Monday, September 30, 2019

Harriet Tubman’s Great Achievements Essay

Harriet Tubman was a hero that completed many brave and selfless acts. She was born in Maryland in 1822 and by the age of 5, she was already working. She got married in 1844, to a free black man, but she was still a slave. Finally, in 1849, her master died and she decided to escape. That is when her great achievements began. Her first great achievement was operating the Underground Railroad. Her journeys to grant other slaves were hundreds of miles long. She traveled from Maryland all the way up to St. Catherines, Canada on foot. She took them all the way to Canada to get them away from the danger of the Fugitive Slave Act which was an act that made Northerners turn in runaway slaves. Harriet was 28 when she made her first rescue and 38 when she made her last. All of the 23 fugitives were collected in Dorchester County, Maryland. To avoid capture, Harriet took trips at night in December, took slaves on Saturday nights (Sunday was a free day and they wouldn’t be needed until Monday), and never met the fugitives at plantations. This was a great achievement because doing this was very long and had many dangers that were all avoided by Harriet even thought she had up to 11 people with her. The next great achievement of Harriet was when she was a spy and rescued 800 slaves in one night. One year after the start of the Civil War, Harriet Tubman was asked by the government of Massachusetts to join the Union troops in South Carolina. She there lead a team of eight black spies to operate behind the enemy lines and provide information for a Union raid to free slaves. The Combahee River raid took place on June 2, 1863. This was a great achievement for â€Å"Moses† ,(Harriet’s nickname, given to her because she was leading slaves to freedom), because she helped 800 slaves in one night. Harriet’s next achievement was becoming a nurse for the Massachusetts 54th  Volunteers , an all black group of solders. These solders attacked Fort Wagner in Charleston Harbor and Harriet was there to care for the wounded. While working, Harriet never got paid by the army so she had to sell baked goods and root beer to the solders. Even thought Harriet worked so hard, her actions were never recognized by the army. She never received pension and only took her rations 20 times. This was a great achievement. Finally, Harriet’s last great achievement was taking care of poor and sick people. Harriet took the 48 years from the end of the Civil War to her death to taking care of poor and sick people in her home. She typically had six to eight people that she was caring for. In a quote from her, she states that she took care of the old, paralyzed, blind, and people with other sicknesses. These achievements were all great, but I feel that Harriet Tubman’s greatest achievement was when she was a spy for the Union and helped free 800 slaves. Compared to the other achievements, I think this one is definitely more heroic and deserving of more praise. Harriet Tubman was an amazing hero that will never be forgotten because of her compassion and bravery.

Sunday, September 29, 2019

Review the Issues Involved in Strategic Planning Essay

Every year at about this time or a little earlier, we start the process of ‘strategic’ planning. The annual planning process, for all its focus on analysis, or template completion, can easily fall into the apparently comfortable tactic of merely updating the activity from last year’s plans. Often, however, what is really needed is a fresh approach which can pay dividends. Approaches to planning differ, depending upon the attitude and culture of the company involved, which in turn affect the relative importance given to different elements of the process and the output. Some companies are heavily financially oriented, making the desired output more focused on numbers than the thinking behind those numbers. Other organisations focus heavily on the resource implications of the tactical plan, and particularly sales force allocation and efficiency. Not all companies perform truly strategic (long -term) market-centred planning, but all companies generally aim to produce a set of financial forecasts. The major differences are in the way they get there and as a consequence the basis on which those forecasts are derived. First and foremost, the organisation needs to be clear about what issues can get in the way of developing a sound strategic plan before deciding on an appropriate approach. Clearly all planning is driven to an extent by profit and financial forecasts but there is a need to be clear what else the plan has to deliver for the organisation, the individual, and the brand – the planning ‘need’ – otherwise the process used may be sub-optimal. Why does the organisation need a plan? What is it meant to deliver over and above the financial projections? Many companies are often unaware of the issues and constraints that will affect the planning process and output , for example the local operating company situation. Are the right resources, the right experience and the right information available at a local level to develop and complete the plan? Can the local markets get the right quality of information they need to drive good quality thinking? If not, then how can this be provided to ensure the right level of thinking is achieved? It could also be that the chosen approach is too sophisticated or inappropriate to deliver the required answers. For example, the process may have all the ‘standard’ elements of analysis but there is no thought given to what each element is telling them. All companies do have a structured process but if the process does not drive the necessary thinking then the resulting plans can be limited. If the process does not challenge the planners to consider different ways of doing things but is merely a set of agreed templates and a time line for deliverables, the resultant forecast simply becomes a straight line projection from historical sales data, and activity remains the same as last year no matter whether or not things are changing in the market. This is the apparently ‘safe’ option but it rarely maximises return on investment and is often not safe at all. Above all the process needs to raise the right questions, stimulate debate both internally and with external stakeholders, and force conclusions to be drawn from the analysis and interpretation of information that can then form the basis for strategy development. And finally, senior management by their actions and questions often demonstrate that all they are really interested in are the numbers, with no challenge or credence given to the thinking behind those numbers. Even though a thorough process is used to arrive at a market -based forecast, senior management just focus on the revenue with/without profit Sometimes the budget or forecast even comes before the planning/thinking in time, and at other times it is ‘imposed’ so the plan reflects how to achieve it, not whether it is at all achievable. There are three very different approaches to strategic planning in our experience: The data-driven approach is based on hard data collected from a variety of sources, both primary panels and syndicated data, from which a market model is then built by brand from the bottom up. Issues are then identified but there seems to be no real focus on what drives success in local markets, or on what competitors will do and the impact of their actions. This approach can simply lead to ‘more of the same’, making a projection based on the previous year and no real change in approach, with the whole focus being on next year’s revenue. While many companies may not use such an apparently numbers-focused approach they still act in the same way, with the forecast being the key, rather than the rationale behind it. To overcome the inevitable local variances in both resource and/or experience and to ensure a consistent base for review, many companies utilise a template-led approach . This consists of a pre-defined plan with key headings that can be amplified or contracted, but with certain key elements which must be completed. This option works well as it provides a structured process for analysis, with check questions at each stage. However in some cases we have seen that such an approach can still be very financially focused. Sometimes it does not analyse the brand and company strengths and weaknesses in a meaningful market-centred manner, to enable a market -led SWOT analysis and often there is still not enough competitive focus. The next level is often seen in the ‘marketing excellence’ approach, where the organisation provides an integrated planning tool comprising standard marketing planning software. In a sophisticated example this allows local working but is linked into a central supporting database, with aspects that can be adapted and others that are fixed. The beauty of such a process is that it is transparent, allowing a clear overview of who is performing well, and enabling experience and successes to be shared. However when this is a relatively new process people tend to take time to get to grips with the process resulting in ‘doing the process’ rather than really thinking about what each step is telling them. Moreover for this approach to be used effectively, senior management must understand the process very well so that they can interrogate the people who are developing the plan. Efforts to plan correctly often fail due to poor alignment between personal and corporate goals – people are often rewarded for achieving short-term deliverables with secure outcomes rather than longer term brand building and innovation or driving change. In summary the key issues in strategic planning are: Not being clear about the planning ‘need’ Not being aware of the issues and constraints that will affect the planning process and output Approach too sophisticated or not appropriate to deliver the required answers The financial forecast is all that matters, with the thinking behind those forecasts being ignored or not challenged/considered Process not challenging people to think or act differently Insufficient external focus: environment and/or competitors Lack of real focus on (new) opportunities for growth Poor expertise at local level More tactical/operational than strategic focus So what works well in overcoming some of these inherent problems? Ensure a complete and effective structured process to develop the analysis base. Output should focus on alternative scenarios and ‘what ifs’ working from a base plan. Thereby, focusing on incremental growth and type of incremental drivers that need to be addressed. Build market -based forecasts by brand at country level. This requires country plans and budgets built from bottom up by brand and forecasts linked to hard data and clear market maps. Allow enough time for countries to make amendments based on sound strategic thinking and then finalise forecasts ? do not just use Excel formulas. Balance the need for a ‘quick’ solution with a complete process (analysis and review). Value the process, including through management attitude, and align management with the strategy. Key imperatives are to ensure a complete and effective structured process to develop the analysis base, with structured external and internal analysis, and check questions at each stage. The process should be transparent, reviewed by management so that the output is seen by senior management during budget process. Multi-functional teams should build plans with all key stakeholders involved, but led by marketing. Recent surveys show that where companies use a good formal process, satisfaction with strategic planning is higher. Companies are looking more and more at processes that drive to different strategies and/or activities. However, there is a demand for a stronger link in pharma between action and reaction, i. e. if we do X then â‚ ¬Y will result. Strategic planning should prepare executives to face the strategic uncertainties ahead, and serve as the focal point for creative thinking about the company or the brand’s vision and direction. It should also be about making choices between competing priorities, focusing on strategic as well as operational issues. This will ensure that progress against the strategic plan is monitored. There are a number of ‘tricks of the trade’ that help in strategic planning. Among the best practice companies, executives who carry out strategy also make it, and plans reflect goals and challenges. It is important to use any plan to identify growth opportunities, both within and outside the core business. Monitoring progress against the strategic plan is critical and a key area for improvement. It is important also that planning meetings are true ‘conversations’. Simple ‘tricks’, such as having only a small number of the right people in the meeting, can pay dividends. The process also takes time, so more than one meeting is required. It is also important to avoid combining strategy reviews with discussions of budgets and financial targets because when the two are considered together, short-term financial issues tend to dominate at the expense of long-term strategic ones. The ideal process leads to strategic decisions that allow the company to meet goals and challenges. It assesses risks as well as benefits, but is based on fact, focusing on strategic issues, and is therefore not merely tactical. The ideal process ensures that those who will carry out strategy are involved in developing it, builds shared understanding of market dynamics, and emphasises discussion of issues not process. Planning should build ‘prepared minds’ through dialogue to make sure that all decision makers involved have a solid understanding of the business, its strategy, and the assumptions behind that strategy. Then it will be possible for them to respond swiftly to challenges and opportunities as they occur during the year. No strategy process can guarantee great flashes of creative insight, but much can be done to increase the odds that they will occur. The process can be used to challenge assumptions and open people up to new thinking.

