Wednesday, July 31, 2019

Review of Related Literature and Studies Essay

Parents Portal The Parents Portal gives the parent an opportunity to view their student’s schedules, performance, and statement of accounts. Parents also have access to review current contact information, which may be used to help the school maintain accurate contact data. Online Reporting is the innovative use of media and communication technologies such as emails, blogs, websites and text alerts in order to keep parents informed about their children’s achievements, progress, behaviour and attendance. It is important for teachers and schools to consult parents on how they would like to be kept informed on the progress of their child. Some parents prefer face – to – face contact, whereas others may favour the convenience of tools such as text alerts or online reporting to gain a quick insight of their child’s progress. A website is one of the most effective communication tools that is easily accessible for most schools and parents. It allows access to regular upda tes such as timetables, school trips, and learning tools supporting parents and involving them in school life (Russel, 2009). Web – based system is used in most businesses for better communication. It creates a customer portal that could provide a range of services in a unified, centralized way. Using online – based systems, there is no need for modifications to the applications on the mission – critical mainframes. The Internet offers greater speed and cost-efficiency when compared to manual way. A portal is defined in the Merriam-Webster’s Online Dictionary (2008) as â€Å"a site serving as a guide or point of entry to the World Wide Web and usually including a search engine or a collection links to other sites arranged especially by topic.† Tatnall (2005) writes that a web portal provides a personalized gateway that aggregates information and allows access to a variety of resources and services that are relevant to the person seeking them. For parents this would include the ability to connect with information and services relevant to their child’s learning and ac tivity at school, through  any computer connected to the World Wide Web (Williamson, R. D., & Johnston, J. H., 1998). Communication between schools and families is essential for building trusting relationships that foster parental involvement. Parental involvement in schools and social institutes is necessary for youngsters to develop successfully and to make decisions that will have positive outcomes for their futures. As society becomes increasingly dependent on technology, schools are investing more time and money in technological means of communication. Access to computer and internet technologies is increasing all over Europe. In work places and schools, both educators and parents are provided with access to electronic communication (Rogers & Wright, 2007). It is proven that regular communication from school to parents is critical to the success of children .It is well established that building home – school partnerships is a powerful avenue for increasing the satisfaction of parents and the community with schooling and for improving schools. Parents’ involvement in their childâ⠂¬â„¢s education is a key factor in the child’s scholastic success. Parental participation ranges from paying little or no attention to overt hovering. As the teacher, he must help manage the parental participation so that students are accountable for their own learning. At lower level parents are more active in school participation. Communicating frequently is essential, but the teacher does not have to meet with parents every month or even contact them at home. Instead, he can be in touch by sending parents a weekly or monthly class newsletter that highlights the activities and events going on in the classroom or sending an e – mail with necessary information when it is needed. He can also send home reports if one of the students does something outstanding. He can use a social network, e – mail, put in on a (secured) website, etc. (Harington, 2008). Additionally, as the discourse between homes and schools increases, understanding improves, suggestions are shared, and positive attitudes are more easily maintained. For instance, in 1984 in Western Europe only 8.2% of the households surveyed had computers, while in 2003, 61.87% of the households had computers and 54.7% had Internet access. In 2008 in the Netherlands, 84% of the families with children between two and 21 years had at least one computer with fast internet. The most of the families are multimedia families nowadays. A recent survey of 4,000 adults in 20 cities in the USA conducted by Opinion Research Corp. and America Online showed  that 41 percent of Americans check e – mail first thing in the morning — and a whopping 61 percent say they check their personal e – mail while at work (eSchoolMedia & eCampus News, 2011). Android Application The Google Android Operating System is used in a lot of major smartphone brands available today. It is one of the most popular platform which is used for developing Android applications. With sufficient knowledge regarding the development, Android leads to milestones of achievement through the development of Android application. Technical knowledge and talent is a pioneering need for developing exceptional applications on the Android Platform. The Linux kernel, Daivik and SQL Lite database are some of the basic tools and techniques to build master Android applications. Using them, the Android application developer and programmer teams can deliver various custom – made Android applications (HiddenBrains InfoTech, 2011). Some typical characteristics of Android development are: Low development cost Rapidly growing platform Provides support for interactive media features Linux core is responsible for stability of the Android applications Vast, comprehensive library for graphics, media and other tools Android SDK helps in formation of rich and unique applications The software for the mobile phones is loaded in the Android. The android foundation is comprised of the operating system (OS), the middleware, main programs, and a Software Development Kit (SDK). The SDK allows the designers with the Application Programming Interface (API) and resources needed for development. The submission platform is of an open character. This permits the designers to develop the programs and easily spread them. One can even sell them through the World Wide Web. The wind turbine is very less because the android is free. There are a number of advantages of this mobile platform. Some of the major advantages of this are as follows: Android is Linux – based. It allows quick collection of details. It also provides the correct details desired. The cycle is greatly reduced. The event resources are simple to use. All the details and solutions are offered to the designers without any biases. It provides affluent internet browser amenities as well. This allows the creator to provide improved solutions. The use of the mobile phones to access the World Wide Web is increasing day by day. There are many mobile phones that have operating systems based on Android. If the business wants its web page to be appropriate with these mobile phones then the web page needs to be designed or altered. This is where Android application development performs an important role. The users of Android mobile phones want the phone to be used not only for telecommunication but also as an office computer. The customer may need some specifications to be added on to the android handsets. This is another situation where the Android Applications becomes necessary (Bryanstrang, 2012). Review of Related Studies Traditional reports can be replaced with regular and up – to – date online reports which parents can access whenever and wherever they happen to be. Being able to access their child’s educational information as and when they wish has already been very successful in many schools with parents gaining greater understanding of day – to – day school life. Research undertaken by the Department for Children Schools and Families (DCSF), entitled ‘Parental Involvement in Child’s Education 2007’, revealed that 44 percent of parents expressed work commitments as the main barrier to greater involvement in their child’s education. For busy working parents and those whose work necessitates travel, online reporting could hold the key to ensuring that they are kept informed and up to date regarding their child’s progress (Christine Thompson & Jo Lee, n.d.). The AMA Education System (AMAES), a network of universities and colleges in the Philippines offering computer training, has upgraded its Information Technology (IT) infrastructure with Oracle’s PeopleSoft Campus Solutions. The solutions provide a web – based system that enables the institution to manage student administration processes, including prospect management, admissions, student records, enrolment, curriculum, advisement, transfer credit, student financials,  financial aid, graduation and alumni relations. Edwin Santos, Chief Information Officer of the AMAES, said that the deployment of the new IT infrastructure took 12 months to complete for the first 12 campuses. That includes the AMA Computer University and 11 trimestral campuses of the AMA Computer College. The application suite will also be implemented across the rest of AMAES entities, including AMA Computer Learning Center (ACLC), AMA International Institute of Technology (AIIT), ABE Colleges, AMA School of Medicine and AMA International Aviation Academy. Estopace (2012) quoted the statement of Santos that is, â€Å"The primary advantage of the solution for us is it enhances service delivery. That includes service delivery to o ur students, who are our prime customers, and service delivery to the parents, as both would have access to the portals. The second advantage is ease of deployment. Since AMAES is also expanding its business base, it gives us a lot of flexibility in deployment to other campuses since the solution is centrally hosted and in the cloud.† The most important benefits to students and parents, according to Santos, is the real-time access to information about their payments, grades, courses taken, schedules and information on future subjects to be offered. AMAES is also working to include an online payment gateway to allow students to do any transactions at home. â€Å"Mobile integration is something we are looking forward to,† Santos disclosed. â€Å"For now, our concentration will be more on deploying the serve to all our branches and campuses† (Estopace, 2012). Engineer Arnel Hibo, First Vice President of AMAES, added that the management side of AMAES will also have access to real – time information covering academic and administrate functions for all the campuses (Estopace, 2012). Justification of the Present Study The system called, â€Å"Parents Portal with Android Application† for the AMA Computer College – General Santos City, has similar features with that of the Oracle’s Peoplesoft Campus Solutions. Both systems provide a wide avenue of information for parents, which is critical to the success of the students. This avenue does not limit information through the traditional method of query. Instead, it provides and facilitates information accessibility such as updates on grades, fees, and student class schedules. On the other hand, the Parents Portal, is limited to the local campus and is only intended for both the parents and the administrators hence, it is not intricate and is easier to use. Moreover, less internet traffic comes as a result of the non – complexity of the system. It also has the capability of sending and receiving messages regarding student concerns. Most of all, the system can be integrated to mobile phones, smartphones, and tablets through the Android Operating System and can still provide accessibility even if offline because of its own database.

