.

Monday, September 30, 2019

Perceptions Of Cancer In Children Health And Social Care Essay

Cancer is a awful disease none of us would desire to hold. Peoples may hold different general perceptual experiences of malignant neoplastic disease in kids, striplings and younger grownups. Those perceptual experiences may come from the media, from wellness attention suppliers, an overheard narrative or from a member of a household who experienced it, and through these brushs, perceptual experiences of malignant neoplastic disease may be formed. For a 3rd universe state like the Philippines, a delayed acknowledgment of the disease every bit good as forsaking of intervention may ensue partially from misinterpretations and beliefs of incurableness, wholly lending to patient mortality. Misperceptions, and therefore the demands for increased support, may be greatest in a public infirmary with largely patients of low socio-economic position and educational degree. Such patients may peculiarly necessitate support from governmental and non-governmental bureaus every bit good as private sector spouses to prolong intervention. Once public perceptual experiences of malignant neoplastic disease in an country are better understood, targeted educational runs and resources may be better dedicated to assist households in demand and address misperceptions that affect patient attention.â€Å" Reappraisal of related literature and/or â€Å" What is already known about the subject?In developed states, endurance results for kids and stripling s with malignant neoplastic disease have improved significantly over the past few decennaries ; for Acute Lymphoblastic Leukemia, for case, 5-year endurance estimations for kids aged 15 old ages and below have increased from 60 % to up to 89 % ( Smith et Al, 2010 ) . In the Philippines, in contrast, 5-year endurance for childhood malignant neoplastic disease has been estimated to be merely 5-10 % ( Ribeiro et al, 2008 ) . As suggested by surveies in other low-income states, persons ‘ perceptual experiences, beliefs, and awareness refering malignant neoplastic disease may impact intervention decision-making ( Kumar et al, 2010 ) . In the Philippines, in add-on to misperceptions, audiences with unconventional health care suppliers such as faith therapists may be normally practiced ( Gamboa, 1984 ) ( Kimby et al. , 2003 ) , and contribute to holds in intervention, which may in bend worsen results. In developing states the principal cause of intervention failure in kids malignant neoplastic disease is abandonment ( Arora et al, 2010 ) . However, beyond fiscal and transit troubles that lead to intervention refusal and forsaking, perceptual experiences that malignant neoplastic disease is incurable may besides add to put on the line for forsaking. Thus misperceptions about malignant neoplastic disease in each scene should be carefully studied, so that they may be better addressed through instruction, reding and support ( Sitaresmi et al, 2010 ) . A recent qualitative survey on parents ‘ positions on information proviso in childhood malignant neoplastic disease attention suggested that the extent and type of information known to parents about the unwellness of their kid may impact get bying ( Kastel at Al, 2010 ) . Patients themselves may be likewise affected because better support from households through good information may better communicating and patient results. The populace may frequently hold different perceptual experiences of malignant neoplastic disease than the positions of experts ( Lipworth et al. 2010 ) . A survey done about the general populace ‘s malignant neoplastic disease consciousness in the United Kingdom found that even in a first universe state, there still may be important lacks in footings of malignant neoplastic disease consciousness ( Adlard and Hume, 2003 ) . In developing states, the demand for information and public instruction sing malignant neoplastic disease may be even more profoun d. Cancer patients who are adolescent and immature grownups up to 29 old ages of age may see physical and emotional challenges that are rather distinguishable from those in patients of other age groups. A recent follow-up survey of stripling and immature grownup malignant neoplastic disease subsisters ( Kazar et al, 2010 ) reported that diagnosing during adolescence was associated with more negative self-reported psychosocial map and wellness beliefs, proposing that wellness perceptual experiences may impact well-being even in the long term. Persons in this age group may besides be more likely to seek wellness information online ( Koch-Weser et Al, 2010 ) and therefore potentially have different malignant neoplastic disease perceptual experiences than those in other age groups. Better understanding different public perceptual experiences and their beginnings would let wellness suppliers to turn to misperceptions, and assist concentrate information airing on the most needful subjects.â⠂¬Å" Research question/s † and/or â€Å" What is non yet known about the subject? †1. Amongst grownups go toing a third public infirmary in a resource-limited scene, what are some general perceptual experiences sing malignant neoplastic disease, and specifically leukaemia in kids or younger grownups? 2.What are these perceptual experiences based on? ( Personal experience? Others ‘ experiences? Media? Etc. )â€Å" Significance of the survey † and/or â€Å" What will healthcare be if the answer/s to the research question/s will be known? †By better understanding public perceptual experience of malignant neoplastic disease in kids, striplings and immature grownups, wellness suppliers may be able to: 1. Better reference misinterpretations and assist usher patients and households to get by with the unwellness 2. Better address the different perceptual experiences of malignant neoplastic disease in kids, striplings and immature grownups through media, wellness attention suppliers and patients ‘ several household membersObjective/s † and/or â€Å" What will this survey make? †1. To garner general perceptual experiences refering malignant neoplastic disease in kids, striplings and immature grownups, amongst grownups at a third public infirmary in Mindanao, Philippines 2. To place possible precedences for public consciousness publicity and protagonism for malignant neoplastic disease in kids, striplings and immature grownups. MethodologyResearch designA qualitative survey of the general perceptual experiences of malignant neoplastic disease in kids, stripling and immature grownups at a third public infirmary in Mindanao, Philippines is proposed utilizing semi-structured interview as the primary research attack. A personal interview was considered to be more appropriate for our puting instead than the usage of a telephone interview as non every family owns a telephone, and such studies are non common in our scene. A semi-structured interview was selected in stead of a cross-sectional study to better research the new subject. Furthermore, Pollock et Al. ( 2010 ) late found that qualitative interviewing may be more effectual than a questionnaire in researching persons ‘ ideas on malignant neoplastic disease information ; in comparing usage of questionnaires to interview to measure malignant neoplastic disease patients ‘ satisfaction, they showed that both the quality and item provided was richer utilizing colloquial interviews. Use of a semi-structured interview allows us to utilize inquiries that were prepared in front of clip in add-on to holding flexibleness to follow respondents ‘ train of idea as appropriate during the interview. Using open-ended inquiries will let patients to joint in their ain words their perceptual experiences instead than holding research workers categorise them, which may be peculiarly appropriate for this survey since there are no formal surveies researching this subject in the Philippines to our cognition. The interview procedure will get down in February of 2011 upon moralss blessing. Patients will be recruited from the clinics three times a hebdomad, with the end of enrolling 3-5 patients each clip. The brief interviews will be recorded on paper with infinite for every inquiry and besides be audio-recorded with participant consent, with interviews expected to last for 5-10 proceedingss. While there is an on-going audio-recording the participant is besides observed for their facial looks, position, or for non-verbal cues that can non be captured on tape. To promote variable responses, the interview manner is informal and involves open-ended inquiries. The information will be analyzed by inductive content analysis with coding. Subjects will be identified from transcripts of the audio-recordings or handwritten notes for comparing and analysis. Independent reappraisal and initial cryptography of the transcripts will be conducted by the survey research workers, with subsequent treatment a nd declaration of differences by consensus.PutingThe survey will be held at the General Pediatric Outpatient Department and Internal Medicine Department at JICA constructing during their clinic hours from Monday to Friday, 1-3pm, at the Southern Philippines Medical Center. Consultation starts at 8am-5pm with tiffin interruptions. The subspecialty clinics are separated. The cut off age for the general paediatricss section is 14 old ages old and below with upper limit of 50-70 patients and 14 old ages old and above for general internal medical specialty with a upper limit of 50-80 patients in a twenty-four hours. Outpatient audience fee is 30 pesos which hapless households in the bottom 30 percent income group with an mean monthly income of P6,475 in 2007 can afford ( National Statistical Coordination Board ) .ParticipantsInclusion StandardsEach of these standards must be met for inclusion: 1. Watchers/care-givers or healthy patients 18 old ages old or over showing for non-acute attention at ambulatory clinics 2. English- or Bisaya/Tagalog-speakers 3. Those physically and mentally able, are willing to be interviewed on the subject of malignant neoplastic disease and give their consentExclusion StandardsEither of these standards being met will take to exclusion: 1. Watchers/care-givers or healthy patient below 18 old ages old presenting for non-acute attention at ambulatory clinics 2. Watchers/care-givers of patients ( or patients themselves ) who are presently being managed for malignant neoplastic disease, or are showing to clinic for question malignant neoplastic disease ( Note: Watchers/patients who are former malignant neoplastic disease patients or household members of malignant neoplastic disease patients who have completed intervention may still be included if they meet all the above inclusion standards. ) This exclusion standard attempts to protect participants who may be more emotionally affected if they or their household member were presently undergoing malignant neoplastic disease therapy ; besides, as a group, their experiences and perceptual experiences are likely really different that they should be considered in a separate survey. On the other manus, many may hold aged household members with a history of malignant neoplastic disease, yet remain potentially valuable sources for this survey. )Definition of footingsChildren – used here by a nd large for those between ages 0-13 old ages Adolescent and Young Adult ( AYA ) – adapted from a normally used term in paediatric oncology, to mention to those aged between 13-29 old ages Children, Adolescent and Young Adult ( CYA ) – used in this survey to depict both Children and AYA as a group Cancer – any malignance in the described age groups, including leukaemia and solid tumourSampling processsThose who meet the inclusion standards will be included in the survey. A maximal fluctuation purposive sampling is used to deliberately include individuals of different age, gender, and evident socio-economic position, as their perceptual experiences may differ. An expected sum of no more than 40 participants are expected to be recruited to accomplish impregnation, when no new information appears to originate from subsequent interviews ( Patton, 1990 ) . Small samples can derive a better, more in-depth apprehension of topics such as persons ‘ general wellness perceptual experiences, as have been used in other surveies related to this subject. As a recent illustration, a qualitative survey with 25 survey participants was able to place of import subjects to steer future surveies with respects to understanding immature unwritten malignant neoplastic disease patients â⠂¬Ëœ perceptual experiences ( Grant et Al, 2010 ) .Datas assemblageMain result steps General perceptual experiences of malignant neoplastic disease Symptoms of malignant neoplastic disease Percepts of how malignant neoplastic disease is diagnosed and treated Percepts of impact of malignant neoplastic disease diagnosing, including results Expected beginnings of medical/financial/psychosocial support for CYA with malignant neoplastic disease Beginning of information/awareness sing malignant neoplastic diseaseData handling and analysisThe interviewer will do handwritten notes of the participants ‘ responses every bit closely as possible. Audio-recording, where agreed upon by the participant, will be included to ease accurate gaining control of informations. All the interviews will be conducted by a first twelvemonth paediatric occupant doctor, with informations analysis done together with one paediatric junior adviser, and two paediatric oncology/hematology advisers. The information will be transcribed, translated and coded line by line. Succeeding regular squad meetings will be held to integrate feedback and reconcile differences. The interview will be reviewed independently by at least two advisers working with CYA with malignant neoplastic disease to measure inquiries ‘ content cogency. A pilot testing of the interview procedure will be done foremost on 5-10 voluntaries ( e.g. clinical trainees or clinical support squad members ) with at least one other squad member observing, for initial feedback on interview manner and inquiry lucidity. Further pilot testing of the interview inquiries will so be done on an initial sample of 5-10 people run intoing the inclusion/exclusion standards at the out-patient section of the paediatric and internal medical specialty section of the Southern Philippines Medical Center.Ethical considerationsOral consent is proposed in stead of written consent for farther protection of patients ‘ individuality and confidentiality ; their real/full names are non required for the survey, and all participants will be identified by a codification name/number. Based on the inclusion and exclusion standards they should hold an accurate apprehension of the survey ‘s focal point. Patients may anticipate that privateness will be respected and the squad ‘s purpose to make no injury. A privy country at the out-patient section will be made ready in instance the topics requested a small privateness. For patients/caregivers of malignant neoplastic disease patients this issue might be sensitive for them, and those households affected presently with malignant neoplastic disease are therefore excluded from the survey. A participant who becomes uncomfortable during the interview may instantly halt at any clip and all are invited to give their ideas openly. Participants are free to inquire inquiries and can bespeak more information about the survey. Dummy Consequence: In a qualitative person interview survey, grownups showing to a public third infirmary in Mindanao had a by and large ___perspective sing malignant neoplastic diseases in kids, striplings and immature grownups. Cancer is described as being _____ and survival is____ . Some of the most common symptoms they knew were ______ . Families who seek medical attention from this establishment are from the different categories of the society but largely from the ____ or ___ . Percepts of how malignant neoplastic disease is diagnosed and managed included ____ . Expected outcomes most normally described included _____ . Anticipated beginnings of support for malignant neoplastic disease patients named included _______ Main beginnings of information about malignant neoplastic disease described were____ , _____ , _____ .

