Monday, September 30, 2019

Advantages and Disadvantages of Space Programme

BOB Space programme plays an important role in our life because it helps human know the world clearly. There are increasing number of money spent on space programmer in United States and Russia, which has had a significant impact all over the world. Although there are some advantages like contributing to economy growth and providing chance to search new planet for human to live, there are several disadvantages need to be considered like wasting non-renewable resources and including unforeseen risks.Developing space programme has many advantages. First and foremost, developing space programme promotes the development of economy by creating job opportunities. Jewell. R(2011) said that â€Å"Aerospace-related industries employed millions of worker and supported a great number of profitable companies. Many experts believe that space tourism and development of space could result in an economic boom† Thus, the development of space programme helps the economy growth.Secondly, develop ing space programme provides the opportunity to search new planet for human to live. with the rapid development of industry, the natural resources are becoming rare in the earth and the earth is deeply polluted by human beings. For this situation, it seems obviously important for human to find a new planet to live in. Therefore developing space programme is a long-term consideration for human beings. On the other hand, there are some disadvantages in developing space programme.Firstly, developing space programme waste a lot of non-renewable resources. Every year millions of tons of coals were consumed by aerospace industry, which means a mass of waste gas, like carbon dioxide, discharged into air annually, resulting a series of environment problems such as ozone hole and acid rain directly. Consequently, spending vast amount of money in space programme is completely bad for the environment. Furthermore, there is always full of unforeseen risks with space exploration. Lichtenstein D. 2011) said that â€Å"The space shuttle Challenger exploded during launch in 1986, killing seven astronauts, and the shuttle Colombia exploded during re-entry in 2003, also killing seven† human’s life is valuable because everyone only lives once, which is not only precious for themselves, but also for their relatives. Thus, the development of space programme could threaten human’s life. To sum up, developing space programme has many advantages like promoting the development of economy and exploring new planet for human to live. However, there are some disadvantages like wasting non-renewable resources and filling with unforeseen risks.The decision to develop Space programmer not only affects human beings now, but also has an impact on their future life. Therefore, people should still develop Space programmer so that their can know more about the world. Reference Jewell. R(2011) â€Å"Positive Effects of Space Exploration† Retrieved 17/03/2013 from http:/ /www. ehow. com/info_839090880_positive-effects-space-exploration. html Lichtenstein D. (2011) â€Å"Bad Things About Space Exploration† Retrieved 17/03/2013 from http://www. ehow. com/info_8523069_bad-things-space-exploration. html