Sodom and Gomorrah

THE SEARCH FOR SODOM: IS IT BAB EDH-DHRA OR TALL EL-HAMMAM? Jill Toodle Biblical Archaeology BIBL471_D01 April 7, 2013 Since the early 19th century archaeologists and Christian bible scholars have discovered a difference in archaeological and geographical evidence that supports a northern view of Sodom or a southern view of Sodom. The Southern site for Sodom is commonly referred to as the Bab edh-Dhra and the northern site for Sodom is referred to as the Tall el-Hammam. Since archaeologists have not uncovered exact evidence indicating a particular site as the biblical Sodom, the search for Sodom remains a mystery.To accurately investigate these sites and try to form a conclusion, key facts need to be revealed. The intention of this paper is to reveal certain facts pertaining to those areas. The specific facts are as follows; the site each position believes is Sodom, the evidence for destruction at both sites and how each site meets the criteria for the biblical location of Sodom. In addition this paper will compare and identify the strengths and weaknesses of each position. Two sites have been excavated as possible sites of the biblical Sodom.Which one is it? First the paper will focus on the southern site named Bab edh-Dhra, and then an analysis of the Tall el-Hammam will be done. Bab edh-Dhra is the excavated site along the Valley of Siddom, South of the Dead Sea. Many proponents of this site suggest that this site is located precisely on the eastern fault, which provides evidence for it’s destruction. [1] Furthermore, they indicate that the Bible historically supports this location in Genesis 13:10, Genesis 14:10 and Genesis 19:24. J.Penrose Harland explains that an overall agreement between the southern supporters and northern supporters is that the cities of the Plain are to be found in Ghor, or Valley of the Jordan and the Dead Sea. However, Harland states, â€Å"the evidence is preponderantly in favor of a location at the Southern end of the Dead Sea†, which is described as Bab edh-Dhra. [2] To better grasp this preponderant view the archaeological evidence for the destruction of Bab edh-Dhra should be revealed. Dr. Price is a prominent supporter of this site and he reveals that this site was never reoccupied after the Early Bronze date of 2300-2000 B.C. [3] This evidence supports the truth that after the destruction of Sodom by the wrath of God that this location was uninhabitable. Furthermore, significant ash layers were discovered, which supports Genesis 19: 24-28. Geologist Frederick Clapp surveyed Ghor, the southern end of the Dead Sea and discovered abundant amounts of asphalt, petroleum and natural gas. In addition, the smell of sulphur and ash deposits represented in Genesis 14:10 were present. [4] Since the Bible informs us that Sodom was destroyed during the time of the Patriarchs one important discovery needs to be made in regard to the date of the Patriarchs.The site of Bab edh-Dhra provides a date of the second millennium B. C. Dr. Price confirms this discovery and states, â€Å"Only a second millennium context will fit the type of inheritance practiced by the Patriarchs. [5] Many bible scholars and archaeologists have spent numerous hours uncovering the site of Bab edh-Dhra. At this point the criteria that causes Bab edh-Dhra to be considered as biblical Sodom is the followings; the Bible, the late Greek and Roman writers, from geology and topography, from hydrography, and archaeology. [6] Furthermore, Genesis 13:10 describes Sodom as â€Å"a well watered land like the land of Egypt. Therefore, the Paleo-botanical studies done on and at the Bab edh-Dhra site reveal that the area has had a rich diversity of crops, meeting the criteria for a well-watered land. [7] Another huge discovery that causes Bab edh-Dhra to be recognized as Sodom is the reference in Genesis 19:1, where Lot is sitting at the city gate. Bab edh-Dhra actually means â€Å"gate of the arm. † Wood describes this fortification when he describes what the gate and site measure. He states, â€Å"The city wall, enclosing an area of 9-10 acres, was a massive 7m (23 ft) wide and made of stones and mud bricks. [8] Although the Bab edh-Dhra has not been confirmed as the definite biblical Sodom, there is very strong evidence linking it to the Sodom described in the infallible Word of God. However, a professor from Albuquerque has followed and found based on the geography and history presented in the Bible a site called Tall el-Hammam, the northern site in question. Dr. Collins and many other scholars believe that this site is actually the correct site for biblical Sodom. Therefore, throughout the next section of this paper, a detailed analysis to the Tall el-Hammam will be done. Tall el-Hammam s the site located on the northern circular plain of the southern Jordan Valley. Proponents of this site are, Charles W. Wilson, H. H. Kitchener, Claude R. Conder, Selah Merrill, Henry B Tristram, Willia m M. Thomson, George Grove and Henry S. Osborn. [9] They form their conclusion based on an analysis of the Hebrew text and their understanding of geography. Dr. Collins explains that the place that Lot set out to is clearly between Bethel and Ai. [10] This location provides the evidence for scholars to lean towards the Tall el-Hammam as the biblical Sodom, instead of the southern site, Bab edh-Dhra.Supporting this, a majority of biblical scholars locate Bethel, near Beitin, about 12 miles north of Jerusalem. Therefore, if Sodom is located between Bethel and Ai, the Tall el-Hammam better fits the criteria for being the biblical Sodom. When looking at the archaeological evidence for the destruction of the Tall el-Hammam archaeologist have discovered the site was destroyed near the end of the Middle Bronze Age. Dr. Collins explains that they have discovered vast quantities of ash, consisting of 1. 5 to 3 feet thick of heavy ash associated with the Middle Bronze Age stratum. 11] Some of the debris found is pottery, a few bones, some ash and something an excited digger thought was part of the meteor some believers speculate God hurled at Sodom to destroy it. [12] In addition, the Tall el-Hammam site reveals that a temperature exceeding 2,000 degrees Fahrenheit destroyed the area; this gave evidence of catastrophic damage. [13] Based on the evidence revealed through archaeological excavation of the Tall el-Hammam, the supporters of this site date the Patriarchs as 17/16th Century, or Middle Bronze Age.Collins says the â€Å"Bible makes it clear that Sodom and Gomorrah were destroyed during the Middle Bronze Age, the time of Abraham and Lot†. [14] This dating is certainly the biggest difference between the two sites in question. Therefore, it is important to list how the Tall el-Hammam meets the criteria for the biblical Sodom. The specific discoveries of the Tall el-Hammam meet the criteria are described briefly in this paragraph. First, the bible describes t he place where Lot went as being a well-watered land, like the land of Egypt.Tall el-Hammam is located on a disk of well-watered plain 18 miles (30km) in diameter in the Jordan Valley north of the Dead Sea! This location is exactly where Dr. Collins believes the biblical Sodom exists. The Hebrew word kikkar has special significance to the location of the Tall el-Hammam. This word was used to describe what Lot looked up and saw. Kikkar is a plain, round or oval shaped. Dr. Collins explains that when kikkar is used to describe a geographical construct, it refers to a disk shaped plain in the Southern Jordan Valley. 15] The specific site of the Tall el-Hammam has revealed that it was a well watered and fertile land, with large wadis wrapped around the fortification in exactly the described location. Another discovery was that in 3000-2350 B. C. E. the site was protected by enormous defenses. This indicated a strong government and settlements associated with an agricultural economy. Whe n debating the two locations in consideration for the biblical site of Sodom, strengths and weakness of each view exist. Some of the strengths of the Bab edh-Dhra site are the discovery that the location was destroyed in the Early Bronze Age and never occupied again.This seems likely since God destroyed it with such great wrath. Strength of the Bab edh-Dhra is the fact that Lot was closely associated with Moab. [16] Therefore, the southern half of the Dead Sea would seem appropriate. In addition the charnel houses discovered in Bab edh-Dhra suggest a catastrophic event that burned many areas and came from above. [17] As for the weaknesses of in the location of Bab edh-Dhra, one is the fact that the Bible does not indicate specifically a southern site. Also, the lack of an excavated gate complex like the one found at the Tall el-Hammam and the difference in the size of the two sites.Bab edh-Dhra is approximately 12 acres and Tall el-Hammam is 100 acres. [18] When evaluating the weakn esses of the Tall el-Hammam some often mention the dating of the Patriarchs. Some believe that Dr. Collins has lowered the date of Abraham in order to create a match with his excavations. Dr. Collins absolutely denies that. Genesis 14 and 29 support an Early Bronze Age date for the Patriarchs and the Tall el-Hammam contradicts that date. Furthermore, the Tall el-Hammam was reinhabited hundreds of years after the destruction. This seems unlikely due to the soil being severely contaminated.Some strengths of the Tall el-Hammam site are the amount of ash and â€Å"frothy† magna indicating a temperature above 2000 degrees Fahrenheit. Additionally, the northern location of Sodom seems more likely, since the Bible suggests that Sodom is between Bethel and Ai (Genesis 13:1-2). Tall el-Hammam is visible from that area which is ten miles north of Jerusalem. [19] In closing, I would like to suggest that it is just too early to exactly say which site is the correct biblical Sodom. Howeve r, the amount of ash strongly points to the Tall el-Hammam.I have reservations because of the date of the Patriarchs given to that site and the fact of it being occupied once again in the Late Bronze Age. This certainly complicates the excavation. Interestingly, very intelligent evangelical biblical archaeologists disagree on which site is in fact the biblical Sodom. I find it very difficult to form an opinion, considering Dr. Price, the author of our textbook The Stones Cry Out concludes the Bab edh-Dhra as the correct site and my professor, Dr. David Graves, is the field supervisor of the Roman remains (Livias? ) at the Tall el-Hammam (Sodom? excavations in Jordan. Due to this reality and the evidence, I am undecided. I have chosen to let the reader form an individual conclusion based on the evidence I have presented in this paper. Hopefully, I have equally analyzed each site and the reader can participate in this exciting journey of biblical discoveries to uncover the biblical So dom. Bibliography Collins, Steven. â€Å"Discovering the City of Sodom. † Kirkus Reviews 3 (Feb 2013), http://www. kirkusreviews. com Collins, Steven. â€Å"If You Thought You Knew the Location of Sodom and Gomorrah†¦ think Again. Biblical Research Bulletin 7, no. 4 (2007): 1-6. Collins, Steven. â€Å"North vs. South: Why the Southern Location Doesn’t Work. † Sidebar to: Where is Sodom. † Biblical Archaeology Society 39, no. 2 (Mar/April 2013) http://www. basarchive. org. ezproxy. liberty. edu:2048/bswbBrowse. asp? PubID=BSBA &Volume=39&Issue=2&ArticleID=2&UserID=1037. Collins, Steven. â€Å"Where Is Sodom? The Case for Tall el-Hammam. † Biblical Archaeology Society 39, no. 2 (Mar/April 2013). http:www. basarchive. org. ezproxy. liberty. edu:2048/bswbBrowse. asp?PubID=BSBA &Volume=39&Issue=2&ArticleID=2&UserID=1037. Harland, J. Penrose. â€Å"Sodom and Gomorrah: The location of the Cities of the Plain. † The Biblical Archaeologist 5, no . 2 (May 1942): 17-32. Higgins, Andrew. â€Å"Digging for Sin City, Christians Toil in Jordan Desert; Prof Collins seeks Sodom with Scriptures as Guide and Volunteers as Muscle. † Wall Street Journal, A1 edition (February 2007). http://search. proquest. com/docview/399037586? accountid=12085 Price, Randall. The Stones Cry Out. Oregon: Harvest House, 1997. Wood, Bryant G. The Discovery of the Sin Cities of Sodom and Gomorrah. † Bible and Spade 12, no. 3 (1999). â€Å"Search for Sodom and Gomorrah. † (August 2009). http://blog. bibleplaces. com/2009/08/ Video-Searchforsodomandgomorrah. html ———————– [1] Bryant Wood, â€Å"The Discovery of the Sin Cities of Sodom and Gomorrah,† Bible and Spade 12, no. 3(1999): 0. [2] J. P. Harland, â€Å"Sodom and Gomorrah:The location of the Cities of the Plain,†The Biblical Archaeologist 5, no. 2 (May 1942):19. [3] Randall Price, The Stones Cry Out (Oregon: Harv est House, 1997), 120. [4] Price, 118-119. 5] Price, 94. [6] Harland, 28. [7] Wood, 0. [8] Wood, 0. [9] Steven Collins, â€Å"North vs. South: Why the Southern Location Doesn’t work,† Biblical Archaeology Society 39, no. 2 (Mar/April 2013):0. [10] Steven Collins, â€Å"Where is Sodom? The Case for Tall el-Hammam,† Biblical Archaeology Society 39, no. 2 (Mar/April 2013). [11] Collins, â€Å"Where is Sodom? The Case for Tall el-Hammam,† 0. [12]Andrew Higgins. â€Å"Digging for Sin City Christians Toil in Jordan Desert, Prof. Collins seeks Sodom with Scriptures as Guides and Volunteers as Muscle,† Wall Street Journal, A1 edition (Feb 2007): 0. 13] Collins, â€Å"Where is Sodom? The Case for Tall el-Hammam,† 0. [14] The Journal for Jane Mahoney, â€Å"Digging a New Path to Lost Cities; Albuquerque Archaeologist uses Biblical Clues to Find what He thinks are the Ruins of Sodom an Gomorrah,† Albuquerque Journal (June 2006):0. [15] Steven Co llins, â€Å"If You Thought You Knew the Location of Sodom and Gomorrah.. think Again,† Biblical Research Bulletin 7, no. 4 (2007): 2. [16]Harland, 21. [17] Price, 117. [18] Collins, â€Å"Where is Sodom? The Case of the Tall el-Hammam,† 0. [19] â€Å"Search for Sodom and Gomorrah,† (August 2009), http://bibleplaces. com