Saturday, September 28, 2019

Socially Responsible Companies in Europe Research Paper - 1

Socially Responsible Companies in Europe - Research Paper Example The paper tells that many companies in various continents treat corporate social responsibility as a key aspect of their company survival technique. It has evolved from being a value-added concept of management to on being among the key concepts. This is because consumers evaluate theirs produces depending on how friendly they are to the environment and their conformance to most of the international laws that business ethics demand be met. Many European companies are among the leading socially responsible companies in the present society. This is true because Europe gets ranked as one of the greatest markets in the world. For this reason, the companies that operate in this zone must be willing to impress their consumers. The FTSE index provides the best tool in monitoring corporate socially responsible companies, in Europe, and the remaining parts of the world. The reshuffle of leading global responsible investment index series provides information on the companies that have adhered to environmental and social laws in the internal business arena. Companies get to fluctuate from one position to another because social laws change daily, and an organization will not be able to conform to each and every that is passed. In addition, not all corporate laws are universal. One of the most common companies that are socially responsible in Europe is Microsoft Europe. This is a company that was invented by Bill Gates and Paul Allen way back in 1975 and has since with co-operation with other companies revolutionized the software computing industry. As a software company, Microsoft does not face common responsibility in terms of social and environmental laws like other production companies. This is because it does not pollute the environment or utilize much of its resources. Despite this, social responsibility has been key to the company because it has since been expanding into different countries that harbor different social values. Microsoft has also been aware of the sec urity issue their customers get to face on the internet, hence introducing free protective softwares such as windows defender. They have also included a vast number of language packs for their software users, hence allowing their products to be used by almost everybody in the world.

Friday, September 27, 2019

Choose any topic Assignment Example | Topics and Well Written Essays - 250 words

Choose any topic - Assignment Example For instance, president Obama, while asking Congress to vote on his decision to act on the use of chemical weapons by Assad in Syria, manifests the truth in the statement that might is right. President Obama seeks to act on the situation simply because it poses a threat to its national security and of ‘friends’. This action will be in violation of international law that only allows the Security Council to sanction recourse to war. The President downplays the role of the UN in the matter and does not wait for its decision. From this action, it can be inferred that mighty nations can do as they wish without feeling bound by international laws. Ironically, the president states in his speech that right creates might while doing exactly the opposite. In a similar vein, former president Bush went on with pre-emptive war in Iraq even though the issue was before the UN. The reason put forward were that Iraq posed a threat to the national security of the US. This opinion fuelled the policy of the US to attack their enemies before the enemies attacked US. Similarly, Bush unilaterally decided that Iran with Nuclear weapons would be a great threat to world security. This misplaced notion that the US has the responsibility to bring change or protect the world could only stem on the operationalization of might is right. To sum it up, Kimen Valaskaki states in his article that whatever interpretation is given to pre-emptive actions leans towards the wrong assertion of the might is right concept at the expense of the weaker nations. It is indeed true that might is right is a reality in the present

Thursday, September 26, 2019

Topic Paper # 1 Essay Example | Topics and Well Written Essays - 2000 words

Topic Paper # 1 - Essay Example A Cochlear Implant is an electronic device which is implanted in the cochlea of the ear and is connected to a microphone on the outside through a speech processor and a transmitter. It works by converting sound vibrations into electrical stimuli, which provides a sensation of sound. Cochlear Implants are primarily recommended for those with a severe to profound hearing disorder. Among children and infants, a Cochlear Implant can help develop speech and communication skills. However, due to the long period of therapy required, its candidacy has to be determined on an individual basis and there is disagreement over its suitability for autistic children. Most cases of hearing impairment are due to loss of hair cell receptors in the inner ear, which limits the cochlea’s ability to transduce sound information from the environment to neural transmissions that can be interpreted by the central nervous system as auditory sensations (Copeland & Pillsbury, 2004). Since in such cases the nervous elements that transmit information from the cochlea to the brain remain intact, a Cochlear Implant is a viable option. The actual surgery to implant a cochlear implant is performed on an outpatient basis and requires about two to three hours of general anesthesia. However, once the prosthesis is implanted in the cochlea, there is an extensive process requiring aural habilitation with inputs from experienced audiologists and speech and language experts. Also, since the entire circuitry remains permanently attached to the patients, patients are required to take a number of precautions to avoid damage to the delicate device. The FDA-approved minimum age of implantation is one year. It is difficult to implant the device in younger children due to difficulty in properly testing the hearing in such young patients. Another concern is with patients suffering from multiple

Wednesday, September 25, 2019

Commercial Law Case Analysis Study Example | Topics and Well Written Essays - 750 words

Commercial Law Analysis - Case Study Example The impact point on the ground should have been with fine beach sand. In this case, this was not to be found. The ground was semi-hard to hard up to a height of 0.3m and harder beyond this height. A series of studies were done to find out whether the hardness of the impacting surface could have any effect on the damage done to his skill. The research did prove that this was true. The harder the surface, the damage is hard. There should have been beach sand in the pit at least up to a depth of 0.3 m. This was not to be found. The Respondent's reason for his head having to impact the ground first was also found to be not in consonance with the scientific evidence at hand. There is a possibility that the Respondent was traveling upside down for such a large impact to happen. At the trial court, the trial Judge offered compensation to the Respondent and held valid the claim that the damage to the Respondent is due to the negligence of the City. The City has moved the appellate court subsequently as an appeal over the decision made by the trial court. Summary of Decision: The Judges in the Appeal court considered the following stance and the facts above to come to a conclusion on the case: 1. The Judges found that this was a case under the causation principle. The Appellant, in this case, is liable only if the damage is caused by the negligent act of the Appellant of the case. And it is the onus of the Respondent to prove that the act did cause the damage.2. The negligent act of the Appellant need not be the sole cause of the damage. It could have materially contributed to the loss or damage to the Respondent.  

Tuesday, September 24, 2019

Play and pedagogy Essay Example | Topics and Well Written Essays - 3000 words - 1

Play and pedagogy - Essay Example It is this ability to play such games that such children are able to become great men and women in future. Some of the games for instance prepare great mathematicians in future. They assist such children to develop mentally in terms of the ability to perform some simple arithmetic. Apart from the metal development, games have also played a major role for the social, physical and emotional development in children. In the former category for instance, the children are able to interact with each other developing communication skills. Children who at first may appear shy are able to show confidence after they have interacted in most of these games. In addition to that, games have been imperative in ensuring that children display their different talents and gifts. It is difficult to know the talents that children have unless they are engaged in this kind of activities. To understand the role of play in children, I visited a certain kindergarten and made observation of how the children wer e responding. The following is a record of the observation that I made. The class setting Recently I visited a certain kindergarten with a view of establishing the role of play and pedagogy in children’s development. The kindergarten had one main teacher and three assistants. They had to work together for the purpose of ensuring that each child received maximum attention. The classroom setting provided an environment that fostered mental development of the children. The walls were full of the pictures that the children had drawn in including the alphabets. Each of the letters also had words and pictures drawn against them. This was for the purpose of enabling the children learn easily. For instance, a letter ‘G’ would have a picture of a guitar or a girl. This form of learning enabled the children understand better. The setting of the classroom was also in a way that it could make it easy for children to play. For instance, there was a huge empty area, which was left for the purpose of play. In the cupboard that was used to store all the toys and other materials used by the children for playing. In addition to that, there was tables and chairs that were arranged in a carefully manner to ensure that children were safe. This is in accordance with rules and regulations that demand that safety has to be ensured for such children. It is imperative that they are protected against any physical harm, by creating a harmless environment. The children The class composed of children from different social, economic and cultural backgrounds. The teachers made sure that the needs of each child were met. In addition to that, there were children with physical challenges who also benefited from the class setting that facilitated their learning and movement. The class therefore made it possible for inclusion to take place. The age of the children ranged between 3-5 years. They interacted well and each of them seemed to enjoy what was going on. The morning ses sion activities According to the teacher, all mornings began by ensuring that children sung. However, the types of songs and stories told depended on the themes that the teacher wanted to pass to the children. In this particular class, I was keenly following the response of two main children; in a view to find out how play enabled them develop mentally and emotionally. The two children were Natalie and John. They were both three years old and very jovial. When the teacher entered the classroom, it was mandatory for all the

Monday, September 23, 2019

Obama's Struggle with Congress over Debt Ceiling Crisis Case Study

Obama's Struggle with Congress over Debt Ceiling Crisis - Case Study Example With this law in place, the United States government would work without prejudice or malice within itself through its various dockets. Therefore, the Senate at the time enacted this law preventing inter government wrangles by setting a ceiling or a maximum on the lending ability; this would not increase for any department no matter the situation (Woodward 1). In this regard, the United State Congress in that year needed to raise the debt ceiling, which President Barrack Obama declined. In a quick rejoinder to avert a crisis, President Obama called a crisis meeting on July 23 2011 between him and the top Congressional representatives at the White House where he sought to reach an amicable solution to the looming crisis. The meeting later proved inconsequential. The Congressmen present included Nancy Pelosi of the House of Minority, House Speaker John A. Boehner, Harry M. Reid of the Senate Majority and Mitch Mc Connell of the Senate Minority. This meeting took place at least 10 days b efore the U. S went into default that threatened to cripple its function, as it would not have had money for it to run on efficiently. It was also held in the wake of a night that the speaker had called off attempts to raise the $14Trillion debt limit and save the government’s repute. ... Allegedly, this infuriated the president but he could not do anything at the time. Eventually, Obama reiterated that it was his duty to sign the bill into law therefore implying that he would not sign it. Surprisingly, the Senate Majority leader Reid Harry interjected and requested the president to allow the Congress representatives to speak in private. This was a clear indication that the president’s presence, in a meeting that he had called for, had no impact. His decency intact, Obama let them have their private session but did not take those remarks lightly. He did not want to appear as though he were a dictator and hence allowed democracy to prevail even in that particular meeting. Some would consider it cowardly but for Obama, as the man that he is, it is the greatest act of power. To him it is not about imposing ideas and infringing other people’s rights but it is about equal participation in decision-making. In the events leading to the meeting, the four leaders allegedly plotted to use the debt ceiling increase as a campaign debate tool come the 2012 presidential elections. Obama had adamantly continued to decline to this arrangement insisting on possible consideration after the elections. Further, the president went to an extent of calling Boehner on the night of the aborted meeting, while he was dinning with friends, to insist that he would not relent and sign the bill into law. The House Speaker pointed out to Obama that his concern was substantial but if they did not increase the debt ceiling limit at that time then the government would have to go into bad debt. Additionally, he highlighted that going back on

