Wednesday, July 31, 2019

JKL International plc. International Human Resource Essay

INTRODUCTION With the trend of globalisation, the number of multinational companies is constantly increasing as well as expatriates (Business Recorder, 2011). Expatriate management now is an essential issue of human resource department because it takes a large amount of budget from the corporation. It is inevitable for expatriates to face culture barriers in subsidiaries because of unique national cultures in all countries over the world. National culture is †cultural experiences, beliefs, learned behaviour patterns, and values shared by citizens of the same nation† (Neale _et al_, 2006, p.26). A national culture will significantly affect any employee working in firms and furthermore, national culture will influence the management framework in a company as well accompanied with organisational culture so that cross culture management is helpful not only for the supervisors’ decisions but also for employees especially for expatriates (Chen, 2006, p. 2). In the case study of JKL, it showed a range of problems in their expatriates which related national cultures and JKL will implement a British managerial system into its Russian subsidiary. This essay will first examine the problems and issues in managing expatriates in JKL and then evaluate the proposal from Jim Flinn, the CEO of Zagorski who will apply an entire British managerial system into a Russian subsidiary. ORGANISATIONAL CONTEXT (CASE STUDY) JKL is a British pharmaceutical company which was founded in 1925 and it has expanded its business by acquiring other pharmaceutical companies in Malaysia, India, Greece and USA. Recently, JKL has made the largest acquisition of Zagorski, a pharmaceutical company in Russia. At the headquarter of UK, JKL applies a decentralised organisational structure. All managers are required to give their own opinions to avoid some drawbacks of group decision making which is conformity pressure in groups (Robbins and Judge, 2009, p.336). Employees are allowed to propose valuable ideas to manufacture and administrative systems as well. Supervisors will award monetary incentives (one of the physical needs) as motivation to employees and managers (Carrell, Elbert and Hatfield, 2000, p.129) if their initiatives are judged as potential innovations. On the other hand, in subsidiaries, JKL applied localised human resource practices in order to fit local cultural values and legal systems (Dowling, Festing and Engle, 2008, p.217) by keeping local managers with existing  organisational and managerial systems. In past years, those subsidiaries in Malaysia, India and Greece were continually making profits to JKL and JKL also regularly sent managers and specialists to those subsidiaries for expatriation in a period of time. After the acquisition of Zagorski, Dr. Jim Flinn will be the CEO who had spent last three years in the subsidiary of USA. PART ONE: EXPATRIATES MANAGEMENT AND CROSS CULTURE MANAGEMENT IN MULTINATIONAL CORPORATIONS INTRODUCTION Culture is a popular topic in literature research and it could be described as a †software of the mind† (Hofstede, 1991, p. 2) .With the trend of globalisation, managing cultural differences has become an important issue in human resource management of multinational corporations. Misunderstanding may be occurred if culture differences are not well-managed even these colleagues are working in the same organisation (Hall, 1995, p.6). In the case study, seven expatriates of JKL have their own problems and for JKL, there is a high expatriate leaving rate after repatriation (Appendix F). This essay will identify the problem of seven expatriates working in JKL and its subsidiaries and after that, rational proposals of changes will be given to them on the basis of improvements of JKL’s human resource department. EXPATRIATES AND ORGANISATION PROBLEMS AND PROPOSALS FOR CHANGES EXPATRIATES In the case study it lists seven expatriates with their problems and in the following essay they will be numbered from A to G. A (RETURNED FROM PENNSYLVANIA, USA) According to the case study, expatriate A was the first expatriate to Pennsylvania because of an attractive salary. The reason of returning is that expatiate A was annoyed about following managers received better compensation packages than him although they were almost doing the same works. The main problems of the human resource department of JKL are rewarding system and lack of correct performance appraisal system. †Every employee believes, and most experts believe, that pay and rewards are an important part of an organisation’s human resource management† (Harris, Brewster and Sparrow, 2003, p.91). In fact, the first expatriate to a subsidiary will face loads of difficulties in practical and then try to solve them as a pioneer (Business Wire, 1998). As a result, the first expatriate is deserved to have a better compensation package than followers. As the perspective of organisation, the first expatriate may important to human resource managers because this person can be regarded as a training model of human resource management (Arusha Times, 2009, p.16). On the other hand, because of lacking effective performance appraisal, expatriate A had a lower compensation package compared with following managers and that may be the reason of the compensation package of expatriate A was retain unvarying for a long time as well. Expatriates sometimes will feel unfair if performance evaluate system is not effective enough because insufficient performance appraisal system may make expatriates uncertain of their performance especially for those hard working expats (Gordon, 2010, p.56). The possible solution of dealing this problem is establishing an effective reward system by performance appraisal (Performance -related reward system). Performance-related pay (PRP) can change the payment from a rigid structure to a flexible way depended on performance (Harris, Brewster and Sparrow, 2003, p.94). By applying this system, the productivity of employees will be significantly increased and for expatriates, they will be motivated and more  willing to finish their assignments as well (Gielen, Kerkhofs and Van, 2010, p.299). Furthermore, accurate evaluation is also a factor which company need to take account because there is an essential link between motivation and performance appraisal (Carrell, Elbert and Hatfield, 2000, p.315). B (RETURNED FROM INDIA) The reason of expatriate B returning to UK is that his spouse and child had enough of India living and schooling as seemed to be suffering (Case Study). The main problem of the human resource department of JKL is expatriate selection especially in cross-cultural suitability and family. Cross-cultural suitability and family are two of the most crucial criteria of expatriate selection (Dowling, Festing and Engle, 2008, p.120). In culture aspect, Hofstede’s national culture model demonstrated the main various between UK and India in power distance and individualism (Appendix A). According to appendix A, the power distance column in India is much higher than it in UK as well as individualism so that there maybe the reason of his spouse had enough of India. In addition, unlike Western Europe civilisation, there is a caste system in India which cause the high power distance and many females in India basically are not regarded as equal to males (Robert _et al_., 2000, pp.654-656). Moreover, individualism in India is much less important than UK so that residents in India intend to work, study and live collectively (South Asian Studies, 2011) that is totally different to UK. As a result, the wife and child keened on back to UK because of the cultural adjustment problem while her husband was still working only with British colleagues (Case Study). The solutions will be provided here are selecting an appropriate candidate as an expatriate and putting more emphasis on cross-cultural suitability and family requirement. Cotemporary, the family element is having more important weight in expatriate selection because of non-working factors and potential influence to working expatriates (Andreason and Aaron, 2008, pp. 386-387). C (RETURNED AFTER A-FIVE-YEAR-ASSIGNMENT AND WOULD BE SENT OUT IMMEDIATELY) The problem of JKL here is about repatriate management and in detail; it will be related to re-entry management. In general, after completing an international assignment, an expatriate will go back to the home country as called re-entry or repatriation (Harzing and Ruysseveldt, 2004, p.337). However, most repatriates will cope with culture shock after they back to the home country. Using an example of India and UK here, although many British work in India as expats for its booming economic and after their finishing assignments, back to UK, they therefore only find they cannot work under a UK context (The International Herald Tribune, 2009). That may be the reason that JKL sent employee C abroad again without hesitation in order to avoid coping with culture shocks (Case Study). It is obviously that JKL need to improve their repatriate management and there are many models here from other multinational companies. JKL could ‘Offer repatriation training, pre-departure training, and re-entry orientation to employees and their families’ (Liu, 2005, p.129) and expats can increase the awareness of repatriation and decrease the uncertainty after back to the home country . Moreover, JKL could prepare a job vacancy in expatriate management division of human resource management because expatriates have various working experiences in other countries (Berman and Ursula, 2009, pp.80-81). D (NOW WORKING IN GREECE AS AN EXPATRIATE) The major issue of expatriate D in Greece now is adapting the local customs and culture in Greece although JKL had a prepared pre-departure training programme (Case Study). In Hofstede’s national culture demonstration of UK and Greece (Appendix B), the uncertainty avoidance is extremely high and no long-term orientation in Greece. In the case of expatriate D, a problem of communication is occurred as well. In theoretical aspect, there four problems in cross-cultural oral communication: †semantics, word connotations, tone differences and differences among perceptions† (Robbins and Judge, 2009, pp.407-408) and English and Greek are classified to two different language system. As a result, it will take a longer training  programme to completely learn and understand a foreign language. Likewise the body language and gestures in England are slightly different to the world, for example, a †V† gesture means victory or peace in many countries but in England, †if the palm and fingers face inward, it means ‘up yours’ especially if executed with an upward jerk of the fingers† (New York Times, 1996, p.E7). Consequently, post-departure training is a rational option for expatriate D to continually make adjustments into Greek culture. The reason is that post-departure training is suit for expatriates living in a country which has an entirely different culture and it can accelerate accustoming another culture (Managing Training and Development, 2005). E AND F (CONFUSED AFTER REPATRIATE) Expatriate E and F have similar problems after finishing their international assignments because JKL currently have no response about their repatriate (Case Study). The problem of JKL must be repatriate management. The possible solution will be provided here is putting emphasis on repatriate management. In fact, in last ten years, there is an increasing number of multinational corporations focus on repatriate management while in 1990s, only few companies would hold a re-entry discussion. According to a survey in 1997, only 27% firms supposed to hold a discussion about re-entry and it had been improved in 2000s. In 2004, there are 86% companies intended to discuss the re-entry issue (Dowling, Festing and Engle, 2008, p.199). JKL could offer repatriate supports to repatriates such as give interaction to human resource management to increase the sense of loyalty so that the company can avoid losing these experienced employees (Harzing and Ruysseveldt, 2004, pp. 343-344). G (THOUGHT GREEK DISCRIMINATE AGAINST FEMALE) From expatriate G’s case, it seems Greek dislike the idea of female even she is well qualified or experienced (Case Study). Thus, for JKL, it shall  investigate the culture and even the working environment in Greece. From Hofstede’s national culture model, UK and Greece possess almost the same figure in masculinity and Greece actually has a lower masculinity figure than UK (Appendix B). However, the power distance in Greece is much higher than it in UK which means whatever a male or female, their ideas are hardly applied to supervisors as an employee. In Greek working condition, it is surprisingly to find much evidence of discrimination against female. According to an official report written by Greek Helsinki Monitor (GHM) and the World Organisation against Torture (OMCT) (2002, pp.13-21), there are approximately 4500 rapes in working communities every year and only 6% are reported to police. Furthermore, Sexual harassment in communities is common in Greece due to no specific legislation of sexual harassment. Those factors may be the reasons of Greek male employees discriminate against female in the working place. In JKL’s view, it is a challenge to solve this problem as well, one of the effective ways is sending a male expatriate instead of female employee in Greece to prevent any hidden risks in Greece and make further investigation in Greek subsidiaries. ORGANISATION From the case study, JKL have a high expatriate failure rate (Exceed 46%) in subsidiaries except USA (Appendix F). JKL has paid a low attention on cross culture management because it applies a localised managerial system and most managers in the subsidiaries are from the host countries. In fact, many multicultural corporations which apply localised managerial system have the same issue in manage culture difference (National Centre for Vocational Education Research, 2006, p.1). According to Brunstein (1995, pp. 275-280), a localised managerial system will positively fit the local context and it is easier to bring profit like autonomy units in a shorter of time than centralised management system. However, the drawbacks are employees especially the expatriates from the parent company will probably face a huge  culture shock in the subsidiary if their cultures are totally different. As a result, JKL must release many improvements in human resource department especially in expatriate management field. If JKL continually applies a localised managerial system in acquired firms, it may only have problems on expatriates’ management. However, once the supervisors intended to transplant the whole management system into a country with entirely different national culture like flag-planting, it definitely will bring a serious impact to the target subsidiary and the worst consequence may like the failure of Japanisation entering UK in 1990s. CONCLUSION The main problem that JKL has is on its international human resource management as a part of managerial system. In the case study, seven expatriate had a range of typical expatriate problems comprising training, expatriate selection and repatriate management. Moreover, 43 per cent of expatriate left JKL after their repatriation and at least 46 per cent of expatriate cannot complete their tour in subsidiaries except USA. In short, those fundamental factors of expatriates’ problems are totally based on various national cultures that JKL need to take account in its cross culture management. PART TWO: APPRAISE THE DECENTRALISED MANAGERIAL SYSTEMS OF JKL APPLIED IN RUSSIAN AFFILIATE INTRODUCTION Like national cultures, many companies have developed their own organisational culture as well as managerial structure. Organisational structure is important to multinational corporations because it will definitely interact with different national cultures in host countries (Francesco and Gold, 2005, p.236). In the case study, JKL applies a  polycentric control system in Malaysia, India and Greece and decision making authority is awarded to subsidiaries in order to avoid drawbacks on the motivation and political problems in these countries (Stonehouse _et al_, 2004, pp.382-383). As a result, those subsidiaries make profit very shortly (Case Study). This essay will evaluate Jim Flinn’s proposal who intends to transplant a whole managerial system from JKL headquarter to its Russian affiliate. STRENGTHS AND WEAKNESS OF JKL’S AND ZAGORSKI’S STRUCTURES AND MANAGERIAL