Saturday, September 28, 2019

Factors and Motivations That Influence Biological Warfare

Many troops during the years of World War I met their demise in what is arguable the most terrifying and inhumane of all military tactics – biological warfare. Soldiers inhaled a deadly acidic gas that burned them from the inside out, suffocating them in an excruciating and unimaginable pain. Kurth Audrey, a professor of strategy at the U. S. National War College in Washington, stated: â€Å"Science is as neutral as a knife; it may maybe a blessing or a curse depending on the heart and the mind of the man who holds it. †[1] Terrorists organizations are motivated by many factors to use biological warfare. If a terrorist organization has the concepts of science down, as a neutral knife, then they can produce weapons that can fulfill their agenda, whether it is something that has to do with reputation, politics, or religion. Many factors contribute to terrorists using this type of warfare, which stimulates the motivations of terrorist organizations. These factors range from; access to information, cost, ease of dissemination, availability, access to technology, and difficulty of detection. Biological warfare is a dangerous type of warfare, than can cause severe damage to a population of people, crops, or animals. It can also cause harm to the one that is dispersing the biological agent, which causes one to think, why would someone use this type of warfare? Biological agents are often simpler to attain and produce than chemical weapons that can cause mass destruction in a population. The material for biological agents can easily be grown or purchased. There are some agents, such as Anthrax or Brucellosis, which occur naturally in animals in certain parts of the world , and individuals can acquire these agents just by traveling the globe to where these agents grow. For an example, the Aum Shinrikyo cult was reported to have gone to Zaire, a place in Africa, to seek the strains of Ebola for its use in its bio-weapons program. [2] Until recently, anyone could order agents from supple houses around the world. In 1995, American Type Culture Collection (ATCC), a mail order company that provides biological products, shipped the bacteria, Anthrax, to Saddam Hussein's biological warfare program in Iraq. [3] Just like the increase of technology throughout the decades, there is also an increase of availability of information related to chemical and biological weapons. Information on how to create biological weapons can be taken from articles within scientific literature on a variety of topics, which only requires a trained scientist to understand. The Internet has created forums on which terrorists groups can reach out, recruit members, and spread messages. It also makes a large library of information available to just about anyone who is interested on the production of biological agents. One resource that is found online is, Bacteriological Warfare: A Major Threat to North America, which is written by Larry Wayne Harris of the Aryan Nation. 4] This manual describes the reproduction and growth of biological agents, and can be purchased for only $30. [5] Another resource available is called, Silent Death, which instructs the reader in ways to kill using chemical and biological poisons. According to the publisher of this book, it sells thousands of copies each year. [6] Bio-engineers are now armed with knowledge on how to cease biological agents, as well as the effects of the agents upon a population. According to Ken Alibek, who supervised the Soviet bio warfare program, â€Å"Although the mos-sophisticated and effected versions [of biological weapons]require considerable equipments and scientific expertise, primitive versions can be produced in a small area with minimal equipment by someone with limited training†¦ They would be relativity inexpensive and easy to produce. †[7] To produce bio-weapons, a terrorist organization must have access to a scientist with some graduate training in the fields of microbiology or genetic engineering. The political and economic situation in Russia created a supply of bio warfare scientists who were not being paid and were unable to provide for themselves or their families. Regardless of the political, moral and ethical standards of these scientists, it is reasonable to expect that many of those scientists are now working for terrorist organizations around the world. Iraq scientists discovered which strains to order by reviews in American scientific journals, which are located at American Type Culture Collection in Rockville, Maryland. For thirty-five dollars, they also picked up strains of tularemia and Venezuelan equine encephalitis once targeted for weaponization at Fort Detrick. [8] The knowledge that is learned, and the availability of the biological agents, caused the relative ease of production of the agents, storage they can be contained in, dissemination factors, increased safety for the troops handling the binary agents, and the less complicated processes of demilitarization. The cost of producing and deploying biological weapons is less expensive than chemical weapons; the materials, equipment, and production space are all so inexpensive, any terrorist organization can afford them. According to an Office of Technical Assessment (OTA) Report, the cheapest overt production of one nuclear bomb costs $200 million, with larger programs costing up to 50 times more. In contrast, a large arsenal costs less than $10 million dollars. 9] Kathleen Bailey, found through interviews with professors, students, and scientists, that all that was needed to create a biological weapons program capable of producing large amounts of agents, would be several biologists with $10,000 worth of equipment – all of which who could fit into the same room. [10] This then causes many terrorists organizations to actually be capable of producing a biological agent. Dissemination of biological agents can be simple and inexpensive. There are a variety of different ways they can be de livered. The simplest methods of dissemination are through the contamination of food products or water. This method only requires direct access to any food product or water- preferably during the purification stages of that food product or of that water. Biological agents can also be dispersed through the contamination of agriculture, indirect transmission through animals, and direct contact, such as the assassination of Georgi Markov in 1978 through a ricin- containing pallet that was shot into his thigh. Dissemination through aerosol or vapor into an enclosed area or the open air is more complex than just through food products or water. Biological agents released into the air, such as through the release of vapors from a crop duster, are subject to biological decay, physical decay, atmospheric thermal stability, wind speed, and dimension of the land surface. The dissemination of agents is more predictable in rural areas than urban regions. The agents must be able to withstand the stress of the dissemination, environmental factors, and physical obstructions. Researchers have found, however, that dissemination of agents at night or enclosed dark areas, such as subways or tunnels, can be particularly effective. [12] Biological agents can be extremely lethal, some biological agents create more deadly affects than others, such as Anthrax. According to the Department of Defense, ten kilograms of Anthrax can cause more damage than a ten kiloton nuclear weapon. [13] This form of warfare can lead a military down by 90% through the intentions of militarization, by giving the military that dispensed the biological agents a form of character. Since most individuals are not vaccinated for different types of diseases, such as smallpox, it can lead to millions of people dying. Small pox is an example of a bacteria that can cause up to 2 million people, if being exposed to a society, to die because of the complete absence of prevention and control measures since 1970, because people do not believe that this disease will emerge again. It has such a high mortality rate (one in three people die) and infectiousness (on average, one person will infect three additional people). Politics seams to be the cause of many disasters from the corrupt French government in 1740 which led to the brutal French Revolution, to the rebellions of Aum Shinrikyo, which formed their own structure based on the Japanese government. Aum Shinrikyo attracted followers that opposed the Japanese government, in the late 1980's and 1990's, which caused their group to become larger. Their goal was to pursue terrorist violence in competition with rival groups that Shoko Asahara, the leader of this violent group, feared would attract support away from Aum Shinrikyo. Their next goal was to take over the Japanese government. On March 1194, Aum Shinrikyo tried to assassinate the leader of a rival religious sect, the Soka Gakkai, but failed because the spraying system mounted on a van malfunction and contaminated its operators. However, the second attempt occurred in Mastumoto on June 27th, 1994, the members working with the biological agents of Aum Shinrikyo, improved the spraying system, which targeted three judges who were expected to rule against the sect in a land dispute. This later resulted in the injuries of 500, including the three political judges they were after. In September 1984, Rajneeshee religious cult the Dalles, Orgeon grew Salmonella typhimurium to manipulate the results of the November 1984 election. They planned to buss homeless people into their commune and register them as voters, and make the opposing voters sick and unable to vote. They then poisoned to county commissioners by using the method of dissemination of contaminating water with salmonella typhiurium, which caused both the commissioners to become sick. The cult then contaminated ten Dallas restaurants, which opened up 751 cases of salmonella. 16] The uses of these pathogens by both these two different groups, had the attentions of manipulating whatever they deemed was politically corrupted. Biological agents can be small and easy to transport. William Patrick, who left the US biological Weapons Development Program around 1969, regularly carries a vial containing a stimulant for anthrax, just to test whether or not it will be detected. In 1999, he brought the vial with him into a hearing of the House Permanent Select Committee on Intelligence without being detected and claimed to make the same move at the State Department, the Pentagon, and the CIA. 17] Many have traveled through airports, with high-tech security, around the world carrying equipment for deploying these biological agents through the air and never were stopped to explain the purpose for the equipment. The first signs of an attack may not even come until weeks after the agent has been deployed. Thus, by the time the authorities determine an attack has taken place, the perpetrators could be anywhere in the world, trying to escape what they have done. Biological attacks can be mistaken for naturally occurring disease outbreaks. Because of the difficulty in detecting a biological weapons attack, it is almost impossible to lay blame on a particular group or individual for the outbreak. As technology, and information on the biological fields of science increase, so do the potential threats of this type of warfare. It has been examined closely to how the factors help contribute to this type of warfare, as well as how motivation leads for this type of warfare to become some-what successful. The main major factor of groups to use this type of warfare would be religion. Religion plays a tremendous role in human misery, from wars, such as the crusades, to the use of biological weapons targeted at specific religious groups. When terrorism is involved in the name of religion, such as Al-Qaida, it is often motivated by violence that is regarded as â€Å"divine duty† which justifies bloodshed. One of the hallmarks of a religious terrorist is the unquestioned willingness to kill a large number of people without conscience behind their agendas. Since biological warfare is very effective in killing mass number of people, many religious extremist groups use this form of warfare to justify their actions, and views on religion. Terrorists groups have reputations that attract many people. Acquiring such massive biological weapons, or producing such complicated weapons, brings the terrorist group a high-rank reputation as well as to be seen as having no boundaries. It then makes it easier for the terrorist group to achieve their agendas. Aum Shinrikyo cult is an example that uses both of these motivations. Their attack in the subway system in 1995 not only caused the successful attack of fifty-five hundred people, according to their agenda, but had gotten people to realize their dangerous element; the involvement of highly intelligent and educated people, in which some are considered to be Japan's brightest scientists, computer technicians, and trained professionals. Even by the standards of cults, the Aum were a strange bunch. Among other things, members believed in the virtues of levitation and coffee enemas. They also wore elaborate radio sets on their heads so as to better hear the thoughts of their Leader. Despite their unusual ideas, the cult attracted a number of educated followers with scientific and technical abilities. It is a discouraging fact: religious cults may be strange and oblivious, but that doesn't prevent them from attracting capable intelligent followers – or to pursue their doomsday agendas. This type of warfare is an inhumane, dangerous type of warfare, that has killed dozens of people. If we actually take the factors into consideration, than we can lower the motivation and the prevent the further productions of these biological weapons. Bibliography http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_AUM01.htm