Sunday, September 22, 2019

Has the No Child Left Behind Act Severely Impacted Special Needs Research Paper

Has the No Child Left Behind Act Severely Impacted Special Needs Students by Expecting them to do Things That Normal Kids - Research Paper Example Introduction. The No Child Left Behind Program enhances the education of the special needs students. The research centers on the effect of the No Child Left Behind Program on the special needs learners. The research focuses on the test taking environment of the special needs test takers. The No Child Left Behind Act had not severely impacted special needs students by expecting them to do things that â€Å"Normal† Kids do. Related Literature. The No Child Left Behind Program states that the progress of all special education students should be monitored (PBS, 2008). Likewise, the program states the scores of the special Needs students will be included in getting the average scores of the students within a stat by 2014. Specifically, 95 percent of the learning disabled students’ scores in the English and Math subjects will in included in the overall state’s student tests’ statistical results. To level the playing field in the area of test taking, some leeway is legally given to the disabled learners. One such leeway, giving the disabled students tests incorporating large print questionnaires. Next, the special needs test takers are given more time to take the tests. Third, the special needs students allowed to take the tests in small groups, compared to the normal test groups. Fourth, the special needs students can be allowed to take the tests on a one on one basis. Fifth, some of the test watchers or teachers are allowed to aid the students on how to fill up the answer sheets. Sixth, the blind students are allowed to take the tests using the Braille method. Seventh, some special needs students are allowed to use sign language and other communication help to finish the tests. Eight, some of the special needs students are allowed to use computers to finish the tests. Lastly, many of the special needs students are allowed to use bilingual test booklets to solve math problems (English and Spanish version or English and another language ver sion). Further, the No Child Left Behind Program requires all schools that fail the state’s Adequate Yearly Progress goals in math and reading are classified as â€Å"in need of improvement†. Consequently, the school is required to put into place an educational program to improve the school’s ratings in the next Adequate Yearly Progress results in the areas of reading and mathematics. On the other hand, Alice Hammel (2011) insists the No Child Left Behind Act has severely impacted on the schools for the failure of the Special Needs Students by expecting them to do things that normal kids do, not the special needs children. The schools will receive complaints if the rights of the special needs children are not addressed. For example, students with emotional needs must be educated and tested in a special way, different from the normal learning kids. The students with behavioral needs, including ADHD students, should be taught in a special way to ensure the student will not be bored and reduce interest in the subject. In addition, the special needs children’s learning environment includes parental intervention. The procedural due process includes giving leeway to students with special learning needs to cope with the learning levels of the normal

Saturday, September 21, 2019

Ford and Toyota Analysis Essay Example for Free

Ford and Toyota Analysis Essay ord Motor Company was incorporated in Delaware in 1919. Ford acquired the business of a Michigan company, also known as Ford Motor Company which incorporated in 1909 to produce and sell automobiles designed and engineered by Henry Ford. They are one of the world’s largest producers of cars and trucks. Ford operates in two sectors, Automotive and Financial Services. In the Automotive sector reportable segments are Ford North America, Ford South America, Ford Europe, and Ford Asia Pacific Africa. In the Financial Services sector reportable segments are Ford Motor Credit Company and Other Financial Services. 1b. Factors affecting Ford’s profitability include: Wholesale unit volumes Margin of Profit on each vehicle sold – which in turn is affected by many factors, such as: Market factors – volume and mix of vehicles and options sold, and net pricing (reflecting, among other factors, incentive programs: Cost of components and raw materials necessary for production of vehicles Costs for customer warranty claims and additional service actions Costs for safety, emissions and fuel economy technology and equipment A high proportion of relatively fixed structural costs, so that small changes in wholesale unit volumes can significantly affect overall profitability General economic conditions and other uncontrollable external factors affect the automotive industry as a whole 1c. Toyota commenced operations in 1933 14 years after Ford. Toyota operates in the Automotive and Financial sectors as does Ford, with reportable segments in Japan, North America, Europe and Asia NEED MORE Toyota Motor Corporation is a limited liability, joint-stock company incorporated under the Commercial Code of Japan and continues to exist under the Corporation Act. Toyota commenced operations in 1933 as the automobile division of Toyota Industries Corporation (formerly, Toyoda Automatic Loom Works, Ltd.). Toyota became a separate company on August 28, 1937. In 1982, the Toyota Motor Company and Toyota Motor Sales merged into one company, the Toyota Motor Corporation of today. As of March 31, 2013, Toyota operated through 509 consolidated subsidiaries and 206 affiliated companies, of which 56 companies were accounted for through the equity method. Toyota primarily conducts business in the automotive industry. Toyota also conducts business in finance and other industries Toyota’s business segments are automotive operations, financial services operations and all other operations. The following table sets forth Toyota’s sales to external customers in each of its business segments for each of the past three fiscal years Toyota sells its vehicles in approximately 170 countries and regions. Toyota’s primary markets for its automobiles are Japan, North America, Europe and Asia. The following table sets forth Toyota’s sales to external customers in each of its geographical markets for each of the past three fiscal years. Automobile sales are affected by a number of factors including: †¢ social, political and economic conditions, †¢ introduction of new vehicles and technologies, and †¢ costs incurred by customers to purchase and operate automobiles 2a.2c A proxy is another person that you legally designate to vote your stock. If you designate someone as your proxy in a written document, that document also is called a proxy or a proxy card. A proxy statement is a document that SEC regulations require that we make available to you when we ask you to vote your stock at the annual meeting. NEED MORE 2b. dklsfjl; 3c. The Board has adopted the following standards in determining whether or not a director has a material relationship with the Company. Employee or former employee. No director who is an employee or former employee of the company can be independent until three years after termination of such employment Independent Auditor Affiliation. No director who is, or in the past three years has been, affiliated with or employed by the Company’s present or former independent auditor can be independent until three years after the end of the affiliation, employment, or auditing relationship. Interlocking Directorship. No director can be independent if he or she is, or in the past three years has been, part of an interlocking directorship in which an executive officer of the company serves on the compensation committee of another company that employs the director. Additional Compensation. No director can be independent if he or she is receiving, or in the last three years has received, more than $100,000 during any 12-month period in direct compensation from the Company, other than director and committee fees and pension or other forms of deferred compensation for prior service (provided compensation is not continent in any way on continued service). Immediate Family Members. Directors with immediate family members itn the foregoing categories are subject to the same three-year restriction. Other relationships. Commercial, charitable and educational relationships will not be considered to be material relationships that would impair a director’s independence. PAGE 25 Elaborate more 3d. In book 3e. Among the most important qualities directors should possess art the highest personal and professional ethical standards, integrity, and values. They should be committed to representing the long-term interests of all of the shareholders. Directors must also have practical wisdom and mature judgment. Directors must be objective and inquisitive. Directors must be willing to devote sufficient time to carrying out their responsibilities and duties effectively, and should be committed to serve on the Board for an extended period of time. 3f. Non-employee board members are provided with $200,000 of life insurance which ends when a director retires, company provided healthcare insurance at no cost, use of up to two company vehicles free of charge. NOT DONE 4a. Ford’s audit committee selects the independent registered public accounting firm to audit Ford’s books and records, and determines the compensation of the independent registered public accounting firm. Consults with the firm, reviews and approves the scope of their audit, and reviews their independence and performance. Reviews internal controls, accounting practices, and financial reporting, including the results of the annual audit and the review of the interim financial statements with management and the independent registered public accounting firm. CONTINUED PAGE 20 4b. The Board has designated Stephen G. Butler as the Audit Committee financial expert.