SYSTEMS At the headquarter in UK and its affiliate in USA, JKL uses a decentralised management structure and employees will be empowered to make decisions on their own works (Case Study). Currently, many European multinational companies applied decentralised managerial structure and developed an organisational culture called ‘old boys network’ with high autonomy (Bartlett, Ghoshal and Birkinshaw 2003 pp.342-343). Decentralised structure is one of the most successful management systems in transnational corporations which has experienced a long time modification and has generated many derivative systems. Under this system, diverse standards are made to fit specific manufacturing cases and it will enhance developing new and innovative products (Johnson _et al_, 2008, p. 166). For JKL, it is a brilliant choice because innovation is actually a crucial factor to a pharmaceutical company. Yet, the weak point of this system is hard to implement global business strategies because those subsidiaries are working as autonomies while Zagorski used to apply a centralised structure which renowned for the efficiency of implements business strategies. Furthermore, JKL developed a monitoring system with performance appraisal in headquarter and USA which can significantly motivate employees in working place (Decenzo and Robbins, 1999, pp. 292-294). However, there are a few weaknesses of performance appraisal system. For example, a report from General Electric (GE) which applied performance appraisal system and it found that those employees who received a honest but negative feedback from supervisors would actually not motivated them but decrease the motivation in their work  (Oberg, 2000, p. 64). On the contrast, a centralised structure has a formal bureaucracy system with a tall hierarchy and fixed official duties (Francesco and Gold 2005, pp.240-241). This structure is therefore suit for small or middle-sized companies at the beginning stage for effective control power in strategy implementation (Jeong, 2001, p. 446). One the other hand, the Economist (2004, p.33) found that with the increasing size of firms, a centralised structure will constantly lose the efficiency of decision making process through the complicated bureaucracy system and the employees will get used to receive orders from supervisors instead of expressing their own idea. In addition, there is no performance related rewards in Zagorski because a tall hierarchy management system proposed to make a uniform management system by formalised, vertical and fair control so that regulations are designed to fit every employee as a same unit (Czinkota, Ronkainen and Moffett, 1999, p.712). NATIONAL CULTURE DIFFERENCES JKL used to transplant their management system to its subsidiary in USA and it successful worked. This is the main reason that Jim Flinn, the former manager in US affiliate wants to transplant the system to Russia again. Before making the final decision, it is necessary to analyse the reasons of this success in USA. As main economics in Europe and North America, there are many similarities in the national culture of UK and USA. According to Harris, Moran and Moran (2004, pp.297-298, pp. 437-440), free enterprise, culture affinity, English speaking, private, good manners, aggressive and self-realisation are the common key words of American and British. Moreover, in Hofstede’s national culture model (Appendix C), the national culture of USA and UK are almost the same and in uncertainty avoidance column, USA is slightly higher than UK. However, Russia is totally a different country in East Europe. First, employees in Russia are regarded as a kind of cost rather than a resource (Organizational Dynamics, 1999, p.75). Second, beside the language usage, all management decisions are made by supervisors in business context.  Furthermore, Russian basically have a slow time sense and they intend to work collectively (Harris, Moran and Moran, 2004, pp.497-500). In Hofstede’s national culture demonstration (Appendix D), Russia has a higher power distances, lower individualism, higher uncertainty avoidance and no long term orientation compared to UK and USA. From a report, Russian firms used to apply a reactor business strategy in order to meet immediate need instead of long term benefits but most of those companies are finally failed (Milles and Snow, 1978, p. 353). RELEVANT CASES After culture analysis, it is showed that there is a huge difference in national culture between Russia and UK. Hence, it is not sure that Jim Flinn will still succeed again in his transplanting programme. Look back at history, in 1990s, Japanisation once became a popular word in UK and Toyota established its manufacturing plant in Derby in 1992 because there was an existing skilled engineering workforce there (The Independent, 1992, p.23). During the early 1990’s only about 55000 people were employed by Japanese companies in the UK (The Journal, 1999). Japanisation is a Japanese managerial system with Cost-centred Just in Time System, long term contracts, vertical integration to supplier and low labour turnover rate (Hasegawa, 2001, pp.165-166). However, once Japanese manager attempted to entirely implement this system into British subsidiaries, it was not worked effectively with British employees and many Japanese companies like Nissan finally failed in UK market because Japanese manufacturing method did not fit British economic and culture conditions with collective working method (Procter and Ackroyd, 1998, p. 241, pp.244-245). In Hofstede’s national culture model (Appendix E), Japan is a collective, success oriented and long term oriented country with high uncertainty avoidance which is almost an opposite of UK. It is recommended to apply a centralised managerial structure in Russia because many most Russian companies applied a †traditional production-oriented culture with strong factory patriotism† just like a  typical Soviet traditions (Clarke, 2004, p. 418). In 2003, IKEA opened its first store in Russia and many Swedish worked in IKEA Russia as expatriates. After repatriation, their feedbacks are high power distance in the working place accompanied with rigid centralised management structures (Jonsson, 2008, p.34). Despite the nation culture of Russia possess a high power distance, there are some autonomous states in Russia which has rich unexplored natural resources such as Komi and Sakhalin actually have a more decentralised culture and many Dutch petroleum and pharmaceutical companies had established their affiliates with decentralised management structures in those regions (Condon, and Dauman, 1993, p.31). FORECAST According to the case study, Jim Flinn intends to use a ‘top-down’ change approach to transplant the managerial structure which may be imposed in a coercive manner (Balogun and Hailey, 2004, p.27). Once Jim Flinn has completely applied the management system that used in the headquarter and USA, the employees in Russian subsidiaries have to cope with a huge culture difference from West Europe. Jim Flinn may draw attention on the success of Dutch pharmaceutical companies in Russia as mentioned before. Thus, in a short term, transition will be a main issue in Russian subsidiary and it probably will take a long time in this process. However, in a long term perspective, the management structure of JKL’s headquarter may bring a range of benefits because a decentralised management system is exactly helpful in research and development department although the Russian employees are used to reluctant in changes (Case Study). CONCLUSION The main problem of JKL’s Russian affiliate is culture adjustment if Jim Flinn transplants the whole management structure from JKL to Zagorski. In fact, national culture will strongly influence the organisational culture as well as managerial framework of a company. Changing management system in a  subsidiary is not a flag-planting work because of various national cultures involved. In the first part of essay, some expatriates actually have problems on their international assignments in India and Greece. Hence, it can be estimated that, after the transplantation, many local employees working in Russia subsidiaries may have the same problems. Furthermore, many previous cases above are provided which could be used as a reference to Jim Flinn as well. CONCLUSION AND RECOMMENDATIONS This essay examined the problems in managing expatriates in JKL and evaluated the proposal from Jim Flinn who will transplant a British managerial system to a Russian subsidiary. Through these analyses, it is concluded that national culture will influence both expatriates and organisational cultures. It is essential for multinational corporations to have a good command of human resource management because of the large proportion budget of expatriates and efficiency of implementing business strategies. Managerial structure, on the other hand, it cannot be easily changed and sometime it will bring a series negative consequences in real business context because national cultures are involved as well. JKL have to improve its human resource department especially repatriate division and training programme to offer better supports to expatriates and eventually, there is a suggestion to Jim Flinn which is making further investigations on previous cases and local subsidiaries REFERENCE: Andreason and Aaron, W. (2008), ‘Expatriate Adjustment of Spouses and Expatriate Managers: An Integrative Research Review’, _International Journal of Management_, 25(2), pp.386-387. Around The World in Eighty Years. Arusha Times (2009), ‘Trends in Management of Human Resource in Civil Service’, p.16, 28 March, 2009. Balogun, J. and V. H. Hailey (2004), _Exploring Strategic Change_, p.27. Pearson Education Limited, Essex, England. Bartlett, C., S. Ghoshal and J. Birkinshaw (2003), _Transnational Management: Text, Cases, and Readings in Cross-Border Management_, pp. 342-343, McGraw-Hill, Singapore. Berman, W. and Ursula (2009), ‘International Assignments and the Career Management of Repatriates: The Boundaryless Career Concept’, _International Journal of Management_, 26(1), pp.80-81. Brunstein, I. (1995), _Human Resource Management in Western Europe_, pp. 275-280, Walter de Gruyter, Berlin, Germany. Business Recorder (2011), ‘Economic Development’, 27 February, 2011. Business Wire (1998), ‘Expatriate Resources: Corporate Update’, 26 March, 1998. Carrell, R. M., F. N. Elbert and D. R. Hatfield (2000), _Human Resource Management, Strategies for Managing a Diverse and Global Workforce, Six Edition_, p.129, p.315, The Dryden Press, Harcourt College Publisher, Orlando, USA. Chen, Y. R., (2006), _Research on Managing Groups and Teams_, p.2, Emerald Group Publishing Limited, UK. Clarke, S. (2004), ‘A Very Soviet Form of Capitalism? The Management of Holding Companies in Russia’, _Post-Communist Economies_, 16(4), p.418. Condon, J. and J. Dauman (1993), ‘New realities and prospects for Western business in the new Russia of decentralising regions’, _European Business Journal_, 5(2), p.31. Czinkota, M. R., I. A. Ronkainen and M., H., Moffett (1999), International Business, pp. 712, The Dryden Press, Harcourt Brace College Publishers, Orlando, USA. Decenzo, D. A. and S. P. Robbins (1999_), Human Resource Management, Sixth Edition_, pp.292-294, John Wiley and Sons, Inc., New York, USA. Dowling, P. J., M. Festing and A. D. Engle (2008), _International Human Resource Management: Managing People in a Multinational Context_, p.120, p. 199, p.217, South-Western, London, UK. Economist (2004), ‘Centralised intelligence?’, 373(8405), p.33. Francesco, A. M. and B. A. Gold (2005), _International Organisational Behaviour, Second Edition_, p. 236, pp. 240-241, Pearson Prentice Hall, New Jersey, USA. Gielen, A. C., M. J. M. Kerkhofs and O. J. C. Van (2010), ‘How performance related pay affects productivity and employment’, _Journal of Population Economics_, 23(1), p.299. Gordon, K. (2010), ‘What Employees Want’, _Campaign_, p.56, 1 March, 2010. Greek Helsinki Monitor and the World Organisation against Torture (2002), _Violence against Women_ _In Greece_, pp.13-21, July, 2002. Harris, H., C. Brewster and P. Sparrow (2003), _International Human Resource Management_, p. 91, p.94, Chartered Institute of Personnel and Development, CIPD House, London. UK. Hall, W. (1995), _Managing Cultures, Making Strategic Relationships Work_, p.6, John Wiley and Sons Ltd., West Sussex, England. Harris, P. R., R. T. Moran and S. V. Moran (2004), _Managing Cultural Differences, Sixth Edition_, pp.297-298, pp. 437-440, pp. 497-500, Elsevier Butterworth-Heinemann, Oxford, UK. Harzing, A. W. and J. V. Ruysseveldt (2004), _International Human Resource Management_, p. 337, pp. 343-344, SAGE Publications Ltd., London, UK. Hasegawa, H. (2001), ‘Globalization and Japanisation: implications for human resource management in Britain’, _Japan Forum_, 13(2), pp.165-166. Hofstede, G. (1991), _Cultures and Organisations_, p.2, McGraw Hill, Maidenhead, UK. Hofstede, G. (1992a), ‘National Culture of UK and India’. Available at: http://geert-hofstede.com/united-kingdom-and- india.html. Accessed 20 December 2011. Hofstede, G. (1992b), ‘National Culture of UK and Greece’. Available at: http://geert-hofstede.com/united-kingdom-and-greece.html. Accessed 20 December 2011. Hofstede, G. (1992c), ‘National Culture of UK and USA’. Available at: http://geert-hofstede.com/united-kingdom-and- united-states.html. Accessed 20 December 2011. Hofstede, G. (1992d), ‘National Culture of UK and Russia’. Available at: http://geert-hofstede.com/united-kingdom-and- russia.html. Accessed 20 December 2011. Hofstede, G. (1992e), ‘National Culture of UK and Russia’. Available at: http://geert-hofstede.com/united-kingdom-and- japan.html. Accessed 21 December 2011. Jeong, J. (2001), ‘Pursuing centralised bargaining in an era of decentralisation?’, _Industrial Relations Journal_, 32(1), p. 446. Johnson, Gerry, Scholes and Kevan (2008), _Exploring Corporate Strategy (8th edition)_, p. 166, Harlow, Essex: Financial Times and Prentice Hall, London, UK. Joneeon, A. (2008), ‘a transnational perspective on knowledge sharing: lessons learned from IKEA’s entry into Russia, China and Japan’, _International Review of Retail, Distribution & Consumer Research_, 18(1), p. 34. Liu, C. H. (2009), ‘The Effects of Repatriates’ Overseas Assignment Experiences on Turnover Intentions’, _Journal of American Academy of Business_, 7(1), p.129. Managing Training and Development (2005), ‘Culture Training How to Prepare Your Expatriate Employees for Cross-Cultural Work Environments’, p.2, February, 2005. Milles, R. and C. Snow (1978), Organisational Strategy, Structure and Process, p.353, McGraw-Hill, New York, USA. Neale, M. A., M. A. Elizabeth and Y. R. Chen (2006), _National culture and groups_, p. 26, Bingley, U.K National Centre for Vocational Education Research (2006), ‘Managing Culture–Making Culture Work for You’, p.1, March, 2006. New York Times (1996), ‘What’s A-O-K in the U.S.A. Is Lewd and Worthless Beyond’, p. E7, 18 August, 1996. Oberg, W. (2000), ‘Make performance appraisal relevant’, _Harvard Business Review_, 50(1), p. 64. Organizational Dynamics (1999), ‘Doing Business in Russia: Effective Human Resource Management Practices for Foreign Firms in Russia’, 28(2), p.75. Procter, S. and S. Ackroyd (1998), ‘Against Japanisatoin: Understanding the Reorganisation of British Manufacturing’, _Employee Relations_, 20(3), p.241, pp. 244-245. Robbins, S. P. and T. A. Judge (2009), _Organizational Behavior, Pearson International Edition_, p.336, pp. 407-408, Pearson Education Inc., New Jersey, USA. Robert, C., Probst, T. M., Martocchio, J. J., Drasgow, F. and J. J. Lawler (2000), ‘Empowerment and continuous improvement in the United States, Mexico, Poland, and India: predicting fit on the basis of the dimensions of power distance and individualism’, _The Journal of Applied Psychology_, 85(5), pp.654-656. South Asian Studies (2011), ‘The State, Media, Religion and Emerging Challenges in India’, 26 (1), July, 2011. Stonehouse, G., D. Campbell, J. Hamill and T. Purdie (2004), _Global and Transnational Business, Strategy and Management_, pp. 382-383, John Wiley and Sons Ltd, West Sussex, England. The Independent (1992), ‘Britain’s motor parts suppliers learn Japanese’, p.23, 8 June, 1992. The International Herald Tribune (2009), ‘A Reverse Culture Shock in India: Workers Returning Home Find It Hard to Cope with Clash between Two Worlds’, p.10, 28 November, 2009. The Journal (1999), ‘Japanese bring 150 more jobs –  £5m investment in Tees Valley’, p.26, 8 September, 1999.