Sunday, September 29, 2019

Implementation of an Information System for a Financial Institution

INTRODUCTION Background Ribeiro and David (2001) state that information technology over the years has had a number of significant impact on organizations. Such impacts are: †¢ It has created opportunities for competitive advantages amongst competitors in any industry †¢ It has improved the relationship existing between customers and organizations †¢ It has helped with the development of new products as well as services †¢ It has allowed organizations to perform tasks which would have remained impossible without the use of a computer system. It has reduced the total cost incurred in transaction processing for banks and other financial institutions. History of the I. T manager Having applied for the post of the I. T systems manager, listed below are my qualifications and information about my past work experience: †¢ A master’s degree in Information systems with technical background in Windows Server and Desktop technology †¢ Professional qualificati ons in CISCO and MCSE with an understanding of some server grade applications including IIS, Apache, SharePoint, DNS, SQL and Foundstone Reasonable knowledge of large enterprise LAN/WAN environments †¢ 8 years experience in project management, leadership and organizational skills †¢ 7 years IT managerial experience in other financial institutions †¢ 5 years experience with client technologies †¢ 4 years working experience developing effective IT for financial institutions History of Progress bank Progress bank was established in 1999 and up till now does not have any I. T department in place. Their customer base is relatively small as well as the number of staff. Recently, it mergered with another bank in a bid to make it stronger and this has led to increased operational activities, increased customer base and more staff and a decision to introduce and implement an effective I. T department for the bank. The board decided to set up the department in order to ease their work, to allow free flow of communication between the various departments, to hasten decision making processes, to improve the turn-around time in their daily operational activities. The board members of the bank want the I. T manager to report directly to the Head of Operations of the bank. About 10 – 12 information technology specialists would be required to work with him in the new department and the roles and responsibilities are to develop, maintain and support the banks cash and commercial product management systems, to reconcile accounts, to manage the cash systems and control disbursement of funds. Some recruitment consultants were consulted to help out with the recruitment of appropriate candidates and so far, 8 people have been recruited to work with the I. T manager. These people include network technicians, network assistants, and network engineers. Responsibilities of the I. T manager The major tasks and responsibilities of the I. T manager have been identified to be: 1. Development of an information system for the bank. 2. Coordination, monitoring and supervision of the supporting staff for the development, designing, coding, maintaining and modifying application programs for a limited area and small number of projects. 3. Extensively working with the business units of the bank in support of their business processes, electronic business communication and also transactional needs. . The provision of analytical support for applications-related activities including customer experience, marketing, technology, human resource and also the operations department. 5. Leading the deployment of advanced information technology solutions relating to commercial product needs. 6. Recommendation and suggestion of strategies as well as hardware and software enhancements to increase employee productivities. 7. Administering, recommending and im plementing changes to policies that affect the employees of the various departments. 8. Making the flow of information within the organization easier and faster through the development of the intranet. 9. Making communication a two- way thing i. e. vertical and horizontal. 10. Developing a customer database for the bank. 11. Selecting, developing and evaluating personnel to ensure the efficient and effective operation of assigned functions. 12. Ensuring that the project budget, schedules and performance requirements are completely met. 13. Regular interaction with customers and some peer group managers. 14. Ensuring that the organization operates fully in accordance with the established procedures and practices. How to measure the implementation success The success of the implementation of an information system can be measured by taking note of the following: i. User satisfaction with the system or with the outcomes of using the system. ii. Favorable attitudes on the part of the users towards the system. iii. The overall payoff to the organization. iv. The extent to which the system accomplishes the organizational objectives. Limitations The major limitation to be considered is the cost. It would be costly for the organization to fully introduce and to implement an effective information system. A major factor to be considered is the need for training and development of the existing members of staff of the organization. Training and development sessions, on-the-job training, meetings and discussions need to be arranged for the members of staff in a way that it would not interfere with the day-to-day operational activities. The whole process of change may be a cumbersome one for the employees because they would have to transfer the information and data from the various departments from files which were their major form of storage to the computers. INFORMATION SYSTEM This refers to the interaction between people, processes, data and technology. It refers to the way people interact with technology to support the business processes. Information systems are different from the information and communication technology (ICT) and also from business processes although it has an ICT component and it also helps to control the performance of the business processes (Zhu and Meredith, 1995). An information system can be defined as a work system involving activities that are necessary for the processing (capturing, transmitting, storing, retrieving, manipulating and displaying) information (Wang and Strong, 1996). An information system can be considered as a semi-formal language that supports decision making as well as actions. Components of Information System There are different components of the information system and they include: i. I. T comprising of the hardware and the software. ii. Data/ Information. iii. Procedures/Policies. iv. People. v. Purpose and vi. Communication Networks. Hardware Standards There are different standards of computer hardware, the hardware consists of the things that can be seen. The standards will be reviewed and revised occasionally based on the emerging desktop technologies and development in software (Avgerou, 2001). It is recognized that in the bank, the ability to share vital information easily and quickly is very important. Apart from the quick sharing of information, the software environment is also important especially those used for word processing, databases for the customers, spreadsheets, network browsing and electronic mail. Therefore, the development of a wide computing infrastructure which is based on good hardware and software standards will improve the day-to-day operational activities and interactivity between the various departments of the bank. The standards would also help facilitate the quick exchange of information as well as important documents both within and outside the bank. According to Stair and Reynolds, the hardware standards are based on the present technology that is available in addition to the present needs of the bank which then applies to both the windows and the mackintosh platforms. However, for each hardware configuration, some considerations have to be made which include: i. Easy connectivity to the bank’s network. ii. Easy connectivity to the external systems and other organizations. iii. The in-house experience with the chosen product and the configuration. v. The maximum period which the machine can effectively function. v. The presence of service provided by external hardware repairers. Different types of computers can be purchased but regardless of the type purchased, the minimum configuration should be: i. Intel core 2 Duo processor. ii. 2 G RAM because we’ll be using windows Vista. iii. 60 GB hard disk. iv. CD – ROM/DVD drive. v. Network connection. vi. 3 years warranty. Because of the nature of the tasks performed by the bank, there will be a need to archive data, so a DVD+R drive is recommended. Recommendations on what to purchase Monitors: Flat panel monitors with high resolutions are recommended due to cost constraint, but as time goes on, we could change them to dual monitors. Printers: HP Laser jet P2015dn (monochrome) and HP Color Laser Jet 2605dn (color) is recommended. Scanners: USB scanners are recommended. Other Peripherals such as Modems, NICs and Drives: From previous experience, a personal relationship has been developed with MNJ Technologies Direct so it is recommended that supplies be purchased from them. Software Standards The software standards have a lot of advantages and these include: 1. An improved data sharing to ensure: . The sharing of data between applications such as word processors, databases, spreadsheets and so on. b. That there are identical resources on each of the desktop to provide easy transfer of information and to serve as a consistent tool-set for all the bank workers. c. A consistency of file format to provide optimal file sharing between individuals, units and departments within the organization. 2. An improved training which focuses on: a. Team training in various courses and workshops for different levels of user proficiency i. e. the introductory, intermediate as well as the advanced stages. b. Computer – based training courses which is centered on selected software packages. 3. An improved support from the I. T support staff to focus on: a. The depth of knowledge of application instead of the breadth of the large number of applicants. b. Product expertise. 4. Smoother software installation and upgrades to ensure: a. The proper installation of the different software for the new computers usually making it a part of the initial hardware installation. b. That routine installation is made instead of a specialized process for each individual resulting in maximization of time and resources. c. That upgrades are tested and properly documented in order to reduce potential incompatibilities. Types of software standards 1. Fully supported software: it is my responsibility as the I. T manager to ensure that the appropriate software is installed, to troubleshoot software problems, to provide training courses and to provide the documentation of selected packages. Office productivity suite includes Microsoft word, Microsoft excel, PowerPoint, Access, and MS Office. i. Electronic mail/calendar ii. Web browser which includes internet explorer 6, safari 1 (Mac OS 10. 2), Firefox 2. iii. Web course development : Desire2Learn. v. Web page development: Dreamweaver MX. v. Image Editing: Adobe Creative Suite 2. 0. vi. Operating Systems: Windows XP and Windows Vista. vii. File transfer: Transmit, Filezilla 1. 7. viii. Other utilities: PowerArchiver 2000, Norton Antivirus 10. 15, Print Key 2000. ix. Network operating system: Netware 6, Microsoft server. x. Network clients: Netware client 4. 9 SP2 (Win XP). 2. Partially supported software: This may include some versions of the fully supported software and in some cases; it includes a new release of a standard application. These includes: i. Mathematical software: Maple 10, Matlab 2006. i. Telnet: Host Explorer (Telnet) 4, Putty (Win). iii. Operating systems: Windows 2000, Mac OS X 10. 3. iv. Statistics: SPSS 15. x, SPSS 12. x, Minitab 15. x. v. Office productivity suite: MS Office XP. 3. Non- supported software: these are some software that the I. T will not install nor provide follow-up support for because they are considered as obsolete. Examples of these include all Microsoft DOS and Windows 3. 1 based software. 