Friday, September 20, 2019

Leadership Styles and Management in Mental Health Care

Leadership Styles and Management in Mental Health Care Leadership Styles and Management Discuss the impact of transformational and transactional leadership styles on the management of violence and aggression within UK regional maximum security forensic mental health hospital. Incorporating organisation structure, change management, multidisciplinary working, staff motivation and retention, legal and ethical implications for nursing practice. Executive Summary: In this essay we discuss the transformational and transactional leadership styles in the management of violence and crisis situations within the clinical setting and in mental health units. We begin our discussion with studies on the need for disaster management teams and structured command system within hospitals to help ensure that patients receive proper care when needed. We then briefly discuss the differences of transformational and transactional leadership styles and suggest that both personality patterns and attitudes towards these styles determine care and change management within the hospitals. Struggling with your nursing essay(s)? Did you know that we can help you with your leadership styles and management and any other nursing essays? We can help you! Place an order with us and youll get: An exact, 100% original answer to your essay question From a graduate writer, qualified in your subject area Delivered confidentially by email, in 3 hours 10 days (you choose) Stop struggling and get the help you need from the UK’s favourite student support company, right now. Introduction: Leadership styles within the nursing practice can be evaluated by understanding the relationship between management and planning, change operations and organisation structure. As Zane and Prestipino (2004) point out, hospital disaster manuals and response plans lack formal command structure in most cases and the hospital authorities rely on the presence of certain individuals who are familiar with hospital operations or hold leadership positions and abilities during the routine operations and management of the hospital. Management of emergency situations, especially in case of mental health patients who are prone to violence requires the expertise of a disaster management team. However such leadership patterns in which the hospital does not have a formal command structure may be unreliable and during critical conditions, the relying on a few individuals may be inadequate as the concerned persons may not be available at all times and even for prolonged events of crisis, this is not a feasible option or proper management. The Hospital Emergency Incident Command System (HEICS) is a command structure and a method suggested that provides a structured pattern of leadership which does not have to rely on specific individuals for crisis management (such as inpatient violence, or serious injury) and is more flexible and can be applied in all kinds of services such as fire services, emergency medical services, military, police agencies and improves ease of communication among professionals during crisis periods. The study by Zane and Prestipino give a descriptive report of the implementation of the HEICS in a healthcare network and recommends that since this tool pro vides a complete command structure for hospitals and by being a common tool for management can enable validity, reliability of the system as well as consistency and commonality with other hospitals ad disaster response teams. Considering the necessities of a disaster response team and the need for effective leadership styles of management of crises situations, in this essay we would discuss the various styles of leadership and how this relates to change management, nursing practice, and the quality of care during emergency and normal conditions . Several issues are considered here along with examples from evidential studies and clinical research. Leadership Styles in Clinical Management Our discussion will revolve around two forms of leadership patterns mainly the transactional and the transformational styles of leadership. The differences between transactional and transformational leadership styles were first given by Weber (1947, in Turner, 1998) who suggested that transactional leadership is based on control on the basis of knowledge and hierarchical power and transactional leaders aim to negotiate and bargain to achieve higher efficiency. In case of transformational leadership, the leader is a charismatic personality who seeks to change or transform ordinary people with his qualities and seeks to change ways of thinking by using novel ideas within the organisation. Hendel et al(2005)examined the relationship between leadership styles and the choice of strategy in conflict management among nurse managers. The study identified conflict mode choices of head nurses in general hospitals as nurses deal with conflicts on a daily basis and have to implement effective choice of conflict management mode to deal with the complicated situations. The authors point out that the choice of conflict management mode is largely associated with managerial effectiveness of the nurses. It is largely understood that the ability to manage conflict situations creatively to result in constructive and effective outcomes is a standard requirement in nursing practice. For the purposes of the study, the Thomas-Kilmann Conflict Mode Instrument, the Multi-factor Leadership Questionnaire, Form 5X-Short (MLQ 5X) and demographic data were used. 60 head nurses were selected for the study and the results indicated that most head nurses perceived themselves as transformational lead ers in the clinical setting rather than transactional leaders. The most common conflict management strategy was an emphasis on compromise and more than half of the nurses studied admitted to using only one mode of conflict management. Transformational leadership was found to be more popular and widely used than transactional style of leadership and the style of leadership also affected the conflict strategy selected. In case of mental health and psychiatric patients, conflict management and management of violent behaviours in patients are the major challenges. Thus the study mainly argued that conflict handling mode in head nurses is largely associated with the style of leadership and the overall conflict management approach that was based on compromise. Katz and Kirkland (1990) point out that violent behaviour in mental hospital wards is widespread although there may be differences in incidence and distribution. Their study suggested that are varying patterns to show the relation between staff behaviour, management styles, social organisation of the unit and the levels of violence. The study suggests conclusively that, violence is a symptom of disorder not only in the biological and psychological field but also in the socio-cultural field'(p.262). Violent behaviours in patients were found to be more frequent in wards where staff functions were unclear, where there were no predictable staff-meeting interaction or which had slackened or unstructured leadership or management approach. The role of personality in transactional and transformational leadership has been examined by Bono and Judge (2004). Their study was based on meta-analysis of the relationship between personality and ratings on transformational and transactional leadership behaviours. The five factor model was used in the study and personality traits were related to 3 dimensions of transformational leadership namely idealized influence-inspirational motivation or charisma, intellectual stimulation, and individualised consideration and also to the 3 dimensions of transactional leadership namely contingent reward, management by exception-active and passive leadership. Extraversion as a major personality trait has been found to be the most consistent correlate of transformational leadership and even charisma was closely related to this style of leadership. There is a growing need to understand the subtle personality traits and how these relate to the unobvious characteristics and determinants of transfo rmational and transactional styles of leadership. In an earlier study, Judge and Bono (2000) have linked the personality traits from five factor model with that of transformational leadership patterns and behaviours. The personality traits of Extraversion, Agreeableness and Openness to Experience have been found to predict transformational leadership and are traits that are closely related to this particular leadership style. Neuroticism and Conscientiousness were found to be unrelated to transformational leadership behaviours. Judge and Bono further stated that transformational leadership behavior predicted a number of outcomes reflecting leader effectiveness, controlling for the effect of transactional leadership (2000,p.751). Leadership styles also affect performance and not just personality patterns and behaviours. The overall performance of a unit has been critically examined by Bass et al (2003) assessing both transformational and transactional leadership styles. The authors ask how leadership styles and ratings from operating units can predict the subsequent performance of these units that operate under high stress and even considerable uncertainty. In this study, the predictive relationships for transformational and transactional leadership styles for ratings of unit potency, cohesion and performance levels were calculated. The results indicated that both the leadership styles positively predicted unit performance suggesting that transactional and transformational styles of leadership may be both effective for improving performance of an entire nursing or clinical unit. Some studies have suggested that staff retention and job satisfaction are closely associated with transformational leadership styles (Kleinman, 2004). Prenkert and Ehnfors (1997) measured organisational effectiveness in relation to transactional and transformational leadership in nursing management. The relative influences of transactional (TA) and transformational (TF) styles of leadership on organisational effectiveness (OE) was measured as the degree of goal attainment and reflected on the quality of nursing care (NQ) provided. The study used interviews of head nurses and the Leadership Nursing-Effectiveness Questionnaire (LNEQ) was also used. The result indicated that TA and TF leadership styles had low or significant connection with the organisational effectiveness at a hospital and the study did not support the perceived understanding that organisations and clinical settings exposed to higher levels of transformational or transaction leadership behaviours show better organisational effectiveness. Conclusion: In this study we discussed various approaches to transformational and transactional leadership styles and behaviours and in the course of the discussion we showed the different views and perceptions on leadership styles. In general most of the studies discussed here suggest that transformational leadership is preferred and is the more positive form of leadership as it emphasises on individual power and charisma to change the surroundings and the situation. Transactional leadership on the other hand is comparatively easier form of leadership as it is not dependent on any unique personality pattern but is largely dependent on how an individual uses the situations to bring out efficient and positive consequences. However as Bonos studies suggest both the leadership styles may be equally related to personality patterns with openness and agreeableness being important traits of a transformational leader. Most studies discussed here seems to point out that leadership styles are closely rela ted to change management, quality of care, work relations, job satisfaction and overall nursing practice. This is also true in all other areas and services, including mental health wards where violence management of patients is a major challenge for head nurses. There are however few exceptional studies examined here that seem to argue that organisational effectiveness have little, no or uncertain relationship with leadership styles. Recommendations: Following the discussions and evidential studies above, we suggest several moves for better services and improvement of leadership behaviours in the clinical settings keeping in mind the ethical implications. These can be given as follows: 1. Conducting interviews, using surveys and questionnaires to understand nurse attitudes and perceptions towards leadership styles 2. Performing personality tests to identify traits correlating with the different leadership styles to understand the strengths and weaknesses of the workforce 3. Having transformational and transactional leadership style training, education and analysis to make nursing staff suitable for handling crisis situations especially in mental health units 4. Increasing awareness on leadership styles among and showing the importance or use of each leadership behaviour during crisis in hospitals and psychiatric wards 5. Forming a disaster management team or emergency team that will be well informed of leadership styles and relative characteristics or advantages of each Bibliography Zane RD, Prestipino AL.   Implementing the Hospital Emergency Incident Command System: an integrated delivery systems experience. Prehospital Disaster Med. 2004 Oct-Dec;19(4):311-7. Dutton JE, Frost PJ, Worline MC, Lilius JM, Kanov JM Leading in times of trauma. Harv Bus Rev. 2002 Jan;80(1):54-61, 125. Arnetz BB Psychosocial challenges facing physicians of today. Soc Sci Med. 2001 Jan;52(2):203-13. Review. Gilbert T. Nursing: empowerment and the problem of power. J Adv Nurs. 1995 May;21(5):865-71. Review. Kootte AF Psychosocial response to disaster: the attacks on the Stark and the Cole. Med Confl Surviv. 2002 Jan-Mar;18(1):44-58. Franco H, Galanter M, Castaneda R, Patterson J. Combining behavioral and self-help approaches in the inpatient management of dually diagnosed patients. J Subst Abuse Treat. 1995 May-Jun;12(3):227-32. Katz P, Kirkland FR. Violence and social structure on mental hospital wards. Psychiatry. 1990 Aug;53(3):262-77. Hendel T, Fish M, Galon V. Leadership style and choice of strategy in conflict management among Israeli nurse managers in general hospitals. J Nurs Manag. 2005 Mar;13(2):137-46. Judge TA, Piccolo RF Transformational and transactional leadership: a meta-analytic test of their relative validity. J Appl Psychol. 2004 Oct;89(5):755-68. Bono JE, Judge TA Personality and transformational and transactional leadership: a meta-analysis. J Appl Psychol. 2004 Oct;89(5):901-10. Bass BM, Avolio BJ, JungDI, Berson Y Predicting unit performance by assessing transformational and transactional leadership. J Appl Psychol. 2003 Apr;88(2):207-18. Stordeur S, DHoore W, Vanderberghe C. Leadership, organizational stress, and emotional exhaustion among hospital nursing staff. J Adv Nurs. 2001 Aug;35(4):533-42. Laurent CL A nursing theory for nursing leadership. J Nurs Manag. 2000 Mar;8(2):83-7. Judge TA, Bono JE Five-factor model of personality and transformational leadership. J Appl Psychol. 2000 Oct;85(5):751-65. Kleinman C The relationship between managerial leadership behaviors and staff nurse retention. Hosp Top. 2004 Fall;82(4):2-9. Dunham J, Klafehn KA. Transformational leadership and the nurse executive. J Nurs Adm. 1990 Apr;20(4):28-34. The Cambridge Companion to Weber ~Stephen Turner (Editor) Cambridge University Press Paperback June 3, 1998

Thursday, September 19, 2019

Use of Figurative Language in Daddy by Sylvia Plath Essay -- Literary

The figurative language in the poem â€Å"Daddy† by Sylvia Plath can be used to discover a deeper significant of the poem. By using figurative language throughout the poem such as symbolism, imagery, and wordplay, Plath reveals hidden messages about her relationship with her father. Plath uses symbols of Nazis, vampires, size, and communication to help reveal a message about her dad. In Plath’s poem she frequently uses figurative language about Nazis and the Holocaust. Plath depicts herself as a victim by saying she is like a Jew, and her father is like a Nazi. Plath uses a train engine as a metaphor for her father speaking the German Language, and also to depict herself as a victimized Jew being taken away to a concentration camp. Plath states â€Å"And the language obscene / An engine, and engine / Chuffing me off like a Jew† (Plath 30-32). This shows the subtle metaphor of the train engine being her father speaking the German language and how she feels she is a prisoner. Plath uses other subtle metaphor that connect her father discreetly to the Nazis when she uses German words such as â€Å"Luftwaffe† (42) which is the German air force, and â€Å"Panzer-man† (45) who were the men who manned the German tanks. Another example of Plath using figurative language to depict her father as a Nazi can be found when she uses an allusio n to Hitler’s mustache and the blue eyes of Aryans. â€Å"And your neat moustache / And your Aryan eyes, bright blue† (Plath 43-44). The use of this allusion gives the father the image of Hitler himself and helps build the metaphor of her father as a Nazi. Towards the end of the poem Plath begins to be more blunt in depicting her dad as a Nazi. She uses the metaphor of her father not being like God, but rather lik... ...voices just can’t worm through† (Plath 68-70) A metaphor compares the telephone to a plant, and the plant has been cut off at the root and therefor the communication has been cut off. The roots are almost a metaphorical telephone line growing on her father’s grave, but now they are cut off and no longer available for communication. We can see the struggle Plath is having in wanting so desperately to tell her father something but never having the chance to say it. By analyzing Plath’s use of figurative language we can see a much deeper significance to her poem. We see how she depicted her father as a suffocating monster through figurative language. We also get deeper insight into the type of relationship, or rather lack of relationship between the two. Works Cited Plath, Sylvia. The Collected Poems. Ed. Ted Hughes. NewYork: Harper Perennial, 1972.

Wednesday, September 18, 2019

The Computer :: Technology Internet Electronics Essays

The Computer Even though J. David Bolter wrote Turing’s Man: Western Culture in the Computer Age in 1984, at least a century ago in computer years, his observations and concerns about the electronic age are in no way obsolete. Bolter examines from a historical perspective how the computer will reshape our understanding of the human mind and our relationship with nature. By comparing the computer with defining technologies of previous ages, Bolter anticipates the many qualities and values of people in the digital age, his so-called â€Å"Turing’s men†. In doing so, he encourages those in the humanities to take an active role in shaping some of the perceptions of the emerging era. Humankind has created, used, and replaced innumerable technologies over the past 10,000 years of written record. Turing’s Man concentrates on only four of these technologies: the spindle and potter’s wheel of ancient Greece, the mechanical clock of Renaissance Western Europe, the steam engine of Industrial Europe, and finally the computer of the electronic age. According to Bolter, each of these inventions â€Å"defines or redefines man’s role in relation to nature†(13). Although Bolter considers the influences of these technologies on many facets of culture and society, his main efforts are devoted to understanding their implications for a culture’s view of time, space, thought, and creation. The spindle and the potter’s wheel of Ancient Greece suggest an intimate relationship between man and nature. The tools are seen more as an extension of the human hand than a barrier between craftsman and material. Bolter argues that the image of the potter, fashioning his finely crafted, but still imperfect vessel on the rotating wheel, made a great impression on the thinkers of that time. The rotating nature of these tools, mimicking the great circular paths followed by celestial bodies, led Aristotle to claim that â€Å"circular motion . . . was natural, whereas motion in a straight line required further explanation†(116). As a consequence, the Greeks adopted a cyclical view of time. The world did not progress forward in linear motion but repeated over and over. Rather than progressing, ideas and institutions would remain static or decay. The potter and his clay also served as a metaphor for divine creation. The world and its human inhabitants were fashioned out of imperfect materials by divine force. This material makes up the entirety of the world.

