Tuesday, December 31, 2019

The Morality Of Same Sex Marriage - 2166 Words

The morality of same-sex marriage is a major controversial issue in the United States today. While Liberals believe that marriage should be the union of two people who love each other and that it should be legal for gay and lesbian individuals in order to ensure equal rights for all citizens, Conservatives believe that marriage is the union of one woman and one man only and that requiring citizens to sanction same-sex relationships violates moral and religious beliefs. Taking opposing viewpoints of this issue are both philosophers David Boonin and Jeff Jordan who discuss the public dilemma of same-sex marriage within their articles. Through the use of counterarguments to the premises made by Jeff Jordan, as well as by discussing various†¦show more content†¦After providing a set of premises as to why one would hold the parity thesis- which states that homosexuality has the same moral status as heterosexuality- true; Jordan attacks these claims by objecting to the first premise which states that homosexual acts between consenting adults do not harm anyone, and the fourth which explains that discrimination against homosexuals removes individual freedom as it ignores personal choice and privacy [Jordan 2]. He states that these premises are only plausible when these acts are done in private, concluding that one should only be able to discriminate homosexual behavior if it is done in public. This premise is an assumption made by Jordan that unlike homosexual acts, people enjoy viewing heterosexual acts that are displayed publically. This premise assumes that the majority of society accepts viewing heterosexu al behavior in public, but are uncomfortable with viewing public homosexual acts. To set up his argument in support of the Difference Thesis, Jordan creates a scenario in which one person believes that subject â€Å"X† is morally wrong but another person believes it is morally permissible, calling this conflict an â€Å"impasse† (Jordan 42). He continues to define â€Å"public dilemma† as special case impasses and

Monday, December 23, 2019

Essay on Biostatistics for Public Health - 1336 Words

My health profession is focus on biostatistics. Biostatistics is a branch science of statistics, which is a core discipline in public health. It focuses on developing and applying the statistical techniques and methods to analyzed data to extract necessary information. Its interesting area does not limits to biological science, the research work covers medicine, pharmacy, public health and agriculture.[Wikipedia] As an integral part of public health, biostatistics is responsible for understanding a health event to design experiments, collecting data for the experiments, understanding the collected data and making inferences and interpretations base on the analyzed results. The interpretations could used to forecast a health event, identify†¦show more content†¦Ã¢â‚¬ ¢ Relative Risk In the first unit, we talked about the concept of relative risk. Relative risk is the ratio of the probability of a health event in the exposed group to the probability of the event in the non-exposed group. It is be used to figure out how a factor relates to the health problem. Generally, if the ratio of relative risk is greater than 1, then we could say the likelihood for the exposed group suffering the health problem is higher than the non-exposed group and suggest the suspected risk factor is related to the health problem. While, the bigger the ratio, the more relevant between the risk factor and the health problem. [Lecturettee] How relative risk relates to biostatistics The relative risk is designed to determine how a risk factor relates to a health event. Considering the in-class example which want to find whether smoking is related to coronary heart disease (CHD), the experiment was set as recruiting 2 groups of people, one is consist of smokers and the other is consist of non-smokers. Researchers made surveillance on them for a period of time and then find out how many of them have CHD after the experiment period. The relative risk is the ratio of the rate of CHD for smokers to the rate of CHD for non-smokers. From this example, it could be found that calculating the relative risk relates to the functions of data collection, applying statistical techniques to the health problem and make conclusionShow MoreRelatedA Study On A Practicum940 Words   |  4 Pagesability to apply public health theory and knowledge, while gaining professional experience is an integral part in the course of meeting educational and career goals. In the following analysi s, I will discuss how my experience applies to the aforementioned practicum benefits. Biostatistics competencies were the main focus of the completed practicum. Specifically, the practicum allowed me to conduct a statistical data analysis of a study focusing on student performance and integrative health interventionsRead MoreRingworm1178 Words   |  5 PagesUNIVERSITY OF SOUTHERN MISSISSIPPI DEPARTMENT OF COMMUNITY HEALTH SCIENCES CHS 623: Biostatistics Fall 2012 Instructor Information: Danielle Fastring, PhD, MS, MPH Dept Community Health Sciences Office Address: 108 North 31st Avenue Hattiesburg, MS 39406 E-mail: Danielle.Fastring@usm.edu Time and Place: Monday 3:30 – 6:15 FG113 Text: Daniel, W. W. (2009). Biostatistics: A Foundation for Analysis in the Health Sciences, 9th edition. NY: John Wiley amp; Sons. CourseRead MoreThe Scope Of Public Health1076 Words   |  5 Pagesto the role of public health. We rely on public health officials to assess the health status of whatever population they are responsible for, to create and fulfill suitable plans of action that improve living conditions for those people. In other words, public health officials are designated for engaging in population health surveillance, controlling the spread of disease, and executing protocols for helping populations build healthier, more enjoyable lives. The scope of public health is very broadRead MoreQuestions On Epidemiology And Biostatistics846 Words   |  4 Pages Master’s Degree – 12/2014 45 Semester hours Major: Public health Concentration: Epidemiology and Biostatistics Relevant Coursework: Fundamental of Public Health, Complex Emergencies and forced migration, Epidemiological Research Methods I II, Multivariate Biostatistics, Data management and Analysis, Political Aspect of Public Health GPA: 3.5 out of 4.0 TempleRead MoreHow Public Health System Helps Improve The Quality Of Life And Health Of People847 Words   |  4 PagesPublic health has developed to address several issues, including chronic diseases, infectious diseases, birth defects, injury prevention, violence, and bioterrorism. The knowledge gained through the social sciences, Biostatistics, epidemiology, laboratory science, pharmacology, proteomics, genomics and biochemistry has facilitated the advancement and growth of public health. In addition, the involved practitioners vary. In addition to the nurses, doctors, nutritionists, and engineers, the systemRead MorePublic Health Deals With Community Health Problems Essay819 Words   |  4 Pages1. Public Health deals with community health problems. Public health is consisted to be the forefront in preventing disease, and prolonging an individual’s life and promoting health through the systematized efforts of the organizations. Pu blic health also handles any concerns of possible threat(s) to the public health based on population health analysis. Public health joins the interdisciplinary methods of epidemiology, biostatistics and health services, environmental health, community health, behavioralRead MoreWebsite Review and Summary Paper846 Words   |  4 Pagespeople have relied on their health care providers for medical treatments. Now a day, people have the opportunity to research about any illness, medical concern, medical diagnosis and any type of disease in the Internet. There are many health care organizations that offer people around the world with information about drugs, illnesses, diseases, outbreaks, treatments, preventions and the list goes endless. In this paper the writer will review and summarize governmental health agency websites. TheRead MoreHealthcare : A Great Deal789 Words   |  4 PagesMedicare and Medicaid so that the ageing and low income population would get health insurance and to reduce disparities related to socio economic status. Now due to Affordable Care Act there is decrease in uninsured population as it has helped the population by reducing the premium the pay for the health insurance, which has allowed the underinsured, uninsured population and small business employers to enroll in the health insurance that will suffice their needs. The Affordable Care Act diminishesRead MoreA Research Study On Preventive Medicine978 Words   |  4 Pagessaving a life, but when you are a public health personnel, you are saving thousands of lives at a time’, delivered by my professor in the orientation class of undergraduate Community Medicine course. That introductory speech was so motivating that I contemplated for a while, should I be in the ‘thousands life saver’ group? Though i nspiring, that speech alone was not sufficient to grow my interest in public health. Day by day I felt the importance of public health while dealing with various patientsRead MoreStatement of Purpose Essay1051 Words   |  5 Pagessomething that would grip my mind and keep me thirsting for more, I was captivated by the sphere of public health and similar issues which were not localized to any one nation but had global ramifications if not arrested on time. My search ended for I had found my calling. Today a desire to be a part of the leading force of public health professionals brings me to the Masters Degree course in Public Health at your University. An ambitious, energetic and dedicated student I have been diligent about