4. However, changes will be made regularly by the I. T department to the computer hardware and software standards and this will be communicated to all members of staff. Sufficient time will be allowed for the migration to new standards; changes will also be made regularly to the hardware configurations as technology and prices change and would also be communicated to all members of staff. Operating systems Operating systems are the most important software which runs on the computer. Without it, the application software which is designed to communicate with the hardware through the operating system cannot run. There are different types of operating systems and these can be classified into: a. Single program operating system and . Multi tasking operating system The single program operating system is a type of OS that allows only one program to run at a particular time. This was later converted to the multi tasking operating system because it was found out that it was time consuming and not very practical and professional to close one application in order to open another one especially if you want to copy or transfer data from one application to anothe r. The multi tasking operating system is a type of OS that enables a single user to have more than one applications open at the same time. It usually gives the computer the option of determining how many time slices will be allocated to each program. The main program gets the most and the rest is distributed to the remaining programs depending on their rates of activity. There are basically three types of the multi tasking operating systems. These are: Single user multi tasking systems, real time operating systems and the multi user operating system. The real time operating systems are usually used to control scientific instruments, industrial systems and so on. The user has little control over the activities performed by this type of system. The single user multi tasking system allows a single user to open and run different applications at the same time. Examples of this type are Windows of Microsoft and the Macintosh of apple. Multi user operating systems are systems that give access to the resources on a single computer to many users at the same time. An example of this is the UNIX. However, the operating system that is commonly used are Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP (coming in two versions as the home and the professional), Windows Vista, Windows CE, Apple Macintosh, Unix, Solex etc (Charette, 2005). Network Security The computer networks can either be public or private. They are used daily to conduct transactions and to hasten communications amongst individuals, business and groups within an organization. The networks comprises of ‘nodes’ which can be referred to as ‘client’ terminals and one or more ‘servers’ or ‘host’ computers. They are usually linked by communication systems which could be private which could be used within a company and public which can be accessed by members of the public such as the Internet. However, due to technological advancement, most of the companies host computers can be accessed by employees within the offices over a private communications network outside the offices through normal telephone lines (Tatnall et al. , 2002). Network security can then be described as involving all the activities that the various organizations, institutions, enterprises and so on take to protect the value of their assets and the integrity and continuity of their operations. In order to make the network secure, threats should be identified and strategies put in place to combat them by making use of the different network security tools. Threats to network security There are different threats to network security and they include: a. Viruses: these are computer programs that have been written by programmers with the aim of infecting computers when triggered by a certain event. b. Trojan horse programs: these are delivery vehicles for destructive codes which could appear as a harmless software program or as a useful one. c. Vandals: these are some software applications that can destroy the computer. . Attacks: This could be information-gathering activities which collect data that is used to compromise networks, access attacks which exploit network vulnerabilities gaining entry to e-mails, databases and the corporate network and denial-of-service attacks which prevent access to some part or all parts of the computer system. e. Data interception: This involves the altering of data packets that are being transmitted. Some network security tools that can be put in place include: a. Antivirus software packages: These are used to counter most of the virus threats. They need to be updated regularly in order for it to be effective. b. Secure network infrastructure: firewalls and intrusion detection systems provide protection for all the areas of network hence enabling secure connections. c. Virtual private networks: these are used to provide accessibility control and data encryption between different computers on a particular network. It allows the safe connection of workers to the network without the risk of someone else intercepting the data. d. Encryption: these are used to make sure that messages cannot be read by anyone else other than the authorized recipients. . Identify services: are services that identify users and control their activities as well as their various transactions on the network. Services used here include authentication keys, passwords etc. However, no single solution can protect against the variety of the afore mentioned threats, as a result, multiple layers of the security tools should be put in place. Network security i s usually accomplished through the hardware as well as the software, with constant update of the software to further protect from the emerging threats. In order for the network security system to be effective, it is important to note that all the network security tools work hand in hand to minimize maintenance and to improve security. Client Server Computing Client server computing can be defined as a distributed computing model where the requesting of services from the server processes is done by client applications. Here, both the clients and the servers run of different computers that have been interconnected by a computer network. Basically, it is server software that accepts requests for data from the client software and returns the results to the client. The major focus in client-server computing is on the software. A common example of the client-server computing is the use of the internet which could be the collection of information from the World Wide Web. However, client server computing generally applies to systems in which the organization runs various programs that have multiple components distributed amongst different computers in a particular network. The concept is linked with the enterprise computing which ensures availability of the computing resources. Client server systems are important and useful in the banks because it allows easy accessibility of account information on a central database server amongst other things. This will be very useful in the day-to-day operational activities. All the access is done through a PC client which provides a graphical user interface (GUI). Data such as the individual account numbers can be entered into the GUI along with the different types of transactions made on the account be it withdrawal or deposits. The PC client validates the data, transfers it to the data base server and eventually displays the results. Client Server Toolkits It has been observed that a lot of software toolkits for the effective building of client-server software are available today. These toolkits are referred to as middleware and examples are the Open Software Foundation (OSF) Distributed Computing Environment (DCE), Distributed component object model (DCOM), Message-Oriented Middleware (MOM) and the Transaction processing monitors (TPM). Data Base Management System This is a collection of programs that enables effective storage, modification and extraction of information from a database. Its primary goal is to provide an environment that is convenient and efficient for the storage and the retrieval of information. Different types exist which range from small systems running on personal computers to huge systems running on mainframe computers. Examples of database management system are Microsoft Access, My SQL Server, Oracle and FileMaker Pro. Examples of the use of the database systems include: †¢ Automated teller machines(ATM) †¢ Computerized library systems †¢ Computerized parts inventory systems †¢ Flight reservation systems Employee information systems †¢ Company payroll †¢ Credit card processing systems †¢ Sales tracking systems and so on The internal organization determines the ease and flexibility of information extraction. The requests for information from a database are made in form of a question. This information can be presented in different formats. The database management system includes a report writer program which en ables the output of data in the form of a report; some also include a graphics component which allows the output of information in the form of graphs and charts. The major purpose of a database system is that it provides users with an abstract view of data. Data is usually stored in complex data structures bit users see a simplified view of the data. Model View Controller Model view controller is a design pattern that is used by applications which need the ability to maintain multiple views of data. It focuses on a separation of objects into three categories such as: †¢ Models: for the maintenance of data †¢ Views : for the display of all or a portion of data †¢ Controllers: for the handling of events affecting both the models and the views. Due to the fact that it can be categorized, there can be interactions between multiple views and controllers with the same model and there can also be interactions between new views and controllers that were never in existence with a model without necessarily forcing a change in the design of the model. Model view controller can be represented graphically as shown below: [pic] The controller can change a model or a view or change both due to certain events. When a controller changes the model, all the dependent views update automatically and similarly, when a controller changes a view, the view gets data from the model to update itself. Enterprise resource planning (ERP) This is a term that is used to describe the set of activities supported by multi-module application software that helps businesses and companies to manage the important parts of its business. It is a package that promotes the seamless flow of information in any organization. The information from the ERP system provides visibility for key performance indicators that are necessary for meeting corporate and business objectives. ERP software applications are useful in managing product planning, providing customer service, purchasing, inventories and tracking orders. Enterprise resource planning includes application modules for the finance and the human resources aspects of any business. Typically, it has both modular hardware and software units that communicate on a local area network. This allows a business to add or to reconstruct modules while preserving the integrity of the data. Some of the players in the ERP market are SAP, PeopleSoft etc, while the new comers include Oracle, IBM and the Microsoft. Before an organization implements the ERP, certain issues need to be addressed and they are stated below: †¢ The popular information systems †¢ Fluctuations in the choice of technology The ability of the market players to stay in tune with ERP †¢ The effective ways to implement business applications like ERP †¢ Ways to benefit from it in order to lead to competitive advantage †¢ The necessity for the innovation of software applications All these are important to take note of and will eventually determine the business mod el of the organization. The implementation of ERP is a very crucial factor in the ERP system. The success of a good ERP implementation lies in quicker processes making training very important. The speed and extent of the training eventually determines the worth and the value of the ERP. Decision Support System This is a term that describes computer applications which enhances the user’s abilities to make decisions. It describes a system that is designed to help decision makers identify problems and to make decisions to solve those problems by using information from a combination of raw data, personal knowledge, business models and communications technology (Hanna et. al, 2003). Information that can be gathered and presented by a decision support is: †¢ Comparative sales figures from one period to the other †¢ Projected revenue figures which are usually based on assumptions on new product sales A stock of all the current information assets which could be data sources, data warehouses, data marts etc. Components of Decision Support System According to Bhargava et. al,(1999), the components of Decision Support System can be classified as: †¢ Inputs: which include numbers and characteristics that are used for analysis †¢ User knowledge and exp ertise: which are inputs that require manual analysis by the users †¢ Outputs: which are transformed data that aid the generation of the DSS decisions †¢ Decisions: these are the results generated by the DSS Applications of Decision Support System Decision support system can be used and applied in various fields. Some of them are stated as follows: 1. It can be used for medical diagnosis in the clinics. 2. It is used extensively in business and management to allow faster decision making, better allocation and utilization of resources and the early identification of negative trends which could pose as threats to the organization. 3. It is used in agricultural production systems to facilitate decision making at the farms and at policy levels. 4. It can also be used in forest management for long-term planning. 5. It can be designed to make useful decisions in the stock market or even in the marketing department of the banks to decide which segment or target group to design a product for. It is basically useful in any field where effective organization is necessary. Benefits of Decision Support System Some of the benefits of an effective DSS include: 1. It helps to create competitive advantage amongst an organization’s competitors. 2. It facilitates interpersonal relationships between the employees of a particular organization. 3. It increases control in an organization. 4. It speeds up the process of problem-solving in an organization. . It recognizes the importance of training and development within an organization and it promotes this. 6. It encourages innovative thinking as well as discovery of new areas of the decision maker hence improving motivation of the employee CONCLUSION It is worthy to note that the implementation of an effective information system is a continuous process t hat starts from the period the original suggestion was made and continues in the system as new users are introduced. Implementation plays a major role in the management of information technology and as such steps should be taken that it is done properly. REFERENCES Avgerou, C. , (2001). The significance of context in information systems and organizational change. Information systems Journal, Vol 11, pp 43 – 63. Bhargava, H. K. , Sridhar, S. & Herrick, C. (1999). Beyond spreadsheets: Tools for building decision support systems. IEEE Computer, 32(3), 31-39. Charette, R. N. (September 2005). Why software Fails. IEEE Spectrum. Hanna, M. M. , Ahuja, R. K. & Winston, W. L. (2003). Developing spreadsheet-based decision support systems using VBA for Excel. Gainesville, USA: Innovation Center. Ribeiro, L. & David, G. (2001). Impact of the information system on the pedagogical process. Stair, R. M. & Reynolds, G. W. (1999). Principles of information systems (4th ed. ). USA, Course Technology – ITP. Tatnall, A. , Davey, B. , Burgess, S. , Davison, A. & Wenn, A. (2002). Management information systems -concepts, issues, tools and applications. Melbourne: Data Publishing. Wang, Y. and Strong, D. M. (1996). Beyond Accuracy: What data quality means to data consumers. Journal of Management Information Systems, 12, pp. 5-34. Zhu, Z. and Meredith, P. H. (1995). Defining critical elements in JIT implementation: a survey. Industrial Management and Data Systems, 95(8), pp. 21-29.