Blood Typing Lab

Name_____________________________________ Block__________________ Date_____________________ Forensics Mystery Blood Typing Lab Scenario: Police are called to a house where they discover a body near the back door. There is a fresh pool of blood by the victim’s head. Officers question the neighbors and learn that a plumber and an electrician made service calls to the house just hours before. They were able to trace both. They recover a shirt with a dark stains from the service van of the plumber and rags with similar dark stains from electrician’s van.Your forensics lab receives the following items to test: Sample 1: Stained cloth from plumber’s van Sample 2: Stained cloth from the electrician’s van Sample 3: Blood collected from under the victim’s head Test Background: The phenolphthalein test is a highly sensitive, being capable of detecting blood spots practically invisible to the eye. In an actual criminal case, a positive phenolphthalein test wou ld be followed by tests to determine the species that produced the blood and if these tests indicate the blood is human, by tests to determine ABO, Rh and other blood groups.There is no point in pursuing typing and species identification procedures if the phenolphthalein test is negative. The phenolphthalein test is not absolutely specific for blood because most plants and some animal cells can also cause a positive reaction. Discussion Questions: 1. Does a positive phenolphthalein test prove that a stain is caused by blood? 2. Does a positive phenolphthalein test prove that a stain is caused by human blood? Procedure 1: 1. Test the shirt and rags to determine if the stains are caused by blood. 2. Place a drop of phenolphthalein/peroxide solution on each stain. 3.Observe if a color change occurs. A purple-violet color reaction indicates that blood (heme) is present (positive reaction). Absence of this reaction indicates that blood is not present. 4. Record your results: Color reacti on for Sample 1:_________________________ Color reaction for Sample 2:_________________________ Based on the results of this test, which person, the plumber or the electrician becomes your prime suspect? ____________________________________________________________________________ Additional Information: When confronted, your chief suspect claims to have a nosebleed, thus accounting for the blood stain.Investigators have now been able to recover a blood sample (Sample 4 ) from the suspect’s van. It is suitable for blood typing. You ask and receive a blood sample from the suspect (Sample 5). Proceed to Procedure 2. Test Background: Blood groups are created by molecules present on the surface of red blood cells. The table shows the four ABO phenotypes (â€Å"blood groups†) present in the human population. When red blood cells carrying one or both antigens are exposed to the corresponding antibodies, they agglutinate; that is, clump together.People usually have antibodies against those red cell antigens that they lack. The ABO Blood Groups Blood Group| Red Cell Antigen (Protein on blood cell)| Serum Antibody (Produced by Body)| A| A| Anti-B| B| B| Anti-A| AB| A and B| Neither| O| Neither| Anti -A and Anti -B| Discussion Questions: 1. How do you determine a person’s blood type? 2. Can a person’s blood type prove or disprove that he/she committed a crime? How? Procedure 2: 1. Add a drop of synthetic anti-A (blue) to the well labeled A. Replace cap. . Always replace the cap on the vial before opening the next vial to prevent cross contamination. . Add a drop of synthetic anti-B (yellow) to the well labeled B. Replace cap. 3. Add a drop of synthetic anti-Rh serum (clear) to the well labeled Rh. Replace cap. 4. Using the dropper vial, place a drop of Sample 3 (the victim’s blood) in each well of the blood typing slide. DO NOT TOUCH THE WELL! 5. Replace the cap on the dropper vial. 6. Using a different color mixing stick for each well (blue for anti-A, yellow for anti-B & white for anti –Rh), gently stir the synthetic blood and anti-serum drops for 30 seconds.Remember to discard each mixing stick after a single use to avoid cross contamination. 7. WAIT 60 Seconds. 8. Carefully examine the thin films of liquid mixture left behind. If the film remains uniform in appearance, there is no agglultination (no clumps, negative reaction). If the film as clumps, agglutination has occurred (positive reaction) 9. Determine blood type of the sample using the data table below. Answer yes or no as to whether agglutination occurred in each sample. A positive agglutination reaction indicates blood type. 10. Record the results for each blood sample in the data table.Data Table | Sample 3| Sample 4| Sample 5| Anti-A| | | | Anti-B| | | | Rh| | | | Blood type| | | | 11. Then repeat steps 1-9 for Samples 4 and 5. Record each results on table. 12. Thoroughly rinse the blood typing slides and return all materials. Conclusion: Bas ed on your results, did the blood collected from the suspect’s van come from the suspect? ____________________________________________________ Could this blood have come from the victim? ____________________________ What can you conclude from your results? (Remember to cite your data). __________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ________________________________ ______________________________________________________________________________________________________________________________________

