to the problem of state sovereignty in the increasingly integrated world. In â€Å"Back to the Future: Neomedievalism and the Postmodern Digital World Economy† the key issue is the anticipated transformation of state sovereignty into new forms of political loyalty. Kobrin argues that sovereign state as we know it-firmly defined within certain territorial borders-is about to change profoundly, if not to wither away. National markets are too small to be self-sustainable which challenges the meaning of territorial boundaries between states. Both authors acknowledge that sovereignty, defined as unambiguous authority, is threatened. Whereas Barber finds that alarming, Kobrin takes this as a historical inevitability; modern state system, based on mutually exclusive jurisdiction, may be an anomaly rather than a historically privileged form of political organizations. Kobrin argues that we should look at the medieval world for the answers to how the future might look like. Medieval analogy offers a world of overlapping multiple authorities and absence of fixed boundaries. It is a world of multiple political loyalties-to emperors, to the pope, to feudal lords-which are complex rather than linear. Kobrin's modern analogy is European Union, with its overlap of national, regional and supra-national authorities. The medieval metaphor seems attractive, but Kobrin forgets that the world of the Middle Ages was highly decentralized rather than unified, and in that sense radically different from our own. Medieval feuds, as economic units, were self-sufficient and isolated-everything that modern markets are not. Kobrin himself argues that the integrated economy requires a strong central authority, perhaps not yet in the form of world government but certainly through stronger international organizations such as WTO. Clearly, this is a different kind of authority than a pope or an emperor might have had in medieval world. Is medieval analogy applicable at all? If we follow Kobrin's reasoning, it appears that the new world will require more rather than less authority. Nation-state's sovereignty may be eroding, but, as a result, we have an increasing supra-national authority instead of a loose authority of the medieval type. Barber, on the other hand, may be launching an artificial dichotomy. While McWorld sounds like an apt metaphor for globalization, Jihad seems to be a superficial, emotionally charged term with multiple meanings. Barber draws on Yeats and Mary Shelly to define this â€Å"heritage of race,† the force of tribal instincts, ancient hatreds, and fundamentalism. Although doubtless poetic, the concept of Jihad, as described by Barber, is confusing. He takes a few examples of ethnic conflict, such as Bosnia or Rwanda, and declares they are but a manifestation of the tribalisation phenomenon, but he does little to support his thesis. Did Bosnia really fall apart because of ancient, tribal hatreds? Barber overlooks the fact that peoples of Bosnia have been living peacefully with one another much longer than they have waged wars. Reducing complex conflicts to an oversimplified, poorly defined phenomenon such as Jihad helps Barber support his shaky Jihad-McWorld dichotomy but does little to persuade the reader that Jihad exists as such. Barber's and Kobrin's views seem diametrically opposite whereas it may simply be that they are considering different issues. There is little common ground between them in terms of problems they are interested in. They both take McWorld for granted, though. Neither challenges globalization nor tries to imagine the world as something other than globalized, digital, and integrated. Even Barber who laments over the destructiveness of Jihad admits that McWorld is the winner in the long run. Although they have different agendas, they are telling essentially one and the same thing-the future belongs to McWorld. What with democracy, Barber asks? Everyone will be a consumer, but what will happen to citizens? For Kobrin, however, the problem does not exist; just as we have civil societies within states today, in the future they will be replaced by global civil society with its mixture of state and non-state actors, NGOs, transnational movements. Are Barber and Kobrin debating at all? Their visions of the world in the future are not mutually exclusive. Barber comes up with a bold notion that not even nations constitute main players today, but tribes. His description of balkanization, tribalization and awakening of atavistic forces among peoples evokes images of dark Middle Ages. Barber warns that our civilization is beginning to resemble medieval past in which the world consisted of warring fiefdoms unified by Christianity; in our world, Bosnian Serbs and alike wage their ethnic conflicts while both the aggressors and the victims eat the same BigMacs, wear jeans and watch MTV. It seems that he is also looking at the world through medieval prism, albeit from its dark side. It is precisely the dark side that Kobrin avoids confronting. He is intentionally focused on the practicalities of managing the world in the future so he lefts out of the picture the unpleasant details. Fragmentation is one of the issues that he chooses not to consider although he acknowledges that some authors, such as Kaplan offer a less optimistic vision of the world torn by refugee migration, private armies, collapse of nation state and civil order with it. Kobrin's only response to this grim prophecy is little more than hope: â€Å"One hopes that such an age is not part of the neomedieval metaphor, hat a new and more terrifying barbarian is not on the horizon† (183). Walled communities and private security forces that he admits appear increasingly today could be, Kobrin still hopes, only â€Å"ephemeral products of a world in transition and not a permanent characteristic of the postmodern era† (183). Barber, Benjamin R. Introduction to Jihad vs. McWorld (New York: Ballantine Books, 1996) Kobrin, Stephen J. â€Å"Back to the Future: Neomedievalism and the Postmodern Digital World Economy,† Globalization and Governance (London: Routledge, 1999.

Thursday, August 29, 2019

A Song Analysis by Walt Whitman

The poem, A Song, by Walt Whitman appears in Leaves of Grass. This edition collection of poems appeared in 1867. It is the workshop for the other versions that followed. â€Å"A Song† is not as well-known as some of Whitman’s other songs. This one like many of his poems celebrates comradeship and nature. It appears in the Calamus section of the 1867 book. It does not appear in later additions. The poem praises the soldiers who fought for America’s freedom. The emphasis on comradeship grows throughout the four stanzas. It starts with life-long love grows to manly love and ends with high-towering love. He uses lots of images from nature as well including â€Å"trees along the rivers,† â€Å"along the shores,† â€Å"all over the prairies. † This emphasis of the water is no coincidence as ships and those that worked on them fascinated Whitman. He loved ride the ferries and spend time along the East River in New York state. His patriotic side shines through this poem too with phrases like â€Å"the continent indissoluble,† â€Å"divine magnetic lands,† â€Å"O Democracy. † His ideals of a united nation present in the poem, contrast with the country as it really was, with racial problems and disputes between the North and South. This ideal grew out of his visits with wartime veterans after seeing the harm that segregation did to the country. At very young age, this ideal emerged through his friendship with Tom Paine, who wrote Common Sense. Whitman wrote this poem shortly after the Emancipation Proclamation produced the freedom that many questioned could ever occur. Keats, Bryant, and Emerson inspired much of his poetry and followed their examples especially in his newer editions of Leaves of Grass. In â€Å"A Song,† music tries to ring through the words. Whitman was a master at matching images with musical sounds. The reader can almost hear the river through the trees or the song of the prairies. In the poem, his love for music reaches out to people. Music is universal and brings people of all races together. Whitman seems to say that through song all nations can achieve these things. By replacing the â€Å"I† in this poem with songs or song, the reader sees how important song and music became to Whitman. Whitman was largely self-taught learning his trade as a teenager. He worked in a print shop. He learned much about journalism and grew to love writing in all its forms. Among other things, he was a schoolteacher, a journalist, an editor. He also wrote fiction and essays.