Sunday, December 15, 2019

Links Free Essays

What is our government’s stance on the genetic engineering of humans? According to the links consulted, the government of the United States is cautiously allowing some genetic engineering research to proceed, such as gene transfer research seeking to correct or treat disease. There does not appear to be a coherent policy on permitting trait selection for reproduction purposes though ethical questions of this nature are starting to be asked.   President Bush, has said â€Å"Our children are gifts to be loved and protected, not products to be designed and manufactured â€Å", which is certainly a more definitive stance than is present in regulation or law presently, and so appears opposed to genetic engineering for the purpose of selecting traits of offspring. We will write a custom essay sample on Links or any similar topic only for you Order Now http://www.whitehouse.gov/news/releases/2002/04/20020410-4.html Summary of Regulatory environment. What is our government’s stance on cloning? At present, there isn’t any specific law banning Human cloning per se.   However, due to the extreme public response and with President Bush’s ban on federal funding for such research, it could be said that the government is hostile toward human cloning. This stance is based on the ethical consideration of Human Life,   and was summed up by President Bush: I believe all human cloning is wrong, and both forms of cloning ought to be banned, for the following reasons. First, anything other than a total ban on human cloning would be unethical. Research cloning would contradict the most fundamental principle of medical ethics, that no human life should be exploited or extinguished for the benefit of another. (Applause.) Yet a law permitting research cloning, while forbidding the birth of a cloned child, would require the destruction of nascent human life. Secondly, anything other than a total ban on human cloning would be virtually impossible to enforce. Cloned human embryos created for research would be widely available in laboratories and embryo farms. Once cloned embryos were available, implantation would take place. Even the tightest regulations and strict policing would not prevent or detect the birth of cloned babies. Third, the benefits of research cloning are highly speculative. Advocates of research cloning argue that stem cells obtained from cloned embryos would be injected into a genetically identical individual without risk of tissue rejection. But there is evidence, based on animal studies, that cells derived from cloned embryos may indeed be rejected. Yet even if research cloning were medically effective, every person who wanted to benefit would need an embryonic clone of his or her own, to provide the designer tissues. This would create a massive national market for eggs and egg donors, and exploitation of women’s bodies that we cannot and must not allow. I stand firm in my opposition to human cloning. And at the same time, we will pursue other promising and ethical ways to relieve suffering through biotechnology. This year for the first time, federal dollars will go towards supporting human embryonic stem cell research consistent with the ethical guidelines I announced †¦.. President’s Bioethics Council report on Cloning What are some possible new genetic modifications we are likely to see soon?   We are likely to see an explosion of gm crops and animal food products and even ‘biopharm’ ( Animals designed so they produce drugs or other chemicals) breeds of certain species.   For example, according to the FDA, â€Å"new versions of familiar foods–ones that are custom â€Å"built† to improve quality or remove unwanted traits. Insect-resistant apples, long-lasting raspberries, and potatoes that absorb less fat are among the more than 50 plant products under study now that are likely to reside soon on grocers’ shelves.† According to press reports, genetic researchers studying the limited gene pools of   isolated communities such as the Amish and Mennonites are accumulating valuable insight into the genetic markers of a number of diseases including Sudden Infant Death Syndrome.   This research may bring about numerous genetic treatments for these diseases. Genetic research in limited Gene pool populations is yielding tremendous research benefits. From the Associated Press. University of Virginia discusses future uses of Biotechnology What are some laws that may be introduced to handle the legal issues of genetic engineering? Look at both Human and agriculture laws. Laws or regulations on labeling, bio-containment and review processes for genetically modified (transgenic) animals and plants are likely in the near future.   In Canada herbicide-resistant canola is becoming a â€Å"super-weed† in prairie areas.   Stricter farming regulations and requirements the GM crop must meet are likely to result. The US Senate moved in a near unanimous manner to begin the process of preventing the world portrayed in the film Gattica from becoming a reality by passing S306 â€Å"Genetic Information Nondiscrimination Act of 2005†Ã‚   Which would prevent discrimination in employment or insurance on genetic basis.   Something of this magnitude probably needs to be approached as an amendment though. Legislation can be repealed.   Currently this measure is waiting on action in the House of Representatives.   The bill is supported by the NIH and by the whitehouse. Other laws designed to prohibit the traffic and trade of human beings or organisms based on human genetic code, as well as attempts to create human/animal hybrids are probably to be expected, and are on the Policy agenda of the President’s advisory Committee for Bioethics. Director of National Human Genome Research Institute comment on Senate Bill. Contains the targeted legislative goals of the Presidential Administration’s Council on BioEthics. JOURNAL Stopping cloning or genetic engineering would be nearly impossible now.   The ‘idea’ is already established, and it has been shown that â€Å"it can be done.†Ã‚   Suppression of this technology would require a worldwide coalition more effective than the current anti-proliferation mechanisms set up for nuclear technology.   After World War II and the power of Nuclear weapons began to be understood, the United States attempted to suppress the information to prevent other nations from developing their own programs.   One after another of the allies developed their own weapons following the Soviet Union’s Development. Suppression has been mostly successful only with nations volunteering to remain non-nuclear or accepting large economic rewards for remaining so.   However three (possibly five) nations have developed weapons programs (Pakistan, India, North Korea) in the last 6 years; additionally,   Israel is suspected of having undeclared weapons for some time, and Iran has announced the intent to develop a peaceful nuclear program for power production, which some suspect would be a cover for a weapons program.   Research into this area by 3rd world countries is made easier for knowing that the result is attainable. The difficulties in monitoring become apparent when one considers that the world was taken by surprise when both Pakistan and India announced their new capabilities within months of each other.   The United States admitted to being flatfooted and having no intelligence at all about the developments.   Recent experience in Iraq in attempting to track and account for Sadaam’s mobile chemical laboratories and work centers show that similar facilities used for genetic research could be very difficult to find and shut down. The frightening thing about technology is that humanity typically utilizes it in conflict before turning it to more peaceful purposes; this has been true of all our history, but is especially characteristic of modern technology.   Interchangable parts, making mass production possible, was first used to produce thousands of rifles.   Rockets were first used to deliver explosives, long before they were used for exploration.   Computers were first used for calculating artillery ballistics, and then for assisting in simulations of various weapons effects (and still are used for this). Aircraft, though initially a curiosity, were quickly developed from little more than kites to devices that have come to dominate modern warfare in a space of two decades   and continue to become more sophisticated in both military and civilian applications.   Genetic Engineering, has so far been pacific in its uses in the 21st century but the closely related eugenics sciences, especially in Nazi Germany, have ominous implications for the mis-use of genetic science.   Having direct access to genetic materials of humanity and other organisms, some may attempt to tailor disease organisms to attack certain genotypes in an effort to eliminate an ethnic enemy or â€Å"inferior.†Ã‚   Doubly troubling is the emergence of useful nanotechnology; together nanotechnology and genetic engineering could create complementary and wonderful   advances or equally horrible and devastating weapons that can wreak havoc not only on human life but the entire biosphere and the current balance of species in the environment. Indeed, genetic engineering may be a difficult test of humanity’s maturity.   Even peaceful uses require the utmost scrutiny. Because we don’t know all the rules in this field yet, unintended consequences are certain to occur.   This field will require the best from our scientists, researchers, and regulatory agents to ensure that the promise of the technology is realized while minimizing or eliminating its dangers. How to cite Links, Essay examples