Tuesday, July 30, 2019

Android: International Conference on Computer Essay

Porting mobile web application engine to the Android platform Yonghong Wu, Jianchao Luo, Lei Luo School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 benbshmily@126.com, andyluomail@163.com, lluo@uestc.edu.cn Abstract Android which Google released as an open-source mobile phone operating system is a Linux-based platform; it consists of the operating system, middleware, and user interface and application software. xFace is a cross-platform web application engine for mobile Internet. As a global leader in mobile web application engine, xFace [1] has the advantages of versatility, easy to master, universal. It significantly reduces the effort of development; while the services of testing which porting layer provides, will greatly reduce the developer’s development costs. A perfect transplant will greatly reduce the Android platform migration workload, but also to make widget’s operating efficiency to be improv ed. This paper describes xFace of native code (c + +) runs on the Android (java) platform through JNI called, xFace porting layer(c++) also calls the Android platform APIs(JAVA) by JNI, such as Graphics, HTTP and other related system modules. Keywords—Android, JNI, Mobile web Application Engine, Porting are the hot spot type of value-added services, 3G mobile terminals under a variety of value-added services would be the integration of up to provide users with chain services, it will be a technical major breakthrough. In addition, along with the WEB2.0 maturity, improving, it makes mobile Internet to become an inevitable trend in the future, while the development of next-generation mobile communication terminal is the power of mobile Internet development. xFace is a kind of engine of the web application. It uses HTML, CSS, and JavaScript and other Web technologies to develop lightweight mobile applications. Mobile applications, which are developed by using the technology of xFace, can run on different operating systems without any modification, such as windows Mobile, BREW, Symbian and other mobile phone platforms. It greatly reduces development efforts and costs of the mobile web application software. Android as an open-source mobile phone platform, is favored by the major mobile phone Manufacturers, its large rate of market share is also increasing. In this context, for mobile Internet and mobile terminals, this paper puts forward the way to solve the xFace transplanted to the Android platform that is very valuable and practical significance. 1. Introduction Along with the continuous development of communication industry, today’s mobile terminals have extended from single service with telephone to multiple services with voice, data, images, video and games [2]. Communications, computing and Internet convergence will be trend of the information and communication technology development in the future. Nowadays, operators’ services have erected one by one in the open data services, a unified service — the platform for mobile Internet. The step into data transfer is an important stage in the development of the 3G. It provides rich data services also contributed to the development of smart mobile devices. Under the impact of the 3G, mobile terminals gradually turn to be intelligent. Under a variety of 3G services such as mobile instant messaging, mobile email, mobile search, online browsing, mobile TV and mobile games 978-0-7695-4108-2/10 $26.00  © 2010 IEEE DOI 10.1109/CIT.2010.369 2157 2. xFace transplant programs in the Android platform 2.1. Android platform features The architecture of Android system [3], similar to other operating systems, use a hierarchical structure. From the chart to see, Android is divided into four layers; from the top to the lower level are the application layer, application framework layer, system layer and the Linux runtime core layer. In figure 1, Applications with some of the essential applications, such as email, address book, SMS and browser, etc. All applications are done by the Java language. Application Framework provides java class library for Android applications, Android application developers developed applications, like developing those core applications, with full permission to access to the APIs provided by framework. Libraries layer was developed by C/C++ language, those libraries are packaged by Application Framework section. The bottom section is the Linux Kernel which is developed by c language, it provide the core system services, such as security, memory management, file system management, process ma nagement, network group, Driver Model and so on. It is also an abstract layer between the hardware and system software. Figure 1 Architecture of Android Each of Android applications runs in its own process, to enjoy the Dalvik virtual machine for its exclusive distribution of instances. Dalvik virtual machine runs a Dalvik-format-Executable file (. Dex), the file of this format is optimized so as to make the Android applications occupy less memory when it’s running. Java compiler compiles Java source files into class files, class files has been built into the dex format file by a kind of DEX tool, only this file can run in Dalvik virtual machine after registered in the Dalvik. Thus, all of the Android applications must use java language to develop. This situation gets C/C++ developers into trouble. xFace engine and porting layer are developed by C/C++, and therefore it’s a big trouble to port the xFace to Android platform. Feasibility Analysis: xFace is developed by C/C++, but the Android application is developed by java language, which allows us to have to use JNI [4]. JNI’s called the Java Native Interface, which is provided by JAVA to allow JAVA and the C/C++ interface to call each other. In view of this, JNI provides feasibility for porting xFace to the Android platform. Native code (interface) of xFace can be generated the dynamic library called by JNI in JAVA. Also, because of the Android system functions are supported by JAVA packages (such as SMS, e-mail module, address book, phone calls, local capacity, etc.). Because of all of the Android APIs are based on java package. To finish the operating system-related functions of xFace porting layer, we have to use JNI to call the JAVA classes and methods in C/C++. Transplant Program: According to the feasibility analysis, we know that xFace is ported to Android platform is entirely feasible, so it requires an effective plan to implement. An efficient migration plan can reduce a lot of workload of transplant. Simultaneously, the operating efficiency of widget is also improved. According to the specificity of Android applications, application framework and start-up code must be written in JAVA language, and then called C/C++ program entry of xFace by JNI in that start-up code. However, in the xFace platform porting layer, some of the features also need to adopt a similar approach to call the Android APIs which are provided as JAVA packages by Android. Event-dispatching can also be the way through the JNI passing from JAVA to C/C++ layer. And then we formed a transplant plan which is mixed-programming language. As shown in Figure 2. 2.2. xFace mobile web application engine xFace is composed of xFace engine and platform adaptation layer (also known as Porting layer), xFace engine is mainly responsible for page layout, script analysis, logic and other functions, the porting layer is mainly responsible for abstracting the operating system-related functions into the system-independent in order to make xFace run on different platform. Figure 2 xFace Porting Layer 2158 3. Porting the xFace native Code to Android 3.1 Bulit the environment Transplanting xFace to the Android platform, because of mixture of programming language, we use Eclipse and the Android environment NDK as the environment of compilation. NDK is primarily used to compile xFace core and porting layer, and it compiles the starting-entry(C/C++) of xFace into dynamic library. Eclipse is mainly used to build Android application development environment, needed ADT plug-in. At last, we use Eclipse to package the program and the dynamic library, which is generated by NDK, into Android executable files – DEX files. Android NDK: Android NDK is the acronym for Native Development Kit. Android application developers can use NDK to develop C/C + + native code. In this plan, we also need to use it to develop C/C + + native code and call the java classes and methods by JNI. Android NDK has developed to provide a way of developing dynamic library for application developer. Developers need to make their project folder into the folder of â€Å"NDK_ROOT / apps /† and write the Makefile in accordance with the specification of NDK. For example, first, we should create a new folder as the name of â€Å"xFace† under the directory of â€Å"NDK_ROOT / apps /†. Next, we create a new file named â€Å"application.mk† and a new directory named â€Å"project† under the directory which is created just now. Create a new folder named â€Å"jni† in the â€Å"project† folder, our xFace Native Code and Makefiles are placed inside this folde. Due to space reasons, we can not do introduce the specifications of the Makefile for the NDK. NDK compiler works under the Linux environment, so if you use Windows, you have to install the software such as Cygwin. Installing eclipse: After install eclipse software, you should install the ADT plug-in into the eclipse, select the ADT plug-in options and create a new Android emulator. After that you can develop the Android application with it. divided into two parts. One, it is completed entirely by the C/C++ code, such as threads, semaphores, memory [5] and file operations modules. And local capacity of the other part is related to points in two ways, first by the C/C++ to prepare the framework, and it called Android APIs which are provided by JAVA packages (such as access and set the system time, MMI implementation, call the local function such as phone calls, send text messages and other system calls); the second is a direct implementation by the java function, and then C/C++ side call them which have been achieved by the java (such as HTTP module, etc). As shown in Figure 3. Figure 3 Implementation plan of porting layer 3.3 Integration of the porting layer and core After porting layer of each module completed, we can integrate it with xFace engine. Each module of xFace engine also needs to NDK environment to be compiled into static libraries. All of those static libraries are supplied for xFace program entry module calling. xFace program entry module which is called by JAVA is responsible for the performance of xFace capacity module. This module depends on the xFace engine and platform adaptation layer, and must follow the norms of java call native code compiled into dynamic link libraries and by the Eclipse environment, written in java program packaged with the framework to Android emulator to run. 4. Details of the design According to the above design, we can divide xFace program into three layers: application framework entrance layer, xFace Native entrance, xFace Native layer (shown as below in figure 4). Following segments elaborate the completion of xFace. 3.2 Implementation of the porting layer Porting layer is an abstraction of operating system functions-related; the implementation of porting layer is the main work of transplantation. It provides interfaces for xFace engines, due to different operating systems platform layer functions do correspond to abstraction, which makes xFace can be run on different platform. Platform adaptation layer implementation can be 2159 5. Testing According to the solution of this paper proposing, the function of porting layer has been implemented. After integrating the porting layer and core, it can run web applications. In order to test the validity and effectiveness of this solution, the following are some simple web application to run screenshot (as shown in figure 5). There are no exceptions and very steady when the program is running. At this point, it demonstrates the feasibility and correctness of the solution of this paper. Figure 4 Startup process 4.1 Application framework entrance Application framework entrance is primarily responsible for starting the xFace; Developed by JAVA language. And its main function is that prepare for running xFace in the Android platform, to provide a running environment, and the creation of the window and dispatch the event information to xFace native layer. As the Android applications are running on Dalvik virtual machine, so the program must start by the way of JAVA. It is a bridge of communication between xFace Native framework and Android, so it is essential. Figure 5 demo application 4.2 xFace Native entrance xFace Native entrance is mainly responsible for achieving xFace local businesses, such as loading the page, parsing the page, initialization xFace widget runtime environment, as well as the release of related resources and so on. Associated with xFace businesslogic is organized in this layer, which is the work of xFace entrance. Only for Application framework entrance called. In the plan, the drawing graphics is the maximum cost. It is not direct to draw shape to screen because this plan is using JNI to call JAVA methods to draw graphics. So the program of xFace may be slower than Android Native Application, especially when you running a kind of widget which need a mount of drawing in xFace , such as games. 6. Summary Currently almost all of the transplants, the source build-environment of transplant and the target platform build-environment are basically the same. This migration plan of mixed programming language provides a general method for the situation that the source and the target platform of build-environment of transplant are different; furthermore, this solution also makes code-reuse to maximize and reduces development costs and cycle. This article based on the Android platform, while providing a set of transplantation program, but the program is also a place to shortcomings in the drawing mechanism, because it is provided through the JNI calling java class library Android than any other platform, the efficiency of direct system call mapping is slightly low. Therefore, it is also a need for further study and improvement to improve efficiency. 4.3 xFace Native Code This layer is mainly to achieve graft-layer specific functions, xFace all of the features are in this layer, which coordinates xFace engine and porting layer; and to make porting layer and the underlying of operating system, porting layer and the Android application programming interface layer in the layer of packaging. It exposes the interfaces to xFace application developers and xFace engines. This layer of xFace is the kernel, all of the performance capabilities of xFace application are implemented in this layer. 7. References [1] Introduce of xFace[M/OL]. http://189works.com/articleDetail.action?u=yangzihao04&id =10124. 2010 [2] 3G Mobile Terminal Development Trend of the operating system [M/OL]. http://pda.c114.net/32/c4948.html, 2007 [3] Android Architecture 2010[R/OL]. http://www.cnmsdn.com/html/201003/1268713218ID2058_2 .html [4] ChuanBin Tu, Dissecting JDK1.6, Electronic Industry Press, 2008-01 [5] Neil Matthew . Professional Linux Programming . Wrox . 2002-01 [6] W3C. SVG Tiny 1.2-2008. Scalable vector graphics (SVG) tiny 1.2 specification[S]. W3C 2008 [7] Niu Xin-Zheng, She Kun, Qin Ke, Zhou Ming-Tian. Cooperative caching optimization strategy on Mobile P2P network[J]. Journal of Computer Research and Development. 2008, 42(4): 1-2 [8]Lei Huang. Development of embedded system based on platform. Foreign Electronic Measurement Technology, 2006 [9] Wangchao Network. Web Application Development of Mobile devices[DB/OL].http://www.wangchao.net.cn/bbsdetail_314 11.html. 2006-01-08 [10] Times Connection. I ntroduction to Web Application[EB/OL].http://cs.now.cn/html/FAQ/VHost/2008 10/10-3088.html. 2008-10-10