Wednesday, August 28, 2019

Extra assignment 2 Essay Example | Topics and Well Written Essays - 500 words

Extra assignment 2 - Essay Example While the literature reviewed in assets and skills management shed a lot of light on the different aspects of this subject, the literature on knowledge management brought out the methods of managing the organisational knowledge. The difficulties and issues in managing virtual and extended teams also brought out the importance of culture awareness in managing such teams. This paper will extensively shed light upon how the IT sector has changed lives. Management of resources can be defined as a comprehensive approach to the collection, storage, process, maintenance and electronic information and the exchange of information between different organisations (de Brisis 141-149). There are a plethora of resources that an organisation can exploit for its development, such as competencies or skills, assets, knowledge, and so on. Due to the rapid evolvement of the globalisation, the resources and their management have also become distributed over time and space in different regions across the world that have different cultures and attitudes. Management of Information Technology at the global scale is full of challenges. But there are also benefits that accrue to the organisations from the global resources that are accessible to them. Information resource management is important to the organisation for gaining advantages over the competition and maintaining the successful operations of the organisation. The advantages of good management of resources lie in improved productivity and quality of decision-making, as well as in the enhancement of the task performance and organisational learning curve (Feng 1-24). Resources that are valuable and rare can benefit the company that owns them because of their obvious competitive advantage. But this advantage is temporary and can be made to sustain if the firm is able to protect the resources from being imitated, transferred or substituted. Assets are of prime importance to a company, assets can be of two types

Tuesday, August 27, 2019

Michelangelo Merisi da Caravaggio Essay Example | Topics and Well Written Essays - 1000 words - 1

Michelangelo Merisi da Caravaggio - Essay Example He was born on September 29, 1571. By the time he was eleven, he became an orphan and he became an apprentice to Simone Petersano of Milan. When he was seventeen, he went to Rome to work for more artists. For five years, he jumped from one employment to the other, as an apprentice for other painters with less than impressive talents. In 1595, he sold a painting to Cardinal Francesco del Monte. Caravaggio was now under the wings of the church and enjoyed the protection of the cardinal, complete with board and lodging, plus pension in the house of the cardinal. He was now a commissioned artist and is quite famous. His works are very realistic and this appealed to the people in that era. His clients were mostly the religious but despite the spiritual deprivations Caravaggio had when he was growing up, he delivered his art quite well. He must have had at least forty works made for Del Monte. The realism and the play of light started showing in his paintings styles. One must take note that this happened in the Baroque period. Baroque art is heavily influenced by religion, specifically, the Roman Catholic religion. It also reflects the tensions between Roman Catholicism and Protestantism. In the early fifteenth century, the Roman Catholic Church answered the Protestant Reformation movement with Counter Reformation and used art to influence its faithful followers. The light play in light and shadow, as well as the use of realism and portrayal of everyday life was the main schemes of this movement. This is why Caravaggio became successful in this era, as he was supported by the clergy. As there was emphasis on realism and the everyday life, Caravaggio employed laborers as models for his paintings of saints. This act was taken as an offense by the public but he never had a shortage of commissions (but this movement about representing religion in paintings faded, as Baroque as an art movement emphasized daily living and realism). He

Monday, August 26, 2019

DS Assignment 7 Coursework Example | Topics and Well Written Essays - 500 words

DS Assignment 7 - Coursework Example This has been worse on countries that have benefited greatly on the monetary policies of the Fed. Higher levels of international liquidity relative to short-term liabilities and lower balance sheet vulnerability to currency depreciation have enabled most countries in the Latin America to withstand any financial breakdowns (Franko, 2006). The fact that Latin America expects to experience an increased economic growth in the current year, reforms geared towards increased productivity have been enhanced and are expected to dominate the forthcoming international talks. The policymakers’ attention has to shift to other macroeconomic aspects given that financial risk problems seem to have been adequately dealt with such as fiscal policy evaluations as well ensuring that the interest rates remain low so as to encourage investments as well as consumption and the exchange rate. This will aid economies that had been badly affected by tapering of the Fed in the previous year provided that they take control of huge current account deficits and reduction of labor costs as well as assets’ valuation (Blair, 1999). The recent financial crisis have triggered new debate on the impact of gender on the economic cycle as well as making policymakers to reconsider earlier studies by (Bullock, 1994) who tried to explore the effect of women in employment on recession. He had earlier suggested that the vulnerability of women could be viewed in three dimensions namely demand side in which the recessionary effects are triggered by the pattern and form of gender segregation. The second dimension is about how women are committed to participation in the labour market and the common belief that women may act as a flexible reserves in who are willing to quit their positions in times of low economic demand. The final view is about a keen consideration of the role played by the

Sunday, August 25, 2019

Oceania Research Paper Example | Topics and Well Written Essays - 2500 words

Oceania - Research Paper Example Polynesia is made up of more than 1000 islands spread over central and South Pacific Ocean. The occupants of Polynesian are called Polynesians. According to the history, the occupants were sailors who used stars to determine night hours. The land is about 70 million sq miles of Pacific Ocean. Polynesia is made up of two different cultural groups, east and west Polynesia. The culture of west belong to high populations, it is made up of well build institutions of marriage, well developed judiciary, financial and trading traditions. The groups that occupy this area are the Tonga, Niue, Samoa and Polynesian outliers. According to the (Richard, 2011) the eastern part is adapted to small islands such as cook, islands, Tuamotus, Marquesas, Hawaii, and Rapa Nui. The leaders were appointed based on their blood hereditary. The settlement in the area was of two categories, the hamlet and village, the size of an island was the determining factor on whether the hamlet or a village will be build. In the large volcanic islands, the hamlet was mainly built because of many zones; these zones could be divided all over the islands. Villages were established on the coast of small islands and it consist of 40 or more houses. Melanesia extends from Arafura Sea to the western part of Pacific Ocean, and Fiji to the east. The people occupying the region are called Melanesians and are believed to be he ancestors of Papuan speaking people. The number of languages in Melanesia is about 1320 and they are scattered across the land. The leaders were appointed based on the individual personality not through inheritance or blood like the Polynesians. The key components for leadership were power of persuasion, selecting high placed woman as a partner and many other physical factors. Micronesia lies to the Melanesia to the south and to the east is Polynesia; Philippines to the west and Indonesia to southwest. Micronesia is made up of 607 islands and it has four states, Chuuk, Yap, island of Kosr ae and Ponpei. The original languages of Micronesia indigenous people are in a class of Austronesia language family (Richard, 2011). The island was colonized by Spain in 17thcen. Later on the Germans purchased it from the Spanish in 1899. The Japanese fought out the Germans from the island in 1915 but American forces took over from the Japanese during the world war 11. The Micronesia culture is one of the last to develop in the region; it is a mixture of Melanesians, Polynesians, and Filipinos. One of the main ethnic groups in the region is Fijians. Fijians arrived at Fiji when it was already occupied by the Melanesians, but Melanesians was still weak since they were still new in the area. Due to their strong war tools, they managed to fight out Melanesians and occupy the area. Due to the conflict between the two groups, Fiji ends up being a place of relentless and bloody conflict. The early missionaries and traders who visited the islands show the details of extreme violence and ca nnibalism. In the Fijian culture, warfare, cannibalism and religion were interdependent (Richard, 2011). The traditional rights and customs demand bodies and sacrifices to be carried out for the security of the society, at the same time for a war to be carried out successfully; it needs the mediation of priest and the help from

Management 4100 Cultural Diversity Essay Example | Topics and Well Written Essays - 500 words