Friday, December 6, 2019

Code Of Ethics In Modern Corporations †MyAssignmenthelp.com

Question: Discuss about the Code Of Ethics In Modern Corporations. Answer: Introduction Ethics has become the top priority for 21st Century corporations. This comes at a time when a lot of organizations have adopted unethical business principles (Lawrence and Weber, 2014). The society has developed an attitude of impatience towards unethical corporations. Their actions enrich a few people and impoverish the majority. For example, under the leadership of Carly Fiorina, Hewlett Packard proved its pledge to the code of ethics. The former Chief Executive Officer said that under her tenure at the company, she made difficult choices, including firing individuals who lacked integrity (Ely and Rhode, 2010). Her actions contrast that of R.J. Reynolds Tobacco Company, which was found to be covering up information about nicotine addiction (Derthick, 2011). From the two examples, even though in one instance action was taken against individuals who lacked ethics, it is evident that many organizations lack ethics. It is a culture that is no longer common in many institutions. Talking about organizational responsibility and accountability is impractical without mentioning ethics. Irresponsible behavior in businesses and corporations is so typical in this day and age. For instance, corporations in the manufacturing sector have failed to ensure the safety of employees making accidents a common occurrence. Greed and selfish reasons have caused corporate entities to lose objectivity (Grappi et al. 2013, 1819). As a result, they vindicate unethical practices while focusing on making profits. It is in this regard that the code of ethics has become synonymous with many entities, and is a tool that is useful in modern corporations. Understanding the Code of Ethics Understanding the code of ethics is fundamental to appreciating its importance in business or ordinary life. A code of ethics is a set of guiding principles that direct corporate practices to reflect societal concerns without necessarily pursuing profits (Erwin, 2011, 539). Societal concerns signify the growing levels of impatience in the irresponsible and selfish practices exhibited by many institutions in the 21st Century (Painter-Morland, 2010). The institutional principles, standards, values, and norms not only apply to the organizations, but also to the individuals in those entities altogether. Corporate code of ethics has descriptive and normative dimensions. In corporate practice and career specialty, the field is predominantly normative. However, academicians trying to comprehend organizational ethical behavior adopt descriptive techniques. The quantity and range of issues mirror the relationship between behavior meant to maximize profit, and those that are non-economic. Historical Background Interest in the corporate code of ethics accelerated significantly in the late 80s and early 90s, especially with the advancements in technology. For instance, company executives faced a dilemma in balancing the privacy of its customers and employees, as well as the freedom accorded to the workforce. Another difficulty was in ensuring that technology was used for legitimate business activities. However, this has not been the case in many organizations. Major businesses in the 21st Century endorse their pledge to non-economic tenets under slogans such as corporate social responsibility charters and the ethics code. Adam Smith once said that individuals with the same trade seldom meet, even to make merry. However, their conversations usually end in conspiracies against the innocent members of the public. In some instances, some conniving on how to raise the prices of goods (Maon et al. 2010). An example is an ethical scandal witnessed with Wells Fargo Company. Some company employees created fake account details using real names of the entitys clients. Governments have not been spared either. They have been accused of enacting legislation that guides businesses and corporate entities in what is perceived to be advantageous ways. Codes of ethics are meant to regulate details and areas that are beyond state influence. The advent of large multinationals with limited interactions and sensitivity to the society in which they operate hasten ed the development of the code of ethics regimes. Ethical business norms have evolved. The result is that it caused the acceptable behavior to be objectionable. Companies began taking their moral importance seriously to distance themselves from scandals that were synonymous back in the 80s. The concept of the ethics code of practice caught the attention of media, corporates and academics by the end of the Cold War. However, during this era, criticism of corporate practices was attacked and accused of infringing on the rights of entrepreneurs. Critics, however, were accused of supporting communists. This scampered the discourse of business ethics in academia and media. The corporate ethical code reflects its philosophy of activities, where it determines the principal purpose of an entity that includes transparency among other issues. If a companys reason for existence is to maximize investors returns, then to concentrate on profits violates its fiduciary responsibility. Accounting scandals such as that of the pharmacy giant Mylan, who imposed huge charges to the subscribers of its life-saving EpiPen is one of the examples in this case. Corporate entities are considered as persons in many countries. They are, therefore, legally entitled to liabilities and rights due to citizens as people. Ethics should govern our daily lives, as employees of business entities or as ordinary individuals who go about their everyday occurrences. Many people equate it with consciousness or a simple sense of right or wrong. Others would say that it is an internal code governing individuals conduct. Corporations and professional entities have written code of ethics governing the professional standards expected in all fields. It is important to be cognizant of the fact that ethics and law are two different parameters. Moreover, ethical and legal courses of action in a particular situation is not the same. The law is set forth in the regulations and statutes that are enacted by the legislative bodies and administrative entities. For instance, in America, slavery was considered a lawful act. However, enslaving another person is unethical. Milton Friedman, an economist, argues that corporate executive responsibility generally will be to maximize shareholder value while conforming to the basic societal rules, both those in the ethical customs and law. He adds that the only entities that can have responsibilities are people. A business cannot have the same (Carroll and Shabana, 2010, 90). The question is whether corporate executives, within the law, have other responsibilities in their companies apart from making money. It can be argued that they do not. A survey in many countries found 30 to 80 % of the respondents were in favor of this view. Friedmans arguments were considered as consequentialism rather than logical. It implied that unrestricted corporate freedom would be beneficial to many in the long term. However, Peter Drucker, a business author and consultant, observed that there are no separate integrities of business, nor is it required (Drucker, 2017). He implied that the standards of personal morals apply to a ll situations of activity. In other instances, he argues that the responsibility of corporates is not to cause harm to the society in which it operates. Businesses ought to exhibit corporate social responsibility, an umbrella term signifying that ethical conduct of firms must be guided by codes of responsible citizenship to the communities in which they operate. This is regardless of the cost associated with profits or any other company goals. Importance of the Code of Ethics and their Role in Modern Corporations. In many firms, the code of ethics serves numerous functions. At the level of the profession, it documents the principles according to which the position can be held to account for the conduct of the holders of the detailed post (Benn et al. 2014). Furthermore, the society has relegated control to many corporate bodies. The line of work has a code of ethics put in place to provide self-regulation to persons working for these companies. Additionally, the code of ethics provides a practical guide to members of a profession who are experiencing an ethical dilemma at a given circumstance. Where employees find themselves in a state of moral tension, it is evident that the code of ethics can help in providing counsel. It also ensures that corporations provide fair working conditions for their employees. This is important, especially for those who work with dangerous chemicals and machines. They should not be exploited at the expense of their safety. The existence of a code of ethics is useful because it provides the basis of a corporations ethical program that is intended to encourage ethical practices among its members. Some of the recommended practices include honesty and integrity. Furthermore, any organization may review its code of ethics by considering individuals that are subjected to it at the grass root levels. Their inputs and contributions can help ensure that the code achieves its intended purpose by being as detailed and comprehensive as possible (Leipziger, 2015). Any code of ethics ought to remain sensitive to changing values. Corporates depending on it for their continued sustenance on public support are, therefore, mandated to expand their likelihood of maintaining accountability. The code of ethics is useful especially for professionals in the corporate world because it can assist them when charged with misconduct or even in litigation. Demonstrated observance of the professional code of ethics is deemed to be an indication of the adherence to the principles of practice, which are consistent with professional rules. Suppose these methods result in harm, the code-abiding persons will be less likely to be guilty of having committed such wrongdoing. However, centered on the belief of trust, the public expects that the best professional judgment will be exercised. The code of ethics is associated with statutory force. This implies that it can be enforced via the administration of some degree of disciplinary action. Indeed, the concept of accountability and self-regulation that have been referred to previously are associated with some level of control that can be exercised by the corporation itself (Singh, 2011). Due to this nature of the code, some corporate organizations prefer to avoid these implications linked to the codes and go for guidelines. The latter associate guidance which has fewer consequences associated with it. Other entities avoid both codes and directives. Instead, they develop ethical declarations for their specific companies. The Role of the Code of Ethics in Modern Day Corporations Ethics is not about moral or legal responsibility. It has evolved to become organizations priority. Business leaders of today have a lot to deal with in the competitive world today. They have to keep abreast of rapid changes in the technological field, competition from their rivals, globalization, and the threats and opportunities in the industry. They must also keep tabs on the vision and mission of their organizations. In the midst of all this complex environment, it becomes difficult to find room for other top priorities such as ethics. However, for a corporation to succeed in the current era, it will have to implement a code of ethics that will make the moral code a priority. A code of ethics is useful in this case. Many modern organizations are now alert to the importance of ensuring ethical practices guide their ways of conducting their operations. Many have their lawyers formulate a corporate code of ethics programs that help detect and prevent violations of law and moral standards (Carroll and Buchholtz, 2014). Bearing in mind the sanctions and probation that may befall such organizations, it is, therefore, prudent to have guiding principles to ensure that corporations are not found on the wrong side. Such measures emphasize prevention of unwarranted conduct by increasing observation, control, and imposing penalties to those found in the wrong. There has been no objection to the necessity of a well-formulated compliance requirement for major corporations. Employees may be frustrated and frightened. However, leaders who use the law to guide ethical conducts act so in ignorance of the fundamental understanding of multifaceted legal issues. Take for instance a company like Samsung, operating in more than 75 countries. The franchise has its code of ethics that conforms to local laws and applies a strict global code to its employees. This has enabled the company to become one of the most successful in the global arena. Primary emphasis on having a code of ethics is that behavior is channeled towards a suitable direction. The underlying approach is meant to deter unwanted conduct (De George, 2011). People act rationally when they want to maximize their self-interests. They, however, act contrary to moral expectations when they want to legitimize their choices. Discipline is a fundamental part of any successful corporation. A code of ethics is useful because it justifies the penalties rendered for infringing on the legitimate norms. However, it may be counterproductive in some instances and may even cause employees to rebel against the organization. This happens in cases where the employees were not involved in the process of development and formulation of the code of ethics. Many people may be skeptical about the code of ethics that they view as a compliance program which management uses as a liability insurance. This conclusion is valid because many of such programs rarely consider the cause of delinquency. Modern day corporations embrace the code of ethics as a necessary tool for safeguarding their reputation (Collins, 2011). Strict adherence to the ethical conduct as stated helps them avoid bad publication on the media platforms. A perfect example is a challenge posed to the International Olympic Committee. There is a growing disillusionment with the games that are characterized by the worst scandals (Hunt, 2011). Athletes are willing to go to the extreme lengths to win the coveted medals by adopting unfair advantages over other competitors. The result is that they have faced the wrath of the unforgiving media houses. Corporations are held to a stouter standard based on veracity. Compliance may be based on avoiding legal sanctions. However, corporate integrity is rooted in the concept of self-governance that follows guiding principles such as the code of ethics. Their level of integrity can be determined based on guidelines that shape their day to day operations (Verhezen, 2010). A typical integrity strategy comprises of a conception of ethical practices, which is the driving force of an entity. Furthermore, the code of ethics is used to shape the search for prospects and the design of operational systems and policy. Those who oppose such kinds of ethical compliance argue that it is better to leave people to use their intuitions when faced with stressful situations as opposed to having the procedure laid down for them. Furthermore, they argue that some of the corporate policies under the banner of code of ethics are entrenched in the utilitarian view that limits the legal ability of a company (Fassin, 2011, 600). Moreover, they carry public favor by appearing as a good corporate citizen. Ideally, the corporations may not have problems, but in instances where it occurs, the corporation is likely to argue that it occurred because employees failed to follow the code of ethics. In addition to that, the disconnect may arise between the corporations code of ethics and the sound practices. Whether or not the code is sanctioned by the top management makes it deceitful. In most cases, it is used as a plain marketing tool. Jones and Parker, writers in the field of ethics, suggest that what many people read the name of the business code of ethics is a sentimental common sense or a set of excuses for the failure to be pleasant. They argue that many codes are procedural manuals that are not cognizant of the real ethical dilemmas that people in the corporations deal with. The United States of America Department of Commerce dealing with ethical business practices suggest that the code of ethics is a set of guidelines and procedure that ethics officers should follow. Other people argue that the code is simply meant for people to be ethical. However, according to Richard DeGeorge, a business author, a corporate code of ethics is and still important because the exercise of developing it in itself is worthwhile. This, he argues, that it forces a large number of individuals to rethink strategy freshly (Ciullia et al. 2011). Their mission and obligations, both in groups and as individuals, to their clients, and the society. Once adopted, the code can be used as a tool that generates continuing discussions and modifications where deemed necessary (DeGeorge, 2011). In addition to that, the discussions it generates is likely to inculcate a sense of perspective and responsibility in new employees, the need to have moral thinking about individual actions, and the significance of developing virtues considered to be appropriate in various capacities. Conclusion Many modern corporations are aware of the critical need to have a code of ethics under their cultural fabric, especially in this era where ethics is lacking in many organizations. Many have developed theirs, but there is still room for improvement. First, organizations must realize that they are obligated to ensure they are ethical in their practices. No matter how intelligent an entity may be, it is unacceptable to hurt others for selfish reasons. The code of ethics will find its place in institutions and corporations that make it a priority by putting in place relational expectations that work for everyones benefit. Organizations should seize the opportunity of shaping the future by influencing culture via institutionalizing ethical principles. Through the creation of a value-based culture within corporations, the society is likely to be improved through the positive influences that are perpetuated outside these corporations. References Benn, S., Dunphy, D. and Griffiths, A., 2014.Organizational change for corporate sustainability. Routledge. Carroll, A. and Buchholtz, A., 2014.Business and society: Ethics, sustainability, and stakeholder management. Nelson Education. Carroll, A.B. and Shabana, K.M., 2010. The business case for corporate social responsibility: A review of concepts, research and practice.International journal of management reviews,12(1), pp.85-105. Ciulla, J.B., Martin, C.W. and Solomon, R.C., 2011. Honest work: A business ethics reader. Collins, D., 2011.Business ethics: How to design and manage ethical organizations. John Wiley Sons. De George, R.T., 2011.Business ethics. Pearson Education India. De George, R.T., 2011.Business ethics. Pearson Education India. Derthick, M.A., 2011.Up in smoke: From legislation to litigation in tobacco politics. Sage. Drucker, P.F., 2017.The Theory of the Business (Harvard Business Review Classics). Harvard Business Press. Ely, R.J. and Rhode, D.L., 2010. Women and leadership.Handbook of leadership theory and practice, pp.377-410. Erwin, P.M., 2011. Corporate codes of conduct: The effects of code content and quality on ethical performance.Journal of Business Ethics,99(4), pp.535-548. Fassin, Y. and Buelens, M., 2011. The hypocrisy-sincerity continuum in corporate communication and decision making: A model of corporate social responsibility and business ethics practices.Management Decision,49(4), pp.586-600. Grappi, S., Romani, S. and Bagozzi, R.P., 2013. Consumer response to corporate irresponsible behavior: Moral emotions and virtues.Journal of business research,66(10), pp.1814-1821. Hunt, T.M., 2011.Drug games: The International Olympic Committee and the politics of doping, 19602008. University of Texas Press. Lawrence, A.T. and Weber, J., 2014.Business and society: Stakeholders, ethics, public policy. Tata McGraw-Hill Education. Leipziger, D., 2015.The corporate responsibility code book. Greenleaf Publishing. Maon, F., Lindgreen, A. and Swaen, V., 2010. Organizational stages and cultural phases: A critical review and a consolidative model of corporate social responsibility development.International Journal of Management Reviews,12(1), pp.20-38. Painter?Morland, M., 2010. Questioning corporate codes of ethics.Business Ethics: A European Review,19(3), pp.265-279. Singh, J.B., 2011. Determinants of the effectiveness of corporate codes of ethics: An empirical study.Journal of Business Ethics,101(3), pp.385-395. Verhezen, P., 2010. Giving voice in a culture of silence. From a culture of compliance to a culture of integrity.Journal of Business Ethics,96(2), pp.187-206.