Saturday, September 28, 2019

Service and the Security implication of VOIP Dissertation

Service and the Security implication of VOIP - Dissertation Example The use and importance of telecommunication in business cannot be overstressed. In some industries, it is even their source if not the most important infrastructure that drives the business processes. However, in order to use the technology efficiently and effectively, its limitations and security has to be assessed and determined. The anonymity of the internet provides an added complexity to the challenge since the prosecution and detection of perpetuators is not only hard but the detection of an actual eavesdropping is already hard in itself. This dissertation will provide the best infrastructure that is both resilient and redundant that will provide the basic security to basic security threats. As proof of concept this dissertation will also demonstrate how an actual VoIP system can be set-up and used, this dissertation has also confirmed how an actual attack on the security can be done and its potential effect on the user. This dissertation also provided a technical strategy on h ow to remediate the security vulnerabilities. However, as any technical security strategy goes, there will always be a hacker that is better at overcoming the best and the latest security system. A determined hacker will always find a way to overcome any security system thrown in front of him thus this dissertation will provide recommendation that will protect businesses from falling prey to opportunistic and disreputable shady characters. Acknowledgement This author would like to thank his love ones for providing him with the inspirations to stay on track for him to be able to finish this dissertation. This author would also like to thank his instructor for providing him the chance and opportunity to learn not only from his instructor’s knowledge but also from the wisdom his instructor imparts. The practical way this author’s instructor presents solutions to complex problems have inspired this author to be better than what he perceive can become. This author’s instructor made him realise that this author can be more than what he want to be or could become. Table of Contents Abstract 3 Acknowledgement 4 Table of Contents 5 1.0Introduction 5 1.1 Overview 6 1.2 Existing Problems 7 1.3 Aims and Objectives 8 1.4 Project Objectives 9 1.5 Research Methodology 10 1.6 Structure of the Dissertation 12 2.0 Literature Review 13 Chapter Summary 26 3. 0 Methodology 28 4.0 Voice over IP Implementation and Threats and Vulnerabilities Demonstration 30 5.0 Statement of Result 49 6.0 Analysis AND Discussion 51 7.0 Conclusion 53 8.0 Recommendation 57 Reference List and Bibliography 61 Appendices 67 List of Figures: 67 List of Tables: 68 Asterisk installation guide 68 CentOS/Linux installation guide 68 1.0 Introduction Asterisk was developed as a cheap alternative to PBX by Mark Spencer. Since then the face of VoIP has never been the same again. Since 1989 the development of VoIP as an alternative transport system for telephony signalling has progress to a po int that almost all of the telephone infrastructures all over the world are being used as data transporter along with voice channel. VoIP simply enabled telecommunication companies to maximize its infrastructure by making several channels available in a

Friday, September 27, 2019

Women, crime, and criminology Assignment Example | Topics and Well Written Essays - 1000 words

Women, crime, and criminology - Assignment Example Violations of gender roles were treated in the 19th century by various charitable missions and voluntary social work projects that focused on instilling moral conscience and virtues into wayward girls. Social control over girls primarily targeted status violations, since girls are not as frequently involved in violent crime. Status violations include such things as resisting home or school authority, becoming pregnant, running away (Gelsthorpe & Sharpe, 2006). An overwhelming number of girls reformatories and training schools were established in the early 20th century, 23 established between 1910-1920, and only five established in each decade of the half century prior to that (Schlossman & Wallach, 1985, p. 70). They basically tried to isolate the young women from all males. Into the 20th century, girls were thought to need kind guidance rather than punishment, unlike boys, but they have also been thought to be more difficult to handle. They have been seen as being more emotionally unstable, more vulnerable to bad influence, more psychiatrically challenged, and more stubborn, yet less criminally inclined. Their efforts to engage in freedom beyond the socio-culturally and religiously encouraged gender role expectations were routinely seen from a medical model of pathology and a religious model of temptation into sin. In the past century, status offences revolved around their sexuality (Gelsthorpe & Sharpe, 2006). Currently, the tendency is to criminalize their resistance, language, and even the way they dress and to spread great concern that young teen girls are increasingly turning to drugs, alcohol and violent crime, instead of only status offenses. Young women have relocated their social activities from home to the more publicly visible streets and clubs, a move that has set off moral alarms in society. Society has responded, most

Thursday, September 26, 2019

Christopher Columbus Essay Example | Topics and Well Written Essays - 500 words

Christopher Columbus - Essay Example Christopher Columbus composed two letters when he docked on Spain. One was during 1493 and the other was during 1503. The earliest letter was towards Luis de Santangel regarding the first journey February 15, 1493 at sea. The next letter was written to Ferdinand and Isabella with regards to the fourth voyage July 7, 1503 in Jamaica. In 1493 Christopher Columbus settled on the Island of Spain. His approach in his letter happens to be very cheerful and proud. He found tiny hamlets wherein the people did not want to converse to him. He kept hunting for cities and towns, but he found nothing. He sent away two men out to distinguish if they could find any cities or towns, but they also found nothing. Columbus docking within Indias turf depicts a propagandist image of American Indians receiving their defeaters, one that is very much in need of a deconstructive reading. Foregrounded happens to be bashful but welcoming versions of the dignified savage, bearing stylish specimens of gifts declaring towards an astounding amount of aboriginal metallurgy. Columbus swaggers forwarded to conceal the staff of invasion, the unpleasant expression on his face approaching filthiness as he appraises the insufficiently dressed natives.

Unit 5 speer review Essay Example | Topics and Well Written Essays - 250 words

Unit 5 speer review - Essay Example Par 5, line 2 and 3: â€Å"This irony here is that the product was at first quite a disaster†. The sentence is unclear or rather ambiguous. Despite its weak construction, the irony being referred to is nonexistent. Par 5, line 3: â€Å"Sven Mattisson, the man behind the technology stated:..† The extra information â€Å"the man behind the technology† should have been enclosed with commas. Moreover, instead of the colon efore the direct quotation, a simple comma should have been used. So the sentence should look like: â€Å"Sven Mattisson, the man behind the technology, stated, â€Å"†¦Ã¢â‚¬ . The content is quite appealing. The introduction is organized and guides the reader throughout the essay by providing an ostensible road map. While the content is profound, little has been done on the development of the Bluetooth technology. The inclusion of the stepwise development of the technology would have bolstered the quality of the essay and the argument being