Monday, July 29, 2019

Analysis of Equity and Fraud Research Paper Example | Topics and Well Written Essays - 1750 words

Analysis of Equity and Fraud - Research Paper Example All these measures have been introduced with the intention of preventing fraud and ensuring that there are no hidden transfers of equitable interests and that the contents of a deceased person’s will are clearly evidenced in writing. The purpose of the Wills Act of 1837 is, therefore, to encourage people to make out their last wishes formally, publicly and in writing to prevent any scope for misunderstanding. However, the public nature of wills is often a significant drawback in some instances. A will is a public document and can be accessed by anyone and there are instances when a testator may wish to make provision for a mistress or an illegitimate child for example, which are not to be revealed in the public eye. In such instances, a testator may resort to secret trusts or half-secret trusts, whereby he formally and outwardly designates a legatee as the beneficiary of his estate, yet enters into a private arrangement with him for dispersal of the assets of his estate to other parties. The legatee thus accepts the gift after having provided an assurance to the testator for dispersal of the gift in accordance with the testator’s wishes. Hence this gives rise to the existence of a secret trust, however, if the beneficiaries cannot prove the existence of such a trust, the legatee may take the property free of the trust, which raises the issue of fraud. However, as established in the Snowden case, it is not for the legatee to prove that he is holding the property on trust, rather the beneficiaries of the trust must prove this, on the basis of the probabilities that exist.  Ã‚  

Sunday, July 28, 2019

Jean Roberge - vice president of ABS Essay Example | Topics and Well Written Essays - 2500 words

Jean Roberge - vice president of ABS - Essay Example The project tends to bring all 3 sub-units (which were previously 3 different businesses) on to one platform so that resources can be shared profitably especially in accounting and human resource management department. Even in marketing department, if the plan of marketing from all three entities is in line with each other due to the presence of an integrated management system, it will prove less costly and more effective. The project will cost $50 million, which Mr. Roberge plan to spread over the period of 24 months. The major targets of ABS from incorporation of this new system are to ensure consistent and reliable data retrieval, harmonization of accounting and financial process, improving process efficiency in HR management and to create an integrated market vision for the new ABS entity. The challenges as identified by Mr. Roberge include the fact that there is a huge amount of information that needs to be sorted out and placed rightly to be accessed when required and this too must be done without a single error. The existing systems and soft wares cannot be considered obsolete for no reason. Instead, the best option is to make as little as possible change to the soft wares in use already. This will help in keeping the system understandable for the users. Also, it is a huge project which will have a direct impact over the way IT department of ABS works. It will have an impact over the future of IT department in ABS. Another great challenge is that Mr. Roberge needs to hire a competent project manager. Case 1: Question 1: There are few other issues which at this point seem that Mr. Roberge has not considered. The biggest issue is reaction of ABS employees to this huge change. It has been mentioned in the case study that IT department staff is already a little uneasy about it as such a system can lead towards downsizing of their department. Such an automated system might result in lower number of jobs in IT department. This thus has an impact over performan ce of staff especially in the IT department. On the same line, the reaction of employees from other departments will also be important. Marketing department for example might not be very comfortable with such an integrated system. They are not used to discussing their micro plans with a huge audience. An important aspect that is thus being overlooked at this stage in my opinion is change management. Case Study 2: Question 1: In my opinion there are a few key points in the presentation which include the following: First of all, the presentation must have included the scope, budget, requirement and justification of having such a huge system in place. This is something which Mr. Roberge’s own presentation to the committee had in detail. The issues which he found a little untouched in his own presentation and was impressed when he saw added to consultant’s presentation are a detailed break up of the additional resources ABS will require for implementation of such a huge sy stem. When ERP is incorporated in any huge corporate of public culture, there is a lot of staff requirement, capital resource requirement and hardware and soft ware requirements to be taken care of by the parent company. Though Mr. Roberge has done thorough cost analysis, the requirement of staff was brought up by the consultant. Other important point that was highlighted in the presentation of the consultant was that change management must be a well planned process. The consultant has been a part of essentially many such ERP incorporations and from his experience he has pointed out that firms see highest turn over rate during the time when such huge changes are taking place. He pointed out that change management should be a well planned process and employees from every tier must be involved so that

Saturday, July 27, 2019

Symphony No 1 (Brahms Analysis) Essay Example | Topics and Well Written Essays - 2250 words

Symphony No 1 (Brahms Analysis) - Essay Example The popularity and success of this Symphony are richly deserved. It is a work of perfect technical achievement and profound emotion, of beautiful melody and detailed counter point. The most important structural feature, and that is undoubtedly original with Brahms, is the acquisition of a short but striking phrase which introduces the exposition, and for which the phrase basic motive seems most appropriate, since it principals the entire movement, either as a component or as a generating factor. The themes are all based on it, or obtained from it. The subordinate Theme is, for scant measures, similar to the principal one: such a likeness between the chief themes has been frequently done before and is identified as one of the conditions of the early symphonic movement. The first codetta also shows remarkable likeness to the principal theme; the basic motive is set forth in the upper most tones, but the principal theme is given to the basses.... This introduction was composed after the remainder of the piece had already been scored. The allegro section of the movement is a huge orchestral sonata, wherein musical ideas are developed, clearly expressed and restated with changed relationships among them. The key of the allegretto is A-flat major. The allegretto starts with a tranquil, stepwise tune in the clarinet. The four bar figure experience an extension making it an asymmetrical five bars resulting from a small bridge between the phrases by the strings. The â€Å"A† theme in the allegretto is rounded off by the clarinet making the invasion of the first five bars audible. The B the infiltrates in m. 11 and then features a dropping dotted eighth pattern in the clarinet, bassoon, and flute with the falling arising figures of the rhythm being echoed by the strings. A appears to emerge with the violins repeating the first theme and a longer, chromatic bridge segment which lengthens the phrase composition to seven bars. D and C themes are different from A and B in the sense that they are more angular and shorter rhythmically. The first two themes are almost persistent eighth note pizzicato in the string. On the other hand, C and D have more complexity to the sixth note pattern that is interlocked accompanying the wind. The movement to F minor from the major mode marks the sections as apart from heralding material. The contrast that is obvious in mood and character can make someone to think of the D and C sections as a trio appearing within them first allegretto section in the greater ternary form shown by the whole movement (Wilson 137). The symmetry of the whole is reflected in the symmetry of each section. The A†