Friday, November 29, 2019

Thevenins Theorem La Report, free essay sample

Calculator RTH as follows RTH = VTH/ ISC Method 2: (By measuring the equivalent resistance) Remove all sources from the circuit, i. e. replace all voltage sources with a short-circuit and current sources with an open-circuit. Then with the help of a multimeter find the resistance between the points ‘a’ and ‘b’, denoted by Req. RTH = Req Method 3: (By applying known voltage and measuring source current). We can also find RTH by applying a known voltage to the circuit between points ‘a’ and ‘b’, then measuring the current from the voltage source. Suppose 1 Vdc is applied as the test voltage then, RTH = Vtest / I 4. Method 4: (By inserting two different resistors and measuring current) There is another method to find the value of RTH, by inserting two different loads between points ‘a’ and ‘b’ i. e. insert resistors R1 and then R2 one by one and write expression for the current through that particular resistor as given below, Current through the resistor R1 :- I1 = VTH / (RTH + R1) Current through the resistor R1 :- I2 = VTH / (RTH + R2) Simultaneously solving these equations will give the value of RTH. We will write a custom essay sample on Thevenins Theorem La Report, or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Procedure: We connected the circuit on breadboard as shown in the fig below. Our aim was to determine the current through and the voltage across the 1k? resistance R1 connected between the two nodes A and B. We followed the following procedure to validate the Thevenin’s theorem. Finding VTH: 1. We removed the resistor R1 from the circuit on breadboard. 2. We then determined the open-circuit voltage (voltage between points A and B i. e. VAB) using a voltmeter. This is the required Thevenin voltage VTH. We recorded this value in Table. Finding RTH: 1. We determined RTH by method A. Further connected an ammeter between load points A and B to measure the short-circuit current ISC. Found the value by RTH = VTH / ISC 2. We then determined RTH by method B. Replaced the voltage sources with short-circuits. Then using an ohmmeter, we found the equivalent resistance between load points A and B. This is RTH. 3. We also determine RTH by method C by Applying a known DC voltage (1 V) between points A and B. Then using an ammeter, we found the current through the test voltage source. We found RTH by: RTH = Vtest / I 4.

Monday, November 25, 2019

analysis of the song Scarecrow essays

analysis of the song Scarecrow essays The Christian music industry is renowned for its many deep, thought provoking songs, but there is none whose lyrics capture my mind like the song Scarecrow, written and composed by the band Skillet. This song is a reflection of the writers perspective of his life as a scarecrow. The artist proposes that we as Christians need to surrender everything to Christ in order to gain a meaningful relationship with Him. The chorus is divided into three different sections, each showing the three essential elements pertaining to our walk with God. The first concentrates on the knowledge part of a persons relationship with God. The second entails the love and emotion that is involved. The last focuses on the servant aspect in our attempt to please God. The comparison of a scarecrow to the life of a human being seeking Christ may seem far-fetched to begin with, but careful evaluation of the wording in this song has shown many parallels. The first part of the verse refers the guilt and shame the scarecrow is dealing with. He feels alone in the world and is shameful of his dirty clothes which represent the sin in his unworthy life. This seems like the ideal analogy for the aimless, consumer driven lives of many lukewarm Christians in todays society. The distractions of life keep getting in the way of truly focusing on God, bringing about a sense of shame and worthlessness. The scarecrow, Safe enough to not let go, seems to have a sense of security in the known that prohibits him from letting go of everything and letting God take over. He is comfortable where he is and does not want to risk change. He also is fearful of the unknown as shown in the text, Scared enough to not release. He is not willing to sacrifice the safety of everything he knows to be true to venture into the unfamiliar. In the next line Open up to drink the wind, the &q...

Thursday, November 21, 2019

Toyota Australia to UAE Essay Example | Topics and Well Written Essays - 1500 words

Toyota Australia to UAE - Essay Example The popularity of the Toyota and its reputation has been considered in dealing with the analysis. Selection of areas were highlighted which could provide added benefit to the export of the business. The underlying risk associated with the entry of foreign markets was also studied in detail. The market of UAE have been found to be promising for the Australian export market and owing to the benefits the market provides Toyota should not resist its temptation to test its fortune in the market. An added advantage which the market of UAE provides is in the low price of diesels, which generally increases the sale of cars. Other than the general market analysis a study of the associated service has been done to find out whether any obstacles lie in the smooth running of the business. 7. Macro-environmental analysis of UAE 7.1 Political and Legal Environment of UAE: The government of UAE is the combination of seven emirates which is ruled by the president. The government of UAE is flexible r elating to the investment from the foreign countries. It promotes and encourages foreign countries to enter their region and carry out business. Despite the nation being the combination of seven different emirates but there exist federalism in the UAE companies law and is applicable throughout. The UAE free zone offers 100%foreign ownership and tax exemptions to companies operating over a period of 15-50 years (United Arab Emirates UAE tax rates, n.d). So it is quite encouraging for the companies to invest in UAE. Owing to such favorable factors the foreign investment in UAE accounted to108billion dollar in 2011. (FDI in UAE, 2008,) 7.2 Economic Environment of UAE: The economic condition in UAE is always on a high and in recent times it is expected to grow at a rate of 3-3.5% in 2011. UAE’s rising economy can be contributed to the export of oil, which over the years have gained considerable amount of revenue for the country. It significantly rose to 30% and caused earnings of 74 billion dollars (UAE oil income up 30% in 2010, 2011). It happens to rise at a considerable rate every year. The employment rate in UAE is considerably high as the foreign companies are obliged to recruit local people. Out of approximately 2 million populations in the emirate a staggering 86.6% of them are economically active. (Holdsworth, 2010) Dubai sees 19% decrease in unemployment rate 7.3 Socio-cultural Environment of UAE: The standards of living of the inhabitants are pretty high owing to the good financial position of most number of people. UAE has a diverse culture of people as many foreign bodies have established their base in the country. 7.4 Competitive Environment in UAE: The demand for luxury cars in UAE is always on a high and the automobile industry faces sufficient growth over the years in UAE. There is a strong presence of local car manufactures as well as the presence of international brands like Hyundai. The sales figure of Arabian automobiles recorded an 18% growth and the increase in sales of the Japanese firm was accounted due to introduction of new brands of car. The overall market grew by 19.7% in the year of 2010. The rise in sales of cars have added considerable amount of competition among the big players in the market. (UAE automotive industry record high growth in sales, 2011) 8. SWOT analysis STRENGTH 1. The company ,Toyota had

Wednesday, November 20, 2019

Due 1 aug Assignment Example | Topics and Well Written Essays - 750 words

Due 1 aug - Assignment Example We shall also discuss some diseases or conditions which women are likely to have due to this process. According to Fox – Spencer and Brown (2006), menopause is the point when a woman has her last period which happens when her  ovaries  stop releasing eggs, and for some women, it happens all at once but for many women, it is a gradual process. If a woman has not had a period in more than a year, is not pregnant, or does not have another illness, she may have most likely reached menopause and this typically, this happens when the woman is in her fifties. Planned Parenthood, in their website state that perimenopause is the gradual change that leads to menopause which usually happens between the ages of 45 and 55 but it is not unknown to begin as early as 40, a time when menstrual periods usually become less predictable and they may become more or less frequent or may be heavier or lighter. Women who smoke have a higher possibility of going into perimenopause earlier than those women who do not smoke. Perimenopause is a process that can last for few months or can go on for up to 12 years depending on the physiological make up of the woman involved. If a woman has not had a period for more than a year or two, then this marks the end of the perimenopausal stage and the beginning of menopause. Surgical menopause occurs with the removal of both ovaries in women who have yet to undergo menopause and this induces menopause because they suddenly experience the symptoms of menopause without the normal gradual changes that occur. Women with surgical menopause experience the following changes: hot flashes; sweating at night; the drying of the vagina; heart palpitations; frequent mood swings; unexplained depression; constant fatigue; and some changes in their sexual desire. Stress menopause is caused by the constant stress experienced by a woman on many occasions

Monday, November 18, 2019

Individual Letter Element Essay Example | Topics and Well Written Essays - 750 words

Individual Letter Element - Essay Example In order to top the elite clubs in England and Europe, there exist a number of drivers from the external environment of the club that could be significant in the evolution: international fan base, online merchandise and club marketing, and the club’s loyal owners. Being a football franchise, Arsenal FC greatly relies on the support of fans. Arsenal FC has a huge fan base on the international scene. However, there are millions of unhooked fans that could provide a perfect customer base for the clubs merchandise, assets that collect about 11% of the club’s revenue. Revenue is bound to grow and so is the club’s superiority given the influence that fans usually have on the players. With a huge and loyal fan base, players are likely to work extra hard to avoid being letdowns. Arsenal FC has potential to attract more fans given its current numbers, with statistics showing that Nigeria alone has more fans of Arsenal than the total number of Arsenal fans in the UK alone. Additional PESTEL analysis factors will emphasize the club’s ability to achieve this. The internet has revolutionized into one of the biggest sole market place globally through ecommerce. Online market force opportunity for Arsenal is another key driver that could change the fortunes of its revenues and increase the ability of its fans in getting its merchandise. The current online statistics stand at over 50 million subscribers to its Facebook and twitter page, site, and its online store. The arsenal marketing outfit needs to focus more on online marketing and strive to implement the stalled Click and Collect service. The last key factor that puts Arsenal FC at a position of extensive growth and change is its ownership team that is entirely committed to the core values that run the club. The club has the ability to maintain this by avoiding any frequent change of management witnessed in other major clubs in the country. The above key drivers for change were determined using a framework of PESTEL that ensured viability and realism. The Political factor (P) provides favorable environment by letting football franchises operate independently thus independence. With independence, the club ownership of Arsenal FC is liberal enough to do anything under their sleeve that would improve the club’s fortunes. The steady revenue income for the club is a key Economic factor (E) to count on in ensuring enough capital in online marketing and increasing the international fan base through numerous promotions. The stable economic situation globally has enabled emergence of a population class that is stable enough to involve in fun activities such as football. This is a Social factor (S) that ensures availability of potential fans for the club. Literacy level in IT matters in the society have increased, facilitating a possibility of high access to online material, a strategy Arsenal intends to market itself. Technology (T) has ensured the availability of internet and numerous smart devices that would enable easy implementation of Arsenal’s online marketing strategies. In implementing all the key drivers, care was taken not to violate any Environmental factors (E) thus avoiding pollutants of any kind. For the Legal factors (L) Arsenal’s self-sustaining business model of operation shield’s it from legal confrontations by not infringing any competition law that governs English football. Arsenal has a number of strengths and an equal share of weaknesses