Tuesday, September 17, 2019

Galileos Work :: essays research papers

Galileo Galilei was born on February 15, 1564 in Pisa, Italy. In 1570 his family relocated to Florence. Galileo pioneered "experimental scientific method" and was the first to use a refracting telescope to make important astronomical discoveries. In 1581, Galileo studied at the University of Pisa. There he became interested in the workings of science and concluded that the period (the time in which a pendulum swings back and forth) does not depend on the arc of the swing (the isochronisms). In 1609 Galileo learned of the invention of the telescope in Holland. From the barest description he constructed a vastly superior model. Galileo made a series of profound discoveries using his new telescope, including that the moon has craters, valleys, and mountains much like the Earth’s terrain. He also was able to see four small lights orbiting around the planet Jupiter. He was then able to conclude that it too was moons. Galileo was also able to discover that the planet Venus had phases much like our Moon. As a professor of astronomy at University of Pisa, Galileo was required to teach the accepted theory of his time that the sun and all the planets revolved around the Earth. Later at University of Padua he was exposed to a new theory, proposed by Nicolaus Copernicus, that the Earth and all the other planets revolved around the sun. Galileo's observations with his new telescope convinced him of the truth of Copernicus's sun-centered or heliocentric theory. In 1610, Galileo published a book, The Starry Messenger, describing his findings that supported the Copernican theory. Galileo's support for the heliocentric theory got him into trouble with the Roman Catholic Church. He was forced to abandon his astronomical pursuits. But, Galileo retaliated by publishing a book, Dialogue Concerning the Two Chief World Systems. This book cause more arguments with the church due to it were in Italian which was a direct conflict with the church. In 1633 the Inquisition convicted him of heresy and forced him to recant (publicly withdraw) his support of Copernicus. They sentenced him to life imprisonment, but because of his advanced age allowed him serve his term under house arrest at his villa outside of Florence, Italy. It was not until 1992 that the church publicly forgave Galileo. But due to the timeframe, the damage had already been done.

Monday, September 16, 2019

My Dreams of the Future

Do you pay attention in how fast time goes by? From the age of 5 we spend our time busy with school, and then we grow up to find a job and build up a family. Before we realize, time has passed by and all the dreams we had for our future have not yet come true. The reason is because our dreams are just dreams and haven’t yet become goals. The only way to achieve our goals is to know what we want to plan how to get it. Life is a dream, realize it. In my future I want to do so many things. One of the things I want to do is become a Civil Engineer so I can help build a better Panama. To become an Engineer, I will have to study more than ever. Graduate from National Taiwan University is one of my short-time goals I want to achieve. After that I want to get a well-paid job as an Engineer, doing all kind of projects to improve the infrastructure of different cities. I also want to create an organization for the poor and shelterless people in my country; I believe that we should all have the same privilege like have a place to live in and receive an education. I wish for a happy and healthy life, who doesn’t? But this is something I can only wish for. On the other hand I can work hard to make my dreams come true. There are also other things that I would like to do at some point. One of my dreams is to travel around the world. I have always been curious about other cultures and the differences between people in other countries. It would be amazing to travel the whole world. Furthermore I would love to bungee jump or swim with sharks, experiencing life to the limits. In the future I may have new dreams, but the first goal I have to achieve is getting my diploma. This is one of the keys to accomplish my other goals and dreams. After becoming a professional, I want to start a family, one lovely wife and maybe three children’s and have one beautiful cozy home to raise my kids and grow old with the people I love the most. I hope to achieve all my goals and fulfill my dreams, I know it will take a lot of work and dedication, but the outcomes are more than amazing. People have their own ways to get what they want and I will do whatever I can for my dreams to come true

Sunday, September 15, 2019

Cell Phones are a Necessity of Life Essay

Cell phones are not an advanced gadget on the scene. It was developed in 1947 in the form of a car mobile phone. The hypothesis of cellular phone was produced by Bell Laboratories with the permission of FCC (Federal Communication Commission), and had everything to do with broadcasting and sending a radio or television message out over the airwaves. There was a scientist who gave a advanced shape to the same accessory. Dr Martin Cooper, a former general manager in Motorola, made the basic call on a portable cell phone in nineteen seventy-three. The premier ever cell phone was very ample and bulky. It resembled a radio frequency accessory. The weight of Motorola’s introductory cell phone was 2 pounds. Presently, the structure of cell phones has evolved to match the style and comfort of the user. It is uncomplicated to tailor cell phones by choosing its features and functions for one’s comfort. There are phone covers that change the face and design of the contraption. Various accessories are available such as car chargers, belt clips, phone covers, data cables and etc. Cell phones emerged as a apparatus of luxury, but presently it plays a much bigger and considerable role. One can gather wireless Internet service through your cell phone, with web and email capability. A cell phone with a mini web browser can relief retrieve web emails and chat while you are on the move. A extraordinary kind of browser is used for surfing the net on a small cell phone screen. If internet use is a must, make sure that when buying a cell phone you make the choice for graphic browser capability instead of a text-based browser. In addition, if you think you will browse the wireless Internet often, you may desire to consider buying a cell phone with a larger than average display size. There are International websites that allow sending mails, without having a computer. All you need is a basic GPRS enabled mobile phone and you can access your mail on your cell phone anytime and anywhere. It seems that cell phones have become a bed-side essential for us today. It is no longer a device of entertainment. From local weather forecast in the morning to your  loved ones valuable night messages, it keeps you connected all the time. With cell phones becoming a gadget with all the modern technology, its theft is growing across the world. In a survey in the UK, a cell phone is stolen every three minutes. In the United States, the statistics are very analogous. By keeping a note on the IMES identification that each phone has, you can trace a phone. This is quite the tedious process. The IMES code is individual to each cell phone and when you lose your phone, you can refer the code to your network provider as well as handset provider and trace back the cell phone, or at least block the applications in the phone. The person who stole the cell phone can’t use it after the IMES code is blocked. Cell phones have become a very popular consumer electronic product. With the availability of internet connection, cell phone as broaden even deeper its options of uses. You must also note that GPS capability is a life saver for tracking cell phone users who are in emergency situations. Cell phone usage has become a necessity of life. People cannot live without their cell phone. What was once considered a luxury item in the early days, cell phones are a must have item at every waking moment.