Management 4100 Cultural Diversity - Essay Example he fast casual dining experience, of which Noodles & Company is part of, is also popular with consumers aged less than 24 years because it has an informal atmosphere and offers value for money, especially after the recent economic crisis. The largest segment that is expected to visit the restaurant will be those aged between 24 and 35, especially since this is the age group that frequents fast casual restaurants the most. The reason for this is the unhurried nature of service and the provisions that fast casual restaurants make for small children (Anthony 35). Most of those aged above twenty-four are expected to be both female and male, especially because those visiting Noodles & Company in this age group will be married. It is also expected that they will have small families, maybe between one and three children, and they will be in the middle-income bracket (Walker 54). Most of them will be employed with university education. Since this restaurant is to be opened in Qatar, it is expected that they will be Muslims; although, the world cup in 2022 is expected to bring in customers of all religions. This group is made up of strivers who attach importance to status and image, contended conformers who seek to be normal and follow trends, and are traditionalists who are averse to risk taking (Walker 56). For the 18-24 age group, both genders will be targeted. This age group will not be expected to have children with them, although most Noodles & Company restaurants in the US have seen a rise in couples visiting. Their income is expected to be relatively lower than the former, and they will be students in high school and university. This group is made up of self-actualizers who are exploring change, creative, and individualistic. They are also innovators who are setting their own achievement targets and are risk takers. Finally, they are esteem seekers who are materialistic and aspire for success symbols (Walker 57). Because the 18-24 age group was the most hit by the

Saturday, August 24, 2019

Insights at IT Essay Example | Topics and Well Written Essays - 250 words

Insights at IT - Essay Example Moreover due to lack of interest of customers in the software products owing to their high prices, the software companies have started offering web-based services in which the software programs are not installed on the computer of the customers but services are offered to the customers on web. The customers have started to think that they are not getting the proper business value from the software programs because they think that they are spending more and the return is less. One of the reasons behind this thinking of the customers is the large maintenance costs that they have to pay when the subscription expires. The proof of this lack of interest on part of the customers is the discount offers by various software companies and the increase in the use of web-based software services. The article Six IT Decisions Your IT People Shouldn’t Make, I have observed that the most disastrous practice which is very common in the IT organizations these days is letting IT people prioritiz e the projects according to their business magnitude. No doubt IT people are best at their work and can actually carry out projects successfully but deciding about the projects that which project is the most beneficial for the company is not the job of IT people.

Friday, August 23, 2019

Nursing Research Essay Example | Topics and Well Written Essays - 1000 words

Nursing Research - Essay Example Critiquing a research work, therefore, involves a careful examination of all aspects of the study, to assess its strength, limitations, meanings and relevance, in a bid to gain adequate up to date knowledge, improve practice and provide essential data necessary for further studies (Hek, 1996; Burns and Grove, 1999). 1. Problem Statement: The study was conducted to evaluate patients' satisfaction with two different routes of follow-up monitoring care for patients with Rheumatoid Arthritis - Primary care settings involving a General Practitioner and/or practice nurse, and Secondary care settings involving a specialist team within hospitals and including case management by a Rheumatology Nurse Specialist (RNS). This research problem is of great importance to the nursing profession, as it evaluates patients' satisfaction to specialized nursing service delivery. 2. Study Purpose: The purpose of the research was to compare Rheumatoid Arthritis patients' satisfaction with a General Practitioner led primary care and a Rheumatology Nurse Specialist (RNS) led secondary care settings. ... it can be inferred from the study aim that the research question would be something like: Are patients more satisfied with primary care or secondary care settings for follow-up care and monitoring 4. Hypothesis/Hypotheses: Hypothesis is a statement, which predicts the performance of a verifiable occurrence in certain conditions, based upon theoretical considerations (Stevens et al, 1993).The hypothesis of this research was not stated, also; however, the main hypothesis the research appear to be testing was: Rheumatoid Arthritis patients undertaking disease modifying antirheumatic therapy (DMARDS) are more satisfied with follow up monitoring and care provided by specialized nurse-led secondary care settings. 5. Study Variables: The two main variables of the research, as identified by the researchers are: primary and secondary monitoring of patients with Rheumatoid Arthritis undertaking DMARDS. 6. Conceptual/ Theoretical Framework: This study was guided theoretically by the former exploratory study carried out by the same authors, which indicated factors such as attitude and empathy, information provision, continuity of care etc influenced patients' satisfaction with care received. The present study sought to explore these qualities within the context of primary and secondary care. 7. Review of Related Literature: According to Massey (1995), the essence of a literature review is to analyze what has been said so far and thus demonstrate what is known about a research problem, and, in the process establish the need for the current study. The authors of this study contend that there was a lack of adequate literatures that relates to the satisfaction of rheumatology patients with monitoring follow-up. They identified and reviewed only three articles. However, one can argue

Thursday, August 22, 2019

Working Capital Simulation Essay Example for Free

Working Capital Simulation Essay This simulation has given me a better understanding of what managers and CEO’s go through when making decisions for the company. As I went through each simulation more than once to see what affects the decisions had on cash flows, sales and EBIT. In some situations they changed whether it dropped or risen, and others they were completely stagnant with their movement through each phase. Below I will point out how and why I made each decision. Phase 1, I chose to acquire a new customer and tighten up accounts receivable in both times I did the simulation. I chose to take on a new customer because SNC needed the exposure to become known as it is starting to get widespread exposure. The results of this acquisition were that it increased the sales significantly but also left us with higher receivable an inventory balances. (Harvard SNC Synopsis) The results of tightening up the accounts receivable were that sales have declined but the receivables improved which freed up cash. (Harvard SNC Synopsis) In phase 2, I chose to expand the online presence as well as develop a private label in one simulation and the second simulation I just chose to expand on line. In my first choice since I chose to expand online and develop the label, the amounts varied in increase of cash flows. The expansion of the online presence increased Internet sales and the private label increased the EBIT margin only a little. This also counteracts with the accounts receivable and inventory balances after phase one. But it was not that drastic of a change. In ’17 there was no increase or decrease in cash flows, which only means that in that year we broke even on the developing label side. The last phase, I chose to adopt a global expansion strategy in one trial and in the second I chose to adopt and acquire the high-risk customer. The results of acquiring a high-risk customer increase the sale, but had a dramatic affect on the receivables. SNC has now to consider witting off a portion of the outstanding balance as the company Midwest Miracles filed for chapter 11 bankruptcies. This simulation alone has taught me one of the many risks of doing business with any company. (Harvard SNC Synopsis) I thought that after acquiring the company, they could maybe stand on their own with the help of SNC and pull out of their financial hardship. It had the complete opposite affect on the SNC and it could have potentially ruined my company, as well as made me lose investors. The global expansion however helped the SNC grow its top of the line with the new customer Viva Familia. Like expanding online, the global strategy was another attempt to make sure SNC is the first company consu mers think about when dietary supplements. Limiting access to financing can hinder any company or person from trying to grow their business. It can cause higher interest rates on loans and credit fees as well as force businesses to face hardships when it comes to registration costs, policies and equipment needed for the business. (Parrino, Kidwell, $ Bates, 2012) It can also limit the profits they may encounter with consumers on in the new market. The limit of access to finances also hinders the process to develop and own their own brand of products. Making a if I were really the CEO of SNC or any business, I would need the help of a team to help make these decisions on and expansion and growth as well as investing in other companies. This simulation put in perspective the skill set and education needed after studying finances to even hope that you can make a profit on any decision made. It is a really difficult task to try and manage a company as well as keep up with the market. If this were a sole proprietorship, it would really be stressful to handle all by their lonesome. Reference: Harvard Business Publishing. (2012). Working capital simulation: managing growth. Retrieved May 16th, 2915 from, http://forio.com/simulate/harvard/working-capital/simulation Parrino, R., Kidwell, D.S, Bates, T.W. (2012) Fundamentals of corporate finance (2nd ed.) Hoboken, NJ: Wiley