Friday, July 26, 2019

ADVENTURE FACILITATION AND EDUCATION Essay Example | Topics and Well Written Essays - 2250 words

ADVENTURE FACILITATION AND EDUCATION - Essay Example Similarly, as a means of determining overall viability of the social media outreach plan that has heretofore been utilized, the discussion will be concentric upon seeking to define the plan that best promotes the interests of the firm while seeking to maximize the exposure per pound spent on marketing that lies at the core of any and all successful marketing analyses. As a way to provide answers to the overarching question of effectiveness which has been outlined above, this report will seek to lay out the results of a pilot study. As such, the pilot study will have the express intention of providing insights into whether or not the social media outreach which is being performed has a positive contribution to the viability of the firm, to what extent, and whether or not the expense to operate such a program is worth the yield that it generates. As with any pilot program, the scope, time frame, number of individual results weighed, and an analysis of the contributing factors have all been weighed (Tuten et al 2012, p. 203). The following section will briefly detail how each one of these was undertaken within the confines of the given pilot study. For purposes of the pilot study, the account activity, posting ratio, overall number of hits, total number of sign ups generated and percentage of clicks garnered were analyzed. With respect to the period of time that was employed, a period of 2 months of activity was analyzed (Rodriguez et al 2012, p. 371). The raw data itself was made available to the requesting entity by statistics and tracking software provided free of charge to the firm via Facebook’s statistics software. For purposes of brevity and the absence of bias, the software was employed as a way to readily generate a plethora of data and habits with relation to the web habits of those within the target demographic. Through an analysis of the time period mentioned, the

Thursday, July 25, 2019

The couses of increasing the crime in the UK (just in the UK) Essay

The couses of increasing the crime in the UK (just in the UK) - Essay Example It differs from simply citing poverty or racism as the cause of crime because it includes almost all social components including the family, social institutions such as school, the community, peer groups and home life. The concept of being "socially excluded" can also take into account economic and political exclusion, such as unemployment and immigration status, as well as lack of access to medical care, housing, policing and security. (Young, J, 'Crime and Social Exclusion'). The effect of social exclusion on crime is evident. Richard Garside (2008) reports in the Guardian that there were no homicides in 2007 in more prosperous areas of London, whereas other more impoverished areas accounted for 46 alone. The Londoners who are socially included are safer, whereas "those living in the capital's poorer neighbourhood's appear to be at much greater risk of homicide than those living in its leafier, richer suburbs." To look at the causes of crime this way makes it a social problem rather than an individual problem; in other words, it is viewed as a symptom of the society we live in rather than the situation of an isolated individual. But those who research crime in the U.K. differ in how they interpret the cause of social exclusion. Some assert that people are self-excluded; that is, the fault lies within themselves and their lack of motivation can be traced to their dependency on the welfare state. Under this scenario, even if there were jobs available, they wouldn't take them. Another theory is that the individual doesn't lose the motivation to work but doesn't have the capacity to look for work due to lack of positive role models. Then there's the third theory that may best explain the increase in crime: that economic decline over the last few decades has been so extreme and jarring that it thrust many in the category of social exclusion. It used to be that one could count on a lifetime employment with a good company and a sense of security. Now, due to downsizing, outsourcing and widespread unemployment, work is much more temporary and contractual. This adds a great deal of insecurity and creates a larger underclass of the stigmatized unemployed who are often paraded in the media as drug dealing criminals separate from those in the "leafier, richer suburbs". That dichotomy of exclusion/inclusion combined with media amplification led to one of the most famous and effective enunciation of crime policy by any politician, former Prime Minister Tony Blair's slogan, "Tough on crime, tough on the causes of crime." (King 2008, p. 137). It ushered in the Labour Party after a string of defeats. It emulated that of the United States with its emphasis on enforcement as opposed to rehabilitation. The implication was that the government would take a two-pronged attack on crime: enforcement and prevention. The framework of social exclusion, prevention and enforcement led the Home Office department of the government to pursue sweeping solutions to a myriad of interrelated causes. When examining the problem of youth and crime, risk factors and causes include a troubled home life, including absent parents and volatility; truancy and failing at school; mental illness; drug and alcohol abuse; poor housing and homelessness; and peer group pressure. Because the government sees the causes of crime as multi-dimensional and social in nature, the solution it comes up with is similarly expansive and social. The youthful offender is like

Composing an Argument on Patient Safety Essay Example | Topics and Well Written Essays - 1000 words

Composing an Argument on Patient Safety - Essay Example After some serious riots from the people the government started to think over this issue and started searching for ways to solve this issue (Mantel 2012). A committee was setup to solve this issue at its earliest and provide with a solution that is practically applicable. The committee came up with a revolutionary solution. They suggested instead of blaming hospitals, doctors or nurses the whole system should be changed. A very keen investigation should be made so that each and every issue that leads to preventable deaths can be controlled like taking proper care of the pharmacy, hygiene should be given high priority, nurses should be well trained, they should not be made to do over duty, there should be a proper communication between the hospital ward and doctor and other such practices. Different programs have been started to keep a check and balance on the health care system of different hospitals. These programs have certainly proved beneficial and effective in controlling the he alth care systems and improvement have been seen as the death tolls due to the carelessness and faults of the health care have been considerably decreased (Mantel 2012). The government has started certain programs in which the nurses and the hospital wards were given special training and education so that they coordinate perfectly with the doctor and the patient as well. They are also taught a number of different languages so that they do not create problems while communicating with the patients and do not create any problems for the patient. In earlier years we have observed that many health care related issues in foreign countries occurred because the nurse could not understand what he wanted to say and therefore confusions would arise and wrong approaches could be made. The nurses were taught to remain alert and attentive in all situations and must have a very quick response to any emergency situation. The nurses were taught a very important factor that while working they should not lose their patience and do not provide any harm to the patient if they are misbehaving. Likewise private organizations have also initiated such programs to create awareness and train the nurses. Doctors are also made to attend different sessions and seminars to make them aware of the different ways they can handle their patient with utmost care and delicacy. It sometimes happens that doctors due to certain reasons may not listen to the patient willingly and as a result of which maybe that the patient might not be given the right treatment that he needs. The doctors are made to realize that they are the responsible person at the hospital and it is their duty and obligation to carefully and properly examine the patient and give him the right treatment. Doctors are also made to learn more language rather than their own mother tongue so that they can have no problem in communicating with the patient (Vecchion 2005). In the earlier years it was a common practice that the nurses would mark the position on the patient where ever the surgery had to be conducted and as the nurses are not that well educated therefore they were very likely to make mistakes. The change that has been initiated in the system is that now the doctors are given the responsibility to mark the patient so that the chances of any errors

Wednesday, July 24, 2019

Self-Portraits. Journal Essay Example | Topics and Well Written Essays - 750 words - 2

Self-Portraits. Journal - Essay Example Using a journal format prevents these ideas from sounding like second hand information, and makes his ideas known as well as interesting. As an artist that depicts people most of the time, I am highly interested in expressing the different emotions that humans are highly capable of showing. The various people I have painted also includes myself, simply due to being a quick subject to study on, as well as me being the most easy-to-find model around. I have shown this through the numerous self-portraits I have painted throughout my lifetime, which is roughly 10% of the bulk of my artworks (van de Wetering, 2005). However, it is not only I but also other artists of my time like Gerard Dou and Frans van Mieris made a considerable number of self-portraits as well, which does not make my output sound unique during that period. Throughout my entire career, it can be observed that my self-portraits also change along with my age and preferred methods of painting, which in a way would also tell the viewers my life as if it were a running timeline (van de Wetering, 1997). I am able to do so by using a mirror while looking at it as I paint (Berger, 2000). Not only are people able to see how I have aged, but also they could also see the different techniques that I have acquired, which resulted in my unique style of layering multiple brush strokes until the surface almost looks like it was sculpted and molded, not painted on (van de Wetering, 1997). My artistic choices in composition can be viewed as rather dark or muted, but as I have progressed in my profession, a certain drama can be seen in the sharp contrast of light and shadow. This is regarded as one of my most distinguishing styles, the chiaroscuro, which is one of my ways to show my non-conformist ideals with regards to how and what I paint (van de Wetering, 1997). The prominence of my choice of dark

Tuesday, July 23, 2019

Tahiti Tourism IMC Plan Assignment Example | Topics and Well Written Essays - 1250 words

