Wednesday, December 25, 2019

The Global Fashion Industry Affects Society - 1376 Words

Introduction The global fashion industry affects almost everyone, from factory workers to the consumers. And with the increasing number of garments being produced as part of ‘fast fashion’ the more unsustainable this process can become. â€Å"The phrase ‘fast fashion’ refers to low-cost clothing collections that mimic current luxury fashion trends† (Joy et al, 2012, pg 274). ‘Fast fashion’ is considered to be an unsustainable way to produce clothing as it encourages a short lifecycle for the garment; with companies renewing the clothes in their stores regularly. Thus, providing the consumers with ever more opportunities to purchase the latest trend for the cheapest price. This gives people in the developed world a cheap alternative to keep up†¦show more content†¦These countries often become highly dependent on a few traded products which makes their economy very vulnerable and unstable to global fluctuations in trade and commerce. The value of the top 10 exports of clothing in 2016 (US$), is shown in the graph 1. The data indicates that China (in the Global South) is the highest exporter of clothing in 2016 with 161.4 million US$. Whereas the USA (in the Global North) is the lowest exporter of clothing with 5.7 million US$. This demonstrates the great divide between countries of the Global North and South. The EU is ranked second with 117 million US$, though this relates to exports to other EU countries and the extra-EU accounts for exports to countries outside the EU. This data indicates that many companies are using countries where it is cheaper to produce clothes. Though it is apparent that there is a shift and more garments are being produced within the EU for the EU. Graph 1 - Top 10 exports of clothing in 2016 (US$) Source: Graph 2 - Top 10 imports of clothing in 2016 (US$) Source: Graph 2 demonstrates the top 10 importers of clothing in 2016. The highest importer is the EU with 175.1 million US$ and this only includes the imports from other countries in the EU. The second largest importer is Extra-EU with 95.3 million US$, (from countries outside of the EU).Show MoreRelatedThe World A More Eco Friendly Environment917 Words   |  4 PagesThe society we live in today, has made efforts to make the world a more eco-friendly environment. For the most part, different industries have made a push to better the ecosystem. The oil industry developed a â€Å"clean† fuel refinery, a design to eliminate or minimize solid waste. The automotive industry has promoted cars that are fueled by power instead of gas, to decrease pollution, and the manufacturing industry has gone green by developing new equipment that uses less energy. It is almost as ifRead MoreDoes The Origin Of Clothing Impact Global Sustainability?1336 Words   |  6 Pages2014 Does the origin of clothing impact global sustainability? The impacts that clothing have on the global economy and environment have become increasingly prominent over the years. While consumers don’t pay attention to the origins of their clothing, the producers use tactful strategies in order to keep up with the fashion industry and save their products on the market [A]. From sweatshops to pollution, the origins of our clothing have a huge impact on global sustainability whether it be on the economyRead MoreInfluence Of Fast Fashion910 Words   |  4 Pagesintroduction of fast fashion to major clothing companies. The fast fashion world has made its way to be one of the dominating parts of consumer culture. However, the affordable clothing, as well as the introduction of fast-paced garment work, has affected more than just our wallets. Advancement of new practices and clothing availability have contributed to many new garment factories and businesses for clothing manufacturing, but it has also led to influences in cultures, environm ents, and societies within manyRead MoreImpact Of Social Media On The Fashion Industry1107 Words   |  5 PagesTo what extent does social media affect the fashion industry? Introduction This report’s aim is to attempt to investigate the impact of social media on the fashion industry as the social media users has been growing and the society today has been really around it. Businesses are also getting involved and are using social media as a promotional tool. Fashion industry, has evolved and it’s come to the point where a lot of changes are happening and where fashion trends occur frequently, social mediaRead MoreHow The Macroenvironment And The Global National Environment? Sarah Jebreen1601 Words   |  7 Pages3 - Assess the Macroenvironment and the Global National Environment - Sarah Jebreen The financial performance of any business in the clothing retail industry depends on the level of consumption and spending consumers are willing to reach, which is affected by the macroenvironmental factors. Those factors include economic, global, technological, demographic and political and legal forces. First we will start with the Macroeconomic factors. Economic factors can ether have positive or negative impactsRead MorePest Analysis of Gap Inc1178 Words   |  5 PagesGlobalization has been a current trend to every industry which also includes the apparel and fashion industry in which is due to the construction of import international facilities and establishment. It has been noted that when products are traded, regulations and policies are present. With these regulations and policies, company’s operations may be impaired. Some countries also control the entrance of foreign companies which would also affect the process of operation of these companies. LargeRead MorePest Analysis of Gap Inc1171 Words   |  5 PagesPolitics Globalization has been a current trend to every industry which also includes the apparel and fashion industry in which is due to the construction of import international facilities and establishment. It has been noted that when products are traded, regulations and policies are present. With these regulations and policies, company’s operations may be impaired. Some countries also control the entrance of foreign companies which would also affect the process of operation of these companies. LargeRead MoreManaging Product Procurement : Supply Chain1566 Words   |  7 Pagesmacroeconomic and climate change, trade interventions, some external factors in manufacture countries and foreign currency are all parts of the risk management. Fashion Fashion has a limited life cycle, and there is always some part of collection will not be able to accept for the customers. However, HM try to execute a sustainable fashion for each collection and combination the right quality with the right price. Weather The product is introduced in every season, however, if winter or summer comesRead MoreEthics of the Textile Industry1463 Words   |  6 PagesThe textile industry faces many ethical issues; unfortunately the outworking industry is a growing problem in the fashion world which often goes unheard of. While outworkers are facing poverty, Australian teenage fashion consumers are oblivious to this extreme ethical issue. Young people should be addressing the outworking industry in Australia in an attempt to improve the current and future economical and ethical situations. This essay will investigate the working conditions of outworkers, the amountRead MoreCarbon Emissions And Its Effect On The Environment1733 Words   |  7 Pagesmacroeconomic and climate change, trade interventions, some external factors in manufacture countries and foreign currency are all parts of the risk management. Fashion Fashion has a limited life cycle, and there is always some part of collection will not be able to accept for the customers. However, HM try to execute a sustainable fashion for each collection and combination the right quality with the right price. Weather The product is introduced in every season, however, if winter or summer comes

Tuesday, December 17, 2019

Evil in Mary Shelleys Frankenstein - 1462 Words

Mary Shelleys Frankenstein is very much a commentary on the Enlightenment and its failure to tame the human condition through reason. The human condition can be defined as the unique features which mold a human being. The creature is undoubtedly a victim of this predicament. He grapples with the meaning of life, the search for gratification, the sense of curiosity, the inevitability of isolation, and the awareness of the inescapability of death. These qualities and his ceaseless stalking of his master conjure up the metaphor that he is the shadow of the Enlightenment. Indeed, the Enlightenment is represented through Frankenstein whereas the creature is the embodiment of everything it shuns. These include nature, emotion, and savagery. The two characters are understood as counterparts and yet strikingly similar at the same time. The creature is considered a monster because of his grotesque appearance. Frankenstein on the other hand is a monster of another kind: his ambition, secrecy, and selfishness alienate him from human society. He is eventually consumed by an obsessive hatred of his creation. Both characters also commit primordial crimes. Although rationality pervades through Frankensteins endeavours, it can be argued that he becomes less human the more he tries to be God. The secret of life lies beyond an accepted boundary from which none can return. By creating life Frankenstein ironically sets the stage for his own destruction as well as that of his family. TheShow MoreRelated Mary Shelleys Frankenstein as a Portrait of Evil Essay1701 Words   |  7 PagesFrankenstein as a Portrait of Evil   Ã‚  Ã‚   Mary Shelleys Frankenstein is more than just a story of a creation gone bad; it is rather a story of evil that compares Victor Frankenstein to Prometheus and his monster as a God-like figure. Mary was able to do this by all of the influences that she had. These influences made her able to write a new, modern, Prometheus that did not directly call upon God, but, however, it did directly call on evil.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The influences that Mary ShelleyRead MoreGood and Evil in Mary Shelleys Frankenstein Essay853 Words   |  4 PagesGood and Evil in Mary Shelleys Frankenstein Frankenstein was written by Mary Shelley. She was born in 1797 and died in 1851. Her parents were also progressive writers, and their work would have influenced Shelleys work. Frankenstein is written in the gothic horror genre. The idea of Frankenstein actually came to Mary Shelley in a half waking nightmare. She herself said, When I placed my head on the pillow I did not sleepà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ My imagination, unbiddenRead MoreEssay on The Themes of Good and Evil in Mary Shelleys Frankenstein1346 Words   |  6 PagesHow are the themes of good and evil explored in Chapters 16 and 17 of Mary Shelley’s Frankenstein? Not only does the idea of ‘good vs. evil’ have relevance in today’s society, but some of the ideas behind the medical advances shown in ‘Frankenstein’ and the moral issues of creating new life in unnatural ways such as cloning, should we really be making life for scientific advances or should we be leaving to nature? During Chapters 16 and 17, Frankenstein is telling the sailor what the Read MoreMary Shelleys Frankenstein as a Tale of a Struggle Between Good and Evil1462 Words   |  6 PagesMary Shelleys Frankenstein as a Tale of a Struggle Between Good and Evil Mary Shelleys novel Frankenstein can be conceived as an anomaly for many things with its many underlying themes but most predominantly it is a power struggle between good and evil. The main character named Frankenstein develops a lust for knowledge early on in the novel and although this has its circumstances it is seen as an evil obligation. Mary Shelley sees Frankensteins great ambition to createRead MoreEmotional Isolation in Mary Shelleys Life and in Frankenstein1159 Words   |  5 Pagesisolation in Frankenstein is the most pertinent and prevailing theme throughout the novel.   This theme is so important because everything the monster does or feels directly relates to his poignant seclusion.   The effects of this terrible burden have progressively damaging results upon the monster, and indirectly cause him to act out his frustrations on the innocent.   The monsters emotional isolation makes him gradually turn worse and worse until evil fully prevails.   This theme perpetuates from Mary ShelleysRead More The Dangers of Science in Mary Shelleys Frankenstein Essay example1019 Words   |  5 PagesScience in Mary Shelleys Frankenstein Mary Shelleys novel Frankenstein cannot merely be read as a literary work of the early 19th century. It represents the workings of young Shelleys mind. Further, it represents the vast scientific discoveries of the time, combined with Mary Shelleys intuitive perception of science. She views science as a powerful entity, but also recognizes the dangers if uncontrolled. Shelley demonstrates this fear in the book as science drives Victor Frankenstein to createRead More Comparing Mary Shelley’s Frankenstein and Kenneth Branaghs Frankenstein1212 Words   |  5 PagesComparing Mary Shelley’s Frankenstein and Kenneth Branaghs Frankenstein Most Americans have some idea of who Frankenstein is, as a result of the many Frankenstein movies. Contrary to popular belief Mary Shelley’s Frankenstein is a scientist, not a monster. The monster is not the inarticulate, rage-driven criminal depicted in the 1994 film version of the novel. Shelley’s original Frankenstein was misrepresented by this Kenneth branagh film, most likely to send a different message to theRead MoreComparison Between Frankenstein And Mary Shelley s Frankenstein1644 Words   |  7 Pagescomparing the creature in Mary Shelley’s original novel Frankenstein to multiple newer representations. The creature is portrayed differently in almost all illustrations; unfortunately, all modern representations of the creature tend to be wrong. The creature’s physical characteristics, intellectual abilities, morals, and actions are all drastically different when comparing modern representations to Shelley’s actual portrayal of the being, and these changes can ruin Shelley’s depiction of who the creatureRead MoreHuman and Important Cautionary Guide Essay1078 Words   |  5 PagesIntroduction to Frankenstein Mary Shelley The ethical debate concerning biotechnological exploration into genetic cloning has created a monster in itself. A multitude of ethical questions arises when considering the effect of creating a genetically engineered human being. Does man or science have the right to create life through unnatural means? Should morality dictate these technological advancements and their effects on society? The questions and concerns are infinite, but so to are the curiositiesRead More Mary Shelly Essay examples1564 Words   |  7 PagesMary Wollstonecraft Shelly has written many books in her life. She has received much criticism about one of her books inperticular, Frankenstien. Frankenstein was one of her most famous novels. Shelly had written Frankenstein in order to enter a contest but what few people realized was that Frankenstein was one of many nightmares that Shelly had during her rough childhood. Shelly has become one of the most renowned Gothic authors because of her use of graphic desc riptions and settings and her