Wednesday, August 21, 2019

Examining The Impact Of Mentoring Desistance Among Prisoners Criminology Essay

Examining The Impact Of Mentoring Desistance Among Prisoners Criminology Essay This chapter seeks to situate the importance of the impact of mentoring in promoting desistance among ex-prisoners, and why effective interventions such as mentoring which aim to reduce reoffending are crucial for the wellbeing of society and should therefore be explored in order to discover which elements of such interventions do or do not promote desistance. A critical review of current relevant literature in the field of mentoring and how it impacts on desistance will be reported on and hopefully a gap within that literature will be identified which this research will attempt to address. The Problem of Reoffending The Social Exclusion Unit (SEU) has provided some of the most overwhelming statistics regarding reoffending ex-prisoners and has declared that Prison sentences are not succeeding in turning the majority of offenders away from crime (2002: 5). Fifty eight per cent of prisoners released in 1997 were reconvicted of another offence within 2 years of being released from custody, and of those, thirty six per cent also went on to receive an additional prison sentence (SEU, 2002: 5). Even though the Ministry of Justice (2010: 2) declare that the proportion of ex-prisoners reoffending is actually falling (noting a decrease in re-offences from forty three per cent in the year 2000 cohort, to forty one per cent in the 2008 equivalent), and The Home Office recent Five Year strategy for protecting the Public and reducing reoffending (2006: 9) claims Crime is going down. The risk of being a victim of crime is at the lowest level in 24 years, reoffending rates still remain persistently high. In conjunction with punishment, the reform of offenders is crucial to reducing reoffending and delivering justice to the public. But when these figures quoted from the above sources are combined they make for shocking reading and depending on how they are interpreted can imply that current rehabilitative interventions which aim to reform offenders and reduce reoffending, are thus failing. This raises questions about how current rehabilitative interventions can be improved to achieve their aims, or if new interventions, such as mentoring for example, should be researched further, and used more widely (and possibly in place of current strategies) if they show positive effects. Rehabilitation Criminal Justice theories of rehabilitation broadly take the stance that crime is best prevented by working directly with offenders to address the personal, social and economic factors most closely associated with their offending behaviour, which Canton and Edie term as their criminogenic needs (2008: 93). Millie and Erol (2006: 2) identify some examples of criminogenic needs as, substance misuse, poor educational and vocational skills, poor cognitive and interpersonal skills, and antisocial attitudes. By focussing on these risk factors it is more likely that an offender will successfully rehabilitate (Millie and Erol, 2006: 2) and desist from committing further crime. At the beginning of the 20th century, penal policy was strongly influenced by a theory of rehabilitation. Unfortunately rehabilitative strategies failed to live up to the claim that they would reduce recidivism according to Martinson, resulting in his gloomy conclusion that nothing works (1974) and provoking a loss of confidence in the rehabilitative ideal during the 1970s and 80s in Britain (Hollin, 2005: 7). However, through a series of meta-analytic reviews which developed the What Works agenda, and provided a compelling case against Martinsons (1974) declaration, Britain witnessed a remarkable resurgence of the rehabilitative ideal in the 1990s (Hollin, 2005: 8). The general message of the meta-analyses that took place during the What Works movement was that when rehabilitative treatment was used with offenders it could have small but noteworthy effects in terms of reducing reoffending. McGuire and Priestly (1995) outline their interpretation of these key areas through a set of guiding principles, concluding that if followed they could lead to greater effectiveness in program content and delivery. These guiding principles are; Risk Classification- effective risk assessment is said to be required for the accurate matching of the clients with the level of delivery of certain rehabilitative programmes Focus on criminogenic needs Responsivity- matching styles of learning between worker and service user Community based interventions Treatment modality- a combination of skills-orientated, cognitive behavioural and other methods Programme integrity- that ensures programme aims are reflected in the methods used (McGuire and Priestly, 1995). However, it would be wrong to assume that the case for treatment was established as it is difficult to derive the exact magnitude of this overall treatment effect (Hollin, 1999: 3) from the meta-analyses, and perhaps more significantly because not all interventions that were researched had the same effect on recidivism, making the findings unreliable to a certain degree. Like all research methods, the meta-analysis process also has limitations, with Sharpe (1997) noting that; mixing dissimilar studies into the analysis and only using published research (of which some might have involved poorly designed and conducted original studies), results in meaningless findings (cited in Hollin, 1999: 7). This research will attempt to overcome some of the ambiguities that arose from the findings of the What Works era that although provided evidence of what does work with offenders in tackling reoffending generally, provided little in-depth and substantial evidence regarding what aspects of certain programmes (such as mentoring) promoted desistance among offenders and will seek evidence of this from service users themselves who have not traditionally been asked to comment on the service they receive (Ford et al, 1997). Resettlement Another process which aims to reduce the likelihood of prisoners reoffending upon release into the community is known as resettlement which although does hold out hope for the rehabilitation of offenders, focuses most of its attention on the pressing practical problems faced by many ex-prisoners, which if solved or at least significantly improved can go some way to reducing the likelihood of reoffending. The charity User Voice which draws on insights from offenders in order to develop strategies to reduce reoffending (User Voice, n.d) highlighted in its report The User Voice of the criminal justice system that gaining treatment, accommodation and work are key factors in the journey toward successful resettlement (2008: 13). Likewise a report from the Home Office (Lewis et al, 2003: 8-9) which evaluated the findings from 7 pathfinder programmes placed an emphasis on providing a co-ordinated approach to practical resettlement problems and recommended that the gaps it identified in provision of services needed to facilitate reintegration of offenders prompt a need for; Improved partnership working with Employment Services, Benefits Agencies, local authorities and relevant voluntary/private sector agencies; and access to a wider range of suitable housing, among others. Recent legislation and policy has attempted to combine ideas from theories of Rehabilitation and Resettlement and recommendations from reports such as those detailed in order to combat the problem of reoffending through various new strategies and most importantly through the creation of the National Offender Management Service. This has generally meant increased levels of alternative interventions being used in criminal justice in order to reduce reoffending, such as mentoring. Current Policy The Governments Reducing Reoffending National Action Plan (Home Office, 2004) translated the Social Exclusion Units recommendations most specifically (2002) into policy, with its core focus on the resettlement of prisoners after release. This National Action Plan required the production of Reducing Re-offending Strategies and linking Action Plans for the delivery of key services which were divided into seven separate pathways including; accommodation, education, training and employment (ETE), mental and physical health; drugs and alcohol; finance, benefit and debt; children and families of offenders; and attitudes thinking and behaviour (Maguire and Raynor, 2006: 4). The delivery of these services enacted by the Home Office (2004) now takes place in a dramatically different organisational framework after the creation of NOMS which brought Probation and Prison under one management system and most importantly for purposes of rehabilitation and resettlement