MDG Presentation Essay

ABSTRACT The Importance of Information Technology (IT) cannot be over emphasized as it is very necessary in all works of life; Agriculture, Health, Education, Security, Entertainment etc. It provides new opportunities for improving performance and strategic competitiveness. However, few organizations have successfully grasped the opportunities enabled by IT, largely due to their limited ability to evaluate the impact of IT on firm performance and ignorance. My Industrial Training Programme has exposed me to the IT industry with hands-on practical experience on Computer engineering and software development. The practical side of computing can be seen everywhere. Nowadays, practically everyone is a computer user, and many people are even computer programmers. Getting computers to do what you want them to do requires intensive hands-on experience. But computer science can be seen on a higher level, as a science of problem solving. Computer scientists must be adept at modeling and analyzing problems. They must also be able to design solutions and verify that they are correct. Problem solving requires precision, creativity, and  careful reasoning. Computer science also has strong connections to other disciplines. Many problems in science, engineering, health care, business, and other areas can be solved effectively with computers, but finding a solution requires both computer science expertise and knowledge of the particular application domain. Thus, computer scientists often become proficient in other subjects. COMPANY PROFILE ABOUT CONNECT TECHNOLOGIES LIMITED In 1986, the founder had a dream and the urge to deploy Information Technology Solutions and participate actively in the Nigerian Economy. His mission then, was to exploit the untapped resources of the nation’s Information Technology (IT) Industry. With over 100 man-years cognate professional exposure fused in, Connect Technologies Limited was in 2000 incorporated as a leading specialist IT Solutions Provider. GOAL â€Å"Our clients’ success is our growth† MISSION STATEMENT Connect Technologies Limited is dedicated to accomplishment of its vision and  mission by applying the following ‘value chain’ approach: Customer Focus – Customer First Philosophy: We will work diligently to understand our clients’ IT needs, and strive to meet or exceed their expectations, using the best practice approach. Our People – Connect Technologies’ Management Team is its greatest asset. The Team understands the Nigerian IT needs and challenges in the competitive global economy. Commitment – To provide the highest level of commitment to quality service and products to our customers. CAPABILITY STATEMENT – EXPERIENCE Connect Technologies’ entry into the information technology industry is backed with more than 100 man-years of cognate and relevant professional experience of its leading practitioners. Connect Technologies’ professional and managerial manpower base, no doubt, represents one of the best in the industry today. Working in collaboration with our technical partners in Nigeria, Asia–India, Europe and the USA, we possess the capability to design, supply, install LAN-based/multi-tier Application Software, train, and maintain complex information technology systems, both domestic and overseas. VISION â€Å"To be and remain a leading IT Solutions Provider with capabilities to innovate and deliver functional hi-tech Software projects with maximum benefits to all clients.† Our concept of customer satisfaction is derived from the fact that we aspire to reduce our implementation downtime to the barest minimum while increasing our clients’ productivity at least cost to them. PROFESSIONAL SERVICES Connect Technologies practice and carry on the business of Informatics and Information with particular reference to all related activities and trade in the Information and Communications Technology (ICT) industries and services – involving Software Development and Hardware configuration solutions. The core service is focused on business of design, and development of Information Technology Knowledge Infrastructure projects with particular reference to the design of Application Software and Solutions and interfacing them with Local Information Infrastructure (LII), National Information Infrastructure (NII) and Global Information Infrastructure (GII). As professional IT trainers, Connect Technologies’ organizes and manages special I.T Seminars, Workshops and Conferences for corporate organizations – especially the banking industry for the purpose of upgrading the knowledge and operational expertise of Informatics Technology. The customized training embraces in-house training on Information Technology and Communications Technology – especially Internet Development and Operation Training. CORE COMPETENCE Capabilities: Design, automate, Integrate, Support and Manage complex technology-driven Application Software systems – Our Solutions are 100% indigenous effort. Human Resources Highly skilled Software Development & Implementation Team Solutions & Services LAN Groupware Applications and Solutions Internet Solutions & Web Portal Design Design and Installation of Local & Wide Area Networks Offshore Software Project Development Technical Training Facilities Management Project Management EXPERTISE Connect Technologies Limited has strong foundation in Infrastructural, Financial, Technical, Product and Marketing Resources. Today, this expertise in Retail Banking Consultancy, Software Development, Networking and other services will benefit major banks and business organizations all over the country. CONNECT TECHNOLOGIES SOLUTIONS EPortal Solutions Enterprise eGovernment Operation Solutions Enterprise Educational Portal Solutions Enterprise Business Intelligent Solutions Enterprise Campus-wide Knowledge Solutions Enterprise Recruitment Solutions Enterprise Cooperative Financial (CoopFinance) Web-based Financial Application designed to automate all Cooperative activities from Member Registration, Savings & Loan Application, Approval Process and Repayment Processes, Journal Posting, Account Management, Pool Fund Management, Payable & Receivables (Members & Third Party). Enterprise BankerïÆ' ¤ (CT2001) Banking software specially designed to automate all banking activities, from banking needs of retail customers, routine banking needs of investments and trade-finance activities to full activity report summary. Enterprise Stock MasterïÆ' ¤ Stock Application targeted towards mid-ranged stock and Stock Brokerage, Financial and Investment Houses in its scope. It is specially designed to automate all stock activities, from shareholder registration of clients and stock needs of investments and trade-finance activities to full activity report summary. Enterprise Inventory/Payment System Enterprise Manufacturing and Inventory System is designed to optimize the  efficiency of Trading/Sales Network, Sales Warehouses and Manufacturing capability. It is a complete Manufacturing/Inventory System [With Customer Support System, Financial Management System, Inventory Control System] [Including Sales, Purchase, Bills Receivable and Payable, Income and Expense maintenance] With various useful Reports. Money Transfer Management Systems MTMS, version CT2003 is a full Multi-Currency Solution targeted towards commercial banks, Merchant banks, Savings and Loans, Financial, Passenger Traffic Systems and Investment Houses. It is specially designed to automate all online money transfer activities, from sending and receiving of money to reconciliation of accounts and full activity report summary. The Application is secure and reliable. Digital Image / Account Security System Digital Image / Account Security System is an application designed to monitor customer’s accounts and provide adequate Account Security through Digital Image Capturing and Confidential Data Protection. MAJOR PROJECT REFERENCES S/N Client Nature of Project Status 1 NITDA Supply of e-Learning Application System to RITC Completed 2 NITDA ICT Consultancy on Development of Computer Network Security Standards Completed 3 NITDA Part of Consortium of ICT Consultants that developed Framework Architecture and Standards for e-Government Applications Completed 4 Shell-East Cooperative Investment Limited, PH IT Financial Consultant, Deployment and Implementation of Enterprise Cooperative Financials Software Completed and is being supported 5 NITDA ICT Consultancy & Implementation of eGovernment Project for Federal Government Completed 6 NITDA e-Government Workflow PS-NET Pilot Application deployed at FMST, Presidency, National Assembly, Finance Ministry, BOF (Budgets Office), Civil Service Commission, EFCC, PARP and Ministry of Education Completed 7 Akwa-Ibom State Government ICT Consultancy on SIT Park Project Completed 8 Trithel International Consulting E-Business Solutions (e-commerce portal) Completed 9 Akwa Savings & Loan – Uyo, Unical Community Bank – Calabar, Olomi Community Bank – Ibadan, Karakata Investment Limited – Ogbomosho, Aniocha Community Bank etc Deployment of our Enterprise Banker  Completed and is being supported 10 Riggs Securities, Lagos Deployment of our Enterprise Stock MasterïÆ' ¤ Solutions Completed 11 Toyota Nigeria Limited E-Business Solutions Completed 12 Henrich Boll Foundation, Socio Economic Rights Initiative, NOTAP (National Office for Technology Acquisition and Promotion), ITAN (Information Technology Association of Nigeria) 13 SIM Registration with Chams Plc Completed PROFILE OF KEY PERSONNEL CHRIS UWAJE (FNCS, FIAP) Born in Lagos, Nigeria, 4th August, 1951, Christopher Uwaje (FNCS, FIAP) is the Principal Consultant, Chief Software Architect and Chief Executive Officer: Connect Technologies Limited–CTL. He is the Originator/Pioneer of National Information Technology Policy for Nigeria. Guest Student on Informatics, University of Hamburg, Graduate of Informatics, British Institute of Engineering Technology and Control Data Institute, Frankfurt, Germany. Post Graduate Qualifications. Over Three Decades of on-the-job IT Practice as Computer Scientist – Spread across three continents (Europe/Africa and America), specializing in IT-Strategy Consulting – incorporating SIT Park project conceptualization, design, implementation, project management and Technical Support. Software Engineering Solutions; Research, Design and Development (RD&D). Special Professional focus: National & Regional IT Policy; Coordinating Chairman, Council for West Africa Information Technology Professionals (CWAITP). Immediate Past President of Information Technology Association of Nigeria (ITAN) and 1St Vice President of Institute of Software Practitioners Association of Nigeria (ISPON). Member, National Inter-Ministerial Committee on Software development. PROFESSIONAL CREDENTIALS AND ASSOCIATIONS Graduate of Informatics, British Institute of Engineering Technology and Control Data Institute, Frankfurt, Germany. Post Graduate Qualifications. IMMEDIATE-PAST PRESIDENT: INFORMATION TECHNOLOGY ASSOCIATION OF NIGERIA (ITAN) IMMEDIATE PAST PRESIDENT: INSTITUTE OF SOFTWARE PRACTITIONERS OF NIGERIA (ISPON) FELLOW NIGERA COMPUTER SOCIETY NCS) FELLOW: INSTITUTE OF ANALYSTS AND PROGRAMMERS. U.K. FELLOW: INSTITUTE OF CERTIFIED PROFESSIONAL OF U.K. MEMBER: COMPUTER PROFESSIONAL REGISTRATION COUNCIL OF NIGERIA.