Wednesday, September 25, 2019

Does increasing nurse-patient ratio increase in hospital patient Research Paper

Does increasing nurse-patient ratio increase in hospital patient mortality - Research Paper Example The issue of high nurse-patient rations will continue to affect the delivery of healthcare services across the U.S (Institute of Medicine, 2004). Additionally, the nursing shortage in the USA is expected to grow to 260,000 registered nursing staff by the year 2025. A shortage of this degree will be double that experienced in the past, in the US since the 1960s. Relating the case of nurse shortage in the U.S, one of the developed nations of the world, the case has not been any different for less developed nations like Taiwan. In Taiwan, a high number of hospitals are facing the problem of low nurse-staffing. The case has been very acute in recent years, leading to the closure of a number of wards at given hospitals, according to the statistics drawn from a study by the National union of Nurses’ association (Central News Agency, 2011). Research studies on hospitals and healthcare centers show that institutions with inadequate nursing personnel show poorer patient outcomes, which compromises the care administered to patients. Decreased nurse staffing was linked to patient safety concerns and the increased incidence of adverse situations like the development of pneumonia, pressure ulcers, urinary tract infections (UTIs) (Lichtig, Knauf & Milholland, 1999), patient mortality (Aiken et al., 2002), medication errors (McGills-Hall, Doran & Pink, 2004), unplanned extubation cases (Marcin et al., 2005) and longer length of stay on average (Pronovost et al., 1999). Blegen and Vaughn (1998) discussed that, with a higher proportion of the service hours offered by registered nurses (RNs), there was a resultant decrease in the average length of stay (ALOS), cases of upper gastrointestinal bleeding, UTIs, medication errors and patient complaints, pressure ulcers, and pneumonia and cardiac arrests or shock with failure to rescue. Towards addressing the nurse shortage, the government has adopted a potential payment model to address the increasing medical expenditures. This has been affected through the imposition of measures like, the restructure of the operations of the hospitals facing financial pressure. This encompasses the adoption of strategies like the hiring of unlicensed assistant nurses or casual nurses, who are paid lower amounts as compared to the RNs, and can fill the service gaps (Sun et al., 2005). Nevertheless, it is challenging to improve nursing staff levels, even after the replacement of registered nurses with the less costly personnel. The factors leading to the unsolvable nature of the situation include the gap between the numbers of available vacancies and the number of qualified registered nurses, willing to fill these vacancies, the working conditions, the nurse burnout resulting from the shortage and low job satisfaction levels (Yin & Yang, 2002). Another issue heightening the nursin g shortage is the abandonment of the nursing profession due to increased involvement in extra-patient care services like nursing informatics and utilization management. This is evident from a recent study, which showed an average vacancy level of 28% in Taiwan (Sun et al., 2005). In Taiwan, there is also legislation requiring a minimum nurse-to-patient ratio of 1:8 at hospitals. However, this minimum ratio was

Monday, September 23, 2019

A Background on Egypt Essay Example | Topics and Well Written Essays - 1500 words

A Background on Egypt - Essay Example From the study it is clear that Egypt occupies a strategic position as it is a bridge between two continents and links two chief waterways, the Indian Ocean and the Mediterranean Sea. Its position demands that it dominates its environment otherwise it suffers from the victimization of foreign powers. Egypt survival depends on the Nile River. Indeed, the majority of the country’s citizens live near along the river where the only arable land is found, an area of about 15, 000 square miles. As the discussion declares the country is also considered to be in a very strategic position politically since it’s at the epicenter of three circles. These are the Arab, the African, and the Islamic people. The country considers itself playing a vital role in Africa as it was a major advocate of nonalignment and neutralism. With its strategic position, Egypt remains an important part of major powers’ plan to reach the Arab world. In spite of the country’s unbalanced outcome of its two referendums and parliamentary elections, it experienced a free and fair election for a period of 10 months from November 2011. The country’s politics became a tool through which contentious issues could be settled. During the 2012 elections, twenty-nine parties and several independent candidates competed for the 498 seats available in the People’s Assembly. With the eight political parties that competed in the elections, the Islamists won at least 83 percent of the 18 0 available seats.

Sunday, September 22, 2019

Two Companies in Economic Downturn Essay Example | Topics and Well Written Essays - 1250 words

Two Companies in Economic Downturn - Essay Example For about four years General Motors have been losing in the market but Harley Davis has been gaining. Ultimately GM has failed after a loss of about $82 billion in 2008 and Harley is still survived with a net gain of $3.6 billion. Both are in the automobile manufacturing business and based in USA.( Branding Strategy August 09) Harley too has faced the slowdown recently in the period of recession but it did not close down. GM is multi-brands company and Harley has a single core product. It competes with brands like Honda, BMW. GM also competes with these brands in the market. The main difference behind the Harley’s success is that the company has built a strong brand image in the market focusing on its heavy duty motorcycles. GM on the opposite went on adding to its brands without focusing them on any single segment. GM had twelve brands in the market Buick, Chevrolet, GMC, Opel, Pontiac, Daewoo, Holden, Hummer, Saab, Saturn, Vauxhall, and Wuling. These vehicles were not free from problems. Customers were not happy about the performance of these vehicles. GM had put the focus on these brands in order to sell them and not at all on how to solve the problems. Customers remained dissatisfied and that eventually put GM into problem. This is case of ‘Supply power’ that Porter in his theory P orter’s 5 forces mentioned explaining how erosion of brand loyalty penalizes a big company.( Brand Position workshop) Harley always projected the brand HOG to prospective customers and explained what the brand stands for. HOG grabbed 46% of the Heavy-duty motorcycle market and entered the name among the world’s 50th most valuable brand. GM was nowhere in the list. In 2007 GM made about 7,450.000 vehicles and lost $4141 on every vehicle. GM never projected what their brands stand for except dreamy and vague captions such as â€Å"See the USA in your