introduced end to end offender management, meaning an offender would now be under the supervision of one manager throughout the whole of their sentence. This new concept of end to end offender management implies the close involvement of partner agencies in service planning and provision (Maguire and Raynor, 2006: 5), and is an important move for third sector organisations such as mentoring projects, who are now increasingly seen to play an influential role in the resettlement of ex-prisoners and reducing reoffending. This optimism for third sector organisations is supported by the Ministry of Justice in reports such as Working with the third sector to reduce reoffending: securing effective partne rships 2008-2011 (2007) and by NOMs in its consultation paper Volunteers Can: Towards a volunteering strategy to reduce re-offending (2007). This newly found optimism for third sector organisations to be able to improve the chances of successful rehabilitation and resettlement thus reducing the likelihood of reoffending, has naturally lead to an increase in the prevalence and use of such organisations including mentoring projects, as part of criminal justice interventions. The Rise of Mentoring Joliffe and Farrington (2007: 2) note that mentoring is used in the criminal justice context to increase the life successes of individuals who are at risk of reoffending by providing direct practical assistance (for e.g. filling out housing applications, assisting in searching for employment) and indirect support (for e.g. by acting as a positive role model). By providing individuals with both of these forms of support, mentoring aims to assist in reducing reoffending and increase positive life outcomes (Joliffe and Farrington, 2007: 10). For the purpose of their systematic review Tolan et al identify the following 4 central characteristics of mentoring; Interaction of two individuals over an extended period of time. Inequality of experience or power between the mentor and the mentee (recipient) with the mentee possessing a greater share. The mentee is in a position to imitate and benefit from the knowledge, skill, ability, or experience of the mentor. The absence of the role inequality that typifies other helping relationships and is marked by professional training, certification, or predetermined status differences such as parent-child or teacher-student relationships (Tolan et al, 2008: 6). Mentoring is a relatively new concept to the UK, especially in the field of criminal justice. It is identified by Newburn and Shiner that mentoring originated as a formal response to social exclusion and social welfare problems in the US (2006: 1), with one of the earliest mentoring programmes being identified as the Big Brothers Big Sisters of America (BBBSA) which was established in 1904. The Big Brothers/Big Sisters programme has since expanded rapidly in the US and is used as a template by other mentoring organisations with similar visions elsewhere in the World including the UK (Big Brothers Big Sisters, n.d) through ventures such as The Dalston Youth Project (DYP) and Big Brothers Big Sisters UK (Newburn and Shiner, 2006: 2). Although, despite its increasing popularity mentoring continues to be associated with a number of difficulties. Defining mentoring becomes difficult due to the vast set of practises it can cover including one or all of the following; coaching, facilitating, counselling, befriending, tutoring, teaching, role-modelling, buddying or life-styling (Phillip, 1999; Clutterbuck, 2002). It is these definitional problems combined with the contemporary nature of the intervention that creates further difficulty in assessing the value of mentoring, which is why there is little empirical research evaluating its impact, particularly concerning how or why it is or is not of benefit in promoting desistance (i.e. what aspects of mentoring impact on desistance) and not simply does it reduce recidivism. The Effectiveness of Mentoring Most evaluations of mentoring schemes have originated from the US and report generally favourable findings in relation to reducing reoffending. For example, Becker (1994) studied delinquent youths who were involved in the Partners Inc. Mentoring programme and reported a 65-75% reduction in recidivism. In Joliffe and Farringtons rapid evidence assessment (2007) 18 studies were analysed in order to assess how successful mentoring is in reducing reoffending, with 7 of these showing a statistically significant positive impact on reoffending, demonstrating a 4 to 11 per cent reduction of subsequent offending for those involved in these mentoring schemes. It was noted though that this result was driven primarily by those studies with lower methodological value. The best studies that were designed to provide the most accurate assessment of the impact of mentoring actually suggested that mentoring did not cause a statistically significant reduction in reoffending. It was also noted that due to the restricted time-period that their study had to be completed in, it was unrealistic to be able to include unpublished studies, difficult to obtain materials and foreign language studies. This can reduce confidence in the findings and also results in publication biases due to there being a greater tendency for statistically significant findings to be published over studies that show non-statistically significant findings. However, there are other advantages to mentoring, which may impact on reducing reoffending but which cannot be directly measured (For e.g. improving chances of gaining employment). Most research into mentoring appears to focus significantly on quantitative measures of success rather than qualitative approaches, which might provide a better measure of its benefits. For example when Newburn and Shiner (2006) conducted a study of the Mentoring Plus scheme they did not find it impacted successfully on reducing re-offending per se, but they did find the impact of mentoring was strongest in relation to engagement with education, training and employment (a key pathway to aid reducing reoffending). But similarly to some other studies, they took a cautious approach in their conclusion of their evaluation by stating that mentoring faces an uncertain future (2006: 17) but it has real potential (2006: 16). Clancy and colleagues (2006) have associated through the gate work with lower reconviction rates due to the mentor having already established a positive relationship with the mentee in custody and this being continued after release ( See also; Hudson et al, 2007). This is supported by Hudson et al (2007) who highlight mentoring schemes as a promising strategy to assist ex-prisoners in settling in at their initial accommodation and assisting their progress afterwards. The structure of mentoring can also affect the success of mentoring schemes. Joliffe and Farrington (2007) found that the mentoring programmes that were most successful in reducing reoffending were those where the mentee and mentor met at least once a week and spent longer periods of time together when they met. St James-Roberts et al (2005) also identified that programmes lasting over ten months, including 15 meetings on average, and had a steering group, were recognised as most successful. They found that the characteristics of the mentee also had effects on outcomes too, reporting that mentees who were younger, had a lack of offending history and were female were most successful. Joliffe and Farrington (2007) noted that when mentoring occurred as part of a multi-modal programme, with a larger number of interventions involved, these programmes tended to be more successful in reducing reoffending. Pathfinder studies (Lewis et al, 2007) also provide support for the growth of interventions based around a combination of cognitive-motivational work and facilitating offenders access to service agencies. Other benefits of mentoring on reducing reoffending have come from Clancy et al who completed a review of the Transitional Support Scheme (TSS) which provided mentoring for offenders in Wales. The study concluded that the scheme produced statistically significant changes in offenders attitudes to crime and that offenders found assistance completing forms and managing finances the most useful aspect of mentoring (2004, as cited in Ministry of Justice, 2008: 10-12). Furthermore another vital factor in the effectiveness of the scheme was that the mentors were understood by offenders to be detached from the criminal justice system, therefore mentees were more likely to participate in a relationship with them. The most recent systematic review of mentoring schemes has come from the Campbell Collaboration in the US (Tolan et al, 2008). The study evaluated the effects of the mentoring interventions included in their study