Friday, September 27, 2019

Marketing is The management process of anticipating, identifying and Essay - 1

Marketing is The management process of anticipating, identifying and satisfying customer requirements profitably (CIM, 2001) - Essay Example It involves formulation and communication of information that can generate utility to different stakeholders to a subject entity and such stakeholders may be customers, business associates, the community, and contractual parties to an institution’s activities. In addition, the scope of the definition of marketing identifies a dual approach to information transfer between an entity and its stakeholders (Taylor 2010, p. 152). This definition is valid because it identifies with the American Marketing Association’s (AMA’s) definition. The CIM’s definition of marketing focuses on customers’ utility and organizations’ profitability. Even though the AMA’s definition does not focus on profit motive for organization’s engagement in marketing, this is trivial from the scope of corporate ventures that profit motive drives. Such a scope validates CIM’s definition of marketing as a strategy to profit optimization by business organization and is consistent with organizations’ initiatives for efficiencies and effectiveness that can results to low production costs for higher profit margins and economies of scale advantage. CIM also identifies customer utility as a driver to marketing initiative and this is reflexive of the definition of marketing according to AMA. According to AMA, the focus of marketing is to meet customers’ needs, at individual an d societal levels. The CIM’s definition of marketing also identifies, though not directly, associated activities with marketing that AMA outlines. Anticipating and identifying customers’ needs, for example, involves exploration of background information into customers’ needs for creation of information or commodities while satisfying such needs relates to communication and transfer of utilities for customers’ satisfaction. CIM’s definition is further consistent with AMA’s previous definitions of marketing that that identified focus on business undertakings and development of values for

Qualitative methods - Participant observation Research Paper

Qualitative methods - Participant observation - Research Paper Example Literature Review: Introduction: Participant observation has its roots in anthropological studies, where researchers would go to a far away place to study the customs and practices of less known societies (Lakono et-al, 2009). With regard to a qualitative method such as semi-structured interviews, the process involves a researcher speaking to research subjects and then attempting to make sense of what has been said by reviewing the transcript of the conversation (Tolhurst, 2012).To avoid biased remarks, the researcher has to learn to put aside their preconceptions (Kutsche, revised 2008). Challenges: The challenges that face researchers in the field of qualitative research, otherwise referred to as ethnographic fieldwork, which encompasses participant observation are enormous and disorienting. These short theoretical explanations make it clear that we are dealing with a social phenomenon that confronts researchers with a new complexity in terms of special disruption, and at the same time, a highly connected social formation (Richter, 2012). The social sciences have particularly advanced in application of qualitative methods, including gender concerns. The desire to overcome the separation of productive and reproductive labour in the lives of both sexes is a desire that can only be achieved if labour unions perceive gender relations as a political challenge demanding their attention (Morgenroth, 2012). Jun Li, in her research in the field of female gambling, sums up some of her challenges in a slightly disturbing fashion. By assuming a covert research role, I was able to observe natural occurrences in gambling settings, but unable to make peace with disturbing feelings of my research concealment. By uncovering my research identity, I was able to fulfill ethical obligations as a researcher, but unable to get he female gamblers to speak their minds (Jun Li, 2008). According to Jun Li, she may never have succeeded in uncovering the individual secrets behind their p erformance in the game, and for any other matters they considered her an outsider. Participant Observation Definition Participant observation is a method of acquiring information for a study that requires the researcher to undertake their study in the target society. For this reason, the researcher gets ‘absorbed’ into the society and makes direct observations while in the assumed position of a member of the society. For this reason they participate directly in the affairs of their target, and therefore have a clearer understanding of the aspects of their study. Application of Participant Observation in Business management The method of participant observation has over time spread in application from the initial sociological fields to gain application in more disciplines, including business management. The managers of a business expect to be provided with forthright information about all aspects of the business that could help them to make advised decisions in running t he business. For this reason, they may decide to plant ‘informers’ to update them on curious operational details. They may as well decide to engage in relatively lower ranked duties in the firm in order to have clearer control of operations. A business proprietor interested in

Thursday, September 26, 2019

CS346-1501A-01 User Interface Design Phase 3 DB Coursework

CS346-1501A-01 User Interface Design Phase 3 DB - Coursework Example The purpose of this paper is to highlight the different benefits of usability test and how effective it becomes when developing an application that utilizes one of the rapid application methodologies. The most important reason for performing a usability test is to ensure that the design is what the user needs because there are very many websites and designs, which are very similar. Users always go for the easy and efficient websites, sites that are easy to use increase user satisfaction hence the company gets more users, and it also edges competition from their rivals. It is at this stage, designers identify the need to alter the design with an aim of improving user performance and satisfaction. These tests also help to analyze the performance and check whether it meets its outlined objectives. However, a formal laboratory is not necessary to facilitate such tests, the most important part is that there should be a user and an observer who can be in the same room with the user or can alternatively use another. Portable recording equipment is not necessary for such scenarios. Usability test has proved to be essential in the development of any type of products that endeavors to capture the consumer who is the user in this case. In reference to rapid application development, usability test is vital since it provides the required information about the requirements and the different ways of testing the designs (Edrington 1999). In this type of model, the different components are developed in parallel as if they are just sub projects. The designers arrange the developments and deliver them into a working prototype. It is at this stage that the user achieves something visible to see and try out to provide feedback in regards to phase. RAD model encourages the feedback of the customer, which is the backbone of the usability test because it depends solely on the customer to provide information about the type of product that will suit him. On the

Wednesday, September 25, 2019

Financial Analysis of General Electric CO Essay Example | Topics and Well Written Essays - 750 words