Monday, December 9, 2019

Bidding and Funding in Health Care

Question: Apply knowledge and skills of funding and organisational processes to the construction of a funding bid or strategy relating to a new nursery set up in Tower Hamlets.Learning outcomes/what to cover Contracting and funding Service level agreements Consolation and partnership working Commissioning and provision of services Framing and construction of bids Working with different funding streams in the third sector Establishing a need for services Structuring a delivery method Identifying resources Quality and policy Governance and structure Answer: Introduction A nursery is a place to nurture pre-school children of working or studying parents. The main objective is to look after children when their parents are away. It must not be taken as a business opportunity as caring about children below eight years is a daunting task which demands registration from local authority. Previously this service was more or less non-profit centric and runs on donations given by community members. But in recent period, this has been transformed into a successful business platform. The difference between this business and other business is here money always ranks second and security ranks first. The more money, demands more security. Setting up nursery requires funding in order to meet diverse need of the children. Since it is not going to provide any sort of product or service for client in a business environment, the funding remains an issue for nursery set ups. Childcare services are broadly classified into two categories such as not for profit and public s ervices(Roda et al, 2011). In general there are three types of child care services to which the parents or community looks after. They are family care, home care or day care centers. Nursery falls into day care services where programs are developed for development of children. As nothing comes in free, whether it is a profitable venture or non-profitable venture, money is required for establishment and running. The main purpose of this piece of article is to demonstrate different strategies to be followed by childcare service like nursery set up in order to bring funds and grants for successful set up and running. The essay will demonstrate how to bid for a successful money flow and different levels of agreement required for setting up nursery. The current piece of article addresses different needs and strategies of setting up nursery in tower hamlets. Contracting and Funding Contracting and funding can be a good option for XYZ nursery to be set up at tower helmets. Contracts is a term of agreement in between organization and a third party purchased either for good and services. Contract must not be considered in normal business terms as give product and take money , rather it specifies what requirements is there, how the current nursery is going to fulfill that requirement, how it will address the need and for what service they will be paid for or funded. Although, from definition it looks an easy pass, contract funding has four processes through which every organization or an entrepreneur has to get through. Commissioning The first step is to assess the need of local people as far nursery is concerned. After an initial assessment is done, the service is designed and secured. Procurement It encompass specific activities which are required to ensure smooth buying process both for client and service provider. The components consist of initial advertisement to total sealing of project(Feierabend and Staffelbach, 2015). After procurement process is done, tender application is the next crucial step. In this step nursery has to outline what is the need of the society and what is the plan of nursery and how it will be delivered. For example- if local people demands different time for leaving their children at setting, the nursery must address how shifts will be managed, human resources to be involved and how it will be done. The services to be provided will be determined based upon what service requirement has been specified from local authority. The nursery must look into the matter how the claimed service will be met and must be ready to make them understand if required. The service specifications and justifications must be strong enough to ensure the deal is set. But this process might not be good for Kidco Nursery, as it is quite small in terms of capacity and area coverage. Although, it caters to the need of local people, the population of that area also matters. Service Level Agreement Service level agreement is defined as the degree of service that will be facilitated by the nursery to be established in tower hamlet. It must be explained in simpler language, and if necessary must include technical terms with well definition to exhibit the services to be facilitated. The service level agreement must speak about perceived work of nursery, how the performance is to be expected, its operational mechanism, what are the priorities, who all will be involved, and what guarantee or warranty will be given to local authority of tower hamlet. If possible, the nursery will address the target set to reach within a specified deadline. For example- to cover minimum 300 families in a period of six months shows our level of work and growth pattern. The different components to be included in service level agreement for setting up new nursery are as follows Controlling children center and how many days per week it will operate, timing of each shifts, employment status, and number of employees to be hired, their roles and responsibilities, and financial control, etc. The service level agreement must address the potential risks and issues such as if the nursery has to be shut down temporarily for any infrastructural work then what will be the status, how the community users will be categorized and how priorities will be decided among them, security, health and safety of children and charges to be paid by the users, etc. Thus, service level agreement strengthens the bidding of nursery for funding and grants(Saraceno, 2011). Kidco nursery can incorporate this strategy to attract funding agencies, once the service level agreement is done; it is feasible to get funds from local authorities and government employees. Consultation and Partnership Working Being a new nursery, the claims must not outnumber our capacity and strength. Therefore, to adhere to our services claimed the nursery management will consult the other established nurseries in nearby district and will be working in partnership with two other big nurseries situated in other cities. For example- training of care takers is a must for setting up new nursery. The experienced ones can train the novices in a much better way than any professional service provider. Since, the management is yet to start with the nursery unit, the real time issues can be addressed only after entering into real work. To address different types of issues to be raised in future, the nursery of tower hamlet will be consulting our partners as well as local authorities for sorting out the issue. Through consultation and partnership, the management team ensures to its investors and funding agencies that it is not feasible to meet our target by working alone. To prevent any unfortunate event or issues , the set up will enter into partnership and go for regular consultation(Pecora et al, 2012). This strategy must be followed as this will build trust loyalty among its users. Working with an established name gives them a better opportunity to learn about different strategies through which they can be funded. Commissioning and Provision of Services Commissioning and procurement of services or provision of services not necessarily suits all non-profit organizations. But in the present context, the management of new nursery to be set up declares full understanding of the concepts of commissioning and provision of services. Prior to opening of nursery, the group has carried out substantial amount of research to find out the needs of local family or parents(Munn-Giddings and Winter, 2013). As per our survey data, the current level of working parents in this area stands at 65% which is very high. Out of 65%, 48% are forced to leave their children at some distanced relative home as they have no one to look after them. Thus, a nursery is demanded by those parents to look after their children. To meet the assessed needs, the nursery program was developed which not only involves taking care but simultaneously looking after proper development of child. Post funding a qualitative survey will be carried out to find out the qualitative need of children and design service as per requirement. In recent years, the number of non-public bodies facilitating public services has been increased with funding and grants. The provision of services shows the services to be provided in order to meet the need and how they will be compensated. Service provision of new nursery ensures qualified and trained staffs available 24*7 at the setting to deliver the services as mentioned in our service level agreement. The provision of services ensures long term relationship with our users and higher degree of interaction. Framing and Construction of Bids As we are providing public service, for funding and investment the nursery has to bid for funds and tender with other competitor. Therefore, it is absolutely essential to bid in best way which address the need, shows the real problems to authorities and how our service is going to meet those needs. For successful bidding the following framework is to be followed- The age group of children who will be attending the nursery and what provisions of services has been designed for each group. The safety and health services to be provided for each age group. The details of our services to be facilitated by leaflet as well as online through our webpage. The timing or operating time must be mentioned for each day of week including holidays. This will help authorities know our strengths and capability against our competitors. The timing must be justified with needs and interventions for those needs. How those needs are different from others must be addressed in the bidding structure. The bidding framework must include place of operation, valid logical reason for the place chosen for operation and how it will be managed. The details of ownership, partnership and contracts for partnership must be provided in the framework for bidding(Dursch and Muller, 2014). Bidding can be done by Kidco nursery, as it will help them as they will be identified by different agencies. Failure can lead to valuable suggestions that will ensure Kidco nursery manages to get required amount of funds for successful run in next bidding. Working with Different Funding Streams of Third Sector As we are non-profit organization it is necessary to know different funding agencies and types of funds which can be used for setting new nursery. There are three main types of funding which can be avail by management of new nursery. The first is through grant, second is through grant in aid and the third one is through a contract. In grant, the service level agreement is attached to ensure the money taken as grant will be spent on type of service mentioned and different processes involved. The grant in aid is a type of funding which must be not very specific like the above, and can be spent on different other factors which affects functionality of nursery. The third option is to go through contract, wherein a contract will be signed in between nursery and local authority to provide nursery services against a particular amount to be paid by the users and local authority in regular intervals. Since, the current project is a start-up one; the start-up grant can be availed through which the costing of set up, human resources, equipments and physical place will be funded by government agency or through different private organizations(Bergqvist and Njberg, 2013). Establishing a Need for Services Every organization or any firm first establish a need for their services in order to design services. The principle remains same for our nursery where we must establish the need for such a nursery in tower hamlet. As previously mentioned, 65% of parents are working out of which 48% have no body to look after their children. In such cases, the amount of care which must be given to the child is usually not provided. As parents look after financial status of their family, they are forced to send their children to nearby neighbor house or distance relatives. In such cases, the development of child is hampered due to negligence in care and development. The timing of their food and other requirements gets disturbed which also affects their health. In due course of time, the mental status of child also gets hampered. These issues show there is a need for nursery service where parents can leave their child with minimal tension and can take their child post job session happily. To address the above mentioned need, the nursery must be set up(Harowitz et al, 2014). Structuring of Delivery Services Structuring of delivery of service is a very important process in nursery set up. In most cases absence of such structured delivery systems reduces the chance of success and in turn leads to failure of the project. When a service delivery is structured, it provides a necessary insight into real time problems, issues, barriers and promoters with achievement of each delivery system. For the current project the deliverables such as choosing of place, establishment of facility, safety guidelines meeting, hiring of trained staffs must be carried out sequentially and logically. For example establishment of physical facility with all safety guidelines must be showed to funding agency within a given time period(Alfrod and Oflyn, 2012). As a result, this will help in more funding due to systematised work process and achievement of targets within deadline. Similarly, with each delivery of service and process within the service the real time issues can be discussed and interventions can be made to avoid such issues in future. For example- hiring of staffs might not get completed within target deadline as this job requires highly patient personalities. The issues faced during the project can be addressed before our next project which reduces our time requirement and enhances efficiency. Knowing Resources To deliver services claimed by our management, knowing resources within and resources outside is an extreme necessity. Resources in a group are much higher and can be used potentially to deliver service which cant be realized by individuals of that group. Each person in the group differs in their expertise and strength areas. Therefore, knowing each individuals strength and how they can be used in service delivery helps in efficient allocation of human resources(Collins, Fischer, Nalich, 2014). This demand before establishing the nursery Kidco nursery must recognize its own potentials. For example- establishing nursery requires persons with an experience of taking tantrums of children and yet patiently interacting with them. Not necessarily each and every individual in the team possess such personality. It can be facilitated by group effort which lessens the burden upon single individual. Thus, a common goal can be created and the whole team can commit to achieve the goal. Similarly, it is important to address the external resources which can be beneficial for our nursery set up program. Arranging fund raising awareness or campaign in locality with one or two influential personalities can bring good amount of funding to our project which will help us in easy establishment of nursery(Landry et al, 2014). Quality Policy and Governance The standards of service to be provided must meet the legal and health department guidelines for a particular region. Maintaining and adhering to quality policies demonstrates our commitment towards quality service facilitation to locality. Thus, a quality manager will be hired in order to inspect and maintain quality as per norms. For example- the drinking water system must meet stringent criteria set by health department and time to time external audits can be done by the funding agencies. The transparency in quality policy will help us in providing better service in a reasonable price range. The governance must be done by a board of members which must include two members from funding agencies(Bergqvist and Njberg, 2013). This has to be done in order to keep a check upon different process and procedures to be followed at the center. Conclusion The nursery set up will be a successful project if the above mentioned points are done while bidding and tendering for funds. The process must be transparent in order to raise more funds and must address different loopholes. Partnership must be sought in order to be a successful nursery in tower hamlet and provide quality service to the local authorities. References Alford, J., O'Flynn, J. (2012).Rethinking public service delivery: Managing with external providers. Basingstoke: Palgrave Macmillan. Bergqvist C., Njberg, A. (2013). Welfare state restructuring and child care inSweden.Child care policy at the crossroads: Gender and welfare state restructuring, 287. Collins, C. C., Fischer, R., Lalich, N. (2014). Enhancing Child Care for Children with Special Needs Through Technical Assistance.Journal of Family Strengths,14(1), 9. Drsch, P., Mller, J. (2014). Bidding for Nothing? The Pitfalls of overly Neutral Framing. Feierabend, A., Staffelbach, B. (2015). Crowding Out Reciprocity between Working Parents and Companies with Corporate Childcare.Human Resource Management. Horwitz, S. M., Hoagwood, K., Stiffman, A. R., Summerfeld, T., Weisz, J. R., Costello, E. J., ... Norquist, G. (2014). Reliability of the services assessment for children and adolescent Landry, S. H., Zucker, T. A., Taylor, H. B., Swank, P. R., Williams, J. M., Assel, M., ... Klein, A. (2014). Enhancing early child care quality and learning for toddlers at risk: The responsive early childhood program.Developmental psychology,50(2), 526. Munn-Giddings, C., Winter, R. (2013).A handbook for action research in health and social care. Routledge. Pecora, P. J., Whittaker, J. K., Maluccio, A. N., Barth, R. P. (2012).The child welfare challenge: Policy, practice, and research. AldineTransaction. Roda, C., Barral, S., Ravelomanantsoa, H., Dussaux, M., Tribout, M., Le Moullec, Y., Momas, I. (2011). Assessment of indoor environment in Paris child day care centers.Environmental Research,111(8), 1010-1017. Saraceno, C. (2011). Childcare needs and childcare policies: A multidimensional issue.Current Sociology,59(1), 78-96.