Tuesday, July 30, 2019

Brainstorm of the places where we use computers Essay

The main uses of ICT in Coopers is to educate pupils that attend also to help teachers keep track of their daily teachings. The uses of ICT like interactive boards and projectors have played an important part in the way education is being taught in ST Edward’s. These functions allows teachers to browse the Internet in front of the class and go on educational websites. Also to use the interactive board with a interactive pen to draw straight lines easier than a whiteboard. Systems like SIMS are very useful for teachers every day routine as it allows them to do features like see students timetables, personal details like address and home telephone number also their face identity. This is useful because this can be arranged so that a whole classes pictures are printed of in alphabetical order in order for a teacher to know there class pupils quicker by face by arranging the class in alphabetical order. The public school Coopers is allocated in Romford, Essex was formed over 300 years ago. It contains around 1200 pupils with six formers and over 100 teachers, which the school had to accommodate by building a new building alongside the old one. The head teacher of Coopers is Mr Drew. The school is very multicultural as it accepts students from the local borough as well as outside the borough, which makes the school very unique in its area of Havering. Also recently Coopers was one of the 19 schools in the whole of London to been given the top grade from OFSTED inspectors. The school dress code of Coopers’s pupils is to blue blazers with a badge showing a cross and doves also charcoal grey trousers. The tie has diagonal stripes of yellow, navy and light blue. Microsoft office plays a very important role in the education system at Coopers through programs like Microsoft Word, Excel, and PowerPoint. Some of the uses that these programs enable are: Spreadsheet > Microsoft Excel: Use are being able to mail merge, spread sheet formulas Word Processing > Microsoft Word: This programs enables you to Do Fax template documents, Invoices and basics such as Letters Presentation Software > Microsoft PowerPoint: PowerPoint presentations allow students to present class to their class on an interactive board. Database > Microsoft Access: Mainly used throughout Cooper’s school for tracking student’s behaviour and for teaching throughout the schooling industry. Also by teachers into allowing them to organise their timetables and see where they have free periods or when a class needs a supply teacher as a teacher is away from school. Desktop Publishing (DTP) > MS Publisher, Photoshop, and Corel Draw: Generally used in school to edit and draw pictures. List of Hardware: (computer Specification) How ICT is used in subjects that are taught and used in school. CDT: This subject has specialised software on the ICT program like 2D Design, which enables students to draw different shapes and letters then have specially designed into a 2D key chain using a high tech machine. MFL: the subject MFL has software installed on the schools computer system, which allows teachers to access it through the interactive boards and teach students on their speech thought the board’s speakers. Also through the interactive pen, the teachers can ask students to come to the front and moves individual words to the right sentences. Security software: an administrator through logging on a computer can access The CCTV cameras. This allows the admin to control the movement of the cameras. Most classrooms in Coopers are locked with a specialized security system with only opens by inserting a card with a special chip build into it. The door will only open if it recognises the chip. Systems on different doors can be programmed to accept the chip. This will allow the user to open a number of doors throughout the school. The school technicians would install anti – virus software’s like Northern Art: The use of digital cameras and software allows users to edit photos and images. Also it can be used to evaluate pieces of work and how to make improvements. The benefits of using ICT in Art are that students can do animations and add special effects to pictures, which cannot be done by hand. Library: The heritage used to the check if the book you want hasn’t been taken out. Also the library uses ICT to controls what is borrowed and taken out in the library also students who have books that are overdue. I also found my school is using networking in 10 computer rooms; each room has a local network. All local networks are connected together with router and Gateway. After accessing to the network manager I found that the school network is using the star network. Preferably Maths: ICT is used in maths to do accurate pie chart and bar chart diagrams. Also spreadsheets and calculations in programs like MS excel. Finance Dept: This department uses ICT to deal with problems such as calculating staff salary and tax using spreadsheets and SAGE line 50 or Payroll software. Why the organisation uses ICT? Coopers Comprehensive uses ICT as it is very effective in helping to manage and organise the work of the school. Examples; The organisation uses word processing software such as Microsoft Word to design templates which they will use every time they want to send a letter to pupil’s homes. This is effective as this system will enable the organisation to save time not writing by hand the information that would be stored as a template. E.g. school address and logo Locations where ICT is used 1. Reception a. Photocopier b. Computer c. Lights d. Fax 2. Classrooms a. Lights system b. Computer c. Fan d. Projector e. 3. Staff room a. Computers b. Lighting system 4. Science Lab a. Computers b. Interactive board 5. Interactive board a. Sound system b. Internet browser c. Interactive board d. Video e. Projector 6. Library a. Heritage i. Resource library ii. Computer iii. Database 7. Six form sweet 8. D.T a. Computers 9. Technicians office a. Laptops b. Computers 10. Art room a. Computers 11. Music room a. Keyboards b. Interactive board c. Lights d. Sound system 12. Food room a. Digital camera (for taking pictures of food) b. Computer c. Pocket computer (keeps track of his daily routines) Roles 1. Teaching a. Worksheets b. Timetables c. Teachers planners d. Room changes e. On call system 2. French a. Interactive whiteboards 3. History a. Computer b. Interactive 4. Security a. CCTV (24 hours in motion a day.) b. School alarm c. Fire alarm 5. Internet a. School website b. Revision sites for learning 6. Mr Chapmen’s Office a. Letters home b. Reachout 7. Mr Drew’s office a. Photocopier 8. Homework 9. Maths a. Calculators b. Projectors c. Interactive board 10. SEN Dept 11. S.T.E.D.S a. Calculators 12. Mr Browns Office a. Timetables 13. SIMS (schools information management system) a. NOVA b. Timetables for students and teachers c. Cover d. Administration e. Pupil profiles f. Students behaviour Now I am going to highlight more details how the organisation is using ICT to meet the specific needs. Making lessons interactive: the school uses a smart interactive white board and computer system in every classroom to make lessons interactive. When the teacher is teaching he can write down everything on the whiteboard and using the special software SMART, writing can be saved and played back whenever necessary. Teachers can use many tools to make lessons interactive for example, drawing tools, setting the background colour, selecting font, importing diagrams, showing animation and effects and so on. To make the interactive board work the following hardware and software I identified > Projector > Computer with necessary software e.g. operating system Windows XP and applications software e.g. MS Word and hardware e.g. keyboard, mouse and > Driver program comes with interactive whiteboard > USB memory to transfer and save lessons. > Digital pen or stylus – using this device teachers can use software interactively without coming to the computer > Cable connection between whiteboard and computer The objective of the organisation is to educate students interactively within a short time. Using such interactive system the teacher can teach many things to each student e.g. printing handouts of what he taught at the end of the lesson, without writing he can show it again and again if the student doesn’t understand. Students don’t need to take all notes and can take soft copy of the lessons. When a student is absent he or she can take the soft copy to catch up. registering and maintaining student database creating school brochure templates designing writing letter to parents mail merge save time don’t make mistakes Issuing and receiving books in the school library Searching for books in the library: the school uses ICT in libraries so that books can be found easily and can also to record pupils taking books out and returning them easily without making mistakes and losing books. The benefits are: > Saves time just scanning books instead of writing it down manually every time a pupil wants to take a book out. > Pupils can easily search for books on a database instead of finding it on shelves > Overdue books can be worked out by the computer whereas you may forget when the pupil was due to bring back the book.

Monday, July 29, 2019

Compare and contrast the ethical issues concerned with due process v Essay

Compare and contrast the ethical issues concerned with due process v. street justice. in U.S - Essay Example On considering the ethics behind whether to implement 'due process' or 'street justice', it may be of ample relevance to point out inquisitively about up to what extent is one necessary over the other. By 'street justice', policing in the U.S. takes its origins out of the increasing urgency to develop a community-based politically decentralized institution to manage social regulation within communities that barely cope with keeping norms as urbanization progresses in them (Sykes). This is especially true during the early years when accredited justice institutions overlooked adequate fulfillment of tasks that the police was summoned over for complementary aid and allowed thereby to conduct informal procedures on peacekeeping to settle tolerable disputes at least. Since local governments admit imperfection and inefficiency or neglect on certain aspects that seem quite inevitable at times of facilitating criminal cases, police officers are hence granted the opportunity to exercises flex ible authority to apply measures they suppose may be suitable for a particular occasion. As this tradition proceeds so that American policemen fully recognize the functional worth of 'street justice', it readily yields for these law enforcers the thought of having broader options in performing their designated duties. More often than not, the idea of versatility with role naturally comes out as an initial impression that lasts as long as each police officer assumes that their overall job equates that of the judiciary system. Having a wider sense of responsibility in the process is remarkable, however, the risk of operating beyond the required control occurs at a stage of reasoning that locates community-based policing as more of a privilege. This way, there are cops who, reportedly, have become abusive of their profession to obtain favor which satisfies personal interests. The disadvantage of accruing potential greed or inclination to corrupt practice as from such eventually obscure s the sight of justice in achieving fair ends upon targeted goals with which the welfare of the innocent is the chief concern. On the other hand, subjecting moral issues under the 'rule of law' is known to be a classic organized way of evaluating which side deserves a specific portion of verdict. Though it is conventionally tedious to hold court proceedings, appeals and positions of each of the people involved are thoroughly examined, with scientific investigation in the process, and are judged accordingly in this setting in order that one is assured of fair and equal treatment with the rest during prosecution. Where evidences are adequately presented, an appreciable chance of attaining to just consequences duly deserved follows after the most reliable scrutiny by a number of lawfully educated individuals. Typically, a systematic means of arriving at righteous judgment is unquestionable for being objective by nature, but the harsh realities of officiating a correct yet rigid or aust ere punishment is unlikely translatable to a form which is rather compassionate and life-transforming for a culprit who might so profoundly hope to change and be wholly renewed apart from the former immoral character. Dr. J.M. Pollock further argues that by 'due process' in the 'rule of law', â€Å"

Sunday, July 28, 2019

The economic and accounting concepts of Income Essay

The economic and accounting concepts of Income - Essay Example It is impossible to arrive at the accounting income without going through accounting equation. i.e. adding up what the accounting records say belongs to the business and deducting what they say the business owes. This gives us the accounting income which essentially shows what an individual or a business is worth according to those accounting records. The accounting income therefore takes into account the fact that that no business will be set up to start trading in the absence of recourses which in most cases are supplied by the owner of the business. Usually, it is not only then owner of the business supplying resources, but other people s well other than the owner. The amounts owing to these other people for their assets in the business is called liabilities Accounting income , therefore can be called the owner 's equity or net worth, since it comprises of the funds invested in the business by the owner plus any profits retained for use in the business less any share of profit paid out of the business to the owner. The following is an illustration of a balance sheet. Balance sheet as at ________________________________________________________________________ Fixed assets CapitalFree hold premises xx Furniture and fittings xx Long Term, Liabilities xx Motor Vans xx Loan for 5 Years xx Current Assets Trading Debtors xx Trading stock xx Cash at Bank xx Short term Liabilities Trading Debtors xxShort term Loans xx Institution of all kinds prepare income statements even governments of Government bodies