Financial Analysis of General Electric CO - Essay Example GE is investing in cleaner technologies and being recognized for the effort. GE Company is well managed. The data are mostly positive over the years. The company is showing growth in all the areas. It is also low geared and showing positive growth in profitability, liquidity, efficiency measurements. The company seems to be in the maturity phase. Analysts are positive about the growth of the company. So, the company has not topped its potential as yet. Appendix 1. Return on Investment (ROI) = {Profit before taxes (PBIT) / Investment (total assets - current liabilities)} 2006: {24,620 / (697,239 - 220,514)} x 100; 2005: {22,696 / (673,321 - 204,970)} x 100 2. Gross Profit Ratio = (Gross Profit) / Total Revenues) x 100 2006: (89,281 / 163, 391) x 100 ; 2005: (81,142 / 147,956) x 100 3. Return on Equity (ROE) = {Profit after taxes / Shareholder's Equity }x 100 2006: (20,666 / 112,314) x 100 ; 2005: (18,661 / 109,351) x 100 4. Earnings per share (given) 5. Working Capital = Current Assets - Current Liabilities 2006: (438,728 - 220,514) ; 2005: (378,269 - 204,970) 6. Current Ratio = Current Assets : Current Liabilities 2006: (438,728 / 220,514) ; 2005: (378,269 / 204,970) 7. Acid Test (or Quick) Ratio = Quick Assets : Current Liabilities (Quick Assets = Current Assets - Equity) 2006: (390,902 / 220,514) ; 2005: (336,121 / 204,970) 8. Total Asset Turnover = Revenue / Total Assets (fixed + current) (times) 2006: (163,391 / 697,239) ; 2005: (147,956 / 673,321) 9. Fixed Asset Turnover = Revenue / Fixed Assets (times) 2006: (163,391 / 258,511) ; 2005: (147,956 / 295052) 10. Cash Turnover Ratio = Total Revenues / Cash Balance s (times) (Cash Balances = Cash + Accounts Receivables) 2006: (163,391 / 28,229) ; 2005: (147,956 / 23,676) 11. Gearing ratio = {Total Debt Capital / (Total Debt Capital + Equity ) }x 100 2006: {432,957 / (432,957 + 112,314)}x100 ; 2005: {370,437 /

Tuesday, September 24, 2019

Israel & US aid Essay Example | Topics and Well Written Essays - 750 words

Israel & US aid - Essay Example The United States policy aims at promoting trade and cooperation with other nations. However, the United States has gone through economic downturn while the Chinese communist government has been rising rapidly (China Times, 2011). China is the greatest creditor to the United States and is uncomfortable with a single country’s global reserve currency. China believes the US should cut spending on social security and military. According to People’s daily, Beijing was angered by the decision to downgrade the US debt by S & P. The Chinese stepped up criticism against the United States and complained of the scheme of worldwide currencies that has been subjugated by the US dollar. The primary reason is the desire for Beijing to protect its financial interests (McGrego, 2012). According to a Chinese official Xinhua, the mounting dept and opinionated battles with US have dented the illustration of US overseas. The Chinese officials asserted that the US must cease its addiction to debt and learn to live within its means (China Times, 2011). This shall ensure safety of the Chinese assets in dollars. According Jamil, Beijing is unhappy with the checks subjected to the Chinese investors in the United States. China accuses the united states of checking the political background of Chinese investors. One of the Chinese officials, Wang, criticized the united states of discrimination and overspending on military at the expense of the economy (UPI, 2012). The Chinese policy aims at protecting its international interest like increasing its military presence and military budget. The United States has been opposing increased military spending in China. China is exerting influence in places it never affected before. For decades, China did business with regimes like Iran and Sudan which were unfriendly to the United States (McGregor, 2012). Presently the Chinese are doing business with America’s closest allies. China surpassed the United States to become the

Monday, September 23, 2019

Life Situations Represented through Graphs Essay

Life Situations Represented through Graphs - Essay Example The total amount paid in electricity bills for the last 10 months was $384, meaning that The average amount of electricity bill per month was $384/10 = $38.4 During 5 of the last 10 months, the electricity bill was above average of $38.4 and for the remaining 5, it was below the average amount. In terms of trend, the monthly electricity cost for the house increased from October 2010 onwards and reached a maximum of $49 in December 2010 before starting to decrease again. It has been decreasing since then. The graph is non-linear as no three successive points lie on the same line; although, the overall graph looks like a half sine curve with a clear peak during December 2010 and January 2011. The months of December 2010 to February 2010 had very high electricity bills compared to other months. In other words, the winter months had much higher electricity bills compared to spring and fall. This means that the consumption of electricity is rather seasonal. This seems natural as there is no heating required in the house during spring and fall, while the heating appliances are kept on during the winter months, which increases the consumption of electricity. It is likely that this trend would continue over the years although the peaks and the troughs in the graph can be brought lower by using energy efficient devices. References Glencoe. (n.d.).

Sunday, September 22, 2019

Advantages and disadvantages of internet Essay Example for Free

Advantages and disadvantages of internet Essay Nowadays internet is the most common form of communication. It is a worldwide connection of computer systems over a massive network. There are certain advantages and disadvantages to the Internet. First of all internet has made communication very simple, easy and convenient. It is possible to stay in touch with people that you hardly ever see. Moreover internet is a source of knowledge. Anyone could simply open internet and get many information about anything. In other words it is a small encyclopedia about everything in the universe. Nothing online is trustworthy. Websites that are supposed to be trusted and are supposed to be reliable are not full of reliable information. Even major websites that are run by big and trusted companies are using writing firms to write their websites and the writing firms are simply hiring the cheapest freelancers to do their work for them. It is true that the Internet has made it easier to find out basic facts such as the location of places, but even that information is commonly incorrect. Also some people use the Internet too much and forgot real life contact. It may now be easier to keep in contact with people you know, but it has removed any incentive to visit people. In other words it can be addictive and a waste of time and even money. Two angles have been compared in both a positive and negative light. Internet can be useful and dangerous at the same time. In my opinion, Treat the information you read online with a high degree of skepticism and you will be alright. It is also a good idea to use the Internet in order to stay in contact with people, as it is easy and convenient. However, do not allow online contact to start replacing physical contact. It is important to strike a balance between the two.