Saturday, September 21, 2019

Access to Medicines in Developing Countries Essay Example for Free

Access to Medicines in Developing Countries Essay One of the appalling statistics that came out of a survey in 2000 was the percentage of the HIV/AIDS infections in Africa. It was reported that nearly 80% of the total number of affected people was from this continent. Now if this report sounds dreadful, one might get a bigger shock by looking at the picture of modern healthcare methodologies in Africa. Despite being a developing nation, Africa gets scarcely one percent of modern drugs. The value of all medical drugs transported to Africa amounts to the expenses spent on advertising by the leading pharmaceutical companies in the United States of America. Under the light of this reality, this paper is going to discuss the genuine scenario in developing countries that don’t have an affordable access to life-saving medicines. It might be noted that access to medicines is a fundamental human right, and there is a yawning gap between crisis and cure in a capitalistic social setup. Due to increased political pressure, many drug manufacturing companies have been forced to review their business strategies and produce medicines that are relatively less expensive. Moreover, it is also mandatory to formulate a well-organized delivery system that would ensure a proper and timely delivery of the medicinal goods to Africa and other Third World countries. Modern healthcare remedies are needed to be deployed in order to combat the menace of HIV and other diseases in the underprivileged tropics. (â€Å"Access to Medicine in Developing Countries†, 2000) Access to medicine in developing countries has always been a matter of great disputation, mainly because of the convoluted interaction between macroeconomic development, patterns of diseases and healthcare requirements and provisions. It has been an inescapable paradox for many countries where the national economic status can only be attained by improved health status. Hence, lack of supply of life-saving drugs hinders the scope and opportunity of national healthcare. (â€Å"Improving Access to Medicines in Developing Countries†, 2005) The impoverished countries find it a mammoth task to meet both ends successfully. It has been proposed that only a large scale international funding can inject some fruitful results in the context of healthcare and economic boost. The World Health Organization (WHO) and the World Trade Organization (WTO) are working together to provide the best possible framework for improved health status as well as the macroeconomic development of developing nations. WTO is primarily concerned with the organized growth of a capitalist, free market global economy. On the other hand, WHO is focused on improving health conditions by providing healthcare models that can be applied to both developed as well as developing nations. Institutional and public sector frameworks play a crucial role in realizing the objectives of WHO to the best possible extent. The newly incepted Global Health Fund is working relentlessly to provide remedies for HIV/AIDS, TB and Malaria. The Trade-Related Aspects of Intellectual Property Rights (TRIPS agreement) are held, in some cases, as obstacles for access to essential medicines in developing countries. Ever since WTO finalized the TRIPS agreement in April 1994, this issue has been a matter of great debate. The main problems in accessing medicines, as viewed by experts, are the increasing expenses, which can shoot up to 66% of total expenditure in developing nations. Today’s scenario as far as having access to essential medicines is concerned is an alarming one, with more than one-third of the world’s population are deprived of indispensable drugs. According to the WHO, developing countries, especially those in Asia and Africa, must be provided with an all-encompassing solution in terms of health priority problems, and they must be able to gain access to life-saving medicines at an affordable deal. To make matters worse, the poorer section of societies in developing countries find themselves all at sea due to their inability to physically access life-saving drugs. So both availability and affordability are the key areas of concern. Now under these circumstances, the introduction of strong and worldwide product patents for drugs, as implemented through the TRIPS agreement, may cause drastic increase in prices for essential medicines. The ‘legal monopoly’ that comes with such rigid patent system prevents anybody from producing, selling or distributing medicines in an unauthorized manner. Even if there is no patent laws, access to medicines is going to be a problem for the developing countries, due to adequate purchasing capabilities and required infrastructure. Majority of the medicines for HIV/AIDS are still under ‘live’ patent coverage. It doesn’t make for affordable access to such medicines either. And since more than 95% of HIV/AIDS affected people are from developing countries, and 50% of them belong to the productive age group of below 25 years, serious socio-economic consequences are perceived with very little signs of relief. Before TRIPS were put to effect, most developing countries and some developed countries did not impose patent laws on medicines even if they were manufactured with innovative technological aids. But today, most of these nations being WTO members have to enforce the patent laws laid down by TRIPS. This has led to hike in prices of patented medicines. It is worth noticing that even under the TRIPS guidelines, patents are to be given only on applications received from 1995 onwards for new therapeutic inventions. So any medicine manufactured before 1995 should not be unaffordable for the developing nations. Manufacturers of the newer and more innovative pharmaceutical products file for patents only in countries where business of piracy runs rampant. Parallel import of drugs is another important issue that came into consideration after the TRIPS agreement. The Intellectual Property Rights owners of specific brands of medicines face problems when goods, legally distributed in the market of one country, are imported to another without the necessary legal authorization. Now, as long as there is no discrepancy in Intellectual Property Rights in two different countries, article 6 of TRIPS defends parallel import. But considering the economic side of such imports, it might be noted that price of the same medicine in one country may rise or fall to a great extent in another. So developing countries, without violating the Intellectual Property Rights protection, may find a way out to access essential but expensive drugs from its neighboring countries. (Watal, J. 2000) In addition to what is discussed above, one must bear in mind the supply side process concerning manufacture and distribution of medicines. The specific issue related to accessibility to medicines is directly linked with the development and implementation of more efficient and cost-effective measures in manufacturing and distributing drugs. A number of speculative theories and ideologies have been put forward to address the issue of maximizing the available resources to achieve a standardized health status around the globe. However, the aim of this paper is not to get into a particular ideological standpoint, or to promote distinct solutions, but to gain a deeper insight into the real constraints of manufacturing and distributive activities. One has to take into account the diverse theoretical concepts, the macroeconomic environment of international economics and technological nuances of the pharmaceutical sectors. Once we identify the constraints, it will be easier to suggest feasible solutions in terms of easy and regular access to medicines for the developing countries. The policies adopted by pharmaceutical companies are worth taking a look at.