Saturday, July 27, 2019

Debriefing Report for VoIP2.biz, Inc Essay Example | Topics and Well Written Essays - 1000 words

Debriefing Report for VoIP2.biz, Inc - Essay Example The voice communication often remained on the plain Old Telephone Service (POTS).In business market, voice communication is still important to the business and remained 10 to 20 times the size of internet communication. Most business spends money every month on the legacy telephony technology. The company should therefore have some POTS for these businesses. They can also switch some of the many POTS to VolP services.Ordinarilly, the market for VolP typically measured in terms of how many POTS lines are available. VolP should allow the integration of organizations many locations including the remote workers into a single communication costs and expand functionality by combining voice and data into one network and by bringing advanced features that are not currently available to most small and midsize business customers. They need to replace all the POTS Telephone circuits with internet connections and utilize open source voice applications and commodity intercircuits.Smaller versions of PBX systems should be introduced to manage voice communication and optimizing the utilization of carrier services, reducing company monthly expenses. The company should also utilize HSC services such as DSC to reduce costs by outsourcing central engineering and equipment

Friday, July 26, 2019

Process Report Essay Example | Topics and Well Written Essays - 1500 words

Process Report - Essay Example Working with polarities/dualities -- body and mind, duty and pleasure, straight and gay -- very much set the mood of this and past sessions and has been very challenging for me. Challenging because it brought me back to the way I was processing some aspects of my life, when I felt it was safer to be at one side or another of the spectrum, rather than the middle where unpredictability would jeopardise my safety and make me feel anxious. In (2T), when I asked Andrew what type of medication he was taking, I learned how little he has revealed to the assessor and indeed to me in the previous sessions. For example, he has not revealed to anyone that he is going to therapy or his doubts about his sexuality, and his depressive condition. The latter makes me aware of some kind of similar narratives that I could encounter in other therapeutic alliances. I feel that with Andrew I am struggling to follow the rhythm and the pace he gave to the session. The ‘dance’ between us sometimes goes out of synch, as he unexpectedly stops and starts (with his silences and overwhelming recounts). This produces in me a constant vigilant state that makes the therapeutic relationship very tiring. However, there are also times in this unsynchronised dance where I am in and out of our therapeutic alliance; the ‘in time’ is when I am present and part of the client’s world and the ‘out’ is when I am the spectator of his world. During this time I move back into my own space where I can reflect and try to make sense of my, his and our world. I am realising more and more the wide river that runs through the client’s intellect and the solid bridge that we need to construct to be able to move freely from one shore to the other. Sometimes I feel that building that bridge is a huge task, and I wonder if we will succeed. The doubt is possibly to do with Andrew being my first client and the complex world

Thursday, July 25, 2019

Discussion Board Post Response Essay Example | Topics and Well Written Essays - 250 words - 12

Discussion Board Post Response - Essay Example In my organization, nurses are able to get feedback on the quality of their services from their patients as well as from the general public through a facebook page created by the organization and also through twitter. This has greatly improved provision of services in my organization as weak points are easily identified and appropriate strategies implemented. I agree with your implication Hope Barham that the situation in your case scenario can be addressed through the nurse manager providing scheduling examples previously made and that have been a success and openly discussing them. In my opinion, social sites could play a vital role in improving the staff morale in your case scenario. Hader (2009) posits that social sites within a department can be used to "Share information, dialogue, and receive feedback and input from others" (p. 6). Therefore, you could allow the nurses to give their input through social sites and then incorporate their opinions and views in creating the schedules. Engaging the nurses in creating their schedules will enable them feel that their input is valued and hence feel motivated. Bestowing a schedule to employees that they have not been involved in creating is likely to be met with

Letters Essay Example | Topics and Well Written Essays - 250 words

Letters - Essay Example This draws reference to the way they have mistreated the Negro population at the time they pray. Freedom has been denied and this is what disappoints King. Ethical argument: By informing his audience that he is not unmindful of the fact that a number of them have taken steps in handling the issue amicably, he implies that he is sensitive. This wins the clergymen’s love after he has admonished their poor leadership. He finds it important to appreciate the efforts sop far involved so that they can keep on improving. King decides to speak this way after realizing that most black people were being discriminated in church matters and therefore it is imperative that this kind of attitude is discouraged among the clergymen. The church essentially should unit people. Their grievances were not being put forward. He realized that demonstrations had increased among the African American populace following the bad treatment they received from other white people in the United States of

Wednesday, July 24, 2019

Toyota Essay Example | Topics and Well Written Essays - 750 words - 1

Toyota - Essay Example Thailand is chosen as the global manufacturing base and other manufacturing bases in Asian countries will supply engines and other components. The vehicles developed in global manufacturing base of Thailand have a potential for export in 80 nations and regions. This will also make input costs much lower than in developed countries and increase the profit margin in case of an economic slowdown. In case of Chinese markets, manufacturing and marketing needs to be strengthened for viable growth. Full product lineup in different segments like compact, luxury SUV and luxury sedan vehicles has to be established. The manufacturing capacity needs to be revamped in this emerging market which will in turn increase the brand value of Toyota. Introduction of lexus and reorganization of sales channel is necessary to sustain growth in Japanese market. Further preparations are necessary to accomodate future changes in market structure and customer values. The merger and acquisition scenario also brings two of the major players Ford and Toyota together. Toyota management can negotiate a deal as Ford, the third largest manufacturer of cars, is mired in one of the worst financial crises in its history and Toyota is in its strongest position since it was founded 70 years ago. Development of a wide range of technologies and products with focus on market creation is the ultimate strategy for expansion. Leading edge technologies like nanotechnology, material technology and biotechnology will be the driving force for the next generation cutting edge technology for developing green and clean environment friendly, safe and user friendly interface for vehicles. The ecology and the emotion of customers will be taken care of in this strategic development. The laws, regulations and government policies regarding environmental protection, vehicle emissions, vehicle fuel economy , vehicle safety, outcome of

Tuesday, July 23, 2019

Documents Necessary to Organize a Limited Liability in Ohio State Term Paper

Documents Necessary to Organize a Limited Liability in Ohio State - Term Paper Example Employer identification number (EIN) resembles the Social Security Number and is nine digits long. It is assigned by Internal Revenue Service (IRS) to be used by the LLC’s to track their tax returns. One is required to request for the EIN from IRS website, download, and print from SS-4. The form is supposed to have the signature of a representative of the LLC. Mail the completed SS-4 form the Internal Revenue Services headquarters in Ohio. One has to wait up to four weeks to get the assigned FEIN from IRS. The LLC can apply for federal tax ID for a fee through third parties or for free if applied directly (Ohio Secretary of State, 2014). LLC’s are required to apply for work permits from Ohio Secretary of State. These include local permits necessary to do business in Ohio special and professional licenses depending on the business. One has also to contact the Ohio Bureau of Workers Compensation as required by the state law. This only applies if the LLC has hired employees who are salaried and registration is through their website. "The Ohio Department of Job and Family Services" (Ohio Secretary of State, 2014) have also to be contacted so as to establish an unemployment compensation tax account. This account is opened with the Ohio Department of Job and Family Services through their website (Ohio Secretary of State, 2014). This certificate is a necessity for foreign LLC that want to establish in Ohio State. The certificate is a proof of the LLC’s existence as affirmed by the federal government. It is also a documented compliance with the federal regulation on how businesses are set up and ran in the coun try (Ohio Secretary of State, 2014).

Monday, July 22, 2019

Han china and imperial rome Essay Example for Free

Han china and imperial rome Essay Rome was very successful because of its superior military authority. That is the main influential factor that cemented Roman power for nearly a thousand years. They had several advantages rapid development of the latest technology and vast numbers of infantry along with a stable senate system and much wealth to fuel their ambitions. It had sewers to control waste, aqueducts for plumbing and paved roads for transport which many other nations simply did not have. Rome had a large assortment of choices when it came to battle. Their army usually consisted of Hastati, Principes or Legionary Cohort in the later years marvelous soldiers and very useful ones to say the least. Having said this, they had access to exceptional horses as well and it was this mixture of troops that was a deciding factor in conflicts. Rome used its sheer force of numbers to overwhelm most enemies and surround them or cave in on their flanks causing a route very quickly. Mind you, tactics were used, but not effectively. The Romans took advantage of technological progressions and were only to happy to inflict deadly harm upon their foes with ballistae, catapults, onagers and numerous other siege equipment. The land they conquered poured much profit into the treasury which was distributed to the armed forces. This was able to give them the latest weapons, brand new armour, plenty of supplies and good morale. You can also look at the sheer amount of land they claimed through war the empire covered Spain, France, Italy, Greece, Turkey, parts of the Middle-East, Egypt, and the Africa coastline. Finally, the Romans brought the ideology of Christianity to the people in Europe influencing the events that were to proceed in the future greatly, something that has changed the world today. They will be looked upon in 1000 years (during the Middle Ages) with their beliefs, attitudes, values, lifestyle and ingenuity being emulated.