Monday, December 2, 2019

The Lake Essay Example For Students

The Lake Essay The LakeIt was early July and my friend Chad and I decided to join his family at the lake. Chads family was already up at the lake, and had some extra room in the condo. So we figured, what the hell, we could go for some boating. Right. The lake the only about a two-hour drive away. We were driving in Chads fathers convertible sports car, so the drive was quite pleasant. We drove through twisting canyons and long straight roads going just slightly over the speed limit. We arrived at our destination at record-breaking time, which didnt seem to make his parents too happy. Along with Chads family, which consists of four brothers and one sister, were some neighbor friends of theirs and their five-year-old son Nick. The rest of the day was spent miniature golfing and playing catch with Chads little brothers. On the following morning we went with Chads parents to rent the boat. We got the boat and loaded it up with the gear. We broke the family into groups so each one could have their own time on the boat. Our group was the one that wanted to ski, wake board, ride on the tube, and throw each other off the tube. The other group consisted of people that either didnt want to ski or were too young. All the younger kids were in this group. Our group was the first to have the boat. We spent hours and hours out on the lake and had an awesome time, even though I got one of the worst sunburns in my life. We returned with the boat so the other group could take their turn. As the second group left on the boat we decided to just go lounge in the swimming pool. After about a half-hour, Chads mom came running in and said they had an accident with the boat and that little Nick was knocked unconscious. We ran from the pool to see what exactly happened. Chads sister told us that another boat was traveling way too fast in the no-wake zone while not paying attention and struck the front of our boat. When the boats collided it took everyone a few minutes to notice that Nick was lying fa ce down on the floor of the boat. Panic arose when his mother noticed him lying there motionless. It turned out the other boat actually hit this little boy in the head when they collided. We were all in shock that something like this could happen. The ambulance arrived shortly after the accident and started to work on reviving poor Nick. I remember walking back to the condo with Chad, lightly joking about the situation, saying, wouldnt that suck if Nick died. We were sure he would be fine and awake with a horrible headache at anytime. Hours passed and soon we saw a helicopter that seemed to be flying really low. We then noticed that the helicopter was Life-Flight. We were confused; he just bumped his head, right? What do they need Life-Flight here for? As the time slowly passed we heard that the crew was trying to stabilize his life signs and that there was some hemorrhaging of the brain. Life-Flight finally took off and got him to a hospital. We all went to bed that night silently, just thinking about what had taken place that day. Why it had happened to him? Hes only five years old. Perhaps if someone older would have gotten hit they would have been fine. I awoke in the morning to the sound of the phone ringing, and it gave me a queasy feeling in my stomach. I could only hear half of the conversation, but I understood enough to know what happened. Little Nicholas never awoke from the coma. That moment in my life made me realize just how fragile life is. To this day I cant help but think, what if it would have been me? Would I have been all right because I was older? Or would the same thing happen to me or anyone else. That was the last time I went to that lake. I dont know when, or even if, I will ever go back. .uc03e99aa2213c4ce7b9107645d0741ec , .uc03e99aa2213c4ce7b9107645d0741ec .postImageUrl , .uc03e99aa2213c4ce7b9107645d0741ec .centered-text-area { min-height: 80px; position: relative; } .uc03e99aa2213c4ce7b9107645d0741ec , .uc03e99aa2213c4ce7b9107645d0741ec:hover , .uc03e99aa2213c4ce7b9107645d0741ec:visited , .uc03e99aa2213c4ce7b9107645d0741ec:active { border:0!important; } .uc03e99aa2213c4ce7b9107645d0741ec .clearfix:after { content: ""; display: table; clear: both; } .uc03e99aa2213c4ce7b9107645d0741ec { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uc03e99aa2213c4ce7b9107645d0741ec:active , .uc03e99aa2213c4ce7b9107645d0741ec:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uc03e99aa2213c4ce7b9107645d0741ec .centered-text-area { width: 100%; position: relative ; } .uc03e99aa2213c4ce7b9107645d0741ec .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uc03e99aa2213c4ce7b9107645d0741ec .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uc03e99aa2213c4ce7b9107645d0741ec .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uc03e99aa2213c4ce7b9107645d0741ec:hover .ctaButton { background-color: #34495E!important; } .uc03e99aa2213c4ce7b9107645d0741ec .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uc03e99aa2213c4ce7b9107645d0741ec .uc03e99aa2213c4ce7b9107645d0741ec-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uc03e99aa2213c4ce7b9107645d0741ec:after { content: ""; display: block; clear: both; } READ: Essay about The Bias of Communication: Media and Bias Essay We will write a custom essay on The Lake specifically for you for only $16.38 $13.9/page Order now