Tahiti Tourism IMC Plan - Assignment Example A viable IMC plan needs to take into consideration the existing and upcoming competitors (Porter 1980). At present, going by the global economic meltdown, the Tahitian tourism industry has been hit hard and is facing a slump like situation. With a majority of the tourist arrivals at Tahiti, hailing from the US, the local tourism and leisure industry has proven more then vulnerable to the recessionary international trends. In the existing scenario, the more affluent and resource rich tourist destinations are resorting to aggressive and proactive marketing strategies. In addition, the upcoming competitors like the Middle East and Africa are continually increasing their share in the tourism industry by posing a cutthroat competition. The target segments have already been identified. All the digital and print media efforts are to be oriented around young singles, young married couples and post parenthood families in the US and France in general and in New Zealand and Australia in particular. The advertising efforts will tend to educate the target customers about the uniqueness of Tahiti in terms of pristine locations, variegated tourist activities, economical accommodation and food and affordability. The advertising campaigns will peculiarly target the urban customers in Australia. The media campaigns will stress on perceiving leisure as being a sound and affordable emotional investment rather then being a costly luxury (Ray 1982). The media strategy wil... MEDIA STRATEGY The media strategy will be broad based, involving both the online channels like the internet, blogs, emails and podcast and the offline channels like the print media, television, radio, public relations, etc. The strategy will be immaculately profile matched to hit the target segment (Freeman 1999). The crux of the media strategy will be to bolster the image of Tahiti as being a desirable and affordable tourist destination. The connectivity of the campaign with the target is bound to encourage a trial purchase and an eventual brand loyalty. The campaign will especially focus on the trendsetting areas like the urban markets and state capitals. CREATIVE PLAN The plan is to communicate to the target audience that Tahiti is an excellent tourist destination that is almost immune to the altering economic and political trends (Peckham 1975). An excellent destination, which has something for everybody, regardless of one's age, family status or budgetary constraints. The advertisements will show young, attractive couples and happy, middle class families having a good time at Tahiti. The strategically contrived frames will enable the audience to contrast the positive aspects of Tahiti with the over crowdedness and high prices at other tourist destinations. The slogan: "Tahiti, a home you can always come to" will project Tahiti as an affordable and soothing destination. MEDIA SELECTION RATIONALE Internet is not only a relatively low cost media that offers a high selectivity and multiple interactive possibilities, but studies have also shown that the target audience mostly retrieve the desired information and data using the internet (Davenport & Bech 2000). Going by the large

Monday, July 22, 2019

Public life Essay Example for Free

Public life Essay Early Years When Brown and his family moved to New York, he learned that the pro-slavery forces in Kansas were confrontational. Brown left for Kansas after learning that the families of his adult sons were completely unprotected from any possible attack. He collected funds and weapons along the way and even held an anti-slavery convention in Albany. Despite the stir because of his support for unrest to liberate, Brown still managed to get financial support. He gathered more anti-slavery forces in Ohio. Brown and his forces were going to stop at nothing to stop the pro-slavery actions in Kansas. He believed that the pro-slavery forces, or the Border Ruffians, will eventually become violent themselves. He used this as justification for his disregard for the law. Brown was angered by the violence displayed by the Border Ruffians, and also the political manipulations happening to quell the northern abolitionist movement. Brown learned that his family was to be attacked next by the Border Ruffians and the pro-slavery neighbours squealed about the support that his family was giving him. In May 1856, five pro-slavery settlers were killed by Brown’s men. They were taken from their homes and slashed to death by swords. According to Brown, he did approve of the murder, but he never participated in it. Two of Brown’s sons were captured by Henry Pate, a pro-slavery captain. But Pate was soon captured with twenty-two men. Pate was forced to sign a treaty that exchanges their freedom with the freedom of his two sons. Pate was released, but his sons’ release was to be postponed till September. Pro-slavery forces from Missouri came to Kansas under the command of Major General John Reid. They headed towards Osawatomie, Kansas, determined to crush the abolitionist forces there. Some of Reid’s men killed one of Brown’s sons in the morning of August 30, 1956. Brown was clearly outnumbered by Reid’s pro-slavery forces, but they still defended their posts. They managed to wound 40 and kill 20 of the Reid’s men. Reid ordered his men to retreat into the forest, and Brown’s men managed to capture four of Reid’s men. This display of bravery in that situation that clearly went against him was viewed as an act of heroism by Northern abolitionist forces. Brown was then known by the nickname, Osawatomie Brown. A month later, Brown met Free State leaders in Lawrence to help plan for a possible assault by the pro-slavery forces. Pro-slavery forces from Missouri were engaging attacks in Kansas. Battles ensued, though large damages were nipped in the bud when Kansas governor John Geary called for disarmament and offered clemency to soldiers of both sides. Brown fled from Kansas with his sons to gather more funds and support from the north. Brown travelled eastward to collect more funds. In his travels, he met with many prominent abolitionists like William Lloyd Garrison and Gerrit Smith. Some of the wealthy abolitionists he met agreed to provide Brown with funds. This group of financers become known as the â€Å"Secret Six†. How much of Brown’s plans the Secret Six knew still remains a mystery until today as these men were just there to fund Brown with â€Å"no questions asked. † On January of the following year, Brown received pledges of weapons from different abolitionist organizations and individuals. He travelled more and continued to look for funding. He received help in forms of numerous pledges but little of these pledges were translated to cash. Brown met with Hugh Forbes in New York in March. He hired Forbes to be the tactician and drillmaster of his army. Both met in Tabor and formulated a plan for their anti-slavery crusade in the south with them disagreeing with some of the details of the plan. They left for Kansas six months later without Forbes receiving his salary. He decided to leave for the east instead of going with Brown to Kansas. Brown travelled to Ontario to attend a Constitutional Convention. Chatham, Ontario’s population were mostly dominated by slave fugitives. It was here that Brown’s provisional constitution was adopted. Brown was elected as the commander-in-chief and Elder Monroe, an African man was elected as minister, and shall act as president until a new one was elected. Many of the delegates signed the Constitution, but only a few joined Brown’s forces. Many intended to join but Forbes attempted to reveal the plans to Henry Wilson, a Massachusetts senator. Many of the members of Brown’s inner circle felt fear that their names will go revealed to the public. The members of the Secret Six were divided. Some of them wanted Brown to execute his plans rapidly, while some insisted for postponement. To derail Forbes’ knowledge of his plan, Brown returned to Kansas and remained there for 6 months. He joined forces with James Montogomery, the leader of the raids in Missouri. Brown led his own attacks, managing to set 11 slaves free. He took the liberated man with him to Detroit and to Canada. He went from city to city to collect more support. He reconnected with the Secret Six, visited his family and departed for Harpers Ferry. Upon arrival in Harpers Ferry, he rented a farmhouse nearby for his new recruits. He never received the number of recruits he expected to come to support him. He revealed the plan to some of his supporters and some of them expressed their worry and qualms about the plan. One of them, Douglass, already knew of Brown’s plan since 1859 and has tried numerous attempts to avert the enlistment of blacks in Brown’s army. Some of the weapons fit for a thousand men arrived late September, but Brown only had 21 men. A month later, Brown led 19 of his men to attack the armory of Harpers Ferry. He planned to distribute the weapons here to arm the slaves in the locality. He would then lead these men to the south to liberate more slaves. His plan was to free the slaves of Virginia to maim the institution and kill off the life-line that kept the economy alive in the south. They easily entered the town and they captured the armory with no resistance. They also spread the news to the local slaves they were going to be freed soon. Things went awry when a passenger train arrived in town. One of the train staff warned the passengers about Brown’s men. Brown ordered him to halt then, but seeing that his warning was not heeded, shot him openly. News of the raid reached Washington by late morning. Brown’s men were held inside the armory by the angry residents of the town. Military men sealed off the bridge, the only escape route available. Brown moved inside the armory and had the doors and windows blocked. The soldiers and townspeople outside prevented the exit of anyone inside the armory, and sometimes, Brown’s men would shoot at the people outside. Brown sent out his son, Watson, and one of his men under the bearing of a white flag and yet the men outside shot them. Exchanges of shots were fired, and Oliver, another of Brown’s sons were wounded and killed. On October 18, John Brown’s fort was surrounded by the military. They were encouraged to surrender, but Brown refused, saying that he would rather die there. The military men then broke the doors and walls of the armory down and captured the men inside. Brown was charged with murder of 5 men, instigation of a rebellion among the slaves and treason against the state of Virginia. The court found him to be guilty on all three counts on November 2. He was sentenced to be publicly hanged a month later. On November 2, after a week-long trial and 45 minutes of deliberation, the Charles town jury found Brown guilty on all three counts. Brown was sentenced to be hanged in public on December 2. Before he died, he wrote, I, John Brown, am now quite certain that the crimes of this guilty land will never be purged away but with blood. I had, as I now think, vainly flattered myself that without very much bloodshed it might be done. METHODOLOGY The results of this study were obtained via data collection from documents from the internet, several books and journals. Data analysis of the information was performed and some personal opinions of the author were also injected into the analysis of the data gathered.