Sunday, July 21, 2019

MapReduce for Distributed Computing

MapReduce for Distributed Computing 1.) Introduction A distributed computing system can be defined as a collection of processors interconnected by a communication network such that each processor has its own local memory. The communication between any two or more processors of the system takes place by passing information over the communication network. It has its application in various fields like Hadoop and Map Reduce which we will be discussing further in details. Hadoop is becoming the technology of choice for enterprises that need to effectively collect, store and process large amounts of structured and complex data. The purpose of the thesis is to research about the possibility of using a MapReduce framework to implement Hadoop. Now all this is possible by the file system that is used by Hadoop and it is HDFS or Hadoop Distributed File System. HDFS is a distributed file system and capable to run on hardware. It is similar with existing distributed file systems and its main advantage over the other distributed File system is, it is designed to be deployed on low-cost hardware and highly fault-tolerant. HDFS provides extreme throughput access to applications having large data sets. Originally it was built as infrastructure support for the Apache Nutch web search engine. Applications that run using HDFS have extremely large data sets like few gigabytes to even terabytes in size. Thus, HDFS is designed to support very large sized files. It provides high data communication and can connect hundreds of nodes in a single cluster and supports tens of millions of files in a system at a time. Now we take all the above things mentioned above in details. We will be discussing various fields where Hadoop is being implemented like in storage facility of Facebook and twitter, HIVE, PIG etc. 2.) Serial vs. Parallel Programming In the early decades of computing, programs were serial or sequential, that is, a program consisted of a categorization of instructions, where each instruction executed sequential as name suggests. It ran from start to finish on a single processor. Parallel programming (grid computing) developed as a means of improving performance and efficiency. In a parallel program, the process is broken up into several parts, each of which will be executed concurrently. The instructions from each part run simultaneously on different CPUs. These CPUs can exist on a single machine, or they can be CPUs in a set of computers connected via a network. Not only are parallel programs faster, they can also be used to solve problems on large datasets using non-local resources. When you have a set of computers connected on a network, you have a vast pool of CPUs, and you often have the ability to read and write very large files (assuming a distributed file system is also in place). Parallelism is nothing but a strategy for performing complex and large tasks faster than traditional serial way. A large task can either be performed serially, one step following another, or can be decomposed into smaller tasks to be performed simultaneously using concurrent mechanism in parallel systems. Parallelism is done by: Breaking up the process into smaller processes Assigning the smaller processes to multiple processors to work on simultaneously Coordinating the processors Parallel problem solving can be seen in real life application too. Examples: automobile manufacturing plant; operating a large organization; building construction; 3.) History of clusters: Clustering is the use of cluster of computers, typically PCs or some workstations, storage devices, and interconnections, appears to outsider (user) as a single highly super system. Cluster computing can be used for high availability and load balancing. It can be used as a relatively low-cost form of parallel processing system for scientific and other related applications. Computer clustering technology put cluster of few systems together to provide better system reliability. Cluster server systems can connect a group of systems together in order to provide combined processing service for the clients in the cluster. Cluster operating systems distribute the tasks amongst the available systems. Clusters of systems or workstations can connect a group of systems together to share critically demanding and tough tasks. Theoretically, a cluster operating system can provide seamless optimization in every case. At the present time, cluster server and workstation systems are mostly used in High Availability applications and in scientific applications such as numerical computations. A cluster is a type of parallel or distributed system that: consists of a collection of interconnected whole computers and is used as single, unified computing resource. The whole computer in above definition can have one or more processors built into a single operating system image. Why a Cluster Lower cost: In all-purpose small sized systems profit from using proper technology. Both hardware and software costs tend to be expressively minor for minor systems. However one must study the entire cost of proprietorship of your computing environment while making a buying conclusion. Next subdivision facts to some issues which may counterbalance some of the gains of primary cost of acquirement of a cluster. . Vendor independence: Though it is usually suitable to use similar components through a number of servers in a cluster, it is worthy to retain a certain degree of vendor independence, especially if the cluster is being organized for long term usage. A Linux cluster created on mostly service hardware permits for much better vendor liberation than a large multi-processor scheme using a proprietary operating system. Scalability: In several environments the problem load is too large that it just cannot be processed on a specific system within the time limits of the organization. Clusters similarly provide a hassle-free path for increasing the computational means as the load rises over time. Most large systems scale to a assured number of processors and require a costly upgrade Reliability, Availability and Serviceability (RAS): A larger system is typically more vulnerable to failure than a smaller system. A major hardware or software component failure fetches the whole system down. Hence if a large single system is positioned as the computational resource, a module failure will bring down substantial computing power. In case of a cluster, a single module failure only affects a small part of the overall computational resources. A system in the cluster can be repaired without bringing rest of the cluster down. Also, additional computational resources can be added to a cluster while it is running the user assignment. Hence a cluster maintains steadiness of user operations in both of these cases. In similar type of situations a SMP system will require a complete shutdown and a restart. Adaptability: It is much easier to adapt the topology. The patterns of linking the compute nodes together, of a cluster to best suit the application requirements of a computer center. Vendors typically support much classified topologies of MPPs because of design, or sometimes testing, issues. Faster technology innovation: Clusters benefit from thousands of researchers all around the world, who typically work on smaller systems rather than luxurious high end systems. Limitations of Clusters It is noteworthy to reference certain shortcomings of using clusters as opposite to a single large system. These should be closely cautious while defining the best computational resource for the organization. System managers and programmers of the organization should intensely take part in estimating the following trade-offs. A cluster increases the number of individual components in a computer center. Every server in a cluster has its own sovereign network ports, power supplies, etc. The increased number of components and cables going across servers in a cluster partially counterbalances some of the RAS advantages stated above. It is easier to achieve a single system as opposed to numerous servers in a cluster. There are a lot more system services obtainable to manage computing means within a single system than those which can assistance manage a cluster. As clusters progressively find their way into profitable organizations, more cluster savvy tools will become accessible over time, which will bridge some of this gap. In order for a cluster to scale to make actual use of numerous CPUs, the workload needs to be properly well-adjusted on the cluster. Workload inequity is easier to handle in a shared memory environment, because switching tasks across processors doesnt involve too much data movement. On the other hand, on a cluster it tends to be very tough to move a by this time running task from one node to another. If the environment is such that workload balance cannot be controlled, a cluster may not provide good parallel proficiency. Programming patterns used on a cluster are typically diverse from those used on shared-memory systems. It is relatively easier to use parallelism in a shared-memory system, since the shared data is gladly available. On a cluster, as in an MPP system, either the programmer or the compiler has to explicitly transport data from one node to another. Before deploying a cluster as a key resource in your environment, you should make sure that your system administrators and programmers are comfortable in working in a cluster environment. Getting Started With Linux Cluster: Although clustering can be performed on various operating systems like Windows, Macintosh, Solaris etc. , Linux has its own advantages which are as follows:- Linux runs on a wide range of hardware Linux is exceptionally stable Linux source code is freely distributed. Linux is relatively virus free. Having a wide variety of tools and applications for free. Good environment for developing cluster infrastructure. Cluster Overview and Terminology A compute cluster comprises of a lot of different hardware and software modules with complex interfaces between various modules. In fig 1.3 we show a simplified concept of the key layers that form a cluster. Following sections give a brief overview of these layers. 4.) Parallel computing and Distributed Computing system Parallel computing It is the concurrent execution of some permutation of multiple instances of programmed instructions and data on multiple processors in order to achieve results faster. A parallel computing system is a system in which computer with more than one processor for parallel processing. In the past, each processor of a multiprocessing system every time came in its own processor packaging, but in recent times-introduced multicore processors contain multiple logical processors in a single package. There are many diverse kinds of parallel computers. They are well-known by the kind of interconnection among the processors (â€Å"processing elements or PEs) and memory. Distributed Computing System: There are two types of distributed Computing systems: Tightly coupled system: In these systems, there is a single system wide primary memory (address space) that is shared by all the processors. In these systems any communication between the processors usually takes place through the shared memory. In tightly coupled systems, the number of processors that can be usefully deployed is usually small and limited by the bandwidth of the shared memory. Tightly coupled systems are referred to as parallel processing systems Loosely coupled systems: In these systems, the processors do not share memory, and each processor has its own local memory. In these systems, all physical communication between the processors is done by passing messages across the network that interconnects the processors. In this type of System Processors are expandable and can have unlimited number of processor. Loosely coupled systems, are referred to as distributed computing systems. Various Models are used for building Distributed Computing System: 4.1) Minicomputer Model It is a simple extension of the centralized time-sharing system. A distributed computing system based on this classical consists of a few minicomputers or large supercomputers unified by a communication network. Each minicomputer usually has many user simultaneously logged on to it through several terminals linked to it with every user logged on to one exact minicomputer, with remote access to other minicomputers, The network permits a user to access remote resources that are available on same machine other than the one on to which the user is currently logged. The minicomputer model is used when resource sharing with remote users is anticipated. The initial ARPAnet is an example of a distributed computing system based on the minicomputer model. 4.2) Workstation Model Workstation model consists of several workstations unified by a communication network. The best example of a Workstation Model can be a company’s office or a university department which may have quite a few workstation scattered throughout a building or campus, with each workstation equipped with its individual disk and serving time which is specifically during the night, Notion of using workstation Model is that when certain workstations are idle (not being used), resulting in the waste of great amounts of CPU time the model connects all these workstations by a high-speed LAN so that futile workstations may be used to process jobs of users who are logged onto to other workstations and do not have adequate processing power at their own workstations to get their jobs handled efficiently. A user logs onto one of the workstations which is his â€Å"home† workstation and submits jobs for execution if the system does not have sufficient processing power for executing the processes of the submitted jobs resourcefully, it transfers one or more of the processes from the user’s workstation to some other workstation that is currently ideal and gets the process executed there, and finally the outcome of execution is given back to the user’s workstation deprived of the user being aware of it. The main Issue increases if a user logs onto a workstation that was idle until now and was being used to perform a process of another workstation .How the remote process is to be controlled at this time .To handle this type of problem we have three solutions: The first method is to allow the remote process share the resources of the workstation along with its own logged-on user’s processes. This method is easy to apply, but it setbacks the main idea of workstations helping as personal computers, because if remote processes are permitted to execute concurrently with the logged-on user’s own processes, the logged-on user does not get his or her fail-safe response. The second method is to kill the remote process. The main disadvantage of this technique is that all the processing done for the remote process gets lost and the file system may be left in an erratic state, making this method repellent. The third method is to migrating the remote process back to its home workstation, so that its execution can be continued there. This method is tough to implement because it involves the system to support preemptive process migration facility that is stopping the current process when a higher priority process comes into the execution. Thus we can say that the workstation model is a network of individual workstations, each with its own disk and a local file system. The Sprite system and experimental system developed at Zerox PARC are two examples of distributed computing systems, based on the workstation model. 