Tuesday, November 26, 2019

Explain the Main difference between Act and Rule Utilitarianism (it can also be used to explain the main difference between Bentham and Mill)

Explain the Main difference between Act and Rule Utilitarianism (it can also be used to explain the main difference between Bentham and Mill) Explain the main differences between Act and Rule UtilitarianismUtilitarianism is a theory, which first became widely acknowledge when it was adopted by its greatest advocate Jeremy Bentham. It is a theory that maintains that it is an action's total consequence that determines its moral correctness. It is a theory not concerned with the effects of the action on the individual carrying out the action, but instead the effect it has on everybody affected by the action. It also maintains that it is happiness that is key to life's conquest, and hence happiness that is the determination of right or wrong. Very simply if an actions consequence cause happiness, then the action is right, if it causes pain, or destroys happiness then the action is wrong. The main philosophy of the theory of Utilitarianism is to create the greatest happiness for the greatest number.Jeremy Bentham, and his disciple John Stuart Mill have become recognised as the two greatest sponsors of Utilitarianism.From http:/ /hypernews.ngdc.noaa.govBentham is known for his popularisation of the more traditional version of the theory, know as Act Utilitarianism. Although a student of Bentham, Mill could see problems in what he was being taught and so began to develop his own views on Utilitarianism, which are now known as Rule Utilitarianism.Bentham was a great traditionalist believer in the expression, "the greatest good for the greatest number." Bentham called this principle the principle of utility. With "utility" here referring to the tendency of an action to produce happiness, not its usefulness. It is the aim of Act Utilitarianism to fulfil to the greatest extent the principle of utility.Act Utilitarianism focuses solely on the consequences of the action. The motives and the reasons why actions are carried out are trivial in determining the moral rightness of the action;...

Saturday, November 23, 2019

Arab Americans Populations by State

Arab Americans Populations by State As a bloc, the 3.5 million Arab Americans in the United States are becoming an important economic and electoral minority. The largest concentrations of Arab Americans are in some of the most contested electoral battlegrounds of the 1990s and the 2000s - Michigan, Florida, Ohio, Pennsylvania and Virginia. In the early 1990s Arab Americans tended to register Republican more than Democratic. That changed after 2001. So have their voting patterns. The largest block of Arab Americans in most states is of Lebanese descent. They account for a quarter to a third of the total Arab population in most states. New Jersey is an exception. There, Egyptians account for 34% of the Arab American population, Lebanese account for 18%. In Ohio, Massachusetts, and Pennsylvania, Lebanese account for 40% to 58% of the Arab American population. All these figures are based on estimates by ​Zogby International, conducted for the Arab American Institute. A note about the population estimates in the table below: ​Youll notice quite a disparity between the 2000 Census Bureau figures and those of Zogby in 2008. Zogby explains the difference: The decennial Census identifies only a portion of the Arab population through a question on ancestry on the census long form. Reasons for the undercount include the placement of and limits of the ancestry question (as distinct from race and ethnicity); the effect of the sample methodology on small, unevenly distributed ethnic groups; high levels of out-marriage among the third and fourth generations; and distrust/misunderstanding of government surveys among more recent immigrants. Arab American Populations, 11 Largest States Rank State 1980Census 2000Census 2008Zogby Estimate 1 California 100,972 220,372 715,000 2 Michigan 69,610 151,493 490,000 3 New York 73,065 125,442 405,000 4 Florida 30,190 79,212 255,000 5 New Jersey 30,698 73,985 240,000 6 Illinois 33,500 68,982 220,000 7 Texas 30,273 65,876 210,000 8 Ohio 35,318 58,261 185,000 9 Massachusetts 36,733 55,318 175,000 10 Pennsylvania 34,863 50,260 160,000 11 Virginia 13,665 46,151 135,000 Source: Arab American Institute

Thursday, November 21, 2019

Strategic plans for American car manufacturer Chrysler Essay

Strategic plans for American car manufacturer Chrysler - Essay Example However, in 1970s, oil crisis led to a high demand in oil efficient vehicles. In the year 2009, the third largest automobile manufacturer filed for bankruptcy. This essay is based on a case study analysis of the management aspects of Chrysler and develops recommendations that can improve the profitability of the automobile manufacturer. The company hired a new leadership in 1978. The new management team initiated cost-cutting measures which includes shutting down some plants, temporary layoffs, scaling down nonproductive plants and stopping a number of employee benefits. The company appealed for a federal loan as the debt escalated. The loan revamped the company has the product line of the company begun to expand again. The company embarked to manufacturing fuel efficient cars and passenger vehicles. The company entered into a strategic alliance with Samsung in 1987 and increased its shareholding in Mitsubishi motors’ corporation (Zaccaro & Klimoski 2001). The company was struggling to stay afloat even after receiving financial aid from a federal loan of $ 4 billion in 2009. The federal government insisted that the company had to merge with Fiat in order the get additional funding of $ 2 billion. This additional funding request was one of the strategies to ensure that the long-term viability of the company is ensured (Hampton 2009). The management was requested to cut the costs through negotiating with both united auto workers and Canadian auto workers. The failure of the debtors of agrees on debt restructuring caused the company to file for bankruptcy. The company is seen as suffering from poor business management. Besides, the Japanese cars were smaller, oil-efficient and had competitive prices. The Japanese cars had a better performance. This led to a decline in the sales of the Chrysler products. The company has a history of failing to respond decisively to the prevailing challenges. This has caused the other competitors to take

Tuesday, November 19, 2019

UCR and NCIC Essay Example | Topics and Well Written Essays - 500 words

UCR and NCIC - Essay Example The NCIC started out its operation by helping law enforcement in the apprehension of fugitives and helping to locate property that was stolen (â€Å"Public Safety†). Since the NCIC database consists of information about humans and property, the database includes 18 files, which contain this information. Records for articles and other properties such as vehicles, guns, boats, among others, are found in seven files, while the remaining 11 files consist of person records, including fugitives, sexual offenders, gang members, wanted persons, terrorist groups, among others. To back up the files, this database also includes images to assist law enforcement agencies in the identification of people and property (â€Å"Public Safety†). The NCIC can be used in a variety of ways. For instance, during a traffic stop, a law enforcement officer can instantly check the NCIC records to verify if a particular vehicle in the traffic stop was stolen, or if it is being driven by a criminal. The NCIC therefore, serves an important purpose of availing an electronic database, which can be accessed by various criminal justice agencies for inquiries, and information on crime and criminals from other agencies. The information in the NCIC therefore, helps law enforcement and authorized agencies to locate missing persons and stolen property, identify criminals, and protect the law enforcement personnel (â€Å"Public Safety†). The Uniform Crime Report (UCR) was established in the United States out of the need for tracking changes in the rate of crime at the state and national level. This program mainly collects data about crime instances reported by various law enforcement agencies in different states. The Federal Bureau of Investigation (FBI) is responsible for the collection and publishing of this crime data annually. These publications however, vary depending on the state, type of crime, and nature of criminals. The most popular and biggest annual

Sunday, November 17, 2019

Jain Architecture Essay Example for Free

Jain Architecture Essay Summary Jainism is a religion, based on ‘non violence’ and ‘self control of the human senses’. It has its origins in India. Jains are idol worshippers, and a temple is a place where this worship is carried out. Jain places of worship in India are unique in many respects. Temple cities are built atop hills at a considerable height from the sea level. Palitana, Delvada and Sametshikhar are classic examples of cluster of temples built on the top of hills. These were built during the times when the only technology available was hand work. Ranakpur and Shramanbelgoda are other classic examples of architectural masterpieces emerging out of devotion to idol worship. A photographic exhibition on these five sites is proposed. It will try to explain the uniqueness of temples at each of the sites. It would be an effort to demonstrate to the world, the marvelous results faith can bring. Attention would also be paid to the extensive use of marble as a material of faith ( the idols) construction ( the structures) and decoration ( the pillars and the domes) of Jain temples. The team will visit each of the sites and shoot the required still pictures. Specialists on each of sites will be personally interviewed to understand the architecture of each site as a form of art. So far, much work is not done on documentation of Jain architecture. Nor is there any authentic analysis available to see them as a form of art. For examples the basic geometric principles of Jain temples are hardly documented. The final form of the exhibition will be a series of still photographs, sketches or drawings or maps supplemented by text. This will make a comprehensive presentation of Jain temples as a form of art. Scope: The scope of this exhibition is to communicate the uniqueness of Jain architecture, mainly the five most popular sites in India, namely, Sametshikhar, Palitana, Delvada, Ranakpur and Shramanbelgoda. The medium used is still photography, supported by drawings, sketches and written text. All the photographs will be shot on 35 mm format. All the information will be displayed on panel size 4 ft X 3 ft. Each site will be allotted 10 panels, making it 50 panels in total. Each temple site will be documented as an independent module, to facilitate erection at any place in future. Leaving proper space between two modules will ensure a smooth human flow, while the exhibition is on. The exhibition is not to be viewed from a religious or a philosophical point of views, but as a form of art. It will expose the onlooker to how Jains incorporated the element of art into their ‘places of worship’. All the five sites chosen for this exhibition are in India. Sametshikhar, in the state of Bihar, can be compared to Mecca of Jains. This is the place where most of the 24 ‘tirthankars’ of Jains, attained their ‘nirvan- freedom from the cycle of rebirth’. Temples are built on the top of an array of hills as a mark of respect to each of them. Palitana, in the state of Gujarat, is a city of temples on the top of a hill, where the first ‘ tirthankar’, prayed. Delvada, at Mt. Abu in Rajasthan is well known for its intricate hand carving of large marble columns and the domes. Ranakpur, at the foot of Aravalli hills in Rajasthan, is again a rare piece of architectural marvel. It is a four sided temple, with 1,444 hand carved marble columns, in its interior. No art symbols on any of the columns are duplicated. The ceilings and the domes are also carved with symbols representing Jain beliefs. Shramanbelgoda, in the state of Karnataka in South India, is not a closed temple, but a single, huge idol of Bahubali. This idol is believed to be carved out of single piece marble. Temple complex at Palitana ( clipart ) ( ref. No. 1 ) Close up view of column carving at Delavada Dome carving at Delavada ( clipart ) ( clipart) ( ref.No. 2) ( Ref. No. 3 ). Temple complex- Delwada ( clipart) ( Ref. No. 4) Temple complex – Ranakpur ( Clipart) ( Ref. No. 5) Few of the 1444 pillars at Ranakpur ( Clipart)(ref6) Dome carving at Ranakpur(Clipart) ( Ref 7) Pillar carvings – Ranakpur ( Clipart ) ( re no. 8) Idol of Bahubali, Sramanbelgoda ( Clipart )(ref 7) A team consisting of experts in still photography, freehand sketching, documentation will be visiting these sites personally in India. They will also interview and talk to people who are experts on each of the sites. The same team on return, will edit the visual and the text material and prepare the final panels. This team will also be present at the site wherever this exhibition is held, to personally brief the visitors on the subject. This exhibition must happen, because of the uniqueness of its subject. Perhaps there is no such collective documentation existing, as yet. It would surely enlighten the onlooker. Works-cited page 1. Clipart , Clip Arts from Jain temples/Pilgrimage places, Retrieved on 1 May 07 from: http://www. jainworld. org/pictures/temples .