on delinquency outcomes for youthand key associated outcomes (2008: 5). The Review concluded that when the 39 included studies were analysed for outcomes measuring delinquency or closely related outcomes it suggests mentoring for high-risk youth has a modest positive effect for delinquency, aggression, drug use, and achievement (2008: 8). They noted that effects were strongest when emotional support was a key process in mentoring interventions (2008: 8). However, Tolan et al are wary not to make any sweeping conclusions about what elements of mentoring make it an effective intervention by stating that the valuable features and most promising approaches cannot be stated with any certainty, putting this down to the remarkable lack of description of key features or basic progr am organization in the studies included in their review (2008: 8). They finally call for more careful design and testing of mentoring effects to provide the needed specificity to guide effective practice of this popular approach (2008: 5). On the whole mentoring seems to be a promising intervention and the elements which have been identified as making it effective, have been highlighted, but there is still a lack of research into mentoring effectiveness from the UK, especially concerning its impact on adult rather than young offenders or at risk individuals. This implies that most mentoring projects in the UK have begun due to a leap of faith. Most studies that have been published into the effectiveness of mentoring so far have also been overly concerned with quantitative analyses of mentoring with the majority only being interested in reconviction rates, resulting in them only been able to provide some general and tentative statements about what specific elements of mentoring might impact on its ability to reduce reoffending. This ignores the possibility that qualitative approaches may provide a better measure of the benefits of mentoring, as they are able to assess the numerous indirect impacts mentoring may have on desistance in the long run. There is also a lack of studies focussing on the thoughts of the service user and as it is ultimately only the offenders themselves who can stop reoffending it is vital that their views on how this should be done are taken into account, this is reinforced by Matzas method of appreciation in which aim is to comprehend and illuminate the subjects view and to interpret the world as it appears to him (1969: 25). The Process of Desistance Farrall and Calverley describe desistance as the process of ending a period of involvement in offending behaviour (2006: 1). This definition recognises that the study of desistance is not primarily concerned with whether an individual has committed further crime or not but rather the journey towards becoming a non-offender. Maruna (1998) supports this by claiming desistance is not an event but a process (as cited in Farrall, 2002: 65) and Laub et al define desistance as a gradual movement away from criminal offending (1998: 3). It has been widely agreed that one of the most important influences on future offending patterns is a change in offenders thinking as well as their circumstances. For example Zamble and Quinsey who concluded from their study of released male prisoners in Ontario that habitual offending is best predicted by looking at an individuals acquired ways of reacting to common situations (1997: 147) and that pessimistic or negative reactions to common problems for many prisoners can lead them to give up on attempts to lead a crime free life. Similarly Marunas (2000) interview-based study lead to him conclude that what he terms different kinds of narrative (or the personal understandings or accounts of behaviours and situations) can either support desistance or continued offending. Maruna found that a key factor in narratives that promote desistance was the belief that the offender had begun to take control of their life, where as in comparison those still offending seemed to have little vision of what the future might hold, [but] desisting interviewees had a plan and were optimistic they could make it work (2000: 147). DiClemente and Prochaska (1982) identify a broad cycle of change with specific stages; Pre-contemplation Contemplation Action Maintenance, which people might pass through when attempting to change any previously habitual behaviours. A persons readiness can be affected by a range of factors which might include among others; major life events, age, physical and social circumstances and social bonds (Maguire and Raynor, 2006: 24). Burnett instead refers to a zig-zag path of desistance which involves reversals of decision, indecision, compromise and lapses, and suggests that if interventions are to facilitate the desistance process this ubiquitous state of ambivalence should be fully acknowledged and addressed (2004: 169). Another element which many writers agree is a central component in the process of desistance is the generation and maintenance of motivation (See Maruna, 2000; Maruna and Immarigeon, 2004). But however strong a persons narrative or motivation to change is, this can be seriously frustrated by a range of social problems, such as persistent accommodation problems or barriers to employment (Burnett and Maruna, 2004: 8). As people undergo a process of change and begin to desist they will also need new skills and capacities appropriate to their new lifestyle, and access to opportunities to use them (Maguire and Raynor, 2006: 8). They will need to acquire new social and human capital, with human capital referring to the skills and knowledge that an individual possesses and social capital being conceptualised as socially structured relationships between individuals, in families and in aggregations of individuals in neighbourhoods, churches, schools and so on (Hagan and McCarthy, 2007 as cited in Farrall, 2004: 60). It is suggested that if ex-offenders do not have access to these new appropriate social capital and human capital then the process of desistance could be slowed down (Farrall, 2004) which the use of a volunteer mentor would hopefully overcome. Maguire and Raynor (2006) suggest that many of the observations described above from desistance theorists have implications for interventions aiming to reduce recidivism and the following points should be taken into account by those involved in the resettlement of offenders, such as mentors or probation officers, in order to foster change and reduce reoffending; There is a need to respond to offenders individual needs rather than applying a one size fits all series of interventions. It is important that the offender takes the lead in the process of change or that it is understood as a shared effort between the offender and one attempting to foster change in them. Emphatic support required in order to maintain the motivation of the offender. It is imperative that assistance is given in taking advantage of opportunities to improve the lifestyle of the offender and in attaining relevant skills for them. Motivation of the offender can be maintained by overcoming social and practical problems. It should be expected that relapses will occur, whereby the offender falls back into previous patterns of behaviour, but this should not act as an indication that desistance has failed (Maguire and Raynor, 2006: 8). Like many of the studies of mentoring that have already been discussed Maguire and Raynor (1997) also highlight the importance of throughcare, suggesting this may increase the chances of interventions being effective, and the offenders involved desisting. They define throughcare as encompassing the following characteristics; Early preparation for release and planning. Creation of a close relationship with the offender before they are released from prison. A focus on continuity between work started with individuals whilst they are in custody with work taking place upon release. The provision of any required services (for example a drug treatment worker) as soon as is possible after their release (Maguire and Raynor, 1997). As has been proven through the evaluation of previous studies into the impact of mentoring on reoffending, as a rehabilitative intervention and one which aims to aid the resettlement process, it has huge potential to be able to curb offending behaviour. However little research has yet to be done into what impact mentoring can have as part of the whole process of desistance and what it is about mentoring that specifically encourages or discourages the mentees to desist in the long run. Maguire and Raynor (1997; 2006) have gone at least some way to link how interventions should be structured in order to promote desistance, and this dissertation will be exploring this process in relation to the specific intervention of mentoring.