Friday, September 20, 2019

Bachelor Of Business In Tourism Management Tourism Essay

Bachelor Of Business In Tourism Management Tourism Essay The objective of this project is providing an evaluation of sustainability in Changi Airport. By focusing Terminal 3, a lot of discussion and analysis have been done to examine Changi Airports sustainability. The project comprises four main components included the description of Changi Airport, identification and discussion of sustainability criteria, analysis of potential impacts and recommended planning tool. Methodology: The project takes full advantage of using qualitative and quantitative methods to collect data for the sustainable indicators and support for its arguments. Particularly, to qualitative method, a lot of site observations, evident pictures and interviews with relevant personal included face-to-face communication and email were conducted to examine Changi Airports sustainability (Hair et al. 2003, p.74). Feinstein Thomas (2002) determined that quantitative method is the adoption from a range of mathematical and statistical techniques used to analyze data and information. The qualitative method was applied to obtain information through Changi Airport website, relevant journal articles and books from both online sources and the National Library Singapore. Description of Changi Airport: Singapore Changi Airport has always been known as the best airport in the world (Changi Airport Group (CAG) 2010). Their reputation has been expanded through a lot of annual worldwide awards such as: 2010 Best Green Service Provider Airport, 2009 Asias Leading Airport, 2008 Worlds Leading Eco-friendly Airport, 2007 Worlds Leading Airport, etc (CAG 2010). Establishing from 1981, Changi Airport is centrally located in the South East Asian region and is managed by the Civil Aviation Authority of Singapore (CAAS) (Caudle 1996). The airport handles more than 80 airlines operating 5,100 weekly scheduled flights flying to about 200 cities in 60 countries (Hui Wan2003). These big numbers of airlines operations allow the airport welcoming more than 5,000 arrivals and departures every week and over 37 million passengers a year (Hui Wan 2003). Changi Airport Terminal 3 opened on 9 January 2008. This S$1.75 billion terminal comprises 380000 square meter of space and can handle about 22 million passengers a year (NEWASIA Singapore 2010). The roof of the main terminal building is designed with 919 skylights that automatically adjust to sunlight and fill soft natural light into the inside of the terminal (NEWASIA Singapore 2010). Terminal 3 consists of seven storeys (4 levels above ground and 3 levels below ground) which are considered as a small city with many services and amenities (NEWASIA Singapore 2010). There is a floor-to-ceiling viewing gallery on the fourth floor which allows visitors to enjoy watching the control tower, plane takeoff and land. Natural greenery is the main theme of the terminals architectural design (NEWASIA Singapore 2010). The green wall, a 5-storey tall and 300 meter long vertical garden is very good evidence with 4 waterfalls, layers of tropical foliage and sculptured sandstone art walls at the arrival hall (NEWASIA Singapore 2010). Identification and Discussion of Sustainability Criteria: Sustainability Criteria is known as the specific standards which organizations follow to achieve their purposes of minimizing at the lowest level of negative impacts and balancing the triple bottom lines (Swarbrooke 1999). To be well-known as a green destination, Changi Airport has put a lot of efforts to obtain sustainability in many ways. (The table of sustainability indicators can refer to Appendix 1) Environmental Indicators: Water Management: To Changi Airport, water management is very important to reduce as much as possible water consumption and the amount of water that takes from suppliers. They are quite successful to apply Rainwater Harvesting system that allows them to collect storm water for irrigating plants at Changi Airport Nursery and external landscape areas (CAG 2009). Besides, NEWater (recycled water) is using as the main water source in Changi Airport for multiply purposes such as : irrigation, fire-fighting, sanitation and cooling purposes in place of potable water (CAG 2009). Another efficiency practice in water conservation is installing flow rate regulators for wash basins in selected areas of the airport to decrease water usage by 66% from 6 liters per minute to 2 liters per minute (CAG 2009).  Drinking water is also conserved in term of installing taps with water saving devices such as on-off sensors (CAG 2009). One of the biggest sources of water usage is from toilets, so that Change Airport Introducing low-flush toilets that recycled water (NEWater) being used for flushing (CAG 2009). Energy Management: The airport has saved a lot of energy from its initiatives to improve energy efficiency. A typical practice is using natural lighting in passenger areas by installing double glazed glass and solar shading devices (CAG 2009).  These practices allow the nature light to get into the buildings while minimizing heat gained from sunlight at the same time. From then on, it helps to decrease the need for artificial lighting and air conditioning. Inside the buildings, they also set up the efficient lighting system with motion sensors and sensor escalators and travellators (CAG 2009). The other practices included shutting down escalators and travellators at night and during off-peak hours, turning off peripheral lighting during day time and looking for the best energy-efficient options when replacing their assets and equipments (CAG 2009). The most remarkable practice is installing a 250kWp photovoltaic system with solar panel modules which cover a rooftop area of about 2,500m ². These panel modules generate over 280,000 kWh/year, it is calculated to reduce more than 122,000kg of carbon dioxide per year (CAG 2009). Waste Management: The whole idea of sustainable development has been developed very efficiently by Changi Airport through reducing waste generation and increasing the percentage of waste recycled. The airport has introduced a new creative design of recycling bins which actually depicted an enlarged bottle, a can and a newspaper (CAG 2009). The purpose of these bins is trying to catch peoples attention and encourage them to be more considerate and participate in recycle waste. With regards to reducing waste generation, the airports taxiway pavements are construed by recycled materials and recycled concrete is used to built roadways, drains, pavements and kerbs. Office refurbishments are also used drywall partitions instead of mortar and bricks to minimize waste generation (CAG 2009).These results in cost savings through waste disposal and raw material costs. Noise Management: Efficient noise management always challenges for aircraft operators all over the world. The activities such as: re-fuelling, baggage loading, engine maintenance, unloading and re-provisioning of aircraft usually generate a lot of noise which can affect directly to the nearby community. At Changi Airport, noise management is considered as a very important factor to minimize the possible negative impacts to the community. All airlines and civil aircraft operating in Singapore have to commit to  meet the noise standards stipulated by International Civil Aviation Organization (ICAO)s guidelines on Balanced Approach to Noise (CAG 2009). Land use planning is conducted by the Urban Redevelopment Authority (URA), which zones land surrounding Changi Airport for residential use in accordance with international norms on noise levels.   Noise studies are conducted regularly to update the noise contours around Changi Airport.   The results of these studies are shared with URA for future land-use planning (CAG 2009). Changi Airport also assigns runways to aircrafts to reduce air traffic and requires all aircraft that departing from Singapore to follow defined routes to avoid flying directly overhead residential areas (CAG 2009). Besides, the airport conducts regular inspections to maintain noise level and detect any abnormal noise activity (CAG 2009). With a better effort to reduce noise level, Changi Airport Group (2009) cooperates with Singapore Amalgamated Services Co-operative Organization (SASCO), the nearby airside agency to ensure that the impact of noise from their compounds is minimized especially from 12 a.m. to 06 a.m. Air Quality Control: To Changi Airport, providing a good environment with best air quality is very important to protect their employees health and the local community. There are a lot of useful practices which allow them to minimize as much as possible the amount of carbon dioxide generating from airport vehicles, ground running of aircraft, road traffic, food preparation and air conditioning. They only use hybrid tractors to sort baggage within Terminal 3 (CAG 2009). The Sky Train system is also used efficiently to transport passengers who make inter-terminal flight connections among Terminal 1, 2 and 3 (CAG, 2009). The system has total of seven stations: two each in Terminal 1 and 2, and three in Terminal 3. This high-speed people mover system is powered by electricity and creates zero local emissions (CAG 2009). Moreover, the airport put their sustainable efforts in term of designing the airfield to maximize the number of rapid exit taxiways and connecting taxiways to limit congestion on the airfield (CAG 2009). This helps cutting down a lot of taxiing time of aircraft and reducing a large amount of engine emissions. Another good practice which allows reducing a lot of carbon emissions from the airport is applying electronic car park system in 1,700 car park spaces and 130 motorcycle spaces (Changi Airport Singapore (CAS) 2010). With this helpful system, vehicles can quickly find the empty lots and decrease the big amount of carbon emissions from going around the car parks. The key highlight of terminal 3 is the Green Wall, five-storey high vertical garden. The garden is designed with four cascading waterfalls, a sculptured sandstone art wall and a lot of climbing plants (Hui Wan 2003). This green practice help creating fresh air, cooling the atmosphere inside the building and saving a large amount of energy consumptions through air conditioners. Stress Level: Changi Airport is well-known as one of the best airports all over the world which serves more than 80 airlines operating 5,100 weekly scheduled flights flying to about 200 cities in 60 countries (Hui Wan2003). These big numbers of airlines operations allow the airport welcoming more than 5,000 arrivals and departures every week and over 37 million passengers a year (Hui Wan 2003). The whole airport is about 1,300 hectares with 870 hectares reclaimed from the sea (670 hectares using seafill and 200 hectares using landfill) (CAS 2010). There are more than 230 retails and services stores and about 100 food beverage establishments here (CAS 2010). Besides, terminal 3 has an annual handling capacity of 22 million passengers while the total handling capacity of Changi Airport is about 70 million passengers per year (CAS 2010). Social-cultural Indicators: Environmental Education: There are many kinds of sustainable education which is conducted in Changi Airport through environmental exhibitions, campaigns, events, gallery and activities. Some remarkable activities that