Saturday, September 21, 2019

A dsdm outline plan

A dsdm outline plan Project initiation phase (1 page, not technical knowledge) Scope CSA projects will have a stepwise plan for doing prelimionary analysis before committing to the full scope of work, in the event of unknowns or surprises being within the scop;e of work. Scope is managed through the finance Department. The scope of CSA project is to develop and implement centralized management, sharing data and the supporting IT systems and infrastructure necessary to provide: A secure and trusted means by which data communication can share information. A framework for information sharing, which can be transferred to other branches; areas and regions to assist in the delivery of integrated person centered services. The opportunity to measure and explore KPIs and other operational issues which effect the transition of children for example; each children remark, records, personal info.etc. Feasibility Study  § Large or high-risk projects will usually include provisions for review and reassessment of scope of work at this stage. By prior agreement, there may be a go/ nogo decision at this point. Existing System Analysis: Mainly, there is no standard way that projects record information about users of their services. Some projects record using different ways of paper based system, spreadsheet to help maintain records. It is needed centralized management and powerful administration. It is like that to choose the RAD technique within the DSDM framework. Proposed system requirements were feasible in contract agreement between our development team and CSA. We have been decided to use the ‘Oracle Database (this have enterprise features, models) as a standard database to implement. Feasibility report will cover all the usual topics, but not in great details. If a project is seen to be feasible from the results of the study, the next logical step is to proceed with the full business plan. Business Study Objectives of Business to fulfill the business requirements of CSA, to solve each department responsible person in Area, Region, Administration. To make the CSA project better than the existing system, some of them will be needed to update information to meet business in marketplace. Stimulate innovative partnership practice in the voluntary and provider sector to further increase the volume of service available. Incremental and iterative development necessary to converge on an accurate business solution. Configuration management Configuration Management is a key factor in managing the evolving products (both software and documents). The changed plan or control procedure must be valid within the contract. If it is not, we cant take this trouble. Project Manger probably reports this ‘user request form to Change Control Board (high level management to make decisions) to confirm the change request, features. Another problem is scope changes because it takes more about features that some arent available in real time system when we implement. (Prototyping is used to help users visualize and request changes to the system as it is being built, allowing applications to evolve iteratively.) Delivery timeframe changes because we cant to get end product in the agree date. So, we must schedule again to balance about the urgent product. (Timeboxing is used to create artificially with customer agreement that was estimated at 12 weeks duration.) Product description and breakdown structure The product description considered about the CSA organization, firstly we must considered the products that are associated with Budget Estimation happens after contract for development of the CSA project. It is the mainly event to perform as soon as later contract. Requirements Analysis is essentially required to make assessment of which are the requirements in CSA. Develop specific functionality defined as to carry out the proposed functions described in contract as CSA requirements. Define CSA requirements are needed really to determine the system starts before. It is divided by functional and non-functional requirements. Define System requirements are also needed to get required performance, response time to perform the system tasks such as defining required hardware, software.etc. For methodology, DSDM is used for development. Organization Structure by product WBS Risk Management Risk Management Type The risk lists is periodically reviewed to evaluate the effectiveness of risk mitigation strategies, which in turn drives revisions to the project plan and subsequent iteration plans. Risk ID Responsible Person(s) Description likelihood Impact (L/M/H) Contingency Plan Rsk0000 Project Manager Delays in appointing key personnel Inability to meet target date L Project Board to progress appointments as a priority Rsk0001 Project Manager Insufficient skills / resources / capacity within the partnership when required Inability to meet target date H Ensure commitment at a senior level to deliver required resource Rsk0002 Board Of Directors (High level) Competition for Technology Partners resources Milestones missed H Plan and identify resource requirements early Rsk0003 Project Manager Poor co-operation between partners Decisions take longer L Adequate internal resources must be made available to the project appropriate representatives attend meetings The system is to be developed under the joint guidance of the Director of Administrative Services and the Finance Director. How to Reduce Risks A central contract database will overcome the problem of record duplication. This solves the different way of project recorded information about users of their services. We decided to choose ‘Oracle Database to implement the central database as a enterprise standard of CSA. It has the features of data secure functions of performance and reliability of the backup and recovery operations are critical to effective database operation. Monitor Control risks KPI helps the performance of indication of our CSA projects. It is essential to measure for each project. Risks monitoring and contingency plan are required together with KPIs. We must think of other potential risks such as hardware failure, disaster, staffs leaving etc. at the initiation stage before the development of CSA project. We must start taking care of during design phase before implementations. We must set up milestones, critical paths in CSA projects. In avoidance of risk, pre-consideration of overcome risks with contingency plan and risks training are essential. Contingency Planning Project Manager also monitors the project progress. The main tool for deciding on progress is the prioritized requirements rather than a Gantt chart of activities. The Gantt chart will show the timeboxes, but the supplementary documentation about what is to be produced in each timebox is far more important for control and monitoring purposes of CSA. Project manager must monitor on each of the phase finished before and after during the project. Limited duration solved by a milestone date, not to deviate the schedule he drew out before the project during planning stage. Security Management Steve Sutherland (Finance Director) says â€Å"There cant be a hard connection between the finance system we use and the MIS (Management Information System) as that would open up all sorts of security risks that we dont want to open up. We must think how we can share data between the two systems without compromising our finance system. Possible Solutions (Security review) //Unauthorisation of resources and data in order to decrease errors in activities of access level , CSA was going to manage the application software cover rights on single users to whom to prevent unauthorized access of secret information by this way we produce fully protection of database access to centralized office. CSA could be to ensure instruction to functions in the area of information maintaining, retrieving from program. For the recovery and backup purposes, CSAs privacy were secure because of the above functions. We must consider security before documents sent to the central office in London, each of regions and areas needed to scan for virus free. And then, must send the required documents to the central. How to control security Login to database (Enter valid code to access data from centralized office). Give authority to each person to access for each of their application. Some kind of security like Norton Antivirus kit for threats, virus, spams mail, for other different threats. That is required for CSA database and documents security needed for all regions and areas. Back up for important data at off-site to be secured. B) Prioritised Function Lists MosCoW analysis Source: Mr Tulley Sign Off: Mr Tulley Requirement id; Name R0001 Tulley (SA) Functional Requirement (s) -Centralized standard db (Must have) -Centralized management (Must have) -Record contracts info in current future(Must have) -Each projects linked to central contract(Must have) -Record core data about the projects, young people and their KPIs they are working with(Could have) -Secure personal data (accessing authorized person)(Should have) -Secure Data sharing between central to regions, areas,(Must have) -Accurate and update info, KPIs send back to Administrative (Must have) -Services Department every 3 months(Must have) -Sending data to Funding body to correct (Must have) -Produce regular monitoring reports for funding bodies(Want to have) -Send childrens KPIs to Administrative Service Department (to change data) (Must have) -Monitor childrens behavior, character in KPIs for admin(Could have) Assumption of functional requirements Project prioritization MoSCoW is required to prioritise. It can be divided by FMI or DBI. Implement the recommendations of the CSA, review establishing childrens records and review each of their KPIs. CSA with functions for the department of regional and areas for housing, family support, education training and tackling crime with this portfolio as their primary responsibility. Fulfill the requirements for each contract linked to central contract. Provide support to develop oracle database for centralized offices to ensure more effective way for branches such as areas, regions and related partner. We have to consult to agree functions with the Board of Trustees. As an additional info, CSA should be provided Alcohol and Drugs free zone. From each department to central offices can send KPIs information safety related with administrative department. Secure data sharing is also needed to develop among them. Staff must be trained on new system established for training case to know how Oracle database system works. Training and qualifications are necessary to respond to send data vice versa. We must define staff level or permission to access data, records. We have responsibility to manage IT training course for young people who have previously committed crime. Training should be refreshed on a periodic basis. For example, holidays, duties off. C) Non-functional Requirements Specification Non-functional Requirement (s) -Accessibility () -Reliability() -Responsibility() Safety and Efficiency(DBI) -Consistency() Accuracy() Description -The above requirements are permitted by Project Board. Target Value Acceptable Range: ok Comments: Assumption on non-functional requirements In addition, donation for young children from online should be able to meet with people who want to donate. Data collection and management issues will substantially affect the usefulness of data sources; therefore, the quality of collected data must be consistently accurate and maintainable. Provide overall product management oversight with respect to non-functional requirements, such as: accuracy; reliability; maintainability; affordability; privacy; and security, etc. Accessibility From administrative department can be accessible each childrens records every time they require. Data should be accessible for use with commonly available analytical tools(eg. Oracle database) 1.3 KPIs measures for accessing childrens records as described in. Reliability 2.1 CSA system is needed to design easy to use and match with user requirements. Responsibility 3.1 Authorized person to access detailed children information must be able to support administration/response as well as to monitor children for progress. Safety and Efficiency 4.1 Secure information is needed to prevent by the ways (encryption) from central office to branch or branch to central office. The data between central and branch essentially networking service security is required to think. Consistency Automated reporting tools and pre-defined report templates should be supported to ensure consistency and quality. SECTION -B Critical Evaluation Of DSDM Toolset Report for CSA From : Jack (Project Manager) To : CSA organization Subject : Critical Evaluation of DSDM toolset Title : Development of the Management Information System for CSA Author : Jack (PM) Date : 18/8/09 Authorisation : Project Board of Trustees Distribution : CSA organization 1) Critique of DSDM toolset (2000) //There are many consideration upon a case tool used in implementation of DSDM. CSA organizations alter in how much must easy accept or construct in the job training.An organization that is used to the authorization responsibility and trading in a way taking precaution to problems and that a lot carefully with the relation to customers already works very on the project will often find it is similar in many ways to that what is made currently, but that happened some hardness, terminology common and useful tools to the project.To the other hierarchical organizations much with concentrating narrow onto a contract details, will have to make attention approximately introduction, the location of the project adapted and initially taking care outside in more than a method for project phases. The power tools utilized in Rapid Application Development are Computer-Aided Systems Engineering (CASE) tools. The RAD methodology uses both computerized tools and human techniques to achieve the goals of high-speed and high