Tuesday, August 20, 2019

Investigating The Mechanism And Impact Of Nectar Card Marketing Essay

Investigating The Mechanism And Impact Of Nectar Card Marketing Essay To explore the effectiveness of customer centric theory by the implementation of loyalty cards in retail business. To make a critical review about the operation and success of Nectar card Sainsbury in maintaining the customer relationship in current business environment. To investigate more about some practical theories used by Sainsbury for the implementation of Nectar cards in their business. To evaluate the impact of Nectar card among Sainsbury customers to point out some valuable suggestions thereby to improve the effectiveness of nectar card in business of Sainsbury. Research background In this competitive market the main factor affecting the business is the effective strategic management in the business. Information technology is the most effective factor now days. Therefore all the business organizations are to be careful in maintaining effective IT related strategies for the effective business. Sainsbury is a well established supermarket network in London. They have made a strategic approach by using the IT sector as by using the nectar card as an service to the customer where as using it as the information collector for the effective business. They mainly focus to meet customer requirements. In this proposed research I am planning to do a research on the nectar card used by the Sainsbury at Holborn, London. By using this effective strategy of management Sainsbury have achieved a wide range of customers at Holborn. As they use this card to keep an updated record of data of their customers and to keep a track of their regular customers. By this research I am focusing on the main sections on the strategic application of the information technology of the Nectar card in the business management of the Sainsbury. ORGANIZATION BACKGROUND: Sainsbury, An organization with more than 140 years old opened its first showroom in the year 1869 by Mr. John James and Mary Ann Sainsbury from the time of its establishment towards Sainsbury has very well strategic planning for the instant we can very well see that Sainsbury opened its first showroom in Drury lane, it was the one of the poorest area in the in the country England and they started to sell the high quality products at the lower rate which attracted people all over the place and from the time being the rate of success of strategic decision were very high which lead to the growth of the Sainsbury from 1 store to the 800 stores by the year 2010. The other main strategy adopted by the Sainsbury was they aim to sell to product under their own brand name and first among them was the smoked bacon. The bacon was smoked in their in store under the smoking oven. Sainsbury had a very large shortage of the workers during the First World War and they started to recruit women to wo rk in their in store and many other store roles were assigned to the women. (j-sainsbury,2009) In 1950s Sainsbury our self service stores are started in the UK much before many competitors have implemented and this had made Sainsbury a different store from others continuously the strategies adopted by the company goes at higher success rate one of the result among them was the in the year 1969 their own brand products accounted for the 50% of their turn over.(j-sainsbury,2009) GOAL OF SAINSBURY: The major o goal of the Sainsbury is by providing good quality shopping experience at the convenient price with the highest quality available in the market. Sainsbury aims at the higher customer expectations for the daily lives which makes the life of the customer easier.(j-sainsbury,2009) VALUES OF SAINSBURY: Sainsbury value for the passion for the healthy, safe, fresh and tasty foods, our focuses towards delivering great products at fair prices, a history of innovation and leadership and a strong regard for the social, ethical and environmental effects of our operation have continued to stand the test of time. (j-sainsbury,2009) Five major principles followed by the Sainsbury are: Bringing the best for the food and health. Integrity in sourcing Environment respect. Marking positive effects in the community. Making working environment a better place to work. (j-sainsbury,2009) LITERATURE REVIEW: LOYALTY CARD: Loyalty card is an another marketing strategy adopted by many business organization and loyalty card is provided by different organization and marketed by different organization in different name and some among them is the Nectar card, Club card, Reward card etc. Usually loyalty card is a plastic or paper card usually looks like credit or debit card in which the name of the card holder will be imprinted in the face of the card. Loyalty card is the usual name famous in the UK region and its name varies in different region in the world. The other side of the card typically will have a magnetic strip or a barcode so that they can be easily scanned to the system when purchasing the products. (loyalty,2008). A retail firm in the in the retail industry may issue this loyalty card towards the customers or consumers which can be then used as an identification procedure in order to find the particular customer. The loyalty gives the data of the consumer regarding demography as well as the other relevant data. It gives data such as the address as well as the number of families in the home. Each and every loyalty card issued by the retail merchandise will have customer privacy statement as well as the non- disclosure data about the customers and these data will not be disclosed between the others users of the same retailing sector. These data provided by the loyalty card can be used for the both externally as well as internally. These data can be used to analyze the data such which will be better and favorite brand for the particular customer or whether the consumer is vegetarian or not.( loyalty,2008) EPOS: Electronic point of sales: EPOS data are usually used by the retailing groups like supermarkets, hypermarkets, pharmacies, chemists, convenience stores, small independent stores, petrol bunks, cash and carry, off license as well as in pubs and restaurants. Electronic point of sales data are the much useful data to the retailer like the one which when the customer swipe the card at the till of the shop all the details like what all are the things purchased by the consumer will goes towards the marketing wing and as per the data available the marketing wing can able to analyze the customer and they can provide provides rewards and loyalty program according to the taste and nature of the consumers or customers.( loyalty,2009) NECTAR CARD: Nectar card is a loyalty card as well as a loyalty reward program mainly based in the UK region supplied with the partnership of the business giants like Sainsbury, American express and BP. The nectar card was introduced into UK in later of 2002. (nectar,2009) Nectar is maintained by the private organization named Loyalty Management Group UK and now it became the part of Group aero plan. The helpline is mainly based on the Tyne and in Mumbai. Nectar card has maintained a 5 year plan from the year 2002 and thus helped to overtake the club card issued by the Tesco and by the year 2010 Nectar card has became popular 2in the UK. (nectar,2002) Sainsbury uses the data from the nectar card by the process of EPOS. Sainsbury valuate each and every customer by the process of EPOS services provided by the nectar card. At the time of billing process Sainsbury stores each data in the database through this process they can be able to analyze what all are the products which are mostly sold in the particular day and they can analyze the trends in shopping of the consumers as well as the customers. By looking over the database of each customer they can be able to analyze the taste of the consumers like whether he or she is vegetarian or non vegetarian through this analyze they can be able to provide particular offer toward for the particular products for the customers and at the same time they can be able to provide offers for the products which are not usually used by the consumer. During each seasons for example during the month of Christmas if consumer or customer consumes wines they can be able to provide seasonal offers for the p articular products at particular time. (j-sainsbury,2003). Rationale I had been employed by the firm and have found that with the advent of loyalty cards the company is capable of promoting its sales very easily. The loyalty cards have made market analysis and exploitation of customer behavior carry with nominal expenditure very effectively than any other method. Hence being from an IT background and as learning Business Management, I thought to keep me ahead in this era of technology based business. This research will horn me with more knowledge. Hypothesis Loyalty cards are the simplest ways to analysis and understand periodical customer behavior and to promote business regionally. Methodology Don Erwin says The main reason for studying research methodology is that it provides a time-tested, proven means of providing new, reliable knowledge that accumulate the growing body of knowledge.(Ethridge,2004,p.10) The methodology of research can be explained as the systematic method to solve the research problem or the scientific method of doing the research and meeting the objectives of the research. Research methods and methodology closely related parts of the research, in which the methodology has many dimensions and method can be viewed as the part of this .This makes the methodology of a research always wider than the research method. Thus in this context researcher should well aware about the research methods as well as methodology before doing a research. (Kumar, 2008, p.5) The research can be classified on the basis of a number of factors like objectives, data used, data collection methods, the use of the research, approach of the researcher etc. most of the time a research may be the combination of more than one type. So following are the classification of some major type of research in which my research is more related to. Descriptive Vs analytical research The descriptive research mainly concentrates on the descriptive approach of stating the affairs and research problems. This make use of the main research methods like survey method, observation   and other primary data collection method in spite of the secondary data which is already available. An important characteristic of this research is that it can only describe what is happened or happening and no control over the variables of the research topic. But in the case of analytical research the researcher make use of the various information and facts which is already available for the evaluation of the research topic, so that no need to collect fresh or primary data.