Saturday, November 16, 2019

Development of College Announcement Notification System

Development of College Announcement Notification System Chapter 1: Introduction Introduction This project proposal is created to propose an IT solution to the student of Sunway University. The main point that the author want to highlight is regarding the efficiencies for student in Sunway University. An example, inefficiencies that occur in posting the announcement that is post on the website or in the notice board, it is hard to inform to the student and also the staff may also forget to post the announcement that will inconvenient for the student itself. In order to solve those problems, the author proposed to create a website as a third party for the staff to post the announcement. The author feel that only a website is very simple and common nowadays, so to improve the effectiveness and give more efficiency, a SMS (Short Messaging Service) feature is added to the system. Every announcement is posted by the SCT Staffs in the website, a SMS notification will be sent to the student that already registered to the website. The content of the SMS just a brief notification abou t the title of the event, venue and time, for more brief detail the students can refer to the website. Other way to notify the students is used Email as an instant notifier, but consider using email as an instant notifier is not really effective because students didnt open their email every day but using the SMS as the instant notifier to notify the students are more effective because most of the student is own and bring their own cell phone, therefore the MS as an instant notifier is more appropriate. Since the advancement of the technology nowadays, using this system will help in reduce the paper usage. Project Objective To give efficiencies for staff of Sunway University who want to post announcement. To use SMS as an instant notifier, for example every announcement post on the website the student will receive a SMS about the annoncement. In long term of view, this system will help in notify student about things that happen in college. Project Scope To become the most useful media for announcement notification. When the system is run it involves the Sunway University students and staffs that want to use the service. The user of the system should be students of Sunway University and staffs. All users that want to use the system have to become member. Methodology Methodology is a formalized approach to implement the SDLC (System Development Life Cycle). There are many different systems development methodologies, and each one is unique based on the order and focus it places on each SDLC phase. Some methodologies are formal standards used y government agencies, while others have been developed by consulting firms to sell to client. Many organizations have internal methodologies that have been honed over the years, and they explain exactly how each phase of the SDLC is to be performed in that company. There are many ways to categorize methodologies. One way is looking at whether they focus on business process or the data that support the business. There are three types of system development methodologies, it is called Structured Design, RAD (Rapid Application Development), and Agile Development. Types of Software Development Methodologies Structured Design This is the first type of system development, it is introduced in 1980s. This methodology adopts the formal step by step approach to the SDLC, it moves logically from one phase to another phase. Waterfall Model This is the original structured design of methodology, with this methodology, the analyst and users proceed in sequence from one phase to the next phase. The key deliverables for each phase are typically very long and are presented to the project sponsor for approval as the project moves from phase to phase. This methodology is referred to as waterfall development because it moves forward from phase to phase in the same manner as a waterfall. Advantages of using waterfall model: It identifies system requirements long before programming begins It minimizes changes to the requirements as the project proceeds. Disadvantages of using waterfall model: The design must be completely specified before programming begins This model required significant rework, if there is a changes in the business environment, in order to going back to the initial phase need to go through each of the subsequent phase in return. Parallel Development This model of methodology attempts to address the problem of long delay between analysis phase and the delivery of the system. Instead of doing design and implementation in sequence, it performs a general design for the whole system and then divides the project into a series of distinct subprojects that can be designed and implemented in parallel. Once all subprojects are complete, there is a final integration of the separate pieces, and the system is delivered. Advantage of using parallel model: It can reduce the schedule time to deliver a system There is less chance of changes in the business environment causing rework Disadvantage of using parallel model: The approach still suffers from problem caused by paper documents It adds new problem, sometimes subprojects arent completely independent; design decisions made in one subproject may affect another subprojects Phased Development In this model, the overall system is divided into a series of version that are developed sequentially. The analysis phase identifies the overall system concept, and the project team, users and system sponsors then categorize the requirement into a series of version. Advantage of using phased model: Quickly getting a useful system into the hands of the users While the system does not perform all the functions the users need at first, it does begin to provide business value sooner than if the system were delivered after completion, as is the case with waterfall or parallel methodology. Disadvantage of using phased model: The users begin to work with the systems that are intentionally incomplete, it is critical to identify the most important and useful feature and include them in the first version, while managing users expectation along the way. Prototyping In this model, it performs the analysis, design and implementation phases concurrently, and all the three phases are performed repeatedly in a cycle until the system is completed. In this methodology, the basics of analysis and design are performed, and work immediately begins on a system prototype, a â€Å"quick and dirty† program that provides a minimal amount of features. Advantage of using prototyping model: It is very quickly provides a system for the users to interact with, even it is not ready for widespread organizational use at first. Reassure the users that the project team is working on the system Helps to more quickly refine real requirements rather than attempting to understand a system specification on paper, the user can interact with the prototype to better understand what it can do and cannot do. Disadvantage of using prototyping model: Its fast paced system releases challenge attempts to conduct careful, methodical analysis. This can cause problems in the development of complex systems because fundamental issues and problems are not recognized until well into the development process. Software Development Methodology Comparison After do research about the types of methodology that is appropriate to be used into the project. The author compared the 4 types of methodology that is compatible with the current development. The following table is the result of using the described methodology to the project. System Characteristic Waterfall Parallel Phased Prototyping Unclear User Requirement Poor Poor Good Excellent Unfamiliar Technology Poor Poor Good Poor Complexity of the System Good Good Good Poor Reliability of the System Good Good Good Poor Short Time Schedule Poor Good Excellent Excellent Schedule Visibility Poor Poor Excellent Excellent Table 1 Methodology Comparison Selecting the appropriate Methodology According to the project objective that the author proposed, author analyze each methodology that is already been researched. The author decides to use the Phased Methodology. The main reason on why the author uses this methodology is because the author would develop this system all by himself and the project will be easier to be built phase by phase. Other considerations in choosing this model are: User Requirement: the requirement of the system is clear, which is to address the problem of inefficiency and ineffectiveness of conventional way in notify the student for announcement. Familiarity with Technology: for designing the website, PHP, VB.Net language technology is going to be used, since it is still in area of the author expertise. System Complexity: the complexity of this project is at medium level, since the author familiar with the technology used in the project so it is not really difficult. However the author still need to do research on certain area of technology, for this case the knowledge of SMS gateway, and how to integrate the web based system with the SMS gateway. Duration: the duration of developing the project is approximately 4 months in order to fully complete the project. Development Method: it is a web based application that is built using the PHP, and VB.NET as the programming language. Area of Research Certain areas that we research for this project are: How to create easy and manageable database system? What is SMS (Short Message Service) portal and SMS (Short Message Service) gateway? How to integrate web based system with SMS portal? How to create easy and manageable database system? This part is one of the crucial parts in order to make a good web based application system. Therefore, creating an easy and manageable database system is really important. The database system that the author used to manage the College Announcement System web based application is MySQL. Several reasons become the consideration of choosing the MySQL software are, first reason is because the main programming language system that the author built is using the PHP technology, and PHP language has an integrated connector that able to connect it to SQL. Second reason, MySQL is open source software so it is free for download, it is will help in determining the project cost development. There is other software which is better than MySQL but looked back at the scope of the project; this is just an undergraduate project, then the author decides that using MySQL software is a wiser choice. The third reason, the author already took the MySQL subject during the study in Sunway University College, which is still in the author expertise. However, if this system wants to be implemented into the real organization, further study to create easy and manageable design is needed. When the project is already on the run, this would be very beneficial in doing maintenance of the application system. How to integrate the Web based System with SMS portal? As most people known that SMS is the most famous service that a mobile phone give. It is a service where the users able to send short text message from a mobile phone to another mobile phone. Basically the SMS would not work with just the mobile phone itself, it I because the Mobile Phone Network Operator that give the service so the SMS can be delivered to the recipient by the help of the mobile phone device as the medium to type the message. The SMS can travel all the way from the sender device to the recipient device must go through a pathway through a network called SMSC (Short Message Service Centre). SMSC works as a hardware that stores the SMS that is sent from a mobile phone then forward it again to the recipient. From the early of 1990s, the era when the first SMS is sent through the network using the mobile phone device. Nowadays with the advancement of the technology, SMS not only can be done through using mobile phone but can be integrated in other application such as web based application system, using the SMS gateway technology. However, the SMS that is sent still have to go through SMSC, which is still needed to use the SIM Card that is given by the mobile network operator. SMS gateway act as a bridge the platform that cannot use the mobile phone SIM Card to use the mobile service by using the GSM modem, in this case the mobile service is to send the SMS. The mobile SIM Card will be inserted into the GSM modem. GSM modem will act as the third party to connect to the SMSC. The web based application store the message that will be sent into the database, and the GSM will retrieve the data from the database and ready to send the SMS to the destination number. The basic function of SMS and e mail is the same, for email the sender need to enter the destination email and for SMS the sender need to enter the destination phone number. The difference is why SMS is more popular than email is because it is mobile and user can send and receive SMS wherever they are. The mobile advantage of using SMS is the reason that makes the author choose the SMS application system to be added into the College Announcement Notification system instead of using email. Another reason the author choose to use SMS is because most of the students in Sunway didnt have mobile phone that can handles in receiving and sending email, but most of the students have mobile phone that enable them to send and receive SMS. Therefore, using the SMS as additional software into College Announcement Notification system is the best choice, and the author also learn to use the GSM modem and the implementation of it into the system. Software / Hardware Requirements In order to make this project successful there are some hardware and software which is required to use in order to complete the project are: Software and Hardware requirement to develop the system. Software: SQL YOG: is the database software that the author chose to be implemented inside the College Announcement Notification system. SQL Yog had the user friendly interface and it is open source software. XAMPP: this software is applied as the localhost to compile the web based application. Adobe Dreamweaver: is the software that makes it easier to edit the coding for PHP, JAVA. Hardware: PC (with mouse, keyboard, monitor) / laptop with minimum specification: Intel Core Duo processor(1.66Hz), 1GB RAM, 60GB 5400 RPM HDD Software and Hardware Requirement to run the system. User Side Hardware Requirement: PC (with mouse, keyboard, monitor) / laptop with minimum specification: Intel Core Duo processor(1.66Hz), 1GB RAM, 60GB 5400 RPM HDD User Side Software Requirement: Web browser: Mozilla Firefox, IE, Google Chrome, etc Server Side Hardware Requirement: PC (with mouse, keyboard, monitor) / laptop with minimum