quality. //Depending on the user participation, that is one of the RAD method happens choosing users to get more agreement and effective way described in User involvement at stages of system life cycles. Purchaser of a RAD tool environment should think carefully before buying. Show understanding of the key issues relating DSDM toolset Valuate the tools used Show evidence of research Produce a well structured essay Identify benefits and drawbacks with relevant examples Examples from case study(DSDM tools) Peter Jackson (Area Manager) used Microsoft Excel as he went on a course. The only problem is that it takes a white to find individual pieces of data which is always annoying when we are trying to fill in the returns for Julieanne (IQ Officer, Administrative Services Department )s KPIs. It can often take a couple of days getting all that data together. In current position, there is no standard way that projects record information about users of their services. Some projects record their data using a paper based system whilst others have created simple databases or spreadsheets to help maintain records. One or two of the larger projects have invested heavily in IT and building their own databases to meet their requirements. We dont want is to get distracted with providing projects with a system to manage individual young peoples cases, records of interviews with the young person and so on. That would be far too complex at this stage. // DSDM supports that the RAD only it is adapted to determines kinds of applications with functionality to customer interface, has a group of customers easily defined, they are not too complex and have fixed requirements that are not too much details. DSDM supports that RAD is not adapted to applications in real time or emergency-critics to applications where requirement works. It must completely be specifies before that all programs are written.Therefore, RAD would only appear to the part of address of collection of applications. Disadvantages of the DSDM: It is involved the progressive development of requirement. Focus on RAD can lead in order to reduce in lines of code. Complete engagement of the requirement to the DSDM processes. Meaningful Participation of the customer for requirements Requires In an expert team developed in the commerce that represents IT. Ethics of people for change Successful change requires a number of things. We now face the problem of using different databases in different departments. So It is not easy to managed Objectives have to be set and attained; an existing system being analysis. Questionaire (Effective User Communication) This tool takes the form of a questionnaire in which the applicability of an iterative approach to functional areas in the organization is checked. The Organization Filter (KPIs) is intended as a ‘thermometer with which to measure the situation with regard to iterative development in a company or unit at a particular moment. It is intended only as a diagnostic instrument. The aim of the CSA is mainly to develop in the matter of children and to control each region and areas centrally and secure. The use of KPIs is to measure each student behavior, project performance progress. o Incremental and iterative development necessary to converge on an accurate business solution. We can take the form of a questionnaire, similar to the CSA project requirements. We look at the organization and/or the organizational unit as a whole. We serve to map the project risks, while KPIs is an instrument with which to map the situation in the organization concerned. This section contains the complete CSA questionnaire, with an accompanying Explanation for every questions. The questionnaire is divided into eight areas for evaluation: Users (Children Support) User management (CSA Centralized management) Organization (CSA Organization Structure) Culture (CSA culture) IT staff (CSA IT staff) IT management (CSA IT Development) Management organization (CSA management) Techniques (Standard use of method and database) There are a number of questions per area, intended to provide a picture of the organisations receptivity to an iterative approach for each area. Although the areas follow one another in the questionnaire, this sequence does not have to be followed. However, the questions within an area follow a conscious order, from general to specific. Critical Analysis of how the tools used(DSDM tools) RAD technique (Even though many criticize the RAD approach as being overly ad hoc in nature, it must be remembered that the reason for its popularity throughout the 1990s was that it was perceived as providing significant customer value that is a working prototype was generally considered of much greater value to the typical business customer for whom using dataflow diagrams, entity-relationship diagrams, and other formal documents produced by a heavy methodology (DSDM, XP, Scrum). Difficulties of RAD May be used as an excuse for hacking a solution resulting in: Poor understanding of environment and business requirements. Insufficient testing and subsequent unforeseen problems. Poor documentation and difficulties with enhancement. Client and user commitment. Changing user requirements. Prototyping method Selecting a set of CASE tools to support modeling, prototyping, and code re usability, as well as automating many of the combination of techniques. This is the sign of conceptual model to provide support the components of functional and non-functional of project. A technique where a component that is produced to assess whether or not the system will be fit for purpose. A prototype need not be complete and tested with respect to all its related functional and non-functional requirements, the aim is to try out some aspect of the project to prove its ability to meet the needs of the Users. Examples include architectural prototypes to prove some new technology and user interface prototypes to try out the user interaction with the system. Critique of prototyping include the following: Client can be seen this as final product. May lead to insufficient analysis due to the ease of development. Difficult for developers to discard and start creating the final product from scratch. Estimation tools Cost estimation tools, or model-based estimation techniques use data collected from past projects combined with mathematical formulae to estimate project cost. They usually require factors such as the system size as inputs into the model. The main model-based techniques include COCOMO, SLIM, RCA PRICE-S, SEER-SEM, and ESTIMACS. These estimation models produce an estimate of the cost, effort or duration of a project based on factors such as the size and desired functionality of the system. The work breakdown structure (WBS) of the project or a piece of work into its component. Projects can be resource-constrained (limited by the type of people, monetary or hardware resources available) or time-constraint (limited by the deadline). When management fails to participate in the preparation of the estimate, and does not monitor the accuracy of the estimate, this is believed to contribute to the estimate being inaccurate. Inaccuracy also occurs when management does not refer to the estimate when conducting performance reviews of estimators and other project personnel. Causes of Inaccurate Estimates in Systems Development Estimation inaccuracy can also be caused from a lack of procedures and policies on how to deal with failures and avoid repeating mistakes by learning from past experiences. The estimation process can be impacted negatively by these pressures resulting in time or cost constraints. Software managers may over-report causes of inaccuracy that lie outside their responsibility, such as customer-related causes. Project managers therefore have to be aware of the implications that political factors can have on IS development estimation. DSDM Charts toolset// Charts toolset as it was required to show what tasks are critical that are important when activity goes. There are activities of sequence in or some are parallel tasks that are not dependent on the completion of task more or less at each stage before next stage of project begins. We can start other tasks after one stage ends .Tasks from Pert Charts were shown as the critical path by the view of estimation of time at each stage of project. It is slightly view of how to estimate the length of time to be shortened and to prevent taking long time activities. JAD (Joint Application Development) Analysis A forum for knowledgeable and empowered staff from business and IT to make decisions and produce products through consensus, controlled and enabled by an impartial facilitator. Also known as a ‘Facilitated Workshop†. Also known as facilitated workshop, for user participation matter. Workshop Leader who organizes and conducts the workshops for Joint Requirements Planning and Joint Application Design. Critique of JAD (Joint Application Development) Using workshops, instead of interviews, to gather requirements and review design. Analysis of case materials shows significant critique is attached to the efficacy of the JAD sessions. Analysis suggests that a lack of proactive leadership towards the JAD workshops, and of the management of people activities within the JAD sessions would have facilitated more focused productivity towards development objectives, promoted a shift away from former cultures to acceptance of new working behaviours. The new integrated team-working environment of a RAD-type approach meant that people experienced uneasiness in the team workshops. People found it difficult to present their ‘thinking in front of their colleagues and this was a key concern for the developers, the cultural issue is that organizational people felt they were answerable to their line manager; consequently they were apprehensive about expressing their views. Several of those interviewed on the organizational side were reluctant to voice options in workshops if their managers were also present, they did not feel on an equal plane, and therefore did not contribute effectively. Critique of Prioritization(MoSCoW approach) MoSCoW is an acronym where the capital letters stand for Must have, Should have, Could have, Wont have this time. These provide a technique for prioritizing requirements. As the case indicates, the MoSCoW (a DSDM technique) appears not to be very suitable for this situation due to the difficulty of prioritizing requirements. The same holds for timeboxing, for which there must be a fixed date for the project, or for an increment, or for an iteration. Critique of MoSCoW Time to make not enough all. Resources in order to make not enough all. Lack or money or lack of people. Critique of TimeBoxing Analysis Development slots fixed in allocated time and resources; variable in implemented functionalities; Time box content priorities is negotiated at each Iteration. Implementing time-boxed development that allows development teams to quickly build the core of the system and implement refinements in subsequent releases. A period of time with a fixed end-date in which a team produces, checks and agrees a deliverable (partial or complete) or set of such deliverables. DSDM has an overall time box for the project which contains nested time boxes for day-to-day management and control. The timeframe is not subjective to change, rather functional requirements are prioritized within the timebox and less essential features may have to wait to be included and built into future iterations. RAD has been criticised for being fairly unstructured approach and there is no commonly defined framework for its completion. Disadvantages of TimeBoxing// Customers enable to agree the products delivery covered from timebox to finish end date.If it seems that the expirations could be lacked, the deliverable would have to be de-scoped, to eliminate more than insufficient priority that is it must have and be able while to have requirement it can slip the timeline bases identically.The continuous negotiation of that what is important is to develop and is worked to with and is comes agreement . DSDM shows timeboxing nested timeboxes for example it nested timebox more than two to six weeks inside the timebox. Configuration management tools For high criticality systems, additional measures to ensure good communications and improved controls are needed. Additional project management controls should be used around risk management and a wider use of Configuration and Change Management tools, along with increased testing effort. These steps attempt to increase project communications, actively mitigate risks and detect issues and tolerance exceptions earlier in the project. Agile methodology analysis// While our teams continue to adopt and to regulate the agile development to the inside of their organizations so we can face the challenges of coordination and control of the multiple groups, the positions and the plans continue to increase. The plan complexity more reinforced that is why the agile atmospheres embrace programs and the priorities changing in real time.Consequently, the requirement of the senses to easy control this complexity inside the context of single, constant structure is critical to elevate the value and the happened one of our agile activities of development.The procurement way that uses the agile methods to give to the competent suppliers a small with of the characteristic in order transporting and seeing that what supplies. Show evidence of research -risks Identify benefits and drawbacks with relevant examples Cutover During this phase the new system will be phased-in in a parallel manner (alongside the old system), whilst users endure final training and testing ensuring system adequacy, eventually leading to the old systems develop. While the system is being constructed, we use the CASE toolset to accomplish detailed design and code generation, must be poised to move quickly. At the end of the development cycle, the Cutover Team, which handles training and cutover, must be ready to move quickly.