bring a lot of good green image of Changi Airport are: Changi Airport Group and IATA launched environmental exhibition between 2 February 2010 and 28 February 2010 to highlight aviations commitment to the environment (Changi Airport Group IATA 2010). The airport practiced Earth Hour 2010 to raise environmental awareness among its stakeholders (CAS 2010). Changi Airport cooperates with National Museum of Singapore and Double A Ltd. to promote Making your own woodblock print with local icons campaign to use the paper wisely (CAS 2010). Value of foreign ownership: The full beneficial ownership of Changi Airport belongs to the government of Singapore. The Civil Aviation Authority of Singapore (CAAS) is  the regulatory authority (Channel Newasia 2009). Within CAAS, there are two entities: One is in charge in the regulator, promoter and developer of the aviation industry (Channel Newasia 2009). The corporatized entity is in charge to operate Changi Airport, the airport emergency services and exploit investment opportunities overseas (Channel Newasia 2009). Locals jobs created through tourism: Changi Airport is generating about 13,000 jobs for local community (CAS 2010). Baseline Indicators: Quality Management: Changi Airport is known as the worlds most awarded airport with over 350 awards included 28 won in 2009 and  8 won as at May 2010 (CAG 2010). Some remarkable awards are: 2010 Best Green Service Provider Airport 2009 Asias Leading Airport 2008 Worlds Leading Airport 2008 Worlds Leading Eco-friendly Airport Potential Impacts of Changi Airport: Tourism activities can cause a lot of impacts to the triple bottom lines included environment, economic and social-culture (Swarbrooke 1999). Changi Airport is well-known as an essential element in the aviation industry in particular and the whole tourism system (WTS) in general (Weaver Lawton 2010). Therefore, it cannot ignore both negative and positive impacts from its transportation service to local community. Environmental Impacts: The good side of tourism development in Changi Airport is promoting peoples sustainable awareness and their responsibility in term of environmental conservation (Buckley 2000). There are also many cleaning programmes such as: the Clean Energy Programme Office (CEPO) to protect the attractiveness and green image of the best worldwide eco-friendly airport (Singapore Economic Development Board 2009). Besides, one of the best benefits which Changi Airport has created for the environment is promoting the development of using renewable sources such as: solar energy- 919 skylights, recycled water the NEWater, etc (Manson 2003). Together with the positive impact, there are also a lot of negative impacts which Changi Airport generates for the environment. Noise pollution is, for many people, the most obvious form of pollution related mainly to aircraft (Leiper, Braithwaite Witsel 2008). Besides, its impacts on climate change, peoples health and contributing in depleting the stratospheric ozone layer are the most serious problems (Refer to Appendix 2 for more detail). Social Impacts: The development of tourism in Changi Airport has created more job opportunities and higher income to local residents. There are about 13,000 jobs are generated during last few years (CAS 2010). It also results in the development of more and better shopping, transport, the countrys medical facilities, cultural and recreational facilities and communication facilities (Khan et al. 1990). Crowne Plaza Hotel with 5- star rate is a very good example of how good infrastructure has been improved because of tourism development in Changi Airport (CAG 2010). Besides, it can bring locals feeling of pride about their worlds best eco-friendly airport and consciousness of keeping the airport clean and attractive (Khan et al. 1990). The image of Singapore as a clean and beautiful city is also emerged to attract more and more tourists (Khan et al. 1990). On the other hand, the development can cause vulnerability to the community. The difference in wealth between the locals and the tourists may result in the high number in drug abuse, prostitution, and theft and crime rate especially with the setup of gambling facilities at the two integrated resorts (Khan et al. 1990). Many locals complained that they have to pay higher prices for some good and services as well we their rentals for offices and shops were increased because of tourism development (Khan et al. 1990). Obviously, there are a lot of buildings around the Changi Airport area such as: 4 terminals, control tower, Crowne Plaza Hotel, etc. They will definitely cause the visual impact at the end (Weaver Lawton 2010). Economic Impacts: The significant effects of tourism development in Changi Airport expand on the high number of Gross Domestic Product (GDP) and employment. There are more ten 13,000 job opportunities generated to cater passengers demand (CAG 2010). Another important benefit is generating indirect local revenue through the multiplier effect of money and jobs (Heng Low 1990). Due to the development of the aviation industry, it also cause the stimulation of backward linkages of the other industries, includes agriculture, fisheries and construction (Heng Low 1990). The full beneficial ownership of Changi Airport belongs to the government of Singapore; thus, it limits the negative impacts from high leakage due to foreign ownership (Channel Newasia 2009). Besides, the strong demand for Singapore dollars due to tourism expansion is resulting in the growth of the price of Singapores currency and exchange rate (Heng Low 1990). However, the high tourism dependence of Singapore economy in general and Changi Airport in particular can be a big problem. The uncontrollable outside forces such as: natural disasters (Tsunami), SARS and economic crisis will affect seriously to the whole economy of Singapore (Heng Low 1990). The aviation activities can cause a lot of problems; however, there still are many offsets that can organize to limit them at the lowest level. Changi Airport is a very successful representative for the aviation industry that owns a lot of initiatives to balance its negative impacts to triple bottom lines (Refer to Appendix 1). Their efforts in sustainable development have been proved through a lot of honor awards such as: the Green Mark Gold in October 2009, the inaugural Best Green Service Provider at the Annual Asian Freight and Supply Chain Awards in 2010 (CAG 2009). Recommended Planning Tool: According to Newsome, Moore and Dowling (2002), the best planning tool is one that provides an effective monitoring in the areas with effective outcome, involve visitors and community and lead to sustainability of the resource. There are many tourism planning frameworks, but, the Visitor Impact Management Framework is the most suitable one for Changi Airport (Refer to Appendix 3). Visitor Impact Management (VIM) Framework: To Changi Airport, applying the VIM planning framework to ensure visitor impacts at acceptable levels seems a good idea which allows them to enhance visitors benefit and achieve their purpose in excellent service: We are the best in our business (CAG 2010). Based on eight basic steps, the VIM framework can lead the managers not only focusing on reviewing existing data and management objectives, through selecting indicators and standards and using these to identify unacceptable impacts, but also helping them to indentify causes and appropriate management strategies (Newsome et al 2002). The purpose of steps1 and 2 is reviewing the organizations existing objectives, legislation, policies, pervious research and other data to identify problems. In these stages, Changi Airport can recognize the need for clear objectives (excellent service provider), better understanding the needs and wants from passengers and identify current problems within the process of organizing. The next steps (steps 3 and 4) are selecting key impact indicators and standards for the whole terminal 3. Noise management, air quality control and passenger satisfaction seems to the best indicators that need to be highlighted for taking care of local community and passengers (Refer to Appendix 1). The following indicators such as: waste management, energy consumption, water quality control and quality management will be also useful to providing excellent service in the aviation industry. After collecting enough data, the comparison between standards and existing conditions will necessary to examine whether it exceed the acceptable level or at that level. For instance, the desired standard for passenger satisfaction at Changi Airport was 94 % while passenger rates their satisfaction at lower or higher standard (CAG 2010). To maintain the service standard at a high level, monitoring programmers have been established with certain criteria. The purpose of this practice is making sure that they can win annual Best Worldwide Airport award (CAG 2010). Therefore, this award is used as a measuring method to ensure their standard of passenger satisfaction. If their actual satisfaction level is below the desired standard, the Changi Airport Group will take action to identify probable causes of decreasing in passenger satisfaction level (Step 6) (CAG 2010). Some possible problems might be low in service delivery, lack of initiative in operation, etc (Tian-Cole Cromption 2003). From then on, the suitable planning and strategies are provided and implemented to get over limitations and enhance in service delivery (Steps 7 and 8). The Be a Changi Millionaire Draw, which kicked off monthly from1 June 2010 to choose the most lucky passenger who shopped at Changi Airport, is a very good evidence (CAG 2010). This activity is a very creative idea to promote the airports products and its wonderful service at the same time. Through this activity, passengers will be very happy and their satisfaction level will increase at the end. Limitation of the report: The report focuses mainly on Terminal 3 to collect data for the sustainable indicators. Thus, the quality of information collected might not be representative for the whole Changi Airport included: Terminal 1 and 2. Besides, there are some data and information cannot be gathered because the organization is outsourced its departments and some private information cannot be leaked out. The paper only mentions about environmental impact, one important component in the triple bottom lines, thus, it is lack of convincing evidences to prove that the balance among triple bottom lines have been done in Changi Airport. Conclusion: The whole project provides a good understanding how Changi Airport can create its image and reputation as the best airport in the world. Especially, in term of sustainability, there are a lot of efforts have been done to take care of environment and local community. However, it cannot avoid the negative impacts which the aviation industrys member causes for the environment. These problems are able to offset by taking full advantages of using management frameworks and planning tool such as: the VIM frameworks. With this research, it is obvious that Singapore Changi Airport is meritorious to be known as the best green airport all over the world. In the future, it can strongly believe that Changi Airport will be more conscious about the environment with more green planning and strategies to maintain its reputation as well as develop as a green icon of sustainability.