specification: Intel Core Duo processor(1.66Hz), 1GB RAM, 60GB 5400 RPM HDD GSM Modem Server Side Software Requirement: Adobe Dreamweaver SQL Yog Web Browser: Mozilla Firefox, IE, Google Chrome, etc XAMPP Server side software requirement is needed to do the regular maintenance on the system. The development software might be needed to fix error that might be occurred when the system on the run. Chapter 2: Literature Review Literature Review Literature Review is a critical look at the existing research that is significant to the work that is currently undergo. The author currently did a project; College Announcement Notification System is the project. College Announcement Notification System is a web based application system, which is proposed as a solution to Sunway University College regarding the poor information flow in Sunway University College especially School of Computer Technology. The author chose to propose the solution only to School of Computer Technology because of the course that currently taken is under it. College Announcement Notification System is a web based application, it is hoped the system would work perfectly and increasing the information flow within School of Computer Technology (SCT). The users of the system able to access the College Announcement Notification System via laptop or PC, as long there is an internet connection. The author think if it just a normal website, there is no uniqueness that makes my project different than the others. After doing research, the author decided to add the SMS feature as the instant notification system. Integrate the system with SMS feature; means need to deal with SMS gateway. The author aware that using the SMS feature is almost the same like adding the Email as the instant notification where the system is able to send automatically the posted announcement that is already posted in the website. Email is an electronic mail that worked same like a normal mail, where the users need to write the content of the letter, after that the address of the recipient is a must for the users to add. Email enables users to send and receive electronically over the internet. SMS and Email basically is the same, it contains text and to send it need to know the exact recipient email address for email and phone number for SMS. There are many email server company that is give services for the users to send and receive email such as Hotmail, Yahoo Mail, Go ogle Mail, etc. There is also an application that handles email such as Microsoft Outlook. Some advantages that email could give are emails is free for users to use like send and receive mail, it can contains richer message contents than the conventional mail did. However from the advantages that an email, there are also a few disadvantages of emails. With the advancement of the technology nowadays, the previous email only can sent the words but nowadays, users can sent not only words but can attach richer media such as picture, video, file, etc. This advantages of email were misused by some people, it enable them to send virus, malicious software, spam that can harm the recipients PC or laptop. In order to overcome this security issue, the email provider companies try many ways to increase the security but the spammer can overcome the security and still sent the spam email that may contain virus and malicious software. Using the email as an instant notification to the College Announcement Notification System is a good choice but users may not open their own email daily, usually users open their email whenever the feel like to open it. Therefore, the author proposed to use the SMS system as the instant notification. There are few reasons that become the considerations of choosing SMS to be implemented. First reason, the project is a notification system so SMS is the best choice because after the sender sent it then the recipients received it in instant. Second reason, if using email the recipients of the email need to open their own laptop or PC, and then open the email service web page, it will takes time and not instant. Most of the students nowadays had their own mobile phone and they carry their mobile phone everywhere they go, so it is one of the reason why the author choose to use SMS as an instant notification. Mobile phone user aware that open a SMS is faster than open an Email. Nowadays, ma ny mobile phone producers now produced a new mobile phone that can handles in send or receive an email. However mobile phone that can handles send and receive email is still too expensive for the most of the mobile phone users only a few that can afford that. But if the SMS only, most of the mobile phone users able to send and receive that because it is the basic function that the mobile phone offer. SMS (Short Messaging Service) As most people known, SMS is a protocol used in communication that gives way to exchange of short message from one mobile phone to another mobile phone (tech-faq.com, 2009). Nowadays mobile phone takes an important part because it provides connections to the others that in the past impossible to do. The main usage of the mobile phone is to enable users to make a phone call wherever and whenever they are, beside used to call others; other main function of mobile phone that is growing rapidly is the usage of SMS service. SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages between mobile phones. SMS first appeared in Europe in 1992. It was included in the GSM (Global System for Mobile Communications) standards right at the beginning. Later it was ported to wireless technologies like CDMA and TDMA. The GSM and SMS standards were originally developed by 3GPP (Third Generation Partnership Project) is responsible for the development and maintenance of the GSM and SMS standards. As suggested by the name Short Message Service, the data that can be held by an SMS message is very limited. One SMS message can contain at most 140 bytes (1120 bits) of data, so one SMS message can contain up to: 160 characters if 7-bit character encoding is used. (7-bit character encoding is suitable for encoding Latin characters like English alphabets.) 70 characters if 16-bit Unicode UCS2 character encoding is used. (SMS text messages containing non-Latin characters like Chinese characters should use 16-bit character encoding.) SMS text messaging supports languages internationally. It works fine with all languages supported by Unicode, including Arabic, Chinese, Japanese and Korean. Besides text, SMS messages can also carry binary data. It is possible to send ringtones, pictures, operator logos, wallpapers, animations, business cards (e.g. VCards) and WAP configurations to a mobile phone with SMS messages. One major advantage of SMS is that it is supported by 100% GSM mobile phones. Almost all subscription plans provided by wireless carriers include inexpensive SMS messaging service. Unlike SMS, mobile technologies such as WAP and mobile Java are not supported on many old mobile phone models. (developershome.com, 2008) Usage of SMS As the mobile voice communication market approaches saturation, carriers are focusing on messaging as crucial value -added service to garner more mobile subscribers and generate greater market revenue. Specifically, SMS (Short Messaging Service) is emerging as one of the most important asynchronous communication that carriers provide. It is projected that in 2009 U.S subscribers will send over 126 billion messages via their mobile phone device, generating $8.6 billion revenues (Deng, Sun, Turner, Prince, 2008). Nowadays, people are presented with a wide variety of communication media such as email, instant messaging (IM), etc. To date, most researchers have focused on the use of SMS by teenager and young adult. Recently as SMS become the needs in our daily lives, older people also recognized the convenience of using SMS. It has been reported that over 74% of the mobile phone users worldwide is using SMS text messaging (Deng, Sun, Turner, Prince, 2008). How does the SMS works? Even if you are not talking on your cell phone, your phone is constantly sending and receiving information. It is talking to its cell phone tower over a pathway called acontrol channel. The reason for this chatter is so that the cell phone system knows which cell your phone is in, and so that your phone can change cells as you move around. Every so often, your phone and the tower will exchange a packetof data that lets both of them know that everything is OK. Your phone also uses the control channel for call setup. When someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play itsringtone. The tower also gives your phone a pair of voice channel frequencies to use for the call. The control channel also provides the pathway for SMS messages. When a friend sends you an SMS message, the message flows through the SMSC, then to the tower, and the tower sends the message to your phone as a little packet of data on the control channel. In the same way, when you send a message, your phone sends it to the tower on the control channel and it goes from the tower to the SMSC and from there to its destination. (howstuffworks.com, 2005) The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives and sends short messages. The SME was sent to the SMSC.TheSMSC (Short Message Service Center)is the entity which does the job of store and forward of messages to and from the mobile station. After receiving the SME, then SMSC sent the SME to the SMS GMSC. TheSMS GMSC(SMS gateway MSC (Mobile Switching Center)) is a gateway so that MSC that can also receive short messages. The gateway MSC is a mobile networks point of contact with other networks. On receiving the short message from the short message center, GMSC uses the SS7 network to interrogate the current position of the mobile station form the HLR, the home location register. HLRis the main database in a mobile network. It holds information of the subscription profile of the mobile and also about the routing information for the subscriber, i.e. the area (covered by a MSC) where the mobile is currently situated. The GMSC is thus able to pass on the message to the correct MSC. MSC(Mobile Switching Center) is the entity in a GSM network which does the job of switching connections between mobile stations or between mobile stations and the fixed network. AVLR(Visitor Location Register) corresponds to each MSC and contains temporary information about the mobile, information like mobile identification and the cell (or a group of cells) where the mobile is currently situated. Using information from the VLR the MSC is able to switch the information (short message) to the corresponding BSS (Base Station System, BSC + BTSs), which transmits the short message to the mobile. The BSS consists of transceivers, which send and receive information over the air interface, to and from the mobile station. This information is passed over the signaling channels so the mobile can receive messages even if a voice or data call is going on. (logixmobile.com) How to send SMS using a computer? After done some research about how the SMS works, there are several ways in sending SMS using computer, they are (developershome.com, 2008): Connect a mobile phone or GSM/GPRS modem to a computer / PC. Then use the computer / PC and VB commands to instruct the mobile phone or GSM/GPRS modem to send SMS message. Connect the computer / PC to the SMS center (SMSC) or SMS gateway of a wireless carrier or SMS service provider. Then send SMS messages using a protocol / interface supported by the SMSC or SMS gateway. Connection between mobile phone or GSM/GPRS modem to computer using VB command for sent SMS A GSM/GPRS modem is a wireless modem that works with GSM/GPRS wireless networks. A wireless modem is similar to a dial-up modem. The main difference is that a wireless modem transmits data through a wireless network whereas a dial-up modem transmits data through a copper telephone line. To send SMS messages, first place a valid SIM card from a wireless carrier into a mobile phone or GSM/GPRS modem, which is then connected to a computer. There are several ways to connect a mobile phone or GSM/GPRS modem to a computer. For example, they can be connected through a serial cable, a USB cable, a Bluetooth link or an infrared link. The actual way to use depends on the capability of the mobile phone or GSM/GPRS modem. After connecting a mobile phone or GSM/GPRS modem to a computer, you can control the mobile phone or GSM/GPRS modem by sending instructions to it. The instructions used for controlling the mobile phone or GSM/GPRS modem are called by using VB commands. The above figure showed the process of sending SMS using the VB application. In this case, the system that the author developed is using PHP that act as the third party to store the announcement data inside the database. After finish with the stored announcement, VB application is used to instruct the GSM modem to send SMS. As shown in the figure above, VB application will retrieve the stored data that will be sent as SMS. Then after retrieving the data, it will be sent to through SMS gateway until it arrived in the hand of the recipient. One of the benefits from using the VB application to send SMS is users will have a very reliable notification system, because before sending SMS intended recipient can be configured so it is received at the intended recipient. Using a mobile phone or GSM/GPRS modem to send SMS messages has a major drawback, which is the SMS sending rate is too low. Only 6-10 SMS messages can be sent per minute (when the SMS over GSM mode is used). The performance is not affected by the connection between the computer and the mobile phone or GSM/GPRS modem (i.e. the SMS sending rate is about the same no matter the mobile phone or GSM/GPRS modem is connected to the computer through a serial cable, USB cable, Bluetooth link or infrared link) and does not depend on whether a mobile phone or GSM/GPRS modem is used (i.e. the SMS sending rate is about the same no matter a mobile phone or a GSM/GPRS modem is used). The determining factor for the SMS sending rate is the wireless network. (developershome.com, 2008) Send SMS from Computer through SMS Gateway The way for sending SMS messages from a computer through a mobile phone or GSM/GPRS modem has a major limitation, which is the SMS sending rate is too low. If you need a high SMS sending rate, obtaining a direct connection to the SMS center (SMSC) or SMS gateway of a wireless carrier is necessary. It can be difficult for small businesses or individual application developers to obtain a direct connection to the SMSC or SMS gateway of a wireless carrier since a wireless carrier may only provide such service to those who have huge SMS traffic. Buying SMS messages in bulk means the total fee will be very high (although the fee per SMS message will