Thursday, November 14, 2019

Comparing the Salem Witch Trials, European Witchcraft Craze and the McC

Comparing the Salem Witch Trials, European Witchcraft Craze and the McCarthy Hearings The evidence of witchcraft and related works has been around for many centuries. Gradually, though, a mixture a religious, economical, and political reasons instigated different periods of fear and uncertainty among society. Witchcraft was thought of as a connection to the devil that made the victim do evil and strange deeds. (Sutter par. 1) In the sixteenth, seventeenth, and twentieth century, the hysteria over certain causes resulted in prosecution in the Salem Witch Trials, European Witchcraft Craze, and the McCarthy hearings. These three events all used uncertain and unjustly accusations to attack the accused. The Salem witch trials in Massachusetts Colony lasted from 1692 to early 1693. Even before the witchcraft trials, Salem Village was not exactly known as a bastion of tranquillity in New England. (Sutter par.2) There was a population of over six hundred that was divided into two main parts; those that wanted to separate from Salem Town and those that did not. They divided themselves into the eastern and western parts of the town. With this tension and an unfortunate combination of economic conditions, congregational strife, teenage boredom, and personal jealousies, (Oliver par. 2) Salem became unstable. When Elizabeth Parris and Abigail Williams, Reverend Samuel Parris's daughter and niece, started to exhibit strange behavior including convulsive seizures, screaming, and trances, (Oliver par. 2) and the doctor declared that the girls were under the influence of the devil, the townspeople believed him. This could be because there was an Indian War ranging less than seventy miles away, and with many refugees from the war were in tha... ...uring the McCarthy hearings, people were prosecuted for being communists even without valid proof just as in the two witchcraft crazes, people were prosecuted for being witches without valid proof. All three were caused mainly of fear of the so-called evil. During a time of crisis, people turn to extreme solutions. The witchcraft hysteria of the sixteenth and seventeenth centuries and the McCarthy hearings are only three examples of how people can try to prosecute those they fear by assumption and without valid proof. The witchcraft hysteria should warn us to think about how best to safeguard and improve our system of justice to avoid unjustly trials that lead to unfair prosecution. These trials come to show as a reminder of how politics, family conflicts, religion, economics, and the imagination and fears of people (Sutter par.1) can yield tragic consequences.

Tuesday, November 12, 2019

Electronic Health Record (EHR) System Potential Threats and Measures Taken to Protect It

Since the early 1980s, information technology have improved and revolutionized every aspect of our lives. We use information technology to do our daily chores like shopping and reading the latest global news at the comfort of our living room. It replaces old challenges with new possibilities. However, one of the areas that had evolved to this new demand in information technology but rather in a slow phase is the healthcare industry. Today’s healthcare includes hospitals and private clinics. A lack of an effective management of data about a disease and the treatment for saving lives can be put at risk. In previous years medical information was stored only on paper and in one location, usually a patient's primary care physician's office or medical institute. People tend to migrate to a different area or country, thus making it difficult to transfer piles of paperwork and medical records to every point of medical institution which a patient is seeking treatment. It is even more complex when most patients visit more than a single physician or an institution and the process of being treated by a different number of nurses, consulting specialists, diagnostic technicians and administrative staff. Paper-based medical record systems are also adding the unnecessary expense to a medical institution. Registration clerks, nurses spend precious time away from patients attending to huge piles of paperwork. This adds up an enormous financial burden inclusive for the storage of the medical records and wages for the administrative support staff. Miss-kept or missing medical records adds to the lost of precious time and can lead to unnecessary or duplicating of clinical tests. However, until recently, usage of information technology has increased and become prominent part of the healthcare industry. Many large hospitals and private hospitals have made the transition from old-school paper medical records to EHR, Electronic Health Record System. Early stages of an EHR System were base on a simple side but have advance tremendously. Now EHR System is Web-based which are accessible across networks and utilizing GUI, Graphics User Interface for interactivity. Web-based EHR are easy to use, have the capabilities to organize and link information, strong multimedia presentation capabilities, works on most hardware platform and operating system in the market; which communicate through the Internet and provide access to medical records using web browsers and web technologies. Jamie R. Steck(1998), Director of IT from the Central Utah Clinic stated that â€Å"Efficiency has increased dramatically. We did an in-motion study in our records room, which showed that filing electronically is 80 percent more efficient than filing manually, and we’ve seen proof of that on a daily basis. Study shows that EHR is more efficient than the normal process of filing the paper-medical records. Health institution of many sizes faces many demands and challenges when making the transition from paper records to EHR. Healthcare institutions are working hard to reduce their reliance on handwritten records. EHR has improved patient care through greater and qui cker access to patient information thus reducing medical errors due to paper-records. It also significantly reduces test result and patient wait-times with a faster and more efficient workflow. It also reduces record-keeping time thus decreasing paperwork for administrative staff. EHR establish a better information and improved communications in a medical institution. It reduces the possibility of misplaced and lost records thus ensuring the patient record; test results are available when needed. It reduces cost on paper and supply. But just as much as its ancestor, EHR are subjected to privacy violations. Today, healthcares systems in developed countries are changing dramatically. These countries are looking into more inexpensive communication means using the internet to achieve a more efficient and high quality EHR. With the increase of health care system on information technology, we must also look into the increasing number of threats resulting from distribution and the implementations of the EHR System. Patients and doctors are aware of the security requirements base upon the system with the usage of communications over open and insecure network such as the internet. There are concerns over the privacy and security of electronic health information and they fall into two general categories: â€Å" 1. concerns about inappropriate releases of information from individual organizations 2. oncerns about the systemic flows of information throughout the health care and related industries† – National Research Committee (1997, p. 54) The first category can result either from an authorized users who intentionally or unintentionally access or distributes information in violation of the institution policy or from hackers who break into a institution’s computer system. The second categ ory refers to the open disclosure of patient health information to parties that may act against the interests of the patient or may also be alleged as invading a patient’s privacy. EHR stored at medical institution are vulnerable to internal or external threats. Internal threats includes authorized system users or medical personnel who abuse and misuses their privileges by accessing information for inappropriate reasons such as viewing their friends, neighbors, colleagues or to leak information to the press for spite, revenge, or profit. External threats or unauthorized access, which is related to the open architecture of Internet, sometimes by vindictive former employees, angry patients, network intruders, hackers or others may steal information, damage systems, or disrupt operations. Till today, there have been modest amounts of evidence to gauge the exposure of EHR to external attacks as there are still no tools for detecting attacks on EHR in the healthcare industry. In a case reported by Marbach, William D. (1983), so-called â€Å"414† group broke into a computer system at the National Cancer Institute in 1982, although no damages were reported. Study by the Federal Bureau of Investigation and the Computer Security Institute (CSI), CSI Director Patrice Rapalus(1996, p. 2) said, â€Å"The information age has already arrived, but most organizations are woefully unprepared . . . making] it easier for perpetrators to steal, spy, or sabotage without being noticed and with little culpability if they are. † Set of laws are being introduced for patient record privacy put strict demands on healthcare providers to protect patient information while using EHR while sharing the information with other patients. Six main factors are integrity, dependability, av ailability, confidentiality, authenticity and accountability. Patient records involves very sensitive data, which should only be disclosed to authorize users, thus confidentiality of the required data is essential. Integrity and availability of the services are also important. To accomplish the desire measure of information system security, a range of security policy models have been proposed and implemented in healthcare. One of the most widely use of security policy being adopted by medical institutions to protect patients information in a EHR System is the Role Based Access Control policy. Role Base Access Controls (RBAC) is the common policy being used in an ERH System. These include two basic types of access control mechanism that are used to protect data which are discretionary access control (DAC) and mandatory access controls (MAC). DAC is very supple hence it is not suitable for protection of health records. MAC on the other hand is stricter, allowing ample space for flexibility and it requires all users handling the records to follow a set of rules administered by the system admin. RBAC in EHR System should have the advantages of both DAC and MAC. With the RBAC approach, EHR System should adopt the roles and the authorization management in its system. In RBAC, it identifies which staffs in a medical institution are authorized to view a patient medical record. It restricted the data from being abuse or falling to the wrong hands. Each and every medical staff in a medical institution are assigned a specific role and operates the EHR System according to their role. Medical staffs are only allowed to view patients’ record that they are allowed to access. Not all data are being revealed to the every role. G. Pangalos(1998) states that: â€Å"EHR System identifies the following roles in its system: 1. Patients. They have access to their own health institution, personal and demographic data. 2. Physicians. Main Users of EHR System. Make diagnosis, admissions and treatment. Act on behalf of patients. 3. Doctors. Responsible for the laboratory tests and evaluation results. 4. Nurses. Responsible for providing daily care to patients. Don’t need to know any sensitive personal patient data. 5. Other Healthcare Professionals. Responsible to perform treatments for example psychiatric consultation. 6. Administration. Responsible for collection of the administrative, social, personal and non-personal demographic and insurance information about the patient. 7. Local authorities. Specifically Government bodies have access to health records for research or investigation purposes and any sensitive personal data will not be reveal. Department of Health and Human Services (1998), in the proposed rule for security and electronic standards, â€Å".. each organization that uses communications or networks would be required to protect communications containing health information that are transmitted electronically over open networks so that they cannot be easily intercepted and interpreted by parties o ther than the intended recipient, and to protect their information systems from intruders trying to access systems through external communication points†. (vol 63, No 155) As of the statement above given by the Department of Health and Human Services, all information that are sent over the internet must only be accessed by authorized receiver. Today’s technologies allow users to prove their authenticity and with data encryptions allow data to be transmitted safely over the medium. Data encryption should be at a satisfactory level of security to protect against intruders, thus data integrity have been compromised. User authentication must also be present with the encryption and data transmission process to ensure that the data sent are received by authorized receiver. Other than data encryption, a good firewall should also be implemented on the database server to avoid external intruders from accessing unauthorized data. Although these policies and counter measures are being implemented, unauthorized data leakages do still prevails. Medical records of celebrities and famous people are sought after by the media around world. This is due to the interest of people and money. So patient plays a part in protecting their own medical records. They have to put their trust in the medical institution where their records are being kept.