Sunday, July 21, 2019

Analysing SME Policy in Ireland

Analysing SME Policy in Ireland Social Network Analysis CHAPTER I: INTRODUCTION 1.0 Introduction 1.1 Research Design The proposed design for this study is a flexible mixed-method design making use of both qualitative and quantitative methods for data collection and analysis in order to understand and later analyse policy implementation networks for MSEs in Ireland, particularly concerning those in the Dublin 15 area. This approach was required for two reasons: 1) time and resource constraints; and 2) the literature reviewed for this research indicated that such an approach would provide better answers to the questions being asked. As shown in Table 1 below, this method was also important to establish the complimentary nature of the methods being used for the enquiry. For example, qualitative methods were required initially for content analysis of documents produced by the European Commission and the Dept. of Trade, Enterprise and Employment. However, a quantitative approach is given to the treatment of the relationships under investigation namely, mandatory and voluntary cooperation for policy implementation. Therefore, the following steps were taken for this particular research:- 1. Internet research for qualitative content analysis and name generation of policy actors and policies being made at both European and Irish levels; 2. Short open-ended qualitative interview with a major policy actor in Ireland for name generation of policy implementation actors; 3. Quantitative data collection and non-random sampling and estimate number of start-up companies in the Dublin 15 area; and 4. Data collection and analysis using Social Network Analysis methodology for all names generated to measure the effects of mandatory and voluntary cooperation among policy actors. Patience A follow-up interview with a key informant on the network composition and to confirm that the relationships drawn on the literature for policy implementation indeed existed in the manner they were in the questionnaire. In this case, a Head of Small Business Unit in the Department of Enterprise, Trade and Employment could confirm the relationship among the actors in the network from an ‘ego’ perspective and pros and cons for this approach will be discussed further in the methodology chapter. The table below gives an illustration of the design being used and it follows the design approach suggested by Creswell et alli 2003:- Table 1 – Sequential Research Design Implementation Priority Integration Theoretical Perspective Sequential – Qualitative first Quantitative At Data Collection   and Interpretation Explicit With Some Combination As mentioned earlier, this design draws on Creswell’s (2003) work about various research design approaches – with special attention to the use of mixed-methods in the human sciences. A rather overt and systematic use of the methods have grown in popularity and it is evidenced in the work entitled Handbook of Mixed Methods in Social Behavioral Sciences, launched in 2003 by Abbas Tashakkory and Charles Teddlie and from which Creswell derives most of his useful explanations on the advantages and weaknesses of such a design. In a flexible design, the researcher is given a greater freedom to change research questions as the research progresses since she would be rigidly attached to one philosophical paradigm or the other, but would find relevant to include those that make sense to the enquiry as it evolves. On the other hand, making use of both qualitative and quantitative methods for data collection and analysis – whether they take place sequentially or concurrently, allows for a richer understanding and, hopefully, explanation of the problematic under investigation. Details of the methodologies and paradigms they are associated with are dealt with in the Methodology chapter. For this section is imperative now that the researcher makes the esteemed reader aware of the possible biases and the actions taken to deal with them. Bias statement It has been argued that bias is when systematic random or non-random errors are not accepted or acknowledged by the researcher at any point of her work, such as in the design, measurement, sampling, procedure, or choice of problem to be studied. Bias is also related to the accuracy of the information produced and reliability and validity may also be sacrificed, though not necessarily. Hammersley and Gomm (1997), however, assert that nonfoundationalist realism is rather appropriate for it neither relies on foundational epistemology nor it does on relativist and standpoint theory and its aims are to favour the production of knowledge rather than one’s political or personal agenda. According to these authors, foundationalism makes bias a rather evident matter in a research once the researcher’s ideological commitments are indentified as affecting research procedures hence compromising outcomes expected credibility. But bias is not as straightforward as foundationalists, according to them, would like it to be. In a nonfoundationlist realistic perspective, social researchers are not part of the phenomena they want to describe or explain nor can they construct phenomena through their accounts, but merely account for these realities and be judgemental of the influence that what they understand for established knowledge can have on their accounts of social r eality. (1997) In this research, in a foundationalist perspective, the biases that could possibly compromise the commitment with knowledge production is that:- 1) the researcher is a micro-entrepreneur from the vicinities; 2) her commitment with epistemological views of policy networks as ineffective given the predominant hierarchical structure and political agendas; 3) Snowball sampling technique may introduce bias for it may not represent a good cross section of the population investigated; and 4) Questionnaires sent to MSEs were not returned for reasons which will be explained in the Methodology chapter. This can also lead to incorrect conclusions. However, this is not an action research and the methodologies applied for enquiry on policy implementation networks aim to control for bias arising from the researchers’ own point of view regarding cooperation for the benefit of Small and Micro Enterprises in Dublin 15. Moreover, from a nonfoundationalistic realism view point, efforts were consciously made in order to avoid that knowledge so far taken as established in the field of cooperation among actors in policy networks compromises the knowledge produced by the evidence on cooperation among actors in this research. Taking the above into consideration, one of the methodologies used is a qualitative approach considering respondents’ representations of reality through a qualitative content analysis and qualitative techniques in social network analysis. Once data were generated, they were treated by using quantitative data analysis techniques and were converted into algebraic formulae reflecting responses given, i.e. whether a relation exists or not between two actors or more and if it is reciprocal one is a matter of replacing YES and NO answers, or in this case BLUE and RED arrows, for 1 and 0, respectively. This is not to say that social network analysis will serve as a complete assurance for validity and credibility, as questionnaire return rates and responses can indeed compromise it. It is hoped, however, that the weaknesses evident on this work are rather derivative from the very limited time afforded to Taught Masters students, effectively from May to August 2009, than from research bias. 1.2 Justification This work has a scientific and practical relevance and they are equally important as it is hoped that its findings and conclusion will not just add to the scientific knowledge but also reach the actors involved in policy implementation for micro and small enterprises in Ireland as well as those concerned with aspects of economic development. In the scientific sphere, this study will be initially guided by O’Toole’s (1997) work stressing the increasing complexity of networked settings in the public administration where he also urges for more empirical research to be conducted in order to comprehend the impact of such settings on policy implementation. This is also Blair’s (2002) views in his work on implementation networks in which he infers that complex systems formed by actors both coming from both the public and private sectors are assumed in now-a-days public administration. According to Blair, this will help measure the level of direct action by the government so to assess the complexity of such networks and he goes on to borrow from Alexander (1995) the concept of compulsory and voluntary links as the essence of policy implementation systems. Further to such concepts, the focus of this study is on mandatory and voluntary cooperation amongst MSEs stakeholders both in the public and private sectors. Having it all said, measuring service integration among agencies is not the objective of this study. Instead, it will try to leverage on social network analysis practice and theory to measure centrality, closeness, structural holes and brokerage (Freeman 1979; Burt 1995 and 2005). Other theorists, especially those whose studies are within social network analysis (Simmel 1995; Wellman 1983; Hanneman 2005), and regarding the bureaucratic aspect of the public administration (Weber 1978 and Blau 2006) and the (potential) social capital resulting from networks (Bourdieu 1986; Putnam 1995; and Fukuyama 1996) will also be used in the hope to complement existing literature on the topic. The above will, indeed, guide this study all the way through. 1.3 Chapter Outline CHAPTER III: LITERATURE REVIEW Defining the size of a business This research does not aim to be seen under the umbrella of business studies, but a sociological study of cooperation among policy implementation actors for policies in benefit of micro and small businesses in Ireland. Nevertheless, it is found pertinent to use business literature in order to outline the most commonly used definitions of business’ size according to factor inherent to its life cycle. The literature on organisation life cycle (OLC) has been found to be the most appropriate to define the size of a business. However, it is important to note that professionals used to working with businesses may find their own ways of defining business’ size and may as well widely disagree from the scholarly models created and widely used to date. The traditional models for sizing a company were given mostly in the 1980s first through conceptual works and eventually through empirical research which attempted to establish the phases of an organisation according to the environmental issues it faced throughout its existence (Rutherford et al. 2004). The literature consulted for this section has shown that one of the models that has been most cited and used as a reference is that created by Miller and Friesen (1984) whereby the organisation life cycle was divided into five phases: birth, growth, maturity, revival and decline (1984: 1162). These phases can be summarised according to the age, size and growth rate of the organisation. In summary, these phases were the birth phase for small companies, the growth phase for medium-sized companies, the maturity phase for larger organisations, the revival for very large and finally the decline phase for market size companies. The latter phase is linked with the decline in innovation and with environmental factors such as market dry-up. Meanwhile the earlier phases of the business are linked with the most innovative, although unstructured, stages of the organisation (1984: idem). Figure 2 below exemplifies the above:- Figure 2. Organisation life cycle (OLC) and its expected size per phase. The head count for the traditional models is shows as 0-4 persons employed in the birth phase, then 5-19 employees in the medium-sized firms and finally above 20 in the larger ones (Huang and Brown 1999 cf. Rutherford et al. 2004). Weaknesses of this model have been pointed by more recent works (Stubbart and Smalley 1990; Tichey 1980 cf. Rutherford, Buller and McMullen 2004) which took different views and approaches to establishing the different phases an organisation goes through. Other works making use of open-ended choices rather than forced-choice methods to identify an organisation’s problems according to its size, have found that obtaining external financing, internal financial management, economic environment and regulatory environment are problems often experienced by organisations in their start-up and growth phase (Terpstra and Olson 1993 cf. Rutherford, Buller and McMullen 2004) Taking definition from a different angle, the authors Rutherford et al. (2004) infer that other models have been created to overcome the weaknesses presented in previous models and the model by Kihenen (1990), which makes use of Artificial Neural Network (ANN) in order to depict rather realistic stages of an organisation given a series of other factors not limited to age, size and growth rate and it is similar to a cluster analysis and named as self-organising map (SOM). This model, different from traditional models, including the model created by Miller and Friesen (1984), does not force firms to fit into predetermined groups but allows for stages to fall into categories given by the data under study (2004: 328). Nevertheless, the traditional model remains imperative throughout their work and so it will throughout this work. The reason is twofold: a) the traditional definitions have been confirmed through empirical work and across countries; and b) it is assumed here that the proble ms faced by an organisation in each phase of its existence can be logically linked with the needs of these organisations for growth. Hence, policy-making and implementation, as it will be demonstrated later on, is more likely to follow traditional models than novel models. Though this is not to say that new findings on an organisation’s functioning will not be appreciated by policy actors. Moreover, taking into consideration the criticism on the traditional models it is therefore acknowledged that the adoption of traditional model is merely as starting point for reference given the insufficient time for the maturing of this study. Table 3 below shows the most common problems in organisations given their size and phase found by traditional models which have also been confirmed by more current studies utilising different organisational typology techniques:- Table 3. Problems helping establish the size and stage of an organisation. Problems Stage/Phase Headcount Newness, obtaining external finance, internal finance management, unstructured, informal, product development, economic and regulation environment, weak client base, owner/manager dominated. Birth/Start-up (Small firms) 0-4 employees Production efficiency and effectiveness, human resources management and re-organisation, economic and regulation environment. Growth (Medium-sized firms) 5-19 employees Maintaining growth momentum and market