4.3) Workstation-Server Model Workstation Server Model consists of a limited minicomputers and numerous workstations (both diskful and diskless workstations) but most of them are diskless connected by a high speed communication Network. A workstation with its own local disk is generally called a diskful workstation and a workstation without a local disk is named as diskless workstation. The file systems used by these workstations is either applied either by a diskful workstation or by a minicomputer armed with a disk for file storage. One or more of the minicomputers are used for applying the file system. Other minicomputer may be used for providing other types of service area, such as database service and print service. Thus, every minicomputer is used as a server machine to provide one or more types of services. Therefore in the workstation-server model, in addition to the workstations, there are dedicated machines (may be specialized workstations) for running server processes (called servers) for handling and providing access to shared resources. A user logs onto a workstation called his home workstation, Normal computation activities required by the user’s processes are performed at the user’s home workstation, but requirements for services provided by special servers such as a file server or a database server are sent to a server providing that type of service that performs the user’s requested activity and returns the result of request processing to the user’s workstation. Therefore, in this model, the user’s processes need not be migrated to the server machines for getting the work done by those machines. For better complete system performance, the local disk of diskful workstation is normally used for such purposes as storage of temporary file, storage of unshared files, storage of shared files that are rarely changed, paging activity in virtual-memory management, and caching of remotely accessed data. Workstation Server Model is better than Workstation Model in the following ways: It is much cheaper to use a few minicomputers equipped with large, fast disks than a large number of diskful workstations, with each workstation having a small, slow disk. Diskless workstations are also preferred to diskful workstations from a system maintenance point of view. Backup and hardware maintenance are easier to perform with a few large disks than with many small disks scattered all Furthermore, installing new releases of software (such as a file server with new functionalities) is easier when the software is to be installed on a few file server machines than on every workstations. In the workstation-server model, since all files are managed by the file servers, users have the flexibility to use any workstation and access the files in the same manner irrespective of which workstation the user is currently logged on .Whereas this is not true with the workstation model, in which each workstation has its local file system, because different mechanisms are needed to access local and remote files. Unlike the workstation model, this model does not need a process migration facility, which is difficult to implement. In this model, a client process or workstation sends a request to a server process or a mini computer for getting some service such as reading a block of a file. The server executes the request and sends back a reply to the client that contains the result of request processing. A user has guarantied response time because workstations are not used for executing remote process. However, the model does not utilize the processing capability of idle workstation. The V-System (Cheriton 1988) is an example of a distributed computing system that is based on the workstation-server model. 4.4) Processor-Pool Model In the process of pool model the processors are pooled together-to be shared by the users needed. The pool -or processors consist of a large number of micro-computers and minicomputers attached to the network. Each processor in the pool has its own memory to load and run a system program or an application program of the distributed-computing system. The processor-pool model is used for the purpose that most of the time a user does not need any computing power but once in a while he may need a very large amount of computing power for short time (e.g., when recompiling a program consisting of a large number of files after changing a basic shared declaration). In processor-pool model, the processors in the pool have no terminal attached directly to them, and users access the system from terminals that are attached to the network via special devices. These terminals are either small diskless workstations or graphic terminals. A special server called a run server manages and allocates the processors in the pool to different users on a demand basis. When a user submits a job for computation an appropriate number of Processors are temporarily assigned to his or her job by the run server. In this type of model we do not have a concept of home machine, in this when a user logs on he is logged on to the whole system by default. The processor-pool model allows better utilization of the available processing power of a distributed computing system as in this model the entire processing power of the system is available for use by the current logged-on users, whereas this is not true for the workstation-server model in which several workstations may be idle at a particular time but they cannot be used for processing the jobs of other users. Furthermore, the processor-pool model provides greater flexibility than the workstation-server model as the system’s services can be easily expanded without the need to install any more computers. The processors in the pool can be allocated to act as extra servers to carry any additional load arising from an increased user population or to provide new services. However, the processor-pool model is usually considered to be unsuitable for high-performance interactive application, program of a user is being executed and the terminal via which the user is interacting with the system. The workstation-server model is generally considered to be more suitable for such applications. Amoeba [Mullender et al. 1990]. Plan 9 [Pike et al. 1990], and the Cambridge Distributed Computing System [Needham and Herbert 1982] are examples of distributed computing systems based on the processor-pool model. 5) ISSUES IN DESIGNING A DISTRIBUTED OPERATING SYSTEM To design a distributed operating system is a more difficult task than designing a centralized operating system for several reasons. In the design of a centralized operating system, it is assumed that the operating system has access to complete and accurate information about the environment is which it is functioning. In a distributed system, the resources are physically separated, their is no common clock among the multiple processors as the delivery of messages is delayed, and not have up-to-date, consistent knowledge about the state of the various components of the underlying distributed system .And lack of up-to-date and consistent information makes many thing (such as management of resources and synchronization of cooperating activities) much harder in the design of a distributed operating system,. For example, it is hard to schedule the processors optimally if the operating system is not sure how many of them are up at the moment. Therefore a distributed operating system must be designed to provide all the advantages of a distributed system to its users. That is, the users should be able to view a distributed system as a virtual centralized system that is flexible, efficient, reliable, secure, and easy to use. To meet this challenge, designers of a distributed operating system must deal with several design issues. Some of the key design issues are: 5.1) Transparency The main goal of a distributed operating system is to make the existence of multiple computers invisible (transparent) and that is to provide each user the feeling that he is the only user working on the system. That is, distributed operating system must be designed in such a way that a collection of distinct machines connected by a communication subsystem appears to its users as a virtual unprocessed. Accesses Transparency: Access transparency typically refers to the situation where users should not need or be able to recognize whether a resource (hardware or software) is remote or local. This implies that the distributed operating system should allow users to access remote resource in the same ways as local resources. That is, the user should not be able to distinguish between local and remote resources, and it should be the responsibility of the distributed operating system to locate the resources and to arrange for servicing user requests in a user-transparent manner. Location Transparency: Location Transparency is achieved if the name of a resource is kept hidden and user mobility is there, that is: Name transparency: This refers to the fact that the name of a resource (hardware or software) should not reveal any hint as to the physical location of the resource. Furthermore, such resources, which are capable of being moved from one node to another in a distributed system (such as a file), must be allowed to move without having their names changed. Therefore, resource names must be unique system wide. User Mobility: this refers to the fact that no matter which machine a user is logged onto, he should be able to access a resource with the same name he should not require two different names to access the same resource from two different nodes of the system. In a distributed system that supports user mobility, users can freely log on to any machine in the system and access any resource without making any extra effort. Replication Transparency Replicas or copies of files and other resources are created by the system for the better performance and reliability of the data in case of any loss. These replicas are placed on the different nodes of the distributed System. Both, the existence of multiple copies of a replicated resource and the replication activity should be transparent to the users. Two important issues related to replication transparency are naming of replicas and replication control. It is the responsibility of the system to name the various copies of a resource and to map a user-supplied name of the resource to an appropriate replica of the resource. Furthermore, replication control decisions such as how many copies of resource should be created, where should each copy be placed, and when should a copy be created/deleted should be made entirely automatically by the system in a user -transparent manner. Failure Transparency Failure transparency deals with masking from the users partial failures in the system, Such as a communication link failure, a machine failure, or a storage device crash. A distributed operating system having failure transparency property will continue to function, perhaps in a degraded form, in the face of partial failures. For example suppose the file service of a distributed operating system is to be made failure transparent. This can be done by implementing it as a group of file servers that closely cooperate with each other to manage the files of the system and that function in such a manner that the users can utilize the file service even if only one of the file servers is up and working. In this case, the users cannot notice the failure of one or more file servers, except for slower performance of file access operations. Be implemented in this way for failure transparency. An attempt to design a completely failure-transparent distributed system will result in a very slow and highly expensive system due to the large amount of redundancy required for tolerating al l types of failures. Migration Transparency An object is migrated from one node to another for a better performance, reliability and great security. The aim of migration transparency is to ensure that the movement of the object is handled automatically by the system in a user-transparent manner. Three important issues in achieving this goal are as follows: Migration decisions such as which object is to be moved from where to where should be made automatically by the system. Migration of an object from one node to another should not require any change in its name. When the migrating object is a process, the interposes communication mechanism should ensure that a massage sent to the migrating process reaches it without the need for the sender process to resend it if the receiver process moves to another node before the massage is received. Concurrency Transparency In a distributed system multiple users uses the system concurrently. In such a situation, it is economical to share the system resource (hardware or software) among the concurrently executing user processes. However since the number of available resources in a computing system is restricted one user processes, must necessarily influence the action of other concurrently executing processes. For example, concurrent update to the file by two different processes should be prevented. Concurrency transparency means that each user has a feeling that he is the sole user of the system and other users do not exist in the system. For providing concurrency transparency, the recourse sharing mechanisms of the distributed operating system must have the following properties: An event-ordering property ensures that all access requests to various system resources are properly ordered to provide a consistent view to all users of the system. A mutual-exclusion property ensures that at any time at most one process accesses a shared resource, which must not be used simultaneously by multiple processes if program operation is to be correct. A no-starvation property ensures that if every process that is granted a resources which must not be used simultaneously by multiple processes, eventually releases it, every request for that restore is eventually granted. A no-deadlock property ensures that a situation will never occur in which competing process prevent their mutual progress ever though no single one requests more resources than available in the system. Performance Transparency The aim of performance transparency is never get