(CPN) MEMBER: INSTITUTE OF MANAGEMENT SPECIALIST, BRITAIN. PAST PRESIDENT: ROTARY INTERNATIONAL DISTRICT 9110, NIGERIA. OLUYINKA TANIMOWO Born on March 14th 1971 in Abeokuta, Ogun State, Nigeria. Happily married with two lovely daughters and one handsome boy. B. SC (Hons), Computer Science (First Class Honours) from University of Benin, Benin-City, Edo State (1993) AWARDS Best graduating student in Faculty of Science during 1992/1993 Academic Session Best student in Computer Science during 1992/93 Session Best student in Computer Science during 1991/92 Session Nigerian Breweries PLC, Prize Winner, 1991/92 Session Best student in Computer Science during 1990/91 Session Best Student in Mathematics. 1988 (Secondary School) EXPERIENCE – SUMMARY Over 10 years of active Software Development. Hardware/OS Platforms: Have worked on various platforms that range from DOS, Windows 3.x, Windows 95/98, NT/Win 2000, Advanced Server 2002 and higher, Windows XP. Software/Internet Technologies: Experienced with the following: VB.Net, ASP. Net, C#, Visual C/C++, MFC, ActiveX Controls, Visual Basic, HTML, ASP, DHTML, VB Script, JavaScript, XML, CGI, JAVA, Windows NT, Client/Server Software Development, TCP/IP, ODBC, MS SQL Server, COBOL, MS Visual SourceSafe. Others: Object-Oriented Analysis & Design (OOA & D), UML, Rational Rose & Requirement Analysis. CHAPTER ONE INTRODUCTION Therefore, students most especially in higher institution of learning are expected to have an Industrial Training experience in order to improve their practical skills in their different course of study and also be computer literate. 1.1 Industrial Training Program. Industrial Training program provides pre-professional work experience with specific assignments and responsibilities. An Industrial Training should be relevant to a student’s personal career interests and academic courses of study, serving as a bridge between university and the world of work. Productive Industrial Trainings help students to make informed decisions and improve their marketability after graduation. 1.2 Objectives of Industrial Training. To provide avenue for students in higher institution of learning acquire industrial skills and experience in their various course of study. To prepare students for work situation they are likely to meet after graduation. To expose students to work methods and techniques in handling equipment and machinery that may not be available in the University. To make transition from University to the world of work easier and thus enhance contests for later job placements. To provide students with an opportunity to apply their theoretical knowledge  in real work situation, thereby bridging the gap between University work and actual practice. To enlist and strengthen employers’ involvement in the entire educational process of preparing University graduates for employment in the industry. 1.4a Brief History of Connect Technology Ltd. 1.4b Structure of the Company. 1.4c Training Procedure of Connect Technology Ltd. At Connect Technology Ltd is a perfect mixture of theory and practical works also the implementation of web-based instructions to enable students on Industrial Training get a grip of whatever is taught. Connect Technology Ltd is a highly organized firm that not only satisfies clients but also ensures that students learn a lot that pertains to their course of study. 1.4d Features of Training Methodologies. Assignments: At the end of each lecture, students are to do their assignments and submit. Scores maybe awarded to keep check on progress level of students. Seminars: This is an interactive forum where students including staffs come together to talk about works they have executed, siting the challenges and also make plans for further works or projects. Textbooks: Students are allowed to go through the firm’s handout and read more pertaining to what has been taught. Internet: Students are also given the opportunity to go online to read up on different topics, which may not necessarily be what have been discussed at work but must be relevant so as to add more knowledge to the student. CHAPTER 2 WORK DONE The first day of work at Connect Technologies Ltd was on the 3rd of August, 2012. I was given an orientation in the company by one of the staff by name Pius Ekeh Junior, he told me of the rules and regulation of the company, showed me around different offices in the company, the services they render to the society, and he also gave a job description, and all that is expected of me during my Industrial Attachment. I was assigned to the hardware department, where we did jobs like formatting a system unit, ghosting of hard drives, coupling system, changing of damaged motherboard components and repairs of computer if the need arises, among others. Every Friday, everybody including staffs and IT students are enjoined in a seminar where they are given appraisal on works done during the week, discuss on challenges encountered during the week’s work and plan ahead for further jobs and projects. Monthly, I assist my colleagues in disk cleanup, disk fragmentation, antivirus update, and also give a well detailed report to the staff in charge of IT (Industrial Training) students. During the first week, no much work was done since I was new in the company, but as time went on, I was been thought on computer basics, how to use Microsoft, WordPad, Command Prompt, Viruses, Malware, Spyware and how they affect the computer system. I also learnt on the definition of disks, their different types which are Basic and Dynamic disks, their uses, and how to convert from one form or state to another i.e. converting a disk in its Basic state to a Dynamic disk or from its Dynamic state to a Basic disk. DISK CLEAN This is a process where the computer gets rid of irrelevant programs from its memory. It is used to clear unused files on the hard disk and offers more options than just emptying the recycle bin but also detecting temporary internet files. Files such as temporal office setups and old restore points can be removed in one operation, this also offers more flexibility for file removal. To do this Right Click the My Computer Icon Then Click on Properties Next Click Disk Cleanup Tick the items to be removed Select Yes to confirm deletion Then Click Ok to finish By these actions, the files are removed from the hard disk and the spaces occupied are being freed. RECYCLE BIN When a file is deleted from the computer, it is not completed deleted from the computer instead it is saved in the Recycle Bin, where it can be restored should in case it was deleted by mistake. Only when a file is deleted from the Recycle Bin, is it permanently deleted from the computer. The Recycle Bin should be emptied on a regular basis. SCAN DISK This is used to check the integrity of the file systems, also to scan the physical hard disk for bad sectors. These bad sectors can lead to data loss or corruption and this is one of the first signs of falling hard disks. When bad sectors are detected, Scan Disk attempts to repair these sectors mark them as ‘UNUSABLE’. GHOSTING This means creating a clone of its contents so that they may be transferred to a different and larger sized hard disk. It is not strictly the same as copying, but rather a means of accessing files and software without having to go through all the trouble of reinstalling them. Ghosting is typically done on a computer so as to upgrade it to a larger hard disk. It is also very important to note that when doing this both hard disks should be compatible, in terms model and brand. It is sometimes called CLONING. CONFIGURATION OF SYSTEMS System configuration is the process of setting up the hardware devices and assigning resources to them so that they work together without conflicts. A properly configured system will allow the user avoid resource conflict problems, and makes it easier for the user to upgrade the system with new equipments in the future. An improperly configured system will lead to storage errors and problems, and make upgrading very difficult. Steps in Setting up or Configuration a Computer. Power on the Computer On Set up window, choose country or region, time, currency and keyboard layout Click ‘Next’ Accept the license terms required to use your computer Click ‘Next’ Enter username and password, then choose a default picture for the use account Enter computer name e.g. Helen-pc Click ‘Next’ and click on ‘Ask me again if any message comes up’ Here set time and date time zone Finally click on ‘Start’ After configuration of the computer, the user can now allow the window to check the performance of the computer and prepare the desktop. At this juncture the user can install and download any necessary applications that are needed on the computer. UPGRADING WINDOWS XP to WINDOWS 7. It is the same steps taken when configuring a computer; the difference is that during the configuration, the following are done: Insert the OS cd for Windows 7 Restart the computer When prompted to boot to boot from CD, it any key on the keyboard to proceed Then all the instructions carefully and you will have your Windows XP upgraded to Windows 7 After that install the drivers and applications that are necessary to help the user work conveniently on the computer. ACTIVATING WINDOWS. Activating Windows is necessary for Microsoft to know it is a genuine version of the Operating System. It also aids in upgrading any Operating System to any version. These are the steps required: Click on the Start button Right Click on My Computer Select Properties Click on Activate Windows Follow all instructions including the EULA agreement You will need to type the product key of the computer and it is always at the top of the system unit After that you will be required to wait for some minutes so that Windows can be activated. TROUBLESHOOTING OF A COMPUTER SYSTEM. Troubleshooting is a process of determining the cause of, and ultimately the solution to, a problem. It is a form of problem solving, most often applied to repair of failed products and processes. It is a logical and systematic search for the source  of a problem, so that it can be solved, and so the product or process can be made operational again. It is also needed to develop and maintain complex systems, where the symptoms of a problem can leave many possible problems. By applying a logical, consistent method to the troubleshooting process, you make your work easier, and shorten the time it takes to discover the root of the problem. Acquire information about the problem by questioning the user and identifying any change the user has made to the computer lately. In acquiring the information, you will find out that sometimes the user has the problem. Some complain of not being able to connect to the internet or not being able to use the printer and applications. All that is needed is to check the machine which ever it is and try to proffer a solution.