position, economic environment, production stagnation and lack of innovation, and employee retention. Stability/Maturity and Decline (Large firms) 20+ employees Source:Miller and Friesen 1984; Kazanjian 1988; Terpstra and Olson 1993 and Huang and Brown 1999 (cf. Rutherford et al. 2004). Conceptualising the phases and problems of organisations will help us understand the policies made in benefit of micro and small businesses in the European Union. However, a point in time must be made regarding the micro-enterprises that may not fit into the typology above given the ethos of their existence. In Europe, the crafts industry is within the definition for micro-enterprises as well as entrepreneurs in the rural areas. However, one should also consider the large number of self-employed professionals such as plumbers, carpenters, painters and also accountants whom may never expand their business, formalising it into a company hence adhering to the organisational life cycle above. Nevertheless, they too generate employment and tax revenue on top of their networked oriented business behaviour hence contributing to the country’s economy but as well as for social and local integration in Europe (European Commission’s SME Portal Observatory Report of European Enterprises 2003/7). Given the above, the needs for micro and small enterprises will vary according to their problems and other human aspects inherent of the cultural and social settings and mindset businesses are found. These settings have been acknowledged by the European Commission in providing assistance to groups widely seen as minorities in large scale businesses, but forming a large number among micro and small entrepreneurs, namely women and immigrants. The Concept of Policy Implementation Networks In policy network theory, implementation networks have been categorised and conceptualised mostly according to the context in which they have emerged in order to either reduce transaction costs or resolve problems effectively. Such a context will determine the resources and power that members will share on their way to achieve their shared goals or resolve their common problems (Provan and Milward 1995 and Bozer 1996). The subject of context is here defined as the ethos and habitus of policy implementation networks in general and they will be explained later on in this chapter. Modern states are now dealing with problems of greater complexity and this requires a superior level of negotiation and public participation in order for services to be delivered to the public as effectively as it is possible. For this reason, O’Toole (1997) asks researchers and public administrators to take networks more seriously and calls for a whole research agenda on the effects they have on hierarchical structures common to public agencies and ultimately affecting policy making, implementation and evaluation (O’Toole 1997; Provan and Milward 1995, 1998 and 2001; Bolzer 1996; and Sandstrà ¶m and Carlssson 2008, among others). The last decade saw a particular growth in research interest on policy implementation networks. Most of the work produced, once satisfied with the working concepts and theoretical frameworks on the subject, now concentrates on measuring implementation effectiveness from different angles and using different methods (idem). While O’Toole (1997 and 1999) remained mostly in the theoretical field hypothesising on management action in hierarchical structures (O’Toole and Meier 1999) and Bozer (1997) strived to conceptualise networks as forms of governance, others like Blair (2002) took the empirical road either by putting to test models created by O’Toole and Meier (1999) or utilised Social Network Analysis in order to analyse networks for what they really are, social structures with interdependent interests (ibidem). As to the initial theoretical framework for policy implementation networks, O’Toole and Meier (1999) created models for managerial action in public administration taking into account the prevailing hierarchical structure of public agencies. For them, networks are of great help to public servants and they see the two structures, linear and non-linear, as poles of a continuum related to buffering in the interests of stability (1999: 510). However, it is important to note that the emphasis of their work is on improving hierarchical systems rather than replacing them for networks since the authors see the informal and inconsistent nature of networks as a weak structure for buffering environmental issues common to policy implementation or service delivery while they also believe that a hierarchical system can maximise management resources more than networks as the latter demands more of such resources in order to maintain reciprocal ties. Though, they do acknowledge that not all networks have inconsistent relationships and have achieved stability by sharing a consistent policy agenda away from a hierarchical habitus, e.g. US farmers’ network, borrowing the term in italics from Tocqueville (2004: 329). Blair (2002), on the other hand, deals with empirical quantitative research on policy implementation in the field of economic development by studying the so-called Enterprise Zones in Southern United States, very popular in the 1990s, especially during Reagan’s second term in presidency. He makes use of policy tools theory and methodology while also drawing from O’Toole and Meier’s (1999) conceptual framework and models for public management in policy systems to formulate his three major hypotheses that aim at measuring the level of direct government intervention in service delivery systems for Enterprise Zones in distressed areas. The first hypothesis states that less government direct intervention means more complex implementation networks, while the second hypothesis continues from the first by asserting that less government participation also means that more actors are involved in implementation, especially private and non-profit organisations. Finally, the third hypothesis, which will later provide the most confounding findings, posits that the private sector takes a greater role in implementing programs in economic development policy networks (2002:170). The first two hypotheses were validated by the findings and agreed with the theoretical concept framework by O’Toole and Meier (1999) on the structure of new policy implementation systems. However, the third hypothesis for which he expected a negative correlation between private and public participation in implementation, he, in fact, obtained a positive one. His findings indicated that the more active is government intervention in the EZs investigated, the more participative businesses were in implementing the programs. However, this finding, according to Blair, does not contradict what had been theorised by O’Toole and Meier’s (1999) (cf. Blair 2002), but he classifies O’Toole’s (1997) system as the old implementation system and the later as the new system. Although policy tools theory is one good way of measuring government intervention in economic development, other approaches may also provide fruitful findings and ways of analysing policy implementation networks. Bozer (1997), for example, explains that policy networks are conceived as a particular form of governance in modern policy systems (Kenis and Schneider 1991; Kooiman 1993; Mayntz 1994, cf. Bozer 1997). In fact, she notes that their main focus is on problem-solving and not on intermediating interests. Any cooperative game members play in order to negotiate strategies to arrive at a solution and based not only on mutual goals, but mostly on communication and trust while acknowledging that their values, ideas and identities are essential to the network. Therefore, Bozer understands:- Policy networks as ‘webs of relatively stable and ongoing relationships which mobilise and pool dispersed resources so that collective (or parallel) action can be orchestrated toward the solution of a common policy’ (Kenis Schneide 1993: 36 cf. Bozer 1993:5). A policy network includes all actors involved in the formulation and implementation of a policy in a policy sector. They are characterised by predominantly informal interactions between public and private actors with distinct but interdependent interests, who strive to solve problems of collective action on a central, non-hierarchical level. (Bozer 1997: idem) She asserts that scholars whom have dedicated their work to see these network members as rational actors, following a horizontal self-coordination, may forget to include some of the main aspects making for such networks in the first place. For Bozer, looking at the intermediation position that networks can have, one may realise that policy-making can be ‘blocked by dissent’ and create what she sees as the ‘bargaining dilemma’ (or prisoner’s dilemma) where ‘defection from cooperation is more rewarding than compliance for a rational actor, owing to the risk of being cheated’. (1997:4) The exception exists when ‘bargaining is voluntary’. As approaches to research change over time and so do concepts and theoretical frameworks on policy implementation networks. Though, most references analysed for this work, showed that there is more of a convergence of knowledge on the topic rather than any radical change. It was noted, however, that works on the subject matter have become more and more empirical and it was found that using structural analysis has proved rather fruitful for a much needed progression on studying it. Aside policy tools, strategic decisions and interest intermediation to share resources and increase productivity and effectiveness, networks are social structures where norms are created and crystallised or otherwise and as such they must be analysed for their properties, the opportunities (advantages) and constraints (disadvantages) that these properties can originate. In other words, since networks are dynamic social structures, the questions asked, either to understand their modus operandi or more so to measure their effectiveness, refer to how actors organise themselves to problem-solving and what are the properties that this can originate. This seems to be the approach taken by a recent study on four policy networks in the educational system in Sweden by Sandstrà ¶m and Carlssson (2008). They acknowledge the organisational roots of policy network theory and from which important concepts have emerged, such as advocacy coalitions, implementation structures, iron triangles, issue networks, policy communities, and subgovernments (Sabatier Jenkins-Smith 1993; Hjern Porter 1993; Jordan Schubert 1992; Heclo 1978; Jordan 1990; Rhodes 1990; cf. Sandstrà ¶m and Carlssson 2008). Nevertheless, their research is justified by the reasons mentioned earlier, being a lack of substantive empirical work using the methods of social network analysis to study policy networks, since only network theorists in different disciplines (Sociology, Political Science, Business Administration etc.) have been interested in the social capital derived from network properties and which is capable of evaluating outcomes and performance. The authors concluded that their theoretical and methodological approach, as aforementioned, proved fruitful for the understanding of policy networks as a structural process where heterogeneity and centralisation are beneficial to network performance whereas structural holes (poorly or non-connected actors) should be avoided when the objective is to achieve efficiency (2008:517). In this view, concepts and knowledge generated by their study converge with those generated by previous works mentioned earlier in a complimentary manner. Evidently, there are several theoretical and empirical works making valuable contribution to the conceptualisation and setting an ever richer theoretical framework to rely on. However, given the short time given for this research, we will settle for what was seen as some of the most useful works with which to begin with. The ethos and habitus of policy implementation networks After contemplating some of the most prominent and recent concepts and theories on policy implementation networks and having touched on the subject of context, we now proceed to further the discussion on the latter beginning with seminal works on bureaucracy, the original ethos of public policy making and an aspect of the context which policy networks can be found. After that it will be discussed the idea of habitus as conceived by Tocqueville on his work about the associational ability of North Americans in the United States of his times. Beginning with the former, Max Webber interpreted the bureaucratic organisation by using terms such as money economy (for its existence), but also stability and rigidity as forming the ‘mechanised bureaucratic apparatus’ while emphasising its ‘technical superiority over every other form’. (1978:345-50) In parallel to contemporary public administration systems, the bureaucratic systems conceived by Weber had similar reasons to evolve and proliferate, being the always increasing complexity in administration, pressure from interested parties for social policy and willingness by the state to increase efficiency while reducing transaction costs. Still according to Weber, authority and hierarchy are also essential to the universe occupied by the public office. However, networked systems, although still embedded in bureaucracy, being hierarchy its essence, would not posses the same strictness and uniformity. As we have seen earlier, this is not to say that todayâ⠂¬â„¢s public administration cannot achieve stability through ways other than hierarchy. (O’Toole and Meier 1999) However, it is well known that Weber came from a rather theoretical perspective, which is the opposite of Peter Blau’s (1963) case, whom has written an entire book on the American bureaucratic system as a result of his ethnographical work in the 1950s. For Blau, this type of social organisation could not be defined merely through hypotheses, but was rather the subject of empirical investigation. Moreover, he opted to see bureaucracy as an orchestrated effort of public officials to ‘transform exceptional problems into routine duties of experts’. (Hughes 1951, cf. Blau, 1963:251) In fact, Blau acknowledges that the bureaucratic system in Germany during Weber’s times were very different from the same system on Blau’s times, especially if we consider they also refer to different countries, hence of different cultures. Even if we accept that expertise, or specialism, has been the raison d’à ªtre of public administration (again, for transaction cost reduction and efficiency’s sake), social interaction among servants are always changing and recurrent cooperation among workmates and just not friends would help contribute to the emergence of the new ethos of policy implementation networks. (Blau 1963:259; Bozer 1997) Therefore, one can hypothesise that repeated social interaction among individuals within the same group or organisation will lead to cooperative behaviour and as Bozer (1997) has inferred, such interactions combined with the notion of good communication