be low). (deve Development of College Announcement Notification System Development of College Announcement Notification System Chapter 1: Introduction Introduction This project proposal is created to propose an IT solution to the student of Sunway University. The main point that the author want to highlight is regarding the efficiencies for student in Sunway University. An example, inefficiencies that occur in posting the announcement that is post on the website or in the notice board, it is hard to inform to the student and also the staff may also forget to post the announcement that will inconvenient for the student itself. In order to solve those problems, the author proposed to create a website as a third party for the staff to post the announcement. The author feel that only a website is very simple and common nowadays, so to improve the effectiveness and give more efficiency, a SMS (Short Messaging Service) feature is added to the system. Every announcement is posted by the SCT Staffs in the website, a SMS notification will be sent to the student that already registered to the website. The content of the SMS just a brief notification abou t the title of the event, venue and time, for more brief detail the students can refer to the website. Other way to notify the students is used Email as an instant notifier, but consider using email as an instant notifier is not really effective because students didnt open their email every day but using the SMS as the instant notifier to notify the students are more effective because most of the student is own and bring their own cell phone, therefore the MS as an instant notifier is more appropriate. Since the advancement of the technology nowadays, using this system will help in reduce the paper usage. Project Objective To give efficiencies for staff of Sunway University who want to post announcement. To use SMS as an instant notifier, for example every announcement post on the website the student will receive a SMS about the annoncement. In long term of view, this system will help in notify student about things that happen in college. Project Scope To become the most useful media for announcement notification. When the system is run it involves the Sunway University students and staffs that want to use the service. The user of the system should be students of Sunway University and staffs. All users that want to use the system have to become member. Methodology Methodology is a formalized approach to implement the SDLC (System Development Life Cycle). There are many different systems development methodologies, and each one is unique based on the order and focus it places on each SDLC phase. Some methodologies are formal standards used y government agencies, while others have been developed by consulting firms to sell to client. Many organizations have internal methodologies that have been honed over the years, and they explain exactly how each phase of the SDLC is to be performed in that company. There are many ways to categorize methodologies. One way is looking at whether they focus on business process or the data that support the business. There are three types of system development methodologies, it is called Structured Design, RAD (Rapid Application Development), and Agile Development. Types of Software Development Methodologies Structured Design This is the first type of system development, it is introduced in 1980s. This methodology adopts the formal step by step approach to the SDLC, it moves logically from one phase to another phase. Waterfall Model This is the original structured design of methodology, with this methodology, the analyst and users proceed in sequence from one phase to the next phase. The key deliverables for each phase are typically very long and are presented to the project sponsor for approval as the project moves from phase to phase. This methodology is referred to as waterfall development because it moves forward from phase to phase in the same manner as a waterfall. Advantages of using waterfall model: It identifies system requirements long before programming begins It minimizes changes to the requirements as the project proceeds. Disadvantages of using waterfall model: The design must be completely specified before programming begins This model required significant rework, if there is a changes in the business environment, in order to going back to the initial phase need to go through each of the subsequent phase in return. Parallel Development This model of methodology attempts to address the problem of long delay between analysis phase and the delivery of the system. Instead of doing design and implementation in sequence, it performs a general design for the whole system and then divides the project into a series of distinct subprojects that can be designed and implemented in parallel. Once all subprojects are complete, there is a final integration of the separate pieces, and the system is delivered. Advantage of using parallel model: It can reduce the schedule time to deliver a system There is less chance of changes in the business environment causing rework Disadvantage of using parallel model: The approach still suffers from problem caused by paper documents It adds new problem, sometimes subprojects arent completely independent; design decisions made in one subproject may affect another subprojects Phased Development In this model, the overall system is divided into a series of version that are developed sequentially. The analysis phase identifies the overall system concept, and the project team, users and system sponsors then categorize the requirement into a series of version. Advantage of using phased model: Quickly getting a useful system into the hands of the users While the system does not perform all the functions the users need at first, it does begin to provide business value sooner than if the system were delivered after completion, as is the case with waterfall or parallel methodology. Disadvantage of using phased model: The users begin to work with the systems that are intentionally incomplete, it is critical to identify the most important and useful feature and include them in the first version, while managing users expectation along the way. Prototyping In this model, it performs the analysis, design and implementation phases concurrently, and all the three phases are performed repeatedly in a cycle until the system is completed. In this methodology, the basics of analysis and design are performed, and work immediately begins on a system prototype, a â€Å"quick and dirty† program that provides a minimal amount of features. Advantage of using prototyping model: It is very quickly provides a system for the users to interact with, even it is not ready for widespread organizational use at first. Reassure the users that the project team is working on the system Helps to more quickly refine real requirements rather than attempting to understand a system specification on paper, the user can interact with the prototype to better understand what it can do and cannot do. Disadvantage of using prototyping model: Its fast paced system releases challenge attempts to conduct careful, methodical analysis. This can cause problems in the development of complex systems because fundamental issues and problems are not recognized until well into the development process. Software Development Methodology Comparison After do research about the types of methodology that is appropriate to be used into the project. The author compared the 4 types of methodology that is compatible with the current development. The following table is the result of using the described methodology to the project. System Characteristic Waterfall Parallel Phased Prototyping Unclear User Requirement Poor Poor Good Excellent Unfamiliar Technology Poor Poor Good Poor Complexity of the System Good Good Good Poor Reliability of the System Good Good Good Poor Short Time Schedule Poor Good Excellent Excellent Schedule Visibility Poor Poor Excellent Excellent Table 1 Methodology Comparison Selecting the appropriate Methodology According to the project objective that the author proposed, author analyze each methodology that is already been researched. The author decides to use the Phased Methodology. The main reason on why the author uses this methodology is because the author would develop this system all by himself and the project will be easier to be built phase by phase. Other considerations in choosing this model are: User Requirement: the requirement of the system is clear, which is to address the problem of inefficiency and ineffectiveness of conventional way in notify the student for announcement. Familiarity with Technology: for designing the website, PHP, VB.Net language technology is going to be used, since it is still in area of the author expertise. System Complexity: the complexity of this project is at medium level, since the author familiar with the technology used in the project so it is not really difficult. However the author still need to do research on certain area of technology, for this case the knowledge of SMS gateway, and how to integrate the web based system with the SMS gateway. Duration: the duration of developing the project is approximately 4 months in order to fully complete the project. Development Method: it is a web based application that is built using the PHP, and VB.NET as the programming language. Area of Research Certain areas that we research for this project are: How to create easy and manageable database system? What is SMS (Short Message Service) portal and SMS (Short Message Service) gateway? How to integrate web based system with SMS portal? How to create easy and manageable database system? This part is one of the crucial parts in order to make a good web based application system. Therefore, creating an easy and manageable database system is really important. The database system that the author used to manage the College Announcement System web based application is MySQL. Several reasons become the consideration of choosing the MySQL software are, first reason is because the main programming language system that the author built is using the PHP technology, and PHP language has an integrated connector that able to connect it to SQL. Second reason, MySQL is open source software so it is free for download, it is will help in determining the project cost development. There is other software which is better than MySQL but looked back at the scope of the project; this is just an undergraduate project, then the author decides that using MySQL software is a wiser choice. The third reason, the author already took the MySQL subject during the study in Sunway University College, which is still in the author expertise. However, if this system wants to be implemented into the real organization, further study to create easy and manageable design is needed. When the project is already on the run, this would be very beneficial in doing maintenance of the application system. How to integrate the Web based System with SMS portal? As most people known that SMS is the most famous service that a mobile phone give. It is a service where the users able to send short text message from a mobile phone to another mobile phone. Basically the SMS would not work with just the mobile phone itself, it I because the Mobile Phone Network Operator that give the service so the SMS can be delivered to the recipient by the help of the mobile phone device as the medium to type the message. The SMS can travel all the way from the sender device to the recipient device must go through a pathway through a network called SMSC (Short Message Service Centre). SMSC works as a hardware that stores the SMS that is sent from a mobile phone then forward it again to the recipient. From the early of 1990s, the era when the first SMS is sent through the network using the mobile phone device. Nowadays with the advancement of the technology, SMS not only can be done through using mobile phone but can be integrated in other application such as web based application system, using the SMS gateway technology. However, the SMS that is sent still have to go through SMSC, which is still needed to use the SIM Card that is given by the mobile network operator. SMS gateway act as a bridge the platform that cannot use the mobile phone SIM Card to use the mobile service by using the GSM modem, in this case the mobile service is to send the SMS. The mobile SIM Card will be inserted into the GSM modem. GSM modem will act as the third party to connect to the SMSC. The web based application store the message that will be sent into the database, and the GSM will retrieve the data from the database and ready to send the SMS to the destination number. The basic function of SMS and e mail is the same, for email the sender need to enter the destination email and for SMS the sender need to enter the destination phone number. The difference is why SMS is more popular than email is because it is mobile and user can send and receive SMS wherever they are. The mobile advantage of using SMS is the reason that makes the author choose the SMS application system to be added into the College Announcement Notification system instead of using email. Another reason the author choose to use SMS is because most of the students in Sunway didnt have mobile phone that can handles in receiving and sending email, but most of the students have mobile phone that enable them to send and receive SMS. Therefore, using the SMS as additional software into College Announcement Notification system is the best choice, and the author also learn to use the GSM modem and the implementation of it into the system. Software / Hardware Requirements In order to make this project successful there are some hardware and software which is required to use in order to complete the project are: Software and Hardware requirement to develop the system. Software: SQL YOG: is the database software that the author chose to be implemented inside the College Announcement Notification system. SQL Yog had the user friendly interface and it is open source software. XAMPP: this software is applied as the localhost to compile the web based application. Adobe Dreamweaver: is the software that makes it easier to edit the coding for PHP, JAVA. Hardware: PC (with mouse, keyboard, monitor) / laptop with minimum specification: Intel Core Duo processor(1.66Hz), 1GB RAM, 60GB 5400 RPM HDD Software and Hardware Requirement to run the system. User Side Hardware Requirement: PC (with mouse, keyboard, monitor) / laptop with minimum specification: Intel Core Duo processor(1.66Hz), 1GB RAM, 60GB 5400 RPM HDD User Side Software Requirement: Web browser: Mozilla Firefox, IE, Google Chrome, etc Server Side Hardware Requirement: PC (with mouse, keyboard, monitor) / laptop with minimum specification: Intel Core Duo processor(1.66Hz), 1GB RAM, 60GB 5400 RPM HDD GSM Modem Server Side Software Requirement: Adobe Dreamweaver SQL Yog Web Browser: Mozilla Firefox, IE, Google Chrome, etc XAMPP Server side software requirement is needed to do the regular maintenance on the system. The development software might be needed to fix error that might be occurred when the system on the run. Chapter 2: Literature Review Literature Review Literature Review is a critical look at the existing research that is significant to the work that is currently undergo. The author currently did a project; College Announcement Notification System is the project. College Announcement Notification System is a web based application system, which is proposed as a solution to Sunway University College regarding the poor information flow in Sunway University College especially School of Computer Technology. The author chose to propose the solution only to School of Computer Technology because of the course that currently taken is under it. College Announcement Notification System is a web based application, it is hoped the system would work perfectly and increasing the information flow within School of Computer Technology (SCT). The users of the system able to access the College Announcement Notification System via laptop or PC, as long there is an internet connection. The author think if it just a normal website, there is no uniqueness that makes my project different than the others. After doing research, the author decided to add the SMS feature as the instant notification system. Integrate the system with SMS feature; means need to deal with SMS gateway. The author aware that using the SMS feature is almost the same like adding the Email as the instant notification where the system is able to send automatically the posted announcement that is already posted in the website. Email is an electronic mail that worked same like a normal mail, where the users need to write the content of the letter, after that the address of the recipient is a must for the users to add. Email enables users to send and receive electronically over the internet. SMS and Email basically is the same, it contains text and to send it need to know the exact recipient email address for email and phone number for SMS. There are many email server company that is give services for the users to send and receive email such as Hotmail, Yahoo Mail, Go ogle Mail, etc. There is also an application that handles email such as Microsoft Outlook. Some advantages that email could give are emails is free for users to use like send and receive mail, it can contains richer message contents than the conventional mail did. However from the advantages that an email, there are also a few disadvantages of emails. With the advancement of the technology nowadays, the previous email only can sent the words but nowadays, users can sent not only words but can attach richer media such as picture, video, file, etc. This advantages of email were misused by some people, it enable them to send virus, malicious software, spam that can harm the recipients PC or laptop. In order to overcome this security issue, the email provider companies try many ways to increase the security but the spammer can overcome the security and still sent the spam email that may contain virus and malicious software. Using the email as an instant notification to the College Announcement Notification System is a good choice but users may not open their own email daily, usually users open their email whenever the feel like to open it. Therefore, the author proposed to use the SMS system as the instant notification. There are few reasons that become the considerations of choosing SMS to be implemented. First reason, the project is a notification system so SMS is the best choice because after the sender sent it then the recipients received it in instant. Second reason, if using email the recipients of the email need to open their own laptop or PC, and then open the email service web page, it will takes time and not instant. Most of the students nowadays had their own mobile phone and they carry their mobile phone everywhere they go, so it is one of the reason why the author choose to use SMS as an instant notification. Mobile phone user aware that open a SMS is faster than open an Email. Nowadays, ma ny mobile phone producers now produced a new mobile phone that can handles in send or receive an email. However mobile phone that can handles send and receive email is still too expensive for the most of the mobile phone users only a few that can afford that. But if the SMS only, most of the mobile phone users able to send and receive that because it is the basic function that the mobile phone offer. SMS (Short Messaging Service) As most people known, SMS is a protocol used in communication that gives way to exchange of short message from one mobile phone to another mobile phone (tech-faq.com, 2009). Nowadays mobile phone takes an important part because it provides connections to the others that in the past impossible to do. The main usage of the mobile phone is to enable users to make a phone call wherever and whenever they are, beside used to call others; other main function of mobile phone that is growing rapidly is the usage of SMS service. SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages between mobile phones. SMS first appeared in Europe in 1992. It was included in the GSM (Global System for Mobile Communications) standards right at the beginning. Later it was ported to wireless technologies like CDMA and TDMA. The GSM and SMS standards were originally developed by 3GPP (Third Generation Partnership Project) is responsible for the development and maintenance of the GSM and SMS standards. As suggested by the name Short Message Service, the data that can be held by an SMS message is very limited. One SMS message can contain at most 140 bytes (1120 bits) of data, so one SMS message can contain up to: 160 characters if 7-bit character encoding is used. (7-bit character encoding is suitable for encoding Latin characters like English alphabets.) 70 characters if 16-bit Unicode UCS2 character encoding is used. (SMS text messages containing non-Latin characters like Chinese characters should use 16-bit character encoding.) SMS text messaging supports languages internationally. It works fine with all languages supported by Unicode, including Arabic, Chinese, Japanese and Korean. Besides text, SMS messages can also carry binary data. It is possible to send ringtones, pictures, operator logos, wallpapers, animations, business cards (e.g. VCards) and WAP configurations to a mobile phone with SMS messages. One major advantage of SMS is that it is supported by 100% GSM mobile phones. Almost all subscription plans provided by wireless carriers include inexpensive SMS messaging service. Unlike SMS, mobile technologies such as WAP and mobile Java are not supported on many old mobile phone models. (developershome.com, 2008) Usage of SMS As the mobile voice communication market approaches saturation, carriers are focusing on messaging as crucial value -added service to garner more mobile subscribers and generate greater market revenue. Specifically, SMS (Short Messaging Service) is emerging as one of the most important asynchronous communication that carriers provide. It is projected that in 2009 U.S subscribers will send over 126 billion messages via their mobile phone device, generating $8.6 billion revenues (Deng, Sun, Turner, Prince, 2008). Nowadays, people are presented with a wide variety of communication media such as email, instant messaging (IM), etc. To date, most researchers have focused on the use of SMS by teenager and young adult. Recently as SMS become the needs in our daily lives, older people also recognized the convenience of using SMS. It has been reported that over 74% of the mobile phone users worldwide is using SMS text messaging (Deng, Sun, Turner, Prince, 2008). How does the SMS works? Even if you are not talking on your cell phone, your phone is constantly sending and receiving information. It is talking to its cell phone tower over a pathway called acontrol channel. The reason for this chatter is so that the cell phone system knows which cell your phone is in, and so that your phone can change cells as you move around. Every so often, your phone and the tower will exchange a packetof data that lets both of them know that everything is OK. Your phone also uses the control channel for call setup. When someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play itsringtone. The tower also gives your phone a pair of voice channel frequencies to use for the call. The control channel also provides the pathway for SMS messages. When a friend sends you an SMS message, the message flows through the SMSC, then to the tower, and the tower sends the message to your phone as a little packet of data on the control channel. In the same way, when you send a message, your phone sends it to the tower on the control channel and it goes from the tower to the SMSC and from there to its destination. (howstuffworks.com, 2005) The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives and sends short messages. The SME was sent to the SMSC.TheSMSC (Short Message Service Center)is the entity which does the job of store and forward of messages to and from the mobile station. After receiving the SME, then SMSC sent the SME to the SMS GMSC. TheSMS GMSC(SMS gateway MSC (Mobile Switching Center)) is a gateway so that MSC that can also receive short messages. The gateway MSC is a mobile networks point of contact with other networks. On receiving the short message from the short message center, GMSC uses the SS7 network to interrogate the current position of the mobile station form the HLR, the home location register. HLRis the main database in a mobile network. It holds information of the subscription profile of the mobile and also about the routing information for the subscriber, i.e. the area (covered by a MSC) where the mobile is currently situated. The GMSC is thus able to pass on the message to the correct MSC. MSC(Mobile Switching Center) is the entity in a GSM network which does the job of switching connections between mobile stations or between mobile stations and the fixed network. AVLR(Visitor Location Register) corresponds to each MSC and contains temporary information about the mobile, information like mobile identification and the cell (or a group of cells) where the mobile is currently situated. Using information from the VLR the MSC is able to switch the information (short message) to the corresponding BSS (Base Station System, BSC + BTSs), which transmits the short message to the mobile. The BSS consists of transceivers, which send and receive information over the air interface, to and from the mobile station. This information is passed over the signaling channels so the mobile can receive messages even if a voice or data call is going on. (logixmobile.com) How to send SMS using a computer? After done some research about how the SMS works, there are several ways in sending SMS using computer, they are (developershome.com, 2008): Connect a mobile phone or GSM/GPRS modem to a computer / PC. Then use the computer / PC and VB commands to instruct the mobile phone or GSM/GPRS modem to send SMS message. Connect the computer / PC to the SMS center (SMSC) or SMS gateway of a wireless carrier or SMS service provider. Then send SMS messages using a protocol / interface supported by the SMSC or SMS gateway. Connection between mobile phone or GSM/GPRS modem to computer using VB command for sent SMS A GSM/GPRS modem is a wireless modem that works with GSM/GPRS wireless networks. A wireless modem is similar to a dial-up modem. The main difference is that a wireless modem transmits data through a wireless network whereas a dial-up modem transmits data through a copper telephone line. To send SMS messages, first place a valid SIM card from a wireless carrier into a mobile phone or GSM/GPRS modem, which is then connected to a computer. There are several ways to connect a mobile phone or GSM/GPRS modem to a computer. For example, they can be connected through a serial cable, a USB cable, a Bluetooth link or an infrared link. The actual way to use depends on the capability of the mobile phone or GSM/GPRS modem. After connecting a mobile phone or GSM/GPRS modem to a computer, you can control the mobile phone or GSM/GPRS modem by sending instructions to it. The instructions used for controlling the mobile phone or GSM/GPRS modem are called by using VB commands. The above figure showed the process of sending SMS using the VB application. In this case, the system that the author developed is using PHP that act as the third party to store the announcement data inside the database. After finish with the stored announcement, VB application is used to instruct the GSM modem to send SMS. As shown in the figure above, VB application will retrieve the stored data that will be sent as SMS. Then after retrieving the data, it will be sent to through SMS gateway until it arrived in the hand of the recipient. One of the benefits from using the VB application to send SMS is users will have a very reliable notification system, because before sending SMS intended recipient can be configured so it is received at the intended recipient. Using a mobile phone or GSM/GPRS modem to send SMS messages has a major drawback, which is the SMS sending rate is too low. Only 6-10 SMS messages can be sent per minute (when the SMS over GSM mode is used). The performance is not affected by the connection between the computer and the mobile phone or GSM/GPRS modem (i.e. the SMS sending rate is about the same no matter the mobile phone or GSM/GPRS modem is connected to the computer through a serial cable, USB cable, Bluetooth link or infrared link) and does not depend on whether a mobile phone or GSM/GPRS modem is used (i.e. the SMS sending rate is about the same no matter a mobile phone or a GSM/GPRS modem is used). The determining factor for the SMS sending rate is the wireless network. (developershome.com, 2008) Send SMS from Computer through SMS Gateway The way for sending SMS messages from a computer through a mobile phone or GSM/GPRS modem has a major limitation, which is the SMS sending rate is too low. If you need a high SMS sending rate, obtaining a direct connection to the SMS center (SMSC) or SMS gateway of a wireless carrier is necessary. It can be difficult for small businesses or individual application developers to obtain a direct connection to the SMSC or SMS gateway of a wireless carrier since a wireless carrier may only provide such service to those who have huge SMS traffic. Buying SMS messages in bulk means the total fee will be very high (although the fee per SMS message will be low). (deve