Saturday, September 14, 2019

WorldCom Accounting Failure

This research paper will seeks to discuss accounting failure at WorldCom by trying to understand the nature of fraud committed, the perpetrators who caused the failure, the lacking controls that may have caused all these problems and the intentions of the perpetrators as would be revealed by the extent and frequency of manipulation done in the financial reports of the company. This paper hopes to find the lesson of the story for the guidance of people who may be involved the same way or the other. . Analysis and Discussion 2. 1 Brief background of the company. WorldCom was part the Telecommunication Company before its name it was eventually named to MCI in 2003, Inc after several events including its merger with LDDS and later with MCI Communications as part of its strategy to get out from bankruptcy caused by the scandals that the company went through. MCI, Inc was purchased by Verizon Communication and now part of Verizon Division. What happened at WorldCom, what caused them to commit fraud? WorldCom’s stocks were used as means to enrich its chief executive officer (CEO) Ebbers and other officers basically from finance and accounting departments at the expensed of many investors by making the company’s to look more profitable than what is real. The fake profitability has caused the price of the company’s stock to rise significantly but only to be used by certain people to take advantage with malice against the investors. As to what caused them to commit fraud may be clearly blamed on the apparent greed of these people for more wealth with of the involvement of many of officers or from another point of view, by the laxity of the system of control that allowed things to happen so easily. As to which is more believable would be subject to analysis in the following sections and subsections. 2. 1. b. What kind of fraudulent accounting practices were used to manage earnings, describe the specifics of how it was accomplished? The two fraudulent practices could be classified into two. The first one the underreporting of â€Å"line costs† by capitalizing them rather than recording as expenses for the period and the second one is inflating or overstating the revenues. In accounting profitability is measured by the excess of revenues over expenses every period. The company in effect deferred the recognition of the expenses so that company appeared more profitable that what is real when expenses are recognized properly. The other fraudulent practice is therefore logical and would have the same effect as the first since inflating or increasing the revenues would cause to the company’s profitability to look better. Each of the fraudulent practice is described in detail below. The overall objective of efforts was to keep reported line costs to approximately 42% of revenues which is far from having actually reached levels in excess of 50%, and to maintain in its report to investors double-digit revenue growth when the truth is that actual growth rates were so much lower substantially. People became rich because of the frauds including the company’s CEO Bernard as derived from the increasing price of his shareholdings with the company. The start of the fraudulent accounting was found to be 1999 when the company wanted to paint a good financial condition contrary to what the company was actually in after the downturn in the telecommunication industry shortly after WorldCom has acquired MCI in 1998. By painting a different picture investors were plainly deceived into investing. 2. 1. b. 1) Underreporting ‘line costs’ (interconnection expenses with other telecommunication companies) by capitalizing these costs on the balance sheet rather than properly expensing them The first fraud committed is the reduction of reported line costs, which represents the company largest category of expenses. It is a good thing its internal audit personnel were the ones which alerted about improperly transfer of $3. 852 billion from line cost expenses to capitalized a ccounts during 2001 and the first quarter of 2002. It was latter announced by company about the additional line cost accounting fraud which when combined with the first $ 3. 8 billion would total at $6. 412 billion in improper reductions to line costs. These and other manipulations of line cost caused fraudulent jumping up of pre-tax income by over $7 billion. The fraud actually started as line cost adjustments in the form of accruals in 1999 and 2000 but when it was not possible to make more large accruals, the next scheme as to capitalized or defer 2001 and 2003 operating line cost as assets . Capitalizing will cause the assets to be bigger than actual and would also make the financial structure of the company which would make it attractive to investors while improving its profitability position because of understatement of expenses that would bloat the income. Line costs could be defined charges for carrying a voice call or data transmission from one point to anther point which represents the company’s largest single expense from 1999 to 2001. Being the largest, it was in reality approximately more than 50% of total expenses. This was taken particular focus by company management and other parties particularly outside analysts to find out the trends by the use of ratio of line cost expense to revenue (E/R ratio) as a way to measure the trend of behaviour of the cost to revenues . The company’s manipulation in accrual could be found in releasing the same with the required analysis even it was in excess of the amount required. Even in case of excess accruals, the company did not cause them to be effected at the time of identification. What happened rather was for certain line cost accruals to have been kept as rainy day funds and managers caused only their release when needed. It appears that everything was really in the control of the perpetrators which included key accounting and finance officers since the accounting information was almost being manipulated to serve their selfish purpose as when there is a felt need to improve results. There could only be malice for this kind of behavior since accounting information as supposed to be reported because standards require them to be such. Another manipulation in the accrual as found by investigators was the release of accruals that are applicable for other purposes thus further again understating the expenses to attain the targeted level of profitability as promised to the investors by the manipulators. The inappropriate releases of had commonality in features since they appear directed Chief Finance Officer Sullivan, Controller Myers, and Accounting Yates who are incidentally part of the finance organization in the company. Another is the fact that released occurred not during ordinary or normal day to day operations but during adjustment periods after the end of each quarter and documentation are lacking and employees involved have raised concerns at time because they knew what was indeed happening to the company. The company has fundamentally worn out available accruals at the most possible means to address the needed manipulation of line costs as reported in its financial report by the end of 2000, The following quarter of 2001 and one year after in 2002, the reduction was reached $3. 8 billion from the capitalized $3. billion as directed by its Chief finance officer. It was a clear violation of company’s capitalization policy and the generally accepted accounting standards. Sullivan when asked about the violation commented that there is the plan to ultimately reduce these apparently bloated assets accounts with a hefty restructuring charge to be effected in 2002. The practice of capitalizing operating expense would produce the effect of shifting these costs to balance sheet from income statement and the effect was to bloat income and assets at the same time. Without the capitalization, there would have been losses instead of pre-tax gain as reported. Capitalization by reduction of line cost allowed the company to have E/R ratio of about 42% in every quarter while in reality the company has exceeded 50% E/R ratio. The message that it was bringing to the stock market was that the company’s have been able to sustain profitability despite the problem in the telecommunication industry. A capitalization strategy is in fact part of the internal control but was twisted by manipulators to serve their ends, and for this reason Chief Finance Officer Sullivan needed consent from a number of people from financial and accounting departments of WorldCom. The company had its General Accounting group that is based in Clinton, Mississippi, which made actual journal entries, but the system of the company allows the creation of a swell effect from the books by adjusting databases and reports from several finance-related groups. These groups include Property Accounting group which had its base from Texas which and which as tasked to tracked company’s capital assets. Due to non-passing through the ordinary capital expenditure process, the group was called to effect the capitalizations physically in its database and on its reports. Another group from Texas, called capital reporting group had also participated responsible since it was tasked to approve capital expenditures and to track the same capital spending. It was normal to have the employees within the General Accounting group since the problems on manipulation are basically done by journal entries and their adjustments that these people became concerned about the propriety of the practice causing them to express concern to each others and some even talked of looking for outside that given the risks that they were exposed to. Fortunately, something happened and the tilt of what is good eventually came to the rescue when the Internal Audit discovered the capitalization sometime in June 2002. 2. 1. b. (2) Inflating revenues with bogus accounting entries from ‘corporate unallocated revenue accounts’). WorldCom painted itself in the market as high-growth Company, and how its revenues is going to grow is a thing that should speak for a successful company. Company’s main business is to provide goods and service which are measurable by revenues. Since revenues increase was clearly critical factor of its success, WorldCom was able to convince investors what the company was above water even if market conditions throughout the telecommunications industry were not that good in 2000 and 2001. Since investors would like to make money, it would it was very easy to dupe them into believing that the company could sustain growth. Claiming to have successfully managed industry trends which on contrary were already hurting all of its competitors, the company was wonderfully deceiving people with the promises of double-digit growth rates. It would be asserted in addition to what was stated earlier, the higher the revenues, the higher also would be the profitability if all other things like the expenses are assumed equal. But the company has already bloated revenues and deliberated understated the expenses, so that the growth in profitability was indeed tremendous to attract people to invest in the company’s stocks. The manipulators behind the schemes were therefore focus on revenue enhancement. Ebbers was found by investigators intensely to have put much efforts on revenue performance, by his receiving and closely examining revenue reports which are given to him on a monthly basis by the company’s Reporting and Accounting Group. It was starting in 1999 that the company people made efforts to bloat revenues after the end of every reporting quarter to show to users of information that it was achieving high revenue growth targets that CEO Ebbers and Chief Finance Officer Sullivan had made or wanted to happen. The bloating of revenues was basically done by making adjustments between the differences of actual and â€Å"targeted revenues† and level the same as corporate unallocated revenue accounts. In simple means the company’ management announced a target in revenues to be attained and such must be attained and presented when reporting period comes that the same will require adjusting entries and level the same as unallocated. According to investigators, the questionable revenue entries found under the Corporate Unallocated accounts reached millions or tens of millions of dollars which appeared generally only in the quarter-ending month which were recorded weeks after the quarter has ended. Between Ebbers and Sullivan, it was the second one who became concerned since revenues recorded were already masking the result of the company’s operation. 2. 1. c. Who in the company perpetrated the fraud? Discuss also the fact that the corporations CEO, Bernard Ebbers, took millions of dollars in personal loans from the corporation’s funds. Very briefly discuss the outcome of the fraud and the whole WorldCom scandal, how it was discovered, what happened to the perpetrators. Ebbers persuaded the company’s board of directors to provide him loans amounting to over than $400 millions to cover his margin calls that he failed and was ousted as CEO in April 2002 by John Sidgmore. He and other perpetrators were eventually prosecuted and convicted of crimes in relation to corporate scandals. It was discovered by the internal audit group an announcement was made for the hefty understatement of line cost in the amount of more than $3 billion. This kind of fraud in additions other understatement of lines cost by capitalization and inflation of revenues caused their perpetrators caused their freedom and they are now serving the prison sentences. The fraud was the on the damaged caused to investors who lost their money because of the fake profitability and financial condition of the business. 2. 2) Discuss in detail what controls/ internal controls were missing and/or subverted in order for this fraud/accounting failure to occur. The needed controls/internal controls that were missing and/or subverted in order for this fraud/accounting failure to occur is the independence of the auditors and integrity of the officers of the corporation. The need for independent auditors to ensure reliability of the financial statements is paramount since management not independent in many instances of their engagements and the most probable thing to happen is for management to make self-serving representation in the preparation of financial statements. The practice of accounting profession where the independent auditors will have to attest to the reliability of the financial statements requires the auditor must indeed be independent, competent and with integrity. Lacking one of these requirements would really make a big difference. It appears that the auditor of WorldCom was Arthur Andersen which had involvement with Enron which also collapsed and Waste Management Company. In fact the Security and Exchange Commission had Mr Arthur Anderson convicted at lower court but said conviction was overturned by the Supreme Court sometime in May of 2005. Although he was acquitted of the charge eventually, the fact that he was already charge and convicted is a question of character which do not have a place in the accounting profession. The role of auditors between their client and the public is one vested with public interest so that auditors must have good moral character. Since the auditor should be independent the engagement must be purely auditing or attestation service. It was possible that Andersen was maintaining secretly a special relationship with the management of WorldCom thus Ebbers and company was courageous enough to do the fraudulent act as the very nose of the regulators and the investing public. Dependable information is essential to the very existence of our society. The investor making a decision to buy or sell securities, the banker deciding whether to approve a loan, the government is obtaining revenue based on income tax returns, all are relying upon information provided by others. In many of these situations, the goals of the providers of information run directly counter to those of the users of the information. The purpose of having an auditor is for attestation function or to provide assurance as to reliability of the financial statements. Arguing to have the external auditors to protect the company assets from fraud would be sounding too simple since more than the auditors the stockholders or owners of the corporation must have also the protective or preventive attitude. In addition therefore for the need to have independent, honest and competent external auditors, the company must have also the same independent and honest officers, particularly those who are members of the audit committee and those performing money related functions. The function of company officers are part of a good internal control that any normal or good company must have so that functions would be defined and duties would be segregated or separated in such way that would provide checks and balances. This system of checks and balances are part therefore of good internal control that a company must put into effect. A good internal control must also ensuring compliance with the GAAP is by having since the two are complementary. The GAAP is an external requirement to provide the needed characteristic of information to be reliable for decision making. It is faulty to argue that a company has an efficient and effective internal control over financial reporting if it not consistent with the requirements of GAAP. The underreporting of expenses and inflating of revenues are clear violations of the GAAP since GAAP works for fair presentation of financial statement which are governed by revenue recognition principles and expense recognition principles. Under the revenue recognition principles, revenues must be properly recognized when earned. The practice of inflating revenues by adjusting entries in creating corporate unallocated revenue accounts could easily be detected if there is an effort to do so since the name of unallocated accounts is very revealing but since the perpetrators are from the very people who are to ensure the reliability of the financial statements, the standard appeared to have no power over their criminal minds. But as found in the investigation, it was the internal audit which first calls for the alarm when there was a transfer of line costs amounting to more than $ 3 billion. This means that the system of internal control of the company still allows the working of revenue recognition principle to be noticed since they found that the ratio of expenses to revenue was already too low despite the transfer of big amount of expenses to assets. The revenue recognition principle could have guided them the simple minds of auditor that it was utterly impossible to have produced those ratios. To go back to internal control, it is management’s responsibility to have it in place but the people who were governed by the procedures did not all work together to protect the company assets since some are just evil while others are perhaps touched by their conscience especially the internal audit personnel who called the alarm on the transfer of more $3 billion line costs to assets. It appears that internal control must also have the characteristic of integrity as a system since if others are honest but others are dishonest, it will still malfunction because the company appeared to have two sets of values. Every practicing accountant and auditors will agree that the purpose of the internal control is to provide assurance that its financial statements are reliable and its preparation are in accordance with the accounting standards as issued by Financial Accounting Standards Board (FASB). Since internal control policies and procedures for the maintenance of record in reasonable detail and reflecting the same in accurate and fair manner, first and foremost, the objective must be desired by management as a goal. In the case of WorldCom it is believable to assert that the company did have internal control but its implementation was clouded by the intention of the few who wanted to enrich themselves at the expense of investors. If the company has indeed proper values that are adopted and desired by its members, the company could have surmounted the internal control’s inherent limitations for its not to have prevented or detected the misstatement of revenues and expenses. 2. 3 Discuss in detail what a forensic accounting consultant (you) would have recommended or instilled to have prevented this fraud/accounting failure. pages As a forensic accounting consultant, what was needed was independence of the auditor from management. Auditors are to maintain their independence from the client as called for by their ethical standards but the moment that there is connivance, it goes pretty sure that fraud could easily happen. The work of an external auditor is separate from that of the company ac countant or even an internal auditor. Companies must reliable financial reporting system so that information should accurate and in accordance with generally accepted accounting principles (GAAP). One way of ensuring compliance with the GAAP is by having an efficient and effective internal control over financial reporting. Since it is management’s responsibility to do the same, the company must do the same with a sense of integrity as part of its defining values. . Since the purpose of the internal control is to provide assurance that its financial statements are reliable and its preparation are in accordance with the US GAAP must be become a necessity for the company to make it good. Internal control is policies and procedures for the maintenance of record in reasonable detail of information and should the reflection of the same in accurate and fair manner. This set of policies and procedure would provide assurance at reasonable level so that unauthorized acquisition or disposition of company’s asset that could materially affect financial statements are detected timely and prevented accordingly. Every company’s internal control has its own inherent limitations that may not prevent or detect the misstatement that must be watched. It is thus accepted by experts in accounting that projections of any effective evaluation to future periods could still have risk thus making the controls inadequate to respond to the needs for more reliable financial statements because of changing conditions as a necessary part of business and degree of compliance with establish procedures may decline as well. It is for this reason that the managements desiring to have the internal in effect must conduct its own evaluation of its existing internal control on its financial reporting. It cans use as framework the Internal Control – Integrated Framework as issued by the Committee of Organizations of the Treadway Commission (COSO). 3. Conclusion The story of WorldCom is a story of how greed would cause damage to people and how the accounting profession could be used as an instrument to perpetrate fraud. Theoretically, accounting is considered as the language of business and that it should provide information to help users for decision making. The basic requirement of valid accounting information is that it must be accurate or truthful. This characteristic was absent in the case of WorldCom as the accounting information was twisted to serve the interest of few people. No wonder Ebbers and company have to go to jail to suffer for the accounting fraud they have committed against the investors and for other crimes which are connected to the act of fraud. The analysis revealed to have to good internal control as requirement for providing reasonable assurance of providing information that is reliable for decision making. Said purpose must be consistent in the company’s being subjecting itself to compliance with US GAAP for the preparation of its financial statements that are reliable. The company must put and serious stand on this since the standards are meant to reconcile conflicting interest of users to prevent one user from taking advantage at the expense of the other. The set of policies and procedures from the efficient and effective internal control would provide reasonable that unauthorized acquisition or disposition of company’s assets that could materially affect financial statements are detected one time and preventive efforts could be applied accordingly. In the final analysis however, between the good internal control and the people who would implement, more weight should be given in the need for integrity and honesty of people who will implement the internal control. The maker should control what it has made. By the same principle the good internal control will mean nothing if people do not have integrity and are only seeking their selfish interest at the expense of all other stakeholders. There is no cure for greed there is a way to discourage or minimize the same by threat of strict implementation of the law. The case of Anderson who became an auditor of WorldCom appears to have not resulted to his prosecution of any crime but the auditor’ case with Enron was different. However he got himself acquitted in the higher court. Government therefore has also a role to play. It has imprisoned the perpetrators of WorldCom hence it should be a warning for many who plans to cheat investors.