Friday, September 20, 2019

Impact of BIM on Construction

Impact of BIM on Construction Building Information Modelling is certainly beginning to change the way the building looks and the way they function. This implementation of BIM has taken the construction industry into a new-era where all processes has fasten up, the benefits are not just time and cost savings but also reduction of risks and uncertain in construction process. From the through literature review of many researchers works published in various journals suggestions are being made as how this BIM approach is being carried out in construction industry, at the same time a critical literature review is also being conducted on the cost estimation within BIM technologies and whether this can benefit or harm the future role of the quantity surveyor. A questionnaire was designed to identify how the use of BIM will affect the future role quantity surveyor. The questionnaires were distributed to construction professionals within UK. From the analysis of the results obtained and comparing them with the literature review it is very clear that the construction industry is lagging in implementing e-procurement approach when compared to other industries and having realizing the potential benefits the BIM is being offering in various fields of construction industry the construction professionals are very much confident that BIM approach can enhance the procurement process and were also looking forward to implement this type of approach into their projects which makes room for bringing the whole project under a single platform Contents 1.0 Introduction The following research will investigate and analysis how the use of BIM will affect the future role of the quantity surveyor. According to the Royal Institute of British Architects RIBA (2012), almost a third of construction consultants are now using BIM .Thenbs (2011) provided information that in May 2011 UK Government Chief Construction Adviser Paul Morrell called for BIM adoption on UK government construction projects of  £5million and over. Thenbs (2012) provide information that Building Information Modelling covers geometry, spatial relationships, light analysis, geographic information, quantities and properties of building components. BIM data can be used to illustrate the entire building life cycle. quantities and properties of materials can be extracted easily and the scope of works can be easily defined. Furthermore systems, assemblies and sequences can be shown in a relative scale to each other and relative to the entire project. 1.2 Problem identification and purpose of study The main role of Quantity Surveyors is to estimate the building cost the modern quantity surveyor provides a service that covers all aspects of procurement, contractual and project cost management. The role of the quantity surveyor plays a very important role in all phases of any type of Construction Company  estimators have developed their computing skills in using estimating systems but mostly relying in adopting spread sheets and database ages(EstimatingTendering book) I believe there is still a market for large databases and standardized items (connections, assembly options) that can assist in the bill production phase. Repository (2012) stated that over the years the need for more cost effective, better quality and environmentally friendlier construction has grown, these factors are the main Influences on the development of technology in the construction industry. Building Information Modelling (BIM) is one of the technologies that have been creating a buzz in the construction industry over the last few years. Ukconstructionessays (2012) provided information that Building Information Modelling, or better known as BIM is not; strictly speaking a new technology as it has been developing and used by other industry sectors since 1950s i.e. the automotive and aero plane industries. As technology evolves, we are forced to evolve with it or run the risk of being left behind. The traditional way of utilising the services of a quantity surveyor has largely been at the stage of costing a design, and the production of procurement and construction documentation (Asworth and Hogg, 2002). With the development of technology like BIM, the responsibilities of professionals are starting to shift. BIM includes a series of cost management functions that could change the processes of cost management of construction projects. This forces the quantity surveyor to focus more on different parts of the cost management process, than what would have previously. Not only will BIM influence the cost management functions and responsibilities of the quantity surveyor, but also the technology and types of software that are currently used in quantity surveying offices. 1.5 structure of the dissertation The whole dissertation is primarily divided up into 6 chapters Chapter 1: Introduction Chapter 2: Literature review Chapter 3: Research Methodology Chapter 4: Analysis Discussions Chapter 5: Conclusion Recommendations Chapter 6: References 1.6 Aims Objectives Aim: The objective of this dissertation is to identify if the use of BIM in the construction industry is going to affect the future role of the quantity surveyor. Objectives: To understand what is BIM To Research into whether BIM will help aid the Quantity Surveyor To Research into whether BIM will affect the role of the Quantity surveyor To summarise, analyse and evaluate the data collected in order analyse how the use of BIM will affect the future role of the quantity surveyor. Critically analyse the data collected from these questionnaires by comparing theoretical conclusions with the empirical research findings to draw conclusions. To prepare a questionnaire to collect data from practitioners within the construction industry in the UK in regards to whether the use of BIM will affect the future role of quantity surveyor. Clear objectives are important to determine whether this study is achieving what it set out to do. It is also important to write program objectives as specifically as possible to provide program clarity and strong links to evaluation. It is much easier to evaluate a program when clear objectives have been developed my peer (2012). 1.7 Restraints Limitations The main restraint is the access and use of BIM software as a full time student I do not have access to BIM software within the construction industry or at the university. Archicad or Autodesk will need to be used to understand fully what BIM is and how it works; a student version can be downloaded online. The research will involve the use of academic materials such as textbooks, journals, published and unpublished documents and internet sites. The data analysis will be carried out by sending out questionnaires to a range of construction professionals working within a Birmingham consultancy, and the results presented in bar charts and analysed after. Another restraint is how many people answer and return the questionnaire, the more people that answer the questionnaire will be beneficial within the analysis as a greater number of people will give much more accurate results. Many of the potential individuals who will carry out the questionnaire may have busy schedules so research must be taken into ensuring that questions are suitable and are able to draw suitable responses from at the end. It will be hard to measure how many construction companies currently use BIM and whether It is having an effect on the role of quantity surveyors working within the construction industry as there isnt enough time to gather research from every construction around the UK .Throughout the study an open mind will be maintained whilst undertaking the research and analysis of the data collected. 1.8 Research Beneficiaries / Dissemination This research will be useful into identifying whether the use of BIM will affect the future role of the quantity surveyor or aid the future role of the quantity surveyor. And to also identify what specific ways the quantity surveyor may benefit from using BIM and in what specific ways the quantity surveyor may be affected by the use of BIM in the future. Other categories to benefit from this research include the researcher, students and academics. By undertaking this research companies and people working within the construction industry can have a better understanding on the use of BIM approach and how it can be implemented within the cost estimation stage of a project and also into different phases of a project and the views of other professionals working within the UK construction industry on this application can be found and thus can implement that application effectively for the success of the project. 2.0 Literature review 2.1 Introduction: In this chapter 2 of literature review, a critical literature has been conducted about how the use of BIM can aid the role of quantity surveyor and how BIM may be a threat to the future role of the quantity surveyor. 2.2 Building Information modelling Constructionbusinessowner (2012) provided information that BIM allows early collaboration and integration of the design information in a 3-D environment programs are widely used in the early stages to eliminate potential issues that would be costly to rectify in the field. All parties involved benefit. Designers can identify and correct design issues before they result in rework and schedule delays. Contractors have more reliable information and can better plan for equipment use and construction sequencing. Owners can walk the project in a 3-D environment during the design. And facility managers can pinpoint ergonomic issues and plan maintenance activities more efficiently by sharing the model with their vendors and contractors. BIM will only benefit users if it leads to improved design, faster delivery, reduced price or improved value. A combination of these factors will dictate how successful BIM implementation will be in the coming years. When all members of the construction team work on the same model, from early design through to completion, changes are automatically coordinated across the project and information generated is therefore of high quality. The construction industry is widely acknowledged as unique and conservative. Building Information Modelling (BIM) systems have the potential to revolutionize current practices and to automate the measurement of quantities from construction drawings. However, there are fears that such developments could threaten the future role of the quantity surveyor. 2.3 Advantages of BIM The application of BIM has the result of many advantages, such as: Greater speed The multi-dimensionality of BIM allows various deliverables and documentation to be prepared simultaneously to the design of the building. Furthermore, the use of object-oriented design and the re-use of information accelerate the creation of drawings (Ashcraft, 2007). Changes made to a certain aspect of the model or the design will be automatically updated through the rest of the project, which allows for major time savings. Lower costs Sabol (2012) provided information that BIM offers the capability to generate take-offs, counts and measurements directly from a model. This provides a process where information stays consistent throughout the project and changes can be readily accommodated. Building information modelling supports the full project lifecycle and offers the capability to integrate costing efforts throughout all project phases. According to chuck Eastman (2011) at any stage of the design, BIM technology can extract an accurate bill of quantities and spaces that can be used for cost estimation. Cost estimating is currently a time consuming process, requiring an entire team of estimators. Acebytes (2012) provided information that there are multiple factors hindering the transition to model-based estimating; however, the risks are justified by the benefits of estimating with BIM. Building Information Modelling has the capability to automate a quantity take-off, which will reduce the time and costs required to estimate a project. By using a building information model instead of drawings; the take offs, counts, and measurements can be generated directly from the underlying model and the information can be linked to generate bills of materials, size and area estimations along with other related estimating information. According to Hardin (2009) another strategy for leveraging BIM during a project is to use the BIM file for updating estimates very quickly, last minute design changes can be altered and updated much more quickly than typical take off methodologies can catch up with . Disadvantages of BIM Precisedraftunginc (2012) provided information that BIM requires more effort at the front end of a project to establish the initial framework. But the payoff is that you are able to extract a much higher quality and greater quantity of information from that model. BIM allows changes to happen easily, so clients may continue to make changes too late in the process, and that can impact construction and design costs. BIM results in much larger file sizes than traditional CAD systems, and requires higher performing computer hardware to operate it effectively. BIM requires more thoughtful design. We now have to do what all good designers have done in the past: Think in 3d and visualize the final product! 3.0 Research Methodology A Quantitative research methodology will be used. According to Shamil Naoum, (2006 p.g39) quantitative research is based on a hypothesis or a theory composed of a variable measured and analysed with statistical procedures. Quantitative research enables the author to measure and analyse data. Benefitof (2012) provided information that the relationship between an independent and dependent variable is studied in detail. The use of standard means in quantitative research means that any research may be replicated, analysed and also compared with other similar studies. Quantitative research allows for greater accuracy and objectivity of results gained .Quantitative research usually filters out all external factors and if well designed, it provides unbiased and real results. Quantitative research is a great method to finalise results and disprove or prove a hypothesis. It is useful for testing results gotten from doing various qualitative experiments, thereby leading to the final answer. Qu antitative Research will provide the advantage of finding a premeditated set of result from a range of professionals in the construction industry. The main strengths of quantitative data collection: Numeric estimates Opportunity for relatively uncomplicated data analysis Data which are verifiable Data which are comparable between different communities within different locations Data which do not require analytical judgement beyond consideration of how information will be presented in the dissemination process. The Weaknesses of quantitative data collection: Gaps in information issues which are not included in the questionnaire, or secondary data checklist, will not be included in the analysis A labour intensive data collection process Limited participation by affected persons in the content of the questions or direction of the information collection process. (Reliefweb 2012) A Questionnaire will be produced to obtain data. Statpac (2012) provided information that Questionnaires are very cost effective when compared to face-to-face interviews. Questionnaires are easy to analyse, they are familiar to most people. They are less are less intrusive than telephone or face-to-face surveys. The results from the questionnaires will then be produced into bar charts and analysed. The questionaries will be sent by letter to a construction consultancy in Birmingham Rider Levett Bucknall in which I gained work experience with in 2011. Questionnaires will also be sent out to a number of Contractors within the west midlands area this will aid within the analysis as the research will be gained by both contractor and consultants and a deeper and more accurate conclusion will be gained at the end of the study. The nature of the data required will be based on personal opinion from a range of construction professionals working within a construction consultancy and a construction contractor. 4.0 Results 4.1 Introduction This chapter is mainly intended to cover the results in detail from the questionnaire sent to the various construction professionals within the UK in a statistical format by making use of Excel and MS Word. The questionnaire data has been broke down critically by representing in graphs and tables. 4.2 Results Explanation The questionnaire has been distributed to 79 construction professionals through email. Out of these 79 questionnaires 37 complete responses have been obtained and 13 responses were incomplete responses. Sample Size originally distributed = 79 Response received (complete response) = 37 No: of incomplete Responses = 5.0 Discussion of Results 6.0 Conclusion and Recommendations The aim of this research report was to study the influence of BIM on the quantity surveying profession. One of the most apparent and vital consequences that will result from implementing BIM into the quantity surveying profession is the effect that it will have on the traditional roles and responsibilities of the quantity surveyor and the structure of quantity surveying firms. BIMs capabilities of automating the production of bills of quantities, which is one of the quantity surveyors fundamental tasks, will have both positive and negative effects on the quantity surveying industry. The automatic production of bills of quantities will enable quantity surveyors to get involved in the early design stages of a construction project and make designers aware of cost implications and manage costs from early on. This will enable designers to design to a cost instead of quantity surveyors costing to a design, which will satisfy the employers need for cost effective construction. In the past m easurement was usually undertaken by senior quantity surveyors, but over the years it has diminished into a task delegated to more junior personnel while professional quantity surveyors take up more strategic roles (Ashworth and Hogg, 2007). Although work is required initially to develop the skills and processes needed to integrate BIM and QS processes, the resulting benefits undoubtedly justify the investment. Recent years have witnessed the realization of many of the ideas of BIM visionaries, and the next five years will see increasing numbers of successful implementations, changes in the building industry, and new trial uses and extensions of what can be achieved with BIM, beyond its use today. This period will see the transition of BIM to accepted mainstream practice; and the transition will impact all building professionals and participants. But the greatest impact will be on the individual practitioner, who will need to learn to work, design, engineer, build, or manage with BIM. Estimators have to access the risks of the project and with BIM you can be more sure of the correct-ability of the drawn material and the demonetised possibility of errors under the build. The question is only how soon they will be liable to correct their ways of working with the same percent advised. It will only take one company to burst the bobble all of the sudden all eyes will be turned to the contractor who went 5-8% under all the other tenders. The companies left behind still stuck to the 2D system will never know what hit them and will very soon have to turn the key. In practice this is time-consuming both for contractors and sub-contractors, and the amount of paperwork had increased immensely. Nevertheless, contractors always need a bill of quantities, whether produced by the clients quantity surveyor, by an in-house commission or by sharing the services of an independent quantity surveyor. There will be a higher demand to the contractors to be able to build accordantly to drawings as a model can be pulled out and digitally measured. They will have to be more accurate in their tenders as the possibility of extra works cause of quality on the drawings will be higher. http://www.7star.dk/b-link/Dissertation_QuantityExtractingInBIM.pdf References [ONLINE] Available at: http://reliefweb.int/sites/reliefweb.int/files/resources/qualitative_and_quantitative_research_techniques.pdf. [Accessed 11 November 2012]. How to Benefit From Using BIM | Construction Business Owner Magazine. [ONLINE] Available at: http://www.constructionbusinessowner.com/topics/software/how-benefit-using-bim. [Accessed 13 November 2012]. Cost estimating. 2012. [ONLINE] Available at: http://www.dcstrategies.net/files/2_sabol_cost_estimating.pdf. [Accessed 13 November 2012]. Tiwari, S., Odelson, J., Watt, A., Khanzode, A.(2009). Model Based Estimating to Inform Target Value Design. AECbytes. [ONLINE] Available at :http://www.aecbytes.com/buildingthefuture/2009/ModelBasedEstimating.html.[Accessed 13 November 2012] Setting objectives. 2012. Setting objectives. [ONLINE] Available at: http://mypeer.org.au/planning/setting-objectives/. [Accessed 14 November 2012]. Advantages of Written Questionnaires. 2012. Advantages of Written Questionnaires. [ONLINE] Available at: http://www.statpac.com/surveys/advantages.htm. [Accessed 04 November 2012]. BIM in construction Building Information Modelling (BIM) article from NBS. 2012. [ONLINE] Available at: http://www.thenbs.com/topics/bim/articles/bimInConstruction.asp. [Accessed 04 November 2012]. BIM, What is Building Information Modeling?. 2012. BIM, What is Building Information Modeling?. [ONLINE] Available at: http://www.precisedraftinginc.com/bim.html. [Accessed 21 December 2012]. Benefits of Quantitative Research | Benefits Of. 2012. Benefits Of Quantitative Research | Benefits Of. [ONLINE] Available at: http://benefitof.net/benefits-of-quantitative-research/. [Accessed 04 November 2012] Definition of Quantity Surveyors . 2012. Definition of Quantity Surveyors . [ONLINE] Available at: http://www.surveyors.com/quantity-surveyors/definition-of-quantity-surveyors-/. [Accessed 19 December 2012]. Building information modelling. 2012. Building information modelling. [ONLINE] Available at: http://www.ukconstructionessays.com/essays/construction/building-information-modelling.php. [Accessed 19 December 2012]. NBS: BIM Roundtable Discussion. 2012. NBS: BIM Roundtable Discussion. [ONLINE] Available at: http://www.thenbs.com/roundtable/. [Accessed 07 November 2012]. 2012. . [ONLINE] Available at: http://repository.up.ac.za/bitstream/handle/2263/16349/Gee_Influence%282010%29.pdf?sequence=1. [Accessed 20 December 2012]. Bibliography Ashcraft, H. 2007. Building Information Modelling A Framework for Collaboration, Construction Lawyer, vol. 28, Number 3, accessed: February 2010, Ashworth, A., and Hogg, K. (2002). Williss Practice and Procedure for the Quantity Surveyor, 11th Edition, Blackwell Science, Oxford London Chuck Eastman, 2011. BIM Handbook: A Guide to Building Information Modelling for Owners, Managers, Designers, Engineers and Contractors. 2 Edition. Wiley.p.g 22 Shamil Naoum, 2006. Dissertation Research and Writing for Construction Students, Second Edition. 2 Edition. Butterworth-Heinemann.p.g 36 Brad Hardin, 2009. BIM and Construction Management: Proven Tools, Methods, and Workflows. 1 Edition. Sybex.p.g 152