Study of Recurrent UTI among Mothers in the Philippines

Study of Recurrent UTI among Mothers in the Philippines INTRODUCTION Background of Study Millions suffer, only a few understand. In Barangay Ula, Recurrent UTI is one of the leading causes of morbidity among 40 households with a prevalence of 82.5% in which a bulk of 57% comprises of mothers. Urinary tract infections (UTIs) are among the most prevailing infectious diseases with a substantial financial burden on society. An estimated 13,000 deaths annually are attributed to UTIs. The magnitude of the problem worldwide is becoming very apparent.Globally, there are an estimated 150 million urinary tract infections per annum. Nearly 20% of women who have UTI will have another, and 30% of those will have yet another, but of the last group, 80% will have recurrences. In the Philippines, UTI continues to be among the top five reasons for consultations in health facilities nationwide. It is one of the ten leading causes of morbidity in all ages with a rate of 127.84 per 100,000 population. Recurrence of UTI among these mothers is greatly affected by behaviors. In this regard, the study would like to focus on the UTI-related behaviors of mothers, in Barangay Ula, diagnosed with recurrent urinary tract infection. Review of Related Literature According to Al-badr and colleague (2013), urinary tract infections (UTIs) are one of the most common clinical bacterial infections in women, accounting for almost 25% of all infections. Around 50–60% of women will develop UTIs in their lifetimes wherein Escherichia coliis the most common organism in all patient groups, but Klebsiella, Pseudomonas, Proteus,and other organisms are more common in patients with certain risk factors for complicated urinary tract infections (Kodner and Gupton, 2010). Hooton and Gupta (2013) defined recurrent urinary tract infection as ≠¥2 infections in six months or ≠¥3 infections in one year. Most recurrences are thought to represent reinfection rather than relapse, although occasionally a persistent focus can produce relapsing infection. Recurrent uncomplicated urinary tract infection is a common presentation to urologists and family doctors. A survey data suggest that 1 in 3 women will have had a diagnosed and treated UTI by age 24 and more than half will be affected in their lifetime. In a 6-month study of college-aged women, 27% of these UTIs were found to recur once and 3% a second time (http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3202002/). Many women suffer from frequent UTIs. About 20 percent of young women with a first UTI will have a recurrent infection. With each UTI, the risk that a woman will continue having recurrent UTIs increases.Some women have three or more UTIs a year. However, very few women will have frequent infections throughout their lives. More typically, a woman will have a period of 1 or 2 years with frequent infections, after which recurring infections cease (http://kidney.niddk.nih.gov/kudiseases/pubs/utiadult/). In a study of college women with their first UTI, 27 percent experienced at least one culture-confirmed recurrence within the six months following the initial infection and 2.7 percent had a second recurrence during this same time period. When the first infection is caused by Escherichia coli, women appear to be more likely to develop a second UTI within six months than those with a first UTI due to another organism. In a Finnish study of women ages 17 to 82 who had E. coli cystitis, 44 percent had a recurrence within one year(http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3202002/). A number of factors also appear to increase the risk of recurrent UTIs such as biological or genetic factors, behavioural risk factors and even the pelvic anatomy (http://www.uptodate.com/contents/recurrent-urinary-tract-infection-in-women). In symptomatic women, predictors of recurrent UTIs include symptoms following intercourse, signs or symptoms of pyelonephritis, and prompt resolution of symptoms with antibiotics. Nocturia and persistence of symptoms between UTI episodes are strong negative predictors for recurrent infection (http://www.aafp.org/afp/2010/0915/p638.html). According to Hooton and Gupta (2014), sexual intercourse, diaphragm-spermicide use, and a history of recurrent UTI are strong and independent risk factors for UTI. Even spermicide-coated condom use results in an increased risk of UTI. However, risk factors specific for recurrent UTI have received relatively less attention. In one large case-control study of women with and without a history of recurrent UTI, the frequency of sexual intercourse was the strongest risk factor for recurrent UTI in a multivariate analysis. Other risk factors identified were: 1) Spermicide use during the past year; 2) Having a new sex partner during the past year; 3) Having a first UTI at or before 15 years of age; and 4) Having a mother with a history of UTIs. Sexual activity can move microbes from the bowel or vaginal cavity to the urethral opening. If these microbes have special characteristics that allow them to live in the urinary tract, it is harder for the body to remove them quickly enough to prevent infection. Following sexual intercourse, most women have a significant number of bacteria in their urine, but the body normally clears them within 24 hours. However, some forms of birth control increase the risk of UTI. In some women, certain spermicides may irritate the skin, increasing the risk of bacteria invading surrounding tissues. Using a diaphragm may slow urinary flow and allow bacteria to multiply. Condom use is also associated with increased risk of UTIs, possibly because of the increased trauma that occurs to the vagina during sexual activity. Using spermicides with diaphragms and condoms can increase risk even further (http://kidney.niddk.nih.gov/kudiseases/pubs/utiadult/). According to Wilkinson and Treas (2010), perinneal care is part of routine hygiene care. When washing the perineum, it must be from front to back to prevent contaminating the urethra with any fecal material left in the anus. Fecal particles left on skin can cause skin breakdown due to enzyme activity, and may increase the risk of a urinary tract infection because of the presence of E. coli in the feces. During menstruation, it is important to change sanitary pads, tampons or menstrual cups regularly. The standard time for a sanitary pad is once every six hours, while for a tampon is once every two hours. Sanitary napkins are made of cotton wool and gel. When an individual bleed into one, most of the blood gets soaked in, but at a certain point the pad gets saturated and may leak. Another consideration is that menstrual blood – once it has left the body – gets contaminated with the body’s innate organisms. When these organisms remain in a warm and moist place for a long time they tend to multiply and can lead to conditions like urinary tract infection, vaginal infections and skin rashes. Therefore changing is essential (http://health.india.com/diseases-conditions/hygiene-during-menstrual-periods-10-things-you-should-know/). General Objective At the end of the study, we will be able to describe the UTI- related behavior of mothers in Barangay Ula, Tugbok, Davao City who were diagnosed with Recurrent UTI from 2009 to 2013 in terms of personal hygiene, sexual activity and birth control method. Specific Objectives To determine the personal hygiene practices of mothers base on the following parameters: Handwashing Perineal care Type of underwear used Usage and changing of panty liners Changing of sanitary pad during menstruation To determine the sexual activity of these mothers To determine the birth control methods used by mothers Significance of the Study This study will provide a reference point on the personal hygiene practices of mothers regarding UTI. The data gathered will be used as a guide in forming future program strategies in decreasing the prevalence of Recurrent UTI in the area. The results of the study will also serve as an insight on the following parties: Barangay health care providers (doctors, nurses and midwives) to provide and disseminate proper information to BHWs and mothers about the behavioural risk factors that can cause recurrence of UTI; Barangay health workers (BHWs) as the most accessible source of information, they should be equipped with the proper and adequate information regarding the behavioural risk factors causing UTI; Mothers to assess whether their personal hygiene practices are correct. This will also, in a way, equip mothers and correct any malpractices they have. There are indeed many cases of recurrent UTI which were not prevented because the mothers have poor personal hygiene practices. Mothers should therefore be properly equipped with adequate understanding of the personal hygiene practices that can be of great importance in the prevention of UTI. Hence, this knowledge can lead to the resolution of this problem. Definition of Terms Behavioural Risk Factors – the elements that predisposes the mothers in having recurrent UTI. Recurrent UTI – Recurrent Urinary Tract Infection; the reinfection involving the urinary tract including the kidneys, ureters, bladder, and urethra. Mother – a person who has been pregnant and has already given birth regardless of her marital status. Personal Hygiene Practices – set of actions performed to care for one’s health Perineal Care an everyday hygienic practice of washing the perineum Chapter 2 Methodology Research Design Descriptive research was used in this study. The study aims to determine the Behavioural Risk Factors of Mothers diagnosed with Recurrent UTI in Purok 6, Barangay Ula, Tugbok District, Davao City. Locale of the Study The study will be conducted in Purok 6, Barangay Ula, Tugbok District, Davao City. Unit Analysis The subject of this study is a Mother diagnosed with Recurrent UTI residing in Purok 6, Barangay Ula, Tugbok District, Davao City. Sampling A total enumeration of 40 mothers will be included in the study. Variables and Measures Data Collection Procedure The testing in this study is focused on the behavioural risk factors of mothers diagnosed with Recurrent UTI, through the scheduled interview of all Mothers in Purok 6, Barangay Ula, Tugbok District, Davao City. Treatment of Data The data was analyzed using the summary statistics like means and frequency distribution. Ethical Consideration We will provide each participant with informed consent forms. Confidentiality of participants’ information and answers will be of our paramount consideration. Chapter 3 Results This section shows the results of the study. The respondents were the 40 mothers of Purok 6, Barangay Ula, Tugbok District, Davao City. Table 1. The Frequency Distribution of 40 Mothers According to Diagnosed Cases of Recurrent UTI Table 2. The Frequency Distribution of 40 Mothers According to Behavioural Risk Factors Chapter 4 Discussion Limitation of the Study The study was limited to all mothers residing in Purok 6, Barangay Ula, Tugbok, Davao City. This was limited on a scheduled interview with the participants. Diagnosed Cases of Recurrent UTI The results showed that 33 mothers were diagnosed with Recurrent UTI while 7 of them were not diagnosed at all with the infection. Behavioural Risk Factors The results showed that all of the mothers were practicing handwashing before and after doing perinneal care. It also showed that a total enumeration of 40 mothers was washing their perineum everyday in which almost all of them were doing it about 1 to times a day. They knew that it is really important to maintain cleanliness within one’s self. About 24 of the mothers were using water and soap in washing their perineum, 11 mothers were using feminine wash while 5 of the mothers were only using water for perinneal care. Out of the 40 mothers doing perinneal care, 19 were washing their perineum from front to back and the remaining 21 mothers were doing it from back to front. The type of underwear used by 28 mothers was made of cotton while 8 of them used spandex and 4 used silk underwear. 22 mothers interviewed were using panty liners in which 19 of them changes their panty liners once to thrice in a day. Of all mothers, 27 were still having their monthly menstrual period while 13 of them were already menopausal. Among the mothers who were still having menstruation, 18 of them were changing their pads at least 1 to 3 times a day, 8 mothers change 4 to 6 times in a day while only 1 mother changes her pad at least 7 times in a day. There were 29 mothers who were sexually active who all had only 1 sexual partner. 26 of which were doing perinneal washing before sexual intercourse while 28 of the sexually active mothers were doing perinneal care after sexual intercourse and 26 of the said mothers were urinating before and after sexual intercourse. No mother was with catheters at the time of interview. This means that catheter is not the cause of the recurrence of UTI among the 40 mothers in the Purok. Birth control methods were used by only 18 mothers wherein 12 of them did not want to have a baby anymore while the remaining 6 were not yet ready to have a baby. The rest of the 22 mothers were not using any birth control methods because 18 of them were already menopausal and 4 of them were said to be pro-life. On the other hand, out of the 12 mothers who used family planning, 8 mothers used condoms. With these results, it revealed that many of the mothers who were diagnosed with recurrent UTI were having personal hygiene malpractices such as washing their perineum from back to front wherein it moves bacteria from the anus close to the urethra. Another was how often they change their panty liners as well as their sanitary pads in a day as the pads get contaminated with the bodies’ innate organisms. When this happens, organisms will multiply in such warm and moist environment leading to urinary tract infections. Chapter 5 Summary of Results, Conclusion and Recommendations Summary Urinary tract infections (UTIs) are among the most prevailing infectious diseases with a substantial financial burden on society. Globally, there are an estimated 150 million urinary tract infections per annum. Nearly 20% of women who have UTI will have another, and 30% of those will have yet another, but of the last group, 80% will have recurrences. In the Philippines, UTI is one of the ten leading causes of morbidity in all ages with a rate of 127.84 per 100,000 population. In Purok 6, Barangay Ula, Recurrent UTI is one of the leading causes of morbidity among 40 households with a prevalence of 82.5%. A bulk of 57% comprises of mothers. The results showed that 33 mothers were diagnosed with Recurrent UTI while 7 of them were not diagnosed at all with the infection. The results showed that all of the mothers were practicing handwashing before and after doing perinneal care. It also showed that a total enumeration of 40 mothers was washing their perineum everyday in which almost all of them were doing it about 1 to times a day. About 24 of the mothers were using water and soap in washing their perineum. The type of underwear used by 28 mothers was made of cotton. 22 mothers interviewed were using panty liners in which 19 of them changes their panty liners once to thrice in a day. Among the mothers who were still having menstruation, 18 of them were changing their pads at least 1 to 3 times a day, 8 mothers change 4 to 6 times in a day while only 1 mother changes her pad at least 7 times in a day. 26 out of 29 sexually active mothers were doing perinneal washing before sexual intercourse while 28 of the sexually active mothers were doing perinneal care after sexual intercourse and 26 of the said mothers were urinating before and after sexual intercourse. On the other hand, out of the 12 mothers who used family planning, 8 of them used condoms. With these results, it only revealed that many mothers who were diagnosed with recurrent UTI were having personal hygiene malpractices. Conclusions At the end of the study, we were able to determine the personal hygiene practices of mothers base on handwashing, perineal care, type of underwear used, usage and changing of panty liners, and changing of sanitary pad during menstruation. We were also able to determine the sexual activity of mothers associated with the prevalence of Recurrent UTI. Lastly, we were able to determine the birth control methods used by mothers that predispose them to recurrent UTI such as the use of condoms and IUDs. Recommendations To the City Health Office: conduct lectures and seminars on Recurrent UTI To the Barangay Officials: provide support on the programs on Recurrent UTI To the BHWs: attend lectures and workshops regarding Recurrent UTI