(Kumar, 2008, p.8) My research is planned to make use of both primary and secondary types of data so my research is more related to descriptive type research than analytical type. Theoretical Vs Empirical Research In the theoretical way of doing a research the researcher primarily selects some of the theoretical facts and information from the sources like articles, journals, books etc then the researcher further analysis the research questions on the basis of this data which is mainly the secondary data. But in the case of the empirical data the research begins with the help of secondary data but latter the researcher also make use of some of the primary data for the further analysis of evaluating the hypothesis and finding the answer to the research questions. . (Schwab,2004,p.15) In the empirical research secondary data helps to make a detailed analysis of the research topic were the primary data helps to find out key ideas and values of the topic, altogether makes the research more reliable and meaning full. Because of this strong advantage I am making use of Empirical research method in my research. Explanatory Vs predictive Research Explanatory research mainly carried out in the situation in which the researcher should find out the reason behind a particular phenomenon which is already happened and is related to the research topic. In this type of approach the researcher identifies different factors or variables and analysis this variables with the help of predicted hypothesis and objectives. In this type of research the researcher can make strong interpretations on the basis of the collected data, but in the case of predictive research the researcher is making predictions regarding the various factors with the help of the collected data. (Gratton, 2004,p.9) Since in my research there is no scope for prediction of phenomenon and also requires the interpretations of collected data my research is more explanatory. Qualitative and Quantitative Research Qualitative and Quantitative is the most important classification on the basis of the date used to carry out the research. The data is mainly classified into two, one which contains narrative explanations and interpretations called qualitative data but the other contains numerical data and its analysis called the quantitative data. The researches which uses qualitative data for proceeding the research is called qualitative research, similarly research which uses quantitative data is called quantitative research. Most of the research is the combination of the quantitative and qualitative approach called the mixed approach. In my research also in making use of both type of research so its a mixed research approach. Quantitative Research This approach concentrates more on measurement and evaluates of the quality or amount, on the factors which can be expected in terms of the quality. This is more related to the quantitative phenomenon and quantifiable data. By implementing this research type the researcher can be able to analyses the topic very precisely with the help of set of procedures and rules so that the reader can get a clear picture of the issues under consideration. (Kumar, 2008,p.10) The scope and limitations of the quantitative approaches are follows. Scope of quantitative research The quantitative research is helpful to the stake holders to evaluate the performance of the company very clearly and easily. Since the analysis is strictly based on the objectives and main points the comparisons can be easily done. Quantitative approach is easily replicate and highly reliable. The authenticity of data used in this type of research can be verified easily The authenticity of quantitative data which is used in the quantitative research analysis can be easily verified. Limitations The main limitation of Qualitative type of research is that it can be effective only with the help of quantitative research. The approach holds minimum flexibility. Highly depends on the authenticity of the numerical data used in the analysis. If the data is not reliable the whole research becomes meaningless and insignificant. Highly time consuming and expensive to perform. This type of research should be planned carefully to ensure the correct destination. Qualitative research Through this type of approach the researcher can easily evaluate and illustrate human behavior and related issues.   Qualitative research is a very important in business researches because it is vey useful in the product design and sales. Through this the user can easily evaluate the preference and habits of the people and can predict the future of the product whether it is viable or not commercially. Qualitative research mainly supported by a realistic and provable hypothesis which can be analyzed to reach the research result.(experiment-resourses,n.d.) Scope of qualitative research Qualitative research is very useful if the research topic is complex with the help of hypothesis and clear objectives. Approach helps the researcher to explore and interpret the real world experiences which is impossible in the case of quantitative analysis. Depth evaluation of the topic is possible in a detailed manner so that the research will be more useful for the readers. Procedures are flexible so that new levels of research can be established very easily. Can make maximum use of the previous researches and also can point out the ignored factors in the previous researches. Limitations Highly influenced by the personal skill of the researcher so that the quality of the research cannot be ensured with the quality data and data collection methods. Systematic comparison is difficult because of the aggregative approach of the research. Low reliability and less precise when compared to the quantitative research. Since the research is more concentrated on the personal experience , general trends opinions ,judgment etc ,this can only be effective in the qualitative method of analysis. Mathematical analysis is impossible. Data collection Methods The most important step in a research is its data collection. By which the data for the research is collected. This step is much important in a research, as proper care is to be taken for the reliability of the data collecting and towards the relevance of those data. For these collecting of data there are few methods which can be classified as primary and secondary data. The main collection methods used are secondary method which includes methods like collecting data from internet, books journals etc. but in the few cases the collection of primary data may face difficulties as it is fresh and new data collected. Primary data collection methods This method is used to collect data from the area of research directly by using various primary data collecting methods. The researcher uses various methods like questionnaires, interviews, surveys etcà ¢Ã¢â€š ¬Ã‚ ¦ the primary data is fully depended on the subjects and hence there is a chance of bias if the subjects are not trust worthy. In this research I am planning to do: Observation method: This is the method of data collecting by the process of observing the working environment at the area of research, in this research it is the working environment off the Sainsbury super market at Holborn, London. This collection method is done by the direct participation of the researcher. Advantages: In this method of data collection the data collected may be more reliable as the researcher has a direct personal experience in the area of research. Observation method is an effective where as an simple method by which the researcher can get a direct contact with the working environment of the area of research and can collect data effectively and easily Direct contact with the employees can be helpful for the success of the research. As they may be able to provide data much easier. Disadvantages: In few situations the information collected by the direct contact may be incomplete and may require further effort on it. The validity and reliability of the data collected by the observation method may not be confirmed. As only a proper skilled researcher can analyze the working environment of an activity effectively. As the part of collecting data in this research, I am using the observation method as I had an experience of six months in this super market and this method is mostly reliable one. Questionnaire method In this method of data collection, I am intending to prepare a collection of questions related to the research topic to find out relevant data for the research. Advantages: Questionnaire method helps to provide data according to the relevance of the research. As all the questions in the questionnaire are directly linked to the research objectives. Collection of data can be done much effectively and easily than conducting an interview. In this method of data collection it is easy to get data from a very large number of persons as the questionnaire can be supplied to them in a short period of time. Disadvantages: In this method of data collection in few situations the participants may not be ready to provide accurate data. All the questions in the questionnaire are to be answered effectively by the participant incase to do easy analysis. As there is possibility of anonymous questionnaires the participants may have a negative feel towards the questionnaire. (Cresewell,2002,p.25).   Interviewing method: This is the method by which I have to formulate a structured frame of the questions which lead me to collect the data which supports my research.   The responses towards my questions by the participants make my research much effective one. Advantages: This is a method by which the data is collected by the researcher by direct contact with the person related to the research area therefore this is much effective to collect relevant data for the research This method of data collection is an flexible one as the questions may vary according to the person. This method helps to get the primary data more easily and reliably as the interview is done with the person who can provide effective data and it is conducted by the researcher itself. Disadvantages: There may be limitations for the researcher to publish data provided by the interviewee in the interview in some situation. As the data may be much confidential related to them. This is a process which takes much time in analyzing and sorting of the data also to lead the data to the finds of the research questions I am planning to conduct a direct interview with the manager of the Sainsbury Supermarket at Holborn, London.  Ã‚   Secondary data collection methods   Secondary data collection means those data which have already be collected and published. Also can be accessible from various sources like journals, articles, books, internet etc. these data collected will   be much reliable if we take proper care in the selection of the sources we use. In this research I am intending to use various above mentioned sources which are reliable.   Advantages: The data can be easily and effectively collected in this method as the required sources are easily   accessible by the researcher through various libraries, internet etc The books which are much reliable as published and written by qualified persons makes those data more reliable and relevant. As the data collected will be already arranged or sorted by the pre-publisher the sorting of data will be easier. Disadvantages: As there are various unreliable sources it is difficult to identify the reliable one and the unreliable one. The improper updating of various websites in the internet may affect the reliability and relevance of the data. As all the data are published before there may be a tendency to copy the work done by any other person which means practicing plagiarism. Ethics in research Ethics in the research is one of the most important factors the researcher should take care of because this can create trust of the reader on the research. The ethical principles can be applied to all levels of the research like planning, evaluating, data collection conducting etc. Integrity, honesty and confidentiality are the main factors which can contribute a lot to the ethical behavior of the research. Some of the ethical standard a research should maintain is follows, Avoid the use of information which can harm environment, individual and property unnecessarily. Reliability of the information and individuals in the research should be ensured. The confidentially and privacy of the data should be preserved whenever necessary. Suitable precautions should be taken when dealing with the individuals in the research to maintain the reliability of the research. Try to avoid big economic expenses, big reward and contract for the study to avoid the falsification of information.