Thursday, September 19, 2019

Historical Validity in The Alamo :: essays research papers

Historical Validity in â€Å"The Alamo†   Ã‚  Ã‚  Ã‚  Ã‚  In the 2004 release, by Touchstone Pictures, â€Å"The Alamo† takes a famous story told throughout time and recreates it on the screen once again. This time was it really any better than the other releases? Maybe the flashy effects and better film quality could interest you in this movie but the real question is how valid is it. To the average person this story looks as if they have recreated it perfectly, but to a historian it might not look so genuine. Although this movie does depict many things with absolute efficiency some things are left out. Almost completely ignored in this movie are important instances in history such as the cowardly James Fannin and the battle at Goliad. This is an important part of the story that has been left out. It could have been nice to know what happened to the one person who could have helped but refused to due to his own growing situation. Also in the movie James Bowie is portrayed as a mildly sick person whereas in real l ife he deathly ill. He was known to have typhoid fever and a bad case at that. Beyond the fallacies in this movie there were many great things that were put to the screen. One of the best in my opinion is the removal of the â€Å"line† that was drawn in the dirt by Travis. According to much research the line was actually a story drawn up years later to help signify the sacrifices these men had made. They correctly portrayed how the men were outnumbered in this fight and the effort and courage that was put forth in this battle to defend the Alamo. The last and most controversial issue in the movie is how did David Crockett really die? In this movie they give him the courageous death that he was thought to have.

Wednesday, September 18, 2019

Climate Change and Carbon Dioxide (CO2) Essay example -- greenhouse gas

Since the industrial revolution, scientists have documented a trend of increasing atmospheric carbon dioxide (CO2), the main greenhouse gas. This observation has been an issue of major environmental concern in the view of the potentially devastating effects of climate change on ecosystems and human survival. Recent studies by scientists led by Wei-Jun Cai have served to underscore this fact by showing that the Arctic region and the globe are faced with a major climate challenge due to the continued melting of sea ice in the Arctic Ocean. This research has indicated that the major concern is the increasing heat absorption as deeper ocean water layers get exposed to sunlight as well as the possible loss of white ice reflectivity or the albedo (An Ice-Free Arctic Ocean Will Not Absorb More CO2, n.d).This paper discusses the recent observations that Arctic Ocean basin do not have an indefinite ability to continue acting as a CO2 sink when conditions are ice-free caused by the escalating warmer temperatures. It is worth noting that sensitivity to climate changes in the Arctic is considered the highest on the Earth’s surface. In addition, the region experiences more pronounced acidification than any other ocean. Recent decades have seen the Arctic Ocean experience a steady increase in the rate of sea ice melt. According to Cai, et al. (2010), this has been especially so in the light of the indications of the three summers from 2007 to 2009. The recent research by Cai et al. has been built on the postulation that more and more CO2 would be absorbed from the atmosphere under ice-free conditions in the Arctic Ocean. Therefore, the research investigates the impact of sea ice melt on the concentration of CO2 on the surface water of the Ar... ...temperatures will continue causing ice melt in summer. Consequently, the surface water carbon dioxide partial pressure will continue to increase, further reducing the ability of the CO2 sink to take up more CO2. The high-resolution survey further points to the fact that the future will see an increased air-sea CO2 flux. This is due to the exposure of more area of sea water as well as long periods when the Arctic Ocean surface will be subjected to ice-free conditions. Though this is expected, the capacity of the CO2 sink in the Arctic Ocean to continue taking up CO2 is predicted to weaken due to equilibration of pCO2 of surface water with the atmosphere. The survey highlights four major factors which facilitate this equilibrium. These include low CO2 fixation, surface warming, shallow mixed-layer depth, and strong stratification of surface water (Cai, et al., 2010).