Sunday, November 10, 2019

Pnb Project Report

Research Project on Application & Management of Information System in Punjab National Bank IN PARTIAL FULFILLMENT OF MASTER’S DEGREE IN BUSINESS ADMINISTRATION INDRAPRASTHA UNIVERSITY (2008-2010) Submitted by: Pratik Jain — 0781563908 Northern India Engineering College (N. I. E. C), Delhi Under the valuable guidance of: Mrs. Shaveta Kumar (Faculty, N. I. E. C) Subject: Information System Management Course Code: MS-205 Submitted on: 30 17 November, 2009 AcknowledgementThis formal piece of acknowledgement is an attempt to express the feeling of gratitude towards people who helped me in successful completion of research project. I would like to express my deep gratitude to Mr. B. D Sharma (branch manager, PNB), for his constant co-operation. He was always there with his competent guidance and valuable suggestion throughout the pursuance of this research project. Special thanks to Mrs. Shaveta Kumar, my internal coordinator who guided me to work honestly and to give valuabl e suggestion for improving my work.Above all no words can express my feelings to my parents, friends all those persons who supported me during my project. I would also like to thank almighty God for his blessings showered on me during the completion of project report. INDEX | | | | | |S. NO |Sub Topic |Topic Name |Page Number | | |S.NO | | | |1. |Acknowledgement |2 | |2. |COMPANY PROFILE | | | |1. |Origin – Punjab National Bank |4 | | |2. |Profile |5 | | |3. Vision and Mission |6 | | |4. |Financial Performance Comparison |7 | |3. |INFORMATION SYSTEM IN PNB | | | |1. |History of Information System in PNB |8 | | | |1. 2000- The Beginning | | | | |1. b 2001-2003- Long Term Strategy | | | | |1. c 2004-2007- Growth | | | | |1. d 2008- Rural Initiative | | | | |1. 2009- 100% CBS Implementation | | | |2. |Other Banking Applications |12 | | | |2. a Straight to Processing (STP) | | | | |2. b Depository Setup | | | | |2. Bank Mate & EDI | | | |3. |PNB IT Setup |13 | | | |3. a S ystems | | | | |3. b Network Design | | | | |3. Storage, WAN & Connectivity | | | | |3. d Security Systems | | | | |3. e Hardware & Software Resources | | | |4. |Organizations Other Computing Resource |15 | | | |4. Payroll TPS | | | | |4. b Online Assistance | | | | |4. c Account Opening – MIS | | | | |4. d SPNS, RTGS & Mobile Alert Service | | |4. IMPACT OF INFORMATION SYSTEM | | | |1. |Finacle’s Impact |16 | | |2. |Impact on Employees, Customers |17 | |5. |Available Alternatives |18 | |6. |Conclusion |19 | |7. Suggestion |20 | |8. |References |21 | Company Profile – Punjab National Bank Origin Established in 1895 at Lahore, undivided India, Punjab National Bank (PNB) has the distinction of being the first Indian bank to have been started solely with Indian capital.The bank was nationalized in July 1969 along with 13 other banks. From its modest beginning, the bank has grown in size and stature to become a front-line banking institution in India at pre sent. |[p|A professionally managed bank with a successful track record of over 110 years. | |ic| | |] | | |[p|Largest branch network in India – 4668 Offices including 432 Extension Counters spread throughout the country. |ic| | |] | | |[p|Strategic business area covers the large Indo-Gangetic belt and the metropolitan centers. | |ic| | |] | | |[p|Ranked as 248th biggest bank in the world by Bankers Almanac, London. |ic| | |] | | |[p|Strong correspondent banking relationships with more than 217 international banks of the world. | |ic| | |] | | |[p|More than 50 renowned international banks maintain their Rupee Accounts with PNB. |ic| | |] | | |[p|Well equipped dealing rooms; 20 different foreign currency accounts are maintained at major centers all over the globe. | |ic| | |] | | ProfileWith its presence virtually in all the important centers of the country, Punjab National Bank offers a wide variety of banking services which include corporate and personal banking, industria l finance, agricultural finance, financing of trade and international banking. Among the clients of the Bank are Indian conglomerates, medium and small industrial units, exporters, non-resident Indians and multinational companies. The large presence and vast resource base have helped the Bank to build strong links with trade and industry.With over 38 million satisfied customers and 4668 offices, PNB has continued to retain its leadership position among the nationalized banks. The bank enjoys strong fundamentals, large franchise value and good brand image. Besides being ranked as one of India's top service brands, PNB has remained fully committed to its guiding principles of sound and prudent banking. Apart from offering banking products, the bank has also entered the credit card & debit card business; bullion business; life and non-life insurance business; Gold coins & asset managementsbusiness,setc.Since its humble beginning in 1895 with the distinction of being the first Indian ba nk to have been started with Indian capital, PNB has achieved significant growth in business which at the end of March 2009 amounted to Rs 3,64,463 crore. Today, with assets of more than Rs 2,46,900 crore, PNB is ranked as the 3rd largest bank in the country (after SBI and ICICI Bank) and has the 2nd largest network of branches (including three overseas offices).PNB has always looked at technology as a key facilitator to provide better customer service and ensured that its ‘IT strategy’ follows the ‘Business strategy’ so as to arrive at â€Å"Best Fit†. The bank has made rapid strides in this direction. Along with the achievement of 100% branch computerization, one of the major achievements of the Bank is covering all the branches of the Bank under Core Banking Solution (CBS), thus covering 100% of its business and providing ‘Anytime Anywhere’ banking facility to all customers including customers of more than 2000 rural branches.The bank has also been offering Internet banking services to the customers of CBS branches like booking of tickets, payment of bills of utilities, purchase of airline tickets etc. Towards developing a cost effective alternative channels of delivery, the bank with more than 2150 ATMs has the largest ATM network amongst Nationalized Banks. With the help of advanced technology, the Bank has been a frontrunner in the industry so far as the initiatives for Financial Inclusion is concerned. With its policy of inclusive growth in the Indo-Gangetic belt.The Bank has launched a drive for biometric smart card based technology enabled Financial Inclusion with the help of Business Correspondents/Business Facilitators (BC/BF) so as to reach out to the last mile customer. The BC/BF will address the outreach issue while technology will provide cost effective and transparent services. The Bank has started several innovative initiatives for marginal groups like rickshaw pullers, vegetable vendors, dairy far mers, construction workers, etc. The Bank has already achieved 100% financial inclusion in 21,408svillages.Backed by strong domestic performance, the bank is planning to realize its global aspirations. In order to increase its international presence, the Bank continues its selective foray in international markets with presence in Hongkong, Dubai, Kazakhstan, UK, Shanghai, Singapore, Kabul and Norway. A second branch in Hongkong at Kowloon was opened in the first week of April’09. Bank is also in the process of establishing its presence in China, Bhutan, DIFC Dubai, Canada and Singapore. The bank also has a joint venture with Everest Bank Ltd. EBL), Nepal. Under the long term vision, Bank proposes to start its operation in Fiji Island, Australia and Indonesia. Bank continues with its goal to become a household brand with global expertise. Amongst Top 1000 Banks in the World, ‘The Banker’ listed PNB at 250th place. Further, PNB is at the 1166th position among 48 In dian firms making it to a list of the world’s biggest companiesscompiledsbysthesUSsmagazines‘Forbes’. Punjab National Bank continues to maintain its frontline position in the Indian banking industry.In particular, the bank has retained its NUMBER ONE position among the nationalized banks in terms of number of branches, Deposit, Advances, total Business, operating and net profit in the year 2008-09. The impressive operational and financial performance has been brought about by Bank’s focus on customer based business with thrust on SME, Agriculture, more inclusive approach to banking; better asset liability management; improved margin management, thrust on recovery and increased efficiency in core operations of the Bank. Vision and Mission Vision To be a Leading Global Bank with Pan India footprints and become a household brand in the Indo-Gangetic Plains providing entire range of financial products and services sssssssunder one roof† Mission â€Å"Ba nking for the unbanked† Performance Comparison over the years [pic] During the FY 2008-09, the bank achieved a net profit of Rs 3,091 crore, maintaining its number ONE position amongst nationalized banks. Bank has a strong capital base with capital adequacy ratio at 14. 03% as on March’09. As on March’09, the Bank has the Gross and Net NPA ratio of 1. 77% and 0. 17% respectively.During the FY 2008-09, its’ ratio of priority sector credit to adjusted net bank credit at 41. 53% & agriculture credit to adjusted net bank credit at 19. 72% was also higher than the respective national goals of 40% & 18%. Information System in PNB History of Information System at PNB 2000 – The Beginning In March 2000, the penetration and use of IT was not very high at PNB. PNB was relying on manual processes to collect, store, and analyze business data. Its retail branches were not connected and it was difficult for management to understand business drivers and impediment s.This situation made it difficult for PNB to provide optimum customer service and resulted in lost opportunities. Manual operations were also costly to support. The bank used seven different software, which ran on 13 different flavors of UNIX, on standalone PCs. The 500-odd branches were not networked and only 35 percent of the bank's business was computerized. The overall expertise in IT among users was low. The Central Vigilance Commission (CVC) issued a directive to the bank to computerize at least 70 percent of its business by December 2000.This prompted the bank to work out a strategy to tackle the daunting task in the short period of time. At that time there were various factors which caused a barrier in implementing an Information System for centralized banking. These weaknesses were:- †¢ Different Unix OS used in different branches. †¢ Different standalone financial applications on PCs at different branches. †¢ Lack of interoperability due to disparity in sys tems. †¢ Limited expertise on the software packages currently deployed. †¢ Most branches did not have a proper LAN in place.PNB hired a consultant and devised a two-pronged plan of action. The plan comprised: †¢ A short term goal – To meet the CVC deadline of 70 percent computerization. †¢ A long term goal – To create a dependable core banking infrastructure and build a nationwide network to connect different branches to the core infrastructure. PNB chose a product from a company called Nelito. It was a DOS-based, ‘Partial Branch Automation' application. Standalone versions were chosen since there weren't LANs in place, and deployment of LANs at branches would take so long that the CVC deadline couldn't be met.The interface was simple in design, and thus easy for the bank personnel to use. The bank requested CVC for an extension of the deadline and was granted time till March 2001. By March 2001, 70. 60 percent of the bank's business was compu terized. 2001-2003 – The Long Term Strategy In the long-term, PNB wanted a technology that would consolidate all its business resources and sustain the bank's future growth. It also wanted to create its own network, which would play a vital role in its success. Three consultants were appointed to review technology options for long-term adoption.The verdict of the consultants was to deploy a centralized core banking architecture. On 30 March 2001, the bank used the services of Infosys for the deployment of Finacle. A core team was selected, which would be the heart of the project. Infosys trained 200-odd personnel from a core team over six months. The core team modified and customized the package according to its specific needs. As the time passed besides making a mark in terms of revenues, the bank— among the few technology-savvy PSUs—set up examples for other banks, especially PSUs in early of this decade.Institute for Development and Research in Banking Techno logy (IDRBT), a division of the Reserve Bank of India (RBI), presented PNB with the award for excellence in banking technology in 2002. This was quite an achievement considering that the technology transformation started only two-and-a-half years back at PNB. In March 2000, the bank had only 36 percent of its businesses covered on computers, as against 84 percent in 2002. PNB purchased servers, security infrastructure, and storage equipment and decided to house it in its own central data center in New Delhi.A lot of infrastructure from Cisco has been used to build the data center. In April 2002 the bank rolled-out Finacle in 7 branches as a pilot venture. This was done because the bank had seven different application packages, and it wanted to ensure smooth migration of the data into Finacle. By mid May 2002, all data from other software was successfully migrated into Finacle and by end of year, the number of locations has increased to 12. As far as the centralized core banking syst em is concerned, PNB has a data centre at the corporate office and all these 12 centers have an extension to that data.This system enables an individual having an account in any of our branches to conduct transactions/operate the account from any of these 12 branches. 2004-2007 – The Growth Stage In 2004, India's National Association of Software and Service Companies (NASSCOM) nominated Punjab National Bank (PNB) as the best user of technology in its sector. The bank continued to spread the technology to more of its branches and centers. The adoption of Core Banking Solution not only ensured standardization of products, but also enabled quick launch of the new and innovative financial products ensuring sufficient lead time to market it.The core banking solution offered seamless platform for integrating various such initiatives and also reduces the cost of transaction, thereby offering financial products at an affordable cost. On May 27,2004 Punjab National Bank (PNB) has intr oduced Loans and Advances Data Desk for Evaluations and Reports, (LADDER), a computerized management information system for rationalization of returns, asset classification and provisioning, credit monitoring and NPA management. The implementation of the system comprised two modules. The first module would require branches to capture data on borrowal accounts as a | |one-time activity with transaction updates at periodic intervals. | |   | |The second module for implementation of the software envisages collection of information on the loan accounts from the stage of receipt of | |application to disbursement of sanctioned loans. | | |With the implementation of this system, manual collation of a large number of loan-related returns become redundant and branch staff | |concentrated on business development and objective monitoring of asset quality. | 2008 – Rural Initiative Infosys Technologies Ltd (Infosys) and Punjab National Bank (PNB) in 2008 announced that PNB has chosen Finacle from Infosys to power its core banking initiative for rural banking deploying Finacle across PNB’s six Regional Rural Banks (RRBs) covering 1300 branches.Punjab National Bank took lead in business excellence and commitment to customers by providing core banking coverage to its 4850 service outlets. Due to the remoteness of rural branch locations, there were issues such as connectivity of branches for operational ease, centralization of data, and enhancement of customer service as well as innovation in banking products. Moreover, all this is needed at a substantially lower cost for RRBs as their operations were relatively less complex. Finacle from Infosys recognized this need of RRBs and adapted its industry leading core banking solution to suit the requirements of these institutions.PNB management selected this platform to transform and standardize the operations of its RRBs. A majority of Indian banks were already ahead in terms of adoption of new age technology. Ex tending the benefits of technology to RRBs helped sponsor banks in not just priority sector lending but also present an additional business avenue with tremendous potential. Finacle enabled RRBs to better manage audit processes, adhere to statutory compliance, enhance internal MIS requirements and offer customers competitive services on par with commercial banks. 2009 – 100% CBS ImplementationIn Feb, 2009 India's second largest public sector bank, announced that it has completed 100 per cent core banking implementation at its 4604 branches and extension counters through the FinacleaUniversalaBankingaSolutionafromaInfosys. The bank implemented industry-leading Finacle CBS across its operations running a flexible and scalable database platform from Oracle and innovative and cost-effective Sun SPARC enterprise serversafromaSunaMicrosystems. Finacle has enabled the bank to consolidate and centralize its operations, improving branch efficiency and productivity per employee.Consoli dation has also resulted in reduction of revenue leakage and cost, while increasing ease of technical support and maintenance at branches. The solution's scalability has also enabled the bank's scalability to be the best in the countryawithatheanumberaofapeakatransactionsaata3. 5amillion. Further, the bank has covered all the branches under CBS platform including extension counters. As a result, 38 million PNB’s customers are enjoying the facility of â€Å"one bank – one account†. In addition, the bank has intended to build a data center capable of handling business of 6000 branches and 1 lakh terminals.The bank was awarded â€Å"IBM green award† for adopting environment friendly technology for data warehouse implementation during the year. Other Banking Applications The banking major also introduced a number of value added services like ATMs, Tele-banking, SMS banking, mobile banking and Internet banking, remote access facility through its website, etc. under a license from RBI to launch Internet banking. The bank also enabled customers to avail of the Straight to Processing (STP) facility. The biggest advantage of STP is that if a person with an account in Delhi deposits a cheque in Chennai, his account in Delhi gets updated the same day.PNB’s team has also customized this package to suit the typical requirements of a public sector bank. â€Å"As PNB handles huge number of government accounts—public provident fund, deposit of income tax, deposit of different duties and treasury payments, PNB had to customize it and also built a module for government businesses into this package. The bank also has a depository set-up (to store dematerialized share certificates) at its corporate office in New Delhi and another in Mumbai. Customers owning shares and bonds can deposit them at these depositories after which the hard copies are destroyed.The bank, on the other hand, keeps a digital copy of all these documents. Thus, one d oes not have to bother about the loss of paper, or a signature that does not match and so on. Customers can now instruct the bank at any point of time to transfer these securities. Another very interesting development with PNB is its contract with Indian Railways. It is putting up an ATM machine at the New Delhi station’s reservation office, which is going to be a interface between the Railways’ server and the bank’s server.Once this is functional, customers can collect their tickets from the ATM machine and the payment can be made using credit or debit cards. Once this is successful and the interface is done, the bank plans to enable all their ATMs across the country on this platform. Electronic Data Interchange (EDI) is another technology initiative that the bank has taken up. It has entered into an agreement with the Customs department wherein the Customs’ server is connected with the bank’s corporate office server, which is further connected to several branches of PNB and also to importers.Thus, whatever duties are required to be deposited with the Customs department can be debited from the importer’s (read customer’s) account automatically. The pilot project for this has already been carried out and the bank plans to introduce this service soon. The PSU has also introduced bilingual software known as Bank-mate. With the help of this software one can generate reports in Hindi and also can get his/her passbook in Hindi. This is already in operation at around various branches and PNB is also getting orders for this package from other banks. PNB’s IT SetupPNB also has a number of applications running on its network like any other Financial Institution. The bank has standardized all its platforms on UNIX operating system and RDBMS on Oracle. Other OS like Microsoft’s windows 2000/ XP are also enabled in centers. As far as the hardware platform is concerned, PNB has Sun Microsystems’ Web serv ers at the data centre. Apart from this, they are also using Compaq, IBM and Xeon servers. At some locations, the bank is still using DOS machines to run some of their ATMs. Systems Before deploying the core banking architecture, PNB used servers which were NT-based, from IBM, and from other vendors.The bank conducted benchmarking tests for Finacle on various server platforms. And it was satisfied with the performance of Sun's hardware on Solaris. Sun's Fire servers, Solaris OS, and Oracle's RDBMS are now in use. Network design Cisco has tied up with PNB to evolve the network design and implement a nationwide network backbone to connect all its offices. Cisco will assist the bank in understanding and implementing the various technologies associated with the project. The converged network infrastructure allowed PNB to standardize the applications and software needed to provide the banking services.The various branches are connected to the data center using new-world routing and switc hing technologies. Storage systems The bank has followed RBI's storage requirement guidelines. Provisions have been made to store transaction data for around 10 years. In some cases, data is stored permanently. Around 164 Sun enterprise class servers are used in DAS architecture. The total capacity is of multiple TBs. The Sun hardware uses an in-built storage management tool. Later look over a storage management application from VERITAS. WAN and connectivity 101 branches of the bank were on a WAN in 2000.The bank put 500-odd branches on the WAN in 2002, and in three years the WAN had 2000-odd branches. The bank tried a number of connectivity options. 802. 11b wireless connectivity was installed in five branches to begin with. The bank then explored the option of leased lines and used connectivity from MTNL and BSNL. It also used Bharti's leased line between Mumbai and Delhi. The bank also used Reliance Infocomm's fiber optic backbone along with the leased lines in locations where th e optic fiber does not reach. PNB had appointed HCL Com-net to carry out 24Ãâ€"7 monitoring of the countrywide network.There's a live link between HCL and PNB's IT head office. The network is monitored remotely and can also be viewed at the bank's IT facility, where a separate monitoring system is used. Security Systems Security was especially important because the bank could afford no compromise. The security architecture had to be robust, reliable, and scalable to meet current and future needs. Cisco was chosen as the service provider who could meet these stringent requirements. The bank uses a range of security products like Firewalls and IDSs from Cisco for its security needs in its LANs and WAN.All data transactions between its routers and switches are encrypted. It has appointed Ramco Systems as the security integrator. The security integrator is responsible for the complete security infrastructure and is answerable for any security breach or lapse. The bank appointed securit y administrators. VeriSign provided the necessary Public Key Infrastructure (PKI) to the bank for secure transactions. Software Resources PNB is using various software’s for its operational activities for its smooth and efficient running, the Software used by PNB include:-  ¬ Microsoft office 2003 Acrobat Reader  ¬ Bank-mate  ¬ Attack Filters: – Spyware, Trojan, VoIP etc.  ¬ Protocols: – IP, VLAN, DNS, HTTP, FTP, TCP, TELNET, UTP etc.  ¬ Operating System’s:- UNIX, Solaris, Windows NT, 2000 Server, XP etc..  ¬ Databases: – MS Access, MS SQL, Oracle, FoxPro. Hardware Resources To fulfill the requirement and as per compatibility with software these hardware are used:-  ¬ HCL, IBM etc Desktops,  ¬ Printer  ¬ NT Based servers from IBM,  ¬ Sun’s hardware for Solaris,  ¬ Network Cards.  ¬ Routers, Scanners etc†¦ Organizations Other Computing Resources Payroll Transaction Processing SystemPayroll TPS, which is a typical accounting transaction processing system found in PNB. A payroll system keeps track of the money paid to employees. The master file is composed of discrete pieces of information (such as a name, address, or employee number) called data elements. Data are keyed into the system, updating the data elements. The elements on the master file are combined in different ways to create reports of interest to management and government agencies and to send paychecks to employees. Management notices the record of the employee’s efficiency to work and may declare added bonus or other incentive.This report is checked and approved by the branch manager after which cheque is issued to the employee. Online Assistance PNB provides its customers online assistance by providing i-banking, online complaints, providing them information about various products and services. These complaints and assistance are processed by customer care services executive. Account Opening In account opening the MIS is used, every information about the customer is recorded like their name, address, account, type of account, account information, their sample signature, these helps in Identification of customer instantly and creating a database at faster rate.This includes the filling of KYC and AC forms. SPNS (Shared Payment Network System) Swadhan, the first SPNS launched in Mumbai by IBA. The banks that participate on this network could issue the cards to customers for transacting on networks. RTGS (Real Time Gross Settlement) RTGS System is a payment settlement system that minimizes the credit risk in the prevalent cheque clearing system. Under RTGS the funds are settled on a near real time basis across Banks in different locations.Bank offers this immediate electronic fund transfer facility to RTGS enabled bank branches across through the country its designated RTGS enabled locations. Mobile Alert Service The clients now have the facility to subscribe to Mobile Alert Service for receiving alert s on registered mobile phone numbers instantly after the funds are pooled. Impact of Information Systems An information system is there to empower its users. A database simply provides data, but an information system is all about providing the best information the user needs to do their task more effectively.It also takes into account that different users doing their own specific tasks may need to see their information presented in differing ways. The benefits of an information system follow when the user can quickly access, understand and respond correctly to that information. The implementation of Information Systems in PNB and other financial institutions had a vast impact on the Employees (the way they work), Customers, The industry & Government. The system provides information on the past, present and project future and on relevant events inside and outside the organization. Finacle’s ImpactFinacle core banking solution is a comprehensive, integrated yet modular business solution that effectively addresses the strategic and day-to-day challenges faced by banks. It is highly parameterizable providing that much-needed flexibility to adapt to a dynamic environment. The solution has an integrated CRM module enabling banks to offer a rich and differentiated value proposition to customers. The layered Service Oriented Architecture (SOA), STP capabilities, web-enabled technology and 24 X 7 operations ensure multi-channel, multi-country and multi-currency implementations.The functionality-rich modules in the solution provide banks with a varied palette of features to continuously innovate on their product and service offerings. With Finacle core banking solution, banks can meet the challenges of managing change, competition, compliance and customer demands effectively. †¢ Differentiated Product Spread Finacle core banking solution offers an unlimited palette of features for banks to design and deploy products for varying market segments.The product bu ndling capabilities of the solution offers a wide range of possibilities for banks to create products with innovative features. The facilities provided for differential pricing, channel rules and customization through Finacle Studio – the scripting engine, empower banks to continuously innovate and extend their suite of products, across segments. †¢ Agile Operations The Service Oriented Architecture (SOA) enables the IT team at the bank to effect changes without touching the base code, ensuring lesser vendor dependency and faster adaptability to changing business conditions. Robust Cross-sell Framework The CIF and CRM capabilities in Finacle offer a unified view of the customer across the entire solution and across multiple back-end applications, enabling the bank to view the customer from a completely informed angle. This empowers banks to effectively manage customer relationships and aggressively explore cross-sell opportunities. †¢ Increased Operational Efficienc ies and Productivity Finacle core banking solution supports business events automation and process orchestration, thus eliminating manual tasks and reducing process time.The elimination of error and data redundancies also results in increased branch productivity. Straight through Processing (STP) abilities enhance reduction in turnaround and processing time, increasing output and enabling speedy completion of tasks. The multilingual web-based single repository of information enables remotely located bankers to collaborate and transact seamlessly. Impact on Employees Information System serves employees with user friendliness, easy storage and access of data, removal of redundancies, fastening up of the processes and providing up of multiple views at same time.In beginning the issues were mostly cultural. Most staffers were used to working in a manual environment, and some had worked in standalone environments. In the new networked environment, personnel at the node/counter didn't act ually ‘see' the transactions updating in the various account books. This gave rise to a number of queries and suggestions from personnel. It took around six-eight months for the personnel to felt that the environment ‘change' had done them good, and they were used to working on the systems. Other Available AlternativesThe Indian banking sector is slowly coming of age and hand grooming this sector is the banking solution market, which has carved a name for itself in the global arena. Not to forget the pro-active government reforms that are helping the Indian banking market reach greater heights and adding glitz and glamour to Indian economy as a whole. Other then Finacle from Infosys there are various available alternatives for which the banking industry and financial institutions can opt. These are:- †¢ Office Accounting Professional 2009 †¢ SAP ERP Financials †¢ Tally 9: Financial Accounting and Inventory Management Software †¢ Flexcube – â₠¬Ëœi-flex solutions’ Hyperion Financial Management – System 9 While in past i-flex solutions’ flagship product Flexcube has been rated the #1 banking product in the world by UK based IBS, an independent banking solutions rating vendor, but Infosys Technologies’’ Finacle doesn’t took long enough to overtake Flexcube. But now a day’s SAP ERP programmes are giving a tough competition to Finacle. Conclusion A management information system is a system or process that provides the information necessary to manage an organization effectively. MIS and the information it generates are generally considered essential components of prudent and reasonable business decisions.This report starts with the Punjab National Bank with overview of PNB followed by history of information system and the steps taken by PNB to be effective in banking industry by using information’s technology. Information Technology (IT) innovations in the last few years have changed the landscape of banks in India. Today, IT seems to be the prime mover of all banking transactions. Electronic and Information Technology together are bringing a swift change in the way banks operate, especially offering better delivery channels and customers’ friendly services.Anywhere banking, telebanking, mobile banking, net banking, automated teller machine(ATMs), credit cards, debit cards, smart cards, call centers, CRM, data warehousing have totally transformed the banking industry. Today almost all the major banks in India like ICICI Bank, UTI Bank, Citibank, Standard Chartered Bank, ABN Amro, SBI and PNB are offering online services to their customers. ATMs have emerged as the most favored channel for offering banking services to the customers in the world.One of the biggest benefits that the bank has derived out of IT has been the tremendous saving on recruitment front—the bank has not recruited more staff even while the business and work pressure s have gone up five times. Consequently, PNB’s profitability has also increased. To train users the bank has set up more than 15 computer training labs across the country. It explains all the TPS how the transactions are made by the bank, using of these TPS from the new events such as account opening, new allowances etc†¦ to the routine work including cash and payments record, updating of records, payroll and the processing of the complaints.These TPS holds all the activities from the manager and employees to the customers. The report discuses the inbound and the outbound logistics and relate all the processes of TPS used in the bank with the Information System is enabling the bank to provide the quality and satisfactory services to their customers. Suggestions The bank is using information system efficiently and it has increased the customer satisfaction, efficiency, data storage, fast data retrieval. But to improve more and regarding future success of PNB here are the some suggestions. The bank must update Hardware to get maximum performance from Information Systems in order to allow the IS to procure the least amount of system resources it requires for functioning.  ¬ The bank should update all their software, networks etc to keep information system up to date for competitive edge, customer satisfaction.  ¬ Steps should be taken to increase the safety & to avoid the unethical practices like phishing.  ¬ Need for improved training for using Information Technology and tools to employees.  ¬ Intra firm communication should be improved.References Websites:- http://www. networkmagazineindia. com/200305/tech4. shtml http://www. expresscomputeronline. com/20021202/banks7. shtml http://www. business-standard. com/india/news/pnb-to-implement-loan-data-software/151819/ http://www. financialexpress. com/news/pnb-in-networking-pact-with-cisco/64296/ http://www. pnbindia. com/ http://netpnb. com/ Books:- PNB Vision 2007-2008 Zonal Training Centre Gui de. ———————– (The name you can bank upon) All Banks Average Punjab National Bank (Performance Chart) (Amount in Rs Crore)